{"id":13107,"date":"2018-07-31T12:27:30","date_gmt":"2018-07-31T10:27:30","guid":{"rendered":"http:\/\/blogs.sun.ac.za\/it\/?p=13107"},"modified":"2018-08-01T12:36:41","modified_gmt":"2018-08-01T10:36:41","slug":"gdpr-protecting-your-data","status":"publish","type":"post","link":"https:\/\/blogs.sun.ac.za\/it\/2018\/07\/gdpr-protecting-your-data\/","title":{"rendered":"[:en]GDPR: Protecting your data[:]"},"content":{"rendered":"<p>[:en]<\/p>\n<p>The international law of data protection has changed and the General Data Protection Regulation (GDPR) came into effect on the 25 May 2018. There is a great deal of information on GDPR. Unfortunately, a lot of it is legal jargon, which can be overwhelming if you are not a legal expert.<\/p>\n<p>The South African equivalent to GDPR is the Protection of Personal Information Act (POPIA); which has not been finalised yet. This article will explain GDPR, compliance requirements and the key benefits and challenges involved in its implementation.<\/p>\n<p><strong>Quick overview<\/strong><\/p>\n<p>GDPR is a law that governs data usage, user privacy rights, data risk management and data security systems within private and public organisations. It highlights the rights of individuals, which are\u00a0<\/p>\n<ol>\n<li>to control how personal data is collected and managed; and<\/li>\n<li>to place new obligations on organisations to be more accountable for data protection.<\/li>\n<\/ol>\n<p>Complying with GDPR is not a simple task, and neither will be complying with South Africa\u2019s own Protection of Personal Information Act (POPIA). However, it is unavoidable and cannot be ignored. Managing data privacy is a serious issue. Until the South African Regulations are finalised and enforced, local companies are encouraged to look to the GDPR for guidance. Whilst there are some differences between POPIA and GDPR in requirements, the principles are similar.<\/p>\n<p><strong>How does an organisation comply?<\/strong><\/p>\n<ul>\n<li>Raise awareness<\/li>\n<\/ul>\n<p>Decision makers and key people in the organisation need to be aware that the law has changed to include GDPR, and need to understand its impact on data management.<\/p>\n<ul>\n<li>Information held<\/li>\n<\/ul>\n<p>An information audit, which includes any personal data held by individuals within the organisation, has to be done. The audit will establish which information the organisation has, who it\u2019s shared with and where it came from.<\/p>\n<ul>\n<li>Communication privacy<\/li>\n<\/ul>\n<p>Review your privacy notices and governance, identify gaps and prepare for the changes required when implementing GDPR.<\/p>\n<ul>\n<li>Individual rights<\/li>\n<\/ul>\n<p>Make sure procedures cover each individual\u2019s rights, including deleting personal data and providing data electronically in all commonly used formats.<\/p>\n<ul>\n<li>Subject access requests<\/li>\n<\/ul>\n<p>Update data management procedures, prepare for handling requests from consumers within the new time-frame and provide additional information.<\/p>\n<ul>\n<li>Legalities when processing personal data<\/li>\n<\/ul>\n<p>Understand the different data processing types, the way the organisation performs and identify the legal basis for carrying out and documenting it appropriately.<\/p>\n<ul>\n<li>Consent<\/li>\n<\/ul>\n<p>The way the organisation seeks, obtains and determines consent may need to be reviewed and changed.<\/p>\n<ul>\n<li>Protecting children\u2019s data<\/li>\n<\/ul>\n<p>Systems to verify ages and can seek parental\/guardian consent for a data processing activities should be designed and developed.<\/p>\n<ul>\n<li>Data breaches<\/li>\n<\/ul>\n<p>Procedures for both the customer and regulator need to be in place to detect, report and investigate a personal data breach.<\/p>\n<ul>\n<li>Data protection by design<\/li>\n<\/ul>\n<p>Assessments and control frameworks have to be developed with guidance from the regulator. Processes need to be developed and have governance for their use.<\/p>\n<ul>\n<li>Data Protection Officers<\/li>\n<\/ul>\n<p>Data Protection Officers or a similar role should be appointed to take responsibility for data protection compliance. The organisation has to decide who fits this role best.<\/p>\n<ul>\n<li>International work<\/li>\n<\/ul>\n<p>If the organisation works internationally, it is important to establish which data protection authority is most appropriate and where processors and controllers are located.<\/p>\n<p><strong>Some benefits of GDPR compliance<\/strong><\/p>\n<ul>\n<li>Greater consumer confidence<\/li>\n<\/ul>\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 GDPR compliance will prove to customers that your\u00a0organisation is a good custodian of their data.\u00a0<\/p>\n<ul>\n<li>Improved data security<\/li>\n<\/ul>\n<p>GDPR compliance lays the groundwork for\u00a0improved data security.<\/p>\n<ul>\n<li>Reduced data maintenance costs<\/li>\n<\/ul>\n<p>GDPR can help your organisation cut costs by prompting you to retire any data inventory software and legacy applications which are no longer relevant to your business.<\/p>\n<ul>\n<li>Increased alignment with evolving technology<\/li>\n<\/ul>\n<p>GDPR compliance requires that your\u00a0organisation moves toward improving its\u00a0network,\u00a0endpoint, and application security.<\/p>\n<ul>\n<li>Better decision-making\u00a0<\/li>\n<\/ul>\n<p>Thanks to the GDPR, your\u00a0organisation\u2019s data will become more consolidated, ensuring\u00a0it\u2019s easier to use and you have a\u00a0greater understanding of its underlying value.<\/p>\n<p><strong>Challenges of GDPR compliance<\/strong><\/p>\n<ul>\n<li>Endless consent prompts for every data process can be time-consuming.<\/li>\n<li>High cost to reach GDPR compliance (e.g. in terms of upgrading security systems).<\/li>\n<li>More work for developers in terms of upgrading security systems.<\/li>\n<li>Massive fines for non-compliance, which amounts to 4% of the organisation\u2019s annual turnover.<\/li>\n<\/ul>\n<p><strong>GDPR integration in SU IT Department<\/strong><\/p>\n<p>In many ways, Stellenbosch University\u2019s Information Technology Department has been implementing data and security laws and regulations such as GDPR and POPIA for years.<\/p>\n<p>We are constantly reminding users on our blog and social media to keep their passwords protected and not leave their PC\u2019s unlocked and unattended. We are the first to alert users via email with regards to phishing attacks and send out warnings on a regular basis. We have also moved toward cloud storage and are happy to say, Microsoft is GDPR compliant. Users have been encouraged to use OneDrive for data storage as it is more secure.<\/p>\n<p>Information security is important, therefore we will continue to convey the importance to our users. There is also an Information Security Awareness Training Course available on <a href=\"https:\/\/learn.sun.ac.za\/\">SUNLearn<\/a>.\u00a0<\/p>\n<p>In conclusion, GDPR is beneficial to South African organisations in many ways. Since South African organisations deal with large and sensitive amounts of data, GDPR compliance is required and may reduce security threats and data loss to a large degree. Although this law appears to solve and manage data management issues, there is still limited information regarding their long-term sustainability and among South African users.\u00a0<\/p>\n<p>More detailed information on EU GDPR guidelines for South African Universities can be found\u00a0<a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2018\/07\/USAF-EU-GDPR-GUIDELINES_Final_25-May-2018.pdf\">in this document<\/a> compiled by\u00a0Universities South Africa (USAf), an association of South Africa\u2019s public universities.<\/p>\n<p style=\"text-align: right;\">[ARTICLE BY MILLY VAN WYHE]<\/p>\n<p>[:]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[:en] The international law of data protection has changed and the General Data Protection Regulation (GDPR) came into effect on the 25 May 2018. There is a great deal of information on GDPR. Unfortunately, a lot of it is legal jargon, which can be overwhelming if you are not a legal expert. The South African [&hellip;]<\/p>\n","protected":false},"author":259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29187],"tags":[54514,54513,54516,54515],"class_list":["post-13107","post","type-post","status-publish","format-standard","hentry","category-security-2","tag-data-protection-act","tag-gdpr","tag-popi","tag-popia"],"publishpress_future_action":{"enabled":false,"date":"2026-05-08 16:57:43","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/13107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/comments?post=13107"}],"version-history":[{"count":5,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/13107\/revisions"}],"predecessor-version":[{"id":13157,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/13107\/revisions\/13157"}],"wp:attachment":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/media?parent=13107"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/categories?post=13107"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/tags?post=13107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}