Please give us a few moments whilst we get your account ready.
Following a three-month delay due to coronavirus – and more than seven years after its enactment – the Protection of Personal Information (POPI) Act has finally come into force.
The aim of POPIA is to ensure that those who collect and manage personal information are obliged to protect it from misuse and exploitation, as well as to respect the rights of information owners.
CEOs and organisations in South Africa who flout the regulations run the risk of fines and/or imprisonment.
The Government has given businesses until July 1 2021 to conform to the legislation, but the clock has started ticking and the time for IT departments to act is now.
Up until now businesses have regarded compliance as preferable, but not necessarily essential. This is no longer the case.
Although the POPI act continues to be put into operation incrementally, the latest legislation provides more bite to protect consumers.
Public and private bodies are obliged to use the one-year grace period to take all relevant steps – or risk the imposition of sanctions and reputational harm if they are found to be non-compliant.
Many global organisations, mindful of their obligations under the EU’s General Data Protection Regulation, will already have implemented at least some of their requirements under POPIA.
However, others will need to review and refine policies set up to ensure data protection compliance.
Start by conducting an assessment of data processing activities to establish the level of POPIA compliance and identify any gaps.
Scrutinise the flow of personal information, both within your organisation and with third parties, focusing on measures to prevent unauthorised access to personal information.
This should include staff training, updates on policies and procedures and a full review of all customer, supplier and third–party agreements, relating to data privacy.
Establishing a data breach/incident response plan and policy cannot be overlooked – neither can the management of subject access requests, which are likely to increase in number.
The POPI act gives individuals more power to access any details held on them, and complying with subject access requests can put considerable strain on already stretched IT resources.
The POPI act will hold companies to account when collecting, processing, storing and sharing personal information.
Penalties for non-compliance include fines of up to R10 million and a jail sentence of up to 10 years.
LogBox, a South African medical data startup, announced within a week of POPI taking effect that a report would be filed with the new Information Regulator after the company’s database containing access keys for thousands of patient records was briefly exposed to potential hackers.
To mitigate against the risk of unauthorised access, deploy a solution that encrypts all data before it leaves its primary location.
By ensuring you choose the encryption key, you can be certain that not even the backup provider is able to read the data.
Using TLS ciphers during cloud and offsite backup communication enhances security further.
When deciding how best to protect your data, also consider whether your provider goes that extra mile, offering search and insight to assist with subject access requests.
Organisations will be able to save a lot of time and money if they have the capability to:
Many South African businesses admit they do not even have record management in place. This leaves their CEOs accountable for non–compliance after POPIA’s one-year grace period. There is no time to lose.
Redstor, a cloud-first data management SaaS company with headquarters in the UK, has extensive experience of helping organisations address the challenges of GDPR.
With a unique technology developed in South Africa, Redstor is perfectly placed to provide solutions for the challenges businesses now face with POPIA.
The recent ransomware attack on Kaseya, a cloud-based IT and security management provider services company that supplies tech-management tools to customers worldwide, has the potential to be the most serious cyber-criminal incident this year.Continue reading