Cybercrime and the Law Flashcards

1
Q

Why are there such as laws?

A

Laws are there to protect YOU as well – that way you can defend yourself against those who might want to harm you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why should one apply for a protection order?

A

Apply for a protection order if:
*A person or group’s behaviour toward you is rude, abusive, aggressive or obsessive
*You feel threatened or unsafe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What must you approve when applying for protection orders?

A

*Someone is following, watching, bothering or communicating with you repeatedly.
*You need proof, so keep records like screenshots or recordings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What if you don’t know who is harassing you? Harassment

A

If you don’t know, you can still apply for the protection order, then the police needs to investigate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What should you do when it comes to Protection from Harassment Act?

A

Apply for a protection order at your local court – you can do it yourself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What happens next? Harassment

A

A temporary (interim) protection order is usually granted while they are investigating the case.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can’t they just ignore it? Harassment

A

If someone breaks the terms of a protection order they can be sentenced for up to 5 years in jail, or have to pay a fine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the POPI Act?

A

This law gives the rules about how personal information can be collected, stored and used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define POPI

A

Protection of personal information POPI) act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does confidential include?

A

ID number, account numbers, medical information, children information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who is affected by the act? POPI

A

People or institutions who collect, store and process information
(So pay attention if you plan to work in a business like that!)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What happens if they don’t do it? POPI

A

They can go to prison or get a fine of up to R10 million – PLUS they must pay damages to those affected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should you do? POPI

A

Report it to the regulator if you suspect your personal information has been misused or leaked in a data breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define RICA

A

Regulation of Interception of Communication and Provision of Communication-Related Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the goal of RICA?

A

To track people, all communications equipment must be sold with tracking capabilities like serial numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the challenge of RICA?

A

To catch criminals red-handed, it is necessary to monitor their communications.

17
Q

What are the rules when it comes to monitoring?

A

RICA
There have to be rules about who may monitor your communications e.g.
listen to your phone calls
read your emails

18
Q

Who is affected by the act? RICA

A

Everyone
Cellphones are often used by criminals – this way police can apply to a judge for permission to monitor their communications

19
Q

What should you do? RICA

A

Provide accurate information when giving information required by the RICA act (e.g. when buying a SIM card)

20
Q

What is the Cybercrimes Bill?

A

A law which tries to define cybercrime, cyberterrorism and how to fight crimes, punish them and ultimately prevent them.

21
Q

What kind of cybercrimes are covered in this law?
Cybercrimes

A

*Unauthorised (unlawful) access to data or hardware
*Unauthorised interception of communications
*Cyber fraud – fraud committed using computing devices
*Sending messages that incite violence or damage to property, or that threaten a person or group of persons

22
Q

Who is affected by the bill?

A

Anyone who uses a computing device

23
Q

What penalties are laid down? Bill

A

Up to 15 years in prison (25 if it’s an act of terrorism) and/or a fine

24
Q

What should you do? Bill

A

Understand what is seen as cybercrime and don’t commit these crimes