SlideShare a Scribd company logo
1 of 17
Put Your Left Leg In,
Take Your Left Leg Out:
     The exclusions and
      exemptions of the
  Protection of Personal
        Information Bill
              explained



               Neil Kirby
PROTECTION OF PERSONAL INFORMATION BILL

1. Objects & purpose
   -    constitutional right to privacy
   -    processing regulation
   -    rights & remedies to protection personal information
   -    voluntary & compulsory measures to enforce rights
2. Section 14
        “Everyone has the right to privacy, which includes the right not
        to have –
        (a)      their person or home searched;
        (b)      their property searched;
        (c)      their possessions seized; or
        (d)      the privacy of their communications infringed.”
3. But also sections 7, 10, 12(2), 15(1), 19 and 21 of the Constitution.
CONSTITUTIONAL PREROGATIVES



“As a general rule any person is likely to feel violated,
  harmed and invaded by the publication of unlawfully
  obtained information. Any reasonable person would
  probably feel less concerned if his discussion of an
  upcoming metropolitan council election, or the state of
  the global economy, were unlawfully intercepted and
  subsequently published, than if his discussion of
  intensely private matters such as family disputes or
  medical records were illegally intercepted and published
  for a larger audience. Similarly, on the public
  interest side of the equation, the public will
  certainly be interested and accordingly benefit
  from discussion of matters which are clearly in
  the public interest.”
 See Tshabalala-Msimang and Another v Makhanya and Others 2008 (6)
                                        SA 102 (W) at paragraph 35
“PUBLIC INTEREST”



“Public interest, it must be noted, is a mysterious concept,
  like a battered piece of string charged with elasticity,
  impossible to measure or weigh. The concept
  changes with the dawn of each new day,
  tempered by the facts of each case. Public interest
  will naturally depend on the nature of the information
  conveyed and on the situation of the parties involved.
  Public interest is central to policy debates, politics and
  democracy. While it is generally acclaimed that
  promoting the common wellbeing or general welfare is
  constructive, there is little, if any, consensus on what
  exactly constitutes the public interest.”
                   See Tshabalala-Msimang decision at paragraph 36
RIGHT HOW?



“The public has the right to be informed of current news
  and events concerning the lives of public persons such
  as politicians and public officials. This right has been
  given express recognition in section 16(1)(a) and (2) of
  the Constitution, which protects the freedom of the
  press and other media and the freedom to receive and
  impart information and ideas. The public has the right
  to be informed not only on matters which have a direct
  effect on life, such as legislative enactments and
  financial policy. This right may in appropriate
  circumstances extend to information about public
  figures.”
                  See Tshabalala-Msimang decision at paragraph 37
REALLY?!


“This is a case where the need for the truth is in fact
   overwhelming. Indeed in this matter the personality involved,
   as well as her status, establishes her newsworthiness. Here,
   we are dealing with a person who enjoys a very high position
   in the eye of the public and it is the very same public that
   craves attention in respect of the information that is in the
   hands of the Sunday Times. The overwhelming public
   interest points in the direction of informing the public about
   the contents incorporated in the medical records in relation to
   the first applicant, albeit that the medical records may have
   been unlawfully obtained. In these circumstances I am
   unable to accede to the requests of the applicants with regard
   to paragraphs 3 and 7 of their notice of motion which in effect
   would impose a form of censorship in relation to any future
   publication around the medical record.
                     See Tshabalala-Msimang decision at paragraph 49
“THE PRIVACY DEBATE”



“However this story does go to show that the privacy
  debate around the smartphone is entering the
  mainstream consciousness, and that’s something
  Facebook, and the rest, will have to deal with.
  Especially in privacy-obsessed Europe.”
      M Butcher “Facebook Accused of Reading User’s Text Messages” at
 http://techcrunch.com/2012/02/26/facebook-accused-of-reading-users-
                                                     text-messages/
POPI LANDSCAPE



1. Application
2. Exemptions
3. Exclusions
4. Only 5th draft: not clear but landscape is not expected
   to change: three pronged inquiry
   • Does it apply to me and my data?
   • If so, am I or my data or both exempt?
   • If not, do I or my data or both fall into an exclusion?
APPLICATION

1. Interpretation
   • give effect to objects and purpose
   • does not prevent “exercising or performing its powers,
      duties and functions in terms of the law …” v “processing”

2. “processing personal information”
   • entered in a record
   • responsible party
   • domiciled in Republic
   • automated or non-automated means in Republic
3. Hierarchy of legislation
EXCLUSIONS I

•       Section 6
•       Also section 5: “lawful processing of personal information”; accountability, processing
        limitation, purpose specification, further processing limitation, information quality,
        openness, security safeguards, data subject participation
•

         CATEGORY               DEDICATED               INFORMATION             EXLUSION
                                SECTION                 PRINCIPLES              APPLICABLE
         Children               25(1) to 26(a) to (e)   Apply                   Yes


         Special personal       Various: 25(2) to 32    Apply                   Yes
         information

         Direct marketing       71                      Apply                   yes



    •     Exclusion test:
           o What is the information about?
           o Do I follow the principles?
           o Am I excluded by section 6?
           o Do I have a Regulator exemption for my data?
EXCLUSIONS II


• household activity
• de-identified “to the extent that [the data] cannot be re-
   identified again”
• public body involving national security, public safety
• public body for preventing crime
• “exclusively journalistic purposes” (currently subject to 5
   options)
• Cabinet and its committees
• provincial executive council
• judicial functions of a court
• Regulator exemption in terms of section 34
EXCLUSIONS III



Definitions –
1. “child”
2. “de-identify”
3. “personal information”
4. “processing”
5. “public body”
6. “re-identify”
7. “record”
EXEMPTIONS I

  • Difference: exemptions attach to categories of information and are
      particular as opposed to exclusions, which operate generally
  •
       CATEGORY                     EXCLUSION   PROCESSOR
       INFORMATION
       Children                     Yes         Consent

       Religious or philosophical   Yes         Certain institutions
       beliefs
       Race or ethnic origin        Yes         Essential purpose & BEE

       Trade union membership       Yes         Trade union


       Political opinions           Yes         Political party
EXEMPTIONS II
 CATEGORY INFORMATION           EXCLUSION   PROCESSOR

 Health or sexual life          Yes         Medical professions in confidence and
                                            insurance companies, medical aid
                                            schemes, medical aid scheme
                                            administrators, managed healthcare
                                            organisations, schools, Minister of
                                            Correctional Services, pension-related
                                            persons, Minister of Justice



 Criminal behaviour             Yes         1.   Law enforcement bodies
                                            2.   “responsible parties who process the
                                                 information for their own lawful
                                                 purposes …”(?)

 Special personal information   Yes         1.   Consent
                                            2.   Regulator exempt
                                            3.   One of categories in section 26

 DNA                            Yes         1.   Serious medical condition prevails
                                            2.   Historical, statistical or research
                                                 activity
REGULATOR

• Section 34: authorises a responsible party to process
  otherwise protected information
• Regulator must assess circumstances: any one or more of the
  following –
      “public interest” outweighs privacy; OR
      “a clear benefit” to data subject or a third party outweighs privacy
• “public interest”
      national security
      crime
      important economic or financial interest of public body
      international or national interests
      historical, statistical or research activity
• Conditions may be imposed
SO WHAT?

1. Compliance
2. Complaints
3. Investigations by Regulator: onerous
4. Search & seizure
5. Assessments in relation to compliance
6. Information notices: determine interference
7. Enforcement notice: interfered
8. Fines
THANK YOU
                                       Neil Kirby
                                      March 2012

Nothing in this presentation should be construed as formal
     legal advice from any lawyer or this firm. Readers are
advised to consult professional legal advisors for guidance
          on legislation which may affect their businesses.


  © 2011 Werksmans Incorporated trading as Werksmans
                         Attorneys. All rights reserved.

More Related Content

What's hot

Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Robert MacLean
 
Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)Jason Haislmaier
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection ActYizi
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africablogzilla
 
The Protection of Personal Information Act: A Presentation
The Protection of Personal Information Act: A PresentationThe Protection of Personal Information Act: A Presentation
The Protection of Personal Information Act: A PresentationEndcode_org
 
Protection of Personal Information
Protection of Personal InformationProtection of Personal Information
Protection of Personal InformationFrancois Naude Jr.
 
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017Jay Castillo
 
Half day public-seminar_on_pdpa_2010_-_250711
Half day public-seminar_on_pdpa_2010_-_250711Half day public-seminar_on_pdpa_2010_-_250711
Half day public-seminar_on_pdpa_2010_-_250711Quotient Consulting
 
POPI Act compliance presentation
POPI Act compliance presentationPOPI Act compliance presentation
POPI Act compliance presentationOvationsGroup
 
Personal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacyPersonal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacylegalPadmin
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...Harrison Clark Rickerbys
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4Wynthorpe
 
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...Harrison Clark Rickerbys
 
Applying the Personal Data Protection Act (Singapore)
Applying the Personal Data Protection Act (Singapore)Applying the Personal Data Protection Act (Singapore)
Applying the Personal Data Protection Act (Singapore)Benjamin Ang
 

What's hot (19)

Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)
 
Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)Crash Course on Data Privacy (December 2012)
Crash Course on Data Privacy (December 2012)
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
The Popi Act 4 of 2013 - Implications for iSCM
The Popi Act 4 of 2013 - Implications for iSCMThe Popi Act 4 of 2013 - Implications for iSCM
The Popi Act 4 of 2013 - Implications for iSCM
 
The Protection of Personal Information Act: A Presentation
The Protection of Personal Information Act: A PresentationThe Protection of Personal Information Act: A Presentation
The Protection of Personal Information Act: A Presentation
 
Protection of Personal Information
Protection of Personal InformationProtection of Personal Information
Protection of Personal Information
 
CEU DPA
CEU DPACEU DPA
CEU DPA
 
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
 
Half day public-seminar_on_pdpa_2010_-_250711
Half day public-seminar_on_pdpa_2010_-_250711Half day public-seminar_on_pdpa_2010_-_250711
Half day public-seminar_on_pdpa_2010_-_250711
 
POPI Act compliance presentation
POPI Act compliance presentationPOPI Act compliance presentation
POPI Act compliance presentation
 
Personal Data Protection in Malaysia
Personal Data Protection in MalaysiaPersonal Data Protection in Malaysia
Personal Data Protection in Malaysia
 
Personal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacyPersonal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data Privacy
 
POPI Seminar FINAL
POPI Seminar FINALPOPI Seminar FINAL
POPI Seminar FINAL
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
 
Pdpa(kewal)
Pdpa(kewal)Pdpa(kewal)
Pdpa(kewal)
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4
 
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
 
Applying the Personal Data Protection Act (Singapore)
Applying the Personal Data Protection Act (Singapore)Applying the Personal Data Protection Act (Singapore)
Applying the Personal Data Protection Act (Singapore)
 

Similar to Put your left leg in, put your left leg out: the exclusions and exemptions of the Protection of Personal Information Bill explained - Neil Kirby, Werksmans Attorneys

Privacy introduction
Privacy introduction Privacy introduction
Privacy introduction brentcarey
 
Social Media, Healthcare and the Law
Social Media, Healthcare and the LawSocial Media, Healthcare and the Law
Social Media, Healthcare and the LawBrian Ahier
 
Introduction to the Freedom of Information and Data Protection Act Trinidad a...
Introduction to the Freedom of Information and Data Protection Act Trinidad a...Introduction to the Freedom of Information and Data Protection Act Trinidad a...
Introduction to the Freedom of Information and Data Protection Act Trinidad a...EquiGov Institute
 
Freedom of Information and Data Protection
Freedom of Information and Data ProtectionFreedom of Information and Data Protection
Freedom of Information and Data ProtectionEquiGov Institute
 
Privacy learning forum broadmeadows
Privacy learning forum broadmeadowsPrivacy learning forum broadmeadows
Privacy learning forum broadmeadowsbrentcarey
 
Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)The Pathway Group
 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfJakeAldrinDegala1
 
Seminar General Data Protection Regulation
Seminar General Data Protection RegulationSeminar General Data Protection Regulation
Seminar General Data Protection RegulationAxon Lawyers
 
Privacy and missing persons
Privacy and missing personsPrivacy and missing persons
Privacy and missing personsmpcislides
 
2014-04-16 Protection of Personal Information Act Readiness Workshop
2014-04-16 Protection of Personal Information Act Readiness Workshop2014-04-16 Protection of Personal Information Act Readiness Workshop
2014-04-16 Protection of Personal Information Act Readiness WorkshopPaul Jacobson
 
Privacy presentation for regional directors july 2009
Privacy presentation for regional directors july 2009Privacy presentation for regional directors july 2009
Privacy presentation for regional directors july 2009brentcarey
 
Privacy In Emerging Technology
Privacy In Emerging TechnologyPrivacy In Emerging Technology
Privacy In Emerging Technologyorrenprunckun
 
Data Protection and Academic Research: The New GDPR Framework
Data Protection and Academic Research:  The New GDPR FrameworkData Protection and Academic Research:  The New GDPR Framework
Data Protection and Academic Research: The New GDPR FrameworkDavid Erdos
 
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104 Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104 Upekha Vandebona
 
Health Information Privacy: Asia's Viewpoint
Health Information Privacy: Asia's ViewpointHealth Information Privacy: Asia's Viewpoint
Health Information Privacy: Asia's ViewpointNawanan Theera-Ampornpunt
 

Similar to Put your left leg in, put your left leg out: the exclusions and exemptions of the Protection of Personal Information Bill explained - Neil Kirby, Werksmans Attorneys (20)

Privacy introduction
Privacy introduction Privacy introduction
Privacy introduction
 
Foia DP Presentation
Foia DP PresentationFoia DP Presentation
Foia DP Presentation
 
Social Media, Healthcare and the Law
Social Media, Healthcare and the LawSocial Media, Healthcare and the Law
Social Media, Healthcare and the Law
 
Introduction to the Freedom of Information and Data Protection Act Trinidad a...
Introduction to the Freedom of Information and Data Protection Act Trinidad a...Introduction to the Freedom of Information and Data Protection Act Trinidad a...
Introduction to the Freedom of Information and Data Protection Act Trinidad a...
 
Freedom of Information and Data Protection
Freedom of Information and Data ProtectionFreedom of Information and Data Protection
Freedom of Information and Data Protection
 
Privacy learning forum broadmeadows
Privacy learning forum broadmeadowsPrivacy learning forum broadmeadows
Privacy learning forum broadmeadows
 
Lecture 4 confidentiality, disclosure and the law.1
Lecture 4  confidentiality, disclosure and the law.1Lecture 4  confidentiality, disclosure and the law.1
Lecture 4 confidentiality, disclosure and the law.1
 
Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)
 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
 
Seminar General Data Protection Regulation
Seminar General Data Protection RegulationSeminar General Data Protection Regulation
Seminar General Data Protection Regulation
 
Presentation gdpr ahti
Presentation gdpr ahtiPresentation gdpr ahti
Presentation gdpr ahti
 
Privacy and missing persons
Privacy and missing personsPrivacy and missing persons
Privacy and missing persons
 
2014-04-16 Protection of Personal Information Act Readiness Workshop
2014-04-16 Protection of Personal Information Act Readiness Workshop2014-04-16 Protection of Personal Information Act Readiness Workshop
2014-04-16 Protection of Personal Information Act Readiness Workshop
 
Privacy presentation for regional directors july 2009
Privacy presentation for regional directors july 2009Privacy presentation for regional directors july 2009
Privacy presentation for regional directors july 2009
 
The Medicare Bill
The Medicare BillThe Medicare Bill
The Medicare Bill
 
Privacy In Emerging Technology
Privacy In Emerging TechnologyPrivacy In Emerging Technology
Privacy In Emerging Technology
 
Data Protection and Academic Research: The New GDPR Framework
Data Protection and Academic Research:  The New GDPR FrameworkData Protection and Academic Research:  The New GDPR Framework
Data Protection and Academic Research: The New GDPR Framework
 
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104 Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
 
G0953643
G0953643G0953643
G0953643
 
Health Information Privacy: Asia's Viewpoint
Health Information Privacy: Asia's ViewpointHealth Information Privacy: Asia's Viewpoint
Health Information Privacy: Asia's Viewpoint
 

More from Werksmans Attorneys

Reaching the summit - addressing the land question seminar
Reaching the summit - addressing the land question seminar Reaching the summit - addressing the land question seminar
Reaching the summit - addressing the land question seminar Werksmans Attorneys
 
Developing sexuality and sexual health policies in the disability sector
Developing sexuality and sexual health policies in the disability sector Developing sexuality and sexual health policies in the disability sector
Developing sexuality and sexual health policies in the disability sector Werksmans Attorneys
 
Recent developments in mining legislation and case law: Director Chris Stevens
Recent developments in mining legislation and case law: Director Chris StevensRecent developments in mining legislation and case law: Director Chris Stevens
Recent developments in mining legislation and case law: Director Chris StevensWerksmans Attorneys
 
Business rescue: Saving distressed companies (Director Eric Levenstein and Se...
Business rescue: Saving distressed companies (Director Eric Levenstein and Se...Business rescue: Saving distressed companies (Director Eric Levenstein and Se...
Business rescue: Saving distressed companies (Director Eric Levenstein and Se...Werksmans Attorneys
 
Business rescue in mining: Peter van den Steen (VSquared)
Business rescue in mining: Peter van den Steen (VSquared)Business rescue in mining: Peter van den Steen (VSquared)
Business rescue in mining: Peter van den Steen (VSquared)Werksmans Attorneys
 
Environmental regulation of prospecting, exploration, mining and production: ...
Environmental regulation of prospecting, exploration, mining and production: ...Environmental regulation of prospecting, exploration, mining and production: ...
Environmental regulation of prospecting, exploration, mining and production: ...Werksmans Attorneys
 
CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...
CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...
CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...Werksmans Attorneys
 
TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:
TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:
TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:Werksmans Attorneys
 
WHEN GOOD CONSTRUCTION CONTRACTS GO BAD
WHEN GOOD CONSTRUCTION CONTRACTS GO BAD WHEN GOOD CONSTRUCTION CONTRACTS GO BAD
WHEN GOOD CONSTRUCTION CONTRACTS GO BAD Werksmans Attorneys
 
The Future of Section 197 in South Africa: Bradley Workman-Davies
The Future of Section 197 in South Africa: Bradley Workman-DaviesThe Future of Section 197 in South Africa: Bradley Workman-Davies
The Future of Section 197 in South Africa: Bradley Workman-DaviesWerksmans Attorneys
 
The Employment Equity Amendment Act: Anastasia Vatalidis
The Employment Equity Amendment Act: Anastasia VatalidisThe Employment Equity Amendment Act: Anastasia Vatalidis
The Employment Equity Amendment Act: Anastasia VatalidisWerksmans Attorneys
 
Controlling Strike Violence: Advocate Anton Myburgh SC
Controlling Strike Violence: Advocate Anton Myburgh SCControlling Strike Violence: Advocate Anton Myburgh SC
Controlling Strike Violence: Advocate Anton Myburgh SCWerksmans Attorneys
 
BBBEE Presentation Cape Town Seminar 29 August 2014
BBBEE Presentation Cape Town Seminar 29 August 2014BBBEE Presentation Cape Town Seminar 29 August 2014
BBBEE Presentation Cape Town Seminar 29 August 2014Werksmans Attorneys
 
VSquXred Business Rescue presentation
VSquXred Business Rescue presentation VSquXred Business Rescue presentation
VSquXred Business Rescue presentation Werksmans Attorneys
 
Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...Werksmans Attorneys
 
Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...Werksmans Attorneys
 
Healthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-Smidt
Healthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-SmidtHealthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-Smidt
Healthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-SmidtWerksmans Attorneys
 

More from Werksmans Attorneys (20)

Labour employment seminar 2016
Labour  employment seminar 2016Labour  employment seminar 2016
Labour employment seminar 2016
 
Reaching the summit - addressing the land question seminar
Reaching the summit - addressing the land question seminar Reaching the summit - addressing the land question seminar
Reaching the summit - addressing the land question seminar
 
Collusive tendering
Collusive tenderingCollusive tendering
Collusive tendering
 
Jbcc - out with the old
Jbcc - out with the oldJbcc - out with the old
Jbcc - out with the old
 
Developing sexuality and sexual health policies in the disability sector
Developing sexuality and sexual health policies in the disability sector Developing sexuality and sexual health policies in the disability sector
Developing sexuality and sexual health policies in the disability sector
 
Recent developments in mining legislation and case law: Director Chris Stevens
Recent developments in mining legislation and case law: Director Chris StevensRecent developments in mining legislation and case law: Director Chris Stevens
Recent developments in mining legislation and case law: Director Chris Stevens
 
Business rescue: Saving distressed companies (Director Eric Levenstein and Se...
Business rescue: Saving distressed companies (Director Eric Levenstein and Se...Business rescue: Saving distressed companies (Director Eric Levenstein and Se...
Business rescue: Saving distressed companies (Director Eric Levenstein and Se...
 
Business rescue in mining: Peter van den Steen (VSquared)
Business rescue in mining: Peter van den Steen (VSquared)Business rescue in mining: Peter van den Steen (VSquared)
Business rescue in mining: Peter van den Steen (VSquared)
 
Environmental regulation of prospecting, exploration, mining and production: ...
Environmental regulation of prospecting, exploration, mining and production: ...Environmental regulation of prospecting, exploration, mining and production: ...
Environmental regulation of prospecting, exploration, mining and production: ...
 
CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...
CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...
CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...
 
TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:
TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:
TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:
 
WHEN GOOD CONSTRUCTION CONTRACTS GO BAD
WHEN GOOD CONSTRUCTION CONTRACTS GO BAD WHEN GOOD CONSTRUCTION CONTRACTS GO BAD
WHEN GOOD CONSTRUCTION CONTRACTS GO BAD
 
The Future of Section 197 in South Africa: Bradley Workman-Davies
The Future of Section 197 in South Africa: Bradley Workman-DaviesThe Future of Section 197 in South Africa: Bradley Workman-Davies
The Future of Section 197 in South Africa: Bradley Workman-Davies
 
The Employment Equity Amendment Act: Anastasia Vatalidis
The Employment Equity Amendment Act: Anastasia VatalidisThe Employment Equity Amendment Act: Anastasia Vatalidis
The Employment Equity Amendment Act: Anastasia Vatalidis
 
Controlling Strike Violence: Advocate Anton Myburgh SC
Controlling Strike Violence: Advocate Anton Myburgh SCControlling Strike Violence: Advocate Anton Myburgh SC
Controlling Strike Violence: Advocate Anton Myburgh SC
 
BBBEE Presentation Cape Town Seminar 29 August 2014
BBBEE Presentation Cape Town Seminar 29 August 2014BBBEE Presentation Cape Town Seminar 29 August 2014
BBBEE Presentation Cape Town Seminar 29 August 2014
 
VSquXred Business Rescue presentation
VSquXred Business Rescue presentation VSquXred Business Rescue presentation
VSquXred Business Rescue presentation
 
Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...
 
Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...
 
Healthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-Smidt
Healthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-SmidtHealthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-Smidt
Healthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-Smidt
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Put your left leg in, put your left leg out: the exclusions and exemptions of the Protection of Personal Information Bill explained - Neil Kirby, Werksmans Attorneys

  • 1. Put Your Left Leg In, Take Your Left Leg Out: The exclusions and exemptions of the Protection of Personal Information Bill explained Neil Kirby
  • 2. PROTECTION OF PERSONAL INFORMATION BILL 1. Objects & purpose - constitutional right to privacy - processing regulation - rights & remedies to protection personal information - voluntary & compulsory measures to enforce rights 2. Section 14 “Everyone has the right to privacy, which includes the right not to have – (a) their person or home searched; (b) their property searched; (c) their possessions seized; or (d) the privacy of their communications infringed.” 3. But also sections 7, 10, 12(2), 15(1), 19 and 21 of the Constitution.
  • 3. CONSTITUTIONAL PREROGATIVES “As a general rule any person is likely to feel violated, harmed and invaded by the publication of unlawfully obtained information. Any reasonable person would probably feel less concerned if his discussion of an upcoming metropolitan council election, or the state of the global economy, were unlawfully intercepted and subsequently published, than if his discussion of intensely private matters such as family disputes or medical records were illegally intercepted and published for a larger audience. Similarly, on the public interest side of the equation, the public will certainly be interested and accordingly benefit from discussion of matters which are clearly in the public interest.” See Tshabalala-Msimang and Another v Makhanya and Others 2008 (6) SA 102 (W) at paragraph 35
  • 4. “PUBLIC INTEREST” “Public interest, it must be noted, is a mysterious concept, like a battered piece of string charged with elasticity, impossible to measure or weigh. The concept changes with the dawn of each new day, tempered by the facts of each case. Public interest will naturally depend on the nature of the information conveyed and on the situation of the parties involved. Public interest is central to policy debates, politics and democracy. While it is generally acclaimed that promoting the common wellbeing or general welfare is constructive, there is little, if any, consensus on what exactly constitutes the public interest.” See Tshabalala-Msimang decision at paragraph 36
  • 5. RIGHT HOW? “The public has the right to be informed of current news and events concerning the lives of public persons such as politicians and public officials. This right has been given express recognition in section 16(1)(a) and (2) of the Constitution, which protects the freedom of the press and other media and the freedom to receive and impart information and ideas. The public has the right to be informed not only on matters which have a direct effect on life, such as legislative enactments and financial policy. This right may in appropriate circumstances extend to information about public figures.” See Tshabalala-Msimang decision at paragraph 37
  • 6. REALLY?! “This is a case where the need for the truth is in fact overwhelming. Indeed in this matter the personality involved, as well as her status, establishes her newsworthiness. Here, we are dealing with a person who enjoys a very high position in the eye of the public and it is the very same public that craves attention in respect of the information that is in the hands of the Sunday Times. The overwhelming public interest points in the direction of informing the public about the contents incorporated in the medical records in relation to the first applicant, albeit that the medical records may have been unlawfully obtained. In these circumstances I am unable to accede to the requests of the applicants with regard to paragraphs 3 and 7 of their notice of motion which in effect would impose a form of censorship in relation to any future publication around the medical record. See Tshabalala-Msimang decision at paragraph 49
  • 7. “THE PRIVACY DEBATE” “However this story does go to show that the privacy debate around the smartphone is entering the mainstream consciousness, and that’s something Facebook, and the rest, will have to deal with. Especially in privacy-obsessed Europe.” M Butcher “Facebook Accused of Reading User’s Text Messages” at http://techcrunch.com/2012/02/26/facebook-accused-of-reading-users- text-messages/
  • 8. POPI LANDSCAPE 1. Application 2. Exemptions 3. Exclusions 4. Only 5th draft: not clear but landscape is not expected to change: three pronged inquiry • Does it apply to me and my data? • If so, am I or my data or both exempt? • If not, do I or my data or both fall into an exclusion?
  • 9. APPLICATION 1. Interpretation • give effect to objects and purpose • does not prevent “exercising or performing its powers, duties and functions in terms of the law …” v “processing” 2. “processing personal information” • entered in a record • responsible party • domiciled in Republic • automated or non-automated means in Republic 3. Hierarchy of legislation
  • 10. EXCLUSIONS I • Section 6 • Also section 5: “lawful processing of personal information”; accountability, processing limitation, purpose specification, further processing limitation, information quality, openness, security safeguards, data subject participation • CATEGORY DEDICATED INFORMATION EXLUSION SECTION PRINCIPLES APPLICABLE Children 25(1) to 26(a) to (e) Apply Yes Special personal Various: 25(2) to 32 Apply Yes information Direct marketing 71 Apply yes • Exclusion test: o What is the information about? o Do I follow the principles? o Am I excluded by section 6? o Do I have a Regulator exemption for my data?
  • 11. EXCLUSIONS II • household activity • de-identified “to the extent that [the data] cannot be re- identified again” • public body involving national security, public safety • public body for preventing crime • “exclusively journalistic purposes” (currently subject to 5 options) • Cabinet and its committees • provincial executive council • judicial functions of a court • Regulator exemption in terms of section 34
  • 12. EXCLUSIONS III Definitions – 1. “child” 2. “de-identify” 3. “personal information” 4. “processing” 5. “public body” 6. “re-identify” 7. “record”
  • 13. EXEMPTIONS I • Difference: exemptions attach to categories of information and are particular as opposed to exclusions, which operate generally • CATEGORY EXCLUSION PROCESSOR INFORMATION Children Yes Consent Religious or philosophical Yes Certain institutions beliefs Race or ethnic origin Yes Essential purpose & BEE Trade union membership Yes Trade union Political opinions Yes Political party
  • 14. EXEMPTIONS II CATEGORY INFORMATION EXCLUSION PROCESSOR Health or sexual life Yes Medical professions in confidence and insurance companies, medical aid schemes, medical aid scheme administrators, managed healthcare organisations, schools, Minister of Correctional Services, pension-related persons, Minister of Justice Criminal behaviour Yes 1. Law enforcement bodies 2. “responsible parties who process the information for their own lawful purposes …”(?) Special personal information Yes 1. Consent 2. Regulator exempt 3. One of categories in section 26 DNA Yes 1. Serious medical condition prevails 2. Historical, statistical or research activity
  • 15. REGULATOR • Section 34: authorises a responsible party to process otherwise protected information • Regulator must assess circumstances: any one or more of the following – “public interest” outweighs privacy; OR “a clear benefit” to data subject or a third party outweighs privacy • “public interest” national security crime important economic or financial interest of public body international or national interests historical, statistical or research activity • Conditions may be imposed
  • 16. SO WHAT? 1. Compliance 2. Complaints 3. Investigations by Regulator: onerous 4. Search & seizure 5. Assessments in relation to compliance 6. Information notices: determine interference 7. Enforcement notice: interfered 8. Fines
  • 17. THANK YOU Neil Kirby March 2012 Nothing in this presentation should be construed as formal legal advice from any lawyer or this firm. Readers are advised to consult professional legal advisors for guidance on legislation which may affect their businesses. © 2011 Werksmans Incorporated trading as Werksmans Attorneys. All rights reserved.