Effective date: 1 February 2022

Pre-Dawn Investments 101 t/a BB Glass is committed to protecting the privacy of personal information of our data subjects. The information you share with us as a data subject allows us to provide you with the best experience with our products and services, or as a stakeholder of Pre-Dawn Investments t/a BB Glass.

Pre-Dawn Investments 101 t/a BB Glass has dedicated policies and procedures in place to protect all personal information collected and processed by us. Please read below for more information on how we collect, process, use and disclose personal information.

Registered address:  3005 Clarence Drive, Bettys Bay, 7141  

Information officer contact details: Annemart Heim, 084 455 5066

Collection of data

Personal data may either be collected directly from you, as data subject, or it may be collected from other sources such as:

  1. Related customer / data subject
  2. From your employing company
  3. Through credit checks
  4. Through the use of cookies on our website
  5. Through security companies
  6. Through builders, contractors or architects
  7. Through renting agents

Where information is not collected directly from you as a data subject, we will take reasonable steps to inform you of the fact that the information was collected and will be processed.

You must not send us personal information about someone else without first getting his or her consent for it to be used and disclosed in the ways set out in this terms and conditions. This is because we will assume he or she has consented although we may still ask for confirmation from them. Where you do give us information about someone else, or someone else discloses a connection with you, that information may be taken into account with your other personal information.

Prospective employees

In applying for this position you may provide us with personal information as part of the application process. We may also obtain personal information while performing the required background check, reference check and credit check if relevant.

The personal information that may be obtained during this process is as follows:

 

 

 

Personal information

Processed?

Purpose for processing

Is the information adequate, relevant and not excessive?

Information collected from

Collection and processing documentation

We are allowed to process the data because

language and birth of the person

Yes

Languages and Communication important for Office / customer environment

Yes

Data subject

Verbal interview and on CV received

processing is necessary to carry out actions for the conclusion or performance of a contract to which the data subject is party

Education history

Yes

Certain positions require minimum of Matric qualification

Yes

Data subject

CV's and certificates received during screening

processing is necessary to carry out actions for the conclusion or performance of a contract to which the data subject is party

financial history

Yes

Depending on the position the successful candidate might have to giver permission for us to conduct a credit check as part of the employment process.  This is only done if the person will be handling cash.

Yes

Other source with consent from Data Subject

Consent form signed by data subject with ID number

processing is necessary to carry out actions for the conclusion or performance of a contract to which the data subject is party

employment history

Yes

Employment history important to note for specific positions available. 

Yes

Data subject

CV's received during screening

processing is necessary to carry out actions for the conclusion or performance of a contract to which the data subject is party

ID number

Yes

Successful employees will required to provide ID number and copy of their ID for SARS / PAYE / BIBC purposes

Yes

Data subject

ID number and copy of ID received on the day they successful candidates starts employment

processing complies with an obligation imposed by law on the responsible party

e-mail address

Yes

Information is requested on advertising of positions and email addresses collected for communication purposes

Yes

Data subject

Details received on CV / application when applying for the position

processing complies with an obligation imposed by law on the responsible party

physical address

Yes

Information is requested on advertising of positions and addresses collected for communication purposes

Yes

Data subject

Details received on CV / application when applying for the position

processing complies with an obligation imposed by law on the responsible party

telephone number

Yes

Information is requested on advertising of positions and contact numbers are collected for communication purposes

Yes

Data subject

Details received on CV / application when applying for the position

processing is necessary to carry out actions for the conclusion or performance of a contract to which the data subject is party

The views or opinions of another individual about the person

Yes

References will be done for successful candidates - this will be done with permission of data subject and contact details provided

Yes

Data subject

Reference details on CV provided alternatively requested electronically in order to process application successfully. 

processing is necessary to carry out actions for the conclusion or performance of a contract to which the data subject is party

 

Employees

Pre-Dawn Investments 101 t/a BB Glass must process personal information of their employees for various legal and employment purposes. The information that will be processed is as follows:

Personal information

Processed?

Purpose for processing

Is the information adequate, relevant and not excessive?

Information collected from

Collection and processing documentation

We are allowed to process the data because

 

 

 

 

 

 

 

 

language and birth of the person

Yes

Languages and Communication important for Office / customer environment

Yes

Data subject

Verbal interview and on CV received from employee when they applied for the position

processing is necessary to carry out actions for the conclusion or performance of a contract to which the data subject is party

 

Education history

Yes

Certain positions require minimum of Matric qualification

Yes

Data subject

CV's and certificates received during screening

processing is necessary to carry out actions for the conclusion or performance of a contract to which the data subject is party

 

financial history

Yes

Depending on the position the successful candidate might have to giver permission for us to conduct a credit check as part of the employment process.  This is only done if the person will be handling cash.

Yes

Other source with consent from Data Subject

Consent form signed by data subject with ID number

processing is necessary to carry out actions for the conclusion or performance of a contract to which the data subject is party

 

employment history

Yes

Employment history important to note for specific positions available. 

Yes

Data subject

CV's received during screening

processing is necessary to carry out actions for the conclusion or performance of a contract to which the data subject is party

 

ID number

Yes

Successful employees will required to provide ID number and copy of their ID for SARS / PAYE / BIBC purposes

Yes

Data subject

ID number and copy of ID received on the day they successful candidates starts employment

processing complies with an obligation imposed by law on the responsible party

 

e-mail address

Yes

Information is requested on advertising of positions and email addresses collected for communication purposes

Yes

Data subject

Details received on CV / application when applying for the position

processing complies with an obligation imposed by law on the responsible party

 

physical address

Yes

Information is requested on advertising of positions and addresses collected for communication purposes

Yes

Data subject

Details received on CV / application when applying for the position

processing complies with an obligation imposed by law on the responsible party

 

telephone number

Yes

Information is requested on advertising of positions and contact numbers are collected for communication purposes

Yes

Data subject

Details received on CV / application when applying for the position

processing is necessary to carry out actions for the conclusion or performance of a contract to which the data subject is party

 

The views or opinions of another individual about the person

Yes

References will be done for successful candidates - this will be done with permission of data subject and contact details provided

Yes

Data subject

Reference details on CV provided alternatively requested electronically in order to process application successfully. 

processing is necessary to carry out actions for the conclusion or performance of a contract to which the data subject is party

 

 

Customers

In order for us to provide you with the best service, we need to collect and process personal information from you as a customer. This information will consist of the following:

Personal information

Processed?

Purpose for processing

Is the information adequate, relevant and not excessive?

Information collected from

Collection and processing documentation

We are allowed to process the data because

 

 

 

 

 

 

 

e-mail address

Yes

We request an email address for correspondence and to send an invoice and statement

Yes

Data subject

The email address is received telephonically or in the office from the client when we conduct work for them

processing is necessary to carry out actions for the conclusion or performance of a contract to which the data subject is party

physical address

Yes

For the business to conduct services we require a physical address for site visit to provide a quote for work to be done / maintenance or urgent call outs due to baboon damage or break ins

Yes

Data subject

The physical address is received telephonically or in person when the client / data subject requests work to be done at their premises

processing is necessary to carry out actions for the conclusion or performance of a contract to which the data subject is party

telephone number

Yes

We request telephone number for correspondence and to keep in contact with the client

Yes

Data subject

The telephone number is received telephonically or in person when the client requests work to be done by us

processing is necessary to carry out actions for the conclusion or performance of a contract to which the data subject is party

 

Pre-Dawn Investments 101 t/a BB Glass will keep your personal information confidential at all times, however, you agree and consent that Pre-Dawn Investments 101 t/a BB Glass may:

  1. Communicate with you electronically in relation with the service or product being provided (email, fax, telephone or through any other relevant or secured electronic platform)
  2. Obtain any relevant personal information, from any person or institution, necessary to comply with the agreement between you and Pre-Dawn Investment 101 t/a BB Glass
  3. Obtain credit information from any person or institution where necessary
  4. Verify the information provided herein and to contact other third party for purposes of the same
  5. Disclose personal information to regulatory or government agencies in accordance with the relevant legislation or directive
  6. Use personal information to market new or other products of the company which may be suitable or relevant to you

 

Individuals screened for COVID 19

The following needs to be explained verbally to anyone who needs to complete documentation with personal information for COVID 19 Screening. It may also be documented on the document to be completed:

The personal information collected is necessary to comply with the COVID 19 screening as required by the Disaster management Act and supplementary regulations and directives. This information will be kept confidential unless disclosure is required by law. E.g. should a positive case be identified. This information will be stored for a period of 1 year and thereafter be destroyed. If you do not provide the information as required, we can limit or refuse you access to the premises.

CCTV Monitoring

The premises of Pre-Dawn Investments 101 t/a BB Glass is monitored by CCTV footage. This footage is only processed for security purposes and not shared with any person or entity outside the company. CCTV footage is retained for a period of 2 weeks after which it is destroyed.

Consent

Where the legal basis for us processing your personal information is consent as above, it will be included in the contract or agreement concluded with you. This consent may be withdrawn at any time, however this withdrawal of consent will not make processing we undertook before your withdrawal unlawful. You will not suffer any detriment for withdrawing your consent.

You may withdraw your consent by contacting our information officer, whose details are provided at the beginning of the privacy policy.

Where the legal basis for processing is for the proper performance of the contract, and you fail to provide us with the information or request us to stop processing this information, it may create limitations on our performance of the contract or agreement.

Sharing information

In processing your personal information, we may share it with third party processors under an operator’s agreement. These include but are not limited to:

  1. Builders, Contractors, Architects
  2. Rental agents
  3. Security companies
  4. BIBC
  5. AAAMSA
  6. Accountants

As an operator, these service providers will not be able to process or use your data for any reason other than to provide the service as required by us. They also need to implement proper safeguards to ensure the personal information is secured at all times.

Retention

Pre-Dawn Investment 101 t/a BB Glass is required to comply with various different legislative retention periods, which leads to different retention requirements. As such we have opted for the longest retention period required from us for legal purposes and apply this to all our data. Your personal information will be kept for a period of 5 years in order for us to comply with all legal requirements.

Your legal rights

You have the following rights under the Protection of Personal Information Act:

  1. Request access to your personal information
  2. Request a correction or deletion of personal information
  3. Object to the processing of personal information
  4. Lodge a complaint to the Information Regulator

If you want to exercise any of the rights described above, or are dissatisfied with the way we have used your personal information, please contact the information officer.

Changes to this policy

This policy may change from time to time. The latest effective date will be highlighted at the start of the privacy policy.

Cookies Notice

 

Our Website makes use of cookies to provide, improve, protect, and promote our Services. These cookies are used to collect information about how you interact with our website. Personal information that may be stored may include your name, surname, username, email address and contact details.

Cookies help us remembering you for your next visit and understanding how you are interacting with our Services in order to improve and customize your browsing experience. You can set your browser to not accept cookies, but this may limit your ability to use the services.

Information Technology Policy

Internet Usage

  • EMPLOYEES with internet access may not abuse the EMPLOYER’S internet facility for personal purposes. The EMPLOYER is entitled to monitor any EMPLOYEE’S internet usage and to remove the EMPLOYEE’S access to the internet at its sole discretion. 
  • The EMPLOYEE may not use the internet facility to:
    • Host or display personal web pages.
    • Download any documents or images not related to the EMPLOYER’S business.
    • Access, download or post any documents, images, materials or statements which are prohibited by any legislation or which may reasonably be construed as being undesirable, sexually explicit, profane, obscene, intimidating, defamatory, discriminatory, harassing, racially or religiously prejudicial or which would constitute an infringement of a third party’s intellectual property rights (collectively “PROHIBITED MATERIAL”).
    • Subscribe to or participate in chat groups, bulletin boards, news groups or discussion groups not related to the EMPLOYER’S business.
    • Post or transmit the EMPLOYER’S CONFIDENTIAL INFORMATION, including usernames, passwords, security codes, or service specific information which would assist any person to gain unauthorised access to the EMPLOYER’S COMPUTER SYSTEM, save without the prior approval of MANAGEMENT.
    • Knowingly introduce viruses into the EMPLOYER’S COMPUTER SYSTEM.
    • Share personal information of any data subject of the entity obtained as a result of being an employee.
  • No EMPLOYEE may use another EMPLOYEE’S internet facility unless authorised by MANAGEMENT.

Email Usage

  •  
    • The email facility must be used for business purposes only.
    • It is accepted that the EMPLOYEE may receive personal email provided that it is in the form of text messages only and does not include attachments in the form of video clips, executable files, graphic files, etc. It is also accepted that the EMPLOYEE may use the email facility for personal purposes but that the EMPLOYEE’S use as aforesaid is incidental to the business purpose.  Any abuse of the email facility by the EMPLOYEE may result in the EMPLOYEE being refused permission to use the email facility for personal purposes.
    • The EMPLOYEE may not use the email facility to:
      • Initiate or forward any chain message or other message which asks the recipient to forward the message to multiple other users, unless such message is required for purposes of the EMPLOYER’S business.
      • Send unsolicited commercial email to persons with whom the EMPLOYER has no prior relationship.
      • Send or receive email messages, files or attachments in excess of 2 megabytes (or any other size as may be determined/stipulated by MANAGEMENT from time to time), unless required for purposes of the EMPLOYER’S business.
      • Send, download, display or store PROHIBITED MATERIAL. If any PROHIBITED MATERIAL is inadvertently received, the incident must be immediately reported to MANAGEMENT.
    • No EMPLOYEE may use another EMPLOYEE’S email facility unless authorised by MANAGEMENT.
    • The EMPLOYEE may not disguise his identity when using the email.
    • The EMPLOYEE may not alter the “from” line or any other indication of the origin of the email message.
    • The EMPLOYEE must adhere to the email operating procedures as issued from time to time.
    • All email correspondence sent or received in which an opinion is expressed or information is requested or given must be saved under Client Data in the applicable client folder in accordance with the procedure for the saving and naming of files on the network OR a hard copy of the email correspondence must be filed in the correspondence file for the particular client.
    • No EMPLOYEE may express an opinion or bind the EMPLOYER in email correspondence unless approved by MANAGEMENT.
    • When receiving emails from clients, personal information contained in these emails must be kept confidential.
      • Where possible, emails must be acted upon and deleted as soon as possible,
      • Emails will not be forwarded outside the company unless the client requested this.

Disclaimer

3.1          The EMPLOYEE will ensure that every email message sent contains the disclaimer at the end of such message.

3.2          No EMPLOYEE is permitted to alter the content of the disclaimer.

3.3          No EMPLOYEE is permitted to change the set up of the email or the signatory clause at the end of the email message.

Computer Usage

4.1          The IT Consultant is required to carry out all maintenance and support of the EMPLOYER’S COMPUTER SYSTEM.  No EMPLOYEE may attempt to repair the EMPLOYER’S COMPUTER SYSTEM, or any part thereof.

4.2          The EMPLOYER has licensed or developed certain software for use on its COMPUTER SYSTEM.

4.3          So as to ensure that the EMPLOYER complies with its obligations in terms of the software licenses and in order to protect the EMPLOYER’S proprietary interest, no EMPLOYEE may:

4.3.1      Use any unlicensed software on the COMPUTER SYSTEM. 

4.3.2      Install any other licensed software on the COMPUTER SYSTEM, save with the prior approval of MANAGEMENT.

4.3.3      Copy the software on the COMPUTER SYSTEM for use on any other computer.

4.3.4      Modify, revise or adapt any software used on the COMPUTER SYSTEM.

4.4          The EMPLOYER reserves the right to inspect any COMPUTER SYSTEM used by the EMPLOYEE to ensure that the EMPLOYEE complies with his obligations regarding software.

4.5          The EMPLOYEE may not access, download, store, display or post any PROHIBITED MATERIAL on the COMPUTER SYSTEM.

4.6          No EMPLOYEE may use another EMPLOYEE’S computer unless authorised by MANAGEMENT.

Security

5.1          Each EMPLOYEE must ensure that their computers are adequately protected against theft and damage.   In this regard, any portable computer must be secured by a security cable at the WORKPLACE or at the client’s premises.

5.2          All EMPLOYEES are responsible for ensuring the security, integrity and confidentiality of all data stored on the local memory of their computer, in particular any client data.  In this regard, any flash disk used to store data must be securely kept at all times.  If the EMPLOYEE is out of the office for extended periods of time, such EMPLOYEE is required to regularly store such data on the EMPLOYER’S COMPUTER SYSTEM.

5.3          If any device is stolen, the employee should report it immediately and steps should be taken to change all access passwords.

5.4          Employees should under no circumstances store any information on memory sticks, unless such memory sticks are password protected.

Virus Protection

  • The EMPLOYEE must ensure that the latest anti-virus protection software provided by the EMPLOYER has been installed on their computer and is permanently enabled.
  • If a virus is detected, the EMPLOYEE must immediately notify the IT Administrator.
  • Access to the Employer’s COMPUTER SYSTEM
  • Only EMPLOYEES who are authorised users may have access to the EMPLOYER’S COMPUTER SYSTEM.
  • No EMPLOYEE may access, copy, alter or delete the data or files on the COMPUTER SYSTEM, save for the express consent of MANAGEMENT.
  • The EMPLOYEE is required to keep his username and password confidential and may not disclose it to any other person unless authorised by MANAGEMENT or unless required by the IT Consultant.
  • No EMPLOYEE is permitted to use any other EMPLOYEE’S username or password to access the COMPUTER SYSTEM, unless authorised by MANAGEMENT.
  • To assist EMPLOYEES to keep their password confidential, the following standards must be adhered to:
  • Passwords should not be printed or stored in any manner or form.
  • Passwords should have a minimum length of seven alpha numerical characters and may not be repeated within six changes of each other.
  • Obvious passwords should be avoided.

General

    • The EMPLOYER expects professional and moral conduct from its EMPLOYEES at all times. Accordingly, all EMPLOYEES are expressly prohibited from sending, receiving or downloading material either off the Internet, or through their email addresses, constituting PROHIBITED MATERIAL, whether written, in picture or in cartoon format.
    • The EMPLOYEE agrees that no email, even if it is addressed to him personally, is considered confidential, nor is his use of the EMPLOYER’S internet, use of the EMPLOYER’S intranet, use of the EMPLOYER’S electronic communication systems or use of the EMPLOYER’S COMPUTER SYSTEMS (including computers owned by the EMPLOYER) considered confidential.
    • The EMPLOYEE agrees that the EMPLOYER reserves the right to open and read all such communications, to intercept, monitor, filter, block and act upon his use of the email, internet, intranet, electronic communication systems or COMPUTER SYSTEMS (including computers owned by the EMPLOYER) and, if necessary, to return, re-direct or refer undesirable communication to any third party.
    • The EMPLOYEE agrees that he will have no claim of any nature whatsoever against the EMPLOYER for any losses, damages, costs or expenses arising out of or in connection with his use of the EMPLOYER’S email, internet, intranet, electronic communication systems or COMPUTER SYSTEMS (including computers owned by the EMPLOYER) for personal purposes and has indemnified the EMPLOYER in respect thereof.
    • Should any EMPLOYEE breach the terms of this policy, formal disciplinary action will be taken against him and the EMPLOYER may charge the EMPLOYEE concerned with the cost of the usage of the internet/Email facility. Any breach by the EMPLOYEE of the provisions of this policy will be considered by the EMPLOYER in an extremely serious light and may result in the termination of the services of an EMPLOYEE.

PROCEDURE FOR THE SAVING AND NAMING OF FILES ON THE NETWORK

    • The procedure for the naming, saving, referencing and typing of all correspondence, documents and financial statements is set out in this policy.
    • All EMPLOYEES are obliged to adhere to this policy. Should any EMPLOYEE breach the terms of this policy, formal disciplinary action may be taken against him.
    • EMPLOYEES are not allowed to save any document, file, correspondence, letter’s contract or any other document of any other nature on their local drives.
    • All documents must at all times be save on the network under a relevant folder created by MANAGEMENT. In the event of a hardware failure, theft or damages to a computer for whatever reason EMPLOYEES will be held personally responsible for the loss of any data that was saved on the local drives and not on the network.
    • Anything that is filed in the wrong place will be moved or deleted without further notice.
    • Disciplinary action may be instituted against staff who do not follow this procedure.

Email Disclaimer

Personal information contained in emails received from clients will only be processed for the purposes obtained as disclosed in our privacy policy. Data subjects who email Pre-Dawn Investments 101 t/a BB Glass notes that even though personal information contained in emails may not be processed, it will be stored on the email server as part of the received email itself. Pre-Dawn Investments 101 t/a BB Glass has safeguards in place to ensure the confidentiality of this personal information.

 

  

Operator clauses for data processing agreement

 

Where you are the responsible party, you need to ensure that there is an agreement in place between you and the operator regarding the data that may be processed by the operator. This agreement will either be in the form of a signed contract, or it may be as simple as accepting the terms and conditions of the operator.

The other party to the contract may already have wording in place. In this instance you will have to review it to ensure it complies with the following requirements:

  1. It details the information that will be processed, and the reason for that processing;
  2. It confirms the fact that information will only be processed as authorised by the responsible party;
  3. The operator undertakes to treat information confidentially and not disclose it unless required by law or regulations;
  4. The operator undertakes to notify the responsible party immediately where there are reasonable grounds to believe that the personal information of a data subject has been accessed or acquired by any unauthorised person;
  5. The operator implements safeguards to protect the integrity of, and access to, the data.

The following example wording can be used to create a clause to add to template contracts, existing contracts as an addendum, or in the terms and conditions accepted by clients. It must be edited as necessary:

Privacy policy and Data Protection

The following personal information will be collected and processed in terms of this agreement:

Personal Information

Reason for processing

Name, Surname and ID number of employee

To process monthly salary for payroll purposes

Name, Surname and ID number of employee

To submit to BIBC

Name, Surname, email and telephone number of the client

To AAAMSA for the COC

 

Name, Surname, email and telephone number of the builder

To AAAMSA for the COC

 

The information will only be processed for the reasons agreed upon between the Responsible party and the Operator as provided for above. The Operator will not process the information for any other reason or by any other means.

All personal information received as part of providing the services will be treated as confidential. It may happen that information needs to be shared in order to provide the required services, or as requested by laws and regulations.

The responsible party acknowledges that information may be shared as follows:

 

Parties information may be shared with

Reason for sharing information

Accountants

For pay roll purposes

BIBC

For employee benefit purposes

AAAMSA

For COC purposes

 

Where information needs to be provided to outside third parties in compliance with laws and regulations, the operator will ensure that a transparent approach is followed unless prohibited by the specific law or regulation that needs to be complied with. This means that requests for information will be communicated to the responsible party as far as possible.

The following security measures are implemented to protect the integrity of, and access to, the data:

Physical document in a file cabinet

Desktop computer

 Risks to information

Safeguard/s over risk

 Risks to information

Safeguard/s over risk

Loss of Data

Locked up filling cabinet

Loss of data - computer crashing

Monthly backup policy

Unauthorised access or theft of data

Access controls such as locked cabinets, monitored alarm system with armed response

Loss of data - ransomware

Antivirus, firewalls and IT policy - suspicious links

Unauthorised sharing of data

Access controls and confidentiality agreements

Unauthorised access - hacking

Antivirus, firewalls and IT policy - suspicious links

Inaccurate and outdated data

Destroy inaccurate and outdated data by shredding the physical documents or deleting electronic documents

unauthorised access to physical computer

Access controls to premises as well as username and password for computers

Employees sharing information

Confidentiality agreements and training to educate employees not to share information

Loss of data - theft of computers

backup policy and access controls by means of unique passwords for each computer

 

 

Laptop

Memory stick

 Risks to information

Safeguard/s over risk

 Risks to information

Safeguard/s over risk

Loss of data - computer crashing

Monthly backup policy

Loss of data - losing memory stick

Locked up in safe

Loss of data - ransomware

Antivirus, firewalls and IT policy - suspicious links

Loss of data and unauthorised access - theft of memory stick

Not making use of memory sticks

Unauthorised access - hacking

Antivirus, firewalls and IT policy - suspicious links

 

 

unauthorised access to physical computer

Access controls to premises as well as username and password for computers

 

 

Loss of data - theft of computers

Back up policy and access controls by means of unique passwords for each laptop

 

 

 

Hard drive - external

Server/network

 Risks to information

Safeguard/s over risk

 Risks to information

Safeguard/s over risk

Loss of data - losing hard drive

Locked up in safe

Computer / systems crashing

Monthly back ups, firewall and antivirus

Loss of data and unauthorised access

Locked up in safe

Unauthorised access - hacking

Monthly back ups, firewall and antivirus

 

Email

Cloud application

 Risks to information

Safeguard/s over risk

 Risks to information

Safeguard/s over risk

Loss of data

Monthly back ups, firewalls, antivirus and password

unauthorized access

Firewalls and antivirus

Computer crashing

Monthly back ups, firewalls, antivirus and password

 

 

Unauthorised access

Locked in alarm secured, armed response office

 

 

 

Where there is a breach or suspected breach of personal information, the operator will inform the Responsible party as soon as reasonably possible. The following information must be disclosed:

  1. Date of breach;
  2. Extent of breach;
  3. Personal information implicated in breach;

Liability of operator

As per the Protection of Personal Information Act, the responsible party will be held liable for breach of information unless the operator acted outside their mandate. As such it is important that the Responsible party and the Operator discuss indemnities from the operator to be included in the agreement. For example requiring the operator to reimburse the responsible party for any penalty that is imposed on it by the information operator where the breach was due to the negligence or non-compliance of the Operator.