Uploaded by Ndangi Amunyela

A legal perspective regarding internet freedom and privacy in Namibia

advertisement
A legal perspective regarding internet freedom and privacy in Namibia
by
Ndangi Amunyela
201714101
A proposal submitted in partial fulfilment of the requirements for the LLB Research
Project
LLB Honors Degree
in the
FACULTY OF LAW
at the
UNIVERSITY OF NAMIBIA
Supervisor: Dr Tapiwa V Warikandwa
Abstract
This research paper analyses internet privacy and internet freedom in Namibia. The
amount of privacy protection an individual enjoys while connected to the Internet is
referred to as Internet privacy. It refers to the level of internet security for personal
and financial information, conversations, and preferences. It explains the
development of privacy from its inception to the modern day. This paper also looks at
various legislation regarding internet privacy such as the European GDPR and the
South African POPIA and compare it to existing and seek to compare it with
Namibian legislation. This paper addresses the evolution of the internet through
social media and the advent of social networking. Finally, this paper looks at internet
freedom and access to the internet in Namibia. It also looks at the various attacks on
the principles of internet by the Namibian legislature and gives policy
recommendations.
Acknowledgments
First and foremost, I'd want to express my gratitude to my supervisor, Dr Tapiwa
Warikandwa, whose guidance was vital in developing the research questions and
methodology. Your informative remarks encouraged me to improve my thoughts and
raise the quality of my work.
In addition, I'd want to express my gratitude to my parents, Peneyambeko Amunyela
and Usko Amunyela, who provided sound advice and intriguing talks as well as
sympathetic ear. You are always willing to help me.
Declaration
I, the undersigned, hereby declare that this study is a true reflection of my own
research and that this work, or part thereof, has not been submitted for a degree in
any other institution of higher education. No part of this thesis may be reproduced,
stored in any retrieval system, or transmitted in any form, or by any means (e.g.,
electronic, mechanical, photocopying, recording or otherwise) without the prior
permission of the author, or the University of Namibia, in that behalf. I, the
undersigned, grant the University of Namibia the right to reproduce this thesis in
whole or in part, in any manner or format, which the University may deem fit, for any
person or institution requiring it for study and research; provided that the University
of Namibia shall waive this right if the whole thesis has been or is being published in
a manner satisfactory to the University.
Amunyela
Ndangi Amunyela
08 November 2021
Date
Supervisor’s certificate
I, Doctor Tapiwa Warikandwa hereby certify that the research and writing of this
study was carried out under my supervision.
____________________
_______________________
Doctor Tapiwa Warikandwa
Date
Dedication
I am dedicating this paper to my late Father Usko Amunyela who passed away this
year on 1 July 2021. He was one of my greatest inspirations in my life and even
though he will not be able to see me graduate I would like to honour him with this
thesis study.
Table of Contents
................................................................................................................................................................ 1
Abstract ................................................................................................................................................... 2
Acknowledgments................................................................................................................................... 3
DECLARATION ......................................................................................................................................... 4
Supervisor’s certificate ........................................................................................................................... 5
Dedication ............................................................................................................................................... 6
Table of Contents .................................................................................................................................... 7
Chapter 1................................................................................................................................................. 9
1
Introduction and Background to the study ................................................................................. 9
1.1
Introduction ........................................................................................................................ 9
1.2
Statement of Problem ....................................................................................................... 10
1.3
Significance of Research.................................................................................................... 13
1.4
Research questions ........................................................................................................... 13
1.5
Hypothesis......................................................................................................................... 14
1.6
Theoretical Framework ..................................................................................................... 14
1.7
Literature Review .............................................................................................................. 15
1.8
Research Methodology ..................................................................................................... 17
1.9
Limitations of study........................................................................................................... 17
1.10
Chapter outline ................................................................................................................. 17
1.11
Ethical Considerations....................................................................................................... 18
Chapter 2............................................................................................................................................... 19
2
The development of the right to privacy .................................................................................. 19
2.1
Introduction ...................................................................................................................... 19
2.2
Historical development of Privacy Law ............................................................................. 20
2.3
Conventions and Declarations on the right to Privacy and Data Protection .................... 24
2.4
Conclusion ......................................................................................................................... 29
Chapter 3............................................................................................................................................... 29
3
Comparison of Namibian Privacy law legislation with other Jurisdictions ............................... 29
3.1
Introduction ...................................................................................................................... 29
3.2
Data Protection Laws in the Republic of South Africa ...................................................... 30
3.3
European Data protection Laws........................................................................................ 34
3.4
Namibian Laws regarding data Privacy ............................................................................. 37
3.5
Comparison of the different data Privacy Laws ................................................................ 38
3.6
Conclusion ......................................................................................................................... 39
Chapter 4............................................................................................................................................... 41
4 Evolution of the internet as through the advent of social media and the impact of the
collection of user data ...................................................................................................................... 41
4.1
Introduction ...................................................................................................................... 41
4.2
Evolution of the internet................................................................................................... 41
4.3
Impact of Data Collection.................................................................................................. 43
4.4
Payment for user data ...................................................................................................... 47
4.5
Conclusion ......................................................................................................................... 50
Chapter 5............................................................................................................................................... 52
5
Internet Freedom and Policy Recommendations ..................................................................... 52
5.1
Internet freedom in Namibia ............................................................................................ 52
5.2
Attacks on Internet Freedom and information ................................................................. 53
5.3
Internet access in Namibia ................................................................................................ 55
5.4
Right to privacy in Namibia ............................................................................................... 56
5.5
Conclusion ......................................................................................................................... 57
References ............................................................................................................................................ 59
6.1
Legislation ......................................................................................................................... 59
6.2
International Treaties........................................................................................................ 59
6.3
Books ................................................................................................................................. 59
6.4
Case Law............................................................................................................................ 60
6.5
Internet Sources ................................................................................................................ 60
Chapter 1
1 Introduction and Background to the study
1.1 Introduction
The internet has been the revolutionary technology that is having a tremendous
impact on the 21st century.1 In this research paper two aspects of the internet will be
analyzed, namely Internet Freedom2 and Internet Privacy.3
Internet privacy refers to a vast range of technologies, protocols and concepts
related to giving individual users or other parties more privacy protections in their use
of the global Internet.4 This may take the form mandatory privacy statements on
websites, data sharing controls and data transparency initiatives.5 When examining
internet privacy data is what is key is the regulation of handling user data.
6
User
data is defined as all data, information, and other content of any type and in any
format, medium or form, whether audio, visual, digital, screen, GUI or other, that is
input, uploaded to, placed into, or collected, stored, processed, generated, or output
by any device, system introduced the GDPR (General Data Protection Regulation) in
an attempt to protect the privacy and user data of its citizens. This raises the
question: does Namibia need a similar law to protect the privacy of its citizens
online?
Secondly is the related and equally important subject of internet freedom. Internet
freedom is defined as an umbrella term that encompasses digital rights, freedom of
information, the right to Internet access, freedom from Internet censorship, and net
neutrality.7 Many people in Namibia take for granted the free and open internet which
we use but for many this is not a reality. In countries such as China, Myanmar,
Uganda, and Iran, just to mention a few, the internet is routinely blocked and cut off.
In the case of China, the internet is completely cut off from the rest of the world due
to the great firewall which blocks most of the global internet and basically leaves
1 Yamin, M.2019. Information technologies of the 21st century and their impact on society. International
Journal of Information Technology. Volume 11. pp 759–766
2 B. Altman. 2008. A Coming Chill Over Internet Freedom? Time.p1
3 L.Mineo. 2017.On internet privacy, be very afraid. Harvard Gazette.p1
4 Techopidia. 2020.Internet Privacy. Available at https://www.techopedia.com/definition/24954/internetprivacy Last Accessed 15 May 2021
5 Techopidia.2020: p1
6Techopidia .2020.
7 B. Altman.2008: p1
Chinese people in a bubble unto themselves which is routinely censored against
anything negative about their one-party system, The Chinese Communist Party.8
1.2 Statement of Problem
On January 15, 2021 WhatsApp users around the world received an update stating a
change in the privacy policy which changed data sharing practice of the application
and expanded its user information sharing with its parent company Facebook. 9 What
was truly upsetting to many users was that this policy was non-optional, and users
could not opt out, this created a stir in Namibia as before this not much attention was
paid to the data that was being collected by technology companies when using their
services.10
When discussing internet privacy, we must look at privacy in general. Privacy is a
fundamental human right, enshrined in numerous international human rights
instruments. It is central to the protection of human dignity and forms the basis of
any democratic society. It also supports and reinforces other rights, such as freedom
of expression, information, and association.11 As such, activities that restrict the right
to privacy, such as surveillance and censorship, can only be justified when they are
prescribed by law, necessary to achieve a legitimate aim, and proportionate to the
aim pursued.12
The Namibian constitution guarantees the protection and respect of the rights to
privacy under Article 13 “(1) No persons shall be subject to interference with the
privacy of their homes, correspondence or communications save as in accordance
with law and as is necessary in a democratic society in the interests of national
security, public safety or the economic well-being of the country, for the protection of
health or morals, for the prevention of disorder or crime or for the protection of the
8
E, Economy. 2018.The great firewall of China: Xi Jinping’s internet shutdown. The Guardian.p1
N, Statt. 2021.WhatsApp to delay new privacy policy amid mass confusion about Facebook data sharing. The
Verge.p1
10
N, Statt.2021: p1
11
Universal Declaration of Human Rights Article 12, United Nations Convention on Migrant Workers Article 14,
UN.
12
Universal Declaration of Human Rights Article 29; General Comment No. 27, Adopted by The Human Rights
Committee Under Article 40, Paragraph 4, Of the International Covenant on Civil and Political Rights,
CCPR/C/21/Rev.1/Add.9, November 2, 1999
9
rights or freedoms of others.13” As stated, the right to privacy is clearly enshrined in
our constitution, but as of late there has been no legislation specifically addressing
the data privacy of Namibian citizens.
Regarding internet privacy Namibian legislators have drafted and authorized several
problematic bills and acts that have sought to increase the surveillance power of the
state without proper oversight and consideration from judicial authority. These are
the Electronic Transactions and Cybercrime Bill and Communications Act 8 of 2009
particularly part 6 section 70(9) of the Act14 which has not yet come into force which
directly threatens the respect and protection of privacy rights as it seeks to grant
broad powers to the government to monitor telephone calls, e-mail, and internet
usage without a warrant.
The Electronic Transactions and Cyber Crime Bill. This Bill was tabled in 2017 and
had serious flaws and terrible implications to privacy in Namibia. It intended to allow
CRAN (Communications Regulatory Authority of Namibia) to conduct warrantless
search and seizure operations, while also allowing state agents through chapter 5
sections 43(2) and 43(3) to enable unauthorized access and access without
notification by CRAN to the affected party to their computer systems which should be
considered government hacking. Furthermore, in chapter 7 section 61(6-8) would
allow a computer security inspector to access computer systems without seeking
legal authorization from the courts or without notification to the affected party. At the
same time, sections of chapter 8, in sections 70 (2) and all of section 72, allow for a
system of secret warrants while vaguely defining the conditions under which such
secret warrants can be sought. These provisions open the door to pervasive
communications surveillance and interception
without
appropriate oversight
mechanisms to monitor the conduct of those carrying out such surveillance or
interception activities.15
The areas of concern within the Communications Act 8 of 2009 include its wording
referring to staff members as first stated in article 70(2) which places no restriction
13
The Namibian constitution Article 13
Any staff member employed in an interception centre may do anything necessary in order to perform the
interception or monitoring concerned (as well as any decoding or decryption necessary to make the
information in question intelligible) and must forward all information obtained from these activities to the
person who made the request referred to in subsection
15
Draft provisions of the electronic transactions and cybercrime bill (2017) Frederico Links, Graham Hopwood
14
on who may conduct the interception or impose the requirement that it must be
conducted by someone with a certain level of standing.16
Under article 70(9) the act seeks to provide broad powers as to the ways and means
by which the surveillance is to occur as it empowers any staff member employed to
do anything that is necessary to perform the interception and monitoring. 17
The only guidance the act grants it under article 70(11) which gives the sole power to
the Director general on how information obtained by interception must be handled,
which persons may handle information obtained by means of interception, which
persons may perform any action relating to interception and any other technical or
procedural matter relating to interception that is necessary or expedient in order to
ensure that information obtained by means of interception is only used for its
intended purpose and that the objects of this Part are fulfilled. 18 The Director general
referred to in the act is the Director-General of the Namibia Central Intelligence
Service.19
The Act under article 71(1) also requires licensees and other providers of
telecommunications services to provide a telecommunications service in such a
manner that it is capable of being intercepted. To store such information relating to
the originator, destination, contents of, and other information relating to the
telecommunications concerned as may be prescribed under subsection 71(2) and
acquire at its own cost whether by purchasing or leasing the facilities and capabilities
necessary to comply with the duties referred to in subsection (1) and (2).
Article 73(1) of the communications act also requires telecommunications service
providers to ensure that information prescribed is obtained for all customers and that
the information stated in the article must be sufficient to determine which telephone
number or other identification has been issued to a specific customer to make it
possible to intercept the telecommunications of that customer.
This act would seek to place an unconstitutional burden on telecommunications
companies to share their user data which would be in clear violation of the
constitution as it would constitute mass surveillance by the government over the
16
No 8 of 2008, Communications Act, No. 4378, Part 6, Para. 70(2)
No 8 of 2008, Communications Act, No. 4378, Part 6, Para. 70(9)
18
No 8 of 2008, Communications Act, No. 4378, Part 6, Para. 70(11)
19
No 10 of 1997, Namibia Central Intelligence Service Act
17
citizenry which goes against the principles of democratic society. This mass
surveillance would also threaten the security, integrity, and privacy of millions of
innocent citizens. As such this law does not respect the principle of legality,
necessity, and proportionality.
The European Union's GDPR law. This is one of the strongest data protection laws
in the world. The aim of the law is to protect the user data of the citizens of the EU
this data includes basic identity information such as name, address and ID numbers,
web data such as location, IP address, cookie data and RFID tags, health and
genetic data, biometric data, racial or ethnic data, political opinions, and Sexual
orientation. These cover wide gambit of user data as it is meant to protect individuals
from discrimination they experience. An example of this is an individual’s health data,
health insurance companies would be more reluctant to take an individual if they had
access to their medical history and found that the individual was more susceptible to
a genetic disease.20
This has become more of a concern as more private companies are coming to
control billions of individuals user data and the lack of trust that the public has with
these companies as seen with the recent change of the privacy policies with by
WhatsApp which intern is controlled by Facebook who business model is to sell its
users data for advertising purposes. The question then arises with the dangers
associated with user data does Namibia not need similar legislation to protect its own
citizens from this.
1.3 Significance of Research
This research seeks to inform the public on how the government and private
companies are increasingly trying to extract and surveille citizens in blatant breach of
the constitution about the importance of individual privacy especially in the modern
age of social media and big data as this data could be harvested and impact your life
in unforeseen circumstances.
1.4 Research questions
• Will Namibia benefit from creating its own updated data protection law?
•
20
Should private companies pay individuals for their user data?
M. Nadeau ,2020, General Data Protection Regulation (GDPR): What you need to know to stay compliant ,
Available at https://www.csoonline.com/article/3202771/general-data-protection-regulation-gdprrequirements-deadlines-and-facts.html last accessed 12/02/2021.
•
Should an online user data fall under the protection of section 13 of the
Namibian Constitution?
1.5 Hypothesis
A more robust data protection law would benefit the public as it would protect against
and give transparency to what user data is being collected and how it is used,
however if the requirements are too stringent it could result in companies refusing to
operate in Namibia at all.
1.6 Theoretical Framework
The basis of this study centers on the right to privacy, Privacy is a fundamental
human right, enshrined in numerous international human rights instruments. It is
central to the protection of human dignity and forms the basis of any democratic
society. It also supports and reinforces other rights, such as freedom of expression,
information, and association. Activities that restrict the right to privacy, such as
surveillance and censorship, can they be justified, unless necessary to achieve a
legitimate aim, and proportionate to the aim pursued as prescribed by law. Another
important issue is whether private companies should explicitly consent to use and
sell our data, whether they must develop reasonable data security practices, notify
users when breaches of their data happen and notify users about the collection, use,
and sharing of their personal information.
In the EU where a data protection law was implemented it has provided numerous
benefits such as increased consumer confidence, better data protection for user data
and greater decision making when it comes to the tracking of individuals across the
internet.21 This however could also have come at a great cost as the that legislation
could have had a major impact on user generated content as it required companies
that acted as platforms such as YouTube, Instagram etc. to pay fines if copyrighted
music were uploaded which would have severely damaged their business model
forcing them to leave the EU market entirely or face these stiff fines. 22 That section
21
Open Access Government. 2018. The five key business benefits of GDPR, Available at
https://www.openaccessgovernment.org/the-five-key-business-benefits-of-gdpr/44554/ last accessed
12/02/2021
22
L.Feiner,2019, YouTube and its users face an existential threat from the EU’s new copyright directive,
Available at https://www.cnbc.com/2019/05/10/youtube-faces-existential-threat-from-the-eus-newcopyright-directive.html last accessed 12/02/2021
was however eventually changed. Secondly as user data becomes more important
there have been calls in regard to who benefits from an individual’s user data as
many companies generate profit from selling their user data to advertising agencies
or use it for the development of artificial intelligence without benefiting the creator of
that data.
1.7 Literature Review
When looking at privacy a familiar name is Edward Snowden, an American dissident
who exposed the massive surveillance which his government was undertaking and
how it violated their right to privacy. His book Permanent Record is a detailed
description of the dangers of allowing government surveillance and abuse of privacy
rights to go unchecked.
The book The Great Firewall of China: How to Build and Control an Alternative
Version of the Internet by James Griffiths is an important book regarding internet
freedom. It discusses how the Chinese have managed to censor and cut off their
population from the world web.
An important source of information for my research is Universal Periodic Review
Stakeholder Report: 24th Session, Namibia the Right to Privacy in Namibia. This
report analyzes and summarizes the current situation regarding privacy in Namibia.
Another report of significant importance is the Namibia internet Governance Forum
report. This report engages with local stakeholders and evaluates the internet from
the benefits it can provide to women for their economic development to the
importance of cybersecurity and the threats posed by it.
The book Customer Data and Privacy explains the use and generation of user data
by large tech-companies and the dangers which comes with the loss of privacy it
entails.
The submission of by Federico Links and Graham Lockwood to the Institute for
Public Policy Research provides an in-depth review on the proposed Electronic
Transactions and Cybercrime Bill and provides an in-depth critique on the Bill.
Everything you wanted to know about GDPR but were afraid to ask is a book that
summarizes all the key facts and requirements of the GDPR. It was a collaborative
book led by the Cyber Management Alliance to help businesses adapt to the new
laws regarding data privacy.
The Net Delusion: The Dark Side of Internet Freedom is a book that examines the
how governments such as Iran and China have used the internet to stifle and
repress freedom of speech around the world
Data Privacy in the Information age is a book by Jacqueline Klosek that analyzes
legal mechanisms passed by various governments to examine privacy in the 21st
century.
The Internet, Warts and All: Free Speech, Privacy and Truth is a book by Paul
Bernal which seeks to address why government digital policies seem so out of touch
and are counterproductive.
The Privacy and data protection in E-commerce: The effectiveness of a government
regulation approach in developing nations is a report aimed at discussing the various
issues developing nations may face in protecting their citizens user data and privacy
on E-commerce platforms in developing nations.
The Internet Freedom and Human Rights report by Joyce Danial investigates
whether, in addition to freedom of expression, the Internet has become so important
for the supply of and access to information, as well as the establishment of political
communities and related concerns of participation, that it deserves additional human
rights protection.
The study by Jason Gainous, Kevin Wagner, Tricia Gray is a very interesting review
on how internet freedom affects political attitudes in Latin America. The objective of
this study is to argue that more internet exposure might encourage individuals to be
more skeptical of political situations in their nations since utilizing social media
increases the chances of being exposed to dissident material.
The article by Kirsty Hughes This article builds a theory of the right to privacy based
on social interaction, which represents how privacy is perceived. According to this
idea, the right to privacy is a right to respect for barriers, and a breach of a privacy
barrier is a breach of that barrier.
1.8 Research Methodology
This research paper will use a descriptive and applied research method as in my
study. This paper will seek to lay out the facts and describe the current state of
privacy in Namibia and compare its position with other nations tackling the same
issue. This research proposal will be qualitative as it seeks the idea of internet
freedom and privacy in depth and by doing so my research seeks to determine the
best cause of action the government should take regarding data protection and find a
way to balance the privacy considerations of individuals and data requirements for
online businesses and security concerns of the Namibian government.
1.9 Limitations of study
A foreseeable limitation is that the interpretations are limited. Personal experience
and knowledge influence observations and conclusions that will be reached.
Qualitative research is also labor intensive as it requires obtaining answers from a
large group of people about their opinions on internet privacy and freedom.
Qualitative research requires thoughtful planning to ensure the obtained results are
accurate. There is no way to analyze qualitative data mathematically. This type of
research is based more on opinion and judgment rather than results. Because all
qualitative studies are unique, they are difficult to replicate.
1.10
Chapter outline
The chapter outline of the dissertation will be as follows:
Chapter 1: Chapter one introduces the proposal. This will consist of the introduction,
problem
statement,
research
questions,
objectives,
hypothesis,
theoretical
framework, literature review, research methodology and limitation of study, in
addition to the chapter outline there will also be the ethical consideration and
reference list.
Chapter 2: In the second chapter will be looking at the history and development of
privacy laws and will look at the various international covenants and declarations
which outline the right to privacy and those pertaining to internet freedom.
Chapter 3: This chapter will seek to analyze Namibian law regarding matters of
privacy and internet freedom and seek to compare and contrast it with legislation of
similar nations.
Chapter 4:
This chapter will be looking at how the internet has evolved
communication through the advent of social media and the impact that the vast
collection of user data has. It will also analyze how government censorship has
evolved in various ways with the advent of the internet.
Chapter 5: This chapter will be my conclusion regarding privacy and internet freedom
in Namibia it will also entail my personal opinion on the subject and
recommendation.
1.11
Ethical Considerations
This work is purely a desk top research in which all primary and secondary sources
used will be referenced. As such no individual or group interviews/questionnaires will
be used as instruments of research with the objective of holding discussions
concerning any topics or issues that might be sensitive, embarrassing or upsetting.
No criminal or other disclosures requiring legal action and having potential adverse
effects, risk or hazards for research participants will be made during the study. There
is therefore no need for arrangements to be made in respect of insurance and/or
indemnity to meet the potential legal liability of the University of Namibia for harm to
participants arising from the conduct of the research.
Chapter 2
2 The development of the right to privacy
2.1 Introduction
When discussing internet privacy, we must first look at its bedrock, the right to
privacy itself. This right can be found under article 12 of the Universal declaration of
human right, as well as article 17 of International Covenant on Civil and Political
Rights. The Namibian constitution also guarantees this right under article 13 of the
bill of rights. This right which is a fundamental human right exists to protect human
dignity and it is paramount as it forms the basis of a modern democratic society.23
Privacy enables us to make barriers and manage boundaries to guard ourselves
from unwarranted interference in our lives, which allows us to trade who we are and
the way we would like to interact with the world around us.24 Privacy helps us
establish boundaries to limit who has access to our bodies, places, and things, as
well as our communications and our information.25
The rules that protect privacy give us the power to claim our rights within the face of
great power imbalances.26 As a result, privacy is an important way we seek to guard
ourselves and society against arbitrary and unjustified use of power, by reducing
what may be known about us and done to us, while protecting us from others who
might need to exert control.27 Privacy is crucial to who we are as people, and we
make decisions about it every single day. It gives us an area to be ourselves without
23
E. Soken-Huberty.2021. 10 Reasons Why Privacy Rights are Important. Available at:
https://www.humanrightscareers.com/issues/reasons-why-privacy-rights-are-important/ last accessed 15
August 2021
24
E. Soken-Huberty.2021.
25
Privacy International. 2021.What is Privacy? Available at:
https://privacyinternational.org/explainer/56/what-privacy last accessed 16 June 2021
26
E. Soken-Huberty.2021.
27
E. Soken-Huberty.2021.
judgement, allows us to think freely without discrimination, and is a crucial element of
giving us control over who knows what about us. 28
The question then arises why does this matter? In countries such as China the
government has sweeping control of all online activity in which they monitor every
individual's communication, private or public in their messaging applications such as
WeChat, their alternative to WhatsApp.
29
In modern democracies, the deliberation
around privacy has become a debate about modern freedoms. As we consider how
we establish and protect the boundaries that surround an individual, and therefore
the ability of the individual to possess a say in what happens to him or her, we are
equally trying to decide: the ethics of modern life, the rules governing the conduct of
commerce and, the restraints we place upon control and reach of the state.30
Technology has always been intertwined with this right. As an example, our
capabilities to guard privacy are greater today than ever before, yet the capabilities
that now exist for surveillance are without precedent. That is why it is an imperative
that we begin formulating concrete privacy laws.
2.2 Historical development of Privacy Law
In early America there was limited legal protection for the right of privacy. It came in
the form of a law which protected against eavesdropping, which was defined as the
act of listening under walls or windows, or the eaves of a house, to hearken after
discourse, and thereupon to frame slanderous and mischievous tales. 31
This later developed in the period of the American Revolution which emanated from
the issue of government intrusion. The leaders of the American Revolution detested
the use of general warrants and writs of assistance. Writs of assistance being
28
Privacy international. 2021.p1
29
J, Yang. 2020.WeChat Becomes a Powerful Surveillance Tool Everywhere in China. Wall street journal. p 1
30
31
Privacy international. 2021.p1
D, Solove. 2006. A Brief History of Information Privacy Law. Washington. George Washington University Law
School. p4
authorized sweeping searches and seizures without any evidentiary basis32 and
general warrants which resulted in ransacking and seizure of the personal papers of
political dissenters, authors, and printers of seditious libel33.
The leaders of the revolution's distaste for excessive government power to invade
the privacy of the people was forged into the Bill of Rights in the Third, Fourth, and
Fifth Amendments. The Third Amendment protects the privacy of the home by
preventing the government from requiring soldiers to reside in people’s houses: 34
“No Soldier shall, in time of peace be quartered in any house, without the consent of
the Owner, nor in time of war, but in a manner to be prescribed by law” 35
In the 18th century mail was starting to be widely used and as such the concerns on
the privacy of the messages delivered was increasingly an issue. As such, the
congress of the United States of America passed legislation in 1782 that forbade
individuals from opening mail not addressed to them. However, this failed to abate
concerns about the privacy of mail and in 1825 this was further reinforced with
legislation stating36:
“Whoever takes any letter, postal card, or package out of any post office or any
authorized depository for mail matter, or from any letter or mail carrier, before it has
been delivered to the person to whom it was directed, with design to obstruct the
correspondence, or to pry into the business or secrets of another, or opens,
embezzles, or destroys the same, shall be fined . . . or imprisoned.” 37
Later in the year 1877 the courts further reinforced this premise in the case Ex parte
Jackson38 where the court extended the fourth amendment of U.S.A constitution to
32
Silas J. Wasserstrom & Louis Michael Seidman.1998. The Fourth Amendment as Constitutional Theory, 77
GEO. L.J. 19, 82
33
M, David.1979. PRIVACY LAW AND PUBLIC POLICY 38; see also
W Stuntz.1995. The Substantive Origins of Criminal Procedure, 105 YALE L.J. pp393, 406
34
D, Solove. 2006.p5
35
U.S.A Constitution. amendment. III
36
D, Solove. pp 6-7
37
Obstruction of correspondence 42 U.S.C. § 1702.
38
Ex parte Jackson, 96 U.S. 727 (1877).
the mail and thereby prohibiting government officials from opening an individual's
mail without a warrant. The court stated, “The constitutional guarantee of the right of
the people to be secure in their papers against unreasonable searches and seizures
extends to their papers, thus closed against inspection, wherever they may be.”
These events laid the foundation of privacy law and inspired the writings of Samuel
D. Warren and Louis Brandeis who wrote the article: The right to Privacy 39 which
was one the most profound developments of Privacy laws, which many jurists such
as Harry Kalven, Jr and Roscoe Pound stated that the article did nothing less than
add a new chapter to the law and that it was one of the most influential law review
articles of all.40 The article's purpose as stated by its authors was “It is our purpose
to consider whether the existing law affords a principle which can properly be
invoked to protect the privacy of the individual; and, if it does, what the nature and
extent of such protection is.” They did so by discussing the “right to be alone”. They
explain that by using the case of Prince Albert v. Strange41.
Both Victoria and Prince Albert created a variety of etchings within the 1840s as a
hobby. The copper plates for these were entrusted to a printer in Windsor called
John Brown to make copies that the couple showed to friends or gave away. The
plates and therefore the good copies were returned by Brown. However, a number of
additional copies had been created by an employee of Brown's, called Middleton.
Middleton sold a group of 63 different prints for the sum of £5 to Jasper Tomsett
Judge, a writer who in 1848 had published a book Sketches of Her Majesty's
Household. Prince Albert filed suit for the surrender of the etchings, for the
prohibition of the exhibition, and for prevention of publication of the etchings. His
plea was granted.
In this case the court stated that its decision was based on the protection of property,
but the authors argued that a close examination of the reasoning reveals the
existence of other unspecified rights, that is, the right to be let alone. They stated
39
S, Warren. L Brandeis.1890. The Right to Privacy. Massachusetts. Harvard Law Review. P 10
40
D, Solove. p 10
41
Prince Albert v Strange (1849) 47 ER 1302
that "where protection has been afforded against wrongful publication, the
jurisdiction has been asserted, not on the ground of property, or at least not wholly
on that ground, but upon the ground of an alleged breach of an implied contract or of
a trust or confidence."42
After the authors devised the new right of privacy they thought of limitations and
remedies for their new right. These were:43
•
The right to privacy does not prohibit any publication of matter which is of
public or general interest.
•
The right to privacy does not prohibit the communication of any matter, though
in its nature private, when the publication is made under circumstances which
would render it a privileged communication according to the law of slander
and libel.
•
The law would probably not grant any redress for the invasion of privacy by
oral publication in the absence of special damage.
•
The right to privacy ceases upon the publication of the facts by the individual,
or with his consent.
•
The truth of the matter published does not afford a defense.
•
The absence of "malice" in the publisher does not afford a defense.
For remedies to the violation of this right they argued that a plaintiff may institute an
action for tort damages as compensation for injury or, alternatively, request an
injunction.
As seen from historical development of modern society, privacy has always been an
important aspect of human development. It is therefore crucial for us in Namibian
society to learn about its importance and be vigilant against those who would try to
restrict it, in the name of security.
42
Prince Albert v Strange (1849) 47 ER 1302
43
S, Warren et al.1890. p14
2.3 Conventions and Declarations on the right to Privacy and Data
Protection
2.3.1 The Universal Declaration of Human Rights
On 10 December 1948 after the atrocities of World War 2 which left 11 million dead
due to the Holocaust committed by Nazi Germany44 and over 14 million dead who
were killed by Imperial Japan45 the world adopted The Universal Declaration of
Human Rights (UDHR)46 which was a document that represented a global road map
to freedom and equity for all people everywhere in the world. It was the first-time
countries agreed on the freedoms and rights that deserve universal protection for
every individual to live their lives freely, equally and in dignity.47 It was adopted by
the United Nations, and it recognized human rights to be the foundation for freedom,
justice, and peace.48
The UDHR was drafted with the help of various nations and consisted of
representatives from China, Australia, Chile, France, the Soviet Union, USA,
Lebanon, and the United Kingdom.49 The declaration gave an outline of 30 different
rights and freedoms that we are unitedly born with as humans and that could not be
taken away. It is a living document which has become one of the most translated
texts in the world. The 30 rights and freedoms started out within the UDHR include
the right to be free from torture, the right to freedom of expression, the right to
education and the right to search for asylum. It includes civil and political rights, like
the rights to life, liberty, and privacy. The right to privacy which was set out under
article 12 states:50
44
The Illinois Holocaust Museum and Education Centre. 2021.Holocaust misconceptions. Available from:
https://www.ilholocaustmuseum.org/holocaust-misconceptions/ last accessed 15 August 2021
45
M. Todd. 2013. China lost 14 million people in World War II. Why is this forgotten? Available from:
https://psmag.com/news/china-lost-14-million-people-world-war-ii-forgotten-66482 last accessed 15
August 2021
46
The Universal Declaration of Human Rights 1948
47
Amnesty International. 2021. Universal declaration of Human rights. Available from
https://www.amnesty.org/en/what-we-do/universal-declaration-of-human-rights/ last accessed 15 August
2021
48
Amnesty international. 2021.What is the universal declaration of human rights and why was it created?
Available at: https://www.amnesty.orgen/what-we-do/universal-declaration-of-human-rights/ last accessed
16 June 2021
49
Research Guides. 2020.Universal Declaration of Human Rights. Available at:
https://libraryresources.unog.ch/c.php?g=462664&p=3163021 last Accessed 15 August 2021
50
United Nations. 2021.Universal Declaration of Human Rights Available at: https://www.un.org/en/ab/outus/universal-declaration-of-human-rights last accessed 16 June 2021
No one shall be subjected to arbitrary interference with his privacy, family, home, or
correspondence, nor to attacks upon his honor and reputation. Everyone has the
right to the protection of the law against such interference or attacks.
2.3.2 Convention for the Protection of Individuals with regard to
Automatic Processing of Personal Data51
This Convention is the first binding international instrument which protects the
individual against abuses which can accompany the gathering and processing of
private data. It seeks to manage at an equivalent time the trans frontier flow of
private data. In addition to providing guarantees in reference to the gathering and
processing of private data, it outlaws the processing of "sensitive" data on an
individual's race, politics, health, religion, sexual life, criminal record, etc., within the
absence of proper legal safeguards. The Convention also enshrines the individual's
right to understand that information is stored on him or her and, if necessary, to have
it corrected.52 Restriction on the rights laid down within the Convention is only
possible when overriding interests (e.g., State security, defense, etc.) are at stake.
The Convention also imposes some restrictions on transborder flows of private data
to States where legal regulation doesn't provide equivalent protection.53
2.3.3 Charter of Human Rights & Principles for the Internet
This charter was written by the United Nations governance forum in collaboration
with the Internet Rights & Principles Dynamic Coalition which is an international body
made up of organizations and individuals working to uphold human rights on the
internet.54 The purpose of the charter is:55
51
Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data ETS
No.108 1985
52
P. Fowler.2017. Data Privacy Day? Yeah, it’s a Thing. Available from: https://www.swlaw.com/blog/datasecurity/2017/01/27/data-privacy-day-yep-its-a-thing/ last accessed 15 August 2021
53
Council of Europe. 2021.Convention for the Protection of Individuals with regard to Automatic Processing of
Personal Data. Available at: https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/108
last accessed 16 June 2021
54
UN Human rights office of the High commissioner. 2011. The charter of human rights and principles for the
internet. Available at:
https://www.ohchr.org/Documents/Issues/Opinion/Communications/InternetPrinciplesAndRightsCoalition
.pdf last accessed 16 June 2021
55
UN Human rights office of the High commissioner. 2011. p4
●
a reference point for dialogue and cooperation between different stakeholder
priorities for the internet’s design, access, and use around the world.
●
an authoritative document that can frame policy decisions and emerging
rights-based norms for the local, national, and global dimensions of internet
governance.
●
a policymaking and advocacy tool for governments, businesses, and civil
society groups committed to developing rights-based principles for the internet.
The charter seeks to create a rights-based internet society and with that purpose it
has outlined 20 important internet principles and rights.56 Two of these rights are of
particular importance to my writings, those being Freedom of expression and
information on the internet that states: Everyone has the right to seek, receive, and
impart information freely on the Internet without censorship or other interference.
Everyone also has the right to associate freely through and on the Internet, for
social, political, cultural, or other purposes57 . The second being Privacy and Data
protection which states that Everyone has the right to privacy online. This includes
freedom from surveillance, the right to use encryption, and the right to online
anonymity. Everyone also has the right to data protection, including control over
personal data collection, retention, processing, disposal, and disclosure.58
Other rights and freedoms under the charter are the right to access the internet, the
right to non-discrimination in internet access, use and governance, the right to liberty
security on the internet, freedom of belief and religion on the internet, freedom of
assembly and association, right to education on and about the internet, right to
culture and access to knowledge on the internet, rights of children on the internet,
right of work and the internet, right to online participation in public affairs, right to
consumer protection on the internet, right to legal remedy and fair trails for actions
on the internet, right to appropriate social and international order on the internet and
finally the duties and responsibilities on the internet.59
56
UN Human rights office of the High commissioner. 2011. p11
57
UN Human rights office of the High commissioner. 2011. p16-17
58
UN Human rights office of the High commissioner. 2011. p18-19
59
UN Human rights office of the High commissioner. 2011. p12-13
2.3.4 African declaration on Internet rights and freedoms
This declaration is a pan-African initiative that seeks to push human rights standards
and principles of openness in internet policy formulation and implementation on the
continent. It does this through the articulation and promotion of 13 principles which it
views as necessary for upholding human and people’s rights on the web.60
The African Commission on Human and Peoples’ Rights adopted Resolution 362
(LIX) on the right to Freedom of information and Expression on the internet in
Africa.61
The resolution acknowledged the worth of the African Declaration in its elaboration of
the principles necessary to uphold human and people’s rights online and in
cultivating an online environment which will best meet Africa’s social and economic
development needs and goals.
This declaration outlines 13 key principles, these being:62
•
Openness: The Internet should have an open and distributed architecture
and should continue to be based on open standards and application
interfaces and guarantee interoperability to enable a common exchange of
information and knowledge.
•
Internet Access and affordability: Access to the Internet should be
available and affordable to all persons in Africa without discrimination on any
ground such as race, colour, sex, language, religion, political or other opinion,
national or social origin, property, birth, or other status.
•
Freedom of Expression: Everyone has the right to hold opinions without
interference.
•
Right to information: Everyone has the right to access information on the
Internet.
•
Freedom of assembly and association on the internet: Everyone has the
right to use the Internet and digital technologies in relation to freedom of
assembly and association, including through social networks and platforms.
60
Association of progressive communications. 2019. African Declaration on Internet Rights and Freedoms
Coalition: Promotion of freedom of expression a priority for Southern Africa Available at
https://www.apc.org/en/news/african-declaration-internet-rights-and-freedoms-coalition-promotionfreedom-expression last accessed 16 June 2021
61
62
Association of progressive communications. 2019.p1
African declaration on internet rights and freedom. 2014.The charter of human rights and principles for the
internet. Available at: https://africaninternetrights.org/ Last accessed 16 June 2021
•
Cultural and linguistic diversity: Individuals and communities have
the right to use their own language or any language of their choice to
create, share and disseminate information and knowledge through the
Internet.
•
Right to development and Access to knowledge: Individuals and
communities have the right to development, and the Internet has a vital
role to play in helping to achieve the full realisation of nationally and
internationally agreed sustainable development goals.
•
Privacy and Data protection: Everyone has the right to privacy
online, including the right to the protection of personal data concerning
him or her. Everyone has the right to communicate anonymously on
the Internet, and to use appropriate technology to ensure secure,
private, and anonymous communication.
•
Security, stability, and resilience of the internet: Everyone has the
right to benefit from security, stability, and resilience of the Internet. As
a universal global public resource, the Internet should be a secure,
stable,
resilient,
reliable,
and
trustworthy
network.
Different
stakeholders should continue to cooperate in order to ensure
effectiveness in addressing risks and threats to security and stability of
the Internet.
•
Marginilised groups and groups at risk: The rights of all people,
without discrimination of any kind, to use the Internet as a vehicle for
the exercise and enjoyment of their human rights, and for participation
in social and cultural life, should be respected and protected.
•
Right to due process:
Everyone has the right to due process in
relation to any legal claims or violations of the law regarding the
Internet.
•
Democratic multistakeholder internet governance: Everyone has
the right to participate in the governance of the Internet.
•
Gender Equity: To help ensure the elimination of all forms of
discrimination on the basis of gender, women and men should have
equal access to learn about, define, access, use and shape the
Internet.
2.4 Conclusion
In this chapter has explained and discussed the importance of privacy, the different
international treaties and covenants that protect the right to privacy and how privacy
laws and internet freedoms and the historical development of privacy law. In an era
where digital corporations such as Facebook, Amazon, Google, and others acquire
and keep personal data, privacy rights that restrict them from utilizing the data for
their own purposes are critical. Groups cannot take your data without your
knowledge or approval and use it for their own purposes. You should have control
over your data if it is yours. Your data can only be used in ways that you consent to,
and you have access to any information about yourself. You would feel powerless if
you didn't have this control. It would also make you extremely vulnerable to society's
more strong influences, and therefore your privacy rights put you in control of your
own life.
Chapter 3
3 Comparison of Namibian Privacy law legislation with other Jurisdictions
3.1 Introduction
This chapter will be looking at the laws and regulations in different jurisdictions that
enforce privacy laws. It will be reviewing laws passed in South Africa and the
European Union and comparing it to Namibian legislation on the matter. In the
context of privacy, it is concerned with ensuring that sensitive data processed,
stored, or sent by a company is consumed in a compliant manner and with the
permission of the person who owns that sensitive data. To do so, it is necessary to
tell people up front about the kinds of data that will be gathered, why it will be
collected, and with whom it will be shared. A person must consent to the conditions
of use and once this transparency is given, enabling the organization that has
collected the data to use it in accordance with its stated objectives after this
agreement has been reached.63
Unlike in South Africa and the European Union, Namibia has yet to implement its
own data privacy laws, however Namibian lawmakers have written and approved a
63
D. Phillips. 2020.Data Privacy vs. Data Security: What is the Core Difference? Available from:
https://www.tokenex.com/blog/data-privacy-vs-security last accessed 10 September 2021
number of controversial laws and acts that have attempted to expand the state's
surveillance powers without receiving appropriate scrutiny and approval from the
judiciary. Among these are the Electronic Transactions and Cybercrime Bill and the
Communications Act64, particularly part 6 of the act, which has not yet come into
effect, but which directly threatens the protection of privacy rights by granting the
government broad powers to monitor telephone calls, e-mail, and internet usage
without the need for a court order.65
When looking at data privacy an inevitability that comes along is data security, as
with the progression of collection that comes with social media and digitisation of
important personal information such as your health records and financial information.
Data breaches to this important information which is in most circumstances held by
private companies can have serious consequences to an individual. This may be
identity theft or blackmail which can have serious financial ramifications.66
3.2 Data Protection Laws in the Republic of South Africa
To ensure the security of data and personal information, the Republic of South Africa
has made considerable efforts to establish laws and regulations that are now in
force. The COVID-19 epidemic has brought attention to the necessity for legislation
to govern the explosion of data and personal information that has arisen from the
use of digital technologies, particularly in developing countries. The Republic of
South Africa is witnessing its first national data protection legislation coming into
force on 1 July 2021, in this digital era of the fourth industrial revolution, it has joined
the rest of the world to safeguard the right to privacy.67 Companies in today's market
are incentivized to collect and analyse as much data as possible in order to get a
competitive edge. Taking this attitude to business is, more often than not, detrimental
64
Act 8 of 2009
65
Privacy International. 2015.The Right to Privacy in Namibia. Available from:
https://privacyinternational.org/sites/default/files/2017-12/Namibia%20UPR_PI_submission_FINAL.pdf last
accessed 16 September
66
D. Harrington. 2021.Data Security: Importance, Types, and Solutions. Available from:
https://www.varonis.com/blog/data-security/ last accessed 13 September 2021
67
P. Bhagattjee. 2021.South Africa - Data Protection Overview. Available from:
https://www.dataguidance.com/notes/south-africa-data-protection-overview last accessed 16 September
2021
to the customer. Giving financial services firms unrestricted access to personal data
may result in intrusive advertising, identity theft, and fraud, among other things.68
Following the President's signing, the Protection of Personal Information Act 69, 2013
('POPIA') was promulgated into law on November 26, 2013. POPIA has a broad
scope of applicability and effect, and it applies to all individuals who handle personal
information, subject to specific exceptions specified in the Act. POPIA will not
become completely operational until the first day of July 2021; nevertheless, the bulk
of its provisions have already begun to be implemented in preparation of that day.70
The personal information protection act (POPIA) relates to the processing of
personal information pertaining to an identifiable, living natural person, or, where
appropriate, an identified, existing juristic person, in the course of their business. In
addition to responsible parties domiciled in South Africa, POPIA will apply to
responsible parties located outside of South Africa who employ methods to process
user data in South Africa, as defined by the Act (unless such means are only used to
forward the information through South Africa). POPIA relates to the processing of
personal information by a responsible party, which is broadly defined by the Act to
include the collecting, recording, organizing, compiling, distributing, altering, storing,
utilizing, and deletion of personal information71 (being a public or private body or any
other person which alone or together with others determines the purpose and means
for processing of special information72).
POPIA regulates the collection, use, and disclosure of personal information. POPIA,
on the other hand, is not applicable to the processing of personal information:73
68
T. Warikandwa T.2021. "Personal Data Security in South Africa's Financial Services Market: The Protection of
Personal Information Act 4 of 2013 and the European Union General Data Protection Regulation Compared"
PER / PELJ 2021(24). Available from: https://perjournal.co.za/article/view/10727 last accessed 16 September
2021
69
Act 4 of 2013
70
P. Bhagattjee. 2021.
71
P. Bhagattjee. 2021.
72
POPIA provides for a separate category of information called 'special personal information' which includes
all information relating to a person's religious or philosophical beliefs, race or ethnic origin, trade union
membership, political persuasion, health or sex life, biometric information, or criminal behaviour. POPIA also
specifically regulates personal information (of a child).
73
P. Bhagattjee. 2021.
● in which the activity is entirely personal or domestic in nature
● In cases where it concerns national security or the aim of the investigation is
to prevent or identify illegal actions (given that alternative legislation
applicable to such activities allows for measures to protect personal
information), by or on behalf of a public body
● by the Cabinet and its committees or the Executive Council of a province
● related to a court's judicial functions
● that has been created purely for the sake of journalistic, literary, or aesthetic
expression
A fully independent supervisory body, the Information Regulator, is introduced and
created under POPIA for the aim of data protection. A complaint to the Information
Regulator may be submitted either verbally or in writing (although oral contributions
must be converted to written submissions as soon as reasonably possible). A
complaint can be submitted in the case of suspected interference by anybody. In
accordance with POPIA, upon receipt of a complaint, the Information Regulator is
required to examine the complaint, serve as a conciliator when appropriate, and take
any further action that is envisaged by the Act.74 Working in collaboration with
information officers, the Information Regulator is charged with developing standards
of conduct for those involved in the collecting and processing of personal
information. A second duty assigned to the Information Regulator is to give
responsible parties prior authorization to engage in planned processing activities
before they may begin such operations. In addition, provisions are provided for
establishing standards for direct marketing, directories, and automated decisionmaking systems.75
Furthermore, the POPIA provides provisions for the movement of information across
international borders. Under the provisions of Section 100-109 of the POPIA,
administrative fines, offenses, and penalties are provided for, among other things.
Sections 100-106 of the POPIA deal with situations in which parties would be
74
T. Warikandwa T.2021.p 11
75
P. Bhagattjee. 2021.
deemed to be guilty of an offence if they did not cooperate. 76 Any person who
interferes with, obstructs, or unlawfully influences the Information Regulator; a
responsible party that fails to comply with an enforcement notice, such as lying under
oath or failing to appear at hearings; unlawful acts committed by a responsible party
in connection with account numbers; and unlawful acts committed in connection with
third parties are examples of such instances.77
Section 107 of the POPIA specifies the penalties that may be imposed for certain
offenses. For severe offenses, a fine of ten million Rands or imprisonment for a term
not exceeding ten years, or a combination of a fine and such imprisonment, shall be
imposed. The punishment for less severe offenses, such as interfering with an
official's execution of a search and seizure warrant, is a maximum of twelve months
imprisonment, or both a fine and the maximum sentence of twelve months
imprisonment.78
In view of the fact that POPIA is not yet completely operational and that the bulk of
its operative provisions just recently became effective on 1 July 2020, there has not
yet been any recorded case law in which a litigant has relied on POPIA to support a
claim in court. Although the operational provisions of POPIA impose onerous duties
on responsible parties, it is expected that a large body of case law will emerge
quickly now that the active provisions of POPIA have come into effect. 79
When the Facebook-owned messaging network WhatsApp notified customers in
January 2021 that it was developing an updated privacy policy, the company said
that under the new policy, it will be able to share some user data with Facebook as
well as other companies like Instagram and Messenger.80 In response to this, on
March 3, 2021, the Regulator released a statement about WhatsApp's planned
76
P. Bhagattjee. 2021.
77
P. Bhagattjee. 2021.
78
T. Warikandwa. 2021.p 12
79
P. Bhagattjee. 2021.
80
N, Statt. 2021.WhatsApp to delay new privacy policy amid mass confusion about Facebook data sharing. The
Verge. Available at: https://www.theverge.com/2021/1/15/22233257/whatsapp-privacy-policy-updatedelayed-three-months last accessed 16 September 2021
amendments to its privacy policy, in which it questioned the company's compliance
with the Privacy and Electronic Communications Act (POPIA).Among the concerns
raised by the Information Regulator with regard to the revised WhatsApp policy and
its application to South Africa were the following: "it is the Information Regulator's
opinion that the processing of cell phone numbers as accessed on the user's contact
list for a purpose other than the one for which the number was specifically intended
at collection, with the aim of linking the number to another person, is contrary to the
provisions of the Privacy Act.".81
3.3 European Data protection Laws
The (GDPR) is an EU legislation that establishes obligatory standards for how
organizations and businesses must handle personal data in an integrity-preserving
manner. Personal data refers to any information that may be used to identify a live
person, either directly or indirectly. Personal data such as a person's name, phone
number, and address are textbook examples. Interests, information about previous
purchases, health information, and online behaviour are all considered personal data
since they may be used to identify a specific individual. Data processing includes the
collection, structuring, organization, use, storage, sharing, disclosure, erasure, and
destruction of data, among other things. Any business that processes personal data
(which includes every firm with workers and customers) is responsible for ensuring
that the personal data it uses complies with the standards of the (GDPR).82
The General Data Protection Regulation (GDPR) came into force in 2018. It took the
place of the Data Protection Directive 95/46/EC (DPD) as the main piece of
legislation governing the protection of personal data by European Union-registered
businesses. The General Data Protection Regulation (GDPR) applies to all
businesses registered in all member states of the European Union (EU). The
rationale for taking such a broad approach is that it will result in the establishment of
a uniform consumer and personal data protection legislative framework across the
EU.83
81
P. Bhagattjee. 2021.
82
T. Warikandwa. 2021.p 1
83
T. Warikandwa. 2021.p 14
The main requirements of the GDPR can be explained as followers:84
● Use of personal data must be legal. The GDPR sets out six alternatives to the
legal basis (for example consent or contract). If your processing is not based
on any of those, it is not lawful. It might be necessary to process personal
data for the performance of a contract. It could also be necessary to use
personal data to prevent fraud and perform marketing.
● Personal data must be handled with honesty. Processing, for example, must
have a purpose. So, you can't gather personal data "just in case". Honesty,
openness, and transparency in data usage That is, people have a right to
know how their data is used and must be consulted. Personal data must only
be kept for as long as required. Processing must also be safe and secure.
Organisations must have and maintain paperwork proving regulatory
compliance.
● Personal data use must respect people' rights. The GDPR gives everyone
rights over their personal data. They are entitled to view their personal data.
Right to know how data is used.
● Data breaches must be notified within 72 hours under GDPR. You must act if
personal data is exposed, accessed, altered, or stolen. Even if the incident
occurred at a supplier. If no personal data was at risk, the incident generally
does not need to be reported. Whenever sensitive data like health or financial
data is lost, the authorities and each affected person must be notified within
72 hours.
● Brand-new to GDPR is responsibility for suppliers. The new legislation
requires controllers to legally obligate their providers to safeguard personal
data. If the provider compromises data, the controller is liable.
● The GDPR's penalties are large. Violations of the legislation may result in
fines of up to 4% of annual worldwide sales or € 20 million.
The GDPR gives data subjects considerable control over automatically processed
personal data, which is an essential aspect. The right to portability is granted to data
84
GDPR Summary. 2021.GDPR Summary. Available at: https://www.gdprsummary.com/gdpr-summary/ last
accessed 21 September 2021
subjects as a result of this. The right to portability means that individuals may move
their personal data without the involvement of other parties (as long as the operating
software systems are secure). Such data subjects will also have the right to erasure,
which enables them to request that their personal data be erased if they so choose.
Because it has extraterritorial applicability, the GDPR right to erasure of personal
data (the right to be forgotten) is critical in the financial markets.85
The GDPR has established a framework for cross-border data transfers. For internal
data transfer to take place, the European Commission (EC) must first assess and
approve the data-transfer legislative regimes of the countries to which the data would
be sent. Only eleven nations have had their legal systems approved by the
European Commission so far (Andorra, Argentina, Canada, Faeroe Islands,
Guernsey, Isle of Man, Israel, Jersey, New Zealand, Switzerland, and Uruguay). The
aforementioned permission is given only after lengthy discussions with the intended
data destination (the country) to bring its national data protection system up to par
with the EU's data protection standards. In the event that data is transferred to a
non-EU country without a legal regime adequacy determination, the relevant
organization must enter into a contractual agreement ensuring that it will comply with
the GDPR's specified level of data protection (this will include all material and
procedural safeguards). As a consequence, data transfers to non-EU institutions will
continue to be governed by the GDPR and will be subject to the same degree of
protection as data transfers inside the EU.86
The GDPR also mandates the appointment of a data protection officer, whose
primary responsibilities include verifying businesses' GDPR compliance and
reporting to data subjects and supervisory agencies. More importantly, the GDPR
broadens the scope of data protection to include multinational corporations, who
collect and handle personal data from EU persons. Such transnational cooperation
firms (for example, South African financial services firms) commercial dealings with
85
T. Warikandwa. 2021.p15
86
T. Warikandwa. 2021.p15
EU financial institutions) shall be subject to the same GDPR and penalties apply to
businesses located in the EU.87
The EU has been enforcing the GDPR as Google received a fine, imposed in 2019
and confirmed in March 2020 following a failed appeal, was the highest on record
until August 2021. The issue concerned how Google delivered privacy notices to its
users, as well as how the firm obtained their permission for customized advertising
and other kinds of data processing. What might have been done to prevent the fine:
In consent policies, Google could have offered more information to users and given
them more choice over how their personal data is handled.88
The GDPR is now recognized as the worldwide standard for safeguarding the rights
of every individual whose personal data enters the digital world. The GDPR's general
user rights are seen as a best practice tool, and since its introduction the GDPR has
substantially raised awareness of these rights. These basic rights should be the
benchmark against which businesses and organizations in Southern Africa and
throughout the African continent should strive. 89
3.4 Namibian Laws regarding data Privacy
The Constitution of the Republic of Namibia guarantees the protection and respect of
the rights to privacy under Article 13, which states that: (1) No persons shall be
subject to interference with the privacy of their homes, correspondence or
communications save as in accordance with law and as is necessary in a democratic
society in the interests of national security, public safety or the economic well-being
of the country, for the protection of health or morals, for the prevention of disorder or
crime or for the protection of the rights or freedoms of others. (2) Searches of the
person or the homes of individuals shall only be justified: (a) where these are
authorised by a competent judicial officer; (b) in cases where delay in obtaining such
judicial authority carries with it the danger of prejudicing the objects of the search or
87
T. Warikandwa. 2021.p 16
88
Tessian.202120 Biggest GDPR Fines of 2019, 2020, and 2021.Available at:
https://www.tessian.com/blog/biggest-gdpr-fines-2020/ last accessed 21 September 2021
89
T. Warikandwa. 2021.p 17
the public interest, and such procedures as are prescribed by Act of Parliament to
preclude abuse are properly satisfied.90
Although Namibia does not have any specific data protection bill there are various
sector-specific laws are in place to protect client information, including in the legal
and banking sectors (e.g., Financial Intelligence Act 13 of 2012; Industrial Property
Act 1 of 2012; Copyright and Neighbouring Rights Protection Act 6 of 1994). 91
Furthermore, there are various international agreements that emphasize the right to
privacy, such as the International Covenant on Civil and Political Rights (‘ICCPR'),
which states in Article 17 of the ICCPR, which reinforces Article 12 of the UDHR, that
“no one shall be subjected to arbitrary or unlawful interference with his privacy,
family, home, or correspondence, nor to unlawful attack. According to the Human
Rights Committee, governments parties to the ICCPR have a positive duty to “adopt
legislative and other measures to give effect to the ban against such interferences
and assaults, as well as to the preservation of this right to privacy.”92
In accordance with Article 144 of the Namibian Constitution “unless otherwise
provided by this Constitution or Act of Parliament, the general rules of public
international law and international agreements binding upon Namibia under this
Constitution shall form part of the law of Namibia.”
3.5 Comparison of the different data Privacy Laws
The POPIA governs the processing of personal data in South Africa that has been
recorded by or for a "responsible party." A responsible party is a public or private
entity or other legal subject that, alone or in collaboration with others, governs the
purpose and methods of processing personal data. The GDPR, on the other hand,
90
Namibian Constitution
91
Council of Europe.2020. Cybercrime policies/strategies. Available from:
https://www.coe.int/en/web/octopus/country-wiki-ap//asset_publisher/CmDb7M4RGb4Z/content/namibia/pop_up?_101_INSTANCE_CmDb7M4RGb4Z_viewMode=
print&_101_INSTANCE_CmDb7M4RGb4Z_languageId=en_GB last accessed 16 September 2021
92
General Comment No. 16 (1988), para1. Available from:
https://www.ifex.org/namibia/2008/11/25/new_bill_on_communication_interception/ last accessed 16
September 2021
applies as a privacy and security legislation to data "controllers" and "processors"
that are: established in the EU; and formed outside the EU but providing products or
services to data subjects in the EU or monitoring the behaviour of EU data subjects.
The POPIA and GDPR are expected to provide African countries with a benchmark
against which to assess the effectiveness of their data protection legislative regimes.
The GDPR, in particular, is expected to provide financial services businesses and
other organizations in Africa with an opportunity.93
Both the GDPR and the POPIA are intended to safeguard the data of living
individuals, and these protections are not extended to the data of the deceased.
They also both provide protection to natural people, with the South African POPIA
going a step further and providing protection to juristic persons in addition to
individuals. Personal data operators and data processors are defined in the same
way under both pieces of legislation, and they both include public organizations that
deal with personal data as part of their definition. Finally, both states make it plain
that this law applies to anybody who handles data about their respective citizens,
whether inside or outside of their respective countries' boundaries.94
3.6 Conclusion
The GDPR and the POPIA outline the importance of data privacy and security in the
modern era and outlines a clear need for similar legislation in Namibia. These laws
however go contrary to While other countries have taken the lead to improve the
data security of their citizens Namibian legislators have lagged behind and have
further sought to try and expand the surveillance power of the state into the digital
lives of the Namibian citizenry. To this day, Article 13 of Namibia's constitution, which
was drafted at the time of the country's independence in 1990, remains the sole form
of privacy guaranteed. Because of this absence of legal framework, the country has
been dubbed "a safe haven for cybercriminals," and many individuals have become
victims of online fraud due to the lack of a cybercrime legislation.95
93
T. Warikandwa. 2021.p 18
94
T. Warikandwa. 2021.pp 19-20
95
N, Gervasius.2021. Data protection and privacy in the absence of law: a Namibian exploration during covid19. Available from: https://openinternet.global/news/data-protection-and-privacy-absence-law-namibianexploration-during-covid-19 last accessed 17 September 2021
The COVID-19 epidemic underscored the necessity of enacting a comprehensive
data protection law. As the government fought to stop the virus from spreading, it
issued new guidelines on April 30, 2020, which included a requirement that
companies retain customer logs to help with contact tracking. Businesses and
governmental institutions across the country began collecting people's data
(including names, national ID numbers, and contact information) for contact tracing
and monitoring almost immediately after the rules were implemented. This
information was to be recorded into a client register at the front of each public
business, according to the standards. Unfortunately, without a data protection
legislation in effect, there were no rules for how this information should be
maintained, stored, and kept secret, issues that grew more serious as the epidemic
expanded.96
The media slammed the public registers almost soon after they went into effect. The
Windhoek Observer, one of the country's weekly newspapers, bemoaned the
decision, stating, "Namibia has neither the resources nor the ability for metadata
processing." The publication went on to say that the practise was invasive and
exposed people to identity theft in its criticism of the action. In the data gathering
mandated during COVID-19, many Namibians ranked identity theft as a major worry.
Women, in particular, are at greater danger as a result of the public data gathering
exercise. The Internet Society's Namibia branch investigated how a lack of
cybercrime and data protection legislation exposes women to violence and puts
them in vulnerable positions in cases of non-consensual picture sharing, online
blackmail, and sexualized hate speech. In early April, a young woman in the Oshana
area got an unwanted message after giving her details at a shop register. The event
became viral on social media, and a screenshot of it ended up on many people's
WhatsApp posts.97
While the COVID-19 Information Hub operated by the Namibian government does
not disclose personal information, the lack of regulation and training for firms doing
96
N, Gervasius.2021
97
N, Gervasius.2021
contact tracing has left individuals exposed to privacy abuses. Videos showing
consumer data have gone viral on TikTok and WhatsApp, revealing how simple it is
for people or corporations to gain access to and misuse personal information. There
are no industry norms or regulations for data protection, and it is simple to scan
through people's contact information on social media and in businesses. Even
though the Ministry of Information and Communication Technology is in the process
of formulating such regulations, COVID-19 has illustrated the urgent need to not only
expedite the bill's development, but also to ensure that it addresses new data privacy
and protection issues discovered during the pandemic. Any regulation must make
public education and understanding about how personal data is gathered, kept,
disseminated, and protected a top priority. A stronger data protection law in Namibia
would protect individuals from identity theft and data exploitation while also
improving COVID-19 contact tracing and keeping people safe.98
Chapter 4
4 Evolution of the internet as through the advent of social media and the
impact of the collection of user data
4.1 Introduction
The Internet's shared, universal protocols have allowed it to be easily modified and
extended into many other aspects of our life. The Internet influences everything, in
our daily lives, to the capacity to read newspapers from all over the globe, and the
way research and cooperation are carried out. The Internet has changed three
important aspects of communication, and these have resulted in profound changes
in the way we socially connect with one another: the speed of information, the
volume of information, and the “democratisation” of publishing, or the ability for
anybody to post their thoughts on the web.99
4.2 Evolution of the internet
The Internet itself has undergone a transformation. It was a static network meant to
transport a tiny packet of bytes or a short message between two terminals in its early
98
N, Gervasius.2021
99
Luman Canada. 2021. The Evolution of the Internet. Available from:
https://courses.lumenlearning.com/suny-massmedia/chapter/11-2-the-evolution-of-the-internet/ last
accessed 4 October 2021
days, which is still relatively recent in historical terms, and it was a storehouse of
information where material was produced and maintained solely by experienced
coders. However, now massive volumes of information are being posted and
downloaded via these digital behemoths such as Facebook, Twitter and YouTube,
and the content is very much our own, since we are all now commentators,
publishers, and producers.100 The Internet expanded its reach in the 1980s and
1990s to include the IT capabilities of universities and research institutes, and later,
governmental bodies, institutions, and commercial companies from across the world.
The Internet grew enormously; it was no longer a state-controlled project, but the
world's largest computer network, with over 50,000 sub-networks, 4 million systems,
and 70 million users.101 The advent of web 2.0102 in the first decade of the twentyfirst century was a revolution in the Internet's brief history, promoting the creation of
social media and other interactive, crowd-sourced communication tools. The Internet
was no longer just about exchanging information: it had evolved into a sophisticated
interdisciplinary tool that allowed people to create content, interact with one another,
and even escape reality. Today, we can transfer data from one end of the planet to
the other in seconds, make online presentations, and utilise images, video, music,
and text to communicate our true selves. Personal experiences are made public, and
local concerns are taken on a global scale.103
It's difficult to study social media without coming across the term "social networking."
As a result, both ideas are covered in this paper. According to Merriam-Webster,
social media are “forms of electronic communication (as Web sites for social
networking and blogging) in which users build online communities to share
information, ideas, personal messages, and other content (as videos).” Networking is
defined as “the interchange of information or services among individuals, groups, or
institutions; specifically: the cultivation of productive relationships for employment or
100
Z, Dentzel. 2014.Change: 19 Key Essays on How the Internet Is Changing Our Lives. Available from:
https://www.bbvaopenmind.com/en/articles/internet-changed-everyday-life/ last accessed 4 October 2021
101
Z, Dentzel.2014.
102
Web 2.0 websites stress user-generated content, simplicity of use, participatory culture, and end-user
interoperability. Darcy Di Nucci invented the phrase in 1999, and Tim O'Reilly and Dale Dougherty popularised
it at the first O'Reilly Media Web 2.0 Conference in late 2004.
103
Z, Dentzel.2014.
business” by the same source.104 One of the most significant and revolutionary
changes to the Internet has occurred as a result of social networking. We can now
see what all of our friends are doing in real time thanks to Twitter; we can consider
the opinions of complete strangers who may never write in traditional print thanks to
blogs; and we can find people we haven't talked to in decades through Facebook, all
without making a single awkward phone call. Although the term "social media" today
appears to be associated with websites like Facebook and Twitter, it is essential to
explore all of the ways a social media platform influences the Internet experience. 105
Humans are social animals; we thrive on, and even require, social connections to
live a healthy life and mind. Social media caters to these fundamental wants,
therefore it's no surprise that social media sites and applications are so popular
today. However, there's more to them than that. Social media applications provide
consumers with several useful functions:106
● They give a forum for people to meet new people and create friends from all
around the world.
● They enable users to join groups of people who share their interests and
hobbies.
● They are completely free to use (but as we all know "if there is no product to
buy you are the product").
● Specialized forums or platforms can connect you with a vast network of
people who can help you find a new career.
● Twitter, for example, has become a significant source of real-time (sometimes
genuine) news. This material is frequently seen 'raw,' with no typical media
bias or opinion added in.
4.3 Impact of Data Collection
In recent years, the gathering of private data has been a major subject in the press.
From Google's algorithms seemingly predicting what you'll search for even before
you start typing to Facebook's inadvertent selling of private user data to Cambridge
Analytica, more people than ever before are learning about the data that's gathered
104
Luman Canada. 2021.
105
Luman Canada. 2021.
106
C, McFadden. 2020.A Chronological History of social media. Available from:
https://interestingengineering.com/a-chronological-history-of-social-media Last accessed 4 October 2021
every day and how it's utilised. Data collection is here to stay, with all of its
advantages and pitfalls, whether it's a government collecting traffic data around the
city, a medical research business collecting information on paediatric patients, or a
for-profit company collecting consumer behaviour patterns.107
Collecting data from hundreds, if not millions, of individuals has advantages. Among
these advantages are:108
● Rapid Innovation, when you can collect a wide range of data, such as health
information on patients, you can create better, quicker inventions. Developers
may produce more customised, sophisticated technology that benefits bigger
groups of people by gathering as much information as feasible. The potential
of small pieces of information collected from millions of individuals might lead
to treatments for everything from cancer to the common cold in the future.
● Cost Savings, developing a new technique, method, or procedure used to
take a substantial amount of time and money. Individuals would have to be
recruited to do research or conduct interviews, compare data on paper, and
collect important information. All of the acquired data would then have to be
processed and interpreted, primarily by humans. Because of the high cost of
implementing new ideas using old processes, decision-making and genuine
change moved at a glacial pace. Because of the cost and time savings,
newer, better processes and goods have been able to reach the market more
quickly, driving change and innovation.
● Conserving resources, reducing natural resources and energy use used to be
a game of guessing. Is it really so important to dial down the thermostat a few
degrees at night? What about the solar electricity produced by a single solar
panel? However, because of digital data collecting, we now have more
reliable information than ever before on the magnitude of even little changes.
Scientists can better grasp how much carbon is saved by moving from coalfired electricity to hydroelectric power by looking at data collected from
individual households all the way up to entire countries. People are more
107
Assist. 2019.Data Collection: The Good, the Bad, and the Value. Available from:
https://atassist.com/blog/data-collection-the-good-the-bad-and-the-value Last accessed 4 October 2021
108
Assist.2019.
likely to undertake resource-saving actions when they have access to this
information.
● Faster response times, People want to be alerted of changes or disturbances
to their routines immediately in today's fast-paced world. Instead, then waiting
for traditional techniques of modelling, such as weather patterns or traffic,
contemporary data gathering allows for real-time data collection and
modelling. If there is an accident at a major crossroads, for example, during
rush hour, traffic can be rapidly re-routed to minimise traffic congestion and
annoyance for commuters. The data collected from traffic signals, sensors,
and even individual mobile phones may be used to generate an accurate map
that prevents accidents and keeps traffic running smoothly.
● Improved Access, with broad data collecting from a number of sources comes
a plethora of information that companies, and organisations may find useful.
Less expensive, more comprehensive data collecting technologies have
prompted several organisations to provide free or low-cost access to their
data holdings. This has enabled businesses and government organisations
that would not have been able to collect data on their own to conduct research
and development. This has enabled humanitarian innovation, such as the
United Nations Global Pulse's initiative using phone data to study refugee
integration in Turkey. This enables organisations to make better use of their
budgets and resources.
On the other hand, and possibly more frequently reported, are the negative
consequences of data collecting, which include:109
● Decreased Privacy, when data is gathered by authorities and corporations,
the individuals who provide the data lose control over their personal
information. Big internet firms like Facebook and Google are renowned for
amassing massive amounts of personal data on its users and, in some
circumstances, selling that data. Everything from your birthdate to your
favourite ice cream flavour is available to the public if you put it out there. The
lack of privacy in data gathering has been extensively criticised, prompting
some to advocate for the split of the major companies as well as tougher rules
on what data can and cannot be gathered.
109
Assist.2019.
● Unauthorized Utilization of data, following the 2016 presidential election in the
United States, it was revealed that Cambridge Analytica had gained the data
of millions of Facebook users, which was utilised in campaign advertising.
This data leak has renewed public criticism of businesses' acquisition and
exploitation of personal data. Why couldn't other businesses obtain access to
so much data under false pretences if one organisation could?
● Security, storing massive amounts of data, particularly very personal
information such as bank account numbers and medical records, need
rigorous security. Unfortunately, hackers are constantly on the lookout for
methods to circumvent even the most stringent digital protections in order to
get access to your data. High-profile data breaches at Marriott, Target, and
other businesses have prompted calls for greater security. While no one
technique of safeguarding digital data will ever be perfect, data security
specialists are always inventing new methods to secure and preserve the
personal data collected by governments, businesses, and other institutions.
● Expensive, while having large-scale access to specific data sets might help
some smaller businesses save money, turning data into a commodity can also
make it extremely expensive. If a firm gathers critical health data on cancer
patients, for example, it might simply charge researchers a fee for access to
such data. This might render access to vital information that could lead to lifesaving breakthroughs out of reach for some businesses. Furthermore,
understanding and analysing data sets necessitates the use of competent,
educated data scientists and other experts, as well as sophisticated tools.
Because of these costs, lower-budget organisations may have access to
valuable data but are unable to do anything with it.
Data collection and analysis are likely to grow as technology develops and
individuals feel more comfortable granting corporations’ access to their deepest,
darkest secrets. It's feasible that the future may offer a situation in which
corporations know what you're going to buy before you ever start shopping for it,
owing to predictive analytics and all of the data that's already been collected on you.
However, the growth of data collecting is unlikely to go uncontrolled. We are likely to
see more governments join the demand for control of what data may be gathered by
private firms and what that data can be used for, and existing tech behemoths may
succumb.110
4.4 Payment for user data
Every day, people generate an astounding quantity of data, amounting to around 2.5
quintillion bytes. Google handles 40,000 searches every second, and Facebook
receives 1.4 billion logins per day. Every minute, 16 million text messages are
transmitted, 156 million emails are exchanged, and 600 new Wikipedia pages are
added. Needless to say, the amount of data created every day, including right now,
is enormous. However, the businesses and enterprises that will ultimately benefit
from this data are not grumbling; in fact, they are delighted. Data is a gear in
contemporary society's wheel. Given the importance of data as a driving element,
shouldn't the consumers who supply this data in the first place be compensated for
its usage by IT companies? This topic has gained traction in recent years, with
academics and important individuals voicing it.111
More data has been produced in recent years than in all of human history combined.
Despite this huge output of data, consumers don't actually gain any 'benefit' or 'value'
except than 'temporarily' free services like Facebook, which in actuality profits more.
The actual beneficiaries here are the tech titans, and it is believed that the unfettered
flow of data would lead to an ever more unequal society and further encourage
exclusive capitalism. Facebook and Google are two of the major online firms that rely
on digital advertising for revenue. Advertisers pay these firms for the attention,
engagement, or clicks of their users. The business model is such that it uses user
data to make predictions about their behaviour with the objective of serving them
advertising and content that is tailored to such behaviour in the future.112
We've all grown accustomed to expecting free internet services. We use free
applications for everything, from finding directions to the doctor to texting colleagues.
Google and Facebook, which provide the great majority of these services, are
110
Assist.2019.
111
S, Golad.2020. Should Companies Pay Users for Their Data? Available from:
https://analyticsindiamag.com/should-companies-pay-users-for-their-data/ last accessed 6 October 2021
112
S, Golad.2020.
ranked No. 4 and No. 6, respectively, on the list of the world's biggest enterprises by
market value. It is common knowledge that Google and Facebook profit from digital
advertising. Advertisers pay for user attention and engagement, often known as
clicks. This business model makes predictions about user behaviour based on user
data, with the objective of serving relevant information and advertising at the correct
moment. If you search for an ophthalmologist, for example, you're likely to see an ad
for an eyeglasses store in your neighbourhood over the following few days, even if
you don't schedule an appointment to see the doctor.113
This is a positive depiction of the “age of surveillance capitalism”, a term popularised
by Harvard University's professor Shoshana Zuboff, who outlines how major internet
firms have amassed enormous influence and money by collecting data on
consumers. This business model's holy grail is to "think the thought before you do or,
to put it another way, foresee your behaviour. The best way to accomplish this is to
gather and analyse all data about your demographic, internet searches, consumer
buying history, friends, address, video content patterns. Such in-depth knowledge,
when paired with non-personal data such as weather and driving habits, has aided in
the creation of profitable internet enterprises. Data is the lifeblood of IT behemoths
such as internet advertising, ride sharing, the gig economy, and ecommerce and
other factors that accurately define your online presence and identity.114Is our data
considered "raw material," and should we be compensated for it? After all, Facebook
earned an average of $30 per follower worldwide in 2019. Understanding the unique
nature of data and its worth, as well as allowing instruments for increased social
value generation, is the answer. The idea of data is unique. It's been likened to oil,
gold, coal, poison, and CO2. These comparisons attempt to determine if data is a
resource that can be used to create value (oil, gold) or that it may cause individual
and public harm (carbon dioxide, poison).115
113
S. Kumar. 2020.Should we be paid for our data? Available from:
https://www.livemint.com/news/business-of-life/should-we-be-paid-for-our-data-11597337028791.html
last accessed 6 October 2021
114
S. Kumar.2020
115
J, Laidler. 2019.High tech is watching you. Available from:
https://news.harvard.edu/gazette/story/2019/03/harvard-professor-says-surveillance-capitalism-isundermining-democracy/ last accessed 06 October 2021
There are four features of data and its value that make assigning costs and benefits
to it particularly difficult. 116
● To begin with, unlike other resources such as oil or coal, data does not
depreciate as it is utilised. Several organisations can make several copies of
the same data and utilise it at any moment.
● Secondly, data has externalities, which are advantages or costs placed on
third parties that are unrelated to the transaction. Some externalities are
advantageous. When anonymized and combined with demographic data, a
person's daily commute data can assist Google Maps improve traffic
forecasts. Data on individual members of a group may be aggregated to
discriminate against an entire community, as an example of damage.
● Thirdly, data's value may be multiplied by merging it with other data sets. At
the same time, liabilities are expected to rise dramatically. As a result,
understanding value will have to take into consideration all elements of
individual gains and damages, to society welfare, and company profits.
● Finally, there occurs a value exchange. At least five stakeholders are involved
in the value generation process: the technology firm, the government, the
community, gig-economy workers, and people. Data is collected and
processed, and value is realised through monetization. Individuals and
communities benefit economically from IT companies' services such as maps,
news, email, and networking. Governments get a portion of the tax income,
and gig workers get paid. However, it is becoming increasingly obvious that
the present data economy design favours profit concentration among
technological behemoths and does not facilitate the realisation of fair value for
individuals and society.
Three concepts for political and legislative activities that might move the data
economy toward equitable results for all stakeholders are being explored. First, a
progressive tax on data monetization can be used to extract some revenue for
redistribution purposes. The money earned by data monetization should be subject
to a progressive tax, according to Nobel Laureate economist Paul Romer, which may
help to disincentivize the gathering and monetization of user data. While the initial
116
S. Kumar.2020
idea aims to reduce monitoring, this technology can be further investigated to see
whether it might help with economic redistribution.117
Second, the concept of providing a "data dividend" to every citizen can be
investigated. There are various arguments for and against the notion of "data
dividends," which involves corporations sharing revenues earned from the usage of
personal data directly with the individuals who gave it. In theory, paying for the use of
our personal data may result in fewer monopolies, better privacy rights, new sources
of revenue, and the opening up of vast markets that are now unavailable due to
current arrangements. Data dividends, on the other hand, are difficult to execute, do
not address the basic challenges of permission and coercion at the base of today's
problems, may impede innovation, and may result in a new set of inequality
issues.118
Finally, catalysing larger social value creation, such as finding a cancer cure using
data, can have enormous societal worth. The European Union's data strategy report
and India's non-personal data committee report both stressed the need of providing
broader access to community data sets in order to unleash the potential of data for
society. Data stewardship through structures such as cooperatives, trusts,
exchanges, personal data repositories, and account aggregators will guarantee
appropriate safeguards and enable individuals to share their data more freely.
Individuals and groups may be willing to share health data for research purposes
without anticipating monetary remuneration if a secure method is provided that
prohibits exploitation.119
4.5 Conclusion
People in Namibia are increasingly using smartphones to access social networking
sites such as Facebook, LinkedIn, Tumblr, Instagram, Twitter, WhatsApp, and
others. The bulk of those who use these forums are aspiring young people who want
their alternative viewpoints to be acknowledged. Because bandwidth is more
117
S. Kumar.2020
118
T, Wadhwa. 2020.Economic Impact and Feasibility of Data Dividends. Available from:
https://datacatalyst.org/reports/gettin-paid-pros-and-cons-of-data-dividends/ last accessed 6 October 2021
119
S. Kumar.2020
affordable in Namibia, more individuals are using social media, with many people
leaving traditional short messaging services (SMS) in favour of WhatsApp, Facebook
Messenger, Telegram, and other free social media texting programmes (apps). In a
variety of ways, social media communication platforms have provided a great deal of
ease. For example, college and university students share research materials and
lectures via networks such as WhatsApp, Telegram, and others, making learning
simpler. With the majority of young people linked to and on these channels, their
capacity to exchange communication messages, including images, videos, and voice
recordings, made them fast favourites. Social media has revolutionised business
communications and human resource operations as a result of this much-needed
ease.120
As a result of the increased use of these apps the data they have acquired has been
expanding tremendously. Thus, resulting in these companies better optimizing their
algorithms to hook people on their content for longer periods of time which has led to
negative impacts on people especially minors. The introduction of social media has
also had a negative influence on the academic performance of high school students
and university students. Many examples of social media addiction have been
documented in various nations across the world, according to empirical data. In
certain situations, social media has been blamed for relationship failure and
breakdown, with some partners complaining that their spouses are addicted to their
phones and do not pay attention to them. Although these are unfortunate, regulating
and/or controlling social media is extremely difficult, if not impossible, because it is
available through the simple download of programmes that instantly link one to the
platforms. In fact, attempts to control social media might be seen as a violation of
people's personal liberties.121
In regard to payment for data in my opinion data catalysation would have a larger
impact on social value creation. Location data collected by social media firms has
potential, albeit it is still in its early stages of development. From measuring the size
120
T,Sam.2019.Social Media and its Impact on Communication Available from:
https://www.namibian.com.na/192332/archive-read/Social-Media-and-its-Impact-on-Communication last
accessed 6 October 2021
121
T, Sam.2019
of urban slums to tracking the ownership of rural farmland to disaster impacts and
response, location tracking through phones has the ability to produce accurate data,
especially as more people buy cheaper smartphones every year from a growing
number of countries and companies, lowering the cost of data acquisition and
increasing its accessibility.122
Chapter 5
5 Internet Freedom and Policy Recommendations
5.1 Internet freedom in Namibia
In Namibia, online human rights, particularly the right to privacy, freedom of speech,
opinion, and access to information, are major concerns. According to the most recent
data from the International Telecommunication Union (ITU), the percentage of
Namibians who use the internet was 36.8% in June 2018, up from 14.8 percent in
2014.123 In addition 35.5 people out of every 100 had a mobile broadband
subscription in 2014. The percentage has grown to 59.3 in every 100 in 2018 (the
most recent year for which ITU data is available). With the rise of digitalisation, it is
more vital than ever for Namibia to preserve basic freedoms both online and offline,
in accordance with Namibia's responsibilities under the International Covenant on
Civil and Political Rights (ICCPR), the African Charter, and Article 21 of the
Constitution.124
Article 21 of the Constitution of the Republic of Namibia protects "freedom of
expression, the press, and other media," however 21(2) allows for justifiable
limitations, such as "national security, public order, decency or morality, contempt of
court, defamation, or incitement to a crime." Namibia scored 23rd out of 180 nations
on the global press freedom rating in 2019-2020125, making it the highest-ranking
122
D, Runde. 2017.The Data Revolution in Developing Countries Has a Long Way to Go. Available from:
https://www.forbes.com/sites/danielrunde/2017/02/25/the-data-revolution-in-developing-countries-hasa-long-way-to-go/?sh=7b74ace21bfc last accessed 6 October 2021
123
ITU, ‘Measuring the Information Society Report .2015.
https://www.itu.int/en/ITUD/Statistics/Documents/publications/misr2015/MISR2015-w5.pdf, Last Accessed 7
October 2021
124
CIPESA, Small Media, ISOC Namibia. 2020.Digital Rights in Namibia. Available at:
https://cipesa.org/?wpfb_dl=436 last accessed 9 October 2021.pp 1-2
125
Reporters Without Borders, 2020. Available at: https://rsf.org/en/namibia, Last Accessed 9 October 2021
African country. The courts have also maintained freedom of expression rights, as
seen by a historic April 2019 judgement dismissing an appeal by the Namibia Central
Intelligence Service (NCIS) to prevent the publishing of an article about corruption.126
Other laws, such as the Protection of Information Act127 and the Namibia Central
Intelligence Service Act128 (NCISA), restrict freedom of expression in Namibia, and
have been used by authorities to suppress the media. Meanwhile, the cabinet
approved a decree in 2016 providing state-owned media priority consideration in the
transmission of government information and ads.129 Officials from the state have
repeatedly criticised and even threatened the press's independence. Politicians have
threatened to censor social media engagements and conversations, endangering
freedom of expression online.130
5.2 Attacks on Internet Freedom and information
Namibian politicians have called for control of social media as a way to combat
disinformation and cybercrime, as it is increasingly being used to voice protest. In
mid-2019, a proposal to regulate social media was claimed to have split members of
parliament, but the Ministry of Information and Communication Technology
reaffirmed intentions to regulate it in February 2020. If such rules are drafted in a
hazy manner and approved without stakeholder participation, they may result in
unnecessarily restricting online expression. Politicians and government officials have
issued serious warnings131 and threats in recent years, saying that "irresponsible"
use of social media endangers lives132. Namibia prohibited the broadcasting of false
126
W, Menges.2019. Available at: https://allafrica.com/stories/201904130069.html, Last Accessed 12 October
2020
127
Act 84 of 1982
128
Act 10 of 1997
129
D, Kisting. 2016.Government prefers NBC, New Era. Available at:
https://www.namibian.com.na/157910/archive-read/Government-prefersNBC-New-Era, Last Accessed 9
October 2021
130
CIPESA, et al. 2020.Digital Rights in Namibia. pp 4-5
131
Quartz Africa,2018. ‘Colonial apartheid era laws southern African press freedom’, Available at:
https://qz.com/africa/1487311/colonial-apartheid-era-laws-hur-southern-africas-press-freedom/, Last
Accessed 9 October 2021
132
Namibian Sun, ‘Social media endangers lives’, Available at: https://www.namibiansun.com/news/socialmedia-endangerslives/, Last Accessed 9 October 2021
or misleading claims about the virus, including on social media, in April 2020 as part
of laws to combat the spread of COVID-19. The crime carries a fine of up to 2,000
Namibian Dollars (USD 134) or a six-month jail sentence. In June 2020, a man was
detained and punished for violating the restrictions.133
Despite the fact that there have been no cases of journalists being killed, imprisoned,
or reported missing13427, harassment, assault, and threats against journalists are
widespread. During the launch of a COVID-19 isolation facility in June 2020, two
journalists were assaulted13528 by a Presidential Security Unit. While the State
Department apologizes136, one of the journalists involved filed a charge of assault
against the security forces. Government leaders conducted verbal attacks against
the media during the 2019 elections. During this time, the government also issued a
public warning about cyberbullying137 .Despite its excellent standing in press
freedom rankings, Namibian journalists are said to be vulnerable to political pressure
and employer pressure, which limits their work in the public good. A Namibia Press
Agency journalist recently had a contentious meeting with President Hage
Geingob138, during which he openly and with permission raised questions that were
of public importance and required to be answered. As a result, the Namibia Press
Agency's administration issued a leaked statement distancing itself from the
journalist's actions. The media and an opposing political party both denounced this
instance.139
133
CIPESA, et al..2020. P 5
134
Committee to Protect Journalists (CPJ) Statistics Namibia’, Available at: https://cpj.org/africa/namibia/,
Last Accessed 9 October 2021
135
The Namibian, ‘Presidency security unit charged with assault’,
https://www.namibian.com.na/201403/archive-read/Presidency-security-unit-charged-with-assault, Last
Accessed 9 October 2021
136
All Africa, ‘Presidency Apologizes After Journalists Barred from Covering Launch of COVID-19 Facility’,
Available at: https://allafrica.com/stories/202006030808.html, Last Accessed 9 October 2021
137
The Namibian, ‘Govt warns against social media bullying’, Available at:
https://www.namibian.com.na/188284/archive-read/Govt-warns-against-social-media-bullying, Last Accessed
9 October 2021
138
Namibian Sun, ‘Journalist lands in trouble for fishrot question to Geingob’,
https://www.namibiansun.com/news/journalist-lands-in-trouble-for-fishrot-question-to-geingob2020-08-03,
Last Accessed 9 October 2021
139
CIPESA, et al. 2020.p 6
5.3 Internet access in Namibia
The Internet has now become one of the main methods by which persons exercise
their right to freedom of expression by receiving and transmitting information and
ideas, as well as providing essential tools for participation in activities and
discussions about political and public-interest issues. Furthermore, in light of its
accessibility and capacity to store and communicate vast amounts of information, the
Internet plays an important role in enhancing the public's access to news and
facilitating the dissemination of information in general. The Internet plays an
important role in enhancing the public's access to news and facilitating the
dissemination of information in general. On the Internet, user-generated expressive
activity gives an unprecedented platform for exercising freedom of speech.140
Namibia has one of the world's highest income inequality rates141. A lack of cheap
access and poor service quality are stifling the technology sector47. Namibia is
ranked 84th out of 100 nations in the 2020 Inclusive Internet Index, which evaluates
internet availability, affordability, content relevancy, and preparedness, while the
ITU's 2017 ICT Development Index puts it 118th out of 176 countries accessed. 142 A
National Broadband Policy (2020)143 was recently released with the goal of providing
everyone with dependable and affordable broadband access. While the policy is
vague in terms of target categories or areas, the five-year implementation action plan
aims to achieve 95 percent broadband penetration by 2024 and to put the Universal
Access and Service Fund into effect.144 Namibia receives a 29 percent rating on the
2020 Women's Rights Online Report Card, which evaluates internet access and
140
European Court of Human rights. 2021.Access to Internet and freedom to receive and impart information
and ideas. Available at: https://www.echr.coe.int/Documents/FS_Access_Internet_ENG.pdf last accessed 9
October 2021
141
The World Bank,2020. ‘Namibia Overview’, Available at:
https://www.worldbank.org/en/country/namibia/overview, Last Accessed 9 October 2021
142
ICT Development Index 2017, ‘internet availability, affordability, relevance of content and readiness ranks
143
Southern Time Africa’, Available at: https://southerntimesafrica.com/site/news/mict-namibia-launchesnational-broadbandpolicy, Last Accessed 9 October 2021
144
New Era, ‘Govt targets 95% broadband coverage by 2024’, Available at:
https://neweralive.na/posts/govt-targets-95-broadband-coverageby2024#:~:text=WINDHOEK%20%2D%20Government%20aims%20to%20achieve,Plan%20in%20the%20Nation
al%20Assembly, Last Accessed 9 October 2021
women's empowerment, relevance of content and services, online safety,
affordability, and digital skills and education. According to the report card, just 47%
of Namibian women have an internet connection, and there is no national strategy
that recognises technology as a tool for combating gender inequality. According to
the research, 1GB of data costs more than 8% of average monthly income145, putting
it out of reach for many Namibians.146
5.4 Right to privacy in Namibia
Data protection and privacy legislation does not exist in Namibia. There are,
however, some signs that things are moving in the right direction.147 A multistakeholder consultation on the data protection bill was held in February 2020,
reportedly attracting 85 participants from the offices of the President, Vice-President,
and Prime Minister; Parliament; the Ministry of ICT; criminal justice authorities;
ministries of education, gender equality, and child welfare; ministries of agriculture
and land reform; internet and telecommunications service providers; and civil society
organisations. In the absence of data protection legislation, data breaches have
been recorded at all levels, from corporate148 to individual. The Ministry of ICT, with
the help of the Council of Europe, undertook additional stakeholder consultations on
the Bill via online platforms from September to mid-October.
According to The Namibian newspaper in a thorough three-edition study, there is a
strong sense of state-sponsored monitoring among civil society and the media,
notably by the Central Intelligence Service.149 Civil society and the media think that
the government, notably the Central intelligence service, is heavily involved in
arbitrary interception and monitoring of individuals, violating their private rights.
145
Alliance for Affordable Internet, ‘2019 Affordability Report. Available at: https://a4ai.org/affordabilityreport/report/2019/, Last Accessed 9 October 2021
146
CIPESA, et al. 2020.p 7
147
GLACY+: Stakeholders’ Consultation Workshop on the Data Protection Bill in Namibia’, Available at:
https://www.coe.int/en/web/cybercrime/-/glacy-stakeholders-consultation-workshop-on-the-dataprotection-bill-innamibia, Last Accessed 9 October 2021
148
The Namibian, ‘SSC leak exposes personal info online’, Available at:
https://www.namibian.com.na/178310/archive-read/SSC-leak-exposes-personal-info-online, Last Accessed 9
October 2021
149
Action Access to Internet, ‘The rise of the Namibian surveillance state (Part I)’, Available at: https://actionnamibia.org/risenamibian-surveillance-state/, Last Accessed 9 October 2021
Online violence against women, on the other hand, continues to be a problem.150
According to a report by the World Web Foundation, Namibia's lack of cybercrime
and data protection legislation puts women at risk of violence and puts them in
vulnerable positions in cases of non-consensual image sharing (also known as
revenge pornography), online blackmail, and sexualized hate speech.151
5.5 Conclusion
In conclusion here are the recommendations to address the issues discussed in this
paper:
•
Reject unreasonable limitations on information availability and freedom of
expression. The Namibian government should promote and preserve internet
access, rather than prohibiting the use of social media and messaging
systems. While such services may raise legitimate societal and national
security concerns, bans are an arbitrary and excessive response that restricts
users cultural, social, and political expression unfairly. Rather than resorting to
national security orders and emergency measures, governments should
address any legitimate human rights or other risks posed by such services
through standard democratic mechanisms, such as legislation passed in
consultation with civil society experts and affected stakeholders.152 Thus the
government should amend the Namibia Central Intelligence Services Act 10,
1997, by repealing section 4 which blanketly prohibits persons from accessing
information on grounds of “national security”.153
•
Take steps to close the digital gap. With more employment and schools going
online, the consequences of uneven internet access are becoming more
severe. The government should cooperate with service providers to reduce
data restrictions and eliminate late payment fines in the near term, as well as
encourage community-based efforts to provide secure public access points
150
Oxford Human Rights Hub, ‘Addressing ‘Revenge Porn’ in Namibia’, Available at:
https://ohrh.law.ox.ac.uk/addressingrevenge-porn-in-namibia/, Last Accessed 9 October 2021
151
CIPESA, et al. 2020.p 10
152
Freedom House. 2021.Policy Recommendations: Internet Freedom. Available at:
https://freedomhouse.org/policy-recommendations/internet-freedom. Last accessed 9 October 2021
153
CIPESA, et al. 2020.p 10
and lend electronic devices to those who need them. Longer-term initiatives
might include increasing internet access and infrastructure for underprivileged
areas and people, ensuring that connection is accessible regardless of
economic level, and establishing strong legislative safeguards for user privacy
and net neutrality.154 The best way to do this is by Operationalising the
Universal Service Fund and the National Broadband Policy (2020) to promote
affordable, equal and equitable access to the internet and related
technologies among women and underserved communities.155
•
Pass strong data privacy regulations and safeguard encryption. Enact
Cybercrime, Data Protection and Privacy legislation in compliance with Article
21 of the Constitution and international human rights standards and
obligations.156 Persons should have control over their data, including the ability
to view, delete, and transfer it to third-party providers. The government should
only be able to access personal data in particular circumstances as defined by
law, with court approval and within a specific time period. Companies should
also be forced to explain how they utilise consumer data in nontechnical
language, as well as information about third parties that have access to the
data and how they are authorised to use it. If a customer's information is
stolen, companies should be compelled to tell them as soon as possible.157
154
Freedom House.2021.
155
CIPESA, et al. 2020.p 10
156
CIPESA, et al. 2020.p 10
157
Freedom House.2021.
6 References
6.1 Legislation
The Constitution of Namibia
Communications Act of 2008
Namibia Central Intelligence Service Act of 1997
Electronic Transactions and Cybercrime bill
General Data Protection Regulation (GDPR)
United States of America Constitution
Obstruction of correspondence 42 U.S.C. § 1702.
The Protection of Personal Information Act(POPIA)
6.2 International Treaties
Universal Declaration of Human Rights
United Nations Convention on Migrant Workers Article
International Covenant on Civil and Political Rights
6.3 Books
Edward Snowdan,2019. Permanent Record, Metropolitan Books
James Griffiths, 2019, The Great Firewall of China: How to Build and Control an
Alternative Version of the Internet, Zed Books
M Evgeny. 2012.The Net Delusion: The Dark Side of Internet Freedom. Public
Affairs
T. Morey. 2020.Customer Data and Privacy, Harvard Business Review
A. Singh, C. Embling, C. Payne et al.2019.Everything you wanted to know about
GDPR but were afraid to ask. Cyber Governance alliance.
P. Bernal. The Internet, Warts and All: Free Speech, Privacy and Truth. Cambridge
University Press.
D, Solove. 2006.A Brief History of Information Privacy Law. Washington. George
Washington University Law School
Silas J. Wasserstrom & Louis Michael Seidman.1998. The Fourth Amendment
as Constitutional Theory, 77 GEO. L.J. 19, 82
M, David.1979. Privacy law and public policy 38; see also
W Stuntz.1995. The Substantive Origins of Criminal Procedure, 105 YALE L.J.
6.4 Reports
J, Yang. 2020.WeChat Becomes a Powerful Surveillance Tool Everywhere in China.
Wall street journal.
Namibia internet Governance Forum report
Draft provisions of the electronic transactions and cybercrime bill Report by
Frederico Links and Graham Hopwood
Universal Periodic Review Stakeholder Report: 24th Session, Namibia the Right to
Privacy in Namibia
S, Warren. L Brandeis.1890. The Right to Privacy. Massachusetts. Harvard Law
Review.
T. Adelola, R. Dawson and F. Batmaz, "Privacy and data protection in E-commerce:
The effectiveness of a government regulation approach in developing nations, using
Nigeria as a case," The 9th International Conference for Internet Technology and
Secured Transactions (ICITST-2014), 2014, pp.234-239,
6.5 Case Law
Ex parte Jackson, 96 U.S. 727 (1877)
Prince Albert v Strange (1849) 47 ER 1302
6.6 Internet Sources
Techopedia. 2020.Internet Privacy. Available at:
https://www.techopedia.com/definition/24954/internet-privacy Last Accessed 15 May
2021
Law insider. 2020.Dictionary, Available at
https://www.lawinsider.com/dictionary/user-data last accessed 12 February 2021.
M. Nadeau ,2020, General Data Protection Regulation (GDPR): What you need to
know to stay compliant. Available at:
https://www.csoonline.com/article/3202771/general-data-protection-regulation-gdprrequirements-deadlines-and-facts.html.Last accessed 12 February 2021
Open Access Government. 2018. The five key business benefits of GDPR, Available
at https://www.openaccessgovernment.org/the-five-key-business-benefits-ofgdpr/44554/ last accessed 12 February 2021
L.Feiner,2019, YouTube and its users face an existential threat from the EU’s new
copyright directive. Available at https://www.cnbc.com/2019/05/10/youtube-facesexistential-threat-from-the-eus-new-copyright-directive.html last accessed 12
February 2021
Amnesty international. 2021.What is the universal declaration of human rights and
why was it created? Available at: https://www.amnesty.orgen/what-we-do/universaldeclaration-of-human-rights/ last accessed 16 June 2021
United Nations. 2021.Universal Declaration of Human Rights Available at:
https://www.un.org/en/ab/out-us/universal-declaration-of-human-rights last accessed
16 June 2021
Convention for the Protection of Individuals with regard to Automatic Processing of
Personal Data ETS No.108 1985
Council of Europe. 2021.Convention for the Protection of Individuals with regard to
Automatic Processing of Personal Data. Available at:
https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/108 last
accessed 16 June 2021
UN Human rights office of the High commissioner. 2011. The charter of human rights
and principles for the internet. Available at:
https://www.ohchr.org/Documents/Issues/Opinion/Communications/InternetPrinciple
sAndRightsCoalition.pdf last accessed 16 June 2021
Association of progressive communications. 2019. African Declaration on Internet
Rights and Freedoms Coalition: Promotion of freedom of expression a priority for
Southern Africa Available at https://www.apc.org/en/news/african-declarationinternet-rights-and-freedoms-coalition-promotion-freedom-expression last accessed
16 June 2021
African declaration on internet rights and freedom. 2014.The charter of human rights
and principles for the internet. Available at: https://africaninternetrights.org/ Last
accessed 16 June 2021
M. Todd. 2013. China lost 14 million people in World War II. Why is this forgotten?
Available from: https://psmag.com/news/china-lost-14-million-people-world-war-iiforgotten-66482 last accessed 15 August 2021
The Illinois Holocaust Museum and Education Center. 2021.Holocaust
misconceptions. Available from: https://www.ilholocaustmuseum.org/holocaustmisconceptions/ last accessed 15 August 2021
P. Fowler.2017. Data Privacy Day? Yeah, it’s a Thing. Available from:
https://www.swlaw.com/blog/data-security/2017/01/27/data-privacy-day-yep-its-athing/ last accessed 15 August 2021
Amnesty International. 2021. Universal declaration of Human rights. Available from
https://www.amnesty.org/en/what-we-do/universal-declaration-of-human-rights/ last
accessed 15 August 2021
Privacy International. 2021.What is Privacy? Available at:
https://privacyinternational.org/explainer/56/what-privacy last accessed 16 June
2021
D.Phillips. 2020.Data Privacy vs. Data Security: What is the Core Difference?
Available from: https://www.tokenex.com/blog/data-privacy-vs-security last accessed
10 September 2021
Privacy International. 2015.The Right to Privacy in Namibia. Available from:
https://privacyinternational.org/sites/default/files/201712/Namibia%20UPR_PI_submission_FINAL.pdf last accessed 16 September
D. Harrington. 2021.Data Security: Importance, Types, and Solutions. Available
from: https://www.varonis.com/blog/data-security/ last accessed 13 September 2021
P. Bhagattjee. 2021.South Africa - Data Protection Overview. Available from:
https://www.dataguidance.com/notes/south-africa-data-protection-overview last
accessed 16 September 2021
T. Warikandwa T.2021. "Personal Data Security in South Africa's Financial Services
Market: The Protection of Personal Information Act 4 of 2013 and the European
Union General Data Protection Regulation Compared" PER / PELJ 2021(24).
Available from: https://perjournal.co.za/article/view/10727 last accessed 16
September 2021
N, Statt. 2021.WhatsApp to delay new privacy policy amid mass confusion about
Facebook data sharing. The Verge. Available at:
https://www.theverge.com/2021/1/15/22233257/whatsapp-privacy-policy-updatedelayed-three-months last accessed 16 September 2021
Tessian.202120 Biggest GDPR Fines of 2019, 2020, and 2021.Available at:
https://www.tessian.com/blog/biggest-gdpr-fines-2020/ last accessed 21 September
2021
GDPR Summary. 2021.GDPR Summary. Available at:
https://www.gdprsummary.com/gdpr-summary/ last accessed 21 September 2021
Council of Europe.2020. Cybercrime policies/strategies. Available from:
https://www.coe.int/en/web/octopus/country-wiki-ap//asset_publisher/CmDb7M4RGb4Z/content/namibia/pop_up?_101_INSTANCE_Cm
Db7M4RGb4Z_viewMode=print&_101_INSTANCE_CmDb7M4RGb4Z_languageId=
en_GB last accessed 16 September 2021
General Comment No. 16 (1988), para1. Available from:
https://www.ifex.org/namibia/2008/11/25/new_bill_on_communication_interception/
last accessed 16 September 2021
N, Gervasius.2021. Data protection and privacy in the absence of law: a Namibian
exploration during covid-19. Available from: https://openinternet.global/news/dataprotection-and-privacy-absence-law-namibian-exploration-during-covid-19 last
accessed 17 September 2021
D, Runde. 2017.The Data Revolution in Developing Countries Has a Long Way to
Go. Available from: https://www.forbes.com/sites/danielrunde/2017/02/25/the-datarevolution-in-developing-countries-has-a-long-way-to-go/?sh=7b74ace21bfc last
accessed 6 October 2021
T, Sam.2019.social media and its Impact on Communication Available from:
https://www.namibian.com.na/192332/archive-read/Social-Media-and-its-Impact-onCommunication last accessed 6 October 2021
T, Wadhwa. 2020.Economic Impact and Feasibility of Data Dividends. Available
from: https://datacatalyst.org/reports/gettin-paid-pros-and-cons-of-data-dividends/
last accessed 6 October 2021
J, Laidler. 2019.High tech is watching you. Available from:
https://news.harvard.edu/gazette/story/2019/03/harvard-professor-says-surveillancecapitalism-is-undermining-democracy/ last accessed 06 October 2021
S. Kumar. 2020.Should we be paid for our data? Available from:
https://www.livemint.com/news/business-of-life/should-we-be-paid-for-our-data11597337028791.html last accessed 6 October 2021
S, Golad.2020. Should Companies Pay Users for Their Data? Available from:
https://analyticsindiamag.com/should-companies-pay-users-for-their-data/.last
accessed 6 October 2021
S, Herman. 2020. Should Tech Companies Be Paying Us for Our Data? Available
from: https://www.forbes.com/sites/forbestechcouncil/2020/10/30/should-techcompanies-be-paying-us-for-our-data/?sh=4528434e4147 last accessed 6 October
2021
Assist. 2019.Data Collection: The Good, the Bad, and the Value. Available from:
https://atassist.com/blog/data-collection-the-good-the-bad-and-the-value.last
accessed 4 October 2021
C, McFadden. 2020.A Chronological History of social media. Available from:
https://interestingengineering.com/a-chronological-history-of-social-media Last
accessed 4 October 2021
Z, Dentzel. 2014.Change: 19 Key Essays on How the Internet Is Changing Our
Lives. Available from: https://www.bbvaopenmind.com/en/articles/internet-changedeveryday-life/ last accessed 4 October 2021
Luman Canada. 2021. The Evolution of the Internet. Available from:
https://courses.lumenlearning.com/suny-massmedia/chapter/11-2-the-evolution-ofthe-internet/ last accessed 4 October 2021
ITU, Measuring the Information Society Report .2015. Available at:
https://www.itu.int/en/ITUD/Statistics/Documents/publications/misr2015/MISR2015w5.pdf, Last Accessed 7 October 2021
CIPESA, Small Media, ISOC Namibia. 2020.Digital Rights in Namibia. Available at:
https://cipesa.org/?wpfb_dl=436 last accessed 9 October 2021.
Reporters Without Borders, 2020. Available at: https://rsf.org/en/namibia, Last
Accessed 9 October 2021
W, Menges.2019. Available at: https://allafrica.com/stories/201904130069.html, Last
Accessed 12 October 2020
D, Kisting. 2016.Government prefers NBC, New Era. Available at:
https://www.namibian.com.na/157910/archive-read/Government-prefersNBC-NewEra, Last Accessed 9 October 2021
Quartz Africa. 2018.Colonial apartheid era laws southern African press freedom’,
Available at: https://qz.com/africa/1487311/colonial-apartheid-era-laws-hur-southernafricas-press-freedom/, Last Accessed 9 October 2021
Namibian Sun, ‘Social media endangers lives’, Available at:
https://www.namibiansun.com/news/social-media-endangerslives/, Last Accessed 9
October 2021
Committee to Protect Journalists (CPJ) Statistics Namibia’, Available at:
https://cpj.org/africa/namibia/, Last Accessed 9 October 2021
The Namibian, ‘Presidency security unit charged with assault’,
https://www.namibian.com.na/201403/archive-read/Presidency-security-unitcharged-with-assault, Last Accessed 9 October 2021
All Africa, ‘Presidency Apologizes After Journalists Barred from Covering Launch of
COVID-19 Facility’, Available at: https://allafrica.com/stories/202006030808.html,
Last Accessed 9 October 2021
The Namibian, ‘Govt warns against social media bullying’, Available at:
https://www.namibian.com.na/188284/archive-read/Govt-warns-against-socialmedia-bullying, Last Accessed 9 October 2021
Namibian Sun, ‘Journalist lands in trouble for fish rot question to Geingob’,
https://www.namibiansun.com/news/journalist-lands-in-trouble-for-fishrot-question-togeingob2020-08-03, Last Accessed 9 October 2021
European Court of Human rights. 2021.Access to Internet and freedom to receive
and impart information and ideas. Available at:
. https://www.echr.coe.int/Documents/FS_Access_Internet_ENG.pdf last accessed 9
October 20
TheWorldBank,2020. ‘Namibia Overview’, Available at:
https://www.worldbank.org/en/country/namibia/overview, Last Accessed 9 October
2021
ICT Development Index 2017, ‘internet availability, affordability, relevance of content
and readiness ranks
SouthernTimeAfrica’,2020Availableat:
https://southerntimesafrica.com/site/news/mict-namibia-launches-nationalbroadbandpolicy, Last Accessed 9 October 2021
New Era,2020. Govt targets 95% broadband coverage by 2024’, Available at:
https://neweralive.na/posts/govt-targets-95-broadband-coverageby2024#:~:text=WINDHOEK%20%2D%20Government%20aims%20to%20achieve,
Plan%20in%20the%20National%20Assembly, Last Accessed 9 October 2021
The Namibian, ‘SSC leak exposes personal info online’, Available at:
https://www.namibian.com.na/178310/archive-read/SSC-leak-exposes-personal-infoonline, Last Accessed 9 October 2021
Action Access to Internet, ‘The rise of the Namibian surveillance state (Part I)’,
Available at: https://action-namibia.org/risenamibian-surveillance-state/, Last
Accessed 9 October 2021
Freedom House. 2021.Policy Recommendations: Internet Freedom. Available at:
https://freedomhouse.org/policy-recommendations/internet-freedom. Last accessed
9 October 2021
Action Access to Internet, ‘The rise of the Namibian surveillance state (Part I)’,
Available at: https://action-namibia.org/risenamibian-surveillance-state/, Last
Accessed 9 October 2021
Download