LCR4805 Notes
LCR4805 Notes
These are my personal notes. I make no representation that they are correct or studying them will help you pass
LCR409.
In fact, I make exactly the opposite representation: if you only use these notes to study, you will probably fail.
Make sure that you only use these notes as a staring point.
There is a difference between an individual and the media in the degree of liability. Thus distinction:
1. mass media: online newspapers and magazines and other online news services
2. not mass media: senders of email messages and participants in real-time chat groups
3. bulletin boards and newsgroups:
a. no editorial control is exercised: postings probably not regarded as “mass media”.
Authors of defamatory email messages liable are liable, but possibly also employers.
Employers can be held vicariously liable for delicts committed by employees in course and scope of employment.
Whether employer will be held liable, will depend on surrounding circumstances. Important factor: whether
defamatory email was sufficiently connected to the employer's business or whether the employee was on a so-called “
frolic of his own”
Liability of ISPs for defamatory content
Liability of ISPs: to a large extent dependent on their function and role in the publication process and a distinction,
based on their respective functions is generally made between:
authors, editors and publishers of the material , where some form of editorial control is usually exercised
distributors linked to the distribution process such as hosts, and network and service providers
common carriers who serve merely as conduits in the transmission and routing process (analogous to a post
office or telephone company), for example, access providers and possibly hosts, depending on their role in the
publication process
Stratton Oakmont Inc et al v Prodigy Services Company: Court held: Prodigy, should be held liable as a publisher,
rather than a distributor, for information published on the defendant’s bulletin boards.
Court argued that Prodigy was liable as a publisher of the defamatory content due to the following:
1. Prodigy held itself out to the public and its members as controlling the content of its bulletin board
2. Prodigy exerted editorial control over its content through the use of an automatic screening software program
and board leaders to enforce its content guidelines
Case was taken on appeal and overturned.
Current:
Lunney v Prodigy Services: ISPs could claim to be common carriers.
Liability of ISP was not decided by relying on the distinction between a publisher and a distributor and the
indemnity provided by section 230 of the CDA, but the court granted the ISP the common-law privilege usually given
to telephone and postal companies, namely, that of being a mere conduit or common carrier.
Court decided that Prodigy was not a publisher of messages but, rather, a passive conduit for the information,
similar to a telephone company and, therefore, not liable.
In USA a distinction is drawn between primary and secondary publishers: in the case of a secondary publisher
(mere distributor as in the case of an ISP), onus is on the claimant to prove fault by the secondary publisher.
The Communications Decency Act of 1996 section 230(c) of the Act: expressly provides that ISPs are not liable as
the publishers “of any information provided by another information content provider”.
Zeran v America Online: started trend of establishing broad immunity for ISPs from defamation liability under
Section 230(c) of the CDA.
Position in the UK
I.t.o. liability of ISPs in the UK, distinction is generally made between
1. publishers of defamatory material on, for example, bulletin boards
2. innocent disseminators of such material.
1. If considered to be publishers, i.t.o. principles of strict liability of publishers for defamation, may be found liable
for defamation without fault.
a. Will have to rely on the same defences available to an author, i.e. liability would depend on whether
alleged defamatory allegation was truthful, constituted fair comment, or was privileged.
2. If they can argue successfully that they do not take an active part in the actual process of communication, but
merely provide the means to make it possible, they may be able to rely on one of two defences, namely
a. The common-law defence of innocent dissemination, or
b. The statutory defence of innocent dissemination in terms of section 1 of the Defamation Act of 1996.
Problem of relying on this defence: in order for it to succeed, ISPs also have to convince the court that
1. they took reasonable care in relation to publication of the statement complained of
2. they did not know, and had no reason to believe, that what they did caused or contributed to the publication of
a defamatory statement
Electronic Communications and Transactions Act of 2002
Chapter 11 of this Act provides for the limitation of liability of ISPs for transmitting, routing, temporarily storing,
caching and hosting of unlawful material & providing links to unlawful material in certain prescribed circumstances.
Definitions
Service provider: any person providing information system services.
Information system services: the provision of connections, the operation of facilities for information systems, the
provision of access to information systems, the transmission or routing of data messages between or among points
specified by a user and the processing and storage of data, at the individual request of the recipient of the service.
Sections
Section 72: limitation of liability will only apply to an ISP if ISP is a member of the industry representative body
and has adopted and implemented the official code of conduct of such a representative body.
Section 71: Minister will only recognise such an industry representative body if the Minister is satisfied that:
1. members are subject to a code of conduct;
2. membership is subject to adequate criteria;
3. the code of conduct requires continued adherence to adequate standards of conduct; and
4. the representative body is capable of monitoring and enforcing its code of conduct adequately.
Section 73: ISP acting as a mere conduit will be exempt from liability if certain requirements are fulfilled.
ISPs who store, transmit, route, or provide access to data through such activity will be exempt from liability if ISP:
1. does not initiate the transmission
2. does not select the addressee;
3. performs the functions in an automatic, technical manner without selection of the data; and
4. does not modify the data contained in the transmission.
Section 73(2): acts of transmission, routing and provision of access mentioned in this section must be performed
for the sole purpose of transmitting information.
Section 74(1): exempts ISP from liability if data is cached on the system of the ISP for the sole purpose of making
the onward transmission of the data more efficient as long as the ISP
1. does not modify the data;
2. complies with conditions on access to the data;
3. complies with rules regarding updating of data;
4. does not interfere with the lawful use of technology to obtain information on the use of the data; and
5. removes or disables access to the data it has stored upon receiving a take-down notice referred to in section 77
Section 75(1): ISP that acts as a host of a website will be exempted from liability for damages arising from data
stored on the website:
1. as long as the ISP
a. does not have actual knowledge that the data message or an activity relating to the data message is
infringing the rights of a third party; or
b. is not aware of facts or circumstances from which the infringing activity or the infringing nature of the
data message is apparent; and
c. upon receipts of a take-down notification referred to in section 77, acts expeditiously to remove or to
disable access to the data.
2. Limitations on liability established by this section do not apply to a service provider unless it has designated an
agent to receive notifications of infringement and has provided through its services, including on its web sites in
location accessible to the public, the name, address, phone number and e-mail address of the agent.
Section 76: ISP will be exempted from liability for damages if the ISP refers or links users to a web page
containing an infringing data message “by using information location tools, including a directory, index, reference,
pointer or hyperlink, where the service provider:
1. does not have actual knowledge that the data message or an activity relating to the data message is infringing
the rights of that person;
2. is not aware of facts or circumstances from which the infringing activity or the infringing nature of the data
message is apparent;
3. does not receive a financial benefit directly attributable to the infringing activity; and
4. removes or disables access to, the reference or link to the data message or activity within a reasonable time
after being informed that the data message or the activity relating to such data message, infringes the rights of
a person.
No general obligation on ISPs who are members of the industry representative body and who provide the services
in terms of this Act to:
1. monitor the data they transmit or store
2. to actively seek facts or circumstances indicating an unlawful activity (s 78).
Implication of this legislation: if ISPs implement certain measures and notify their subscribers about these
measures, they will put themselves in a position to enter a so-called “safe harbour” where they will be exempted from
liability for damages arising from that objectionable material.
ISPs can be called to identify users
Defamed persons look to hold Internet intermediaries liable for material hosted, cached or carried by them.
Intermediary may:
1. offer the best hope of having the offending material removed from the Internet.
2. be the only deep pocket worth suing
3. be the only available and viable defendant
Position in the UK:
Compelling ISPs to disclose the identity of their subscribers:
Totalise v Motley Fool: stands as authority for the proposition that internet intermediaries can be ordered to
disclose the identity of their subscribers, where those subscribers have published material which is plainly defamatory.
Internet intermediaries may not in cases where the offending material gives rise to a strong prima facie case in
defamation refuse to respond to a request from a defamed person for access to information which would identify the
author of the offending material.
Other means of ascertaining the author of a defamatory Internet publication
Takenaka Ltd v Frankl: parties agreed to submit a computer to an expert for examination. The expert produced a
lengthy report which concluded that, on the balance of probabilities, the defendant had sent the offending e-mail
messages.
John Doe: commencement of proceedings against a John Doe defendant, followed by issuing a subpoena against
the relevant intermediary to obtain material which uncovers John Doe’s identity.
Position in the USA
Melvin v. Doe: Court held that if the plaintiff could prove the identity of defendant was
1. material, relevant, and necessary,
2. cannot be obtained by alternative means, and
3. is crucial to plaintiff’s case
the First Amendment would not protect the anonymity of the defendant
Ampex case: Court ruled that plaintiffs in libel actions must prove that the allegedly libellous statement is in fact
libellous before the identity of the speaker will be revealed (practically problematic, if not impossible).
Position in SA:
Rath v Rees: court held:
1. Anton Piller procedure should not have been used in order to obtain evidence to disclose the identity of the
anonymous user.
2. Firm pressure on ISPs to assist a potential plaintiff by identifying names & addresses of users who have posted
defamatory allegations
3. If they do not cooperate: may find themselves being joined to an action for defamation as publishers of matter.
4. According to general principles of defamation law: publication = the repeating of defamatory allegations.
Where does publication take place on the internet?
General rule: publication takes place where the defamatory content is read, seen or heard, and is completed when
the receiver understands the content.
Precedent: Dow Jones & Co Inc v Gutnick: material on the Internet is deemed to have been published wherever it
is viewed online, rather than the country of origin. (Also view of the Court in Tsichlas v Touch Line Media (Pty) Ltd)
Governments have been negotiating to draft Hague Convention on Jurisdiction and Foreign Judgments in Civil and
Commercial Matters. Aim: to harmonise rules for cross-border litigation between private parties. Would require
signatory countries to agree to enforce legal judgments handed down in other countries.
Defamatory material en email
Defamation will probably occur at the place where the offending material is accessed.
Employer can be held liable for a delict committed by its employee, if it is proved that
1. the employee is in fact liable for the delict,
2. that an employer/employee relationship existed at the time the delict was committed and
3. that the delict was committed by the employee “in the course and scope of his or her employment”
Whether an employer will be held liable for e-mail messages sent by its employees will depend on all the facts and
the surrounding circumstances.
Most important point: determine whether the offending act was committed in pursuance of the execution of the
employer's business or whether the employee can be said to have engaged in a “frolic of his own”.
Remedies
1. If the plaintiff is successful in proving that the words referring to the plaintiff are defamatory, plaintiff can claim
satisfaction from the defendant.
2. Plaintiff who can prove financial loss as a result of the defamatory statement: entitled to an award for damages
3. Person who is confronted with a threatening infringement of the right to his good name can apply for an
interdict to restrain publication
Privacy
Interests that are threatened by the processing of personal information
Private law concerns itself with two interests that are jeopardised when personal information is processed:
1. a person's privacy and
2. a person’s identity.
Definitions
Personal information: Information is regarded as personal when it can be associated with a person.
Private information: if a person wants to keep it from the knowledge of outsiders, i.e. he or she does not want
other people to know about it)
All private information will be personal information, but not all personal information is necessarily private.
Anonymous information: information that is collected about people in such a way that the information cannot be
linked to a specific person (cannot amount to a breach of privacy).
Sensitive personal information: refers to information that relates to the person's race or ethnic descent, political
convictions, religious beliefs and convictions, membership of a trade union, health and sex life.
Processing of data: includes any operation performed upon personal data, such as the collection, recording,
organisation, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination,
alignment or combination, blocking, erasure or destruction of such data.
Data controller: the natural or juristic person, public authority, agency or other body that determines the purposes
for which and the means by which the data are processed.
Data user: a person who receives data and applies them for various purposes.
Data subject: a person whose personal data are processed, i.e. the person to whom the data relates.
Any law that authorises the processing of information can be tested against the Constitution: the processing of the
data may not exceed the extent that the law authorises, otherwise the processing will be wrongful.
Intention
1. When wrongfulness of the privacy infringement has been established, a presumption of animus iniuriandi
arises, which may be rebutted by the defendant
2. Presumption of animus iniuriandi may be rebutted by defences such as rixa, jest or mistake.
Remedies
1. actio iniuriarum (mend injury to his or her personality)
2. actio legis Aquiliae (patrimonial loss)
3. interdict (prevent (further) damage)
Identity
Definition
A person's uniqueness or individuality which identifies or individualises him or her as a particular person and thus
distinguishes him or her from others. Identity is manifested in various indicia by which that particular person can be
recognised, in other words facets of personality which are characteristic of or unique to that person, such as his or
her life history, character, name, creditworthiness, voice, handwriting, appearance (physical image), et cetera.
Recognised as an independent personality right by SCA in Grutter v Lombard.
Ways of infringing identity
Identity is infringed if indicia are used in a way that does not reflect the person's true (own) personality image.
Following two forms of wrongful identity infringement may serve as guidelines for the development of
infringement of identity as an iniuria:
1. the public falsification of the personality image (described as “publicity which places the plaintiff in a false light
in the public eye”, or “false-light tort”)
2. the economic misappropriation of identity indicia, especially for advertising purposes (described as
“appropriation, for the defendant's advantage, of the plaintiff's name or likeness”, or “appropriation tort”)
Infringement by data processing: The processing of personal information will be an infringement of a person’s
right to identity when false information is processed about a person.
Difference between infringement of privacy and infringement of identity
Privacy:
True facts about the person are made known against his or her will: privacy is infringed
True private information re a person is processed/transmitted on the Internet: person's right to privacy is at stake
Identity
False use is made of the person's indicia: identity is infringed.
False or untrue information about him or her is processed or transmitted: person's right to identity is infringed
Wrongfulness and grounds of justification
Wrongfulness:
Wrongfulness of an infringement identity: determined by means of the boni mores / reasonableness criterion.
Wrongful in principle:
1. fixation of false information
2. the mass publication of false facts about a person
Grounds of justification:
Ground of justification excludes wrongfulness of an invasion of the right to identity.
Justifications:
1. Appropriation situation:
a. Consent
2. Identity infringement
a. necessity
b. self-defence
c. privilege
d. public interest (especially the public interest in information)
False or misleading data are not reasonably required to protect a justifiable interest. Therefore, for this reason, it
should not be permissible to save or use false or misleading data.
Intention
1. When wrongfulness of the identity infringement has been established, a presumption of animus iniuriandi
arises, which may be rebutted by the defendant
2. Presumption of animus iniuriandi may be rebutted by defences such as rixa, jest or mistake.
Data Protection
Data protection: refers to: a group of policies designed to regulate the collection, storage, use and transmission of
personal information.
SA does not have data-protection legislation, though most developed countries do.
History:
1981 COE Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data
(the Convention)
1981 OECD Guidelines governing the protection of privacy and transborder flows of personal data
(OECD Guidelines)
1990 UN Guidelines concerning computerized personal data files
1995 EU Directive on the protection of individuals with regard to the processing of personal data and on the
free movement of such data
(the Directive)
The Directive:
1. the most prominent document in the data protection arena.
2. binding on all EU member states
3. prescribes that member states must prohibit the transfer of personal data to non-member countries that do not
ensure an adequate level of data protection.
4. all the circumstances surrounding data transfer to non-member countries must be taken into account when
assessing the adequacy of the level of protection afforded by a third country.
5. Factors that must be taken into account:
a. the nature of the data
b. the purpose and duration of the proposed processing operation or operations
c. the country of origin and the country of final destination
d. the rules of law in force in the third country in question
e. the professional rules and security measures that are complied with in that country
6. Derogations from the prohibition on transfer of data to third countries without adequate protection for privacy
in the following circumstances:
a. data subject has unambiguously consented to the proposed transfer
b. transfer is necessary for the performance of a contract between the data subject and the controller or
the implementation of precontractual measures taken in response to the data subject's request
c. transfer is necessary for the conclusion or performance of a contract, concluded in the interest of the
data subject, between the controller and a third party
d. transfer is necessary or legally required on important public interest grounds, or for the establishment,
exercise or defence of legal claims
e. transfer is necessary in order to protect the vital interests of the data subject
f. transfer has been made from a register established by law and intended for consultation by the public
or persons having a legitimate interest
g. where the controller provides adequate safeguards for the protection of the privacy and fundamental
rights and freedoms of individuals. This might be done by means of appropriate contractual clauses.
Principles of data protection
All data-protection laws have certain basic rules or principles in common (referred to as “data-protection
principles” or “fair-information principles”).
OECD Guidelines spell out the following data-protection principles:
1. Openness (or transparency) principle
a. Requires: a general policy of openness about developments, practices & policies regarding personal data
b. Means should be readily available to establish the existence and nature of personal data, the main
purposes for which it is used, as well as the identity and usual residence of the data controller.
2. Purpose-specification principle
a. Linchpin of two other principles: the collection-limitation and the use-limitation principles.
b. Requires: purpose for which personal data is being collected should be specified no later than at the
time of data collection.
c. Subsequent use of data: limited to the fulfilment of that purpose / another compatible with it
d. Data no longer serves the purpose for which collected: should be erased / given in anonymous form.
3. Limitation of collection principle
a. Requires: there should be limits to the collection of personal data and that any such data should be
obtained by lawful and fair means and, if appropriate, with knowledge or consent of the data subject.
b. Special provisions should be made in case of information which is regarded as being especially sensitive
in nature. E.g. information relating to race, gender, sex, health or religion.
4. Limitation-of-use principle
a. Requires: personal data should not be disclosed, made available or otherwise used for purposes other
than those specified in accordance with the purpose-specification principle, except with the consent of
the data subject or by the authority of law.
5. Data-quality principle
a. Requires: personal data should be relevant to the purposes for which it is to be used, and, to the extent
necessary for those purposes, and should be accurate, complete and kept up to date.
6. Individual-participation principle
a. Individuals should have the right to:
i. obtain from a data controller confirmation of whether or not data controller has data relating to
them, and to have such data communicated to them
ii. be given reasons if a request is denied, and to be able to challenge such denial.
iii. challenge data relating to them and, if challenge is successful, have the data erased, rectified,
completed or amended. Thus entails: right to access, right to reasons and right to challenge
7. Security-safeguards principle
a. Personal data should be protected by reasonable security safeguards against such risks as loss or
unauthorised access, destruction, use, notification or disclosure of data.
8. Accountability principle
a. Data controller should be accountable for complying with measures that give effect to the principles
stated above.
Draft Bill on the Protection of Personal Information
Proposed Bill:
1. protects privacy of data subjects by prohibiting the processing of their personal information other than in
accordance with the conditions set out in the proposed Bill.
2. is a comprehensive, general law that governs the processing of personal information by both the public and the
private sectors with an oversight body that ensures compliance with the provisions of the proposed Bill.
3. makes provision for information protection officers to assist the oversight body
4. general provisions of the Bill can be made more specific for a particular profession by drawing up a code of
conduct for that particular industry, profession etc.
5. penalises any activity that is considered to be an interference of the protection of personal information in
addition to providing for civil remedies.
6. will also apply to the processing of personal information on the Internet
7. will in due course replace the provisions of the Electronic Communications and Transactions Act 25 of 2002
Objects of Bill
1. To give effect to the constitutional right to privacy by safeguarding a person's personal information when
processed by public and private bodies
2. To establish voluntary and mandatory mechanisms or procedures which will be in harmony with international
prescripts and which will, while upholding the right to privacy of personal information, at the same time
contribute to economic and social development in an era in which technology increasingly facilitates the
circulation and exchange of information
3. To promote transparency, accountability and effective governance of all public and private bodies by
empowering and educating all persons to understand their rights in terms of the Act in order to exercise their
rights in relation to public and private bodies
Scope
Determined by its definitional framework and its application provisions.
Bill applies to the
1. processing of
2. personal information
3. on a data subject
4. by
a. a data controller or
b. a data processor on behalf of the data controller
Bill's definition of “personal information”: information about an identifiable, natural person, and in so far as it is
applicable, an identifiable, juristic person.
Personal information:
1. the person must be “identifiable”
2. personal information of both natural and juristic persons is protected
3. PAI Act and the proposed Bill's definitions of personal information correspond, since the two pieces of
legislation are closely related
Data subject: the person to whom the personal information relates.
Responsible party: the natural/juristic person/administrative body/any other entity which, alone/in conjunction with
others, determines the purpose of and means for processing personal information. Synonymous with “data controller”.
May also be processed for the purpose of scientific research or statistics where:
1. the research serves a public interest,
2. the processing is necessary for the research or statistics concerned,
3. it appears to be impossible or would involve a disproportionate effort to ask for express consent, and
4. sufficient guarantees are provided to ensure that the processing does not adversely affect the individual privacy
of the data subject to a disproportionate extent
Supervision of proposed Bill by Information Protection Commission
Commission must:
1. promote an understanding & acceptance of information privacy principles and of the objects of those principles
2. monitor
a. compliance by public and private bodies of the provisions of this Act,
b. developments in information processing and computer technology to ensure that any adverse effects of
such developments on the protection of the personal information of persons are minimised
c. the use of unique identifiers of data subjects
3. consult with persons and bodies concerned with the protection of information privacy
4. act as mediator between opposing parties on any matter that concerns the need for action by one person in the
interests of the protection of the personal information of another person
5. provide advice to a Minister or a public or private body on their obligations under the provisions of the Act
6. receive and investigate complaints about alleged violations of the protection of personal information and make
reports to complainants
7. attempt to resolve complaints by means of dispute resolution mechanisms such as mediation and conciliation
8. serve notices in terms of the Act to further promote the resolution of disputes
9. report to the Minister on the desirability of the acceptance, by South Africa, of any international instrument
relating to the protection of the personal information of a person, and draw the Minister's attention to other
matters the Commission deemed necessary.
10.maintain an up-to-date register of the information processing notified to it
11.investigate troublesome planned processing activities before the processing starts
Exceptions: Provisions of subsection (1) do not apply where the decision referred to therein:
1. has been taken in connection with the conclusion or execution of a contract, and
a. the request of the data subject in terms of the contract has been met; or
b. appropriate measures have been taken to protect the data subject's lawful interests; or
2. is based on a law or code of conduct in which measures are laid down for protecting the lawful interests of data
subjects.
Act does not specifically require that the purpose for which the information is collected should be spelled out
before the collection takes place, but it is clear that the scope of the Act itself limits the purposes for which consumer
credit information can be used to consumer credit purposes
National register
1. National Credit Regulator must establish and maintain single national register of outstanding credit agreements
2. Whenever a credit provider enters into a credit agreement with a consumer, the credit provider must supply
certain information to either a credit bureau, or to the national register. Includes information about
a. the credit provider
b. the consumer, such as the name, address, identifying number
c. the credit provided, such as the credit limit, the principal debt involved and date on which the
agreement will come to an end
3. The termination or satisfaction of any credit agreement must also be reported
4. Any information reported to a credit bureau, must be given on by the credit bureau to the national register
5. National register of credit agreements will assist in making data processing in credit industry more transparent
Credit bureaus
CBs have certain duties in respect of consumer credit information:
1. take reasonable steps to verify the accuracy of such information reported to them
2. retain such information for prescribed periods
3. maintain consumer credit records in accordance with prescribed standards
4. expunge information that is not permitted to be stored
5. report to any person who requires it for a prescribed purpose or a purpose contemplated in the Act
6. may not knowingly or negligently provide a report containing inaccurate information.
Every person has the right to be advised of the fact that a credit provider is going to report adverse information on
him or her to a credit bureau, and to be given a copy of the information upon request.
Refusal
Credit provider, who refuses credit to a consumer, must
1. advise the consumer of the dominant reason for refusing credit.
2. if decision is based on an adverse credit record received from a credit bureau, the consumer must be supplied
with the name and contact details of the credit bureau
3. provision will enable a consumer to request access to the records of the particular credit bureau and to
challenge inaccurate information in its records.
ECTA does not prohibit spam, but contains provisions to regulate it:
1. Section 45(1)(a): provides that a person who sends unsolicited commercial communications to consumers must
provide the consumer with the option of cancelling his or her subscription to the mailing list of that person.
2. Section 45(1)(b): provides further that such person must provide the consumer with the identifying particulars
of the source from which the person obtained the consumer's personal information, on request of the
consumer.
a. Once the recipient of the spam has received the identifying particulars of the source, he or she can
institute a civil claim for privacy infringement if the elements of the delict can be proven.
3. If a “spammer” fails to comply with the provisions of section 45(1), he or she is guilty of an offence and liable
to a fine or imprisonment not exceeding 12 months.
Cookies
Used for tracking personal information on the web: a small file containing an ID number that is placed on the
user's hard drive by a website and which helps websites to track users over a session.
Informs website if a user returns to a website & can allow the site to track user’s activities across many websites.
Use of a “cookie” can infringe on the individual's privacy:
1. The information in the “cookie” (i.e. IP address) combined with other information that is provided by the ISP,
can identify an individual user.
2. Consequently, this information can be typified as personal information. If personal information is collected, it
must comply with the data-protection principles.
3. Where the user of the Internet is not aware that “cookies” of information about him or her are being collected,
this does not comply with the principles of data protection, which require that the data subject must be
informed that his or her personal information is being gathered, the reason for this and what it will be used for
Interception of electronic communications
Regulation of Interception of Communications and Provision of Communication-related Information Act 70 of 2002
(RICPCIA)
RICPCIA prohibits the interception of any communication, unless allowed by the Act.
Definitions:
Communication: includes both a direct communication and an indirect communication (email).
Indirect communication: is defined as the transfer of information in the form of speech, data or text, signals, et
cetera, that is transmitted in whole or in part by means of a postal service or a telecommunication system.
Direct communication: communication between two or more persons that occurs face to face.
The Act allows the interception of communication in the following situations:
1. under an interception direction
2. by a party to the communication
3. to prevent serious bodily harm
4. for purposes of determining location in case of an emergency
5. where authorised by certain other Acts
6. with the consent of a party to the communication
7. interception of indirect communication in connection with carrying on of a business
a. be used to enter into a transaction in the course of that business;
b. otherwise relate to that business; or
c. otherwise take place in the course of the carrying on of that business.
The penalties range from a fine to imprisonment for a period not exceeding five years, depending on the offence
committed. Intent is the form of culpability required in respect of the unauthorised access to, interception of or
interference with data.
A data message made in the ordinary course of business, or a copy or printout correctly certified to be correct is
on its mere production admissible in evidence and is rebuttable proof of the facts contained in such record, copy,
printout or extract.
Jurisdiction
Court in the Republic trying an offence in terms of the Act has jurisdiction where
1. the offence was committed in the Republic;
2. any act of preparation towards the offence or any part of the offence was committed in the Republic, or where
any result of the offence has had an effect in the Republic;
3. the offence was committed by a South African citizen ... or a person carrying on business in the Republic; or
4. the offence was committed on board any ship or aircraft registered in the Republic
Evidential matters
Electronic signatures and related concepts
Advanced electronic signature: an electronic signature which results from a process which has been accredited by
the Authority as provided for in section 37.
1. Accreditation Authority
a. Means the Director-General of the Department of Communications: acts as accreditation authority
b. An application for accreditation must
i. be made to the Accreditation Authority in the prescribed manner supported by the prescribed
information;
ii. be accompanied by a non-refundable prescribed fee, and
iii. a person falsely holding out its products or services to have been accredited by the
Accreditation Authority is guilty of an offence.
2. Process
a. Accreditation Authority may not accredit authentication products or services unless the Authority is
satisfied that an electronic signature to which such authentication products or services relate
i. is uniquely linked to the user;
ii. is capable of identifying that user;
iii. is created using means that can be maintained under the sole control of that user; and
iv. will be linked to the data or data message to which it relates in such a manner that any
subsequent change of the data or data message is detectible;
v. is based on the face-to-face identification of the user.
3. Electronic signature
a. means data attached to, incorporated in, or logically associated with other data and which is intended
by the user to serve as a signature;
Cryptography service: any service which is provided to a sender or recipient of a data message or to anyone
storing a data message, and is designed to facilitate the use of cryptographic techniques for the purpose of ensuring:
1. that such data or data message can be accessed or can be put into an intelligible form only by certain persons;
2. that the authenticity or integrity of such data or data message is capable of being ascertained;
3. the integrity of the data or data message; or
4. that the source of the data or data message can be correctly ascertained.
Data message: data generated, sent, received or stored by electronic means and includes:
1. voice, where the voice is used in an automated transaction;
2. a web page; and
3. a stored record.
Automated transaction: an electronic transaction conducted or performed, in whole or in part, by means of data
messages in which the conduct or messages of one or both of the parties are not reviewed by a natural person in the
ordinary course of such natural person's business or employment.
Substantive evidential provisions
1. Section 11: determines that information shall not be without legal force and effect merely on the grounds that
it is wholly or partly in the form of a “data message” or is referred to in a data message.
2. Section 12: determines that the requirement that a document or information be in writing will be complied with
if the information is in the form of a data message and accessible in a manner usable for subsequent reference.
3. Section 13: provides that a data message will only comply with the legal requirement of a signature if an
advanced electronic signature has been used. An electronic signature will not be deprived of legal force and
effect merely on the grounds that it is in an electronic format. The onus of proof is placed on the party who
alleges that an advanced electronic signature is not valid.
4. Section 14: addresses the question of the original form of information. If this is a legal requirement, a data
message will comply, provided that the information is capable of being displayed or produced for the person to
whom it is to be presented and if the integrity of the message complies with the following test:
a. considering whether the information has remained complete and unaltered, except for the addition of
any endorsement and any change which arises in the normal course of communication, storage and
display;
b. in the light of the purpose for which the information was generated; and
c. having regard to all other relevant circumstances.
5. Section 15: provides for the admissibility in evidence of a data message and that it be given due evidential
weight. The assessment of its weight should be carried out according to the following criteria:
a. the reliability of the manner in which the data message was generated, stored or communicated;
b. the reliability of the manner in which the integrity of the data message was maintained;
c. the manner in which the originator was identified; and
d. any other relevant factor
e. Messages generated n the ordinary course of business are admissible and shifts the onus of proof
6. Section 16: provides for the legal retention of information in the form of data messages, applying the same test
laid down for writing in section 13, coupled with additional guarantees of authenticity, as well as the fact that
the origin and destination of that data message and the date and time that it was sent or received can be
determined.
7. Section 17: deals with the production of documents and information (especially in civil procedure) and provides
that data messages may also fulfil this role, provided that certain conditions have been met.