All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "2126482",
"signature": "Article:2126482",
"url": "https://staging.dailymaverick.co.za/article/2024-04-08-securing-south-africas-elections-through-popia-and-the-cybercrimes-act/",
"shorturl": "https://staging.dailymaverick.co.za/article/2126482",
"slug": "securing-south-africas-elections-through-popia-and-the-cybercrimes-act",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "Securing South Africa’s elections through Popia and the Cybercrimes Act",
"firstPublished": "2024-04-08 20:59:36",
"lastUpdate": "2024-04-08 20:59:36",
"categories": [
{
"id": "29",
"name": "South Africa",
"signature": "Category:29",
"slug": "south-africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/south-africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "Daily Maverick is an independent online news publication and weekly print newspaper in South Africa.\r\n\r\nIt is known for breaking some of the defining stories of South Africa in the past decade, including the Marikana Massacre, in which the South African Police Service killed 34 miners in August 2012.\r\n\r\nIt also investigated the Gupta Leaks, which won the 2019 Global Shining Light Award.\r\n\r\nThat investigation was credited with exposing the Indian-born Gupta family and former President Jacob Zuma for their role in the systemic political corruption referred to as state capture.\r\n\r\nIn 2018, co-founder and editor-in-chief Branislav ‘Branko’ Brkic was awarded the country’s prestigious Nat Nakasa Award, recognised for initiating the investigative collaboration after receiving the hard drive that included the email tranche.\r\n\r\nIn 2021, co-founder and CEO Styli Charalambous also received the award.\r\n\r\nDaily Maverick covers the latest political and news developments in South Africa with breaking news updates, analysis, opinions and more.",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 8723,
"contents": "<span style=\"font-weight: 400;\">Cybersecurity breaches and incidents within government and its related agencies have been coming thick and fast. Cybersecurity is integral to our lives as most information that we generate, store and share is on digital platforms today – and will be for years.</span>\r\n\r\n<span style=\"font-weight: 400;\">As a result, digital platforms and information within the platforms have become important and valuable assets within society. With this understanding, cybersecurity for digital platforms, the ecosystems where these platforms are found, the people who use these platforms and the laws of any country, should be among the most important functions for any public and private organisation and for any individual.</span>\r\n\r\n<b>Read more in Daily Maverick:</b> <a href=\"https://www.dailymaverick.co.za/elections-2024/\"><span style=\"font-weight: 400;\">Elections 2024</span></a>\r\n\r\n<span style=\"font-weight: 400;\">A key factor that highlights the importance of cybersecurity is the high level of commercial and social crime that takes place online (cybercrime) within South Africa and throughout the world. </span>\r\n\r\n<span style=\"font-weight: 400;\">Such crimes are executed by bad actors who target digital ecosystems, mostly for financial gain.</span>\r\n\r\n<span style=\"font-weight: 400;\">Sometimes these crimes are also committed in error, as a result of a lack of awareness/training and standard operating processes, and also because organisations have not transformed their company structures to include cybersecurity roles at all levels.</span>\r\n\r\n<span style=\"font-weight: 400;\">Cybercrime is also prevalent because organisations spend very few resources on embracing technology to solve problems, eg any public sector or private sector organisation that houses private and sensitive information of its employees, contractors, partners, customers and any other third party should have in place a working privacy protection solution. </span>\r\n\r\n<span style=\"font-weight: 400;\">This solution should be made up of the right technology platform that will be proactive in detecting and preventing misuse, and safeguarding private and sensitive information. </span>\r\n<h4><b>Recent data breaches</b></h4>\r\n<span style=\"font-weight: 400;\">It is concerning that at the eleventh hour of our sixth democratic election, there have been various data breaches involving government bodies and state organs. In early 2024, the Companies and Intellectual Property Commission (CIPC)</span><a href=\"https://www.itweb.co.za/article/cipc-registry-restores-it-systems-after-cyber-attack/P3gQ2MGAyxQvnRD1\"> <span style=\"font-weight: 400;\">experienced a security breach</span></a><span style=\"font-weight: 400;\">.</span>\r\n\r\n<span style=\"font-weight: 400;\">Recently, we saw both the Electoral Commission of SA (IEC) and the Government Pensions Administration Agency (GPAA) </span><a href=\"https://mybroadband.co.za/news/security/528405-ransomware-group-dumps-massive-collection-of-government-employee-data-online.html\"><span style=\"font-weight: 400;\">being compromised</span></a><span style=\"font-weight: 400;\"> in March 2024.</span>\r\n\r\n<span style=\"font-weight: 400;\">The Information Regulator confirmed </span><span style=\"font-weight: 400;\">on 11 February 2024</span><span style=\"font-weight: 400;\"> that it received two notifications from the IEC regarding a “</span><a href=\"https://techcentral.co.za/info-regulator-iec-security-compromise/241135/\"><span style=\"font-weight: 400;\">security compromise</span></a><span style=\"font-weight: 400;\">” that led to the release of the 2024 elections candidate lists for the ANC and MK parties.</span>\r\n\r\n<span style=\"font-weight: 400;\">At the time, it was unclear if the candidate list data was compromised through a hack or by more physical means. What the Information Regulator established is that an “</span><a href=\"https://techcentral.co.za/info-regulator-iec-security-compromise/241135/\"><span style=\"font-weight: 400;\">unauthorised person</span></a><span style=\"font-weight: 400;\">” gained access to the lists prior to distributing them on social media.</span>\r\n\r\n<span style=\"font-weight: 400;\">Based on the lessons we learnt from the Cambridge Analytica breach and the Edward Snowden revelations, we need to be aware of the implications of the IEC breach.</span>\r\n<blockquote><span style=\"font-weight: 400;\">Cybersecurity threats targeting the IEC and electoral processes pose significant risks to democracy and fundamental freedoms. </span></blockquote>\r\n<span style=\"font-weight: 400;\">Certain pressing questions linger: do we as South African citizens have the assurance that we are shielded from cyber security breaches in our electoral process? If so, to what extent are we protected and what are the implications of the IEC breach incident on our democratic machinery?</span>\r\n\r\n<span style=\"font-weight: 400;\">We also cannot help wondering whether there have been previous cybersecurity breaches that were not reported, as the Protection of Personal Information Act (Popia) was not law at the time.</span>\r\n\r\n<span style=\"font-weight: 400;\">Popia came into law with eight conditions for lawful processing of personal information. Popia also emphasises that processing personal information without any lawful basis is illegal.</span>\r\n\r\n<span style=\"font-weight: 400;\">An unauthorised bad actor would never have a lawful basis to access personal information and their actions would be unlawful (“access” falls within the definition of processing).</span>\r\n\r\n<span style=\"font-weight: 400;\">Of course, it is not just the bad actor’s act of accessing the personal information which is unlawful, but also the actions or inaction of the person who is responsible for ensuring the confidentiality of the information.</span>\r\n\r\n<span style=\"font-weight: 400;\">Essentially, the responsible party must take measures to “secure the integrity and confidentiality of personal information in its possession or under its control by taking appropriate, reasonable, technical and organisational measures to prevent (a) loss of, damage to or unauthorised destruction of personal information; and (b) unlawful access to or processing of personal information” (Section 19(1) of Popia).</span>\r\n\r\n<span style=\"font-weight: 400;\">In instances such as the CIPC, GPAA and IEC compromises, what would constitute “appropriate, reasonable, technical and organisational measures”?</span>\r\n\r\n<span style=\"font-weight: 400;\">We don’t know much about how the CIPC and GPAA compromises occurred (it could well be that these were “zero-day” attack methods against which these organisations would have been helpless), but there is a</span><a href=\"https://x.com/IECSouthAfrica/status/1767221080337555939?s=20\"> <span style=\"font-weight: 400;\">little more information from the IEC</span></a><span style=\"font-weight: 400;\"> on its compromise.</span>\r\n\r\n<span style=\"font-weight: 400;\">We now know that an IEC official’s computer workstation was used to generate and store the reports. We do not know how the reports were disseminated. The important question is: did the IEC have sufficient organisational measures in place to prevent the unlawful dissemination?</span>\r\n\r\n<span style=\"font-weight: 400;\">What data loss prevention measures did it put in place? Did it scan outgoing emails; did it prevent the use of portable flash drives; did it limit access to sensitive folders to only those who were authorised; did it implement measures to prevent information from being uploaded to the cloud?</span>\r\n\r\n<span style=\"font-weight: 400;\">These are questions the Information Regulator is going to want answers to, as is evident from the media release </span><span style=\"font-weight: 400;\">it put out on 11 March 2024</span><span style=\"font-weight: 400;\">.</span>\r\n\r\n<span style=\"font-weight: 400;\">The Cybercrimes Act prohibits the unlawful accessing and interception of data. It seems, from what we know, that the official (who at the time of writing had just been dismissed) is also going to be on the hook for unlawfully and intentionally intercepting data.</span>\r\n\r\n<span style=\"font-weight: 400;\">Intercepting data includes “the acquisition, viewing, capturing or copying of data of a nonpublic nature through the use of a hardware or software tool… so as to make some or all of the data available to a person, other than the lawful owner or holder of the data”.</span>\r\n\r\n<span style=\"font-weight: 400;\">It appears, therefore, that not only will the implicated official have lost their job, but they’re likely to also be prosecuted for contravening the Cybercrimes Act.</span>\r\n<h4><b>What organisations should have in place</b></h4>\r\n<span style=\"font-weight: 400;\">In alignment with Popia, organisations must implement rigorous and reasonable security measures designed to safeguard personal information against loss, damage or unauthorised access. These measures should reflect the diverse risks associated with data processing and the commitment to the privacy and protection of our personal information that the organisation processes.</span>\r\n\r\n<span style=\"font-weight: 400;\">By continually evaluating and enhancing security practices, organisations must ensure the integrity and confidentiality of personal data, underscoring the need to uphold the highest standards of data protection and privacy. A few of the key technical considerations should include implementation of data loss prevention, incident response plans and employee training.</span>\r\n<h4><b>Conclusion </b></h4>\r\n<span style=\"font-weight: 400;\">Under Popia, “reasonable security measures” refer to the appropriate and diligent steps organisations must take to prevent the loss of, damage to or unauthorised access to personal information.</span>\r\n\r\n<span style=\"font-weight: 400;\">These measures are tailored to the organisation’s specific needs, the nature of the data it handles and the potential risks associated with data processing. </span>\r\n\r\n<span style=\"font-weight: 400;\">Implementing such measures ensures that organisations uphold the integrity and confidentiality of personal information, demonstrating their commitment to the protection of data subjects’ privacy rights.</span>\r\n\r\n<span style=\"font-weight: 400;\">As South Africa and other African countries prepare for elections in 2024, it is imperative that cybersecurity and protection of personal data are prioritised. The stakes are high.</span>\r\n\r\n<span style=\"font-weight: 400;\">The IEC data breach may potentially erode public trust in the electoral system and voters may perceive that their personal data is not secure and may lose confidence in the transparency of the electoral process.</span>\r\n\r\n<span style=\"font-weight: 400;\">While the Information Regulator can play a critical role in dealing with the unlawful processing of personal data, the South African government and the IEC need to act fast, do damage control, and restore people’s confidence ahead of the elections. </span><b>DM</b>\r\n\r\n<i><span style=\"font-weight: 400;\">Prof Sizwe Snail ka Mtuze is an attorney at Snail Attorneys @ Law and Adjunct Professor, Nelson Mandela University. </span></i><i><span style=\"font-weight: 400;\">Lucien Pierce is an attorney at PPM Attorneys. </span></i><i><span style=\"font-weight: 400;\">Dr Melody Musoni is Digital Policy Officer at the European Centre for Development Policy Management (ECDPM). </span></i><i><span style=\"font-weight: 400;\">Carl Heinz Uys is Cybersecurity Officer at Cyberspace Protection.</span></i>",
"teaser": "Securing South Africa’s elections through Popia and the Cybercrimes Act",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "949449",
"name": "Sizwe Snail ka Mtuze, Lucien Pierce, Melody Musoni and Carl Heinz Uys",
"image": "",
"url": "https://staging.dailymaverick.co.za/author/sizwe-snail-ka-mtuze-et-al/",
"editorialName": "sizwe-snail-ka-mtuze-et-al",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "5953",
"name": "Cambridge Analytica",
"url": "https://staging.dailymaverick.co.za/keyword/cambridge-analytica/",
"slug": "cambridge-analytica",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cambridge Analytica",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "8600",
"name": "Edward Snowden",
"url": "https://staging.dailymaverick.co.za/keyword/edward-snowden/",
"slug": "edward-snowden",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Edward Snowden",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "67991",
"name": "Independent Electoral Commission",
"url": "https://staging.dailymaverick.co.za/keyword/independent-electoral-commission/",
"slug": "independent-electoral-commission",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Independent Electoral Commission",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "85262",
"name": "Cybersecurity",
"url": "https://staging.dailymaverick.co.za/keyword/cybersecurity/",
"slug": "cybersecurity",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cybersecurity",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "193224",
"name": "Popia",
"url": "https://staging.dailymaverick.co.za/keyword/popia/",
"slug": "popia",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Popia",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "348306",
"name": "2024 elections",
"url": "https://staging.dailymaverick.co.za/keyword/2024-elections/",
"slug": "2024-elections",
"description": "<p data-sourcepos=\"1:1-1:299\">The 2024 general elections in South Africa are<span class=\"citation-0 citation-end-0\"> the seventh elections held under the conditions of universal adult suffrage since the end of the apartheid era in 1994. The</span> elections will be held to elect a new National Assembly as well as the provincial legislature in each province.</p>\r\n<p data-sourcepos=\"3:1-3:251\">The current ruling party, the African National Congress (ANC), has been in power since the first democratic elections in 1994. The ANC's popularity has declined in recent years due to corruption, economic mismanagement, and high unemployment.</p>\r\n<p data-sourcepos=\"5:1-5:207\">The main opposition party is the Democratic Alliance (DA). The DA is particularly popular among white and middle-class voters.</p>\r\n<p data-sourcepos=\"7:1-7:387\">Other opposition parties include the Economic Freedom Fighters (EFF), the Freedom Front Plus (FF+), and the Inkatha Freedom Party (IFP). The EFF is a left-wing populist party that is popular among young black voters. The FF+ is a right-wing party that represents the interests of white Afrikaans-speaking voters. The IFP is a regional party that is popular in the KwaZulu-Natal province.</p>\r\n<p data-sourcepos=\"15:1-15:84\">Here are some of the key issues that will be at stake in the 2024 elections:</p>\r\n\r\n<ul data-sourcepos=\"17:1-22:0\">\r\n \t<li data-sourcepos=\"17:1-17:205\">The economy: South Africa is facing a number of economic challenges, including high unemployment, poverty, and inequality. The next government will need to focus on creating jobs and growing the economy.</li>\r\n \t<li data-sourcepos=\"18:1-18:171\">Corruption: Corruption is a major problem in South Africa. The next government will need to take steps to address corruption and restore public confidence in government.</li>\r\n \t<li data-sourcepos=\"19:1-19:144\">Crime: Crime is another major problem in South Africa. The next government will need to take steps to reduce crime and make communities safer.</li>\r\n \t<li data-sourcepos=\"20:1-20:188\">Education: The quality of education in South Africa is uneven. The next government will need to invest in education and ensure that all South Africans have access to a quality education.</li>\r\n \t<li data-sourcepos=\"21:1-22:0\">Healthcare: The quality of healthcare in South Africa is also uneven. The next government will need to invest in healthcare and ensure that all South Africans have access to quality healthcare.</li>\r\n</ul>\r\nThe 2024 elections are an opportunity for South Africans to choose a new government that will address the challenges facing the country. The outcome of the elections will have a significant impact on the future of South Africa",
"articlesCount": 0,
"replacedWith": null,
"display_name": "2024 elections",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "353222",
"name": "Cybercrimes Act",
"url": "https://staging.dailymaverick.co.za/keyword/cybercrimes-act/",
"slug": "cybercrimes-act",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cybercrimes Act",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "416851",
"name": "Sizwe Snail ka Mtuze",
"url": "https://staging.dailymaverick.co.za/keyword/sizwe-snail-ka-mtuze/",
"slug": "sizwe-snail-ka-mtuze",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Sizwe Snail ka Mtuze",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "416852",
"name": "Lucien Pierce",
"url": "https://staging.dailymaverick.co.za/keyword/lucien-pierce/",
"slug": "lucien-pierce",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Lucien Pierce",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "416853",
"name": "Melody Musoni",
"url": "https://staging.dailymaverick.co.za/keyword/melody-musoni/",
"slug": "melody-musoni",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Melody Musoni",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "416854",
"name": "Carl Heinz Uys",
"url": "https://staging.dailymaverick.co.za/keyword/carl-heinz-uys/",
"slug": "carl-heinz-uys",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Carl Heinz Uys",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "17088",
"name": "",
"description": "",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/2024/04/Oped-Mtuze-CyberElexTW.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/8l7qSZ2idhPb42tgLSGmqM5z0h4=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/04/Oped-Mtuze-CyberElexTW.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/jfPY2iTqNYOF6TC-m10UGSzcw-g=/450x0/smart/file/dailymaverick/wp-content/uploads/2024/04/Oped-Mtuze-CyberElexTW.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/5TPKTfHIx7xKyUddzeaxXaVjGxU=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/04/Oped-Mtuze-CyberElexTW.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/zbU2FeBYoCtvSRcpmwaKwjx60f4=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/04/Oped-Mtuze-CyberElexTW.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/CspiXiF0MkajJXB93nny7X0RY1o=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/04/Oped-Mtuze-CyberElexTW.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/8l7qSZ2idhPb42tgLSGmqM5z0h4=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/04/Oped-Mtuze-CyberElexTW.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/jfPY2iTqNYOF6TC-m10UGSzcw-g=/450x0/smart/file/dailymaverick/wp-content/uploads/2024/04/Oped-Mtuze-CyberElexTW.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/5TPKTfHIx7xKyUddzeaxXaVjGxU=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/04/Oped-Mtuze-CyberElexTW.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/zbU2FeBYoCtvSRcpmwaKwjx60f4=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/04/Oped-Mtuze-CyberElexTW.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/CspiXiF0MkajJXB93nny7X0RY1o=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/04/Oped-Mtuze-CyberElexTW.jpg",
"type": "image"
}
],
"summary": "As South Africa and other African countries prepare for elections in 2024, cybersecurity and the protection of personal data must be prioritised. The stakes are high.",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "Securing South Africa’s elections through Popia and the Cybercrimes Act",
"search_description": "<span style=\"font-weight: 400;\">Cybersecurity breaches and incidents within government and its related agencies have been coming thick and fast. Cybersecurity is integral to our lives as most informat",
"social_title": "Securing South Africa’s elections through Popia and the Cybercrimes Act",
"social_description": "<span style=\"font-weight: 400;\">Cybersecurity breaches and incidents within government and its related agencies have been coming thick and fast. Cybersecurity is integral to our lives as most informat",
"social_image": ""
},
"cached": true,
"access_allowed": true
}