How personal data started costing real money and why Kenyan firms did not see it coming

What looked like routine data handling inside offices ended up feeling very different once complaints were upheld


For years, personal data in Kenya drifted through corporate systems with little friction. Phone numbers passed between sales desks. Photos lifted from events and reused online. CVs forwarded without much thought about ownership. In 2025, that casual handling began to cost real money.

The Office of the Data Protection Commissioner did not change the law. It changed posture. Complaints that once ended in warnings now carried financial awards. By year’s end, more than Sh30 million had been paid out to individuals whose rights had been violated. The cases came from different sectors, but the patterns were familiar. Data collected without clear permission. Requests to stop or delete ignored. Defences built on denial rather than records.

What stands out is not one headline figure. It is how ordinary, almost routine, corporate behaviour ended up before a regulator with teeth.

Marketing calls that would not stop ringing

Lenders feature heavily in the rulings, and for predictable reasons. Sales culture prizes volume and speed. Consent paperwork lags behind.

In one of the costliest cases, Philip Bolo asked a lender to stop calling and texting him with loan promotions. He wrote emails. He made calls. The messages kept coming, sometimes from different agents. The firm argued that unknown actors were behind the calls, including former staff. That claim weakened when an apology arrived from within the same organisation. The regulator concluded that consent had never been demonstrated. The award came close to a million shillings.

Another complaint against the same lender revealed something else. A sales agent referenced specific details about a recipient’s vehicle during an unsolicited call. That level of familiarity raised obvious questions about internal data sharing. The investigation found illegal processing for commercial gain.

Taken together, these cases suggest a deeper problem than rogue callers. Many firms still treat customer data as a shared pool, loosely governed, lightly audited, and difficult to trace once it leaves the original point of collection.

Weddings, school trips, and the afterlife of images

If marketing calls exposed weak consent practices, image use exposed something more cultural. A belief that presence equals permission.

A hotel used wedding photos and video to promote itself online. The couple objected. Deletion requests were ignored. The ruling faulted both the lack of consent and the refusal to act once concerns were raised. Compensation followed.

A school went further, placing a minor’s image on a billboard after photos were taken during a fun day. The child was not even a student. Parents had never been consulted. The regulator treated that absence of parental consent seriously.

Public figures were not spared. An elite athlete discovered his image used on a marketing agency’s website after talks over a project collapsed. The agency blamed an internal error and removed the content, but the use had already occurred. An apology reduced the award. It did not erase liability.

These disputes reveal how digital memory works against institutions. Content uploaded for a moment tends to linger, copied across platforms, cached, shared. Consent that was never documented becomes impossible to reconstruct later.

The right to be forgotten meets broken inboxes

Several rulings turned on deletion requests. Former employees kept receiving promotions. Individuals who had disengaged from companies found their details circulating long after the relationship ended.

In one case, a media and internet firm argued that it had never received a formal request to erase data. The complainant produced an email. It bounced. The address listed on the company’s website did not work. The regulator placed responsibility where it belonged, on the firm that published a dead contact point and failed to maintain a functioning channel for rights requests.

Deletion sounds simple in theory. In practice, it collides with fragmented systems, legacy databases, and poor internal coordination. The awards suggest that technical complexity will not excuse inaction.

Debt collection and collateral damage

One of the more unsettling complaints came from a woman repeatedly contacted over a loan she had never taken. Calls and texts pressed her to chase a colleague for repayment. She had not agreed to be a guarantor. She had not shared her details. The lender did not respond to the complaint.

Here, the data breach was personal and social. Contact details became leverage. The ruling underscored that privacy violations do not require hacks or leaks. They can arise from everyday business processes that spill onto the wrong person.

CVs, tenders, and professional identity

The most brazen misuse involved academic documents. A university lecturer discovered his CV and certificates attached to a tender submission by a private firm. The documents had been obtained through earlier professional contact, then repurposed without consent. No defence was filed. Compensation followed, well below what was sought, but enough to underline ownership of professional identity.

This case hints at a wider vulnerability. In sectors where credentials circulate freely, boundaries between reference, collaboration, and appropriation remain poorly defined.

What the payouts reveal about enforcement

The numbers alone tell only part of the story. Awards varied widely, reflecting context, response, and harm. Apologies reduced exposure. Silence increased it. Failure to keep records proved costly.

A more subtle development sits beneath the figures. The regulator’s reasoning shows increasing confidence. Decisions cite obligations with clarity. Excuses rooted in internal confusion carry little weight. Firms are expected to know where data sits, who accesses it, and how consent was obtained.

There is also a social undercurrent. Many complainants pursued cases after months of frustration. The payouts validated that persistence. As awareness spreads, the volume of complaints is likely to grow, especially in marketing, lending, and recruitment.

A narrowing margin for carelessness

Corporate Kenya is entering a tighter phase of data governance. Not through dramatic legislative change, but through accumulation. Each ruling adds texture. Each payout recalibrates risk.

Some firms will respond with checklists and compliance memos. Others will discover that compliance lives in culture, not policy documents. Sales targets, event marketing, HR shortcuts, and vendor relationships all touch personal data.

The lesson from 2025 is blunt in its own way. Data protection is no longer an abstract obligation handled at the edge of operations. It has moved into the ledger, itemised, priced, and increasingly difficult to ignore.

[Secure Your Seat at Africa Tech Summit Nairobi 2026 | February 11–12 here] Use code TTRENDS10 at checkout to save 10% on your pass and join the leaders building Africa’s $1 trillion cross-border payment future.

Go to TECHTRENDSKE.co.ke for more tech and business news from the African continent and across the world. 

Follow us on WhatsAppTelegramTwitter, and Facebook, or subscribe to our weekly newsletter to ensure you don’t miss out on any future updates. Send tips to editorial@techtrendsmedia.co.ke

TechTrends Media Podcasts

The TechTrends Podcast

The GreenShift Podcast

Facebook Comments

By George Kamau

I brunch on consumer tech. Send scoops to george@techtrendsmedia.co.ke

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button