fbpx

Data Privacy: the need for compliance with NDPR

If organisation pays lip service to cybersecurity, and in the event of an attack, the consequences are usually enormous plus bad corporate image. Organisation that has invested much in IT, should therefore do more to protect its Critical IT infrastructure.

Must Read

Destiny Young
Destiny Younghttp://linktr.ee/youngdestinya
Destiny Young is a highly credentialed information technology professional with over 13 years of industry experience. An HND/BSc (Hons) Computer Science graduate. He holds a Master of Technology degree in Information Technology from the prestigious University of South Africa (UNISA). He is a Distinction-grade MBA alumnus of Nexford University, Washington, DC, where he also obtained a First-class MSc degree in Digital Transformation. He is currently pursuing MSc in Cybersecurity. His professional development direction is in Cybersecurity, Digital Transformation, and Business Intelligence. He is a member of the British Computer Society (BCS), the Chartered Institute of Administration of Nigeria (CIA), the Nigeria Computer Society (NCS), etc.

As technology and digital innovation continue to shape the modern business environment, more businesses are embracing the adoption of cloud technology by moving parts or all of their IT systems to cloud to enjoy the benefits of cloud – operational cost reduction, on-demand service, scalability, agility, resiliency, availability and above all, security.

The cloud ride on the internet and the internet is made possible by global convergence of connected computers and networks.

Once an organisation joins the cloud, they become part of a globally connected computers and therefore consequentially has potential attack surface within their networks either internally or the cloud.

Cyber security threat landscape has grown exponential in recent years, with hackers using sophisticated technology to compromise networks and users. If organisation pays lip service to cybersecurity, and in the event of an attack, the consequences are usually enormous plus bad corporate image. Organisation that has invested much in IT, should therefore do more to protect its Critical IT infrastructure.

National Data Protection Regulation (NDPR) 2019 framework is an information security standard by Nigerian Government developed as guide for government ministries, departments, and agencies. The framework emphasises the implementation of appropriate security controls at all levels of data management, both from the Data owner and the Data Processors end. It sets outline that agencies of government in Nigeria should comply with the regulation.

Nigerian Government, through NITDA has issued a final regulatory warning to government agencies on compliance, with particular emphasis on the appointment of Data Controllers and Data Processing Officer (DPO) for government organisations and submission of Audit Compliance Report to National Data Protection Bureau, without which PENALTY charges will apply to defaulters.

Destiny Young
Destiny Young is a highly credentialed information technology professional with over 13 years of industry experience. An HND/BSc (Hons) Computer Science graduate. He holds a Master of Technology degree in Information Technology from the prestigious University of South Africa (UNISA). He is a Distinction-grade MBA alumnus of Nexford University, Washington, DC, where he also obtained a First-class MSc degree in Digital Transformation. He is currently pursuing MSc in Cybersecurity. His professional development direction is in Cybersecurity, Digital Transformation, and Business Intelligence. He is a member of the British Computer Society (BCS), the Chartered Institute of Administration of Nigeria (CIA), the Nigeria Computer Society (NCS), etc.
- Advertisement -spot_img

1 COMMENT

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisement -

Latest News

How Digital Forensics Aide Fraud Investigation

Digital forensics is a branch of forensic science that involves identifying, preserving, analyzing, and reporting on electronic data. The goal is to preserve evidence in its original form and reconstruct past events to support or refute hypotheses.
- Advertisement -

More Articles Like This

- Advertisement -