Differences between King III and King IV

By | 2017-04-28T10:33:42+00:00 April 28th, 2017|Categories: Governance|Tags: , , , |

King IV is now effective for financial years that start on or after 1 April 2017 and officially replaces King III in its entirety. In response, an important step for you to take is to understand the differences between King [...]

A Pro-Poor Legal Practice Book for all Lawyers

By | 2017-04-18T09:23:35+00:00 April 11th, 2017|Categories: IT Law|Tags: , , , |

The Pro-Poor Legal Practice book is a valuable resource for lawyers from all corners of the legal profession, drafters of laws, and even law students, legal secretaries, and government officials. The book connects all these different persons by highlighting the difference [...]

Email Encryption and POPIA – must you encrypt your emails?

By | 2017-04-11T14:19:38+00:00 April 4th, 2017|Categories: Email Law|Tags: , , , |

Does complying with the Protection of Personal Information Act (POPIA) also mean that you must use email encryption when sending emails containing personal information? In other words, does sending unencrypted emails containing personal information potentially violate POPIA? The short answer is: [...]

Recording Conversations without Consent

By | 2017-03-30T13:21:08+00:00 March 28th, 2017|Categories: Monitoring Law|Tags: , , |

Do you want to record a conversation without someone's consent? Do you wonder whether it's lawful to do so? While different jurisdictions will give you different answers, you might be surprised to find out that - in many cases - recording without consent is legal. This [...]

Information Security Laws or Privacy Laws – What is appropriate security?

By | 2017-04-12T14:20:35+00:00 March 6th, 2017|Categories: POPI and Data Protection|Tags: , , , |

Information security laws (many of which are also privacy laws) across the globe require you to secure the personal data that you process. The General Data Protection Regulation (GDPR) in Europe, the Data Protection Act in the United Kingdom, and the [...]

Cybercrimes and Cybersecurity Bill – Overview of the Cyber Bill

By | 2017-04-03T13:47:59+00:00 February 28th, 2017|Categories: Cyber Crime|Tags: , , , , , , |

The Cybercrimes and Cybersecurity Bill is in the process of being enacted. Some people will call it the Cyber Bill, Cybercrime Bill or Cybercrime Act. Others might refer to it as CaCA, the CaC Bill or just CaC. What will you call [...]

Minimum Information Security Standards (MISS) Summary

By | 2017-04-12T15:22:12+00:00 February 28th, 2017|Categories: Information Security Law|Tags: , , , |

The Minimum Information Security Standards (or MISS) is a standard for the minimum information security measures that any institution must put in place for sensitive or classified information to protect national security. If you work with public service information resources, [...]

The Practical Impact of the Cyber Bill on You

By | 2017-03-30T13:21:12+00:00 February 22nd, 2017|Categories: Cyber Crime|Tags: , , , , |

The second draft of the Cyber Bill (also known as the Cybercrime Bill) will have a significant impact on many organisations and individuals. Unfortunately, the impact is mostly negative and frankly scary. Correctional services are going to have to build more [...]