David Luyt

Home/David Luyt

About David Luyt

David practices law because he enjoys simplifying complex ideas into practical insights. He is a POPI professional, electronic signature expert, and online business aficionado. He facilitates interactive workshops, writes succinct opinions, and drafts beautiful documents. Read more ...

Practical data classification framework

Managing data effectively in any organisation can feel like navigating an intricate roundabout without clear signage — a confusing, inefficient, and costly process prone to mistakes. Poor data quality can significantly impact your organisation's decision-making capabilities, resulting in operational inefficiencies, [...]

By |2025-07-04T07:04:30+02:00June 21st, 2025|Categories: Cybersecurity Law, POPI and Data Protection|Tags: , , , |

Cybersecurity compliance fairy tales – dispelling the myths

It's cybersecurity compliance fairy tale storytime. Let's banish them to the past, where they belong. Cybersecurity compliance can feel like chasing dragons — many discuss it, but few truly understand how to implement it effectively. Organisations often mistakenly believe that [...]

By |2025-06-05T18:29:44+02:00June 5th, 2025|Categories: Cybersecurity Law|Tags: |

South African cybersecurity laws – unravelling the knot

Understanding South African cybersecurity laws can feel like trying to cut through the legendary Gordian knot - a challenging yet essential task. Cyber threats are increasing rapidly, making it crucial for organisations in South Africa to understand these regulations clearly. [...]

By |2025-06-04T11:03:56+02:00June 4th, 2025|Categories: Cybersecurity Law|Tags: |

King V and cybersecurity – locking down corporate governance

The King V Code is changing corporate governance in South Africa by moving cybersecurity from a purely technical issue to a central responsibility for company boards. The Institute of Directors in Southern Africa (IoDSA) published King V's draft on 24 [...]

By |2025-05-26T14:58:04+02:00May 26th, 2025|Categories: Cybersecurity Law, Governance|Tags: , , |

TikTok’s GDPR transfers – Understanding the €530M fine

Let's discuss TikTok’s GDPR transfers. Managing cross-border data flows under GDPR can be as treacherous as navigating iceberg-strewn waters — hidden dangers lurk beneath the surface. TikTok recently discovered how severe those dangers can be, facing a landmark €530 million [...]

Software as a Service Agreements | SaaS Contracts

Software as a Service agreements, or SaaS contracts, are unique and require careful consideration. Are you interested in software as a service (SaaS), developing it for your customers, or using it in your business? Software as a service is a [...]

By |2025-05-27T16:02:09+02:00May 10th, 2025|Categories: Contracts|Tags: |

AI explainability legal governance: Pulling back the curtain

Let's talk artificial intelligence (AI) explainability and legal governance. AI often seems like a magic show: impressive but hard to understand. However, with increasing reliance on AI, legal frameworks now demand transparency. Recent advances, particularly Anthropic's research on circuit tracing, [...]

By |2025-04-17T12:54:49+02:00April 17th, 2025|Categories: AI Law|Tags: , |

Corporate AI deepfake fraud: When trusted faces deceive

It's time to address corporate artificial intelligence (AI) deepfake fraud. AI can now create compelling fake videos and audio of real people. This 'deepfake' technology presents a growing threat to businesses, particularly through financial fraud. Criminals are using deepfakes to [...]

By |2025-04-10T10:44:20+02:00April 10th, 2025|Categories: AI Law, Cybersecurity Law|Tags: , , , |

Personal data deletion rights: Navigating your responsibilities

Personal data deletion rights aren't just paperwork — they're like removing permanent marker from a whiteboard: simple to describe but tricky to do correctly. Data protection laws now give people more rights to control their personal information. One crucial right [...]

By |2025-04-10T10:45:22+02:00April 8th, 2025|Categories: POPI and Data Protection|Tags: , |

Executive cyber liability risks

Time to talk about executive cyber liability risks. Managing cybersecurity and compliance at a senior level carries more significant personal risks than ever. Regulators worldwide are increasingly holding individual executives, such as Chief Information Security Officers (CISOs) and Chief Compliance [...]

By |2025-03-27T16:00:19+02:00March 27th, 2025|Categories: Cybersecurity Law|Tags: |

AI governance board oversight: Mastering the fire

Just as mastering fire once offered humanity warmth, safety, and power, so does mastering artificial intelligence (AI), which promises immense business potential — provided your organisation governs it wisely. Neglect, however, risks turning a strategic opportunity into an organisational inferno. [...]

By |2025-03-26T15:45:57+02:00March 26th, 2025|Categories: AI Law|Tags: , |