SlideShare a Scribd company logo
1 of 29
Information Technology Attorneys Snapshot of Current State of ICT  Regulatory Compliance in South Africa Lance Michalson Gartner Symposium ITXPO 2005 01 August 2005 Cape Town, South Africa
Current Legal Compliance Landscape
Compliance v Best Practice v Risk Management Compliance Best Practice Risk  Management Technology Risk Tech Legal Risk Wide Narrow
Example Compliance issues Issue Offence Crypto supplier  not registered with DOC Offence (fine or imprisonment not exceeding 2 years)   No  corporate info  on e-mail Offence ito Companies Act s50.1.c arw s50.4, s171.1 arw s441.1.m, s50.1.c arw s441.1.k No express or implied consent to  monitoring  paper and electronic communications Fine not exceeding R2m or imprisonment not exceeding 10 years | Inadmissible evidence
Example Tech Legal Risk Issues Issue Risk No  software development agreement  in place Company does not own the software Various factors might influence the  admissibility and evidential weight  of electronic documents  Inadmissibility of evidence. Compromised chances of success of litigation (resulting possible reputational damage, monetary loss – damages, legal costs etc.) No  e-mail footer (signature / disclaimer) Vicarious liability (e.g. for defamation)
 
Legislative Process LEGISLATURE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],EXECUTIVE JUDICIARY CONSTITUTION
South African ICT Regulatory Hype Cycle Visibility Trough of Disillusionment Slope of Enlightenment Plateau of Productivity Business Trigger Maturity Peak of Inflated Expectations
Process followed ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
South African ICT Regulatory Hype Cycle Compliance requirements develop at different rates Visibility Trough of Disillusionment Slope of Enlightenment Plateau of Productivity Business Trigger Peak of Inflated Expectations  Maturity Acronym Key ASPs = Authentication Service Providers RIC =  Regulation of Interception of Communications etc. Act 70 of 2002 Less than two years Two years to five years Five years to 10 years Key: Time to Plateau Infosec / SANS 17799 ECT Act (2002) Basel II (1999) RM / SANS 15489 PROATIA (2000) Sarbanes-Oxley Act (2002) RIC (monitoring) Data Privacy SANS 15801 Critical Databases, Crypto Providers and ASPs Convergence Bill (2005) King II (2002) EU Data privacy  Directive FICA
Life Cycle of an Act of Parliament Issue Paper Discussion Paper Green Paper White Paper  or Fast Track to Bill Bill Parliamentary Portfolio Committee Hearings Act before National Council of Provinces Act before  National Assembly Signed by President  & Gazetted Regulations, Notices DRAFTING PERIOD INFLUENCE PERIOD PREPARE TO COMPLY IP PC Cabinet Source : Department of Justice and Constitutional Development http://www.doj.gov.za/2004dojsite/legislation/legprocess.htm   Last updated: 01 August 2005
Where Key Pieces of Legislation Fit in Issue Paper Discussion Paper Green Paper White Paper  or Fast Track to Bill Bill Parliamentary Portfolio Committee Hearings Act before National Council of Provinces Act before  National Assembly Signed by President  + Gazetted Regulations, Notices IP PC Data Privacy Convergence Bill RIC (not yet promulgated) ECT Act Critical Database Regs ECT Act Crypto, ASP, Domain Name Regs Regs not published for comment Regs published for comment, not yet promulgated Key: Status of Regulations PC IP DRAFTING PERIOD INFLUENCE PERIOD PREPARE TO COMPLY Last updated: 01 August 2005 Cabinet
Optimum points of engagement June 2005  August 2005 December 2005 Convergence Bill Data Privacy Discussion Paper / Green Paper Critical Database  Regulations comments &  Crypto Provider  enactment (ECT Act) January 2006 Possible Gazetting of Monitoring Act (anytime)
What can be done now? ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
Chapter lX: Protection of Critical Databases Chapter lX: Protection of Critical  Databases Scope of  Critical  Database  Protection S57 S56 S55 S54 S53 S58 Identification   of critical  data and  databases Registration  Of Critical  Databases Management Of Critical  Databases Restrictions  On disclosure  of Information Right of  Inspection Non Compliance  with Chapter S52 Chapter lX: Protection of Critical Databases Aim is to facilitate the identification and registration of critical databases within the Republic.  Critical databases are defined as databases that contain information that if compromised could threaten the security of the Republic or the economic and social well being of it’s citizens. The Act stipulates criteria for the identification, registration and management of critical databases  as well as controls to ensure that the integrity and confidentiality of data relating to and contained in these databases is maintained such as the right to audit and restrictions and penalties resulting in unauthorised or illegal disclosure of information contained in or about these databases. In November 2003 the Minister of Communications awarded a tender to a consortium of Consultants to undertake an inventory of all major databases in South Africa.
Management of Critical Databases ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy
State of SA privacy regulation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data Protection Principles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Monitoring
Monitoring e-communications ,[object Object],[object Object],[object Object],[object Object]
Monitoring ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Some Monitoring Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Monitoring Matrix Implied consent and reasonable efforts demonstrated by Written consent demonstrated by CEO is protected by Monitoring Policy Acceptance of Monitoring Policy CEO Delegation to IT department FAQ Pro-Forma Interception Request Glossary of Terms Pro-Forma Interception Report to the Board Log-on Notice Log-on Notice Monitoring Policy Notice to Users Reminder e-mail from IT department
 
Compliance & Risk Cocktail ACTS OF PARLIAMENT ECT ACT PROATIA, 2002 Monitoring Act COMMON LAW BEST PRACTICE INFORMATION RISK MANAGEMENT Contract Delict (Negligence – duty to take reasonable steps) SANS 17799 MISS (Govt depts) COSO ERM COBIT SEE OUR INFORMATION & TECHNOLOGY COMPLIANCE AND  LEGAL RISK MATRIX KING II GOOD GOVERNANCE Compliance crosses several disciplines from HR to IT to Legal to risk management Compliance is a combination of policy, process, and technology
THANK YOU FOR YOUR TIME!! Lance Michalson [email_address] “ IT Law with Insight” www.michalsons.com Copyright © Michalsons 2002-2009 The information contained in this presentation is subject to change without notice. Michalsons makes no warranty of any kind with regard to the material, including, but not limited to, the implied warranties of fitness for a particular purpose. Michalsons shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material. This document contains proprietary information that is protected by copyright. All rights are reserved. No part of this document may be photocopied, reproduced, or translated to another language without the prior written consent of Michalsons This document is an unpublished work protected by the copyright laws and is proprietary to Michalsons. Disclosure, copying, reproduction, merger, translation, modification, enhancement, or use by any unauthorised person without the prior written consent of Michalsons is prohibited. Contact Lance Michalson at lance@michalsons.com for permission to copy.

More Related Content

What's hot

CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
Shadi A. Razak
 
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Constantine Karbaliotis
 

What's hot (20)

57th ICCA Congress | 12.11.2018 | Data Protection - 150 days after GDPR
57th ICCA Congress | 12.11.2018 | Data Protection - 150 days after GDPR57th ICCA Congress | 12.11.2018 | Data Protection - 150 days after GDPR
57th ICCA Congress | 12.11.2018 | Data Protection - 150 days after GDPR
 
Come cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoCome cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeo
 
Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity Legislation
 
Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015
Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015
Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
 
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber security
 
Wearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rightsWearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rights
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPR
 
GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risks
 
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
 
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
 
Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...
 
Key Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government ContractorsKey Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government Contractors
 

Viewers also liked

Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminar
Lance Michalson
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
Lance Michalson
 
Rm2010 toolkit promo
Rm2010 toolkit promoRm2010 toolkit promo
Rm2010 toolkit promo
Betsy Fanning
 
How To Make A Great Pbj
How To Make A Great PbjHow To Make A Great Pbj
How To Make A Great Pbj
guestbdfa639
 

Viewers also liked (17)

What is PDF/A?
What is PDF/A?What is PDF/A?
What is PDF/A?
 
Building relationships -_social_networking_toolkit
Building relationships -_social_networking_toolkitBuilding relationships -_social_networking_toolkit
Building relationships -_social_networking_toolkit
 
PDF/Archive: Preserving Electronic Assets
PDF/Archive: Preserving Electronic AssetsPDF/Archive: Preserving Electronic Assets
PDF/Archive: Preserving Electronic Assets
 
Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminar
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 
Be aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailBe aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to email
 
Pdfa 2 rome-fanning
Pdfa 2 rome-fanningPdfa 2 rome-fanning
Pdfa 2 rome-fanning
 
Records Management and IT: Bridging the Gap
Records Management and IT: Bridging the GapRecords Management and IT: Bridging the Gap
Records Management and IT: Bridging the Gap
 
Social business 2011
Social business 2011Social business 2011
Social business 2011
 
Using and Securely Exchanging Health Records
Using and Securely Exchanging Health RecordsUsing and Securely Exchanging Health Records
Using and Securely Exchanging Health Records
 
Business Process BPM_Overview
Business Process BPM_OverviewBusiness Process BPM_Overview
Business Process BPM_Overview
 
Getting grip on_web_20
Getting grip on_web_20Getting grip on_web_20
Getting grip on_web_20
 
Rm2010 toolkit promo
Rm2010 toolkit promoRm2010 toolkit promo
Rm2010 toolkit promo
 
Digital Preservation Standards
Digital Preservation StandardsDigital Preservation Standards
Digital Preservation Standards
 
Be aware of the ICT laws that apply to your organisation
Be aware of the ICT laws that apply to your organisationBe aware of the ICT laws that apply to your organisation
Be aware of the ICT laws that apply to your organisation
 
How To Make A Great Pbj
How To Make A Great PbjHow To Make A Great Pbj
How To Make A Great Pbj
 
Preparing for ecm_projects
Preparing for ecm_projectsPreparing for ecm_projects
Preparing for ecm_projects
 

Similar to Ict Compliance @ Gartner (August 2005)

115 By Robert Smallwood with Randy Kahn,Esq. , and .docx
115  By Robert Smallwood with Randy   Kahn,Esq.   , and .docx115  By Robert Smallwood with Randy   Kahn,Esq.   , and .docx
115 By Robert Smallwood with Randy Kahn,Esq. , and .docx
drennanmicah
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
segughana
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
padler01
 
The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)
Craig Mullins
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
David Cunningham
 
Mulin Holstein PKI-strategy
Mulin Holstein PKI-strategyMulin Holstein PKI-strategy
Mulin Holstein PKI-strategy
fEngel
 

Similar to Ict Compliance @ Gartner (August 2005) (20)

Privacy & Data Protection: Subject Access Requests
Privacy & Data Protection: Subject Access RequestsPrivacy & Data Protection: Subject Access Requests
Privacy & Data Protection: Subject Access Requests
 
115 By Robert Smallwood with Randy Kahn,Esq. , and .docx
115  By Robert Smallwood with Randy   Kahn,Esq.   , and .docx115  By Robert Smallwood with Randy   Kahn,Esq.   , and .docx
115 By Robert Smallwood with Randy Kahn,Esq. , and .docx
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
[Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again!
[Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again![Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again!
[Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again!
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
 
CrimsonLogic World Bank_IADB_Washington DC_30 Sep 2009_eGovernance to yield g...
CrimsonLogic World Bank_IADB_Washington DC_30 Sep 2009_eGovernance to yield g...CrimsonLogic World Bank_IADB_Washington DC_30 Sep 2009_eGovernance to yield g...
CrimsonLogic World Bank_IADB_Washington DC_30 Sep 2009_eGovernance to yield g...
 
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3
 
State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...
 
SEC Updates its Electronic Recordkeeping Rule for the First Time in 25 Years
SEC Updates its Electronic Recordkeeping Rule for the First Time in 25 YearsSEC Updates its Electronic Recordkeeping Rule for the First Time in 25 Years
SEC Updates its Electronic Recordkeeping Rule for the First Time in 25 Years
 
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 SydneyLegal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
 
Mulin Holstein PKI-strategy
Mulin Holstein PKI-strategyMulin Holstein PKI-strategy
Mulin Holstein PKI-strategy
 
Sarbanes-Oxley Compliance and the RFI/RFP Process
Sarbanes-Oxley Compliance and the RFI/RFP ProcessSarbanes-Oxley Compliance and the RFI/RFP Process
Sarbanes-Oxley Compliance and the RFI/RFP Process
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
 
E. Bryan - Governance and Records Management
E. Bryan - Governance and Records ManagementE. Bryan - Governance and Records Management
E. Bryan - Governance and Records Management
 

Recently uploaded

Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 

Recently uploaded (20)

Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 

Ict Compliance @ Gartner (August 2005)

  • 1. Information Technology Attorneys Snapshot of Current State of ICT Regulatory Compliance in South Africa Lance Michalson Gartner Symposium ITXPO 2005 01 August 2005 Cape Town, South Africa
  • 3. Compliance v Best Practice v Risk Management Compliance Best Practice Risk Management Technology Risk Tech Legal Risk Wide Narrow
  • 4. Example Compliance issues Issue Offence Crypto supplier not registered with DOC Offence (fine or imprisonment not exceeding 2 years) No corporate info on e-mail Offence ito Companies Act s50.1.c arw s50.4, s171.1 arw s441.1.m, s50.1.c arw s441.1.k No express or implied consent to monitoring paper and electronic communications Fine not exceeding R2m or imprisonment not exceeding 10 years | Inadmissible evidence
  • 5. Example Tech Legal Risk Issues Issue Risk No software development agreement in place Company does not own the software Various factors might influence the admissibility and evidential weight of electronic documents Inadmissibility of evidence. Compromised chances of success of litigation (resulting possible reputational damage, monetary loss – damages, legal costs etc.) No e-mail footer (signature / disclaimer) Vicarious liability (e.g. for defamation)
  • 6.  
  • 7.
  • 8. South African ICT Regulatory Hype Cycle Visibility Trough of Disillusionment Slope of Enlightenment Plateau of Productivity Business Trigger Maturity Peak of Inflated Expectations
  • 9.
  • 10. South African ICT Regulatory Hype Cycle Compliance requirements develop at different rates Visibility Trough of Disillusionment Slope of Enlightenment Plateau of Productivity Business Trigger Peak of Inflated Expectations Maturity Acronym Key ASPs = Authentication Service Providers RIC = Regulation of Interception of Communications etc. Act 70 of 2002 Less than two years Two years to five years Five years to 10 years Key: Time to Plateau Infosec / SANS 17799 ECT Act (2002) Basel II (1999) RM / SANS 15489 PROATIA (2000) Sarbanes-Oxley Act (2002) RIC (monitoring) Data Privacy SANS 15801 Critical Databases, Crypto Providers and ASPs Convergence Bill (2005) King II (2002) EU Data privacy Directive FICA
  • 11. Life Cycle of an Act of Parliament Issue Paper Discussion Paper Green Paper White Paper or Fast Track to Bill Bill Parliamentary Portfolio Committee Hearings Act before National Council of Provinces Act before National Assembly Signed by President & Gazetted Regulations, Notices DRAFTING PERIOD INFLUENCE PERIOD PREPARE TO COMPLY IP PC Cabinet Source : Department of Justice and Constitutional Development http://www.doj.gov.za/2004dojsite/legislation/legprocess.htm Last updated: 01 August 2005
  • 12. Where Key Pieces of Legislation Fit in Issue Paper Discussion Paper Green Paper White Paper or Fast Track to Bill Bill Parliamentary Portfolio Committee Hearings Act before National Council of Provinces Act before National Assembly Signed by President + Gazetted Regulations, Notices IP PC Data Privacy Convergence Bill RIC (not yet promulgated) ECT Act Critical Database Regs ECT Act Crypto, ASP, Domain Name Regs Regs not published for comment Regs published for comment, not yet promulgated Key: Status of Regulations PC IP DRAFTING PERIOD INFLUENCE PERIOD PREPARE TO COMPLY Last updated: 01 August 2005 Cabinet
  • 13. Optimum points of engagement June 2005 August 2005 December 2005 Convergence Bill Data Privacy Discussion Paper / Green Paper Critical Database Regulations comments & Crypto Provider enactment (ECT Act) January 2006 Possible Gazetting of Monitoring Act (anytime)
  • 14.
  • 15.  
  • 16.  
  • 17. Chapter lX: Protection of Critical Databases Chapter lX: Protection of Critical Databases Scope of Critical Database Protection S57 S56 S55 S54 S53 S58 Identification of critical data and databases Registration Of Critical Databases Management Of Critical Databases Restrictions On disclosure of Information Right of Inspection Non Compliance with Chapter S52 Chapter lX: Protection of Critical Databases Aim is to facilitate the identification and registration of critical databases within the Republic. Critical databases are defined as databases that contain information that if compromised could threaten the security of the Republic or the economic and social well being of it’s citizens. The Act stipulates criteria for the identification, registration and management of critical databases as well as controls to ensure that the integrity and confidentiality of data relating to and contained in these databases is maintained such as the right to audit and restrictions and penalties resulting in unauthorised or illegal disclosure of information contained in or about these databases. In November 2003 the Minister of Communications awarded a tender to a consortium of Consultants to undertake an inventory of all major databases in South Africa.
  • 18.
  • 20.
  • 21.
  • 23.
  • 24.
  • 25.
  • 26. Monitoring Matrix Implied consent and reasonable efforts demonstrated by Written consent demonstrated by CEO is protected by Monitoring Policy Acceptance of Monitoring Policy CEO Delegation to IT department FAQ Pro-Forma Interception Request Glossary of Terms Pro-Forma Interception Report to the Board Log-on Notice Log-on Notice Monitoring Policy Notice to Users Reminder e-mail from IT department
  • 27.  
  • 28. Compliance & Risk Cocktail ACTS OF PARLIAMENT ECT ACT PROATIA, 2002 Monitoring Act COMMON LAW BEST PRACTICE INFORMATION RISK MANAGEMENT Contract Delict (Negligence – duty to take reasonable steps) SANS 17799 MISS (Govt depts) COSO ERM COBIT SEE OUR INFORMATION & TECHNOLOGY COMPLIANCE AND LEGAL RISK MATRIX KING II GOOD GOVERNANCE Compliance crosses several disciplines from HR to IT to Legal to risk management Compliance is a combination of policy, process, and technology
  • 29. THANK YOU FOR YOUR TIME!! Lance Michalson [email_address] “ IT Law with Insight” www.michalsons.com Copyright © Michalsons 2002-2009 The information contained in this presentation is subject to change without notice. Michalsons makes no warranty of any kind with regard to the material, including, but not limited to, the implied warranties of fitness for a particular purpose. Michalsons shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material. This document contains proprietary information that is protected by copyright. All rights are reserved. No part of this document may be photocopied, reproduced, or translated to another language without the prior written consent of Michalsons This document is an unpublished work protected by the copyright laws and is proprietary to Michalsons. Disclosure, copying, reproduction, merger, translation, modification, enhancement, or use by any unauthorised person without the prior written consent of Michalsons is prohibited. Contact Lance Michalson at lance@michalsons.com for permission to copy.