Mapping 'Security Safeguard' Requirements in a Data Privacy legislation to an International Privacy Framework: A Compliance Methodology

被引:0
|
作者
Govender, I. [1 ]
机构
[1] Univ Stellenbosch, Dept Math Sci Comp Sci, ZA-7600 Stellenbosch, South Africa
来源
2015 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE ISSA 2015 CONFERENCE | 2015年
关键词
Information Security; Data Privacy; Personal Information; GAPP; POPI; framework; methodology; mapping;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is commonplace for organisations to collect personal information to be processed and stored on their systems. Until recently, there was no comprehensive legislation that addressed the 'processing' of personal information by organisations in South Africa. The Protection of Personal Information Bill ("POPI") was signed into law in November 2013 and is expected to come into effect, later this year (2015). POPI is informed by international data privacy legislation. The implications are that it will be incumbent for organisations to revisit how they 'handle' peoples' personal information. This can be a daunting task as evidenced by countries that still find it a challenge to comply with data privacy laws that have been enacted there, a while ago. This article proposes a methodology to comply with POPI. The Generally Accepted Privacy Principles (GAPP) is an American/Canadian framework containing international privacy requirements with best practices. Both, POPI and GAPP address a common purpose: 'How personal information is collected, used, retained, disclosed, and disposed.' GAPP is reputed as a solid benchmark for good privacy practice, comprising of ten overarching privacy principles which yields a set of criteria for effective management of privacy risks and compliance. Much of the provisions in POPI is addressed in GAPP. A key condition (Security Safeguards) in POPI stipulates what aspects of personal information must be adequately secured, with limited insight on how to go about this process. Accordingly, this article proposes a methodology to fill this gap. All of the provisions under ' Security Safeguards' in POPI is mapped onto GAPP, thereby contextualising GAPP to facilitate compliance with South Africa's data privacy legislation and to the same end, complying with international privacy laws. This framework could also be implemented as a checklist/auditing document, guiding the organisation in its implementation of data privacy and POPI compliance.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Privacy and Data Security
    Gaff, Brian M.
    Smedinghoff, Thomas J.
    Sor, Socheth
    COMPUTER, 2012, 45 (03) : 8 - 10
  • [22] A framework to support selection of cloud providers based on security and privacy requirements
    Mouratidis, Haralambos
    Islam, Shareeful
    Kalloniatis, Christos
    Gritzalis, Stefanos
    JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (09) : 2276 - 2293
  • [23] Effective frameworks for delivering compliance with personal data privacy regulatory requirements
    Kabanov, Ilya
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [24] Security and privacy requirements in interactive TV
    Dhiah el Diehn I. Abou-Tair
    Ingo Köster
    Kathrin Höfke
    Multimedia Systems, 2011, 17 : 393 - 408
  • [25] Visualising privacy and security for requirements engineering
    Kreeger, MN
    Duncan, I
    SERP'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2004, : 813 - 819
  • [26] Security and privacy requirements in interactive TV
    Abou-Tair, Dhiah el Diehn I.
    Koester, Ingo
    Hoefke, Kathrin
    MULTIMEDIA SYSTEMS, 2011, 17 (05) : 393 - 408
  • [27] ACCESS CONTROL REQUIREMENTS FOR PRIVACY AND SECURITY
    KINGSLAKE, R
    INFORMATION PRIVACY, 1979, 1 (07): : 312 - 314
  • [28] A Security, Privacy and Trust Methodology for IIoT
    Chen, Lifeng
    Ye, Zhixiao
    Jin, Shanyue
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2021, 28 (03): : 898 - 906
  • [29] Precision health data: Requirements, challenges and existing techniques for data security and privacy
    Thapa, Chandra
    Camtepe, Seyit
    COMPUTERS IN BIOLOGY AND MEDICINE, 2021, 129
  • [30] Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform
    Tsohou, Aggeliki
    Magkos, Emmanouil
    Mouratidis, Haralambos
    Chrysoloras, George
    Piras, Luca
    Pavlidis, Michalis
    Debussche, Julien
    Rotoloni, Marco
    Crespo, Beatriz Gallego-Nicasio
    INFORMATION AND COMPUTER SECURITY, 2020, 28 (04) : 531 - 553