Compliance is security

February 2012 Security Services & Risk Management

New regulations will force companies to do their governance homework.

The security industry has always been able to do what it wanted, or what budgets allowed it to do, in its effort to secure people and information. This state of affairs was acceptable in most instances, but there are always those certain few willing to take advantage of a situation for their own benefit.

In recent years, corporate governance has become a central issue in business and compliance has moved from an option to a necessity in the face of new regulations, and more that will still be formulated in the coming months and years. The protection of information is a core component of compliance, especially in a world where hackers seem to have no trouble breaking into databases and stealing sensitive information.

In the South African context, the protection of information is becoming more important as a component of the King III report, the Consumer Protection Act (CPA) and the proposed Protection of Personal Information Act (PoPI). Hi-Tech Security Solutions asked two companies that deal with these issues on a daily basis for their take on the implications for those responsible for governance, risk and compliance (GRC), focusing on the security field.

Will there be an impact?

When getting beyond the hype, it is probably wise to first ask how, or if new regulations such as PoPI and the CPA, as well as corporate governance standards like King III will affect the installation and maintenance of data and intellectual property (IP) security solutions.

Grant Hodgkinson, business development director at Mimecast South Africa, responds: “We are unlikely to see a mandatory implementation of specific processes to safeguard digital assets or IP. Instead, physical adherence to these frameworks will cover digital assets as well, and for this reason, companies will need to consider information security by implication. Even without these regulations, there is a growing groundswell of ‘better governance’ in the world, where companies realise the need to protect their private data and the data held on behalf of customers.

Grant Hodgkinson, business development director at Mimecast South Africa
Grant Hodgkinson, business development director at Mimecast South Africa

“In response to this, we are likely to see technology solutions being revised. King III places IT and the management of IT information squarely on the board agenda. As more companies embrace this framework, we are likely to see new solutions being considered. King III also pushes companies to either comply or explain non-compliance.”

Andrew Whittaker, senior consultant at Ubusha Technologies expands. “Personal information can be found being collected, stored and processed within almost all corporate business processes. The new draft South African legislation (PoPI) will mandate executives to ensure the right to privacy, and the security of this information, is protected. Ensuring that you know who has access to your customer’s personal information and regular verification of this access will be essential in meeting the requirements of the bill.

“The King commission, in its revised recommendations to business on good governance (King III) has stressed the importance of IT in today’s business world, and therefore the importance of effective IT governance being in place.”

Hodgkinson continues that it is unlikely that all companies will abandon the storage of personal identification information as in many cases it is essential to do multichannel business. “However, certain companies may decide that they no longer have the appetite to risk storage of such data and consider alternatives, but the broad-based abandonment of this is unlikely to take place.”

He goes on to say that when it comes to video surveillance footage in particular, these regulations will not necessarily have an impact, but it “depends on what the footage is of, and what the company decides to do with that footage. This is a question of risk and the company’s appetite for risk.”

Back to access control

While company leaders are concerned with what information they have and how to store it effectively and legally, another question to consider is what happens to that information inside the company. Data is stored for a reason, but failing to ensure only the right people can access and use it for appropriate reasons is another challenge. This brings us back to the old question of access and identity management.

Whittaker comments: “It is well understood that the management of identities in the corporate IT environment is essential to security. But what about managing the access assigned to these identities? Often auditors ask IT organisations the following questions:

* Who works for you?

* Who has access to your systems?

* Should these people have access?

* Do you have the processes to verify this access?

* Do you know how they got their access and who approved it?

“Not only is the ability to answer these questions important to an organisations ability to ensure good IT governance, but there is local and international legislation which may require it to control these risks.”

The CPA and PoPI above are only two local regulations in this regard, with the Sarbanes Oxley act of 2002 (SOX), which applies to US public company boards, management and public accounting firms is the most famous (or infamous) of the international regulations founded in reaction to a number of corporate and accounting scandals – such as those affecting Enron, Tyco International and WorldCom.

The solution for companies, both large and small, is to understand the law as it applies to them and ensure they comply. Not only is this a legal requirement, but more customers are becoming aware of the importance of their privacy and could react negatively to careless or reckless behaviour on the part of organisations. Every company therefore has a responsibility and duty to only store information it requires, as well as its own IP, ensuring that all reasonable effort has been made to ensure the safety and privacy of that information, and that it is only used by authorised employees for legitimate purposes.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SABRIC Annual Crime Statistics 2024
News & Events Security Services & Risk Management Residential Estate (Industry)
SABRIC has released its Annual Crime Statistics for 2024, reflecting a significant decline in financial crime losses, but also warning of the growing threat posed by artificial intelligence (AI) in fraud schemes.

Read more...
SA’s private security industry receives multi-million USD investment
News & Events Security Services & Risk Management
South Africa's private security sector has attracted significant international attention, with the world’s largest tactical flashlight manufacturer, Nextorch, announcing a major investment in its local operations, Nextorch Africa.

Read more...
Vetting people in security estates
iFacts Security Services & Risk Management Residential Estate (Industry)
In today’s security-conscious South Africa, estate management’s responsibility extends beyond gates and patrols; it involves ensuring that every resident, staff member, and service provider upholds the community’s safety standards.

Read more...
View from the trenches
Technews Publishing SMART Security Solutions Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
There are many great options available to estates for effectively managing their security and operations, but those in the trenches are often limited by body corporate/HOA budget restrictions and misunderstandings.

Read more...
IVA AI Pro Visual Gun Detection
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of the IVA AI Pro Visual Gun Detection analytics based on deep learning. It is designed for automatic detection and classification of people and brandished firearms.

Read more...
IP-based horn loudspeakers
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of its new IP-based horn loudspeakers and amplifier module: the high-output LHN-UC15L-SIP horn (for long-throw applications), the compact LHN-UC15W-SIP horn (for wide-angle coverage) and the AMN-P15-SIP amplifier module.

Read more...
SMART Estate Security Conference KZN 2025
Arteco Global Africa OneSpace Technologies SMART Security Solutions Technews Publishing Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
May 2025 saw the SMART Security Solutions team heading off to Durban for our annual Estate Security Conference, once again hosted at the Mount Edgecombe Country Club.

Read more...
ProtecLink 2025 spotlights industry tensions and transformation
Magtouch Electronics t/a Ithegi Electronics Security Services & Risk Management News & Events
ProtecLink 2025, created and hosted by Ithegi Electronics, brought together key stakeholders from the security, finance, and innovation sectors under the theme "Connecting Security, Finance, and Innovation: Inspiring Transformation in the Industry."

Read more...
SSG Holdings acquired by Fidelity Services Group
News & Events Security Services & Risk Management
Fidelity Services Group has successfully acquired a majority shareholding in SSG Holdings. The acquisition builds on Fidelity’s track record of strategic expansion, including previous high-profile acquisitions.

Read more...
The role of drones in farm protection
Agriculture (Industry) Security Services & Risk Management
Laurence Palmer reminds us of the role drones play in agricultural security and offers a free security risk assessment template for downloading (link at the end of the article).

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.