E-Commerce Law – Key Concepts Review

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/34

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

35 Terms

1
New cards

Under South African law, copyright protects the __ of ideas, not the ideas themselves.

expression

2
New cards

For copyright to subsist, a work must be __, fixed in material form, and created by a qualified author.

original

3
New cards

Copyright in South Africa arises __; there is no need for registration.

automatically

4
New cards

The principal statute governing copyright in South Africa is the __ Act 98 of 1978.

Copyright

5
New cards

Copyright holders enjoy the exclusive right to __ (i.e., reproduce) their works.

copy

6
New cards

Sound recordings enjoy protection for __ years from publication or the author’s death (whichever applies).

50

7
New cards

Computer programs are protected as __ works under the Copyright Act.

literary

8
New cards

The international treaty that requires automatic protection and national treatment is the __ Convention.

Berne

9
New cards

Digital Rights Management (DRM) technologies are intended to combat online copyright infringement caused by easy __ and sharing.

copying

10
New cards

Primary infringement occurs when a person directly performs an act reserved for the __ holder.

copyright

11
New cards

Helping others to infringe copyright (e.g., selling pirate copies) is called __ infringement.

secondary

12
New cards

The South African case that confirmed software copying without consent is infringement is __ v Brewers Marketing (2006).

Haupt

13
New cards

A hyperlink that bypasses a paywall or DRM may be infringing because it defeats the copyright owner’s __ controls.

access

14
New cards

In __ v Microsoft, deep-linking and framing were challenged as potential copyright infringements.

Ticketmaster

15
New cards

The unauthorised display of another website’s content inside your own frame is known as __.

framing

16
New cards

According to POPIA, any operation involving personal information, including collection or destruction, is called __.

processing

17
New cards

A person to whom personal information relates is called the __ in both the ECT Act and POPIA.

data subject

18
New cards

The entity that determines the purpose and means of processing personal data is the __ (also “responsible party”).

data controller

19
New cards

A person or organisation that processes data on behalf of a controller is termed a __.

data processor

20
New cards

Unsolicited electronic communications promoting goods or services are generally referred to as __.

spam

21
New cards

Highly sensitive personal data such as race, health or biometric data is classified in POPIA as __ personal information.

special

22
New cards

Processing operations that pose greater privacy risks, like cross-border transfers or profiling, are called __ processing activities.

special

23
New cards

Monitoring or recording communications without at least one party’s knowledge is defined as __ under RICA.

interception

24
New cards

Section 14 of the Constitution protects the right to __, including freedom from search and seizure and communication interference.

privacy

25
New cards

The leading privacy case that formulated a test of ‘legitimate expectation’ is __ v Bester (1996).

Bernstein

26
New cards

The common-law delict protecting reputation against false statements is __.

defamation

27
New cards

For defamation, publication must reach at least __ other person.

one

28
New cards

In __ v Touchline Media, sending an email satisfied the publication requirement for defamation.

Tsichlas

29
New cards

Speech that advocates hatred and incites harm on prohibited grounds is excluded from protection under Section __(2)(c) of the Constitution.

16

30
New cards

The statute chiefly prohibiting hate speech in South Africa is __ (abbreviation).

PEPUDA

31
New cards

Victims of hate speech may seek remedies such as apologies or damages in the __ Court.

Equality

32
New cards

The 2019 amendment to the Films and Publications Act criminalises sharing intimate images without __.

consent

33
New cards

Under the Cybercrimes Act, distributing an intimate image without permission is an offence that can attract up to __ years’ imprisonment.

2

34
New cards

Sexting between minors is treated as __ pornography under section 24B(2) of the FPA.

child

35
New cards

Internet Service Providers