SlideShare a Scribd company logo
1 of 9
Principles of Mobile Privacy
GSMA Capacity Building January 2018
Data protection vs. Data privacy
Data protection
 Is about safeguarding
 Fundamental right to privacy to
personal information collected,
processed and stored by automated
means or intended to be part of a
filling system.
 Enshrined to international and
regional laws and conventions
Data privacy
 Has been identified as a human right
in the Universal declaration on
Human Rights and the International
Covenant of Civil and political Rights
Regulation of Data Protection in South
Africa
 The Information Regulator is, among others, empowered to monitor and enforce compliance by public
and private bodies with the provisions of the PPI Act. The Information Regulator is also responsible for
issuing codes of conduct for different sectors and to make guidelines to assist bodies with the
development and application of codes of conduct.
 Chapter 7 of the PPI Act introduces Codes of Conduct. The development of codes of conduct will
contribute to the proper implementation of the conditions for the lawful processing of personal
information, as reflected in Chapter 3 of the PPI Act, in each sector. Section 60 of the PPI Act, among
others, provides that a code must prescribe how the conditions are to be complied with within specific
sectors as far as the processing of personal information is concerned.
 Chapter 10 provides for complaints to be lodged with the Information Regulator by persons regarding
any interference with the protection of their personal information. Interference with the protection of
the personal information of a data subject consist, in terms of section 73, of—
(i) any breach of the conditions for the lawful processing of personal information set out in Chapter
3 of the PPI Act;
(ii) non-compliance with any obligations created in terms of the PPI Act; or
(iii) a breach of the provisions of a code that has been issued in terms of the Act.
South African Legislations Governing
Mobile Privacy and Data Protection
 Constitution of the Republic of South Africa, 1996
 South African Law Reform Commission Privacy and Data
Protection, 2009
 Protection of Personal Information,2014
Availability of information
 Retails stores , records all the personal information of the
client when they buy phones.
 Explain to the clients how the information is going to be
stored and used for how long.
 How are they going to disclose the information when is
needed by the third party, like a member of law or so.
 Ask the client if he/she agrees to be on their database and
being contacted for promotions.
Confidentiality
 Providers has to ensures that the information is being used
for the purpose specified only, beyond that they have to
contact the client, and ask permission.
Integrity
 When they pass information to the third party they have to
follow up, and know exactly what are they using data for,
they have to protect their clients fully.
Conclusion
 The laws are there, services providers do promise to protect
their clients , yet the clients still complains about receiving
calls from strangers, such as promotors selling insurance, it
can leave us with a question, if we are protected as clients,
then those promoters where are they getting our contact
details from.
 Policy makers are doing their best, however, there are still lot
to be done, we are not 100% protected as consumers.
References
 Constitution of the Republic of South Africa, 108 of 1996
http://www.justice.gov.za/legislation/constitution/SAConstitution-
web-eng.pdf
 South African Law Reform Commission Privacy and Data Protection,
2009
http://salawreform.justice.gov.za/reports/r_prj124_privacy%20and%
20data%20protection2009.pdf
 Protection of Personal Information Act, 2013
http://www.justice.gov.za/legislation/acts/2013-004.pdf
 Electronic Communications Transactions Act, 2002
http://www.internet.org.za/ect_act.html

More Related Content

What's hot

Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Philippine Data Privacy Act of 2012 (RA 10173)
Philippine Data Privacy Act of 2012 (RA 10173)Philippine Data Privacy Act of 2012 (RA 10173)
Philippine Data Privacy Act of 2012 (RA 10173)Kirk Go
 
Data Privacy - Rights of the Data Subject
Data Privacy - Rights of the Data SubjectData Privacy - Rights of the Data Subject
Data Privacy - Rights of the Data SubjectJDP Consulting
 
10 Things You Need To Know About Privacy
10 Things You Need To Know About Privacy10 Things You Need To Know About Privacy
10 Things You Need To Know About PrivacyNow Dentons
 
Data Privacy - Penalties for Non-Compliance
Data Privacy - Penalties for Non-ComplianceData Privacy - Penalties for Non-Compliance
Data Privacy - Penalties for Non-ComplianceJDP Consulting
 
Data Privacy- Security of Sensitive Personal Information
Data Privacy- Security of Sensitive Personal InformationData Privacy- Security of Sensitive Personal Information
Data Privacy- Security of Sensitive Personal InformationJDP Consulting
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age - Mark - Fullbright
 
Stevenson, M - NBCA Writing Sample
Stevenson, M - NBCA Writing SampleStevenson, M - NBCA Writing Sample
Stevenson, M - NBCA Writing SampleMavEryck Stevenson
 
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017Jay Castillo
 
California Privacy Law: Resources & Protections
California Privacy Law: Resources & ProtectionsCalifornia Privacy Law: Resources & Protections
California Privacy Law: Resources & Protectionsipspat
 
Know your rights protection against facial recognition software.
Know your rights  protection against facial recognition software.Know your rights  protection against facial recognition software.
Know your rights protection against facial recognition software.Diganth Raj Sehgal
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information SecurityCharles Mok
 
RIGHT TO INFORMATION ACT 2005 ,FULL THEORY-MANPREET SINGH (B.COM)
RIGHT TO INFORMATION ACT 2005 ,FULL THEORY-MANPREET SINGH (B.COM)RIGHT TO INFORMATION ACT 2005 ,FULL THEORY-MANPREET SINGH (B.COM)
RIGHT TO INFORMATION ACT 2005 ,FULL THEORY-MANPREET SINGH (B.COM)MANPREETSINGHPANESAR1
 

What's hot (20)

Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Data privacy act
Data privacy actData privacy act
Data privacy act
 
Philippine Data Privacy Act of 2012 (RA 10173)
Philippine Data Privacy Act of 2012 (RA 10173)Philippine Data Privacy Act of 2012 (RA 10173)
Philippine Data Privacy Act of 2012 (RA 10173)
 
Taxpayer rights
Taxpayer rightsTaxpayer rights
Taxpayer rights
 
Data Privacy - Rights of the Data Subject
Data Privacy - Rights of the Data SubjectData Privacy - Rights of the Data Subject
Data Privacy - Rights of the Data Subject
 
10 Things You Need To Know About Privacy
10 Things You Need To Know About Privacy10 Things You Need To Know About Privacy
10 Things You Need To Know About Privacy
 
Data Privacy - Penalties for Non-Compliance
Data Privacy - Penalties for Non-ComplianceData Privacy - Penalties for Non-Compliance
Data Privacy - Penalties for Non-Compliance
 
Data Privacy- Security of Sensitive Personal Information
Data Privacy- Security of Sensitive Personal InformationData Privacy- Security of Sensitive Personal Information
Data Privacy- Security of Sensitive Personal Information
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age
 
Data privacy act of 2012 presentation
Data privacy act of 2012 presentationData privacy act of 2012 presentation
Data privacy act of 2012 presentation
 
Leg4
Leg4 Leg4
Leg4
 
Stevenson, M - NBCA Writing Sample
Stevenson, M - NBCA Writing SampleStevenson, M - NBCA Writing Sample
Stevenson, M - NBCA Writing Sample
 
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
 
FOI Executive Order (Freedom of Information)
FOI Executive Order (Freedom of Information) FOI Executive Order (Freedom of Information)
FOI Executive Order (Freedom of Information)
 
California Privacy Law: Resources & Protections
California Privacy Law: Resources & ProtectionsCalifornia Privacy Law: Resources & Protections
California Privacy Law: Resources & Protections
 
Know your rights protection against facial recognition software.
Know your rights  protection against facial recognition software.Know your rights  protection against facial recognition software.
Know your rights protection against facial recognition software.
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
CEU DPA
CEU DPACEU DPA
CEU DPA
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
RIGHT TO INFORMATION ACT 2005 ,FULL THEORY-MANPREET SINGH (B.COM)
RIGHT TO INFORMATION ACT 2005 ,FULL THEORY-MANPREET SINGH (B.COM)RIGHT TO INFORMATION ACT 2005 ,FULL THEORY-MANPREET SINGH (B.COM)
RIGHT TO INFORMATION ACT 2005 ,FULL THEORY-MANPREET SINGH (B.COM)
 

Similar to Principles of mobile privacy

Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislationUlf Mattsson
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoJoel A. Gómez Treviño
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in IndiaLATHA H C
 
Gsma pmp - enhancing data protection and privacy in nigeria through the dat...
Gsma   pmp - enhancing data protection and privacy in nigeria through the dat...Gsma   pmp - enhancing data protection and privacy in nigeria through the dat...
Gsma pmp - enhancing data protection and privacy in nigeria through the dat...Nzeih Chukwuemeka
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
Startups - data protection
Startups  - data protectionStartups  - data protection
Startups - data protectionMathew Chacko
 
Biometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization IssuesBiometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization IssuesGiannisBasa
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database ProtectionSinghania2015
 
Data protection regulation
Data protection regulationData protection regulation
Data protection regulationGreg Ezeilo
 
What are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdfWhat are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdfRiley Claire
 
Trade secrets vs. confidential information
Trade secrets vs. confidential informationTrade secrets vs. confidential information
Trade secrets vs. confidential informationAltacit Global
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commercePalavesa Krishnan
 

Similar to Principles of mobile privacy (20)

Final projet
Final  projetFinal  projet
Final projet
 
Data protection act
Data protection act Data protection act
Data protection act
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislation
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in Mexico
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
 
Gsma pmp - enhancing data protection and privacy in nigeria through the dat...
Gsma   pmp - enhancing data protection and privacy in nigeria through the dat...Gsma   pmp - enhancing data protection and privacy in nigeria through the dat...
Gsma pmp - enhancing data protection and privacy in nigeria through the dat...
 
POPI Seminar FINAL
POPI Seminar FINALPOPI Seminar FINAL
POPI Seminar FINAL
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
SPRING BOARD DOCTRINE PPT
SPRING BOARD DOCTRINE PPTSPRING BOARD DOCTRINE PPT
SPRING BOARD DOCTRINE PPT
 
Startups - data protection
Startups  - data protectionStartups  - data protection
Startups - data protection
 
Biometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization IssuesBiometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization Issues
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
 
Data protection regulation
Data protection regulationData protection regulation
Data protection regulation
 
What are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdfWhat are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdf
 
The Protection of Personal Information Act 4 of 2013
The Protection of Personal Information Act 4 of 2013The Protection of Personal Information Act 4 of 2013
The Protection of Personal Information Act 4 of 2013
 
Trade secrets vs. confidential information
Trade secrets vs. confidential informationTrade secrets vs. confidential information
Trade secrets vs. confidential information
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commerce
 
14 Laws Affecting Direct Marketing
14 Laws Affecting Direct Marketing14 Laws Affecting Direct Marketing
14 Laws Affecting Direct Marketing
 

Recently uploaded

Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝soniya singh
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Niamh verma
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...wyqazy
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 

Recently uploaded (7)

Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 

Principles of mobile privacy

  • 1. Principles of Mobile Privacy GSMA Capacity Building January 2018
  • 2. Data protection vs. Data privacy Data protection  Is about safeguarding  Fundamental right to privacy to personal information collected, processed and stored by automated means or intended to be part of a filling system.  Enshrined to international and regional laws and conventions Data privacy  Has been identified as a human right in the Universal declaration on Human Rights and the International Covenant of Civil and political Rights
  • 3. Regulation of Data Protection in South Africa  The Information Regulator is, among others, empowered to monitor and enforce compliance by public and private bodies with the provisions of the PPI Act. The Information Regulator is also responsible for issuing codes of conduct for different sectors and to make guidelines to assist bodies with the development and application of codes of conduct.  Chapter 7 of the PPI Act introduces Codes of Conduct. The development of codes of conduct will contribute to the proper implementation of the conditions for the lawful processing of personal information, as reflected in Chapter 3 of the PPI Act, in each sector. Section 60 of the PPI Act, among others, provides that a code must prescribe how the conditions are to be complied with within specific sectors as far as the processing of personal information is concerned.  Chapter 10 provides for complaints to be lodged with the Information Regulator by persons regarding any interference with the protection of their personal information. Interference with the protection of the personal information of a data subject consist, in terms of section 73, of— (i) any breach of the conditions for the lawful processing of personal information set out in Chapter 3 of the PPI Act; (ii) non-compliance with any obligations created in terms of the PPI Act; or (iii) a breach of the provisions of a code that has been issued in terms of the Act.
  • 4. South African Legislations Governing Mobile Privacy and Data Protection  Constitution of the Republic of South Africa, 1996  South African Law Reform Commission Privacy and Data Protection, 2009  Protection of Personal Information,2014
  • 5. Availability of information  Retails stores , records all the personal information of the client when they buy phones.  Explain to the clients how the information is going to be stored and used for how long.  How are they going to disclose the information when is needed by the third party, like a member of law or so.  Ask the client if he/she agrees to be on their database and being contacted for promotions.
  • 6. Confidentiality  Providers has to ensures that the information is being used for the purpose specified only, beyond that they have to contact the client, and ask permission.
  • 7. Integrity  When they pass information to the third party they have to follow up, and know exactly what are they using data for, they have to protect their clients fully.
  • 8. Conclusion  The laws are there, services providers do promise to protect their clients , yet the clients still complains about receiving calls from strangers, such as promotors selling insurance, it can leave us with a question, if we are protected as clients, then those promoters where are they getting our contact details from.  Policy makers are doing their best, however, there are still lot to be done, we are not 100% protected as consumers.
  • 9. References  Constitution of the Republic of South Africa, 108 of 1996 http://www.justice.gov.za/legislation/constitution/SAConstitution- web-eng.pdf  South African Law Reform Commission Privacy and Data Protection, 2009 http://salawreform.justice.gov.za/reports/r_prj124_privacy%20and% 20data%20protection2009.pdf  Protection of Personal Information Act, 2013 http://www.justice.gov.za/legislation/acts/2013-004.pdf  Electronic Communications Transactions Act, 2002 http://www.internet.org.za/ect_act.html