Professional Documents
Culture Documents
LCR4805 Exam Semester 1 2023F
LCR4805 Exam Semester 1 2023F
LCR4805 EXAM
SEMESTER 1 2023
(MAY/JUNE)
QUESTIONS WITH DETAILED ANSWERS
[School]
[Course title]
lOMoAR cPSD| 24668432
QUESTION 1
During the recruitment of new staff, an employer checks the profiles of the candidates on
various social networks and includes information from these networks in the screening
process. The employer has not informed the candidates about this.
1.1 Does the Protection of Personal Information Act 4 of 2013 allow an employer to include
the information of candidates found on social networks when screening candidates?
Discuss.
The Protection of Personal Information Act (POPIA) came into effect on 1 July
2020. The Act gives effect to the right to privacy as enshrined in the Constitution
of South Africa, as an essential component of human dignity, freedom, and
security. The main purpose of the Act is to regulate the processing of personal
information by public and private entities. According to the Act, personal
information is defined as any information that identifies a living person or makes
him/her identifiable, such as a name, address, or identification number.
The use of social media profiles for recruitment purposes raises several questions
about an individual's right to privacy and the protection of their personal
information. In terms of POPIA, processing personal information necessitates
adherence to the act's principles and conditions. In this regard, it is essential for
an employer to obtain informed consent from candidates before processing their
personal information.
lOMoAR cPSD| 24668432
In conclusion, the use of social media profiles as part of the recruitment process
is becoming more prevalent. However, employers need to be mindful of the legal
implications of using social media profiles in the hiring process. POPIA provides
clear guidelines for the processing of personal information by responsible parties,
including employers. Employers should obtain informed consent and be
transparent when processing personal information obtained from social media
networks. Finally, the recruitment process should be fair, transparent, and based
on merit and skills.
1.2 Does “the use of information” found in a candidate’s inbox on a social network amount to
the interception of communication, as defined in the Regulation of Interception of
Communications and Provision of Communication-related Information Act 70 of 2002?
QUESTION 2
One evening while driving home after work, Serurubele was involved in a road-rage incident.
The driver of a truck didn’t like how Serurubele was driving. He forced Serurubele’s car to
stop, got out of his truck and smashed in the windscreen of Serurubele’s vehicle with a metal
pipe. He pulled Serurubele out of his vehicle, shouted at him, waved his arms in the air,
climbed back into his truck and drove off. It turned out that another motorist on the scene,
Paul, who was right behind Serurubele’s vehicle, had a camera installed on the dash of his
car, which automatically records everything in the view of the camera through the
windscreen of the vehicle. This road rage incident was also captured by Paul’s dash camera.
The truck driver was later arrested and has to face criminal charges.
Serurubele approaches you as his attorney. Advise him as to whether this video recording
captured on Paul’s dash camera can be used as evidence in a court of law?
The relevance of the footage Is easy to establish as it captures the entire incident,
including the actions of the truck driver. The footage shows the truck driver stopping
Serurubele’s car, smashing in the windscreen with a metal pipe, pulling Serurubele
out of his vehicle, shouting at him, waving his arms in the air, climbing back into his
truck, and driving off. The footage is therefore relevant in establishing what happened
during the incident and identifying the person responsible.
The reliability of the footage Is also crucial in determining whether it can be used as
evidence. The footage must be authentic, accurate, and unaltered to be considered
reliable. In this case, the fact that the footage was captured by a dash camera
installed on Paul’s car makes it likely to be authentic, given that dash camera are
designed to be tamper-proof and automatic. The footage also appears to be accurate,
with clear images and audio of the incident. However, it is important to assess
whether there is any possibility of tampering, editing, or alteration of the footage,
which could taint its reliability.
Assuming that the footage is both relevant and reliable, the next step is to consider
whether it is admissible in a court of law. In South Africa, evidence is generally
admissible if it is probative, that is, it has a tendency to prove or disprove a fact or
issue in the case. The Evidence Act also requires that the evidence be legally
obtained and not obtained in a manner that infringes a right or privilege.
In this case, the dash camera footage appears to have been obtained legally, as it was
recorded by a dash camera installed on Paul’s car, without infringing any rights or
privileges. The footage is also probative, as it captures the entire incident, including
the actions of the truck driver, which could form the basis of criminal charges against
him. The footage can therefore be admissible in court, subject to any objections or
challenges to its authenticity, accuracy, or reliability.
In conclusion, as Serurubele’s attorney, I would advise him that the dash camera
footage captured by Paul’s car is likely to be admissible in court, given that it is both
relevant and reliable. However, any objections or challenges to the footage’s
admissibility should be assessed carefully to ensure that it meets the legal
requirements for admissible evidence. The footage could be instrumental in securing
a conviction against the truck driver for his actions, and its admissibility could be
crucial in the case. It is therefore important to handle the footage with the utmost care
and professionalism to ensure that justice is served and the rights of all parties are
protected.
lOMoAR cPSD| 24668432
For exam pack with questions and answers, quality notes, assignments and
exam help:
email: musyokah11@gmail.com
WhatsApp: +254792947610
QUESTION 3
3.2 We live in an “information age” and the question which often arises is whether
information can be stolen or not. Refer to the common law definition of “theft” and critically
discuss whether the law in South Africa has adapted to keep up with technological
advancements. Your discussion should refer to the positions in other jurisdictions and
include case law, legislation and academic commentary where applicable.
What is theft?
• Wrongful Taking – The property was taken without consent and was
unlawful
• Carrying Away – The property need was moved from where the owner had
placed it or intended it to be placed
lOMoAR cPSD| 24668432
• Property of Another – The property must belong to someone other than the
thief
• Intent to Deprive Permanently – The thief intends that the owner does not
own the property ever again.
3 Has this definition or the law surrounding it changed to deal with the new
technological advances brought about by the information age?
In the case S v Van den Berg 1991 (1) SACR 104 (T) the accused made a
fraudulent misrepresentation by means of a computer terminal. The court held
that the electronic misrepresentation was as unlawful as any other form and
the conviction for fraud was upheld. As a result, the question arises whether
common law would be further expanded by the courts. For this reason, it
becomes essential that legislation be passed to combat cyber-crime. In 2002
the
Afrikaans and res inLatin.) used to limited to corporeal rights but are careful to
expand the concept of ownership in corporeal matters to other incorporeal
rights and prefers not to use the term ownership at all with the other categories
of subjective rights, such as personal rights. Eborsohn follows the second
possible solution for criminal law to extend category of things that may be
stolen. He argues that personal rights and immaterial property rights could be
covered by judicial expansion of the traditional concept of theft. He further
argues that the modern theft is flexible enough to include the appropriation of
personal rights, the electronic transfer of credit between banking accounts, the
copying of incorporeal property and even passwords and confidential credit-
card information.
The United Kingdom - In the case Cox v Riley (1986) 83 Cr App R56 the
accused Cox deliberately sabotage a power saw operated by a printed circuit
containing a number of computer programs by erasing a number of these
programs causing the saw to be unusable until it was programmed. By focus
on the hardware instead of the programs the court managed to convict Cox of
a contravention of section 1(1) of the criminal Damage Act of 1971. The UK
also has a powerful Data Protection Act which might be extended in the future
to include custodial sentences for offenders. Further to this the UK s new
Fraud ‟ Act makes it an offence to fail to disclose information in the form of a
proper data protection notice.
In Germany the legislation the German Criminal Code was amended to provide
for different forms of modern crime for instance the distribution of
pornography. It further criminalises data espionage and also target computer
fraud specifically. The United States in the mid 1980 the US Congress; thus
binding all States, passed two important statues to combat computer related
crimes in which federal interest are part of. The Counterfeit Access Device and
Computer Fraud and Abuse Act 18 USC 1030 (1984) (the CFA Act) and the
Electronic Communications Privacy Act (the ECP Act) (Spy Act only protects
vendors and their DRM www.infoworld.com/archives (accessed 24 April
2007))The latter Act was enacted to include digital transmission of electronic
data to broaden the government’s power to tap into private communications. In
2004 the US Congress introduced the Securely Protect Yourself against Cyber
Trespass Bill (the SPY ACT) to protect consumers who download software that
lOMoAR cPSD| 24668432
has the ability to collect and transmit information. However, this was criticized
for not focusing on consumers but on software vendors. Another bill entitled
Identity Theft
Enforcement and Restitution Act of 2007, expands existing identity theft and
aggravated-identifytheft statutes to include recovery of the value of time lost
as a result of identity theft or even attempted identity theft. The Canadian
Criminal Code defines an object capable of being stolen as “anything whether
animate or inanimate” and in R v Stewart (1988) 1 SCR 963. the court had to
decide whether confidential information was capable of being stolen and held
that confidential information did not fall within the definition of“anything”,
since it could not be taken or converted in a manner that would deprive the
victim. Protection of information should not be granted by extending the
concept of property or the scope of theft, but rather by enacting relevant
legislation andinformation was therefore not considered property for the
purposes of criminal law. Technological advances allow for large volumes of
information to be saved on computers as electronic data and the
accompanying changes in the manner in which data is stored opened doors
for cyber criminals who operate in this incorporeal realm and are capable of
appropriating electronic data.The nature of electronic information makes it
capable of being stolen, by downloading or copying it, without any object
being physically taken proving the ‘theft’ and without the owner being deprived
of the use or possession thereof, even though the owner will be deprived of its
confidentiality. There is no doubt that taking the physical computer itself or its
components like the printer or screen is theft, however a copied or
downloaded version of an electronic document therefore does not meet the
requirements of property capable of being stolen (Snyman CR Criminal Law
3rd ed (1995) 445-478).
Cybercrime is set apart from other crimes in that a computer is used in the
commission of the crime and may include acts like hacking, damage to
intellectual property, unauthorised access to a database or copying of
confidential information and many of these crimes could not be prosecuted
due to a lack of relevant legislation (Herselman and Warren 2004 IISIT 253-266).
The only option was to prosecute these offences under the existing common
law or statutory legislation which was not computer-related acts, however the
Electronic Communications and Transactions Act 25 of 2002 (hereinafter ECT
lOMoAR cPSD| 24668432
Act) was specifically drawn up to combat and prevent cybercrime and in terms
of the ECT Act “data” is defined as the “electronic representations of
information in any form”( s 1 of the ECT Act) and the purpose of the Act is
among other things to prevent abuse of information systems. Access in terms
of the ECT Act: ‘includes the actions of a person who, after taking note of any
data, becomes aware of the fact that he or she is not authorised to access that
data and still continues to access that data’.Section 86 (3) of the ECT Act: ‘(2)
A person who intentionally and without authority to do so, interferes with data
in a way which causes such data to be modified, destroyed or otherwise
rendered ineffective, is guilty of an offence. (3) A person who unlawfully
produces, sells, offers to sell, procures for use, designs, adapts for use,
distributes or possesses any device, including a computer program or a
component, which is designed primarily to overcome security measures for
the protection of data, or performs any of those acts with regard to a
password, access code or any other similar kind of data with the intent to
unlawfully utilize such item to contravene this section, is guilty of an
offence.’Any person, who gains unauthorized access to, intercepts, or
interferes with data; is guilty of an offence in terms of section 86 of the ECT
Act and the possibility therefore exists that a the perpetrator who has copied
or downloaded information without the necessary authorization may have
committed an offense in terms of this section.
For exam pack with questions and answers, quality notes, assignments and
exam help:
email: musyokah11@gmail.com
WhatsApp: +254792947610
lOMoAR cPSD| 24668432
QUESTION 4
Mr Coetzee works for an advertising company, Litaba Ltd. In his spare time, he writes
articles for an online news website, Lesedi News. On this website he publishes an article
(which he wrote from his office computer) about a coastal wetland ecosystem that was
destroyed after an oil rig of the company, Oil-Tech, exploded at sea. He mentioned that the
explosion, resulted in a huge oil spill in the ocean that drifted to the shore. In the article Mr
Coetzee alleges that the explosion was due to the negligence of the company. He lists
several issues, including a lack of proper maintenance and security measures by the
company. The article named “M” as the managing director of Oil-Tech at the time. This
article is upsetting to many readers and in a short space of time the article accumulates 300
comments. Many of the comments are insulting. Some of them go over onto hate speech
and threaten M with violence. Almost two months after publication, M sends a request to
Lesedi News to remove the comments and demands payment of R1000 000.00 in damages
allegedly suffered by the company. Lesedi News removes the comments the same day it
receives the complaint.M consults you as the company’s attorney for legal advice. In your
answers to the following questions refer to case law, legislation and academic commentary
where applicable.
Yes, Oil-Tech can potentially institute a claim for defamation against Robert, as he
made statements that could potentially damage the company's reputation. However,
in order for the claim to be successful, Oil-Tech would have to prove that the
statements were false, that they were made with the intention to harm the company's
reputation, and that they caused actual harm to the company's reputation.
Additionally, Robert may be able to argue that the statements were made in the public
interest and were therefore protected by freedom of expression.
For exam pack with questions and answers, quality notes, assignments and
exam help:
email: musyokah11@gmail.com
WhatsApp: +254792947610
lOMoAR cPSD| 24668432
4.2 Can Mr Coetzee’s employer, Litaba Ltd, be held vicariously liable for Mr Coetzee’s
conduct, since Mr Coetzee wrote the alleged defamatory article on his office computer?
According to the principles of vicarious liability, an employer can be held liable for a
delict committed by its employee if it is proved that.
write articles for Daily News. Additionally, it is unlikely that Lourdes Ltd would
have approved or condoned the statements made in the article.
4.3 Discuss the liability of the internet service providers for the defamation and hate speech
In terms of section 701 , the term service provider means ‘‘any person providing
information system services’’. In terms of section 1, information-system services
include the following: the provision of connections, the operation of facilities for
information systems, the provision of access to information systems, the
transmission or routing of data messages between or among points specified by a
user and the processing and storage of data, at the individual request of the recipient
of the service. Chapter 11 of this Act basically provides for the limitation of liability of
lOMoAR cPSD| 24668432
ISPs for the transmitting, routing, temporarily storing, caching and hosting of
unlawful material and providing links to unlawful material in certain prescribed
circumstances. In terms of section 72, the limitation of liability will apply to an ISP
only if the ISP is a member of the industry representative body and it has adopted and
implemented the official code of conduct of such a representative body. In other
words, ISPs who do not fall into this category will not be able to rely on the protection
of this Act and will have to resort to the common law for defences. In terms of section
71, the Minister will recognise such an industry representative body only if the
Minister is satisfied that;
Section 73 provides that an ISP acting as a mere conduit will be exempt from liability
if certain requirements are fulfilled. In terms of section 73(1), ISPs who store,
transmit, route, or provide access to data through such activity will be exempt from
liability if the ISP.
In terms of section 73(2), the acts of transmission, routing and provision of access
mentioned in this section must be performed for the sole purpose of transmitting
information. Internet service providers (ISPs) generally cannot be held liable for
defamatory or hate speech messages posted by users on their websites and servers,
thanks to the principle of intermediary liability. This means that ISPs are not seen as
the publisher of the content posted by users, and are therefore not liable for any
defamatory or illegal content posted on their platforms. However, ISPs can potentially
be held liable if they actively participate in the creation or dissemination of
defamatory or illegal content. Additionally, ISPs may be required to remove
lOMoAR cPSD| 24668432
defamatory or illegal content from their platforms if they receive a valid notice of
infringement.
For exam pack with questions and answers, quality notes, assignments and
exam help:
email: musyokah11@gmail.com
WhatsApp: +254792947610