Compliance · Uganda · DOPA 2019

A training programme that meets Section 20's organisational-measures standard.

Uganda's Data Protection and Privacy Act, 2019 requires data controllers to adopt "appropriate, reasonable, technical and organisational measures" to protect personal data. Section 20 is explicit. A one-off workshop doesn't meet the bar.

The Aware Front is a fully-managed e-learning and compliance platform that delivers the year-long programme, behavioural testing, and audit-ready evidence pack that stands up to a Personal Data Protection Office review — built in Kampala, for Ugandan organisations.

§ 01 / The law

What Section 20 actually requires.

DOPA 2019 doesn't describe what compliant training looks like in checklist form. It sets a standard — and leaves the evidence of meeting that standard up to you.

Who it applies to

Every public or private organisation in Uganda that collects, processes, holds, or uses personal data. The Act is also extraterritorial — it applies to organisations outside Uganda that handle personal data of Ugandan citizens.

What "organisational measures" means

Section 20(2) sets out the obligations underneath the standard: identify foreseeable internal and external risks, and establish and maintain appropriate safeguards. The Data Protection and Privacy Regulations, 2021 make staff training an enumerated safeguard.

Who enforces it

The Personal Data Protection Office (PDPO), established under the National Information Technology Authority, Uganda (NITA-U), has investigation, audit, and enforcement powers. Breach notifications flow through this office.

§ 02 / The liability

What happens when you don't comply.

DOPA 2019 creates three distinct layers of exposure — criminal, civil, and reputational. Untrained staff don't just create risk; they create liability your organisation carries.

01

Criminal sanctions

The Act creates offences for unlawful obtaining, disclosure, destruction, concealment, or alteration of personal data. For corporations, the fine can reach 2% of gross annual income. Individual officers face up to 240 currency points or 10 years imprisonment — and company directors are personally on the hook for offences they authorise.

02

Civil remedies

Data subjects can sue for damages resulting from a breach. This exposure is distinct from regulatory penalties — a breach caused by a phished employee can generate simultaneous PDPO action and private-party litigation.

03

Reputational damage

Where the PDPO determines publicity would protect affected data subjects, it can direct the organisation to publicise the compromise. For regulated sectors — healthcare, finance, gaming — that disclosure is often more damaging than the fine.

A breach caused by an untrained staff member does not exempt the organisation from liability. Documented, structured training is the defence — on paper, not in intent.

§ 03 / How we answer each clause

DOPA 2019 obligation ↔ TAF deliverable.

Every major training-relevant obligation in the Act and the 2021 Regulations maps to a specific programme component. This is the table you share with your Data Protection Officer or external auditor.

DOPA 2019 provision
What it requires
What TAF delivers
Section 20(2)(a)
Identify reasonably foreseeable internal and external risks to personal data under the organisation's control.
Baseline Human Risk Report (Month 1) — covert phishing simulation establishes per-department click, reporting, and credential-submission rates. Quarterly risk-score recalculation tracks trajectory.
Section 20(2)(b)
Establish and maintain appropriate safeguards against identified risks.
12-month structured programme — 60+ interactive modules, 4 AI phishing simulations per year, 1 annual voice phishing drill, role-based learning paths for clinical, finance, and IT staff.
Regulations 2021 — Staff training
Implement and document a training programme for employees on data protection principles and obligations.
Auditable training record per employee — enrolment, completion, quiz scores (70% pass threshold), and reinforcement assignments for underperformers. All timestamped, all exportable.
Section 3 — Principles
Staff must understand and apply the seven data protection principles: lawfulness, purpose limitation, data minimisation, accuracy, storage limitation, integrity & confidentiality, accountability.
Principles-focused module track — dedicated content on each principle with scenario-based assessments. Additional coverage for customer-facing staff on lawful bases for processing.
Data subject rights (§ 24–28)
Staff handling data subject requests must be able to recognise, route, and fulfil rights of access, correction, objection, and erasure within prescribed timelines.
DSR workflow module for reception, HR, customer service, and IT staff — including the 30-day response clock under Section 24, and exception handling.
Breach notification (§ 22)
Notify the PDPO and affected data subjects where a breach results in unauthorised access or acquisition of personal data.
Breach-recognition training + 3-hour ransomware tabletop exercise for IT and senior management — tests detection, escalation, containment, and notification workflow end-to-end.
Cross-border transfers (§ 19)
Staff involved in cross-border data flows must understand the adequacy standard and consent requirements for extra-territorial processing.
Advanced track for IT and legal staff — covers Section 19 adequacy assessment, cloud-vendor due diligence, and consent mechanism design.
§ 04 / Audit evidence

Exactly what you hand the auditor.

At the end of the programme year, you have a structured, timestamped evidence pack. Not raw data dumps — narrative reports, signed certificates, and verifiable logs. The below is what sits in the evidence folder.

01

Per-employee training record

Name, department, modules enrolled, completion dates, assessment scores, reinforcement assignments. Exportable CSV and PDF.

02

Assessment pass records

70% pass threshold enforced per module. First-attempt and final scores, remediation attempts, time-to-pass by cohort.

03

Phishing simulation results

Per-campaign detail — delivered, viewed, replied, clicked, submitted credentials, reported. Department-level heatmaps and trajectory versus baseline.

04

Voice phishing drill report

Annual vishing test of reception, finance, and procurement. Script, call log, staff response, and per-recipient outcome — the drill auditors ask about but nobody runs.

05

Human risk trajectory

Baseline (Month 1) to Month 12 risk-score timeline, per employee and per department. 12-month forecasting curves showing programme impact.

06

Policy sign-off log

Digital acknowledgement records with timestamp, IP, and device — for data protection policies, acceptable use, and incident reporting procedures.

07

Workshop attendance records

Kick-off, role-based workshops, and tabletop exercise. Signed attendance sheets, session recordings (where consented), facilitator debriefs.

08

Annual Cyber Resilience Report

Board-ready narrative document. Before/after comparison, department analysis, DOPA 2019 compliance statement, and Year-2 recommendations.

09

Organisational Cyber Resilience Certificate

Signed certification for board minutes, insurance renewal, and PDPO audit response. Plus individual completion certificates for every employee.

§ 05 / Uganda-specific content

Scenarios your staff actually face.

Generic Western training content won't map to a Kampala reception desk. We author and maintain custom modules that reflect how Ugandan organisations actually get attacked — and how DOPA 2019 expects them to respond.

Local scenario 01

WhatsApp impersonation of a senior staff member

The most common East African social-engineering attack. A finance officer receives a WhatsApp message from what appears to be the MD's number, requesting urgent payment processing. Our module walks staff through the verification workflow required before acting — and what to log for DOPA breach assessment if it succeeds.

Local scenario 02

Patient data requests from callers claiming insurance authorisation

A hospital clerk answers the phone. The caller claims to be calling on behalf of an insurer and needs patient records faxed urgently. Our healthcare-sector module covers the data subject verification standard under Section 24 and the circumstances that justify disclosure.

Local scenario 03

Mobile money credential phishing

Staff receive SMS or WhatsApp messages purporting to be from MTN MoMo, Airtel Money, or a bank — requesting PIN confirmation, transaction approval, or account linking. Module covers recognition, reporting, and the personal-data implications where work phones are involved.

Local scenario 04

Operator pressure on licensing and regulatory staff

For gaming regulators, government agencies, and licensed operators — social engineering is often attempted through ostensibly routine industry contacts. The module builds on real cases of regulatory-capture attempts and maps the response to the PDPO breach framework.

Start the conversation

Let's talk DOPA 2019.

Request a proposal tailored to your organisation's sector, staff structure, and current compliance posture. We'll come back with a scoped plan for Year 1 — including baseline, content customisation, and evidence-pack targets — not a generic deck.