Data Protection Policy
Effective Date: 1 August 2025
Last Updated: 1 August 2025
1. Introduction
Legacy Vault SA is committed to protecting personal information in accordance with the Protection of Personal Information Act (POPIA) and other applicable South African data protection laws. This policy outlines our approach to data protection and information security.
2. Legal Framework
Our data protection practices comply with:
- Protection of Personal Information Act (POPIA): Primary data protection legislation
- Financial Intelligence Centre Act (FICA): Financial sector compliance requirements
- Promotion of Access to Information Act (PAIA): Information access rights
- Electronic Communications and Transactions Act (ECTA): Electronic transaction security
- Consumer Protection Act (CPA): Consumer information rights
3. Data Protection Principles
We adhere to the following POPIA principles:
3.1 Accountability
We take responsibility for compliance with data protection conditions and can demonstrate such compliance.
3.2 Processing Limitation
Personal information is processed lawfully, fairly, and transparently for specific, explicitly defined purposes.
3.3 Purpose Specification
We collect information for specific, explicitly defined, and legitimate purposes.
3.4 Further Processing Limitation
Information is not processed beyond the original purpose unless legally required or with consent.
3.5 Information Quality
We ensure personal information is complete, accurate, and up-to-date.
3.6 Openness
We maintain clear documentation about information processing and make it available to data subjects.
3.7 Security Safeguards
Appropriate technical and organizational measures protect against unauthorized access, loss, or damage.
3.8 Data Subject Participation
Individuals have rights regarding their personal information, which we respect and facilitate.
4. Technical Security Measures
4.1 Data Encryption
- All data transmitted is encrypted using TLS 1.3 or higher
- Data at rest is encrypted using AES-256 encryption
- Database encryption for sensitive financial information
- Encrypted backups with secure key management
4.2 Access Controls
- Multi-factor authentication for all user accounts
- Role-based access control (RBAC) systems
- Regular access reviews and deprovisioning
- Privileged access management for administrative functions
4.3 Infrastructure Security
- Secure cloud hosting with ISO 27001 certified providers
- Regular security patching and updates
- Network segmentation and firewall protection
- Intrusion detection and monitoring systems
5. Organizational Security Measures
5.1 Staff Training
- Regular POPIA and data protection training
- Cybersecurity awareness programs
- Incident response training
- Professional ethics and confidentiality training
5.2 Policies and Procedures
- Data handling and processing procedures
- Incident response and breach notification protocols
- Data retention and disposal policies
- Third-party vendor security requirements
6. Data Breach Response
In the event of a data breach, we will:
- Immediate Response (0-24 hours): Contain the breach and assess the scope
- Investigation (24-72 hours): Determine cause, impact, and affected individuals
- Notification (72 hours): Report to Information Regulator if required
- Communication (without delay): Notify affected individuals if high risk to rights
- Remediation: Implement measures to prevent recurrence
- Documentation: Maintain records of incident and response
7. Cross-Border Data Transfers
When transferring personal information outside South Africa, we ensure:
- Recipient country has adequate protection level
- Appropriate safeguards are in place (contracts, certifications)
- Data subject consent where required
- Compliance with POPIA cross-border transfer conditions
8. Data Subject Rights
Under POPIA, you have the right to:
- Access: Request copies of your personal information
- Correction: Update inaccurate or incomplete information
- Deletion: Request erasure of personal information (subject to legal obligations)
- Objection: Object to processing in certain circumstances
- Restriction: Request limitation of processing
- Portability: Receive information in a structured, commonly used format
- Complaint: Lodge complaints with the Information Regulator
9. Information Officer
Our designated Information Officer is responsible for:
- Monitoring compliance with POPIA and this policy
- Handling data subject requests and complaints
- Liaising with the Information Regulator
- Conducting privacy impact assessments
- Training staff on data protection requirements
10. Regular Reviews and Updates
This Data Protection Policy is reviewed annually or when significant changes occur to:
- Data protection legislation
- Our business operations or technology systems
- Industry best practices and standards
- Regulatory guidance or enforcement actions