SlideShare a Scribd company logo
Interception Act versus Privacy Act
Dr. Varun Kumar
Dr. Varun Kumar (IIIT Surat) Lecture-16 1 / 8
Outlines
1 The Interception Act
2 The Privacy Act
Activity
Dr. Varun Kumar (IIIT Surat) Lecture-16 2 / 8
The Interception Act: South Africa
⇒ The interception act came into full effect in September 2005.
⇒ Ref: http://www.justice.gov.za/legislation/acts/2002-070.pdf
⇒ RICA: Regulation of Interception of Communications Act.
⇒ Provision of Communication related Information Act.
⇒ RICA seeks to regulate
The interaction of certain communications
The monitoring of certain signals (radio frequency spectrum)
The provision of certain communication-related information
⇒ Steps for monitoring the communication
Law enforcement must be in possession of information or evident
⇒ Electronic communications are being used in the commission of the
crime.
Approach the court and request an ”interception direction”.
⇒ The sitting judge will then decide on the merit of the evident present
and will grant or refuse this directive.
Dr. Varun Kumar (IIIT Surat) Lecture-16 3 / 8
Continued–
Once the interception direction is obtained,
⇒ It can then be served to the relevant service provider.
⇒ Forward all surveillance information to the law enforcement agency.
⇒ The person under surveillance needs not be informed.
RICA provides that all forms of monitoring and interception.
There are several exceptions on the prohibition on intercepting
communications.
⇒ Three rules for apply to monitoring in the workplace:
(i) Party to a communication:
⇒ Section 4 of the RICA allows a party to a communication to monitor
and intercept the communication if he/she is a party to the
communication.
⇒ The participants in a meeting consent to the meeting being recorded.
⇒ This exception also applies where the interceptor is acting with the
consent of one of the parties to the communication.
Dr. Varun Kumar (IIIT Surat) Lecture-16 4 / 8
Continued–
(ii) Written Consent:
⇒ Section 5 allows for interception of any communication under any
circumstances
⇒ No special motivation or reason is required for it.
⇒ The person whose communication is being intercepted has consented
to it in writing prior to such interception.
Dr. Varun Kumar (IIIT Surat) Lecture-16 5 / 8
Continued–
(iii) Business Purpose Exception:
⇒ Section 6 contains a so-called business purpose exception which
involves the interception of indirect communications in connection with
the carrying on of business.
⇒ Section 6 authorizes any person to intercept indirect communications
in the course of carrying out their business by means of which a
transaction is concluded in the course of that business.
⇒ Relates to that business or which otherwise takes place in the course of
the carrying on of that business, in the course of its transmission over a
telecommunication system.
Dr. Varun Kumar (IIIT Surat) Lecture-16 6 / 8
The Privacy Act
⇒ The protection of personal information Act is seen by some as a
counterbalance to the Interception Act above.
⇒ Ref: http://www.gov.za/sites/www.gov.za/files/37067 26-
11 Act4of2013ProtectionOfPersonalInfor correct.pdf
⇒ The act seeks to promote the protection of personal information of
South Africans processed by public and private bodies.
⇒ It also seeks to provide for the rights of persons regarding unsolicited
electronic communications and automated decision making.
⇒ It also seeks to regulate the flow of personal information across the
borders of the Republic.
Dr. Varun Kumar (IIIT Surat) Lecture-16 7 / 8
Activity
Activity: A
⇒ It is likely that by the time you are reading this set of notes that
another draft of the proposed act has been released.
⇒ The media might also be covering it in more detail.
⇒ Try and get hold of the most recent draft or some analysis of it in the
media.
Q How has it changed?
Activity B
Q Discuss if and how the interception and privacy counterbalance one
another. Do you have concerns about either of the acts?
Dr. Varun Kumar (IIIT Surat) Lecture-16 8 / 8

More Related Content

PDF
Interaksi manusia dan komputer
PPTX
Kelompok 8 - Implementasi Role & Privilege pada database Oracle & my SQL
PDF
Resume praktikum 5__linked_list
PPT
03 Ch3 Notes Revised
PPTX
Model pengguna
DOC
Contoh proposal teknik_informatika
DOCX
Laporan modul 5 basisdata
PPTX
Tatakelola Teknologi Informasi
Interaksi manusia dan komputer
Kelompok 8 - Implementasi Role & Privilege pada database Oracle & my SQL
Resume praktikum 5__linked_list
03 Ch3 Notes Revised
Model pengguna
Contoh proposal teknik_informatika
Laporan modul 5 basisdata
Tatakelola Teknologi Informasi

What's hot (20)

PPTX
Map reduce prashant
PDF
Kamus data (data dictionary) - (Bambang Sugianto - Politeknik Sawunggalih Aji...
DOCX
Kecakapan antar personal (kap)
PPTX
Materi ERD (Entity Relationship Diagram).pptx
PPT
UNIT-1 PPT.pptCS 3492 DBMS UNIT 1 to 5 overview Unit 1 slides including purpo...
PDF
Neuron Mc Culloch Pitts dan Hebb
PPT
Modul 4 representasi pengetahuan
PPTX
Teori bahasa otomata pertemuan 4
PDF
Strukturisasi kebutuhan kebutuhan sistem
PDF
Testing dan implementasi_sistem_-_romeo
PDF
Makalah Peranan Semaphore Sistem Operasi - Universitas Widyatama
DOCX
Erp pertamina
PDF
Mainframe
PDF
Sql ch 13 - sql-views
PPTX
Penjelasan Singkat Internet of things
PPTX
Penggunaan SUBQUERY SQL SERVER (USING SUBQUERIES)
PPSX
ARIES Recovery Algorithms
PPTX
Komputasi Fisika 01 (Pengenalan Phyton)
Map reduce prashant
Kamus data (data dictionary) - (Bambang Sugianto - Politeknik Sawunggalih Aji...
Kecakapan antar personal (kap)
Materi ERD (Entity Relationship Diagram).pptx
UNIT-1 PPT.pptCS 3492 DBMS UNIT 1 to 5 overview Unit 1 slides including purpo...
Neuron Mc Culloch Pitts dan Hebb
Modul 4 representasi pengetahuan
Teori bahasa otomata pertemuan 4
Strukturisasi kebutuhan kebutuhan sistem
Testing dan implementasi_sistem_-_romeo
Makalah Peranan Semaphore Sistem Operasi - Universitas Widyatama
Erp pertamina
Mainframe
Sql ch 13 - sql-views
Penjelasan Singkat Internet of things
Penggunaan SUBQUERY SQL SERVER (USING SUBQUERIES)
ARIES Recovery Algorithms
Komputasi Fisika 01 (Pengenalan Phyton)
Ad

Similar to Interception Act vs Privacy Act (20)

PDF
Ethics in Information Technology - Privacy
PPTX
UK Legal Framework (2003)
PDF
Employment and Labour Law Seminar - June 13, 2013
PDF
2009: Voice Security And Privacy (Security Summit - Milan)
PDF
Privacy impact assessment
PDF
Information Security: The Trinidad & Tobago Legal Context
PPTX
Data aCT PRIVACY/................................................
PPT
National Perspective of Cybercrime under IT Act
PDF
What is the PIPEDA Digital Privacy Act.pdf
PPTX
PRIVACY_SPI-Subject_3rdyear-BSITWeb.pptx
PPTX
SCL Conference 8 June 2017 - Investigatory Powers Act
PPTX
Protection of Personal Information
PPTX
Protection of Personal Information
PPT
Sec af pa slides
PDF
10 Things You Need To Know About Privacy
PPTX
Laws and ethics in information assurance
PDF
Privacy and Social Media
PPTX
Section 69 Information technology act 2001
PPTX
Privacy and Privacy Law in India By Prashant Mali
PPTX
OVERVIEW OF CYBER LAWS IN INDIA AND SECTIONS
Ethics in Information Technology - Privacy
UK Legal Framework (2003)
Employment and Labour Law Seminar - June 13, 2013
2009: Voice Security And Privacy (Security Summit - Milan)
Privacy impact assessment
Information Security: The Trinidad & Tobago Legal Context
Data aCT PRIVACY/................................................
National Perspective of Cybercrime under IT Act
What is the PIPEDA Digital Privacy Act.pdf
PRIVACY_SPI-Subject_3rdyear-BSITWeb.pptx
SCL Conference 8 June 2017 - Investigatory Powers Act
Protection of Personal Information
Protection of Personal Information
Sec af pa slides
10 Things You Need To Know About Privacy
Laws and ethics in information assurance
Privacy and Social Media
Section 69 Information technology act 2001
Privacy and Privacy Law in India By Prashant Mali
OVERVIEW OF CYBER LAWS IN INDIA AND SECTIONS
Ad

More from VARUN KUMAR (20)

PDF
Distributed rc Model
PDF
Electrical Wire Model
PDF
Interconnect Parameter in Digital VLSI Design
PDF
Introduction to Digital VLSI Design
PDF
Challenges of Massive MIMO System
PDF
E-democracy or Digital Democracy
PDF
Ethics of Parasitic Computing
PDF
Action Lines of Geneva Plan of Action
PDF
Geneva Plan of Action
PDF
Fair Use in the Electronic Age
PDF
Software as a Property
PDF
Orthogonal Polynomial
PDF
Patent Protection
PDF
Copyright Vs Patent and Trade Secrecy Law
PDF
Property Right and Software
PDF
Investigating Data Trials
PDF
Gaussian Numerical Integration
PDF
Censorship and Controversy
PDF
Romberg's Integration
PDF
Introduction to Censorship
Distributed rc Model
Electrical Wire Model
Interconnect Parameter in Digital VLSI Design
Introduction to Digital VLSI Design
Challenges of Massive MIMO System
E-democracy or Digital Democracy
Ethics of Parasitic Computing
Action Lines of Geneva Plan of Action
Geneva Plan of Action
Fair Use in the Electronic Age
Software as a Property
Orthogonal Polynomial
Patent Protection
Copyright Vs Patent and Trade Secrecy Law
Property Right and Software
Investigating Data Trials
Gaussian Numerical Integration
Censorship and Controversy
Romberg's Integration
Introduction to Censorship

Recently uploaded (20)

PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
web development for engineering and engineering
PPTX
Geodesy 1.pptx...............................................
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
composite construction of structures.pdf
PDF
Well-logging-methods_new................
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
DOCX
573137875-Attendance-Management-System-original
PPT
Project quality management in manufacturing
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Structs to JSON How Go Powers REST APIs.pdf
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
web development for engineering and engineering
Geodesy 1.pptx...............................................
Foundation to blockchain - A guide to Blockchain Tech
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
composite construction of structures.pdf
Well-logging-methods_new................
Lecture Notes Electrical Wiring System Components
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
UNIT-1 - COAL BASED THERMAL POWER PLANTS
573137875-Attendance-Management-System-original
Project quality management in manufacturing
Operating System & Kernel Study Guide-1 - converted.pdf
bas. eng. economics group 4 presentation 1.pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Structs to JSON How Go Powers REST APIs.pdf

Interception Act vs Privacy Act

  • 1. Interception Act versus Privacy Act Dr. Varun Kumar Dr. Varun Kumar (IIIT Surat) Lecture-16 1 / 8
  • 2. Outlines 1 The Interception Act 2 The Privacy Act Activity Dr. Varun Kumar (IIIT Surat) Lecture-16 2 / 8
  • 3. The Interception Act: South Africa ⇒ The interception act came into full effect in September 2005. ⇒ Ref: http://www.justice.gov.za/legislation/acts/2002-070.pdf ⇒ RICA: Regulation of Interception of Communications Act. ⇒ Provision of Communication related Information Act. ⇒ RICA seeks to regulate The interaction of certain communications The monitoring of certain signals (radio frequency spectrum) The provision of certain communication-related information ⇒ Steps for monitoring the communication Law enforcement must be in possession of information or evident ⇒ Electronic communications are being used in the commission of the crime. Approach the court and request an ”interception direction”. ⇒ The sitting judge will then decide on the merit of the evident present and will grant or refuse this directive. Dr. Varun Kumar (IIIT Surat) Lecture-16 3 / 8
  • 4. Continued– Once the interception direction is obtained, ⇒ It can then be served to the relevant service provider. ⇒ Forward all surveillance information to the law enforcement agency. ⇒ The person under surveillance needs not be informed. RICA provides that all forms of monitoring and interception. There are several exceptions on the prohibition on intercepting communications. ⇒ Three rules for apply to monitoring in the workplace: (i) Party to a communication: ⇒ Section 4 of the RICA allows a party to a communication to monitor and intercept the communication if he/she is a party to the communication. ⇒ The participants in a meeting consent to the meeting being recorded. ⇒ This exception also applies where the interceptor is acting with the consent of one of the parties to the communication. Dr. Varun Kumar (IIIT Surat) Lecture-16 4 / 8
  • 5. Continued– (ii) Written Consent: ⇒ Section 5 allows for interception of any communication under any circumstances ⇒ No special motivation or reason is required for it. ⇒ The person whose communication is being intercepted has consented to it in writing prior to such interception. Dr. Varun Kumar (IIIT Surat) Lecture-16 5 / 8
  • 6. Continued– (iii) Business Purpose Exception: ⇒ Section 6 contains a so-called business purpose exception which involves the interception of indirect communications in connection with the carrying on of business. ⇒ Section 6 authorizes any person to intercept indirect communications in the course of carrying out their business by means of which a transaction is concluded in the course of that business. ⇒ Relates to that business or which otherwise takes place in the course of the carrying on of that business, in the course of its transmission over a telecommunication system. Dr. Varun Kumar (IIIT Surat) Lecture-16 6 / 8
  • 7. The Privacy Act ⇒ The protection of personal information Act is seen by some as a counterbalance to the Interception Act above. ⇒ Ref: http://www.gov.za/sites/www.gov.za/files/37067 26- 11 Act4of2013ProtectionOfPersonalInfor correct.pdf ⇒ The act seeks to promote the protection of personal information of South Africans processed by public and private bodies. ⇒ It also seeks to provide for the rights of persons regarding unsolicited electronic communications and automated decision making. ⇒ It also seeks to regulate the flow of personal information across the borders of the Republic. Dr. Varun Kumar (IIIT Surat) Lecture-16 7 / 8
  • 8. Activity Activity: A ⇒ It is likely that by the time you are reading this set of notes that another draft of the proposed act has been released. ⇒ The media might also be covering it in more detail. ⇒ Try and get hold of the most recent draft or some analysis of it in the media. Q How has it changed? Activity B Q Discuss if and how the interception and privacy counterbalance one another. Do you have concerns about either of the acts? Dr. Varun Kumar (IIIT Surat) Lecture-16 8 / 8