Mapping 'Security Safeguard' Requirements in a Data Privacy legislation to an International Privacy Framework: A Compliance Methodology

被引:0
|
作者
Govender, I. [1 ]
机构
[1] Univ Stellenbosch, Dept Math Sci Comp Sci, ZA-7600 Stellenbosch, South Africa
关键词
Information Security; Data Privacy; Personal Information; GAPP; POPI; framework; methodology; mapping;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is commonplace for organisations to collect personal information to be processed and stored on their systems. Until recently, there was no comprehensive legislation that addressed the 'processing' of personal information by organisations in South Africa. The Protection of Personal Information Bill ("POPI") was signed into law in November 2013 and is expected to come into effect, later this year (2015). POPI is informed by international data privacy legislation. The implications are that it will be incumbent for organisations to revisit how they 'handle' peoples' personal information. This can be a daunting task as evidenced by countries that still find it a challenge to comply with data privacy laws that have been enacted there, a while ago. This article proposes a methodology to comply with POPI. The Generally Accepted Privacy Principles (GAPP) is an American/Canadian framework containing international privacy requirements with best practices. Both, POPI and GAPP address a common purpose: 'How personal information is collected, used, retained, disclosed, and disposed.' GAPP is reputed as a solid benchmark for good privacy practice, comprising of ten overarching privacy principles which yields a set of criteria for effective management of privacy risks and compliance. Much of the provisions in POPI is addressed in GAPP. A key condition (Security Safeguards) in POPI stipulates what aspects of personal information must be adequately secured, with limited insight on how to go about this process. Accordingly, this article proposes a methodology to fill this gap. All of the provisions under ' Security Safeguards' in POPI is mapped onto GAPP, thereby contextualising GAPP to facilitate compliance with South Africa's data privacy legislation and to the same end, complying with international privacy laws. This framework could also be implemented as a checklist/auditing document, guiding the organisation in its implementation of data privacy and POPI compliance.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] A Framework for Privacy and Security Requirements Analysis and Conflict Resolution for Supporting GDPR Compliance Through Privacy-by-Design
    Alkubaisy, Duaa
    Piras, Luca
    Al-Obeidallah, Mohammed Ghazi
    Cox, Karl
    Mouratidis, Haralambos
    EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING (ENASE 2021), 2022, 1556 : 67 - 87
  • [2] Evaluating existing security and privacy requirements for legal compliance
    Aaron K. Massey
    Paul N. Otto
    Lauren J. Hayward
    Annie I. Antón
    Requirements Engineering, 2010, 15 : 119 - 137
  • [3] Evaluating existing security and privacy requirements for legal compliance
    Massey, Aaron K.
    Otto, Paul N.
    Hayward, Lauren J.
    Anton, Annie I.
    REQUIREMENTS ENGINEERING, 2010, 15 (01) : 119 - 137
  • [4] Towards a Common Security and Privacy Requirements Elicitation Methodology
    Makri, Eleni-Laskarina
    Lambrinoudakis, Costas
    GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 151 - 159
  • [5] Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
    Massacci, F
    Prest, M
    Zannone, N
    COMPUTER STANDARDS & INTERFACES, 2005, 27 (05) : 445 - 455
  • [6] Privacy and Security Requirements Framework for the Internet of Things (IoT)
    Alqassem, Israa
    36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE COMPANION 2014), 2014, : 739 - 741
  • [7] A Framework Managing Conflicts between Security and Privacy Requirements
    Alkubaisy, Duaa
    2017 11TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2017, : 427 - 432
  • [8] Evaluation of a Security and Privacy Requirements Methodology Using the Physics of Notation
    Diamantopoulou, Vasiliki
    Pavlidis, Michalis
    Mouratidis, Haralambos
    COMPUTER SECURITY, 2017, 2018, 10683 : 210 - 225
  • [9] Data Privacy and Security: HIPAA and Small Business Compliance
    Suleiman, James
    Huston, Terry
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2009, 3 (02) : 42 - 53
  • [10] Multidomain Fusion Data Privacy Security Framework
    Yang, Jing
    Qu, Lianwei
    Wang, Yong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021