Cybercrimes and Cybersecurity Bill – the CaC Bill

The Cybercrimes and Cybersecurity Bill was published on 28 August 2015 and will probably be introduced in Parliament before the end of 2016. Some people will call it the Cybercrime Act or Cybercrime Law. Others might refer to it as CaCA, the [...]

By | August 4th, 2016|Categories: Cyber Crime|Tags: , , , , |

What is IT law, ICT law or Cyber law?

Find resources, guidance, solutions and advice on IT Law, ICT law or Cyber Law. What do these areas of law cover? We focus on the law related to ICT: Information - (or data) in paper or electronic format Communication - [...]

By | January 10th, 2016|Categories: IT Law|Tags: , , , , |

EU Cybersecurity Rules

New EU Cybersecurity Rules have been approved. The European Parliament and the Council of Ministers have agreed on the Network and Information Security Directive (NIS) that will tackle cybersecurity in the European Union. It has an impact on critical service companies [...]

By | December 18th, 2015|Categories: Cyber Crime|Tags: , , , |

What is a National Critical Information Infrastructure?

You may be wondering whether you have anything that can be declared as a National Critical Information Infrastructure (NCII). It's an interesting question. You might well have an NCII. What does mean for you? What are the practical consequences? What falls within [...]

Who is an Electronic Communications Service Provider?

You may be wondering whether you are an Electronic Communications Service Provider (ESCP) as defined by law. It's an interesting question. A lot more people are ECSPs than you realise. You probably are one. What does it means for you if you [...]

Legislation that governs business on the Internet

The ECT Act introduced to South Africa formal legal recognition of electronic commerce. It provides for the facilitation and regulation of electronic communications and transactions, including issues relating to electronic signatures, electronic evidence and computer crimes. Its primary objective is [...]

By | August 13th, 2008|Categories: Internet Law|Tags: , , , |