Regulation of Interception of Communications and Provision of Communication-related Information Act, 2002

Last updated

The Regulation of Interception of Communications and Provision of Communication-Related Information Act (RICA) is a South African law that regulates the interception of communications and associated processes such as applications for and authorisation of interception of communications. The law came into effect on 22 January 2003 when it was published in the Government Gazette of South Africa number 28075.

Contents

Scope

RICA regulates the interception of communications, the monitoring of radio signals and radio frequency spectrums and the provision of communication-related information information relating to indirect communication in the records of telecommunication service providers. It also regulates applications for interception of communications and provision of communication-related information under certain circumstances. It regulates law enforcement where interception of communications is involved and prohibits the provision of telecommunication services which do not have the capability to be intercepted and requires telecommunication service providers to store communication-related information (CRI). The law specifies costs to be borne by telecommunication service providers related to these requirements and compensation to services providers. It provides for the establishment of interception centres an Office for Interception Centres and an Internet Service Providers Assistance Fund. Lastly it prohibits the manufacturing, assembling, possessing, selling, purchasing or advertising of interception equipment without a certificate of exemption issued by the relevant Minister.

Structure

RICA is not limited to the provisions contained in the Act itself, but is supplemented by a directive, a notice, a schedule and four proclamations. The directive prescribed the technical and security requirements related to the interception and routing of communications and the recordal and storage of CRI. Schedule A of the Directive applies to fixed line telecommunications operators and Schedule B and C applies to mobile cellular providers and Internet service providers respectively. The various types of listed equipment is detailed in the notice while the Schedule lists serious crimes that justify interception. Finally the four proclamations deal with the enforcement dates of the Act. Since its promulgation RICA has been amended four times. Two of these amendments are already in force and two are pending.

Constitutional Conflict

Section 14 of the Bill of Rights in the South African Constitution of 1996 expressly provide that "everyone has a right to privacy, which includes the right not to have (...) (d) the privacy of their communications infringed". The rights in the Bill of Rights may be limited, section 36 of the Constitution. However, various other provisions in the Bill of Rights indirectly imply a right to safety and security. If citizens have a right to security, it creates a corresponding duty on the State. Chapter 11 of the Constitution governs this duty and authorise the Police, Defence Force and Intelligence Agencies to assist the State in its security obligations. Parliament therefore attempted to balance these two conflicting rights by providing for judicial oversight and limiting interception only to those cases where a serious crime is involved.

Duties and Prohibitions

RICA provides for three main types of provisions - duties, prohibitions and procedures. The duties are directed at enabling interception, while the prohibitions are aimed at enforcing the individuals privacy right.

Equality

It is, however, neither privacy nor security that raise the most objections against RICA, but equality concerns. A recent proposed amendment to section 40 provides for preferential treatment of mobile providers by extending the enforcement of cell phone registration indefinitely.

Technological neutrality

Different communications tools and technologies are also not subject to equal treatment in RICA. An email, for example is not subject to the onerous duty that related data (like the time, date, sender and recipient of the email) should be recorded and stored while such duties apply to all telephone and cellular communications.

See also


Related Research Articles

Telephone tapping is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on the telephone line. Legal wiretapping by a government agency is also called lawful interception. Passive wiretapping monitors or records the traffic, while active wiretapping alters or otherwise affects it.

Mass surveillance Intricate surveillance of an entire or a substantial fraction of a population

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organisations, such as organizations like the NSA and the FBI, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is also often distinguished from targeted surveillance.

Health Insurance Portability and Accountability Act United States federal law concerning health information

The Health Insurance Portability and Accountability Act of 1996 was enacted by the 104th United States Congress and signed by President Bill Clinton in 1996. It was created primarily to modernize the flow of healthcare information, stipulate how Personally Identifiable Information maintained by the healthcare and healthcare insurance industries should be protected from fraud and theft, and address limitations on healthcare insurance coverage.

Email marketing is the act of sending a commercial message, typically to a group of people, using email. In its broadest sense, every email sent to a potential or current customer could be considered email marketing. It usually involves using email to send advertisements, request business, or solicit sales or donations, and is meant to build loyalty, trust, or brand awareness. Marketing emails can be sent to a purchased lead list or a current customer database. The term usually refers to sending email messages with the purpose of enhancing a merchant's relationship with current or previous customers, encouraging customer loyalty and repeat business, acquiring new customers or convincing current customers to purchase something immediately, and sharing third-party ads.

Lawful interception (LI) refers to the facilities in telecommunications and telephone networks that allow law enforcement agencies with court orders or other legal authorization to selectively wiretap individual subscribers. Most countries require licensed telecommunications operators to provide their networks with Legal Interception gateways and nodes for the interception of communications. The interfaces of these gateways have been standardized by telecommunication standardization organizations.

Fundamental Rights, Directive Principles and Fundamental Duties of India Rights provided to Indian citizens

The Fundamental Rights, Directive Principles of State Policy and Fundamental Duties are sections of the Constitution of India that prescribe the fundamental obligations of the states to its citizens and the duties and the rights of the citizens to the State. These sections comprise a constitutional bill of rights for government policy-making and the behaviour and conduct of citizens. These sections are considered vital elements of the constitution, which was developed between 1947 and 1949 by the Constituent Assembly of India.

Email privacy is a broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user computer. In countries with a constitutional guarantee of the secrecy of correspondence, whether email can be equated with letters and has legal protection from all forms of eavesdropping comes under question because of the very nature of email. This is especially important as relatively more communication occurs via email compared to via postal mail.

Information privacy law or data protection laws prohibit the disclosure or misuse of information about private individuals. Over 80 countries and independent territories, including nearly every country in Europe and many in Latin America and the Caribbean, Asia, and Africa, have now adopted comprehensive data protection laws. The European Union has the General Data Protection Regulation, in force since May 25, 2018. The United States is notable for not having adopted a comprehensive information privacy law, but rather having adopted limited sectoral laws in some areas.

Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements; although sometimes interchangeable, not to be confused with the Data Protection Act 1998.

Secrecy of correspondence legal right in some European countries

The secrecy of correspondence or literally translated as secrecy of letters, is a fundamental legal principle enshrined in the constitutions of several European countries. It guarantees that the content of sealed letters is never revealed, and letters in transit are not opened by government officials, or any other third party. It is the main legal basis for the assumption of privacy of correspondence.

Privacy law refers to the laws that deal with the regulation, storing, and using of personally identifiable information of individuals, which can be collected by governments, public or private organisations, or other individuals.

Privacy and Electronic Communications Directive 2002/58/EC on Privacy and Electronic Communications, otherwise known as ePrivacy Directive (ePD), is an EU directive on data protection and privacy in the digital age. It presents a continuation of earlier efforts, most directly the Data Protection Directive. It deals with the regulation of a number of important issues such as confidentiality of information, treatment of traffic data, spam and cookies. This Directive has been amended by Directive 2009/136, which introduces several changes, especially in what concerns cookies, that are now subject to prior consent.

The Telecoms Package was the review of the European Union Telecommunications Framework from 2007 – 2009. The objective of the review was to update the EU Telecoms Framework of 2002 and to create a common set of regulations for the telecoms industry across all 27 EU member states. The review consisted of a package of directives addressing the regulation of service provision, access, interconnection, users' contractual rights and users' privacy, as well as a regulation creating a new European regulatory body (BEREC).

Privacy law in Denmark is supervised and enforced by the independent agency Datatilsynet based mainly upon the Act on Processing of Personal Data.

Central Monitoring System Internet monitoring effort from the Indian government

The Central Monitoring System, abbreviated to CMS, is a centralized telephone interception provisioning system installed by the Centre for Development of Telematics (C-DOT), an Indian Government owned telecommunications technology development centre, and operated by Telecom Enforcement Resource and Monitoring (TERM) Cells. The CMC system is going to be set up in each major state collocated with the TERM Cells. Telecom operators in India are required by law to give access to their networks to law enforcement agencies.

Magna Carta for Philippine Internet Freedom internet law bill filed in the Philippine legislature in 2012

The Magna Carta for Philippine Internet Freedom is an internet law bill filed in the Philippine legislature. The bill contains provisions promoting civil and political rights and Constitutional guarantees for Philippine internet users, such as freedom of expression, as well as provisions on information and communications technology (ICT) policy, ICT4D, internet governance, e-governance, cybersecurity, cyberwarfare, cyberterrorism, and cybercrime.

Mass surveillance in the United Kingdom

The use of electronic surveillance by the United Kingdom grew from the development of signal intelligence and pioneering code breaking during World War II. In the post-war period, the Government Communications Headquarters (GCHQ) was formed and participated in programmes such as the Five Eyes collaboration of English-speaking nations. This focused on intercepting electronic communications, with substantial increases in surveillance capabilities over time. A series of media reports in 2013 revealed bulk collection and surveillance capabilities, including collection and sharing collaborations between GCHQ and the United States' National Security Agency. These were commonly described by the media and civil liberties groups as mass surveillance. Similar capabilities exist in other western European countries, such as France.

Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015 Australian law

The Telecommunications Amendment Act 2015 is an Australian law that amends the Telecommunications Act 1979 and the Telecommunications Act 1997 to introduce a statutory obligation for Australian telecommunication service providers to retain, for a period of two years, particular types of telecommunications data (metadata) and introduces certain reforms to the regimes applying to the access of stored communications and telecommunications data under the TIA Act.

Human rights and encryption

Human rights applied to encryption is an important concept for freedom of expression as encryption is a technical resource of implementation of basic human rights.

Journalists rely on source protection to gather and reveal information in the public interest from confidential sources. Such sources may require anonymity to protect them from physical, economic or professional reprisals in response to their revelations. There is a strong tradition of legal source protection internationally, in recognition of the function that confidential sources play in facilitating 'watchdog' or 'accountability' journalism. While professional journalistic practice entails multi-sourcing, verification and corroboration, confidential sources are a key component of this practice. Without confidential sources, many acts of investigative story-telling—from Watergate to the major 2014 investigative journalism project Offshore Leaks undertaken by the International Consortium of Investigative Journalists (ICIJ)—may never have surfaced. Even reporting that involves gathering opinions in the streets, or a background briefing often relies on trust that a journalist respects confidentiality where this is requested.