Mapping 'Security Safeguard' Requirements in a Data Privacy legislation to an International Privacy Framework: A Compliance Methodology

被引:0
|
作者
Govender, I. [1 ]
机构
[1] Univ Stellenbosch, Dept Math Sci Comp Sci, ZA-7600 Stellenbosch, South Africa
来源
2015 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE ISSA 2015 CONFERENCE | 2015年
关键词
Information Security; Data Privacy; Personal Information; GAPP; POPI; framework; methodology; mapping;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is commonplace for organisations to collect personal information to be processed and stored on their systems. Until recently, there was no comprehensive legislation that addressed the 'processing' of personal information by organisations in South Africa. The Protection of Personal Information Bill ("POPI") was signed into law in November 2013 and is expected to come into effect, later this year (2015). POPI is informed by international data privacy legislation. The implications are that it will be incumbent for organisations to revisit how they 'handle' peoples' personal information. This can be a daunting task as evidenced by countries that still find it a challenge to comply with data privacy laws that have been enacted there, a while ago. This article proposes a methodology to comply with POPI. The Generally Accepted Privacy Principles (GAPP) is an American/Canadian framework containing international privacy requirements with best practices. Both, POPI and GAPP address a common purpose: 'How personal information is collected, used, retained, disclosed, and disposed.' GAPP is reputed as a solid benchmark for good privacy practice, comprising of ten overarching privacy principles which yields a set of criteria for effective management of privacy risks and compliance. Much of the provisions in POPI is addressed in GAPP. A key condition (Security Safeguards) in POPI stipulates what aspects of personal information must be adequately secured, with limited insight on how to go about this process. Accordingly, this article proposes a methodology to fill this gap. All of the provisions under ' Security Safeguards' in POPI is mapped onto GAPP, thereby contextualising GAPP to facilitate compliance with South Africa's data privacy legislation and to the same end, complying with international privacy laws. This framework could also be implemented as a checklist/auditing document, guiding the organisation in its implementation of data privacy and POPI compliance.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] PRIVACY AND SECURITY IN DATA SYSTEMS
    DAVIS, RM
    COMPUTERS AND PEOPLE, 1974, 23 (03): : 20 - 27
  • [42] Data Security and Privacy in the Cloud
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Livraga, Giovanni
    Samarati, Pierangela
    MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2019, 2019, 10993
  • [43] Big Data - Security and Privacy
    Bertino, Elisa
    2015 IEEE INTERNATIONAL CONGRESS ON BIG DATA - BIGDATA CONGRESS 2015, 2015, : 757 - 761
  • [44] Patients' Privacy And Data Security
    不详
    HEALTH AFFAIRS, 2009, 28 (02) : 415 - 415
  • [45] Data Provenance in Security and Privacy
    Pan, Bofeng
    Stakhanova, Natalia
    Ray, Suprio
    ACM COMPUTING SURVEYS, 2023, 55 (14S)
  • [46] Policy framework for security and privacy management
    Karat, J.
    Karat, C. -M.
    Bertino, E.
    Li, N.
    Ni, Q.
    Brodie, C.
    Lobo, J.
    Calo, S. B.
    Cranor, L. F.
    Kumaraguru, P.
    Reeder, R. W.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2009, 53 (02)
  • [47] Security Framework for VANET for Privacy Preservation
    Chetan, V. S.
    Benni, N. S.
    Bhushan, C.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [48] The hidden meta-requirements of security and privacy
    Spafford, G
    FIFTH IEEE INTERNATIONAL SYMPOSIUM ON REQUIREMENTS ENGINEERING, PROCEEDINGS, 2001, : 10 - 10
  • [49] Security and Privacy in Video Surveillance: Requirements and Challenges
    Rajpoot, Qasim Mahmood
    Jensen, Christian Damsgaard
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 169 - 184
  • [50] DOES COMPUTER SECURITY MEET PRIVACY REQUIREMENTS
    ELLISON, R
    INFORMATION PRIVACY, 1978, 1 (01): : 33 - 37