Information Governance POPI GDPR
Discover how to protect your data and make your organisation POPI Compliant.
Description
Information and technology overlap but are also distinct sources of value creation which pose individual risks and opportunities. It is to reinforce this distinction that this section in the King IV now refers to technology and information instead of information technology.
Course Objectives
The objective of this seminar is to help you understand the full implications of the POPI Act and how it will influence your business going forward. The facilitator will go into detail about how to make your organisation compliant, how to process and manage data in future, as well as the consequences of non-compliance
How will this Training Course be Presented?
Live-Online
Who is this Training Course for?
-
Executives
-
Directors
-
IT managers
-
Internal audit
-
IT staff
-
Security staff
-
Hr Managers
The Course Content
King IV IT governance principals
-
I T management
-
Information management
-
Reporting
-
Governing body responsibility
Information Security Governance
Legal compliance
Protection of Personal Information Act, 2013
-
Application and interpretation of Act
-
Lawful processing of personal information
-
Rights of data
-
Exclusions
-
Exclusion for journalistic, literary or artistic purposes
-
Condition 1 Accountability
-
Condition 2 Processing limitation
-
Condition 3 Purpose specification
-
Condition 4 Further processing limitation
-
Condition 5 Information quality
-
Condition 6 Openness
-
Condition 7 Security safeguards
-
Condition 8 Data subject participation
POPIA vs General Data Protection Regulation (EU)
Getting to Know the GDPR
-
What is the GDPR?
-
Whom it Affects, and How
-
The Initial Requirements
-
Rights and Responsibilities
-
The Challenges of Compliance
-
Who Enforces the Rules?
-
Hassle or Opportunity?
-
Technology Makes the Difference
Understanding What Data is Affected
-
Lots of Data . . . Which Falls Under the GDPR?
-
The Geographic Scope of GDPR
-
Data That Might Be In-Scope
-
Taking an Enterprise-Wide Approach
-
Where the Technical and Business Environments Meet
-
Your Data Governance Initiative
Finding the Data
-
Data is All Over the Organization, in Silos
-
Assessing Lots of Data Stores
-
Discovering Data, Analyzing Risks
-
Technology that Can Help
Preventing Unauthorized Access
-
Why Data Protection Controls?
-
Controls Must Be In Compliance
-
Technology to Handle Security
-
The roles of IT and audit for IT Governance
-
How can IT and internal audit work better together?