scholarly journals IS CYBER SEARCH AND SEIZURE UNDER THE CYBERCRIMES AND CYBERSECURITY BILL CONSISTENT WITH THE PROTECTION OF PERSONAL INFORMATION ACT?

Obiter ◽  
2016 ◽  
Vol 37 (3) ◽  
Author(s):  
Melody Musoni

The focus of this note is to analyze whether the Cybercrimes and Cybersecurity Bill provides a harmonization between search and seizure and the constitutional right to privacy. This will be achieved by discussing the State powers of search and seizure in cyberspace vis-à-vis the right to privacy as envisaged in the Protection of Personal Information Act. Further, this note investigates whether the Cybercrimes and Cybersecurity Bill achieves the purpose of combatting cybercrimes without the infringement of the right to privacy. Subsequently, the article provides plausible recommendations on how the State should lawfully conduct searches and seizures of articles related to cybercrimes.

2020 ◽  
Vol 10 (2) ◽  
pp. 160-179
Author(s):  
Ciara Staunton ◽  
Rachel Adams ◽  
Dominique Anderson ◽  
Talishiea Croxton ◽  
Dorcas Kamuya ◽  
...  

Abstract The Protection of Personal Information Act (POPIA) [No.4 of 2013] is the first comprehensive data protection regulation to be passed in South Africa and it gives effect to the right to informational privacy derived from the constitutional right to privacy It is due to come into force in 2020, and seeks to regulate the processing of personal information in South Africa, regulate the flow of personal information across South Africa’s borders, and ensure that any limitations on the right to privacy are justified and aimed at protecting other important rights and interests. Although it was not drafted with health research in mind, POPIA will have an impact on the sharing of health data for research, in particular biorepositories. It is now timely to consider the impact of POPIA on biorepositories, and the necessary changes to their access and sharing arrangements prior to POPIA coming into force.


2021 ◽  
Vol 46 (2) ◽  
pp. 1-24
Author(s):  
Fareed Moosa ◽  

Sec. 63 of the Tax Administration Act 28 of 2011 (TAA) grants officials of the South African Revenue Service (SARS) access to taxpayers’ private and confidential information by, first, searching a taxpayer’s person and premises without a warrant and, secondly, permitting the seizure of taxpayers’ possessions and communications. Part One of this article (see Journal for Juridical Science 2021(1)) argued that the TAA is a “law of general application” as envisaged by the so-called “limitation clause” contained in sec. 36(1) of the Constitution, 1996 and that, in terms of the threshold stage of analysis prescribed by this provision, the exercise of the powers conferred by sec. 63(1) and (4) limits a taxpayer’s constitutional right to privacy as entrenched in sec. 14 of the Constitution. In this Part Two of the article, it will be hypothesised that, although the search and seizure powers in sec. 63(1) and (4) of the TAA are not models of drafting with absolute clarity, they ought, in terms of the second stage of enquiry that is triggered by the findings in Part One, nevertheless to pass muster under sec. 36(1) of the Constitution, because of the justifiability of the limitation imposed on the right to privacy by these provisions.


2013 ◽  
Vol 20 (1) ◽  
pp. 63-78
Author(s):  
Maria Inês de Oliveira Martins

Abstract The need of private insurers for information on the candidate’s health risks is recognized by the law, which places pre-contractual duties of disclosure upon the candidates. When the risks are influenced by health factors, e.g. in the case of life- and health insurances, it implies the provision of health information by the candidates, who thus voluntarily limit their right to privacy. This consent, however, often happens in a context of factual coercion to contract. Next to this, from a legal standpoint, the collection of personal information must respond to the principle of proportionality. Against this background, this article assesses the compatibility of questionnaire techniques that rely on open-ended health related questions with the right to privacy, as protected by Portuguese and international law. It then analyses the extent of pre-contractual duties of disclosure as defined by the Portuguese Insurance Act, which requires the candidate to volunteer all the relevant information independently of being asked for it. In doing so, the article also refers to some other European countries. It concludes that the relevant Portuguese legislation is incompatible both with Portuguese constitutional law and with international law.


Author(s):  
William Bülow ◽  
Misse Wester

As information technology is becoming an integral part of modern society, there is a growing concern that too much data containing personal information is stored by different actors in society and that this could potentially be harmful for the individual. The aim of this contribution is to show how the extended use of ICT can affect the individual’s right to privacy and how the public perceives risks to privacy. Three points are raised in this chapter: first, if privacy is important from a philosophical perspective, how is this demonstrated by empirical evidence? Do individuals trust the different actors that control their personal information, and is there a consensus that privacy can and should be compromised in order to reach another value? Second, if compromises in privacy are warranted by increased safety, is this increased security supported by empirical evidence? Third, the authors will argue that privacy can indeed be a means to increase the safety of citizens and that the moral burden of ensuring and protecting privacy is a matter for policy makers, not individuals. In conclusion, the authors suggest that more nuanced discussion on the concepts of privacy and safety should be acknowledged and the importance of privacy must be seen as an important objective in the development and structure of ICT uses.


Author(s):  
María Nieves Saldaña

Although the federal Constitution of the United States does not expressly recognize a «right to privacy», however, the Supreme Court, over a long and gradual case law, has considered it implicit in the guarantees of the First, Fourth, Fifth, Ninth and Fourteenth Amendments. Therefore, in the American constitutional system the right to privacy is a broad concept, which is set along more than a century to progressively delimit those areas of the private sphere which tend to preserve those interests of solitude, sanctuary, autonomy, individuality, personal development, freedom of choice in personal matters, control of personal information, as well as the essential substrate of the inviolable human dignity. These essential individual interests contribute to the formation of an active and participatory citizenship, constituting thus the right to privacy a fundamental legal interest for the very existence of the democratic system.Aunque la Constitución federal de los Estados Unidos no reconoce expresamente un «derecho a la privacidad », sin embargo, el Tribunal Supremo, a lo largo de una extensa y gradual jurisprudencia, lo ha considerado implícito en las garantías de la Primera, Cuarta, Quinta, Novena y Decimocuarta Enmiendas. Por tanto, en el sistema constitucional norteamericano el derecho a la privacidad es un concepto amplio, que se ha configurado a lo largo de más de un siglo al delimitarse progresivamente aquellos ámbitos de la esfera privada que tienden a preservar esos intereses de soledad, secreto, autonomía, individualidad, desarrollo de la personalidad, libertad de elección en asuntos personales, control de la información personal, así como del sustrato esencial de la inviolable dignidad humana. Intereses individuales de carácter esencial que coadyuvan a la formación de una ciudadanía activa y participativa, constituyendo así el derecho a la privacidad un bien jurídico fundamental para la existencia misma del sistema democrático.


Author(s):  
Windell Nortje

The constitutional right to privacy is enshrined in section 14 of the Constitution of the Republic of South Africa, 1996. It is premised on the notion that all persons should be protected from intrusions on their privacy by any person or institution. The Constitutional Court has also, on numerous occasions, held that the right to privacy is bolstered by its connection with the right to human dignity. It is undeniable that every person's right to privacy should be protected. However, a person's right to privacy is violated when police officials conduct warrantless search and seizure operations. Generally section 22 of the Criminal Procedure Act provides for warrantless search and seizure operations when a police official has a reasonable suspicion that a search warrant will be issued to him and that a delay in obtaining such a warrant would defeat the object of the search. Warrantless searches are important for the prevention of crime, but recent case law has suggested that there has been a progressive shift towards protecting the right to privacy of the individual subjected to warrantless searches, since there are a number of laws besides section 22 that regulate warrantless searches and which have been declared to be constitutionally invalid. This article seeks to demonstrate that the current regulatory framework for warrantless searches should be reviewed in order to protect the legitimacy of the police as well as the dignity and privacy of the citizens of South Africa.


2020 ◽  
Vol 16 (12) ◽  
pp. 64
Author(s):  
Wejdan Suleiman Irtaimeh

This study deals with the issue of criminal protection of privacy in the Jordanian Cybercrime Law No. 27 of 2015, as the great developments in computer technologies and the widespread use of the Internet have led to the emergence of new forms of electronic crimes related to the protection of the privacy of individuals. The study indicated that the Jordanian legislator did not include in the Jordanian Constitution or in the Cybercrime Law any definition of the right to privacy that delineates its boundaries and clarifies its features. The study concluded that the Cybercrime Law was ambiguous in some of its articles, especially those related to the protection of the right to privacy. The Jordanian legislator did not include special provisions that explicitly criminalize assault on privacy, as it included provisions for other crimes that include assault on this right, which made it lose clarity, precision and accuracy of wording. Moreover, such provisions omitted other forms of electronic crimes related to the right to privacy, which constituted a legislative deficiency. The study concludes that there is a need to amend the Cybercrime Law No. 27 of 2017 and to have explicit provisions that stipulate the criminalization of assault on privacy, as well as the need to issue a special law to protect the personal information of individuals.


Sign in / Sign up

Export Citation Format

Share Document