EOH Privacy

We care about your privacy

Data privacy generally means the ability of a person to determine for themselves when, how, and to what extent personal information about them is shared with or communicated to others. This personal information can be one’s name, location, contact information, or online or real-world behaviour. Just as someone may wish to exclude people from a private conversation, many online users want to control or prevent certain types of personal data collection.

As Internet usage has increased over the years, so has the importance of data privacy. Websites, applications, and social media platforms often need to collect and store personal data about users to provide services. However, some applications and platforms may exceed users’ expectations for data collection and usage, leaving users with less privacy than they realized. Other apps and platforms may not place adequate safeguards around the data they collect, which can result in a data breach that compromises user privacy.

Important Documents

Privacy Policy

This policy statement aims to address EOH’s commitment to complying with the Protection of Personal Information Act (“POPIA”) and aims to inform the customer/client, referred to as the data subject, on how we gather, use, and disclose personal information in compliance with the POPIA’s standards.
Cookies: EOH uses functional cookies to allow various website features and services to operate, such as remembering user IDs, preferred channel selections, browsing, and other service preferences.

Read now

EOH Email Disclaimer

An email disclaimer is a disclaimer, notice or warning which is added to all of EOH’s outgoing email. It’s purpose is to protect EOH’s confidentiality, copyright infringements, defamation, discrimination, harassment, privilege and viruses. It addresses the liability and obligation of the sender, receivers, and unauthorized recipients.

Read now

Promotion of Access to Information Act (PAIA) Manual

The Promotion of Access to Information Act (PAIA) was established to promote the right of access to information and to promote transparency and accountability within both the public and private sectors of society to realize South Africa’s goals of an open and participatory democracy more fully. This PAIA document describes the procedures to facilitate a request for access to a record held by EOH and sufficient guidelines on completing the prescribed access form, and the limitations to access to records according to certain categories.

Read now

EOH Request for Information

Request for access to records.

Download form

How do we protect our information?

To address external security threats, big companies deploy and regularly update basic measures such as two-factor authentication, firewalls and antimalware solutions. They also go further by implementing more advanced strategies such as Trusted Platform Module (TPM) capabilities and adopting Zero Trust architecture.

Zero Trust architecture proposes a new way of tackling cybersecurity: never trust, always verify. It ensures that users, devices, and network traffic are all verified and subject to least-privilege rules when accessing trusted resources. In this way, if one computer becomes infected, attackers are prevented from moving laterally across the network.

One of the most crucial steps towards efficient data protection is knowing exactly which data is being stored and where. By accurately identifying their data lifecycle and the security risks associated with it, companies can make informed decisions concerning the measures they need to protect it.

Large organizations use Data Loss Prevention tools such as Endpoint Protector to scan company networks for sensitive data. When finding it in unauthorized locations, they have the option of deleting or encrypting it. In the age of data protection regulations, transparency is key both for compliance and for building effective data protection policies.

From encrypted hard drives, USBs, and smartphones to data encrypted prior to its transfer to the cloud or onto portable devices, encryption has become essential to protect sensitive company data and secure customer data.

Encryption tackles two common data protection vulnerabilities in today’s global economy: a workforce constantly on the move and the rise of remote work. With devices frequently leaving the safety of company networks, encryption ensures that, in case of theft or loss, the sensitive data they contain is inaccessible to outsiders.

The human factor is often the biggest vulnerability in the data protection chain. Large corporations ensure employees are informed of compliance regulations and best security practices, providing them with both training and clear guidelines for those coming into contact with the most sensitive data types.

C-level executives are frequently targeted by malicious outsiders due to their high-level access to data. Big companies take special care that higher management does not circumvent the rules as it is essential that the same level of data security is maintained across the board, not only horizontally but also vertically.

DLP solutions can act as an effective method of enforcement by setting clear policies that protect and restrict access to sensitive data. Levels of access to data can be controlled based on groups, departments, specific users or endpoints.

As companies embrace Bring-your-own-device (BYOD) policies that increase productivity and reduce costs, they often ignore their security implications. Accessing sensitive information on personal devices means that data is travelling outside the confines of the company network, effectively rendering any security measures taken to protect it moot.

Big organizations restrict the sort of data that can be transferred outside company devices. At the same time, device control policies can be applied, which ensure that only devices that meet a certain level of security are trusted. In this way, employees are given the option of aligning the security of their personal devices to the level required within the company. If they choose not to apply them, it guarantees that no sensitive data is allowed to be transferred to them.

As we move forward into the age of data protection by design and by default, mid-sized and small businesses must follow in the footsteps of larger companies and adopt security plans to protect data from insider and outsider threats.

Contact information

If you have any questions, or you want to update your personal information or preferences, please contact our Privacy Office on the details below:

Email: privacy@eoh.com
Physical address: 1st Floor Block D, Pinmill Farm, 164 Katherine Street, Barlow Park, Sandton, Gauteng, 2148 | PO Box 59, Bruma, 2026