Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Overview of Zimbabwe New Data Protection Act

Published April 3, 2022
Author

Omer Imran Malik

Data Privacy Legal Manager, Securiti

FIP, CIPT, CIPM, CIPP/US

Listen to the content

Zimbabwe has officially been in the process of legislating a concrete data protection bill since 2020. In May 2020, the Bill was formally gazetted with public hearings starting in July 2020. At this point, the Bill was still called the Cybersecurity and Data Protection Bill.

After almost 18 months of deliberations, debates, and modifications to the original Bill, Zimbabwe formally enacted the Data Protection Act (DPA) on December 3, 2021. While the new law deals with aspects of cybersecurity and cybercrime, the Act's primary focus is on data privacy and ensuring data protection for all data collected by data handlers within the country as well as outside the country if the means used for processing is located in Zimbabwe.

The DPA also brought amendments to the following existing laws within the Zimbabwean constitution:

  • Criminal Law (Codification and Reform Act).
  • The Criminal Procedure and Evidence Act.
  • The Interception of Communications Act.

As per the DPA, data controllers must process data fairly and lawfully. They must ensure that data is collected only for specified, explicit and legitimate purposes taking into account all relevant factors and ensure compliance with the provisions of the DPA.

Who Needs to Comply with the DPA

The DPA will apply to any organisation established within or even outside Zimbabwe if the means used to process data were located in Zimbabwe and the processing of data was not done for transit of data purposes. However, if the data being collected is merely for the purpose of transiting the data from Zimbabwe, such data is exempt from this law.

Furthermore, all data handlers collecting data in Zimbabwe must hire a representative within Zimbabwe if they are not formally established or registered within Zimbabwe.

Obligations for Organizations Under that Specific Law

As per Zimbabwe's DPA, organisations have certain obligations towards their customers and users. Some of the most crucial responsibilities include:

As per the DPA, the data handler must seek consent in writing from the data subject to collect any sensitive personal data. Such consent may be withdrawn by the data subject at any time and free of charge. The processing of sensitive personal data can take place without the data subject’s consent only under certain limited grounds.

The processing of non-sensitive personal data is allowed without the consent of the data subject only on any of the following grounds:

  • Where the processing is necessary for the purposes of being material as evidence in proving an offense;
  • Where the processing is necessary to comply with a legal obligation;
  • Where the processing is necessary to protect the vital interests of the data subject;
  • Where the processing is carried out in the public interest or in the exercise of official authority;
  • Where the processing is to promote the legitimate interests of the data controller.

Furthermore, the regulatory authority has the power to ask the data handler to cease the processing of any sensitive personal data even with the data subject’s consent under certain circumstances.

Security Requirements

The DPA requires all data controllers to take appropriate technical and organisational measures that are necessary to protect data from unauthorised destruction, negligent loss, unauthorised alteration or access and any other unauthorised processing of the data.

Furthermore, it requires all data controllers to enter into a written contract with the data processor to protect the data they collect on users with the securest measures available to them.

Data Breach Notification Requirement

All data controllers are required to report a breach within 24 hours to the regulatory authority.

Data Protection Officer Requirement

The DPA does not explicitly require companies to appoint a data protection officer (DPO).
However, if an organisation does hire a DPO, it must duly inform the regulatory authority of the appointment. The DPO's role within the organization will be to ensure complete compliance with the law's provisions in an independent manner.

Data Protection Impact Assessment

There are no requirements for the data handlers to conduct regular data protection impact assessments. However, since the DPA does allow the regulatory authority to carry out further inspection and assessment of the security and organisational measures employed by a data controller. Therefore, it is highly recommended that all data handlers conduct their own impact assessments especially for high-risk data processing activities to ensure their practices are in line with the DPA’s requirements.

Record of Processing Activities

The DPA does not provide any explicit record-keeping obligation as far as data processing activities are concerned. However, as per section 8 of the Schedule (section 4B(5) of the Act), the Cybersecurity Committee requires minutes of all proceedings of any decisions taken at every meeting of the committee to be entered in books kept in a confidential manner.

Cross border data transfer Requirements

Personal data cannot be transferred outside Zimbabwe unless an adequate level of protection is ensured in the destination country. This will be determined by the regulatory authority keeping in mind what data is being transferred, the duration for which the data will need to be in the other country, whether the other country has data protection laws, and what steps can be taken in the country to ensure the data is not compromised in any way.

Once the regulatory authority has determined the other country is adequate or safe for the data to be transferred, the data handler can transfer the data there. Data transfers to countries that do not ensure an adequate level of protection can take place on any of the following grounds:

  • Where the data subject has unambiguously given his or her consent;
  • Where the transfer is necessary for the performance of the contract;
  • Where the transfer is necessary on public interest grounds;
  • Where the transfer is necessary to protect vital interests of the data subject;
  • Where the transfer is made from a register which is intended to provide information to the public and which is open to consultation either by the public in general or by any person who can demonstrate a legitimate interest.

Data Subject Rights

Here are the rights afforded to data subjects under the DPA:

Right to be informed

All data subjects have the right to be informed of the use of their personal data;

Right to access

All data subjects have the right to request access to any and all information in the custody of the data controller or data processor;

Right to object

All data subjects have the right to object to the processing of their personal information;

Right to modification

All data subjects have the right to request correction of false or misleading personal information;

Right to deletion

All data subjects have the right to request that a data handler delete any data they may collect on them that the data subject considered false or incorrect.

Regulatory Authority

Perhaps one of the most important differences between the version of the Bill that was gazetted and recently passed was the decision to set up an independent body, the Postal and Telecommunications Regulatory Authority of Zimbabwe (POTRAZ), as a data protection authority for the purposes of the law. POTRAZ is established in terms of the Postal and Telecommunications Act and has all the necessary legal enforcement powers to ensure the DPA is being enforced properly.

Penalties for Non-compliance

Zimbabwe's new data protection law sets forth some of the strictest penalties for non-compliance and breaches for data handlers. A data controller can be guilty of an offense and liable to a fine not exceeding level 11 or imprisonment for a period not exceeding seven years or both such fine and such imprisonment for violations of certain provisions.

Moreover, if the data handler is found guilty of non-compliance, the Courts have the power to direct law enforcement agencies to seize any media or storage devices that might contain compromised data on data subjects. Any data found in these media or devices will then be destroyed.

How an Organisation Can Operationalize the DPA

Any organisation aiming to achieve compliance with Zimbabwe’s new data protection act can do so by ensuring it follows the following necessities in its data collection practices:

  • Hire a competent representative within Zimbabwe if the data handler is not formally registered in Zimbabwe;
  • Disclose how and why the data handler is collecting data via a transparent privacy policy;
  • Have a robust consent management system in place to ensure consent is gained as per the law;
  • Carry out routine data mapping exercises to have a detailed structure of all data being collected, stored, and transferred to ensure compliance;
  • Conduct regular data protection impact and risk assessments to ensure you remain compliant with the new regulations.

How can Securiti Help

Zimbabwe is just of the several nations that have or are in the process of enacting their own versions of a data protection law. The volatile nature of data privacy globally has meant that companies and websites now find themselves with the heightened responsibility to ensure all data collected by them is adequately protected, stored, and utilized.

Therein lies the problem for most organizations owing to the sheer volume of data they process. Ensuring compliance with these new data protection laws is only possible if organizations accept robotic automation as the ideal solution. Securiti has made a name for itself in the global data governance and privacy compliance sector owing to its Privacy Ops framework that automates data compliance for organizations using machine learning and artificial intelligence-backed tools.

Request a demo today to learn more about how these tools can help your organization.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Take a
Product Tour

See how easy it is to manage privacy compliance with robotic automation.

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 10:35

There’s Been a Material Shift in the Data Center of Gravity

Watch Now View
Spotlight 14:21

AI Governance Is Much More than Technology Risk Mitigation

AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View

Latest

View More

From Trial to Trusted: Securely Scaling Microsoft Copilot in the Enterprise

AI copilots and agents embedded in SaaS are rapidly reshaping how enterprises work. Business leaders and IT teams see them as a gateway to...

The ROI of Safe Enterprise AI View More

The ROI of Safe Enterprise AI: A Business Leader’s Guide

The fundamental truth of today’s competitive landscape is that businesses harnessing data through AI will outperform those that don’t. Especially with 90% of enterprise...

Understanding Data Regulations in Australia’s Telecom Sector View More

Understanding Data Regulations in Australia’s Telecom Sector

1. Introduction Australia’s telecommunications sector plays a crucial role in connecting millions of people. However, with this connectivity comes the responsibility of safeguarding vast...

Understanding Saudi Arabia’s Global AI Hub Law View More

Understanding Saudi Arabia’s Global AI Hub Law

Gain insights into Saudi Arabia’s Global AI Hub Law - a legal framework for operating various types of data centers referred to as Hubs....

ROPA View More

Records of Processing Activities (RoPA): A Cross-Jurisdictional Analysis

Download the whitepaper to gain a cross-jurisdictional analysis of records of processing activities (RoPA). Learn what RoPA is, why organizations should maintain it, and...

Managing Privacy Risks in Large Language Models (LLMs) View More

Managing Privacy Risks in Large Language Models (LLMs)

Download the whitepaper to learn how to manage privacy risks in large language models (LLMs). Gain comprehensive insights to avoid violations.

Comparison of RoPA Field Requirements Across Jurisdictions View More

Comparison of RoPA Field Requirements Across Jurisdictions

Download the infographic to compare Records of Processing Activities (RoPA) field requirements across jurisdictions. Learn its importance, penalties, and how to navigate RoPA.

Navigating Kenya’s Data Protection Act View More

Navigating Kenya’s Data Protection Act: What Organizations Need To Know

Download the infographic to discover key details about navigating Kenya’s Data Protection Act and simplify your compliance journey.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New