Page 14 - Dainfern Precinct Living 5 2021
P. 14

LIFESTYLE

                                                                                 members to undergo some kind of
                                                                                 training, depending on the amount
                                                                                 of personal information that they
                                                                                 deal with.
                                                                                 If there’s a breach of privacy, (for
                                                                                 example sending a client’s banking
                                                                                 details in a document that’s not
                                                                                 password-protected, or divulging
                                                                                 email addresses of people who
                                                                                 don’t know each other by sending a
                                                                                 group email and not blind-copying
                                                                                 the recipients), if you do not alert
                                                                                 the company to the error so they
                                                                                 can take remedial steps and rectify
                                                                                 the situation, it’s possible that you,
                                                                                 as an individual, could be held
                                                                                 liable.

                                                                                 Remedial action could involve
                                                                                 contacting all the people affected
                                                                                 by the breach – along with further
                                                                                 training for the person who caused
                                                                                 the breach.
           from dodgy websites that aren’t     you’re unsure how to do this.
           fully secure, and next thing you   8.  If you find you’re getting ‘Cabin   YOUR RIGHTS AS AN
           know, a hacker has tapped into      Fever’ and decide to pop out and   INDIVIDUAL
           your system. If you are linked      work at a coffee shop:            Everyone has the right to have their
           in any way to your employer’s    a.  Refrain from using the free public   personal information amended or
           IT infrastructure, that would put   Wi-Fi network as it leaves you    deleted if it is:
           the company’s entire computer       vulnerable to hackers.            •  out of date
           network at risk.                 b.  Do not use your work devices     •  current but inaccurate
        4.  Devices used for work purposes     while on public transport.        •  misleading
           should be locked away when not   c.  Sit with your back to a wall so   •  irrelevant to where and why it is
           in use – in a permanently fixed     that passers-by can’t see what’s        stored
           storage cabinet that cannot be      on your screen and people sitting   •  has been obtained unlawfully.
           moved.                              around you can’t take videos/
        5.  Hard copies/printouts of sensitive   snapshots of what you’re working   If you find that your personal
           information should likewise be      on. [By the way, that also applies   information has been unlawfully
           locked away.                        to working at home – don’t sit    obtained by a marketing firm or
        6.  Personal information should not    with your back to a window where  individuals seeking to exploit you,
           be captured on your system or       passers-by can see what you’re    and you did not give your consent
           stored if it’s not relevant to the   doing on screen.]                for them to use your personal
           function that you are performing   d.  Online meetings in the middle of   information, you can lodge a
           (eg. names of spouses and           a busy coffee shop/waiting area   complaint with the Information
           children may not be necessary       are a definite no-no if there's a   Regulator at the Department of
           if all you need to know is how      chance that personal information   Justice by sending an email to:
           many dependents the person has      of clients or employees will be   complaints.IR@justice.gov.za.
           and that they are single/married/   discussed!                        For general enquiries, email:
           divorced). Personal information   e.  Likewise, multi-tasking is not cool   inforeg@justice.gov.za.
           should also not be retained any     if you decide to have a business
           longer than is necessary.           discussion involving a client's or   NO.1 ON YOUR TO-DO LIST
        7.  Printouts containing sensitive     employee's personal information   RIGHT NOW
           information will need to be         while browsing the aisles of a    It stands to reason that, in order
           shredded and disposed of            supermarket or walking around     to become POPI-compliant, we all
           responsibly. Digital information    in a public place where strangers   need to change the way that we
           should be deleted, and then         can hear you.                     work in one way or another. Regular
           deleted from your ‘Deleted’ folder                                    cleaning out of data that we have
           and your Temp files – ask your   WHAT TO DO IF THERE’S A              stored will be essential. In fact, the
           employer’s IT Department or your  BREACH OF PRIVACY                   POPI experts say that should be our
           personal computer technician/    In a POPI-compliant company, there   No.1 priority, not just now, but on an
           service provider to help you if   should be a requirement for all staff   ongoing basis.

                              Disclaimer: To ensure full compliance with the POPI Act, you should consult your employer’s/company’s POPI
           SOURCES            compliance policies. Various aspects of this article have been sourced from the POPI Act, however, some of
           https://popia.co.za  them are practical suggestions from people who work with data privacy on a daily basis. You are advised to
           www.gov.za         refer to the POPI Act or consult a professional specialist for further guidance and assistance.
                              For more information visit: www.gov.za/documents/protection-personal-information-act, or https://popia.co.za/.
                                                           12
                                                           DPL
   9   10   11   12   13   14   15   16   17   18   19