Mapping 'Security Safeguard' Requirements in a Data Privacy legislation to an International Privacy Framework: A Compliance Methodology

被引:0
|
作者
Govender, I. [1 ]
机构
[1] Univ Stellenbosch, Dept Math Sci Comp Sci, ZA-7600 Stellenbosch, South Africa
关键词
Information Security; Data Privacy; Personal Information; GAPP; POPI; framework; methodology; mapping;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is commonplace for organisations to collect personal information to be processed and stored on their systems. Until recently, there was no comprehensive legislation that addressed the 'processing' of personal information by organisations in South Africa. The Protection of Personal Information Bill ("POPI") was signed into law in November 2013 and is expected to come into effect, later this year (2015). POPI is informed by international data privacy legislation. The implications are that it will be incumbent for organisations to revisit how they 'handle' peoples' personal information. This can be a daunting task as evidenced by countries that still find it a challenge to comply with data privacy laws that have been enacted there, a while ago. This article proposes a methodology to comply with POPI. The Generally Accepted Privacy Principles (GAPP) is an American/Canadian framework containing international privacy requirements with best practices. Both, POPI and GAPP address a common purpose: 'How personal information is collected, used, retained, disclosed, and disposed.' GAPP is reputed as a solid benchmark for good privacy practice, comprising of ten overarching privacy principles which yields a set of criteria for effective management of privacy risks and compliance. Much of the provisions in POPI is addressed in GAPP. A key condition (Security Safeguards) in POPI stipulates what aspects of personal information must be adequately secured, with limited insight on how to go about this process. Accordingly, this article proposes a methodology to fill this gap. All of the provisions under ' Security Safeguards' in POPI is mapped onto GAPP, thereby contextualising GAPP to facilitate compliance with South Africa's data privacy legislation and to the same end, complying with international privacy laws. This framework could also be implemented as a checklist/auditing document, guiding the organisation in its implementation of data privacy and POPI compliance.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Compliance Checking of Open Source EHR Applications for HIPAA and ONC Security and Privacy Requirements
    Farhadi, Maryam
    Haddad, Hisham
    Shahriar, Hossain
    2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2019, : 704 - 713
  • [32] ADMINISTRATIVE SECRECY AND DATA PRIVACY LEGISLATION
    DEMITRIADES, PB
    JOURNAL OF SYSTEMS MANAGEMENT, 1976, 27 (10): : 24 - 29
  • [33] The Tenth International Workshop on Security and Privacy in Big Data (BigSecurity)
    Ansari, Nirwan
    Wang, Chonggang
    INFOCOM WKSHPS 2022 - IEEE Conference on Computer Communications Workshops, 2022,
  • [34] A security architecture for data privacy and security
    Weaver, Alfred C.
    ETFA 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOL 1, PTS 1 AND 2, PROCEEDINGS, 2005, : 673 - 676
  • [35] A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
    Deng, Mina
    Wuyts, Kim
    Scandariato, Riccardo
    Preneel, Bart
    Joosen, Wouter
    REQUIREMENTS ENGINEERING, 2011, 16 (01) : 3 - 32
  • [36] A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
    Mina Deng
    Kim Wuyts
    Riccardo Scandariato
    Bart Preneel
    Wouter Joosen
    Requirements Engineering, 2011, 16 : 3 - 32
  • [37] Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations
    Islam, Shareeful
    Mouratidis, Haralambos
    Wagner, Stefan
    REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY, 2010, 6182 : 255 - +
  • [38] Design & analysis of novel IT security framework for overcoming data security & privacy challenges
    Manuja, Prashant
    Shekhawat, Rajveer Singh
    Rawat, Umashankar
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (03): : 885 - 898
  • [39] Big Data Security and Privacy
    Bertino, Elisa
    2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2016, : 3 - 3
  • [40] Security and privacy in big data
    Xiang, Yang
    Au, Man Ho
    Kutylowsky, Miroslaw
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (10): : 2856 - 2857