Electronic signatures and cryptography

Digital signatures, digital certificates, and advanced electronic signatures are all types of electronic signatures that use cryptography to authenticate the identity of the person signing and to secure their electronic signature. They are all very reliable, but they each have [...]

By | January 14th, 2014|Categories: Electronic Signature Law|Tags: , |

Do you need to register as a Cryptography Provider?

Cryptography and encryption presents a challenge to security conscious governments in that it allows message content to be concealed from the authorities. Therefore, the purpose of the cryptography provisions in our law is, amongst other things, to assist the investigative [...]

By | April 23rd, 2012|Categories: IT Law|Tags: , , , , |

IT Security Podcast

This IT Security Pubcast focuses on matters of information security and risk in South Africa. Part 1: 00:00:00 - 00:11:34 - 1.4MB Speakers are introduced (including Helaine Leggat from Michalsons) and they discuss an issue they faced involving a leak [...]

By | October 24th, 2008|Categories: Information Security Law|Tags: , , , |