ECT Act

/Tag:ECT Act

ICT Weekly Update

This is the ICT Weekly Update on legal, regulatory and policy developments in the ICT industry prepared by Lisa Thornton Inc for clients and colleagues. Michalsons reproduces it, in part, here with the permission of Lisa Thornton Inc. NEW FINDINGS, [...]

By | November 29th, 2016|Categories: IT Law|Tags: , , , |

Return of Goods under the Consumer Protection Act in South Africa

When can a consumer return goods under the Consumer Protection Act (CPA) in South Africa. There are a number of sections in the Consumer Protection Act that allow goods to be returned, but what is important to note, is that there [...]

By | July 14th, 2016|Categories: Consumer Protection|Tags: , , , , |

Information and Communications Technology Law Book

Information and Communications Technology Law is a  book recently published by LexisNexis in 2016 dealing with South African law on the topic. It is written by DP van der Merwe, A Roos, T Pistorius, GTS Eiselen and SS Nel.  It is [...]

By | April 11th, 2016|Categories: IT Law|Tags: , , |

Spam and the Law

We first wrote about email marketing, spam email and the law in August 2003 and the law in 2013 relating to spam has changed a lot over the last 10 years. So has people's concept of what spam is. Both [...]

By | May 14th, 2013|Categories: Marketing Law|Tags: , , , |

Get limited liability

In the past, various Internet service providers (ISPs) and publishers have been held liable for the unlawful action of others. For example, ISPs have  been held liable for the data hosted on one of their servers by a customer. So, [...]

By | May 27th, 2012|Categories: IT Contracts|Tags: , |

Cryptography laws in South Africa

What is cryptography? Wikipedia defines "cryptography" as "the practice and study of hiding information". Where a document or communication has been encrypted, the act of encrypting serves several purposes? To: establish its authenticity; prevent its undetected modification; prevent its repudiation [...]

By | May 25th, 2012|Categories: POPI and Data Protection|Tags: , , |

Do you need to register as a Cryptography Provider?

Cryptography and encryption presents a challenge to security conscious governments in that it allows message content to be concealed from the authorities. Therefore, the purpose of the cryptography provisions in our law is, amongst other things, to assist the investigative [...]

By | April 23rd, 2012|Categories: IT Law|Tags: , , , , |

The Law regards Automatic and Electronic Processes

Many organisations are taking processes and looking to see how they can do them electronically and automatically. There are obviously huge benefits in using electronic processes - saving time and money being the most obvious. For example, many organisations are implementing the Companies [...]

Map of Virus Threat Levels

Click here to view a map of computer virus threat levels.

By | June 6th, 2010|Categories: POPI and Data Protection|Tags: , , |

Get an overview of ICT laws

People often ask us to provide an overview of an ICT law - the big picture.  It is often very difficult to do this effectively. Recently we found a great web based tool called Wordle. Worlde enables you to create [...]

By | November 16th, 2009|Categories: IT Law|Tags: , , , , |