Can your boss read your emails?

Source: The Bharat Express News

Several South African companies have implemented an email monitoring policy in their employment contracts. This policy often covers private and professional use of email, but people often wonder how intrusive it should be, says Roy Bregman, director at Bregman Moodley Attorneys.

“Our Constitution respects a person’s right to privacy. The Personal Information Protection Act (POPIA) further strengthens personal data protection rights,” he said. “An employer has the right to expect that employees will not use their email to violate company policies, use inappropriate language, breach confidentiality, or run their own business during working hours. .”

Bregman added that employment contracts typically contain clauses dealing with monitoring and interception of emails.

These clauses generally provide that employees should not expect confidentiality when sending, receiving, downloading, downloading, printing or transmitting e-mails. And that employees should use email only for bona fide business purposes.

In terms of POPIA, an employer who processes an employee’s personal information must:

  • Do so in a reasonable manner and without negatively impacting their rights as data subjects.
  • Do so with the informed, express and voluntary consent of the person concerned.
  • Explain the purpose of such surveillance interception, to enable employees to perform their duties and to assist the employer in meeting its legal, commercial, administrative and managerial obligations.

WhatsApp and privacy

These policies may also include other forms of communication, including messaging services such as WhatsApp and Slack.

An employer is generally liable for its employee’s conduct when employees act within the scope and scope of their employment, said Karl Blom, senior partner at law firm Webber.

For this reason, if an employee uses WhatsApp to conduct their employer’s activities, the employer must ensure that those activities are POPIA-compliant, he said.

He added that several provisions may apply under the POPIA, including requirements for:

  • Transfer of data to third parties outside of South Africa;
  • Retention of personal information;
  • The security of personal information;
  • The purpose for which the personal information is used.

“If an employer uses WhatsApp, they should treat these messages like they treat any other technology – like email, VOIP, regular mail, etc.”

Employers should also be aware of any contractual privacy provisions that may apply to them – including those that may restrict its use of certain technologies, such as WhatsApp, he said.

“Finally, it is important to remember that WhatsApp and other messaging tools are operated by third parties, so employers should always be aware of any regulatory requirements that may restrict how they provide data to third parties. .

“For example, employers in the legal, education, medical or insurance sectors should be aware of the specific requirements that apply to these sectors.”


Source: Supermarket & Retailer

Pick n Pay has done away with its notice boards for the foreseeable future until it can figure out how the public can utilise the boards while protecting their personal information.

The Protection of Personal Information Act (POPI Act) or POPIA came into effect in July 2021, and all the implications of the new law still have to be figured out, according to Vaughan Pierce, GM and Group Legal Advisor at Pick n Pay.

Though customers may voluntarily put their information on the boards, there are no mechanisms to monitor and consent that they are voluntarily displaying their personal information, adds Pierce.

“POPIA aims to ensure that reasonable measures are put in place to ensure all personal information is protected,” says Pierce.

“There is not yet much precedent in answer to interpretation questions arising out of our interaction with the act, ” says Helene Viljoen an attorney, who specialises as a legal advisor on privacy issues.

Viljoen says, the act stipulates that the ‘data subject’ is the person to whom the personal information belongs. Information from the data subject can only be used should they consent to do so. The act also stipulates that the information should be used lawfully, and those who process it are then accountable for the lawful processing thereof.

It is assumed, as per the act, that the information being processed will be done so justly.

Notice boards commonly found in supermarkets and local stores are some of the more older forms of communication amongst locals in communities to advertise sales of services, goods, pets, to advertise flea markets, rentals and more.

“It is my opinion that anyone who makes their personal information publicly available by posting it onto a notice board, communicates it voluntarily and to the public, while indicating the limits that apply to such processing. It is then the duty of each person who processes that information to act accordingly,” says Viljoen.

As a data subject she believes that by availing your personal information to the public for use as advertised, you are providing a clear indication of your reasonable privacy expectations.

”Those who process my [your] phone number, must do so while heeding the conditions for lawful processing,” she adds.

This is merely an invitation for a person to contact about a sale, purchase of goods or services but not for them to exploit your information.

Source: EWN

The days of frantically looking up matric marks in newspapers each year is over and many have welcomed the decision.

The Department of Basic Education made the announcement on Tuesday.

Instead, pupils will have to go to their high schools to collect their results to find out whether they have passed or not.

The department cited the introduction of the Protection of Personal Information Act (POPIA), which came into effect in July last year as the reason behind the decision.

It added that this was done to respect the right to privacy to protect against unlawful collection, retention, dissemination and use of personal information.

Most members of the public have welcomed the decision, especially as a way to protect the mental health of many children who feel overwhelmed by the publishing of results.

Source: IOL

Research by digitally-led marketing agency, Rogerwilco, indicates that only 25 percent of South Africa’s most popular websites have pop-ups that explicitly ask visitors for consent to collect data about their browsing activity.

With the Protection of Personal Information Act (Popia) coming into effect as of 1 July, these company websites are at risk of facing fines of up to R10 million for each breach.

At the same time, their executives could be jailed for 10 years.

While 90% of the sites do have a cookie policy, this is often hidden away, either in a notice in the website’s footer or buried elsewhere. The company websites investigated that don’t have an automated pop-up include Unisa, Takealot, World Sports Betting, Price Check, Vodacom, Private Property, Autotrader, Computicket, Zando, Clicks, Mweb, Fly Safair, Pick n Pay, Tsogo Sun Hotels, Department of Employment and Labour and SA Revenue Service, amongst others.

According to Rogerwilco chief executive, Charlie Stewart, “Popi requires that organisations take reasonably practicable steps to ensure that consumers know which of their personal information is being collected and for what purpose.”

While there is confusion as to whether or not South African websites need to ask visitors for their content to track them, Popi is largely based on the EU’s GDPR privacy bill, which requires people to ‘opt-in’ if tracking is applied.

“The penalties for non-compliance with Popi are significant, but fortunately, a 12-month grace period will apply during which organisations can get their house in order,” said Stewart.

He said, “The most shocking outcome from this research is that two years on from Cambridge Analytica, a scandal that changed the world, brands continue to play fast and loose with consumers’ data.

The debate must move beyond paying lip service to the legal compliance requirements and into a space where companies recognise that they need to restore consumer trust. Policies are not there to make the life of the marketers harder, but the experience of the customers better.”

What are cookies?

Cookies are text files that are stored on your device each time you visit a website. They store information about your activity which companies use to improve your interactions with websites. For example, if you log onto a website that uses cookies and you revisit it later, the cookies ensure that the website ‘remembers’ your information such as login and password, format settings, and website sections/pages/items viewed. This data is also sold to advertisers, which is why ads relating to a product that you previously searched for appear on other sites you visit.

It’s comply or die for SA’s SMEs

By Tracy Bolton, director: General Business at SAP Africa

On 25 May this year, a new piece of legislation came into effect in Europe that could have severe consequences for non-compliant South African businesses. The General Data Protection Regulation – or GDPR for short – is a regulation under European Union law that aims to give control over personal data back to EU citizens.

The regulation applies to any organisation that collects or processes data from EU citizens, even when that citizen or organisation is based outside the EU. The European Commission defines personal data as “any information relating to an individual, whether it relates to his or her private, professional or public life”. This includes names, home addresses, photos, email addresses, bank details, social media posts, medical information, or even a computer’s IP address.

The fines for non-compliance are severe and could spell the end of a business practically overnight: the maximum fine is as much as €20-million, or nearly R300-million. What’s more, the regulation is far-reaching: any company with an EU citizen among its workforce, or a customer based in the EU, or even if only one of the subscribers to a company newsletter is based in the EU, that company can be held liable under GDPR. Few if any mid-sized South African firms could afford such a steep sanction, and legacy issues compound problems around compliance, increasing their risk and potential liability.

In response, technology firms are taking unprecedented steps to ensure they and their customers remain within the confines of the new regulation, especially considering the volume of trade and collaboration between African countries and their European counterparts.

Legacy processes add complexity to compliance
Most mid-sized firms have deliberately or inadvertently built up internal siloes related to how customer, business and other operational data is stored. For example, in a typical retailer’s marketing department, the data storage systems that processes newsletter subscriptions via email may be entirely removed from and non-integrated to the WhatsApp number where much of the customer communication takes place. This means a customer that unsubscribes to a newsletter via WhatsApp may still receive the newsletter until such a time as the retailer can integrate the two sets of data.

As GDPR comes into effect, companies will not only stand liable for fines should the above scenario play out, but they need to be able to provide customers with complete clarity on how their data is stored and managed at any point in time. Any costs incurred in the process of showing how customer data is stored is also for the company’s own account, which adds not only complexity to standard business processes but also potentially additional costs.
Considering the prevailing trust deficit between consumers and brands, the potential of being exposed for treating confidential customer data poorly is immense. Once trust is breached, affected customers are unlikely to engage with the brand again, and will leave a searchable and public trail of comments on social media for all to see. The recent case of Facebook – which now faces a fine of as much as $2-trillion – has brought this to the forefront of consumer consciousness, but other examples of poor customer data management abound.

On the basis of consent
For South African businesses, however, new technology tools could play an invaluable role in mitigating risks associated with GDPR and its South African counterpart, POPI. A recent investment by SAP into Consent is simplifying the business processes associates with creating trusted digital experiences within the limitations of GDPR and POPI compliance.

Part of the SAP Hybris suite of applications, Consent enables SMEs to centrally manage customer preferences and consent settings throughout their full lifecycle, while putting them in control of their own data. Consent enables companies to be transparent, gain loyal customers and protect their business from costly fines as well as potentially disruptive business processes related to proving to customers how their data is being stored and managed.
In line with modern business demands, Consent is also provided in the cloud, making it quick to implement and easy to prove ROI. Every time a policy changes, customers can receive an automated notification that they actively accept, with a record of such forms of consent stored centrally to allow SMEs to quickly and accurately prove responsible customer data management.

Whether you run an online retailer with customers around the world, or a news website where a European citizen may occasionally offer a comment on an article, GDPR holds inherent risks to your business. But with the correct technology tool, a potential R300m liability can be transformed into a competitive business advantage that furthers the cause of trusted and trustworthy digital customer experiences.
Seems an easy choice, no?

How many digital devices does you have in use in your business which could represent a risk for loss of personal information? This question is a lot tougher to answer than you might at first think and in this article we will find out why that’s the case.

The most obvious place to start is by looking at the fixed assets register where you record all of the information and communications technology (ICT) devices which you own, manage and depreciate in line with the rules issued by SARS. In times past this would capture most if not all the ICT items a company used: tech used to relatively high value, centrally procured and tightly managed.

That’s no longer the case for several reasons. First, the emergence of the “throw away” tech era. Items are now so low cost that they fall below the minimum limit to be classified as an asset for depreciation purposes and so they never make it on to the fixed assets register in the first place. Second the extensive use in business today of outsourcing or service agreements. Now we can find that the use of service providers may see our fixed assets register entries drop to zero as we no longer acquire assets in the name of our own organisation.

One of the more recent contributors to this is cloud computing, where entire layers of tech can simply disappear (think traditional server rooms) as they are replaced with a service (think offerings from Microsoft, Google, Amazon, Dropbox and other home-grown cloud service providers). Having said that, most organisations are still holding a significant inventory of desktop/tower PCs, laptops, servers and so on.

Outside of the corporate asset register the next place to look for digital devices which might represent a risk of personal information security compromises taking place covered under the POPI Act (POPIA) (see Condition 7, Security Safeguards for details) are your service agreements. This is where we need to think broadly, as so much of what we do in business today is digital without being a part of our core operations or production or accounting systems.

Examples are physical security systems such as access control – including biometric-based recognition and authorisation systems – whether used for staff or visitors or service providers. Coupled to tracking physical access through digital logging systems are digital monitoring systems, such as CCTV. Where this used to mean a network of fixed location cameras this is fast evolving as more companies start to use drone-based technology to complement their wired land-based platforms. Then there are the specialist tracking systems using a variety of technologies such as WiFi, Bluetooth and RFID to track people as they go about their work, particularly in high hazard job roles as are found in mining and other similar industries.

This can also apply in specialist applications such as health care where bedside monitoring systems track some of the most personal of data relating to health and wellness. Common other examples include multi-function devices such as the print/copy/scan/fax machines or digital switchboard you have on a lease agreement.

One of the largest areas that needs attention has nothing to do with what your organisation manages or pays for, directly or indirectly. It’s what’s become known as BYOD – Bring Your Own Device. As tech has moved into the hands of the consumer and out of the narrow control of the IT/ICT community the use of personally owned and funded devices has mushroomed.

Laptops, tablets, smartphones and smart watches are just some of the devices typically deployed to support directors, management and employees as they go about their daily business. In truth this list is much longer and should include home-based desktop PCs and servers, USB memory sticks (flash drives), CD/DVD disks, digital cameras, external hard drives and digital memory cards and no doubt more that you are probably thinking of right now. Every one of these BYOD devices represents a potential carrier of and therefore potential source of loss of personal information.

Just identifying all these devices can represent a major challenge if not tackled in a formal, structured and consistent way. Remember, POPIA requires (section 19) that the responsible party (the organisation doing the processing, or services providers – called operators in POPIA) takes “reasonable measures” to “identify all reasonably foreseeable internal and external risks to personal information in its possession or under its control”.

Clearly in today’s digitally diverse world that must go beyond consulting the fixed assets register. Look at your service agreements. Run a staff survey. Be inquisitive about where the risks are and how to address them. What to do once you have found those devices will be the subject of my next article.

By Dr Peter Tobin, www.popisolutions.co.za 

Are you a victim of fake POPI news?

Since the Information Regulator South Africa – IRSA – came into office in December 2016, the pace has been picking up in the market for Protection of Personal Information Act (POPIA) products and services.

This has had a spill-over effect on the Promotion of Access to Information Act (PAIA), which also forms part of the responsibilities of the IRSA.

Unfortunately not only has the pace picked up but there has been some confusion sown through what might best be described as questionable marketing practices and erroneous reporting. One contact of mine recently received an email which included the following statement “The Promulgation of POPI, (The Protection Of Personal Information Act) in the Gazette on 26 November 2013 now means you are required to update your PAIA Manual to incorporate the POPI.”

This is misleading, since the Government Gazette did not include the commencement of the POPI Act or even the commencement of the transition period. The same marketing email continued with the statement “ALL information users now must have strict chain-of-custody processes in place.” This is far from the case, as the POPI Act makes no reference to a “strict chain-of-custody”. In similar vein the email stated “Businesses or persons who use/hold/verify or even request your Personal Information MUST now conform to the Act.” Not true.

This will only be so under certain conditions once the POPIA transition period has ended and right now it has not even started.

The same email then offers to help with the appointment of a “Compliance Officer”. No such individual is mentioned or required in terms of either POPIA or PAIA. What is required is an Information Officer, possibly supported by one or more deputies depending on the needs of each organisation. In September the IRSA issued a set of draft regulations which included specific reference to the role and duties of the Information Officer, more about which is available at the IRSA web site.

Perhaps of greatest concern is the statement that “at (name withheld) we made it very easy for you to get compliant in a simple and completely tax deductible manner. It takes you about 10 minutes to complete this process on our website.” Given the duties outlined in the IRSA draft regulations this statement should at least be seen as misleading.

This and other marketing emails that I have seen also push organisations to create or update a manual to comply with PAIA. In truth there are numerous exemptions to that requirement. To check whether you need to publish a PAIA manual please refer to the notice that appeared in the Government Gazette on 11 December 2015, signed by the then Minister of Justice and Correctional Services. For a free copy of the notice visit www.gpwonline.co.za and search for edition 39504.

Not only commercial organisations are guilty of mis-stating the facts. The Star newspaper ran an article in the Saturday Star Personal Finance column during September 2017 which contained the statement “The 12-month grace period to comply with the PoPI Act has expired, and the legislation is being applied in the public and private sectors.” That is factually incorrect and I wrote to the author of the article twice in an attempt to have this incorrect statement corrected.

One of my letters (in part) appeared in the Personal Finance column on Saturday 30 September 2017 under the heading “Incorrect correction about PoPI Act”. The explanation of the true state of affairs was published along with an apology to me personally from the editor.

I repeat those contents below for completeness:
“On September 23 2017 on page 21 in the Personal Finance section an item appeared titled “Correction to article on PoPI Act”. Unfortunately the correction itself is incorrect. To state that the “12 month grace period for market compliance is now in force” is factually incorrect. The only sections of the PoPI Act that have commenced refer to the definitions of the Act and those provisions allowing the establishment of the Information Regulator South Africa (IRSA). These appeared in the Government Gazette in April 2014.”

In summary, be sure you are dealing with reputable sources when seeking advice on how and when to comply with new legislation in general and POPIA and PAIA in particular.

By Dr Peter Tobin

During June 2017 the Information Regulator South Africa (IRSA) released a number of documents on its web site which give an insight into how the IRSA will conduct its work in the coming years.

In this article we will take a look at the Strategic Plan, incorporating the Annual Performance Plan and see what we can learn about the IRSA and the status of the Protection of Personal Information Act (POPIA) and Promotion of Access to Information Act (PAIA) which fall under the responsibility of the IRSA. In a later article we will look at the various committees that have been established by the IRSA. Before we start it is worth remembering that as the IRSA is an arm of government the approach and terminology used is more aligned to government-speak than that familiar to a commercial or non-state owned entity.

Strategic Plan, incorporating the Annual Performance Plan
This thirty one page document covers the period 2017-2020. This is shorter than the usual five year period used by government entities as the IRSA is entering into operation part way through the current SA government planning cycle. The first point of interest is that there appears to be an attempt to seek independent insight in the assistance sought from the Monitoring and Evaluation Unit of the Department of Telecommunications and Postal Services in the development of the plan, as is referred to in the “Foreword” signed by the IRSA Chairperson.

The Vision, Mission and Values are laid out in the Strategic Plan and hold no surprises given the mandate of the IRSA. As part of the mandate the core functions are listed (Part A, section 4), in line with the POPIA and PAIA remit of the IRSA and are worth mentioning here:

• Mandate for POPIA: provide education; monitor and enforce compliance; to consult with interested parties; to handle complaints; to conduct research; codes of conduct; facilitate cross-border co-operation.
• Mandate for PAIA: complaints; investigations; assessments of compliance; a list of more than a dozen “additional functions” including both educational and operational issues.

The final item listed under the mandate is the requirement to submit an annual report to the national assembly.
None of this coverage of the mandate is particularly revealing, except the strange imbalance in the way the mandate for POPIA and PAIA have been presented. One might have expected a balanced approach to presenting the mandate in terms of the focus on education, compliance monitoring and other issues for both pieces of legislation. For example we see the term “enforce compliance” being used in relation to POPIA and not being used in the same way in relation to PAIA. Another inconsistency is the explicit emphasis on training Information Officers and Deputy Information Officers under the PAIA mandate and no such explicit reference under POPIA. Could this be a statement of intent or a mere oversight? A similar inconsistency is the involvement of the Public Protector under PAIA but no similar mention of the Public Protector under POPIA. Perhaps the reasons for these inconsistencies will become clear later?

Section 5 of the Strategic Overview focuses on planned initiatives. There are five areas that are listed that the IRSA will be treating as priorities:
• The adoption of the Regulations
• Codes of conduct needs assessment
• Stakeholder engagement
• Analysis of legislation that impacts on its operating environment

A major disappointment is that these initiatives are stated without reference to POPIA or PAIA specifically, and only by implication can be seen to apply more directly to POPIA. What is absent is any sense that enforcement action is a priority (for either POPIA or PAIA), suggesting a less aggressive approach than some have anticipated.
A curious anomaly in terms of a conventional strategic plan is part A section 6 (Litigation) which is presented more as a report back on recent activity than a commitment to be involved in future litigation as part of a strategic commitment.

Section 7 covers the situational analysis. The first two sections focus on the internal procedural matters of interest to the IRSA (performance and organisational environment) and add no value in terms of the external environment, in particular global influences on the performance of a national information regulator and the external political, economic, social, legislative and other influences it operates under. The final part of section 7 covers the IRSA strategic planning process. Sadly therefore the situation analysis adds little value in terms of the local (national) regional (SADC) or continental (AU) context for the work of the IRSA.

Section 8 claims to cover the high level governance structure. Sadly, given the launch the King IV Report and Code™ in the month prior to the IRSA taking office, there is no acknowledgement of then overall approach to ensuring effective governance as outlined in King IV™. Given the intense focus on the performance of the Chairperson of the IRSA in her previous position at the IEC one might expect a more proactive approach to establishing the legitimacy of the IRSA as a governance outcome. In fact section 8 presents more of an organisation chart than a governance structure.
Section 9 covers the budget overview and mid-term expenditure estimates. These clearly demonstrate that the IRSA will be severely limited in its abilities to deliver on its mandate unless there is a significant change to the budget for the period covered. With compensation of employees pegged at a flat R17,486,000.00 for each year from 2017/18 to 2019/2020 there is little chance that the highly knowledgeable, skilled and experience staff required will grow in any meaningful way for the foreseeable future.
The final part of the Strategic Overview (Part A of the document) covers in section 10 strategic outcome oriented goals. There are seven goal listed, and in the next article we will look at these in relation to the strategic objectives and annual performance plan that make up parts B and C of the overall strategic plan document.

By Dr Peter Tobin

Beware the data breach

South African organisations need to prioritise the protection of confidential information or face putting their businesses at risk of hefty financial penalties, irrevocable reputational damage, and even legal repercussions, a leading information security company has warned.

With the average data breach costing South African businesses R28.6 million each year, Shred-it South Africa said organisations cannot afford to ignore the importance of implementing robust information security policies and practices. The loss of confidential information can also impact customer confidence and may also put businesses at risk of legal action.

“Many South African businesses are not aware of the costly impact that a data security breach can have, both in terms of lost business and non-compliance fines. It’s more than a financial risk; damage to a hard earned reputation is time-intensive and costly to repair. Prevention is always better than a cure, and I urge organisations in South Africa to make sure information security is top of the business agenda,” says Tony Fitzpatrick, country manager at Shred-it South Africa.

Businesses also need to be aware of the legal requirements when it comes to protecting confidential information. According to Shred-it’s Security Tracker Survey, only 37% of SMEs understand the implications the forthcoming enforcement of the Protection of Personal Information (POPI) Act will have on their business compared to 70% of C-Suite Executives. However, the enforcement of POPI will hold all businesses accountable should they abuse or compromise personal information in any way. Organisations could face substantial financial penalties of up to R10 million, or a prison sentence of up to 10 years could be imposed should an entity be in breach of the legislation.

“The clock is ticking for businesses when it comes to being properly prepared to meet the terms of the POPI Act. When the POPI Act comes into full effect, it is crucial that all businesses adhere to the outlined requirements of the legislation when collecting, processing, storing and sharing another entity’s personal information. Businesses should note that the POPI Act is more than a compliance checkbox exercise; it is ultimately for the benefit of business, by ensuring that all information is securely protected so that organisations can build trust with their customers, employees and partners,” Fitzpatrick concludes.

Shred-it, which helps businesses in South Africa to improve their information security practices and protect their workplaces against the damage caused by data breaches, has issued the following five tips to help organisations put information security at the forefront of business planning:

• Schedule regular information security audits to identify problem areas where confidential information could go astray, e.g. printer stations and meeting rooms. Put measures in place to ensure that documents are securely disposed of, e.g. reminding staff to keep documents secure and store them in locked consoles or containers when they are no longer needed, ready for secure disposal.

• Introduce a Shred-it all Policy, which means all documents are destroyed prior to disposal. This means employees do not need to make a decision as to what is or is not confidential when disposing of paperwork. The decision to use the recycling bin or shredding container is often left to chance or convenience where both options are available. In practice, when outsourcing to a secure destruction provider such as Shred-it, all shredded paper is recycled, keeping you secure and protecting the environment at the same time.

• A clean desk is one of the simplest yet most effective safeguards that can significantly reduce the risk of a data breach. A formal Clean Desk Policy directs employees to put away all paper documents and lock all electronic equipment when leaving workstations, so confidential information is not at risk of falling into the wrong hands or left vulnerable to ‘visual hacking‘ from unauthorised prying eyes.

• Ensure employees are informed about the risks associated with data protection breaches and are well trained on which documents they should consider shredding as well as how to dispose of electronic data.

• Work with a reputable professional information destruction company that not only has a secure shredding process but can offer guidance and help with implementing robust information security practices.

  • 1
  • 2

Follow us on social media: 


View our magazine archives: 


My Office News Ⓒ 2017 - Designed by A Collective