Complying with
The POPIA is a regulatory mandate aimed at safeguarding the personally identifiable information (PII) of South African citizens. It provides conditions for the lawful collection and processing of personal data of the citizens by all public and private organizations residing both in and outside the Republic of South Africa.
ManageEngine handbook to help
with POPIA compliance
POPIA compliance requires protecting the PII of employees, vendors, suppliers, and partners in addition to customer data. In POPIA, personal information includes (but is not limited to) aspects as diverse as:
Compliance to such regulations will improve your organization's reputation among the public.
Adhering to such strict guidelines will earn the trust of customers. They'll know they can trust your company over others that aren't complying.
Security measures taken for POPIA compliance will be a stepping stone to protect your organization against data breaches.
Failure to comply with POPIA can cost you and your company either imprisonment of up to 10 years, a fine of up to R10 million, or both.
POPIA can be broadly categorized into eight conditions, and adhering to them all is a multi-step proces. Knowing what these conditions mean to your organization is key to achieving compliance.
POPIA requirements are vast, and they might seem complex and baffling. Adherence to these conditions requires a combination of strict organisational policies and technical measures to be in place. But by adopting the right processes and IT products, POPIA compliance can be made a lot easier. ManageEngine has a comprehensive suite of IT management solutions to help your organization comply with the data security, documentation, and audit requirements of POPIA. Meet the following POPIA conditions with the help of ManageEngine solutions.
Appoint an information officer or a deputy information officer who will bear the sole responsibility to ensure compliance during the collection and processing of data.
Identity and access management tools will help to establish role-based access controls so that only authorized personnel will be able to handle sensitive data.
Access Manager Plus: Create custom roles with preset role permissions to ensure users have only the access required to perform their tasks.
M365 Manager Plus: Help establish role-based access control for Microsoft 365 administration.
Endpoint Central: Grant permissions of your choice based on multiple predefined and/or tailor-made roles using it's Role-Based Access Control (RBAC) approach.
AD360: Select any combination of management, auditing, reporting and alerting tasks concerning AD and Microsoft 365, and delegate them by creating custom help desk roles.
Collect and store only the data required for a specific purpose, and process it only with the consent of the data subject.
Locate and delete junk data including obsolete and duplicate files using data discovery tools.
DataSecurity Plus: Locate PII with its PII scanner. It supports scans for sensitive data from over 50 file types including text and email.
Ensure that the information collected is for a specific, well-defined, and legitimate purpose. After processing, the data should be disposed of in an irretrievable manner.
Data discovery tools help locate sensitive content such as PII/ePHI and maintain an inventory of the personal data stored. This prevents any of the data storage points from being missed in the deletion process.
DataSecurity Plus: Find all forms of PII associated with a data subject across Windows file servers using regex or keyword matching.
Further processing should be compatible with the originaly stated purpose and requires additional consent from the data subject except for legal or national security requirements.
Security information and event management (SIEM) solutions will help with detecting and auditing anomalous activities pertaining to stored sensitive data like data leak or unauthorized sharing, modifications, or deletion to ensure that the data is not misused by internal or external sources.
DataSecurity Plus: Monitor and analyze the usage of all removable devices, and block sensitive data being copied to USB devices with DataSecurity Plus' USB tracking.
Log360: Detect suspicious user behavior with Log360's UEBA engine's unsupervised machine learning algorithms and statistical analysis.
The information collected and stored should be complete, accurate, and not misleading. It should also only be updated when necessary.
A real-time alert mechanism to notify about unauthorized access, modification, or deletion of files with confidential data.
Log360: Generate real-time email/SMS alerts when files containing confidential data are accessed, copied, or modified. Log360's predefined reports help to trace back activities to the user that performed them.
Access Manager Plus: Create context-rich logs of user sessions, and instantly send SNMP traps and syslog messages to SIEM tools to support compliance audits.
Make the data subject aware of all the details regarding the collection and processing of data. Strict documentation of all processing operations must be maintained as proof.
Generate context-based audit logs, session recordings of users handling personal data, and predefined report templates to help with the documentation of the processing activities using a privileged session management solution.
Take technical and organizational measures to ensure the integrity, confidentiality, and security of the collected information.
IT solutions can help organizations meet the security requirements under condition 7:
(i) Detect vulnerabilities and unknown external attacks using custom correlation rules in log management tools.
Log360: Detect potential external threats like SQL injection attempts, ransomware activities, malicious URL requests, malware installation, and more using the predefined rules in Log360's real-time correlation engine.
(ii) Learn from the mistakes made in the past by performing root cause analysis on breaches using log forensics.
Log360: Conduct root cause analysis on data breaches, and view details on it's source, time, and impact using Log360's intuitive log search engine.
(iii) Patch management tools can automate updates and patching of servers, operating systems, corporate assets, and applications.
Patch Manager Plus: Scan endpoints to detect missing patches, and automate deployment of tested patches to OS and third-party applications.
(iv) Browser security solutions can manage and secure browsers across networks.
Browser Security Plus: Perform periodic scans of all browsers accessed from multiple devices storing corporate data to detect any threats.
(v) Auditing solutions can audit and monitor critical resources to ensure data integrity and protection of corporate assets.
DataSecurity Plus: Track accesses to confidential files using central access audit logs, and maintain audit trails to help comply with IT regulations.
PAM360: Obtain readily available video recordings, custom reports, and audit logs on privileged user activity.
ADAudit Plus: Enable real-time Windows Active Directory auditing, logon/logoff auditing, file server auditing, and Windows Server auditing.
(vi) Breach prevention tools can help detect vulnerable sources, limit access to confidential files, and encrypt data in transit to prevent security breaches.
Vulnerability Manager Plus: Discover security loopholes in local and remote endpoints and use attacker-based analytics to identify areas that are more prone to attacks.
Password Manager Pro: Organize and store privileged identities using a central vault. It helps to securely share passwords with team members on an as-needed basis.
Key Manager Plus: Gain complete visibility into SSH keys and SSL environments to avoid data breaches or compliance issues.
(vii) Data discovery and security tools can provide information like risk scores of files containing PII, vulnerable sources, etc. required to perform data protection impact assessment to identify and assess risks of a project.
DataSecurity Plus: Locate files with sensitive data, and analyze their vulnerability by calculating their risk score based on the permissions, the volume, the type of rules violated, audit details, and more.
Have a system in place to meet the requests of data subjects for the modification or deletion of information on account of outdated, incomplete, inaccurate, or unlawfully obtained data.
Data discovery tools can help locate files with the sensitive information of data subjects to further correct, update, or delete them.
DataSecurity Plus: Create custom data discovery rules and policies to locate sensitive data stored in your file servers. You can also generate reports that include the type, location, and the amount of sensitive data stored in each file.
Download this guide to get an in-depth look into the POPIA mandates and the various tools that
are essential to prepare your organization to achieve POPIA compliance.
In partnership with
ZA: 012 665 5551
E: contact@itrtech.co.za
Fully complying with the POPI act requires a variety of solutions, processes, people, and technologies. The solutions mentioned above are some of the ways in which IT management tools can help with some of the POPIA's requirements. Coupled with other appropriate solutions, processes, and people, ManageEngine's solutions help achieve and sustain POPIA compliance. This material is provided for informational purpose only and should not be considered as legal advice for POPIA compliance. ManageEngine makes no warranties, express, implied, or statutory, as to the information in this material.