ARTICLE
16 December 2024

Understanding Your Organisation's Data Breach Liability In Terms Of POPIA

FW
Fairbridges

Contributor

Fairbridges is a leading African law firm providing expert corporate and commercial legal services across South Africa and beyond. With offices in Cape Town and Johannesburg, we assist both local and multinational companies - our areas of expertise include commercial legal advisory, transactional work, commercial drafting, competition law (regulatory filings and litigation), intellectual property law, insurance and medical malpractice, healthcare regulatory advice, and commercial litigation. Our firm’s history (we were established in 1812) provides us with a rich legacy of institutional knowledge and a commitment to service excellence. This deep-rooted experience enables us to offer clients tailored, professional, and high-quality legal services at competitive rates. At Fairbridges, we pride ourselves on our ability to adapt to the evolving legal environment, embrace innovation and uphold the highest standards of the legal profession.
Data breaches have become an everyday reality in the 21st century and have, alarmingly, impacted numerous respected, large enterprises.
South Africa Privacy
Jodi Poswelletski’s articles from Fairbridges are most popular:
  • with readers working within the Business & Consumer Services industries
Fairbridges are most popular:
  • within Immigration topic(s)

Data breaches have become an everyday reality in the 21st century and have, alarmingly, impacted numerous respected, large enterprises. The recent incident involving a prominent South African insurance provider, reported on 06 June 2024, saw the exposure of personal information (PI) belonging to 19 of its clients. A few of the affected clients expressed their frustration on social media, questioning the insurance company's remedial solutions for the aforementioned data breaches. This incident underscores the importance of understanding the responsibilities imposed upon a "responsible party" as outlined in the Protection of Personal Information Act 4 of 2013 (POPIA).

POPIA distinguishes between a "responsible party", who determines the purpose and means of processing PI and an "operator", who processes PI for a responsible party in terms of a mandate (Section 1 of POPIA). However, in the event of a data breach, the responsible party incurs full liability, and is accordingly encouraged to establish agreements with operators to address operator liability, if the data breach occurs as a result of the operator's conduct (Section 21(1) of POPIA).

Prevention is Better than Cure

Under POPIA's 7th Condition for lawful processing of PI, a responsible party must implement the security safeguards as outlined in Section 19 of POPIA, to ensure lawful processing of PI and to prevent data breaches. Section 19(2) of POPIA mandates responsible parties to:

  1. "identify all reasonably foreseeable internal and external risks to personal information in its possession or under its control" (Section 19(2)(a)). Such risks include, inter alia, phishing, social engineering, bait and switch pop-up messages, viruses, and hardware keyloggers.
  2. "establish and maintain appropriate safeguards against the risks identified" (Section 19(2)(b)). Such safeguards include, inter alia, regularly training employees on POPIA awareness, ensuring emphasis on the prohibition of changing the company's PC password, not inserting foreign flash disks into the company's PC, not reconfiguring the company PC's settings, and not outsourcing repairs of the company's PC.
  3. "regularly verify that the safeguards are effectively implemented" (Section 19(2)(c). This requires an IT person and/or IT department to ensure the monitoring of data breach risk mitigation on the Company's network.
  4. "ensure that the safeguards are continually updated in response to new risks or deficiencies in previously implemented safeguards" (Section 19(2)(d). Such continual updates could includeanti-virus software updates, monthly or quarterly POPIA and cyber awareness training, and conducting continuous POPIA risk impact assessments and reports of POPIA risks, identified within the Company.

Other preventative measures include the appointment of an Information Officer within the Company (Section 55-56) as well as having an insurance policy in place for data breaches.

Remedying a Data Breach

Notwithstanding that prevention is indeed better than cure, section 22 of POPIA provides a comprehensive aid for data breach incidents. This provision underpins the security breach incident policy which needs to be established by a responsible party. Section 22(1), read with 22(2) and 22(4) of POPIA mandates responsible parties to, as soon as is reasonably possible after the discovery of a data breach, report the data breach incident to the Information Regulator, as well as to the data subjects affected by such compromise in writing. Section 22(5) further requires the notification of a data breach to data subjects to be effected in such a way that it:

  1. Describes the possible consequences associated with the security compromise and/or data breach
  2. Describes how the responsible party intends to act or has already acted to address the data breach
  3. Recommends measures to be taken by the data subject to mitigate the adverse effects of the breach
  4. Notifies the data subject of the identity of the unauthorised person/s responsible for the data breach, who may have accessed or acquired the PI.

Remember, compliance with POPIA is essential to avoid severe penalties, including fines of up to R10 million and imprisonment of up to 10 years – not forgetting the reputational damage to the company and loss of intellectual property. By prioritising compliance and implementing robust security measures, organisations can fortify their data protection frameworks and mitigate their risks of data breach incidents.

Originally published June 20, 2024

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

[View Source]
See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More