skip to main content
10.1145/2987491.2987506acmotherconferencesArticle/Chapter ViewAbstractPublication PageshtConference Proceedingsconference-collections
research-article

Understanding the Level of Compliance by South African Institutions to the Protection of Personal Information (POPI) Act

Authors Info & Claims
Published:26 September 2016Publication History

ABSTRACT

Privacy entails controlling the use and access to place, location and personal information. In South Africa, the first privacy legislation in the form of the Protection of Personal Information (POPI) Act was signed into law on 26 November 2013. The POPI Act promotes the protection of personal information by South African public and private institutions and specifies the minimum requirements in twelve chapters, which includes eight conditions for lawful processing of personal information. In 2012, CIBECS as part of their State of Business Data Protection in South Africa survey assessed, amongst other aspects, how prepared South African institutions were to comply with the then forthcoming protection of personal information legislation. Since that survey, the POPI Bill progressed to an Act and, more recently, in 2015 processes commenced to appoint the Information Regulator (in terms of the legislation), who would be responsible for enforcing the POPI Act. Due to the aforementioned developments and looming enforcement date associated with the POPI Act, this paper assesses the level of understanding of the POPI Act by participants from South African institutions as well as the current level of compliance to the POPI Act. Specifically, the current level of compliance to Condition Seven of the POPI Act, relating to the confidentiality and integrity of electronic personal information, is explored. Furthermore, a view is provided of the financial value associated with electronic personal information maintained as well as the potential impact a data breach of electronic personal information may have on an institution.

References

  1. Kuneva, M. (2009), "Keynote Speech - Roundtable on Online Data Collection, Targeting and Profiling", p.2, http://europa.eu/rapid/press-release_SPEECH-09-156_en.pdf, (Accessed, 6 May 2016).Google ScholarGoogle Scholar
  2. Ali, A., Eggers, W.D., Hamill, R. and Hersey, J. (2013), "Data as the New Currency - Government's Role in Facilitating the Exchange", Deloitte Review, Issue 13, p.19.Google ScholarGoogle Scholar
  3. World Economic Forum (WEF). (2014), "Global Risks 2014", Insight Report, 9th Edition, pp. 12-13, http://www3.weforum.org/docs/WEF_GlobalRisks_Report_2014.pdf, (Accessed 7 May 2016).Google ScholarGoogle Scholar
  4. Saunders, K.M. and Zucker, B. (1999), "Counteracting Identity Fraud in the Information Age: The Identity Theft and Assumption Deterrence Act", International Review of Law, Computers & Technology, Vol.13, No.2, p.183.Google ScholarGoogle ScholarCross RefCross Ref
  5. Moore, A.D. (2008), "Defining Privacy", Journal of Social Philosophy, Vol.39, No.3, p.425.Google ScholarGoogle ScholarCross RefCross Ref
  6. Hoar, S.B. (2001), "Identity Theft: The Crime of the New Millennium", Oregon Law Review, Vol.80, No.4, p.1423.Google ScholarGoogle Scholar
  7. Information Systems Audit and Control Association (ISACA). (2014), "Risk to Entities Regarding Data Breaches - Lessons from a Brief Case Study", Information Systems Audit and Control Association (ISACA) Journal, Vol.2, p.14.Google ScholarGoogle Scholar
  8. Titus. (2011), "Protecting Personally Identifiable Information (PII) with Classification and Content Inspection", Titus White Paper, p.5.Google ScholarGoogle Scholar
  9. Stein, P. (2012), "South Africa's EU-style Data Protection Law", Without Prejudice, Vol.12, Issue 10, pp. 48--49.Google ScholarGoogle Scholar
  10. Republic of South Africa. (2009), "Protection of Personal Information (POPI) Bill", Cape Town and Pretoria: Government Printer, pp. 1--50.Google ScholarGoogle Scholar
  11. Republic of South Africa. (2013), "Protection of Personal Information (POPI) Act (Act 4 of 2013)", Cape Town: Government Printer, No.37067, pp. 2--146.Google ScholarGoogle Scholar
  12. CIBECS. (2012), "State of Business Data Protection in South Africa", http://offers.cibecs.com/state-of-business-data-protection-in-sa, (Accessed, 6 May 2016).Google ScholarGoogle Scholar
  13. Parliament of the Republic of South Africa. (2015), "Announcements, Tablings and Committee Reports", Cape Town: Government Printer, No. 70-2015, p.2205.Google ScholarGoogle Scholar
  14. Michalsons. (2014), "Protection of Personal Information Act - POPI", http://www.michalsons.co.za/protection-of-personal-information-act-popi/11105, (Accessed, 6 May 2016).Google ScholarGoogle Scholar
  15. Kothari, C.R. (2004), "Research Methodology: Methods and Techniques", New Age International, p. 5.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    SAICSIT '16: Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists
    September 2016
    422 pages

    Copyright © 2016 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 26 September 2016

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate187of439submissions,43%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader