Cyber crime: a comparative law analysis
The Electronic Communications and Transactions Act, 25 of 2002, eradicated various lacunae that previously existed in respect of cyber crimes. Cyber crimes such as inter alia hacking, rogue code, unauthorised modification of data and denial of service attacks have now been criminalised. Specific cri...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | en |
Published: |
2009
|
Subjects: | |
Online Access: | Maat, Sandra Mariana (2009) Cyber crime: a comparative law analysis, University of South Africa, Pretoria, <http://hdl.handle.net/10500/2056> http://hdl.handle.net/10500/2056 |
id |
ndltd-netd.ac.za-oai-union.ndltd.org-unisa-oai-uir.unisa.ac.za-10500-2056 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-netd.ac.za-oai-union.ndltd.org-unisa-oai-uir.unisa.ac.za-10500-20562018-11-19T17:14:07Z Cyber crime: a comparative law analysis Maat, Sandra Mariana Van der Merwe, D.P. Digital signatures Cryptography Cyber inspectors Unauthorised interception Computer-related fraud Theft of information Denial of service attacks Cyber crime Hacking Rogue code 343.9944068 Computer crimes -- South Africa Electronic commerce -- Law and legislation -- South Africa Computer networks -- Law and legislation -- South Africa Internet -- Law and legislation -- South Africa The Electronic Communications and Transactions Act, 25 of 2002, eradicated various lacunae that previously existed in respect of cyber crimes. Cyber crimes such as inter alia hacking, rogue code, unauthorised modification of data and denial of service attacks have now been criminalised. Specific criminal provisions in relation to spamming, computer-related fraud and extortion have also been included in the Act. It is argued that theft of incorporeal items such as information has already been recognised in our law, but has not been taken to its logical conclusion in our case law. However, there are instances where neither the common law nor our statutory provisions are applicable and where there is still a need for legislative intervention. The Act sufficiently deals with jurisdiction, the admissibility of data messages, the admissibility of electronic signatures and the regulation of cryptography. Cyber inspectors are a new addition to law enforcement. Jurisprudence L. L. M. 2009-08-25T10:59:52Z 2009-08-25T10:59:52Z 2009-08-25T10:59:52Z 2004-11 Dissertation Maat, Sandra Mariana (2009) Cyber crime: a comparative law analysis, University of South Africa, Pretoria, <http://hdl.handle.net/10500/2056> http://hdl.handle.net/10500/2056 en 1 online resource (xi, 295 leaves) |
collection |
NDLTD |
language |
en |
format |
Others
|
sources |
NDLTD |
topic |
Digital signatures Cryptography Cyber inspectors Unauthorised interception Computer-related fraud Theft of information Denial of service attacks Cyber crime Hacking Rogue code 343.9944068 Computer crimes -- South Africa Electronic commerce -- Law and legislation -- South Africa Computer networks -- Law and legislation -- South Africa Internet -- Law and legislation -- South Africa |
spellingShingle |
Digital signatures Cryptography Cyber inspectors Unauthorised interception Computer-related fraud Theft of information Denial of service attacks Cyber crime Hacking Rogue code 343.9944068 Computer crimes -- South Africa Electronic commerce -- Law and legislation -- South Africa Computer networks -- Law and legislation -- South Africa Internet -- Law and legislation -- South Africa Maat, Sandra Mariana Cyber crime: a comparative law analysis |
description |
The Electronic Communications and Transactions Act, 25 of 2002, eradicated various lacunae that previously existed in respect of cyber crimes. Cyber crimes such as inter alia hacking, rogue code, unauthorised modification of data and denial of service attacks have now been criminalised. Specific criminal provisions in relation to spamming, computer-related fraud and extortion have also been included in the Act. It is argued that theft of incorporeal items such as information has already been recognised in our law, but has not been taken to its logical conclusion in our case law. However, there are instances where neither the common law nor our statutory provisions are applicable and where there is still a need for legislative intervention. The Act sufficiently deals with jurisdiction, the admissibility of data messages, the admissibility of electronic signatures and the regulation of cryptography. Cyber inspectors are a new addition to law enforcement. === Jurisprudence === L. L. M. |
author2 |
Van der Merwe, D.P. |
author_facet |
Van der Merwe, D.P. Maat, Sandra Mariana |
author |
Maat, Sandra Mariana |
author_sort |
Maat, Sandra Mariana |
title |
Cyber crime: a comparative law analysis |
title_short |
Cyber crime: a comparative law analysis |
title_full |
Cyber crime: a comparative law analysis |
title_fullStr |
Cyber crime: a comparative law analysis |
title_full_unstemmed |
Cyber crime: a comparative law analysis |
title_sort |
cyber crime: a comparative law analysis |
publishDate |
2009 |
url |
Maat, Sandra Mariana (2009) Cyber crime: a comparative law analysis, University of South Africa, Pretoria, <http://hdl.handle.net/10500/2056> http://hdl.handle.net/10500/2056 |
work_keys_str_mv |
AT maatsandramariana cybercrimeacomparativelawanalysis |
_version_ |
1718792942172241920 |