Securiti launches Gencore AI, a holistic solution to build Safe Enterprise AI with proprietary data - easily

View

Overview of Zimbabwe New Data Protection Act

Published April 3, 2022
Author

Omer Imran Malik

Senior Data Privacy Consultant at Securiti

FIP, CIPT, CIPM, CIPP/US

Listen to the content

Zimbabwe has officially been in the process of legislating a concrete data protection bill since 2020. In May 2020, the Bill was formally gazetted with public hearings starting in July 2020. At this point, the Bill was still called the Cybersecurity and Data Protection Bill.

After almost 18 months of deliberations, debates, and modifications to the original Bill, Zimbabwe formally enacted the Data Protection Act (DPA) on December 3, 2021. While the new law deals with aspects of cybersecurity and cybercrime, the Act's primary focus is on data privacy and ensuring data protection for all data collected by data handlers within the country as well as outside the country if the means used for processing is located in Zimbabwe.

The DPA also brought amendments to the following existing laws within the Zimbabwean constitution:

  • Criminal Law (Codification and Reform Act).
  • The Criminal Procedure and Evidence Act.
  • The Interception of Communications Act.

As per the DPA, data controllers must process data fairly and lawfully. They must ensure that data is collected only for specified, explicit and legitimate purposes taking into account all relevant factors and ensure compliance with the provisions of the DPA.

Who Needs to Comply with the DPA

The DPA will apply to any organisation established within or even outside Zimbabwe if the means used to process data were located in Zimbabwe and the processing of data was not done for transit of data purposes. However, if the data being collected is merely for the purpose of transiting the data from Zimbabwe, such data is exempt from this law.

Furthermore, all data handlers collecting data in Zimbabwe must hire a representative within Zimbabwe if they are not formally established or registered within Zimbabwe.

Obligations for Organizations Under that Specific Law

As per Zimbabwe's DPA, organisations have certain obligations towards their customers and users. Some of the most crucial responsibilities include:

As per the DPA, the data handler must seek consent in writing from the data subject to collect any sensitive personal data. Such consent may be withdrawn by the data subject at any time and free of charge. The processing of sensitive personal data can take place without the data subject’s consent only under certain limited grounds.

The processing of non-sensitive personal data is allowed without the consent of the data subject only on any of the following grounds:

  • Where the processing is necessary for the purposes of being material as evidence in proving an offense;
  • Where the processing is necessary to comply with a legal obligation;
  • Where the processing is necessary to protect the vital interests of the data subject;
  • Where the processing is carried out in the public interest or in the exercise of official authority;
  • Where the processing is to promote the legitimate interests of the data controller.

Furthermore, the regulatory authority has the power to ask the data handler to cease the processing of any sensitive personal data even with the data subject’s consent under certain circumstances.

Security Requirements

The DPA requires all data controllers to take appropriate technical and organisational measures that are necessary to protect data from unauthorised destruction, negligent loss, unauthorised alteration or access and any other unauthorised processing of the data.

Furthermore, it requires all data controllers to enter into a written contract with the data processor to protect the data they collect on users with the securest measures available to them.

Data Breach Notification Requirement

All data controllers are required to report a breach within 24 hours to the regulatory authority.

Data Protection Officer Requirement

The DPA does not explicitly require companies to appoint a data protection officer (DPO).
However, if an organisation does hire a DPO, it must duly inform the regulatory authority of the appointment. The DPO's role within the organization will be to ensure complete compliance with the law's provisions in an independent manner.

Data Protection Impact Assessment

There are no requirements for the data handlers to conduct regular data protection impact assessments. However, since the DPA does allow the regulatory authority to carry out further inspection and assessment of the security and organisational measures employed by a data controller. Therefore, it is highly recommended that all data handlers conduct their own impact assessments especially for high-risk data processing activities to ensure their practices are in line with the DPA’s requirements.

Record of Processing Activities

The DPA does not provide any explicit record-keeping obligation as far as data processing activities are concerned. However, as per section 8 of the Schedule (section 4B(5) of the Act), the Cybersecurity Committee requires minutes of all proceedings of any decisions taken at every meeting of the committee to be entered in books kept in a confidential manner.

Cross border data transfer Requirements

Personal data cannot be transferred outside Zimbabwe unless an adequate level of protection is ensured in the destination country. This will be determined by the regulatory authority keeping in mind what data is being transferred, the duration for which the data will need to be in the other country, whether the other country has data protection laws, and what steps can be taken in the country to ensure the data is not compromised in any way.

Once the regulatory authority has determined the other country is adequate or safe for the data to be transferred, the data handler can transfer the data there. Data transfers to countries that do not ensure an adequate level of protection can take place on any of the following grounds:

  • Where the data subject has unambiguously given his or her consent;
  • Where the transfer is necessary for the performance of the contract;
  • Where the transfer is necessary on public interest grounds;
  • Where the transfer is necessary to protect vital interests of the data subject;
  • Where the transfer is made from a register which is intended to provide information to the public and which is open to consultation either by the public in general or by any person who can demonstrate a legitimate interest.

Data Subject Rights

Here are the rights afforded to data subjects under the DPA:

Right to be informed

All data subjects have the right to be informed of the use of their personal data;

Right to access

All data subjects have the right to request access to any and all information in the custody of the data controller or data processor;

Right to object

All data subjects have the right to object to the processing of their personal information;

Right to modification

All data subjects have the right to request correction of false or misleading personal information;

Right to deletion

All data subjects have the right to request that a data handler delete any data they may collect on them that the data subject considered false or incorrect.

Regulatory Authority

Perhaps one of the most important differences between the version of the Bill that was gazetted and recently passed was the decision to set up an independent body, the Postal and Telecommunications Regulatory Authority of Zimbabwe (POTRAZ), as a data protection authority for the purposes of the law. POTRAZ is established in terms of the Postal and Telecommunications Act and has all the necessary legal enforcement powers to ensure the DPA is being enforced properly.

Penalties for Non-compliance

Zimbabwe's new data protection law sets forth some of the strictest penalties for non-compliance and breaches for data handlers. A data controller can be guilty of an offense and liable to a fine not exceeding level 11 or imprisonment for a period not exceeding seven years or both such fine and such imprisonment for violations of certain provisions.

Moreover, if the data handler is found guilty of non-compliance, the Courts have the power to direct law enforcement agencies to seize any media or storage devices that might contain compromised data on data subjects. Any data found in these media or devices will then be destroyed.

How an Organisation Can Operationalize the DPA

Any organisation aiming to achieve compliance with Zimbabwe’s new data protection act can do so by ensuring it follows the following necessities in its data collection practices:

  • Hire a competent representative within Zimbabwe if the data handler is not formally registered in Zimbabwe;
  • Disclose how and why the data handler is collecting data via a transparent privacy policy;
  • Have a robust consent management system in place to ensure consent is gained as per the law;
  • Carry out routine data mapping exercises to have a detailed structure of all data being collected, stored, and transferred to ensure compliance;
  • Conduct regular data protection impact and risk assessments to ensure you remain compliant with the new regulations.

How can Securiti Help

Zimbabwe is just of the several nations that have or are in the process of enacting their own versions of a data protection law. The volatile nature of data privacy globally has meant that companies and websites now find themselves with the heightened responsibility to ensure all data collected by them is adequately protected, stored, and utilized.

Therein lies the problem for most organizations owing to the sheer volume of data they process. Ensuring compliance with these new data protection laws is only possible if organizations accept robotic automation as the ideal solution. Securiti has made a name for itself in the global data governance and privacy compliance sector owing to its Privacy Ops framework that automates data compliance for organizations using machine learning and artificial intelligence-backed tools.

Request a demo today to learn more about how these tools can help your organization.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Take a
Product Tour

See how easy it is to manage privacy compliance with robotic automation.

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View
Spotlight 2:48

Unlocking Gen AI For Enterprise With Rehan Jalil

Rehan Jalil
Watch Now View
Spotlight 13:35

The Better Organized We’re from the Beginning, the Easier it is to Use Data

Watch Now View
Spotlight 13:11

Securing GenAI: From SaaS Copilots to Enterprise Applications

Rehan Jalil
Watch Now View
Spotlight 47:02

Navigating Emerging Technologies: AI for Security/Security for AI

Rehan Jalil
Watch Now View

Latest

View More

Accelerating Safe Enterprise AI with Gencore Sync & Databricks

We are delighted to announce new capabilities in Gencore AI to support Databricks' Mosaic AI and Delta Tables! This support enables organizations to selectively...

View More

Building Safe, Enterprise-grade AI with Securiti’s Gencore AI and NVIDIA NIM

Businesses are rapidly adopting generative AI (GenAI) to boost efficiency, productivity, innovation, customer service, and growth. However, IT & AI executives—particularly in highly regulated...

Key Differences from DLP & CNAPP View More

Why DSPM is Critical: Key Differences from DLP & CNAPP

Learn about the critical differences between DSPM vs DLP vs CNAPP and why a unified, data-centric approach is an optimal solution for robust data...

DSPM Trends View More

DSPM in 2025: Key Trends Transforming Data Security

DSPM trends in 2025 provides a quick glance at the challenges, risks, and best practices that can help security leaders evolve their data security...

The Future of Privacy View More

The Future of Privacy: Top Emerging Privacy Trends in 2025

Download the whitepaper to gain insights into the top emerging privacy trends in 2025. Analyze trends and embed necessary measures to stay ahead.

View More

Personalization vs. Privacy: Data Privacy Challenges in Retail

Download the whitepaper to learn about the regulatory landscape and enforcement actions in the retail industry, data privacy challenges, practical recommendations, and how Securiti...

Nigeria's DPA View More

Navigating Nigeria’s DPA: A Step-by-Step Compliance Roadmap

Download the infographic to learn how Nigeria's Data Protection Act (DPA) mapping impacts your organization and compliance strategy.

Decoding Data Retention Requirements Across US State Privacy Laws View More

Decoding Data Retention Requirements Across US State Privacy Laws

Download the infographic to explore data retention requirements across US state privacy laws. Understand key retention requirements and noncompliance penalties.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New