Beware of PoPI non-compliance

1 October 2017 Security Services & Risk Management, Integrated Solutions

The Protection of Personal Information Act (No. 4 of 2013) (or PoPI Act) is soon to be promulgated in South Africa. Jenny Reid of iFacts recently discussed the matter with Kevin McCallum of Tuckers Incorporated, who specialises in corporate legal matters.

McCallum says that the PoPI Act, although already an Act of Parliament, has not yet come in to full effect. It will only take effect once the President of South Africa signs a proclamation declaring the Act to actually be in effect. By all accounts, compliance with the Act will then be enforced 12 months after its proclamation. It is, however, worthwhile preparing for its inception right now.

Being caught short for non-compliance could have disastrous consequences, given the onerous requirements placed on the collector of personal information and the huge penalties expected to be imposed for the breach of, or non-compliance with, the Act.

A number of companies and institutions have already begun moving towards full compliance with the Act, in anticipation of it coming into effect. This is partly because compliance requires a serious shift away from the haphazard or random collection of personal information. The Act also limits the use of personal information, as this information now cannot be used for just any purpose the collector desires. This includes adequate protection of information so that it cannot be used and shared by unauthorised parties. The Act has its origins in Section 14 of the Constitution of the Republic of South Africa (Act No. 108 of 1996), which governs our rights to privacy.

The collection of personal information in respect of a person (impersonally called a ‘data subject’ in the Act) will require the consent of that particular data subject. The data subject must know and understand the precise purpose for the collection of any information, how it will be utilised, how the information is to be protected against distribution or theft by unauthorised parties, how long it will be retained, and how it will be destroyed when it is no longer required (Section 13 of the Act).

Unlawful retention, distribution, sharing or unauthorised use of personal information may result in non-compliance with the Act, which will carry onerous penalties of up to R10 million in fines, and could even result in jail sentences (in some instances of up to 10 years, depending on the seriousness of the breach or non-compliance).

Section 14 of the Act governs the length of time for which personal information is to be securely retained. Generally the information should only be retained, in a secure manner, for as long as is required to achieve the purpose for which it was collected. Subsequent to this, it should be destroyed to prevent it becoming available to unauthorised users.

As an example, an employee also has the right to challenge the correctness of the information collected, so information should be retained long enough to afford that opportunity.

The PoPI Act in its entirety is more complex than can be dealt with here and contains numerous provisions under which various categories of personal information can and/or must be retained, shared or destroyed. In addition, there are various exceptions to those provisions. Various other statutes and laws may govern the period for which various types of information must be retained and those statutes would have to be read in conjunction with the PoPI Act.

Individuals, companies and other entities who are involved in the collection of personal information are urged to read and familiarise themselves with the PoPI Act. It is advisable to take legal advice to ensure strict compliance before, even inadvertently, falling foul of its provisions and suffering the potentially huge penalties for breach of its provisions.

Ignorance of the law may not be sufficient to save you from the Act when it comes into operation.

For more information contact iFacts, +27 (0)11 609 5124, jenny@ifacts.co.za, www.ifacts.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Security Services & Risk Management
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...