Wednesday, March 3, 2021
CybersecFill
Advertisement
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us
No Result
View All Result
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us
No Result
View All Result
CybersecFill
No Result
View All Result
Home Blog

NIGERIA DATA PROTECTION REGULATION,2019

Cybersecfill by Cybersecfill
January 31, 2019
in Blog
0
Nigeria Data Protection
Share on FacebookShare on Twitter

Is Nigeria ready to protect the data of it’s Citizens?

The National information Technology and development Agency (NITDA) on 25 january,2019 released five information technology, IT, Guidelines and regulatory frameworks to guide the deployment of IT, data harnessing and protection, social media usage in government ministries, departments and agencies, MDAs, to aiding the ease of doing business in Nigeria.

They guidelines include: The Rulemaking Process Regulation of NITDA, Nigerian Data Protection Regulation, Guideline for IT Clearance, Guidelines for Public Internet Access and Framework for Use of Social Media in Public Institutions.

We are more interested in the Nigerian Data Protection Regulation as the protection of data has been a major challenge in Nigeria.

The Objective of the Nigeria Data Protection Regulation .

The objective is to:

  1. Safeguard the rights of natural persons to data privacy.
  2. Foster safe conduct of transactions involving the exchange of personal data
  3. Prevent manipulation of personal data.
  4. Ensure that Nigerian businesses remain competitive in international trade; through the safeguards afforded by a just and equitable legal regulatory framework on data protection and which regulatory framework is in tune with global best practices.

Nigeria is known to have best practices in the aspect of policies and regulations been put in place. The major challenge is the implementation of policies and regulations.

Will the Nigeria Protection Regulation be strictly adhered to, Does NITDA have the capability to monitor the implementation of this regulations?

How will NITDA evaluate the compliance of this regulations?

This questions will be kept in our minds.

We are hoping for some improvement with Data with the new Regulations.

Read more on the Comprehensive Data protection Regulations here

Related Post:

Nigeria data protection regulation, a step towards data protection in Nigeria

 

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!

Tags: BingBlogConferencecybersecurityData PrivacyData RegulationNigeriaNITDAonline safetyYahoo
Cybersecfill

Cybersecfill

An independent Nigeria cybersecurity blog aimed at sharing cybersecurity news, articles ,blog and opinins.

Next Post
Android device hack

Android device hack

0 0 vote
Article Rating
Login
guest
guest
0 Comments
Inline Feedbacks
View all comments

Subscribe

Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!

  • Trending
  • Comments
  • Latest
credit card cloning

How Credit/Debit Cards are Cloned / Preventing Card Cloning

December 26, 2019
Wifi 6 Security

Did Wi-Fi 6 come with an Improvement In Security?

May 13, 2019
Nationa Cybersecurity Strategy

A Review of the Nigeria National Cybersecurity Strategy

July 1, 2019
Wireless Access Point

How To Secure Your Wireless Access Point (WAP)

August 3, 2019
Facebook

Facebook’s New Settings Allows Hackers To Easily Pentest Facebook,Instagram Mobile Applications

8
Nationa Cybersecurity Strategy

A Review of the Nigeria National Cybersecurity Strategy

6
Cybersecurity Jobs

Cybersecurity Jobs – You can create your own Cybersecurity Role

4
open Source intelligence tools

Open Source Intelligence tools – OSINT

4
5G Dangers: What are the Cybersecurity implications?

5G Dangers: What are the Cybersecurity implications?

March 1, 2021
Key Differences Between Firewall And Antivirus

Key Differences Between Firewall And Antivirus

February 27, 2021
Cybersecurity for Remote Workers: 8 ways to work safer…

Cybersecurity for Remote Workers: 8 ways to work safer…

February 24, 2021
Cloud Account Hijacking

Cloud Account Hijacking

February 22, 2021

Recommended

5G Dangers: What are the Cybersecurity implications?

5G Dangers: What are the Cybersecurity implications?

March 1, 2021
Key Differences Between Firewall And Antivirus

Key Differences Between Firewall And Antivirus

February 27, 2021
Cybersecurity for Remote Workers: 8 ways to work safer…

Cybersecurity for Remote Workers: 8 ways to work safer…

February 24, 2021
Cloud Account Hijacking

Cloud Account Hijacking

February 22, 2021

© 2020 CybersecFill. All Rights Reserved.

No Result
View All Result
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us

© 2020 CybersecFill. All Rights Reserved.

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply