Improve your experience. We are very sorry but this website does not support Internet Explorer. We recommend using a different browser that is supported such as Google Chrome or Mozilla Firefox.
Discover how to protect your data and make your organisation POPI Compliant.
Information and technology overlap but are also distinct sources of value creation which pose individual risks and opportunities. It is to reinforce this distinction that this section in the King IV now refers to technology and information instead of information technology.
The objective of this seminar is to help you understand the full implications of the POPI Act and how it will influence your business going forward. The facilitator will go into detail about how to make your organisation compliant, how to process and manage data in future, as well as the consequences of non-compliance
Live-Online
Executives
Directors
IT managers
Internal audit
IT staff
Security staff
Hr Managers
King IV IT governance principals
I T management
Information management
Reporting
Governing body responsibility
Information Security Governance
Legal compliance
Protection of Personal Information Act, 2013
Application and interpretation of Act
Lawful processing of personal information
Rights of data
Exclusions
Exclusion for journalistic, literary or artistic purposes
Condition 1 Accountability
Condition 2 Processing limitation
Condition 3 Purpose specification
Condition 4 Further processing limitation
Condition 5 Information quality
Condition 6 Openness
Condition 7 Security safeguards
Condition 8 Data subject participation
POPIA vs General Data Protection Regulation (EU)
Getting to Know the GDPR
What is the GDPR?
Whom it Affects, and How
The Initial Requirements
Rights and Responsibilities
The Challenges of Compliance
Who Enforces the Rules?
Hassle or Opportunity?
Technology Makes the Difference
Understanding What Data is Affected
Lots of Data . . . Which Falls Under the GDPR?
The Geographic Scope of GDPR
Data That Might Be In-Scope
Taking an Enterprise-Wide Approach
Where the Technical and Business Environments Meet
Your Data Governance Initiative
Finding the Data
Data is All Over the Organization, in Silos
Assessing Lots of Data Stores
Discovering Data, Analyzing Risks
Technology that Can Help
Preventing Unauthorized Access
Why Data Protection Controls?
Controls Must Be In Compliance
Technology to Handle Security
The roles of IT and audit for IT Governance
How can IT and internal audit work better together?