Addressing your data breach risk

Addressing your data breach risk
27 Jun 2018

In the wake of recent data breach incidents, it is imperative that businesses give the provisions of the Protection of Personal Information Act, No 4 of 2013 (Act) their full attention, even though the substantive provisions of the Act are not yet in force. This is borne out by the reality that these incidents are affecting South African businesses more frequently – which aligns with global statistics that point to an alarming escalation in cybercrimes and data breaches.

It is good business practice to ensure that your business’s logical and physical security measures and safeguards are robust and are at least aligned to industry standards and where possible, to industry best practices. This is the first step to ensuring that your business is less vulnerable to a data breach or cyber incident and that your business is aligned to the requirements of the Act. The Act requires that you ensure the security and integrity of personal information in your possession or under your control with appropriate, reasonable technical and organisational measures to prevent the unlawful access to or the loss or damage or unauthorised destruction of personal information, which measures and safeguards should align to generally accepted information security practices or industry specific requirements or professional rules.

Nevertheless, even the most secure businesses could still be on the receiving end of a data breach as a result of the increasing skill and sophistication with which cybercriminals operate. This means that it is imperative to consider your risks in relation to such an eventuality and to have a robust, comprehensive data breach/cyber incident response plan in place – which can be immediately implemented should such an event affect your business.

By adopting a pro-active management strategy rather than crisis driven one and having a well-planned and comprehensive data breach response plan, you will ensure that your business is protected – not just from a legal perspective and to contain business interruption and ensure business continuity – but also from a reputational perspective. How quickly and how well you respond is a key imperative in these situations. Implementing a pre-defined data breach response plan will also assist with protecting your reputation. Timeous notification to the relevant regulators is critical and being responsive and transparent with information relating to the breach with your clients and stakeholders as well as the media can go a long way in assisting to manage the impact of a data breach on your business. The consequences of not doing so are obvious. There are numerous examples abroad of companies who had not dealt with a data breach timeously or in compliance with the law who have lost clients, share value, credibility and who suffered financially following a data breach (including where they have been faced with extensive investigations, damages claims and have incurred significant costs to fix the vulnerabilities in their systems).

King IV also places an obligation on the board of a company to be aware of and address the risks relating to cyber incidents. The board is tasked with overseeing business continuity and resilience arrangements as well as the business’ proactive monitoring of cyber incidents. This means that cybersecurity should be a board level agenda item.

At present, the sections of the Act which have come into effect are those that establish the Information Regulator (Regulator) as the regulatory body tasked with the obligation to govern and ensure compliance under the Act, as well as the sections setting out the procedure for regulation-making by the Regulator. The chairperson of the Regulator, Pansy Tlakula, indicated in a recent radio interview that the office of the Regulator will be operational by next year. So, if this indication is anything to go by, it would appear that the remainder of the Act could come into force by next year. Even though businesses would still have a one-year grace period (which could be extended for up to three years) to become compliant with the provisions of the Act in respect of existing processing activities and it would only be then that punitive measures may be implemented against non-compliant companies, the court of public opinion is a real risk to businesses who are affected by a data breach incident. Time has run out! It is strongly advised that businesses become compliant with the requirements of the Act and it does not stop there. To fully protect your business and ensure that you do not cause unnecessary damage to your reputation or at least are effective at mitigating the fall out of any serious data breach impacting your business, you should plan for such an eventuality.

The General Data Protection Regulation (GDPR) also applies to certain South African businesses and this is already in force – so urgency is definitely the order of the day!

See also:

(This article is provided for informational purposes only and not for the purpose of providing legal advice. For more information on the topic, please contact the author/s or the relevant provider.)
Preeta Bhagattjee
Preeta Bhagattjee

Preeta Bhagattjee is a Director in CDH's Technology and Sourcing practice. She has assisted numerous major clients, both within the ICT sector and as customers of ICT services and in both the public and private sector, on technology and communications law, outsourcing and service level agreements, e-commerce law, intellectual property and data protection and privacy issues.

Send a legal query to Preeta Bhagattjee
Share


Other Technology Law articles by


Other Technology Law articles on GoLegal