Protection of Personal Information Act 2013 and data protection for health research in South Africa

被引:14
|
作者
Staunton, Ciara [1 ,2 ]
Adams, Rachel [3 ,4 ]
Anderson, Dominique [5 ]
Croxton, Talishiea [6 ,7 ]
Kamuya, Dorcas [8 ]
Munene, Marianne [8 ]
Swanepoel, Carmen [9 ,10 ]
机构
[1] Middlesex Univ, Sch Law, London, England
[2] Eurac Res, Inst Biomed, Bolzano, Italy
[3] Human Sci Res Council, Pretoria, South Africa
[4] Univ London, Informat Law & Policy Ctr, Inst Adv Legal Studies, London, England
[5] Univ Western Cape, South African Natl Bioinformat Inst, SA MRC Bioinformat Unit, Cape Town, South Africa
[6] Univ Maryland, Inst Human Virol, Baltimore, MD 21201 USA
[7] Inst Human Virol, Abuja, Nigeria
[8] KEMRI Wellcome Trust Res Programme, Nairobi, Kenya
[9] Tygerberg Hosp, Dept Pathol, Natl Hlth Lab Serv, Cape Town, South Africa
[10] Stellenbosch Univ, Fac Med & Hlth Sci, Stellenbosch, South Africa
关键词
NO; 4; BIOBANKING; CHALLENGES;
D O I
10.1093/idpl/ipz024
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
Key Points The Protection of Personal Information Act (POPIA) [No.4 of 2013] is the first comprehensive data protection regulation to be passed in South Africa and it gives effect to the right to informational privacy derived from the constitutional right to privacy It is due to come into force in 2020, and seeks to regulate the processing of personal information in South Africa, regulate the flow of personal information across South Africas borders, and ensure that any limitations on the right to privacy are justified and aimed at protecting other important rights and interests. Although it was not drafted with health research in mind, POPIA will have an impact on the sharing of health data for research, in particular biorepositories. It is now timely to consider the impact of POPIA on biorepositories, and the necessary changes to their access and sharing arrangements prior to POPIA coming into force.
引用
收藏
页码:160 / 179
页数:20
相关论文
共 50 条
  • [1] Data protection, data management, and data sharing: Stakeholder perspectives on the protection of personal health information in South Africa
    Staunton, Ciara
    Tschigg, Kathrina
    Sherman, Gayle
    PLOS ONE, 2021, 16 (12):
  • [2] Safeguarding the future of genomic research in South Africa: Broad consent and the Protection of Personal Information Act No. 4 of 2013
    Staunton, C.
    Adams, R.
    Botes, M.
    Dove, E. S.
    Horn, L.
    Labuschaigne, M.
    Loots, G.
    Mahomed, S.
    Makuba, J.
    Olckers, A.
    Pepper, M. S.
    Pope, A.
    Ramsay, M.
    Loideain, N. N.
    de Vries, J.
    SAMJ SOUTH AFRICAN MEDICAL JOURNAL, 2019, 109 (07): : 468 - 470
  • [3] Evaluation of Online Resources on the Implementation of the Protection of Personal Information Act in South Africa
    Botha, Johnny
    Eloff, M. M.
    Swart, Ignus
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 39 - 48
  • [5] Health research, protection of personal data and General Data Protection Regulation
    Lesaulnier, Frederique
    MEDECINE & DROIT, 2019, (158): : 103 - 111
  • [6] Drafting a Code of Conduct for Research under the Protection of Personal Information Act No. 4 of 2013
    Adams, Rachel
    Veldsman, Susan
    Ramsay, Michele
    Soodyall, Himla
    SOUTH AFRICAN JOURNAL OF SCIENCE, 2021, 117 (5-6)
  • [7] Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements
    Da Veiga, Adele
    Vorster, Ruthea
    Li, Fudong
    Clarke, Nathan
    Furnell, Steven M.
    INFORMATION AND COMPUTER SECURITY, 2020, 28 (03) : 399 - 422
  • [8] Protection of Personal Information Act No. 4 of 2013: Implications for biobanks
    Staunton, C.
    de Stadler, E.
    SAMJ SOUTH AFRICAN MEDICAL JOURNAL, 2019, 109 (04): : 232 - 234
  • [9] A High-Level Comparison Between the South African Protection of Personal Information Act and International Data Protection Laws
    Botha, Johnny
    Grobler, M. M.
    Hahn, Jade
    Eloff, Mariki
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2017), 2017, : 57 - 66