Formulating specialised Legislation to address the Growing Spectre of Cybercrime: A Comparative Study

Authors

  • Fawzia Cassim University of South africa

DOI:

https://doi.org/10.17159/1727-3781/2009/v12i4a2740

Keywords:

Cyber legislation, cybercrime, inability of national laws, specialised cyber legislation, comparative law, procedural laws, intangible evidence, traditional crimes, tangible evidence, evolving technology, international co-operation, global nature of cyber

Abstract

The article looks at cyber legislation formulated to address cybercrime in the United States of America, the United Kingdom, Australia, India, the Gulf States and South Africa. The study reveals that the inability of national laws to address the challenges posed by cybercrime has led to the introduction of specialised cyber legislation. It is advocated that countries should amend their procedural laws to include intangible evidence of cybercrime, as opposed to tangible evidence of traditional crimes. It is possible that new forms of cybercrime will often emerge with evolving technology; therefore new cyber laws should be introduced to respond to these rapid changes. There should also be continuous research and training of IT security personnel, financial services sector personnel, police officers, prosecutors and the judiciary to keep them abreast of the evolving technology. International co-operation between countries is also required to address the global nature of cybercrime. To this end countries such as South Africa should ratify the Council of Europe’s Convention on Cybercrime (COECC) to serve as a deterrent against international cybercrime. A balanced approach that considers the protection of fundamental human rights and the need for the effective prosecution of cybercrime has been mooted as the way forward.

    ScienceOpen_Log0424.png

Downloads

Download data is not yet available.

References

Bibliography

Allan 2005 NZLR

Allan G "Responding to cybercrime: A delicate blend of the orthodox and the alternative" 2005 New Zealand Law Review 149-178

Anon 2006 Computer Fraud and Security

Anonymous "US ratifies international crime treaty" 2006 (11) Computer Fraud and Security 2-3

Anon 2006 Harvard LR

Anonymous "Immunizing the Internet, or: how I learned to stop worrying and love the worm" 2006 (119) Harvard Law Review 2442-2463

Anon The Peninsula

Anonymous 'Online sex pests censured' The Peninsula 5 April 2008 9

Audal et al 2008 ACLR

Audal et al "Computer crimes" 2008 (45) The American Criminal Law Review 233-272

Bazelon et al 2006 ACLR

Bazelon E et al "Computer crimes" 2006 (43) The American Criminal Law Review 260-308

Bekker et al "The criminal courts"

Bekker PM et al "The criminal courts of the Republic" in Joubert JJ et al (eds) Criminal Procedure Handbook (Juta Cape Town 2007) 37-38

Berg 2007 Michigan Bar Journal

Berg T "The changing face of cybercrime: New Internet threats create challenges to law enforcement" 2007 (86) Michigan Bar Journal 18-22

Blackwell 1997 Canadian Lawyer

Blackwell G "A jurisdiction called cyberspace?" 1997 Canadian Lawyer 22-23

Brenner 2001 Murdoch Univ EJL

Brenner S "Cybercrime investigation and prosecution: the role of penal and procedural law" 2001 (8) Murdoch University Electronic Journal of Law 1-16

Brenner and Clarke 2005 John Marshall JCIL

Brenner SW and Clarke LL "Distributing security: Preventing cybercrime" 2005 (23) John Marshall Journal of Computer and Information Law 659-209

Brenner and Koops 2004 JHTL

Brenner S and Koops B-J "Approaches to jurisdiction" 2004 (4) Journal of High Technology Law 1-46

Bronitt and Gani 2003 Crim LJ

Bronitt S and Gani M "Shifting boundaries of cybercrime: From computer hacking to cyberterrorism" 2003 (27) Criminal Law Journal 303-317

Burchell 2002 SALJ

Burchell J "Criminal justice at the crossroads" 2002 South African Law Journal 579-602

Chelemu 2009 The Times

Chelemu K "Banks open files for police in SMS scam case" 2009 The Times 23 July 2009 6

Collier 2005 Juta's Business Law

Collier D "Evidently not so simple: producing computer print-outs in court" 2005 (13) Juta's Business Law 6-9

Dadhich and Shukla "Cybercrimes"

Dadhich A and Shukla G "Cybercrimes: An insight to the Indian position" in Kierkegaard SM (ed) Cyberlaw Security and Privacy (International Association of IT lawyers 2007) 414-425

Fafinski 2008 Journal of Criminal Law

Fafinski S "Computer misuse: The implications of the Police and Justice Act 2006" 2008 (72) Journal of Criminal Law 53-66

Finlay 1999 TBL

Finlay E "Litigation on the Net: personal jurisdiction in cyberspace" 1999 (62) Texas Bar Journal 334-341

Goodman and Brenner 2002 IJLIT

Goodman MD and Brenner S "The emerging consensus on criminal conduct in cyberspace" 2002 International Journal of Law and Information Technology 10 139-222

Hofman 2006 SACJ

Hofman J "Electronic evidence in criminal cases" 2006 South African Journal of Criminal Justice 3 257-275

Jahankhani 2007 IJESDF

Jahankhani H "Evaluating of cyber legislations trading in the global cyber village" 2007 (1)International Journal of Electronic Security and Digital Forensics 1-11

Kerr 2005/2006 Harvard LR

Kerr OS "Searches and seizures in a digital world" 2005/2006 119 (1-3) Harvard Law Review 532-585

McKenna 2004 Infosecurity Today

McKenna B "UK MPs call for Computer Misuse Act upgrade" 2004 Infosecurity Today July/August 5

Miquelan-Weissmann 2005 John Marshall JCIL

Miquelan-Weissmann MF "The Convention on Cybercrime: A harmonised implementation of international penal law: what prospects for procedural due process?" 2005 (23) John Marshall Journal of Computer and Information Law 1-28

Ormerod 2004 Crim LR

Ormerod DC "Case and comment" 2004 Criminal Law Review 951-954

SALRC Discussion Paper 109

South African Law Reform Commission Discussion Paper 109 Project 124 (October 2005)

Sibanda "Choice of law"

Sibanda OS "Choice of law, jurisdiction and recognition and enforcement of judgments in e-commerce in South Africa" in Kierkegaard SM (ed) Cyber Security and Privacy (International Association of IT lawyers 2007) 259-266

Snail and Madziwa 2008 Without Prejudice

Snail S and Madziwa S "Hacking, cracking and other unlawful online activities" 2008 Without Prejudice 30-31

Van der Merwe 2003 JCRDL

Van der Merwe DP "Computer crime- recent national and international developments" 2003 Journal of Contemporary Roman-Dutch Law 30-44

Van der Merwe 2007 JCRDL

Van der Merwe DP "Information technology crime – a new paradigm is needed" 2007 Journal of Contemporary Roman-Dutch Law 309-319

Van der Merwe et al ICT Law

Van der Merwe DP et al Information and Communications Technology Law (Lexis Nexis Durban 2008)

Van Zyl 2008 JCRDL

Van Zyl SP "Sexual offences and the Internet: Are we ready for 2010?" 2008 Journal of Contemporary Roman-Dutch Law 71 222-239

Wilson 2006 Aust LJ

Wilson J "Cybercrime in the private sector: partnerships between the private sector and law enforcement" 2006 (80) Australian Law Journal 694-704

Xingan 2007 Webology

Xingan L "International actions against cybercrime: Networking legal systems in the networked crime scene" 2007 (4) Webology 1-31

Register of legislation

South Africa

Constitution of the Republic of South Africa 1996

Civil Proceedings Act 25 of 1965

Criminal Procedure Act 51 of 1977

Electronic Communications and Transactions Act 25 of 2002

Films and Publications Act 65 of 1996

Financial Intelligent Centre Act 38 of 2001

Magistrate's Courts Act 32 of 1944

Prevention of Organised Crime Second Amendment Act 38 of 1999

Regulation of Interception of Communications and Provision of Communications-Related Information Act 70 of 2002

International

Australian Criminal Code 1995

Cybercrimes and Information Technology Act 2000 (India)

Cybercrimes Act Law 2 of 2006 (UAE)

Computer Misuse Act 1990 (UK)

Criminal Code and Cybercrime Act 2001 (Australia)

Electronic Communications Privacy Act of 1986 (USA)

National Information Infrastructure Protection Act 1996 (USA)

Penal Code Act 11 of 2004 (Qatar)

Patriot Act 2001 (USA)

Register of court cases

South Africa

Bid Industrial Holdings (Pty) Ltd v Strang and Others 2007 SCA 144 (RSA)

Motata v Nair NO and Another 2009 1 SACR 263 (T); 2009 2 SA 575 (T); (7023/2008) [2008] ZAFSHC 53 (11 June 2008)

SB Jafta v Ezemvelo KZN Wildlife (Case D 204/07)

S v Harper and Another 1981 (1) SA 88 (D)

Narlis v South African Bank of Athens 1976 (2) SA 573 (A)

S v Ndiki and Others 2008 (2) SACR 252

Ndlovu v Minister of Correctional Services and Another 2006 (4) All SA 165 (W)

S v Ntuli 1970 (2) SA 278 (W)

S v Maseki 1981 (4) SA 374 (T)

S v Mpumlo 1986 (3) SA 485 (E)

Secombe v AG 1919 TPD 270

International

Director of Public Prosecution v Sutcliffe [2001] VSC 43 (Victoria, Australia)

R v Gold (1988) AC 1063

R v Smith (Wallace) No 4 [2004] EWCA Crim 631

US v Councilman 385 F3d 793 (first Circuit 2005)

US v Gorshov 2001 WL 1024026

US v Judd 46 F3d 961 (California Circuit 1995)

US v Thomas 74 F3d 70 (Sixth Circuit 1996)

Register of internet resources

Anon 2009 www.ib.com/

Anonymous 2009 South Africa has the lowest software piracy rate in Africa, while Zimbabwe has the highest in the world www.ib/.com/internat.law-news [accessed on 1 June 2009]

Anon 2009 www.legalbrief.co.za/

Anonymous 2009 Judge Motata guilty of drunk driving www.legalbrief.co.za/article [accessed on 3 September 2009]

Anon 2009 www.news24.com/

Anonymous 2009 Huge growth in cybercrime www.news24.com/News24/SouthAfrica [accessed on 10 June 2009]

Anon 2009 www.zawya.com

Anonymous 2009 Cybercrime increasing in Qatar www.zawya.com [accessed on 20 May 2009]

Anon 2009a www.mg.co.za/

Anonymous 2009a Motata found guilty of drunken driving www.mg.co.za/article/2009-09-02 [accessed on 3 September 2009]

Anon 2009b www.mg.co.za/

Anonymous 2009b Motata to appeal drunken-driving ruling www.mg.co.za/article/2009-09-09 [accessed on 10 September 2009]

Anon 2007 it-online.co.za/

Anonymous 2007 SA looks to tackle cyber crime with CSIRT it-online.co.za/conte't/view/180306/129 [accessed on 26 November 2007]

Anon 2007 www.crime-research.org/

Anonymous 2007 South Africa to tackle cyber crime www.crime-research.org/news/11.07.2006/2115/ [accessed on 26 November 2007]

Anon 2007 www.iol.co.za/

Anonymous 2007 Bank clients warned of phishing scam www.iol.co.za/general/news [accessed on 27 May 2007]

Anon 2007 www.polity.org.za/

Anonymous 2007 Examining the real cost of virtual crime www.polity.org.za/article [accessed on 27 November 2007]

Anon 2006a archive.gulfnews.com/

Anonymous 2006a E-government studies smart card to replace ID archive.gulfnews.com/articles [accessed on 3 March 2009]

Anon 2006b archive.gulfnews.com

Anonymous 2006b Federal law covers all areas of cyber crime archive.gulfnews.com [accessed on 12 February 2006]

Bowman 2006 www.itp.net/

Bowman D 2006 Saudi passes cyber crime laws www.itp.net/index [accessed on 15 October 2006]

Cybercrime Law 2007 www.cybercrimelaw.net/

Cybercrime Law 2007 What is cybercrime? www.cybercrimelaw.net/content/cybercrime.html [accessed on 27 November 2007]

Cybercrime Law 2009 www.cybercrimelaw.net/

Cybercrime Law 2009 Cybercrime Law www.cybercrimelaw.net/ [accessed on 21 May 2009]

Dearne 2008 www.australianit.news.com.au/

Dearne K 2008 Cyber treaty may mean new laws www.australianit.news.com.au/story [accessed on 27 May 2008]

DIT 2009 dit.mp.gov.in/

Department of Information Technology Government of Madhya Pradesh 2009 Cyber laws in India dit.mp.gov.in/cyberlawt.htm [accessed on 6 May 2009]

DPA 2009 www.thepeninsulaqatar.com/

DPA 2009 Tourists in Philippines attracted to pirated goods www.thepeninsulaqatar.com/Display_news.asp?section=world_news&month=march2009&file=world_news200903018535.xml [accessed on 1 March 2009]

Herselman and Warren 2004 www.dealin.edu.au/

Herselman M and Warren M 2004 Cyber crime influencing businesses in South Africa www.dealin.edu.au/dro/view [accessed on 10 June 2009]

Howe 2007 archive.gulfnews.com/

Howe M 2007 Gulf States to combat cybercrime archive.gulfnews.com/articles [accessed on 19 June 2007]

Krebs 2008 blog.washingtonpost-com/

Krebs B 2008 Senate approves bill to fight cyber-crime blog.washingtonpost-com/security fix/2008/07 [accessed on 21 May 2009]

Leyden 2008 www.theregister.co.uk/

Leyden J 2008 UK cyber crime overhaul finally comes into effect www.theregister.co.uk/2008/09 [accessed on 21 May 2009]

Mndzima and Snail 2009 www.hg.org/

Mndzima S and Snail S 2009 Cyber crime in South Africa www.hg.org/article [accessed on 14 April 2009]

Ogundeji 2008 www.thestandard.com/

Ogundeji OA 2008 African states to discuss cybercrime www.thestandard.com/news/2008 [accessed on 21 May 2009]

Roberts 2007 archive.gulfnews.com/

Roberts L 2007 Gulf States to combat cyber crime; Gulf States plan unified action on cybercrime law archive.gulfnews.com/articles [accessed on 19 June 2007]

Singh 2009 www.ind.ii.org/

Singh T 2009 Cyberlaw and Information Technology www.ind.ii.org/cyberlaw.aspx [accessed on 6 May 2009]

SABRIC 2009 www.sabric.co.za

SABRIC 2009 South African Banking Risk Information Centre www.sabric.co.za/ [accessed on 10 December 2009]

Special Correspondent 2008 www.thehindu.com/

Special Correspondent 2008 Parliament approves cyber crime Bill www.thehindu.com/2008/12/24/stories/2008122456021400.htm [accessed on 21 May 2009]

Townson 2006 www.gulf-times.com

Townson P 2006 Call for legal steps to fight cyber crimes www.gulf-times.com [accessed on 3 March 2009]

Published

26-06-2017

Issue

Section

Articles

How to Cite

Cassim, F. (2017). Formulating specialised Legislation to address the Growing Spectre of Cybercrime: A Comparative Study. Potchefstroom Electronic Law Journal, 12(4), 35-79. https://doi.org/10.17159/1727-3781/2009/v12i4a2740

Similar Articles

241-250 of 1178

You may also start an advanced similarity search for this article.