SlideShare a Scribd company logo
1 of 2
Download to read offline
Legislative Summary:
POPI Overview
Protection of Personal Information Act (POPI)
Assented to by Parliament on 19 November 2013; full act yet to be commenced
What the law covers
	 •	Each person’s right to privacy and the
measures that must safeguard their
personal information when it is processed
by a Responsible Party
	 •	The eight principles governing the
protection of personal information – during
it’s processing and use – against loss,
damage and its unlawful or unauthorised
access, processing and destruction
What is “personal information”
There are two categories that cover any
information relating to an identifiable, living
natural person or juristic person (companies,
for example).
Examples include, but are not limited to:
Personal information:
	 •	Identity and/or passport numbers
	 •	Date of birth, age and marital/
relationship status
	 •	Phone numbers, email addresses,
physical address
	 •	 Gender, race and ethnic origin
	 •	Photos, voice recordings, video
footage (also CCTV)
	 •	Biometric data
	 •	Private correspondence and
financial information
Special personal information:
	 •	Race, religion or philosophy on life
	 •	Political persuasion
	 •	Trade union membership
	 •	Health and sexual life
	 •	Criminal behaviour
Note: POPI prohibits the processing of special
personal information, unless the data subject
has given explicit consent to do so.
What is “processing”
In broad terms, processing means anything done
with the personal information including collection,
usage, storage, dissemination, modification or
destruction – both automated or manual.
Who must adhere to the regulations
A Responsible Party:
	 •	A public or private body
	 •	Any other person who, alone or in
conjunction with others, determines the
purpose of and means for processing
personal information
	 •	They must either be a resident of or
process the information in South Africa
(subject to certain exclusions)
Use of Third-party Operators
	 •	An operator is anyone who processes
personal information on behalf of a
Responsible Party with their knowledge
and authorisation
	 •	They must treat all personal information
as confidential and have a written
contract with the Responsible Party to
ensure that the appropriate security
safeguards are established and maintained
1 4
2
3
5
This document does not constitute a legal opinion or legal advice. Do not rely on any of the information in this document without first obtaining legal advice. © Copyright 2015
Offences/penalties for non-compliance
Offences include:
	 •	Breach by a person acting on behalf
of a Responsible Party
	 •	Obstruction of the execution of a warrant
	 •	Failure to comply with an enforcement
or information notice
	 •	Obstruction of the Regulator
The penalty for a conviction is imprisonment of
up to 10 years or a fine of up to R10 million.
How to comply
Adherence to the eight data protection
principles is required:
	 1.	Accountability
	 2.	 Processing Limitation
	 3.	 Purpose Specification
	 4.	 Further Processing Limitation
	 5.	 Information Quality
	 6.	Openness
	 7.	 Security Safeguards
	 8.	 Data Subject Participation
Compliance is monitored and enforced by
the Information Regulator. They:
	 •	Must be notified by a Responsible Party
before personal information can be processed
	 •	Receive complaints which they may investigate
and refer to the Enforcement Committee
	 •	Must be informed, along with the data
subject, when reasonable grounds indicate
a breach has occurred
Secure data retention and disposal
requirements
In order to comply with principle 7 and prevent
loss or unlawful access to personal information,
Responsible Parties must:
	 •	Identify all reasonably foreseeable internal
and external risks to personal information
in their possession or under their control
	 •	Establish and ensure the effective
implementation of appropriate safeguards
against these risks and ensure they are
updated regularly to account for new risks
Data retention:
POPI classifies a Record as any recorded
information, regardless of form or medium,
in possession or under the control of a
Responsible Party. Examples:
	 •	 Writing on any material, including labels
	 •	Information produced, recorded or
stored with a tape-recorder or computer
equipment and any derivative material
	 •	 A book, map, plan, graph or drawing
	 •	 A photograph, film, negative or tape
Under POPI, records of personal information:
	 •	Must not be retained any longer than is
necessary for achieving the authorised
purpose for which it was collected or
subsequently processed
	 •	Must be destroyed, deleted or
de-identified in a manner that prevents
its reconstruction in an intelligible form
6
7
8
This document does not constitute a legal opinion or legal advice. Do not rely on any of the information in this document without first obtaining legal advice. © Copyright 2015
How Shred-it can help:
Secure Document and Hard Drive Destruction
	 •	 Secure end-to-end chain of custody
	 •	Certificate of Destruction after every service
	 •	Tailored solutions to your organisation’s needs
Advice and Expertise
	 •	 Trained experts in information security
	 •	Provide a Security Risk Assessment at your organisation
	 •	Helpful resources available at shredit.co.za
For peace of mind,
contact Shred-it today
0861 274 733 | shredit.co.za
For more information on the Protection of Personal
Information, The Promotion of Access to Information
or the Companies Act, please visit: justice.gov.za
9

More Related Content

What's hot

Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Russell_Kennedy
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Dione McBride, CISSP, CIPP/E
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Guernsey Data Protection Legislation
Guernsey Data Protection LegislationGuernsey Data Protection Legislation
Guernsey Data Protection Legislationjonbarclay
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 
Websites: do you tick all the boxes?
Websites: do you tick all the boxes?Websites: do you tick all the boxes?
Websites: do you tick all the boxes?walescva
 
POPI Act compliance presentation
POPI Act compliance presentationPOPI Act compliance presentation
POPI Act compliance presentationOvationsGroup
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection ActSaimaRafiq
 
Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...Werksmans Attorneys
 
Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2MLG College of Learning, Inc
 
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017CloudWATCH Consortium
 
Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protectionmeritnorthwest
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Santosh Sigdel
 
Changing legislation – General Data Protection Regulation (GDPR) and librarie...
Changing legislation – General Data Protection Regulation (GDPR) and librarie...Changing legislation – General Data Protection Regulation (GDPR) and librarie...
Changing legislation – General Data Protection Regulation (GDPR) and librarie...CILIPScotland
 

What's hot (18)

Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
Data protection
Data protectionData protection
Data protection
 
Legal update
Legal updateLegal update
Legal update
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Guernsey Data Protection Legislation
Guernsey Data Protection LegislationGuernsey Data Protection Legislation
Guernsey Data Protection Legislation
 
Privacy 101
Privacy 101Privacy 101
Privacy 101
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Websites: do you tick all the boxes?
Websites: do you tick all the boxes?Websites: do you tick all the boxes?
Websites: do you tick all the boxes?
 
POPI Act compliance presentation
POPI Act compliance presentationPOPI Act compliance presentation
POPI Act compliance presentation
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...
 
Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2
 
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
 
Data Protection GDPR Basics
Data Protection GDPR BasicsData Protection GDPR Basics
Data Protection GDPR Basics
 
Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protection
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...
 
Changing legislation – General Data Protection Regulation (GDPR) and librarie...
Changing legislation – General Data Protection Regulation (GDPR) and librarie...Changing legislation – General Data Protection Regulation (GDPR) and librarie...
Changing legislation – General Data Protection Regulation (GDPR) and librarie...
 

Viewers also liked

justincase.PDF.final
justincase.PDF.finaljustincase.PDF.final
justincase.PDF.finalRaymond Casas
 
Instruct techstatisticswwii
Instruct techstatisticswwiiInstruct techstatisticswwii
Instruct techstatisticswwiiTaldaugion
 
Paquette_InternshipReflection
Paquette_InternshipReflectionPaquette_InternshipReflection
Paquette_InternshipReflectionGail Paquette
 
実務で活かせる AWSアーキテクチャ設計 〜AWS re:Invent 2016アップデート最新版〜
実務で活かせる AWSアーキテクチャ設計 〜AWS re:Invent 2016アップデート最新版〜実務で活かせる AWSアーキテクチャ設計 〜AWS re:Invent 2016アップデート最新版〜
実務で活かせる AWSアーキテクチャ設計 〜AWS re:Invent 2016アップデート最新版〜真吾 吉田
 
MySQL→Aurora移行セミナー
MySQL→Aurora移行セミナーMySQL→Aurora移行セミナー
MySQL→Aurora移行セミナー真吾 吉田
 

Viewers also liked (11)

Portfolio.pptx
Portfolio.pptxPortfolio.pptx
Portfolio.pptx
 
justincase.PDF.final
justincase.PDF.finaljustincase.PDF.final
justincase.PDF.final
 
Analisis externo
Analisis externoAnalisis externo
Analisis externo
 
Instruct techstatisticswwii
Instruct techstatisticswwiiInstruct techstatisticswwii
Instruct techstatisticswwii
 
Paquette_InternshipReflection
Paquette_InternshipReflectionPaquette_InternshipReflection
Paquette_InternshipReflection
 
Tutor
TutorTutor
Tutor
 
The Protection of Personal Information Act 4 of 2013
The Protection of Personal Information Act 4 of 2013The Protection of Personal Information Act 4 of 2013
The Protection of Personal Information Act 4 of 2013
 
Cxjourney
CxjourneyCxjourney
Cxjourney
 
実務で活かせる AWSアーキテクチャ設計 〜AWS re:Invent 2016アップデート最新版〜
実務で活かせる AWSアーキテクチャ設計 〜AWS re:Invent 2016アップデート最新版〜実務で活かせる AWSアーキテクチャ設計 〜AWS re:Invent 2016アップデート最新版〜
実務で活かせる AWSアーキテクチャ設計 〜AWS re:Invent 2016アップデート最新版〜
 
MySQL→Aurora移行セミナー
MySQL→Aurora移行セミナーMySQL→Aurora移行セミナー
MySQL→Aurora移行セミナー
 
DISLEXIA
DISLEXIADISLEXIA
DISLEXIA
 

Similar to POPI_Overview_E

GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...Harrison Clark Rickerbys
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsHarrison Clark Rickerbys
 
Media_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMedia_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMichelleSaver
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsHarrison Clark Rickerbys
 
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...Harrison Clark Rickerbys
 
The Protection of Personal Information Act: A Presentation
The Protection of Personal Information Act: A PresentationThe Protection of Personal Information Act: A Presentation
The Protection of Personal Information Act: A PresentationEndcode_org
 
Protection of Personal Information
Protection of Personal InformationProtection of Personal Information
Protection of Personal InformationFrancois Naude Jr.
 
Protection of Personal Information
Protection of Personal InformationProtection of Personal Information
Protection of Personal InformationFrancois Naude Jr.
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Burton Lee
 
Confidentiality Awareness
Confidentiality AwarenessConfidentiality Awareness
Confidentiality Awarenessitchomecare
 
Lorson Resources Limited - Records & Information Presentation: Data Protectio...
Lorson Resources Limited - Records & Information Presentation: Data Protectio...Lorson Resources Limited - Records & Information Presentation: Data Protectio...
Lorson Resources Limited - Records & Information Presentation: Data Protectio...Lorson Resources Limited
 
Data Privacy and Data Protection: Rotary’s Compliance with GDPR
Data Privacy and Data Protection: Rotary’s Compliance with GDPRData Privacy and Data Protection: Rotary’s Compliance with GDPR
Data Privacy and Data Protection: Rotary’s Compliance with GDPRRotary International
 
WB-2022-01-25-India's Data Protection Bill
WB-2022-01-25-India's Data Protection BillWB-2022-01-25-India's Data Protection Bill
WB-2022-01-25-India's Data Protection BillTrustArc
 
Data Protection Act presentation
Data Protection Act presentationData Protection Act presentation
Data Protection Act presentationIan Clive Oultram
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Frank Dawson
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management Endcode_org
 

Similar to POPI_Overview_E (20)

GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
Media_644046_smxx (1).pptx
Media_644046_smxx (1).pptxMedia_644046_smxx (1).pptx
Media_644046_smxx (1).pptx
 
POPI Seminar
POPI SeminarPOPI Seminar
POPI Seminar
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
 
The Protection of Personal Information Act: A Presentation
The Protection of Personal Information Act: A PresentationThe Protection of Personal Information Act: A Presentation
The Protection of Personal Information Act: A Presentation
 
Protection of Personal Information
Protection of Personal InformationProtection of Personal Information
Protection of Personal Information
 
Protection of Personal Information
Protection of Personal InformationProtection of Personal Information
Protection of Personal Information
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
 
Confidentiality Awareness
Confidentiality AwarenessConfidentiality Awareness
Confidentiality Awareness
 
Lorson Resources Limited - Records & Information Presentation: Data Protectio...
Lorson Resources Limited - Records & Information Presentation: Data Protectio...Lorson Resources Limited - Records & Information Presentation: Data Protectio...
Lorson Resources Limited - Records & Information Presentation: Data Protectio...
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
Gdpr for business full
Gdpr for business fullGdpr for business full
Gdpr for business full
 
Data Privacy and Data Protection: Rotary’s Compliance with GDPR
Data Privacy and Data Protection: Rotary’s Compliance with GDPRData Privacy and Data Protection: Rotary’s Compliance with GDPR
Data Privacy and Data Protection: Rotary’s Compliance with GDPR
 
WB-2022-01-25-India's Data Protection Bill
WB-2022-01-25-India's Data Protection BillWB-2022-01-25-India's Data Protection Bill
WB-2022-01-25-India's Data Protection Bill
 
Data Protection Act presentation
Data Protection Act presentationData Protection Act presentation
Data Protection Act presentation
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
POPI Seminar FINAL
POPI Seminar FINALPOPI Seminar FINAL
POPI Seminar FINAL
 

POPI_Overview_E

  • 1. Legislative Summary: POPI Overview Protection of Personal Information Act (POPI) Assented to by Parliament on 19 November 2013; full act yet to be commenced What the law covers • Each person’s right to privacy and the measures that must safeguard their personal information when it is processed by a Responsible Party • The eight principles governing the protection of personal information – during it’s processing and use – against loss, damage and its unlawful or unauthorised access, processing and destruction What is “personal information” There are two categories that cover any information relating to an identifiable, living natural person or juristic person (companies, for example). Examples include, but are not limited to: Personal information: • Identity and/or passport numbers • Date of birth, age and marital/ relationship status • Phone numbers, email addresses, physical address • Gender, race and ethnic origin • Photos, voice recordings, video footage (also CCTV) • Biometric data • Private correspondence and financial information Special personal information: • Race, religion or philosophy on life • Political persuasion • Trade union membership • Health and sexual life • Criminal behaviour Note: POPI prohibits the processing of special personal information, unless the data subject has given explicit consent to do so. What is “processing” In broad terms, processing means anything done with the personal information including collection, usage, storage, dissemination, modification or destruction – both automated or manual. Who must adhere to the regulations A Responsible Party: • A public or private body • Any other person who, alone or in conjunction with others, determines the purpose of and means for processing personal information • They must either be a resident of or process the information in South Africa (subject to certain exclusions) Use of Third-party Operators • An operator is anyone who processes personal information on behalf of a Responsible Party with their knowledge and authorisation • They must treat all personal information as confidential and have a written contract with the Responsible Party to ensure that the appropriate security safeguards are established and maintained 1 4 2 3 5 This document does not constitute a legal opinion or legal advice. Do not rely on any of the information in this document without first obtaining legal advice. © Copyright 2015
  • 2. Offences/penalties for non-compliance Offences include: • Breach by a person acting on behalf of a Responsible Party • Obstruction of the execution of a warrant • Failure to comply with an enforcement or information notice • Obstruction of the Regulator The penalty for a conviction is imprisonment of up to 10 years or a fine of up to R10 million. How to comply Adherence to the eight data protection principles is required: 1. Accountability 2. Processing Limitation 3. Purpose Specification 4. Further Processing Limitation 5. Information Quality 6. Openness 7. Security Safeguards 8. Data Subject Participation Compliance is monitored and enforced by the Information Regulator. They: • Must be notified by a Responsible Party before personal information can be processed • Receive complaints which they may investigate and refer to the Enforcement Committee • Must be informed, along with the data subject, when reasonable grounds indicate a breach has occurred Secure data retention and disposal requirements In order to comply with principle 7 and prevent loss or unlawful access to personal information, Responsible Parties must: • Identify all reasonably foreseeable internal and external risks to personal information in their possession or under their control • Establish and ensure the effective implementation of appropriate safeguards against these risks and ensure they are updated regularly to account for new risks Data retention: POPI classifies a Record as any recorded information, regardless of form or medium, in possession or under the control of a Responsible Party. Examples: • Writing on any material, including labels • Information produced, recorded or stored with a tape-recorder or computer equipment and any derivative material • A book, map, plan, graph or drawing • A photograph, film, negative or tape Under POPI, records of personal information: • Must not be retained any longer than is necessary for achieving the authorised purpose for which it was collected or subsequently processed • Must be destroyed, deleted or de-identified in a manner that prevents its reconstruction in an intelligible form 6 7 8 This document does not constitute a legal opinion or legal advice. Do not rely on any of the information in this document without first obtaining legal advice. © Copyright 2015 How Shred-it can help: Secure Document and Hard Drive Destruction • Secure end-to-end chain of custody • Certificate of Destruction after every service • Tailored solutions to your organisation’s needs Advice and Expertise • Trained experts in information security • Provide a Security Risk Assessment at your organisation • Helpful resources available at shredit.co.za For peace of mind, contact Shred-it today 0861 274 733 | shredit.co.za For more information on the Protection of Personal Information, The Promotion of Access to Information or the Companies Act, please visit: justice.gov.za 9