Close This website uses modern features that are not supported by your browser. Click here for more information.
Please upgrade to a modern browser to view this website properly. Google Chrome Mozilla Firefox Opera Safari
your legal news hub
Sub Menu
Search

Search

Filter
Filter
Filter
A A A

OSS and cryptography regulations

Publish date: 29 September 2004
Issue Number: 1049
Diary: Legalbrief eLaw
Category: Labour

Draft Cryptography Regulations, released on September 1 by the Department of Communications, are available for comment. In a Tectonic report, Morgan Collett writes that while it had been hoped that these would further define what entities would need to register in terms of the Electronic Communications and Transactions Act as either providers of cryptography services or products, the issue of how open source software fits into the regulations remains unclear.

In terms of the ECT Act nobody may provide cryptography products in SA without registering with the government. In addition, all providers need to provide the government with a list of contact details of customers to whom a cryptography product was delivered, sold, made available or distributed to directly or a service was rendered in the preceding six months’, which is updated every six months. Collett notes that open source cryptography software packages can be distributed in a variety of different ways and this can be done anonymously via download or even P2P networks. According to the report, unless these issues can be resolved, open source cryptography software may fall into a legal grey area. Full report on the Tectonic site

We use cookies to give you a personalised experience that suits your online behaviour on our websites. Otherwise, you may click here to learn more, or learn how to block or disable cookies. Disabling cookies might cause you to experience difficulties on our website as some functionality relies on cookie information. You can change your mind at any time by visiting “Cookie Preferences”. Any personal data about you will be used as described in our Privacy Policy.