SlideShare uma empresa Scribd logo
1 de 83
Electronic Records ManagementJenna Cuming& Katherine ThompsonCL  Johannesburg© Chetty Law 2011 Guest Lecture Presented During Rabelani Dagada's Technology & Information Management's Class at the Wits Business School, 3 February 2011
Electronic Communications and Transactions ActElectronic Records ManagementElectronic Evidence & E-DiscoveryBoardroom ConversationsChecklists
Records Management ImperativeLegal Compliance (Mandate, Industry)Evidence – Proof of Existence of FactsOperational EfficiencyGovernance ImperativeKing IIIArchives ImperativeNational Archives PrescriptionsAccess to Justice and Access to Information Imperative PAJA & PAIA (PPI Bill)
Enter the ECT Act….. © Chetty Law 2011
Intention:To maximize the benefits of electronic transactions and internet usage by all South Africans.In effect:Electronic transactions have the same legal force as paper based transactions.  In Short © Chetty Law 2011
Information is not without legal force and effect merely on the grounds that it is wholly or partly in the form of a data message… or is merely referred to in such data message.  ECT : Section 11(1) & (2) © Chetty Law 2011
Means:Data generated, sent, received or stored by electronic means and includes  voice, where the voice is used in an automated transaction; and a stored record.  Definition of a Data Message © Chetty Law 2011
Includes:data (electronic information) in email, internet, intranet, sms, voice between persons and stored records Excludes: voice between natural person and an automated voice response system  Data Message © Chetty Law 2011
“Legal force and effect to information…referred to in a way that a reasonable person would have noticed the reference and accessible in a form in which it may be read, stored and retrieved by the other party, whether electronically or as a computer printout (able to be reduced to electronic form)”  Incorporation By Reference © Chetty Law 2011
Radicati Group Email Statistics Report 2010, the average corporate user sends and receives 110 e-mail messages daily. http://www.radicati.com/wp/wp-content/uploads/2010/04/Email-Statistics-Report-2010-2014-Executive-Summary2.pdf  Only e-mails… © Chetty Law 2011
All sources of records!
A record is defined in the ECT Act, as “recorded information regardless of form or medium” Can include e-mails, sms’s and instant message logs  What is a record?  © Chetty Law 2011
“if any other law requires the retention of documents or records, such documents and records may be retained in electronic format, subject to certain conditions”ECT sets out requirements for electronic records retention:information is accessible for subsequent reference- is in format generated, sent or received or format that accurately represents information- origin and destination of data message and date & time it was sent or received can be determined  Section 16 © Chetty Law 2011
ExceptionsAgreements:Alienation of LandLong term property lease Execution:Will or CodicilBill of Exchange © Chetty Law 2011
Electronic evidence must not be denied admissibility (a) on grounds that it is in electronic format or (b) if it is best evidence.Must be given due evidential weight.  Section 15 © Chetty Law 2011
To qualify as an original, Integrity must be maintained:- Complete, unaltered, except for endorsement or change in normal course of communication, storage or display.- Must pass assessment.Capable of being displayed or produced to person to whom it is presented..  Original ito Section 14 © Chetty Law 2011
Assessed in terms of:- reliability of the manner in which it was generated, stored or communicated & manner in which integrity was maintained- manner in which originator was identified- any other relevant factor.(Course of business) Data message certified be to correct by an officer in service of company will be admissible as evidence.   Evidential Weight © Chetty Law 2011
Where law prescribes a signature, must use advanced signatures, other cases consensus between parties is sought (includes “click-wrap” and “browse-wrap” agreements).  Signatures  s13 © Chetty Law 2010
Electronic Signaturevs.Advanced Electronic Signature  Signatures  s13 © Chetty Law 2011
The Electronic Evidence Issue Paper   © Chetty Law 2011
Judge HCJ Flemming (1996): Video Conferencing?Letter to Minister of Justice (1997): Telecommunication Technology in TrialsLaw Reform Commission (1997): Investigation  Recommendation: use of “audio-visual links” – e.g. leave to appealProject 113 – Project 126Facilitate a focused debateAllow stakeholders opportunity to raise relevant matters Rationale for Issue Paper © Chetty Law 2011
Rapid developments in technologyAnonymity, Abundance, AssumptionsMultiple sources and formats,Ease of manipulationObsolescenceReading dataMetadataECT Act PresumptionsInteraction with rule against hearsay Rationale for Issue Paper © Chetty Law 2011
-Legal Issue of indirect evidence, challenges for cross-examination -Level of reliance that can be placed on such evidence
The Promotion of Access to Information Act (PAIA)   © Chetty Law 2011
Promotion of Access to Information Act/ Intention “PAIA gives effect to the constitutional right of access to any information held by the State and any information by another person that is required for the exercise or protection of any rights” © Chetty Law 2011
Promotion of Access to Information Act/ Non Disclosure “Where the information requested relates to certain confidential information of a third party: IO must refuse the request for access to information, if the disclosure thereof would amount to a breach of a duty of confidence owed to the third party in terms of an agreement” © Chetty Law 2011
Head of private body must compile & keep updated a manual containing:Address, phone, fax and emailGuide to request recordsCategories of recordsDescription of recordsDetail to facilitate a requestSubjects and categories of records
What needs to be done?Head of private body must compile & keep updated a manual containing:Address, phone, fax and emailGuide to request recordsCategories of recordsDescription of recordsHow to requestCosts of requestSubjects and categories of records © Chetty Law 2011
Protection of Personal Information Bill © Chetty Law 2011
Purpose“To protect the privacy with regard to the processing of personal information; and balance the right to privacy against other rights such as the right of access to information.”  © Chetty Law 2011
Data Subject “data subject” = the person to whom personal information relates  © Chetty Law 2011
Personal Information Information relating to an identifiable, living, natural person & where it’s applicable, an identifiable, existing juristic person, including but not limited to: *Race, gender, sex, pregnancy, marital status,national, ethnic or social origin, colour, sexual orientation, age, physical or mental health, well-being, disability, religion, conscience, belief, culture, language and birth of the person;* Education or the medical, financial, criminal or employment history of the person;* Any identifying number, symbol, e-mail address, physical address, telephone number or other particular assignment to the person;* The blood type or any other biometric information of the person;  © Chetty Law 2011
	* The personal opinions, views or preferences of the person;* Correspondence sent by the person that is implicitly or explicitly of a private	or confidential nature or further correspondence that would reveal the contents of the original correspondence;* The views or opinions of another individual about the person; and* The name of the person if it appears with other personal information relating to the person or if the disclosure of the name itself would reveal informationabout the person;  © Chetty Law 2011
Processing Any operation or activity or any set of operations, whether or not by automatic means, concerning personal information, including:-(a) the collection, receipt, recording, organisation, collation, storage, updating or modification, retrieval, alteration, consultation, use; (b) dissemination by means of transmission, distribution or making available in any other form; or(c) merging, linking, as well as blocking, degradation, erasure or destruction of information  © Chetty Law 2011
The 8 PrinciplesPrinciples of Processing (1) Accountability(2) Processing Limitation(3) Purpose Specification (Specific, Defined, Deletion, Retention) (4) Further Processing Limitation (compatibility) (5) Information Quality(6) Openness(7) Security Safeguards(8) Data Subject Participation © Chetty Law 2011
	Trans-border FlowNot Transfer to 3rd party in foreign country unless recipient subject to law, code, contract which upholds principles substantially similar to principles in Act and includes provisions similar to section relating to further transferconsent transfer necessary for contract performance (DS & RP)transfer is for benefit of DS and not reasonably practicable to obtain consent to transfer / DS would have consented if reasonably practicable © Chetty Law 2011
         And let’s hand over to Katherine….
Electronic Discovery   © Chetty Law 2011
What is E-Discovery?“Parties to litigation have the right to receive copies of the “records” to be used as evidence during the litigation process.Failure to provide such “records” results in the inadmissibility of such records as evidence” © Chetty Law 2011
E-Discovery Challenges“includes email messages (including backups and deleted messages), instant messages (IM), web site information whether in text, graphic or audio format, log files, voicemail messages and logs, data files (documents, spreadsheets, database files, etc.), program files, cache files, cookies” © Chetty Law 2011
Responding to requests has become more complex Need to pull Data from voicemail, email, sms, instant messaging  Still no Policies for preservation of electronic evidence Significant risk  http://www.law.com/jsp/legaltechnology/pubArticleLT.jsp?id=1202426600692
Coleman vs. Morgan Stanley“Morgan Stanley & Co. Inc. has agreed to pay a $15 million civil fine to settle federal regulators' charges that it repeatedly failed to provide tens of thousands of e-mails that they sought in major investigations over several years”Numerous misstatements about practices © Chetty Law 2011
Zubulake vs. UBS Warburg“A $29 million verdict was returned against UBS because the company had destroyed email messages that were demanded as evidence in the case” © Chetty Law 2011
Arndt vs. First Union Banks“Evidence has been received that tends to show that certain profit and loss statements and E-mails were in the exclusive possession of the defendant, First Union; and, [sic] have not been produced for inspection, by the plaintiff or his counsel, even though defendant, First Union, was aware of the plaintiff's claim. From this, you may infer, though you are not compelled to do so, that the profit and loss statements and the E-mails would be damaging to the defendant” © Chetty Law 2011
Edgars Consolidated Stores Limited (EDCON) v CCMA Ms A, an employee of Edgars, received an email from another Edgars employee. The email had racist connotations. Ms A did not consider the email as offensive– in fact she thought it was funny – and she in turn forwarded the email to family members and friends, none of whom were employed by Edgars.“used the Company’s electronic mail to transmit offensive mail internally and externally, thereby causing harm to the Company’s reputation”  © Chetty Law 2011
SIHLALI, MAFIKA v SABC Resignation/Firing by SMS?Contract of Employment with SABC, sent sms to Chairman of the Board resigning.Resignation accepted, tried to go back but Court said no. © Chetty Law 2011
Companies Act 71 of 2008   © Chetty Law 2011
“electronic communication’’ has the meaning set out in section 1 of the Electronic Communications and Transactions Act“present at a meeting’’ means to be present in person, or able to participate in the meeting by electronic communication, or to be represented by a proxy who ispresent in person or able to participate in the meeting by electronic communication” Companies Act / Definitions © Chetty Law 2011
“An unaltered electronically or mechanically generated reproduction of any document, other than a share certificate, may be substituted for the original for anypurpose for which the original could be used ito the ActIf, in terms of this Act, a notice is required or permitted to be given or published to any person, it is sufficient if the notice is transmitted electronically directly to that person in a manner and form such that the notice can conveniently be printed by the recipient within a reasonable time and at a reasonable cost” Companies Act / E-Documents © Chetty Law 2011
National Archive and Record Services (NARS) Act   © Chetty Law 2011
Act requires the retention of records for reasons including the preservation of the social memory of the organisation. While the National Archives Act impacts mainly public institutions, it would also impact the records practices of companies to whom public institutions outsource certain services. Records are needed to serve as evidence that the functions of the entity have been fulfilled, required for management, accountability, operational continuity, legal evidence and disaster recovery, part of the organisations memory and cultural heritage and may be intrinsically linked to the rights of citizens. NARS © Chetty Law 2011
King III Code   © Chetty Law 2011
Associated Policies   © Chetty Law 2011
 - Establish guidelines & responsibilities for use- Avoid risk- Achieve compliance- Accountability  Why do you need policies? © Chetty Law 2011
[object Object]
Password protected but not encrypted
Postedhttp://www.dofonline.co.uk
[object Object]
Memory stick encrypted with password on sticky note
Memory stick with government information -	subcontractor http://www.bbc.co.uk
[object Object]
Bank customers	Account details, signatures, contact details, family details  http://www.bbc.co.uk
Electronic Communications Policy pertaining to acceptable and unacceptable use of the electronic communications facilities of the company; Interception and Monitoring Policy that specifies the circumstances under which the company shall intercept and/or monitor personnel communications; the procedures to the be followed by the company in compliance with RICA; and limitations placed on the manner in which the records emanating from such interception or monitoring shall be used;  Typical Electronic Records Policies © Chetty Law 2011
 Electronic Records Management Policies pertaining to the proper storage and management of electronic records; the treatment of email records and website records; the mandatory and specific metadata to be retained in respect of electronic records; Disaster Recovery and Business Continuity Strategies, Statements and Policies that specify the steps taken by the company internally and by technology providers to ensure the availability of electronic records systems and electronic records and the procedures for recovery to business interruptions; Typical Electronic Records Policies © Chetty Law 2011
 Records Retention Schedules that specify the retention period and the appropriate date for destruction for electronic records including email records; E-mail Management Policies that provide more detailed and contextualised information on e-mail and e-mail records management specifically Typical Electronic Records Policies © Chetty Law 2011
Case Study 1   © Chetty Law 2011
SA Records Retention Periods Example
Case Study 2   © Chetty Law 2010
Write  © Chetty Law 2011
Basic Health-Check -Official Records created, captured upon creation or receipt in appropriate records management system-Access managed - policies and procedures-Found on demand and reliable as evidence-Managed and planned strategically- Employees and personnel are trained- Reporting and accountability- Policies and procedures are updated  © Chetty Law 2011
http://www.lib.az.us/records/GuidanceAndRelatedResources/21st_century_rm_checklist.pdf
http://www.lib.az.us/records/GuidanceAndRelatedResources/21st_century_rm_checklist.pdf

Mais conteúdo relacionado

Mais procurados

Records retention shrm
Records retention shrmRecords retention shrm
Records retention shrmcinderella1961
 
E. Bryan - Governance and Records Management
E. Bryan - Governance and Records ManagementE. Bryan - Governance and Records Management
E. Bryan - Governance and Records ManagementEmerson Bryan
 
E. Bryan - An Introduction To Records Management [Barbados Community College]
E. Bryan  - An Introduction To Records Management [Barbados Community College]E. Bryan  - An Introduction To Records Management [Barbados Community College]
E. Bryan - An Introduction To Records Management [Barbados Community College]Emerson Bryan
 
Why records management is important
Why records management is importantWhy records management is important
Why records management is importantOMWOMA JACKSON
 
A Survey of Security and Forensic Features In Popular eDiscovery Software Suites
A Survey of Security and Forensic Features In Popular eDiscovery Software SuitesA Survey of Security and Forensic Features In Popular eDiscovery Software Suites
A Survey of Security and Forensic Features In Popular eDiscovery Software SuitesCSCJournals
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records tooBob Larrivee
 
Basics of records management
Basics of records managementBasics of records management
Basics of records managementRussell James
 
Book 3 chap-8
Book 3 chap-8Book 3 chap-8
Book 3 chap-8GTU
 
Chap 8
Chap 8Chap 8
Chap 8GTU
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...Cengage Learning
 
The principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - ukThe principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - uk- Mark - Fullbright
 
E discovery mallareddy 20160213
E discovery mallareddy 20160213E discovery mallareddy 20160213
E discovery mallareddy 20160213nullowaspmumbai
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Andrew Sharpe
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11mrmwood
 
What is Electronic Records Management?
What is Electronic Records Management?What is Electronic Records Management?
What is Electronic Records Management?Atle Skjekkeland
 

Mais procurados (20)

Records retention shrm
Records retention shrmRecords retention shrm
Records retention shrm
 
AERM Workshop
AERM WorkshopAERM Workshop
AERM Workshop
 
E. Bryan - Governance and Records Management
E. Bryan - Governance and Records ManagementE. Bryan - Governance and Records Management
E. Bryan - Governance and Records Management
 
E. Bryan - An Introduction To Records Management [Barbados Community College]
E. Bryan  - An Introduction To Records Management [Barbados Community College]E. Bryan  - An Introduction To Records Management [Barbados Community College]
E. Bryan - An Introduction To Records Management [Barbados Community College]
 
INTRODUCTION TO RECORDS
INTRODUCTION TO RECORDS INTRODUCTION TO RECORDS
INTRODUCTION TO RECORDS
 
rm, 10e ch02 copy
rm, 10e ch02 copyrm, 10e ch02 copy
rm, 10e ch02 copy
 
Why records management is important
Why records management is importantWhy records management is important
Why records management is important
 
A Survey of Security and Forensic Features In Popular eDiscovery Software Suites
A Survey of Security and Forensic Features In Popular eDiscovery Software SuitesA Survey of Security and Forensic Features In Popular eDiscovery Software Suites
A Survey of Security and Forensic Features In Popular eDiscovery Software Suites
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records too
 
Basics of records management
Basics of records managementBasics of records management
Basics of records management
 
Book 3 chap-8
Book 3 chap-8Book 3 chap-8
Book 3 chap-8
 
Chap 8
Chap 8Chap 8
Chap 8
 
File And Records Management
File And Records ManagementFile And Records Management
File And Records Management
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
The principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - ukThe principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - uk
 
WhitePaper- Archiving Supports HIPAA Compliance
WhitePaper- Archiving Supports HIPAA ComplianceWhitePaper- Archiving Supports HIPAA Compliance
WhitePaper- Archiving Supports HIPAA Compliance
 
E discovery mallareddy 20160213
E discovery mallareddy 20160213E discovery mallareddy 20160213
E discovery mallareddy 20160213
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
What is Electronic Records Management?
What is Electronic Records Management?What is Electronic Records Management?
What is Electronic Records Management?
 

Semelhante a Rabelani dagada electronic records management chetty law 2011

Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...Jamil Salem
 
What You Need To Know About Privacy Now!
What You Need To Know About Privacy   Now!What You Need To Know About Privacy   Now!
What You Need To Know About Privacy Now!catherinecoulter
 
What You Need To Know About Privacy Now!
What You Need To Know About Privacy   Now!What You Need To Know About Privacy   Now!
What You Need To Know About Privacy Now!catherinecoulter
 
Second Amandement to the Law No. 11/2008: Streghtening Legal Protection and C...
Second Amandement to the Law No. 11/2008: Streghtening Legal Protection and C...Second Amandement to the Law No. 11/2008: Streghtening Legal Protection and C...
Second Amandement to the Law No. 11/2008: Streghtening Legal Protection and C...AHRP Law Firm
 
Legal aspects of data gathering and information exchange
Legal aspects of data gathering and information exchangeLegal aspects of data gathering and information exchange
Legal aspects of data gathering and information exchangeStevenSegaert
 
Right to information act, 2005
Right to information act, 2005Right to information act, 2005
Right to information act, 2005Altacit Global
 
NEW DECREE ON PERSONAL DATA PROTECTION AND CROSS-BORDER PROVISION OF DATA THE...
NEW DECREE ON PERSONAL DATA PROTECTION AND CROSS-BORDER PROVISION OF DATA THE...NEW DECREE ON PERSONAL DATA PROTECTION AND CROSS-BORDER PROVISION OF DATA THE...
NEW DECREE ON PERSONAL DATA PROTECTION AND CROSS-BORDER PROVISION OF DATA THE...Dr. Oliver Massmann
 
Data Privacy Act in the Philippines
Data Privacy Act in the PhilippinesData Privacy Act in the Philippines
Data Privacy Act in the PhilippinesShirley Ingles-Cruz
 
Ten Laws Internet Businesses Should Consider Part II
Ten Laws Internet Businesses Should Consider Part IITen Laws Internet Businesses Should Consider Part II
Ten Laws Internet Businesses Should Consider Part IIRyan K. Hew
 
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...Dr. Oliver Massmann
 
Information Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal ContextInformation Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal ContextJason Nathu
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commercePalavesa Krishnan
 
Update on Laws and Practices 2020
Update on Laws and Practices 2020Update on Laws and Practices 2020
Update on Laws and Practices 2020LawPlus Ltd.
 
41 rti-sali.feature
41 rti-sali.feature41 rti-sali.feature
41 rti-sali.featureDivya Gigy
 
"Information Compliance - Freedom of Information, Data Protection and Librari...
"Information Compliance - Freedom of Information, Data Protection and Librari..."Information Compliance - Freedom of Information, Data Protection and Librari...
"Information Compliance - Freedom of Information, Data Protection and Librari...Terry O'Brien
 
Right to Information Act, 2005
Right to Information Act, 2005Right to Information Act, 2005
Right to Information Act, 2005student
 

Semelhante a Rabelani dagada electronic records management chetty law 2011 (20)

Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
 
What You Need To Know About Privacy Now!
What You Need To Know About Privacy   Now!What You Need To Know About Privacy   Now!
What You Need To Know About Privacy Now!
 
What You Need To Know About Privacy Now!
What You Need To Know About Privacy   Now!What You Need To Know About Privacy   Now!
What You Need To Know About Privacy Now!
 
Right To Information Act, 2005.
Right To Information Act, 2005.Right To Information Act, 2005.
Right To Information Act, 2005.
 
Second Amandement to the Law No. 11/2008: Streghtening Legal Protection and C...
Second Amandement to the Law No. 11/2008: Streghtening Legal Protection and C...Second Amandement to the Law No. 11/2008: Streghtening Legal Protection and C...
Second Amandement to the Law No. 11/2008: Streghtening Legal Protection and C...
 
Legal aspects of data gathering and information exchange
Legal aspects of data gathering and information exchangeLegal aspects of data gathering and information exchange
Legal aspects of data gathering and information exchange
 
Right to information act, 2005
Right to information act, 2005Right to information act, 2005
Right to information act, 2005
 
NEW DECREE ON PERSONAL DATA PROTECTION AND CROSS-BORDER PROVISION OF DATA THE...
NEW DECREE ON PERSONAL DATA PROTECTION AND CROSS-BORDER PROVISION OF DATA THE...NEW DECREE ON PERSONAL DATA PROTECTION AND CROSS-BORDER PROVISION OF DATA THE...
NEW DECREE ON PERSONAL DATA PROTECTION AND CROSS-BORDER PROVISION OF DATA THE...
 
Data Privacy Act in the Philippines
Data Privacy Act in the PhilippinesData Privacy Act in the Philippines
Data Privacy Act in the Philippines
 
Compliance & Value of Digital Signatures
Compliance & Value of Digital SignaturesCompliance & Value of Digital Signatures
Compliance & Value of Digital Signatures
 
Ten Laws Internet Businesses Should Consider Part II
Ten Laws Internet Businesses Should Consider Part IITen Laws Internet Businesses Should Consider Part II
Ten Laws Internet Businesses Should Consider Part II
 
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
 
Information Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal ContextInformation Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal Context
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commerce
 
Update on Laws and Practices 2020
Update on Laws and Practices 2020Update on Laws and Practices 2020
Update on Laws and Practices 2020
 
20eumt047_ipr.pptx
20eumt047_ipr.pptx20eumt047_ipr.pptx
20eumt047_ipr.pptx
 
41 rti-sali.feature
41 rti-sali.feature41 rti-sali.feature
41 rti-sali.feature
 
"Information Compliance - Freedom of Information, Data Protection and Librari...
"Information Compliance - Freedom of Information, Data Protection and Librari..."Information Compliance - Freedom of Information, Data Protection and Librari...
"Information Compliance - Freedom of Information, Data Protection and Librari...
 
Draft Of Ekiti State Charter For Victims Of Crime
Draft Of Ekiti State Charter For Victims Of CrimeDraft Of Ekiti State Charter For Victims Of Crime
Draft Of Ekiti State Charter For Victims Of Crime
 
Right to Information Act, 2005
Right to Information Act, 2005Right to Information Act, 2005
Right to Information Act, 2005
 

Mais de Rabelani Dagada

Rabelani dagada economical waves presentation
Rabelani dagada economical waves presentationRabelani dagada economical waves presentation
Rabelani dagada economical waves presentationRabelani Dagada
 
Rabelani dagada bizpref erp factors
Rabelani dagada bizpref erp factorsRabelani dagada bizpref erp factors
Rabelani dagada bizpref erp factorsRabelani Dagada
 
The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...Rabelani Dagada
 
Time, space and pace book launch presentation final
Time, space and pace book launch presentation finalTime, space and pace book launch presentation final
Time, space and pace book launch presentation finalRabelani Dagada
 
E learning research turning words into action
E learning research turning words into actionE learning research turning words into action
E learning research turning words into actionRabelani Dagada
 

Mais de Rabelani Dagada (10)

Rabelani dagada economical waves presentation
Rabelani dagada economical waves presentationRabelani dagada economical waves presentation
Rabelani dagada economical waves presentation
 
Rabelani dagada bizpref erp factors
Rabelani dagada bizpref erp factorsRabelani dagada bizpref erp factors
Rabelani dagada bizpref erp factors
 
Rabelani dagada wbs erp
Rabelani dagada wbs erpRabelani dagada wbs erp
Rabelani dagada wbs erp
 
Domestication edit
Domestication editDomestication edit
Domestication edit
 
The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...
 
Note of thanks_02
Note of thanks_02Note of thanks_02
Note of thanks_02
 
Dagada programmefinal
Dagada programmefinalDagada programmefinal
Dagada programmefinal
 
Dagada invitation2
Dagada invitation2Dagada invitation2
Dagada invitation2
 
Time, space and pace book launch presentation final
Time, space and pace book launch presentation finalTime, space and pace book launch presentation final
Time, space and pace book launch presentation final
 
E learning research turning words into action
E learning research turning words into actionE learning research turning words into action
E learning research turning words into action
 

Último

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Último (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Rabelani dagada electronic records management chetty law 2011

  • 1. Electronic Records ManagementJenna Cuming& Katherine ThompsonCL Johannesburg© Chetty Law 2011 Guest Lecture Presented During Rabelani Dagada's Technology & Information Management's Class at the Wits Business School, 3 February 2011
  • 2. Electronic Communications and Transactions ActElectronic Records ManagementElectronic Evidence & E-DiscoveryBoardroom ConversationsChecklists
  • 3. Records Management ImperativeLegal Compliance (Mandate, Industry)Evidence – Proof of Existence of FactsOperational EfficiencyGovernance ImperativeKing IIIArchives ImperativeNational Archives PrescriptionsAccess to Justice and Access to Information Imperative PAJA & PAIA (PPI Bill)
  • 4. Enter the ECT Act….. © Chetty Law 2011
  • 5. Intention:To maximize the benefits of electronic transactions and internet usage by all South Africans.In effect:Electronic transactions have the same legal force as paper based transactions. In Short © Chetty Law 2011
  • 6.
  • 7. Information is not without legal force and effect merely on the grounds that it is wholly or partly in the form of a data message… or is merely referred to in such data message. ECT : Section 11(1) & (2) © Chetty Law 2011
  • 8.
  • 9.
  • 10. Means:Data generated, sent, received or stored by electronic means and includes voice, where the voice is used in an automated transaction; and a stored record. Definition of a Data Message © Chetty Law 2011
  • 11. Includes:data (electronic information) in email, internet, intranet, sms, voice between persons and stored records Excludes: voice between natural person and an automated voice response system Data Message © Chetty Law 2011
  • 12. “Legal force and effect to information…referred to in a way that a reasonable person would have noticed the reference and accessible in a form in which it may be read, stored and retrieved by the other party, whether electronically or as a computer printout (able to be reduced to electronic form)” Incorporation By Reference © Chetty Law 2011
  • 13.
  • 14. Radicati Group Email Statistics Report 2010, the average corporate user sends and receives 110 e-mail messages daily. http://www.radicati.com/wp/wp-content/uploads/2010/04/Email-Statistics-Report-2010-2014-Executive-Summary2.pdf Only e-mails… © Chetty Law 2011
  • 15. All sources of records!
  • 16. A record is defined in the ECT Act, as “recorded information regardless of form or medium” Can include e-mails, sms’s and instant message logs What is a record? © Chetty Law 2011
  • 17. “if any other law requires the retention of documents or records, such documents and records may be retained in electronic format, subject to certain conditions”ECT sets out requirements for electronic records retention:information is accessible for subsequent reference- is in format generated, sent or received or format that accurately represents information- origin and destination of data message and date & time it was sent or received can be determined Section 16 © Chetty Law 2011
  • 18. ExceptionsAgreements:Alienation of LandLong term property lease Execution:Will or CodicilBill of Exchange © Chetty Law 2011
  • 19. Electronic evidence must not be denied admissibility (a) on grounds that it is in electronic format or (b) if it is best evidence.Must be given due evidential weight. Section 15 © Chetty Law 2011
  • 20. To qualify as an original, Integrity must be maintained:- Complete, unaltered, except for endorsement or change in normal course of communication, storage or display.- Must pass assessment.Capable of being displayed or produced to person to whom it is presented.. Original ito Section 14 © Chetty Law 2011
  • 21. Assessed in terms of:- reliability of the manner in which it was generated, stored or communicated & manner in which integrity was maintained- manner in which originator was identified- any other relevant factor.(Course of business) Data message certified be to correct by an officer in service of company will be admissible as evidence. Evidential Weight © Chetty Law 2011
  • 22. Where law prescribes a signature, must use advanced signatures, other cases consensus between parties is sought (includes “click-wrap” and “browse-wrap” agreements). Signatures s13 © Chetty Law 2010
  • 23. Electronic Signaturevs.Advanced Electronic Signature Signatures s13 © Chetty Law 2011
  • 24. The Electronic Evidence Issue Paper © Chetty Law 2011
  • 25. Judge HCJ Flemming (1996): Video Conferencing?Letter to Minister of Justice (1997): Telecommunication Technology in TrialsLaw Reform Commission (1997): Investigation Recommendation: use of “audio-visual links” – e.g. leave to appealProject 113 – Project 126Facilitate a focused debateAllow stakeholders opportunity to raise relevant matters Rationale for Issue Paper © Chetty Law 2011
  • 26. Rapid developments in technologyAnonymity, Abundance, AssumptionsMultiple sources and formats,Ease of manipulationObsolescenceReading dataMetadataECT Act PresumptionsInteraction with rule against hearsay Rationale for Issue Paper © Chetty Law 2011
  • 27. -Legal Issue of indirect evidence, challenges for cross-examination -Level of reliance that can be placed on such evidence
  • 28. The Promotion of Access to Information Act (PAIA) © Chetty Law 2011
  • 29. Promotion of Access to Information Act/ Intention “PAIA gives effect to the constitutional right of access to any information held by the State and any information by another person that is required for the exercise or protection of any rights” © Chetty Law 2011
  • 30. Promotion of Access to Information Act/ Non Disclosure “Where the information requested relates to certain confidential information of a third party: IO must refuse the request for access to information, if the disclosure thereof would amount to a breach of a duty of confidence owed to the third party in terms of an agreement” © Chetty Law 2011
  • 31. Head of private body must compile & keep updated a manual containing:Address, phone, fax and emailGuide to request recordsCategories of recordsDescription of recordsDetail to facilitate a requestSubjects and categories of records
  • 32. What needs to be done?Head of private body must compile & keep updated a manual containing:Address, phone, fax and emailGuide to request recordsCategories of recordsDescription of recordsHow to requestCosts of requestSubjects and categories of records © Chetty Law 2011
  • 33. Protection of Personal Information Bill © Chetty Law 2011
  • 34. Purpose“To protect the privacy with regard to the processing of personal information; and balance the right to privacy against other rights such as the right of access to information.” © Chetty Law 2011
  • 35. Data Subject “data subject” = the person to whom personal information relates © Chetty Law 2011
  • 36. Personal Information Information relating to an identifiable, living, natural person & where it’s applicable, an identifiable, existing juristic person, including but not limited to: *Race, gender, sex, pregnancy, marital status,national, ethnic or social origin, colour, sexual orientation, age, physical or mental health, well-being, disability, religion, conscience, belief, culture, language and birth of the person;* Education or the medical, financial, criminal or employment history of the person;* Any identifying number, symbol, e-mail address, physical address, telephone number or other particular assignment to the person;* The blood type or any other biometric information of the person; © Chetty Law 2011
  • 37. * The personal opinions, views or preferences of the person;* Correspondence sent by the person that is implicitly or explicitly of a private or confidential nature or further correspondence that would reveal the contents of the original correspondence;* The views or opinions of another individual about the person; and* The name of the person if it appears with other personal information relating to the person or if the disclosure of the name itself would reveal informationabout the person; © Chetty Law 2011
  • 38. Processing Any operation or activity or any set of operations, whether or not by automatic means, concerning personal information, including:-(a) the collection, receipt, recording, organisation, collation, storage, updating or modification, retrieval, alteration, consultation, use; (b) dissemination by means of transmission, distribution or making available in any other form; or(c) merging, linking, as well as blocking, degradation, erasure or destruction of information © Chetty Law 2011
  • 39. The 8 PrinciplesPrinciples of Processing (1) Accountability(2) Processing Limitation(3) Purpose Specification (Specific, Defined, Deletion, Retention) (4) Further Processing Limitation (compatibility) (5) Information Quality(6) Openness(7) Security Safeguards(8) Data Subject Participation © Chetty Law 2011
  • 40. Trans-border FlowNot Transfer to 3rd party in foreign country unless recipient subject to law, code, contract which upholds principles substantially similar to principles in Act and includes provisions similar to section relating to further transferconsent transfer necessary for contract performance (DS & RP)transfer is for benefit of DS and not reasonably practicable to obtain consent to transfer / DS would have consented if reasonably practicable © Chetty Law 2011
  • 41. And let’s hand over to Katherine….
  • 42. Electronic Discovery © Chetty Law 2011
  • 43. What is E-Discovery?“Parties to litigation have the right to receive copies of the “records” to be used as evidence during the litigation process.Failure to provide such “records” results in the inadmissibility of such records as evidence” © Chetty Law 2011
  • 44. E-Discovery Challenges“includes email messages (including backups and deleted messages), instant messages (IM), web site information whether in text, graphic or audio format, log files, voicemail messages and logs, data files (documents, spreadsheets, database files, etc.), program files, cache files, cookies” © Chetty Law 2011
  • 45. Responding to requests has become more complex Need to pull Data from voicemail, email, sms, instant messaging Still no Policies for preservation of electronic evidence Significant risk http://www.law.com/jsp/legaltechnology/pubArticleLT.jsp?id=1202426600692
  • 46. Coleman vs. Morgan Stanley“Morgan Stanley & Co. Inc. has agreed to pay a $15 million civil fine to settle federal regulators' charges that it repeatedly failed to provide tens of thousands of e-mails that they sought in major investigations over several years”Numerous misstatements about practices © Chetty Law 2011
  • 47. Zubulake vs. UBS Warburg“A $29 million verdict was returned against UBS because the company had destroyed email messages that were demanded as evidence in the case” © Chetty Law 2011
  • 48. Arndt vs. First Union Banks“Evidence has been received that tends to show that certain profit and loss statements and E-mails were in the exclusive possession of the defendant, First Union; and, [sic] have not been produced for inspection, by the plaintiff or his counsel, even though defendant, First Union, was aware of the plaintiff's claim. From this, you may infer, though you are not compelled to do so, that the profit and loss statements and the E-mails would be damaging to the defendant” © Chetty Law 2011
  • 49. Edgars Consolidated Stores Limited (EDCON) v CCMA Ms A, an employee of Edgars, received an email from another Edgars employee. The email had racist connotations. Ms A did not consider the email as offensive– in fact she thought it was funny – and she in turn forwarded the email to family members and friends, none of whom were employed by Edgars.“used the Company’s electronic mail to transmit offensive mail internally and externally, thereby causing harm to the Company’s reputation” © Chetty Law 2011
  • 50. SIHLALI, MAFIKA v SABC Resignation/Firing by SMS?Contract of Employment with SABC, sent sms to Chairman of the Board resigning.Resignation accepted, tried to go back but Court said no. © Chetty Law 2011
  • 51. Companies Act 71 of 2008 © Chetty Law 2011
  • 52. “electronic communication’’ has the meaning set out in section 1 of the Electronic Communications and Transactions Act“present at a meeting’’ means to be present in person, or able to participate in the meeting by electronic communication, or to be represented by a proxy who ispresent in person or able to participate in the meeting by electronic communication” Companies Act / Definitions © Chetty Law 2011
  • 53. “An unaltered electronically or mechanically generated reproduction of any document, other than a share certificate, may be substituted for the original for anypurpose for which the original could be used ito the ActIf, in terms of this Act, a notice is required or permitted to be given or published to any person, it is sufficient if the notice is transmitted electronically directly to that person in a manner and form such that the notice can conveniently be printed by the recipient within a reasonable time and at a reasonable cost” Companies Act / E-Documents © Chetty Law 2011
  • 54. National Archive and Record Services (NARS) Act © Chetty Law 2011
  • 55. Act requires the retention of records for reasons including the preservation of the social memory of the organisation. While the National Archives Act impacts mainly public institutions, it would also impact the records practices of companies to whom public institutions outsource certain services. Records are needed to serve as evidence that the functions of the entity have been fulfilled, required for management, accountability, operational continuity, legal evidence and disaster recovery, part of the organisations memory and cultural heritage and may be intrinsically linked to the rights of citizens. NARS © Chetty Law 2011
  • 56. King III Code © Chetty Law 2011
  • 57.
  • 58.
  • 59. Associated Policies © Chetty Law 2011
  • 60. - Establish guidelines & responsibilities for use- Avoid risk- Achieve compliance- Accountability Why do you need policies? © Chetty Law 2011
  • 61.
  • 62. Password protected but not encrypted
  • 64.
  • 65. Memory stick encrypted with password on sticky note
  • 66. Memory stick with government information - subcontractor http://www.bbc.co.uk
  • 67.
  • 68. Bank customers Account details, signatures, contact details, family details http://www.bbc.co.uk
  • 69. Electronic Communications Policy pertaining to acceptable and unacceptable use of the electronic communications facilities of the company; Interception and Monitoring Policy that specifies the circumstances under which the company shall intercept and/or monitor personnel communications; the procedures to the be followed by the company in compliance with RICA; and limitations placed on the manner in which the records emanating from such interception or monitoring shall be used;  Typical Electronic Records Policies © Chetty Law 2011
  • 70.  Electronic Records Management Policies pertaining to the proper storage and management of electronic records; the treatment of email records and website records; the mandatory and specific metadata to be retained in respect of electronic records; Disaster Recovery and Business Continuity Strategies, Statements and Policies that specify the steps taken by the company internally and by technology providers to ensure the availability of electronic records systems and electronic records and the procedures for recovery to business interruptions; Typical Electronic Records Policies © Chetty Law 2011
  • 71.  Records Retention Schedules that specify the retention period and the appropriate date for destruction for electronic records including email records; E-mail Management Policies that provide more detailed and contextualised information on e-mail and e-mail records management specifically Typical Electronic Records Policies © Chetty Law 2011
  • 72. Case Study 1 © Chetty Law 2011
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78. SA Records Retention Periods Example
  • 79. Case Study 2 © Chetty Law 2010
  • 80. Write © Chetty Law 2011
  • 81. Basic Health-Check -Official Records created, captured upon creation or receipt in appropriate records management system-Access managed - policies and procedures-Found on demand and reliable as evidence-Managed and planned strategically- Employees and personnel are trained- Reporting and accountability- Policies and procedures are updated © Chetty Law 2011
  • 85. Getting started © Chetty Law 2011
  • 86. Jenna Cuming jenna@chettylaw.co.za Katherine Thompson katherine@chettylaw.co.za 011 463 63 68
  • 88. Road Block- Records Retention vs. Wikileaks- Practical use of electronic signatures

Notas do Editor

  1. Read.
  2. It is what allows us to do internet banking, online shopping and contract via email. Without it none of these things would be possible. It puts minimum security measures in place for online banking, it governs returning of goods bought online and also deals with websites & ISP’s.
  3. Section 11 is one of the most important provisions in our minds. Read Out. So what it is saying is that everything you could do on paper is now valid if it’s done electronically. With some exceptions, like wills & deeds for the sale of property which still have to done on paper to be valid. You might be wondering what classifies as a data message.
  4. Thank you. Any questions.