Basil Udotai - presentation on privacy and security - Africa E

advertisement
Data Security laws and
eHealth in Nigeria
Basil Udotai, Esq.,
Managing Partner
Technology Advisors LLP
ICT LAWYERS & CONSULTANTS
Outline
• What has Law got to do with all these?
• -Data Security: why should we care?
• Overview of data protection/ security regime in
Nigeria
• How does this apply to eHealth?
• Does the legal framework support the protection
of data for eHealth service; An analysis of how
the law applies to patient data
• What are the challenges or loopholes in the law?
• Solutions
What has Law got to do with it?
•
•
•
•
Wey tin Lawyers dey do sef? Really?
Legal, Regulatory and Transactional Objectives
The Nature of ICT
How technology or ICT challenges Law
Nature of ICT
•
•
•
•
•
•
•
•
•
•
Global;
Knowledge based and proprietary;
Digital/Electronic;
Fast Paced and Real Time;
Inherent Insecurity vs Interoperability;
Mired by Legal Externalities;
Unlimited Scalability;
Fiercely Competitive;
Cheaper Communication;
Constantly changing and evolving – “All computers to communicate
and all communication gadgets to compute!” INTEL CEO, 2004, in
Abuja. ITU – same year: VOICE as APPLICATION!;
• Operates in the physical: ATTRIBUTION vs ANONYMITY;
• Value-neutral – the Good, the Bad and the Ugly; and finally
• Shared System
How does Law Challenge ICT
• Form: Non-tangible, electronic or digital materials;
• Identity & Authentication: attribution of electronic
activities, undeniably, to identifiable individual actors;
• Liability: whether civil (cause of action) or criminal
(prohibition), for certainty specific laws/regulations must
be enacted or promulgated;
• Authority: substantive legal authority to act and technical
capacity to investigate and prosecute – LEAs must be
conferred legal authority;
• Legal Process: Evidential standards and Court rules and/or
procedures (civil and criminal) – Admissibility and Weight;
• Jurisdiction: location of party, international cooperation
and enforcement coordination – Dual Criminality
requirements
Privacy & Data Security
• Why should we care?
• Data Explosion – personal data (biometricmania –
Nigeria)
• Dangers – self evident - no point listing in a technology
forum
• Data fertilization (linking dumb/blind databases to
other public databases to squeeze out intelligent data)
– SimReg; BVN; NHIS; Pencom; FRSC; NIS; etc – running
that across standard health data held in any held
establishment, will reveal all we need to know;
• Uncertainty of Legal Consequences in Data related
transactions
Crux of the Matter
• ATTRIBUTION vs ANONYMITY
• Competing business models with inordinate
legal and technological challenges
Kaiser hospital fined $250,000 for
privacy breach in octuplet case
• California health regulators fined Kaiser
Permanente's Bellflower hospital $250,000 for
failing to keep employees from snooping in the
medical records of Nadya Suleman, the mother
who set off a media frenzy after giving birth to
octuplets in January, 2009. The fine is the first
monetary penalty imposed and largest allowed
under a new state law enacted in 2008 after
widely publicized violations of privacy at UCLA
Medical Center involving Farrah Fawcett, Britney
Spears, Maria Shriver, and other celebrities.[1]
$25K settlement reached in medical
record breach case
• A $25,000 legal settlement was reached in a
case in which a young girl’s medical records
were improperly accessed in 2010 by a
Rensselaer County Jail nurse and two
Rensselaer County corrections officers,
according to court documents.
Talk Talk
• British broadband provider, Talk Talk, suffered its
third major cyber attack in the last 12 months.
Information accessed from the attack includes
“names and addresses, dates of birth, email
addresses,
telephone
numbers,
account
information, and crucially, credit card and bank
details”
• BBC reported that the attackers used distributed
denial of service (DDOS) to overwhelm the
company’s website.
• Its share capital dropped 10% at LSE.
CIA Boss Attacked
• The personal email account of the US’s top spy was
compromised by hackers who claimed to be high
school students. Those hackers had threatened on
Twitter to release the same documents.
• The people behind the breach, who call themselves
CWA (Crackas With Attitude), said they had breached
John Brennan’s account and followed up with
screenshots containing social security numbers,
cellphone numbers and email addresses. The cell
numbers and email addresses appeared to be genuine.
Data Protection & Security
• Data protection involves the implementation
of administrative, technical or physical
measures to guard against unauthorized
access and misuse of data.
• DATA Security and DATA privacy- the
difference? Data Security enhances data
privacy; while the latter creates a right under
which data subjects (citizens) can seek
remedies through laid down legal process
Objectives of Data Security
• Confidentiality;
• Integrity – data, system and
networks;
• Availability (Survivability)
• Protection
of
Critical
Information Infrastructure (CIIP)
What does a typical Data Security Law
Regulate?
•
•
•
•
Definition of Data
Identification of Data Assets
Identification of data handler and procedures
Establishment of standard Security Controls to
Manage and Control Risk
• Establishment of Third Party Service Provider
Responsibilities
• Creates sanction and penalties for violations
• Compensation and remedies for data subjects
Laws and Regulations
• Nigeria does not have an overarching data protection law.
• CONSTITUTION
• RELEVANT LAWS




National Health Act
Cybercrime Act
Nigerian Communication Act
Freedom of Information Act
• REGULATIONS- {Interim measures}


No laws
Bad laws {Curable}

LEGAL INSTRUMENTS – ORDERS
• RULES
• DIRECTIONS
• REGULATIONS
The Constitution
• The Constitution of the Federal Republic of
Nigeria 1999 (as amended)
• Section 37 guaranties the Right to Private and
Family life by providing that the privacy of
citizens, their homes, correspondence, telephone
conversations and telegraphic communications is
hereby guaranteed and protected.
• This right is not unlimited as it could be
derogated from in deserving circumstances as
per section 45 of the Constitution
National Health Act
• The NHA requires a person in charge of the
health establishment who is in possession of a
user’s or patient’s health records to set up control
measures to prevent unauthorized access to
those records and to the storage facility in which,
or system by which, records are kept. Requiring
the person in charge of a health establishment to
be in possession of the health records creates
uncertainty. It is not clear whether possession is
to actual possession or constructive possession or
both.
National Health Act
• Section 29(2) of the National Health Act provides that:
• Any person who• (a)fails to perform a duty imposed on them under subsection (1);
• (b)falsifies any record by adding to or deleting or changing any
information contained in that record;
• (c)creates, changes or destroys a record without authority to do so;
• (d) fails to create or change a record when properly required to do
so;
Section 29 Contd.
•
(e) provides false information with the intent that it be included in a record;
•
(f) without authority, copies any part of a record;
•
(g) without authority, connects the personal identification elements of a user's record with any
element of that record that concerns the user's condition, treatment or history;
•
(h) gains unauthorised access to a record or record-keeping system, including intercepting
information being transmitted from one person, or one part of a record-keeping system, to
another; i) without authority, connects any part of a computer or other electronic system on which
records are kept to-(i) any other computer or other electronic system; or(ii) any terminal or other
installation connected to or forming part of any other computer or other electronic system; or.
(j) without authority, modifies or impairs the operation of-
•


•
(i) any part of the operating system of a computer or other electronic system on which a user's records are
kept; or
(ii) any part of the programme used to record, store, retrieve or display information on a computer or other
electronic system on which a user's records are kept:
commits an offence and is liable on conviction to imprisonment for a period not exceeding two
years or to a fine of N250,000.00 or both.
Cybercrime Act
• The Cybercrime Act contains extensive provisions
covering a wide range of offences which would apply to
any person who commits offences against systems
designated critical national infrastructure. The offence
include



Section 8- System interference
Section 9 intercepting electronic messages
Section 13; computer related forgery
Section 16 unauthorized modification of computer
systems, and network data and system interference.
• The penalties are severe, ranging from imprisonment
from 2 years to 14 years and substantial fines.
Cybercrime Act 2015
• Under Section 3 of the Cybercrime Act, certain computer
systems, networks, computer programs, computer data or
traffic data vital to the country, whose incapacity or
destruction of or interference with such system would have
a debilitating impact on security, national or economic
security, national public health and safety, or any
combination of these matters, may be designated Critical
National Information Infrastructure. In the case of such
designation, the President by means of an Order, may
prescribe:

minimum standards, guidelines, rules or procedures for the
protection or preservation of critical information infrastructure;
Cybercrime Act
• the general management of critical information infrastructure;
• access to, transfer and control of data in any critical information
infrastructure;
• infrastructural or procedural rules and requirements for securing
the integrity and authenticity of data or information contained in
any designated critical national information infrastructure;
• the storage or archiving of data or information designated as critical
national information infrastructure;
• recovery plans in the event of disaster, breach or loss of the critical
national infrastructure or any part of it; and
• any other matter required for the adequate protection,
management and control of data and other resources in any critical
national information infrastructure
Duties of Service Providers
S. 38 (1) A service provider shall keep all traffic data and subscriber
information as may be prescribed by the relevant authority for the
time being, responsible for the regulation of communication services
in Nigeria, for a period of 2 years.
• (2) A service provider shall, at the request of the relevant authority
referred to in subsection (1) of this section or any law enforcement
agency (a) preserve, hold or retain any traffic data, subscriber
information, non- content information, and content data; or
(b) release any information required to be kept under subsection
(1) of this section.
(3) A law enforcement agency may, through its authorized officer,
request for the release of any information in respect of subsection
(2) (b) of this section and it shall be the duty of the service
provider to comply.
Obligations of Service Providers
•
Registration of Cybercafé – S.7
(1) From the commencement of this Act all operators of a cybercafé shall register
as a business concern with Computer Professionals’ Registration
Council
in
addition to a business name registration with the Corporate Affairs Commission.
Cybercafés shall maintain a register of users through a
sign-in
register.
This
register shall be available to law enforcement personnel whenever needed.
(2) Any person, who perpetrates electronic fraud or online fraud using a
cybercafé, shall be guilty of an offence and shall be sentenced to Three Years
imprisonment or a fine of One Million Naira or both.
(3) In the event of proven connivance by the owners of the cybercafé, such
owners shall be guilty of an offence and shall be liable to a fine of N 2,000,000.00 or a
3 years jail term or both.
(4) The burden of proving connivance in subsection 3 above shall be on the
prosecutor.
Service Providers- Further Obligations
• S. 22 and 29 requires institutions and operators
not to use their special knowledge as engine of
fraud. Lawful Interception requirements;
• Corporate liabilities and those of officers and
managers;
• No waiver of liability and in addition to S.146 and
147 of the Communications Act, which has a
waiver of criminal liability to protect operators in
civil or criminal suits post cooperation with LEA
Nigerian Communications Act 2003
• 146 —(1) A licensee shall use his best endeavour to prevent the network
facilities that he owns or provides or the network service, applications
service or content application service that he provides from being used in,
or in relation to, the commission of any offence under any law in
operation in Nigeria.
• (2) A licensee shall, upon written request by the Commission or any other
authority, assist the Commission or other authority as far as reasonably
necessary in preventing the commission or attempted commission of an
offence under any written law in operation in Nigeria or otherwise in
enforcing the laws of Nigeria, including the protection of the public
revenue and preservation of national security.
• (3) Any licensee, shall not be liable in any criminal proceedings of any
nature for any damage (including punitive damages), loss, cost or
expenditure suffered or to be suffered (whether directly or indirectly) for
any act or omission done in good faith in the performance of the duty
imposed under subsections (1) and (2).
Nigerian Communications Act
• 147. The Commission may determine that a licensee or
class of licensee shall implement the capability to allow
authorised interception of communications and such
determination may specify the technical requirements
for authorised interception capability.
• Please NOTE:
• Working with the ONSA and other National Security
Agencies, NCC has made these determinations and a
proposed legislation is pending at the National
Assembly on the matter;
• However, interim measures are being implemented to
achieve the objectives of this provision, which security
professionals can take advantage of, as necessary
Freedom of Information Act
•
Under Section 11 of the Freedom of Information Act, a public institution must
deny an application for information that contains personal information, and
Information exempted. Section 11 provides thus (1) Subject to subsection (2), a
public institution must deny an application for information that contains personal
information and information exempted under this subsection includes –
(a)
files and personal information maintained with respect to clients, patients,
residents, students, or other individuals receiving social, medical, educational,
vocation, financial, supervisory or custodial care or services directly or indirectly
from public institutions;
(a)
personnel files and personal information maintained with respect to employees,
appointees or elected officials of any public institution or applicants for such
positions;
(a)
files and personal information maintained with respect to any applicant,
registrant or licensee by any government or public institution cooperating with
or engaged in professional or occupational registration, licensure or discipline;
Freedom of Information Act
•
(d) information required of any tax payer in connection with the assessment or
collection of any tax unless disclosure is otherwise requested by the statute; and
•
(e) information revealing the identity of persons who file complaints with or
provide information to administrative, investigative, law enforcement or penal
agencies on the commission of any crime.
•
(2) A public institution shall disclose any information that contains personal
information if - (a) the individual to whom it relates consents to the disclosure;
or (b) the information is publicly available
•
(3) Where disclosure of any information referred to in this section would be in the
public interest, and if the public interest in the disclosure of such information
clearly outweighs the protection of the privacy of the individual to whom such
information relates, the public institution to whom request for disclosure is made
shall disclose such information subject to Section 14 (2) of this Act.
DRAFT NATIONAL GUIDELINES ON
DATA PROTECTION BY NITDA
• The Draft National Guidelines on Data Protection
issued by NITDA pursuant to sections 6, 17 and 18 of
the NITDA Act.
• The purpose of the Draft Guideline is to

Prescribe guidelines for all organizations or persons that
control, collect, store and process personal data of Nigeria
residents within and outside Nigeria for protecting of a
specific category of data commonly known as Personal
Data or Object Identifiable Information (OII).
Prescribe minimum data protection requirements for the
collection, storage, processing, management, operation,
and technical controls for information in this category
Nigerian Communications Act (Registration of
Telephone Subscribers Regulations) 2011
•
Under Regulation 9 provides for Data Protection and Confidentiality
•
9.—(1) In furtherance of the rights guaranteed by section 37 of the Constitution of
the Federal Republic of Nigeria, 1999 and subject to any guidelines issued by the
Commission including terms and conditions that may from time to time be issued
either by the Commission or a licensee, any subscriber whose personal
information is stored in the Central Database or a licensee’s database, shall be
entitled to view the said information and to request updates and amendments
thereto.
(2) The subscriber information contained in the Central Database shall be held on
a strictly confidential basis and no person or entity shall be allowed access to any
subscriber information on the Central Database except as provided in these
Regulations.
(3) Licensees, Independent Registration Agents and Subscriber Registration
Solution Providers shall not under any circumstances retain, duplicate, deal in or
make copies of any Subscriber Information or store in whatever form any copies of
the subscriber information for any purpose other than as stipulated in these
Regulations or in an Act of the National Assembly.
•
•
NCC Regulation Contd.
•
(4) Licensees, Independent Registration Agents, Subscriber Registration
Solution Providers and the Commission shall each take all reasonable
precautions in accordance with international practices to preserve the
integrity and prevent any corruption, loss or unauthorized disclosure of
subscriber information obtained pursuant to these Regulations and shall
take steps to restrict unauthorized use of the Subscriber Information by
their employees who may be involved in the capturing or processing of
such subscriber information.
• (5) Licensees shall utilize personal information retained pursuant to these
Regulations, solely for their operations and in accordance with the
provisions of Part VI of the General Consumer Code of Practice for
Telecommunications Services and any other instruments of the
Commission or any Act of the National Assembly regulating the specific
purposes for which the personal information may be used.
• (6)
Licensees, Independent Registration Agents and Subscriber
Registration Solution Providers shall not retain the Biometrics of any
subscriber after transmission thereof to the Central Database.
How does the laws apply to patient
data?
• With respect to capturing of health
information, section 25 of the National Health
Act mandates every health establishment to
keep a health record for each patient.
• And under Section 26(1) of the National
Health Act all information concerning a
patient, including information relating to his
or her health status, treatment or stay in a
health establishment is confidential.
What is Patient Data?
• There is no a specific provision defining health data or
patient information in our laws, however, section 26(1)
of the National Health Act provides helpful guidance.
Thus, health data or patient information includes, but
not limited to, all information relating to the patient’s
health status, treatment or stay in any health
establishment. The provision states that:
• “All information concerning a user , including
information relating to his or her health status,
treatment or stay in a health establishment is
confidential.”
Access to patients’ information
•
•
There are three scenarios under the National Health Act (NHA) whereby user
information can be accessed.
(1) Health workers or any health care provider that has access to the health
records of a patient user may disclose such personal information to any other
person, health care provider or health establishment as is necessary for any
legitimate purpose within the ordinary course and scope of his or her duties where
such access or disclosure is in the interest of the user.
•
(2) Where access is needed for the purposes of treatment. In this case, the user's
consent has to be obtained. The NHA does not specify how the consent or
authorization is to be obtained.
•
(3)The third scenario is for purposes of study, teaching or research. The health
care provider is required to obtain authorization from the user, head of the health
establishment concerned and the relevant health research ethics committee.
Where the study, teaching or research will not reflect or obtain information which
identifies a user, the health care provider does not need to obtain the specified
authorizations.
Access to patient information Contd.
• Patients’ health record can be accessed without authorisation
where such access is in the interest of defence, public safety, public
order, public morality or public morality. This derives from section
45(1) of the Constitution of the Federal Republic of Nigeria which
states the right of privacy guaranteed under the Constitution shall
not invalidate any law that is reasonably justifiable in a democratic
society in the interest of defence, public safety, public order, public
morality or public health or for the purpose of protecting the rights
and freedom of other persons. Please see Section 28 (1) of the
NHA.
• Section 34 of the National Health Act prescribes that every
institution, health agency and health establishment at which health
research is conducted, shall establish or have access to a health
research ethics committee, which is registered with the National
Ethics Committee.
Use of Patient Information
• Patient information may be used for
treatment, for study, research or teaching.
Where used for treatment, the patient's
authorization needs to be sought and where
used for study, research or teaching,
authorization has to be obtained from the
patient, the head of the health establishment
and the relevant health research ethics
committee. In each case, the NHA does not
state how the authorization should be sought.
Storage of patient information
• There are no specific obligations in the National
Health Act relating to the storage of patient
information.
• The Cybercrime Act requires service providers to
keep all traffic data and subscriber information as
may be prescribed by the relevant authority for
the time being, responsible for the regulation of
communications services in Nigeria, for a period
of 2 years.
Data Transfer
• There are no provisions relating to data transfer in the
laws that apply to the health sector.
• It is subject to interpretation whether the provision in
the National Health Act which allows a health worker
or health care provider to disclose patient information
to any other person, however, on the face of it, and
given the possibility of emergency cases and need for
medical attention from a location different from a
patent’s regular hospital, a health care worker or
health care provider may transfer patient information
even to persons or hospitals outside Nigeria so long as
it is for a legitimate purpose and in the interest of the
patient.
Third Party Responsibilities
• Third party is “one who is not a party to a lawsuit,
agreement, or other transaction but somehow involved in
the transaction; someone other than the principal parties”.
Drawing from this definition, third party in the
circumstance, mean those who are not directly involved in
health management, but are indirectly involved either
because of the services they render or their
professionalism. They are essentially independent
contractors, contracted mostly by the health institutions to
provide specific solutions, example storage of data.
• The recently enacted Cybercrime Act provides severe
penalties for systems-based and content-related violations
which are enforceable against third party technology
service providers in Nigeria
Gaps/Challenges
•
The protection of patient information suffers from a number of deficiencies in the laws that apply
to the health sector. The provisions in the National Health Act relating to patient information are
vaguely worded, giving rise to uncertainties in relation to:
•
the entities obligated to comply with data processing requirements;
•
the lack of provisions on data quality;
•
the lack of provisions on actual consent by patients before information is obtained;
•
the lack of provisions on ownership of patient data
•
the lack of provisions on how long patient data is to be retained;
•
the non-vesting of information rights in patients, for example, patients do not have right of access
to their data; and
•
the lack of provisions for third party responsibilities and cross-border transfer of data.
Solutions
• Utilization of legal instruments to enable
interim solutions to meet data protection and
security mandates contained in our laws,
starting with the NHA and all other technology
related Laws
Conclusion
•
•
•
•
Assist in sensitizing the Legislature
Enforcement of privacy rights
Interpretation of Privacy Laws
Capacity Building
THANK YOU
CONTACT:
basil@ta.com.ng
08033066004
Download