You are on page 1of 2

2, The electronic communications and

1, The Protection of personal information (POPI transactions (ECT act 2002)


act 2013)
-This act aims to address the word of e-
3, The Cybercrimes and Cybersecurity act 2019
-The POPI act sets out the minimum standards commerce and the changes in the way
regarding accessing and processing on any contracts and transactions occur as well as the -This gives the minister powers to make
1.1 legal principles which governs them. regulations on information sharing, This includes
personal information belonging to another
person. The act explains processing as collection, sharing information on cybersecurity incidents ,
Example : Swiping a debit card at a store ,
receiving, recording and of information. detecting , preventing and investigating
paying for a purchase online or transferring
cybercrimes.
Example : Synchronising your contacts on our money from an app to your bank account.
phone , sending an email with sensitive contents, Example : Ransomware , cyber forgers and
Taking/sharing a video or a photo or using an uttering or cyber extortion and malicious
international mail provider. communications access to or modification of
data application.

4 , The general data Protection Regulation 5 , The promotion of access to information act
(GDPR) of the European union, which also (PAIA)
applies to the south African
-The promotion of access to information act
-This establishes the general obligations of data effect to section 32 of the constitution, that
controllers and of those who are processing declares everyone has the right to access any
data on their behalf. Different pieces of the legislation information which is in possession of the state
in South African context which and even if it is held by another person and it is
-It includes the obligation that implements are aimed at the effective required for the exercise or protection of any
required security measure that is involved management of information right.
according to all the risks of data processing systems.
operations which they perform. Example : Information held by a person and that
particular information can help save a person’s
Example : The Telephone credit card or life
personnel number of a person, account ,
customer number are all personnel data.

Powered by TCPDF (www.tcpdf.org)


Index of comments

1.1 The correct use of source references [preferably according to the Harvard technique, for example, (Cloete, 2015:5)] is a scientific requirement. Remember the study guide is a
book, it has an author(s), date and a page(s). See tutorial letter PASALL-P/301/.
Use the most recent sources and as a rule use more than one source per section (in other words, use sources of a diverse nature).

8. Make sure that all the sources you referred to in the text, appear in the "List of Sources" section.

Powered by TCPDF (www.tcpdf.org)

You might also like