Cyber crime: a comparative law analysis

The Electronic Communications and Transactions Act, 25 of 2002, eradicated various lacunae that previously existed in respect of cyber crimes. Cyber crimes such as inter alia hacking, rogue code, unauthorised modification of data and denial of service attacks have now been criminalised. Specific cri...

Full description

Bibliographic Details
Main Author: Maat, Sandra Mariana
Other Authors: Van der Merwe, D.P.
Format: Others
Language:en
Published: 2009
Subjects:
Online Access:Maat, Sandra Mariana (2009) Cyber crime: a comparative law analysis, University of South Africa, Pretoria, <http://hdl.handle.net/10500/2056>
http://hdl.handle.net/10500/2056
id ndltd-netd.ac.za-oai-union.ndltd.org-unisa-oai-uir.unisa.ac.za-10500-2056
record_format oai_dc
spelling ndltd-netd.ac.za-oai-union.ndltd.org-unisa-oai-uir.unisa.ac.za-10500-20562018-11-19T17:14:07Z Cyber crime: a comparative law analysis Maat, Sandra Mariana Van der Merwe, D.P. Digital signatures Cryptography Cyber inspectors Unauthorised interception Computer-related fraud Theft of information Denial of service attacks Cyber crime Hacking Rogue code 343.9944068 Computer crimes -- South Africa Electronic commerce -- Law and legislation -- South Africa Computer networks -- Law and legislation -- South Africa Internet -- Law and legislation -- South Africa The Electronic Communications and Transactions Act, 25 of 2002, eradicated various lacunae that previously existed in respect of cyber crimes. Cyber crimes such as inter alia hacking, rogue code, unauthorised modification of data and denial of service attacks have now been criminalised. Specific criminal provisions in relation to spamming, computer-related fraud and extortion have also been included in the Act. It is argued that theft of incorporeal items such as information has already been recognised in our law, but has not been taken to its logical conclusion in our case law. However, there are instances where neither the common law nor our statutory provisions are applicable and where there is still a need for legislative intervention. The Act sufficiently deals with jurisdiction, the admissibility of data messages, the admissibility of electronic signatures and the regulation of cryptography. Cyber inspectors are a new addition to law enforcement. Jurisprudence L. L. M. 2009-08-25T10:59:52Z 2009-08-25T10:59:52Z 2009-08-25T10:59:52Z 2004-11 Dissertation Maat, Sandra Mariana (2009) Cyber crime: a comparative law analysis, University of South Africa, Pretoria, <http://hdl.handle.net/10500/2056> http://hdl.handle.net/10500/2056 en 1 online resource (xi, 295 leaves)
collection NDLTD
language en
format Others
sources NDLTD
topic Digital signatures
Cryptography
Cyber inspectors
Unauthorised interception
Computer-related fraud
Theft of information
Denial of service attacks
Cyber crime
Hacking
Rogue code
343.9944068
Computer crimes -- South Africa
Electronic commerce -- Law and legislation -- South Africa
Computer networks -- Law and legislation -- South Africa
Internet -- Law and legislation -- South Africa
spellingShingle Digital signatures
Cryptography
Cyber inspectors
Unauthorised interception
Computer-related fraud
Theft of information
Denial of service attacks
Cyber crime
Hacking
Rogue code
343.9944068
Computer crimes -- South Africa
Electronic commerce -- Law and legislation -- South Africa
Computer networks -- Law and legislation -- South Africa
Internet -- Law and legislation -- South Africa
Maat, Sandra Mariana
Cyber crime: a comparative law analysis
description The Electronic Communications and Transactions Act, 25 of 2002, eradicated various lacunae that previously existed in respect of cyber crimes. Cyber crimes such as inter alia hacking, rogue code, unauthorised modification of data and denial of service attacks have now been criminalised. Specific criminal provisions in relation to spamming, computer-related fraud and extortion have also been included in the Act. It is argued that theft of incorporeal items such as information has already been recognised in our law, but has not been taken to its logical conclusion in our case law. However, there are instances where neither the common law nor our statutory provisions are applicable and where there is still a need for legislative intervention. The Act sufficiently deals with jurisdiction, the admissibility of data messages, the admissibility of electronic signatures and the regulation of cryptography. Cyber inspectors are a new addition to law enforcement. === Jurisprudence === L. L. M.
author2 Van der Merwe, D.P.
author_facet Van der Merwe, D.P.
Maat, Sandra Mariana
author Maat, Sandra Mariana
author_sort Maat, Sandra Mariana
title Cyber crime: a comparative law analysis
title_short Cyber crime: a comparative law analysis
title_full Cyber crime: a comparative law analysis
title_fullStr Cyber crime: a comparative law analysis
title_full_unstemmed Cyber crime: a comparative law analysis
title_sort cyber crime: a comparative law analysis
publishDate 2009
url Maat, Sandra Mariana (2009) Cyber crime: a comparative law analysis, University of South Africa, Pretoria, <http://hdl.handle.net/10500/2056>
http://hdl.handle.net/10500/2056
work_keys_str_mv AT maatsandramariana cybercrimeacomparativelawanalysis
_version_ 1718792942172241920