SlideShare uma empresa Scribd logo
1 de 21
DATA PROTECTION AND RISK MITIGATION 
Understanding Data Protection Risks and the Law 
PRIA CHETTY 
ENDCODER/ ENDCODE.ORG
CONTEXT: 
POPI Priority Issues 
IT systems and business tools (enterprise data, (know your) customer data, 
profiling, analytics, relationship management, financial, health ) 
Records management policies (creation, retention and destruction of records) 
Digital content ownership (users: personal data and intellectual property, rights 
and obligations) 
Database ownership(source of data, use of data, rights and obligations) 
Apps ownership (generation of user data: personal data and intellectual 
property, rights and obligations ) 
Young people (campaigns involving young people: special treatment of young 
people) 
Recommendations
POPI: Priority Issues
POPI: Priority Issues 
• Getting Serious about PoPI 
• Identification of Personal Data impacted and exempted 
• Identification of Business Systems impacted 
• Identification of Business Processes impacted 
• Information Security (Risk and Incident Management) 
• Identification of (Vital) Records 
• Classification of Records 
• Personal Information and Intellectual Property 
• Technological Innovation and Privacy
POPI and Advertising and Marketing 
• Know Your Customer 
• Know Your Channel 
• Know Your Platform 
• Risks associated with Digital Opportunities 
• Risks associated with Innovation Opportunities 
• Data Risks Management: Privacy and Intellectual Property (incl. copyright), 
Information Security and Records Management
IT / IS systems and business tools 
• Accountability Principle (s8 POPI) 
• Responsible Party to process PI in satisfaction of conditions of PoPI 
The responsible party must ensure that the conditions set out in 
this Chapter, and all the measures that give effect to such 
conditions, are complied with at the time of the determination of 
the purpose and means of the processing and during the 
processing itself. 
Section 8 The Protection of Personal Information Act 4 of 2013 
• Processing Limitation (Condition 2 PoPI) and Further Processing for compatible 
purposes (Condition 4) 
• Quality of Information (Condition 5 of PoPI)
IT / IS systems and business tools 
• Security Safeguards 
• Security measures on integrity and confidentiality of personal information (s19 of PoPI) 
• Data under my control has been breached, now what? 
• Notification to Data Subject (s22 POPI) 
• Notification to Information Regulator (s22 POPI) 
• Unauthorised access to data is a crime 
A person who intentionally accesses or intercepts any data without authority or 
permission to do so, is guilty of an offence. 
A person who intentionally and without authority to do so, interferes with data 
in a way which causes such data to be modified, destroyed or otherwise 
rendered ineffective is guilty of an offence 
Section 86 (1) and (2) Electronic Communications and Transactions Act 25 of 2002
IT systems and the Cloud 
Information processed by Operator or person acting under authority 
Security measures regarding information processed by operator 
Cross-border transfer policy 
5 Conditions of Cross-border Transfer (S72 POPI) 
• The third party who receives the information is subject to a law, binding corporate rules or 
agreement which provide an adequate level of protection that effectively upholds the 
principles for processing of information that are similar to those in POPI, and includes 
provisions that are similar to POPI in relation to the further transfer of personal information 
from the recipient to third parties in a foreign country; 
• The person consents to the transfer; 
• The transfer is necessary for the performance of a contract between you and the person, or 
for pre-contractual measures taken at the request of the person whose information is being 
transferred; 
• The transfer is necessary for the conclusion or performance of a contract between you and a 
third party that is in the interest of the person; or 
• The transfer is for the benefit of the person whose information is collected, and it is not 
reasonably practical to obtain the consent of the person and, if it were reasonably practical 
to obtain such consent, the data subject would likely give it.
Records Management Policies 
• Accountability Principle 
• Responsible Party to protect integrity of PI (s8 POPI) 
• Outdated information 
• Restriction on records (s14 POPI) 
• Openness 
• Documentation (s17 
• Access to Personal Information (s23 of PoPI) 
• Accuracy & Correction of information 
• Restriction of Records (s14 POPI) 
• Right to correct PI (s24 POPI) 
A responsible party must take reasonably practicable steps to ensure that the personal 
information is complete, accurate, not misleading and updated where necessary. 
Section 16 The Protection of Personal Information Act 4 of 2013 
• De-identification/Deletion of information 
• Exclusion (s6 POPI) 
• As soon as no longer authorised to have PI (s14 POPI)
Records Management Policies 
• Losing personal information 
• Notification to Data Subject & Regulator (s22 POPI) 
• International Best Practices for records management 
• European Directive on Data Protection 
• Right to Access Information Records 
• Promotion of Access to Information Act 2 of 2000 (PAIA) 
• Data Subject participation (s23 POPI)
Digital Content Ownership 
Who Owns Digital Content 
• Do you own your own digital content? 
“There are not yet statutory laws around 
ownership of virtual goods, nor is there case 
law.” 
The Guardian 
“In most cases you are effectively leasing the content, 
not buying it.” 
The Guardian 
"You will not transfer your account to anyone 
without first getting our written permission" 
Facebook's terms and conditions
Digital Content Ownership 
• Should the subject of the digital content own 
the own digital content? 
“What are these people going to do with that data? 
They’re going to target you with an ad which makes 
you feel a bit queasy. Targeted adverts are not the 
future.” 
Sir Tim Berners-Lee 
in The Guardian 
“If you give [people] the ability to see how [data is] 
used and you ban its misuse then people are much 
more happy to open up to their data being used.” 
Sir Tim Berners-Lee 
in The Guardian
Database Ownership 
Databases & Copyright 
• Definition of ‘literary work’ in Copyright Act 98 of 1978 includes compilations stored 
or embodied in a computer or medium used with a computer (s1) 
• Originality in selection or arrangement 
• Labour & Skill 
• Owner of copyright to database has exclusive rights 
Databases & POPI 
• Databases of personal information fall under POPI and must be protected by the 
Responsible Party 
• Directories (s70 POPI)
Apps Ownership 
https://www.flickr.com/photos/jasonahowie/
Apps Ownership 
Apps & Copyright 
• An App is a computer program 
“computer program” means a set of instructions fixed or stored in any 
manner and which, when used directly or indirectly in a computer, directs its 
operation to bring about a result” 
Section 1 The Copyright Act 98 of 1978 
• Computer programs are copyright protected (not patantable) 
“Anything which consists of (amongst others) a computer program shall not 
be an invention for the purposes of this Act” 
Section 25(2) The Patents Act 57 of 1978
App Ownership 
• Data Protection for Apps 
• Owners of App are responsible for 
protection of data collected 
• Think of all of the information an App can 
collect about you 
• Health & sport monitoring apps 
• Medical apps 
• Messaging apps
Younge People & Data Protection 
https://www.flickr.com/photos/malias/
Younge People & Data Protection 
• POPI – ‘Competent Person’ 
• Protection of Personal information of children by Responsible Party 
A responsible party may, subject to section 35, not process 
personal information concerning a child. 
Section 34 The Protection of Personal Information Act 4 of 2013 
• Exceptions (s35 POPI) 
• Consent from the competent person 
• Necessary for establishment, exercise or defence of a right or obligation 
in law 
• Necessary to comply with an obligation of international public law 
• historical, statistical or research purposes
Recommendations 
• Appointment of Information Officer: Enterprise 
• Appointment of a Risk and Compliance Manager: Agencies 
• PoPI Audit (Client) PoPI Audit (Project) 
• Intellectual Property Audit 
• Information Security Audit 
• Privacy Policy 
• Information Security Policy 
• Intellectual Property Policy 
• Innovation Management 
Different rules for different channels, platforms, data sources and applications
Pria Chetty 
Pria.chetty@endcode.org 
endcode.org 
THANKS, QUESTIONS?
References 
• http://ico.org.uk/for_organisations/data_protection/security_measures) 
• http://www.theguardian.com/money/2012/sep/03/do-you-own-your-digital-content 
• http://www.theguardian.com/technology/2014/oct/08/sir-tim-berners-lee-speaks-out-on-data-ownership? 
CMP=ema_827 
• http://www.bizcommunity.com/Article/75/542/98352.html 
• http://ico.org.uk/Youth

Mais conteúdo relacionado

Mais procurados

Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
Data Privacy
Data PrivacyData Privacy
Data PrivacyHome
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerceUjjwal Joshi
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerceWisnu Dewobroto
 
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...gallowayandcollens
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy RegulationMercatus Center
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesAdam Thierer
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethicalSheetal Verma
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data PrivacyWilmerHale
 
Draft data protection regn 2012
Draft data protection regn 2012Draft data protection regn 2012
Draft data protection regn 2012lilianedwards
 
IT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestIT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestLilian Edwards
 
Canadian Copyright Law, Technology and Cultural Management
Canadian Copyright Law, Technology and Cultural Management Canadian Copyright Law, Technology and Cultural Management
Canadian Copyright Law, Technology and Cultural Management CAMT
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
 

Mais procurados (20)

Legal challenges in E-commerce
Legal challenges in E-commerce Legal challenges in E-commerce
Legal challenges in E-commerce
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
 
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
 
E-Commerce 10
E-Commerce 10E-Commerce 10
E-Commerce 10
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy Regulation
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
Draft data protection regn 2012
Draft data protection regn 2012Draft data protection regn 2012
Draft data protection regn 2012
 
IT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestIT law : the middle kingdom between east and West
IT law : the middle kingdom between east and West
 
Canadian Copyright Law, Technology and Cultural Management
Canadian Copyright Law, Technology and Cultural Management Canadian Copyright Law, Technology and Cultural Management
Canadian Copyright Law, Technology and Cultural Management
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
 

Destaque

Sviesuva vaizdine medziaga svietiejams 1 dalis 2013
Sviesuva vaizdine medziaga svietiejams 1 dalis 2013Sviesuva vaizdine medziaga svietiejams 1 dalis 2013
Sviesuva vaizdine medziaga svietiejams 1 dalis 2013valentina valentina
 
Vaizdine metodine medziaga svietejams 7 dalis sveiko zmogaus kodas
Vaizdine metodine medziaga svietejams 7 dalis sveiko zmogaus kodasVaizdine metodine medziaga svietejams 7 dalis sveiko zmogaus kodas
Vaizdine metodine medziaga svietejams 7 dalis sveiko zmogaus kodasvalentina valentina
 
Kaip rengti švietejiska paskaita.patarimai. 6 dalis
Kaip rengti švietejiska paskaita.patarimai. 6 dalisKaip rengti švietejiska paskaita.patarimai. 6 dalis
Kaip rengti švietejiska paskaita.patarimai. 6 dalisvalentina valentina
 
2014 08-20 Radboudumc-Health Valley-LSH: Personalized Healthcare through inte...
2014 08-20 Radboudumc-Health Valley-LSH: Personalized Healthcare through inte...2014 08-20 Radboudumc-Health Valley-LSH: Personalized Healthcare through inte...
2014 08-20 Radboudumc-Health Valley-LSH: Personalized Healthcare through inte...Alain van Gool
 
DJ Hay Landscape Architecture
DJ Hay Landscape ArchitectureDJ Hay Landscape Architecture
DJ Hay Landscape ArchitectureDavid James Hay
 
2016 09-12 Europe Biobanking Week, Vienna, Alain van Gool
2016 09-12 Europe Biobanking Week, Vienna, Alain van Gool2016 09-12 Europe Biobanking Week, Vienna, Alain van Gool
2016 09-12 Europe Biobanking Week, Vienna, Alain van GoolAlain van Gool
 
Relatoio contas sgu 2
Relatoio contas sgu 2Relatoio contas sgu 2
Relatoio contas sgu 2macoesapo
 
Newest products summer
Newest products summerNewest products summer
Newest products summerPattye255
 
Final Powerpoint
Final PowerpointFinal Powerpoint
Final Powerpointtlc6996
 
Building science 2 final report
Building science 2 final reportBuilding science 2 final report
Building science 2 final reportAlfred Tan
 
Relatoio contas sgu 2
Relatoio contas sgu 2Relatoio contas sgu 2
Relatoio contas sgu 2macoesapo
 
How to keep pace with mobile consumer expectations
How to keep pace with mobile consumer expectationsHow to keep pace with mobile consumer expectations
How to keep pace with mobile consumer expectationsTuan Anh Nguyen
 
state_of_app_downloads_and_monetization_2015_global
state_of_app_downloads_and_monetization_2015_globalstate_of_app_downloads_and_monetization_2015_global
state_of_app_downloads_and_monetization_2015_globalTuan Anh Nguyen
 
2015 10-06 Building Bridges Biomarker symposium FIMM Helsinki, Alain van Gool
2015 10-06 Building Bridges Biomarker symposium FIMM Helsinki, Alain van Gool2015 10-06 Building Bridges Biomarker symposium FIMM Helsinki, Alain van Gool
2015 10-06 Building Bridges Biomarker symposium FIMM Helsinki, Alain van GoolAlain van Gool
 
2016 06 Radboud Technology Centers
2016 06 Radboud Technology Centers2016 06 Radboud Technology Centers
2016 06 Radboud Technology CentersAlain van Gool
 
Relatoio contas sgu 2
Relatoio contas sgu 2Relatoio contas sgu 2
Relatoio contas sgu 2macoesapo
 
Fashion ecommerce 2015
Fashion ecommerce 2015Fashion ecommerce 2015
Fashion ecommerce 2015Dario Schilman
 

Destaque (20)

Sviesuva vaizdine medziaga svietiejams 1 dalis 2013
Sviesuva vaizdine medziaga svietiejams 1 dalis 2013Sviesuva vaizdine medziaga svietiejams 1 dalis 2013
Sviesuva vaizdine medziaga svietiejams 1 dalis 2013
 
Vaizdine metodine medziaga svietejams 7 dalis sveiko zmogaus kodas
Vaizdine metodine medziaga svietejams 7 dalis sveiko zmogaus kodasVaizdine metodine medziaga svietejams 7 dalis sveiko zmogaus kodas
Vaizdine metodine medziaga svietejams 7 dalis sveiko zmogaus kodas
 
Kaip rengti švietejiska paskaita.patarimai. 6 dalis
Kaip rengti švietejiska paskaita.patarimai. 6 dalisKaip rengti švietejiska paskaita.patarimai. 6 dalis
Kaip rengti švietejiska paskaita.patarimai. 6 dalis
 
2014 08-20 Radboudumc-Health Valley-LSH: Personalized Healthcare through inte...
2014 08-20 Radboudumc-Health Valley-LSH: Personalized Healthcare through inte...2014 08-20 Radboudumc-Health Valley-LSH: Personalized Healthcare through inte...
2014 08-20 Radboudumc-Health Valley-LSH: Personalized Healthcare through inte...
 
DJ Hay Landscape Architecture
DJ Hay Landscape ArchitectureDJ Hay Landscape Architecture
DJ Hay Landscape Architecture
 
201131065
201131065201131065
201131065
 
2016 09-12 Europe Biobanking Week, Vienna, Alain van Gool
2016 09-12 Europe Biobanking Week, Vienna, Alain van Gool2016 09-12 Europe Biobanking Week, Vienna, Alain van Gool
2016 09-12 Europe Biobanking Week, Vienna, Alain van Gool
 
Relatoio contas sgu 2
Relatoio contas sgu 2Relatoio contas sgu 2
Relatoio contas sgu 2
 
Satish_Reddy_resume
Satish_Reddy_resumeSatish_Reddy_resume
Satish_Reddy_resume
 
Newest products summer
Newest products summerNewest products summer
Newest products summer
 
Projektu ruosimo pagrindai
Projektu ruosimo pagrindaiProjektu ruosimo pagrindai
Projektu ruosimo pagrindai
 
Final Powerpoint
Final PowerpointFinal Powerpoint
Final Powerpoint
 
Building science 2 final report
Building science 2 final reportBuilding science 2 final report
Building science 2 final report
 
Relatoio contas sgu 2
Relatoio contas sgu 2Relatoio contas sgu 2
Relatoio contas sgu 2
 
How to keep pace with mobile consumer expectations
How to keep pace with mobile consumer expectationsHow to keep pace with mobile consumer expectations
How to keep pace with mobile consumer expectations
 
state_of_app_downloads_and_monetization_2015_global
state_of_app_downloads_and_monetization_2015_globalstate_of_app_downloads_and_monetization_2015_global
state_of_app_downloads_and_monetization_2015_global
 
2015 10-06 Building Bridges Biomarker symposium FIMM Helsinki, Alain van Gool
2015 10-06 Building Bridges Biomarker symposium FIMM Helsinki, Alain van Gool2015 10-06 Building Bridges Biomarker symposium FIMM Helsinki, Alain van Gool
2015 10-06 Building Bridges Biomarker symposium FIMM Helsinki, Alain van Gool
 
2016 06 Radboud Technology Centers
2016 06 Radboud Technology Centers2016 06 Radboud Technology Centers
2016 06 Radboud Technology Centers
 
Relatoio contas sgu 2
Relatoio contas sgu 2Relatoio contas sgu 2
Relatoio contas sgu 2
 
Fashion ecommerce 2015
Fashion ecommerce 2015Fashion ecommerce 2015
Fashion ecommerce 2015
 

Semelhante a Data Protection & Risk Management

GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? SecurityScorecard
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...Harrison Clark Rickerbys
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsHarrison Clark Rickerbys
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsHarrison Clark Rickerbys
 
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...Harrison Clark Rickerbys
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsUlf Mattsson
 
Browne Jacobson - Administrative and public law - October 2017
Browne Jacobson - Administrative and public law - October 2017Browne Jacobson - Administrative and public law - October 2017
Browne Jacobson - Administrative and public law - October 2017Browne Jacobson LLP
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislationUlf Mattsson
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare IndustryEMMAIntl
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by QualsysQualsys Ltd
 
The Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research communityThe Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research communityARDC
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Dione McBride, CISSP, CIPP/E
 
PLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalPLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalSofie van der Meulen
 
Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Axon Lawyers
 
What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...Brian Miller, Solicitor
 
Dataprotectionactnew13 12-11-111213033116-phpapp02
Dataprotectionactnew13 12-11-111213033116-phpapp02Dataprotectionactnew13 12-11-111213033116-phpapp02
Dataprotectionactnew13 12-11-111213033116-phpapp02tinkusing
 
Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Aaron Banham
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRCase IQ
 
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017CloudWATCH Consortium
 

Semelhante a Data Protection & Risk Management (20)

GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
 
Browne Jacobson - Administrative and public law - October 2017
Browne Jacobson - Administrative and public law - October 2017Browne Jacobson - Administrative and public law - October 2017
Browne Jacobson - Administrative and public law - October 2017
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislation
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare Industry
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
The Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research communityThe Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research community
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1
 
PLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalPLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics final
 
Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics'
 
What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...
 
Dataprotectionactnew13 12-11-111213033116-phpapp02
Dataprotectionactnew13 12-11-111213033116-phpapp02Dataprotectionactnew13 12-11-111213033116-phpapp02
Dataprotectionactnew13 12-11-111213033116-phpapp02
 
Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPR
 
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
 

Mais de Endcode_org

IAB Online Content Regulation
IAB Online Content RegulationIAB Online Content Regulation
IAB Online Content RegulationEndcode_org
 
Electronic Contracting Presentation
Electronic Contracting PresentationElectronic Contracting Presentation
Electronic Contracting PresentationEndcode_org
 
E-contracting and Commerce
E-contracting and CommerceE-contracting and Commerce
E-contracting and CommerceEndcode_org
 
The Protection of Personal Information Act: A Presentation
The Protection of Personal Information Act: A PresentationThe Protection of Personal Information Act: A Presentation
The Protection of Personal Information Act: A PresentationEndcode_org
 
Consumer Protection
Consumer ProtectionConsumer Protection
Consumer ProtectionEndcode_org
 
Innovator's Guide to the IP Galaxy
Innovator's Guide to the IP GalaxyInnovator's Guide to the IP Galaxy
Innovator's Guide to the IP GalaxyEndcode_org
 
Mutual Non Disclosure Agreement (South Africa)
Mutual Non Disclosure Agreement (South Africa)Mutual Non Disclosure Agreement (South Africa)
Mutual Non Disclosure Agreement (South Africa)Endcode_org
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chettyEndcode_org
 

Mais de Endcode_org (8)

IAB Online Content Regulation
IAB Online Content RegulationIAB Online Content Regulation
IAB Online Content Regulation
 
Electronic Contracting Presentation
Electronic Contracting PresentationElectronic Contracting Presentation
Electronic Contracting Presentation
 
E-contracting and Commerce
E-contracting and CommerceE-contracting and Commerce
E-contracting and Commerce
 
The Protection of Personal Information Act: A Presentation
The Protection of Personal Information Act: A PresentationThe Protection of Personal Information Act: A Presentation
The Protection of Personal Information Act: A Presentation
 
Consumer Protection
Consumer ProtectionConsumer Protection
Consumer Protection
 
Innovator's Guide to the IP Galaxy
Innovator's Guide to the IP GalaxyInnovator's Guide to the IP Galaxy
Innovator's Guide to the IP Galaxy
 
Mutual Non Disclosure Agreement (South Africa)
Mutual Non Disclosure Agreement (South Africa)Mutual Non Disclosure Agreement (South Africa)
Mutual Non Disclosure Agreement (South Africa)
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chetty
 

Último

8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理bd2c5966a56d
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxPresentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxRRR Chambers
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnitymahikaanand16
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfKelechi48
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理Airst S
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理Airst S
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxca2or2tx
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...SUHANI PANDEY
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
Jim Eiberger Redacted Copy Of Tenant Lease.pdf
Jim Eiberger Redacted Copy Of Tenant Lease.pdfJim Eiberger Redacted Copy Of Tenant Lease.pdf
Jim Eiberger Redacted Copy Of Tenant Lease.pdfjimeibergerreview
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理Airst S
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理Airst S
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringSteering Law
 

Último (20)

8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxPresentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
Jim Eiberger Redacted Copy Of Tenant Lease.pdf
Jim Eiberger Redacted Copy Of Tenant Lease.pdfJim Eiberger Redacted Copy Of Tenant Lease.pdf
Jim Eiberger Redacted Copy Of Tenant Lease.pdf
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. Steering
 

Data Protection & Risk Management

  • 1. DATA PROTECTION AND RISK MITIGATION Understanding Data Protection Risks and the Law PRIA CHETTY ENDCODER/ ENDCODE.ORG
  • 2. CONTEXT: POPI Priority Issues IT systems and business tools (enterprise data, (know your) customer data, profiling, analytics, relationship management, financial, health ) Records management policies (creation, retention and destruction of records) Digital content ownership (users: personal data and intellectual property, rights and obligations) Database ownership(source of data, use of data, rights and obligations) Apps ownership (generation of user data: personal data and intellectual property, rights and obligations ) Young people (campaigns involving young people: special treatment of young people) Recommendations
  • 4. POPI: Priority Issues • Getting Serious about PoPI • Identification of Personal Data impacted and exempted • Identification of Business Systems impacted • Identification of Business Processes impacted • Information Security (Risk and Incident Management) • Identification of (Vital) Records • Classification of Records • Personal Information and Intellectual Property • Technological Innovation and Privacy
  • 5. POPI and Advertising and Marketing • Know Your Customer • Know Your Channel • Know Your Platform • Risks associated with Digital Opportunities • Risks associated with Innovation Opportunities • Data Risks Management: Privacy and Intellectual Property (incl. copyright), Information Security and Records Management
  • 6. IT / IS systems and business tools • Accountability Principle (s8 POPI) • Responsible Party to process PI in satisfaction of conditions of PoPI The responsible party must ensure that the conditions set out in this Chapter, and all the measures that give effect to such conditions, are complied with at the time of the determination of the purpose and means of the processing and during the processing itself. Section 8 The Protection of Personal Information Act 4 of 2013 • Processing Limitation (Condition 2 PoPI) and Further Processing for compatible purposes (Condition 4) • Quality of Information (Condition 5 of PoPI)
  • 7. IT / IS systems and business tools • Security Safeguards • Security measures on integrity and confidentiality of personal information (s19 of PoPI) • Data under my control has been breached, now what? • Notification to Data Subject (s22 POPI) • Notification to Information Regulator (s22 POPI) • Unauthorised access to data is a crime A person who intentionally accesses or intercepts any data without authority or permission to do so, is guilty of an offence. A person who intentionally and without authority to do so, interferes with data in a way which causes such data to be modified, destroyed or otherwise rendered ineffective is guilty of an offence Section 86 (1) and (2) Electronic Communications and Transactions Act 25 of 2002
  • 8. IT systems and the Cloud Information processed by Operator or person acting under authority Security measures regarding information processed by operator Cross-border transfer policy 5 Conditions of Cross-border Transfer (S72 POPI) • The third party who receives the information is subject to a law, binding corporate rules or agreement which provide an adequate level of protection that effectively upholds the principles for processing of information that are similar to those in POPI, and includes provisions that are similar to POPI in relation to the further transfer of personal information from the recipient to third parties in a foreign country; • The person consents to the transfer; • The transfer is necessary for the performance of a contract between you and the person, or for pre-contractual measures taken at the request of the person whose information is being transferred; • The transfer is necessary for the conclusion or performance of a contract between you and a third party that is in the interest of the person; or • The transfer is for the benefit of the person whose information is collected, and it is not reasonably practical to obtain the consent of the person and, if it were reasonably practical to obtain such consent, the data subject would likely give it.
  • 9. Records Management Policies • Accountability Principle • Responsible Party to protect integrity of PI (s8 POPI) • Outdated information • Restriction on records (s14 POPI) • Openness • Documentation (s17 • Access to Personal Information (s23 of PoPI) • Accuracy & Correction of information • Restriction of Records (s14 POPI) • Right to correct PI (s24 POPI) A responsible party must take reasonably practicable steps to ensure that the personal information is complete, accurate, not misleading and updated where necessary. Section 16 The Protection of Personal Information Act 4 of 2013 • De-identification/Deletion of information • Exclusion (s6 POPI) • As soon as no longer authorised to have PI (s14 POPI)
  • 10. Records Management Policies • Losing personal information • Notification to Data Subject & Regulator (s22 POPI) • International Best Practices for records management • European Directive on Data Protection • Right to Access Information Records • Promotion of Access to Information Act 2 of 2000 (PAIA) • Data Subject participation (s23 POPI)
  • 11. Digital Content Ownership Who Owns Digital Content • Do you own your own digital content? “There are not yet statutory laws around ownership of virtual goods, nor is there case law.” The Guardian “In most cases you are effectively leasing the content, not buying it.” The Guardian "You will not transfer your account to anyone without first getting our written permission" Facebook's terms and conditions
  • 12. Digital Content Ownership • Should the subject of the digital content own the own digital content? “What are these people going to do with that data? They’re going to target you with an ad which makes you feel a bit queasy. Targeted adverts are not the future.” Sir Tim Berners-Lee in The Guardian “If you give [people] the ability to see how [data is] used and you ban its misuse then people are much more happy to open up to their data being used.” Sir Tim Berners-Lee in The Guardian
  • 13. Database Ownership Databases & Copyright • Definition of ‘literary work’ in Copyright Act 98 of 1978 includes compilations stored or embodied in a computer or medium used with a computer (s1) • Originality in selection or arrangement • Labour & Skill • Owner of copyright to database has exclusive rights Databases & POPI • Databases of personal information fall under POPI and must be protected by the Responsible Party • Directories (s70 POPI)
  • 15. Apps Ownership Apps & Copyright • An App is a computer program “computer program” means a set of instructions fixed or stored in any manner and which, when used directly or indirectly in a computer, directs its operation to bring about a result” Section 1 The Copyright Act 98 of 1978 • Computer programs are copyright protected (not patantable) “Anything which consists of (amongst others) a computer program shall not be an invention for the purposes of this Act” Section 25(2) The Patents Act 57 of 1978
  • 16. App Ownership • Data Protection for Apps • Owners of App are responsible for protection of data collected • Think of all of the information an App can collect about you • Health & sport monitoring apps • Medical apps • Messaging apps
  • 17. Younge People & Data Protection https://www.flickr.com/photos/malias/
  • 18. Younge People & Data Protection • POPI – ‘Competent Person’ • Protection of Personal information of children by Responsible Party A responsible party may, subject to section 35, not process personal information concerning a child. Section 34 The Protection of Personal Information Act 4 of 2013 • Exceptions (s35 POPI) • Consent from the competent person • Necessary for establishment, exercise or defence of a right or obligation in law • Necessary to comply with an obligation of international public law • historical, statistical or research purposes
  • 19. Recommendations • Appointment of Information Officer: Enterprise • Appointment of a Risk and Compliance Manager: Agencies • PoPI Audit (Client) PoPI Audit (Project) • Intellectual Property Audit • Information Security Audit • Privacy Policy • Information Security Policy • Intellectual Property Policy • Innovation Management Different rules for different channels, platforms, data sources and applications
  • 20. Pria Chetty Pria.chetty@endcode.org endcode.org THANKS, QUESTIONS?
  • 21. References • http://ico.org.uk/for_organisations/data_protection/security_measures) • http://www.theguardian.com/money/2012/sep/03/do-you-own-your-digital-content • http://www.theguardian.com/technology/2014/oct/08/sir-tim-berners-lee-speaks-out-on-data-ownership? CMP=ema_827 • http://www.bizcommunity.com/Article/75/542/98352.html • http://ico.org.uk/Youth

Notas do Editor

  1. As technology legal advisors considering social media law and its impact on businesses, we’re particularly interested in the point at which conversation becomes publication. The very act of conversing online equates to publication which in the legal realm introduces a host of rights and obligations. Of even greater legal importance is the content that makes up that conversation and the implications it has for the creator, compiler, the poster, the hoster, the storer and the recipient of that content. In short, each link in what the law regards as “the chain of publication” carries legal implications.