Cover

Webinar Series

Are You
Exposed?

The Hidden Financial and Legal Risks of Ignoring Kenya's Data Protection Act 2019

Date

March 26th 2026

Duration

1 hour 30 Minutes

Webinar Overview

Today's Agenda

01

Understanding the Landscape

The Data Protection Act 2019 and what it means for your business

02

The Hidden Financial Risks

Understanding the true cost of non-compliance

03

Legal Liabilities and Exposure

Understanding your legal obligations and risks

04

Compliance Requirements

What you must do to stay compliant

05

Your Action Plan

Practical steps to achieve compliance and turn it into competitive advantage

Chapter 1

Chapter One

Understanding
the Landscape

The Data Protection Act 2019 and What It Means for Your Business

Understanding the Landscape

What is the Data Protection Act 2019?

Constitutional Foundation

Gives effect to Article 31(c) and (d) of the Constitution of Kenya, which guarantees every person's right to privacy, including the right not to have their person, home, or property searched, and the right not to have information relating to their family or private affairs unnecessarily required or revealed.

Office of the Data Commissioner

Establishes the Office of the Data Protection Commissioner (ODPC) as the regulatory authority responsible for overseeing implementation, enforcement, maintaining registers, investigating complaints, and conducting inspections.

Africa's Most Comprehensive Framework

One of Africa's most comprehensive data privacy frameworks, with extraterritorial scope similar to the EU's GDPR, meaning it applies to organizations outside Kenya processing data of Kenyan residents.

Core Objectives

Regulate processing of personal data to protect individuals' privacy rights

Provide for rights of data subjects in relation to their personal data

Impose obligations on data controllers and processors

Establish mechanisms for addressing violations and seeking redress

Active Enforcement

The ODPC is actively enforcing the Act with nationwide inspections, penalty notices, and enforcement actions across multiple sectors. Non-compliance is not a theoretical risk—it's a real and present danger.

Understanding the Landscape

Who Does the Act Apply To?

Extraterritorial Scope

The Act applies to all data controllers and processors handling personal data of individuals within Kenya, regardless of where the organization is established. Foreign companies offering goods or services to Kenyan residents or monitoring their behavior are covered.

Data Controller

A natural or legal person who determines the purpose and means of processing personal data. This includes businesses, government agencies, NGOs, and any organization that decides why and how personal data is processed.

Example: A bank collecting customer information for account opening.

Data Processor

A natural or legal person who processes personal data on behalf of the data controller. Processors act under the controller's instructions and don't determine the purposes of processing.

Example: A cloud service provider storing customer data for a bank.

No Minimum Threshold

Unlike some jurisdictions, there is no minimum threshold for compliance. Even small businesses processing minimal personal data must adhere to the Act's requirements. Size doesn't exempt you from compliance.

Understanding the Landscape

Key Definitions You Must Know

Personal Data

Any information relating to an identified or identifiable natural person (data subject). This includes names, ID numbers, location data, online identifiers, and factors specific to physical, physiological, genetic, mental, economic, cultural, or social identity.

Examples: Email addresses, phone numbers, IP addresses, employment records, financial information.

Sensitive Personal Data

Personal data revealing racial or ethnic origin, political opinions, religious beliefs, genetic data, biometric data, health data, or data concerning a natural person's sex life or sexual orientation. Requires explicit consent and heightened protection.

Note: Processing sensitive data has stricter requirements.

Data Subject

An identified or identifiable natural person who is the subject of personal data. This includes employees, customers, suppliers, website visitors—any individual whose personal data is processed by your organization.

Rights: Access, rectification, erasure, objection, portability.

Processing

Any operation or set of operations performed on personal data, whether or not by automated means, including:

Collection

Recording

Organization

Adaptation

Retrieval

Consultation

Also includes: use, disclosure by transmission, dissemination, alignment, combination, restriction, erasure, or destruction.

Chapter 2

Chapter Two

The Hidden
Financial Risks

Understanding the True Cost of Non-Compliance

The Hidden Financial Risks

Penalties and Fines: The Sticker Shock

Administrative Fines

Section 63 of the DPA

Maximum Penalty:

KES 5 Million

OR

1% of Annual Turnover

(whichever is lower)

Imposed by the Data Commissioner for failure to comply with data protection principles and obligations.

Enforcement Notices

Issued to compel compliance, requiring specific steps to be taken within defined timeframes. Failure to comply with enforcement notices can result in additional fines of up to KES 5 million or imprisonment or both.

Types of Remedies

1

Penalty Notices

Monetary penalties for proven infringements after investigation.

2

Enforcement Notices

Orders requiring specific corrective actions within set timeframes.

3

Administrative Fines

Deterrent fines to prevent repetition of infringement.

Compensation Claims

Data subjects can seek redress for violations, including financial loss and emotional distress. After exhausting ODPC processes, data subjects can seek remedies from constitutional courts, potentially resulting in significant compensation awards.

Criminal Liability: Directors and company officers can face criminal prosecution for willful violations, including potential imprisonment.

The Hidden Financial Risks

Real-World Enforcement: The ODPC in Action

Landmark Ruling: January 2025

Complaint No. 1618 of 2024

The ODPC ruled that an employer violated an employee's rights by using their photograph for commercial purposes without obtaining explicit consent. This case establishes critical precedent for how consent must be obtained and documented.

Compensation Awarded

KES 500,000

Legal Basis

Section 37(1) DPA

Burden of Proof

On Controller

Active Enforcement Sectors

The ODPC has issued penalty notices across multiple sectors, demonstrating broad enforcement reach:

Entertainment

Finance & Banking

Education

Upcoming Inspections

The ODPC has announced nationwide inspections to assess compliance across various sectors. This proactive enforcement approach means:

No sector is exempt from scrutiny

Compliance documentation will be reviewed

Non-compliance will result in immediate action

Proactive compliance is essential

Key Takeaway: The ODPC is actively enforcing the Act. The January 2025 ruling demonstrates that even seemingly minor violations (using an employee photo without consent) can result in significant financial penalties. The burden of proof rests entirely on the data controller to demonstrate consent was obtained.

The Hidden Financial Risks

Beyond Fines: The Hidden Financial Costs

Reputational Damage

Data breaches and non-compliance become public knowledge, eroding customer trust and brand value. In Kenya's competitive market, privacy-conscious consumers will switch to compliant competitors.

Impact: Customer churn, difficulty acquiring new customers, long-term brand damage.

Remediation Costs

Retrofitting compliance is significantly more expensive than building it from the start. Costs include system overhauls, policy development, legal consultations, and staff training.

Impact: Emergency IT projects, external consultant fees, operational disruption.

Operational Disruption

Enforcement actions can require suspension of data processing activities, effectively halting business operations until compliance is achieved.

Impact: Lost revenue, inability to serve customers, contractual breaches.

Litigation Exposure

Data subjects can file civil lawsuits for damages resulting from privacy violations. Class action risks increase with the scale of the breach or non-compliance.

Impact: Legal defense costs, settlement payments, court-ordered damages.

Lost Business Opportunities

Non-compliance makes you ineligible for procurement opportunities and unattractive to investors who conduct due diligence on data protection practices.

Impact: Exclusion from RFPs, failed investment deals, partnership rejections.

Insurance Premiums

Data breaches and enforcement actions lead to significantly higher cyber insurance premiums or complete inability to obtain coverage.

Impact: Increased operating costs, uninsured breach exposure.

The True Cost Multiplier

Research shows that the total cost of non-compliance (fines + remediation + lost business + reputational damage) is typically 3-5 times higher than the initial regulatory fine. For a KES 5 million fine, the true cost could reach KES 15-25 million or more.

Chapter 3

Chapter Three

Legal Liabilities
and Exposure

Understanding Your Legal Obligations and Risks

Legal Liabilities and Exposure

Data Subject Rights: Your Legal Obligations

Section 26 of the Data Protection Act grants data subjects comprehensive rights. Failure to respect these rights can lead to formal complaints, enforcement actions, and compensation claims. You must establish procedures to receive and respond to these requests within statutory timeframes—typically within 30 days of receipt.

Right to Be Informed

Data subjects have the right to know how their personal data is being used. You must provide clear, concise, and transparent information through privacy notices at the point of data collection.

Response time: At collection

Right of Access

Data subjects can request access to their personal data you hold, including purposes of processing, categories of data, recipients, and retention periods.

Response time: 30 days

Right to Rectification

Data subjects can require you to correct inaccurate or incomplete data without undue delay. You must also notify any third parties who received the data.

Response time: Without undue delay

Right to Erasure

Also known as the "right to be forgotten," data subjects can request deletion of their data when it's no longer necessary, consent is withdrawn, or processing was unlawful.

Response time: Without undue delay

Right to Object

Data subjects can object to processing based on legitimate interests or for direct marketing purposes. You must stop processing unless you demonstrate compelling legitimate grounds.

Response time: At time of objection

Right to Data Portability

Data subjects can receive their data in a structured, commonly used, machine-readable format and transmit it to another controller without hindrance.

Response time: 30 days

Critical Requirement: You must implement mechanisms for data subjects to exercise their rights easily, train staff on handling requests, and maintain records of all interactions. Failure to respond appropriately constitutes a breach and may trigger regulatory action.

Legal Liabilities and Exposure

Cross-Border Transfer Risks

Highly Regulated Transfers

Section 48 of the Act prohibits sharing or transferring personal data outside Kenya unless specific conditions are met. Violations can lead to regulatory bans, fines, suspension of data operations, and civil lawsuits.

Four Legal Bases for Transfer

1

Adequate Safeguards

Proof of appropriate safeguards in the recipient country regarding security and protection.

2

Adequacy Decision

DPC has determined the recipient country ensures adequate protection.

3

Necessity

Transfer necessary for contract performance, legal claims, public interest, or vital interests.

4

Explicit Consent

Data subject has given explicit consent after being informed of risks.

Sensitive Personal Data

Cross-border processing of sensitive personal data is prohibited and only allowed when certain conditions are met:

Explicit consent from data subject

Proof of appropriate safeguards

Written approval from DPC (for civil registration data)

Data Localization

You must ensure storage of at least one serving copy of personal data on a server or data center located in Kenya.

Common Violation: Using cloud services, payment processors, or marketing platforms that store data outside Kenya without proper safeguards or consent is a frequent compliance failure with serious consequences.

Legal Liabilities and Exposure

Top 5 Legal Risks Businesses Face

1

Failure to Register with ODPC

HIGH RISK

Mandatory registration for data controllers/processors meeting thresholds. Failing to register is an offense under Section 18.

KES 5M or 1% turnover Suspension of operations
2

Ignoring Data Subject Rights

HIGH RISK

Failure to respond to access, rectification, erasure, or objection requests within statutory timeframes constitutes a breach.

Enforcement action Compensation claims
3

Unlawful Cross-Border Transfers

MEDIUM-HIGH RISK

Transferring personal data outside Kenya without adequate safeguards, adequacy decisions, necessity, or explicit consent.

Processing suspension Administrative fines
4

Inadequate Security Safeguards

HIGH RISK

Failure to implement appropriate technical and organizational measures to protect personal data, leading to breaches.

72-hour notification Subject notification
5

Commercial Use Without Consent

MEDIUM RISK

Using personal data for commercial purposes without explicit consent, as demonstrated in the January 2025 ODPC ruling.

KES 500K compensation Enforcement notice
Chapter 4

Chapter Four

Compliance
Requirements

What You Must Do to Stay Compliant

Compliance Requirements

Mandatory Registration with ODPC

Section 18 Requirement

Any person acting as a data controller or data processor must be registered with the Data Commissioner. Registration must be renewed every 24 months. Failure to register when required is a criminal offense.

Who Must Register?

Public bodies and state corporations

Companies with annual turnover or assets exceeding prescribed thresholds

Businesses processing sensitive personal data at scale

Specific industries (see right panel)

Mandatory Industries

Financial Services

Healthcare

Telecommunications

Education

Transport Services

CCTV/Security

Direct Marketing

Gambling

Exemptions

Data controllers/processors with annual turnover below KES 5 million and fewer than 10 employees are exempt from mandatory registration (unless in a mandatory industry).

Registration Process

Submit application through ODPC portal with prescribed fee. Certificate issued within 14 days if requirements are met. Valid for 24 months from issuance.

Compliance Requirements

Data Protection Principles: The Foundation

Section 25 of the Act outlines seven core data protection principles that must guide all data processing activities. These principles are not optional guidelines—they are legally binding obligations. Failure to adhere to any principle constitutes a breach of the Act.

1

Lawful, Fair & Transparent

Process personal data in a manner that upholds the data subject's right to privacy. Be transparent about how data is used and ensure processing is based on a lawful basis.

Provide clear privacy notices
2

Purpose Limitation

Collect personal data for specified, explicit, and legitimate purposes. Do not further process data in a manner incompatible with those purposes.

Document purposes at collection
3

Data Minimization

Ensure personal data is adequate, relevant, and limited to what is necessary for the intended purposes. Do not collect more data than you need.

Review data collection forms
4

Accuracy

Keep personal data accurate and up to date. Take reasonable steps to ensure inaccurate data is erased or rectified without delay.

Implement data quality checks
5

Storage Limitation

Keep personal data in a form that permits identification of data subjects for no longer than necessary for the intended purposes.

Establish retention schedules
6

Integrity & Confidentiality

Process personal data in a manner that ensures appropriate security, including protection against unauthorized or unlawful processing and accidental loss, destruction, or damage.

Implement technical safeguards
7

Accountability

The data controller is responsible for and must be able to demonstrate compliance with all data protection principles. This requires maintaining records, conducting impact assessments, and implementing governance frameworks.

Compliance Requirements

Security Safeguards: Technical and Organizational

Legal Basis

Sections 41-42 of the Act require data controllers and processors to implement appropriate organizational and technical measures to implement data protection principles effectively and protect personal data.

Technical Measures

Encryption: Use hashing and cryptography to protect data

Access Controls: Ensure only authorized personnel access necessary data

Authentication: Multi-factor authentication for sensitive systems

Network Security: Firewalls, intrusion detection, secure configurations

Audit Trails: Maintain logs of data access and processing activities

Organizational Measures

Security Policies: Develop, publish, and regularly update data handling policies

Staff Training: Regular data protection and privacy awareness training

Risk Assessments: Regularly assess risks and implement countermeasures

Incident Response: Procedures to detect, handle, report, and learn from breaches

Processor Agreements: Contractual clauses requiring processors to maintain security

Specific Requirements

Keep backups and logs to extent necessary

Use audit trails and event monitoring routinely

Protect sensitive data with adequate measures

Regularly review and test software for vulnerabilities

Compliance Requirements

Breach Notification: The 72-Hour Rule

The 72-Hour Deadline

Data controllers must notify the ODPC of personal data breaches within 72 hours of becoming aware of the breach, where feasible. If the breach is likely to result in high risk to data subjects' rights and freedoms, they must also be notified without undue delay.

When to Notify

To ODPC (Within 72 hours):

All personal data breaches unless unlikely to result in risk to rights and freedoms

To Data Subjects (Without delay):

When breach likely to result in high risk to their rights and freedoms

Documentation:

All breaches must be documented regardless of notification requirement

What to Include

1

Nature of breach: Categories and approximate number of affected data subjects

2

Likely consequences: What harm could result from the breach

3

Measures taken: Steps to address and mitigate the breach

4

Contact details: DPO or contact point for more information

Have a Breach Response Plan Ready

When a breach occurs, minutes matter. Having procedures in place before an incident can mean the difference between manageable containment and regulatory enforcement. Your plan should define roles, escalation procedures, and include template notification documents.

Compliance Requirements

Lawful Basis for Processing

Section 30 of the Act requires that every processing activity must rest on one of six lawful bases. You must determine and document your lawful basis before processing begins. Different requirements apply for sensitive personal data, which generally requires explicit consent.

Consent

Freely given, specific, informed, and unambiguous indication of the data subject's wishes. Must be as easy to withdraw as to give.

Best for: Marketing, cookies, optional services

Contractual Necessity

Processing necessary for the performance of a contract to which the data subject is a party, or to take steps at their request before entering into a contract.

Best for: Employee data, customer orders, service delivery

Legal Obligation

Processing necessary for compliance with a legal obligation to which the controller is subject under Kenyan or EU law.

Best for: Tax records, regulatory reporting, court orders

Vital Interests

Processing necessary to protect the vital interests of the data subject or another natural person, typically life-or-death situations.

Best for: Emergency medical treatment, protecting life

Public Interest

Processing necessary for the performance of a task carried out in the public interest or in the exercise of official authority.

Best for: Public health, social protection, law enforcement

Legitimate Interests

Processing necessary for legitimate interests pursued by the controller or third party, except where overridden by data subject rights.

Best for: Fraud prevention, IT security, internal reporting

Documentation Required: You must document the lawful basis for each processing activity in your records of processing. If relying on consent, ensure mechanisms allow withdrawal as easily as giving consent. For sensitive personal data, explicit consent is generally required.

Compliance Requirements

Data Protection Officer: When You Need One

Mandatory Appointment

The Act mandates appointment of a Data Protection Officer (DPO) in specific circumstances. The DPO must have expert knowledge of data protection law and practices, operate independently, and report directly to the highest management level.

Public Bodies

All public bodies and public authorities must appoint a DPO, regardless of their processing activities.

Includes government agencies, state corporations, and public institutions

Large-Scale Monitoring

Organizations whose core activities involve regular and systematic monitoring of data subjects on a large scale.

Examples: Online tracking, behavioral advertising, CCTV networks

Sensitive Data at Scale

Organizations whose core activities involve processing sensitive personal data on a large scale.

Examples: Health data, biometric data, genetic information

DPO Responsibilities

Inform and advise on data protection obligations

Monitor compliance with the Act and policies

Cooperate with the ODPC and be contact point

Provide advice on DPIAs when required

DPO Requirements

Expert knowledge of data protection law

Independence in performing duties

Report to highest management level

No conflict of interest with other duties

Chapter 5

Chapter Five

Your Action
Plan

Practical Steps to Achieve Compliance

Your Action Plan

10-Step Compliance Roadmap

1

Conduct a Data Audit

Document what personal data you hold, where it comes from, how it's processed, where it's stored, who has access, and retention periods.

2

Register with ODPC

If you meet thresholds or operate in mandatory industries, complete registration through the ODPC portal and pay prescribed fees.

3

Establish Lawful Basis

Document the lawful basis for each processing activity. For sensitive data, ensure you meet stricter requirements including explicit consent.

4

Data Protection by Design

Implement technical and organizational measures that ensure data protection principles are integrated into processing activities from the start.

5

Appoint a DPO

If required, appoint a qualified Data Protection Officer with expert knowledge, independence, and direct reporting to senior management.

6

Draft Privacy Policies

Create clear, concise, and transparent privacy notices specifying purposes, lawful basis, retention periods, rights, and contact details.

7

Establish Rights Procedures

Implement procedures to receive and respond to data subject requests within statutory timeframes (typically 30 days).

8

Prepare Breach Response Plan

Develop a data breach response plan defining roles, escalation procedures, and template notification documents for the 72-hour ODPC notification.

9

Review Third-Party Arrangements

Ensure data processing agreements are in place with all processors specifying subject matter, duration, nature, and security requirements.

10

Conduct Regular Training

Train staff on data protection principles, security measures, breach reporting, and handling data subject requests. Document all training.

Your Action Plan

Compliance as Competitive Advantage

Data protection compliance has moved beyond documentation. Organizations that treat compliance as structural governance infrastructure, not paperwork, gain measurable commercial advantage. In competitive markets, demonstrable compliance becomes a differentiator.

Improved Investor Confidence

Investors conduct due diligence on data protection practices. Compliance demonstrates mature governance and reduces investment risk, making your organization more attractive to funding.

Compliance documentation accelerates due diligence

Stronger Procurement Positioning

Many RFPs now require evidence of data protection compliance. Being compliant makes you eligible for opportunities that non-compliant competitors cannot pursue.

Compliance opens doors to new business opportunities

Enhanced Customer Trust

Privacy-conscious consumers prefer organizations that demonstrate commitment to protecting their data. Transparent data practices build long-term customer loyalty.

Trust is a competitive differentiator

Reduced Litigation Exposure

Structured compliance reduces the risk of data subject complaints, regulatory enforcement, and civil litigation. Prevention is significantly cheaper than remediation.

Avoid fines, compensation, and reputational damage

The New Business Imperative

The real question is no longer "Do we have a privacy policy?" but "Is our organization structurally compliant?" In 2026, demonstrable data protection compliance is not just a legal requirement—it's a commercial necessity and competitive advantage.

Final

The Time to Act is Now

Don't Wait for a Breach
to Take Action

Avoid Costly Penalties - Become Fully Data Protection Compliant

Most organizations think having a privacy policy is enough — until enforcement begins. The Office of the Data Protection Commissioner (ODPC) is actively enforcing compliance. Non-compliance doesn’t just mean fines - it risks your reputation, clients, and business continuity.

KES 5M

Maximum Fine

72 Hours

Breach Notification

24 Months

Registration Validity

No obligation • Form Takes 1 minute • Expert guidance from KKCO East Africa LLP

QR Code