Data Protection

Total 17 Posts

Based on this programmer's research is effectively spyware

TikTok has been labeled as effectively "legitimate spyware" by a software programmer who managed to reverse engineer its source code and leak it on GitHub. TikTok's legal counsel has since had the code taken down through a DMCA takedown request.

6 Ways to keep information safe in the digital age

If you are on the internet daily, your digital security should be a top priority. Hackers are becoming more skilled at cracking your passwords and accessing sensitive information like your address, credit card numbers, social security numbers, business documents, etc. Be sure to take threats to your digital security seriously

The 12th edition of the Cyber Law in Africa conference announced

The aim of the conference is also to engage with the solutions available to various professionals in ensuring that the cyber-related activities and existence of their organizations fall within the ambit of protection of laws and legal instruments.

Understanding the age of data

If data is the new oil, giving out your personal data indiscriminately is like allowing any person who comes your way to set up an oil rig on your private property. Kenyans need to be more vigilant.

The role of privacy regulation in fighting cybercrime

Isabella Hofmeyr-Pretorius, Legal Advisor, Capitec Bank (South Africa), and Alice Namuli Blazevic, Partner Head Technology and Innovation, Katende, Ssempebwa & co Advocates (Uganda), discuss how data privacy regulation plays a role in curbing cybercrime.

South Africa's notable data breaches and data leaks in the past half-decade

For the past 5 years, South Africa has experienced some notable and rather concerning data breaches and leaks. More concerning is also that none of the businesses or organizations have been officially investigated or suffered any punishment.

How the WHOIS service exposes personal data

When you publicly provide information to WHOIS such as an address, phone number, and e-mail address associated with a domain name, you are giving a potential hacker a starting point where they can hijack the domain.