Privacy by design or by accident

February 2026 Security Services & Risk Management, Infrastructure

Every January, Data Privacy Day invites organisations and individuals to reflect on how they handle personal information. This year, two themes stand out. For organisations, the call is to prioritise privacy by design, building privacy into systems from the outset rather than adding it later. For individuals, the message is to take control of your data, understanding where it flows, who accesses it, and how it is protected.


Mwandu Mwelwa.

In Africa, privacy is not only a policy or awareness issue, but an operational one. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Privacy by design is cheaper than privacy retrofits

Privacy-by-design is a systems discipline. The principle is that security and privacy controls should be embedded in architecture, workflows, and default configurations, not added after deployment. Regulators and privacy authorities have long pushed this direction because retrofitting privacy controls into live environments is costly, disruptive, and often incomplete. An accessible overview of the principle is outlined by the Office of the Privacy Commissioner of Canada.

In practice, privacy-by-design means identity controls that enforce least-privilege access by default. It means encryption built into data storage and transport, continuous monitoring, audit trails, and policy enforcement that do not require manual intervention. Most importantly, it means visibility to know where sensitive data lives, how it moves, and when something deviates from normal behaviour.

For many African organisations, the challenge is the realities of infrastructure. Many businesses have distributed branches, limited on-site IT staff, shared networks, and an increasing reliance on cloud platforms and remote access. Without built-in controls and managed visibility, privacy risks accumulate quickly.

Individuals must take control, but systems must support them

The second global theme (encouraging individuals to take control of their data) is equally important. Simple actions, such as using strong passwords, enabling multi-factor authentication, limiting oversharing, and recognising phishing attempts, significantly reduce risk.

Organisations cannot rely on awareness alone. People make mistakes, devices are lost, links fail, and credentials are reused. Privacy-by-design accepts this and assumes human error will occur. Systems are then built to contain damage, limit lateral movement, and provide clear evidence when incidents happen.

In African environments, this combination of human behaviour and infrastructure variability makes managed, always-on controls even more important. A branch that loses connectivity or power should not become a blind spot. A temporary network workaround should not bypass the security policy. A remote user should not be granted broader access simply because identity controls are inconvenient to enforce.

Data centres matter, but the edge decides the outcome

Africa’s data centre ecosystem is expanding rapidly. New facilities, interconnection growth, and hyperscaler investment are strengthening local hosting, improving latency, and addressing data sovereignty requirements. Even the most resilient data centre only delivers privacy and security outcomes if the path between the user and the facility is reliable, visible, and protected.

This is where many privacy strategies fail. The core may be secure, but the edge (branch offices, retail sites, depots, clinics, and field locations) remains exposed. Privacy-by-design must therefore extend to the edge. Otherwise, privacy becomes dependent on good fortune rather than engineered control.

Turning privacy intent into operational control

At inq., we see privacy, security, and connectivity as inseparable. Visibility, monitoring, managed enforcement, and clear reporting are the foundation. Without them, privacy risk cannot be measured, let alone reduced.

That is why our managed connectivity and security services focus on delivering operational outcomes: continuous link monitoring, built-in threat protection, vulnerability visibility, identity-aware access, and evidence-driven incident reporting. These capabilities allow organisations to prove control rather than merely claim it.

For African organisations, this approach matters. It recognises that infrastructure constraints exist. It acknowledges that in-house security teams are often stretched thin. It replaces fragile manual processes with managed, automated controls that continue to function even under less-than-ideal conditions.

A practical next step

Data Privacy Day should not be treated as a one-off compliance reminder. It is an opportunity to ask, can we prove that our systems enforce privacy even when networks fail, devices move, and people make mistakes?

For organisations, this starts with reviewing where sensitive data resides, who has access, and what controls are enforced by default. For individuals, it begins with understanding digital habits and tightening basic hygiene. For technology leaders, this means ensuring that privacy-by-design is not a document on a shelf, but a property of the architecture itself.

Privacy that works only in ideal conditions is not privacy. In Africa, systems must be designed to succeed in real situations. That is where trust is built and where it is most easily lost.

For more information, visit www.inq.inc.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
From digital transformation to digital sovereignty
Security Services & Risk Management IoT & Automation
As cyberthreats grow, data regulations tighten, and AI becomes central to economic competitiveness, countries are recognising the need to control and protect their own digital assets.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.