SlideShare una empresa de Scribd logo
1 de 83
Descargar para leer sin conexión
Electronic Records ManagementJenna Cuming& Katherine ThompsonCL  Johannesburg© Chetty Law 2011,[object Object],Guest Lecture Presented During Rabelani Dagada's Technology & Information Management's Class at the Wits Business School, 3 February 2011,[object Object]
Electronic Communications and Transactions ActElectronic Records ManagementElectronic Evidence & E-DiscoveryBoardroom ConversationsChecklists ,[object Object]
Records Management ImperativeLegal Compliance (Mandate, Industry)Evidence – Proof of Existence of FactsOperational EfficiencyGovernance ImperativeKing IIIArchives ImperativeNational Archives PrescriptionsAccess to Justice and Access to Information Imperative PAJA & PAIA (PPI Bill),[object Object]
Enter the ECT Act…..,[object Object],© Chetty Law 2011,[object Object]
Intention:To maximize the benefits of electronic transactions and internet usage by all South Africans.In effect:Electronic transactions have the same legal force as paper based transactions.,[object Object], In Short,[object Object],© Chetty Law 2011,[object Object]
Rabelani dagada electronic records management   chetty law 2011
Information is not without legal force and effect merely on the grounds that it is wholly or partly in the form of a data message… or is merely referred to in such data message.,[object Object], ECT : Section 11(1) & (2),[object Object],© Chetty Law 2011,[object Object]
Rabelani dagada electronic records management   chetty law 2011
Rabelani dagada electronic records management   chetty law 2011
Means:Data generated, sent, received or stored by electronic means and includes  voice, where the voice is used in an automated transaction; and a stored record.,[object Object], Definition of a Data Message,[object Object],© Chetty Law 2011,[object Object]
Includes:data (electronic information) in email, internet, intranet, sms, voice between persons and stored records Excludes: voice between natural person and an automated voice response system,[object Object], Data Message,[object Object],© Chetty Law 2011,[object Object]
“Legal force and effect to information…referred to in a way that a reasonable person would have noticed the reference and accessible in a form in which it may be read, stored and retrieved by the other party, whether electronically or as a computer printout (able to be reduced to electronic form)”,[object Object], Incorporation By Reference,[object Object],© Chetty Law 2011,[object Object]
Rabelani dagada electronic records management   chetty law 2011
Radicati Group Email Statistics Report 2010, the average corporate user sends and receives 110 e-mail messages daily. http://www.radicati.com/wp/wp-content/uploads/2010/04/Email-Statistics-Report-2010-2014-Executive-Summary2.pdf,[object Object], Only e-mails…,[object Object],© Chetty Law 2011,[object Object]
All sources of records!,[object Object]
A record is defined in the ECT Act, as “recorded information regardless of form or medium” Can include e-mails, sms’s and instant message logs,[object Object], What is a record? ,[object Object],© Chetty Law 2011,[object Object]
“if any other law requires the retention of documents or records, such documents and records may be retained in electronic format, subject to certain conditions”ECT sets out requirements for electronic records retention:information is accessible for subsequent reference- is in format generated, sent or received or format that accurately represents information- origin and destination of data message and date & time it was sent or received can be determined,[object Object], Section 16,[object Object],© Chetty Law 2011,[object Object]
ExceptionsAgreements:Alienation of LandLong term property lease Execution:Will or CodicilBill of Exchange,[object Object],© Chetty Law 2011,[object Object]
Electronic evidence must not be denied admissibility (a) on grounds that it is in electronic format or (b) if it is best evidence.Must be given due evidential weight.,[object Object], Section 15,[object Object],© Chetty Law 2011,[object Object]
To qualify as an original, Integrity must be maintained:- Complete, unaltered, except for endorsement or change in normal course of communication, storage or display.- Must pass assessment.Capable of being displayed or produced to person to whom it is presented..,[object Object], Original ito Section 14,[object Object],© Chetty Law 2011,[object Object]
Assessed in terms of:- reliability of the manner in which it was generated, stored or communicated & manner in which integrity was maintained- manner in which originator was identified- any other relevant factor.(Course of business) Data message certified be to correct by an officer in service of company will be admissible as evidence. ,[object Object], Evidential Weight,[object Object],© Chetty Law 2011,[object Object]
Where law prescribes a signature, must use advanced signatures, other cases consensus between parties is sought (includes “click-wrap” and “browse-wrap” agreements).,[object Object], Signatures ,[object Object],s13,[object Object],© Chetty Law 2010,[object Object]
Electronic Signaturevs.Advanced Electronic Signature,[object Object], Signatures ,[object Object],s13,[object Object],© Chetty Law 2011,[object Object]
The Electronic Evidence Issue Paper  ,[object Object],© Chetty Law 2011,[object Object]
Judge HCJ Flemming (1996): Video Conferencing?Letter to Minister of Justice (1997): Telecommunication Technology in TrialsLaw Reform Commission (1997): Investigation  Recommendation: use of “audio-visual links” – e.g. leave to appealProject 113 – Project 126Facilitate a focused debateAllow stakeholders opportunity to raise relevant matters,[object Object],Rationale for Issue Paper,[object Object],© Chetty Law 2011,[object Object]
Rapid developments in technologyAnonymity, Abundance, AssumptionsMultiple sources and formats,Ease of manipulationObsolescenceReading dataMetadataECT Act PresumptionsInteraction with rule against hearsay,[object Object],Rationale for Issue Paper,[object Object],© Chetty Law 2011,[object Object]
-Legal Issue of indirect evidence, challenges for cross-examination,[object Object],-Level of reliance that can be placed on such evidence,[object Object]
The Promotion of Access to Information Act (PAIA)  ,[object Object],© Chetty Law 2011,[object Object]
Promotion of Access to Information Act/ Intention “PAIA gives effect to the constitutional right of access to any information held by the State and any information by another person that is required for the exercise or protection of any rights”,[object Object],© Chetty Law 2011,[object Object]
Promotion of Access to Information Act/ Non Disclosure “Where the information requested relates to certain confidential information of a third party: IO must refuse the request for access to information, if the disclosure thereof would amount to a breach of a duty of confidence owed to the third party in terms of an agreement”,[object Object],© Chetty Law 2011,[object Object]
Head of private body must compile & keep updated a manual containing:Address, phone, fax and emailGuide to request recordsCategories of recordsDescription of recordsDetail to facilitate a requestSubjects and categories of records,[object Object]
What needs to be done?Head of private body must compile & keep updated a manual containing:Address, phone, fax and emailGuide to request recordsCategories of recordsDescription of recordsHow to requestCosts of requestSubjects and categories of records,[object Object],© Chetty Law 2011,[object Object]
Protection of Personal Information Bill,[object Object],© Chetty Law 2011,[object Object]
Purpose“To protect the privacy with regard to the processing of personal information; and balance the right to privacy against other rights such as the right of access to information.” ,[object Object],© Chetty Law 2011,[object Object]
Data Subject “data subject” = the person to whom personal information relates ,[object Object],© Chetty Law 2011,[object Object]
Personal Information Information relating to an identifiable, living, natural person & where it’s applicable, an identifiable, existing juristic person, including but not limited to: *Race, gender, sex, pregnancy, marital status,national, ethnic or social origin, colour, sexual orientation, age, physical or mental health, well-being, disability, religion, conscience, belief, culture, language and birth of the person;* Education or the medical, financial, criminal or employment history of the person;* Any identifying number, symbol, e-mail address, physical address, telephone number or other particular assignment to the person;* The blood type or any other biometric information of the person; ,[object Object],© Chetty Law 2011,[object Object]
	* The personal opinions, views or preferences of the person;* Correspondence sent by the person that is implicitly or explicitly of a private	or confidential nature or further correspondence that would reveal the contents of the original correspondence;* The views or opinions of another individual about the person; and* The name of the person if it appears with other personal information relating to the person or if the disclosure of the name itself would reveal informationabout the person; ,[object Object],© Chetty Law 2011,[object Object]
Processing Any operation or activity or any set of operations, whether or not by automatic means, concerning personal information, including:-(a) the collection, receipt, recording, organisation, collation, storage, updating or modification, retrieval, alteration, consultation, use; (b) dissemination by means of transmission, distribution or making available in any other form; or(c) merging, linking, as well as blocking, degradation, erasure or destruction of information ,[object Object],© Chetty Law 2011,[object Object]
The 8 PrinciplesPrinciples of Processing (1) Accountability(2) Processing Limitation(3) Purpose Specification (Specific, Defined, Deletion, Retention) (4) Further Processing Limitation (compatibility) (5) Information Quality(6) Openness(7) Security Safeguards(8) Data Subject Participation,[object Object],© Chetty Law 2011,[object Object]
	Trans-border FlowNot Transfer to 3rd party in foreign country unless recipient subject to law, code, contract which upholds principles substantially similar to principles in Act and includes provisions similar to section relating to further transferconsent transfer necessary for contract performance (DS & RP)transfer is for benefit of DS and not reasonably practicable to obtain consent to transfer / DS would have consented if reasonably practicable,[object Object],© Chetty Law 2011,[object Object]
         And let’s hand over to Katherine….,[object Object]
Electronic Discovery  ,[object Object],© Chetty Law 2011,[object Object]
What is E-Discovery?“Parties to litigation have the right to receive copies of the “records” to be used as evidence during the litigation process.Failure to provide such “records” results in the inadmissibility of such records as evidence”,[object Object],© Chetty Law 2011,[object Object]
E-Discovery Challenges“includes email messages (including backups and deleted messages), instant messages (IM), web site information whether in text, graphic or audio format, log files, voicemail messages and logs, data files (documents, spreadsheets, database files, etc.), program files, cache files, cookies”,[object Object],© Chetty Law 2011,[object Object]
Responding to requests has become more complex,[object Object],Need to pull Data from voicemail, email, sms, instant messaging ,[object Object],Still no Policies for preservation of electronic evidence,[object Object],Significant risk ,[object Object],http://www.law.com/jsp/legaltechnology/pubArticleLT.jsp?id=1202426600692,[object Object]
Coleman vs. Morgan Stanley“Morgan Stanley & Co. Inc. has agreed to pay a $15 million civil fine to settle federal regulators' charges that it repeatedly failed to provide tens of thousands of e-mails that they sought in major investigations over several years”Numerous misstatements about practices,[object Object],© Chetty Law 2011,[object Object]
Zubulake vs. UBS Warburg“A $29 million verdict was returned against UBS because the company had destroyed email messages that were demanded as evidence in the case”,[object Object],© Chetty Law 2011,[object Object]
Arndt vs. First Union Banks“Evidence has been received that tends to show that certain profit and loss statements and E-mails were in the exclusive possession of the defendant, First Union; and, [sic] have not been produced for inspection, by the plaintiff or his counsel, even though defendant, First Union, was aware of the plaintiff's claim. From this, you may infer, though you are not compelled to do so, that the profit and loss statements and the E-mails would be damaging to the defendant”,[object Object],© Chetty Law 2011,[object Object]
Edgars Consolidated Stores Limited (EDCON) v CCMA Ms A, an employee of Edgars, received an email from another Edgars employee. The email had racist connotations. Ms A did not consider the email as offensive– in fact she thought it was funny – and she in turn forwarded the email to family members and friends, none of whom were employed by Edgars.“used the Company’s electronic mail to transmit offensive mail internally and externally, thereby causing harm to the Company’s reputation” ,[object Object],© Chetty Law 2011,[object Object]
SIHLALI, MAFIKA v SABC Resignation/Firing by SMS?Contract of Employment with SABC, sent sms to Chairman of the Board resigning.Resignation accepted, tried to go back but Court said no. © Chetty Law 2011,[object Object]
Companies Act 71 of 2008  ,[object Object],© Chetty Law 2011,[object Object]
“electronic communication’’ has the meaning set out in section 1 of the Electronic Communications and Transactions Act“present at a meeting’’ means to be present in person, or able to participate in the meeting by electronic communication, or to be represented by a proxy who ispresent in person or able to participate in the meeting by electronic communication”,[object Object],Companies Act / Definitions,[object Object],© Chetty Law 2011,[object Object]
“An unaltered electronically or mechanically generated reproduction of any document, other than a share certificate, may be substituted for the original for anypurpose for which the original could be used ito the ActIf, in terms of this Act, a notice is required or permitted to be given or published to any person, it is sufficient if the notice is transmitted electronically directly to that person in a manner and form such that the notice can conveniently be printed by the recipient within a reasonable time and at a reasonable cost”,[object Object],Companies Act / E-Documents,[object Object],© Chetty Law 2011,[object Object]
National Archive and Record Services (NARS) Act  ,[object Object],© Chetty Law 2011,[object Object]
Act requires the retention of records for reasons including the preservation of the social memory of the organisation. While the National Archives Act impacts mainly public institutions, it would also impact the records practices of companies to whom public institutions outsource certain services. Records are needed to serve as evidence that the functions of the entity have been fulfilled, required for management, accountability, operational continuity, legal evidence and disaster recovery, part of the organisations memory and cultural heritage and may be intrinsically linked to the rights of citizens.,[object Object],NARS,[object Object],© Chetty Law 2011,[object Object]
King III Code  ,[object Object],© Chetty Law 2011,[object Object]
Rabelani dagada electronic records management   chetty law 2011
Rabelani dagada electronic records management   chetty law 2011
Associated Policies  ,[object Object],© Chetty Law 2011,[object Object]
 - Establish guidelines & responsibilities for use- Avoid risk- Achieve compliance- Accountability ,[object Object],Why do you need policies?,[object Object],© Chetty Law 2011,[object Object]
[object Object]
Password protected but not encrypted
Postedhttp://www.dofonline.co.uk,[object Object]
[object Object]
Memory stick encrypted with password on sticky note
Memory stick with government information -	subcontractor,[object Object],http://www.bbc.co.uk,[object Object]
[object Object]
Bank customers	Account details, signatures, contact details, family details ,[object Object],http://www.bbc.co.uk,[object Object]
Electronic Communications Policy pertaining to acceptable and unacceptable use of the electronic communications facilities of the company; Interception and Monitoring Policy that specifies the circumstances under which the company shall intercept and/or monitor personnel communications; the procedures to the be followed by the company in compliance with RICA; and limitations placed on the manner in which the records emanating from such interception or monitoring shall be used; ,[object Object],Typical Electronic Records Policies,[object Object],© Chetty Law 2011,[object Object]
 Electronic Records Management Policies pertaining to the proper storage and management of electronic records; the treatment of email records and website records; the mandatory and specific metadata to be retained in respect of electronic records; Disaster Recovery and Business Continuity Strategies, Statements and Policies that specify the steps taken by the company internally and by technology providers to ensure the availability of electronic records systems and electronic records and the procedures for recovery to business interruptions;,[object Object],Typical Electronic Records Policies,[object Object],© Chetty Law 2011,[object Object]
 Records Retention Schedules that specify the retention period and the appropriate date for destruction for electronic records including email records; E-mail Management Policies that provide more detailed and contextualised information on e-mail and e-mail records management specifically,[object Object],Typical Electronic Records Policies,[object Object],© Chetty Law 2011,[object Object]
Case Study 1  ,[object Object],© Chetty Law 2011,[object Object]
Rabelani dagada electronic records management   chetty law 2011
Rabelani dagada electronic records management   chetty law 2011
Rabelani dagada electronic records management   chetty law 2011
Rabelani dagada electronic records management   chetty law 2011
Rabelani dagada electronic records management   chetty law 2011
SA Records Retention Periods Example,[object Object]
Case Study 2  ,[object Object],© Chetty Law 2010,[object Object]
Write ,[object Object],© Chetty Law 2011,[object Object]
Basic Health-Check -Official Records created, captured upon creation or receipt in appropriate records management system-Access managed - policies and procedures-Found on demand and reliable as evidence-Managed and planned strategically- Employees and personnel are trained- Reporting and accountability- Policies and procedures are updated ,[object Object],© Chetty Law 2011,[object Object]
http://www.lib.az.us/records/GuidanceAndRelatedResources/21st_century_rm_checklist.pdf,[object Object]
http://www.lib.az.us/records/GuidanceAndRelatedResources/21st_century_rm_checklist.pdf,[object Object]

Más contenido relacionado

La actualidad más candente

Records retention shrm
Records retention shrmRecords retention shrm
Records retention shrmcinderella1961
 
E. Bryan - Governance and Records Management
E. Bryan - Governance and Records ManagementE. Bryan - Governance and Records Management
E. Bryan - Governance and Records ManagementEmerson Bryan
 
E. Bryan - An Introduction To Records Management [Barbados Community College]
E. Bryan  - An Introduction To Records Management [Barbados Community College]E. Bryan  - An Introduction To Records Management [Barbados Community College]
E. Bryan - An Introduction To Records Management [Barbados Community College]Emerson Bryan
 
Why records management is important
Why records management is importantWhy records management is important
Why records management is importantOMWOMA JACKSON
 
A Survey of Security and Forensic Features In Popular eDiscovery Software Suites
A Survey of Security and Forensic Features In Popular eDiscovery Software SuitesA Survey of Security and Forensic Features In Popular eDiscovery Software Suites
A Survey of Security and Forensic Features In Popular eDiscovery Software SuitesCSCJournals
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records tooBob Larrivee
 
Basics of records management
Basics of records managementBasics of records management
Basics of records managementRussell James
 
Book 3 chap-8
Book 3 chap-8Book 3 chap-8
Book 3 chap-8GTU
 
Chap 8
Chap 8Chap 8
Chap 8GTU
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...Cengage Learning
 
The principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - ukThe principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - uk- Mark - Fullbright
 
E discovery mallareddy 20160213
E discovery mallareddy 20160213E discovery mallareddy 20160213
E discovery mallareddy 20160213nullowaspmumbai
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Andrew Sharpe
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11mrmwood
 
What is Electronic Records Management?
What is Electronic Records Management?What is Electronic Records Management?
What is Electronic Records Management?Atle Skjekkeland
 

La actualidad más candente (20)

Records retention shrm
Records retention shrmRecords retention shrm
Records retention shrm
 
AERM Workshop
AERM WorkshopAERM Workshop
AERM Workshop
 
E. Bryan - Governance and Records Management
E. Bryan - Governance and Records ManagementE. Bryan - Governance and Records Management
E. Bryan - Governance and Records Management
 
E. Bryan - An Introduction To Records Management [Barbados Community College]
E. Bryan  - An Introduction To Records Management [Barbados Community College]E. Bryan  - An Introduction To Records Management [Barbados Community College]
E. Bryan - An Introduction To Records Management [Barbados Community College]
 
INTRODUCTION TO RECORDS
INTRODUCTION TO RECORDS INTRODUCTION TO RECORDS
INTRODUCTION TO RECORDS
 
rm, 10e ch02 copy
rm, 10e ch02 copyrm, 10e ch02 copy
rm, 10e ch02 copy
 
Why records management is important
Why records management is importantWhy records management is important
Why records management is important
 
A Survey of Security and Forensic Features In Popular eDiscovery Software Suites
A Survey of Security and Forensic Features In Popular eDiscovery Software SuitesA Survey of Security and Forensic Features In Popular eDiscovery Software Suites
A Survey of Security and Forensic Features In Popular eDiscovery Software Suites
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records too
 
Basics of records management
Basics of records managementBasics of records management
Basics of records management
 
Book 3 chap-8
Book 3 chap-8Book 3 chap-8
Book 3 chap-8
 
Chap 8
Chap 8Chap 8
Chap 8
 
File And Records Management
File And Records ManagementFile And Records Management
File And Records Management
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
The principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - ukThe principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - uk
 
WhitePaper- Archiving Supports HIPAA Compliance
WhitePaper- Archiving Supports HIPAA ComplianceWhitePaper- Archiving Supports HIPAA Compliance
WhitePaper- Archiving Supports HIPAA Compliance
 
E discovery mallareddy 20160213
E discovery mallareddy 20160213E discovery mallareddy 20160213
E discovery mallareddy 20160213
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
What is Electronic Records Management?
What is Electronic Records Management?What is Electronic Records Management?
What is Electronic Records Management?
 

Similar a Rabelani dagada electronic records management chetty law 2011

Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...Jamil Salem
 
What You Need To Know About Privacy Now!
What You Need To Know About Privacy   Now!What You Need To Know About Privacy   Now!
What You Need To Know About Privacy Now!catherinecoulter
 
What You Need To Know About Privacy Now!
What You Need To Know About Privacy   Now!What You Need To Know About Privacy   Now!
What You Need To Know About Privacy Now!catherinecoulter
 
The Privacy Of The Patriot Act
The Privacy Of The Patriot ActThe Privacy Of The Patriot Act
The Privacy Of The Patriot ActVickie Western
 
Legal aspects of data gathering and information exchange
Legal aspects of data gathering and information exchangeLegal aspects of data gathering and information exchange
Legal aspects of data gathering and information exchangeStevenSegaert
 
The Purpose Of Data Protection Act
The Purpose Of Data Protection ActThe Purpose Of Data Protection Act
The Purpose Of Data Protection ActRebecca Diamond
 
Right to information act, 2005
Right to information act, 2005Right to information act, 2005
Right to information act, 2005Altacit Global
 
NEW DECREE ON PERSONAL DATA PROTECTION AND CROSS-BORDER PROVISION OF DATA THE...
NEW DECREE ON PERSONAL DATA PROTECTION AND CROSS-BORDER PROVISION OF DATA THE...NEW DECREE ON PERSONAL DATA PROTECTION AND CROSS-BORDER PROVISION OF DATA THE...
NEW DECREE ON PERSONAL DATA PROTECTION AND CROSS-BORDER PROVISION OF DATA THE...Dr. Oliver Massmann
 
Data Privacy Act in the Philippines
Data Privacy Act in the PhilippinesData Privacy Act in the Philippines
Data Privacy Act in the PhilippinesShirley Ingles-Cruz
 
Ten Laws Internet Businesses Should Consider Part II
Ten Laws Internet Businesses Should Consider Part IITen Laws Internet Businesses Should Consider Part II
Ten Laws Internet Businesses Should Consider Part IIRyan K. Hew
 
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...Dr. Oliver Massmann
 
Information Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal ContextInformation Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal ContextJason Nathu
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commercePalavesa Krishnan
 
The Data Protection Act, 1998 Essay
The Data Protection Act, 1998 EssayThe Data Protection Act, 1998 Essay
The Data Protection Act, 1998 EssayAngela Gibbs
 
Update on Laws and Practices 2020
Update on Laws and Practices 2020Update on Laws and Practices 2020
Update on Laws and Practices 2020LawPlus Ltd.
 
Hitech Act – Privacy And Security
Hitech Act – Privacy And SecurityHitech Act – Privacy And Security
Hitech Act – Privacy And SecurityHaley Johnson
 
41 rti-sali.feature
41 rti-sali.feature41 rti-sali.feature
41 rti-sali.featureDivya Gigy
 

Similar a Rabelani dagada electronic records management chetty law 2011 (20)

Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
 
What You Need To Know About Privacy Now!
What You Need To Know About Privacy   Now!What You Need To Know About Privacy   Now!
What You Need To Know About Privacy Now!
 
What You Need To Know About Privacy Now!
What You Need To Know About Privacy   Now!What You Need To Know About Privacy   Now!
What You Need To Know About Privacy Now!
 
The Privacy Of The Patriot Act
The Privacy Of The Patriot ActThe Privacy Of The Patriot Act
The Privacy Of The Patriot Act
 
Right To Information Act, 2005.
Right To Information Act, 2005.Right To Information Act, 2005.
Right To Information Act, 2005.
 
Legal aspects of data gathering and information exchange
Legal aspects of data gathering and information exchangeLegal aspects of data gathering and information exchange
Legal aspects of data gathering and information exchange
 
The Purpose Of Data Protection Act
The Purpose Of Data Protection ActThe Purpose Of Data Protection Act
The Purpose Of Data Protection Act
 
Right to information act, 2005
Right to information act, 2005Right to information act, 2005
Right to information act, 2005
 
NEW DECREE ON PERSONAL DATA PROTECTION AND CROSS-BORDER PROVISION OF DATA THE...
NEW DECREE ON PERSONAL DATA PROTECTION AND CROSS-BORDER PROVISION OF DATA THE...NEW DECREE ON PERSONAL DATA PROTECTION AND CROSS-BORDER PROVISION OF DATA THE...
NEW DECREE ON PERSONAL DATA PROTECTION AND CROSS-BORDER PROVISION OF DATA THE...
 
Data Privacy Act in the Philippines
Data Privacy Act in the PhilippinesData Privacy Act in the Philippines
Data Privacy Act in the Philippines
 
Compliance & Value of Digital Signatures
Compliance & Value of Digital SignaturesCompliance & Value of Digital Signatures
Compliance & Value of Digital Signatures
 
Ten Laws Internet Businesses Should Consider Part II
Ten Laws Internet Businesses Should Consider Part IITen Laws Internet Businesses Should Consider Part II
Ten Laws Internet Businesses Should Consider Part II
 
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
 
Information Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal ContextInformation Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal Context
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commerce
 
The Data Protection Act, 1998 Essay
The Data Protection Act, 1998 EssayThe Data Protection Act, 1998 Essay
The Data Protection Act, 1998 Essay
 
Update on Laws and Practices 2020
Update on Laws and Practices 2020Update on Laws and Practices 2020
Update on Laws and Practices 2020
 
Hitech Act – Privacy And Security
Hitech Act – Privacy And SecurityHitech Act – Privacy And Security
Hitech Act – Privacy And Security
 
20eumt047_ipr.pptx
20eumt047_ipr.pptx20eumt047_ipr.pptx
20eumt047_ipr.pptx
 
41 rti-sali.feature
41 rti-sali.feature41 rti-sali.feature
41 rti-sali.feature
 

Más de Rabelani Dagada

Rabelani dagada economical waves presentation
Rabelani dagada economical waves presentationRabelani dagada economical waves presentation
Rabelani dagada economical waves presentationRabelani Dagada
 
Rabelani dagada bizpref erp factors
Rabelani dagada bizpref erp factorsRabelani dagada bizpref erp factors
Rabelani dagada bizpref erp factorsRabelani Dagada
 
The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...Rabelani Dagada
 
Time, space and pace book launch presentation final
Time, space and pace book launch presentation finalTime, space and pace book launch presentation final
Time, space and pace book launch presentation finalRabelani Dagada
 
E learning research turning words into action
E learning research turning words into actionE learning research turning words into action
E learning research turning words into actionRabelani Dagada
 

Más de Rabelani Dagada (10)

Rabelani dagada economical waves presentation
Rabelani dagada economical waves presentationRabelani dagada economical waves presentation
Rabelani dagada economical waves presentation
 
Rabelani dagada bizpref erp factors
Rabelani dagada bizpref erp factorsRabelani dagada bizpref erp factors
Rabelani dagada bizpref erp factors
 
Rabelani dagada wbs erp
Rabelani dagada wbs erpRabelani dagada wbs erp
Rabelani dagada wbs erp
 
Domestication edit
Domestication editDomestication edit
Domestication edit
 
The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...
 
Note of thanks_02
Note of thanks_02Note of thanks_02
Note of thanks_02
 
Dagada programmefinal
Dagada programmefinalDagada programmefinal
Dagada programmefinal
 
Dagada invitation2
Dagada invitation2Dagada invitation2
Dagada invitation2
 
Time, space and pace book launch presentation final
Time, space and pace book launch presentation finalTime, space and pace book launch presentation final
Time, space and pace book launch presentation final
 
E learning research turning words into action
E learning research turning words into actionE learning research turning words into action
E learning research turning words into action
 

Último

UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 

Último (20)

UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 

Rabelani dagada electronic records management chetty law 2011

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 7.
  • 10.
  • 11.
  • 12.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 59.
  • 60.
  • 61.
  • 62. Password protected but not encrypted
  • 63.
  • 64.
  • 65. Memory stick encrypted with password on sticky note
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.

Notas del editor

  1. Read.
  2. It is what allows us to do internet banking, online shopping and contract via email. Without it none of these things would be possible. It puts minimum security measures in place for online banking, it governs returning of goods bought online and also deals with websites & ISP’s.
  3. Section 11 is one of the most important provisions in our minds. Read Out. So what it is saying is that everything you could do on paper is now valid if it’s done electronically. With some exceptions, like wills & deeds for the sale of property which still have to done on paper to be valid. You might be wondering what classifies as a data message.
  4. Thank you. Any questions.