20.11.2014 Views

Read more - Department of International Relations and Cooperation

Read more - Department of International Relations and Cooperation

Read more - Department of International Relations and Cooperation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

VIII. Recent developments in the use <strong>of</strong> science <strong>and</strong> technology by<br />

<strong>of</strong>fenders <strong>and</strong> by competent authorities in fighting crime<br />

A. Introduction<br />

121 Technology related <strong>and</strong>/or cyber crime is a<br />

broad concept which is becoming increasingly<br />

important as computer networks become <strong>more</strong><br />

widespread. It encompasses computer <strong>and</strong><br />

network-related crime, privacy issues, trust <strong>and</strong><br />

confidence, <strong>and</strong> dependability <strong>of</strong> critical infrastructure.<br />

122. Cyber crime law is based primarily on the Council<br />

<strong>of</strong> Europe’s Convention on Cyber Crime. South<br />

Africa has signed but not yet ratified the convention.<br />

Under the convention, member states are<br />

obliged to criminalise:<br />

• illegal access to a computer system<br />

• illegal interception <strong>of</strong> data to a computer<br />

system<br />

• interfering with a computer system without<br />

right<br />

• international interference with computer data<br />

without right<br />

• use <strong>of</strong> inauthentic data with intent to put it<br />

across as authentic (data forgery)<br />

• interference with data or functioning <strong>of</strong> computer<br />

system<br />

• child pornography related <strong>of</strong>fences.<br />

123. In South Africa there are various pieces <strong>of</strong><br />

legislation administered by different government<br />

departments that impact on cyber security<br />

<strong>and</strong> which can be used to combat cyber crime.<br />

Examples are the Electronic Communications <strong>and</strong><br />

Transactions Act, 2002(Act No. 25 <strong>of</strong> 2002) which<br />

criminalises unauthorised access, interception<br />

<strong>of</strong>, or interference with data, the South African<br />

Technology related <strong>and</strong>/or cyber crime is a broad concept which<br />

is becoming increasingly important as computer networks<br />

become <strong>more</strong> widespread.<br />

26

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!