Latest Articles

In her latest briefing session on 13 February 2017, advocate Pansy Tlakula, Chairperson of the Information Regulator, elaborated on the work that the office of the Information Regulator will be focused on and the progress they have made thus far, namely: Commencement date The Department of Justice informed the members of the Information Regulator that the Information Regulator’s office should be operational in two years, based on the Department’s experience. However the Information…
The Type Approval Regulations 2013 were promulgated in terms of section 35(1) of the Electronic Communications Act 2005 (ECA). The regulation requires that any type of electronic communications equipment or facility that is used, or will be used, in connection with the provision of electronic communications (Equipment) must be approved by the Independent Communications Authority of South Africa (ICASA). On 28 September 2016 ICASA published a discussion document on Equipment Type Approval Exemptions (Exemptions). Exemptions…
Cybercrime happens at the speed of broadband with criminals able to easily move the tools of their activities from one location to another. Successfully combatting cybercrime therefore requires real time detection and investigation, often by different agencies in different countries. Cybercrime has exploded internationally in the past several years in tandem with the surge of online data. South Africa has not been immune as daily reports of phishing attacks, identity theft and other online crimes…
Cybercrime happens at the speed of broadband with criminals able to easily move the tools of their activities from one location to another. Successfully combatting cybercrime therefore requires real time detection and investigation, often by different agencies in different countries. Cybercrime has exploded internationally in the past several years in tandem with the surge of online data. South Africa has not been immune as daily reports of phishing attacks, identity theft and other online crimes…