Introduction
The Protection of State Information Bill is a controversial bill passed in early 2010 by the South African government, but was soon called back into analysis. Since then there have been consistent rumours about the bill being passed into law. There are numerous organisations opposed to this bill, and few people who would benefit from it, raising the question of if this bill would signal the end of democracy in South Africa.
Organisations
Right2Know
Right2Know is an activist company founded as an opposition to the Secrecy Bill. It was founded in late August 2010 in Cape Town. It opposes the deterioration of worldwide human rights and portrays themselves as a progressive force which carries the hopes of many. The organisation has assessed the Secrecy Bill according to their seven-point freedom test. There were several concerns regarding the bill, and the key concerns can be seen below.
In their report, Right2Know expresses concern that it is too easy for the minister to extend the number of organisations affected by the bill and that it may extend beyond security of the state, as the government says it would be limited to. They also state that the minister responsible for the extent of the bill may benefit from censorship, allowing the bill to be extended over an unnecessary scale. It also seems, according to this organisation, that information can be classed as “top secret” too readily. They also point out that the bill introduces easy exceptions to the National Archives of South Africa Act 1996, which states that information may not be kept classified for more than twenty years. The panel responsible for granting situations exception has little regulations, effectively canceling out the National Archives of South Af...
... middle of paper ...
...hits back at SARS. The Witness , 1. Pietermaritzburg, KwaZulu Natal, South Africa: The Witness.
Right2Know. (n.d.). History. Retrieved April 24, 2014, from Right2Know: http://www.r2k.org.za/about/history/
Right2Know. (n.d.). Measuring the Bill against R2K's seven-point freedom test.
National Assembly. (2010). Protection of State Information Bill. 28. Pretoria, Gauteng, South Africa: South African Government.
SAHRC. (n.d.). About the SAHRC. Retrieved May 2, 2014, from South African Human Rights Commision: http://www.sahrc.org.za/home/index.php?ipkContentID=1
SAHRC. (2012, February 10). Submission to the D Hoc Committee on Protection of State Information Bill. South Africa: SAHRC.
Turner, T. (2013, December 22). WHAT DOES THE FAX SAY? (North Korean Ylvis The Fox Parody Music Video HD). Retrieved May 4, 2014, from YouTube: https://www.youtube.com/watch?v=pxDgQJBVJxg
Chamberlain, Kenneth, “History: The Day the Freedom of Information Act Expanded”. Nationaljournal.com 20 Nov. 2012 General OneFile. Web 26 April 2014.
Data Protection Act 1998: This is there to control and looks after your personal information. Everyone who uses and is able to access your personal information, there are ru...
...f South African language and culture, acknowledgement of the racial oppression in South Africa, past and present, that it was wrong and positive action is required to make it right, and finally that all South Africans are legitimate and enjoy full moral equality (“About – DA”). In order for all this to be possible, the state must ensure it does not compromise the freedom of the individual (“About – DA”).
Even though the similar rules apply in our civilization, people are still oblivious towards the evidence. The book aims to warn what can happen when government strains its powers because it was advantageous using surveillance for control. We must open our minds and be true to ourselves. By thinking for ourselves rather, we will expectantly prevent such tyranny and surveillance like that in 1984.
Personal data are regulated by United Nations and urges States to implement effective measures to ensure t...
The Freedom of Information Act is used mostly to pry open government files. It was designed to help individuals obtain information about the actions of government. The law proclaims that any citizen is to be given access to government records unless the disclosure involves litigation, the CIA, personal m...
...e administration plans to introduce legislation that would alter the N.S.A’s privacy breaches and end its illegal data collections. Citing an identical argument, that the government cannot indicate terrorist attacks that have been stopped by the intelligence gathering programs, a review group of the Administration “called for major changes to the program; the latter also concluded that the bulk collection is illegal.”3
George Orwell’s Famous book 1984 is about a man who struggles to live under the superintendence of Big Brother. Throughout the novel, Winston struggles with constantly being surveilled and the lack of freedom. Similarly, in our world today, there are government agencies that have the power to listen to phone calls, track people's movements, and watch them through cameras. Winston’s world of surveillance and inadequate confidentiality both privately and publicly is in many aspects much the same as in our world today and the people should demand regulations to be set in place to protect their privacy.
Tomescu, Madalina, and Liliana Trofin. "Identity, Security and Privacy in the Information Society." Contemporary readings in law and social justice 2.2 (2010): 307-12. Print.
...the protection of individuals with regard to the processing of personal data by the Community institutions and bodies and on the free movement of such data. The High Representative shall decide on the implementing rules for the EEAS.”
Bureau of African Affairs. (2011). Background Note: South Africa. Retrieved March 28, 2011, from http://www.state.gov/r/pa/ei/bgn/2898.html
As can be seen, from the information presented, the need for laws and restrictions concerning internet data collection is greatly needed. Moreover, the government can search private citizens data without warrant or cause. Also, companies are not only collecting internet user data but also selling it. The companies and agencies who commit such crimes should be fined or either closed down. In closing, the privacy and security of individuals on the internet should be upheld by the United States government.
Stone, Lieutenant Colonel Evan M. "The Invasion of Privacy Act: The Disclosure of My Information in Your Government File." Widener Law Review 19.2 (2013): 345-385. Academic Search Complete. Web. 6 Apr. 2014.
Unknown Author. An Overview of the Communications Decency Act (CDA). Center for Democracy & Technology. Retrieved 26 April 2004.
Staff, Proquest. At Issue: Technology and Privacy. N.p.: ProQuest LLC, 2013. Web. 5 Dec. 2013. .