Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Law - Data protection

Protection of Right to Privacy in Cyberspace. An Appraisal of Legal and Institutional Framework in Tanzania

Title: Protection of Right to Privacy in Cyberspace. An Appraisal of Legal and Institutional Framework in Tanzania

Bachelor Thesis , 2020 , 84 Pages

Autor:in: Haji Shabani (Author)

Law - Data protection
Excerpt & Details   Look inside the ebook
Summary Excerpt Details

This study is about an appraisal of the legal and institutional framework in Tanzania on how they protect the right to privacy in the cyber space. The study asses the laws which have a negative impact on the right to privacy in the cyber space.

The study involved library research so as to lay down the theoretical framework of the study. Field research was conducted in order to support the theoretical work by gathering relevant information from various respondents. Mainly, collection of data involved oral interviews and questionnaire. The study found out that the legal and institutional framework in Tanzania has not been well framed to cater for the right to privacy in the cyber space.

The researcher has concluded that there is a low number of cases on infringement of the right to privacy in cyber space. Tanzanian legal and Institutional framework have not been well framed for the protection of right to privacy in cyber space as failure to comply with international standards and lastly, Police and other law enforcers have been given excessive power during surveillance which affect the right to privacy.

Furthermore, it has been recommended that the rise of awareness to the people on the right to privacy, also enactment of comprehensive legislation (law), establishment of specialized institution which protects the right to privacy in the cyber space and lastly limitation of police power during surveillance.

Excerpt


Table of Contents

CHAPTER ONE

INTRODUCTION AND BACKGROUND OF THE PROBLEM

1.1 Background of the problem

1.2 Statement of the Problem

1.3 Research Hypothesis

1.4 Research Objectives

1.4.1 General Objective

1.4.2 Specific Objectives

1.5 Literature Review

1.6 Scope of the Study

1.7 Significance of the Study

1.8 Limitation of the Study

1.9 Research Methodology

1.9.1 Research design

1.9.2 Study Area

1.9.3. Sample Population

1.9.3 Sample size

1.9.4 Sampling method

1.9.5 Data collection methods

1.9.5.1 Library Research

1.9.5.2Field Research

1.9.5.2.1 Interview

1.9.5.2.2 Questionnaire

1.10 Data Presentation and Analysis

1.11 Chapterization

CHAPTER TWO

CONCEPTUAL FRAMEWORK ON PROTECTION OF RIGHT TO PRIVACY

2.0. Introduction

2.1 The General Concept of Privacy

2.2 Types of Privacy

2.3 Importance of Privacy

2.4 The concept of Information and Communication Technology

2.5 The Concept of Cyber Space

2.6 Relationship between Privacy and Cyber Space

2.7 Consequences of Privacy Invasion

2.8 Conclusion

CHAPTER THREE

INTERNATIONAL LEGAL AND INSTITUTIONAL FRAMEWORK IN PROTECTION OF RIGHT TO PRIVACY TANZANIA

3.0 Introduction

3.1 Legal Framework at International level

3.1.1 Right to Privacy under Universal Declaration of Human Rights.

3.1.2 Guarantee of Right to Privacy in the Cyber Space Under the International Covenant on Civil and Political Rights.

3.2.1 The Human Rights Committee

3.3 Regional Legal Framework

3.3.1 The Protection of Privacy Under the African Union (Malabo Convention)

3.4 Sub Regional Legal Framework

3.4.1 Privacy Protection Under the Economic Community of West African States (ECOWAS).

3.4.2 Right to Privacy Under the East African Community (EAC) for Cyber Law.

3.5 Conclusion

CHAPTER FOUR

NATIONAL LEGAL AND INSTITUTIONAL FRAMEWORK IN PROTECTION OF RIGHT TO PRIVACY

4.0 Introduction

4.1 Legal Framework

4.1.1 The Guarantee of Right to Privacy in the Cyber Space Under the Constitution of the United Republic of Tanzania of 1977

4.1.2 National Information and Communications Technology Policy.

4.1.3 Privacy and Confidentiality of the Customers Under Tanzania Communications Regulation Authority Act.

4.1.4 Prohibition of Illegal Access and Illegal Interference under the Cybercrimes Act.

4.1.6 Protection of Consumer Information under the Electronic and Postal Communication (Consumer protection) Regulations.

4.1.7 Prohibition of Disclosure of User’s Information under the Electronic and Postal Communications (Online Content) Regulations.

4.2 Laws which Posse Potential Risk to Privacy Infringement in the Cyber Space

4.2.1 Threat of Police Power to the Protection of Privacy in the Cyber Space Under the Cybercrimes Act.

4.2.2 Interception and Disclosure of Information Under the Electronic and Postal Communications Act.

4.2.3 Impact of Law Enforcement Agents to the Right to Privacy in the Cyberspace under the Media Service Act

4.2.4 Interception of Communication and Threat of Right to Privacy in the Cyber space under the Prevention of Terrorism Act.

4.2.5 Effect of Police Power in Search under the Police Force and Auxiliary Services Act.

4.2.6 Impact of Surveillance to Right to Privacy under Tanzania Intelligence and Security Service Act.

4.2.7 Impact of Mandatory SIM card Registration to the Protection of Right to Privacy in the Cyber Space under the Electronic and Postal Communications (Sim Card Registration) Regulations of 2020

4.3 Tanzanian Institutional Framework in Protection of Right to Privacy

4.3.1 Power and Function of Tanzania Communications Regulatory Authority in Protection of Right to Privacy

4.3.2 The Information and Communication Technologies. (ICT) Commission in Protection of Right to Privacy

4.3.3 The Police

4.3.3 Protection of Right to Privacy in the Cyber Space by the Court During Adjudication of Privacy Cases

4.4 Conclusion

CHAPTER FIVE

AN APPRAISAL OF TANZANIAN LEGAL AND INSTITUTIONAL FRAMEWORK GORVERNING PROTECTION OF RIGHT TO PRIVACY IN CYBER SPACE

5.0 Introduction

5.1 The Analysis of Guarantee by Legal and Institutional Framework in Protection of Right to Privacy in the Cyber Space.

5.2 The Assessment of Effectiveness of Tanzanian legal and Institutional Framework in Protection of Right to Privacy in Cyber Space.

5.2.1 The Comprehensive Legislation that Established for the Purpose of Protection of Right to Privacy.

5.2.2 Compliance of Tanzanian laws with International, Regional and Sub regional Standards

5.2.3 Analysis of effectiveness of Bodies which are Protecting of Privacy.

5.2.4 Assessment of Police Power and other law enforcers during Surveillance and Interception of Communications in Relation to the Protection of Right to Privacy

5.2.5 Analysis of Mandatory SIM card Registration in Relation to the Right to Privacy in the Cyber Space

5.3 Examination of Necessity of Having Mechanism that Protect Privacy Cyber Space

5.6 Conclusion

CHAPTER SIX

SUMMARY OF THE MAJOR FINDINGS, CONCLUSION AND RECOMMENDATION

6.0 Summary of the Major Findings

6.1 Conclusion

6.2 Recommendations.

Objectives and Topics

The research report provides an appraisal of the legal and institutional framework in Tanzania regarding the protection of the right to privacy within cyberspace. The work aims to identify existing legal lacunae and examine whether the current regulatory measures sufficiently protect citizens while meeting international human rights standards.

  • Analysis of the Tanzanian constitutional and statutory provisions regarding privacy.
  • Evaluation of the impact of police powers, surveillance, and mandatory SIM card registration on privacy.
  • Comparative review of international and regional legal standards for data protection.
  • Identification of gaps in the protection of individual privacy against arbitrary government interference.
  • Recommendations for the enactment of comprehensive data protection legislation.

Excerpt from the Book

1.1 Background of the problem

Privacy is the right of the individual to be protected against intrusion into his personal life or affairs, or those of his family, by direct physical means or by publication of information. Privacy enable us to create boundaries and protect ourselves from unwarranted interference in our lives, allowing us to negotiate who we are and how we want to interact with the world around us, also privacy protect us from arbitrary and unjustified use of power by state, companies and other person.

The growth of internet in the country lead to increase of violation of privacy and there are several ways in which the privacy of the individual can be violated in cyber space. If a person is victimized of privacy infringement over internet, it involves various complex issues to be settled which are what amounts to violation? Who is liable for the same? and, that shall be the remedy offered?

Privacy benchmarks at an international level are found in the international human rights treaties. The Universal Declaration of Human Rights of 1948 where under Article 12 that ‘no one should be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks on his honor or reputation. Everyone has the right of being protected by the law against such interferences or attacks’. This provision is reproduced in Article 17 in the International Covenant on Civil and Political Rights. Other international human rights instruments that specifically recognize privacy as a right include Article 14 of the United Nations Convention on Migrant Workers 1990. However, these instrument stipulates the right to privacy but did not provide any model or framework on how this right can be protected and other related procedures.

Summary of Chapters

CHAPTER ONE: INTRODUCTION AND BACKGROUND OF THE PROBLEM: Provides the foundation of the study, covering the problem of privacy violations in the digital age, research hypotheses, and the methodology utilized for data collection.

CHAPTER TWO: CONCEPTUAL FRAMEWORK ON PROTECTION OF RIGHT TO PRIVACY: Defines the core concepts of privacy, cyberspace, and information technology, and establishes the theoretical relationship between these concepts.

CHAPTER THREE: INTERNATIONAL LEGAL AND INSTITUTIONAL FRAMEWORK IN PROTECTION OF RIGHT TO PRIVACY TANZANIA: Analyzes international and regional legal standards that serve as benchmarks for protecting privacy rights.

CHAPTER FOUR: NATIONAL LEGAL AND INSTITUTIONAL FRAMEWORK IN PROTECTION OF RIGHT TO PRIVACY: Examines specific Tanzanian statutes and institutions currently tasked with regulating cyberspace and managing consumer data.

CHAPTER FIVE: AN APPRAISAL OF TANZANIAN LEGAL AND INSTITUTIONAL FRAMEWORK GORVERNING PROTECTION OF RIGHT TO PRIVACY IN CYBER SPACE: Presents the primary findings from field research and assesses the effectiveness of the current legal system in safeguarding privacy.

CHAPTER SIX: SUMMARY OF THE MAJOR FINDINGS, CONCLUSION AND RECOMMENDATION: Concludes the study by highlighting key findings regarding legal loopholes and proposing legislative and institutional improvements.

Keywords

Privacy, Cyberspace, Cybercrimes Act, Data Protection, Tanzania, Legal Framework, Human Rights, Surveillance, SIM Card Registration, Constitutional Law, Information and Communication Technology, Institutional Reform, Interception, Consumer Protection, Legislation.

Frequently Asked Questions

What is the core focus of this research?

The research focuses on evaluating the legal and institutional framework in Tanzania to determine how effectively it protects the right to privacy in cyberspace, particularly in the absence of comprehensive data protection legislation.

What are the primary themes discussed in the study?

Key themes include the constitutional right to privacy, the impact of surveillance and SIM card registration laws, the role of institutions like the TCRA, and the need for new legislation to address digital privacy challenges.

What is the primary objective of this report?

The objective is to identify gaps (lacunae) in existing Tanzanian laws, determine the necessity for stronger privacy laws, and recommend specific mechanisms to enhance the protection of individual privacy in the cyber environment.

Which scientific methodology was employed?

The researcher adopted a qualitative approach, combining library/archival research with field studies, including structured and unstructured interviews and open-ended questionnaires distributed to magistrates, advocates, and TCRA officers.

What is covered in the main body of the work?

The main body evaluates international standards, analyzes current Tanzanian laws (such as the Cybercrimes Act and Media Service Act), and provides an appraisal based on empirical findings from the field regarding the enforcement and effectiveness of these laws.

Which keywords best characterize this research?

The research is best characterized by terms such as privacy, cyberspace, data protection, Tanzanian legal framework, human rights, and institutional reform.

How does mandatory SIM card registration impact privacy according to the author?

The author argues that mandatory SIM card registration creates extensive databases that facilitate location tracking and surveillance, potentially eroding the anonymity of users and complicating liability in cases of privacy violation.

What are the legal challenges regarding police powers in Tanzania?

The research identifies that certain laws, like the Cybercrimes Act, grant excessive powers to police to search and seize computer systems without judicial oversight, which poses a significant threat to the constitutional right to privacy.

Why is there a perceived need for a specialized privacy institution?

The author suggests that existing bodies like the TCRA are multipurpose and lack the specific expertise or mandate to investigate data privacy breaches, unlike specialized data protection boards found in other jurisdictions.

What conclusion does the author reach regarding Tanzania's current laws?

The author concludes that existing Tanzanian laws are insufficient and fail to meet international standards, necessitating the enactment of a comprehensive data protection law that balances security interests with individual privacy rights.

Excerpt out of 84 pages  - scroll top

Details

Title
Protection of Right to Privacy in Cyberspace. An Appraisal of Legal and Institutional Framework in Tanzania
College
Mzumbe University
Author
Haji Shabani (Author)
Publication Year
2020
Pages
84
Catalog Number
V998116
ISBN (eBook)
9783346399601
ISBN (Book)
9783346399618
Language
English
Tags
protection right privacy cyberspace appraisal legal institutional framework tanzania
Product Safety
GRIN Publishing GmbH
Quote paper
Haji Shabani (Author), 2020, Protection of Right to Privacy in Cyberspace. An Appraisal of Legal and Institutional Framework in Tanzania, Munich, GRIN Verlag, https://www.grin.com/document/998116
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  84  pages
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint