KITE 2025 New Product Award — Local IT | SACEEC

POPIA Compliance Checklist: A Practical Guide for South African Businesses

A step-by-step POPIA compliance checklist to help South African organisations meet their obligations under the Protection of Personal Information Act.

Free PDF GuideDownload this guide as a PDF

The Protection of Personal Information Act (POPIA) is South Africa's comprehensive data protection law. Since its full enforcement on 1 July 2021, every organisation that processes personal information of South African data subjects must comply — or face penalties of up to R10 million, imprisonment, and reputational damage. This guide provides a practical, structured checklist to help your organisation achieve and maintain POPIA compliance.

What Is POPIA?

POPIA (Protection of Personal Information Act, Act 4 of 2013) is South Africa's data protection legislation. It regulates how organisations collect, store, process, and share personal information. POPIA gives individuals (called data subjects) rights over their personal information and places obligations on organisations (called responsible parties) that process that information.

POPIA is administered and enforced by the Information Regulator, an independent body established under the Act. The Information Regulator has the power to investigate complaints, conduct assessments, issue enforcement notices, and impose penalties.

Key definitions under POPIA:

  • Personal information: Any information relating to an identifiable, living, natural person or an existing juristic person — including name, ID number, email address, location data, biometric data, and even opinions about the person
  • Special personal information: Religious or philosophical beliefs, race or ethnic origin, trade union membership, political persuasion, health or sex life, biometric information, and criminal behaviour (Section 26)
  • Responsible party: The organisation that determines the purpose and means of processing personal information
  • Operator: A third party that processes personal information on behalf of the responsible party (similar to a "data processor" under GDPR)
  • Data subject: The person whose personal information is being processed
  • Information officer: The person registered with the Information Regulator who is responsible for POPIA compliance within the organisation
i

POPIA Applies to Juristic Persons Too

Unlike GDPR, which only protects natural persons, POPIA also protects the personal information of juristic persons (companies, trusts, close corporations). This means B2B data handling is also subject to POPIA requirements.

Who Must Comply with POPIA?

POPIA applies to every organisation — public or private, large or small — that processes personal information within South Africa, or that uses automated or non-automated means within South Africa to process personal information, even if the responsible party is domiciled outside South Africa.

This includes:

  • Private companies of all sizes — from sole proprietors to listed corporations
  • Public sector bodies — government departments, municipalities, state-owned entities
  • Non-profit organisations — NGOs, churches, schools, community organisations
  • Professional practices — law firms, accounting firms, medical practices, consultancies
  • Foreign organisations that process personal information of South African data subjects

There are limited exemptions under Section 6 and 7 — including processing for purely personal or household activities, processing by or on behalf of a public body for national security purposes, and processing for journalistic, literary, or artistic purposes. However, these exemptions are narrow and should not be assumed without legal advice.

The 8 Conditions for Lawful Processing

POPIA establishes eight conditions that must be satisfied for personal information processing to be lawful. These conditions form the backbone of POPIA compliance and should guide every data processing activity in your organisation.

Condition POPIA Section Summary
1. Accountability Section 8 The responsible party must ensure compliance with all POPIA conditions and must be able to demonstrate compliance
2. Processing Limitation Sections 9–12 Personal information must be processed lawfully, for a specific purpose, and must be adequate, relevant, and not excessive
3. Purpose Specification Sections 13–14 Personal information must be collected for a specific, explicitly defined, and lawful purpose, and must not be retained longer than necessary
4. Further Processing Limitation Section 15 Further processing must be compatible with the original purpose for which the information was collected
5. Information Quality Section 16 The responsible party must take reasonable steps to ensure personal information is complete, accurate, not misleading, and updated where necessary
6. Openness Sections 17–18 Processing must be transparent — data subjects must be notified of the collection and purpose of processing
7. Security Safeguards Section 19 Appropriate technical and organisational measures must be in place to prevent loss, damage, or unauthorised access to personal information
8. Data Subject Participation Sections 23–25 Data subjects have the right to access, correct, and delete their personal information

Want the full framework with worked examples?

Key POPIA Sections Explained

While all sections of POPIA are important, four sections consistently present the greatest compliance challenges for organisations. Understanding these sections in detail is essential for building an effective compliance programme.

Section 19 — Security Safeguards

Section 19 is often the most complex requirement to implement and evidence. It requires the responsible party to secure the integrity and confidentiality of personal information by taking "appropriate, reasonable technical and organisational measures" to prevent:

  • Loss of, damage to, or unauthorised destruction of personal information
  • Unlawful access to or processing of personal information

The Act requires that measures must be "appropriate" — meaning they should be proportional to the sensitivity of the information, the nature of the processing, and the risks involved. Organisations must also take "reasonable measures" to identify all reasonably foreseeable internal and external risks, establish and maintain appropriate safeguards, regularly verify that safeguards are effectively implemented, and ensure safeguards are continually updated in response to new risks or deficiencies.

!

Section 19 Requires Ongoing Verification

It is not enough to implement security safeguards once. Section 19(2) explicitly requires that you "regularly verify that the safeguards are effectively implemented" and "continually update the safeguards in response to new risks or deficiencies." This means security safeguard compliance requires continuous monitoring — not a one-time assessment. Linking Section 19 safeguards to a live risk register ensures ongoing verification.

Section 11 — Consent

Section 11 establishes the grounds for lawful processing. While consent is the most commonly cited ground, POPIA provides several alternatives:

  • Consent — The data subject has consented to the processing (Section 11(1)(a))
  • Contractual necessity — Processing is necessary for a contract with the data subject (Section 11(1)(b))
  • Legal obligation — Processing is required by law (Section 11(1)(c))
  • Legitimate interest — Processing is necessary for pursuing the legitimate interests of the responsible party or a third party (Section 11(1)(f))
  • Public law duty — Processing is necessary for the proper performance of a public law duty (Section 11(1)(d))
  • Protection of legitimate interest — Processing protects a legitimate interest of the data subject (Section 11(1)(e))

Where consent is the chosen ground, it must be voluntary, specific, and informed. The data subject must be told what information is being collected, why it is being collected, and who will have access to it. Consent can be withdrawn at any time (Section 11(2)).

Section 18 — Notification to Data Subject

Section 18 requires the responsible party to notify the data subject of specific information when collecting personal information. This notification must occur before collection or as soon as reasonably practicable afterwards. The notification must include:

  • The identity of the responsible party and its address
  • The purpose of processing
  • Whether the supply of information is voluntary or mandatory, and the consequences of failure to provide
  • Any law authorising or requiring the collection
  • Whether the responsible party intends to transfer the information to a third country and the level of protection afforded by that country
  • The right to lodge a complaint with the Information Regulator

Section 22 — Breach Notification

Section 22 requires the responsible party to notify the Information Regulator and affected data subjects when there are reasonable grounds to believe that personal information has been accessed or acquired by an unauthorised person. Key requirements:

  • Notification must be made "as soon as reasonably possible" after the breach is discovered
  • The notification must include sufficient information to allow data subjects to take protective measures
  • The Information Regulator may direct the responsible party to publicise the breach if it cannot identify specific data subjects
  • A delay in notification is only permitted if law enforcement requests it or if the responsible party needs time to determine the scope of the breach
!

Breach Notification Is Not Optional

Failure to notify the Information Regulator of a data breach is a separate offence under POPIA, carrying its own penalties. Organisations must have a documented breach response procedure in place before a breach occurs — not develop one during the crisis. Track breach notification as part of your compliance obligation management.

POPIA Compliance Checklist

Use this structured checklist to assess and track your organisation's POPIA compliance. Each item maps to a specific POPIA requirement and can be tracked as a compliance obligation in your risk and compliance register.

Governance & Accountability

  • Appoint and register an information officer with the Information Regulator
  • Appoint deputy information officers for each business unit or function
  • Develop and publish a PAIA manual (Section 51 of PAIA, as required by POPIA Section 17)
  • Establish a data privacy governance structure with clear roles and responsibilities
  • Conduct a personal information impact assessment (PIIA) for all processing activities
  • Document all processing activities in a processing register

Lawful Processing & Consent

  • Identify the lawful ground for each processing activity (Section 11)
  • Where consent is the chosen ground, ensure it is voluntary, specific, and informed
  • Implement a mechanism for data subjects to withdraw consent
  • Document consent records with timestamps and evidence of what the data subject was told
  • Review existing consent records for compliance with POPIA requirements

Purpose Specification & Retention

  • Define and document the specific purpose for each processing activity (Section 13)
  • Develop a data retention policy with retention periods for each category of personal information (Section 14)
  • Implement processes to destroy or de-identify personal information once the purpose is fulfilled
  • Ensure further processing is compatible with the original purpose (Section 15)

Transparency & Data Subject Notification

  • Draft and publish a privacy notice that meets all Section 18 requirements
  • Ensure privacy notices are provided at or before the point of collection
  • Review all data collection points (forms, websites, contracts) for compliance with notification requirements
  • Disclose any cross-border transfers and the level of protection in the receiving country

Security Safeguards (Section 19)

  • Conduct a risk assessment to identify all reasonably foreseeable internal and external risks to personal information
  • Implement appropriate technical measures (encryption, access controls, firewalls, intrusion detection)
  • Implement appropriate organisational measures (policies, training, access management procedures)
  • Regularly verify that safeguards are effectively implemented
  • Update safeguards in response to new risks or identified deficiencies
  • Ensure operators (third-party processors) have adequate security measures in place

Data Subject Rights

  • Establish a process for receiving and responding to data subject access requests (Section 23)
  • Establish a process for receiving and responding to correction and deletion requests (Section 24)
  • Establish a process for handling objections to processing (Section 11(3))
  • Define response timelines and ensure they meet statutory requirements
  • Train staff who handle data subject requests on the correct procedures

Breach Response

  • Develop a documented data breach response procedure
  • Define escalation timelines and responsibilities for breach notification
  • Establish a mechanism for notifying the Information Regulator (Section 22)
  • Establish a mechanism for notifying affected data subjects (Section 22)
  • Conduct regular breach response exercises or tabletop simulations

Cross-Border Transfers

  • Identify all cross-border transfers of personal information (Section 72)
  • Ensure the receiving country has adequate data protection legislation, or that an exemption applies
  • Document the lawful basis for each cross-border transfer
  • Include cross-border transfer provisions in operator agreements

Information Officer Responsibilities

Every responsible party must register an information officer with the Information Regulator. In the case of a private body, the head of the organisation is the information officer by default, unless another person is formally appointed and registered.

The information officer's responsibilities under POPIA include:

  • Encouraging compliance — Ensuring the organisation complies with all POPIA conditions and provisions
  • Handling data subject requests — Dealing with requests made under POPIA and PAIA
  • Coordinating with the Information Regulator — Acting as the point of contact for the Information Regulator
  • Internal awareness — Ensuring staff are aware of POPIA requirements through training and communication
  • Conducting impact assessments — Overseeing personal information impact assessments for new processing activities
  • Maintaining the PAIA manual — Ensuring the Section 51 manual is up to date and available

The information officer may appoint deputy information officers to assist with these duties across different departments or business units. Deputy information officers must also be registered with the Information Regulator.

i

Information Officer Registration

Registration of information officers with the Information Regulator is mandatory. The registration form is available on the Information Regulator's website. Failure to register is a compliance gap that the Regulator can identify during an assessment.

POPIA Penalties and Enforcement

POPIA provides for significant penalties for non-compliance. The Information Regulator has enforcement powers including:

Offence Penalty
Obstruction of the Information Regulator (Section 100) Fine or imprisonment for up to 12 months, or both
Failure to comply with an enforcement notice (Section 101) Fine or imprisonment for up to 12 months, or both
Offences by responsible party (Section 105) — e.g., processing special personal information without authorisation, failing to notify data subjects of a breach Fine of up to R10 million, or imprisonment for up to 10 years, or both
Offences by third parties (Section 106) — e.g., selling personal information obtained unlawfully Fine of up to R10 million, or imprisonment for up to 10 years, or both

Beyond statutory penalties, the Information Regulator can also:

  • Issue enforcement notices requiring the organisation to take specific remedial steps
  • Conduct assessments of the organisation's processing activities
  • Refer matters for criminal prosecution
  • Award damages to affected data subjects through civil action
!

The Information Regulator Is Active

The Information Regulator has moved beyond the grace period and is actively enforcing POPIA. Notable enforcement actions include investigations into major financial institutions, telecommunications companies, and government departments. Organisations that assume enforcement will not reach them are taking a significant compliance risk.

POPIA vs GDPR Comparison

South African organisations that operate internationally or serve EU customers often need to comply with both POPIA and GDPR. While the two laws share common principles, there are important differences.

Area POPIA GDPR
Scope — Natural persons Yes — natural persons Yes — natural persons
Scope — Juristic persons Yes — companies, trusts, close corporations No — natural persons only
Regulator Information Regulator (South Africa) National Data Protection Authorities (e.g., ICO, CNIL)
Lawful grounds for processing 6 grounds under Section 11 6 grounds under Article 6
Consent withdrawal Permitted under Section 11(2) Permitted under Article 7(3)
Breach notification timeline "As soon as reasonably possible" (Section 22) Within 72 hours (Article 33)
Data Protection Officer Information officer — mandatory for all responsible parties DPO — mandatory only in certain circumstances
Cross-border transfer rules Section 72 — adequate protection or consent/contract exemption Chapter V — adequacy decisions, SCCs, BCRs
Maximum fine R10 million or imprisonment up to 10 years EUR 20 million or 4% of global annual turnover
Right to data portability Not explicitly provided Explicitly provided under Article 20
Right to be forgotten Deletion right under Section 24 (narrower scope) Right to erasure under Article 17 (broader scope)

Organisations subject to both laws should map their controls to both frameworks simultaneously. Using a platform like Dimeri, a single information security control can be mapped to both POPIA Section 19 and GDPR Article 32 requirements — tested once and credited to both frameworks. This eliminates duplicate compliance effort and ensures consistent protection. Read more about integrating governance frameworks into your compliance programme.

How to Maintain Ongoing POPIA Compliance

POPIA compliance is not a one-time project. The Act explicitly requires ongoing verification of security safeguards (Section 19(2)) and continuous compliance with all eight conditions. Here is how to build a sustainable compliance programme:

1. Integrate POPIA into Your Risk Register

Treat every POPIA obligation as a compliance risk in your central risk register. Each obligation should have a named owner, a deadline, mapped controls, and attached evidence. This ensures POPIA compliance is monitored alongside all other organisational risks — not managed in isolation.

2. Schedule Regular Compliance Reviews

Conduct quarterly reviews of your POPIA compliance posture. Review the processing register for new activities, test security safeguards for effectiveness, update risk assessments for new threats, and verify that data subject request procedures are being followed.

3. Train Staff Continuously

POPIA compliance depends on staff awareness. Regular training — at induction and annually thereafter — should cover what personal information is, how to handle it, what to do if a data subject makes a request, and how to recognise and report a breach.

4. Monitor Operator Compliance

Section 21 requires the responsible party to ensure that operators (third-party processors) comply with POPIA conditions. This means regular review of operator agreements, security assessments, and evidence of compliance from operators.

5. Use Technology to Automate Tracking

Manual compliance tracking does not scale. As processing activities grow, consent records accumulate, and data subject requests increase, spreadsheet-based tracking becomes unsustainable. A compliance management platform like Dimeri links every POPIA obligation to its controls, evidence, and owner — providing a live compliance scorecard and generating audit-ready reports on demand. Learn more about how to track compliance obligations without duplication.

Key Takeaways

  • POPIA applies to every organisation that processes personal information in South Africa — including juristic persons, which is a broader scope than GDPR
  • The 8 conditions for lawful processing form the foundation of POPIA compliance — every processing activity must satisfy all applicable conditions
  • Section 19 security safeguards require ongoing verification and continuous updating — not a one-time implementation
  • Breach notification under Section 22 must happen "as soon as reasonably possible" — organisations need a documented procedure ready before a breach occurs
  • The Information Regulator is actively enforcing POPIA — penalties of up to R10 million or 10 years imprisonment make compliance a business imperative
  • POPIA compliance should be integrated into your risk register — linking obligations to controls, evidence, and owners ensures sustainable compliance rather than periodic assessments
  • Organisations subject to both POPIA and GDPR can map shared controls to both frameworks, eliminating duplicate compliance effort

Frequently Asked Questions

Does POPIA apply to small businesses?

Yes. POPIA applies to every organisation that processes personal information, regardless of size. A sole proprietor collecting customer email addresses is subject to the same conditions as a listed corporation. The scale of compliance measures should be proportional to the volume and sensitivity of personal information processed, but the obligation to comply exists for all.

What is the difference between an information officer and a deputy information officer?

The information officer is the person ultimately responsible for POPIA compliance and is registered with the Information Regulator. In a private body, this is the head of the organisation by default unless another person is formally appointed. Deputy information officers are appointed to assist the information officer and may be responsible for POPIA compliance within specific departments or business units. Both must be registered with the Information Regulator.

How quickly must a data breach be reported under POPIA?

POPIA Section 22 requires notification "as soon as reasonably possible" after the responsible party becomes aware that personal information has been accessed or acquired by an unauthorised person. Unlike GDPR's specific 72-hour window, POPIA does not prescribe a fixed timeline — but "as soon as reasonably possible" is interpreted strictly. Organisations should aim to notify the Information Regulator within 72 hours as best practice, and must be able to justify any delay.

Can personal information be transferred outside South Africa under POPIA?

Yes, but only under specific conditions set out in Section 72. The receiving country must have adequate data protection legislation, or the data subject must have consented to the transfer, or the transfer must be necessary for a contract. If you use cloud services hosted outside South Africa, this constitutes a cross-border transfer and must comply with Section 72. Organisations should document the lawful basis for each cross-border transfer.

How does POPIA compliance relate to King IV and King V governance requirements?

King IV and King V require boards to ensure that the organisation complies with all applicable laws, and to govern technology and information responsibly. POPIA compliance is therefore a governance obligation under King IV/V. The board should receive regular reports on POPIA compliance status, and the information officer's role should be integrated into the governance structure. Organisations using King IV or King V frameworks can map POPIA obligations alongside governance requirements in a single compliance register, ensuring data protection is part of the broader governance programme rather than a standalone initiative.

Save this guide for later

Download the PDF version to read offline or share with your team.

Co-Founder & ERM Practitioner

An enterprise risk management practitioner with experience across healthcare, public sector, and regulated environments. Phumi focuses on translating ERM frameworks into practical, decision-relevant processes.

Co-Founder & ERM Practitioner

Specialises in enterprise risk management through risk assessments, data analysis, and mitigation planning. Contributes to compliance oversight, risk reporting, and monitoring of key risk indicators.