%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 18 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250701062133+00'00') /ModDate (D:20250701062133+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 3204 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 366.170 521.469 380.564 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 366.545 520.719 379.814 re S 0.773 0.773 0.773 rg 61.016 381.920 m 550.984 381.920 l 550.984 382.670 l 61.016 382.670 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(POPIA: HOW VALUABLE IS PERSONAL INFORMATION?)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Personal information has valueto the individual, to researchers, )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(to the University, and to malicious attackers. The first step )] TJ ET BT 61.016 615.442 Td /F4 9.0 Tf [(towards appropriately securing personal information involves )] TJ ET BT 61.016 604.453 Td /F4 9.0 Tf [(building a proper understanding of the value of the personal )] TJ ET BT 61.016 593.464 Td /F4 9.0 Tf [(information you use for institutional processes and research )] TJ ET BT 61.016 582.475 Td /F4 9.0 Tf [(projects.)] TJ ET BT 61.016 562.486 Td /F4 9.0 Tf [(The Division for Information Governance has launched an online )] TJ ET BT 61.016 551.497 Td /F4 9.0 Tf [(privacy impact self-assessment tool. The assessment allows you )] TJ ET BT 61.016 540.508 Td /F4 9.0 Tf [(to quickly assess the value of personal information based on )] TJ ET BT 61.016 529.519 Td /F4 9.0 Tf [(legislative definitions and how the information may be abused by )] TJ ET BT 61.016 518.530 Td /F4 9.0 Tf [(malicious users. The assessment results provide further guidance )] TJ ET BT 61.016 507.541 Td /F4 9.0 Tf [(on addressing the risks associated with working with higher value )] TJ ET BT 61.016 496.552 Td /F4 9.0 Tf [(personal information.)] TJ ET BT 61.016 476.563 Td /F4 9.0 Tf [(For the more complex or higher value institutional processes and )] TJ ET BT 61.016 465.574 Td /F4 9.0 Tf [(research projects, the Division offers facilitated impact assessments. For more details, visit )] TJ ET 0.373 0.169 0.255 rg BT 424.130 465.574 Td /F4 9.0 Tf [(www.sun.ac.za/privacy)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 424.130 464.423 m 515.651 464.423 l S 0.153 0.153 0.153 rg BT 515.651 465.574 Td /F4 9.0 Tf [( or )] TJ ET BT 61.016 454.585 Td /F4 9.0 Tf [(contact )] TJ ET 0.373 0.169 0.255 rg BT 92.534 454.585 Td /F4 9.0 Tf [(privacy@sun.ac.za)] TJ ET 0.18 w 0 J [ ] 0 d 92.534 453.434 m 168.692 453.434 l S 0.153 0.153 0.153 rg BT 168.692 454.585 Td /F4 9.0 Tf [(.)] TJ ET 0.373 0.169 0.255 rg BT 61.016 434.596 Td /F4 9.0 Tf [(Also read our previous article, "Getting ready for the Protection of Personal Information Act" here.)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 433.445 m 450.581 433.445 l S 0.153 0.153 0.153 rg BT 325.903 414.607 Td /F4 9.0 Tf [([Article provided by Division for Information Governance])] TJ ET 0.400 0.400 0.400 rg BT 61.016 396.118 Td /F2 9.0 Tf [(Posted in:News,Security | | With 0 comments)] TJ ET q 225.000 0 0 168.000 325.984 478.211 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 424.1297 464.7412 515.6507 473.8987 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://www.sun.ac.za/privacy) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 92.5337 453.7522 168.6917 462.9097 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (mailto:privacy@sun.ac.za) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 433.7632 450.5807 442.9207 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (https://blogs.sun.ac.za/it/en/2021/02/getting-ready-for-the-protection-of-personal-information-act/) >> endobj 18 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 224 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 7983>> stream JFIF``;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 82 C    !'"#%%%),($+!$%$C   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$," }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?( ( ( ( ((⒖(()h((((((((((((E EQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEV]jSٽ N#W=֦+/?~$4ڢK\ i8ݧs:nzq" \Kkk#4ά?kwyarO/ HJ#$B⶝6Ń+0@梤NCǛO[lm>gi?*O{7HkXcۮvl~ޱt)Hʬѕ=A>鿳gɬ&U| }UG${MDjIS(B((((((((h ( (((BQJÂ4ؙI-Ā2N*3s*~u<.žڵLŚ7)o0^(wf=p&UڒGa].xG [i$X/Ë^:T,u)U#v=`vzumwI.1\G5FQrWSN295ZJkT%vzv:El5\᫠KDl cWUKN,KIa#t=G%:J+GOV=rlr$F!uQQPP^^56ޒW 5?|I2ᱵbQqo#ayLJ訤L|ZakN72l?FۊK[k>xhD I)î9La;OOWQIΚ5a=:Ai.N?kiևu188_~=jSVeB* 8-G8Wԁ JE%dke{o+zKYF9Cz{ְ!GCYXRBERֵirvɾIԞIY[T% `N+֩tvrb+%<٤*1nsھy:Nip3ՏNZ[ ?RN9|\IGv Z?t5k:zgLQqva&(0qr^j8i,ƻf$÷'@%Z׏uO,6q1(>/m'f 5]/popŝ}GzcOd}qE2 $P}A08Ί((>5[lI|3.8ح w#9-#[zŽƙ~ڋHe$fwbz{j]5;I2Ow,Or{Oe//# wt ?Gd{>SSRjT+#~Slnuh}6o"E$C++N-V^C .ţFcyf&pAk!زc$cM.FuImfVZ/Xmi-[{DdFo0,I p9Z)]{_ISh|p32E|k~ #t9}񵽻JQСijSݞqglk "2aZsJF7nަ/Z]B{sy,˓kO T?"vF&|Y}Lntxd>d{p{WzNkveK4M2?_K~'ris'YIBkFegcڨ:J[3DPIN\H9|]x\f|C% (6XUg ++|mTԒKKN-c}{R[VEj.Trc QzPz߭xkwk 5cԀ GZ =5%t^E|Ե-BM+-?g׵(ԩ9>24 X `6H^5]-}tHՉ r1\8J0Mw=l:\j.xWǖ~!_rں@NU+<%x2:Aǩ{w<%t{W]WSM0'N~[^=jWGpBǀܚM]:ӳDڎe[o=Or7?1#7#CJ;⮻$Ͳ#g˷STw> /-W`nih<5J}yw+fz|>q F~;[*?]j+eܣ7Kq=_j=n( (((BzZ(W/vs g 1dQ~SKu;PܤPq_p׍I6ueI>pA4|^,ܼ~;m%]Y#55߲|i_HBEnZH?%5U>:>ywrHWmg|)no~twI83,|[SQ{:S֮ՙ..%?™X 3R1+hvjd?hhع1_J Tp& OO4[I ~*𝱶mw}G\XDQEQE|Ts&y2L覻zS1rgKr㤮8i>`{}M8%}?@y}$_sUOjp?+ T9Iu_e(q<)4z|Q+WAg5_LZ\p$瞘ZՅ[?H9lѷe>jNæk]JyMurW!m{I u8:v[is,/"2@`沫Z$f'-iweZX>[/ i\CHn#2QGB)7(4QEdQEQU/HuMddz[q]tٕ*{#IAuajgm7.x>~|r.еFXu-3 ,{A bᯄH.t ihV[EƜ]>k_-{XʣF?jK&oqB1PJ3r,FTQ$h2BMt:{[&BuKñG_6m;xwzldQy|cuhH hЪQ\32[`pp6)N{uI‡GoNX'Xwey-uQU{_i^Zm&*sQjXfjzrەs4͌ *M}chu(Wܯ=pj{4g7WݯN,v)%WZmƟmv4epGP>7^wϧsQElrq~+gߦpf"^u9hj,HOga%ǚ cuO A ʾ^eq5]ȇԔ}]H zik̲c7k>+-ito]$Jh61_F1g'2]ON_ҷj+AjIlXSEO` iZs1UW},:iz$c*&ĬdҤ# ZɢYxe\?C]I¤yy=휖7/<Ơxm4§;P ֚Eg\ˌUF6V9~r5E%[rKˎ$e̒#tQM+Ju ̱I_%8FA+|g֩IEԹ_cC1 4=n+Ǩ* )Zsn\I$kd FX)횆(%(x|=ř;n“vW*s:Sʅ:+Ia$Կ"(*I[CM YE^ uUπ/guĚ9]Q*M-yC\Hʹg*שhzdz.cE$ T 8ezj>oe'X#}1ly?{EPIE-PIE-P=OKSkuQ֮VDc&;: vVW<ƽQG7yZq*DQyyMy=Wq 2qz o-?y-Gm=R(4!{yU+oc={txWG-^ݣ<*2k}Osx fBq54{}ֿږ1.`RmNYx"F1 %Sꥇ-($ b®-RQEsTufcSژgB׭ NQ!AvG@qE'p*ϐ=M@4zck^5˴uՊIT"QO䯩_SEwkQR hGqQR#y>\$O>E?>$QG}E2O>E?>$QKQ@TGG=hR+i|C(\(0(((((( (ʊ(ʊ((( (ʊ(ʊ(((? endstream endobj xref 0 19 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000332 00000 n 0000000369 00000 n 0000000507 00000 n 0000000603 00000 n 0000003859 00000 n 0000003971 00000 n 0000004086 00000 n 0000004206 00000 n 0000004314 00000 n 0000004442 00000 n 0000004522 00000 n 0000004649 00000 n 0000004725 00000 n 0000004852 00000 n 0000005003 00000 n trailer << /Size 19 /Root 1 0 R /Info 5 0 R >> startxref 13154 %%EOF POPIA: How valuable is personal information? « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

POPIA: How valuable is personal information?

Personal information has value—to the individual, to researchers, to the University, and to malicious attackers. The first step towards appropriately securing personal information involves building a proper understanding of the value of the personal information you use for institutional processes and research projects.

The Division for Information Governance has launched an online privacy impact self-assessment tool. The assessment allows you to quickly assess the value of personal information based on legislative definitions and how the information may be abused by malicious users. The assessment results provide further guidance on addressing the risks associated with working with higher value personal information.

For the more complex or higher value institutional processes and research projects, the Division offers facilitated impact assessments. For more details, visit www.sun.ac.za/privacy or contact privacy@sun.ac.za.

Also read our previous article, “Getting ready for the Protection of Personal Information Act”  here.

[Article provided by Division for Information Governance]

Comments are closed.

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.