Print Page   |   Sign In   |   Register
Claudelle von EckChief Executive Officer of the IIA SA

Assessing Your Protection of Personal Identifiable Information (POPI) 22 February 2017
Register Map this EventMap this Event Tell a Friend About This EventTell a Friend

One of the unintended consequences of the information age is the availability of personal identifiable information (PII). The combination of name, date of birth, and Identity Number are the “keys to the kingdom” for the purposes of establishing false identity and fraud. Lost laptops, network break-ins, and phishing expeditions have led governmental entities to establish a patchwork quilt of laws requiring custodians of personal information to provide safeguards PPI.

 Export to Your Calendar 2018-02-22
When: 22 February 2017
Registration starts at 8:00am
Where: Map this event »
7th Avenue, no 7
Block B
Johannesburg, Gauteng  1609
South Africa
Contact: Project Coordinator: CPD and Events

Online registration is available until: 2018-02-22
« Go to Upcoming Event List  

Untitled Document

Presenter/s: Bono Skills Development
Duration: 1 Day
CPD Hours: 8
ex VAT
incl VAT
R2 264.91
R2 582
  R2 745.61
     R3 130

 Course Content:

What Is Personal Identifiable Information (PII)? 

  • Various definitions 
  • Minimum requirements
  • Dynamic framework by locality

The Need for Security over PII 

  • The Protection of Personal Information Act (POPI)
  • Performing a meaningful risk assessment 
  • Selling the results to management 
  • Overcoming “not just security”

Where to Find PII

  • The porous nature of data storage 
  • Traditional computing 
  • Outsourced systems 
  • Data on the move 
  • Into the cloud

What Do We Need? 

  • Establishing criteria 
  • Defining the compliance universe 
  • Identifying the legal requirements 
  • Fulfilling assurance/monitoring requirements 




  • Keeping up with changing technology and compliance 
  • Monitoring and assurance

Action Plan  

  • Building a framework for PII
  • Aggregating compliance requirements 
  • Implementing security measures

Who should attend?

Level 1
Entry or introductory level for those requiring a fundamental understanding of the subject.
Level 2
Internal auditors who are already practicing internal audit and have a basic understanding of the subject
Level 3
Supervisory/competent/senior internal auditors: those who already have a sound, practical grasp of the fundamentals of internal auditing and manage staff
Level 4
For advanced internal auditors: Auditors with excellent understanding of topics being presented, who are interested in exchanging knowledge with instructors and other participants

A 10% discount applies if 2 or more participants from the same company attend this course.
Please be advised of the event terms and conditions.
Delegates are also requested to review the content and the levels of the courses presented before booking, to ensure they are attending the right course.

Sign In
Sign In securely
Upcoming Events

2018-02-01 » 2018-02-02
Building a Sustainable Quality Program (BSQP)1-2 February 2018 JHB

2018-02-06 » 2018-02-07
Excel for Beginners: Tools for Internal Auditors (EXCEL) 6-7 February 2018

2018-02-08 » 2018-02-09
CIA Learning System Instructor-Led Course - Part 1 (CIA1) - 8-9 February 2018

2018-02-21 » 2018-02-23
Performing an Effective Quality Assessment (PEQA) 21-23 February 2018 - Western Cape