information security

/Tag:information security

Information Security Laws or Privacy Laws – What is appropriate security?

Information security laws (many of which are also privacy laws) across the globe require you to secure the personal data that you process. The General Data Protection Regulation (GDPR) in Europe, the Data Protection Act in the United Kingdom, and the [...]

By | March 6th, 2017|Categories: POPI and Data Protection|Tags: , , , |

Information Technology Act or IT Act: Data Protection in India

Data protection in India is covered by the Information Technology Act 21 of 2000 (also known as the IT Act) and related IT Rules. Data protection in India is important because many organisations conduct business with Indian companies or store [...]

By | January 10th, 2017|Categories: POPI and Data Protection|Tags: , , |

Appointment of the Information Regulator for POPI and PAIA

Today, 7 September 2016,  the South African National Assembly voted in favour of the appointment of the Information Regulator for POPI and PAIA. Parliament voted for the five nominated candidates to run the newly-formed office of the Information Regulator. This is not [...]

By | September 7th, 2016|Categories: POPI and Data Protection|Tags: , , , |

“Fraudulent” access to an IT system containing unprotected public data

Is it an offence to access data that is freely available on the Internet? Many of us would think that it isn’t if the data is accessible by the public. Can a person use public data (that may include public [...]

By | September 26th, 2014|Categories: POPI and Data Protection|Tags: , , |

PCI DSS Compliance

Interested in PCI DSS compliance? Do you need to comply with the Payment Card Industry (PCI) Data Security Standard (DSS)? A merchant, service provider or bank that processes any cardholder data, needs to know about PCI DSS and what is means [...]

By | March 14th, 2014|Categories: IT Law|Tags: , , , , , , |

Electronic signatures and cryptography

Digital signatures, digital certificates, and advanced electronic signatures are all types of electronic signatures that use cryptography to authenticate the identity of the person signing and to secure their electronic signature. They are all very reliable, but they each have [...]

By | January 14th, 2014|Categories: Electronic Signature Law|Tags: , |

Cryptography laws in South Africa

What is cryptography? Wikipedia defines "cryptography" as "the practice and study of hiding information". Where a document or communication has been encrypted, the act of encrypting serves several purposes? To: establish its authenticity; prevent its undetected modification; prevent its repudiation [...]

By | May 25th, 2012|Categories: POPI and Data Protection|Tags: , , |

Forensic IT and the Law

Forensic IT and computer forensics is big business. There are now many forensic investigators. Especially because most business documents are created electronically nowadays. The need for electronic evidence is not confined to obvious cybercrime events such as hacking, fraud and [...]

By | May 22nd, 2012|Categories: Cyber Crime|Tags: , , |

Do you need to register as a Cryptography Provider?

You need to register as a cryptography provider if you provide encryption-related products and services or electronic-signature-related offerings. Cryptography and encryption present a challenge to security-conscious governments in that it allows you to conceal your message content from the authorities. [...]

By | April 23rd, 2012|Categories: IT Law|Tags: , , , , |

Map of International Crypto and Encryption Laws

Click here to view a map of International Crypto laws and regulations captured from several sources.

By | May 16th, 2009|Categories: POPI and Data Protection|Tags: , , |