Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Components price shock hitting South African PC buyers hard

      Components price shock hitting South African PC buyers hard

      1 March 2026
      US cybersecurity giant invests big in South Africa - Helmut Reisinger

      US cybersecurity giant invests big in South Africa

      1 March 2026
      World braces for an oil price shock

      World braces for an oil price shock

      1 March 2026
      MTN Nigeria in dramatic full-year turnaround - Karl Toriola

      MTN Nigeria in dramatic full-year turnaround

      27 February 2026
      Provinces ordered to enforce ban on online casinos

      Provinces ordered to enforce ban on online casinos

      27 February 2026
    • World
      OpenAI secures $840-billion valuation in latest funding round

      OpenAI secures $840-billion valuation in latest funding round

      1 March 2026

      Stripe mulling bid for PayPal: report

      25 February 2026
      Xbox chief Phil Spencer retires from Microsoft

      Xbox chief Phil Spencer retires from Microsoft

      22 February 2026
      Prominent Southern African journalist targeted with Predator spyware

      Prominent Southern African journalist targeted with Predator spyware

      18 February 2026
      More drama in Warner Bros tug of war

      More drama in Warner Bros tug of war

      17 February 2026
    • In-depth
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
    • TCS
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E4: ‘We drive an electric Uber’

      10 February 2026
      TCS+ | How Cloud On Demand is helping SA businesses succeed in the cloud - Xhenia Rhode, Dion Kalicharan

      TCS+ | Cloud On Demand and Consnet: inside a real-world AWS partner success story

      30 January 2026
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E3: ‘BYD’s Corolla Cross challenger’

      30 January 2026
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E2: ‘China attacks, BMW digs in, Toyota’s sublime supercar’

      23 January 2026

      TCS+ | Why cybersecurity is becoming a competitive advantage for SA businesses

      20 January 2026
    • Opinion
      The AI fraud crisis your bank is not ready for - Andries Maritz

      The AI fraud crisis your bank is not ready for

      18 February 2026
      A million reasons monopolies don't work - Duncan McLeod

      A million reasons monopolies don’t work

      10 February 2026
      The author, Business Leadership South Africa CEO Busi Mavuso

      Eskom unbundling U-turn threatens to undo hard-won electricity gains

      9 February 2026
      South Africa's skills advantage is being overlooked at home - Richard Firth

      South Africa’s skills advantage is being overlooked at home

      29 January 2026
      Why Elon Musk's Starlink is a 'hard no' for me - Songezo Zibi

      Why Elon Musk’s Starlink is a ‘hard no’ for me

      26 January 2026
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » In-depth » Rica erodes your right to privacy

    Rica erodes your right to privacy

    By Jane Duncan28 November 2014
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    eye-640

    The right to privacy has been making big news globally. In the wake of US whistleblower Edward Snowden’s revelations, more people have been clamouring for stronger privacy protections. So why has there been so little debate about the state of this right in South Africa? Is it because there is nothing to be concerned about here?

    In fact, the right is under attack in South Africa, too, but local outrage is muted. Some sceptics have argued that the only people who have anything to fear are those who have something to hide — but the problem with privacy is that you never know when you may need it. Privacy violations are also irreversible; when the wrong people access your personal data and misuse it, they cannot unlearn what they have learnt.

    In the North, the focus has been on the privacy-eroding nature of mass surveillance. Citizens appear to have concluded that targeted, lawful surveillance is the least of their worries, as this practice is already highly regulated. As a result, they are focusing on legal controls of mass surveillance and technical solutions such as mass encryption.

    Governmental mass surveillance champions have argued that this practice does not violate privacy as the initial data mining is undertaken by computers, not humans. This argument is flawed, as people have a right to control who or what has access to their personal data.

    By allowing governments to search and seize their data — practices that should require reasonable suspicion of guilt and a targeted warrant — users lose control of their data, which damages collective privacy rights. It is only a matter of time before some court declares mass surveillance unconstitutional, as the practice is disproportionate to the aim of ensuring national security. And, in any event, a coherent case for mass surveillance still has to be made.

    Yet in South Africa, even targeted surveillance — which is regulated in terms of the Regulation of Interception of Communications Act (Rica) — does not protect privacy adequately. Even worse, the available evidence points to mass surveillance being, to all intents and purposes, unregulated. Snowden has shown that, where there is a lack of accountability, abuses will inevitably follow.

    One of Rica’s most serious weaknesses is that no one is ever informed that their communications have been intercepted, even after the investigation is complete — the authorities are given a power that is largely hidden from the public eye.

    In the US, to protect the rights of the people under surveillance in criminal matters, a judge must ensure that the person whose communications were intercepted is informed about the court order within 90 days of its termination. In Canada, the lack of “after the fact” notification has been declared unconstitutional.

    The grounds for issuing interception directions in terms of Rica are speculative. Directions may be issued in relation to serious offences that may be committed in future, which may not be constitutional. The designated judge’s report is threadbare, which makes it impossible to assess whether the Act is actually being used for pressing public purposes (a requirement for practices that violate privacy). For instance, no information is provided about how many interception directions have led to arrests and convictions.

    The granting of Rica directions is also an inherently one-sided process, which means that the judge has to take the information that is given to him or her on trust. No ombudsman is present to represent users’ interests. As a result, the process lacks an adversarial component, which also predisposes it to abuse.

    Rica requires cellphone users to register their names and addresses when buying a Sim card. Many democracies don’t require their citizens to do so, because it is a de facto violation of the right to privacy. They look with horror at countries such as South Africa, and ask why its citizens simply go and register their Sim cards unquestioningly like sheep and risk having their personal information misused by unaccountable authorities. The available evidence points to Sim card registration being useless as a crime-fighting tool, as criminals merely acquire preregistered Sim cards.

    Rica is silent on whether it regulates foreign signals intelligence (or intelligence gathered from communications passing across South Africa’s borders), and the government has maintained that it does not. This leaves foreign communications data wide open to abuse, especially given the global nature of cloud computing.

    Other countries have instituted special courts for these activities. Yet, typically, these courts lack transparency and accountability. They also tend to subject nonnationals to lower levels of privacy protections than nationals, which is discriminatory. The law that governs monitoring and surveillance of nationals should apply to non-nationals too.

    South Africans should be particularly concerned about the lack of regulation for foreign signals intelligence, as the centre that has undertaken this form of surveillance has also housed the country’s mass surveillance capacity (and probably still does). This was confirmed by the inspector general of intelligence in 2005, who found that the country’s bulk scanning facilities had been used to keep citizens under surveillance during the country’s bruising presidential succession battle.

    So, the organ of state that has the greatest potential for mass surveillance is also the one that is least regulated by law. This capacity is so intrusive that its use should be authorised by primary legislation. South Africa’s case for mass surveillance is likely to be even weaker than countries such as the US, given that the country faces no major terrorist threats to national security.

    sims-640
    Under Rica, South Africans have to register their Sim cards

    Wikileaks has revealed how South Africa manufactured and exported mass surveillance technology, including to authoritarian regimes such as Muammar Gaddafi’s Libya. Privacy International has also publicised the fact that the government has provided funding to local company Vastech for rights-violating technology dressed up as a public good, and that this problem has not been addressed with export controls.

    It is also important that communications network operators speak out against abusive practices. To this end, more companies abroad are beginning to issue transparency reports detailing government spying.

    But South Africans cannot rely on local companies to blow the whistle on dodgy surveillance practices. Although Rica forbids companies from saying anything about these practices, there is no evidence of companies pushing back and challenging the lawfulness of this clearly over-broad gag. Passing the buck and blaming the government for secrecy is simply too easy.

    Little has been made of the implications of other privacy insensitive technologies, too, such as the e-tolling system in Gauteng. Road users should have a right to travel to their chosen destination without having their locational privacy violated, which is perfectly possible in more dynamic systems.

    The government intends bio­metrics to be the technology of choice in its transactions with citizens. It is establishing centralised biometric databases for its social security system and identity cards, in spite of the major concerns globally about the integrity of such databases. Now, legislation authorising surveillance drones is also being considered, but if past precedents are anything to go by, the privacy implications may not receive a grilling.

    South Africa has globalised national security worst practices in the digital space, but it is failing to globalise best practices. The upcoming review of intelligence policy provides the country with an opportunity to revisit some of the questionable practices it allowed to slip through the first time round.

    Also, a largely excellent Protection of Personal Information Act may offer some respite, and an information regulator is being set up to enforce peoples’ data rights. Only time will tell, though, whether it is an effective watchdog or a lame duck. The regulator will have its work cut out for it in the coming years, as so many privacy eroding measures have already been introduced.

    South Africans have been sleepwalking through many privacy issues that have made people elsewhere take to the streets in protest. The country needs a dedicated privacy champion in civil society, in the way that it has for freedom of expression or access to information. The issues are specialist and global in nature, but they also require a locally rooted mass movement that pushes back against privacy erosions.

    Giving up personal liberties for security is a false and dangerous trade-off that no one should make, as they are likely to achieve neither freedom nor security.

    • Jane Duncan teaches at the University of Johannesburg. Her book, The Rise of the Securocrats, has just been published by Jacana
    • This column was first published in the Mail & Guardian, the smart news source
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Edward Snowden Jane Duncan
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticlePayPal brings US e-commerce sites to SA
    Next Article Phonefinder profits from complexity

    Related Posts

    How to stop the abuse of South Africa's intelligence agencies

    How to stop the abuse of South Africa’s intelligence agencies

    25 July 2024

    Edward Snowden warns of AI ‘werewolves’

    5 June 2024
    South Africa's proposed new spying law is deeply flawed

    South Africa’s proposed new spying law is deeply flawed

    9 February 2024
    Company News
    Galaxy S26 brings proactive AI, pro-grade video and a privacy breakthrough

    Galaxy S26 brings proactive AI, pro-grade video and a privacy breakthrough

    27 February 2026
    Cell C to SMEs: We'll be your partner, not just a provider - Cell C Business

    Cell C to SMEs: We’ll be your partner, not just a provider

    27 February 2026
    The data sovereignty paradox - Altron Digital Business

    The data sovereignty paradox

    27 February 2026
    Opinion
    The AI fraud crisis your bank is not ready for - Andries Maritz

    The AI fraud crisis your bank is not ready for

    18 February 2026
    A million reasons monopolies don't work - Duncan McLeod

    A million reasons monopolies don’t work

    10 February 2026
    The author, Business Leadership South Africa CEO Busi Mavuso

    Eskom unbundling U-turn threatens to undo hard-won electricity gains

    9 February 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Components price shock hitting South African PC buyers hard

    Components price shock hitting South African PC buyers hard

    1 March 2026
    US cybersecurity giant invests big in South Africa - Helmut Reisinger

    US cybersecurity giant invests big in South Africa

    1 March 2026
    OpenAI secures $840-billion valuation in latest funding round

    OpenAI secures $840-billion valuation in latest funding round

    1 March 2026
    World braces for an oil price shock

    World braces for an oil price shock

    1 March 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}