Formulating specialised Legislation to address the Growing Spectre of Cybercrime: A Comparative Study
DOI:
https://doi.org/10.17159/1727-3781/2009/v12i4a2740Keywords:
Cyber legislation, cybercrime, inability of national laws, specialised cyber legislation, comparative law, procedural laws, intangible evidence, traditional crimes, tangible evidence, evolving technology, international co-operation, global nature of cyberAbstract
The article looks at cyber legislation formulated to address cybercrime in the United States of America, the United Kingdom, Australia, India, the Gulf States and South Africa. The study reveals that the inability of national laws to address the challenges posed by cybercrime has led to the introduction of specialised cyber legislation. It is advocated that countries should amend their procedural laws to include intangible evidence of cybercrime, as opposed to tangible evidence of traditional crimes. It is possible that new forms of cybercrime will often emerge with evolving technology; therefore new cyber laws should be introduced to respond to these rapid changes. There should also be continuous research and training of IT security personnel, financial services sector personnel, police officers, prosecutors and the judiciary to keep them abreast of the evolving technology. International co-operation between countries is also required to address the global nature of cybercrime. To this end countries such as South Africa should ratify the Council of Europe’s Convention on Cybercrime (COECC) to serve as a deterrent against international cybercrime. A balanced approach that considers the protection of fundamental human rights and the need for the effective prosecution of cybercrime has been mooted as the way forward.
Downloads
References
Bibliography
Allan 2005 NZLR
Allan G "Responding to cybercrime: A delicate blend of the orthodox and the alternative" 2005 New Zealand Law Review 149-178
Anon 2006 Computer Fraud and Security
Anonymous "US ratifies international crime treaty" 2006 (11) Computer Fraud and Security 2-3
Anon 2006 Harvard LR
Anonymous "Immunizing the Internet, or: how I learned to stop worrying and love the worm" 2006 (119) Harvard Law Review 2442-2463
Anon The Peninsula
Anonymous 'Online sex pests censured' The Peninsula 5 April 2008 9
Audal et al 2008 ACLR
Audal et al "Computer crimes" 2008 (45) The American Criminal Law Review 233-272
Bazelon et al 2006 ACLR
Bazelon E et al "Computer crimes" 2006 (43) The American Criminal Law Review 260-308
Bekker et al "The criminal courts"
Bekker PM et al "The criminal courts of the Republic" in Joubert JJ et al (eds) Criminal Procedure Handbook (Juta Cape Town 2007) 37-38
Berg 2007 Michigan Bar Journal
Berg T "The changing face of cybercrime: New Internet threats create challenges to law enforcement" 2007 (86) Michigan Bar Journal 18-22
Blackwell 1997 Canadian Lawyer
Blackwell G "A jurisdiction called cyberspace?" 1997 Canadian Lawyer 22-23
Brenner 2001 Murdoch Univ EJL
Brenner S "Cybercrime investigation and prosecution: the role of penal and procedural law" 2001 (8) Murdoch University Electronic Journal of Law 1-16
Brenner and Clarke 2005 John Marshall JCIL
Brenner SW and Clarke LL "Distributing security: Preventing cybercrime" 2005 (23) John Marshall Journal of Computer and Information Law 659-209
Brenner and Koops 2004 JHTL
Brenner S and Koops B-J "Approaches to jurisdiction" 2004 (4) Journal of High Technology Law 1-46
Bronitt and Gani 2003 Crim LJ
Bronitt S and Gani M "Shifting boundaries of cybercrime: From computer hacking to cyberterrorism" 2003 (27) Criminal Law Journal 303-317
Burchell 2002 SALJ
Burchell J "Criminal justice at the crossroads" 2002 South African Law Journal 579-602
Chelemu 2009 The Times
Chelemu K "Banks open files for police in SMS scam case" 2009 The Times 23 July 2009 6
Collier 2005 Juta's Business Law
Collier D "Evidently not so simple: producing computer print-outs in court" 2005 (13) Juta's Business Law 6-9
Dadhich and Shukla "Cybercrimes"
Dadhich A and Shukla G "Cybercrimes: An insight to the Indian position" in Kierkegaard SM (ed) Cyberlaw Security and Privacy (International Association of IT lawyers 2007) 414-425
Fafinski 2008 Journal of Criminal Law
Fafinski S "Computer misuse: The implications of the Police and Justice Act 2006" 2008 (72) Journal of Criminal Law 53-66
Finlay 1999 TBL
Finlay E "Litigation on the Net: personal jurisdiction in cyberspace" 1999 (62) Texas Bar Journal 334-341
Goodman and Brenner 2002 IJLIT
Goodman MD and Brenner S "The emerging consensus on criminal conduct in cyberspace" 2002 International Journal of Law and Information Technology 10 139-222
Hofman 2006 SACJ
Hofman J "Electronic evidence in criminal cases" 2006 South African Journal of Criminal Justice 3 257-275
Jahankhani 2007 IJESDF
Jahankhani H "Evaluating of cyber legislations trading in the global cyber village" 2007 (1)International Journal of Electronic Security and Digital Forensics 1-11
Kerr 2005/2006 Harvard LR
Kerr OS "Searches and seizures in a digital world" 2005/2006 119 (1-3) Harvard Law Review 532-585
McKenna 2004 Infosecurity Today
McKenna B "UK MPs call for Computer Misuse Act upgrade" 2004 Infosecurity Today July/August 5
Miquelan-Weissmann 2005 John Marshall JCIL
Miquelan-Weissmann MF "The Convention on Cybercrime: A harmonised implementation of international penal law: what prospects for procedural due process?" 2005 (23) John Marshall Journal of Computer and Information Law 1-28
Ormerod 2004 Crim LR
Ormerod DC "Case and comment" 2004 Criminal Law Review 951-954
SALRC Discussion Paper 109
South African Law Reform Commission Discussion Paper 109 Project 124 (October 2005)
Sibanda "Choice of law"
Sibanda OS "Choice of law, jurisdiction and recognition and enforcement of judgments in e-commerce in South Africa" in Kierkegaard SM (ed) Cyber Security and Privacy (International Association of IT lawyers 2007) 259-266
Snail and Madziwa 2008 Without Prejudice
Snail S and Madziwa S "Hacking, cracking and other unlawful online activities" 2008 Without Prejudice 30-31
Van der Merwe 2003 JCRDL
Van der Merwe DP "Computer crime- recent national and international developments" 2003 Journal of Contemporary Roman-Dutch Law 30-44
Van der Merwe 2007 JCRDL
Van der Merwe DP "Information technology crime – a new paradigm is needed" 2007 Journal of Contemporary Roman-Dutch Law 309-319
Van der Merwe et al ICT Law
Van der Merwe DP et al Information and Communications Technology Law (Lexis Nexis Durban 2008)
Van Zyl 2008 JCRDL
Van Zyl SP "Sexual offences and the Internet: Are we ready for 2010?" 2008 Journal of Contemporary Roman-Dutch Law 71 222-239
Wilson 2006 Aust LJ
Wilson J "Cybercrime in the private sector: partnerships between the private sector and law enforcement" 2006 (80) Australian Law Journal 694-704
Xingan 2007 Webology
Xingan L "International actions against cybercrime: Networking legal systems in the networked crime scene" 2007 (4) Webology 1-31
Register of legislation
South Africa
Constitution of the Republic of South Africa 1996
Civil Proceedings Act 25 of 1965
Criminal Procedure Act 51 of 1977
Electronic Communications and Transactions Act 25 of 2002
Films and Publications Act 65 of 1996
Financial Intelligent Centre Act 38 of 2001
Magistrate's Courts Act 32 of 1944
Prevention of Organised Crime Second Amendment Act 38 of 1999
Regulation of Interception of Communications and Provision of Communications-Related Information Act 70 of 2002
International
Australian Criminal Code 1995
Cybercrimes and Information Technology Act 2000 (India)
Cybercrimes Act Law 2 of 2006 (UAE)
Computer Misuse Act 1990 (UK)
Criminal Code and Cybercrime Act 2001 (Australia)
Electronic Communications Privacy Act of 1986 (USA)
National Information Infrastructure Protection Act 1996 (USA)
Penal Code Act 11 of 2004 (Qatar)
Patriot Act 2001 (USA)
Register of court cases
South Africa
Bid Industrial Holdings (Pty) Ltd v Strang and Others 2007 SCA 144 (RSA)
Motata v Nair NO and Another 2009 1 SACR 263 (T); 2009 2 SA 575 (T); (7023/2008) [2008] ZAFSHC 53 (11 June 2008)
SB Jafta v Ezemvelo KZN Wildlife (Case D 204/07)
S v Harper and Another 1981 (1) SA 88 (D)
Narlis v South African Bank of Athens 1976 (2) SA 573 (A)
S v Ndiki and Others 2008 (2) SACR 252
Ndlovu v Minister of Correctional Services and Another 2006 (4) All SA 165 (W)
S v Ntuli 1970 (2) SA 278 (W)
S v Maseki 1981 (4) SA 374 (T)
S v Mpumlo 1986 (3) SA 485 (E)
Secombe v AG 1919 TPD 270
International
Director of Public Prosecution v Sutcliffe [2001] VSC 43 (Victoria, Australia)
R v Gold (1988) AC 1063
R v Smith (Wallace) No 4 [2004] EWCA Crim 631
US v Councilman 385 F3d 793 (first Circuit 2005)
US v Gorshov 2001 WL 1024026
US v Judd 46 F3d 961 (California Circuit 1995)
US v Thomas 74 F3d 70 (Sixth Circuit 1996)
Register of internet resources
Anon 2009 www.ib.com/
Anonymous 2009 South Africa has the lowest software piracy rate in Africa, while Zimbabwe has the highest in the world www.ib/.com/internat.law-news [accessed on 1 June 2009]
Anon 2009 www.legalbrief.co.za/
Anonymous 2009 Judge Motata guilty of drunk driving www.legalbrief.co.za/article [accessed on 3 September 2009]
Anon 2009 www.news24.com/
Anonymous 2009 Huge growth in cybercrime www.news24.com/News24/SouthAfrica [accessed on 10 June 2009]
Anon 2009 www.zawya.com
Anonymous 2009 Cybercrime increasing in Qatar www.zawya.com [accessed on 20 May 2009]
Anon 2009a www.mg.co.za/
Anonymous 2009a Motata found guilty of drunken driving www.mg.co.za/article/2009-09-02 [accessed on 3 September 2009]
Anon 2009b www.mg.co.za/
Anonymous 2009b Motata to appeal drunken-driving ruling www.mg.co.za/article/2009-09-09 [accessed on 10 September 2009]
Anon 2007 it-online.co.za/
Anonymous 2007 SA looks to tackle cyber crime with CSIRT it-online.co.za/conte't/view/180306/129 [accessed on 26 November 2007]
Anon 2007 www.crime-research.org/
Anonymous 2007 South Africa to tackle cyber crime www.crime-research.org/news/11.07.2006/2115/ [accessed on 26 November 2007]
Anon 2007 www.iol.co.za/
Anonymous 2007 Bank clients warned of phishing scam www.iol.co.za/general/news [accessed on 27 May 2007]
Anon 2007 www.polity.org.za/
Anonymous 2007 Examining the real cost of virtual crime www.polity.org.za/article [accessed on 27 November 2007]
Anon 2006a archive.gulfnews.com/
Anonymous 2006a E-government studies smart card to replace ID archive.gulfnews.com/articles [accessed on 3 March 2009]
Anon 2006b archive.gulfnews.com
Anonymous 2006b Federal law covers all areas of cyber crime archive.gulfnews.com [accessed on 12 February 2006]
Bowman 2006 www.itp.net/
Bowman D 2006 Saudi passes cyber crime laws www.itp.net/index [accessed on 15 October 2006]
Cybercrime Law 2007 www.cybercrimelaw.net/
Cybercrime Law 2007 What is cybercrime? www.cybercrimelaw.net/content/cybercrime.html [accessed on 27 November 2007]
Cybercrime Law 2009 www.cybercrimelaw.net/
Cybercrime Law 2009 Cybercrime Law www.cybercrimelaw.net/ [accessed on 21 May 2009]
Dearne 2008 www.australianit.news.com.au/
Dearne K 2008 Cyber treaty may mean new laws www.australianit.news.com.au/story [accessed on 27 May 2008]
DIT 2009 dit.mp.gov.in/
Department of Information Technology Government of Madhya Pradesh 2009 Cyber laws in India dit.mp.gov.in/cyberlawt.htm [accessed on 6 May 2009]
DPA 2009 www.thepeninsulaqatar.com/
DPA 2009 Tourists in Philippines attracted to pirated goods www.thepeninsulaqatar.com/Display_news.asp?section=world_news&month=march2009&file=world_news200903018535.xml [accessed on 1 March 2009]
Herselman and Warren 2004 www.dealin.edu.au/
Herselman M and Warren M 2004 Cyber crime influencing businesses in South Africa www.dealin.edu.au/dro/view [accessed on 10 June 2009]
Howe 2007 archive.gulfnews.com/
Howe M 2007 Gulf States to combat cybercrime archive.gulfnews.com/articles [accessed on 19 June 2007]
Krebs 2008 blog.washingtonpost-com/
Krebs B 2008 Senate approves bill to fight cyber-crime blog.washingtonpost-com/security fix/2008/07 [accessed on 21 May 2009]
Leyden 2008 www.theregister.co.uk/
Leyden J 2008 UK cyber crime overhaul finally comes into effect www.theregister.co.uk/2008/09 [accessed on 21 May 2009]
Mndzima and Snail 2009 www.hg.org/
Mndzima S and Snail S 2009 Cyber crime in South Africa www.hg.org/article [accessed on 14 April 2009]
Ogundeji 2008 www.thestandard.com/
Ogundeji OA 2008 African states to discuss cybercrime www.thestandard.com/news/2008 [accessed on 21 May 2009]
Roberts 2007 archive.gulfnews.com/
Roberts L 2007 Gulf States to combat cyber crime; Gulf States plan unified action on cybercrime law archive.gulfnews.com/articles [accessed on 19 June 2007]
Singh 2009 www.ind.ii.org/
Singh T 2009 Cyberlaw and Information Technology www.ind.ii.org/cyberlaw.aspx [accessed on 6 May 2009]
SABRIC 2009 www.sabric.co.za
SABRIC 2009 South African Banking Risk Information Centre www.sabric.co.za/ [accessed on 10 December 2009]
Special Correspondent 2008 www.thehindu.com/
Special Correspondent 2008 Parliament approves cyber crime Bill www.thehindu.com/2008/12/24/stories/2008122456021400.htm [accessed on 21 May 2009]
Townson 2006 www.gulf-times.com
Townson P 2006 Call for legal steps to fight cyber crimes www.gulf-times.com [accessed on 3 March 2009]
Published
Issue
Section
License
Copyright (c) 2017 Fawzia Cassim
This work is licensed under a Creative Commons Attribution 4.0 International License.