Punishment for cyber crime in Africa
Answers
Answered by
1
The issue of cyber bullying which was featured in a local Sunday newspaper on 30 August 2015, gave a harrowing and chilling account of a Durban school going teenager’s nightmare, who was bullied by an unknown person on Facebook and other social media network platforms. The teenager was humiliated and degraded by the incessant defamatory messages, which were circulating around these social platforms.
Cyber bullying is a crime and cybercrime is any crime, which involves the use of some electronic equipment or device. Cybercrime and cyber security has now come under the spotlight with the passing of the Cybercrimes and Cyber Security Bill 2015. Currently there are a number of laws dealing with cyber security, which is a mix of both legislation and the common law. The Bill seeks to regulate many of the crimes committed in cyberspace. These include ‘phishing’, hacking, unlawful interception of data, unlawful interference of data, unlawful acts of malware (such as viruses, worms, logic bombs and trojan horses), the unlawful acquisition, possession, provision, receipt or use of passwords, access codes or similar data or devices. Malware have different effects on data, computer devices, computer networks, databases or electronic communications networks.
Cyber bullying is a crime and cybercrime is any crime, which involves the use of some electronic equipment or device. Cybercrime and cyber security has now come under the spotlight with the passing of the Cybercrimes and Cyber Security Bill 2015. Currently there are a number of laws dealing with cyber security, which is a mix of both legislation and the common law. The Bill seeks to regulate many of the crimes committed in cyberspace. These include ‘phishing’, hacking, unlawful interception of data, unlawful interference of data, unlawful acts of malware (such as viruses, worms, logic bombs and trojan horses), the unlawful acquisition, possession, provision, receipt or use of passwords, access codes or similar data or devices. Malware have different effects on data, computer devices, computer networks, databases or electronic communications networks.
Answered by
0
(1) Subject to the Interception and Monitoring Prohibition Act, 1992 (Act No. 127 of 1992), a person who intentionally accesses or intercepts any data without authority or permission to do so, is guilty of an offence.
(2) A person who intentionally and without authority to do so, interferes with data in a way which causes such data to be modified, destroyed or otherwise rendered ineffective, is guilty of an offence.
(3) A person who unlawfully produces, sells, offers to sell, procures for use, designs, adapts for use, distributes or possesses any device, including a computer program or a component, which is designed primarily to overcome security measures for the protection of data, or performs any of those acts with regard to a password, access code or any other similar kind of data with the intent to unlawfully utilise such item to contravene this section, is guilty of an offence.
(4) A person who utilises any device or computer program mentioned in subsection (3) in order to unlawfully overcome security measures designed to protect such data or access thereto, is guilty of an offence.
(5) A person who commits any act described in this section with the intent to interfere with access to an information system so as to constitute a denial, including a partial denial, of service to legitimate users is guilty of an offence.
hope it will help you
(2) A person who intentionally and without authority to do so, interferes with data in a way which causes such data to be modified, destroyed or otherwise rendered ineffective, is guilty of an offence.
(3) A person who unlawfully produces, sells, offers to sell, procures for use, designs, adapts for use, distributes or possesses any device, including a computer program or a component, which is designed primarily to overcome security measures for the protection of data, or performs any of those acts with regard to a password, access code or any other similar kind of data with the intent to unlawfully utilise such item to contravene this section, is guilty of an offence.
(4) A person who utilises any device or computer program mentioned in subsection (3) in order to unlawfully overcome security measures designed to protect such data or access thereto, is guilty of an offence.
(5) A person who commits any act described in this section with the intent to interfere with access to an information system so as to constitute a denial, including a partial denial, of service to legitimate users is guilty of an offence.
hope it will help you
Similar questions