information security

Home/Tag:information security

Do you need to register as a Cryptography Provider?

You need to register as a cryptography provider if you provide encryption-related products and services or electronic-signature-related offerings. Cryptography and encryption present a challenge to security-conscious governments in that it allows you to conceal your message content from the authorities. [...]

By |2025-03-20T11:30:32+02:00March 5th, 2025|Categories: IT Law|Tags: , , , , |

Information security vs cyber security: What’s the difference?

Information Security vs Cyber Security - what’s the Difference? Information security and cybersecurity are not separate concepts—they are the same discipline applied in different eras. Information security existed long before digital technology, focusing on protecting physical records and sensitive information. [...]

By |2025-03-18T22:04:31+02:00February 26th, 2025|Categories: Cybersecurity Law, Uncategorised|Tags: , , |

Data protection in Bulgaria

Data protection is a critical element of Bulgaria's fast-evolving digital economy. As businesses explore innovative technologies, foreign investment grows, and data-driven services expand, compliance with the GDPR and the Bulgarian Personal Data Protection Act (PDPA) is essential for safeguarding consumer [...]

By |2025-02-25T15:26:37+02:00February 25th, 2025|Categories: POPI and Data Protection|Tags: , |

The law in 2025 – our predictions

Welcome to the law in 2025! At the beginning of each year, we gaze into the future to help you prioritise your next steps. This is the law regarding digital, data and tech in 2025. We try to predict what [...]

Privacy obligations in the BEC case of ENS v Hawarden

In the matter of ENS v Hawarden, the SCA overturned the judgment in the High Court in Gauteng, holding ENS liable for the loss suffered by Mrs Hawarden because of a business email compromise. The SCA's finding is primarily based [...]

CrowdStrike outage: What happened and what we can learn?

On Friday, 19 July 2024, a global IT outage disrupted many users worldwide. CrowdStrike, a leading cybersecurity firm, released a faulty security update that caused Microsoft Windows devices to crash. The CrowdStrike outage impacted Microsoft's Windows 365 Cloud PCs, apps, [...]

By |2024-07-23T15:23:29+02:00July 23rd, 2024|Categories: Cybersecurity Law|Tags: , |

Edward Nathan Sonnenbergs (ENS) v Hawarden | BEC

In Edward Nathan Sonnenbergs(ENS) v Hawarden, ENS appealed the judgment handed down in Hawarden v Edward Nathan Sonnenbergs. The Supreme Court of Appeal (SCA) upheld the appeal and dismissed the original order from the high court. Hawarden may appeal this [...]

Data subject breach notification

Imagine a castle under siege, and the guards fail to alert the inhabitants. In the world of data protection, data subject breach notifications act as crucial alarms, ensuring individuals are aware of threats to their personal data. Data protection laws, [...]

Data breach legal strategies

Dealing with a data breach is like trying to turn off a complex alarm system, where cutting the wrong wire can make things worse instead of quieting the alarm. Breaches include leaks, hacks and other information security compromises. As we [...]

The law in 2024 – our predictions

At the beginning of each year, we gaze into the near future to try and help you prioritise your next steps. This is the law in 2024. We try to predict what will happen and what it will mean for [...]

How to navigate data transfers in Africa

In today's globalised world, data transfers across borders is increasingly crucial for African businesses. However, navigating the complex landscape of data privacy regulations and overcoming jurisdictional hurdles can present significant challenges. Let's explore critical strategies for effectively managing data [...]

By |2024-04-16T15:37:10+02:00July 6th, 2023|Categories: POPI and Data Protection|Tags: , , , , |

Achieving information security compliance in South Africa’s public sector

South Africa has taken significant strides in promoting accountability in the public sector for information security compliance. The Protection of Personal Information Act (POPIA) and Promotion of Access to Information Act (PAIA) continue to be a major focus for the [...]