SlideShare a Scribd company logo
Interception Act versus Privacy Act
Dr. Varun Kumar
Dr. Varun Kumar (IIIT Surat) Lecture-16 1 / 8
Outlines
1 The Interception Act
2 The Privacy Act
Activity
Dr. Varun Kumar (IIIT Surat) Lecture-16 2 / 8
The Interception Act: South Africa
⇒ The interception act came into full effect in September 2005.
⇒ Ref: http://www.justice.gov.za/legislation/acts/2002-070.pdf
⇒ RICA: Regulation of Interception of Communications Act.
⇒ Provision of Communication related Information Act.
⇒ RICA seeks to regulate
The interaction of certain communications
The monitoring of certain signals (radio frequency spectrum)
The provision of certain communication-related information
⇒ Steps for monitoring the communication
Law enforcement must be in possession of information or evident
⇒ Electronic communications are being used in the commission of the
crime.
Approach the court and request an ”interception direction”.
⇒ The sitting judge will then decide on the merit of the evident present
and will grant or refuse this directive.
Dr. Varun Kumar (IIIT Surat) Lecture-16 3 / 8
Continued–
Once the interception direction is obtained,
⇒ It can then be served to the relevant service provider.
⇒ Forward all surveillance information to the law enforcement agency.
⇒ The person under surveillance needs not be informed.
RICA provides that all forms of monitoring and interception.
There are several exceptions on the prohibition on intercepting
communications.
⇒ Three rules for apply to monitoring in the workplace:
(i) Party to a communication:
⇒ Section 4 of the RICA allows a party to a communication to monitor
and intercept the communication if he/she is a party to the
communication.
⇒ The participants in a meeting consent to the meeting being recorded.
⇒ This exception also applies where the interceptor is acting with the
consent of one of the parties to the communication.
Dr. Varun Kumar (IIIT Surat) Lecture-16 4 / 8
Continued–
(ii) Written Consent:
⇒ Section 5 allows for interception of any communication under any
circumstances
⇒ No special motivation or reason is required for it.
⇒ The person whose communication is being intercepted has consented
to it in writing prior to such interception.
Dr. Varun Kumar (IIIT Surat) Lecture-16 5 / 8
Continued–
(iii) Business Purpose Exception:
⇒ Section 6 contains a so-called business purpose exception which
involves the interception of indirect communications in connection with
the carrying on of business.
⇒ Section 6 authorizes any person to intercept indirect communications
in the course of carrying out their business by means of which a
transaction is concluded in the course of that business.
⇒ Relates to that business or which otherwise takes place in the course of
the carrying on of that business, in the course of its transmission over a
telecommunication system.
Dr. Varun Kumar (IIIT Surat) Lecture-16 6 / 8
The Privacy Act
⇒ The protection of personal information Act is seen by some as a
counterbalance to the Interception Act above.
⇒ Ref: http://www.gov.za/sites/www.gov.za/files/37067 26-
11 Act4of2013ProtectionOfPersonalInfor correct.pdf
⇒ The act seeks to promote the protection of personal information of
South Africans processed by public and private bodies.
⇒ It also seeks to provide for the rights of persons regarding unsolicited
electronic communications and automated decision making.
⇒ It also seeks to regulate the flow of personal information across the
borders of the Republic.
Dr. Varun Kumar (IIIT Surat) Lecture-16 7 / 8
Activity
Activity: A
⇒ It is likely that by the time you are reading this set of notes that
another draft of the proposed act has been released.
⇒ The media might also be covering it in more detail.
⇒ Try and get hold of the most recent draft or some analysis of it in the
media.
Q How has it changed?
Activity B
Q Discuss if and how the interception and privacy counterbalance one
another. Do you have concerns about either of the acts?
Dr. Varun Kumar (IIIT Surat) Lecture-16 8 / 8

More Related Content

What's hot

Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
Meenakshi Paul
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
Dineesha Suraweera
 
Topic Packet switching
Topic Packet switchingTopic Packet switching
Topic Packet switching
Dr Rajiv Srivastava
 
Mikrotik basic configuration
Mikrotik basic configurationMikrotik basic configuration
Mikrotik basic configuration
Tola LENG
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
Alok Tripathi
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
hoanv
 
Bab3-computer network
Bab3-computer networkBab3-computer network
Bab3-computer networkAten Kecik
 
Leaky bucket A
Leaky bucket ALeaky bucket A
Leaky bucket A
Syed Shaheer Gilani
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
Kathirvel Ayyaswamy
 
Introduction to distributed system
Introduction to distributed systemIntroduction to distributed system
Introduction to distributed system
ishapadhy
 
Introducción a Foundation 5
Introducción a Foundation 5Introducción a Foundation 5
Introducción a Foundation 5
Cycle-IT
 
SPAN, RSPAN and ERSPAN
SPAN, RSPAN and ERSPANSPAN, RSPAN and ERSPAN
SPAN, RSPAN and ERSPAN
NetProtocol Xpert
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
QaswarBosan
 
Conmutación LAN e inalámbrica: 5. Spaning Tree Protocol STP
Conmutación LAN e inalámbrica: 5. Spaning Tree Protocol STPConmutación LAN e inalámbrica: 5. Spaning Tree Protocol STP
Conmutación LAN e inalámbrica: 5. Spaning Tree Protocol STP
Francesc Perez
 
Transport layer protocols : TCP and UDP
Transport layer protocols  : TCP and UDPTransport layer protocols  : TCP and UDP
Transport layer protocols : TCP and UDP
Kongu Engineering College, Perundurai, Erode
 
Case study of wireless networking for small business
Case study of wireless networking for small businessCase study of wireless networking for small business
Case study of wireless networking for small business
Kambohwell Publisher Enterprises
 
Windows firewall
Windows firewallWindows firewall
Windows firewall
VC Infotech
 
Chapter 10 -Vlsm
Chapter 10 -VlsmChapter 10 -Vlsm
Chapter 10 -Vlsm
phanleson
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
Nita Dalla
 

What's hot (20)

Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
Topic Packet switching
Topic Packet switchingTopic Packet switching
Topic Packet switching
 
Mikrotik basic configuration
Mikrotik basic configurationMikrotik basic configuration
Mikrotik basic configuration
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
Bab3-computer network
Bab3-computer networkBab3-computer network
Bab3-computer network
 
Leaky bucket A
Leaky bucket ALeaky bucket A
Leaky bucket A
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Introduction to distributed system
Introduction to distributed systemIntroduction to distributed system
Introduction to distributed system
 
Introducción a Foundation 5
Introducción a Foundation 5Introducción a Foundation 5
Introducción a Foundation 5
 
SPAN, RSPAN and ERSPAN
SPAN, RSPAN and ERSPANSPAN, RSPAN and ERSPAN
SPAN, RSPAN and ERSPAN
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
Conmutación LAN e inalámbrica: 5. Spaning Tree Protocol STP
Conmutación LAN e inalámbrica: 5. Spaning Tree Protocol STPConmutación LAN e inalámbrica: 5. Spaning Tree Protocol STP
Conmutación LAN e inalámbrica: 5. Spaning Tree Protocol STP
 
Transport layer protocols : TCP and UDP
Transport layer protocols  : TCP and UDPTransport layer protocols  : TCP and UDP
Transport layer protocols : TCP and UDP
 
Case study of wireless networking for small business
Case study of wireless networking for small businessCase study of wireless networking for small business
Case study of wireless networking for small business
 
Windows firewall
Windows firewallWindows firewall
Windows firewall
 
Chapter 10 -Vlsm
Chapter 10 -VlsmChapter 10 -Vlsm
Chapter 10 -Vlsm
 
Ipv4
Ipv4Ipv4
Ipv4
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 

Similar to Interception Act vs Privacy Act

RTI Act 2005
RTI Act 2005RTI Act 2005
RTI Act 2005
Rajveer Bhaskar
 
Rti natchiappan cmte-report of fgd-030209
Rti natchiappan cmte-report of fgd-030209Rti natchiappan cmte-report of fgd-030209
Rti natchiappan cmte-report of fgd-030209
Raviforjustice Raviforjustice
 
Guide to right to information act Malayalam James Joseph Adhikarathil
Guide to right to information act Malayalam James Joseph AdhikarathilGuide to right to information act Malayalam James Joseph Adhikarathil
Guide to right to information act Malayalam James Joseph Adhikarathil
Jamesadhikaram land matter consultancy 9447464502
 
Guide 2013 issue
Guide 2013 issueGuide 2013 issue
Guide 2013 issue
bansi default
 
Understanding the computer and privacy issues-2
Understanding the computer and privacy issues-2Understanding the computer and privacy issues-2
Understanding the computer and privacy issues-2
VARUN KUMAR
 
Right to Information Act 2005 by Dr. N.P.Ghadge.pptx
Right to Information Act 2005 by Dr.  N.P.Ghadge.pptxRight to Information Act 2005 by Dr.  N.P.Ghadge.pptx
Right to Information Act 2005 by Dr. N.P.Ghadge.pptx
neeta35
 
Right_to_Information_Act_2005.ppt
Right_to_Information_Act_2005.pptRight_to_Information_Act_2005.ppt
Right_to_Information_Act_2005.ppt
jiki8
 
Rti presentation may2013
Rti  presentation may2013Rti  presentation may2013
Rti presentation may2013
Mukut Deori
 
Rule of law.ppt.
Rule of law.ppt.Rule of law.ppt.
Rule of law.ppt.
Abhinav Singh
 
Rti overview
Rti overviewRti overview
Principles of mobile privacy
Principles of mobile privacyPrinciples of mobile privacy
Principles of mobile privacy
Euphodia Maluleke
 
Right to Information India Act 2005.pptx
Right to Information India Act 2005.pptxRight to Information India Act 2005.pptx
Right to Information India Act 2005.pptx
ABCDEF505066
 
113/2009 Regulations on Protection
113/2009 Regulations on Protection113/2009 Regulations on Protection
113/2009 Regulations on Protection
traoman
 
RTI Act
RTI ActRTI Act
RTI Act
Preet Gill
 
Pra Primer 04072010
Pra Primer 04072010Pra Primer 04072010
Pra Primer 04072010
dslunceford
 
Enforcement of Trademarks and Copyrights in Thailand and Myanmar
Enforcement of Trademarks and Copyrights in Thailand and MyanmarEnforcement of Trademarks and Copyrights in Thailand and Myanmar
Enforcement of Trademarks and Copyrights in Thailand and Myanmar
LawPlus Ltd.
 
ENVIRONMENT MANAGEMENT AND HUMAN RIGHTS.pptx
ENVIRONMENT MANAGEMENT AND HUMAN RIGHTS.pptxENVIRONMENT MANAGEMENT AND HUMAN RIGHTS.pptx
ENVIRONMENT MANAGEMENT AND HUMAN RIGHTS.pptx
KuriakoseBaby1
 
Indu mehta rti ppt
Indu mehta rti pptIndu mehta rti ppt
Indu mehta rti ppt
Arjun Mehta
 
Section 69 Information technology act 2001
Section 69 Information technology act 2001Section 69 Information technology act 2001
Section 69 Information technology act 2001
22010122059
 

Similar to Interception Act vs Privacy Act (20)

RTI Act 2005
RTI Act 2005RTI Act 2005
RTI Act 2005
 
Rti natchiappan cmte-report of fgd-030209
Rti natchiappan cmte-report of fgd-030209Rti natchiappan cmte-report of fgd-030209
Rti natchiappan cmte-report of fgd-030209
 
Guide to right to information act Malayalam James Joseph Adhikarathil
Guide to right to information act Malayalam James Joseph AdhikarathilGuide to right to information act Malayalam James Joseph Adhikarathil
Guide to right to information act Malayalam James Joseph Adhikarathil
 
Guide 2013 issue
Guide 2013 issueGuide 2013 issue
Guide 2013 issue
 
Understanding the computer and privacy issues-2
Understanding the computer and privacy issues-2Understanding the computer and privacy issues-2
Understanding the computer and privacy issues-2
 
Right to Information Act 2005 by Dr. N.P.Ghadge.pptx
Right to Information Act 2005 by Dr.  N.P.Ghadge.pptxRight to Information Act 2005 by Dr.  N.P.Ghadge.pptx
Right to Information Act 2005 by Dr. N.P.Ghadge.pptx
 
Rti
RtiRti
Rti
 
Right_to_Information_Act_2005.ppt
Right_to_Information_Act_2005.pptRight_to_Information_Act_2005.ppt
Right_to_Information_Act_2005.ppt
 
Rti presentation may2013
Rti  presentation may2013Rti  presentation may2013
Rti presentation may2013
 
Rule of law.ppt.
Rule of law.ppt.Rule of law.ppt.
Rule of law.ppt.
 
Rti overview
Rti overviewRti overview
Rti overview
 
Principles of mobile privacy
Principles of mobile privacyPrinciples of mobile privacy
Principles of mobile privacy
 
Right to Information India Act 2005.pptx
Right to Information India Act 2005.pptxRight to Information India Act 2005.pptx
Right to Information India Act 2005.pptx
 
113/2009 Regulations on Protection
113/2009 Regulations on Protection113/2009 Regulations on Protection
113/2009 Regulations on Protection
 
RTI Act
RTI ActRTI Act
RTI Act
 
Pra Primer 04072010
Pra Primer 04072010Pra Primer 04072010
Pra Primer 04072010
 
Enforcement of Trademarks and Copyrights in Thailand and Myanmar
Enforcement of Trademarks and Copyrights in Thailand and MyanmarEnforcement of Trademarks and Copyrights in Thailand and Myanmar
Enforcement of Trademarks and Copyrights in Thailand and Myanmar
 
ENVIRONMENT MANAGEMENT AND HUMAN RIGHTS.pptx
ENVIRONMENT MANAGEMENT AND HUMAN RIGHTS.pptxENVIRONMENT MANAGEMENT AND HUMAN RIGHTS.pptx
ENVIRONMENT MANAGEMENT AND HUMAN RIGHTS.pptx
 
Indu mehta rti ppt
Indu mehta rti pptIndu mehta rti ppt
Indu mehta rti ppt
 
Section 69 Information technology act 2001
Section 69 Information technology act 2001Section 69 Information technology act 2001
Section 69 Information technology act 2001
 

More from VARUN KUMAR

Distributed rc Model
Distributed rc ModelDistributed rc Model
Distributed rc Model
VARUN KUMAR
 
Electrical Wire Model
Electrical Wire ModelElectrical Wire Model
Electrical Wire Model
VARUN KUMAR
 
Interconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignInterconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI Design
VARUN KUMAR
 
Introduction to Digital VLSI Design
Introduction to Digital VLSI DesignIntroduction to Digital VLSI Design
Introduction to Digital VLSI Design
VARUN KUMAR
 
Challenges of Massive MIMO System
Challenges of Massive MIMO SystemChallenges of Massive MIMO System
Challenges of Massive MIMO System
VARUN KUMAR
 
E-democracy or Digital Democracy
E-democracy or Digital DemocracyE-democracy or Digital Democracy
E-democracy or Digital Democracy
VARUN KUMAR
 
Ethics of Parasitic Computing
Ethics of Parasitic ComputingEthics of Parasitic Computing
Ethics of Parasitic Computing
VARUN KUMAR
 
Action Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionAction Lines of Geneva Plan of Action
Action Lines of Geneva Plan of Action
VARUN KUMAR
 
Geneva Plan of Action
Geneva Plan of ActionGeneva Plan of Action
Geneva Plan of Action
VARUN KUMAR
 
Fair Use in the Electronic Age
Fair Use in the Electronic AgeFair Use in the Electronic Age
Fair Use in the Electronic Age
VARUN KUMAR
 
Software as a Property
Software as a PropertySoftware as a Property
Software as a Property
VARUN KUMAR
 
Orthogonal Polynomial
Orthogonal PolynomialOrthogonal Polynomial
Orthogonal Polynomial
VARUN KUMAR
 
Patent Protection
Patent ProtectionPatent Protection
Patent Protection
VARUN KUMAR
 
Copyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy LawCopyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy Law
VARUN KUMAR
 
Property Right and Software
Property Right and SoftwareProperty Right and Software
Property Right and Software
VARUN KUMAR
 
Investigating Data Trials
Investigating Data TrialsInvestigating Data Trials
Investigating Data Trials
VARUN KUMAR
 
Gaussian Numerical Integration
Gaussian Numerical IntegrationGaussian Numerical Integration
Gaussian Numerical Integration
VARUN KUMAR
 
Censorship and Controversy
Censorship and ControversyCensorship and Controversy
Censorship and Controversy
VARUN KUMAR
 
Romberg's Integration
Romberg's IntegrationRomberg's Integration
Romberg's Integration
VARUN KUMAR
 
Introduction to Censorship
Introduction to Censorship Introduction to Censorship
Introduction to Censorship
VARUN KUMAR
 

More from VARUN KUMAR (20)

Distributed rc Model
Distributed rc ModelDistributed rc Model
Distributed rc Model
 
Electrical Wire Model
Electrical Wire ModelElectrical Wire Model
Electrical Wire Model
 
Interconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignInterconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI Design
 
Introduction to Digital VLSI Design
Introduction to Digital VLSI DesignIntroduction to Digital VLSI Design
Introduction to Digital VLSI Design
 
Challenges of Massive MIMO System
Challenges of Massive MIMO SystemChallenges of Massive MIMO System
Challenges of Massive MIMO System
 
E-democracy or Digital Democracy
E-democracy or Digital DemocracyE-democracy or Digital Democracy
E-democracy or Digital Democracy
 
Ethics of Parasitic Computing
Ethics of Parasitic ComputingEthics of Parasitic Computing
Ethics of Parasitic Computing
 
Action Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionAction Lines of Geneva Plan of Action
Action Lines of Geneva Plan of Action
 
Geneva Plan of Action
Geneva Plan of ActionGeneva Plan of Action
Geneva Plan of Action
 
Fair Use in the Electronic Age
Fair Use in the Electronic AgeFair Use in the Electronic Age
Fair Use in the Electronic Age
 
Software as a Property
Software as a PropertySoftware as a Property
Software as a Property
 
Orthogonal Polynomial
Orthogonal PolynomialOrthogonal Polynomial
Orthogonal Polynomial
 
Patent Protection
Patent ProtectionPatent Protection
Patent Protection
 
Copyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy LawCopyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy Law
 
Property Right and Software
Property Right and SoftwareProperty Right and Software
Property Right and Software
 
Investigating Data Trials
Investigating Data TrialsInvestigating Data Trials
Investigating Data Trials
 
Gaussian Numerical Integration
Gaussian Numerical IntegrationGaussian Numerical Integration
Gaussian Numerical Integration
 
Censorship and Controversy
Censorship and ControversyCensorship and Controversy
Censorship and Controversy
 
Romberg's Integration
Romberg's IntegrationRomberg's Integration
Romberg's Integration
 
Introduction to Censorship
Introduction to Censorship Introduction to Censorship
Introduction to Censorship
 

Recently uploaded

Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 

Recently uploaded (20)

Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 

Interception Act vs Privacy Act

  • 1. Interception Act versus Privacy Act Dr. Varun Kumar Dr. Varun Kumar (IIIT Surat) Lecture-16 1 / 8
  • 2. Outlines 1 The Interception Act 2 The Privacy Act Activity Dr. Varun Kumar (IIIT Surat) Lecture-16 2 / 8
  • 3. The Interception Act: South Africa ⇒ The interception act came into full effect in September 2005. ⇒ Ref: http://www.justice.gov.za/legislation/acts/2002-070.pdf ⇒ RICA: Regulation of Interception of Communications Act. ⇒ Provision of Communication related Information Act. ⇒ RICA seeks to regulate The interaction of certain communications The monitoring of certain signals (radio frequency spectrum) The provision of certain communication-related information ⇒ Steps for monitoring the communication Law enforcement must be in possession of information or evident ⇒ Electronic communications are being used in the commission of the crime. Approach the court and request an ”interception direction”. ⇒ The sitting judge will then decide on the merit of the evident present and will grant or refuse this directive. Dr. Varun Kumar (IIIT Surat) Lecture-16 3 / 8
  • 4. Continued– Once the interception direction is obtained, ⇒ It can then be served to the relevant service provider. ⇒ Forward all surveillance information to the law enforcement agency. ⇒ The person under surveillance needs not be informed. RICA provides that all forms of monitoring and interception. There are several exceptions on the prohibition on intercepting communications. ⇒ Three rules for apply to monitoring in the workplace: (i) Party to a communication: ⇒ Section 4 of the RICA allows a party to a communication to monitor and intercept the communication if he/she is a party to the communication. ⇒ The participants in a meeting consent to the meeting being recorded. ⇒ This exception also applies where the interceptor is acting with the consent of one of the parties to the communication. Dr. Varun Kumar (IIIT Surat) Lecture-16 4 / 8
  • 5. Continued– (ii) Written Consent: ⇒ Section 5 allows for interception of any communication under any circumstances ⇒ No special motivation or reason is required for it. ⇒ The person whose communication is being intercepted has consented to it in writing prior to such interception. Dr. Varun Kumar (IIIT Surat) Lecture-16 5 / 8
  • 6. Continued– (iii) Business Purpose Exception: ⇒ Section 6 contains a so-called business purpose exception which involves the interception of indirect communications in connection with the carrying on of business. ⇒ Section 6 authorizes any person to intercept indirect communications in the course of carrying out their business by means of which a transaction is concluded in the course of that business. ⇒ Relates to that business or which otherwise takes place in the course of the carrying on of that business, in the course of its transmission over a telecommunication system. Dr. Varun Kumar (IIIT Surat) Lecture-16 6 / 8
  • 7. The Privacy Act ⇒ The protection of personal information Act is seen by some as a counterbalance to the Interception Act above. ⇒ Ref: http://www.gov.za/sites/www.gov.za/files/37067 26- 11 Act4of2013ProtectionOfPersonalInfor correct.pdf ⇒ The act seeks to promote the protection of personal information of South Africans processed by public and private bodies. ⇒ It also seeks to provide for the rights of persons regarding unsolicited electronic communications and automated decision making. ⇒ It also seeks to regulate the flow of personal information across the borders of the Republic. Dr. Varun Kumar (IIIT Surat) Lecture-16 7 / 8
  • 8. Activity Activity: A ⇒ It is likely that by the time you are reading this set of notes that another draft of the proposed act has been released. ⇒ The media might also be covering it in more detail. ⇒ Try and get hold of the most recent draft or some analysis of it in the media. Q How has it changed? Activity B Q Discuss if and how the interception and privacy counterbalance one another. Do you have concerns about either of the acts? Dr. Varun Kumar (IIIT Surat) Lecture-16 8 / 8