Category Archives: Technology

The disregard for Data Privacy in Uganda


In the late 90s, as a Systems Administrator for Starcom, one of the pioneer Internet Service Providers in Uganda, I had the privilege of managing the Email server and in the process got to know which email accounts were used by StateHouse as well as the Kabaka of Buganda. Out of pure professional ethics, not even once did I snoop to find out what kind of communication they were undertaking. As the overall administrator of the server, I had unlimited privileges that I could have chosen to abuse at will or in exchange for a few pieces of silver. That was then.

Close to eight years ago, I got to learn about this couple. They were so much in love with one another until the entry of the other girl turned things around. Rita couldn’t stomach it any longer and quit the relationship. Meanwhile, her boyfriend had other ideas. After failing to convince her to reverse her decision, he turned to stalking her. Philip had friends who worked for the Telecom company that his ex girlfriend was subscribed to. With their help, he tracked down her phone interactions in a manner that eventually proved disastrous to her new relationship. To-date, these scenarios are still common with telecom employees willfully playing the role of Judas. I have been told that for as little as UGX 50,000/= one can get phone records for any person of interest without needing a Police or Court order.

When it comes to the banks, someone I will call Mark has had banking records involving his credit cards and other transactions given to his wife without his approval. How she accesses the information is still a mystery to him. The bank in question is a leading international bank whose professionalism you would ordinarily not put to question. He is now scared because if his wife can easily get such information, then what happens in the event that someone who has ill motives makes a move for the same?

The case of Bank connivance in the death of an Eritrean Businessman in Uganda is very telling. The Inspector General of Police came out decrying the presence of a Mafia Network in the banking system. Airtel was recently too accused of abetting number plate theft. These are matters not to be taken lightly.

There has been a fresh demand by the Uganda Communications Commission to ensure that sim card registration is adhered to. In a recent press release, the to-do list had among others a requirement that, database reconciliation/verification to be done by operators in liaison with NIRA (National Identification and Registration Authority). This has caused a lot of concern. The depth of information that NIRA has about individuals is so much and if shared carelessly with other providers whose lackluster approach to confidentiality is well known, the threat on individuals is likely to be made worse. Whereas thugs have always had only phone records to contend with, now they are likely to have residential information, next of kin thereby making it easier for them to plan kidnaps for ransom.

I have a bone to pick with UCC for the haphazard manner in which some interventions are undertaken. After huffing and puffing about sim registration and fines to Telcos that do not comply, many of us were under the impression that this matter had been settled as far back as 2015. It is a shame (a very big one) to realise that it had to take the death of a high profile individual for the same institution to bring this matter to a close. I cant shake my head enough to show my disappointment. However, that is a story for another day.

Now that private data is being aggregated with the potential for sharing it with providers in future, what should be done to ensure that we minimise its abuse?

  • Enact a Data Protection law

This is a law that prohibits the disclosure or misuse of information held on private individuals. The cases cited in this article can easily be pursued legally once the appropriate laws are in place. The Data Protection and Privacy Bill 2014 already has the desired provisions. These include;

Section 27 Unlawful obtaining and disclosure of personal data

(1) A person shall not knowingly or recklessly –

(a) obtain or disclose personal data of the information held or processed by a data controller; or

(b) procure the disclosure to another person of the information contained in personal data.

(2) A person who contravenes this section commits an offence and is liable on conviction to a fine not exceeding one hundred and twenty currency points  or imprisonment not exceeding five years or both.

Section 28 Sale of personal data

(1) A person shall not sell or offer for sale personal data of any person.

(2) A person who contravenes subsection (1) commits an offence and is liable on conviction to a fine not exceeding one hundred and twenty currency points or imprisonment not exceeding five years or both.

NB: Please note that One Currency Point is equivalent to UGX 20,000/=

  • Limit the amount of information shared with third parties

UCC should ensure that going forward, NIRA does not share all users’ information with the Telcos or any other third parties. This can be made possible through the use of software interfaces which limit the kind of access one can have to the National ID database. This is something within the means of NIRA to achieve in a short a time as one week.

Other than that, I look forward to the day when employees as well as companies whose staff are involved in illegal use of private consumer data are made accountable for their ill deeds. Many are suffering out there silently having been victims of this unprofessional conduct. Others have had to pay for it with their lives. We cannot afford to wait any longer.

James Wire is a Small Business and Technology Consultant based in Kampala, Uganda

Follow @wirejames on Twitter.

Email lunghabo [at] gmail [dot] com

Other articles of interest:

President Museveni, avoid Knee Jerk reactions on Installing Security Cameras


The death of Afande Felix Kaweesi (RIP) took us all by surprise and matters were worsened by the brutal and professionally executed hit. In the aftermath of this occurrence, President Yoweri Museveni was quoted by various media houses as having stated that installation of cameras along public roads should be done as soon as possible.

In the run up to the 20th Common Wealth Head of Governments’ Meeting (CHOGM) held in Kampala, Uganda in 2007, installation of security cameras was on the To Do list. One of the reasons given was that they would continue providing surveillance long after the event. Apart from seeing remnants of poles and housing units for cameras, that project died as fast as it was birthed. Money was spent procuring these cameras, installation was probably done but that is as far as things went.

Mr President, before you embark on another spending spree to procure new cameras, I have a humble appeal. Please do not follow the knee jerk reaction on this matter. Many of your people may be looking at this need merely as a procurement opportunity without internalising its overarching importance towards facilitating crime management in the city of Kampala.

As steps are taken towards implementing your directive, it is crucial that certain things are kept in mind. These include;

  • Needs Assessment and Budgeting – Apart from equipment costs, time and labour required can also be intensive. Product quality is also key as opting for low cost products without considering their abilities could lead to challenges like low quality images hence creating challenges during evidence collection, poor visibility at night or during the rain among others.

  • Planning for Infrastructure, Maintenance and other recurrent costs – In Uganda, we have a tendency to believe that initial costs are all that matters when acquiring technology. Plan ahead for costs of maintaining infrastructure eg Wireless connections to the data centre may require servicing, obstructions could occur near the cameras and have to be removed, cameras may have to be replaced and even outright vandalism of some cameras could occur. In cases of non networked cameras, there might be a need for a team of people to physically collect data from them periodically among other activities. This is where probably the CHOGM camera project went wrong.

  • Technology Integration – Our security forces already have different technologies in use. The Police for example has license plate recognition software which is used a lot to get ticket defaulters. The camera system installed should be able to integrate this and other technologies including facial recognition, gunshot detection, incident mapping, video analytic among others. That way, we shall avoid having silos of technologies that are not interoperable, a waste of tax payers money.

  • Policy Development – There needs to be policies in place to manage this surveillance. It is crucial to achieve a balance between protecting citizens’ privacy rights and enabling law enforcement officers utilise the technology in an effective manner.

  • Active Monitoring Vs Passive Monitoring – Active monitoring is real time monitoring where locations are observed continuously while passive is the opposite. The former approach is a lot more resource intensive but allows the security agencies achieve much more especially when it comes to preventing crime. However, does Uganda’s force have the capacity to actively monitor a widespread camera system covering the entire Kampala city? Maybe a mix of Active and Passive would work best. Certain areas considered hot spots could be monitored actively while for those that are less dangerous, a passive approach can be undertaken. This decision will also inform on the type of technology to be deployed where.

  • Integrating Camera systems with current practices – There are procedures and practices that the security systems are utilising to monitor and manage crime. These do not have to work in isolation with the Camera systems. Could there be a need to mount cameras on all Police Patrol cars for example? In danger spots, can patrol teams be deployed in areas where the camera coverage is poor or where they expect criminals to seek refuge from the cameras?

  • Cameras are not a replacement to normal security duties – It is important to ensure that there is no sloppiness that develops on the part of the security officials as a result of camera installations. The old school physical engagements of investigating, tracking and preventing crime still apply. These cameras should be viewed as the icing on the cake. Footage can be used to corroborate information, identify culprits and witnesses to be interviewed among others.

Any eventual decision on the kind of Cameras to use should not restrict itself to a particular model of cameras but instead opt for a variety of camera models with different abilities. There will however be a need to get assurances from the vendors about their interoperability with other vendors’ equipment.

Technologies that need to be integrated in the procured system should include among others;

Gunshot Detection Systems: They work by utilising a system of sound sensors installed all over the target area. By scanning sounds in the area, these sensors are able to decode whether it is from a gun or not and through a triangulation approach offer an approximate location where the shot was fired from. Integrate this with crime mapping software and you will easily know theneighborhood in question.

License Plate Recognition: This scans number plates of cars and can verify with any database to determine whether the car in question has uncleared tickets, has been reported stolen or any other issue as brought to the attention of the authorities.

Facial Recognition: Advances in technology now allow computer software to be able to match faces when compared with database entries. By integrating this software with the cameras, one should be able to quickly track offenders especially the repeat offenders.

There is a lot more to share on this but it is my hope that this time round, the Government of Uganda manages this project the right way in order to achieve its intended goals without financially haemorrhaging the public coffers.

For God and My Country !!!!

James Wire is a Small Business and Technology Consultant based in Kampala, Uganda

Follow @wirejames on Twitter

Other Articles of interest:

Additional material from Using Public Surveillance Systems for Crime Control and Prevention by Nancy G LaVigne, Samantha S Lowry and others.