Protection of Personal Information Policy (POPI)

Objective

The objective of this policy is to protect the information assets of Insurance Institute Northern Gauteng (IING) and its associated companies  against  threats,  be  it  internal  or  external,  whether  with  intent  or  accidental.  This is necessary to ensure business continuation, curbing of losses and maximising of business opportunities.

This policy sets the standard for suitable protection of personal information in IING. It provides the principles regarding the right for individuals to privacy and reasonable protection of personal information.

Scope

The policy is applicable to IING, Associated Service Providers, their sole owners, key persons, representatives and other personnel in IING. The sole owners, key personnel and management of IING are eventually responsible for proper control of information security.

IING’s Information Control Officer

The responsibilities of IING Information Officer are as follows:

  • the development and updating of this policy;
  • ensuring that this policy is supported with applicable documentation and procedural instructions;
  • assuring that documentation is relevant and kept up to date;
  • communicating the content of the policy, and consequential updating, to the relevant managers, representatives, personnel and associates concerned.

The sole owners, key personnel, representatives and personnel of IING are obliged to comply with the provisions of this policy. Any deviations from this policy or breach thereof or incidents that may relate to such a possibility, must be reported to the Information Officer.

External individuals, involved in information technology under contract to IING, will be subjected to the same information security policy as applicable to IING. A separate contract will have to be signed confirming commitment to the policy and will include assurance that security measures are in place when personal information is processed.

Core Principles

The sole owners, key personnel, representatives as well as personnel of IING are committed to the following principles:

  • IING will always maintain and develop reasonable protective measures against risks such as loss,  unauthorised   access,  destruction,  use,  alteration  or   revelation   of  personal information.
  • IING will at all times comply with restrictions and other requirements applicable to the international transfer of information.

IING upholds the requirements of the legislation on POPI and maintains an approach of transparency of operational procedures that control collection and processing of personal information.

  • IING is committed to comply with all applicable regulatory requirements related to the collection and processing of personal information.
  • IING undertakes to collect personal information in a legal and reasonable way and to process the personal information obtained from clients only for the purpose for which it was obtained in the first place.
  • Processing of personal information obtained from clients will not be undertaken in an insensitive or wrongful way that can intrude on the privacy of the client.
  • IING undertakes not to request or process information related to race, religion, medical situation, political preference, trade union membership, sexual certitude or criminal record. IINGwill also not process information of juveniles.
  • IING will ensure that correct and sufficient information is on record of its clients. Non relevant information will be removed. Only the latest information related to the training process will be recorded.
  • Information will be directly obtained from the client.
  • IING also undertakes not to provide any documentation to a third party or service provider without the consent of the client except where it is necessary for the proper execution of the service as expected by the client, in compliance with the education provided, with the proviso that IING will at all times ensure that the third party also complies with the stipulations and requirements of the POPI legislation as well as when documents are requested by institutions as prescribed by law.
  • IING is compelled to keep effective record of personal information and undertakes not to keep information for a period longer than that prescribed by the relevant educational legislation. Information will be destroyed at the end of the prescribed period in such a way that it cannot be reconstructed.
  • IING will provide the necessary security of data and keep it in accordance with prescribed legislation.
  • Should information be lost, that is not under the control of IING anymore, it will immediately be brought to the attention of the client and the regulator.
  • In the event of data loss, the client will receive sufficient information to restrict possible risk that may result from the loss.
  • Clients may at all times inquire about information kept and may also request the removal or destruction of information which is not relevant anymore.
  • IING will ensure that all service providers and other role players involved, comply with the expectations of the POPI legislation of 2013.
  • The management  of  IING  give  the  assurance  that  representatives  and  staff understand the requirements and expectations of the act and comply with the content thereof and that training will take place on an ongoing basis.
  • IING’s policy regarding private information will continuously be updated to comply with legislation, thereby ensuring that personal information will be secure.

Monitoring

The management as well as the information officer of IING, are responsible for the implementation, administration and supervision of this policy. This function includes the provision of supporting guidelines, standardised operational procedures, notices, applicable documents and processes.

The sole owner, key personnel, representatives and staff of IING will be trained to be conversant with their functions regarding the regulatory requirements, policy and guidelines related to the protection and control of personal information. The staff and volunteers of IING will undertake periodic revision and auditing to ensure compliance with the policy, guidelines and the application of the principle of privacy of information.

 Operational controls

IING will implement suitable operational controls to ensure privacy of information in compliance with this policy and the regulatory requirements. These control measures will comprise of:

  • allocation of responsibilities for information security;
  • incident reporting and management;
  • user ID inclusion or removal;
  • information security training and education;
  • data backup.

Implementation

This policy is implemented by the Management, volunteers and staff of IING. All stakeholders namely shareholders, directors, key personnel, representatives and staff of IING as well as the volunteers assigned with the duty to collect and process personal information, must comply with the requirements of the policy.

Non-compliance to this policy will lead to disciplinary action such as a possible change of mandate or dismissal.

IMPLEMENTATION CHECKLIST

Companies can assess the amount of preparation needed to ready themselves for the implementation of the Protection of Personal Information Bill (“POPI”) by considering the following minimum requirements:

  1. Audit the  processes  used  to  collect,  record,  store,  disseminate  and  destroy  personal information:  in  particular,  companies  must  ensure  the  integrity  and  safekeeping  of personal information in their possession or under their control. They must take steps to prevent the information being lost or damaged, or unlawfully accessed.    
  2. Define the purpose of the information gathering and processing: personal information must be collected for a specific, explicitly defined and lawful purpose that is related to a function or activity of the company concerned.
  3. Limit the processing parameters: the processing must be lawful and personal information may only be processed if it is adequate, relevant and not excessive given the purpose for which it is processed.
  4. Take steps  to  notify  the  ‘data  subject’:  the  individual  whose  information  is  being processed has the right to know this is being done and why. The data subject must be told the name and address of the company processing their information. In addition, he or she must  be  informed  as  to  whether  the  provision  of  the  information  is  voluntary  or mandatory.  
  5. Check the rationale for any further processing: if information is received via a third party for further processing, this further processing must be compatible with the purpose for which the data was initially collected.
  6. Ensure information quality: the company processing the information must make sure the information is complete, accurate, up to date and not misleading.
  7. Notify the information Protection Regulator: when the POPI is enacted and a Regulator established, organisations  processing  personal  information  will  have  to  notify  the Regulator about their actions. 
  8. Accommodate data subject requests: the POPI allows data subjects to make certain requests, free of charge, to organisations holding their personal information. For instance, the data subject has the right to know the identity of all third parties that have had access to their  information.  A  data  subject  can  also  ask  for  a  record  of  the  information concerned.   
  9. Retain records for required periods: personal information must be destroyed, deleted or ‘de-identified’ as soon as the purpose for collecting the information has been achieved. However, a record of the information must be retained if an organisation has used it to make a decision about the data subject. The record must be kept for a period long enough for the data subject to request access to it.
  10. Cross border data transfer: there are restrictions on the sending of personal information out of South Africa as well as on the transfer of personal information back into South Africa. The applicable restrictions will depend on the laws of the country to whom the data is transferred or from where the data is returned, as the case may be.

04 July 2020