enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Protection of Personal Information Act, 2013 - Wikipedia

    en.wikipedia.org/wiki/Protection_of_Personal...

    The Protection of Personal Information Act (PoPIA or the PoPI Act) is a piece of legislation which governs the law of data protection and privacy in South Africa. [1] The act was passed to regulate the right to privacy, as enshrined by section 14 of the Constitution of South Africa, and would work in conjunction with the Promotion of Access to Information Act.

  3. Cyber-security regulation - Wikipedia

    en.wikipedia.org/wiki/Cyber-security_regulation

    A cybersecurity regulation comprises directives that safeguard information technology and computer systems with the purpose of forcing companies and organizations to protect their systems and information from cyberattacks like viruses, worms, Trojan horses, phishing, denial of service (DOS) attacks, unauthorized access (stealing intellectual property or confidential information) and control ...

  4. Regulation of Interception of Communications and Provision of ...

    en.wikipedia.org/wiki/Regulation_of_Interception...

    The Regulation of Interception of Communications and Provision of Communication-Related Information Act (RICA) [1] is a South African law that regulates the interception of communications and associated processes such as applications for and authorisation of interception of communications.

  5. Internet censorship in South Africa - Wikipedia

    en.wikipedia.org/wiki/Internet_censorship_in...

    Digital media freedom is generally respected in South Africa. Political content is partially censored, with a number of incidents. [2] The Freedom of the Press Report lists South Africa as being among the countries with one of the biggest declines in press freedom, dropping four places. It is now being seen as only “partly free”.

  6. Information security standards - Wikipedia

    en.wikipedia.org/wiki/Information_security_standards

    Information security standards (also cyber security standards [1]) are techniques generally outlined in published materials that attempt to protect a user's or organization's cyber environment. [2] This environment includes users themselves, networks, devices, all software, processes, information in storage or transit, applications, services ...

  7. SEC filing - Wikipedia

    en.wikipedia.org/wiki/SEC_filing

    The SEC filing is a financial statement or other formal document submitted to the U.S. Securities and Exchange Commission (SEC). Public companies , certain insiders, and broker-dealers are required to make regular SEC filings.

  8. Regulation S-X - Wikipedia

    en.wikipedia.org/wiki/Regulation_S-X

    Regulation S-X and the Financial Reporting Releases (Staff Accounting Bulletins) set forth the form and content of and requirements for financial statements required to be filed as a part of (a) registration statements under the Securities Act of 1933 and (b) registration statements under section 12, [2] annual or other reports under sections 13 [3] and 15(d) [4] and proxy and information ...

  9. Internet security - Wikipedia

    en.wikipedia.org/wiki/Internet_security

    Its objective is to establish rules and measures to use against attacks over the Internet. [2] The Internet is an inherently insecure channel for information exchange, with high risk of intrusion or fraud, such as phishing, [3] online viruses, trojans, ransomware and worms.