Spelling suggestions: "subject:"6electronic records - daw anda legislation"" "subject:"6electronic records - daw ando legislation""
1 |
Investigation into the state of digital records management in the provincial government of Eastern Cape: a case study of the office of the premierMunetsi, Ndakasharwa January 2011 (has links)
The study sought to investigate the viability of digital records management in the Office of the Premier (OTP) in the Eastern Cape Province. The objectives of the study were to establish the current status of digital records management in the OTP, determine the compliance with the legal framework, identify the requisite infrastructure for digital records management (DRM), describe the security and preservation measures for DRM, and the challenges of managing digital records. Purposive sampling was used to select 40 participants. A questionnaire was used to collect data. The study revealed that the OTP has taken a number of initiatives aimed at establishing records management practices. However, the study found that the OTP is faced with a number of challenges in trying to use the Electronic Document and Records Management System (EDRMS). The majority of the employees did not have any qualification in records management. This lack of skills and competencies affects the implementation of the new system. The findings of the study showed that most of the employees were resisting using the new system because they were not comfortable with it. The study recommends that the department should encourage its staff to get training to be knowledgeable in the use of EDRMS which generates records; the staff should work closer with the consultancy in order to gain skills and knowledge to facilitate the change process, and the security and preservation of digital records should be enhanced.
|
2 |
Assessing the reliability of digital evidence from live investigations involving encryptionHargreaves, Christopher James January 2009 (has links)
The traditional approach to a digital investigation when a computer system is encountered in a running state is to remove the power, image the machine using a write blocker and then analyse the acquired image. This has the advantage of preserving the contents of the computer’s hard disk at that point in time. However, the disadvantage of this approach is that the preservation of the disk is at the expense of volatile data such as that stored in memory, which does not remain once the power is disconnected. There are an increasing number of situations where this traditional approach of ‘pulling the plug’ is not ideal since volatile data is relevant to the investigation; one of these situations is when the machine under investigation is using encryption. If encrypted data is encountered on a live machine, a live investigation can be performed to preserve this evidence in a form that can be later analysed. However, there are a number of difficulties with using evidence obtained from live investigations that may cause the reliability of such evidence to be questioned. This research investigates whether digital evidence obtained from live investigations involving encryption can be considered to be reliable. To determine this, a means of assessing reliability is established, which involves evaluating digital evidence against a set of criteria; evidence should be authentic, accurate and complete. This research considers how traditional digital investigations satisfy these requirements and then determines the extent to which evidence from live investigations involving encryption can satisfy the same criteria. This research concludes that it is possible for live digital evidence to be considered to be reliable, but that reliability of digital evidence ultimately depends on the specific investigation and the importance of the decision being made. However, the research provides structured criteria that allow the reliability of digital evidence to be assessed, demonstrates the use of these criteria in the context of live digital investigations involving encryption, and shows the extent to which each can currently be met.
|
3 |
Assessing the Reliability of Digital Evidence from Live Investigations Involving EncryptionHargreaves, C J 24 November 2009 (has links)
The traditional approach to a digital investigation when a computer system is
encountered in a running state is to remove the power, image the machine using a
write blocker and then analyse the acquired image. This has the advantage of
preserving the contents of the computer’s hard disk at that point in time. However, the
disadvantage of this approach is that the preservation of the disk is at the expense of
volatile data such as that stored in memory, which does not remain once the power is
disconnected. There are an increasing number of situations where this traditional
approach of ‘pulling the plug’ is not ideal since volatile data is relevant to the
investigation; one of these situations is when the machine under investigation is using
encryption. If encrypted data is encountered on a live machine, a live investigation
can be performed to preserve this evidence in a form that can be later analysed.
However, there are a number of difficulties with using evidence obtained from live
investigations that may cause the reliability of such evidence to be questioned. This
research investigates whether digital evidence obtained from live investigations
involving encryption can be considered to be reliable. To determine this, a means of
assessing reliability is established, which involves evaluating digital evidence against
a set of criteria; evidence should be authentic, accurate and complete. This research
considers how traditional digital investigations satisfy these requirements and then
determines the extent to which evidence from live investigations involving encryption
can satisfy the same criteria. This research concludes that it is possible for live digital
evidence to be considered to be reliable, but that reliability of digital evidence
ultimately depends on the specific investigation and the importance of the decision
being made. However, the research provides structured criteria that allow the
reliability of digital evidence to be assessed, demonstrates the use of these criteria in
the context of live digital investigations involving encryption, and shows the extent to
which each can currently be met.
|
4 |
Legal principles regulating the processing of personal information in the workplaceNxokweni, Unathi Pearl 10 1900 (has links)
This study focuses on the right to privacy in the workplace, specifically employees' expectations of electronic privacy where personal information is processed. The main aim of this dissertation is to establish whether, given advantages in technology, South African laws offers adequate protection for employees when their electronic information is being processed. The study analyses South African law as it relates to the privacy of employees during the processing of their personal information in the workplace.This is examined within the parameters of the constitutional and legislative framework with due regard to the common-law right to privacy. The legal issues are examined from a South African context and is compared with data protection laws and regulations of the United Kingdom. It also offers recommendations based on experience gained in the United Kingdom. / Private Law / LL. M.
|
5 |
A historical-legal analysis of search and seizure of electronic records for the prosecution of financial crimes in South AfricaPoyo, Unathi 30 September 2020 (has links)
Crime has been around since the beginning of time. In an evolving society, and the methodology of crime also changes. The methodology of combating and preventing crime should aim to match the speed at which crime occurs. Criminal procedure deals with the powers of the police to investigate crimes.1 The Criminal Procedure Act 51 of 1977 (CPA) contains the principles of search and seizure in chapter 2. The promulgation of the CPA was during a period where the computer was a new phenomenon. At this time, it was inconceivable that technology would ever advance and become so ubiquitous, to the point that technology would infiltrate every aspect of our lives, and laws. There has since been many developments in our law, especially a new Constitutional dispensation.2 There have been developments and technological advancements that have had a direct and indirect bearing on the CPA. People use technology to communicate, transact, and unfortunately, to commit crime. These developments require there to be amendments in the CPA. There has been no specific amendments relating to search and seizure which are of significance in addressing technological advances. It is recommended that the amendments to the CPA include definitions and guidelines for procedural aspects of collection of electronic evidence. / Criminal and Procedural Law / LL. M. (Criminal and Procedural Law)
|
Page generated in 0.173 seconds