Sunday Times

Braced for the inevitable breach-of-trust bombshells

-

WHEN last did you hear of a South African bank, insurance company, hospital or major retailer suffering a major security breach of its informatio­n systems? Probably never. But that is hardly a reason for confidence in the privacy of personal data such as health and financial status. In reality, because institutio­ns have never been under an obligation to report such breaches, they have tended to sweep them under the carpet.

That will no longer be possible — or at least legal — once the Protection of Personal Informatio­n Act comes into effect in South Africa. Signed into law two years ago, it awaits proclamati­on of a commenceme­nt date. Companies will have a oneyear grace period to get their data house in order — and prepare for the bombshells that will land when they do suffer breaches.

“South Africa has a culture of non-disclosure and cover-ups when it comes to data loss and data breaches, but [the act] will force much greater transparen­cy,” said Jos Floor of Floor Swart attorneys.

“A lot of companies prefer to deal with things quietly, and in some the culture of the cover-up is so strong that the board would rather not discuss an issue, or even get a report, to avoid putting their awareness of a problem on record. That is no longer an option.”

Internatio­nal experience signals that such reporting will make us aware of just how vulnerable we are to breaches.

“Everyone says cyber breaches are big issues in the US , but that’s only because it has to be reported,” said Brian West, senior vice-president at internatio­nal communicat­ions firm Fleishman-Hillard, during a recent visit to South Africa.

“I suspect that, once it has to be reported in Europe and here, you’re going to hear a lot more about it.”

In the US, a breach has to be reported within 60 days. South Africa will require immediate notificati­on of the regulator. While that may seem over-protective, it could well save companies from exacerbati­ng their reputation­al damage.

West gave the example of US retail giant Target, where hackers stole 40 million payment card records in 2013.

“The typical response of a company is, ‘We want to know everything before we say anything.’ But people whose records are stolen need to be told immediatel­y.

“They sat on the informatio­n for some time, and the delay cost them trust of customers. The breach occurred in September 2013, and they only announced it in January 2014. The share price plummeted, because they had also breached investors’ trust.

“On the other hand, the medical insurance company Anthem had a breach of 80 million med- ical records. They told customers and the FBI immediatel­y, and set up help lines. The share price did drop initially, but then grew significan­tly, thanks to the trust that was earned.”

West recommende­d a “holistic approach” to cyber security.

“When Vodafone in Germany had two million records stolen internally, it showed that it’s now also a human resources issue, demanding vetting and education of employees. A German steel mill got hacked, causing immense damage and forc- ing the plant to be shut down. That made it an emergency response matter, which falls under operations, and of business continuity, which falls under legal.”

That is even before the communicat­ions and investor relations department­s get in on the act. When breaches go public, companies will have to learn a new way not only of communicat­ing externally, but also of organising themselves internally.

As West said, “You can’t buy time in a crisis.”

Goldstuck is founder of World Wide Worx and editor-in-chief of Gadget.co.za. Follow him on YouTube and Twitter @art2gee

 ??  ??

Newspapers in English

Newspapers from South Africa