The Protection of Personal Information Act

Slides:



Advertisements
Similar presentations
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi David Cauchi Office of the Commissioner for Data Protection.
Advertisements

HIPSSAPROJECT Support for Harmonization of the ICT Policies in Sub-Sahara Africa Meeting with Data Protection Law Stakeholders 28/29 th August, 2013 PRESENTATION.
The Data Protection (Jersey) Law 2005.
Data Protection.
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi Office of the Data Protection Commissioner.
What does the Data Protection Act do? It sets standards which must be satisfied when obtaining, recording, holding, using, disclosing or disposing of.
Data Protection and Records Management
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
The Protection of Personal Information Act 2013 Personal Information is your business KOMESHNI PATRICK TECHNOLOGY LAWYER/DIRECTOR/ENDCODE.ORG.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
The Data Protection Act
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
Data Protection for Church of Scotland Congregations
Protection of Personal Information presented by Seminar Adv. Alan Lambert Sunnyside Hotel 25 October 2012.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
The Data Protection Act 1998 The Eight Principles.
Managing Risks Associated With Privacy Alison Baker- Senior Associate Hall & Wilcox 24 November
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Data Protection: An enabler? David Freeland, Senior Policy Officer 23 October 2014.
Data Protection Act AS Module Heathcote Ch. 12.
Data Protection Act & Freedom of Information Simon Mansell Corporate Governance and Information Team.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
IT Applications Theory Slideshows By Mark Kelly Vceit.com Privacy Laws.
IM NETWORK MEETING 20 TH JULY, 2010 CONSULTATION WITH 3 RD PARTIES.
Data Protection - Rights & Responsibilities Information Commissioner’s Office Orkney Practice Forum 4 th July 2007.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
The Protection of Personal Information Bill 13 February
Serving the Public. Regulating the Profession. CANADA’S ANTI-SPAM LEGISLATION (CASL) Training for Chapters Based on Guidelines for Chapters First published.
DATA PROTECTION ACT INTRODUCTION The Data Protection Act 1998 came into force on the 1 st March It is more far reaching than its predecessor,
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
The EU General Data Protection Regulation Frank Rankin.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Data protection—training materials [Name and details of speaker]
Sharing Information Legally Lindsay Ould London Borough of Lewisham.
SEMINAR: Copyright 2012 All rights reserved. This presentation and/or any part thereof is intended for personal use and may not be reproduced or distributed.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Protection of Personal Information Act An Analysis on the impact.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
Introduction to Data Protection Plan »Brief Introduction to Data Protection  Example  Principles  P3, 4, 7  Sensitive Data  Conditions for Processing.
TRANSBORDER DATA FLOWS INA MEIRING. THE PROTECTION OF PERSONAL INFORMATION ACT (“POPI”) > 'personal information' means information relating to an identifiable,
Data Protection Laws in the European Union John Armstrong CMS Cameron McKenna.
Students’ Unions 2011 Data Protection and Students’ Unions Mairead O’Reilly 19 July 2011.
Personal Data Protection
Monique Jefferson & Nadine Mather
The Data Protection Act 1998
Privacy principles Individual written policies
Issues of personal data protection in scientific research
IT Applications Theory Slideshows
Data Protection The Current Regime
General Data Protection Regulation
The Data Protection Act 1998
Data workshop WhOSE DATA IS IT ANYWAY? Alexia Christie
Data Protection Legislation
PERSONAL DATA PROTECTION ACT 2010
Data Protection & Freedom of Information- An Introduction
GENERAL DATA PROTECTION REGULATION (GDPR)
The General Data Protection Regulation (GDPR)
Implications of the PoPI Act for the higher education sector
New Data Protection Legislation
G.D.P.R General Data Protection Regulations
Data Protection principles
Relocation CARNIVAL come one…come all
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
GDPR Workshop MEU Symposium Prague 2018
PERSONAL INFORMATION BILL
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
Dr Elizabeth Lomas The General Data Protection Regulation (GDPR): Changing the data protection landscape Dr Elizabeth Lomas
Presentation transcript:

The Protection of Personal Information Act

Overview In a Nutshell Purpose of POPI Scope of POPI Concepts Conditions for Processing Special PI Transborder Information Flows Direct Marketing Compliance Enforcement Transitional Arrangements & Status

In a Nutshell POPI will regulate the processing of personal information (PI) by responsible parties (RP) Conditions: PI must be collected directly from the data subject (subject to exceptions) PI must be collected for specific, explicitly defined purpose PI can only be processed with DS’ consent, under contract or other limited ground PI must not be retained for longer than necessary for purpose for which collected PI can only be processed further if compatible with original purpose PI must be complete, accurate not misleading and updated where necessary RP must take reasonably practicable steps to ensure that the DS is aware of PI being collected and purpose for which collected RP must take appropriate and reasonable measures to protect PI PI can’t be sent offshore unless DS has consented or equivalent protection No fault civil liability if damage results from certain breaches In serious cases, fine or imprisonment not exceeding 10 years or both

Purpose of POPI Give effect to the constitutional right to privacy while balancing this right against other rights such as the right of access to information protection of important interests including the free flow of information To promote the protection of personal information processed by public and private bodies To provide for the establishment of an Information Regulator To provide for the rights of persons regarding unsolicited communications and automated decision making To regulate the flow of personal information across the borders of the Republic Facilitate international commercial relationships Keep up with international trends, e.g. EU data protection

Scope of POPI Applies to the processing of personal information entered in a record by or for a responsible party where the responsible party is domiciled in South Africa or not domiciled in South Africa, but makes use of automated or non-automated means in the Republic, unless those means are used only to forward personal information through the Republic. Subject to certain exclusions: in the course of a purely personal or household activity that has been de-identified to the extent that it cannot be re-identified again journalistic, literary or artistic purposes under certain circumstances etc. Does not apply to the processing of personal information: in the course of a purely personal or household activity that has been de-identified to the extent that it cannot be re-identified again by or on behalf of a public body (national security, combating and prosecution of crime under certain circumstances) By the cabinet, provincial executive council By the judiciary in certain circumstances By journalists in certain circumstances Exempted by the Information Protection Regulator

Concepts Personal Information (PI) Data Subject (DS) Responsible Party (RP) Processing Special Personal Information Operator Consent

What is “personal information”? Information relating to an identifiable, living, natural person, and where it is applicable, an identifiable, existing juristic person, including: race, gender, sex, pregnancy, marital status, national, ethnic or social origin, colour, sexual orientation, age, physical or mental health, well-being, disability, religion, conscience, belief, culture, language and birth of the person; education or the medical, financial, criminal or employment history of the person any identifying number, symbol, e-mail address, physical address, telephone number, location information, online identifier or other particular assignment to the person the biometric information of the person;

What is “personal information”? the personal opinions, views or preferences of the person correspondence sent by the person that is implicitly or explicitly of a private or confidential nature or further correspondence that would reveal the contents of the original correspondence the views or opinions of another individual about the person; and the name of the person if it appears with other personal information relating to the person or if the disclosure of the name itself would reveal information about the person

Data Subject, Responsible Party, Operator The person to whom Personal Information relates Responsible Party A private or public body or any other person which alone or in conjunction with others determines the purpose of and means for processing personal information Operator An operator is a person who processes personal information for a responsible party in terms of a contract or mandate, without coming under the direct authority of that party

What is “Processing”? Any operation or activity or any set of operations concerning personal information (whether or not by automatic means) including: the collection, receipt, recording, organisation, collation, storage, updating or modification, retrieval, alteration, consultation or use; dissemination by means of transmission, distribution or making available in any other form; or merging, linking, as well as restriction, degradation, erasure or destruction of information

Consent “consent” means any voluntary, specific and informed expression of will in terms of which permission is given for the processing of personal information.

Conditions for Processing 1. Accountability 2. Processing limitation 3. Purpose specification 4. Further processing limitation 5. Information quality 6. Openness 7. Security safeguards 8. Data subject participation

1. Accountability Responsible party must ensure that all the conditions and the measures that give effect to them are complied with. i.e. statement of responsible party’s accountability for lawful processing

2. Processing limitation Processing must be done lawfully and in a manner that does nor infringe the privacy of the data subject PI can only be processed if the processing is adequate, relevant and not excessive, given the purpose for which it is processed PI may only be processed if: Data subject consents to processing Processing necessary to perform under a contract to which data subject is party In terms of an obligation imposed on RP by law Processing protects legitimate interest of data subject Processing necessary for performance of public duty by public body Processing necessary to pursue the legitimate interests of the RP or 3rd party to whom PI was supplied

2. Processing limitation ctd. DS may withdraw consent to processing, but RP can still process if e.g.: necessary for fulfilling contract with DS required by law Collection of PI must take place directly from the data subject unless: PI is contained in a public record or deliberately made public by the data subject Data subject has consented to collection from another source Collection from another source would not prejudice a legitimate interest of the data subject Collection is necessary for one of a variety of state purposes including the combatting of crime, national security etc Collection from another source is necessary to maintain the legitimate interests of the RP or a 3rd party to whom PI supplied Direct collection would prejudice a lawful purpose of collection Direct collection is not reasonably practicable in the circumstances

3. Purpose specification PI must be collected for a specific, explicitly defined and lawful purpose Data subject must be aware of purpose of collection (see “Openness”) RP must destroy / delete or de-identify PI when no longer authorised to retain it The destruction or deletion of a record of personal information must be done in a manner that prevents its reconstruction in an intelligible form.

Retention of Records Records of PI must not be retained for longer than necessary to achieve the purpose for which the PI was collected or subsequently processed unless: retention required by law RP reasonably requires record for its functions or activities retention required by contract DS has consented to retention Records of personal information may be retained for longer periods for historical, statistical or research purposes IF the responsible party has established appropriate safeguards against the records being used for any other purposes. If PI used to make a decision regarding the DS, the RP must retain the record: for as long as prescribed by a law code of conduct or otherwise for as long as needed for RP to request access to the record

4. Further processing limitation Further processing must be compatible with purpose of collection Relevant factors for this include: Relationship between original purpose and purpose of further processing Contract between the parties POPI also sets out circumstances where further processing IS compatible with original purpose including: DS consented to further processing obligation imposed by law conduct of legal proceedings historical, statistical or research purposes S15 several other allowances for further processing e.g. national security

5. Information Quality RP must take reasonably practicable steps to ensure that PI is complete, accurate not misleading and updated when necessary When taking these steps the RP must take account of the purpose for which the PI is collected or further processed

6. Openness Before or as soon as reasonably practical after collection… RP must take reasonably practicable steps to ensure that the DS is aware of (most importantly): PI being collected Where PI collected from (if not direct from DS) Name and address of RP Purpose for which collected RP intends to transfer PI to a “third country” or international organisation and the level of protection afforded to PI there Number of circumstances not necessary including: Consent of DS No prejudice to legitimate interests of DS if non-compliance Compliance not reasonably practicable PI not used in a form from which DS can be identified PI used for statistical, historical, research purposes

7. Security Safeguards Responsible party must secure the integrity and confidentiality of PI in its possession or under its control By taking appropriate, reasonable technical and organisational measures to prevent: Loss, damage or unauthorised destruction of PI Unlawful access to or processing of PI

Prescribed Security Measures The responsible party must take reasonable measures to: Identify all reasonably foreseeable internal and external risks to PI Establish and maintain appropriate safeguards against the risks identified Regularly verify that the safeguards are effectively implemented Ensure that safeguards are continually updated in response to new risks or deficiencies in previously implemented safeguards “The responsible party must have due regard to generally accepted information security practices and procedures which may apply to it generally or be required in terms of specific industry or professional rules and regulations.” [s19(3)]

Operators If an operator is processing PI for a responsible party it must: Process the PI only with the knowledge or authorisation of the responsible party Treat the PI as confidential and not disclose it “unless required by law or in the course of the proper performance of [its] duties” Same is true where any other party processes for the RP OR the operator The responsible party must i.t.o. a written contract ensure that an operator also establishes and maintains the prescribed security measures Operator must immediately inform responsible party where reasonable grounds to believe PI has been accessed or acquired by an unauthorised person.

Notification of Security Compromises Where reasonable grounds exist to believe that PI has been accessed or acquired by an unauthorised person, the RP must notify the Regulator and the data subject Notification must take place ASAP after discovery of the compromise, subject to Legitimate needs of law enforcement Need to investigate the scale of the breach and restore integrity of RP’s information system Sufficient information must be given to data subject to allow for protective measures to be taken

8. Data Subject Participation Data subject can request whether a RP holds PI about the data subject (no charge) the record / description of that PI including all 3rd parties who have access to that PI Data subject may also require the RP to: correct or delete PI that is inaccurate, irrelevant, excessive, out of date, incomplete, misleading or obtained unlawfully Delete PI that RP is no longer authorised to retain under principle 3 (purpose specification)

Processing of special personal information A responsible party may not process personal information concerning the religious or philosophical beliefs, race or ethnic origin, trade union membership, political persuasion, health or sex life or biometric information of a data subject; or the criminal behaviour of a data subject to the extent that the information relates to the alleged commission by a data subject of any offence; or any proceedings in respect of any offence allegedly committed by a data subject or the disposal of such proceedings. Subject to specific conditions s26 & 27

Enforcement Following complaint and investigation Regulator may issue an enforcement notice: take steps or refrain from taking steps within stated period OR stop processing PI specified in the notice or stop processing PI for the purpose or in the manner specified within stated period Failure to comply with enforcement notice penalties = fine or imprisonment not exceeding 10 years, or both Regulator may issue administrative fines essentially an admission of guilt fine max of R10 million RP may elect to be tried in court s73 onwards

Civil Remedies Civil action – extends rights under the common law and violation of constitutional right to privacy. Data subject (or the Regulator at his / her request) may bring action for damages against the RP i.r.o.: breach of any of the processing conditions failure to notify of security compromise unlawful direct marketing unlawful transfer of PI outside borders of RSA NB whether or not there is intent or negligence on part of RP – i.e. no-fault liability UNLESS: Vis Maior Consent by plaintiff Fault of plaintiff Compliance not reasonably practicable in the circumstances Regulator granted an exemption Damages: compensation for patrimonial AND non-patrimonial loss aggravated damages at discretion of court s99

Transborder Information Flows Responsible party in RSA may not transfer PI to a 3rd party in a foreign country unless: Recipient is subject to a law, binding corporate rules or binding agreement that provide an adequate level of protection that: effectively upholds principles for reasonable processing of PI that are substantially similar to the conditions for the lawful processing of PI includes substantially similar provisions on transborder information flows to 3rd parties in a foreign country OR Data subject consents to transfer; OR Transfer necessary for performance of contract between RP and DS or implementation of pre-contractual measures in response to DS’s request; OR Transfer is necessary for conclusion or performance of a contract concluded in the interest of the DS between RP and 3rd party OR Transfer is for the benefit of the DS, but it is not reasonably practicable to get the data subject’s consent, and the data subject would be likely to give it. s72

Direct Marketing 1 s45 of ECTA repealed by POPI (Unsolicited goods, services or communications) Direct Marketing will be “opt-in” No Direct marketing UNLESS data subject has given consent RP may only request consent ONCE OR Data Subject is an existing customer contact detail obtained in context of sale of good or service direct marketing is of similar goods/services data subject given opportunity to object to direct marketing when data collected and with each communication All direct marketing communications must contain: identity of person on whose behalf sent contact details for unsubscribe

Direct Marketing 2 Distribution of marketing databases: PI can only be distributed by collector of data with DS’ consent (explicit) [s15(1)(a)] PI can only be received by the “marketer” if the DS has consented to the distribution [s12(1)] Marketer must probably still obtain consent from DS to market to the DS [s69(1)] Marketer must notify the DS that it has received the PI and the source [s18(1)(a)]

Direct Marketing 3 CPA s11(3) provides for National Opt-out Registry (NOR) How will NOR work with POPI? Marketer must probably STILL consult the NOR i.t.o. the CPA

Compliance Complete compliance is not realistic Requirement – what is reasonably practicable Compliance Process Assessment Compliance Plan Implementation Maintenance (enforce and review)

Information Officers & PAIA Same person as for PAIA: in the case of a juristic person— (i) the chief executive officer or equivalent officer of the juristic person or any person duly authorised by that officer; or (ii) the person who is acting as such or any person duly authorised by such acting person; Duty to ensure compliance with POPI Deputy Information Officers Appointed in same manner as PAIA duties of Information Officer may be delegated to them PAIA Manual to include: “…sufficient detail to facilitate a request for access to a record of the body, a description of the subjects on which the body holds records and the categories of records held on each subject;”

Transitional Arrangements All processing of PI to conform with POPI within one year of date of commencement Period can be extended by minister after consultation with the Regulator in respect of different classes of information and bodies by an additional period not to exceed three years.

Status Signed into law on 26 November 2013 Certain sections commenced 11 April 2014 definitions establishment of Regulator General commencement date unknown

Presentation did not cover The following are also dealt with in POPI: Information Regulator Establishment, powers, duties etc Codes of Conduct Details of enforcement Exemptions from application of POPI Prior authorisation for certain types of processing: Linking PI via unique identifiers Information on criminal, unlawful or objectionable conduct Credit reporting Transborder info transfer of special PI or PI re children Automated decision making

Questions and general discussion www.dingley.co.za