Subscribe

POPI: The race to data safety

* By Gregory Anderson, country manager, Trend Micro South Africa

* The passing of the Protection of Personal Information Act (POPI) into South African law in 2013 and the imminent appointment of an information regulator has forced local businesses to sit up and listen, as they are given a deadline of a year to comply.


Johannesburg, 05 Jun 2015
Gregory Anderson, country manager, Trend Micro South Africa
Gregory Anderson, country manager, Trend Micro South Africa

Relax - the effective date for POPI is not set in stone. POPI became an Act of Parliament in 2013; however, it will only come into effect by proclamation by the president Jacob Zuma in the Government Gazette. So, from the date of the president's proclamation, companies - no matter their size - will have one year to make the necessary changes to become POPI compliant.

However, the president has already proclaimed certain sections of POPI into effect, specifically the section that provides for the establishment of an information regulator to oversee and enforce the provisions of POPI. It is suspected that once said regulator has been established, the president will proclaim the rest of the provisions of POPI into effect.

There is currently no clue as to when this date may be; however, it has been predicted that it could be towards the end of this year. Nevertheless, you should already be thinking about - if not implementing - the necessary changes, says Gregory Anderson, country manager of Trend Micro South Africa.

Knowing it is coming is all good and well, but do you know what POPI is and how it affects your business?

Introducing POPI

For argument's sake, let's pretend you been have living under a rock and that you have no idea what POPI is. In this case, you would need to know that the POPI Act is an all-inclusive piece of legislation which aims to regulate the processing (see the very detailed definition of this word in the Act) of personal information.

POPI outlines personal information as any information relating to an identifiable, living natural or juristic person and includes but is not limited to contact details, demographic information, history, biometric information, opinions of and about a person or private correspondence (like e-mail). Those that fail to comply with POPI in the set time limit - and that don't apply for and receive an extension - may be subjected to fines of up to R10 million and even jail time.

One of the eight conditions established by POPI in order for the processing of personal data to be lawful is that reasonable security measures be applied to protect it. So the short answer to companies that wonder if POPI will affect them is: If you have customers, partners or staff and you have any of their personal information stored in your database then POPI definitely applies to you.

The next logical question then is: how safe is your data?

Safeguarding your data

POPI makes it obligatory for companies to do what IT security vendors have been preaching for years: put the security of data first. Because of POPI, local companies will need to better protect and manage the personal records and information they process. This pertains to information of their customers and clients, but it also concerns every employee in their service.

In the technology and information age we live in, POPI can be seen as a starting point for businesses and professionals who want to take stock of how they handle and subsequently govern this valuable business asset. With cyber crime incidents increasing and gaining complexity, and trends like cloud, BYOD as well as the Internet of everything in full swing, there are a lot of information channels that need to be secured within any organisation's network.

In addition to this information 'stock take', it is a good idea to map out how you - as a company - plan to meet the legal requirements of POPI. This is an especially vital step when it comes to the security of company data; do you know what security measures you have in place? Do you have in place a holistic security solution that covers you from end-to-end?

Have you taken measures towards data loss prevention and encryption in your business? Technologies like Trend Micro Integrated DLP (data loss prevention) protect your company data from endpoint to cloud based on the polices set up on what data can leave the organisation, while encryption technologies like Trend Micro Endpoint Encryption provide full disk, file encryption and data protection.

Technologies that are designed to protect your business in the cloud and at the virtual layer can protect your company data. Trend Micro Deep Security is a robust solution for cloud computing and virtual environments because it enables the user to take advantage of "better-than-physical" protection. It is a single platform that integrates all security technologies and in turn is able to resolve any operational issues that may arise in the virtual environment.

Trend Micro's Deep Security Solution delivers comprehensive, adaptive, highly efficient, agentless and agent-based protection, including anti-malware, intrusion detection and prevention, firewall, Web application protection, integrity monitoring and log inspection. With Deep Security, businesses will be aware of security breaches and will have advanced protection for physical, virtual and cloud servers.

The protection of data should have always been a company priority because a data breach not only puts your clients and customers at risk, it risks the reputation of your entire business. Every person who trusts you with their data is essentially placing in you a belief that it will be protected, and once that information is breached, the trust is gone for good, and you will be left in despair as clients and customers turn their backs on your business. Are you willing to risk that?

Share

Trend Micro

Trend Micro (TYO: 4704), a global leader in security software, strives to make the world safe for exchanging digital information. Its solutions for consumers, businesses and governments provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. Leveraging these solutions, organisations can protect their end-users, their evolving data centre and cloud resources, and their information threatened by sophisticated targeted attacks.

All solutions are powered by cloud-based global threat intelligence, the Trend Micro Smart Protection Network, and are supported by over 1 200 threat experts around the globe.

For more information, visit www.trendmicro.com.

Editorial contacts

Charlene Carroll
Anti-Clockwise
(+27) 11 314 2533
Charlene@anticlockwise.co.za