data privacy

DORA compliance for vendors – a practical playbook

DORA compliance for vendors is now a live requirement, and selling technology to European financial firms is therefore like constructing a new building in a crowded city: you must meet the code, welcome inspections, and prove the structure can take [...]

By |2025-11-14T19:33:31+02:00November 14th, 2025|Categories: Cybersecurity Law, POPI and Data Protection|Tags: , , , , |

Telco cybersecurity in South Africa – finding a signal in the noise

Let's talk telco cybersecurity in South Africa. Securing a telecommunications network is like trying to tune into a radio station amid heavy static: operators must carefully adjust both their security controls and their compliance processes to cut through the noise. [...]

Case study: Quickloan privacy violation in Uganda

The Quickloan privacy violation marks a significant milestone for data protection enforcement in Uganda, demonstrating that non-compliance carries real consequences. In July 2025, Uganda's Personal Data Protection Office (PDPO) secured its first-ever criminal conviction under the Data Protection and Privacy [...]

Cybersecurity compliance mapping – finding every obligation

What is cybersecurity compliance mapping? Navigating cybersecurity compliance today is like conducting a precise archaeological dig: you must carefully uncover each layer of obligations without damaging your organisation's underlying structure. Each jurisdiction, sector, and obligation presents distinct challenges, demanding meticulous [...]

By |2025-07-31T11:41:07+02:00July 22nd, 2025|Categories: Cybersecurity Law, POPI and Data Protection|Tags: , , , , |

Data classification best practices

We've all got that chaotic drawer at home — a messy collection of old chargers, mystery keys, forgotten receipts, and batteries that may or may not work. While such clutter at home might only cause mild frustration, allowing your business [...]

Nigerian data controller and processor registration

As Nigeria keeps stepping up its data protection game, companies looking to do business there must stay on top of what’s required under the Nigeria Data Protection Act (NDPA) 2023. One key thing to know is that under the NDPA, [...]

By |2025-03-26T09:30:00+02:00March 25th, 2025|Categories: POPI and Data Protection|Tags: , , |

The law in 2025 – our predictions

Welcome to the law in 2025! At the beginning of each year, we gaze into the future to help you prioritise your next steps. This is the law regarding digital, data and tech in 2025. We try to predict what [...]

Lingo Telecom enforcement action | Robocalling fine

The Federal Communications Commission (FCC) proposed a landmark enforcement action against Lingo Telecom, a voice service provider, for violations of caller ID authentication rules under the STIR/SHAKEN framework. This proposal followed the transmission of thousands of spoofed robocalls, including deepfake [...]

By |2025-04-01T16:58:38+02:00September 1st, 2024|Categories: POPI and Data Protection|Tags: , , |

Uber enforcement action | data transfer fine

The Dutch Data Protection Authority (DPA) recently fined Uber a hefty €290 million. But what led to this enforcement action? Well, it turns out Uber mishandled European taxi drivers' personal data when transferring it to the United States. This enforcement [...]

By |2024-08-29T13:39:22+02:00August 26th, 2024|Categories: POPI and Data Protection|Tags: , , |

Information security incident reports

Navigating the stormy seas of information security requires more than just a robust ship; it also demands a vigilant crew equipped with precise navigation tools. Information security incident reports are essential tools in the world of data protection. This document [...]

By |2024-08-13T18:00:45+02:00August 13th, 2024|Categories: Cybersecurity Law, POPI and Data Protection|Tags: , , , , |

AI in privacy policy drafting

Creating a privacy policy used to be as challenging as cultivating a garden in a desert—each new rule felt like a rare shower that could completely alter the terrain. Nowadays, artificial intelligence (AI) acts like a sophisticated watering system, making [...]

Privacy obligations in the BEC case of ENS v Hawarden

In the matter of ENS v Hawarden, the SCA overturned the judgment in the High Court in Gauteng, holding ENS liable for the loss suffered by Mrs Hawarden because of a business email compromise. The SCA's finding is primarily based [...]