A Comparative Overview of the (Sometimes Uneasy) Relationship between Digital Information and Certain Legal Fields in South Africa and Uganda

Authors

  • Dana Van der Merwe University Of South Africa

DOI:

https://doi.org/10.17159/1727-3781/2014/v17i1a2250

Keywords:

Computer crime, Computer evidence, Digital information, E-commerce, Espionage, Personal Data, Privacy, Military Intelligence, State Security, Treaties

Abstract

The present article focuses on the (sometimes problematic) relationship between digital information and certain legal fields. Most legal rules developed long before the arrival of the computer and the digital telephone, and these rules are now under considerable strain to adapt.

 

Digital information is rapidly becoming one of the 21st Century’s most valuable assets. This raises the question as to whether or not the law is able to adequately protect this phenomenon against the many attacks being launched against it. The present article analyses certain legal fields in this regard, namely privacy, criminal law, and the law of evidence. The world seems suddenly to have woken up to the fact that digital technology might be a mixed blessing, especially as is shown by certain recent incidents relating to privacy in the USA. In order to obtain an “Africa perspective” the legal situation in South Africa is compared to that in Uganda (East Africa) against a background of multilateral treaties that might apply in this regard.

An important point to keep in mind while weighing up legal interests is whether the State may attempt to be both neutral umpire (by means of its judicial power) as well as one of the players who want to win (as the executive power, when government information is at stake). A number of recent incidents in which the United States government has been involved seem to indicate that this attempt to sit on two stools at the same time is likely to diminish respect for the government (and its regulatory efforts) amongst the general population.

 

A specific problem with enforcement consists of the international nature of infringements. The Internet knows no borders and this factor suggests that effective international co-operation is an essential prerequisite for the law to function adequately in an international context. The concluding of International treaties between groupings of countries is put forward as perhaps the most effective solution in this regard.

    ScienceOpen_Log0343216.png

Downloads

Download data is not yet available.

References

BIBLIOGRAPHY

Literature

Anon 2013 Time

Anon "Blown Whistle: What the Manning Verdict Means" 2013 Time 12 Aug 13

Brandeis and Warren 1890 Harv LJ

Brandeis L and Warren S "The Right to Privacy" 1890 Harv LJ 193 (downloaded from http://groups.csail.mit.edu/mac/classes/6.805/articles/

privacy/Privacy_brand_warr2.html on 4 September 2013)

Buys Cyberlaw@SA 1999

Buys R (ed) Cyberlaw@SA (Van Schaiks Pretoria 1999)

Buys Cyberlaw@SA 2004

Buys R (ed) Cyberlaw@SA 2nd ed (Van Schaiks Pretoria 2004)

Claasen Beeld

Claasen C "'Selfone kan tot Groot Oproer Lei'" Beeld (10 November 2013) http://www.beeld.com/nuus/2013-11-10-selfone-kan-tot-groot-oproer-lei accessed 17 February 2014

Eastlake and Niles Secure XML

Eastlake DE and Niles K Secure XML: The New Syntax for Signature and Encryption (Addison-Wesley Boston 2003)

Hofman Cyberlaw

Hofman J Cyberlaw (Ampersand Press Cape Town 1999)

Hofman "South Africa"

Hofman J "South Africa" in Mason S Electronic Evidence: Disclosure, Discovery and Admissibility (LexisNexis/Butterworths London 2007) 483

Neethling and Potgieter Law of Delict

Neethling J and Potgieter JM Law of Delict 6th ed (LexisNexis Durban 2010)

Papadopoulos and Snail Cyberlaw@SA

Papadopoulos S and Snail S (eds) Cyberlaw@SA 3rd ed (Van Schaik Pretoria 2012)

SALRC Privacy and Data Protection

SALRC Privacy and Data Protection - Discussion Paper 109, Project 124 (The Commission Pretoria 2005)

Scherer 2013 Time

Scherer M "Geeks who Leak" 2013 Time 24 Jun 18-25

Schmidt and Rademeyer Bewysreg

Schmidt C and Rademeyer H Bewysreg 4th ed (Butterworths Durban 2000)

Schmidt and Cohen New Digital Age

Schmidt E and Cohen J The New Digital Age (John Murray London 2013)

Scholtz 2013 Beeld

Scholtz L "Erger as die KGB - VSA breek eie reëls" Beeld 2013 8 November

Tapper Computer Law

Tapper C Computer Law (Longman London 1978)

Van der Merwe 1983 Obiter

Van der Merwe DP "Computer Crime" 1983 Obiter 124-133

Van der Merwe 1985 SACC

Van der Merwe DP "Diefstal van onliggaamlike sake met spesifieke verwysing na rekenaars" 1985 SACC 129-141

Van der Merwe Computers and the Law 1986

Van der Merwe DP Computers and the Law (Juta Cape Town 1986)

Van der Merwe 1994 Obiter

Van der Merwe DP "Documentary evidence (with specific reference to the Internet)" 1994 Obiter 64-84

Van der Merwe Computers and the Law 2000

Van der Merwe DP Computers and the Law 2nd ed (Juta Cape Town 2000)

Van der Merwe 2007 THRHR

Van der Merwe DP "Information technology crime - a new paradigm is needed" 2007 THRHR 309-319

Van der Merwe et al Information Communications Technology Law

Van der Merwe DP et al Information Communications Technology Law (LexisNexis Durban 2008)

Van der Merwe 2010 THRHR

Van der Merwe DP "The current position regarding digital evidence and XML as a possible solution" 2010 THRHR 81-92

Van der Merwe 2011 THRHR

Van der Merwe DP "XBRL and the law: the legal implications of mark-up languages" 2011 THRHR 418-431

Zimmermann PGP Source Code and Internals

Zimmermann P PGP Source Code and Internals (MIT (Massachusetts Institute for Technology) Press 1995)

Case law

Abrams v United States 250 US (1919)

Brandenburg v Ohio 395 US (1969)

Financial Mail (Pty) Ltd v Sage Holdings Ltd 1993 2 SA 453 (SA)

Janit v Motor Industry Fund Administrators (Pty) Ltd 1995 4 SA 293 (A)

National Media Ltd v Jooste 1996 3 SA 262 (A)

O'Keefe v Argus Printing and Publishing Co Ltd 1954 3 SA 244 (C)

S v De Villiers 1993 1)SACR 574 (Nm)

S v Harper 1981 1)SA 88 (D)

S v Howard (Johannesburg Regional Magistrates Court) unreported case number 41/258/02

Legislation

South Africa

Constitution of the Republic of South Africa, 1996

Electronic Communications and Transactions Act 25 of 2002

National Credit Act 34 of 2005

Promotion of Access to Information Act 2 of 2000

Protection of Personal Information Act 4 of 2013

Uganda

Computer Misuse Act 2 of 2011

Electronic Commerce Act 8 of 2011

Electronic Signatures Act 7 of 2011

Government publications

GN 504 in GG 29995 of 20 July 2007 (Regulations relating to Authentication Service Providers)

GN 888 in GG 35821 of 28 October 2012 (Electronic Communications and Transactions Amendment Bill)

General Intelligence Laws Amendment Bill, 2011 [B25-2011]

Protection of State Information Bill, 2010 [B6-2010]

International instruments

Convention on Cybercrime (2011)

Draft Convention on Cyber-legislation in Africa (2012)

Draft EAC Framework for Cyber-laws (Phase I) (2008)

EAC Cyber-laws Framework (2009)

SADC Draft Model Law on Crime and Cybercrime (2012)

Internet sources

Anon 2013 http://www.news24.com/Technology/News/Microsoft-joins-Google-in-US-spying-suit-20130831

Anonymous 2013 Microsoft Joins Google in Spying Suit http://www.news24.com/Technology/News/Microsoft-joins-Google-in-US-spying-suit-20130831 accessed 4 September 2013

JSTOR 2014 http://www.jstor.org

JSTOR 2014 JSTOR Home Page http://www.jstor.org accessed 28 February 2014

Napolitano 2013 http://reason.com/archives/2013/11/07/how-can-the-nsa-spy-on-merkel-the-pope-t

Napolitano A 2013 How can the NSA Spy on Merkel, the Pope, the UN and the Rest of Us? http://reason.com/archives/2013/11/07/how-can-the-nsa-spy-on-merkel-the-pope-t accessed 7 November 2013

Published

21-04-2017

Issue

Section

Articles

How to Cite

Van der Merwe, D. (2017). A Comparative Overview of the (Sometimes Uneasy) Relationship between Digital Information and Certain Legal Fields in South Africa and Uganda. Potchefstroom Electronic Law Journal, 17(1), 296-326. https://doi.org/10.17159/1727-3781/2014/v17i1a2250

Similar Articles

421-430 of 1145

You may also start an advanced similarity search for this article.