Content in this category is not available to guests – it is restricted. Free registered users and all users above them have access. Free registered users do not pay a fee to register or read the content. Subscribers and Clients also have access. Private tags are inserted and the following usergroups should be ticked: Trial, Free, Subscriber, Student and Client.

Cyberbullying v Freedom of Speech

Many people around the world reacted strongly against "cyberbullying" or cyber-bullying after the suicide of Megan Meier in 2006. She committed suicide after alleged online harassment by a fictitious "teen boy" who turned out to be the mother of a [...]

By | April 28th, 2009|Categories: Cyber Crime|Tags: , , , , , |

Leave my laptop alone

In this post we look at how your laptop may be treated at a South African Airport and the possible impact of this on your right to privacy. Nowadays, more and more people work flexi hours, from home or live [...]

By | March 9th, 2009|Categories: POPI and Data Protection|Tags: , , , |

Automatically unfair termination

Know, understand and apply the principles for determining the “dismissals”  regarded as automatically unfair, in the sense that employers are not able to defend any such “dismissals”. Persons who prove: an employment relationship, a “dismissal” and automatic unfairness are entitled [...]

By | February 20th, 2009|Categories: Labour Law|Tags: , , , |

Who owns web site posts?

A common issue nowadays is who owns the copyright in content posted to web site posts or blogs - content in the form of text, visual images or the like, where a web site allows this sort of participation by [...]

By | February 18th, 2009|Categories: Intellectual Property Protection|Tags: , , |

IT Security Podcast

This IT Security Pubcast focuses on matters of information security and risk in South Africa. Part 1: 00:00:00 - 00:11:34 - 1.4MB Speakers are introduced (including Helaine Leggat from Michalsons) and they discuss an issue they faced involving a leak [...]

By | October 24th, 2008|Categories: Information Security Law|Tags: , , , |

Corporate Governance: Index (Part 1)

This is an index of some legal resources related to the broad concept of corporate governance, which includes fairness, accountability, responsibility, transparency, and risk management: 2005 ONWARDS [Constitutional Court] Sidumo v Rustenburg Platinum Mines Ltd (GF 6778) [Navsa AJ et [...]

By | October 22nd, 2008|Categories: IT Governance|Tags: , , , |

What can’t be advertised on the Internet?

Are there any products or services that may not be advertised or types of content which are not permitted on the Internet? In terms of ASA, the following has been identified as unacceptable advertising: Advertisements that play on fear ( [...]

By | October 9th, 2008|Categories: Marketing Law|Tags: , , , , |

Can a website provider use third-party content on its website without permission from the third-party content provider?

No. This would amount to a contravention of the Copyright Act 98 of 1978 if the content as the copyrighted work was first published in South Africa or made by a "qualified person" (a South African or company registered and [...]

By | September 27th, 2008|Categories: Intellectual Property Protection|Tags: , , , , |

Measures to be taken by companies to guarantee security of Internet transactions

Section 43(5) of the ECT Act requires the supplier in an electronic transaction to "utilise a payment system that is sufficiently secure with reference to accepted technological standards at the time of the transaction and the type of transaction concerned." [...]