Data Protection
Pathway: Education
Prerequisite: Leadership
Data protection course that deals with relevant laws in Kenya
#Data_protection#Relevant_Law
1. Analyze and interpret Kenya’s Data Protection Act, 2019 and subsidiary regulations (including the Data Protection (General) Regulations, 2021 and Registration of Data Controllers and Data Processors Regulations, 2021) to determine organizational obligations, roles, lawful bases, and data subject rights across typical processing scenarios.
Learning Targets:
1. Differentiate personal data from sensitive personal data under Kenyan law and identify associated compliance implications.
2. Classify organizational roles (controller, joint controller, processor) for case scenarios and assign statutory responsibilities accordingly.
3. Determine and document an appropriate lawful basis for specific processing purposes and assess purpose compatibility.
4. Map applicable data subject rights and statutory response timelines to common requests (access, correction, erasure, portability, objection, restriction).
5. Identify when registration with the Office of the Data Protection Commissioner (ODPC) is required and compile the necessary registration inputs.
Modules
1. Kenyan Data Protection Law Foundations
1. 1. Scope, Definitions, and Legal Structure of the DPA, 2019
Learning Outcomes:
1. Differentiate personal data, sensitive personal data, and anonymized data under Kenyan law and cite compliance implications for each category
2. Map the material and territorial scope of the DPA, 2019 to common organizational scenarios including public, private, and non-profit entities
3. Analyze the interaction between the DPA, the General Regulations 2021, and Registration Regulations 2021 to delineate enforceable obligations
4. Classify lawful processing principles (lawfulness, fairness, transparency, purpose limitation, minimization, accuracy, storage limitation, integrity/confidentiality, accountability) and align them to operational controls
5. Interpret ODPC powers, enforcement mechanisms, and penalties to assess regulatory risk exposure for hypothetical cases
6. Evaluate applicability of exemptions and limitations (e.g., national security, journalism, research) and document conditions for valid reliance
7. Construct a compliance checklist that ties statutory definitions and principles to concrete organizational policies and procedures
