CyberCrimesDiscussionDocument2015 PDF
CyberCrimesDiscussionDocument2015 PDF
CyberCrimesDiscussionDocument2015 PDF
1. PURPOSE OF BILL
2. BACKGROUND
2.1 In 2011 more than one third of the world‘s total population had access to the
Internet. It is estimated that mobile broadband subscriptions will approach 70 per cent of
the world‘s total population by 2017. The number of networked devices is estimated to
outnumber people by six to one, transforming current conceptions of the internet. In the
future hyper-connected society, it is hard to imagine a cybercrime or perhaps any crime,
that does not involve electronic evidence linked with internet protocol connectivity. Both
individuals and organised criminal groups exploit new criminal opportunities, driven by
profit and personal gain. Most cybercrime acts are estimated to originate in some form
2
2.2 As part of Government‘s Outcome Based Priorities, the JCPS Cluster signed the
JCPS Delivery Agreement relating to Outcome 3 on 24 October 2010. This agreement
focuses on certain areas and activities, clustered around specific outputs, where
interventions will make a substantial and positive impact on the safety of the people of
South Africa.
2.4 Currently there are various laws on the Statute Book dealing with cyber security,
some with overlapping mandates administered by different Government Departments
and whose implementation is not coordinated. The legal framework regulating cyber
security in the Republic of South Africa is a hybrid mix of legislation and the common
law. Some notable statutes in this regard include, among others, the Electronic
Communications and Transactions Act, 2002 (Act No. 25 of 2002), the Protection of
State Information Bill, 2010, the South African Police Service Act, 1995 (Act No. 68 of
1995), the Correctional Services Act, 1998 (Act No. 111 of 1998), the National
Prosecuting Authority Act, 1998 (Act 32 of 1998), the Regulation of Interception of
Communications and Provision of Communication-related Information Act, 2002 (Act
No. 70 of 2002), the Prevention and Combatting of Corrupt Activities Act, 2004 (Act No.
3
12 of 2004), the Films and Publications Act, 1996 (Act No. 65 of 1996), the Criminal
Law (Sexual Offences and Related Matters) Amendment Act, 2007 (Act No. 32 of
2007), the Copyright Act, 1978 (Act No. 98 of 1978), the Civil Proceedings Evidence
Act, 1965 (Act No. 25 of 1956), the Criminal Procedure Act, 1977 (Act No. 51 of 1977),
the Protection of Personal Information Act, 2013 (Act No. 4 of 2013), the Protection from
Harassment Act, 2011 (Act No. 17 of 2011), the Financial Intelligence Centre Act, 2001
(Act No. 38 of 2001), and the State Information Technology Agency Act, 1998 (Act No.
88 of 1998), to name a few.
2.6 The Bill is part of a review process of the laws on the Statute Book which deal
with cyber security and matters related to cyber security. Further legislation may in due
course be promoted to address other relevant aspects, inter alia, cryptography, e-
identity management and also a possible review of electronic evidence.
3. OBJECTS OF BILL
3.1 Definitions
Clauses 1, 2 and 26, 50 contain various definitions which will be explained in context
with the provisions to which they relate.
3.2. Offences
The following offences aim to address personal or financial information or data related
offences:
5
(a) Clause 3(1) criminalises the intentional and unlawful acquiring by any means, the
possession of or provision to another person, of the personal information of a
person for purposes of committing an offence provided for in the Bill.
(b) Clause 3(2) criminalises the intentional and unlawful acquiring by any means, the
possession of or provision to another person, of the financial information of a
person for purposes of committing an offence provided for in the Bill.
(c) Clause 3(3) criminalises the intentional and unlawful use of the personal or
financial information of another person to commit an offence under the Bill.
(b) In terms of clause 3(4), a person is guilty of an offence, if he or she is found in
possession of personal or financial information of another person in regard to
which there is a reasonable suspicion that such personal or financial information–
* was acquired, is possessed, or is to be provided to another person for
purposes of committing an offence under the Bill; or
* was used or may be used to commit an offence under this Bill,
and if he or she is unable to give a satisfactory exculpatory account of such
possession.
accesses system files or other stored data. The criminalisation of illegal access
represents an important deterrent to many other subsequent acts against the
confidentiality, integrity and availability of data, a computer device, a computer network,
a database or an electronic communications network, and other computer-related
offences. It is vital to distinguish between illegal access and subsequent offences, since
the other offences have a different focus of protection. In most cases, illegal access is
not the end goal, but rather a first step towards further crimes, such as interfering with
or intercepting data.
To address this, clause 4(1) criminalises the unlawful accessing of the whole or any
part of data, a computer device, a computer network, a database, a critical database, an
electronic communications network or a National Critical Information Infrastructure.
Clause 4(3) defines "access" as to include, without limitation, the following: To make
use of, to gain entry to, to view, display, instruct, or communicate with, to store data in
or retrieve data from, to copy, move, add, change, or remove data or otherwise to make
use of, configure or reconfigure any resources of a computer device, a computer
network, a database, a critical database, an electronic communications network or a
National Critical Information Infrastructure, whether in whole or in part, including their
logical, arithmetical, memory, transmission, data storage, processor, or memory
functions, whether by physical, virtual, direct, or indirect means or by electronic,
magnetic, audio, optical, or any other means. Clause 4(4) provides that for purposes of
this section, the actions of a person, to the extent that they exceed his or her lawful
authority to access data, a computer device, a computer network, a database, a critical
database, an electronic communications network or a National Critical Information
Infrastructure, must be regarded as unlawful.
amount of access if adequate security measures are not implemented which will allow
access to, inter alia, passwords, bank account information and other sensitive
information. The criminalisation of the unlawful interception of data aims to protect the
integrity, privacy and confidentiality of data within a computer device, a computer
network, a database or an electronic communications network as well as data which is
being sent to, over or from the aforementioned. The unlawful interception of data builds
on the offence of illegal access, where further actions are taken by the perpetrator in
order to acquire data unlawfully.
Clause 5(1) provides that any person who intentionally and unlawfully intercepts data
to, from or within a computer device, a computer network, a database, a critical
database, an electronic communications network, or a National Critical Information
Infrastructure, or any part thereof, is guilty of an offence.
In terms of clause 6(1), any person who intentionally and unlawfully manufactures,
assembles, obtains, sells, purchases, makes available or advertises any software or
hardware tool for the purposes of contravening clauses 3(1)(a) or (2)(a), 4(1), 5(1), 7(1),
8(1), 10(1), 11(1), 12(1) or (2) or 13(1), is guilty of an offence. Clause 6(2) provides that
any person who intentionally and unlawfully uses or possesses any software or
hardware tool for purposes of contravening clauses 3(1)(a) or (2)(a), 4(1), 5(1), 7(1),
8(1), 10(1), 11(1), 12(1) or (2) or 13(1) , is guilty of an offence. In terms of clause 6(3), a
person is guilty of an offence, if he or she is found in possession of any software or
hardware tool in regard to which there is a reasonable suspicion that such software or
hardware tool is possessed for the purposes of contravening clauses 3(1)(a) or (2)(a),
4(1), 5(1), 7(1), 8(1), 10(1), 11(1), 12(1) or (2) or 13(1) , and if he or she is unable to
give a satisfactory account of such possession.
Clause 6(5) defines "hardware or software tools" as any data, electronic, mechanical
or other instrument, device, equipment, or apparatus, which is used or can be used,
whether by itself or in combination with any other data, instrument, device, equipment or
apparatus, in order to—
* acquire, make available or to provide personal data or financial data as
contemplated in clause 3(1)(a) or (c), or (2)(a) or (c);
* access as contemplated in clause 4(3);
* intercept data as contemplated in clause 5(3);
* interfere with data as contemplated in clause 7(3);
* interfere with a computer device, computer network, database, critical database,
electronic communications network or National Critical Information Infrastructure
as contemplated in clause 8(3); or
* acquire, modify, provide, make available, copy or clone a password, access code
or similar data and devices as defined in clause 10(4).
9
In terms of clause 7(1), the interference with data or critical data is criminalised. In
terms of clause 7(3) “Interference with data” means to—
* alter data;
* hinder, block, impede, interrupt or impair the processing of, functioning of, access
to, the confidentiality of, the integrity of, or the availability of data; or
* make vulnerable, suppress, corrupt, damage, delete or deteriorate data.
In terms of clause 8(1) of the Bill, the interference with the lawful use of a computer
device, a computer network, a database, a critical database, an electronic
communications network, or a National Critical Information Infrastructure, is
criminalised. In terms of clause 8(3), the ―interference with a computer device,
computer network, database, critical database, electronic communications
network or National Critical Information Infrastructure‖ is defined as to mean to
hinder, block, impede, interrupt, alter or impair the functioning of, access to, the
confidentiality of, the integrity of, or the availability of a computer device, computer
network, database, critical database, electronic communications network or National
Critical Information Infrastructure.
In terms of clause 9(1) of the Bill, the assembling, obtaining, selling, purchasing,
possession, making available, advertising or using malware for the purposes of causing
damage to data, a computer device, a computer network, a database, a critical
database, an electronic communications network or a National Critical Information
Infrastructure, are criminalised. In terms of clause 9(2), a person is guilty of an offence,
if he or she is found in possession of malware in regard to which there is a reasonable
suspicion that such malware is possessed for the purposes of intentionally and
unlawfully causing damage to data, a computer device, a computer network, a
database, a critical database, an electronic communications network or a National
Critical Information Infrastructure, and the person is unable to give a satisfactory
account of such possession. Clause 9(4) defines "malware" as to mean means any
data, electronic, mechanical or other instrument, device, equipment, or apparatus that is
designed specifically to—
* create a vulnerability in respect of;
* modify or impair;
* compromise the confidentiality, integrity or availability of; or
* interfere with the ordinary functioning or usage of,
data, a computer device, a computer network, a database, a critical database, an
electronic communications network, or a National Critical Information Infrastructure.
Passwords access codes or similar data or devices can be obtained, for example, via
illegal access to computer devices and databases, the use of phishing or hardware and
software tools, or through illegal acquisition, such as dumpster diving, social
engineering, the buying of credit card numbers or bank authentication information of
another person or theft.
The illicit obtaining and using of credit card numbers and electronic banking information
of a person and the subsequent use of this information are everyday examples which
clause 9, inter alia, aims to address. Clause 10(1) of the Bill criminalises the unlawful
acquiring, possession, provision to another or use of access codes, passwords or
similar data or devices for purposes of contravening clauses 3(1)(a) or (c), 3(2)(a) or (c),
4(1), 5(1), 7(1), 8(1), 11(1), 12(1) or (2) or 13(1) of the Bill. In terms of clause 10(2), a
person is guilty of an offence, if he or she is found in possession of an access code,
password or similar data or devices in regard to which there is a reasonable suspicion
that such access code, password or similar data or devices was acquired, is possessed,
or is to be provided to another person or was used or may be used for purposes of
contravening section 3(1)(a) or (c), 3(2)(a) or (c), 4(1), 5(1), 7(1), 8(1), 11(1), 12(1) or
(2) or 13(1), and who is unable to give a satisfactory account of such possession. In
terms of clause 10(4) of the Bill “passwords, access codes or similar data or
device” means without limitation a secret code or pin, an image, a security token, an
access card or device, a biometric image, a word or a string of characters or numbers,
or a password, used for electronic transactions or user authentication in order to
access, as contemplated in clause 4(3), data, a computer device, a computer network, a
database, a critical database, an electronic communications network, or a National
Critical Information Infrastructure or other device or information.
Service and the law enforcement agencies do not have the capacity to investigate all
cyber related offences but usually prioritize them according to seriousness. The
protected legal interest in crimes against the confidentiality, integrity and availability of
computer data and systems is the integrity of computer information and data itself. In
contrast, criminal provisions on computer-related fraud protect interests in property,
financial assets and the authenticity of data or data messages. Common forms of
computer related fraud are—
* online auction fraud, where the perpetrator offers non-existent goods for sale and
request buyers to pay prior to delivery, or where goods are bought online and
where delivery is requested without the intention to pay; or
* advanced fee fraud, where offenders send out e-mails asking for recipients‘ help
in transferring large amounts of money to third parties and promising them a
percentage, if they agree to process the transfer using their personal accounts.
The offenders then ask them to transfer a small amount to validate their bank
account data, which the offender takes.
Section 87 of the Electronic Communications and Transactions Act, 2002, purports to
create an offence of computer related fraud, which is more akin to forgery. The common
law offence of fraud is used mainly to prosecute offenders in appropriate circumstances.
Clause 11(1), in line with the common law proscription of fraud, creates the offence of
computer related fraud. Clause 11(1) provides that any person who intentionally and
unlawfully, by means of data or a data message, makes a misrepresentation which
causes actual prejudice, or which is potentially prejudicial to another, is guilty of the
offence of computer related fraud. Clause 2(1) defines “computer related” as the use
of data, a computer device, a computer network, a database or an electronic
communications network to commit a prohibited act provided for in clause 11. The
definition of “data” was dealt with under paragraph 3.2.3, above. In terms of clause 1 a
"data message" is defined as data in an intelligible form, in whatever form generated,
sent, received, communicated, presented, tendered or stored by electronic means.
Fraud by means of data will be committed mainly where information is presented to a
computer device such as an ATM machine, whilst a data message will be the medium
used to mislead another person.
perpetrator but which is in the lawful possession of another. The issue of theft of
incorporeals was dealt with as follows in the South African law: In S v Mintoor 1996 1
SACR 514 (C), the court decided that electricity cannot be stolen. In S v Harper and
Another 1981 (2) SA 638 (D), it was held that shares (as an incorporeal) as opposed to
share certificates are capable of being stolen. In Nissan South Africa (Pty) Ltd v Marnitz
NO and Others (Stand 186 Aeroport (Pty) Ltd Intervening) 2005 (1) SA 441 (SCA) at
paragraphs 24 and 25 it was held that, as a result of the fact that ownership in specific
coins no longer exists where resort is made to the modern system of banking and
paying by cheque or kindred processes, money is capable of being stolen even where it
is not corporeal cash but is represented by a credit entry in books of an account. In S v
Ndebele and Others 2012 (1) SACR 245 (GSJ) at 253 to 257, it was held that
incorporeals in the form of electricity credits amount to theft. The courts have not yet
developed the offence to include theft of other incorporeals other than money in the
form of credits. However, the following examples illustrate the need to criminalise the
appropriation of incorporeals:
(a) A hacker accesses a database of a bank where he or she downloads credit card
numbers of customers of the bank which he or she subsequently sells over the
Internet.
(b) A person physically breaks into the head offices of a pharmaceutical firm, takes a
portable data storing device and downloads data which contains all the
information about the synthesising of a new drug which cures an incurable
disease which he or she subsequently sells to another pharmaceutical company
for millions of dollars.
(c) A programmer working for a programming company and who is part of a software
development team copies the newly developed computer operating system and
sells it to another company.
(d) A person physically steals the only copy of a DVD which contains all the
information about the development of a super efficient electro-active polymer
which will revolutionise robotic applications which he or she subsequently sells to
a country for millions of dollars.
(e) A hacker accesses the electronic database of the Companies and Intellectual
Property Commission and substitutes his or her name for that of the patent
holder of a patent which he or she later sells.
16
If the common law offence of theft is applied to the above mentioned examples, the
following will result:
* There was no appropriation of property, in examples (a) to (c) in the sense that
the owners of the data were deprived of the data or property. The data and
property are still in the possession of the owners.
* One cannot steal incorporeal things such as data. The data in examples (a) to
(c), which are extremely valuable, are not recognised as capable of being stolen.
* In example (d), the person committing the offence will probably be prosecuted for
the theft of a DVD worth R5, 00.
* In example (e), although the hacker can be prosecuted for fraud and forgery, he
or she has in fact stolen a patent.
Theft of immovable property is not recognised in the South African Law, mainly
―because immovables cannot be carried away‖ according to a Roman-Dutch law
principle. In cyberspace it is possible to assign new ownership to immovable property,
for instance, a hacker accesses the electronic database of the deeds office and
substitutes his or her name for that of the owner of a farm and who soon afterwards dies
intestate.
In terms of section 1 of the General Law Amendment Act, 1956 (Act No. 50 of 1956),
the unlawful appropriation of the use of another's property is criminalised. A requirement
for this offence is the physical removal of the property from the control of the owner or
person competent to consent to such removal. However, in cyberspace it is not
necessary to physically remove property and thereby use it without the consent of the
owner. For example a computer, server or database within a financial or a state
institution can be taken over by a person with the intent to use it for his or her purposes
without the consent of the owner or any other person competent to give such consent.
Although such conduct may, inter alia, be prosecuted as unlawful access, unlawful
interference with data or unlawful interference with a database or electronic
communications network, there is no reason for not acknowledging a similar offence as
that created by section 1 of the General Law Amendment Act, 1956, in respect of
instances where electronic communications infrastructures are unlawfully and without
the consent of the owner or legal user used by unauthorised third parties to the
detriment of the owners or parties, who have an interest in such resources or property
17
Clause 13(3) defines ―property‖ as money, credit, any information which can be used
to facilitate a financial transaction, or any movable, immovable, corporeal or incorporeal
thing which has a commercial value. For purposes of this definitions registered patents
as defined in the Patents Act, 1978 (Act No. 57 of 1978), any copyright works as
defined in the Copyright Act, 1978 (Act No. 98 of 1978), or plant breeders rights or
designs as defined in the Designs Act, 1995 (Act No. 195 of 1993), or trademarks as
defined in the Trademark Act, 1993 (Act 194 of 1993), are excluded from the definition
of property. The reason for this exclusion is that the existing legislation in this regard
already provides adequate protection against infringements of this nature. However, if
such property is appropriated before it is, inter alia, copyrighted it will amount to
computer related appropriation. ―Right in property‖ is defined in clause 1 as any rights,
privileges, claims and securities in property and any interest therein and all proceeds
thereof and and includes any of the foregoing involving any registered patents as
defined in the Patents Act, 1978 (Act No. 57 of 1978), any copyright works as defined in
18
the Copyright Act, 1978 (Act No. 98 of 1978), or plant breeders rights or designs as
defined in the Designs Act, 1995 (Act No. 195 of 1993), or trademarks as defined in the
Trademark Act, 1993 (Act 194 of 1993).
interception of data, tampering with data, use or distribution of certain devices and
denial-of-service attacks to acquire a proprietary advantage by undertaking to cease or
desist from such action, or by undertaking to restore any damage caused as a result of
those actions as extortion.
Computer-related extortion is dealt with in terms of clause 14 of the Bill, which
broadens the concept of extortion substantially as provided for in section 87 of the
Electronic Communications and Transactions Act, 2002. In terms of clause 14(1) any
person who intentionally and unlawfully—
* threatens to commit any offence under the Bill; or
* commits any offence under the Bill,
for the purposes of obtaining any advantage from another person, is guilty of the
offence of computer related extortion.
In terms of clause 2(1) of the Bill ―computer related‖ is defined as the use of data, a
computer device, a computer network, a database or an electronic communications
network to commit the offence in question.
(ii) causes serious risk to the health or safety of the public or any segment of
the public;
(iii) causes the destruction of or substantial damage to critical data, a critical
database, an electronic communications network or a National Critical
Information Infrastructure, whether public or private;
(iv) is designed or calculated to cause serious interference with or serious
disruption of an essential service, critical data, a critical database, an
electronic communications network or a National Critical Information
Infrastructure;
(v) causes any major economic loss or extensive destabilisation of an
economic system or substantial devastation of the national economy of a
country; or
(vi) creates a serious public emergency situation or a general insurrection in
the Republic,
irrespective whether the harm contemplated in paragraphs (a) (i) to (vi) is or may
be suffered in or outside the Republic; and
(b) which is intended, or by its nature and context, can reasonably be regarded as
being intended, in whole or in part, directly or indirectly, to—
(i) threaten the unity and territorial integrity of the Republic;
(ii) intimidate, or to induce or cause feelings of insecurity among members of
the public, or a segment of the public, with regard to its security, including
its economic security, or to induce, cause or spread feelings of terror, fear
or panic in a civilian population; or
(iii) unduly compel, intimidate, force, coerce, induce or cause a person, a
government, the general public or a segment of the public, or a domestic
or an international organisation or body or intergovernmental organisation
or body, to do or to abstain or refrain from doing any act, or to adopt or
abandon a particular standpoint, or to act in accordance with certain
principles,
whether the public or the person, government, body, or organisation or institution
referred to in subparagraphs (ii) or (iii), as the case may be, is inside or outside
the Republic.
22
Clause 15(1) of the Bill aims to criminalise direct computer-related terrorist activities by
providing that any person who, intentionally and unlawfully, engages in a computer-
related terrorist activity is guilty of the offence of computer-related terrorism. Clauses
15(2) and (3) create the offences of association with a computer-related terrorist activity
and facilitation of a computer-related terrorist activity, respectively. These offences aim
to criminalise conduct which does not directly amount to a terrorist attack, but which
supports or aids terrorist activities.
The offence associated with a terrorist activity, as contemplated in clause 15(2),
consists of acts by a person which will, or is likely to, enhance the ability of any person,
entity or organisation to engage in a computer-related terrorist activity, including—
* providing or offering to provide a skill or expertise;
* entering or remaining in any country; or
* making himself or herself available,
for the benefit of, at the direction of, or in association with any person, entity or
organisation engaging in a computer-related terrorist activity, and which the person
knows or ought reasonably to have known or suspected, that such act was done for the
purpose of enhancing the ability of such person, entity or organisation to engage in a
computer-related terrorist activity.
The offence of facilitating a computer-related terrorist activity, as contemplated in
clause 15(3), entails—
* the provision or offering to provide any data, an interception device, malware, a
password, access code or similar data, a computer device, computer network, a
database, an electronic communications network or any other device or
equipment or any part thereof to a person for use by or for the benefit of a
person, entity or organisation;
* the soliciting of support for or giving of support to a person, entity or organisation;
* providing, receiving or participating in training or instruction, or recruiting a
person, entity or an organisation to receive training or instruction;
* the recruiting of any person, entity or organisation; or
* the possession, receiving or making available data, an interception device,
malware, a password, access code or similar data or a computer device,
computer network, a database an electronic communications network or any
other device or equipment or any part thereof,
23
another person to perform a prohibited act contemplated in clause 3(1) or (3), in sofar
as it relates to the use of personal information, 4(1), 5(1), 6(1) or (2), 7(1), 8(1), 9(1) or
10(1), in order to gain access to, as contemplated in clause 4(3) or intercept data, as
contemplated in clause 5(3) in possession of the State, classified as secret. Clause
16(6)(b) criminalises the intentional and unlawful possession, communication,
delivering, making available or receiving of data in possession of the State, classified as
secret. Clause 16(7)(a) criminalises the intentional and unlawful performing or
authorising, procuring or allowing another person to perform a prohibited act
contemplated in clause clause 3(1) or (3), in sofar as it relates to the use of personal
information, 4(1), 5(1), 6(1) or (2), 7(1), 8(1), 9(1) or 10(1), in order to gain access to,
as contemplated in clause 4(3), or intercept data, as contemplated in clause 5(3), in
possession of the State, classified as top secret. Clause 16(7)(b) criminalises the
intentional and unlawful possession, communication, delivering, making available or
receiving of data in possession of the State, classified as top secret. Clause 16(8) of the
Bill defines ―terrorist activity‖, for purposes of clause 16, as a ―computer related
terrorist activity‖ contemplated in section 16(1) of the Act and a ―terrorist activity‖
contemplated in the Protection of Constitutional Democracy against Terrorist and
Related Activities Act, 2004 (Act 33 of 2004).
placement of large amounts of cash, the use of the Internet might perhaps not offer that
many tangible advantages. However, the Internet is especially useful for offenders in
the layering phase. In this context the investigation of money-laundering is especially
difficult when money-launderers use online casinos and virtual currencies. Unlike a real
casino, large financial investments are not needed to establish online casinos. In
addition, regulations relating to online and offline casinos often differ between countries.
Tracing money transfers and proving that funds are not prize winnings, but have instead
been laundered, is only possible if casinos keep records and provide them to law
enforcement agencies. Current legal regulation of Internet-based financial services is
not as stringent as traditional financial regulation. Apart from gaps in legislation,
difficulties arise from –
* accurate customer verification which may be compromised in that the financial
service provider and customer never meet and it is difficult to apply traditional
customer verification procedures;
* the involvement of providers in various countries with different regulatory
provisions applicable to online transfers; and
* instances where peer-to-peer (person-to-person) transfers are allowed.
The use of virtual currencies is similarly problematic in that users may be able to open
accounts online, often without registration. Some providers even enable direct peer-to-
peer transfer or cash withdrawals. Account holders may also use inaccurate information
during registration to mask their identities. Clause 19 of the Bill supplements the
provisions of the Prevention of Organised Crime Act, 1998 (Act No. 121 of 1998) and
the Financial Intelligence Centre Act, 2001, in so far as it deals with money laundering.
In addition to money laundering, the Internet can further be used as a medium to make
payments in order to facilitate a wide array of unlawful activities, inter alia, drug
transactions, the buying of stolen credit card numbers, payments made to a criminal to
commit an offence, the buying of contraband, the buying of child pornography, etcetera.
Clause 19(1) criminalises the intentional participating in, processing of, or facilitating of
a financial transaction through a computer network or an electronic communications
network—
* with the intention of promoting an unlawful activity; or
* which involves the proceeds of any unlawful activity.
28
Clause 19(3) of the Bill defines ―unlawful activity‖ as any conduct which contravenes
any law of the Republic.
when copyright is infringed and sections 24 and 25 deal with the remedies for an
infringement of copyright. Section 27 of the Act provide for penalties for the infringement
of copyright. Clause 20 of the Bill aims to supplement the Copyright Act, 1978, by
criminalising the infringement of copyright through the use of the Internet and more
specifically peer-to-peer file-sharing. Clause 20(1) of the Bill provides that any person
who intentionally and unlawfully, at a time when copyright exists in any work, without the
authority of the owner of the copyright, by means of a computer network or an electronic
communications network sells, offers for download, distributes or otherwise makes
available, any work, which the person knows is subject to copyright and that his or her
actions will prejudicially affect the owner of the copyright, is guilty of an offence. Clause
20(3) of the Bill defines "work" to mean any literary work, musical work, artistic work,
cinematographic film, sound recording, broadcast, programme-carrying signal,
published edition or computer program, which is eligible for copyright in terms of
section 2 of the Copyrights Act, 1978, or similar legislation of any State designated by
the Minister by notice in the Gazette.
A position of trust is not normally given to individuals unless they have unblemished
integrity and an offence committed by persons in a position of trust may be seen as a
betrayal of those very characteristics. Society operates in certain spheres largely on the
basis of trust and one of the burdens of a position of trust is an undertaking of
incorruptibility. The individual who puts himself or herself forward as trustworthy is
trusted by others and if he or she takes advantage of his or her power for his or her own
personal gain it can be said to offend in two ways, namely not only does he or she
commit the crime in question, but in addition he or she breaches the trust placed in him
or her by society and by the victims of the particular offence. According to various
judgments of the High court it is an aggravating circumstance if a person, who is in a
31
position of trust, to abuse this position by committing an offence. Persons who are
responsible for the processing of personal information or financial information or who
are in charge of, in control of, or have access to data, a computer device, a computer
network, a database, a critical database, an electronic communications network, or a
National Critical Information Infrastructure as part of their daily duties are persons in a
position of trust. To date, various serious cybercrimes have been committed in the
Republic by persons in a position of trust, either by themselves or in collusion with or
with the assistance of other persons. Cybercrimes committed by persons in trust is a
serious concern to both the private and public sector. Persons in trust may have
unrestricted and unlimited access to data, information, access codes or computer
systems of an institution. The reasons for these persons committing these offences and
the kind of offences which commit, vary. Crimes by persons in trust may be committed
for purposes of self-enrichment, as a vendetta against their employer, or as part of an
organised criminal syndicate, among others. In terms of clause 23(2) of the Bill a court
which imposes any sentence in terms of clause 3, 4, 5, 7, 8 or 10 of the Bill must,
without excluding other relevant factors, consider as an aggravating factor the fact that
the offence was committed by a person, or with the collusion or assistance of that
person, who as part of his or her duties, functions or lawful authority—
(a) is responsible for the processing of personal information or financial information,
which personal information or financial information was involved in any offence
provided for in clause 3;
(b) is in charge of, in control of, or has access to data, a computer device, a computer
network, a database, a critical database, an electronic communications network, or
a National Critical Information Infrastructure or any part thereof which was involved
in any offence provided for in clause 4, 5, 7 and 8; or
(c) is the holder of a password, access code or similar data or device which was used
to commit any offence provided for in clause 10.
In terms of clause 23(3), a court must, unless substantial and compelling circumstances
exist which justify the imposition of another sentence as prescribed in paragraphs (a) or
(b) of clause 23(3), impose, with or without a fine, in the case of—
(a) a first contravention of clause 3, 4, 5, 7, 8 or 10, a period of direct imprisonment
of no less than half of the period of imprisonment prescribed by the clause which
is contravened; and
32
3.3 Jurisdiction
such a country has the right to exercise jurisdiction over its nationals, wherever
they are and whatever they do.
* The passive personality theory: This theory is concerned with the nationality of the
victim and the courts of a country, to which the victim belongs, assume jurisdiction.
* The protective theory: A country assumes jurisdiction if its national or international
interest are adversely affected.
* Universality theory: This theory is based on the international character of offences
and allows every country to assume jurisdiction over offences, even if those
offences have no direct effect on a specific country. The requirements for
assuming jurisdiction in terms of this theory are, firstly, that the State assuming
jurisdiction must have the perpetrator in custody, and secondly‚ the offensive
conduct must adversely affect the international community.
Countries, in general, deal with cyber jurisdiction issues by broadening as much as
possible the notion of jurisdiction in accordance with the first four jurisdiction theories to
investigate and prosecute cybercrime effectively. Clause 25 of the Bill follows suit and
extends the traditional concept of criminal jurisdiction to accommodate cybercrime.
Clause 25 of the Bill provides as follows:
(a) A court in the Republic trying an offence in terms of the Bill has jurisdiction
where—
* the offence was committed in the Republic;
* any act of preparation towards the offence or any part of the offence was
committed in the Republic, or where any result of the offence has had an
effect in the Republic;
* the offence was committed in the Republic or outside the Republic by a
South African citizen or a person with permanent residence in the Republic
or by a person carrying on business in the Republic; or
* the offence was committed on board any ship or aircraft registered in the
Republic or on a voyage or flight to or from the Republic at the time that
the offence was committed.
(b) If the act alleged to constitute an offence under the Bill occurred outside the
Republic, a court of the Republic, regardless of whether or not the act constitutes
an offence at the place of its commission, has jurisdiction in respect of that
offence if the person to be charged—
34
3.4 Powers to investigate, search and gain access to or seize and international
cooperation
Chapter 2 of the Criminal Procedure Act, 1977 (Act No. 51 of 1977), in general, sets out
the powers of law enforcement agencies in the investigation of criminal offences.
Although an ―article‖ as intended in section 20 of the Criminal Procedure Act, will
include anything which is involved in or which may afford evidence of the commission of
an offence, Chapter 2 is object based and does not readily lend itself to the investigation
of cybercrime. In so far as it relates to investigations of cybercrime, the Criminal
Procedure Act, 1977, is supplemented by the Regulation of Interception of
Communications and Provision of Communication-related Information Act, 2002 (the
RICA). The RICA provides, inter alia, for the obligations of electronic communications
service providers to record and store certain information in respect of customers and
communications of customers, the interception of communications, the provision of
communication-related information and obligation on decryption key holders. It must be
mentioned that there is currently no obligations on Internet service providers to store
any communication-related information. Cumulatively viewed these two Acts do not
provide adequate measures for the investigation of cybercrime. Chapter 4 of the Bill
36
aims to rectify this position and to bring the law of the day in line with the international
position regarding the investigation of cybercrime.
3.4.2 Clause 26 contains definitions which are relevant to the interpretation of Chapter
4 of the Bill. In terms of clause 26—
(a) ―access‖ is defined as making use of, gaining entry to, viewing, displaying,
retrieving, copying data, or otherwise making use of a computer device, a
computer network, a database, a critical database, an electronic communications
network or a National Critical Information Infrastructure or their accessories or
components or any part thereof;
(b) ―article‖ is defined as any data, a computer device, a computer network, a
database, a critical database, an electronic communications network or a
National Critical Information Infrastructure or any part thereof or any other
information, instrument, device or equipment which—
* is concerned with or is, on reasonable grounds, believed to be concerned
in the commission or suspected commission;
* may afford evidence of the commission or suspected commission; or
* is intended to be used or is, on reasonable grounds, believed to be
intended to be used in the commission,
of an offence in terms of the Bill or any other offence which may be committed by
means of or facilitated through the use of an article, whether within the Republic
or elsewhere.
(c) ―investigator‖ is defined as an appropriately qualified, fit and proper person, who
is not a member of a law enforcement agency, and who is appointed by the
National Commissioner or the Director-General: State Security, as the case may
be, due to his or her expertise to, subject to the control and directions of a
member of a law enforcement agency who accompanies him or her, assist a law
enforcement agency in an investigation in terms of the Bill;
(d) "designated judge" is defined as the designated judge as defined in section 1 of
the Regulation of Interception of Communications and Provision of
Communication-related Information Act, 2002 (Act No. 70 of 2002);
(e) ―law enforcement agency‖ is defined as —
37
3.4.3 Various other laws contain provisions which may be used to investigate aspects
relating to cybercrime, see in this regard, inter alia, sections 82 and 83 of the Electronic
Communications and Transactions Act, 2002, the RICA, section 11 of the Intelligence
Services Act, 2002 (Act 65 of 2002), Chapter 2 of the Criminal Procedure Act, 1977.
The purpose of Chapter 4 is to establish additional procedures which cater specifically
for the investigation of cybercrime. In terms of clause 27 the provisions in Chapter 4 of
the Bill apply in addition to Chapter 2 of the Criminal Procedure Act, 1977, or any other
applicable law that regulates the search and seizure of articles connected with offences.
Clause 27 further provides that Chapter 4 also applies in addition to Chapter 2 of the
International Co-operation in Criminal Matters Act, 1996 (Act 75 of 1996), which
38
regulates requests to and from foreign States to provide evidence in criminal matters.
Clause 28 of the Bill provides that a member of a law enforcement agency or an
investigator accompanied by a member of a law enforcement agency may, in
accordance with the provisions of this Chapter, access or seize any article, whether
within the Republic or elsewhere.
3.4.5 The warrant requirement in criminal investigations is a tried and tested method to
protect individuals against the power of the State, ensuring that the police cannot invade
private homes or private communications upon a whim, or to terrorise. Open democratic
societies throughout the world have fashioned the warrant process as the mechanism to
balance the public interest in combating crime with the individual's constitutional rights.
The warrant process guarantees that the State must justify and support intrusions upon
individuals' rights under oath before a neutral judicial officer prior to the intrusion. It
furthermore governs the time, place and scope of the search, limiting the intrusion of
rights, guiding the State in the conduct of the inspection and informing the subject of the
legality and limits of the search. In similar trend to section 21 of the Criminal Procedure
Act, 1977, clause 29 of the Bill, provides that an article can only be accessed or seized
in terms of a search warrant. Clause 29, however, differs in various aspects from
section 21 of the Criminal Procedure Act, in order to provide for the search and access
or seizure of evidence relevant to cybercrime. Clause 29(1) provides that an article
referred to in clause 28 can only be accessed or seized by virtue of a search warrant
issued—
* by a magistrate or judge of the High Court, on written application by a member of
a law enforcement agency, if it appears to the magistrate or judge, from
information on oath or by way of affirmation that that there are reasonable
grounds for believing that an article is—
• within his or her area of jurisdiction; or
• being used or is involved in the commission of an offence within his or her
area of jurisdiction, or within the Republic, if it is unsure within which area
of jurisdiction the article is being used or is involved in the commission of
an offence; or
* by a magistrate or judge presiding at criminal proceedings, if it appears to such
magistrate or judge that an article is required in evidence at such proceedings.
39
Clause 29(2) provides that a search warrant issued by a magistrate or judge must
require a member of a law enforcement agency or an investigator who is accompanied
by a member of a law enforcement agency to access or seize the article in question
and, to that end, authorizes the member of a law enforcement agency or an investigator
who is accompanied by a member of the law enforcement agency to—
* search any person identified in the warrant;
* enter and search any container, premises, vehicle, facility, ship or aircraft
identified in the warrant;
* search any person who is believed, on reasonable grounds, to be able to furnish
any information of material importance concerning the matter under investigation
and who is found near such a container, on or at such premises, vehicle, facility,
ship or aircraft;
* search any person who is believed, on reasonable grounds, to be able to furnish
any information of material importance concerning the matter under investigation
and who is nearby, who uses or who is in possession of or in direct control of any
data, a computer device, a computer network, a database, a critical database, an
electronic communications network or a National Critical Information
Infrastructure identified in the warrant to the extent as is set out in the warrant;
* access and search any data, a computer device, a computer network, a
database, a critical database, an electronic communications network or a
National Critical Information Infrastructure identified in the warrant to the extent
as is set out in the warrant;
* obtain and use any instrument, device, equipment, password, decryption key,
data or other information that is believed, on reasonable grounds, to be
necessary to access or use any part of any data, a computer device, a computer
network, a database, a critical database, an electronic communications network
or a National Critical Information Infrastructure identified in the warrant to the
extent as is set out in the warrant;
* copy any data or other information to the extent as is set out in the warrant; or
* seize an article identified in the warrant to the extent as is set out in the warrant.
40
Clause 29(3) provides that whenever a search warrant, issued under clause 29(1),
authorises an investigator who is accompanied by a member of the law enforcement
agency to search any person, the search of such a person must, subject to clause
35(2), be carried out by a member of the law enforcement agency accompanying the
investigator.
In terms of clause 29(4), a search warrant may be executed at any time, unless the
person issuing the warrant in writing specifies otherwise.
3.4.6 In some instances it is necessary to search and gain access to or seize items
immediately or urgently. The procedures for obtaining a search warrant under clause
29(1)(a) on information on oath will, in such circumstances, defeat the objects of the
search. This is especially applicable to crimes committed in cyber space, where a real
possibility exists that evidence may be lost. In many instances highly relevant
information is often deleted automatically after a short period of time. The reason for this
automatic deletion is because after the end of a process (e.g. the sending out of an e-
mail, accessing the Internet or downloading child pornography), the traffic data that has
been generated during the process and that ensures that the process could be carried
out is no longer needed. There is also the possibility that a perpetrator of cybercrime
may cover his or her tracks by deleting or altering highly incriminating data. Although
section 22 of the Criminal Procedure Act, 1977, provides that a member of a law
enforcement agency may, without a search warrant, conduct a search it is highly
undesirable to afford such powers to the law enforcement agencies where databases of
banks, electronic communications service providers or National Critical Information
Infrastructures may be involved.
41
Clause 30 of the Bill aims to balance the interests of natural and legal persons to
ensure the privacy and confidentiality of information in their possession and control with
the interests of the law enforcement agencies to search for and access or seize an
article involved in a cybercrime. To this end clause 30 provides for the oral application
for, or for the amendment of search warrants contemplated in clause 29(1)(a), by a
specifically designated member of a law enforcement agency, if it is not reasonably
practicable, having regard to the urgency of the case or the existence of exceptional
circumstances, to make a written application. In terms of this clause:
(a) An oral application must indicate the particulars of the urgency of the case or the
other exceptional circumstances which, in the opinion of the member of the law
enforcement agency, justify the making of an oral application and comply with
any supplementary directives relating to oral applications issued by the Judges
President of the respective Divisions of the High Court.
(b) A magistrate or judge of the High court may, upon an oral application made to
him or her, issue the warrant applied if the magistrate or judge of the High Court
concerned is satisfied, on the facts alleged in the oral application concerned,
that—
(i) there are reasonable grounds to believe that a warrant applied for could be
issued;
(ii) a warrant is necessary immediately in order to access or seize or search
for an article within his or her area of jurisdiction or an article which is
being used or is involved in the commission of an offence—
* within his or her area of jurisdiction; or
* within the Republic, if it is unsure within which area of jurisdiction
the article is being used or is involved in the commission of an
offence; and
* it is not reasonably practicable, having regard to the urgency of the
case or the existence of exceptional circumstances, to make a
written application for the issuing of the warrant applied for; and
(iii) on condition that the member of the law enforcement agency concerned
submits a written application to the magistrate or judge of the High Court
concerned within 48 hours after the issuing of the oral warrant.
42
(c) A warrant issued following an oral application must be in writing and must be
transmitted electronically to the member of the law enforcement agency.
(d) A magistrate or judge of the High Court who issued a warrant under this clause
or, if he or she is not available, any other magistrate or judge of the High Court
must, upon receipt of a written application submitted to him or her in terms of
paragraph (b)(iii) reconsider that application whereupon he or she may confirm,
amend or cancel that warrant.
Clause 31 of the Bill, however, provides that a member of a law enforcement agency or
an investigator who is accompanied by a member of a law enforcement agency may,
without a search warrant, execute the powers referred to in section 29(2) of the Act,
subject to any other law if the person who has the lawfully authority to consent to the—
* search for and access to or seizure of the article in question; or
* search of a container, premises, vehicle, facility, ship, aircraft, data, computer
device, computer network, database, critical database, electronic
communications network or a National Critical Information Infrastructure,
consents, in writing, to such search and access to or seizure of the article in question.
3.4.7 Clause 32, similar to section 23 of the Criminal Procedure Act, 1977, provides
that, on the arrest of any person on suspicion that he or she has committed an offence
under the Bill or any other offence, a member of a law enforcement agency may search
the arrested person and seize any article referred to in clause 28 which is in the
possession of, in the custody of or under the control of the arrested person. This clause
further authorises a member of a law enforcement agency or or an investigator who is
accompanied by a member of a law enforcement agency to access and search the
seized article. The definition of ―article‖ is relevant to the interpretation of this clause
since it restricts the ambit thereof which may otherwise have unforeseen consequences.
An article can only be seized and can only be accessed if it qualifies as an article, in
that it—
* is concerned in or is, on reasonable grounds, believed to be concerned in the
commission or suspected commission;
* may afford evidence of the commission or suspected commission; or
43
3.4.8 Electronic communications networks and are relatively complicated and may
consist of various servers and associated infrastructure which makes it extremely
difficult for law enforcement agencies to locate and access or seize the required
evidence. Electronic devices which store and transmit data are protected by passwords,
access devices or encryption from unauthorised access. Data is, in many instances,
encrypted which make intelligible access to data virtually impossible. In most instances
the person in control of an electronic communications network or a database can assist
the law enforcement agencies to locate as well as access or seize the required
evidence. In terms of clause 33 of the Bill an electronic communications service
provider or person, other than the person who is suspected of having committed an
offence under the Bill, who is in control of any container, premises, vehicle, facility, ship,
aircraft, data, computer device, computer network, database, critical database,
electronic communications network or a National Critical Information Infrastructure or
any other information, instrument, device or equipment that is subject to a search
authorised in terms of clause 29(1) or 30(3) or which takes place in terms of clause 31
must, if required, provide—
* technical assistance; and
* such other assistance as may be necessary,
to the member of the law enforcement agency or investigator who is accompanied by a
member of a law enforcement agency in order to—
* access, or use any data, computer device, computer network, database, critical
database, electronic communications network or a National Critical Information
Infrastructure or any other information, instrument, device or equipment;
* copy data or other information;
* obtain an intelligible output of data; or
* remove a computer device, any part of a computer network, a database, a critical
database, an electronic communications network or a National Critical
Information Infrastructure.
44
3.4.9 Clause 34 of the Bill contains the following provisions to ensure that law
enforcement agencies and investigators who are accompanied by members of a law
enforcement agency are not hindered in an investigation:
* Clause 34(1) of the Bill provides that any person who obstructs or hinders a
member of a law enforcement agency or an investigator who is accompanied by
a member of a law enforcement agency in the exercise of his or her powers or
the performing of his or her duties or functions in terms of Chapter 4 or who
refuses or fails to comply with a search warrant issued in terms of clause section
29(1), section 30(3) or which takes place in terms of section 31, is guilty of an
offence.
* Clause 34(2) provides that a member of a law enforcement agency, or a member
of a law enforcement agency who accompanies an investigator who may lawfully
execute any power conferred upon him or her in terms of clause 29(2) of the Bill,
may use such force as may be reasonably necessary, proportional to all the
circumstances relating to the execution of such powers.
Similar to the Criminal Procedure Act, 1977, and various other laws which authorise the
use of force to enter premises, this clause further provides that no member of a law
enforcement agency may enter upon or search any premises, vehicle, ship or aircraft
unless he or she has audibly demanded admission to the premises, vehicle, ship or
aircraft and has notified the purpose of his or her entry. However, due to the fact that
electronic evidence may easily be altered or destroyed, provision is further made that a
member of a law enforcement agency may enter premises without demanding
admission, if he or she is on reasonable grounds of the opinion that an article which is
the subject of the search may be destroyed, disposed of or tampered with.
3.4.10 In a democratic society it is a requirement that the powers conferred upon the
State to investigate crime should be tempered in order to ensure that an unfettered
discretion is not given to law enforcement agencies in the execution of their powers.
This is done by introducing additional conditions that balance these powers. In this
regard these powers are further regulated by clauses 35 and 36.
Clause 35 of the Bill provides that the powers conferred upon member of a law
enforcement agency or an investigator who is accompanied by a member of a law
45
enforcement agency in terms of clause 29(2) of the Bill, must be conducted with strict
regard to decency and order and with due regard to the the rights, responsibilities and
legitimate interests of other persons in proportion to the severity of the offence. This
clause further provides that if a female needs to be physically searched, such search
must be carried out by a female.
Clause 36 of the Bill criminalises the conduct of a member of a law enforcement agency
or an investigator—
* who acts contrary to the authority of a search warrant issued under clause 29(1)
or clause 30(3) of the Bill or the provision of any other law which affords similar
powers to a member of a law enforcement agency or investigator; or
* who, without being authorized thereto under Chapter 4 of the Bill or the provision
of any other law which affords similar powers to a member of a law enforcement
agency or investigator—
- accesses, searches, copies or seizes data, a computer device, any part of
a computer network, a database, a critical database, an electronic
communications network or a National Critical Information Infrastructure or
any other information, instrument, device or equipment;
- obtains any instrument, device, password, decryption key or other
information that is necessary to access or use data, a computer device,
any part of a computer network, a database, a critical database, an
electronic communications network or a National Critical Information
Infrastructure; or
* who obtains and uses any instrument, device, password, decryption key or other
information contemplated in clause 29(2)(f), for other purposes as set out in
warrant, or does not destroy all information if such information will not be
required for purposes of court proceedings or for purposes of an order of court.
The clause further provides that if a member of a law enforcement agency or an
investigator is convicted of an offence in terms of this clause, the court convicting such
a person, may upon application of any person who has suffered damage, or upon the
application of the prosecutor acting on the instructions of that person, award
compensation in respect of such damage, whereupon the provisions of section 300 of
the Criminal Procedure Act, 1977, applies mutatis mutandis with reference to such
award.
46
3.4.11 The impact of an investigation relating to cybercrime is of such a nature that a lot
of specialised manpower is necessary to investigate the offence in question which may
impact on the availability of electronic resources and adversely affect the productivity of
a company or the State. Furthermore, cybercrime investigations, to a greater or lesser
extent, will almost always make inroads on the privacy and other rights of a person.
Clause 37 of the Bill therefore aims to counter these adverse effects by criminalising
the giving of false information on oath or by way of affirmation which results in a search
warrant being issued, or being issued and executed on the basis of such information.
The clause further provides that if a person is convicted of an offence in terms of this
clause, the court convicting such a person, may upon application of any person who has
suffered damage, or upon the application of the prosecutor acting on the instructions of
that person, award compensation in respect of such damage, whereupon the provisions
of section 300 of the Criminal Procedure Act, 1977, applies mutatis mutandis with
reference to such award.
3.4.12 In order to protect the integrity of the investigation process and to ensure that
offenders are not warned in advance of an investigation which may lead to the
tampering with or destruction of evidence, clause 38 of the Bill provides that no person,
investigator, member of a law enforcement agency, electronic communications service
provider or an employee of an electronic communications service provider may disclose
any information which he, she or it obtained in the exercising of his, her or its powers or
the performance of his, her or its duties in terms of the Bill, except—
* to any other person who of necessity requires it for the performance of his or her
functions in terms of the Bill;
* if he or she is a person who of necessity supplies such information in the
performance of his or her functions in terms of the Bill;
* if it is information which is required in terms of any law or as evidence in any
court of law; or
* to any competent authority which requires it for the institution of criminal
proceedings or an investigation with a view to instituting criminal proceedings.
47
3.4.13 User interaction with computer devices produces a wealth of computer generated
digital traces. These digital traces are relevant to the investigation of cybercrime and
can, in some instances, indicate the origin, destination, content of a communication and
underlying service used. Computer data potentially relevant to a criminal act may
include photographs, videos, emails, chat logs and system data. This evidence can be
altered or obliterated easily. Locating relevant information within this data can further be
extremely time-consuming, requiring long periods of availability of data. The
identification of an offender who has committed a cybercrime usually requires an
analysis of data. One of the main difficulties that investigators face is the fact that data
which can be used to identify the cyber-offender or the criminal act is more often than
not available after a short period of time only. Although there are obligations on
electronic communications service providers to record and store certain information in
terms of section 30 of the RICA, no such obligations were imposed on Internet service
providers in terms of section 30(2) of the RICA. Furthermore, obligations imposed on
electronic communications service providers in this regard do not provide for the
preservation of all digital evidence which may be relevant to a cyber offence. In so far
as electronic communications service providers are obliged to intercept, record and
store data, clause 39 of the Bill provides that the provisions of the RICA must be
utilized to obtain obtain this information.
Clause 40 of the Bill provides for an expedited preservation of data mechanism, where
persons or electronic communications service providers are under no obligation to
intercept, record or store information as required by the RICA. This mechanism, in so
far as it relates to traffic data, forms part of most international instruments and various
international laws dealing with cybercrime. This procedure does not only guarantee the
availability of digital evidence but also ensures that it must be retained as is on the
electronic communications network of the electronic communications service provider or
on the database of a person who stores such information in order to ensure the integrity
and availability of the information. Seen from an Internet service provider‘s perspective,
data preservation is a less intensive instrument compared to data retention. Internet
Service Providers do not need to store all data for all users, but instead have to ensure
that specific data is not deleted as soon as they receive a preservation request.
However, the proposed legislative intervention is wider than the international notion of
48
data preservation, in that it applies, in addition to traffic data, also to other forms of data,
for instance information that is stored on a computer device or a database or which may
become available. Clause 40 provides that a specifically designated member of a law
enforcement agency, may if he or she, on reasonable grounds, believes that any person
or electronic communications service provider may be in possession of, or is in control
of data concerned in the commission or intended commission of an offence in the
Republic or an offence substantially similar to an offence recognized in the Republic
committed in a foreign State, issue an expedited preservation of data direction to a
person or electronic communications service provider. The effect of an expedited
preservation of data direction is that the person or electronic communications service
provider must immediately, from the moment of service of the direction, and for a period
of 120 days (which may be extended by a preservation of evidence direction issued by
a judicial officer in terms of clause 42 of the Bill), preserve the current status of data in
order to preserve the integrity of the data. However, no data may be disclosed to a law
enforcement agency on the strength of a preservation of data direction. The clause
further provides that a person or electronic communications service provider to whom
an expedited preservation of data direction is addressed, may in writing apply to a
magistrate in whose area of jurisdiction the person or electronic communications service
provider is situated for an amendment or the cancellation of the direction concerned on
the ground that he, she or it cannot timeously or in a reasonable fashion comply with the
direction.
The Bill provides for separate procedures for the expedited preservation of data and the
expedited disclosure of data. Although the immediate availability of data will enable law
enforcement agencies to respond faster to an alleged cybercrime, the rights of the
concerned individual, most notably the right to privacy should be protected. Prior judicial
authorization for a procedural intervention on the rights of an individual is usually a
prerequisite. Clause 41 of the Bill therefore requires prior judicial authorization before
data can be disclosed. This clause provides that a judicial officer may, on written
application by a law enforcement agency, if it appears to the judicial officer from
information on oath or by way of affirmation that there are reasonable grounds for
believing that a person or electronic communications service provider may be in
possession of data which is relevant to or which may afford evidence of, the
49
* that the Cabinet member responsible for the administration of justice, is informed
of the—
- fact that he or she intends to issue a disclosure of data direction; and
- reasons for such decision.
A disclosure of data direction must—
* direct the person or electronic communications service provider to provide the
data identified in the direction to the extent as is set out in the direction to an
identified member of the law enforcement agency;
* must set out the period within which the data must be provided; and
* may specify conditions or restrictions relating to the provision of data authorised
therein.
The clause further provides that a person or electronic communications service provider
to whom disclosure of data direction is addressed, may in writing apply to the judicial
officer for an amendment or the cancellation of the order concerned on the ground that
he, she or it cannot timeously or in a reasonable fashion comply with the order. Non-
compliance with a disclosure of data direction is criminalized.
3.4.16 Clause 44(1) of the Bill provides that a member of a law enforcement
agency or an investigator may—
* access public available data regardless of where the data is located
geographically;
* access or receive non-public available data, regardless of where the data is
geographically located, if the person who has the lawful authority to disclose the
data, voluntarily, in writing, consents to such accessing of data, or provides the
data to a member of a law enforcement agency or an investigator; or
* access any data, regardless of where the data is located geographically, if such
data is lawfully accessible from, or available to a computer device, a computer
network, a database, a critical database, an electronic communications network
or a National Critical Information Infrastructure which is being accessed in terms
of clause 29, 30, 31 or 32.
52
The first two grounds of access are in line with Article 32 of the European Convention
on Cybercrime. Access to public available data, is defined as data which is without
restriction accessible in the public domain, does not require further elaboration. If
everybody else can access such data so can the law enforcement agencies. On similar
grounds access to non-public available data with the voluntary consent of the person
who has lawful authority to allow access to or to provide data, can be justified.
Since cybercrimes often have an international dimension which, in turn, implies that the
cybercriminal and the victim may be in separate countries, whilst the electronic
resources of a third country may primarily be used to commit the offence in question.
Cybercrime is by no means the first type of crime to demand a global response. Over
the past decades, global action has been required to address challenges such as illicit
drug trafficking, trafficking in persons and transnational organized crime, through the
development of international agreements. Nonetheless, cybercrime presents unique
international cooperation challenges. One of the key demands of investigators in
transnational investigations is the need for immediate reaction of their counterparts in
the country where the offender is located. The European Convention on Cybercrime
(Article 23 and 25) contains the following principles regarding international cooperation
in cybercrime investigations among the members:
* Cooperation in international investigations to the widest extent possible should be
provided;
* this cooperation does not only apply in cybercrime investigations but in any
investigation where evidence in electronic format needs to be collected;
* parties must co-operate with each other on the basis of international instruments
on international co-operation in criminal matters, arrangements agreed to on the
basis of uniform or reciprocal legislation, and domestic laws; and
* fast communication in cybercrime investigations is necessary.
In many instances the country in which the offences are committed may not even be
aware of the conduct of the cyber criminal who may have committed similar offences in
that country or other countries. Within cybercrime investigations carried out on a
national level, links to offences related to another country might be discovered. If law
enforcement agencies, for example, investigate a child pornography case, they might
find information about pedophiles from other countries that have participated in the
53
exchange of child pornography. Article 26 of the European Convention provides for the
law enforcement agencies to inform foreign law enforcement agencies without
jeopardizing their own investigation. In addition to forms of formal international
cooperation, parts of the process of extraterritorial law enforcement investigations may
be undertaken by informal police-to-police communications. Such communications can
be used prior to a formal mutual legal assistance request to a competent authority, or to
facilitate a formal request. In similar vein the Bill provides for a mechanism which may
be used by the South African law enforcement agencies to cooperate with any foreign
law enforcement agency for purposes of investigating cybercrime and offences which
may be committed or facilitated by means of an article. The network of informal bilateral
relationships between law enforcement agencies, INTERPOL, currently serves this
purpose and facilitates informal police-to-police requests. In this regard clause 44(2) of
the Bill provides that a law enforcement agency may, after obtaining the written
approval of the National Director of Public Prosecutions, forward any information
obtained during any investigation to a law enforcement agency of a foreign State when
the law enforcement agency is of the opinion that the disclosure of such information
may—
* assist the foreign State in the initiation or carrying out of investigations regarding
an offence committed within the jurisdiction of a foreign State;
* lead to further cooperation with a foreign State to carry out an investigation
regarding the commission or intended commission of an offence contemplated in
terms of the Bill which was committed within the Republic; or an offence which
was committed in a foreign State.
In terms of clause 44(3), the information may only be forwarded to the foreign State if
the National Director of Public Prosecutions approves it in writing after he or she is
satisfied that the forwarding of information —
* will not affect any pending criminal proceedings or investigations adversely
regarding criminal offences committed within the Republic; and
* is in accordance with any applicable law of the Republic.
Clause 44(4) provides that a law enforcement agency may receive any information from
a foreign State which will—
* assist the law enforcement agency in the initiation or carrying out of
investigations regarding an offence committed within the Republic; or
54
Clause 45 of the Bill provides for the manner in which foreign assistance and
cooperation in cyber related matters must be requested. The clause makes provision for
an ordinary procedure and an expedited procedure for requesting foreign assistance
and cooperation. In terms of clause 45(1), a judicial officer may if it appears from
information on oath or by way of affirmation that there are reasonable grounds for
believing that an article necessary for the investigation and prosecution of an offence
contemplated in the Bill is in the possession of, under the control of or upon any person,
in a container, upon or at any premises, vehicle, ship, aircraft, computer device,
computer network, database or any part of an electronic communications network within
the area of jurisdiction of a foreign State, the judicial officer may issue a direction in the
prescribed form, in which assistance from that foreign State is sought to preserve an
article or to intercept or obtain and provide data, as is stated in the direction. In terms of
clause 45(2), the direction must specify that—
* there are reasonable grounds for believing that an offence contemplated in the
Bill has been committed in the Republic or that it is necessary to determine
whether an offence has been committed;
* an investigation in respect thereof is being conducted; and
* for purposes of the investigation, it is necessary in the interests of justice that the
article be preserved or that data be intercepted or obtained and be provided by a
person or authority in a foreign State.
In terms of clause 45(3), in the case of an ordinary request for assistance, a direction is
sent to the National Director of Public Prosecutions for transmission to—
* the court or tribunal specified in the direction;
* the appropriate authority in the foreign State which is requested to provide
assistance and cooperation; or
* a designated 24/7 contact point in the foreign State which is requested to provide
assistance and cooperation.
In terms of clause 45(4), in a case of urgency, a direction may be transmitted directly to
the court or tribunal, the appropriate government body or designated 24/7 contact point
and the National Director of Public Prosecutions must, as soon as practicable be
notified of that fact and a copy of the direction must be furnished to him or her. In terms
of clause 45(5), the Cabinet member responsible for the administration of justice must
56
be informed of the fact that a direction, as contemplated in clause 44 has been sent to a
court or tribunal or the appropriate authority in the foreign State.
Clause 46 provides for the converse situation contemplated in clause 45, namely,
where the Republic is requested to provide foreign assistance and cooperation. This
clause also makes provision for an ordinary procedure and an expedited procedure for
requesting assistance and cooperation. In terms of clause 46(1), a request by an
authority, court or tribunal exercising jurisdiction in a foreign State for assistance in
preserving, obtaining and providing or intercepting and providing an article in the
Republic for use in such foreign State must be submitted—
* to the 24/7 point of contact established in terms of clause 49 of the Bill, which
must submit it to the National Director of Public Prosecutions or, in case of
urgency, to the designated judge;
* the National Director of Public Prosecutions; or
* in case of urgency, to the designated judge,
for consideration.
In terms of an ordinary application for assistance which is submitted to the National
Director of Public Prosecutions, clause 46(2) provides that he or she must satisfy
himself or herself—
* that proceedings have been instituted in a court or tribunal exercising jurisdiction
in the requesting State or territory; or
* that there are reasonable grounds for believing that an offence has been
committed in the requesting State or territory or that it is necessary to determine
whether an offence has been so committed and that an investigation in respect
thereof is being conducted in the requesting State or territory.
Similar considerations are applicable, in terms of clause 46(3) of the Bill, if an urgent
application serves before the designated judge. In addition this clause requires the
designated judge to obtain the recommendations of the National Director of Public
Prosecutions on the request. In terms of clause 46(4), the National Director of Public
Prosecutions or the designated judge may rely on a certificate purported to be issued by
a competent authority in the State or territory concerned, stating the facts contemplated
in the said subsections. In terms of the general procedure for assistance, clause 46(5)
requires that the National Director of Public Prosecutions must, if he or she approves of
57
the application, submit the request together with his or her recommendations, to the
Cabinet member responsible for the administration of justice, for his or her approval. If
the request is approved by the Minister it must be submitted to the designated judge for
approval. In terms of clause 46(6), the designated judge may, subject to the conditions
set out in clause 46(7), issue any order which he or she deems appropriate to ensure
that the requested article is preserved for a period or obtained and provided or
intercepted and provided. In the case of a urgent request which was submitted directly
to the designated judge. Before the designated judge may issue an order as
contemplated in clause 46(6)(a), the designated judge must inform the Cabinet member
responsible for the administration of justice, in writing, of the fact that he or she intends
to issue an order and the reasons for the decision. In terms of clause 46(8), the order of
the designated judge must be executed by a member of the South African Police
Service who was specifically designated in writing by the National Commissioner to
execute such orders.
Clause 48 provides for the manner in which a foreign State must be informed of the
outcome of a request for assistance and cooperation and also provides for the manner
in which information must be provided to the foreign State. In terms of clause 48(1) of
the Bill, the National Director of Public has the responsibility of informing a foreign State
of the outcome of its request for assistance and cooperation. Clause 48(2) provides that
the data which was obtained or intercepted pursuant to the order of the designated
judge must be provided to the 24/7 Point of Contact, for provision to an authority, court
or tribunal of a foreign State, in an industry standard format which ensures ease of
access to the information and which guarantees the authenticity, integrity and reliability
of the information. The information must be accompanied by the order of the designated
58
judge and an affidavit in the prescribed form by the person or authorised representative
of an electronic communications service provider, verifying the authenticity, integrity and
reliability of the information that is furnished. Clause 48(3) obliges a person or
electronic communications service provider to keep copies of any the information which
is furnished to the 24/7 Point of Contact, in a manner which will ensure the authenticity,
integrity and reliability of the information. Clause 48(4) provides that the information,
together with the copy of the order and affidavit, must be provided to the authority, court
or tribunal exercising jurisdiction in a foreign State who requested the assistance.
Director of the 24/7 Point of Contact. The Director is accountable to the National
Commissioner regarding any matter relevant to, incidental to or which may impact on
the objects and functions of the 24/7 Point of Contact. The clause further provides that
the Director must, in the exercise of his or her powers, the performance of his or her
functions and carrying out of his or her duties, be assisted by –
(a) appropriately qualified members of the South African Police Service;
(b) a member of the National Prosecuting Authority who has particular knowledge
and skills in respect of any aspect dealt with in this Act and who is seconded or
designated to the 24/7 Point of contact to assist the Director; and
(c) persons or entities who are, from time to time, appointed to assist the Director.
Due to the nature of the work involved it is a requirement that a security clearance
should be issued to these persons. The functions of the 24/7 Point of Contact are set
out in clause 49(4), which provides that the 24/7 Point of Contact must operate on a
twenty-four hour, seven-day-a-week basis, in order to ensure the provision of immediate
expedited assistance for the purpose of proceedings or investigations regarding the
commission or intended commission of an offence contemplated in the Bill, which
assistance includes—
* the provision of technical advice and assistance;
* the facilitation or provision of assistance regarding anything which is authorised
under Chapter 4 of the Bill;
* the provision of legal information;
* the identification and location of an article;
* the identification and location of a suspect; and
* cooperation with appropriate authorities of a foreign State.
In terms of clause 49(5), the Cabinet member responsible for policing may, after
consultation with the Cyber Response Committee, make regulations to further regulate
any aspect which is necessary or expedient for the proper implementation of this
provision. In terms of clause 49(6), the Cabinet member responsible for policing must,
at the end of each financial year, submit a report to Chairperson of the Joint Standing
Committee on Intelligence to report on the functions and activities of the 24/7 Point of
Contact.
3.6.3 Clause 52 provides for the establishment of a dedicated structure, namely the
Cyber Security Centre, whose responsibilities are, inter alia—
* to develop measures to deal with cyber security matters impacting on national
security;
* to facilitate the identification of and protection and securing of National Critical
Information Infrastructures; and
* to respond to and to provide coordination and guidance pertaining to cyber
security aspects which may affect the State.
In terms of clause 52(1) of the Bill, the Cabinet member responsible for State security,
must establish and equip, operate and maintain a Cyber Security Centre. Clause 52(3)
provides that the Cabinet member responsible for State security must enter into service
62
level agreements with the head of a department or any entity or institution, in respect of
the provision of services by the Cyber Security Centre. In terms of clause 52(4):
* A person must be appointed as Director of the Cyber Security Centre, subject to
the control and directions of the Cabinet member responsible for State security.
* The Director will, in the exercise of his or her duties, be assisted by members of
the State Security Agency designated to the Cyber Security Centre and other
persons to whom security clearances have been issued and who, from time to
time, are appointed to assist the Director.
* The Director is responsible for the day to day functioning of the Cyber Security
Centre and must regulate the procedure and determine the manner in which the
provisions of this Act must be carried out by Cyber Security Centre and
Government Security Incident Response Teams.
* The Director must co-ordinate the activities of the Cyber Security Centre and
Government Security Incident Response teams with those of the 24/7 Point of
Contact, the National Cybercrime Centre, the Cyber Command, the Cyber
Security Hub and Private Sector Security Incident Response Teams.
* The Director must also, on a quarterly basis, or as the Chairperson of the CRC
requires, submit a written report to the Cabinet member responsible for State
security and the Chairperson of the CRC regarding matters relevant to, incidental
to the functioning of the Cyber Security Centre.
Clause 52(5) provides for the objects and and functions of the Cyber Security Centre
which, inter alia, includes the development of measures to deal with cyber security
matters impacting on national security and to act as a point of contact regarding matters
relating to national intelligence.
3.6.4 Clause 53 envisages that the existing Government Security Incident Response
Teams will continue to exist and that additional Government Security Incident Response
Teams should be established. In terms of clause 53(1), the Cabinet member
responsible for State security must, in consultation with the Cabinet member
responsible for national financial matters, at State expense establish on or more
Government Security Incident Response Teams and equip, operate and maintain the
Government Security Incident Response Teams. In terms of clause 53(3), the Cabinet
member responsible for State security must enter into service level agreements with the
63
head of a department and any entity or institution, in respect of the provision of services
by the Government Security Incident Response Teams. Clause 53(4) requires that the
Director-General: State Security, must appoint a person from the State Security Agency
who, on the grounds of his or her knowledge and experience is a suitable and qualified
person, as head for each Government Security Incident Response Team, who is
subject to the control and directions of the Director: Cyber Security Centre. The head of
a Government Security Incident Response Team will be assisted in his or her daily
functions by members of the State Security Agency designated to the Government
Security Incident Response Team and knowledgeable persons who are, from time to
time, appointed to assist the head. The head must, on a monthly basis, or as the
Director: Cyber Security Centre requires, submit a written report to the Director: Cyber
Security Centre—
* regarding cyber security related threats, and measures implemented to address
such cyber security related threats and shortcomings in addressing such cyber
security related threats;
* any matter relevant to, incidental to or which may impact on the objects and
functions of the Government Security Incident Response Team; and
* any other matter relating to the Bill which the head wishes to or may want to
bring to the attention of the Director: Cyber Security Centre or Cyber Response
Committee.
The objects and functions of a Government Security Incident Response Team are set
out in clause 53(5), which are to—
* develop or acquire and implement measures to deal with cyber security matters
impacting on national intelligence and national security;
* protect and secure National Critical Information Infrastructures;
* implement measures, on the written request of the Director-General: State
Security, to assess and test National Critical Information Infrastructures, including
vulnerability assessments, threat and risk assessment and penetration testing;
* provide a reactive service to the State, which includes responding to alerts and
warnings, handling incidents, vulnerability handling and artifact handling;
* provide a proactive service to the State which includes intrusion alerts,
vulnerability warnings, security advice and other similar announcements and
64
3.6.5 Clause 54 of the Bill provides for the establishment of a National Cybercrime
Centre. The aim of establishing this structure within the South African Police Service is
to ensure that a dedicated structure is created which focuses on cybercrime as opposed
to other forms of crime. In terms of clause 54(1), the Cabinet member responsible for
policing must, in consultation with the Cabinet member responsible for national financial
matters, at State expense establish a National Cybercrime Centre and equip, operate
and maintain the National Cybercrime Centre. Clause 54(3), among others, provides
for—
* the appointment of a member from the Service, who on the grounds of his or her
knowledge and experience, is a suitable and qualified person, as Director of the
National Cybercrime Centre;
* the staffing of the National Cybercrime Centre;
* the powers and duties of the Director, which includes the co-ordination of the
activities of the National Cybercrime Centre with those of the other structures
established in terms of Chapters 5 and 6 of the Bill and the development and
65
3.6.6 In order to protect the interests of the Republic in the event of a cyber-war, a
cyber-warfare capacity has to be built. The Department of Defence has overall
responsibility for the coordination, accountability and implementation of cyber defence
measures in the Republic as an integral part of its National Defence Mandate. A Cyber-
warfare Strategy, that is informed by the National Security Strategy of South Africa,
should be developed under guidance of the CRC. Clause 55 of the Bill aims to
establish a dedicated structure within the Department of Defence which has the
responsibility of implementing and developing the cyber offensive and defensive
capabilities of the South African National Defence Force. In terms of clause 55(1), the
Cabinet member responsible for defence must, in consultation with the Cabinet member
responsible for national financial matters, at State expense, establish a Cyber
Command and equip, operate and maintain the Cyber Command. Clause 55(3)
provides for the appointment of the General Officer Commanding of and the staffing of
the Cyber Command and also sets out the responsibilities of the General Officer
Commanding and the reporting functions of the General Officer Commanding. Clause
55(4) sets out the objects and functions of the Cyber Command, which are to—
* facilitate the operational coordination of cyber security incident response
activities regarding national defence;
67
3.6.8 In terms of clause 57, the Cyber Security Hub, has the responsibility of
encouraging and facilitating the development of appropriate additional Private Sector
Security Incident Response Teams. Clause 57 of the Bill provides for the recognition or
establishment of Private Sector Security Incident Response Teams and also provides
for the objects and functions the Private Sector Security Incident Response Teams. The
functions of Private Sector Security Incident Response Teams are, among others, to—
* be a contact point for that specific sector on cyber security matters;
* coordinate cyber security incident response activities within that sector;
* facilitate information-sharing and technology-sharing within the sector;
* facilitate information-sharing and technology-exchange with other Private Sector
Security Incident Response Teams established for other sectors and the Cyber
Security Hub;
* establish minimum security standards and best practices for the sector for which
it is established in consultation with the Cyber Security Hub;
69
* report all cyber security threats in the sector for which it is established and
measures which have been implemented to address such threats to the Cyber
Security Hub and Private Sector Security Incident Response Teams established
for other sectors;
* immediately report new cybercrime trends which come to its attention to the
Cyber Security Hub, Private Sector Security Incident Response Teams
established for other sectors and the National Cybercrime Centre; and
* provide sector entities within the sector for which it is established with best
practice guidance on cyber security.
potential National Critical Information Infrastructure, must within 12 months of the fixed
date, submit to the Cabinet member responsible for State security, recommendations
regarding information structures which need to be declared as National Critical
Information Infrastructures. In terms of clause 58(2), the Cabinet member responsible
for State security may, after considering recommendations made to him or her by the
Cyber Security Centre, by notice in the Gazette, declare any information structure, or
category or class of information structures, as National Critical Information
Infrastructures if it appears to the Cabinet member that an information infrastructure is
so important that any interference therewith, or that its loss, damage, disruption or
immobilization may—
* prejudice the security, defence, law enforcement or international relations of the
Republic;
* prejudice the health or safety of the public;
* cause interference with or disruption of an essential service;
* causes any major economic loss;
* cause destabilization of the economy of the Republic; or
* create a public emergency situation.
Clause 58(3) makes it mandatory for the Cabinet member responsible for State security
to follow a just administrative process before he or she declares an information
infrastructure as a National Critical Information Infrastructure. The decision of the
Cabinet member is subject to appeal to the High Court. In terms of clause 58(4), an
information infrastructure which is to be declared as a National Critical Information
Infrastructure must comply with the regulations which the Cabinet member may make in
terms of clause 58(5). In terms of clause 58(5), the Cabinet member responsible for
State security must make regulations regulating—
* the classification of information on National Critical Information Infrastructures;
* security policies and procedures to be applied to National Critical Information
Infrastructures;
* access to National Critical Information Infrastructures;
* storing and archiving of information on National Critical Information
Infrastructures;
* cyber security incident management and continuation with service provision;
72
Clause 59 provides for the establishment and control of a fund to be known as the
National Critical Information Infrastructure Fund which must, among others, be utilised
to implement disaster management measures in respect of National Critical Information
Infrastructures in disaster situations. Clause 59(9) defines—
(a) “disaster management measure” as any measure aimed at—
* preventing or reducing the risk of a disaster;
* mitigating the severity or consequences of a disaster;
* emergency preparedness;
* rapid and effective responses to a disaster; and
* post-disaster recovery and rehabilitation; and
(b) ―disaster situation‖ as a progressive or sudden, widespread or localised
occurrence, which takes place or is imminent and which causes or may cause
substantial damage to a National Critical Information Infrastructure or any part
thereof and which is of such a magnitude that it exceeds the ability of such a
National Critical Information Infrastructure affected by the disaster to cope with its
effects using its own resources only.
Clause 60 of the Bill provides for an auditing process in order to evaluate compliance
with the provisions of clause 58(6) of the Bill.
73
3.8 Evidence
Evidence is the means by which facts relevant to the guilt or innocence of an individual
at a trial are established. Electronic evidence is all material that exists in electronic, or
digital form, for instance data which makes up a virus and which deletes other data as
opposed to real evidence, like a computer device. The South African common and
statutory law (most notably Chapter III Part 1 of the Electronic Communications and
Transactions Act, 2002), governs admissibility of electronic evidence. The current laws
dealing with electronic evidence are, in general, sufficient for the purposes of criminal
proceedings. However, the Bill proposes two clauses which provide for evidence by
means of affidavits. The possibility of giving evidence by way of affidavit is recognised in
various laws of the Republic. The rationale behind these provisions is to avoid an
unnecessary waste of resources and time, especially where evidence needs to be
adduced which originates from a foreign State. In many instances such evidence is not
disputed and is sometimes formally admitted through admissions by the defence.
Sections 212 and 212A of the Criminal Procedure Act, 1977, make provision for the
admissibility of certain affidavits. These sections provide for the reception of affidavits
on their production as prima facie proof of their contents. Since these affidavits, at
common law, constitute hearsay evidence whenever their probative value depends
upon the credibility of any person other than the testifying witness, these sections make
inroads on the hearsay rule. These affidavits can therefore only be regarded as prima
facie proof of their contents if there strict is compliance with the prerequisites which are
provided for their admissibility. As opposed to sections 212 and 212A of the Criminal
Procedure Act, clause 61 caters specifically for disciplines relevant to information
communications technologies which may be received in evidence by way of affidavit.
Aspects relating to information communication technologies are not addressed
adequately by section 212 or 212A of the Criminal Procedure Act. Section 212(4)(a)(iii)
of the Criminal Procedure Act, as the only possible relevant provision, is restricted in its
ambit to ―computer science‖ which does not include all the other relevant disciplines
which may play a role in, or which are relevant to, evidence relating to cybercrime.
Section 212A, concerns itself with an act, transaction or occurrence which took place in
a government institution, court of law or a bank of a foreign State, which also
74
* the person who makes the statement would be guilty of an offence for which he
or she could be prosecuted if he or she makes a false statement or
representation, or furnishes false information, knowing it to be false.
Evidence which is so obtained must be admitted as evidence at any proceedings and
forms part of the record of such proceedings if—
* the party against whom the evidence is to be adduced agrees to the admission
thereof as evidence at such proceedings; or
* the court, having regard to the nature of the proceedings, the nature of the
evidence, the purpose for which the evidence is tendered, any prejudice which a
party may suffer and any other factor which the court deems necessary to take
into account, is of the opinion that such evidence should be admitted in the
interests of justice.
The court before which evidence is produced as prima facie proof of the relevant
contents thereof may, in its discretion—
* cause the person who made the statement to be subpoenaed to give oral
evidence in the proceedings in question; or
* cause written interrogatories to be submitted to the person for reply and such
interrogatories and reply are likewise admissible in evidence at such
proceedings.
Clause 63 urges the courts not to apply the rules of evidence too strictly so as to
preclude the admissibility of data, a data message or data document in evidence in
criminal matters. The clause further provides for—
(a) general considerations which must be taken into account in assessing the
admissibility and the evidential weight of data, a data message or a data
document; and
(b) the admissibility of a copy or printout of data, a data message or a data
document,
in criminal proceedings.
Clause 64 of the Bill sets out the general obligations of an electronic communications
service provider which are—
77
* to take reasonable steps to inform its clients of cybercrime trends which affect or
may affect the clients of such an electronic communications service provider;
* establish procedures for its clients to report cybercrimes with the electronic
communications service provider;
* inform its clients of measures which a client may take in order to safeguard
himself or herself against cybercrime; and
* when it becomes aware of the use of its computer network or electronic
communications network to commit an offence, to—
- immediately report the matter to the National Cybercrime Centre; and
- preserve any information which may be of assistance to the law
enforcement agencies in investigating the offence, including information
which shows the communication‘s origin, destination, route, time date,
size, duration and the type of the underlying services.
Non-compliance with these obligations is criminalised.
As pointed out above, cybercrime most often involves an international dimension and, to
that extent, international cooperation is essential for the investigation and prosecution of
cybercrime. Although the Republic has signed the European Convention on Cyber
Crime, it has not ratified the Convention. The Republic is further not a party to any
regional or international agreement which deals specifically with measures to address
cybercrime. To address cybercrime, other measures, in addition to the investigation of
and prosecution of cybercrime, are necessary. Other strategies and measures which
reduce the risk of crimes occurring and their potential harmful effects on individuals and
society, on an international and regional basis, are also necessary. The United Nations
Guidelines for the Prevention of Crime highlight that government leadership plays an
important part in crime prevention, combined with cooperation and partnerships across
countries. In terms of clause 65 of the Bill, the President may enter into any agreement
with any foreign State regarding—
* the provision of mutual assistance and cooperation relating to the investigation
and prosecution of offences contemplated in the Bill;
* the implementation of cyber threat response activities;
78
The provisions which are deleted deal with substantially the same matters which are
provided for in the Bill.
The amendments to the Criminal Law (Sexual Offences and Related Matters)
Amendment Act Amendment Act, 2012, aims to criminalise various aspects relating to
child pornography in cyberspace. Initiatives seeking to regulate the distribution of child
pornography over the Internet have had little deterrent effect on perpetrators. The
Internet is the medium which is preferred for the distribution of child pornography. The
79
online sale of child pornography is highly profitable, with collectors willing to pay great
amounts for videos, pictures and literature depicting children in a sexual context. Search
engines find such material quickly. Most material is exchanged in password-protected
closed forums, which regular users and law enforcement agencies can rarely access.
The following factors in the use of the Internet to exchange of child pornography pose
difficulties for the investigation of these crimes, namely—
* the use of virtual currencies and anonymous payments which make it difficult for
law enforcement agencies to trace financial transactions in respect of child
pornography;
* the use of encryption or other technologies to make information which is sent
and stored, inaccessible; and
* technologies or procedures which can be used to hide the identities of
perpetrators.
The amendments to the Criminal Law (Sexual Offences and Related Matters)
Amendment Act Amendment Act, 2012, aim to supplement section 24B of the Films and
Publications Act, 1996, which contains provisions criminalising child pornography. The
amendments proposed by the Bill, aims to criminalise the intentional and unlawful—
* taking of steps to procure, obtain or access or in any way knowingly assisting in,
or facilitating the procurement, obtaining or accessing of child pornography
through a computer network or electronic communications network;
* possession of child pornography on a computer data storage medium, a
computer device, a computer network, a database or an electronic
communications network;
* production of child pornography for the purpose of making it available, distributing
it or broadcasting it by means of a computer network or an electronic
communications network;
* making available, distribution or broadcasting of child pornography by means of a
computer network or an electronic communications network;
* advocating, advertising, encouraging or promotion of child pornography or the
sexual exploitation of children, by means of a computer network or an electronic
communications network;
80
3.11.2 Clause 67 provides that the Cabinet members responsible for the administration
of justice and State security must make regulations where these are required in terms of
the Bill.