
Data Controller Vs. Data Processor
The Data Protection Act requires that all Data Controllers and Processors be registered.
The Act defines a "data controller" as a natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purpose and means of processing of personal data; A "data processor" on the other hand means a natural or legal person, public authority, agency or other body which processes personal data on behalf of the data controller. A processor is under the instructions of a controller.
"Personal data" is any information relating to an identified or identifiable natural person and such a person becomes a data subject once this information is held and processed by a data processor or controller. A controller determines the purposes and means of the processing of personal data while a processor uses the data for purposes of and under directions of the controller. The processor cannot process personal data unless as directed by the data controller.
An example of how this Controller/Processor relationship arises if an online shopping platform eg, Jumia. A user will log into the system and hand over their personal data, which includes their name, email address, ID Number, Bank details and residential address for delivery of the items purchased. The controller will require this information in order to perform the service they are selling to the user. By collecting that information, Jumia becomes a data controller. Jumia may then procure the services of Sendy motorcycles who are then contracted to do the deliveries to clients. Sendy accesses information held by Jumia for purposes of deliveries for Jumia, and it is therefore a Data processor and must be registered as such.
An entity can be both a controller and processor and should in that case be registered as both. For instance, in the above case, Sendy has other operations outside of it’s contract with Jumia which operations involve collection of client data. Sendy being in the logistics business will ordinarily collect client data including name, identity number, office address, home address, email address and mobile number. All this is data which obviously identifies the user of the Sendy app (personal data) and therefore Sendy will therefore qualify as both a data controller and a data processor.
Other than registration, a data controller is required to take measures to ensure the safety of the data, and that the data is held and processed in accordance with the Data Protection Act. A processor is not only bound by the limits of processing set out by the controller, but they are also required to process the information in accordance with the law. While the controller and the processor are required to conduct Data Protection Impact Assessments (DPIAs) as and when necessary, especially in high risk situations. The data processor is also required to implement internal measures to ensure compliance and support the controller in implementation of data privacy measures.
While making the application for registration, the data processor or controller shall disclose the nature of personal data held, and the purpose for which it is held. Further, it shall disclose safety measures in place to protect such data.
-
The Fin-Tech Take Over
What exactly is Fin-Tech? Banks have gone head to head, outdoing each other with innovation. It s... -
What In The World Is ChatGPT?
(And why should you care?) Of course you have interacted with bots before. For example, when ... -
Tech Lingo For Lawyers
You know how someone throws in some Tech word in a conversation and in that one short moment you dec... -
The Subtle Balance And Trade-Offs In Cyber Security (Part 2)
Last week we looked at the cyber trade-offs that businesses have to make as they enter online market... -
The Subtle Balance And Trade-Offs In Cyber Security (Part 1)
Tradeoffs. That sounds familiar, but you can’t quite place it. Never mind, I’ll dive right into it. ... -
How To Craft A Winning Innovation Strategy
Where do we start? Yes, of course we have to start somewhere. Lawyers may lead the pack in more a... -
How Far Can Lawyers Go In Adopting Legal Tech?
The legal profession has historically been considered a conservative field and as a result, lawyers ... -
Drafting Bug Bounty (Ethical Hacking) Agreements
Where does the Lawyer come in? The relationship between a corporate like Safaricom and an individ... -
Ethical Hacking (Bug Bounty Hunting): What Does It Mean?
New word alert: Bug Bounty Hunting = Ethical Hacking. Last week, I was invited to a Tech Conferen... -
Internet Privacy: A Lawyer’s Guide To Online Privacy (Part 2)
1. Avoid torrent or piracy web sites He...he…yes. There is something called ET (Entertainment... -
Internet Privacy: A Lawyer’s Guide To Online Privacy (Part 1)
Did you know that most Internet Service Providers (ISPs) are tracking, storing and mining your onlin...