privacy | Cybersoc



2.1 Collection, Use and Processing

CyberSOC Africa would collect sensitive and personal data for lawful purpose and only in connection with employment or the provision of managed security services

CyberSOC Africa shall use personal data after seeking Individual’s consent in accordance with ways that the Individual would reasonably expect, and not in a manner that would have unjustified adverse effects on him or her.

CyberSOC Africa shall endeavor to be compliant with the relevant laws and regulations while giving effect to the Policy. However, CyberSOC Africa may process the personal data of any person without the consent of the person concerned for any of the following purposes:
(a) the prevention or detection of crime
(b) the prosecution of offenders

2.2 Data Privacy Obligations for Personal Data

☖ Personal data shall be processed fairly and lawfully.

☖ Personal data shall be obtained only for specified and lawful purposes, and must not be processed in a manner which is incompatible with those purposes.

☖ Personal data must be adequate, relevant and not excessive in relation to the purposes for which it is processed.

☖ Providers of Personal data must, as and when requested, review the Personal data and ensure that the Personal data is accurate and, where necessary, kept up to date;

☖ Personal data processed for any purpose shall not be kept for longer than is necessary or is otherwise required under any other law for the time being in force.

☖ Appropriate measures shall be taken against unauthorized or unlawful processing of Personal data and against accidental loss or destruction of, or damage to, or theft of Personal data;

☖ Personal data shall be transferred only if it is necessary for the performance of a lawful contract between CyberSOC Africa and the transferee entity, subject to prior permission from the provider of Personal data.

2.3 Confidentiality and Security

CyberSOC Africa shall adopt reasonable security practices and procedures, to protect sensitive data and personally identifiable information (PII) from accidental loss, theft, destruction, damage, unauthorized or unlawful processing.

2.4 Data Breaches

This is defined as “a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to sensitive and personal data transmitted, stored or otherwise processed”.

Where there is a claim and/or evidence of data breach the following notification regime below is applied:

☖ Sensitive data breach shall be reported to relevant authority not later than 24 hours after becoming aware of it.

☖ Personal data breach shall be reported to the relevant authority not later than 72 hours after becoming aware of it, unless the personal data breach is unlikely to result in a risk to rights and freedom.

Protect Me

Experiencing a security incident

Contact Us
Whatsapp icon Contact Us