%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 12 0 R 14 0 R ] /Count 3 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250704223733+00'00') /ModDate (D:20250704223733+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Length 7197 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 81.596 521.469 665.138 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 81.596 l 565.984 81.596 l 565.984 745.984 l f 45.266 746.734 m 45.266 81.596 l 46.016 81.596 l 46.016 745.984 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(GDPR: PROTECTING YOUR DATA)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(The international law of data protection has changed and the General Data Protection Regulation \(GDPR\) came into effect )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(on the 25 May 2018. There is a great deal of information on GDPR. Unfortunately, a lot of it is legal jargon, which can be )] TJ ET BT 61.016 615.442 Td /F4 9.0 Tf [(overwhelming if you are not a legal expert.)] TJ ET BT 61.016 595.453 Td /F4 9.0 Tf [(The South African equivalent to GDPR is the Protection of Personal Information Act \(POPIA\); which has not been finalised )] TJ ET BT 61.016 584.464 Td /F4 9.0 Tf [(yet. This article will explain GDPR, compliance requirements and the key benefits and challenges involved in its )] TJ ET BT 61.016 573.475 Td /F4 9.0 Tf [(implementation.)] TJ ET BT 61.016 553.486 Td /F1 9.0 Tf [(Quick overview)] TJ ET BT 61.016 533.497 Td /F4 9.0 Tf [(GDPR is a law that governs data usage, user privacy rights, data risk management and data security systems within )] TJ ET BT 61.016 522.508 Td /F4 9.0 Tf [(private and public organisations. It highlights the rights of individuals, which are )] TJ ET BT 78.360 502.535 Td /F4 9.0 Tf [(1.)] TJ ET BT 91.016 502.519 Td /F4 9.0 Tf [(to control how personal data is collected and managed; and)] TJ ET BT 78.360 491.546 Td /F4 9.0 Tf [(2.)] TJ ET BT 91.016 491.530 Td /F4 9.0 Tf [(to place new obligations on organisations to be more accountable for data protection.)] TJ ET BT 61.016 471.541 Td /F4 9.0 Tf [(Complying with GDPR is not a simple task, and neither will be complying with South Africa’s own Protection of Personal )] TJ ET BT 61.016 460.552 Td /F4 9.0 Tf [(Information Act \(POPIA\). However, it is unavoidable and cannot be ignored. Managing data privacy is a serious issue. )] TJ ET BT 61.016 449.563 Td /F4 9.0 Tf [(Until the South African Regulations are finalised and enforced, local companies are encouraged to look to the GDPR for )] TJ ET BT 61.016 438.574 Td /F4 9.0 Tf [(guidance. Whilst there are some differences between POPIA and GDPR in requirements, the principles are similar.)] TJ ET BT 61.016 418.585 Td /F1 9.0 Tf [(How does an organisation comply?)] TJ ET 0.153 0.153 0.153 RG 85.866 401.412 m 85.866 401.824 85.696 402.234 85.404 402.526 c 85.113 402.817 84.703 402.987 84.291 402.987 c 83.878 402.987 83.469 402.817 83.177 402.526 c 82.885 402.234 82.716 401.824 82.716 401.412 c 82.716 401.000 82.885 400.590 83.177 400.298 c 83.469 400.007 83.878 399.837 84.291 399.837 c 84.703 399.837 85.113 400.007 85.404 400.298 c 85.696 400.590 85.866 401.000 85.866 401.412 c f BT 91.016 398.596 Td /F4 9.0 Tf [(Raise awareness)] TJ ET BT 61.016 378.607 Td /F4 9.0 Tf [(Decision makers and key people in the organisation need to be aware that the law has changed to include GDPR, and )] TJ ET BT 61.016 367.618 Td /F4 9.0 Tf [(need to understand its impact on data management.)] TJ ET 85.866 350.445 m 85.866 350.857 85.696 351.267 85.404 351.559 c 85.113 351.850 84.703 352.020 84.291 352.020 c 83.878 352.020 83.469 351.850 83.177 351.559 c 82.885 351.267 82.716 350.857 82.716 350.445 c 82.716 350.033 82.885 349.623 83.177 349.331 c 83.469 349.040 83.878 348.870 84.291 348.870 c 84.703 348.870 85.113 349.040 85.404 349.331 c 85.696 349.623 85.866 350.033 85.866 350.445 c f BT 91.016 347.629 Td /F4 9.0 Tf [(Information held)] TJ ET BT 61.016 327.640 Td /F4 9.0 Tf [(An information audit, which includes any personal data held by individuals within the organisation, has to be done. The )] TJ ET BT 61.016 316.651 Td /F4 9.0 Tf [(audit will establish which information the organisation has, who it’s shared with and where it came from.)] TJ ET 85.866 299.478 m 85.866 299.890 85.696 300.300 85.404 300.592 c 85.113 300.883 84.703 301.053 84.291 301.053 c 83.878 301.053 83.469 300.883 83.177 300.592 c 82.885 300.300 82.716 299.890 82.716 299.478 c 82.716 299.066 82.885 298.656 83.177 298.364 c 83.469 298.073 83.878 297.903 84.291 297.903 c 84.703 297.903 85.113 298.073 85.404 298.364 c 85.696 298.656 85.866 299.066 85.866 299.478 c f BT 91.016 296.662 Td /F4 9.0 Tf [(Communication privacy)] TJ ET BT 61.016 276.673 Td /F4 9.0 Tf [(Review your privacy notices and governance, identify gaps and prepare for the changes required when implementing )] TJ ET BT 61.016 265.684 Td /F4 9.0 Tf [(GDPR.)] TJ ET 85.866 248.511 m 85.866 248.923 85.696 249.333 85.404 249.625 c 85.113 249.916 84.703 250.086 84.291 250.086 c 83.878 250.086 83.469 249.916 83.177 249.625 c 82.885 249.333 82.716 248.923 82.716 248.511 c 82.716 248.099 82.885 247.689 83.177 247.397 c 83.469 247.106 83.878 246.936 84.291 246.936 c 84.703 246.936 85.113 247.106 85.404 247.397 c 85.696 247.689 85.866 248.099 85.866 248.511 c f BT 91.016 245.695 Td /F4 9.0 Tf [(Individual rights)] TJ ET BT 61.016 225.706 Td /F4 9.0 Tf [(Make sure procedures cover each individual’s rights, including deleting personal data and providing data electronically in )] TJ ET BT 61.016 214.717 Td /F4 9.0 Tf [(all commonly used formats.)] TJ ET 85.866 197.544 m 85.866 197.956 85.696 198.366 85.404 198.658 c 85.113 198.949 84.703 199.119 84.291 199.119 c 83.878 199.119 83.469 198.949 83.177 198.658 c 82.885 198.366 82.716 197.956 82.716 197.544 c 82.716 197.132 82.885 196.722 83.177 196.430 c 83.469 196.139 83.878 195.969 84.291 195.969 c 84.703 195.969 85.113 196.139 85.404 196.430 c 85.696 196.722 85.866 197.132 85.866 197.544 c f BT 91.016 194.728 Td /F4 9.0 Tf [(Subject access requests)] TJ ET BT 61.016 174.739 Td /F4 9.0 Tf [(Update data management procedures, prepare for handling requests from consumers within the new time-frame and )] TJ ET BT 61.016 163.750 Td /F4 9.0 Tf [(provide additional information.)] TJ ET 85.866 146.577 m 85.866 146.989 85.696 147.399 85.404 147.691 c 85.113 147.982 84.703 148.152 84.291 148.152 c 83.878 148.152 83.469 147.982 83.177 147.691 c 82.885 147.399 82.716 146.989 82.716 146.577 c 82.716 146.165 82.885 145.755 83.177 145.463 c 83.469 145.172 83.878 145.002 84.291 145.002 c 84.703 145.002 85.113 145.172 85.404 145.463 c 85.696 145.755 85.866 146.165 85.866 146.577 c f BT 91.016 143.761 Td /F4 9.0 Tf [(Legalities when processing personal data)] TJ ET BT 61.016 123.772 Td /F4 9.0 Tf [(Understand the different data processing types, the way the organisation performs and identify the legal basis for carrying )] TJ ET BT 61.016 112.783 Td /F4 9.0 Tf [(out and documenting it appropriately.)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Page /Parent 3 0 R /Contents 13 0 R >> endobj 13 0 obj << /Length 10297 >> stream 0.153 0.153 0.153 rg 0.153 0.153 0.153 RG 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 88.402 521.469 669.582 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 566.734 757.984 m 566.734 88.402 l 565.984 88.402 l 565.984 757.984 l f 45.266 757.984 m 45.266 88.402 l 46.016 88.402 l 46.016 757.984 l f 0.153 0.153 0.153 rg 0.153 0.153 0.153 RG 85.866 743.009 m 85.866 743.422 85.696 743.831 85.404 744.123 c 85.113 744.415 84.703 744.584 84.291 744.584 c 83.878 744.584 83.469 744.415 83.177 744.123 c 82.885 743.831 82.716 743.422 82.716 743.009 c 82.716 742.597 82.885 742.187 83.177 741.896 c 83.469 741.604 83.878 741.434 84.291 741.434 c 84.703 741.434 85.113 741.604 85.404 741.896 c 85.696 742.187 85.866 742.597 85.866 743.009 c f BT 91.016 740.193 Td /F4 9.0 Tf [(Consent)] TJ ET BT 61.016 720.204 Td /F4 9.0 Tf [(The way the organisation seeks, obtains and determines consent may need to be reviewed and changed.)] TJ ET 85.866 703.031 m 85.866 703.444 85.696 703.853 85.404 704.145 c 85.113 704.437 84.703 704.606 84.291 704.606 c 83.878 704.606 83.469 704.437 83.177 704.145 c 82.885 703.853 82.716 703.444 82.716 703.031 c 82.716 702.619 82.885 702.209 83.177 701.918 c 83.469 701.626 83.878 701.456 84.291 701.456 c 84.703 701.456 85.113 701.626 85.404 701.918 c 85.696 702.209 85.866 702.619 85.866 703.031 c f BT 91.016 700.215 Td /F4 9.0 Tf [(Protecting children’s data)] TJ ET BT 61.016 680.226 Td /F4 9.0 Tf [(Systems to verify ages and can seek parental/guardian consent for a data processing activities should be designed and )] TJ ET BT 61.016 669.237 Td /F4 9.0 Tf [(developed.)] TJ ET 85.866 652.064 m 85.866 652.477 85.696 652.886 85.404 653.178 c 85.113 653.470 84.703 653.639 84.291 653.639 c 83.878 653.639 83.469 653.470 83.177 653.178 c 82.885 652.886 82.716 652.477 82.716 652.064 c 82.716 651.652 82.885 651.242 83.177 650.951 c 83.469 650.659 83.878 650.489 84.291 650.489 c 84.703 650.489 85.113 650.659 85.404 650.951 c 85.696 651.242 85.866 651.652 85.866 652.064 c f BT 91.016 649.248 Td /F4 9.0 Tf [(Data breaches)] TJ ET BT 61.016 629.259 Td /F4 9.0 Tf [(Procedures for both the customer and regulator need to be in place to detect, report and investigate a personal data )] TJ ET BT 61.016 618.270 Td /F4 9.0 Tf [(breach.)] TJ ET 85.866 601.097 m 85.866 601.510 85.696 601.919 85.404 602.211 c 85.113 602.503 84.703 602.672 84.291 602.672 c 83.878 602.672 83.469 602.503 83.177 602.211 c 82.885 601.919 82.716 601.510 82.716 601.097 c 82.716 600.685 82.885 600.275 83.177 599.984 c 83.469 599.692 83.878 599.522 84.291 599.522 c 84.703 599.522 85.113 599.692 85.404 599.984 c 85.696 600.275 85.866 600.685 85.866 601.097 c f BT 91.016 598.281 Td /F4 9.0 Tf [(Data protection by design)] TJ ET BT 61.016 578.292 Td /F4 9.0 Tf [(Assessments and control frameworks have to be developed with guidance from the regulator. Processes need to be )] TJ ET BT 61.016 567.303 Td /F4 9.0 Tf [(developed and have governance for their use.)] TJ ET 85.866 550.130 m 85.866 550.543 85.696 550.952 85.404 551.244 c 85.113 551.536 84.703 551.705 84.291 551.705 c 83.878 551.705 83.469 551.536 83.177 551.244 c 82.885 550.952 82.716 550.543 82.716 550.130 c 82.716 549.718 82.885 549.308 83.177 549.017 c 83.469 548.725 83.878 548.555 84.291 548.555 c 84.703 548.555 85.113 548.725 85.404 549.017 c 85.696 549.308 85.866 549.718 85.866 550.130 c f BT 91.016 547.314 Td /F4 9.0 Tf [(Data Protection Officers)] TJ ET BT 61.016 527.325 Td /F4 9.0 Tf [(Data Protection Officers or a similar role should be appointed to take responsibility for data protection compliance. The )] TJ ET BT 61.016 516.336 Td /F4 9.0 Tf [(organisation has to decide who fits this role best.)] TJ ET 85.866 499.163 m 85.866 499.576 85.696 499.985 85.404 500.277 c 85.113 500.569 84.703 500.738 84.291 500.738 c 83.878 500.738 83.469 500.569 83.177 500.277 c 82.885 499.985 82.716 499.576 82.716 499.163 c 82.716 498.751 82.885 498.341 83.177 498.050 c 83.469 497.758 83.878 497.588 84.291 497.588 c 84.703 497.588 85.113 497.758 85.404 498.050 c 85.696 498.341 85.866 498.751 85.866 499.163 c f BT 91.016 496.347 Td /F4 9.0 Tf [(International work)] TJ ET BT 61.016 476.358 Td /F4 9.0 Tf [(If the organisation works internationally, it is important to establish which data protection authority is most appropriate and )] TJ ET BT 61.016 465.369 Td /F4 9.0 Tf [(where processors and controllers are located.)] TJ ET BT 61.016 445.380 Td /F1 9.0 Tf [(Some benefits of GDPR compliance)] TJ ET 85.866 428.207 m 85.866 428.620 85.696 429.029 85.404 429.321 c 85.113 429.613 84.703 429.782 84.291 429.782 c 83.878 429.782 83.469 429.613 83.177 429.321 c 82.885 429.029 82.716 428.620 82.716 428.207 c 82.716 427.795 82.885 427.385 83.177 427.094 c 83.469 426.802 83.878 426.632 84.291 426.632 c 84.703 426.632 85.113 426.802 85.404 427.094 c 85.696 427.385 85.866 427.795 85.866 428.207 c f BT 91.016 425.391 Td /F4 9.0 Tf [(Greater consumer confidence)] TJ ET BT 61.016 405.402 Td /F4 9.0 Tf [(          GDPR compliance will prove to customers that your organisation is a good custodian of their data. )] TJ ET 85.866 388.229 m 85.866 388.642 85.696 389.051 85.404 389.343 c 85.113 389.635 84.703 389.804 84.291 389.804 c 83.878 389.804 83.469 389.635 83.177 389.343 c 82.885 389.051 82.716 388.642 82.716 388.229 c 82.716 387.817 82.885 387.407 83.177 387.116 c 83.469 386.824 83.878 386.654 84.291 386.654 c 84.703 386.654 85.113 386.824 85.404 387.116 c 85.696 387.407 85.866 387.817 85.866 388.229 c f BT 91.016 385.413 Td /F4 9.0 Tf [(Improved data security)] TJ ET BT 61.016 365.424 Td /F4 9.0 Tf [(GDPR compliance lays the groundwork for improved data security.)] TJ ET 85.866 348.251 m 85.866 348.664 85.696 349.073 85.404 349.365 c 85.113 349.657 84.703 349.826 84.291 349.826 c 83.878 349.826 83.469 349.657 83.177 349.365 c 82.885 349.073 82.716 348.664 82.716 348.251 c 82.716 347.839 82.885 347.429 83.177 347.138 c 83.469 346.846 83.878 346.676 84.291 346.676 c 84.703 346.676 85.113 346.846 85.404 347.138 c 85.696 347.429 85.866 347.839 85.866 348.251 c f BT 91.016 345.435 Td /F4 9.0 Tf [(Reduced data maintenance costs)] TJ ET BT 61.016 325.446 Td /F4 9.0 Tf [(GDPR can help your organisation cut costs by prompting you to retire any data inventory software and legacy applications )] TJ ET BT 61.016 314.457 Td /F4 9.0 Tf [(which are no longer relevant to your business.)] TJ ET 85.866 297.284 m 85.866 297.697 85.696 298.106 85.404 298.398 c 85.113 298.690 84.703 298.859 84.291 298.859 c 83.878 298.859 83.469 298.690 83.177 298.398 c 82.885 298.106 82.716 297.697 82.716 297.284 c 82.716 296.872 82.885 296.462 83.177 296.171 c 83.469 295.879 83.878 295.709 84.291 295.709 c 84.703 295.709 85.113 295.879 85.404 296.171 c 85.696 296.462 85.866 296.872 85.866 297.284 c f BT 91.016 294.468 Td /F4 9.0 Tf [(Increased alignment with evolving technology)] TJ ET BT 61.016 274.479 Td /F4 9.0 Tf [(GDPR compliance requires that your organisation moves toward improving its network, endpoint, and application security.)] TJ ET 85.866 257.306 m 85.866 257.719 85.696 258.128 85.404 258.420 c 85.113 258.712 84.703 258.881 84.291 258.881 c 83.878 258.881 83.469 258.712 83.177 258.420 c 82.885 258.128 82.716 257.719 82.716 257.306 c 82.716 256.894 82.885 256.484 83.177 256.193 c 83.469 255.901 83.878 255.731 84.291 255.731 c 84.703 255.731 85.113 255.901 85.404 256.193 c 85.696 256.484 85.866 256.894 85.866 257.306 c f BT 91.016 254.490 Td /F4 9.0 Tf [(Better decision-making )] TJ ET BT 61.016 234.501 Td /F4 9.0 Tf [(Thanks to the GDPR, your organisation’s data will become more consolidated, ensuring it’s easier to use and you have a )] TJ ET BT 61.016 223.512 Td /F4 9.0 Tf [(greater understanding of its underlying value.)] TJ ET BT 61.016 203.523 Td /F1 9.0 Tf [(Challenges of GDPR compliance)] TJ ET 85.866 186.350 m 85.866 186.763 85.696 187.172 85.404 187.464 c 85.113 187.756 84.703 187.925 84.291 187.925 c 83.878 187.925 83.469 187.756 83.177 187.464 c 82.885 187.172 82.716 186.763 82.716 186.350 c 82.716 185.938 82.885 185.528 83.177 185.237 c 83.469 184.945 83.878 184.775 84.291 184.775 c 84.703 184.775 85.113 184.945 85.404 185.237 c 85.696 185.528 85.866 185.938 85.866 186.350 c f BT 91.016 183.534 Td /F4 9.0 Tf [(Endless consent prompts for every data process can be time-consuming.)] TJ ET 85.866 175.361 m 85.866 175.774 85.696 176.183 85.404 176.475 c 85.113 176.767 84.703 176.936 84.291 176.936 c 83.878 176.936 83.469 176.767 83.177 176.475 c 82.885 176.183 82.716 175.774 82.716 175.361 c 82.716 174.949 82.885 174.539 83.177 174.248 c 83.469 173.956 83.878 173.786 84.291 173.786 c 84.703 173.786 85.113 173.956 85.404 174.248 c 85.696 174.539 85.866 174.949 85.866 175.361 c f BT 91.016 172.545 Td /F4 9.0 Tf [(High cost to reach GDPR compliance \(e.g. in terms of upgrading security systems\).)] TJ ET 85.866 164.372 m 85.866 164.785 85.696 165.194 85.404 165.486 c 85.113 165.778 84.703 165.947 84.291 165.947 c 83.878 165.947 83.469 165.778 83.177 165.486 c 82.885 165.194 82.716 164.785 82.716 164.372 c 82.716 163.960 82.885 163.550 83.177 163.259 c 83.469 162.967 83.878 162.797 84.291 162.797 c 84.703 162.797 85.113 162.967 85.404 163.259 c 85.696 163.550 85.866 163.960 85.866 164.372 c f BT 91.016 161.556 Td /F4 9.0 Tf [(More work for developers in terms of upgrading security systems.)] TJ ET 85.866 153.383 m 85.866 153.796 85.696 154.205 85.404 154.497 c 85.113 154.789 84.703 154.958 84.291 154.958 c 83.878 154.958 83.469 154.789 83.177 154.497 c 82.885 154.205 82.716 153.796 82.716 153.383 c 82.716 152.971 82.885 152.561 83.177 152.270 c 83.469 151.978 83.878 151.808 84.291 151.808 c 84.703 151.808 85.113 151.978 85.404 152.270 c 85.696 152.561 85.866 152.971 85.866 153.383 c f BT 91.016 150.567 Td /F4 9.0 Tf [(Massive fines for non-compliance, which amounts to 4% of the organisation’s annual turnover.)] TJ ET BT 61.016 130.578 Td /F1 9.0 Tf [(GDPR integration in SU IT Department)] TJ ET BT 61.016 110.589 Td /F4 9.0 Tf [(In many ways, Stellenbosch University’s Information Technology Department has been implementing data and security )] TJ ET BT 61.016 99.600 Td /F4 9.0 Tf [(laws and regulations such as GDPR and POPIA for years.)] TJ ET endstream endobj 14 0 obj << /Type /Page /Parent 3 0 R /Annots [ 16 0 R 18 0 R ] /Contents 15 0 R >> endobj 15 0 obj << /Length 2921 >> stream 0.153 0.153 0.153 rg 0.153 0.153 0.153 RG 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 523.888 521.469 234.096 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 523.888 m 566.734 523.888 l 565.984 524.638 l 46.016 524.638 l f 566.734 757.984 m 566.734 523.888 l 565.984 524.638 l 565.984 757.984 l f 45.266 757.984 m 45.266 523.888 l 46.016 524.638 l 46.016 757.984 l f 61.016 539.638 m 550.984 539.638 l 550.984 540.388 l 61.016 540.388 l f 0.153 0.153 0.153 rg BT 61.016 740.193 Td /F4 9.0 Tf [(We are constantly reminding users on our blog and social media to keep their passwords protected and not leave their )] TJ ET BT 61.016 729.204 Td /F4 9.0 Tf [(PC’s unlocked and unattended. We are the first to alert users via email with regards to phishing attacks and send out )] TJ ET BT 61.016 718.215 Td /F4 9.0 Tf [(warnings on a regular basis. We have also moved toward cloud storage and are happy to say, Microsoft is GDPR )] TJ ET BT 61.016 707.226 Td /F4 9.0 Tf [(compliant. Users have been encouraged to use OneDrive for data storage as it is more secure.)] TJ ET BT 61.016 687.237 Td /F4 9.0 Tf [(Information security is important, therefore we will continue to convey the importance to our users. There is also an )] TJ ET BT 61.016 676.248 Td /F4 9.0 Tf [(Information Security Awareness Training Course available on )] TJ ET 0.373 0.169 0.255 rg BT 307.607 676.248 Td /F4 9.0 Tf [(SUNLearn)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 307.607 675.097 m 349.619 675.097 l S 0.153 0.153 0.153 rg BT 349.619 676.248 Td /F4 9.0 Tf [(. )] TJ ET BT 61.016 656.259 Td /F4 9.0 Tf [(In conclusion, GDPR is beneficial to South African organisations in many ways. Since South African organisations deal )] TJ ET BT 61.016 645.270 Td /F4 9.0 Tf [(with large and sensitive amounts of data, GDPR compliance is required and may reduce security threats and data loss to )] TJ ET BT 61.016 634.281 Td /F4 9.0 Tf [(a large degree. Although this law appears to solve and manage data management issues, there is still limited information )] TJ ET BT 61.016 623.292 Td /F4 9.0 Tf [(regarding their long-term sustainability and among South African users. )] TJ ET BT 61.016 603.303 Td /F4 9.0 Tf [(More detailed information on EU GDPR guidelines for South African Universities can be found )] TJ ET 0.373 0.169 0.255 rg BT 437.171 603.303 Td /F4 9.0 Tf [(in this document)] TJ ET 0.18 w 0 J [ ] 0 d 437.171 602.152 m 502.700 602.152 l S 0.153 0.153 0.153 rg BT 502.700 603.303 Td /F4 9.0 Tf [( compiled )] TJ ET BT 61.016 592.314 Td /F4 9.0 Tf [(by Universities South Africa \(USAf\), an association of South Africa’s public universities.)] TJ ET BT 414.445 572.325 Td /F4 9.0 Tf [([ARTICLE BY MILLY VAN WYHE])] TJ ET 0.400 0.400 0.400 rg BT 61.016 553.836 Td /F2 9.0 Tf [(Posted in:Security | Tagged:Data Protection Act,GDPR,POPI,POPIA | With 0 comments)] TJ ET endstream endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 307.6067 675.4156 349.6187 684.5731 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (https://learn.sun.ac.za/) >> endobj 18 0 obj << /Type /Annot /Subtype /Link /A 19 0 R /Border [0 0 0] /H /I /Rect [ 437.1707 602.4706 502.6997 611.6281 ] >> endobj 19 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/files/2018/07/USAF-EU-GDPR-GUIDELINES_Final_25-May-2018.pdf) >> endobj xref 0 20 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000319 00000 n 0000000348 00000 n 0000000486 00000 n 0000000549 00000 n 0000007798 00000 n 0000007910 00000 n 0000008025 00000 n 0000008145 00000 n 0000008253 00000 n 0000008318 00000 n 0000018669 00000 n 0000018760 00000 n 0000021734 00000 n 0000021862 00000 n 0000021938 00000 n 0000022066 00000 n trailer << /Size 20 /Root 1 0 R /Info 5 0 R >> startxref 22203 %%EOF GDPR: Protecting your data « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

GDPR: Protecting your data

The international law of data protection has changed and the General Data Protection Regulation (GDPR) came into effect on the 25 May 2018. There is a great deal of information on GDPR. Unfortunately, a lot of it is legal jargon, which can be overwhelming if you are not a legal expert.

The South African equivalent to GDPR is the Protection of Personal Information Act (POPIA); which has not been finalised yet. This article will explain GDPR, compliance requirements and the key benefits and challenges involved in its implementation.

Quick overview

GDPR is a law that governs data usage, user privacy rights, data risk management and data security systems within private and public organisations. It highlights the rights of individuals, which are 

  1. to control how personal data is collected and managed; and
  2. to place new obligations on organisations to be more accountable for data protection.

Complying with GDPR is not a simple task, and neither will be complying with South Africa’s own Protection of Personal Information Act (POPIA). However, it is unavoidable and cannot be ignored. Managing data privacy is a serious issue. Until the South African Regulations are finalised and enforced, local companies are encouraged to look to the GDPR for guidance. Whilst there are some differences between POPIA and GDPR in requirements, the principles are similar.

How does an organisation comply?

  • Raise awareness

Decision makers and key people in the organisation need to be aware that the law has changed to include GDPR, and need to understand its impact on data management.

  • Information held

An information audit, which includes any personal data held by individuals within the organisation, has to be done. The audit will establish which information the organisation has, who it’s shared with and where it came from.

  • Communication privacy

Review your privacy notices and governance, identify gaps and prepare for the changes required when implementing GDPR.

  • Individual rights

Make sure procedures cover each individual’s rights, including deleting personal data and providing data electronically in all commonly used formats.

  • Subject access requests

Update data management procedures, prepare for handling requests from consumers within the new time-frame and provide additional information.

  • Legalities when processing personal data

Understand the different data processing types, the way the organisation performs and identify the legal basis for carrying out and documenting it appropriately.

  • Consent

The way the organisation seeks, obtains and determines consent may need to be reviewed and changed.

  • Protecting children’s data

Systems to verify ages and can seek parental/guardian consent for a data processing activities should be designed and developed.

  • Data breaches

Procedures for both the customer and regulator need to be in place to detect, report and investigate a personal data breach.

  • Data protection by design

Assessments and control frameworks have to be developed with guidance from the regulator. Processes need to be developed and have governance for their use.

  • Data Protection Officers

Data Protection Officers or a similar role should be appointed to take responsibility for data protection compliance. The organisation has to decide who fits this role best.

  • International work

If the organisation works internationally, it is important to establish which data protection authority is most appropriate and where processors and controllers are located.

Some benefits of GDPR compliance

  • Greater consumer confidence

          GDPR compliance will prove to customers that your organisation is a good custodian of their data. 

  • Improved data security

GDPR compliance lays the groundwork for improved data security.

  • Reduced data maintenance costs

GDPR can help your organisation cut costs by prompting you to retire any data inventory software and legacy applications which are no longer relevant to your business.

  • Increased alignment with evolving technology

GDPR compliance requires that your organisation moves toward improving its network, endpoint, and application security.

  • Better decision-making 

Thanks to the GDPR, your organisation’s data will become more consolidated, ensuring it’s easier to use and you have a greater understanding of its underlying value.

Challenges of GDPR compliance

  • Endless consent prompts for every data process can be time-consuming.
  • High cost to reach GDPR compliance (e.g. in terms of upgrading security systems).
  • More work for developers in terms of upgrading security systems.
  • Massive fines for non-compliance, which amounts to 4% of the organisation’s annual turnover.

GDPR integration in SU IT Department

In many ways, Stellenbosch University’s Information Technology Department has been implementing data and security laws and regulations such as GDPR and POPIA for years.

We are constantly reminding users on our blog and social media to keep their passwords protected and not leave their PC’s unlocked and unattended. We are the first to alert users via email with regards to phishing attacks and send out warnings on a regular basis. We have also moved toward cloud storage and are happy to say, Microsoft is GDPR compliant. Users have been encouraged to use OneDrive for data storage as it is more secure.

Information security is important, therefore we will continue to convey the importance to our users. There is also an Information Security Awareness Training Course available on SUNLearn. 

In conclusion, GDPR is beneficial to South African organisations in many ways. Since South African organisations deal with large and sensitive amounts of data, GDPR compliance is required and may reduce security threats and data loss to a large degree. Although this law appears to solve and manage data management issues, there is still limited information regarding their long-term sustainability and among South African users. 

More detailed information on EU GDPR guidelines for South African Universities can be found in this document compiled by Universities South Africa (USAf), an association of South Africa’s public universities.

[ARTICLE BY MILLY VAN WYHE]

Tags: , , ,

Comments are closed.

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.