ResearchSpace

Evaluation of online resources on the implementation of the protection of personal information act in South Africa

Show simple item record

dc.contributor.author Botha, J
dc.contributor.author Eloff, MM
dc.contributor.author Swart, I
dc.date.accessioned 2015-11-20T12:23:50Z
dc.date.available 2015-11-20T12:23:50Z
dc.date.issued 2015-03
dc.identifier.citation Botha, J, Eloff, MM and Swart, I. 2015. Evaluation of online resources on the implementation of the protection of personal information act in South Africa. In: 10th International Conference on Cyber Warfare and Security, Kruger National Park South Africa, 24-25 March 2015, 10pp. en_US
dc.identifier.uri http://hdl.handle.net/10204/8299
dc.description Abstract only. en_US
dc.description.abstract The recent adoption of the privacy law, Protection of Personal Information (PoPI) Act in South Africa, mandates notable changes from both government departments and the public sector when dealing with personal identifiable information (PII). Recent research has shown that the level of change still required to comply with the new Act is significant. Surveys indicated that approximately only forty percent of organisations in South Africa have started with the compliance process. Private empirical research has found widespread leakage of PII within South African cyber infrastructures. The leaked information affected well over two million South African citizens in some or other manner and with penalties instituted by the PoPI of up to R10 million, it is crucial for organisations to clean up these incidents of non-compliance. Even without the monetary incentive, leaked PII holds a significant threat, not only for individuals but also for companies and governmental organisations alike. Several documented instances exist where targeted phishing attacks, that has a 70% success rate once PII is included, has been successfully used against organisations. While technical controls may limit the leakage of PII, significant security vulnerabilities exist that allows for the circumvention of these controls. Cyber security awareness is still the primary defence against these technical control failures, but the notable challenge remains in educating users and responsible personnel. As with any cyber activity, there is a human factor that requires a significantly diverse skill set to understand the infrastructure that comprises an organisation. With cyber security education a continuous developing field, there is a dire need for additional research to supplement this knowledge base. This paper examines online resources available for individuals, organisations and governmental departments to comply with the PoPI Act. The approach used will be to examine content made available through popular social media platforms such as YouTube (YouTube, N.D.), Facebook (Facebook, N.D.), Twitter (Twitter, N.D.) and search engines. These data sources were chosen since it may be the most likely common route individuals will take to gain fundamental understanding of the requirements the PoPI Act places on them. Identified resources will be evaluated for the audience they serve (e.g. business owners, privacy officers, managers and employees), technical content (e.g. informative, guidelines or step by step instructions) and finally the cost involved to access or download resources (e.g. free or commercial). en_US
dc.language.iso en en_US
dc.relation.ispartofseries Worklist;15907
dc.subject Cyber security awareness en_US
dc.subject Protection of Personal Information Act en_US
dc.subject PoPI en_US
dc.subject Personal identifiable information en_US
dc.subject PII en_US
dc.title Evaluation of online resources on the implementation of the protection of personal information act in South Africa en_US
dc.type Article en_US
dc.identifier.apacitation Botha, J., Eloff, M., & Swart, I. (2015). Evaluation of online resources on the implementation of the protection of personal information act in South Africa. http://hdl.handle.net/10204/8299 en_ZA
dc.identifier.chicagocitation Botha, J, MM Eloff, and I Swart "Evaluation of online resources on the implementation of the protection of personal information act in South Africa." (2015) http://hdl.handle.net/10204/8299 en_ZA
dc.identifier.vancouvercitation Botha J, Eloff M, Swart I. Evaluation of online resources on the implementation of the protection of personal information act in South Africa. 2015; http://hdl.handle.net/10204/8299. en_ZA
dc.identifier.ris TY - Article AU - Botha, J AU - Eloff, MM AU - Swart, I AB - The recent adoption of the privacy law, Protection of Personal Information (PoPI) Act in South Africa, mandates notable changes from both government departments and the public sector when dealing with personal identifiable information (PII). Recent research has shown that the level of change still required to comply with the new Act is significant. Surveys indicated that approximately only forty percent of organisations in South Africa have started with the compliance process. Private empirical research has found widespread leakage of PII within South African cyber infrastructures. The leaked information affected well over two million South African citizens in some or other manner and with penalties instituted by the PoPI of up to R10 million, it is crucial for organisations to clean up these incidents of non-compliance. Even without the monetary incentive, leaked PII holds a significant threat, not only for individuals but also for companies and governmental organisations alike. Several documented instances exist where targeted phishing attacks, that has a 70% success rate once PII is included, has been successfully used against organisations. While technical controls may limit the leakage of PII, significant security vulnerabilities exist that allows for the circumvention of these controls. Cyber security awareness is still the primary defence against these technical control failures, but the notable challenge remains in educating users and responsible personnel. As with any cyber activity, there is a human factor that requires a significantly diverse skill set to understand the infrastructure that comprises an organisation. With cyber security education a continuous developing field, there is a dire need for additional research to supplement this knowledge base. This paper examines online resources available for individuals, organisations and governmental departments to comply with the PoPI Act. The approach used will be to examine content made available through popular social media platforms such as YouTube (YouTube, N.D.), Facebook (Facebook, N.D.), Twitter (Twitter, N.D.) and search engines. These data sources were chosen since it may be the most likely common route individuals will take to gain fundamental understanding of the requirements the PoPI Act places on them. Identified resources will be evaluated for the audience they serve (e.g. business owners, privacy officers, managers and employees), technical content (e.g. informative, guidelines or step by step instructions) and finally the cost involved to access or download resources (e.g. free or commercial). DA - 2015-03 DB - ResearchSpace DP - CSIR KW - Cyber security awareness KW - Protection of Personal Information Act KW - PoPI KW - Personal identifiable information KW - PII LK - https://researchspace.csir.co.za PY - 2015 T1 - Evaluation of online resources on the implementation of the protection of personal information act in South Africa TI - Evaluation of online resources on the implementation of the protection of personal information act in South Africa UR - http://hdl.handle.net/10204/8299 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record