David Luyt

About David Luyt

David practices law because he enjoys simplifying complex ideas into practical insights. He is a POPI professional, electronic signature expert, and online business aficionado. He facilitates interactive workshops, writes succinct opinions, and drafts beautiful documents. Read more ...

DORA compliance for vendors – a practical playbook

DORA compliance for vendors is now a live requirement, and selling technology to European financial firms is therefore like constructing a new building in a crowded city: you must meet the code, welcome inspections, and prove the structure can take [...]

By |2025-11-14T19:33:31+02:00November 14th, 2025|Categories: Cybersecurity Law, POPI and Data Protection|Tags: , , , , |

Telco cybersecurity in South Africa – finding a signal in the noise

Let's talk telco cybersecurity in South Africa. Securing a telecommunications network is like trying to tune into a radio station amid heavy static: operators must carefully adjust both their security controls and their compliance processes to cut through the noise. [...]

Cybersecurity compliance mapping – finding every obligation

What is cybersecurity compliance mapping? Navigating cybersecurity compliance today is like conducting a precise archaeological dig: you must carefully uncover each layer of obligations without damaging your organisation's underlying structure. Each jurisdiction, sector, and obligation presents distinct challenges, demanding meticulous [...]

By |2025-07-31T11:41:07+02:00July 22nd, 2025|Categories: Cybersecurity Law, POPI and Data Protection|Tags: , , , , |

Data classification best practices

We've all got that chaotic drawer at home — a messy collection of old chargers, mystery keys, forgotten receipts, and batteries that may or may not work. While such clutter at home might only cause mild frustration, allowing your business [...]

Cybersecurity is mission-critical

Imagine your business as a body, thriving and responding to opportunities, with your digital systems acting as its nervous system. Just as any impairment to nerves can paralyse a body, a cybersecurity breach can disrupt or incapacitate your organisation. Cybersecurity [...]

By |2025-07-10T10:47:28+02:00July 10th, 2025|Categories: Cybersecurity Law|Tags: |

Practical data classification framework

Managing data effectively in any organisation can feel like navigating an intricate roundabout without clear signage — a confusing, inefficient, and costly process prone to mistakes. Poor data quality can significantly impact your organisation's decision-making capabilities, resulting in operational inefficiencies, [...]

By |2025-07-04T07:04:30+02:00June 21st, 2025|Categories: Cybersecurity Law, POPI and Data Protection|Tags: , , , |

Cybersecurity compliance fairy tales – dispelling the myths

It's cybersecurity compliance fairy tale storytime. Let's banish them to the past, where they belong. Cybersecurity compliance can feel like chasing dragons — many discuss it, but few truly understand how to implement it effectively. Organisations often mistakenly believe that [...]

By |2025-06-05T18:29:44+02:00June 5th, 2025|Categories: Cybersecurity Law|Tags: |

South African cybersecurity laws – unravelling the knot

Understanding South African cybersecurity laws can feel like trying to cut through the legendary Gordian knot - a challenging yet essential task. Cyber threats are increasing rapidly, making it crucial for organisations in South Africa to understand these regulations clearly. [...]

By |2025-10-20T09:32:08+02:00June 4th, 2025|Categories: Cybersecurity Law|Tags: |

King V and cybersecurity – locking down corporate governance

The King V Code is changing corporate governance in South Africa by moving cybersecurity from a purely technical issue to a central responsibility for company boards. The Institute of Directors in Southern Africa (IoDSA) published King V's draft on 24 [...]

By |2025-05-26T14:58:04+02:00May 26th, 2025|Categories: Cybersecurity Law, Governance|Tags: , , |

TikTok’s GDPR transfers – Understanding the €530M fine

Let's discuss TikTok’s GDPR transfers. Managing cross-border data flows under GDPR can be as treacherous as navigating iceberg-strewn waters — hidden dangers lurk beneath the surface. TikTok recently discovered how severe those dangers can be, facing a landmark €530 million [...]

Software as a Service Agreements | SaaS Contracts

Software as a Service agreements, or SaaS contracts, are unique and require careful consideration. Are you interested in software as a service (SaaS), developing it for your customers, or using it in your business? Software as a service is a [...]

By |2025-05-27T16:02:09+02:00May 10th, 2025|Categories: Contracts|Tags: |