All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "224002",
"signature": "Article:224002",
"url": "https://staging.dailymaverick.co.za/article/2019-01-28-hands-off-our-data/",
"shorturl": "https://staging.dailymaverick.co.za/article/224002",
"slug": "hands-off-our-data",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "Hands off our data!",
"firstPublished": "2019-01-28 00:10:17",
"lastUpdate": "2019-01-28 00:10:17",
"categories": [
{
"id": "29",
"name": "South Africa",
"signature": "Category:29",
"slug": "south-africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/south-africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "Daily Maverick is an independent online news publication and weekly print newspaper in South Africa.\r\n\r\nIt is known for breaking some of the defining stories of South Africa in the past decade, including the Marikana Massacre, in which the South African Police Service killed 34 miners in August 2012.\r\n\r\nIt also investigated the Gupta Leaks, which won the 2019 Global Shining Light Award.\r\n\r\nThat investigation was credited with exposing the Indian-born Gupta family and former President Jacob Zuma for their role in the systemic political corruption referred to as state capture.\r\n\r\nIn 2018, co-founder and editor-in-chief Branislav ‘Branko’ Brkic was awarded the country’s prestigious Nat Nakasa Award, recognised for initiating the investigative collaboration after receiving the hard drive that included the email tranche.\r\n\r\nIn 2021, co-founder and CEO Styli Charalambous also received the award.\r\n\r\nDaily Maverick covers the latest political and news developments in South Africa with breaking news updates, analysis, opinions and more.",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 13306,
"contents": "<p class=\"western\" align=\"LEFT\"><a href=\"https://en.wikipedia.org/wiki/Data_Privacy_Day\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Data Privacy Day</span></span></a><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\"> falls on 28 January. Its purpose is to raise awareness about privacy issues online and the importance of data protection.</span></span></span></p>\r\n<p class=\"western\" lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">How well is South Africa doing in protecting data privacy? Terribly. It is open season on people’s personal data, leading to massive data breaches, and this problem is likely to intensify. The fourth industrial revolution — which we are told we need to promote if we’re going to stay relevant as a country — is premised on the exploitation of data. The technology optimists have been allowed to dominate the debate.</span></span></p>\r\n<p class=\"western\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\">One reason why so many government and private companies have their snouts in our data, beyond what is necessary or appropriate, is that the much anticipated Information/Privacy Regulator </span></span></span><a href=\"https://www.r2k.org.za/wp-content/uploads/INQUIRY-Regarding-the-Functioning-of-the-Information-Regulator.pdf\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">does not appear to be</span></span></a><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\"> fully operational yet. Consequently, its founding law, the Protection of Personal Information Act, is not fully in force. These are urgent problems that need to be addressed.</span></span></span></p>\r\n<p class=\"western\" lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Yet, perhaps more urgent is the need for a massive public education campaign on what peoples’ data rights are. This campaign needs to be similar to that waged against the Protection of State Information Bill, which transformed freedom of information from an arcane, elitist issue, into a popular issue.</span></span></p>\r\n<p class=\"western\" lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Basic data protection principles need to become part of the national conversation, on the streets and in the media. Many people do not even know that they are generating data, much less what their rights are in relation to this data.</span></span></p>\r\n<p class=\"western\" lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">These rights and principles are as follows:</span></span></p>\r\n\r\n<ul>\r\n \t<li>\r\n<p lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Collection limitation principle — you have a right to insist that data controllers (or people who have control over your personal data) should limit the collection of personal data, which should be collected using lawful means and with your consent;</span></span></p>\r\n</li>\r\n \t<li>\r\n<p lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Data quality principle — you have a right to insist that data controllers must ensure that your data is as complete and up to date as possible, and should serve the purpose for which it was collected;</span></span></p>\r\n</li>\r\n \t<li>\r\n<p lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Purpose specification principle — you have a right to insist that when data is collected, data controllers must state the purpose for collection, and they should limit themselves to that purpose;</span></span></p>\r\n</li>\r\n \t<li>\r\n<p lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Use limitation principle — you have a right to insist that data should not be collected, or once collected, should not be used for a purpose for which it was not intended without your consent;</span></span></p>\r\n</li>\r\n \t<li>\r\n<p lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Security safeguards principle — you have a right to insist that data controllers must protect your personal information using reasonable safeguards against loss, disclosure, alteration or destruction;</span></span></p>\r\n</li>\r\n \t<li>\r\n<p lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Openness principle — you have a right to insist that data controllers should be open about the policies and practices impacting on personal data;</span></span></p>\r\n</li>\r\n \t<li>\r\n<p lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Individual participation principle — you have right to know if data is being kept about you in a reasonable time and at an affordable cost and in a format that is intelligible, and if the request is refused, you should be given reasons; and</span></span></p>\r\n</li>\r\n \t<li>\r\n<p lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Accountability principle — the data controller should be responsible for complying with these principles.</span></span></p>\r\n</li>\r\n</ul>\r\n<p class=\"western\" lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">These are rights that all of us should be aware of, and we should insist that they are respected, as South African institutions, public and private, are shockingly non-compliant. It doesn’t take much thinking to realise that these rights are being violated all the time.</span></span></p>\r\n<p class=\"western\" lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">When these institutions insist on people handing over their personal information, then people need to know that they can question why their information is being collected, how it is going to be stored and used, who is going to access it and for what purposes, and when is it going to be destroyed. Doing so is part of exercising data sovereignty or control over the data that you generate. </span></span></p>\r\n<p class=\"western\" lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">The culture of handing over information unquestioningly needs to change. This will involve a big shift in consciousness both for ordinary citizens and for data controllers.</span></span></p>\r\n<p class=\"western\" lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">There are some key data protection issues that we need to look out for in 2019. People who care about their privacy should get out in front and shape the agenda of the Information/Privacy Regulator. </span></span></p>\r\n<p class=\"western\" lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">There are likely to be important struggles around the exceptions to data protection rules. The South African Police Service and the State Security Agency may well argue that these rules don’t apply to them.</span></span></p>\r\n<p class=\"western\" lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Police and intelligence agencies around the world try to exempt themselves from data protection rules with varying degrees of success. This is in spite of the fact that these agencies are likely to violate privacy in excess of what is needed to fight crime or protecting national security, leading to abuses.</span></span></p>\r\n<p class=\"western\" lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">For instance, the growing use of intelligence-led policing and predictive policing models is seeing policing relying less on reasonable suspicion of criminality as a basis for policing work, and more on fundamental intelligence principles of prediction and forewarning. As a result, the risks of profiling politically inconvenient people, and reinforcing stereotypes about who the main criminals are in society, are high.</span></span></p>\r\n<p class=\"western\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\">Data protection exemptions risk making these rules irrelevant in sectors where they are most needed. South Africa’s </span></span></span><a href=\"http://www.justice.gov.za/inforeg/docs/InfoRegSA-POPIA-act2013-004.pdf\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">law</span></span></a><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\"> has a caveat, though, implying that the law doesn’t apply to police and national security, only if it can be proved that existing data privacy protections are adequate, which they </span></span></span><a href=\"https://www.r2k.org.za/2017/04/20/download-r2ks-activist-guide-to-rica-state-surveillance-in-sa/\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">aren’t</span></span></a><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\">. </span></span></span></p>\r\n<p class=\"western\" lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">But we should watch out for these agencies trying to argue for blanket exemptions from data protection rules. They shouldn’t be allowed to, and any exceptions should be narrowly tailored and serve a legitimate public safety purpose.</span></span></p>\r\n<p class=\"western\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\">Then there are data protection issues at local and street level. Increasingly, South African cities are incorporating </span></span></span><a href=\"https://www.dailymaverick.co.za/article/2018-02-25-op-ed-what-ramaphosa-needs-to-do-to-fix-state-spying-part-4-smart-policing-and-cctv-surveillance/\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">facial recognition</span></span></a><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\"> and </span></span></span><a href=\"https://www.dailymaverick.co.za/article/2018-10-05-controlling-cape-town-the-real-costs-of-cctv-cameras-and-what-you-need-to-know/\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">automatic number plate recognition</span></span></a><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\"> technologies into “smart” closed circuit television (CCTV) camera networks. Signage is non-existent in areas where these smart tools are active, which is wrong. The regulator needs to issue a </span></span></span><a href=\"https://www.privacy.org.nz/assets/Files/Brochures-and-pamphlets-and-pubs/Privacy-and-CCTV-A-guide-October-2009.pdf\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">practice note</span></span></a><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\"> about CCTV roll-out.</span></span></span></p>\r\n<p class=\"western\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\">Drones are likely to be acquired more </span></span></span><a href=\"http://www.engineeringnews.co.za/article/security-drones-taking-off-but-sa-restrictions-limit-adoption-2018-04-13/rep_id:4136\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">frequently</span></span></a><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\"> for public safety purposes and they have indisputable benefits. However, the safeguards on their abuses are inadequate, largely because the Civil Aviation Authority (CAA) is privacy insensitive and concerned only about airspace safety — and the regulator needs to engage the CAA about this. </span></span></span></p>\r\n<p class=\"western\" lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">The increasing scope of public surveillance makes the argument that people do not have a reasonable expectation of privacy in public spaces, much more problematic. Also, if people do not know that their personal information is being collected in public spaces, then they cannot enforce their data rights and demand accountability for how their money is being spent.</span></span></p>\r\n<p class=\"western\" lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Governments and surveillance companies tend to overpromise and under-deliver on crime-fighting using data-driven surveillance devices. These smart devices are also leading to particular types of crime becoming prioritised — such as crime in public spaces — while white collar, corporate crime becomes less and less visible, except when leaks happen.</span></span></p>\r\n<p class=\"western\" lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Surveillance is likely to become even more of an issue as cities go smart (in other words, as they incorporate data collection and processing tools into their everyday activities, such as traffic control).</span></span></p>\r\n<p class=\"western\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\">Smart cities present communications companies with massive markets for their wares, with a company such as Huawei offering municipalities “smart cities in a box”. Smart cities have become controversial for commodifying digital spaces, exploiting citizens’ data without their consent, reinforcing spatial inequalities and undermining their “</span></span></span><a href=\"https://onlinelibrary.wiley.com/doi/full/10.1111/anti.12312\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">informational right to the city</span></span></a><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\">”.</span></span></span></p>\r\n<p class=\"western\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\">Giving us a taste of what is to come if citizens are not vigilant, </span></span></span><a href=\"https://mybroadband.co.za/news/industrynews/huawei-enterprise/250933-south-africa-is-well-positioned-for-smart-city-development-huawei.html\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Edwin Diender</span></span></a><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\">, v</span></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\">ice president, government and public utility sector, Huawei Enterprise Business Group, has said:</span></span></span></p>\r\n<p class=\"western\" lang=\"en-ZA\" align=\"LEFT\">“<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Europe is almost over-regulated, making it very difficult to proceed swiftly, compared to South Africa… In fact, if Amsterdam and Johannesburg were to compete in implementing a particularly smart solution, I believe Johannesburg could easily win the race.”</span></span></p>\r\n<p class=\"western\" align=\"LEFT\"><a href=\"https://www.property24.com/articles/smart-city-development-on-the-cards-for-joburg-and-cape-town/26924\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Johannesburg</span></span></a><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\"> and </span></span></span><a href=\"https://academic.oup.com/idpl/article/7/4/314/4762323\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Cape Town</span></span></a><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\"> have signalled their intentions to become smart cities, in spite of the fact that the roll-out of smart technologies is running far ahead of data protection policies and practices. Right now there is nothing to prevent companies such as Huawei from cashing in on in our practically unregulated market for data.</span></span></span></p>\r\n<p class=\"western\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\">In fact, as they are</span></span></span><a href=\"https://www.iol.co.za/business-report/international/germany-considering-ways-to-exclude-huawei-from-5g-auction-18852994\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> shut out</span></span></a><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\"> from providing fifth generation communication networks in countries with stronger data protection regimes, apparently for security reasons, they are likely to concentrate even more on markets in the global South. Our data is vulnerable and that is a real security issue. </span></span></span></p>\r\n<p class=\"western\" lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">In the absence of a functioning data protection regime, more government and private companies are also likely to exploit smart data-generating devices connected to digital networks through the Internet of Things (IoT). Data generated by smart electricity meters, for instance, qualifies as personal information and shouldn’t be exploited without a person’s consent. Citizens need to keep a close eye on municipalities in this regard, as they may be tempted to monetise these datasets without the permission of residents.</span></span></p>\r\n<p class=\"western\" lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">The relatively unchecked expansion of data-driven security powers leaves people vulnerable to being profiled or even falsely accused of a crime. This is especially so when databases containing peoples’ personal information are linked with one another and used to track their travel and banking habits, who they communicate with and what they search about and even what they read. Citizens must demand to know when databases that are set up for one purpose, are used for another purpose, or where data is shared among data controllers. </span></span></p>\r\n<p class=\"western\" lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Overall, state and private surveillance capabilities are expanding all the time; yet accountability for how they are used isn’t. This means that we cannot yet speak about an appropriate balance between security and privacy. In fact, it has become too easy for politicians to hide behind the cloak of security to evade accountability, abuse power and maintain unsustainable societies.</span></span></p>\r\n<p class=\"western\" lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">There is clearly much work to be done, globally and locally. We need to start to demand accountability from the politicians who exploit our data in the name of security. We also need to demand performance from the smart devices that are collecting and processing our data. For instance, no public surveillance system should be rolled out without privacy impact assessments having been conducted and public consultation processes having been undertaken.</span></span></p>\r\n<p class=\"western\" lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">There are several other international developments that we need to keep an eye on. One of the most important is around repeated attempts to weaken encryption in the name of security. How this will happen is still a matter of debate, but the fight for security may be harmed more than it may be helped by weakening encryption, including the fight for information security.</span></span></p>\r\n<p class=\"western\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\">In the dying days of 2018, an important battle for encryption was </span></span></span><a href=\"https://www.bbc.com/news/world-australia-46463029\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">lost</span></span></a><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\"> in Australia. This defeat has international implications, including for South Africa. Australia is part of a global signals intelligence alliance, the </span></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><a href=\"https://www.stuff.co.nz/technology/106878758/five-eyes-spy-network-and-access-to-your-private-data-what-it-means-for-you\">Five </a><a href=\"https://www.stuff.co.nz/technology/106878758/five-eyes-spy-network-and-access-to-your-private-data-what-it-means-for-you\">Eyes</a></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\">. Now that it has become the weakest link in the alliance from a data protection point of view, it is likely that more intelligence data will be collected and processed through Australia in future, including of South Africans.</span></span></span></p>\r\n<p class=\"western\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\">The developing standards around bulk communication surveillance are crucially important, as are the attempts to address the cavalier approach with which metadata has often been handled. Intelligence-sharing and the ease with which intelligence agencies elsewhere have </span></span></span><a href=\"https://privacyinternational.org/feature/1742/new-privacy-international-report-reveals-dangerous-lack-oversight-secret-global\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">shared</span></span></a><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\"> personal information according to nebulous, ill-defined and secretive intelligence-sharing agreements is another major concern.</span></span></span></p>\r\n<p class=\"western\" lang=\"en-ZA\" align=\"LEFT\"><a name=\"_GoBack\"></a> <span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">In South Africa, the data exploiters have been having a field day. Data privacy day should be the day when ordinary citizens start to take back control of their data. If effective campaigns are to be mounted against data exploitation using modernisation, efficiency, safety and security as reasons, then we need to “do” data protection work differently. These campaigns cannot become the property of specialist NGOs, which are often good at making well-thought-out arguments, but which typically do not exercise much social power.</span></span></p>\r\n<p class=\"western\" lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">In fact, data privacy needs to become a mass issue. This means emphasising the social content of online privacy and its relationship to political rights (such as the right to organise). Once this happens, then perhaps we will we start to see data becoming a force for social progress and a public good, rather than yet another means of exploitation, oppression and dispossession. <u><b>DM</b></u></span></span></p>\r\n\r\n<ul>\r\n \t<li>\r\n<p lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\"><i>Jane Duncan is a professor in the Department of Journalism, Film and Television in the Faculty of Humanities at the University of Johannesburg. Her most recent book is Stopping the spies: constructing and resisting the surveillance state in South Africa (Wits University Press). The Right2Know Campaign has launched a </i></span></span></span><a href=\"https://awethu.amandla.mobi/petitions/protect-our-private-info-implement-sa-s-privacy-law\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\"><i>petition</i></span></span></span></a><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\"><i> calling for the Protection of Personal Information Act to be implemented fully, and has also produced a popular education </i></span></span></span><a href=\"http://www.r2k.org.za/POPI-guide\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\"><i>guide</i></span></span></span></a><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\"><i> to the act.</i></span></span></span> <span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\"><u><b>DM</b></u></span></span></span></span></p>\r\n</li>\r\n</ul>",
"teaser": "Hands off our data!",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "244",
"name": "Jane Duncan",
"image": "http://local.dailymaverick.co.za/wp-content/uploads/f5e14618bfe84d1212f2d888b19aa4b7.jpg",
"url": "https://staging.dailymaverick.co.za/author/janeduncan/",
"editorialName": "janeduncan",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "57825",
"name": "Protection of Personal Information Act",
"url": "https://staging.dailymaverick.co.za/keyword/protection-of-personal-information-act/",
"slug": "protection-of-personal-information-act",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Protection of Personal Information Act",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "122872",
"name": "smart cities",
"url": "https://staging.dailymaverick.co.za/keyword/smart-cities/",
"slug": "smart-cities",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "smart cities",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "122873",
"name": "smart devices",
"url": "https://staging.dailymaverick.co.za/keyword/smart-devices/",
"slug": "smart-devices",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "smart devices",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "92095",
"name": "",
"description": "",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/duncan-data-privacy-day-OPED.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/USPIyZ5i4CQmb7GzzI3ySRYwEi0=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/duncan-data-privacy-day-OPED.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/RMnJt9BE-5s945ea92ateksFfis=/450x0/smart/file/dailymaverick/wp-content/uploads/duncan-data-privacy-day-OPED.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/0vmfPIkG8FhlgMFLU2j2gv8_d8E=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/duncan-data-privacy-day-OPED.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/KMWkPS0V8z27fjIlqHDsmppt0iE=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/duncan-data-privacy-day-OPED.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/XZVEBNeI9y5ZnZ56-g9MT57EtC0=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/duncan-data-privacy-day-OPED.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/USPIyZ5i4CQmb7GzzI3ySRYwEi0=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/duncan-data-privacy-day-OPED.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/RMnJt9BE-5s945ea92ateksFfis=/450x0/smart/file/dailymaverick/wp-content/uploads/duncan-data-privacy-day-OPED.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/0vmfPIkG8FhlgMFLU2j2gv8_d8E=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/duncan-data-privacy-day-OPED.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/KMWkPS0V8z27fjIlqHDsmppt0iE=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/duncan-data-privacy-day-OPED.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/XZVEBNeI9y5ZnZ56-g9MT57EtC0=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/duncan-data-privacy-day-OPED.jpg",
"type": "image"
}
],
"summary": "How well is South Africa doing in protecting data privacy? Terribly. The culture of handing over information unquestioningly needs to change. This will involve a big shift in consciousness both for ordinary citizens and for data controllers. ",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "Hands off our data!",
"search_description": "<p class=\"western\" align=\"LEFT\"><a href=\"https://en.wikipedia.org/wiki/Data_Privacy_Day\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Data Privacy Day</span></span></a><s",
"social_title": "Hands off our data!",
"social_description": "<p class=\"western\" align=\"LEFT\"><a href=\"https://en.wikipedia.org/wiki/Data_Privacy_Day\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Data Privacy Day</span></span></a><s",
"social_image": ""
},
"cached": true,
"access_allowed": true
}