Protecting privacy in the face of PoPI

October 2017 Information Security, Infrastructure, Security Services & Risk Management

ESET South Africa has launched ESET Privacy Protection Solutions. These are tools that an organisation can use to achieve digital security that is practical and feasible, and which will assist organisations with the Protection of Personal Information Act (PoPI) compliance.

Carey van Vlaanderen.
Carey van Vlaanderen.

“While no single product can offer complete PoPI compliance, having a quality set of information security products puts organisations in a significantly better position with respect to PoPI compliancy and keeping personal information safe,” says ESET South Africa CEO, Carey van Vlaanderen, “ESET Privacy Protection Solutions offer customers a product set with outstanding value that covers three key components – endpoint protection, two-factor authentication and data encryption.”

Information Security has always been a concern for businesses to protect information such as intellectual property, business strategy, product information or even customer information from competitors who might seek to exploit this information. PoPI introduces a broad legal requirement for all organisations to take appropriate measures to protect personal information across all industries and sectors of society.

PoPI is cause for concern for any organisation that handles personal information. PoPI mandates all organisations to implement appropriate measures to ensure that all personal information is protected. It is enforced by the Information Regulator and the consequences for non-compliance can be significant.

Organisations looking to understand PoPI, can visit https://encryption.eset.com/za/





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Deception technology crucial to unmasking data theft
Information Security Risk Management & Resilience
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Risk Management & Resilience Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...
Access & identity expectations for 2024
Technews Publishing IDEMIA ZKTeco Gallagher Salto Systems Africa Regal Distributors SA Reditron Editor's Choice Access Control & Identity Management Information Security AI & Data Analytics
What does 2024 have in store for the access and identity industry? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

Read more...
What you can expect from digital identity in 2024
Access Control & Identity Management Security Services & Risk Management
As biometric identity becomes a central tenet in secure access to finance, government, telecommunications, healthcare services and more, 2024 is expected to be a year where biometrics evolve and important regulatory conversations occur.

Read more...