SlideShare a Scribd company logo
1 of 22
Be aware of the Privacy and Protection of Personal Information (PPI) laws that apply to your organisation John Giles ICT lawyer john@michalsons.com 083 322 2445 t.	086 011 1245 skype. 	johngiles  www.OnlineLegal.co.za www.MichalsonsAttorneys.com
Thank you
The goal today
King III
What must your organisation comply with? “the board should ensure that the company complies with IT laws and that IT related rules, codes and standards are considered.“
Ignorance of the law is no excuse You should have a working understanding of the effect of the applicable laws, rules, codes and standards on the company and its business. The induction and ongoing training programmes should incorporate an overview of and any changes to applicable laws, rules, codes and standards. You should sufficiently familiariseyourself with the general content of applicable laws, rules, codes and standards to discharge your legal duties. You should understand the context of the law, and how other applicable laws interact with it.
Who needs to be aware? CAE CRO Legal CO CIO
Impossible Task?
Overwhelmed?
The benefits of being aware?
FinlandPersonal DP Act In force 1 June 1999 NorwayPersonal D Reg Act In force 14 April 2000 DenmarkAct on Processing f PD In force 1 July 2000 SwedenPersonal Data Act In force 24 October 1998 Ireland*- Bill to be approved BelgiumData  Protection Act In force 1 Sep 2001 United KingdomData ProtectionAct In force 1 March 2000 Germany*- Bill to be approved Luxembourg* - Bill to be approved AustriaData Protection Act In force 1 January  2000 NetherlandsPersonal DP Act In force June 2001 CanadaPIP&ED Act Commenced 1 Jan 2001 ItalyData Protection Act In force 8 May 2000 MexicoeCommerce Act In force 7 June 2000 France*- Bill to be approved United States (Federal)CPP Act 1984 VPP Act 1988 COPP Act 1998 In force 21 April 2000 HIPA Act In force 14 April 2001 GLB Act In force 1 July 2001 ‘General’ Act In consideration SpainData Protection Act In force 14 January 2000 AustraliaPrivacy Act In force 21 Dec 2001 Hong KongPersonal Data (Privacy) In force 20 Dec 1996 GreeceProtection Processing PD  In force 10 April 1997 New ZealandPrivacy Act In force 1 July 1993 PortugalPersonal DP Act In force 27 October 1998 TaiwanComputer Processed DP In force 11 August 1995 South KoreaeCommerce Act In force January 1999 Eastern EuropeEstonia(96) Poland (98)Solovak (98)  Slovenia(99)  Hungary (99)Czech(00)  Latvia(00) Lithuania (00) SwitzerlandData Protection Act In force 1 June 1999 Global PerspectiveNational Private Sector Privacy Protection  SOUTH AFRICA?
An Information System
Section 14(d) of the Constitution “14. Everyone has the right to privacy, which includes the right not to have-  (d) the privacy of their communications infringed.”… Limitations
Common lawChildren’s ActCustoms and Excise Act
National Credit Act Confidential Information section 1 ‘personal information that belongs to a person and is not generally available to or known by others’ Section 68 Still stands – not repealed by PPI Bill
ECT Act
PAI Act
RICA
PPI Bill
To ask questions and find the detail
Thank you John Giles john@michalsons.com Michalsons Attorneys can help apply ICT laws to your specific circumstances www.MichalsonsAttorneys.com “ICT Law with Insight” Copyright © Michalsons 2002-2009 The information contained in this presentation is subject to change without notice. Michalsons makes no warranty with regard to the material, including the implied warranties of fitness for a particular purpose. Michalsons will not be liable for errors or for incidental or consequential damages in connection with this material. This document contains proprietary information that is protected by copyright. All rights are reserved. No part of this document may be photocopied, reproduced, or translated to another language without the prior written consent of Michalsons.  This document is an unpublished work protected by the copyright laws and is proprietary to Michalsons. Disclosure, copying, reproduction, merger, translation, modification, enhancement, or use by any unauthorised person without the prior written consent of Michalsons is prohibited.  Contact John Giles at john@Michalsons.com for permission to copy.

More Related Content

What's hot

The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To KnowEamonnORagh
 
Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...Werksmans Attorneys
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Clyrofor popia readiness webinar
Clyrofor  popia readiness webinarClyrofor  popia readiness webinar
Clyrofor popia readiness webinarLesedi Mnisi
 
POPI Act compliance presentation
POPI Act compliance presentationPOPI Act compliance presentation
POPI Act compliance presentationOvationsGroup
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection ActSaimaRafiq
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Saying "I Don't": the requirement of data subject consent for purposes of dat...
Saying "I Don't": the requirement of data subject consent for purposes of dat...Saying "I Don't": the requirement of data subject consent for purposes of dat...
Saying "I Don't": the requirement of data subject consent for purposes of dat...Werksmans Attorneys
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issuesSagar Rahurkar
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Put your left leg in, put your left leg out: the exclusions and exemptions of...
Put your left leg in, put your left leg out: the exclusions and exemptions of...Put your left leg in, put your left leg out: the exclusions and exemptions of...
Put your left leg in, put your left leg out: the exclusions and exemptions of...Werksmans Attorneys
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 

What's hot (20)

The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To Know
 
Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Clyrofor popia readiness webinar
Clyrofor  popia readiness webinarClyrofor  popia readiness webinar
Clyrofor popia readiness webinar
 
POPI Act compliance presentation
POPI Act compliance presentationPOPI Act compliance presentation
POPI Act compliance presentation
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Saying "I Don't": the requirement of data subject consent for purposes of dat...
Saying "I Don't": the requirement of data subject consent for purposes of dat...Saying "I Don't": the requirement of data subject consent for purposes of dat...
Saying "I Don't": the requirement of data subject consent for purposes of dat...
 
The Protection of Personal Information Act 4 of 2013
The Protection of Personal Information Act 4 of 2013The Protection of Personal Information Act 4 of 2013
The Protection of Personal Information Act 4 of 2013
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
The Popi Act 4 of 2013 - Implications for iSCM
The Popi Act 4 of 2013 - Implications for iSCMThe Popi Act 4 of 2013 - Implications for iSCM
The Popi Act 4 of 2013 - Implications for iSCM
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
 
POPI Seminar FINAL
POPI Seminar FINALPOPI Seminar FINAL
POPI Seminar FINAL
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
POPI Update 2013
POPI Update 2013POPI Update 2013
POPI Update 2013
 
Put your left leg in, put your left leg out: the exclusions and exemptions of...
Put your left leg in, put your left leg out: the exclusions and exemptions of...Put your left leg in, put your left leg out: the exclusions and exemptions of...
Put your left leg in, put your left leg out: the exclusions and exemptions of...
 
POPI
POPI POPI
POPI
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 

Similar to Privacy and Protection of Personal Information law seminar

Be aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailBe aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailLance Michalson
 
Legislation
LegislationLegislation
Legislationmegabyte
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Lumension
 
GDPR: the legal aspects. By Matthias of theJurists Europe.
GDPR: the legal aspects. By Matthias of theJurists Europe.GDPR: the legal aspects. By Matthias of theJurists Europe.
GDPR: the legal aspects. By Matthias of theJurists Europe.Matthias Dobbelaere-Welvaert
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 
Lexing Barcelona Conference
Lexing Barcelona ConferenceLexing Barcelona Conference
Lexing Barcelona ConferenceMarc Gallardo
 
Data theft rules and regulations things you should know (pt.1)
Data theft rules and regulations  things you should know (pt.1)Data theft rules and regulations  things you should know (pt.1)
Data theft rules and regulations things you should know (pt.1)Faidepro
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkMatt Siltala
 
Advanced Data Protection training for volunteers
Advanced Data Protection training for volunteersAdvanced Data Protection training for volunteers
Advanced Data Protection training for volunteersParkinson's UK
 
高谷知佐子講演_PERSONAL DATA AND PRIVACY ISSUES IN CROSS-BORDER M&A PROCESS Japan ca...
高谷知佐子講演_PERSONAL DATA AND PRIVACY ISSUES IN CROSS-BORDER M&A PROCESS Japan ca...高谷知佐子講演_PERSONAL DATA AND PRIVACY ISSUES IN CROSS-BORDER M&A PROCESS Japan ca...
高谷知佐子講演_PERSONAL DATA AND PRIVACY ISSUES IN CROSS-BORDER M&A PROCESS Japan ca...mhmjapan
 
The International Comparative Legal Guide to: Data Protection 2014
The International Comparative Legal Guide to: Data Protection 2014The International Comparative Legal Guide to: Data Protection 2014
The International Comparative Legal Guide to: Data Protection 2014Hogan Lovells BSTL
 
Everything you need to know about the GDPR
Everything you need to know about the GDPREverything you need to know about the GDPR
Everything you need to know about the GDPRSpoon London
 
Computer Legislation2 T2
Computer Legislation2  T2Computer Legislation2  T2
Computer Legislation2 T2lees_ush
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer PrivacyAshish Jain
 
Know your rights protection against facial recognition software.
Know your rights  protection against facial recognition software.Know your rights  protection against facial recognition software.
Know your rights protection against facial recognition software.Diganth Raj Sehgal
 
SIM - Mc leod ch10
SIM - Mc leod ch10SIM - Mc leod ch10
SIM - Mc leod ch10Welly Tjoe
 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdfMeshalALshammari12
 

Similar to Privacy and Protection of Personal Information law seminar (20)

Be aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailBe aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to email
 
Legislation
LegislationLegislation
Legislation
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
GDPR: the legal aspects. By Matthias of theJurists Europe.
GDPR: the legal aspects. By Matthias of theJurists Europe.GDPR: the legal aspects. By Matthias of theJurists Europe.
GDPR: the legal aspects. By Matthias of theJurists Europe.
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
Lexing Barcelona Conference
Lexing Barcelona ConferenceLexing Barcelona Conference
Lexing Barcelona Conference
 
Data theft rules and regulations things you should know (pt.1)
Data theft rules and regulations  things you should know (pt.1)Data theft rules and regulations  things you should know (pt.1)
Data theft rules and regulations things you should know (pt.1)
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David Mink
 
Advanced Data Protection training for volunteers
Advanced Data Protection training for volunteersAdvanced Data Protection training for volunteers
Advanced Data Protection training for volunteers
 
高谷知佐子講演_PERSONAL DATA AND PRIVACY ISSUES IN CROSS-BORDER M&A PROCESS Japan ca...
高谷知佐子講演_PERSONAL DATA AND PRIVACY ISSUES IN CROSS-BORDER M&A PROCESS Japan ca...高谷知佐子講演_PERSONAL DATA AND PRIVACY ISSUES IN CROSS-BORDER M&A PROCESS Japan ca...
高谷知佐子講演_PERSONAL DATA AND PRIVACY ISSUES IN CROSS-BORDER M&A PROCESS Japan ca...
 
The International Comparative Legal Guide to: Data Protection 2014
The International Comparative Legal Guide to: Data Protection 2014The International Comparative Legal Guide to: Data Protection 2014
The International Comparative Legal Guide to: Data Protection 2014
 
Everything you need to know about the GDPR
Everything you need to know about the GDPREverything you need to know about the GDPR
Everything you need to know about the GDPR
 
Computer Legislation2 T2
Computer Legislation2  T2Computer Legislation2  T2
Computer Legislation2 T2
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
Know your rights protection against facial recognition software.
Know your rights  protection against facial recognition software.Know your rights  protection against facial recognition software.
Know your rights protection against facial recognition software.
 
PL&B _UK_80
PL&B _UK_80PL&B _UK_80
PL&B _UK_80
 
GPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-RightGPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-Right
 
SIM - Mc leod ch10
SIM - Mc leod ch10SIM - Mc leod ch10
SIM - Mc leod ch10
 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdf
 
Data protection
Data protectionData protection
Data protection
 

Recently uploaded

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 

Recently uploaded (20)

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 

Privacy and Protection of Personal Information law seminar

  • 1. Be aware of the Privacy and Protection of Personal Information (PPI) laws that apply to your organisation John Giles ICT lawyer john@michalsons.com 083 322 2445 t. 086 011 1245 skype. johngiles www.OnlineLegal.co.za www.MichalsonsAttorneys.com
  • 5. What must your organisation comply with? “the board should ensure that the company complies with IT laws and that IT related rules, codes and standards are considered.“
  • 6. Ignorance of the law is no excuse You should have a working understanding of the effect of the applicable laws, rules, codes and standards on the company and its business. The induction and ongoing training programmes should incorporate an overview of and any changes to applicable laws, rules, codes and standards. You should sufficiently familiariseyourself with the general content of applicable laws, rules, codes and standards to discharge your legal duties. You should understand the context of the law, and how other applicable laws interact with it.
  • 7. Who needs to be aware? CAE CRO Legal CO CIO
  • 10. The benefits of being aware?
  • 11. FinlandPersonal DP Act In force 1 June 1999 NorwayPersonal D Reg Act In force 14 April 2000 DenmarkAct on Processing f PD In force 1 July 2000 SwedenPersonal Data Act In force 24 October 1998 Ireland*- Bill to be approved BelgiumData Protection Act In force 1 Sep 2001 United KingdomData ProtectionAct In force 1 March 2000 Germany*- Bill to be approved Luxembourg* - Bill to be approved AustriaData Protection Act In force 1 January 2000 NetherlandsPersonal DP Act In force June 2001 CanadaPIP&ED Act Commenced 1 Jan 2001 ItalyData Protection Act In force 8 May 2000 MexicoeCommerce Act In force 7 June 2000 France*- Bill to be approved United States (Federal)CPP Act 1984 VPP Act 1988 COPP Act 1998 In force 21 April 2000 HIPA Act In force 14 April 2001 GLB Act In force 1 July 2001 ‘General’ Act In consideration SpainData Protection Act In force 14 January 2000 AustraliaPrivacy Act In force 21 Dec 2001 Hong KongPersonal Data (Privacy) In force 20 Dec 1996 GreeceProtection Processing PD In force 10 April 1997 New ZealandPrivacy Act In force 1 July 1993 PortugalPersonal DP Act In force 27 October 1998 TaiwanComputer Processed DP In force 11 August 1995 South KoreaeCommerce Act In force January 1999 Eastern EuropeEstonia(96) Poland (98)Solovak (98) Slovenia(99) Hungary (99)Czech(00) Latvia(00) Lithuania (00) SwitzerlandData Protection Act In force 1 June 1999 Global PerspectiveNational Private Sector Privacy Protection SOUTH AFRICA?
  • 12.
  • 14. Section 14(d) of the Constitution “14. Everyone has the right to privacy, which includes the right not to have- (d) the privacy of their communications infringed.”… Limitations
  • 16. National Credit Act Confidential Information section 1 ‘personal information that belongs to a person and is not generally available to or known by others’ Section 68 Still stands – not repealed by PPI Bill
  • 19. RICA
  • 21. To ask questions and find the detail
  • 22. Thank you John Giles john@michalsons.com Michalsons Attorneys can help apply ICT laws to your specific circumstances www.MichalsonsAttorneys.com “ICT Law with Insight” Copyright © Michalsons 2002-2009 The information contained in this presentation is subject to change without notice. Michalsons makes no warranty with regard to the material, including the implied warranties of fitness for a particular purpose. Michalsons will not be liable for errors or for incidental or consequential damages in connection with this material. This document contains proprietary information that is protected by copyright. All rights are reserved. No part of this document may be photocopied, reproduced, or translated to another language without the prior written consent of Michalsons. This document is an unpublished work protected by the copyright laws and is proprietary to Michalsons. Disclosure, copying, reproduction, merger, translation, modification, enhancement, or use by any unauthorised person without the prior written consent of Michalsons is prohibited. Contact John Giles at john@Michalsons.com for permission to copy.

Editor's Notes

  1. Thank you for being here and welcome. This is not the reaction that I hope I get from you. When considering attending a presentation by a lawyer talking about the law, many people think boring. I hope you enjoy the seminar and that you become more aware of [ICT/email/PPI] laws that ply to your organisation. Before we continue I’d like to get a better idea of the audience and who is here. Who is a director? Auditors and assurance providers?Any risk managers?How many CIOs or IT managers?How many compliance officers are there? How many Governance officers?Information Officers?IT Security officers?Are there any lawyers or legal advisors in the audience?