POPI and your data security

“I have an advisory business serving private and corporate clients. Our client information is stored on a central server in our offices. I have been advised to review our data security due to the growing risk of being hacked and the requirements of POPI to protect the personal information of my clients. What does POPI require of me in this regard?”

The Protection of Personal Information Act 4 of 2013 (“POPI”) aligns South Africa with the international position in respect of information and data protection. Although POPI has not yet fully come into operation, it is only a matter of time before it does.

An important aim of POPI is to protect persons from suffering damage and harm by requiring entities and persons who receive our personal information to protect such information. POPI therefore places an important responsibility on parties who collect, store, use and destroy personal information (“responsible parties”) and provides rights and remedies to persons whose rights have been infringed (“data subjects”).

POPI obliges responsible parties to ensure the integrity and confidentiality of personal information in their possession. Data security is promoted by appropriate and reasonable technical (electronic) and organisational (physical) measures to prevent the loss of, damage to, unauthorised destruction of, unlawful access to and/or the unlawful processing of personal information. It is important to understand that data security is not restricted to personal information that is processed electronically (technical). Even physical records containing personal information of data subjects (organisational) may need to be secured.

Information security breaches in the modern business environment may occur through various means, including theft, deliberate attacks on electronic systems, unauthorised use of personal information of data subjects by an employee, accidental loss or even equipment failure. Although POPI does not specify the technical requirements that must be met, it will be the responsibility of each responsible party to ensure that they have the necessary and appropriate technical and organisational measures in place to protect data. 

In the event that a responsible party’s data security safeguards are compromised and unauthorised access to personal information ensues, responsible parties will be required to notify the Information Regulator as well as the affected data subjects as soon as is reasonably possible after the discovery of the compromise. The notice will also have to contain sufficient information for data subjects to adequately protect themselves against any potential consequences of the compromise in data security.

A responsible party will also have to contain the breach, aim to recover any compromised data (if possible), assess the risks associated with the breach, including the potential harm for data subjects and conduct an investigation into the cause of the breach and the effectiveness of the response thereto.

Responsible parties will therefore carry an extensive burden in terms of POPI in respect of their network and data security and it would be advisable to enlist the help of a technical expert or POPI specialist to review your current data security systems and develop the necessary security plans and procedures for your business.

May 15, 2018
Out with maternity leave, in with parental leave

Out with maternity leave, in with parental leave

A landmark judgment delivered on 3 October 2025 by the Constitutional Court of South Africa has reshaped the legal landscape governing employment and family rights. In Van Wyk and Others v Minister of Employment and Labour; Commission for Gender Equality and Another v Minister of Employment and Labour and Others (CCT 308/23) [2025] ZACC 20, the Court declared several provisions of the Basic Conditions of Employment Act 75 of 1997 (“BCEA”) and the Unemployment Insurance Act 63 of 2001 (“UIF Act”) invalid and inconsistent with the Constitution in that they unfairly discriminate between different classes of parents.

AI regulation on the horizon

AI regulation on the horizon

Artificial Intelligence (AI) is rapidly transforming industries, and everyday life. We now live in an era where information cannot be trusted at face value, and content creation blurs the lines between reality and fiction. With such a dangerous capability literally at anyone’s fingertips, it is normal to wonder whether AI is being regulated in South Africa. In this article, we look at the current position regarding AI in South Africa.

The tax distinction between local and foreign dividends

The tax distinction between local and foreign dividends

Dividends from South African resident companies fall under the dividends tax regime and are subject to a 20% withholding tax in terms of section 64E of the Income Tax Act 58 of 1962 (“Act”), known as dividends tax, rather than normal income tax. In contrast, foreign dividends are included in a taxpayer’s gross income unless relief is available under section 10B of the Income Tax Act 58 of 1962, which provides a full or partial participation exemption depending on certain circumstances. In this article, we unpack the important distinction in the tax treatment of local vs foreign dividends in South Africa.

Sign up to our newsletter

Pin It on Pinterest