Protecting the right to identity against catfishing
- Authors: Ndyulo, Lisa Neliswa Latima
- Date: 2022-04-06
- Subjects: Catfishing South Africa , False personation Law and legislation South Africa , Torts South Africa , Mass media and publicity South Africa , Social media Law and legislation South Africa , Identity theft Law and legislation South Africa
- Language: English
- Type: Academic theses , Master's theses , text
- Identifier: http://hdl.handle.net/10962/290767 , vital:56782
- Description: Catfishing is a form of impersonation occurring on social media that interferes with a person’s right to identity. It involves creating a fake profile online using another person’s images. The facets of the right to identity are image, name, and likeness, among others. Catfishing affects a person’s right to identity and human dignity. Hence, the thesis aims to determine whether the right to identity adequately protects individuals against catfishing. This thesis is a desktop analysis considering the South African legal framework related to the right to identity, including the common law, the Constitution of the Republic of South Africa, 1996, and legislation. The thesis is also a comparative analysis assessing the adequacy of addressing catfishing through the right to identity. The study evaluates the right to identity’s adequacy by juxtaposing the South African legal framework with California and Oklahoma’s common law and statutory interventions. The study reveals that the right to identity protects South African social networking website users against catfishing. Like the common law right of privacy in California and Oklahoma, a person infringes the right to identity when they use another person’s identity facets to portray them in a false light, and like the statutory right of publicity in California and Oklahoma, a person infringes identity when they appropriate facets of another person’s identity for commercial gain. The infringement of the right to identity entitles a person to legal remedies, including a claim for damages, among other things. The thesis also considers principles of conflict of laws to determine the operative law in an instance where a victim resides in South Africa and the perpetrator resides in the US, or vice versa. The study recommends that developing the common law to recognise that identity can be infringed by mere appropriation not linked to a commercial purpose would be beneficial for addressing catfishing adequately in South Africa. Legal development contributes to the constitutional imperative to align the common law with society’s shifting needs and address novel legal issues, such as catfishing. , Thesis (LLM) -- Faculty of Law, Law, 2022
- Full Text:
- Date Issued: 2022-04-06
- Authors: Ndyulo, Lisa Neliswa Latima
- Date: 2022-04-06
- Subjects: Catfishing South Africa , False personation Law and legislation South Africa , Torts South Africa , Mass media and publicity South Africa , Social media Law and legislation South Africa , Identity theft Law and legislation South Africa
- Language: English
- Type: Academic theses , Master's theses , text
- Identifier: http://hdl.handle.net/10962/290767 , vital:56782
- Description: Catfishing is a form of impersonation occurring on social media that interferes with a person’s right to identity. It involves creating a fake profile online using another person’s images. The facets of the right to identity are image, name, and likeness, among others. Catfishing affects a person’s right to identity and human dignity. Hence, the thesis aims to determine whether the right to identity adequately protects individuals against catfishing. This thesis is a desktop analysis considering the South African legal framework related to the right to identity, including the common law, the Constitution of the Republic of South Africa, 1996, and legislation. The thesis is also a comparative analysis assessing the adequacy of addressing catfishing through the right to identity. The study evaluates the right to identity’s adequacy by juxtaposing the South African legal framework with California and Oklahoma’s common law and statutory interventions. The study reveals that the right to identity protects South African social networking website users against catfishing. Like the common law right of privacy in California and Oklahoma, a person infringes the right to identity when they use another person’s identity facets to portray them in a false light, and like the statutory right of publicity in California and Oklahoma, a person infringes identity when they appropriate facets of another person’s identity for commercial gain. The infringement of the right to identity entitles a person to legal remedies, including a claim for damages, among other things. The thesis also considers principles of conflict of laws to determine the operative law in an instance where a victim resides in South Africa and the perpetrator resides in the US, or vice versa. The study recommends that developing the common law to recognise that identity can be infringed by mere appropriation not linked to a commercial purpose would be beneficial for addressing catfishing adequately in South Africa. Legal development contributes to the constitutional imperative to align the common law with society’s shifting needs and address novel legal issues, such as catfishing. , Thesis (LLM) -- Faculty of Law, Law, 2022
- Full Text:
- Date Issued: 2022-04-06
The regulation of privacy on cloud computing services in terms of the Protection of Personal Information Act 4 of 2013
- Authors: Malahleka, Mthuthukisi
- Date: 2022-04-06
- Subjects: South Africa. Protection of Personal Information Act, 2013 , Cloud computing Law and legislation South Africa , Data protection Law and legislation South Africa , Personal information management South Africa , Data privacy South Africa , Computer security Law and legislation South Africa , General Data Protection Regulation (GDPR)
- Language: English
- Type: Academic theses , Master's theses , text
- Identifier: http://hdl.handle.net/10962/290731 , vital:56779
- Description: There is a relatively new development in Information Technology (IT) space known as cloud computing, software and service delivered remotely through the Internet without installing software on a computer. Cloud computing has quickly gathered steam as one of the most prominent topics in IT, and indeed within the business sector as a whole. Cloud computing is one such development associated with opportunities and benefits, especially in the commercial sector. Due to the development of IT and many businesses adopting e-commerce business-related strategies, cloud computing has revolutionised how personal information is processed. The advent of cloud computing as a mechanism to process personal information has brought many legal challenges for protecting the right to privacy enshrined under section 14 of the South African Constitution, which is a vulnerable part of one’s personality right. The right to privacy has long been protected even before adopting the Constitution under the common law of delict (actio iniuriarumn). As the adoption rate of cloud computing services by businesses continues to increase, the legal considerations and risks become more prevalent. The lawmakers struggle to keep pace with the rapidly changing technological advancements, at least for now. Both the common law and the Constitution could not address all the legal aspects of data protection and the adoption of cloud computing services hence the promulgation of the Protection of Personal Information Act 4 of 2013 (POPI Act). The POPI Act’s main objective is to protect the personal information of both natural and juristic persons. Personal information about an individual forms part of privacy. Unlawful processing of such personal information is a violation of the right to privacy of an individual. It is now widely recognised that the unregulated processing of personal information significantly impacts fundamental human rights like privacy, personality, and autonomy. A close analysis of cloud computing regulation is necessary, as legal protection mechanisms must safeguard the processing of personal information and establish extraterritorial jurisdiction to regulate the use of cloud computing within national legislation as cloud computing provides a transnational characteristic on the cross-border flow of personal information. In this thesis, a question is asked on whether the current data protection laws in South Africa on protecting the right to privacy in the cloud computing services context are adequate. The analysis will determine whether the overlaps between these pieces of data protection laws are competent to deal with the ever-increasing threats on the right to privacy and if they meet the international data protection standards set by the European Union’s General Data Protection Regulation (GDPR). The research seeks to analyse and reveal the shortcomings under the Constitution and the common law that led to adopting the POPI Act by studying the regulation of cloud computing services. This analysis will determine the shortcomings of the POPI Act as well in the context of cloud computing. The research will then follow a comparative analysis of the POPI Act and the GDPR to determine the application of the GDPR on international data breaches and compare its provisions with the POPI Act in the context of cloud computing. Finally, the research will address the question as to whether a multi-faceted approach, which includes a Model Law on cloud computing, would be an appropriate starting point setting out requirements for the use of this technology can be sufficient in protecting data subjects. And as cloud computing risks are not only a national but also a global problem, South Africa needs to look at the option of entering into mutual agreements with other countries and organisations to regulate cloud computing at an international level. , Thesis (LLM) -- Faculty of Law, Law, 2022
- Full Text:
- Date Issued: 2022-04-06
- Authors: Malahleka, Mthuthukisi
- Date: 2022-04-06
- Subjects: South Africa. Protection of Personal Information Act, 2013 , Cloud computing Law and legislation South Africa , Data protection Law and legislation South Africa , Personal information management South Africa , Data privacy South Africa , Computer security Law and legislation South Africa , General Data Protection Regulation (GDPR)
- Language: English
- Type: Academic theses , Master's theses , text
- Identifier: http://hdl.handle.net/10962/290731 , vital:56779
- Description: There is a relatively new development in Information Technology (IT) space known as cloud computing, software and service delivered remotely through the Internet without installing software on a computer. Cloud computing has quickly gathered steam as one of the most prominent topics in IT, and indeed within the business sector as a whole. Cloud computing is one such development associated with opportunities and benefits, especially in the commercial sector. Due to the development of IT and many businesses adopting e-commerce business-related strategies, cloud computing has revolutionised how personal information is processed. The advent of cloud computing as a mechanism to process personal information has brought many legal challenges for protecting the right to privacy enshrined under section 14 of the South African Constitution, which is a vulnerable part of one’s personality right. The right to privacy has long been protected even before adopting the Constitution under the common law of delict (actio iniuriarumn). As the adoption rate of cloud computing services by businesses continues to increase, the legal considerations and risks become more prevalent. The lawmakers struggle to keep pace with the rapidly changing technological advancements, at least for now. Both the common law and the Constitution could not address all the legal aspects of data protection and the adoption of cloud computing services hence the promulgation of the Protection of Personal Information Act 4 of 2013 (POPI Act). The POPI Act’s main objective is to protect the personal information of both natural and juristic persons. Personal information about an individual forms part of privacy. Unlawful processing of such personal information is a violation of the right to privacy of an individual. It is now widely recognised that the unregulated processing of personal information significantly impacts fundamental human rights like privacy, personality, and autonomy. A close analysis of cloud computing regulation is necessary, as legal protection mechanisms must safeguard the processing of personal information and establish extraterritorial jurisdiction to regulate the use of cloud computing within national legislation as cloud computing provides a transnational characteristic on the cross-border flow of personal information. In this thesis, a question is asked on whether the current data protection laws in South Africa on protecting the right to privacy in the cloud computing services context are adequate. The analysis will determine whether the overlaps between these pieces of data protection laws are competent to deal with the ever-increasing threats on the right to privacy and if they meet the international data protection standards set by the European Union’s General Data Protection Regulation (GDPR). The research seeks to analyse and reveal the shortcomings under the Constitution and the common law that led to adopting the POPI Act by studying the regulation of cloud computing services. This analysis will determine the shortcomings of the POPI Act as well in the context of cloud computing. The research will then follow a comparative analysis of the POPI Act and the GDPR to determine the application of the GDPR on international data breaches and compare its provisions with the POPI Act in the context of cloud computing. Finally, the research will address the question as to whether a multi-faceted approach, which includes a Model Law on cloud computing, would be an appropriate starting point setting out requirements for the use of this technology can be sufficient in protecting data subjects. And as cloud computing risks are not only a national but also a global problem, South Africa needs to look at the option of entering into mutual agreements with other countries and organisations to regulate cloud computing at an international level. , Thesis (LLM) -- Faculty of Law, Law, 2022
- Full Text:
- Date Issued: 2022-04-06
- «
- ‹
- 1
- ›
- »