Evaluation of Online Resources on the Implementation of the Protection of Personal Information Act in South Africa

Wedi'i Gadw mewn:
Manylion Llyfryddiaeth
Cyhoeddwyd yn:International Conference on Cyber Warfare and Security (2015), p. 39-50
Prif Awdur: Botha, Johnny
Awduron Eraill: Eloff, M M, Swart, Ignus
Cyhoeddwyd:
Academic Conferences International Limited
Pynciau:
Mynediad Ar-lein:Citation/Abstract
Full Text
Full Text - PDF
Tagiau: Ychwanegu Tag
Dim Tagiau, Byddwch y cyntaf i dagio'r cofnod hwn!

MARC

LEADER 00000nab a2200000uu 4500
001 1781335755
003 UK-CbPIL
035 |a 1781335755 
045 2 |b d20150101  |b d20151231 
084 |a 142229  |2 nlm 
100 1 |a Botha, Johnny 
245 1 |a Evaluation of Online Resources on the Implementation of the Protection of Personal Information Act in South Africa 
260 |b Academic Conferences International Limited  |c 2015 
513 |a Feature 
520 3 |a The recent adoption of the privacy law, Protection of Personal Information (PoPI) Act in South Africa, mandates notable changes from both government departments and the public sector when dealing with personal identifiable information (PII). Recent research has shown that the level of change still required to comply with the new Act is significant. Surveys indicated that approximately only forty percent of organisations in South Africa have started with the compliance process. Private empirical research has found widespread leakage of PII within South African cyber infrastructures. The leaked information affected well over two million South African citizens in some or other manner and with penalties instituted by the PoPI of up to R10 million, it is crucial for organisations to clean up these incidents of non-compliance. Even without the monetary incentive, leaked PII holds a significant threat, not only for individuals but also for companies and governmental organisations alike. Several documented instances exist where targeted phishing attacks, that has a 70% success rate once PII is included, has been successfully used against organisations. While technical controls may limit the leakage of PII, significant security vulnerabilities exist that allows for the circumvention of these controls. Cyber security awareness is still the primary defence against these technical control failures, but the notable challenge remains in educating users and responsible personnel. As with any cyber activity, there is a human factor that requires a significantly diverse skill set to understand the infrastructure that comprises an organisation. With cyber security education a continuous developing field, there is a dire need for additional research to supplement this knowledge base. This paper examines online resources available for individuals, organisations and governmental departments to comply with the PoPI Act. The approach used will be to examine content made available through popular social media platforms such as YouTube (YouTube, N.D.), Facebook (Facebook, N.D.), Twitter (Twitter, N.D.) and search engines. These data sources were chosen since it may be the most likely common route individuals will take to gain fundamental understanding of the requirements the PoPI Act places on them. Identified resources will be evaluated for the audience they serve (e.g. business owners, privacy officers, managers and employees), technical content (e.g. informative, guidelines or step by step instructions) and finally the cost involved to access or download resources (e.g. free or commercial). 
610 4 |a YouTube Inc 
651 4 |a South Africa 
653 |a Education 
653 |a Electronic mail systems 
653 |a Medical records 
653 |a Internet resources 
653 |a Personal information 
653 |a Disclosure 
653 |a Compliance 
653 |a Cybercrime 
653 |a Social networks 
653 |a Identity theft 
653 |a Knowledge base 
653 |a Social media 
653 |a Search engines 
653 |a Public sector 
653 |a Research 
653 |a Internet 
653 |a Cybersecurity 
653 |a Government agencies 
653 |a Security 
653 |a Research methodology 
653 |a Departments 
653 |a Owners 
653 |a Resources 
653 |a Infrastructure 
653 |a Penalties 
653 |a Organizations 
653 |a Noncompliance 
653 |a Trade 
653 |a Privacy 
653 |a Information 
653 |a Mass media 
653 |a Protection 
653 |a Fines and penalties 
700 1 |a Eloff, M M 
700 1 |a Swart, Ignus 
773 0 |t International Conference on Cyber Warfare and Security  |g (2015), p. 39-50 
786 0 |d ProQuest  |t Political Science Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/1781335755/abstract/embedded/ZKJTFFSVAI7CB62C?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/1781335755/fulltext/embedded/ZKJTFFSVAI7CB62C?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/1781335755/fulltextPDF/embedded/ZKJTFFSVAI7CB62C?source=fedsrch