ECT Act

/Tag:ECT Act

Is it possible to eSign or use an Online Signature?

People everywhere want to know if they can eSign or use an online signature to sign documents, and whether or not such electronic signatures really are important. They want to know about how the law recognises electronic signatures. They're asking [...]

By | February 14th, 2017|Categories: Electronic Signature Law|Tags: , , |

ICT Weekly Update

This is the ICT Weekly Update on legal, regulatory and policy developments in the ICT industry prepared by Lisa Thornton Inc for clients and colleagues. Michalsons reproduces it, in part, here with the permission of Lisa Thornton Inc. NEW FINDINGS, [...]

By | February 14th, 2017|Categories: IT Law|Tags: , , , |

Return of Goods under the Consumer Protection Act in South Africa

When can a consumer return goods under the Consumer Protection Act (CPA) in South Africa? There are a number of sections in the Consumer Protection Act that allow goods to be returned, but it is important to note that there is no [...]

By | July 14th, 2016|Categories: Consumer Protection|Tags: , , , , |

Information and Communications Technology Law Book

Information and Communications Technology Law is a  book recently published by LexisNexis in 2016 dealing with South African law on the topic. It is written by DP van der Merwe, A Roos, T Pistorius, GTS Eiselen and SS Nel.  It is [...]

By | April 11th, 2016|Categories: IT Law|Tags: , , |

Spam and the Law

We first wrote about email marketing, spam email and the law in August 2003 and the law in 2013 relating to spam has changed a lot over the last 10 years. So has people's concept of what spam is. Both [...]

By | May 14th, 2013|Categories: Marketing Law|Tags: , , , |

Get limited liability

In the past, various Internet service providers (ISPs) and publishers have been held liable for the unlawful action of others. For example, ISPs have  been held liable for the data hosted on one of their servers by a customer. So, [...]

By | May 27th, 2012|Categories: IT Contracts|Tags: , |

Cryptography laws in South Africa

What is cryptography? Wikipedia defines "cryptography" as "the practice and study of hiding information". Where a document or communication has been encrypted, the act of encrypting serves several purposes? To: establish its authenticity; prevent its undetected modification; prevent its repudiation [...]

By | May 25th, 2012|Categories: POPI and Data Protection|Tags: , , |

Do you need to register as a Cryptography Provider?

You need to register as a cryptography provider if you provide encryption-related products and services or electronic-signature-related offerings. Cryptography and encryption present a challenge to security-conscious governments in that it allows you to conceal your message content from the authorities. [...]

By | April 23rd, 2012|Categories: IT Law|Tags: , , , , |

The Law regards Automatic and Electronic Processes

Many organisations are taking processes and looking to see how they can do them electronically and automatically. There are obviously huge benefits in using electronic processes - saving time and money being the most obvious. For example, many organisations are implementing the Companies [...]

Map of Virus Threat Levels

Click here to view a map of computer virus threat levels.

By | June 6th, 2010|Categories: POPI and Data Protection|Tags: , , |