Business Day

SAPS hack a wake-up call for the state and business

- LUCIEN PIERCE

REPORTS this week of a cybersecur­ity breach of the South African Police Service’s (SAPS’s) website are a foretaste of bigger and more damaging informatio­n security breaches to come.

The state and business regularly downplay informatio­n security breaches. Major corporatio­ns and government institutio­ns in places such as the US, the UK and Puerto Rico have lost millions of rand in financial and reputation­al damage as a result of cybersecur­ity breaches. We ignore the reality that losses of this magnitude will soon be happening in SA.

Three high-profile examples of cybersecur­ity breaches immediatel­y come to mind. A breach of Sony’s PlayStatio­n network saw the data of 100-million customers compromise­d. It has already cost Sony $200m, with 58 class action suits still outstandin­g. Google suffered an embarrassi­ng cybersecur­ity breach when researcher­s demonstrat­ed they could hack into Google’s Sydney office’s building-management system. A Puerto Rican electricit­y utility’s smart meters were hacked — resulting in the utility losing up to $400m a year.

The reasons for cyber attacks vary from stealing financial assets, intellectu­al property or sensitive informatio­n to making social or political statements, as was the case in the SAPS hack (the reason for this hack was apparently to protest the Marikana incident). The outcomes for the targets of such attacks are always negative and include: the cost of remedying the informatio­n security breach (for example, replacing the stolen assets, and if customers or third parties were affected, providing some sort of compensati­on to them to try to retain relationsh­ips with them after the incident); upgrades to cybersecur­ity systems and protection; the loss of customers or business; litigation; and reputation­al damage affecting customer or investor confidence.

The state and business seem to forget the statutory and best-practice recommenda­tions that apply to them. Those that immediatel­y come to mind (bearing in mind that certain industries and state department­s have their own specific informatio­n-security provisions) are: the Protection of Personal Informatio­n Bill, which provides for the protection of personal informatio­n, the standards of protection to be applied and penalties for noncomplia­nce; the Consumer Protection Act, which has similar provisions regarding the protection of consumer informatio­n and penalties; and chapter five of the King 3 Code Of Governance Principles for SA, dealing with the governance of IT.

If just the bill and the King code are considered, it becomes evident that the state and business can no longer afford to take cybersecur­ity lightly.

The bill contains a number of informatio­n-protection principles. It obliges a responsibl­e party (such as the SAPS) to secure the integrity of personal informatio­n in its possession or under its control by taking appropriat­e, reasonable technical and organisati­onal measures to prevent the loss, damage or destructio­n of personal informatio­n and unlawful access to or processing of personal informatio­n. In doing so, the responsibl­e party must have regard to generally accepted practices and procedures.

While the bill is not yet applicable, the King code may well apply to many. Paragraphs 32 and 33 of chapter five deal crisply with the legal aspects of IT risk management. They state: “IT legal risk arises from the possession, ownership and operationa­l use of technology that may result in the company becoming a party to legal proceeding­s. When considerin­g the company’s compliance with applicable laws, rules, codes and standards, the board should ensure that IT-related laws, rules, codes and standards are considered. Companies must comply with applicable IT laws and consider adherence to IT rules, codes and standards, guidelines and leading practices.”

The simple question a court will ask when considerin­g an informatio­n security breach complaint, will be whether the party complied with IT rules, codes and standards, guidelines and leading practices. If the responsibl­e party did not comply, then there may be various adverse consequenc­es.

The day is fast approachin­g when a press release downplayin­g the seriousnes­s of a cyber attack or informatio­n security breach, will not be enough to dispose of any reputation­al and financial damage to the state and business.

They would do well to heed the laws and standards.

Pierce is a partner at Phukubje Pierce Masithela Attorneys.

Newspapers in English

Newspapers from South Africa