Advertisement

CyberBRICS pp 227-270 | Cite as

Cybersecurity in South Africa: Towards Best Practices

Chapter
  • 121 Downloads

Abstract

Cybersecurity has been on the South African agenda for a number of years now. Great concern has been expressed over the proliferation of cybercrime, the lack of protection of personal information and the challenges that come with regulating of cybersecurity as a whole. To this end, the Government, working hand-in-hand with the private sector has been proactively drafting policies and legislation which attempt to address these concerns. This Chapter provides a brief overview of the South African cybersecurity landscape through short discussions of the core topics of data protection, consumer protection, cybercrime, interception of communication and cyberdefence. This provides the foundation upon which the best practices in the South African context are discussed. It is clear that South Africa still has a long way to go but the progress that has been made is encouraging as most of it is on par with international standards. 

References

  1. Amabhungane Centre for Investigative Journalism NPC v Minister of Justice and Correctional Services (25978/2017) [2019] ZAGPPHC 384.Google Scholar
  2. Basson A (2015) “The Right to be forgotten: a South African perspective” Masters Dissertation, University of Pretoria.Google Scholar
  3. De Bruyn, M (2014) The Protection of Personal Information (POPI) Act - Impact on South Africa International Business & Economic Research Journal 13(6) 1315-1340.Google Scholar
  4. De Stadler, E. (2013) Intro to POPI (part 5): Rethinking privacy policies Juta’s Consumer Law Review (May/June) available at http://www.esselaar.co.za/legalarticles/intro-popi-part-5-rethinking-privacy-policies (accessed 15 September 2020)
  5. Department of Defence. (2015a). South African defence review. Pretoria. Available at <http://www.dod.mil.za/documents/defencereview/Defence%20Review%202015.pdf>. Accessed 30 September 2019.
  6. Department of Defence. (2015b). Department of Defence strategic plan for 2015 to 2020. Pretoria. Available at <http://www.dod.mil.za/documents/annualreports/DoD%20Annual%20Performance%20Strat%20Plan%202403.pdf. Accessed 30 September 2019.
  7. Department of Telecommunications and Postal services “A baseline study on Cybersecurity readiness” (2017). Available at <https://www.cybersecurityhub.gov.za/images/docs/Cyber-Readiness-Report.pdf>. Accessed 30 September 2019.
  8. Department of Telecommunications and Postal Services “Annual Performance Plan” (2019–2020) available at <https://www.dtps.gov.za/index.php?option=com_phocadownload&view=category&download=694:annual-performance-plan-2019-020&id=111:annual_performance_plans&Itemid=453>. Accessed 30 September 2019.
  9. Gillwald A (2019) “South Africa caught up in the global hype of the Fourth Industrial Revolution” Mail & Guardian available at <https://mg.co.za/article/2019-08-26-south-africa-is-caught-in-the-global-hype-of-the-fourth-industrial-revolution>. Accessed 15 October 2019.
  10. Global Cybersecurity Index (2019) 55. Available at <https://www.itu.int/en/ITU-D/Cybersecurity/Documents/draft-18-00706_Global-Cybersecurity-Index-EV5_print_2.pdf>. Accessed 30 September 2019.
  11. Government Gazette General Notices (December 2018) available at <http://www.gpwonline.co.za/Gazettes/Gazettes/MonthyIndexDecember2018.pdf>. Accessed 15 October 2019.
  12. Greenleaf, G. (2013). Chapter 10: Data protection in a globalised network. In Brown, I. [ed]. Research handbook on governance of the Internet. Northampton, MA: Edward Elgar. p 221–259.Google Scholar
  13. Grobler M., van Vuuren J.J., Leenen L. (2012) Implementation of a Cyber Security Policy in South Africa: Reflection on Progress and the Way Forward. In: Hercheui M.D., Whitehouse D., McIver W., Phahlamohlaka J. (eds) ICT Critical Infrastructures and Society. HCC 2012. IFIP Advances in Information and Communication Technology, vol 386. Springer, Berlin, HeidelbergGoogle Scholar
  14. Hubbard J (2019) “SA business underplaying the danger of cybercrime?” Fin24 available at <https://www.fin24.com/Finweek/Business-and-economy/sa-business-underplaying-the-danger-of-cybercrime-20190313 [accessed 15 October 2019].
  15. Heyink, M. (2011). Protection of Personal Information Guidelines for Law Firms. Law Society of South Africa LSSA Guidelines 1-55 available at https://www.golegal.co.za/wp-content/uploads/2018/01/Protection-of-Personal-Information-for-South-African-Law-Firms-LSSA-Guidelines-2018.pdf (accessed 15 September 2019)
  16. International Telecommunication Union’s (ITU) Global Cybersecurity Index (2018) 1. Available at https://www.itu.int/en/ITU-D/Cybersecurity/Pages/global-cybersecurity-index.aspx. Accessed 30 September 2019.
  17. International Telecommunication Union’s (ITU) Global Cybersecurity Index (2019) 55. Available at https://www.itu.int/en/ITU-D/Cybersecurity/Documents/draft-18-00706_Global-Cybersecurity-Index-EV5_print_2.pdf accessed 30 September 2019.
  18. IQ Business (2014) Are South African Companies Prepared for POPI? Accountancy SA available at https://www.accountancysa.org.za/influence-are-south-africancompanies-prepared-for-popi/ (accessed 15 September 2019).
  19. Longe, O; Ngwa, O; Wada, F; Mbarika, V (2009). “Criminal Uses of Information & Communication Technologies in Sub-Saharan Africa: Trends, Concerns and Perspectives”. Journal of Information Technology Impact, vol. 9, n. 3, pp. 155–172. Available at <https://www.researchgate.net/profile/Lynette_Kvasny/publication/228876250_Criminal_Uses_of_Information_Communication_Technologies_in_Sub-Saharan_Africa_Trends_Concerns_and_Perspectives/links/00463524215d1ce6c7000000/Criminal-Uses-of-Information-Communication-Technologies-in-Sub-Saharan-Africa-Trends-Concerns-and-Perspectives.pdf>.
  20. O’Keefe v Argus Printing and Publishing (Pty) Ltd 1954 3 SA 247 (C). Second Line of Defence (2018) SANDF Way Ahead: Priorities and Challenges” <https://sldinfo.com/2018/06/sandf-way-ahead-priorities-and-challenges/>. Accessed 13 June 2019.
  21. South Africa Government (2010) Justice Crime Prevention and Security (JCPS) delivery agreement <https://www.gov.za/media-statement-justice-crime-prevention-and-security-jcps-delivery-agreement>. Accessed 14 June 2019.
  22. South African Banking Risk Information Centre (SABRIC) “Annual Crime Stats” (2018) available at <https://www.sabric.co.za/media-and-news/press-releases/sabric-annual-crime-stats-2018/>. Accessed 15 October 2019.
  23. South African Constitution Act 108 of 1996.Google Scholar
  24. South African Cybercrimes Bill [B6B-2017] (2017).Google Scholar
  25. South African Reserve Bank Prudential Authority (2018a) ‘Cloud computing and offshoring of data’ directive D3/2018.Google Scholar
  26. South African Reserve Bank Prudential Authority (2018b) “Guidance Note on computing and offshoring of data.” (D3/2018) available at https://www.resbank.co.za/Publications/Detail-Item-View/Pages/Publications.aspx?sarbweb=3b6aa07d-92ab-441f-b7bfbb7dfb1bedb4&sarblist=21b5222e-7125-4e55-bb65-56fd3333371e&sarbitem=8749 accessed 15 October 2019
  27. South African State Security Agency “National Cybersecurity Policy Framework” (2012) Government Gazette No. 39475. Available at <https://www.gov.za/sites/default/files/gcis_document/201512/39475gon609.pdf>. Accessed 30 September 2019.
  28. Stander, A; Dunnet, A; Rizzo, J. “A Survey of Computer Crime in South Africa”, Proceedings of ISSA 2009 conference, pp. 217-226, (2009).Google Scholar
  29. Sutherland E (2017) Governance of cybersecurity – the case of South Africa. The African Journal of Information and Communication (AJI) 20 at 93.Google Scholar
  30. The Presidency (2018) “10th BRICS Summit: Johannesburg declaration” available at <http://www.thepresidency.gov.za/press-statements/10th-brics-summit%3A-johannesburg-declaration>. Accessed 15 October 2019.
  31. The Presidency (2019) “President appoints commission on Fourth Industrial Revolution” available at http://www.thepresidency.gov.za/pressstatements/president-appoints-commission-fourth-industrial-revolution accessed 15 October 2019.
  32. Tubbs, B. (2014) How companies can gear up for POPI IT Web Financial available at http://www.itweb.co.za/?id=71803:How-companies-can-gear-up-for-POPI (accessed 15 September 2019).Google Scholar

Copyright information

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021

Authors and Affiliations

  1. 1.Pan African Bar Association of South Africa (PABASA)JohannesburgSouth Africa

Personalised recommendations