Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      South Africa's AI policy is a bureaucrat's dream - Solly Malatsi

      South Africa’s draft AI policy is a bureaucrat’s dream

      10 April 2026
      Big Tech is going nuclear

      Big Tech is going nuclear

      10 April 2026
      5G expected to reshape South Africa's wireless broadband market

      5G expected to reshape South Africa’s wireless broadband market

      10 April 2026
      Warning that South Africa's digital competitiveness is in retreat

      Warning that South Africa’s digital competitiveness is in retreat

      10 April 2026
      South Africa's biggest banks are lining up behind Optasia - Salvador Anglada

      South Africa’s biggest banks are lining up behind Optasia

      10 April 2026
    • World
      Anthropic mulls building its own AI chips

      Anthropic mulls building its own AI chips

      10 April 2026
      DeepSeek V4 to run on Huawei silicon as China builds its own AI stack

      DeepSeek V4 to run on Huawei silicon as China builds its own AI stack

      4 April 2026
      Amazon in talks to buy satellite operator Globalstar

      Amazon in talks to buy satellite operator Globalstar

      2 April 2026

      Apple plans to open Siri to rival AI services

      27 March 2026
      It's official: ads are coming to ChatGPT

      It’s official: ads are coming to ChatGPT

      23 March 2026
    • In-depth
      Africa switches on as Europe dims the lights

      Africa switches on as Europe dims the lights

      9 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
      The R18-billion tech giant hiding in plain sight - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
    • TCS
      TCS+ | Vodacom Business moves to crack the SME tech gap - Andrew Fulton, Sannesh Beharie

      TCS+ | Vodacom Business moves to crack the SME tech gap

      7 April 2026
      TCS | MTN's Divysh Joshi on the strategy behind Pi - Divyesh Joshi

      TCS | MTN’s Divyesh Joshi on the strategy behind Pi

      1 April 2026
      Anoosh Rooplal

      TCS | Anoosh Rooplal on the Post Office’s last stand

      27 March 2026
      Meet the CIO | HealthBridge CTO Anton Fatti on the future of digital health

      Meet the CIO | Healthbridge CTO Anton Fatti on the future of digital health

      23 March 2026
      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses - Clare Loveridge and Jason Oehley

      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses

      19 March 2026
    • Opinion
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      R230-million in the bag for Endeavor's third Harvest Fund - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » In-depth » Rica erodes your right to privacy

    Rica erodes your right to privacy

    By Jane Duncan28 November 2014
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    eye-640

    The right to privacy has been making big news globally. In the wake of US whistleblower Edward Snowden’s revelations, more people have been clamouring for stronger privacy protections. So why has there been so little debate about the state of this right in South Africa? Is it because there is nothing to be concerned about here?

    In fact, the right is under attack in South Africa, too, but local outrage is muted. Some sceptics have argued that the only people who have anything to fear are those who have something to hide — but the problem with privacy is that you never know when you may need it. Privacy violations are also irreversible; when the wrong people access your personal data and misuse it, they cannot unlearn what they have learnt.

    In the North, the focus has been on the privacy-eroding nature of mass surveillance. Citizens appear to have concluded that targeted, lawful surveillance is the least of their worries, as this practice is already highly regulated. As a result, they are focusing on legal controls of mass surveillance and technical solutions such as mass encryption.

    Governmental mass surveillance champions have argued that this practice does not violate privacy as the initial data mining is undertaken by computers, not humans. This argument is flawed, as people have a right to control who or what has access to their personal data.

    By allowing governments to search and seize their data — practices that should require reasonable suspicion of guilt and a targeted warrant — users lose control of their data, which damages collective privacy rights. It is only a matter of time before some court declares mass surveillance unconstitutional, as the practice is disproportionate to the aim of ensuring national security. And, in any event, a coherent case for mass surveillance still has to be made.

    Yet in South Africa, even targeted surveillance — which is regulated in terms of the Regulation of Interception of Communications Act (Rica) — does not protect privacy adequately. Even worse, the available evidence points to mass surveillance being, to all intents and purposes, unregulated. Snowden has shown that, where there is a lack of accountability, abuses will inevitably follow.

    One of Rica’s most serious weaknesses is that no one is ever informed that their communications have been intercepted, even after the investigation is complete — the authorities are given a power that is largely hidden from the public eye.

    In the US, to protect the rights of the people under surveillance in criminal matters, a judge must ensure that the person whose communications were intercepted is informed about the court order within 90 days of its termination. In Canada, the lack of “after the fact” notification has been declared unconstitutional.

    The grounds for issuing interception directions in terms of Rica are speculative. Directions may be issued in relation to serious offences that may be committed in future, which may not be constitutional. The designated judge’s report is threadbare, which makes it impossible to assess whether the Act is actually being used for pressing public purposes (a requirement for practices that violate privacy). For instance, no information is provided about how many interception directions have led to arrests and convictions.

    The granting of Rica directions is also an inherently one-sided process, which means that the judge has to take the information that is given to him or her on trust. No ombudsman is present to represent users’ interests. As a result, the process lacks an adversarial component, which also predisposes it to abuse.

    Rica requires cellphone users to register their names and addresses when buying a Sim card. Many democracies don’t require their citizens to do so, because it is a de facto violation of the right to privacy. They look with horror at countries such as South Africa, and ask why its citizens simply go and register their Sim cards unquestioningly like sheep and risk having their personal information misused by unaccountable authorities. The available evidence points to Sim card registration being useless as a crime-fighting tool, as criminals merely acquire preregistered Sim cards.

    Rica is silent on whether it regulates foreign signals intelligence (or intelligence gathered from communications passing across South Africa’s borders), and the government has maintained that it does not. This leaves foreign communications data wide open to abuse, especially given the global nature of cloud computing.

    Other countries have instituted special courts for these activities. Yet, typically, these courts lack transparency and accountability. They also tend to subject nonnationals to lower levels of privacy protections than nationals, which is discriminatory. The law that governs monitoring and surveillance of nationals should apply to non-nationals too.

    South Africans should be particularly concerned about the lack of regulation for foreign signals intelligence, as the centre that has undertaken this form of surveillance has also housed the country’s mass surveillance capacity (and probably still does). This was confirmed by the inspector general of intelligence in 2005, who found that the country’s bulk scanning facilities had been used to keep citizens under surveillance during the country’s bruising presidential succession battle.

    So, the organ of state that has the greatest potential for mass surveillance is also the one that is least regulated by law. This capacity is so intrusive that its use should be authorised by primary legislation. South Africa’s case for mass surveillance is likely to be even weaker than countries such as the US, given that the country faces no major terrorist threats to national security.

    sims-640
    Under Rica, South Africans have to register their Sim cards

    Wikileaks has revealed how South Africa manufactured and exported mass surveillance technology, including to authoritarian regimes such as Muammar Gaddafi’s Libya. Privacy International has also publicised the fact that the government has provided funding to local company Vastech for rights-violating technology dressed up as a public good, and that this problem has not been addressed with export controls.

    It is also important that communications network operators speak out against abusive practices. To this end, more companies abroad are beginning to issue transparency reports detailing government spying.

    But South Africans cannot rely on local companies to blow the whistle on dodgy surveillance practices. Although Rica forbids companies from saying anything about these practices, there is no evidence of companies pushing back and challenging the lawfulness of this clearly over-broad gag. Passing the buck and blaming the government for secrecy is simply too easy.

    Little has been made of the implications of other privacy insensitive technologies, too, such as the e-tolling system in Gauteng. Road users should have a right to travel to their chosen destination without having their locational privacy violated, which is perfectly possible in more dynamic systems.

    The government intends bio­metrics to be the technology of choice in its transactions with citizens. It is establishing centralised biometric databases for its social security system and identity cards, in spite of the major concerns globally about the integrity of such databases. Now, legislation authorising surveillance drones is also being considered, but if past precedents are anything to go by, the privacy implications may not receive a grilling.

    South Africa has globalised national security worst practices in the digital space, but it is failing to globalise best practices. The upcoming review of intelligence policy provides the country with an opportunity to revisit some of the questionable practices it allowed to slip through the first time round.

    Also, a largely excellent Protection of Personal Information Act may offer some respite, and an information regulator is being set up to enforce peoples’ data rights. Only time will tell, though, whether it is an effective watchdog or a lame duck. The regulator will have its work cut out for it in the coming years, as so many privacy eroding measures have already been introduced.

    South Africans have been sleepwalking through many privacy issues that have made people elsewhere take to the streets in protest. The country needs a dedicated privacy champion in civil society, in the way that it has for freedom of expression or access to information. The issues are specialist and global in nature, but they also require a locally rooted mass movement that pushes back against privacy erosions.

    Giving up personal liberties for security is a false and dangerous trade-off that no one should make, as they are likely to achieve neither freedom nor security.

    • Jane Duncan teaches at the University of Johannesburg. Her book, The Rise of the Securocrats, has just been published by Jacana
    • This column was first published in the Mail & Guardian, the smart news source
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Edward Snowden Jane Duncan
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticlePayPal brings US e-commerce sites to SA
    Next Article Phonefinder profits from complexity

    Related Posts

    How to stop the abuse of South Africa's intelligence agencies

    How to stop the abuse of South Africa’s intelligence agencies

    25 July 2024

    Edward Snowden warns of AI ‘werewolves’

    5 June 2024
    South Africa's proposed new spying law is deeply flawed

    South Africa’s proposed new spying law is deeply flawed

    9 February 2024
    Company News
    Vertiv AI Innovation Roadshow returns to Africa as virtual event

    Vertiv AI Innovation Roadshow returns to Africa as virtual event

    10 April 2026
    What South African parents look for in an online school - CambriLearn

    What South African parents look for in an online school

    9 April 2026
    Modernising legacy systems - without the downtime - BBD Software

    Modernising legacy systems – without the downtime

    9 April 2026
    Opinion
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    South Africa's AI policy is a bureaucrat's dream - Solly Malatsi

    South Africa’s draft AI policy is a bureaucrat’s dream

    10 April 2026
    Big Tech is going nuclear

    Big Tech is going nuclear

    10 April 2026
    5G expected to reshape South Africa's wireless broadband market

    5G expected to reshape South Africa’s wireless broadband market

    10 April 2026
    Warning that South Africa's digital competitiveness is in retreat

    Warning that South Africa’s digital competitiveness is in retreat

    10 April 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}