Legal updates and opinions
News / News
When the walls fall in
Ring-a-round the rosie, A pocket full of posies, Ashes! Ashes! We all fall down
The Information Regulator has officially made her presence known. The Enforcement Committee has been established and we have noted various announcements from the Office of the Information Regulator as to current actions underway.
But what does this mean to each and every company? What does this mean to comply with POPIA[1] and how does this impact compliance initiatives? In short, what tasks can employees perform, with absolutely no ill intent, that can still bring the wall falling down?
Can’t make head or tail of POPIA? Lessons from Sheburi V Rail Safety Regulator – Read more here
Employees are expected to remember and adhere to numerous policies, including privacy policies. Poster campaigns are rolled out to reinforce positive behaviour and still when we consider data breaches it is often unbelievable how the mistake that resulted in the breach could have possibly occurred. The reality is that many data breaches occur when employees believe they are doing the right thing.
The top 5 employee privacy risk potholes to avoid.
-
Employees DO NOT be too helpful!
Employees want to do the right thing to keep customers, suppliers, internal and external clients happy. However, being overly helpful may result in an employee providing unnecessary information to complete a task, which increases the risk of a data breach. For example, a well-intended employee may provide more personal information than required. If that information is provided to unauthorised individuals, it would result in a data breach which would be required to be notified to the Information Regulator.
-
Security rules are not followed!
When employees are in a rush and under work pressure, it happens that information, personal information and confidential information could be sent out without applying password protection or using proper encryption. This problem occurs when the security processes and technology is too difficult and time consuming to use, or alternatively the employee has not been trained and cannot use the technology solutions properly.
-
Sending files to the incorrect recipient!
This is in fact the most common and difficult issue to tackle at a company. Many email applications automatically store past email addresses. However, this can increase the chances of a mistake as employees may use the incorrect auto-filled email address and fail to double-check the recipient’s name. It is only after the email is sent, or when the recipient notifies the sender of the incorrect transmission that the error is discovered.
-
The risk of multi-tasking
We are all busy with more than one computer monitor and have a number of computer applications open at a time. When personal information is entered into the wrong system and disclosed this results in a data breach!
-
They collect what they DO NOT need!
Only asking for the bare minimum relevant information required is key and employees must consider this carefully. The less personal information a company has and employees have access to, the less the risk of a data breach. Logically the converse applies.
A lack of robust business processes and employee POPIA training cannot be underestimated.
Thinking before you do, must be the rule when it comes to employees and privacy. Let the house stand firm!
Footnotes
[1] The Protection of Personal Information Act, No. 4 of 2013
Latest News
The Role of the Corporate Doctor – Saving Distressed Companies in South Africa
South African corporates continue to face significant challenges in surviving economic constraints and turmoil in the market place. Looking at [...]
Navigating the termination of conditional offers of employment: What employers need to know
and Yendiswa Sithole – Candidate Attorney Introduction In today's highly competitive employment market, securing the most suitable candidates is of [...]
Employer ordered to pay compensation for failing to adequately investigate sexual harassment complaints
and Hanán Jeppie – Candidate Attorney Introduction An employer's liability in instances where it fails to comply with its statutory [...]
Evidential crossroads: Navigating hearsay evidence in CCMA proceedings
Introduction There is some debate surrounding the extent to which Commissioners are required to apply the general rule against the [...]
Change is inevitable with the evolution of technology
Vision without action is merely a dream. Action without vision just passes the time. Vision with action can change the [...]
Whatever it is, it’s never what you thought it was…. Intersection between privacy and AI
Lwazi-Lwandile Simelane - Candidate Attorney The permeation of artificial intelligence ("AI") into our society as a whole and into our [...]