I was dumbstruck and believe me, it takes a lot to get me speechless… While reading through some article, I came across an issue that relating to “linking” to other websites. In the article reference was made to Standard Bank’s website Terms and Conditions of Access, which states that they DO NOT allow linking to their website without permission. ... | Read more... (Estimated read time 3:07 mins)
In a 2014 court case a Cape Townian man was caught for distributing(‘seeding’) a South African movie via a torrent website. I initially thought this was our first case relating to internet piracy, but after a little bit of research I found that another man was fined R5000 and 6 months imprisonment, suspended for five years, for pirating computer programs in 2001. The hype surrounding the 2014 case of the Cape Townian was probably because in 2001 torrents were not used that much and today downloading (piracy) has become more widely used. ... | Read more... (Estimated read time 2:11 mins)
The renowned King III Report, copyrighted by IoDSA, is sometimes overlooked by business, especially the smaller companies. This is an internationally acclaimed and very valuable resource and I want to give a little overview of the principles of the King III Report. ... | Read more... (Estimated read time 5:49 mins)
By now I would think that the majority of us knows about the “Protection of Personal Information (POPI) Act, 2013“, which basically determines the conditions for processing information. Although it sounds simplistic, it is a rather complex requirement and non-compliance can see you being fined up to R10 million or even face 10 years in jail. ... | Read more... (Estimated read time 4:12 mins)
Electronic Communications and Transactions Act, 2002 (Act No. 25 of 2002)
Topic by Ian Dewar an Independent Civic Entrepreneur & Socio-economic Development Professional.
“… (Not to be confused with the Electronic Communications Act which is another beast altogether). It has very useful sections, for example on Universal Access, Encryption & Authentication, and Data Controllers, and Protection of Critical Databases.” ... | Read more... (Estimated read time 14 secs)