MENA FCCG Privacy and Data Protection Framework Guide 1700007913
MENA FCCG Privacy and Data Protection Framework Guide 1700007913
MENA FCCG 1
March 2021
TABLE OF CONTENTS
This document builds on international leading practices as well as the expertise of MENA FCCG’s Technical
Working Committee to provide practical overview of data protection and privacy fundamentals. It does not
however address all privacy requirements, nor does it constitute legal advice.
MENA FCCG 2
March 2021
1.0 INTRODUCTION
Privacy and protection of personal data is a key concern for both customers,
organizations, and regulators. Customers expect organizations to treat their personal
information as private and confidential, to effectively safeguard their personal data, and
to use it only to provide and operate financial services, and for other purposes as
required by law or regulation. MENA regulators are increasing focusing on how
organizations manage personal data in their possession from the point of data collection
and up to data disposal while also enhancing customer rights, including rectification of
their personal data, data access, and objection to processing where appropriate
(Reference Annex (I): Data Protection Legislation in MENA Countries1). Accordingly,
protection of personal data and associated customer trust has become a competitive
advantage and a critical focus area for risk managers.
The purpose of this Guide, along with the Privacy Self-Assessment Questionnaire, are
intended to increase compliance awareness of the key elements for building an effective
Privacy and Data Protection Framework as necessary to meet evolving regulatory
expectations and harness customer trust.
1
MENA FCCG will update this annex as necessary to reflect new/revised regulatory requirements.
MENA FCCG 3
March 2021
2.0 PRIVACY AND DATA PROTECTION PRINCIPLES
A Privacy and Data Protection Framework should seek to achieve the following key principles:
The following sections will explain how the above principles can translate into actual
processes.
MENA FCCG 4
March 2021
3.0 KEY ELEMENTS OF AN EFFECTIVE PRIVACY AND DATA
PROTECTION FRAMEWORK
Privacy and Data Protection compliance is a journey and requires ongoing awareness and
understanding of personal data processing operations and embedding privacy
management throughout the organization. A one-size-fits-all approach is also not the
answer. However, the following represents the key elements based on international
leading practices.
MENA FCCG 5
March 2021
3.1 GOVERNANCE & ACCOUNTABILITY
Governance and accountability are fundamental to building a strong data protection & privacy
framework; key elements are summarized below:
MENA FCCG 6
March 2021
I. Data Protection Officer (DPO) - Organizations should look to appoint a DPO who is
responsible for privacy and data protection activities and reports directly to the
highest management level. The roles and responsibilities of the DPO should be clear
while ensuring there is no conflict of interest.
II. Privacy and Data Protection Champions - To further safeguard data, organizations
should designate champions that are responsible for privacy and data protection
within their divisions/department/sections. It is expected to have a Champion for
each division (e.g. HR, IT, Marketing, Credit…etc.)
III. Data Privacy Governance Committee – A governance committee should be formed,
with adequate Terms of Reference to discuss privacy incidents, issues, and risks. The
formation of a committee also demonstrates a tone at the top and senior
management commitment.
MENA FCCG 7
March 2021
3.2 POLICES, PROCEDURES, AND PRIVACY NOTICES
The documentation infrastructure is crucial to tie data privacy principles and allow proper
functioning of the organization by establishing boundaries of behaviour, outlining processes,
and defining rules. To build a strong data protection framework, the below should be
considered:
MENA FCCG 8
March 2021
applicable)
The source of the personal data (if the personal data is not obtained from
the individual it relates to)
The details of the existence of automated decision-making, including
profiling (if applicable)
REVIEW AND Remember, the Privacy Notice needs to be regularly reviewed and updated.
UPDATE For example, if the organization plans to use personal data for a new purpose,
the Privacy Notice needs to be updated and communicated to data subjects.
Privacy Notice - Examples of Good and Bad Practice
Poor Practices: Better Practices:
“We may use your personal data to “We may use information provided or
develop new services” ( it is unclear obtained via this site to: respond to your
what the “services” are or how the data queries and feedback (for example, if you’ve
will help develop them) asked a question or submitted feedback via
“We may use your personal data for the site), provide you with information,
research purposes” ( it is unclear what products or services you have requested,
kind of “research” this refers to) carry out our obligations from any contracts
“We may use your personal data to offer entered into between you and us, allow you
personalized services” (it is unclear what to participate in any interactive features of
the “personalization” entails) the site, notify you about changes to the
site, or provide you with updates where
you’ve consented to receive these by
registering on the site”
(it is clear in this example the kind of
processing the organization is going to
undertake)
Demonstrating accountability and embedding privacy and data protection across the
organization’s processes involves a wide array of policies and procedures. However, the role of
the Privacy and Data Protection Officer can differ; examples follow:
MENA FCCG 9
March 2021
Officer upon completion for IT Security Assessment Results
record retention and Business Continuity Plans
validation purposes
MENA FCCG 10
March 2021
system, product, service or business process is introduced or where changes are proposed to
existing processes and systems.
A PIA also helps organizations meet individuals’ expectations of privacy and data protection and
help avoid reputational damage which might otherwise occur. There can also be financial
benefits; identifying a potential issue or problem early on generally means a simpler and less
costly solution.
However, a PIA does not have to eradicate all risks, but should help in minimizing and
determining whether or not the level of privacy and data protection risk is acceptable in the
circumstances, taking into account the benefits the new / revised process, product, service etc.
intends to achieve. Conducting a PIA is generally a legal requirement for any type of processing
that is likely to result in high risk to individuals under some data protection laws.
MENA FCCG 11
March 2021
risk of unauthorized downloading of customer data and loss of data containing
sensitive information by implementing endpoint DLP solutions. An effective DLP
solution helps organizations understand the types of data to protect, monitor the
journey of the data including channels of data leakage and ultimately prevent data
leakage such as blocking certain types of messages/files from leaving the
organization’s domain. DLP solutions can mitigate malicious intent, negligence, as
well as accidental disclosure of data.
I. Right to information - This right provides the data subject with the ability to ask the
organization for information about what personal data (about him or her) is being
processed and the rationale for such processing.
II. Right to access - This right allows the data subject to see or view their own personal
data, as well as to request copies of the personal data.
III. Right to rectification - This right provides the data subject with the ability to ask for
modifications to his or her personal data in case the data subject believes the
personal data is not up to date or accurate.
IV. Right to withdraw consent – Data subjects should have the ability to withdraw a
previously given consent for processing of their personal data.
V. Right to object to decisions made solely on automated basis – an automated
decision making is any form of automated processing of personal data (including
profiling) that produces a legal effect on or significantly affects the data subject. This
right provides the data subject with the ability to object to a decision based on
automated processing. Using this right, an individual may ask for his or her request
to be reviewed manually, because he or she believes that processing of his or her
loan may not consider his/her unique situation.
VI. Right to be forgotten / deleted - This right provides the data subject with the ability
to ask for the deletion of their data. This will generally apply to situations where a
customer relationship has ended. It is important to note that this is not an absolute
right, and depends on the organization’s retention schedule in line with other
applicable laws
VII. Right for data portability - This right provides the data subject with the ability to ask
for transfer of his or her personal data. As part of such request, the data subject
may ask for his or her personal data to be provided back (to him or her) or
transferred to another organization.
MENA FCCG 12
March 2021
CONSIDERATIONS ON DEVELOPING POLICY ON HANDLING DATA SUBJECT REQUESTS
TO EXERCISE THEIR RIGHTS
MENA FCCG 13
March 2021
simply applying the decision taken by the automated system.
A controller or processor of personal data have different roles and responsibilities and therefore
it is important for organizations to know which role they play. Under GDPR and other privacy
and data protection laws, the data controller has greater responsibilities in relation to
protecting the privacy and rights of data subjects.
Controllers determine the purposes and means of the processing of personal data. In essence,
they make decisions about processing activities, whilst processors are third parties that process
data based on the controller’s instructions.
When a controller appoints a processor, they should conduct sufficient due diligence and insert
appropriate data protection clauses to clearly define the role and specific purposes when the
processor can process personal data. Under GDPR and some privacy laws, a controller should
conduct privacy impact assessments when they instruct processors to carry out high risk data
processing activities. Finally, in the event of a data breach, controllers must notify the
Supervisory Authorities and the data subjects whenever a breach results in the rights and
freedoms of the data subjects being put at risk. A processor on the other hand, must notify the
relevant controller impacted by the breach.
MENA FCCG 14
March 2021
CONTRACTS WITH DATA PROCESSORS - KEY CONSIDERATIONS
Consider including the following in your contracts with data processors:
the processor must only act on the written instructions of the controller (unless
required by law to act without such instructions),
the processor must ensure that any individuals processing the data are subject to a duty
of confidence,
the processor must take appropriate measures to ensure the security of processing,
the processor must only engage a sub-processor with the prior consent of the data
controller and a written contract,
the processor must assist the data controller in allowing data subjects to exercise their
rights as applicable,
the processor must assist the data controller in meeting its regulatory obligations in
relation to the security of processing, the notification of personal data breaches and
data protection impact assessments,
the processor must delete or return all personal data to the controller as requested at
the end of the contract, and
the processor must submit to audits and inspections by the data controller.
As a general rule, cross border transfers are permissible when transferring data to a country
with adequate data protection laws. Organizations should review their data flow maps to
understand where cross border transfers occur. Once the assessment is complete,
organizations should review if the jurisdictions are adequate as deemed by data protection laws.
If not, they should ensure sufficient due diligence is conducted as well as incorporate
appropriate safeguards and contractual clauses into agreements.
MENA FCCG 15
March 2021
roles and responsibilities in safeguarding personal data. There are numerous ways to
continuously enhance and improve the privacy culture, these include:
I. Training & Awareness – At a minimum, all employees should receive data privacy
training on an annual basis. Some employees with greater exposure to personal
data may require additional or specialized training. Internal Circulars, workshops
and brochures are recommended as continuous methods of raising awareness and
enforcing commitment to protect personal data.
II. Newsletters – On a regular basis, it is recommended to create data protection
content as part of existing newsletters or stand alone. The newsletter should be
informative regarding current privacy news, recent fines, and lessons learnt.
III. Hiring Procedures - Employees (full/part time employees, contractors & third
parties staff members) should be made aware of their roles and responsibilities
towards protecting the organization’s information assets, and should be aware of
key threats to these assets. Privacy responsibilities must be addressed prior to
employment in adequate job descriptions and in terms and conditions of
employment.
Remember, training, awareness, and capacity building is a journey. The organization should
ensure its training and awareness addresses all levels and commitment to privacy and data
protection cascades top down across the organization.
MENA FCCG 16
March 2021
PROFESSIONAL As part of career development The DPO and staff who are part of
CERTIFICATION the DPO team
Containment: Ascertain the severity of the breach, whether any personal data
is involved and whether the breach is still occurring.
If the breach is still occurring, establish what steps need to be
taken immediately to minimize the effect of the breach and
contain the breach from further data loss (e.g. restricting access
to systems or close down a system etc.)
Implement appropriate steps required to recover any data loss
where possible and limit damage caused (e.g. use of backups to
restore data, changing passwords etc.)
Inform the Compliance Committee of the Board /Risk Committee
of the Board if the severity and likely impact of the breach
warrants such.
Seek expert or legal advice if it is believed that illegal activity has
occurred or likely to occur.
Ensure regulatory reporting within prescribed timeframes.
Ensure actions and decisions are fully documented and logged in
your Data Security Breach Log.
Risk Assessment: To help the organization determine the next course of action, an
assessment of the risks associated with the breach is undertaken to
identify whether any potential adverse consequences for individuals are
likely to occur and the seriousness of these consequences. Key issues to
consider:
What types and volume of data are involved?
Is there sensitive data impacted with the breach?
Has the data been unofficially disclosed, lost, or stolen? Were
preventions in place to prevent access/misuse? (e.g. encryption)
How many individuals are affected by the data breach?
MENA FCCG 17
March 2021
What could the data tell a third party about the individual? Could
it be misused regardless of what has happened to the data?
What actual/potential harm could come to those individuals?
E.g. physical safety, reputation, finances, identity theft, other
private aspects to their life
Are there wider consequences to consider?
Evaluation and When the organization’s response to a data breach has reached a
Response conclusion, the organization should:
Undertake a full review of both the causes of the breach and the
effectiveness of the response.
The full review should be reported to the Privacy and Data
Protection Committee for information and discussion as soon as
possible after the data breach has been identified.
If through the review, systematic or ongoing problems
associated with weaknesses in internal processes or security
measures have been identified as a cause of the data breach,
then appropriate action plans must be drafted, actioned and
monitored to rectify any issues and implement
recommendations for improvements.
The Committee should monitor progress against the actions
appropriately.
MENA FCCG 18
March 2021
ANNEXES
I. Data Protection Legislation in MENA Countries
MENA FCCG 19
March 2021
Annex (I): Data Protection Legislation in MENA Countries
Algeria
KEY DEFINITIONS
Definition of personal data: any information, irrespective of its medium, concerning a person identified or
identifiable, in a direct or indirect manner, in particular by reference to an identification number or to one or
more specific elements of their physical, physiological, genetic, biometric, psychic, economic, cultural or social
identity.
• Definition of sensitive personal data: Sensitive personal data is defined under the law as personal data which
reveal the racial or ethnic origin, political opinions, religious or philosophical beliefs or union membership of the
person concerned or relating to his health, including his genetic data.
AUTHORITY
Law 18-07 shall create, with the President of the Republic, an independent administrative authority for the protection
of personal data. This national authority is responsible for ensuring that the processing of personal data takes place in
accordance with Law 18-07.
REGISTRATION
The personal data controller must be registered on a national data protection register kept by the national authority.
In addition, any processing operation of personal data, is subject to a declaration or prior authorization of the
national authority.
DATA PROCESSING
The processing of personal data may only be carried out with the express consent of the relevant person. Such prior
consent is not required in certain cases exhaustively listed in Law 18-07. For example, when data processing is
needed:
• To comply with a legal obligation applicable to the relevant person or to the personal data controller
• To perform a contract to which the relevant person is a party or to perform pre-contractual measures taken at
the request of the relevant person.
• To achieve a legitimate interest of the data controller or the recipient of the data.
DATA TRANSFER
The authority shall authorize cross-border transfers of personal data outside of Algeria, after ensuring the
recipient country has adequate data privacy measures.
Data controllers can transfer data across borders to a country without adequate data protection measures in
certain cases. For example:
o If the data subject explicitly provides his consent to the transfer
o For the performance of a contract between the data subject and the data controller, or pre-contractual
procedures on the request of the data subject.
o Based on receiving a license from the authority for the transfer.
BREACH NOTIFICATION
There is no obligation for a breach notification by the data controller to the regulator or the data subjects.
MENA FCCG 20
March 2021
Bahrain
KEY DEFINITIONS
• Definition of personal data: Personal data is defined under the PDPL as any information of any form related to an identifiable
individual, or an individual who can be identified, directly or indirectly, particularly through their personal identification
number, or one or more of their physical, physiological, intellectual, cultural or economic characteristics or social identity.
• Definition of sensitive personal data: Sensitive personal data is a subset of personal data. It is personal data which reveals,
directly or indirectly, the individual's race, ethnicity, political or philosophical views, religious beliefs, union affiliation,
criminal record or any data related to their health or sexual life. Sensitive personal data requires more rigorous treatment by
data controllers
AUTHORITY
Under the PDPL, the Personal Data Protection Authority (Authority) will have power to investigate violations of the PDPL on its
own, at the request of the responsible minister, or in response to a complaint. At the interim, the Ministry of Justice is assuming
the responsibilities of the Authority pending the establishment of the latter.
REGISTRATION
The Authority must create a register of data protection officers. To be accredited as a data protection officer, an individual must
be registered in that register.
DATA PROCESSING
Processing of personal data can only occur with the consent of the data subject, unless the processing is necessary:
to implement a contract to which the data subject is a party;
to take steps at the request of the data subject to conclude a contract;
to implement an obligation required by law, contrary to a contractual obligation or an order from a competent court;
to protect the vital interests of the data subject; or
to exercise the legitimate interests of the data controller or any third party to whom the data is disclosed, unless this
conflicts with the fundamental rights and freedoms of the data subject.
Processing of sensitive personal data is also prohibited without the consent of the data subject, except under limited conditions
(e.g. is required by the data controller to carry out their obligations, is necessary for the protection of the data subject, etc.)
DATA TRANSFER
Transfers of personal data out of Bahrain is prohibited unless the transfer is made to a country or region that provides
sufficient protection to personal data. Those countries need to be listed by the Authority and published in the Official
Gazette.
Data controllers can also transfer personal data to countries that are not determined to have sufficient protection of
personal data under certain conditions including: the transfer occurs pursuant to a permission to be issued by the
Authority on a case-by-case basis, if the data subject has consented to that transfer, or there is a legitimate and vital
interest for the transfer, etc.
BREACH NOTIFICATION
MENA FCCG 21
March 2021
The PDPL contains a general requirement on the data protection officer to notify the Authority of any breach under the PDPL of
which that the data protection officer becomes aware.
Morocco
KEY DEFINITIONS
• Definition of personal data: Personal data is defined as any information regardless of their nature, and format, relating
to an identified or identifiable person.
• Definition of sensitive personal data: Sensitive personal data is defined under the law as personal data which reveal the
racial or ethnic origin, political opinions, religious or philosophical beliefs or union membership of the person
concerned or relating to his health, including his genetic data.
AUTHORITY
The relevant authority is the Data Protection National Commission - CNDP (Commission Nationale de Protection des Données
Personnelles).
REGISTRATION
The processing of personal data is subject to a prior declaration to be filed with the Personal Data Protection Commission,
and to the prior authorization of the CNDP when the processing concerns Sensitive data, or Genetic data, or Data including
the National Identity Card number, or when using Personal data for purposes other than those for which they were initially
collected.
DATA PROCESSING
As a general rule, the processing of a personal data must be subject to the prior consent of the relevant data subject.
However, the processing of personal data can be performed without the consent of the relevant data subject provided that
the information relates to the:
Compliance with a legal obligation.
Execution of a contract to which the relevant data subject is party or in the performance of pre-contractual measures
taken at the request of the latter.
Protection of the vital interests of the relevant data subject, if that person is physically or legally unable to give its
consent.
Performance of a task of public interest or related to the exercise of public authority.
Fulfillment of the legitimate interests pursued by the person in charge of the processing or by the recipient.
DATA TRANSFER
Prior authorization from the National Commission is required before any transfer of personal data to a foreign state.
Further, the person in charge of the processing operation can transfer personal data to a foreign state only if the said
state ensures under its applicable legal framework an adequate level of protection for the privacy and fundamental
rights and freedoms of individuals regarding the processing to which these data is or might be subject, unless
o The data subject has expressly consented to the transfer
o The transfer and subsequent processing is required for any task highlighted under the exemptions listed in
the “Data Processing” section
BREACH NOTIFICATION
MENA FCCG 22
March 2021
The law does not set out any obligation to notify the CNDP or the concerned individual in the event of a data security breach.
Qatar
KEY DEFINITIONS
• Definition of personal data: Personal data is defined under the Data Protection Law as data relating to a natural
person whose identity is identified or is reasonably identifiable, whether through this data or by means of
combining this data with any other data or details.
• Definition of sensitive personal data: Sensitive personal data means personal data consisting of information as to
a natural person’s ethnic origin, health, physical or mental health condition, religious beliefs, relationships, and
criminal records.
AUTHORITY
Qatar Ministry of Transport and Communications (MoTC).
REGISTRATION
There are currently no registration requirements in Qatar.
DATA PROCESSING
The data controller is free to process data without the consent of the data subject in the following circumstances:
Executing a task related to the public interest as per the law.
Implementing a legal obligation or an order rendered by a competent court.
Protecting vital interests of Individual.
Achieving purposes of scientific research which is underway for public interest.
Gathering necessary information for investigation into a criminal offense, upon an official request of
investigative bodies.
DATA TRANSFER
Data controllers may collect, process and transfer personal data when the data subject consents, unless
deemed necessary for realizing a 'lawful purpose' for the controller or for the third party to whom the
personal data is sent.
Data controllers should not take measures or adopt procedures that may curb trans-border data flow,
unless processing such data violates the provisions of the Data Protection Law or will cause gross damage to
the data subject. The Data Protection Law defines 'trans-border data flow' as accessing, viewing, retrieving,
using or storing personal data without the constraints of state borders.
MENA FCCG 23
March 2021
BREACH NOTIFICATION
Controllers should report the personal data breach to the Compliance and Data Protection (CDP)
Department at Ministry of Transport and Communications without delay and within 72 hours of becoming
aware of it, if the personal data breach could cause damage to individuals’ personal data or privacy.
Controllers should notify the individuals of the personal data breach without delay and within 72 hours of
becoming aware of it if the personal data breach could cause serious damage to their personal data or
privacy.
Tunisia
KEY DEFINITIONS
• Definition of personal data: Personal data is defined as all information regardless of their origin or form and
which directly or indirectly allows to identify or make identifiable a natural person, with the exception
of information related to public life or considered as such by law.
• Definition of sensitive personal data: There is no clear definition of sensitive personal data, but the law listed
some personal data the processing of which is either prohibited, or would question the data subject’s prior
consent or the national authority’s authorization. Such as; criminal history and proceedings, criminal
prosecution, penalties, preventative measures or judicial history, in addition to data concerning racial/genetic
origins, religious beliefs, political opinions, union/philosophical activism, health and scientific research.
AUTHORITY
The National Authority for Protection of Personal Data (the Instance) was created by Decree n° 2007-3003 of
November 27th, 2007.
REGISTRATION
Any processing of personal data shall be subject to a prior declaration filed at the headquarters of the National
Authority for Protection of Personal Data, or by any other means leaving a written record.
DATA PROCESSING
Among the main prerequisites for the legitimate processing of personal data is the informed consent of the data
subject, which means that the processing of personal data cannot be carried out without the express and written
consent of the data subject. This consent shall be governed by the general rules of law if the data subject is
incompetent or unauthorized or incompetent to sign.
Additionally, and in the spirit of child protection, Tunisian law has provided extra protection to personal data relating
to children as this kind of data cannot be carried out without the consent of the child’s agent and after authorization
of the juvenile and family court judge.
DATA TRANSFER
The transfer of personal data is generally prohibited or subject to strict measures, including prior authorization
(submitted to the National Authority for Protection of Personal Data), and the explicit consent of the person in
question, which is mandatory.
MENA FCCG 24
March 2021
The international transfer of personal data may not take occur if the foreign country does not provide an
adequate level of protection. In every case, the authorization of the Instance is required before the transfer of
personal data.
BREACH NOTIFICATION
There are no breach notification obligations prescribed by the Law.
A. Customers’ Data:
1. Names:
a. Full Name
b. Mother’s name
c. Alias (aka)
2. Personal Identification Numbers:
a. National or Social Security Number (e.g. SSN)
b. Passport Number
c. Residence Permit Number
d. Visa Permit Number
e. Driver’s License Number
f. Taxpayer Identification Number (TIN)
g. Other Government Identification Numbers
3. Personal financial data:
a. Account Number or Customer ID Number (unique identifying number)
b. Safety Deposit Box Number
c. Credit/Debit Card Number
d. IBAN
e. Personal Identification (PIN). Codes used to authorize electronic use of a
financial transaction card
4. Personal address information:
a. Home Address
b. Mailing Address (P.O. Box/zip code)
c. Electronic Mail Name or Address
d. IP Address
5. Personal Telephone Numbers:
a. Home Telephone Numbers
b. Mobile Telephone Numbers
6. Biometric data - Special Category / Sensitive Data
a. Finger Vein Recognition - Special Category / Sensitive Data
b. Digital Signatures
c. Facial Geometry - Special Category / Sensitive Data
d. Photographic Images (particularly of face or other identifying characteristics)
7. Internet account numbers, or Internet identification names:
a. Login Names
MENA FCCG 25
March 2021
b. Social Media IDs (e.g. Facebook, Tweeter, LinkedIn)
8. Vehicle Information:
a. Vehicle registration number
b. Vehicle license plate number
B. Employees
1. Biographical data
2. Radio frequency identification (RFID) data (access card/badge) - Special
Category / Sensitive Data
3. Security clearance
4. Financial information
5. Criminal record - Special Category / Sensitive Data
6. Home address
7. Grievance information - Special Category / Sensitive Data
8. Disciplinary records
9. Leave-of-absence reason
10. Payroll and benefits information
11. Employment information
12. Educational information
13. Health information - Special Category / Sensitive Data
http://menafccg.com/publications/
www.menafccg.com
Send inquiries to:[email protected]
MENA FCCG 26
March 2021