Empower End Users

Simplify Access, Protect Confidential Data


Reach Out



Around the world, data protection is a business imperative, driven both by regulations, such as South Africa’s Protection of Personal Information Act (PoPIA), and by the growing realisation that consumers’ trust, or lack thereof, in your business can be a competitive differentiator. This means that the awareness of protection, privacy, and liability must become top of mind.

Companies are no longer able to acquire, collect and use customer and other personal information without concern for rules, laws, and liabilities.

Says Gary Allemann, MD of Master Data Management and eLearning partner, “The frequent occurrence of data misuse and theft has created the need for companies to reexamine their approach to data protection and privacy.  The development of laws around the world focused on data protection, privacy, and responsibility has created a new set of challenges in the world of data usage and business analytics, while, at the same time consumers are increasingly demanding personalised experiences.”

“The day is quickly approaching where companies will need to be able to manage and track data usage, data location, and customer consent. Business people must understand their company’s responsibilities in retaining customer data to support business decision making.”

In this 5 hour course, which forms part of our Certified Data Steward (CDS) curriculum, Evan Levy discusses the business challenges and drivers for compliance; reviews key concepts and terminology; and reviews the activities that go into supporting a privacy and protection initiative.

You will learn:

  • Key concepts of data protection
  • The impact of protecting data on an existing analytics environment
  • Privacy by design – An approach to integrating these principles into the data lifecycle
  • The phases and activities involved with Data Privacy/Protection Initiative
  • The stakeholders and participants of a Data Protection Initiative

If you are a Chief Data Officer, are responsible for Risk and Compliance, or are otherwise impacted by PoPIA or similar regulations, then this course is for you!

This course can be completed stand-alone or contribute towards your internationally recognised CDS accreditation.

Click here to register.

Get Started Today!


Data Security FAQ

Pathlock is an access governance solution that helps organizations monitor and control user access to their sensitive data and systems. It provides real-time visibility into user activity, detects suspicious behavior, and helps prevent unauthorized access and data breaches. By continuously monitoring who accessed what, when, and why, Pathlock empowers organizations to:

  • Minimize access risk: Identify and address potential access risks before they materialize, reducing the likelihood of data breaches and unauthorized access.
  • Strengthen data governance: Demonstrate compliance with data privacy regulations and maintain data integrity through comprehensive audit trails and real-time insights.
  • Boost user productivity: Streamline access requests and user provisioning processes, reducing friction and empowering users to be more productive.

Traditional access control systems typically rely on static rules and permissions, often lacking the granularity and continuous monitoring capabilities needed in today's dynamic IT environments. Pathlock goes beyond traditional systems by:

  • Offering real-time activity monitoring: Provides deep insights into user activity across applications and systems, capturing context surrounding each access event.
  • Detecting anomalous behaviour: Analyzes user activity against established baselines to identify potential threats and suspicious actions.
  • Offering customizable alerts and notifications: Receive immediate alerts for suspicious activity, unauthorized access attempts, or violations of user privileges.

Pathlock can protect a wide range of sensitive data, including:

  • Customer data (names, addresses, financial information)
  • Employee data (salaries, benefits, performance reviews)
  • Intellectual property (trade secrets, research data, design documents)
  • Financial data (bank accounts, transactions, credit card information)
  • Healthcare data (medical records, patient information)

Yes, Pathlock integrates seamlessly with a wide range of enterprise applications and platforms, including SAP, Oracle, Coupa, Workday, Salesforce, Dynamics 365, cloud platforms, and more. This ensures comprehensive visibility and consistent control across your entire IT ecosystem from a single centralised platform.

Pathlock helps organizations comply with data privacy regulations by:

  • Enforcing least privilege access: Granting users only the minimum access needed for their job function, minimizing the risk of unauthorized access and data exposure.
  • Providing detailed audit trails: Maintaining comprehensive logs of user activity, which can be used to demonstrate compliance with regulations and facilitate forensic investigations.
  • Automating tasks and workflows: Streamlining processes like user provisioning and access reviews to ensure consistency and reduce the risk of human error.

Pathlock takes data security seriously and implements robust security measures, including:

  • Multi-factor authentication: Protects against unauthorized access by requiring additional verification beyond passwords.
  • Data encryption: Encrypts data at rest and in transit to ensure confidentiality and integrity.
  • Regular security audits: Continuously evaluates and improves its security posture to address evolving threats.

Phone:+27 11 485 4856