Legal protection for data?

1 November 2017 Security Services & Risk Management

The ‘masterdeeds’ data breach of over 30 million people’s personal records has been cited as South Africa’s worst-ever data breach. The sensitive information in question, including names, addresses, ID numbers, genders, ethnicities and email addresses of people both living and deceased, was extracted from one of South Africa’s top real estate companies, Jigsaw Holdings. In light of this catastrophic data leak, what guarantee do you have that your personal information ­– and that of your clients – is safe?

Ross Saunders, the director of global technology services at Cura Software Solutions, believes that the data should not have been where it was to begin with, and beyond that, the source website did not have best practices in place to keep any data safe. “Their first mistake was to store an extract of their database on a publicly accessible website. The fact that there were insufficient security measures in place and absolutely no data encryption was a recipe for disaster.”

According to Saunders, the solution is on its way in the form of the General Data Protection Legislation (GDPR) for Europe and the Protection of Personal Information Act (POPIA) for South Africa.

From a South African perspective, POPIA sets the conditions for when it is lawful for someone to process someone else’s personal information. The legislation, centred around integrity and confidentiality, is applied to any natural or juristic person who processes personal information, including large corporates and government.

Similarly, the GDPR is one of the most important changes in data privacy regulation in 20 years and aims to protect all EU citizens from data breaches in an increasingly data-driven world. The GDPR replaces the Data Protection Directive and will be enforced as of 25 May 2018. It could be reasonably expected that the GDPR will become the ‘gold standard’ for data privacy regulation globally.

Data protection laws set principles that controllers must comply with, which include the following:

Lawfulness, fairness and transparency

This means that the processing of information must be lawful and not excessive. Processing should be for a defined purpose, and there should be openness as to any processing activities. The principles and conditions of the law must be followed. In an essential step towards data transparency and consumer empowerment, the new legislation stipulates that the data subjects may obtain confirmation as to whether or not their personal data is being processed, where and for what purpose.

Purpose limitation

The processing of the information must be for a defined purpose and limited from further processing without consent thereafter.

Data minimisation

Only necessary data should be kept in order for processing to take place. Organisations should be cognisant of the fact that they should not be keeping excessive data that is unused for their purpose.

Accuracy

The data itself should be accurate, and should allow for data subject participation in making sure it is up to date.

Storage limitation

Once data processing has completed, the data should be removed. It should not be kept for longer than is necessary to perform the data processing activities.

Integrity and confidentiality

Data, wherever it may be stored, must be stored responsibly and with the correct safeguards in place to ensure its security. It is the obligation of the organisation to prevent loss, damage or unlawful access to the data via appropriate security measures. This information must be treated as confidential. In the instance of a security breach, both the regulator and the data subject should be notified of such. Data protection laws also create obligations for controllers, which include:

• Technological and organisational measures that must be implemented to lawfully process data,

• Controlling of processors through contracts,

• Keeping records of processing activities, and

• Co-operating with authorities, and securing personal data.

In conclusion, Saunders says, “Both the GDPR and POPIA are taking extensive measures to protect and empower all citizen’s data privacy and will substantially change the landscape of data breach risks for organisations globally. Along with our other compliance solutions, Cura offers a data privacy solution specifically geared for GDPR and POPIA readiness and management with the assistance of Michalsons attorneys.”





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Security Services & Risk Management
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Global Identity Fraud Report revealing eight-month ‘mega-attack’
Editor's Choice Security Services & Risk Management
AU10TIX recently released its Q4 Global Identity Fraud Report, with the research identifying two never-before-seen attack patterns, with the worst case involving 22 000+ AI-generated variations of a single U.S. passport.

Read more...
Linking of security officers by security businesses
PSiRA (Private Security Ind. Regulatory Authority) News & Events Security Services & Risk Management
[Sponsored] By law, all security businesses are required to declare their employees to PSiRA so that they can be accounted for administratively. Failure to link employees by security businesses is a contravention of the Code of Conduct and a criminal offence.

Read more...
AI augmentation in security software
Security Services & Risk Management AI & Data Analytics
The integration of AI technology into security software has been met with resistance. In this, the second of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...