• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 15
  • 3
  • 2
  • Tagged with
  • 22
  • 22
  • 22
  • 22
  • 13
  • 11
  • 10
  • 8
  • 8
  • 7
  • 7
  • 6
  • 6
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

The law of data (privacy) protection: a comparative and theoretical study

Roos, Anneliese 31 October 2003 (has links)
In present-day society more and more personal information is being collected. The nature of the collection has also changed: more sensitive and potentially prejudicial information is collected. The advent of computers and the development of new telecommunications technology, linking computers in networks (principally the Internet) and enabling the transfer of information between computer systems, have made information increasingly important, and boosted the collection and use of personal information. The risks inherent in the processing of personal information are that the data may be inaccurate, incomplete or irrelevant, accessed or disclosed without authorisation, used for a purpose other than that for which they were collected, or destroyed. The processing of personal information poses a threat to a person's right to privacy. The right to identity is also infringed when incorrect or misleading information relating to a person is processed. In response to the problem of the invasion of the right to privacy by the processing of personal information, many countries have adopted "data protection" laws. Since the common law in South Africa does not provide adequate protection for personal data, data protection legislation is also required. This study is undertaken from a private law perspective. However, since privacy is also protected as a fundamental right, the influence of constitutional law on data protection is also considered. After analysing different foreign data protection laws and legal instruments, a set of core data protection principles is identified. In addition, certain general legal principles that should form the basis of any statutory data protection legislation in South Africa are proposed. Following an analysis of the theoretical basis for data protection in South African private law, the current position as regards data protection in South-Africa is analysed and measured against the principles identified. The conclusion arrived at is that the current South African acts can all be considered to be steps in the right direction, but not complete solutions. Further legislation incorporating internationally accepted data protection principles is therefore necessary. The elements that should be incorporated in a data protection regime are discussed. / Jurisprudence / LL. D. (Jurisprudence)
12

The right to confidentiality in the context of HIV/AIDS

Mtunuse, Paul Tobias 02 1900 (has links)
The purpose of this study is to investigate the right to confidentiality in the context of HIV/AIDS through an interdisciplinary lens. This study indicates that whilst confidentiality is important and should be preserved in order to protect persons living with HIV/AIDS against stigmatisation, discrimination and victimisation, this should be balanced by other equally important interests, such as the protection of public health and individual third parties who may be affected by the intentional or negligent infection of others with HIV. As the consideration of the legal issues relating to confidentiality and privacy cannot be divorced from the social context in which HIV/AIDS plays out in South African communities, the study will examine, amongst others, the victimisation, discrimination and stigmatisation experienced by persons living with HIV/AIDS, followed by a critical exploration of the present legal and ethical framework governing privacy and confidentiality, including medical confidentiality, as well as the duty to disclose a positive HIV-status, in the context of HIV/AIDS. Possible limitations on the right to privacy in this context are also examined, which include, amongst others, a consideration of making HIV/AIDS notifiable diseases in South Africa. The study suggests that it is imperative that legal interventions aimed at curbing the spread of HIV will need to be mindful of the unique social, cultural and economic forces that impact on the duty to disclose a positive HIV-status to partners and other affected third parties. Insights gained from philosophical theories relating to Africanism, individualism, communitarianism and utilitarianism are valuable tools in facilitating a clearer understanding of relevant social and cultural factors that keep South African society locked in the present stalemate with regard to the disclosure of HIV status. / Public, Constitutional, & International law / LLD
13

Legal principles regulating the processing of personal information in the workplace

Nxokweni, Unathi Pearl 10 1900 (has links)
This study focuses on the right to privacy in the workplace, specifically employees' expectations of electronic privacy where personal information is processed. The main aim of this dissertation is to establish whether, given advantages in technology, South African laws offers adequate protection for employees when their electronic information is being processed. The study analyses South African law as it relates to the privacy of employees during the processing of their personal information in the workplace.This is examined within the parameters of the constitutional and legislative framework with due regard to the common-law right to privacy. The legal issues are examined from a South African context and is compared with data protection laws and regulations of the United Kingdom. It also offers recommendations based on experience gained in the United Kingdom. / Private Law / LL. M.
14

The right to privacy and identity on social network sites : a comparative legal perspective

Skosana, Milton Themba 12 April 2018 (has links)
This study focuses on the use of Social Network Sites (SNSs) and certain personality rights (specifically the right to privacy and the right to identity) that may be infringed by this use. The study also discusses data protection law as the protection of the rights to privacy and identity are interlinked with data protection in that data protection assumes importance when there is processing of personal information on SNSs. The study seeks to determine whether South African law provides adequate protection for the interests that form the object of these personality rights, and highlights certain shortcomings, particularly in the context of SNSs. It also suggests solutions where there are shortcomings by learning from other jurisdictions. Related issues investigated are: who should be held responsible for the user-generated content uploaded on SNSs; the role of the Internet Service Provider (ISP); and how to deal with anonymous defendants. / Private Law / LL. M.
15

The law of data (privacy) protection: a comparative and theoretical study

Roos, Anneliese 31 October 2003 (has links)
In present-day society more and more personal information is being collected. The nature of the collection has also changed: more sensitive and potentially prejudicial information is collected. The advent of computers and the development of new telecommunications technology, linking computers in networks (principally the Internet) and enabling the transfer of information between computer systems, have made information increasingly important, and boosted the collection and use of personal information. The risks inherent in the processing of personal information are that the data may be inaccurate, incomplete or irrelevant, accessed or disclosed without authorisation, used for a purpose other than that for which they were collected, or destroyed. The processing of personal information poses a threat to a person's right to privacy. The right to identity is also infringed when incorrect or misleading information relating to a person is processed. In response to the problem of the invasion of the right to privacy by the processing of personal information, many countries have adopted "data protection" laws. Since the common law in South Africa does not provide adequate protection for personal data, data protection legislation is also required. This study is undertaken from a private law perspective. However, since privacy is also protected as a fundamental right, the influence of constitutional law on data protection is also considered. After analysing different foreign data protection laws and legal instruments, a set of core data protection principles is identified. In addition, certain general legal principles that should form the basis of any statutory data protection legislation in South Africa are proposed. Following an analysis of the theoretical basis for data protection in South African private law, the current position as regards data protection in South-Africa is analysed and measured against the principles identified. The conclusion arrived at is that the current South African acts can all be considered to be steps in the right direction, but not complete solutions. Further legislation incorporating internationally accepted data protection principles is therefore necessary. The elements that should be incorporated in a data protection regime are discussed. / Jurisprudence / LL. D. (Jurisprudence)
16

The right to confidentiality in the context of HIV/AIDS

Mtunuse, Paul Tobias 02 1900 (has links)
The purpose of this study is to investigate the right to confidentiality in the context of HIV/AIDS through an interdisciplinary lens. This study indicates that whilst confidentiality is important and should be preserved in order to protect persons living with HIV/AIDS against stigmatisation, discrimination and victimisation, this should be balanced by other equally important interests, such as the protection of public health and individual third parties who may be affected by the intentional or negligent infection of others with HIV. As the consideration of the legal issues relating to confidentiality and privacy cannot be divorced from the social context in which HIV/AIDS plays out in South African communities, the study will examine, amongst others, the victimisation, discrimination and stigmatisation experienced by persons living with HIV/AIDS, followed by a critical exploration of the present legal and ethical framework governing privacy and confidentiality, including medical confidentiality, as well as the duty to disclose a positive HIV-status, in the context of HIV/AIDS. Possible limitations on the right to privacy in this context are also examined, which include, amongst others, a consideration of making HIV/AIDS notifiable diseases in South Africa. The study suggests that it is imperative that legal interventions aimed at curbing the spread of HIV will need to be mindful of the unique social, cultural and economic forces that impact on the duty to disclose a positive HIV-status to partners and other affected third parties. Insights gained from philosophical theories relating to Africanism, individualism, communitarianism and utilitarianism are valuable tools in facilitating a clearer understanding of relevant social and cultural factors that keep South African society locked in the present stalemate with regard to the disclosure of HIV status. / Public, Constitutional, and International law / LLD
17

Security of electronic personal health information in a public hospital in South Africa

Chuma, Kabelo Given 01 1900 (has links)
The adoption of digital health technologies has dramatically changed the healthcare sector landscape and thus generates new opportunities to collect, capture, store, access and retrieve electronic personal health information (ePHI). With the introduction of digital health technologies and the digitisation of health data, an increasing number of hospitals and peripheral health facilities across the globe are transitioning from a paper-based environment to an electronic or paper-light environment. However, the growing use of digital health technologies within healthcare facilities has caused ePHI to be exposed to a variety of threats such as cyber security threats, human-related threats, technological threats and environmental threats. These threats have the potential to cause harm to hospital systems and severely compromise the integrity and confidentiality of ePHI. Because of the growing number of security threats, many hospitals, both private and public, are struggling to secure ePHI due to a lack of robust data security plans, systems and security control measures. The purpose of this study was to explore the security of electronic personal health information in a public hospital in South Africa. The study was underpinned by the interpretivism paradigm with qualitative data collected through semi-structured interviews with purposively selected IT technicians, network controllers’, administrative clerks and records management clerks, and triangulated with document and system analysis. Audio-recorded interviews were transcribed verbatim. Data was coded and analysed using ATLAS.ti, version 8 software, to generate themes and codes within the data, from which findings were derived. The key results revealed that the public hospital is witnessing a deluge of sophisticated cyber threats such as worm viruses, Trojan horses and shortcut viruses. This is compounded by technological threats such as power and system failure, network connection failure, obsolete computers and operating systems, and outdated hospital systems. However, defensive security measures such as data encryption, windows firewall, antivirus software and security audit log system exist in the public hospital for securing and protecting ePHI against threats and breaches. The study recommended the need to implement Intrusion Protection System (IPS), and constantly update the Windows firewall and antivirus program to protect hospital computers and networks against newly released viruses and other malicious codes. In addition to the use of password and username to control access to ePHI in the public hospital, the study recommends that the hospital should put in place authentication mechanisms such as biometric system and Radio Frequency Identification (RFID) system restrict access to ePHI, as well as to upgrade hospital computers and the Patient Administration and Billing (PAAB) System. In the absence of security policy, there is a need for the hospital to put in place a clear written security policy aimed at protecting ePHI. The study concluded that healthcare organisations should upgrade the security of their information systems to protect ePHI stored in databases against unauthorised access, malicious codes and other cyber-attacks. / Information Science / M. Inf. (Information Security)
18

HIV exceptionalism and the South African HIV and AIDS epidemic: perspectives of health care workers in Pietermaritzburg

Still, Linda Joy 31 October 2008 (has links)
The limited success of HIV-testing facilities in South Africa means that many people are not accessing necessary antiretroviral treatment services. This study investigates the practical implications of HIV exceptionalism inherent in Voluntary Counselling and Testing (VCT). A semi-structured interview schedule was used to survey participants for their perspectives on barriers to HIV-testing uptake as well as the effects of exceptionalist practices at VCT clinics. Responses showed marked perceptions of gender differences in people's willingness to test and several important barriers including problems of access to services. Significantly, exceptionalism displayed in certain clinic procedures was thought to contribute to stigma, and attempts to normalise HIV practice in order to combat the effects of stigma were being informally implemented. Participants' views on routine opt-out testing were explored. The researcher recommended further investigation on how HIV testing and treatment policies can be normalised so as to reduce stigma and increase testing uptake. / Social Work / M.A. Sociology (Social Behaviour Studies in HIV/AIDS)
19

Aspekte van deursoeking en beslaglegging in Suid Afrikaanse openbare skole : n Vergelykende studie

Van Rensburg, Angelique Gene Janse 06 1900 (has links)
Afrikaans text / The Canadian and South African legal systems established equivalent constitutional values and principles pertaining to searches conducted with or without a valid search warrant. It creates the basis for a comparative study on this particular aspect. The Supreme Court of Canada held in R v A. M 2008 S.C.C 19 random sniffer dog searches conducted without neither a reasonable suspicion nor any legislative authority on learners enrolled in public schools, is unconstitutional due to its infringement of a learner's reasonable expectation to privacy, as protected in section 8 of the Canadian Charter of rights and Freedoms. South African learners are randomly search by law enforcement officers by using sniffer dogs for purposes of detecting the possession of illegal drugs in instances without neither a reasonable suspicion nor statutory authority. The search is subsequently conducted in terms of the common law. The common law is not regarded as law of general application to limit a fundamental right in terms of the limitation clause. By taking into consideration the ratio in R v A. M (supra) the conclusion is subsequently that random sniffer dog searches conducted on learners in South African public schools, without neither a reasonable suspicion nor statutory authority, is unconstitutional which infringes section 14 of the Constitution of South Africa of 1996. / Die basis vir hierdie studie is ontleen aan die ooreenstemmende vereistes en beginsels in die Kanadese en Suid Afrikaanse reg ten aansien van deursoekings met of sonder 'n wettige lasbrief uitgevoer. In die Kanadese beslissing van R v A.M 2008 SCC 19 is die grondwetlikheid van ewekansige deursoekings met behuip van snuffelhonde op leerders sonder statutere magtiging uitgevoer, deur die Supreme Court of Canada as ongrondwetlik bevind aangesien 'n leerder wel oor 'n redelike verwagting op privaatheid beskik. Indien leerders sonder 'n redelike vermoede en statutere magtiging met behuip van snuffelhonde deursoek word, geskied dit ingevolge die gemenereg en dit word nie beskou as 'n algemeen geldende reg om 'n fundamentele reg kragtens die beperkingsklousule te beperk nie. Met inagneming van die ratio in R v A.M (supra) kan daar dus tot die gevolgtrekking gekom word dat ewekansige deursoekings met behulp van snuffelhonde op Suid Afrikanse leerders in die afwesigheid van 'n redelike vermoede asook sonder statutere magtiging uitgevoer, tans ongrondwetlike optrede daarstel wat op artikel 14 van die Grondwet van 1996 inbreuk maak. / Law (College) / LL.M.
20

The regulation of unsolicited electronic communications (SPAM) in South Africa : a comparative study

Tladi, Sebolawe Erna Mokowadi 06 1900 (has links)
The practice of spamming (sending unsolicited electronic communications) has been dubbed “the scourge of the 21st century” affecting different stakeholders. This practice is also credited for not only disrupting electronic communications but also, it overloads electronic systems and creates unnecessary costs for those affected than the ones responsible for sending such communications. In trying to address this issue nations have implemented anti-spam laws to combat the scourge. South Africa not lagging behind, has put in place anti-spam provisions to deal with the scourge. The anti-spam provisions are scattered in pieces of legislation dealing with diverse issues including: consumer protection; direct marketing; credit laws; and electronic transactions and communications. In addition to these provisions, an Amendment Bill to one of these laws and two Bills covering cybercrimes and cyber-security issues have been published. In this thesis, a question is asked on whether the current fragmented anti-spam provisions are adequate in protecting consumers. Whether the overlaps between these pieces of legislation are competent to deal with the ever increasing threats on electronic communications at large. Finally, the question as to whether a multi-faceted approach, which includes a Model Law on spam would be a suitable starting point setting out requirements for the sending of unsolicited electronic communications can be sufficient in protecting consumers. And as spam is not only a national but also a global problem, South Africa needs to look at the option of entering into mutual agreements with other countries and organisations in order to combat spam at a global level. / Mercantile Law / LL. D.

Page generated in 0.0812 seconds