Technology Law

SEND NUDES

While most people chuckle at the “send nudes” gifs and memes that are an ongoing source of humour on the internet, for some, the tragic reality is that these nudes may ruin their lives.  People in relationships usually trust the person they’re with and could never imagine being betrayed by them.  However, the startling number of “revenge porn” cases evident [...]

That’s how the cookie crumbles…

No, I don’t mean those midnight snacks you’ve been sneaking.  Cookies are small files which are stored on a user's computer.  They are designed to hold a small amount of data specific to a particular user and website that can be accessed either by the web server or the client computer. This allows the server to deliver a page tailored [...]

TEMPTED TO IGNORE THE EU GDPR PRIVACY LAWS? RATHER USE THIS GUIDE TO NAVIGATE THEM

May 25 has come and gone; we are all very aware of the GDPR, the European Union’s new set of data privacy laws. It might be tempting to think that because you’re in SA, these laws don’t affect you or your company, but the EU is serious about its citizens’ privacy and complacency would be a mistake. South African organisations [...]

By | 26th June, 2018|Commercial Law, IT Law, Privacy Law, Technology Law|

Steps to becoming GDPR compliant as a South African Company

There is a plethora of information relating to the necessity of compliance of the General Data Protection Regulation (“GDPR”) , a European Union directive that will come into force on 25 May 2018.  This legislation will fast forward European law into new ways of protecting personal data around the world especially given the advancing of modern technology and its ability [...]

By | 23rd May, 2018|Cybersecurity, IP Law, IT Law, Technology Law|

GDPR: Data Protection Impact Assessments

While there are many similarities between the Protection of Personal Information Act 4 of 2013 (“POPIA”) and the General Data Protection Regulations, (“GDPR”) there are also many differences.  One of these differences is the obligation that GDPR places on organisations to conduct a Data Protection Impact Assessment (“DPIA”). What is a Data Protection Impact Assessment? This is a process that [...]

From crypto currency to crypto contracts

Soon, paying legal fees for a solid, watertight contract will be a thing of the past.  Traditional contracts, painstakingly reviewed by tired eyes for the seventh time, are so 2017.  Smart contracts are the future, and with the rapid development of this technology, it may happen sooner than we think. What are smart contracts? Smart contracts use certain coding and [...]

By | 12th April, 2018|Contract Law, Technology Law|

Lawyer v Machine

In an innovative study, US lawyers in corporate law and contract review went up against a computer to spot issues in five Non-Disclosure Agreements” NDAs”, which are a contractual basis for most business deals. The human contenders were twenty US-trained lawyers, with decades of legal experience ranging from law firms to corporations.  They competed against a LawGeex Artificial Intelligence ‘’AI” [...]

By | 10th April, 2018|Technology Law|

Robot Law Explained

Robot Law is a relatively new and emerging field of law in South Africa. It is rather an exciting field to delve into and includes concepts such as driverless vehicles, drones and everything to do with robots. It is worth mentioning at this point the famous science-fiction writer, Isaac Asimov’s, three fictional laws of robotics being: A robot may not [...]

By | 5th February, 2018|Technology Law|

International Day of Human Space Flight – 12 April

South Africa’s involvement in Space On 7 April 2011, the United Nations General Assembly declared 12 April as the International Day of Human Space Flight.  Its aim is “to celebrate each year at the international level the beginning of the space era for mankind, reaffirming the important contribution of space science and technology in achieving sustainable development goals and increasing [...]

By | 12th April, 2017|PPM Attorneys, Technology Law|

YOU WILL BE BREACHED: TIPS ON LIMITING LEGAL LIABILITY UNDER THE PROTECTION OF PERSONAL INFORMATION ACT

It was reported over the past weekend that 15 computers were stolen in a burglary at the Office of the Chief Justice, in Johannesburg.  The media reported that the computers held the information of 243 South African judges and about 1,800 support staff.  Other important South African state institutions like the state arms procurement company, Armscor, and the South African police [...]