{"id":7963,"date":"2024-10-10T22:34:01","date_gmt":"2024-10-10T22:34:01","guid":{"rendered":"https:\/\/shehatalaw.com\/law-update\/addressing-data-breach\/"},"modified":"2026-01-20T19:46:21","modified_gmt":"2026-01-20T19:46:21","slug":"addressing-data-breach","status":"publish","type":"sp-law-updates","link":"https:\/\/shehatalaw.com\/ru\/law-update\/addressing-data-breach\/","title":{"rendered":"Data Privacy Laws in Egypt: Addressing Data Breach Incidents &amp; Beyond"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7963\" class=\"elementor elementor-7963 elementor-4436\" data-elementor-post-type=\"sp-law-updates\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5e2535e e-con-full e-flex e-con e-parent\" data-id=\"5e2535e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ab1dc1a elementor-widget elementor-widget-text-editor\" data-id=\"ab1dc1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In recent years, data privacy has become a critical concern for individuals and organizations worldwide. This is no different for Egypt \u2013 Recognizing the importance of protecting personal information in the digital age, significant steps have been taken to establish a comprehensive data privacy framework. With the increasing prevalence of electronic processing and cybersecurity threats, the need for robust data protection measures has never been more pressing. Recent data breach incidents in the country have further highlighted the urgency of addressing these issues effectively.<\/p><p>The Egyptian data privacy law introduces key provisions to safeguard sensitive personal data and regulate its lawful processing. This article explores the legal space surrounding data protection in Egypt, examining the roles and responsibilities of data controllers, data protection officers, and the data protection authority. It delves into the requirements for data breach notification, the implementation of data protection impact assessments, and the enforcement of privacy regulations. By understanding these crucial aspects, organizations can better navigate the complexities of data protection and mitigate the risks associated with data protection violations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7667a90 elementor-widget elementor-widget-heading\" data-id=\"7667a90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Overview of Egypt's Data Protection Law<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9be7d48 elementor-widget elementor-widget-text-editor\" data-id=\"9be7d48\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Egypt introduced the <a href=\"https:\/\/www.pwc.com\/m1\/en\/services\/consulting\/technology\/cyber-security\/navigating-data-privacy-regulations\/egypt-data-protection-law.html\" target=\"_blank\" rel=\"noopener\">Personal Data Protection Law No. 151 of 2020<\/a>, consisting of 49 articles divided into 14 chapters. This law aims to establish a comprehensive data privacy framework, <a href=\"https:\/\/www.pwc.com\/m1\/en\/services\/consulting\/technology\/cyber-security\/navigating-data-privacy-regulations\/egypt-data-protection-law.html\" target=\"_blank\" rel=\"noopener\">aligning with international standards, particularly the European GDPR<\/a>. It prohibits the processing of personal data without explicit consent and grants individuals rights such as restricting access, reversing consent, and being informed of data breaches. The law defines personal data as information related to an identified or identifiable natural person, while sensitive personal data includes health, financial, religious, and children&#8217;s data. Organizations processing personal information must appoint a Data Protection Officer and may need to obtain licenses for data processing.<\/p><p>Under the DPL, in principle, any digitally collected and\/or processed <a href=\"https:\/\/practiceguides.chambers.com\/practice-guides\/data-protection-privacy-2024\/egypt\" target=\"_blank\" rel=\"noopener\">data must meet the following conditions<\/a> (the \u201c<strong>General Conditions<\/strong>\u201d):<\/p><ul><li>personal Data shall be collected for specific legitimate purposes announced to the Data Subject. Collected data must be accurate, reliable, and securely maintained;<\/li><li>collected data must be processed in a legitimate manner and in compliance with the purposes for which it is collected;<\/li><li>collected data must not be kept for longer than the period necessary to fulfil the purpose specified for it.\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-01b9dfd elementor-widget elementor-widget-heading\" data-id=\"01b9dfd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Understanding key roles &amp; stakeholders<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-01a3253 elementor-widget elementor-widget-heading\" data-id=\"01a3253\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Data Controller:<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8dcb111 elementor-widget elementor-widget-text-editor\" data-id=\"8dcb111\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Any natural or juristic person who has &#8212; by the nature of his activities &#8212; the right to obtain personal data and to specify the method and criteria of retaining, processing, or controlling such data according to a specific purpose or to his activities.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b862566 elementor-widget elementor-widget-heading\" data-id=\"b862566\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Data Processor: <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-628dfaa elementor-widget elementor-widget-text-editor\" data-id=\"628dfaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Any natural or <a href=\"https:\/\/www.law.cornell.edu\/definitions\/uscode.php?&amp;def_id=15-USC-1086238248-1913738695\" target=\"_blank\" rel=\"noopener\">juristic person<\/a> who processes personal data for their own benefit or for the benefit of the data controller. They must adhere to the controller&#8217;s instructions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d7697c elementor-widget elementor-widget-heading\" data-id=\"3d7697c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Data Subjects:<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba9845c elementor-widget elementor-widget-text-editor\" data-id=\"ba9845c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Any natural person to whom electronically processed personal data is attributed which identifies them legally or factually and enables them to be distinguished from any other person, whose personal data is processed has rights, including access, correction, and deletion of their data.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29b2ff5 elementor-widget elementor-widget-heading\" data-id=\"29b2ff5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Regulatory Authority: <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23d8476 elementor-widget elementor-widget-text-editor\" data-id=\"23d8476\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Data Protection Center (<strong>DPC<\/strong>) oversees compliance, addresses complaints, and has enforcement powers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96bcef3 elementor-widget elementor-widget-heading\" data-id=\"96bcef3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Regulatory Authority and Enforcement<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa287a9 elementor-widget elementor-widget-text-editor\" data-id=\"fa287a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Data Protection Center (<strong>DPC<\/strong>) serves as the key regulator for data privacy in Egypt. This authority sets policies, issues licenses, and monitors compliance with the data protection law.<\/p><p>Significant penalties for violating the law can be imposed, including fines ranging from EGP 100,000 to EGP 5 million, depending on the nature of the offense.<\/p><p>In cases of unauthorized disclosure of sensitive data, offenders may face <a href=\"https:\/\/www.pwc.com\/m1\/en\/services\/consulting\/technology\/cyber-security\/navigating-data-privacy-regulations\/egypt-data-protection-law.html\" target=\"_blank\" rel=\"noopener\">imprisonment for a minimum of three months<\/a>. The law also holds directors and managers personally liable for regulatory breaches, emphasizing the importance of strict adherence to data protection measures. These enforcement mechanisms aim to ensure robust protection of personal data and promote compliance with privacy regulations.<\/p><p>In order to achieve its objectives, the <a href=\"https:\/\/practiceguides.chambers.com\/practice-guides\/data-protection-privacy-2024\/egypt\" target=\"_blank\" rel=\"noopener\">DPC may exercise all the competencies stipulated in the DPL<\/a>, including the following:<\/p><ul><li>setting and developing policies;<\/li><li>implementing decrees and procedures for the protection of personal data;<\/li><li>unifying data protection and processing policies;<\/li><li>co-ordinating with all government and non-government authorities to ensure the application of personal data measures;<\/li><li>issuing licences, approvals and various measures related to the protection of personal data;<\/li><li>receiving complaints related to the application of the DPL to issue the necessary decisions in this regard;<\/li><li>monitoring those addressed by the DPL and taking the necessary legal measures;<\/li><li>checking the conditions for cross-border data movement;<\/li><li>concluding agreements and memoranda of understanding, co-operating, and exchanging experiences with the relevant international bodies; and<\/li><li>preparing an annual report on the status of personal data protection in Egypt.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-656dc21 elementor-widget elementor-widget-heading\" data-id=\"656dc21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Data Breach Notification Requirements<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34f56b5 elementor-widget elementor-widget-text-editor\" data-id=\"34f56b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Egypt&#8217;s data privacy law has established strict requirements for reporting data breaches. Both data controllers and processors have an obligation to <a href=\"https:\/\/www.dataguidance.com\/notes\/egypt-data-protection-overview\" target=\"_blank\" rel=\"noopener\">notify the Data Protection Center (DPC) within 72 hours<\/a> of becoming aware of any breach or violation of personal data. In cases related to national security, immediate reporting is mandatory. The law also requires <a href=\"https:\/\/www.dataguidance.com\/notes\/egypt-data-protection-overview\" target=\"_blank\" rel=\"noopener\">notifying affected individuals within three working days<\/a> from the date of reporting to the DPC. This notification should include details about the incident&#8217;s cause, affected data, consequences, and remedial actions taken. Failure to comply with these requirements can result in significant administrative <a href=\"https:\/\/www.pwc.com\/m1\/en\/services\/consulting\/technology\/cyber-security\/navigating-data-privacy-regulations\/egypt-data-protection-law.html\" target=\"_blank\" rel=\"noopener\">fines of up to EGP 3 million<\/a> and potential criminal penalties, as per Article 38 of the law.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b0eb03 elementor-widget elementor-widget-heading\" data-id=\"4b0eb03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Digging deeper into specific type of sensitive data <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d357c0 elementor-widget elementor-widget-heading\" data-id=\"7d357c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Sensitive Data:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b18a9d0 elementor-widget elementor-widget-text-editor\" data-id=\"b18a9d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The DPL categorizes sensitive data, including psychological, biometric, financial, religious, political, and children&#8217;s data. Processing such data requires prior licensing from the DPC and the data subject&#8217;s consent. Violations can lead to severe penalties, including fines of up to EGP 5 million and imprisonment.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d1fb583 elementor-widget elementor-widget-heading\" data-id=\"d1fb583\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Financial Data:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-edd3c51 elementor-widget elementor-widget-text-editor\" data-id=\"edd3c51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Financial data is also classified as sensitive. The Banking Law No. 194 of 2020 and Fintech Law No. 5 of 2022 impose strict confidentiality obligations on financial institutions. Customer data must remain confidential and can only be disclosed with the customer\u2019s consent or through a court order. Digital payment service providers are required to implement robust security measures to protect customer data.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-850b977 elementor-widget elementor-widget-heading\" data-id=\"850b977\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Health Data:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-acf8f98 elementor-widget elementor-widget-text-editor\" data-id=\"acf8f98\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Health data is treated as sensitive under the DPL, and various laws protect its confidentiality, including the Penal Code and the Blood Operations Law No. 8 of 2021. Healthcare professionals face legal penalties for unauthorized disclosures. The Mental Health Law No 71 of 2009. ensures confidentiality for mental health patients, while regulations for persons with disabilities mandate the protection of their data.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5df4e4e elementor-widget elementor-widget-heading\" data-id=\"5df4e4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Exploring other relevant laws <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d168c44 elementor-widget elementor-widget-heading\" data-id=\"d168c44\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. E-signature Law (Law No. 15 of 2004):<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-385234a elementor-widget elementor-widget-text-editor\" data-id=\"385234a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This law ensures the confidentiality of data related to electronic signatures and mandates that such data may only be disclosed or used for the purposes for which it was submitted. Key provisions include:<\/p><ul><li><strong>Confidentiality Requirements:<\/strong> E-signature service providers must implement robust systems to protect customer data. This includes safeguarding electronic mediums and ensuring that data is not used beyond its intended purpose.<\/li><li><strong>Licensing Requirements: <\/strong>Providers must comply with specific licensing criteria, which include having adequate security measures in place to protect confidential information.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c64262a elementor-widget elementor-widget-heading\" data-id=\"c64262a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Consumer Protection Law (Law No. 181 of 2018):<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-542e455 elementor-widget elementor-widget-text-editor\" data-id=\"542e455\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This law emphasizes the protection of consumer data and privacy. Key aspects include:<\/p><ul><li><strong>Data Preservation Obligations:<\/strong> Suppliers must preserve customer data and information and cannot disclose or share it without explicit consent. This applies to any information gathered during contract formation.<\/li><li><strong>Privacy Measures:<\/strong> Suppliers are required to implement necessary measures to ensure the confidentiality and security of consumer data. This includes adopting technical and organizational measures to prevent unauthorized access or breaches.<\/li><li><strong>Breach Notification: <\/strong>The law holds suppliers accountable for any breaches of consumer data, mandating that they take corrective actions and notify affected consumers as required.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0bffc53 elementor-widget elementor-widget-heading\" data-id=\"0bffc53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Telecommunications Law (Law No. 10 of 2003):<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a59f73f elementor-widget elementor-widget-text-editor\" data-id=\"a59f73f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The telecommunications sector is governed by specific guidelines to ensure user data protection. Key provisions include:<\/p><ul><li><strong>Confidentiality Obligations:<\/strong> Licensed telecommunications service providers and their staff are required to protect the confidentiality of user data. This includes preventing unauthorized disclosures of telecommunications data and ensuring that conversations are not recorded or intercepted without legal authorization.<\/li><li><strong>Internal Security Procedures:<\/strong> Providers must establish internal protocols to secure telecommunications systems against breaches, cyber-attacks, and unauthorized access. This encompasses measures to safeguard both user data and the integrity of communications over their networks.<\/li><li><strong>Regulatory Oversight: <\/strong>The National Telecommunications Regulatory Authority (NTRA) enforces compliance with these guidelines, ensuring that service providers adhere to the required standards for protecting user privacy.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61ad8f9 elementor-widget elementor-widget-heading\" data-id=\"61ad8f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Frequently Asked Questions <\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50d0472 elementor-widget elementor-widget-heading\" data-id=\"50d0472\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Who oversees data protection regulations in Egypt?<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ca6e8d elementor-widget elementor-widget-text-editor\" data-id=\"5ca6e8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In Egypt, the DPC, established under Article 19 of the DPL, acts as the data protection regulator. This Center is a public economic authority with its own legal identity and operates under the supervision of the Minister of Communications and Information Technology. The DPC has not been established to date.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d71a2c elementor-widget elementor-widget-heading\" data-id=\"6d71a2c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Can you explain the right to privacy according to the Egyptian Constitution?<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad64af3 elementor-widget elementor-widget-text-editor\" data-id=\"ad64af3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Egyptian Constitution, ratified via referendum in January 2014, explicitly guarantees the right to privacy. Article 57 of the Constitution declares that private life is inviolable, protected, and must not be infringed upon.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e810785 elementor-widget elementor-widget-heading\" data-id=\"e810785\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">What constitutes a breach of the Data Protection Act?<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bc9e8f elementor-widget elementor-widget-text-editor\" data-id=\"3bc9e8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A breach of the DPL is defined any unauthorized or illegal access to Personal Data, or any other illegitimate operation to reproduce, transmit, distribute, exchange, transfer, or circulate which aims to expose or disclose such Personal Data, or damage or edit it while it is being stored, transferred or processed.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"featured_media":7964,"template":"","class_list":["post-7963","sp-law-updates","type-sp-law-updates","status-publish","has-post-thumbnail","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/shehatalaw.com\/ru\/wp-json\/wp\/v2\/sp-law-updates\/7963","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shehatalaw.com\/ru\/wp-json\/wp\/v2\/sp-law-updates"}],"about":[{"href":"https:\/\/shehatalaw.com\/ru\/wp-json\/wp\/v2\/types\/sp-law-updates"}],"version-history":[{"count":0,"href":"https:\/\/shehatalaw.com\/ru\/wp-json\/wp\/v2\/sp-law-updates\/7963\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shehatalaw.com\/ru\/wp-json\/wp\/v2\/media\/7964"}],"wp:attachment":[{"href":"https:\/\/shehatalaw.com\/ru\/wp-json\/wp\/v2\/media?parent=7963"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}