NDPA Compliance for SMEs: A 90‑Day Action Plan
A practical, bite‑sized programme to align a Nigerian business with the Nigeria Data Protection Act (NDPA). This is an operations‑first playbook—templates, quick wins and clear deliverables for 0–30, 31–60 and 61–90 days.
The principles (plain English)
- Lawful, fair, transparent: tell people what you’ll do with their data, and have a legal basis.
- Purpose & minimisation: collect only what you need for specified purposes.
- Accuracy & retention: keep data accurate and only as long as necessary.
- Security: protect against loss, unauthorised access or disclosure.
- Rights: enable access, correction, deletion, objection and portability where applicable.
- Accountability: document what you do (records, policies, logs, contracts).
This guide is NDPA‑inspired and keeps language generic—always confirm current regulator guidance before final implementation.
Day 0 set‑up: team & scope
Assemble your privacy squad
- Appoint an internal lead (or DPO function where appropriate).
- Identify process owners in HR, Sales/Marketing, Product/IT, Finance, Admin.
- Nominate an engineer/IT contact for security and data mapping.
Define scope
- Entities in/out of scope (Nigeria entity, affiliates).
- Systems/applications, websites, mobile apps, cloud storage.
- Third‑party processors (payroll, CRM, cloud, marketing, payment).
Kick‑off artefacts
- Project plan, RACI and simple risk register.
- Data inventory spreadsheet (collection points and systems).
- Records of Processing Activities (RoPA) template.
- Data Subject Request (DSR) log & SOP.
- Incident response playbook (draft).
Days 0–30: foundations & quick wins
- Map data flows: for HR, customer, vendor and product data. Identify controllers vs processors.
- Choose lawful bases: contract, legal obligation, legitimate interests, consent where needed.
- Draft external privacy notice: website/app notice + short notice for forms/checkout.
- Stand up RoPA: start with top 10 processes. Capture purpose, categories, recipients, retention, security.
- Quick security fixes: MFA on email & admin tools; revoke stale accounts; encrypt laptops; backups.
- Cookie & tracking review: switch off unneeded third‑party tags; prepare a consent banner if you rely on cookies for marketing/analytics.
- Vendor list & contracts: collect DPAs or add NDPA clauses; verify location & sub‑processors.
- DSR intake: create a working email (privacy@…) and a web form with ID verification steps.
If you’re a larger or high‑risk operator, consider designating a DPO function and registering/engaging with the regulator as required by current guidance.
Days 31–60: policies, vendors & controls
- Policies: approve Privacy Policy, Retention Schedule, Information Security Policy, Acceptable Use, BYOD, Access Control.
- DSR workflow: verify identity, assess scope, search systems, respond within internal SLA; keep a response log.
- Contracts: roll out NDPA‑compliant DPAs to processors (processing instructions, confidentiality, security, sub‑processor approval, return/delete on exit).
- Cross‑border transfers: identify transfers; apply approved mechanisms/safeguards; document transfer risk assessment.
- Retention & deletion: implement auto‑deletion in systems where possible; add manual review cadence.
- Access control & logging: least privilege, quarterly access reviews, admin logs, vendor access management.
Days 61–90: DPIAs, training & drills
- DPIA: run privacy impact assessments for high‑risk processing (e.g., large‑scale profiling, sensitive data, CCTV/biometrics).
- Training: 30‑minute annual privacy & security basics for all staff; role‑based training for HR/Support/Engineering.
- Incident response: define what is a breach; create a triage matrix; tabletop exercise with leadership; have regulator & data subject notification templates ready per current rules.
- Website & app: publish privacy notice, cookie notice; enable consent banner if used; add “manage my data” link.
- Board sign‑off: present compliance status, risk register, and 12‑month roadmap.
Templates you can reuse
Records of Processing (RoPA) — sample columns
Data Subject Request (DSR) tracker — sample columns
Vendor DPA — essential clauses
- Processing instructions & confidentiality
- Security measures & breach notification
- Sub‑processor approval & listing
- Assistance with DSRs & DPIAs
- Return/delete data on exit; audit rights
Retention schedule — example
| Record | Default retention | Rationale |
|---|---|---|
| Recruitment (unsuccessful) | 12 months | Future openings (unless opted‑out) |
| Employee HR file | 6 years after exit | Statutory limitation / references |
| Customer account | 5 years after last activity | Support / legal claims |
| Marketing contacts | Until consent withdrawn / 24 months inactivity | List hygiene |
FAQs
Do we need a DPO?
Designate a DPO function where appropriate for your risk profile and as required by current regulator guidance. Smaller low‑risk entities can assign the role to a trained staff member.
What about breach timelines?
Keep a process to assess and notify the regulator/individuals in line with the latest Nigeria Data Protection Commission (NDPC) requirements. Practically, structure your playbook so you can assess within hours—not days.
Are cookies covered?
Be transparent. If you rely on tracking for analytics/ads, provide notice and an easy way to consent/manage preferences.
Need help?
This guide is for general information only and does not constitute legal advice. We implement NDPA programmes end‑to‑end: data mapping, RoPA, policies, vendor DPAs, DPIAs, training and incident response.
Last updated: October 07, 2025
Manasseh Ehile & Co.