Follow Us on Telegram For Up To Date Tech News and Reviews

Features

The growing importance of privacy amongst customers and how businesses should cater to it

Veera Natarajan - Zoho Kenya copy(1)

By Veerakumar Natarajan, Country Head – Kenya, Zoho Corp.

Linkedin

Privacy is a growing concern for technology consumers worldwide. While there was a time when that may not have been the case for countries like Nigeria and Kenya, that’s no longer the reality. As connectivity becomes more affordable and ubiquitous, Kenyans and Nigerians have become increasingly tech-savvy and conscious regarding how much data they share with technology companies and what the latter are doing with it.

In the face of these growing concerns, companies operating in Africa need to be mindful of the increasing privacy mindset of their customers. Aside from regulatory compliance, companies should actively demonstrate that they care about their customers’ privacy concerns in order to build and sustain trust and to show they’re taking a proactive approach to protect their personal information.

The importance of regulatory compliance

The first step any company should take to safeguard their customers’ privacy is ensuring they’re compliant with all of the relevant laws and regulations. In countries like Kenya and Nigeria, data protection regulations are relatively new.

The Data Protection Act of 2019, enforced by the Office of the Data Protection Commissioner (ODPC), regulates data protection in Kenya. The act expressly prohibits organisations from processing personal data if their consent has not been provided first. Each organisation must have a data controller and/or a data processor whose responsibility is to prove they’ve obtained consent before processing a person’s data.

Nigeria’s Data Protection Act, meanwhile, was signed into law in 2023. The act governs both manual and automatic data processing. The act also established the Nigeria Data Protection Commission (NDPC), which is an independent body that governs data protection and regulation in the country. In addition to defining sensitive personal data as including an individual’s genetic and biometric data as well as their race, ethnicity, and health status, among other things, the act also provides specific grounds for the processing of this sensitive personal data. According to the act, such data can be processed where consent is provided or where processing is necessary for social security or employment laws.

Both of these laws are in line with similar laws and regulations around the world, such as Europe’s GDPR. That means they’re not only a good place for Nigerian and Kenyan businesses to start for compliance, but they also help businesses gain good footing when it comes to protecting customer data should they start operating internationally.

Read: Zoho’s user base Crosses the 100 Million Mark

Beyond compliance

Companies should, however, view regulatory compliance as the bare minimum when it comes to meeting their customers’ privacy needs. Given the parlous state of privacy protection across many African countries, going above and beyond with customer privacy can be a positive differentiator for companies that get it right.

Among the initiatives they can undertake in this direction are investing in data center security to minimise the collection of data, requesting permission from customers while collecting sensitive information, and ultimately reducing their reliance on selling user data for revenue gains. Another initiative that organisations can implement is implementing multi-factor authentication if they require customers to log in to an account to access their products and services.

Another aspect that businesses should pay close attention to is which technology vendor they work with to run their internal operations. Businesses should ensure the third-party tech tools they deploy within their IT infrastructure also come with strong data privacy and protection controls, and the corresponding vendors also practice transparent data collection practices. Should one of these vendors fall victim to a cybersecurity breach, the customer data of the organisations using it could easily fall into nefarious hands.

Businesses should, therefore, ensure they make use of software providers and vendors that are, themselves, compliant with all the relevant privacy laws and regulations, and offer a comprehensive set of security measures and procedures, including controlled user access, enterprise mobility management (EMM) integration, IP restrictions, and secure integrations.

Riding the positives of proactive protection

While there are many negatives associated with data protection failures, including reputational damage and legal punishments, it’s also important that organisations understand the positives associated with proactive data protection.

High up on the list of those positives is building trust. Customers who trust the companies they buy from are more likely to be loyal in the long term, make repeat purchases in the future, and act as evangelists to others. At a time when customers are increasingly concerned about data privacy, building that trust is more difficult, but also more rewarding than ever. It, in other words, is something worth investing in.

Also Read: Zoho Invoice Integrates M-PESA to Simplify Payments

About author

Tech Arena is an independent technology news website that mainly covers social media news, mobile and gadget news and reviews, apps and software among others. The site focuses on tech news from all over the world that directly impact Kenya.
Related posts
FeaturesNews

Visa Appoints Chad Pollock as New General Manager for East Africa

FeaturesNews

Moringa School Partners With M-PESA and Safaricom to Offer API Training and Certification in Africa

FeaturesTop 5

Five tips for small business owners to help grow their business online

Features

The Right Server for a Small Business (The Ultimate Guide)

Sign up for our Newsletter and
stay informed

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.