Protection of Private Information (PoPI) Act

Why the need for Privacy?
Data privacy
Protection of Private
Information Act:
Prepare, Protect and Prevent
Processing
personal
information
enables your
business
Processing
personal
information
enables your
business
Processing
personal
information
enables your
business
PoPI in a nutshell
Privacy questions to consider
Accountability
Comliance with the law
Processing limitation
• Process the minimum required personal
information, obtain it directly from the Data
Subject when possible obtain their consent
for processing
Purpose specification
• Collect personal information for a specific
purpose, retain it only for as long as required
and destroy securely once it is no longer
required
Further processing limitation
• Further processing of information must
be compatible with the original purpose of
collection
Information quality
• Personal information processed is complete,
accurate, not misleading and updated where
necessary
Global outlook
Openness
• Personal information processing operations
are documented and publicly available
The diverse and complex privacy landscape makes
effective privacy risk management and compliance
a big challenge for organisations. Significant
discrepancies exist in the laws across jurisdictions, as
shown in the diagram below.
Security safeguards
• Security measures are in place to safeguard
information processed by the Responsible
Party or their third parties. Breaches
should be communicated to the Information
Regulator and the Data Subjects
2016
Data subject participation
Other significant privacy laws in place
National privacy or data protection law in place
Emerging privacy or data laws
No privacy or data protection law in place
The South African reality
The Protection of
Personal Information
Act, No. 4 of 2013 (PoPI)
was signed into law on
26 November 2013. In
April 2014, provisions
for establishing the
Information Regulator
(sections 1, 39 to
54 and 112 and
113) commenced.
Nominations for
appointing the five
members of the
Information Regulator
were closed on 14
August 2015. Once the
Information Regulator
is established, they will
give notice in the Gazette
of operation dates for
further sections of
PoPI. Organisations will
have one year from the
gazetted date to comply
with these requirements.
PoPI will have a
significant impact on the
control environments
of organisations that
process Personal
Information: from
amending contractual
agreements with
employees, vendors
and suppliers, to the
implementation of
technical information
security measures to
protect information
processed by an
organisation. The
definition of processing
by PoPI is wide: it refers
to all stages of the
Personal Information
lifecycle: from collection
to destruction of
information.
• Data Subjects can inquire about the Personal
Information held by the Responsible Party
and can request the correction or deletion
of that information when it is incorrect or no
longer relevant
Value of getting it right
What can go wrong
• Protect brand, reputation and
customer confidence
• Enhance customer experience,
drive sales, margin and
shareholder value
• Achieve and maintain legal
and regulatory compliance.
Minimise risk of regulator fines
• Enhance employee trust by
respecting their personal data
• Minimise data incidents and
associated management costs
• Awareness of thecontrols used
by third party suppliers
• Enable business with countries
with data protection laws (e.g.
EU countries)
• According to the Ponemon Institute*, the
value of brand and reputation could decline as
much as 17 percent to over 31 percent
• Tax-related identity theft was the most
common form of identity theft (33% of overall
complaints) reported to the U.S. Federal Trade
Commission in 2014. It costs the U.S. Internal
Revenue Service billions of dollars every year:
$5.2B loss and $24.2B cases detected on
time in 2014
• The loss of an unencrypted, non-password
protected, portable hard drive storing
prisoner information resulted to the regulator
imposing a £180,000 fine to the UK Ministry
of Justice.
• In 2013 SA banks suffered tens of millions
of losses due to a major breach of customer
credit card data that originated from fast food
merchants IT infrastructure
• The UK Information Commissioner fined
NHS Surrey with £200,000 for not ensuring
that the third party they used for destroying
old hard drives was complying with the UK
regulation
• The new EU General Data Protection
Regulation will have jurisdiction over foreign
companies active in the European market
which “handle Europeans’ personal data
abroad”. No compliance may have great
impact
• PoPI provisions
• Criminal penalties
• Administrative penalties
• Enforcement notices
*Ponemon Institute, Reputation Impact of a Data Breach, November 2011
Marketing
Human
Resources
Procurement
Suppliers
IT and
Security
Cross border
data
transfers
• Do you use data to analyse trends in consumer
behaviour?
• Do you use data obtained from social media or
applications to learn more about your consumers?
• Are you targeting specific groups of consumers?
• Do you collect sensitive personal data such as race ,
disabilities or medical information?
• Do you have privacy notices in your contracts?
• Do you collect information on minors /
beneficiaries?
• Do you share employee information with suppliers
such as health insurance companies and provident
funds?
• What agreements with third parties do you have in
place to ensure that they are protecting your data
appropriately?
• How do you gain assurance over third parties?
• What personal information do you store? Where?
Who has access to it? Do you encrypt it?
• What is the overall state of information security in
your organisation?
• Do you have an Information Security Framework and
is it implemented across the organisation?
• Do you get assurance from the performance of
Information Security in your organisation?
• Are you sending personal data (including employee
data) outside South Africa? Do you have appropriate
mechanisms to do so?
If any of these questions raise concerns, you should conduct a Privacy
Impact Assessment to assess your privacy risks.
What should organisations be doing?
Current
state
assessment
• Understand your current compliance position and
undertake a Privacy Impact Assessments where
appropriate
• Assess your key gaps against the requirements of
PoPI and prioritise them based on risk
Privacy
improvement
programme
• Develop a prioritised plan for
remediation based on risk to your
organisation and identify quick wins
• Implement remediation activities
Monitoring
and
assurance
• Establish data protection monitoring
for core business operations and
third parties (e.g., regular audits,
develop metrics and dashboards)
EY privacy services
Privacy is not simply about understanding the law: it is also about
implementing it. EY has the breadth of skillset to assist you in this
journey. We have experience in the following areas
• Privacy Impact Assessments
• Privacy compliance roadmaps
• Privacy frameworks
• Personal information inventories
• Control environment improvement
• Training and Awareness workshops
• Consultation on contracts: privacy clauses and terms and
conditions
• Broad skillset in the Cyber Security area:
• Information security framework reviews and
implementation
• Documentation of policies and procedures
• Technical information security reviews (attack and
penetration testing, vulnerability management,
configuration reviews)
• Privacy control review and assurance
1
Identify and
diagnose
2
Design and
implement
3
Assure
Contacts:
Raghuvansh Swami | Director | Advisory Services
Office: +27 11 772 3752 | Mobile: +27 83 611 1212
Email: [email protected]
Yvette du Toit| Senior Manager | Advisory Services – Data Privacy
Office: +27 11 772 3265 | Mobile: +27 82 719 1821
Email: [email protected]
Why EY?
• EY has a team of over 200 Certified Information Privacy
Professionals (CIPPs) who have developed methodologies to help
organisations understand what risks exist to data privacy and
compliance.
• For over a decade, EY has been assisting international
organisations with understanding privacy and data protection
risk, compliance and regulations and helping them effectively
manage the use of personal information within their
organisation.
• We draw on our global privacy team to bring insights on
legislation and regulation across the world.
• We have published a number of Privacy Thought Leadership.
• ‘EY was rated equal highest in Forrester’s Information Security
Consulting Services Wave in terms of its privacy services’ The
Forrester Wave™: Information Security Consulting Services, Q1
2013, Forrester Research, Inc.