SLIDE 7
- Adv. Mabel Slabbert (c) UNAUTHORISED REDISTRIBUTION OF THIS MATERIAL IS PUNISHABLE BE LAW.
THE ACT EXPLAINED
The 8 conditions for the Lawful Processing
5.) Security y safeguards
- The responsible party must secure the integrity and confidentiality
- f the Personal Information (PI) in its possession by taking
appropriate, reasonable, technical and organizational measures to prevent loss, damage, or destruction and unlawful access, In order to do this, the responsible party must:
- Identify all reasonably foreseeable internal and external risks
to PI in its possession or under its control
- Establish and maintain appropriate safeguards against
identified risks Regularly verify that safeguards are effectively implemented
- Ensure safeguards are regularly updated in response to new
risks or deficiencies,
6.) In doing so,
- The responsible party must have due regard to generally
accepted information security practices and procedures.
___________________________________ ___________________________________ ___________________________________ ___________________________________ ___________________________________ ___________________________________ ___________________________________
THE ACT EXPLAINED
The 8 conditions for the Lawful Processing
7) Data subject particip ipation ion
The data subject is entitled to:
- Enquire, free of charge, whether his I her PI is being
processed
- Request description of his I her PI
- Request information about the recipients of his I her PI
- Challenge the accuracy of their PI
- Request correction of their information (if inaccurate,
irrelevant, excessive, out of date, incomplete, misleading or
- btained unlawfully)
- Request deletion
___________________________________ ___________________________________ ___________________________________ ___________________________________ ___________________________________ ___________________________________ ___________________________________
THE ACT EXPLAINED
The 8 conditions for the Lawful Processing
8) Processing and Compl mplian iance Audits
Organisations should do processing and compliance audits by:
- Identifying all the collection points of personal information,
like websites, application forms, call centres, employment application forms and event attendance sheets,
- Identifying personal information being collected and
whether it is being collected directly from the data subject
- r via a third party,
- Identifying all purposes for processing both internal and
external access (including disclosure)
- Identifying when exceptions to conditions for lawful
processing apply,
- Identifying all purposes for processing both internal and
external access (including disclosure)
___________________________________ ___________________________________ ___________________________________ ___________________________________ ___________________________________ ___________________________________ ___________________________________