Information security

Information security seeks to address “confidentiality” (ensuring that only authorised persons have access to information), “integrity” (ensuring that information is not maliciously or accidentally corrupted or amended) and “availability” (ensuring that information is available to those persons requiring the information as and when they may need it).

In most jurisdictions the requirement of information security has been as a result of the implementation of privacy legislation and the necessity in terms of privacy legislation to appropriately safeguard personal information. However, in South Africa, in the absence of privacy legislation until the enactment of the Protection of Personal Information Act, the development of information security principles has occurred largely outside of the legislative obligations of privacy legislation. Therefore the focus of most information security interventions has been the “availability” element of information security very often and to a large degree at the cost of the “confidentiality” and “integrity” elements.

Section 19 of the Protection of Personal Information Act requires that a responsible party establishes appropriate security safeguards to ensure that the “integrity” and “confidentiality” of personal information in its possession or under the control of the responsible party is not compromised. Even those companies who have relatively mature information security frameworks but which have predominantly addressed the issue of “availability” will need to review those frameworks in light of the requirement to specifically address “confidentiality” and “integrity”.

Privacy Online can assist companies in establishing information security management systems which address confidentiality, integrity and availability. This approach incorporates the appropriate configuration of information and communications technologies, the development of processes governing the use of the technologies and the training of employees to promote their compliance with the policy, procedures and standards necessary for the proper processing of information, and in particular personal information.

  • 13 September 2017 - 12:37:00
    In Government Gazette No. 41105 published on the 8th September 2017, the Information Regulator invited comment on the draft Regulations ...

  • 11 April 2017 - 10:02:00
    I was recently referred to an article entitled "Responding to Cybercrime at Scale: Operation Avalanche - A Case Study". The article is published by the Centre for Cyber and Homeland Security at the George Washington University and is authored by Robert Wainwright, a director of Europol and Frank J. Cilluffo, director of the Centre for Cyber and Homeland Security.

    For anyone dealing with the Cybercrimes and Cybersecurity Bill, this article provides some insight into the complexity of cybercrime and the profoundly different way in which the combatting of cybercrime needs to be addressed.