A Comparative Overview of the (Sometimes Uneasy) Relationship between Digital Information and Certain Legal Fields in South Africa and Uganda
DOI:
https://doi.org/10.17159/1727-3781/2014/v17i1a2250Keywords:
Computer crime, Computer evidence, Digital information, E-commerce, Espionage, Personal Data, Privacy, Military Intelligence, State Security, TreatiesAbstract
The present article focuses on the (sometimes problematic) relationship between digital information and certain legal fields. Most legal rules developed long before the arrival of the computer and the digital telephone, and these rules are now under considerable strain to adapt.
Digital information is rapidly becoming one of the 21st Century’s most valuable assets. This raises the question as to whether or not the law is able to adequately protect this phenomenon against the many attacks being launched against it. The present article analyses certain legal fields in this regard, namely privacy, criminal law, and the law of evidence. The world seems suddenly to have woken up to the fact that digital technology might be a mixed blessing, especially as is shown by certain recent incidents relating to privacy in the USA. In order to obtain an “Africa perspective” the legal situation in South Africa is compared to that in Uganda (East Africa) against a background of multilateral treaties that might apply in this regard.
An important point to keep in mind while weighing up legal interests is whether the State may attempt to be both neutral umpire (by means of its judicial power) as well as one of the players who want to win (as the executive power, when government information is at stake). A number of recent incidents in which the United States government has been involved seem to indicate that this attempt to sit on two stools at the same time is likely to diminish respect for the government (and its regulatory efforts) amongst the general population.
A specific problem with enforcement consists of the international nature of infringements. The Internet knows no borders and this factor suggests that effective international co-operation is an essential prerequisite for the law to function adequately in an international context. The concluding of International treaties between groupings of countries is put forward as perhaps the most effective solution in this regard.
Downloads
References
BIBLIOGRAPHY
Literature
Anon 2013 Time
Anon "Blown Whistle: What the Manning Verdict Means" 2013 Time 12 Aug 13
Brandeis and Warren 1890 Harv LJ
Brandeis L and Warren S "The Right to Privacy" 1890 Harv LJ 193 (downloaded from http://groups.csail.mit.edu/mac/classes/6.805/articles/
privacy/Privacy_brand_warr2.html on 4 September 2013)
Buys Cyberlaw@SA 1999
Buys R (ed) Cyberlaw@SA (Van Schaiks Pretoria 1999)
Buys Cyberlaw@SA 2004
Buys R (ed) Cyberlaw@SA 2nd ed (Van Schaiks Pretoria 2004)
Claasen Beeld
Claasen C "'Selfone kan tot Groot Oproer Lei'" Beeld (10 November 2013) http://www.beeld.com/nuus/2013-11-10-selfone-kan-tot-groot-oproer-lei accessed 17 February 2014
Eastlake and Niles Secure XML
Eastlake DE and Niles K Secure XML: The New Syntax for Signature and Encryption (Addison-Wesley Boston 2003)
Hofman Cyberlaw
Hofman J Cyberlaw (Ampersand Press Cape Town 1999)
Hofman "South Africa"
Hofman J "South Africa" in Mason S Electronic Evidence: Disclosure, Discovery and Admissibility (LexisNexis/Butterworths London 2007) 483
Neethling and Potgieter Law of Delict
Neethling J and Potgieter JM Law of Delict 6th ed (LexisNexis Durban 2010)
Papadopoulos and Snail Cyberlaw@SA
Papadopoulos S and Snail S (eds) Cyberlaw@SA 3rd ed (Van Schaik Pretoria 2012)
SALRC Privacy and Data Protection
SALRC Privacy and Data Protection - Discussion Paper 109, Project 124 (The Commission Pretoria 2005)
Scherer 2013 Time
Scherer M "Geeks who Leak" 2013 Time 24 Jun 18-25
Schmidt and Rademeyer Bewysreg
Schmidt C and Rademeyer H Bewysreg 4th ed (Butterworths Durban 2000)
Schmidt and Cohen New Digital Age
Schmidt E and Cohen J The New Digital Age (John Murray London 2013)
Scholtz 2013 Beeld
Scholtz L "Erger as die KGB - VSA breek eie reëls" Beeld 2013 8 November
Tapper Computer Law
Tapper C Computer Law (Longman London 1978)
Van der Merwe 1983 Obiter
Van der Merwe DP "Computer Crime" 1983 Obiter 124-133
Van der Merwe 1985 SACC
Van der Merwe DP "Diefstal van onliggaamlike sake met spesifieke verwysing na rekenaars" 1985 SACC 129-141
Van der Merwe Computers and the Law 1986
Van der Merwe DP Computers and the Law (Juta Cape Town 1986)
Van der Merwe 1994 Obiter
Van der Merwe DP "Documentary evidence (with specific reference to the Internet)" 1994 Obiter 64-84
Van der Merwe Computers and the Law 2000
Van der Merwe DP Computers and the Law 2nd ed (Juta Cape Town 2000)
Van der Merwe 2007 THRHR
Van der Merwe DP "Information technology crime - a new paradigm is needed" 2007 THRHR 309-319
Van der Merwe et al Information Communications Technology Law
Van der Merwe DP et al Information Communications Technology Law (LexisNexis Durban 2008)
Van der Merwe 2010 THRHR
Van der Merwe DP "The current position regarding digital evidence and XML as a possible solution" 2010 THRHR 81-92
Van der Merwe 2011 THRHR
Van der Merwe DP "XBRL and the law: the legal implications of mark-up languages" 2011 THRHR 418-431
Zimmermann PGP Source Code and Internals
Zimmermann P PGP Source Code and Internals (MIT (Massachusetts Institute for Technology) Press 1995)
Case law
Abrams v United States 250 US (1919)
Brandenburg v Ohio 395 US (1969)
Financial Mail (Pty) Ltd v Sage Holdings Ltd 1993 2 SA 453 (SA)
Janit v Motor Industry Fund Administrators (Pty) Ltd 1995 4 SA 293 (A)
National Media Ltd v Jooste 1996 3 SA 262 (A)
O'Keefe v Argus Printing and Publishing Co Ltd 1954 3 SA 244 (C)
S v De Villiers 1993 1)SACR 574 (Nm)
S v Harper 1981 1)SA 88 (D)
S v Howard (Johannesburg Regional Magistrates Court) unreported case number 41/258/02
Legislation
South Africa
Constitution of the Republic of South Africa, 1996
Electronic Communications and Transactions Act 25 of 2002
National Credit Act 34 of 2005
Promotion of Access to Information Act 2 of 2000
Protection of Personal Information Act 4 of 2013
Uganda
Computer Misuse Act 2 of 2011
Electronic Commerce Act 8 of 2011
Electronic Signatures Act 7 of 2011
Government publications
GN 504 in GG 29995 of 20 July 2007 (Regulations relating to Authentication Service Providers)
GN 888 in GG 35821 of 28 October 2012 (Electronic Communications and Transactions Amendment Bill)
General Intelligence Laws Amendment Bill, 2011 [B25-2011]
Protection of State Information Bill, 2010 [B6-2010]
International instruments
Convention on Cybercrime (2011)
Draft Convention on Cyber-legislation in Africa (2012)
Draft EAC Framework for Cyber-laws (Phase I) (2008)
EAC Cyber-laws Framework (2009)
SADC Draft Model Law on Crime and Cybercrime (2012)
Internet sources
Anon 2013 http://www.news24.com/Technology/News/Microsoft-joins-Google-in-US-spying-suit-20130831
Anonymous 2013 Microsoft Joins Google in Spying Suit http://www.news24.com/Technology/News/Microsoft-joins-Google-in-US-spying-suit-20130831 accessed 4 September 2013
JSTOR 2014 http://www.jstor.org
JSTOR 2014 JSTOR Home Page http://www.jstor.org accessed 28 February 2014
Napolitano 2013 http://reason.com/archives/2013/11/07/how-can-the-nsa-spy-on-merkel-the-pope-t
Napolitano A 2013 How can the NSA Spy on Merkel, the Pope, the UN and the Rest of Us? http://reason.com/archives/2013/11/07/how-can-the-nsa-spy-on-merkel-the-pope-t accessed 7 November 2013
Published
Issue
Section
License
Copyright (c) 2017 Dana Van der Merwe
This work is licensed under a Creative Commons Attribution 4.0 International License.