SlideShare a Scribd company logo
DATA PROTECTION AND RISK MITIGATION 
Understanding Data Protection Risks and the Law 
PRIA CHETTY 
ENDCODER/ ENDCODE.ORG
CONTEXT: 
POPI Priority Issues 
IT systems and business tools (enterprise data, (know your) customer data, 
profiling, analytics, relationship management, financial, health ) 
Records management policies (creation, retention and destruction of records) 
Digital content ownership (users: personal data and intellectual property, rights 
and obligations) 
Database ownership(source of data, use of data, rights and obligations) 
Apps ownership (generation of user data: personal data and intellectual 
property, rights and obligations ) 
Young people (campaigns involving young people: special treatment of young 
people) 
Recommendations
POPI: Priority Issues
POPI: Priority Issues 
• Getting Serious about PoPI 
• Identification of Personal Data impacted and exempted 
• Identification of Business Systems impacted 
• Identification of Business Processes impacted 
• Information Security (Risk and Incident Management) 
• Identification of (Vital) Records 
• Classification of Records 
• Personal Information and Intellectual Property 
• Technological Innovation and Privacy
POPI and Advertising and Marketing 
• Know Your Customer 
• Know Your Channel 
• Know Your Platform 
• Risks associated with Digital Opportunities 
• Risks associated with Innovation Opportunities 
• Data Risks Management: Privacy and Intellectual Property (incl. copyright), 
Information Security and Records Management
IT / IS systems and business tools 
• Accountability Principle (s8 POPI) 
• Responsible Party to process PI in satisfaction of conditions of PoPI 
The responsible party must ensure that the conditions set out in 
this Chapter, and all the measures that give effect to such 
conditions, are complied with at the time of the determination of 
the purpose and means of the processing and during the 
processing itself. 
Section 8 The Protection of Personal Information Act 4 of 2013 
• Processing Limitation (Condition 2 PoPI) and Further Processing for compatible 
purposes (Condition 4) 
• Quality of Information (Condition 5 of PoPI)
IT / IS systems and business tools 
• Security Safeguards 
• Security measures on integrity and confidentiality of personal information (s19 of PoPI) 
• Data under my control has been breached, now what? 
• Notification to Data Subject (s22 POPI) 
• Notification to Information Regulator (s22 POPI) 
• Unauthorised access to data is a crime 
A person who intentionally accesses or intercepts any data without authority or 
permission to do so, is guilty of an offence. 
A person who intentionally and without authority to do so, interferes with data 
in a way which causes such data to be modified, destroyed or otherwise 
rendered ineffective is guilty of an offence 
Section 86 (1) and (2) Electronic Communications and Transactions Act 25 of 2002
IT systems and the Cloud 
Information processed by Operator or person acting under authority 
Security measures regarding information processed by operator 
Cross-border transfer policy 
5 Conditions of Cross-border Transfer (S72 POPI) 
• The third party who receives the information is subject to a law, binding corporate rules or 
agreement which provide an adequate level of protection that effectively upholds the 
principles for processing of information that are similar to those in POPI, and includes 
provisions that are similar to POPI in relation to the further transfer of personal information 
from the recipient to third parties in a foreign country; 
• The person consents to the transfer; 
• The transfer is necessary for the performance of a contract between you and the person, or 
for pre-contractual measures taken at the request of the person whose information is being 
transferred; 
• The transfer is necessary for the conclusion or performance of a contract between you and a 
third party that is in the interest of the person; or 
• The transfer is for the benefit of the person whose information is collected, and it is not 
reasonably practical to obtain the consent of the person and, if it were reasonably practical 
to obtain such consent, the data subject would likely give it.
Records Management Policies 
• Accountability Principle 
• Responsible Party to protect integrity of PI (s8 POPI) 
• Outdated information 
• Restriction on records (s14 POPI) 
• Openness 
• Documentation (s17 
• Access to Personal Information (s23 of PoPI) 
• Accuracy & Correction of information 
• Restriction of Records (s14 POPI) 
• Right to correct PI (s24 POPI) 
A responsible party must take reasonably practicable steps to ensure that the personal 
information is complete, accurate, not misleading and updated where necessary. 
Section 16 The Protection of Personal Information Act 4 of 2013 
• De-identification/Deletion of information 
• Exclusion (s6 POPI) 
• As soon as no longer authorised to have PI (s14 POPI)
Records Management Policies 
• Losing personal information 
• Notification to Data Subject & Regulator (s22 POPI) 
• International Best Practices for records management 
• European Directive on Data Protection 
• Right to Access Information Records 
• Promotion of Access to Information Act 2 of 2000 (PAIA) 
• Data Subject participation (s23 POPI)
Digital Content Ownership 
Who Owns Digital Content 
• Do you own your own digital content? 
“There are not yet statutory laws around 
ownership of virtual goods, nor is there case 
law.” 
The Guardian 
“In most cases you are effectively leasing the content, 
not buying it.” 
The Guardian 
"You will not transfer your account to anyone 
without first getting our written permission" 
Facebook's terms and conditions
Digital Content Ownership 
• Should the subject of the digital content own 
the own digital content? 
“What are these people going to do with that data? 
They’re going to target you with an ad which makes 
you feel a bit queasy. Targeted adverts are not the 
future.” 
Sir Tim Berners-Lee 
in The Guardian 
“If you give [people] the ability to see how [data is] 
used and you ban its misuse then people are much 
more happy to open up to their data being used.” 
Sir Tim Berners-Lee 
in The Guardian
Database Ownership 
Databases & Copyright 
• Definition of ‘literary work’ in Copyright Act 98 of 1978 includes compilations stored 
or embodied in a computer or medium used with a computer (s1) 
• Originality in selection or arrangement 
• Labour & Skill 
• Owner of copyright to database has exclusive rights 
Databases & POPI 
• Databases of personal information fall under POPI and must be protected by the 
Responsible Party 
• Directories (s70 POPI)
Apps Ownership 
https://www.flickr.com/photos/jasonahowie/
Apps Ownership 
Apps & Copyright 
• An App is a computer program 
“computer program” means a set of instructions fixed or stored in any 
manner and which, when used directly or indirectly in a computer, directs its 
operation to bring about a result” 
Section 1 The Copyright Act 98 of 1978 
• Computer programs are copyright protected (not patantable) 
“Anything which consists of (amongst others) a computer program shall not 
be an invention for the purposes of this Act” 
Section 25(2) The Patents Act 57 of 1978
App Ownership 
• Data Protection for Apps 
• Owners of App are responsible for 
protection of data collected 
• Think of all of the information an App can 
collect about you 
• Health & sport monitoring apps 
• Medical apps 
• Messaging apps
Younge People & Data Protection 
https://www.flickr.com/photos/malias/
Younge People & Data Protection 
• POPI – ‘Competent Person’ 
• Protection of Personal information of children by Responsible Party 
A responsible party may, subject to section 35, not process 
personal information concerning a child. 
Section 34 The Protection of Personal Information Act 4 of 2013 
• Exceptions (s35 POPI) 
• Consent from the competent person 
• Necessary for establishment, exercise or defence of a right or obligation 
in law 
• Necessary to comply with an obligation of international public law 
• historical, statistical or research purposes
Recommendations 
• Appointment of Information Officer: Enterprise 
• Appointment of a Risk and Compliance Manager: Agencies 
• PoPI Audit (Client) PoPI Audit (Project) 
• Intellectual Property Audit 
• Information Security Audit 
• Privacy Policy 
• Information Security Policy 
• Intellectual Property Policy 
• Innovation Management 
Different rules for different channels, platforms, data sources and applications
Pria Chetty 
Pria.chetty@endcode.org 
endcode.org 
THANKS, QUESTIONS?
References 
• http://ico.org.uk/for_organisations/data_protection/security_measures) 
• http://www.theguardian.com/money/2012/sep/03/do-you-own-your-digital-content 
• http://www.theguardian.com/technology/2014/oct/08/sir-tim-berners-lee-speaks-out-on-data-ownership? 
CMP=ema_827 
• http://www.bizcommunity.com/Article/75/542/98352.html 
• http://ico.org.uk/Youth

More Related Content

PPTX
Social Media & Legal Risk
PPTX
Cyber Banking Conference
PPTX
IAB Online Content Regulation: Trends
PPT
legal and ethcal issues of e business
PPTX
social, legal and ethical issues of e-commerce..
PPT
Legal & moral issues in e commerce
PPT
Ethics in e commerce n it
PDF
Privacy, Drones, and IoT
Social Media & Legal Risk
Cyber Banking Conference
IAB Online Content Regulation: Trends
legal and ethcal issues of e business
social, legal and ethical issues of e-commerce..
Legal & moral issues in e commerce
Ethics in e commerce n it
Privacy, Drones, and IoT

What's hot (20)

PPTX
Legal challenges in E-commerce
PPTX
Kasita's presentation
PPT
Privacy and Data Security: Risk Management and Avoidance
PDF
Consumers' and Citizens' Privacy
PPTX
Data Privacy
PPTX
Unit 6 Privacy and Data Protection 8 hr
PPT
Legal instrumentation in e commerce
PPT
Averting the dangers embedded in lack of privacy law in nigeria by arazim
PDF
Legal ethical issues E commerce
PPTX
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
PPT
E-Commerce 10
PPTX
Thierer Internet Privacy Regulation
PPTX
Privacy & the Internet: An Overview of Key Issues
PPT
Legal social ethical
PDF
Cybersecurity and Data Privacy
PPTX
Draft data protection regn 2012
PPTX
IT law : the middle kingdom between east and West
PPT
Canadian Copyright Law, Technology and Cultural Management
PPTX
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
Legal challenges in E-commerce
Kasita's presentation
Privacy and Data Security: Risk Management and Avoidance
Consumers' and Citizens' Privacy
Data Privacy
Unit 6 Privacy and Data Protection 8 hr
Legal instrumentation in e commerce
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Legal ethical issues E commerce
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
E-Commerce 10
Thierer Internet Privacy Regulation
Privacy & the Internet: An Overview of Key Issues
Legal social ethical
Cybersecurity and Data Privacy
Draft data protection regn 2012
IT law : the middle kingdom between east and West
Canadian Copyright Law, Technology and Cultural Management
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
Ad

Viewers also liked (20)

PPT
Sviesuva vaizdine medziaga svietiejams 1 dalis 2013
PPTX
Vaizdine metodine medziaga svietejams 7 dalis sveiko zmogaus kodas
PPT
Kaip rengti švietejiska paskaita.patarimai. 6 dalis
PDF
2014 08-20 Radboudumc-Health Valley-LSH: Personalized Healthcare through inte...
PDF
DJ Hay Landscape Architecture
PPTX
201131065
PDF
2016 09-12 Europe Biobanking Week, Vienna, Alain van Gool
PDF
Relatoio contas sgu 2
DOCX
Satish_Reddy_resume
PPT
Newest products summer
PDF
Projektu ruosimo pagrindai
PPTX
Final Powerpoint
PDF
Building science 2 final report
PDF
Relatoio contas sgu 2
PDF
How to keep pace with mobile consumer expectations
PDF
state_of_app_downloads_and_monetization_2015_global
PDF
2015 10-06 Building Bridges Biomarker symposium FIMM Helsinki, Alain van Gool
PDF
2016 06 Radboud Technology Centers
PDF
Relatoio contas sgu 2
PPTX
Fashion ecommerce 2015
Sviesuva vaizdine medziaga svietiejams 1 dalis 2013
Vaizdine metodine medziaga svietejams 7 dalis sveiko zmogaus kodas
Kaip rengti švietejiska paskaita.patarimai. 6 dalis
2014 08-20 Radboudumc-Health Valley-LSH: Personalized Healthcare through inte...
DJ Hay Landscape Architecture
201131065
2016 09-12 Europe Biobanking Week, Vienna, Alain van Gool
Relatoio contas sgu 2
Satish_Reddy_resume
Newest products summer
Projektu ruosimo pagrindai
Final Powerpoint
Building science 2 final report
Relatoio contas sgu 2
How to keep pace with mobile consumer expectations
state_of_app_downloads_and_monetization_2015_global
2015 10-06 Building Bridges Biomarker symposium FIMM Helsinki, Alain van Gool
2016 06 Radboud Technology Centers
Relatoio contas sgu 2
Fashion ecommerce 2015
Ad

Similar to Data Protection & Risk Management (20)

PPTX
3A – DATA PROTECTION: ADVICE
 
PDF
POPI_Overview_E
PDF
POPI_Overview_E
PPTX
POPI Seminar FINAL
PPTX
Protection of Personal Information
PPTX
Protection of Personal Information
PPTX
The Protection of Personal Information Act: A Presentation
PPTX
Popi and Sharepoint 2010
PPTX
PDF
2014-09-18 Protection of Personal Information Act readiness workshop
PPTX
The Protection of Personal Information Act 4 of 2013
PPTX
Privacy in India: Legal issues
PPT
Personal privacy and computer technologies
PPT
Data protection in_india
PDF
Information Security: The Trinidad & Tobago Legal Context
PPTX
Group 10 - PDPA II.pptx
PPT
Data Privacy in India and data theft
PDF
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...
PPTX
The Popi Act 4 of 2013 - Implications for iSCM
PPT
Compliance audit under the Information Technology Act, 2000
3A – DATA PROTECTION: ADVICE
 
POPI_Overview_E
POPI_Overview_E
POPI Seminar FINAL
Protection of Personal Information
Protection of Personal Information
The Protection of Personal Information Act: A Presentation
Popi and Sharepoint 2010
2014-09-18 Protection of Personal Information Act readiness workshop
The Protection of Personal Information Act 4 of 2013
Privacy in India: Legal issues
Personal privacy and computer technologies
Data protection in_india
Information Security: The Trinidad & Tobago Legal Context
Group 10 - PDPA II.pptx
Data Privacy in India and data theft
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...
The Popi Act 4 of 2013 - Implications for iSCM
Compliance audit under the Information Technology Act, 2000

More from Endcode_org (7)

PPTX
IAB Online Content Regulation
PPTX
Electronic Contracting Presentation
PPTX
E-contracting and Commerce
PPTX
Consumer Protection
PPTX
Innovator's Guide to the IP Galaxy
DOCX
Mutual Non Disclosure Agreement (South Africa)
PPTX
E-commerce regulation pria chetty
IAB Online Content Regulation
Electronic Contracting Presentation
E-contracting and Commerce
Consumer Protection
Innovator's Guide to the IP Galaxy
Mutual Non Disclosure Agreement (South Africa)
E-commerce regulation pria chetty

Recently uploaded (20)

PPTX
Ethiopian Law of Contract short note.pptx
PPT
Understanding the Impact of the Cyber Act
DOCX
FOE Reviewer 2022.docxhgvgvhghhghyjhghggg
PPTX
POSH Awareness and policy ppt with all design covering .
PPTX
BUSINESS LAW AND IT IN CONTRACT SIGNING AND MANAGEMENT
PPT
Cyber-Crime-in- India at Present day and Laws
PPT
Understanding the Impact of the Cyber Act
PDF
Louisiana Bar Foundation 2023-2024 Annual Report
PDF
Vinayaka Mission Law School Courses and Infrastructure.pdf
PPTX
Lecture Notes on Family Law - Knowledge Area 5
PDF
A SEP and FRAND Overview 13 Aug 2024.pdf
PPTX
2.....FORMULATION OF THE RESEARCH PROBLEM.pptx
PDF
CRIMINAL PROCEDURE BY HON. JUSTICE BAH.pdf
PPTX
FFFFFFFFFFFFFFFFFFFFFFTA_012425_PPT.pptx
PPTX
Law of Torts , unit I for BA.LLB integrated course
PPTX
UDHR & OTHER INTERNATIONAL CONVENTIONS.pptx
PDF
Notes to accompany the TMT and FRAND Overview Slides
PDF
Trademark, Copyright, and Trade Secret Protection for Med Tech Startups.pdf
PPT
3. INDUTRIAL RELATIONS INTRODUCTION AND CONCEPTS.ppt
PPTX
Learning-Plan-4-Core-Principles.pptx htts
Ethiopian Law of Contract short note.pptx
Understanding the Impact of the Cyber Act
FOE Reviewer 2022.docxhgvgvhghhghyjhghggg
POSH Awareness and policy ppt with all design covering .
BUSINESS LAW AND IT IN CONTRACT SIGNING AND MANAGEMENT
Cyber-Crime-in- India at Present day and Laws
Understanding the Impact of the Cyber Act
Louisiana Bar Foundation 2023-2024 Annual Report
Vinayaka Mission Law School Courses and Infrastructure.pdf
Lecture Notes on Family Law - Knowledge Area 5
A SEP and FRAND Overview 13 Aug 2024.pdf
2.....FORMULATION OF THE RESEARCH PROBLEM.pptx
CRIMINAL PROCEDURE BY HON. JUSTICE BAH.pdf
FFFFFFFFFFFFFFFFFFFFFFTA_012425_PPT.pptx
Law of Torts , unit I for BA.LLB integrated course
UDHR & OTHER INTERNATIONAL CONVENTIONS.pptx
Notes to accompany the TMT and FRAND Overview Slides
Trademark, Copyright, and Trade Secret Protection for Med Tech Startups.pdf
3. INDUTRIAL RELATIONS INTRODUCTION AND CONCEPTS.ppt
Learning-Plan-4-Core-Principles.pptx htts

Data Protection & Risk Management

  • 1. DATA PROTECTION AND RISK MITIGATION Understanding Data Protection Risks and the Law PRIA CHETTY ENDCODER/ ENDCODE.ORG
  • 2. CONTEXT: POPI Priority Issues IT systems and business tools (enterprise data, (know your) customer data, profiling, analytics, relationship management, financial, health ) Records management policies (creation, retention and destruction of records) Digital content ownership (users: personal data and intellectual property, rights and obligations) Database ownership(source of data, use of data, rights and obligations) Apps ownership (generation of user data: personal data and intellectual property, rights and obligations ) Young people (campaigns involving young people: special treatment of young people) Recommendations
  • 4. POPI: Priority Issues • Getting Serious about PoPI • Identification of Personal Data impacted and exempted • Identification of Business Systems impacted • Identification of Business Processes impacted • Information Security (Risk and Incident Management) • Identification of (Vital) Records • Classification of Records • Personal Information and Intellectual Property • Technological Innovation and Privacy
  • 5. POPI and Advertising and Marketing • Know Your Customer • Know Your Channel • Know Your Platform • Risks associated with Digital Opportunities • Risks associated with Innovation Opportunities • Data Risks Management: Privacy and Intellectual Property (incl. copyright), Information Security and Records Management
  • 6. IT / IS systems and business tools • Accountability Principle (s8 POPI) • Responsible Party to process PI in satisfaction of conditions of PoPI The responsible party must ensure that the conditions set out in this Chapter, and all the measures that give effect to such conditions, are complied with at the time of the determination of the purpose and means of the processing and during the processing itself. Section 8 The Protection of Personal Information Act 4 of 2013 • Processing Limitation (Condition 2 PoPI) and Further Processing for compatible purposes (Condition 4) • Quality of Information (Condition 5 of PoPI)
  • 7. IT / IS systems and business tools • Security Safeguards • Security measures on integrity and confidentiality of personal information (s19 of PoPI) • Data under my control has been breached, now what? • Notification to Data Subject (s22 POPI) • Notification to Information Regulator (s22 POPI) • Unauthorised access to data is a crime A person who intentionally accesses or intercepts any data without authority or permission to do so, is guilty of an offence. A person who intentionally and without authority to do so, interferes with data in a way which causes such data to be modified, destroyed or otherwise rendered ineffective is guilty of an offence Section 86 (1) and (2) Electronic Communications and Transactions Act 25 of 2002
  • 8. IT systems and the Cloud Information processed by Operator or person acting under authority Security measures regarding information processed by operator Cross-border transfer policy 5 Conditions of Cross-border Transfer (S72 POPI) • The third party who receives the information is subject to a law, binding corporate rules or agreement which provide an adequate level of protection that effectively upholds the principles for processing of information that are similar to those in POPI, and includes provisions that are similar to POPI in relation to the further transfer of personal information from the recipient to third parties in a foreign country; • The person consents to the transfer; • The transfer is necessary for the performance of a contract between you and the person, or for pre-contractual measures taken at the request of the person whose information is being transferred; • The transfer is necessary for the conclusion or performance of a contract between you and a third party that is in the interest of the person; or • The transfer is for the benefit of the person whose information is collected, and it is not reasonably practical to obtain the consent of the person and, if it were reasonably practical to obtain such consent, the data subject would likely give it.
  • 9. Records Management Policies • Accountability Principle • Responsible Party to protect integrity of PI (s8 POPI) • Outdated information • Restriction on records (s14 POPI) • Openness • Documentation (s17 • Access to Personal Information (s23 of PoPI) • Accuracy & Correction of information • Restriction of Records (s14 POPI) • Right to correct PI (s24 POPI) A responsible party must take reasonably practicable steps to ensure that the personal information is complete, accurate, not misleading and updated where necessary. Section 16 The Protection of Personal Information Act 4 of 2013 • De-identification/Deletion of information • Exclusion (s6 POPI) • As soon as no longer authorised to have PI (s14 POPI)
  • 10. Records Management Policies • Losing personal information • Notification to Data Subject & Regulator (s22 POPI) • International Best Practices for records management • European Directive on Data Protection • Right to Access Information Records • Promotion of Access to Information Act 2 of 2000 (PAIA) • Data Subject participation (s23 POPI)
  • 11. Digital Content Ownership Who Owns Digital Content • Do you own your own digital content? “There are not yet statutory laws around ownership of virtual goods, nor is there case law.” The Guardian “In most cases you are effectively leasing the content, not buying it.” The Guardian "You will not transfer your account to anyone without first getting our written permission" Facebook's terms and conditions
  • 12. Digital Content Ownership • Should the subject of the digital content own the own digital content? “What are these people going to do with that data? They’re going to target you with an ad which makes you feel a bit queasy. Targeted adverts are not the future.” Sir Tim Berners-Lee in The Guardian “If you give [people] the ability to see how [data is] used and you ban its misuse then people are much more happy to open up to their data being used.” Sir Tim Berners-Lee in The Guardian
  • 13. Database Ownership Databases & Copyright • Definition of ‘literary work’ in Copyright Act 98 of 1978 includes compilations stored or embodied in a computer or medium used with a computer (s1) • Originality in selection or arrangement • Labour & Skill • Owner of copyright to database has exclusive rights Databases & POPI • Databases of personal information fall under POPI and must be protected by the Responsible Party • Directories (s70 POPI)
  • 15. Apps Ownership Apps & Copyright • An App is a computer program “computer program” means a set of instructions fixed or stored in any manner and which, when used directly or indirectly in a computer, directs its operation to bring about a result” Section 1 The Copyright Act 98 of 1978 • Computer programs are copyright protected (not patantable) “Anything which consists of (amongst others) a computer program shall not be an invention for the purposes of this Act” Section 25(2) The Patents Act 57 of 1978
  • 16. App Ownership • Data Protection for Apps • Owners of App are responsible for protection of data collected • Think of all of the information an App can collect about you • Health & sport monitoring apps • Medical apps • Messaging apps
  • 17. Younge People & Data Protection https://www.flickr.com/photos/malias/
  • 18. Younge People & Data Protection • POPI – ‘Competent Person’ • Protection of Personal information of children by Responsible Party A responsible party may, subject to section 35, not process personal information concerning a child. Section 34 The Protection of Personal Information Act 4 of 2013 • Exceptions (s35 POPI) • Consent from the competent person • Necessary for establishment, exercise or defence of a right or obligation in law • Necessary to comply with an obligation of international public law • historical, statistical or research purposes
  • 19. Recommendations • Appointment of Information Officer: Enterprise • Appointment of a Risk and Compliance Manager: Agencies • PoPI Audit (Client) PoPI Audit (Project) • Intellectual Property Audit • Information Security Audit • Privacy Policy • Information Security Policy • Intellectual Property Policy • Innovation Management Different rules for different channels, platforms, data sources and applications
  • 20. Pria Chetty Pria.chetty@endcode.org endcode.org THANKS, QUESTIONS?
  • 21. References • http://ico.org.uk/for_organisations/data_protection/security_measures) • http://www.theguardian.com/money/2012/sep/03/do-you-own-your-digital-content • http://www.theguardian.com/technology/2014/oct/08/sir-tim-berners-lee-speaks-out-on-data-ownership? CMP=ema_827 • http://www.bizcommunity.com/Article/75/542/98352.html • http://ico.org.uk/Youth

Editor's Notes

  • #2: As technology legal advisors considering social media law and its impact on businesses, we’re particularly interested in the point at which conversation becomes publication. The very act of conversing online equates to publication which in the legal realm introduces a host of rights and obligations. Of even greater legal importance is the content that makes up that conversation and the implications it has for the creator, compiler, the poster, the hoster, the storer and the recipient of that content. In short, each link in what the law regards as “the chain of publication” carries legal implications.