POPIA Readiness Assessment

Assess Your POPIA Ready?

Free · 25 questions · Results in 5 minutes

5 POPIA Conditions 25 Questions ~5 Minutes Start Free Assessment
POPIA Act 4 of 2013 SA Information Regulator
Condition 1 of 5 0% complete
1
2
3
4
5
Accountab.
Processing
DSR
Security
Breach
📋
§8–11
Accountability
Information Officer designation, PAIA manual, compliance framework, data inventory and PIAs per §8–11.
Q1 · Condition 1
An Information Officer has been designated and registered with the SA Information Regulator.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q2 · Condition 1
The PAIA manual has been published and is current.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q3 · Condition 1
A POPIA compliance framework and policies are documented.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q4 · Condition 1
A data inventory and mapping exercise has been completed.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q5 · Condition 1
Privacy Impact Assessments (PIAs) are conducted for new processing activities.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
⚖️
§12–25
Processing Conditions
Lawful basis, purpose limitation, data minimisation, retention schedules and special PI safeguards per §12–25.
Q1 · Condition 2
A lawful basis is documented for every processing activity.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q2 · Condition 2
Purpose limitation is applied — data is not processed beyond the stated purpose.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q3 · Condition 2
Data minimisation is enforced — only necessary personal information is collected.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q4 · Condition 2
Retention and disposal schedules are defined and enforced for all PI categories.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q5 · Condition 2
Special personal information (health, race, criminal records) has extra safeguards.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
👤
§23–25
Data Subject Rights
Access requests, correction, deletion, objections, automated decisions and DSR audit trails per §23–25.
Q1 · Condition 3
An access request process exists with a 30-day SLA.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q2 · Condition 3
Correction and deletion of personal information is handled within prescribed timeframes.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q3 · Condition 3
Objections to processing are formally assessed and responded to.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q4 · Condition 3
Automated decision-making is disclosed to data subjects per §71.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q5 · Condition 3
DSR requests are tracked with an audit trail.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
🛡️
§19–22
Security Safeguards
Technical and organisational security measures, operator contracts, staff training and access controls per §19–22.
Q1 · Condition 4
Technical and organisational security measures protect personal information per §19.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q2 · Condition 4
Operators are governed by written contracts with security requirements per §20–21.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q3 · Condition 4
POPIA awareness training is conducted for all staff with access to PI.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q4 · Condition 4
Physical and access controls restrict PI to authorised staff.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q5 · Condition 4
Security controls are reviewed and updated regularly.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
📢
§22
Breach Notification
Breach response procedures, detection, regulator notification, data subject notification and post-breach review per §22.
Q1 · Condition 5
A breach response procedure is documented per §22.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q2 · Condition 5
A breach detection and assessment process exists.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q3 · Condition 5
A process to notify the Information Regulator is in place.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q4 · Condition 5
Affected data subjects are notified when their rights are materially impacted.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Q5 · Condition 5
Post-breach reviews feed improvements back into security controls.
Not Implemented
0 pts
Planned ≤12m
1 pt
Partial
2 pts
Fully Implemented
3 pts
Please answer all questions to continue.
0%
0 / 75 pts
POPIA READINESS SCORE
🔴 Critical Risk

Significant POPIA gaps identified. Immediate action required to avoid enforcement by the SA Information Regulator.

Score by POPIA Condition
Priority Recommendations
SADC Regional Hub → Start Free Tabletop Exercises →

This assessment is self-reported and indicative only. It does not constitute legal or regulatory advice. For formal POPIA compliance evaluation, consult the South African Information Regulator or a qualified attorney.