Cybercrime

Home/Cybercrime

Cybercrime includes computer crime, online crime, information crimes, communications crimes and technology crimes. It describes both:

  • the crimes directed at computers, data or information communications technologies (ICTs), and
  • the crimes committed by people using computers or ICT.

Michalsons offers workshops on this subject. Both public and private in-house workshops available, as well as an executive briefing designed to get your board on board, helping them understand the cyber security risks that may face their organisation, as well as the related legal implications.

We can also update or draft policies for your organisation that are in line with latest Cybercrime Laws. We can assist you with Incident Response, and ensure that you can admit records and evidence of cybercrime.

You can read more about cybercrime law or read the posts below for our insights.

Employee cybercrime in your backyard

Employee cybercrime is a growing threat that can impact any organisation, regardless of size or industry. While many businesses focus on external cyber threats, the risks posed by insiders often go unnoticed until it’s too late. Recent events illustrate just [...]

By |2025-01-08T16:44:48+02:00January 8th, 2025|Categories: Cybercrime|Tags: , , |

Operation AFRICA Cyber Surge – combatting cybercrime in Africa

Cybercrime in Africa is growing, and with new opportunities comes new vulnerabilities in the online environment. AFRIPOL and INTERPOL have joined forces in a series of efforts designed to combat these increasing threats: AFRICA Cyber Surge. The initiative focuses on [...]

By |2025-02-24T15:30:05+02:00November 8th, 2024|Categories: Cybercrime|Tags: , , |

Navigating Trustworthy AI in South African Law: An Overview

Building AI without legal guidance is like constructing a bridge without blueprints—it might stand for a while, but it's destined to collapse. As AI continues to rapidly integrate into the South African business environment, aligning it and its use [...]

By |2024-10-01T08:36:42+02:00September 30th, 2024|Categories: Access to Information, AI Law, Cybercrime, Data governance, POPI and Data Protection|Tags: , , , |

Privacy obligations in the BEC case of ENS v Hawarden

In the matter of ENS v Hawarden, the SCA overturned the judgment in the High Court in Gauteng, holding ENS liable for the loss suffered by Mrs Hawarden because of a business email compromise. The SCA's finding is primarily based [...]

Pinnacle Micro Proprietary Limited v Govender | BEC

This case highlights the importance of verifying banking details before making electronic payments, especially when receiving a change of instructions. Who should care about this judgment and why? Essentially all businesses face the threat of business email compromise. This judgment provides [...]

Edward Nathan Sonnenbergs (ENS) v Hawarden | BEC

In Edward Nathan Sonnenbergs(ENS) v Hawarden, ENS appealed the judgment handed down in Hawarden v Edward Nathan Sonnenbergs. The Supreme Court of Appeal (SCA) upheld the appeal and dismissed the original order from the high court. Hawarden may appeal this [...]

All businesses need cyber insurance, but at what cost?

Cybercrime insurance is essential for businesses in the digital world, but how much should you invest in this protection, and are there other ways to manage the risks? Who needs cyber insurance? Any organisation using the internet needs to guard [...]

By |2024-06-11T14:30:00+02:00June 6th, 2024|Categories: Cybercrime|Tags: , , |

Monitoring employees in the age of cybercrime

Cybercrime can happen to any organisation—it's almost inevitable. Hackers intent on accessing your data may target you or your employees and prevent you from accessing vital IT systems. While preventative measures like installing advanced security systems and raising awareness are [...]

By |2024-05-02T10:29:00+02:00April 29th, 2024|Categories: Cybercrime|Tags: , |

State v Ndiki and others | Electronic evidence

In this case, State v Ndiki and others, the court ruled that computer-generated evidence labelled as hearsay according to the Law of Evidence Amendment Act 45 of 1988 (LEAA) could be allowed under specific parts of the Act. Evidence depending [...]

Lester Connock Commemoration Fund v Brough Capital | BEC

In Lester Connock Commemoration Fund v Brough Capital, the high court held Brough Capital liable for a breach of agreement in administering funds for the Rotary Club of Rosebank. The court found that fraudulent email transactions totalling R3.1 million occurred [...]

By |2024-02-20T07:53:19+02:00November 29th, 2023|Categories: Cybercrime, Cybersecurity Law|Tags: , , |

How small businesses can protect themselves against cybercrimes

Cybercrimes are on the rise, and your cybersecurity efforts should be too. Cybersecurity does not have to cost you an arm and a leg, but it can save you an arm and a leg if done properly. Small businesses can [...]

Cybercrime and AI: same threats now powered with advanced technology

Cybercrime continues to be an important issue that all organisations are trying to manage. But now, in the era of artificial intelligence (AI), there are even more challenges when dealing with cybercrime. So understanding the impact of cybercrime and AI [...]