Recent Articles
All Articles
ISM (Information Security Management) Tips For SMEs – Byte 8
May 2024 | Issue no 31In this eighth byte, we break down the next policy policy statement you should include in your basic statement you …
READ MOREAre You Being Watched? The Legality Behind Workplace Monitoring
May 2024 | Issue no 30In this post-Covid era, many organisations have adopted a hybrid working model to support their employees. These organisations face the …
READ MORENavigating The Delicate Balance Of AI And Privacy
May 2024 | Issue no 29As technology rapidly evolves, artificial intelligence (AI) has emerged as a significant innovator across various fields. While AI enhances daily …
READ MOREISM (Information Security Management) Tips For SMEs – Byte 7
March 2024 | Issue no 28In our seventh byte, we will break down the next policy statement you should include in your basic ISM policy …
READ MORETelemarketing In South Africa: Navigating The POPIA Landscape
March 2024 | Issue no 27The telemarketing sector in South Africa is currently undergoing significant regulatory scrutiny. The Information Regulator is taking a strong stance …
READ MOREWhat Is It About Personal Information Which Is ‘Publicly Available’ Or ‘In The Public Domain’?
March 2024 | Issue no 26Every so often, a client will say, ‘But that personal information is publicly available, so POPIA does not apply’ …
READ MOREMore About … Information Matching Programmes
March 2024 | Issue no 25To get a POPIA code of conduct accredited, a POPIA code of conduct must specify appropriate measures for information matching …
READ MOREInformation Security Management Tips For SMEs – Byte 6
May 2023 | Issue no 24In our sixth byte, we will break down the third policy statement you should include in your basic ISM policy …
READ MOREData Privacy Roundup For Q1 Q2 2023
May 2023 | Issue no 23This is another roundup of the interesting articles, events and guidance released by data protection regulators worldwide, which we have …
READ MORE