Author: Tsakani Stella Rikhotso

  • 116935-3-9 SayPro Lesson Sending Email

    By the end of this lesson, learners should be able to:

    • Identify the parts of the email message window
    • Compose and send an email message
    • Receive new email messages
  • 116935-3-8 SayPro Lesson Security considerations

    An organisation must take note of certain security considerations of using the internet for transmitting messages in terms of both the environment and its implications to the immediate environment.

    1. Computer virus

    A computer virus is an unauthorised software program or portion of a program that is introduced into a computer or network. The purpose of a virus is to damage data files, delete data or perform other harmful actions. Depending on the purpose of a particular virus, the reformatting of an infected diskette or hard drive may be the only method of dealing with the virus. This will result in the loss of all the data on the diskette or hard drive.

     

    • Computer viruses are becoming more common and the number of viruses being detected has increased. The downloading or copying of unauthorised software onto employees’ PCs is one of the easiest ways for these viruses to invade a computer or network.

     

    • It is therefore important that the company not permit its employees to download data of whatever nature except possibly to a stand-alone PC set aside for this purpose. Further, all information downloaded onto the PC should be checked with virus scan software, which the company should have. The organisation should accordingly contain stringent rules in this regard to safeguard its data and computer system

     

    1. Encryption

    Encryption is the process of disguising, that is, encrypting, a readable communication, into an unintelligible scramble of characters according to some code or cipher. The readable communication is called plaintext. The encrypted communication is called ciphertext. Decryption is the process of converting the ciphertext back to its original, readable form”.

     

    • Most encryption software programs use algorithms and encryption keys. These keys contain a string of zeros and ones of varying lengths. Each character in the string is called a bit. Encryption software combines the message or attachment to be transmitted and the key in a complex mathematical algorithm, resulting in the ciphertext. The longer the bits in the key, the more difficult it is to “crack” the encryption system without the key.

     

    • Given the fact that the Internet is an open network, it is important to remember that if one is going to send messages which are not encrypted; this would be the electronic equivalent of sending postcards, as opposed to the equivalent of sealed envelopes when encryption is used.

     

    • It appears as if encryption software is free to be used by commercial or private organisations (i.e. one does not need a permit from the relevant government department to use it). The situation is governed by the Armaments Development and Production Act.This Act must be read in conjunction with Schedule 1 of the General Armaments Control Schedule. In terms of the Schedule, the South African government controls encryption as a dual-use item. This means that the export of encryption software requires an individual validated licence. While the Act does not specifically include encryption software in its definition of “armaments”, item 8 of the Schedule places controls on the export of military equipment that possesses cryptographic capabilities. Hence, a valid permit is required from the Armaments Control Division for the import of cryptographic equipment for software.

     

    • It is important for South African users to note that the export of encryption software is regulated in many countries.In the United States, these regulations take the form of export controls. The practical effect of this for South African users is that they are not able to use, for example, PGP (Pretty Good Privacy). However, there is an international version of PGP (known as PGPi) which is available for use by South African users.

     

    1. Spam filter

    Spam is any kind of email that you don’t want and that you didn’t sign up to receive. Some spam is annoying but harmless, but some might be part of an identity theft scam or other kind of fraud. You can get spam in instant messages, text messages, and on your social networking sites. This information below will help you to reduce spam email.

    • Use email software with built-in spam filtering.SmartScreen filter helps reduce unwanted email. It’s built into Microsoft email programs and is turned on by default.

     

    • Add people you know to your safe sender list and unwanted senders to your blocked list.This helps SmartScreen personalize your email experience, to deliver email that you want into your Inbox, and to filter unwanted email into the Junk folder.

     

    • Share your email address only with people you know.Avoid posting your email address on your social networking site, in large Internet directories, and in job-posting websites. Don’t even post it on your own website (unless you disguise it as described below).

     

    • Ignore junk email or IM.Spammers get rich (and build their contact lists, too) when people buy their “products.” So don’t reply to spam (even to unsubscribe), buy anything from an unfamiliar business, give to any “charity” you don’t know by reputation, or agree to hold or transfer money for anyone. Messages that appear to come from Microsoft and that ask for your password or threaten to close your account or expire your password are false.

     

    • Look for pre-checked boxes.When you shop online, companies sometimes pre-select check boxes that indicate you have agreed that it’s fine to sell or give your email address to responsible parties. Be prudent about when to subscribe to email newsletters and about what kind of email messages you are willing to receive. Clear the check box if you don’t want to be contacted.

     

    • Read the privacy policy.When you sign up for web-based services such as banking, shopping, or newsletters, carefully read the privacy policy before you reveal your email address so you don’t unwittingly agree to share confidential information. The privacy policy should outline the terms and circumstances regarding if or how the site will share your information. If a website does not post a privacy statement, consider taking your business elsewhere.

     

    • Disguise your email address.When you post to a message board, newsgroup, chat room, or other public web page, spell out your entire email address, for example, SairajUdin AT example DOT com. This way, a person can interpret your address, but the automated programs that spammers use often cannot.

     

    • Improve your computer’s security.You can greatly reduce your risk from hackers, viruses, and worms if you use a firewall, keep your Windows and Microsoft Office software up to date, and install antivirus and antispyware software and update it routinely.

     

  • 116935-3-7 SayPro Lesson Provision of email facilities to employees

    It is a principle of South African law that an employer can be held liable for a delict committed by its employee, as long as it can be shown that

    1. The employee is in fact liable for the delict,
    2. That an employer/employee relationship existed at the time the delict was committed and
    3. The delict was committed by the employee “in the course and scope of his or her employment”.

    This phrase refers to acts committed by the employee in the exercise of the functions to which he/she was appointed, including such acts as are reasonably necessary to carry out the employer’s instructions.

    • While South African law recognises that the employer creates a risk that third parties may be harmed by its employees committing wrongful acts in the course of their duties and that it should be liable to compensate people who suffer harm when the risk materialises, the question posed above has not yet been tested in South African courts. The answer will depend on all of the facts and circumstances of the case. The enquiries will include an examination of the nature and content of the e-mail, the employee’s position, title, scope of responsibilities (and perhaps experience), and the nature of the employer (public or private company, close corporation or partnership). Most importantly one should consider whether the offending act was committed in pursuance of the execution of the employer’s business or whether the employee can be said to have engaged in a “frolic of his own”.

     

    • It is important to remember that binding contracts can be concluded by e-mail and an employer could be bound to a contract entered into by the employee for and on behalf of the company if the employee was either authorised to conclude the contract or if the employee’s responsibilities typically included such activities.

     

    • It is also important to remember that the contracting parties need not be human beings, as sale agreements are now commonly being concluded with “electronic agents” online.In addition, when entering into purchase and sale agreements online, it must be remembered that South African Reserve Bank (SARB) exchange controls apply to all residents in South Africa who wish to remit moneys abroad. This applies to payment in respect of goods purchased abroad. South African residents are also required to pay customs duties and VAT on any imported items when they are collected at the point of entry (which is usually the recipients’ local post office).

     

    • E-mail can contain binding “admissions”, just as can regular mail or other documents. Again the determination will turn on authority and scope of employment. To avert this possibility, some companies have taken to suggesting that their employees draft fairly lengthy electronic “signatures” (which are affixed automatically to the end of all e-mail messages) that expressly disclaim the employee’s authority to act for or bind the employer.

     

    • Even if the employee disclaims official connection with the employer (i.e. by stating that “the following are only my opinions, and do not reflect those of my employer”), can the reputation of the employer be adversely affected? Certainly. In most cases, e-mail from company-provided systems will contain routing information that identifies the company’s Internet “domain” (e.g. name-of-your-company.co.za).

     

    • Aware of this possibility, some employees have taken to posting theirscurrilous messages using pseudonyms while trying to remain anonymous. Unfortunately, this is easier to contemplate than to accomplish. Traffic on the Internet is composed of “packets” which may be likened to postcards, carrying a message, an address, and a return address (these are called “IP addresses”).

     

    • Every e-mail message and browser enquiry is conveyed over the Internet in “packet” format, and monitoring software can easily capture the IP address of the sender’s computer. Whether this IP address is sufficient to actually identify a specific individual depends on the sender’s computer configuration and local computer environment (e.g. a corporate intranet or LAN, or dial-up through an Internet service provider or online service provider).

     

    • Again, where the sender uses a corporate direct connection to the Internet, his/her e-mail and browser requests will carry the corporation’s “.co.za” or “.com” imprimatur and will appear to observers to have come fromsomeone in the company. True anonymity is very difficult to attain.

    From the above it should be apparent that employees need to be educated in the risks of sending e-mails or browsing the Internet. It often happens that they are horrified to learn that their every move leaves an audit trail (irrespective of whether or not anyone actually is monitoring their exchanges or later decides to review the system logs). After employees have been educated in these points they are much more likely to act with circumspection in their posting and surfing (both official and personal).

    Note

    • An organisation must have email policies in place so that employees will not misuse the service. Employees should not email confidential information about the company to anyone. If there are no policies in place, an employee can email sensitive and confidential information to friends of competitors- the company can lose its clients because of this act.

     

    • Employees should not be allowed to visit and download information from some sites. Employees can unknowingly download viruses while downloading information from invalid sources. Viruses spread quickly in workplaces as employees exchange and use removable devices like memory sticks. Viruses can damage the system and destroy valuable information in an organisation.
  • 116935-3-6 SayPro Lesson Films and publications Amendment Act 2009

    While this Act does not deal specifically with the Internet, the definition of a “publication” is wide enough to include the Internet.

    Although the provisions of this Act seek to regulate the distribution of films and publications (including pornography), one must interpret them having due regard to the fundamental rights to privacy and of freedom of expression which are protected in the Bill of Rights. See also chapters 12 and 13.

    With regard to “hate speech”, the right to freedom of expression does not extend to advocacy of hatred that is based on race, ethnicity, gender or religion and that causes incitement to cause harm. It must be noted that like pornography, it is only the distribution of such material which is an offence under the Act.

    With regard to defamation by companies and employees of companies, one of the important issues is where the duty to regulate lies; whether there is a duty on the company or Internet service provider (ISP) to regulate the publication of material (whether it is by way of e-mail or a bulletin board on the company’s intranet) is a moot point. Unfortunately, this issue has not been decided in South Africa and companies that decide not to regulate and instead do nothing, could be exposing themselves to a possible claim for negligence on grounds that they owed a duty of care to their employees and third parties to impose some restrictions.

    In so far as e-mail might be the medium for the defamatory statement in the workplace, it is important to remember that the defamation will probably occur at the place where the offending material is accessed. This might impact on defamatory e-mail received from a foreign jurisdiction, as a South African court will only have jurisdiction in South Africa if the words were published (accessed) in South Africa.

  • 116935-3-5 SayPro Lesson Legislation relating to emails

    The following are some of the legislations that relate to use of emails.

    1. Electronic Communications and Transactions Act, 2002

    The overall objective of the Act is to enable and facilitate electronic transactions by creating legal certainty around transactions and communications conducted electronically. The Act seeks to address the following policy imperatives:

    • bridging the digital divide by developing a national e-strategy for South Africa;
    • ensuring legal recognition and functional equivalence between electronic and paper-based transactions;
    • promoting public confidence and trust in electronic transactions; and
    • providing supervision of certain service providers
    1. A) Facilitating electronic transactions

    Part 1 provides for the legal recognition of data messages and records. Electronic data will, subject to certain conditions, be permitted to be retained for statutory record retention purposes, will be regarded as being ‘‘in writing’’, and as a true copy of an ‘‘original’’ record, and provision is made for securing proper evidentiary weight of electronic evidence.

    Part 2 deals with the rights and obligations that follow from the communication of data messages. The Act also provides for the validity of sending notices and other expressions of intent through data messages.

     

    1. B)  Cyber inspectors

    Chapter XII of the Act seeks to provide for the Department of Communications to appoint cyber inspectors. The cyber inspectors may monitor Internet web sites in the public domain and are granted powers of search and seizure of “information systems”, subject to obtaining a warrant. The Act’s definition of ‘‘information system’’ means a system for generating, sending, receiving, storing, displaying or otherwise processing data messages and includes the Internet;

    Under Section 82 (1) A cyber inspector may, in the performance of his or her functions, at any reasonable time, without prior notice and on the authority of a warrant issued in terms of section 83(1), enter any premises or access an information system that has a bearing on an investigation

    [Amongst other things] He is authorised to:

    1. Search those premises or that information system;
    2. Search any person on those premises if there are reasonable grounds for believing that the person has personal possession of an article, document or record that has a bearing on the investigation;
    3. Take extracts from, or make copies of any book, document or record that is on or in the premises or in the information system and that has a bearing on the investigation;
    4. Demand the production of and inspect relevant licenses and registration certificates as provided for in any law;
    5. Inspect any facilities on the premises which are linked or associated with the information system and which have a bearing on the investigation;

    A person who refuses to co-operate or hinders a person conducting a lawful search and seizure in terms of this section is guilty of an offence.

     

    1. C) Unsolicited goods, services or communications

    Unsolicited emails now have a legal definition and must meet certain requirements.

    45(1): Any person who sends unsolicited commercial communications to consumers, must provide the consumer

    (a) With the option to cancel his or her subscription to the mailing list of that person; and

    (b) With the identifying particulars of the source from which that person obtained the consumer’s personal information, on request of the consumer.

     

    (2) No agreement is concluded where a consumer has failed to respond to an unsolicited communication.

     

    (3) Any person who fails to comply with or contravenes subsection (1) is guilty of an offence and liable, on conviction, to the penalties prescribed in section 89(1).

     

    (4) Any person who sends unsolicited commercial communications to a person, who has advised the sender that such communications are unwelcome, is guilty of an offence and liable, on conviction, to the penalties prescribed in section 89(1).

     

    In responding to local spam you might find the following template message most useful in getting results.

     

    1. D) Sending and receiving emails

    The Act sets out rules to provide certainty about:

    • when an electronic communication, such as an email or fax, is taken to have been sent and received, and
    • where electronic communications are taken to have been sent and received

    An email or other electronic communication is taken to have been sent at the time it first enters an information system outside the sender’s control. So if you have an email account with an Internet Service Provider (ISP), your email will be taken to have been sent when it first enters your ISP’s system. If you have a direct Internet connection, the email will be taken to have been sent when it first goes to the recipient’s ISP or their own mail server. An email or other electronic communication is taken to have been received:

    • if the receiver has designated an information system for receiving emails, when the email first enters that information system, or
    • in all other situations, when the email comes to the receiver’s attention

     

     

    1. E) Information that must be in paper-based writing

    Some communications or transactions that the law requires to be in writing cannot be in electronic form: they must still be on paper. For example:

    • notices that are required to be given to the public
    • information that is required to be given in writing either in person or by registered post
    • wills, affidavits and powers of attorney
    • cheques and other negotiable instruments, and bills of lading
    • court documents
    • documents to do with title to land
    • various agreements or notices that are required to be in writing by consumer-protection laws, for example:
      • the “prepossession notice” that a finance company is required to give before it repossesses hire-purchase goods
      • the written agreement that a door-to-door salesperson is required to give
    • consent by a psychiatric patient to brain surgery
    • search warrants