Information Security

Do not click on that link – it might be a phishing email

Many people have been swindled out of their hard-earned money due to lack of information on fraud.  On a daily basis, fraudsters prowl the internet in search of their next victim. Do not become the next victim!  The rule of thumb is “if an offer looks too good to be true, it probably is.” Joe received an email on his [...]

By | 8th February, 2019|Consumer Law, Contract Law, Cybersecurity, Information Security, PPM Attorneys|

SEND NUDES

While most people chuckle at the “send nudes” gifs and memes that are an ongoing source of humour on the internet, for some, the tragic reality is that these nudes may ruin their lives.  People in relationships usually trust the person they’re with and could never imagine being betrayed by them.  However, the startling number of “revenge porn” cases evident [...]

Five Tips to a Successful Relationship with the GDPR

Have you ever downloaded an app on your phone and looked at the permissions that the app requests.  I mean I just want to play Tetris, why do you need permission to access my contact list and messages, or know what I ate for dinner? With the new the General Data Protection Regulation (“GDPR”), a move to the age of [...]

By | 9th January, 2019|Compliance Law, Cybersecurity, Data Protection, GDPR, Information Security, Privacy Law|

That’s how the cookie crumbles…

No, I don’t mean those midnight snacks you’ve been sneaking.  Cookies are small files which are stored on a user's computer.  They are designed to hold a small amount of data specific to a particular user and website that can be accessed either by the web server or the client computer. This allows the server to deliver a page tailored [...]

GDPR: Data Protection Impact Assessments

While there are many similarities between the Protection of Personal Information Act 4 of 2013 (“POPIA”) and the General Data Protection Regulations, (“GDPR”) there are also many differences.  One of these differences is the obligation that GDPR places on organisations to conduct a Data Protection Impact Assessment (“DPIA”). What is a Data Protection Impact Assessment? This is a process that [...]

PRIVACY AND DIGNITY: A BALANCING ACT

Section 16 of the Constitution Everyone has the right to freedom of expression & the right to receive and impart information and ideas. Section 10 of the Constitution Everyone has the right to the protection of this dignity and reputation. Competing Rights Two competing rights which are upheld by the Constitution. Section 16 of the Constitution provides a broad guarantee [...]

By | 10th October, 2017|Information Security, PPM Attorneys|

POPI’s draft regulations have been published

They are simple and clear to understand. Don’t miss your opportunity to comment. Earlier this year, during a stakeholder briefing, South Africa’s Information Regulator chairperson promised to have draft Protection of Personal Information Act regulations out before the end of 2017.  She has kept her word: draft POPIA (the Information Regulator prefers this acronym) regulations were published on Friday 8 [...]

By | 11th September, 2017|Data Protection, Information Security, IP Law, PPM Attorneys, Privacy Law|

SNAP MAPS – DO YOU KNOW WHO KNOWS WHERE YOU ARE?

Snapchat, Facebook, and Instagram are some of the most popular social media platforms today.  One thing they have in common is that they track your location, sometimes without you even being aware. Snapchat is incredibly popular amongst the younger generation.  It allows individuals to send images and videos to each other that disappear after a certain amount of time.  On [...]

5 WAYS TO PROTECT PERSONAL INFORMATION WHILE USING CLOUD SOFTWARE

Cloud technology has significantly changed the way we transfer and store information. By allowing us to store our files in a space with no physical boundaries, cloud technology allows us to have access to any file at any time and from anywhere. The only downside is the additional privacy risks involved with using a cloud system. In terms of the [...]

By | 16th August, 2017|Data Protection, Information Security, PPM Attorneys, Privacy Law|

The Cybercrimes and Cybersecurity Bill – the rationale behind it and why you should comment

The enacting of legislation undergoes a consultative process; the Promotion of Administrative Justice Act 3 of 2000 (“PAJA”) provides that where an administrative action materially affects the rights of the public, the public must be consulted.  The principle behind public participation is that all the stakeholders affected by a piece of legislation have a right to be consulted and contribute [...]

By | 10th July, 2017|Data Protection, Information Security, PPM Attorneys, Privacy Law|