Introduction. Chapter 1
Author | Leani Marlie Van Schalkwyk |
DOI | 10.10520/EJC74045 |
Published date | 01 January 2005 |
Date | 01 January 2005 |
Pages | 1-11 |
publishedBy | University of the Free State |
CHAPTER 1
INTRODUCTION
1.General introduction1
The era in which we find ourselves demonstrates the rapid deve-
lopment of technology.Information that would have been practically
inaccessible a few years ago is available to anyone with a computer
or Internet2access. In the beginning of the previous century every-
body’s personal papers and details were kept in their houses and
places of business.Today this detailed information is on computer
disks. It is in most instances not even in our possession but is in
the custody of third parties — banks, insurance companies, medical
institutions and employers, to only name a few.
With the progress associated with technology and the information
industry, life has become much more convenient. Banks claim that
a person can do his or her necessary banking in front of the com-
puter at any convenient time.Online shops and merchants lure
“shoppers” into the magical world of cyber malls where you can
purchase anything your heart desires without leaving the comfort
of your own home.
This accessibility to innumerable opportunities can pose a danger
to the individual. The darker side of progress has many times been
coined as an involuntary sacrifice of privacy and the peace of mind
that your interests are safe.
Information is constantly being gathered, filtered and processed for
different purposes. How can a person ensure that information that
was intended not to be freely available is not publicised?
The green paper on e-commerce3worded this dilemma quite clearly:
“Privacy or the lack thereof, is a major concern for individuals in the
use of the electronic medium in commerce.This includes not only the
privacy of the communication between the parties in a transaction
e.g. the protection of credit and debit card numbers while traversing
the Internet, or of other personal details, which can be solved through
the use of encryption; but also the accumulation of personal data
at web sites4visited, for example through the use of “cookies”.5
1
1Because of the technical nature of this study a list of relevant defini-
tions and terms is supplied at the end of this dissertation in the form
of a list of key terms for purposes of reference.
2See page 104 in the list of key terms.
3See chapter 3 (3.1)
4For a definition of “Web site” see page 106 in the list of key terms.
5See chapter 2 (2.1.2) and page 103 in the list of key terms.
Get this document and AI-powered insights with a free trial of vLex and Vincent AI
Get Started for FreeUnlock full access with a free 7-day trial
Transform your legal research with vLex
-
Complete access to the largest collection of common law case law on one platform
-
Generate AI case summaries that instantly highlight key legal issues
-
Advanced search capabilities with precise filtering and sorting options
-
Comprehensive legal content with documents across 100+ jurisdictions
-
Trusted by 2 million professionals including top global firms
-
Access AI-Powered Research with Vincent AI: Natural language queries with verified citations

Unlock full access with a free 7-day trial
Transform your legal research with vLex
-
Complete access to the largest collection of common law case law on one platform
-
Generate AI case summaries that instantly highlight key legal issues
-
Advanced search capabilities with precise filtering and sorting options
-
Comprehensive legal content with documents across 100+ jurisdictions
-
Trusted by 2 million professionals including top global firms
-
Access AI-Powered Research with Vincent AI: Natural language queries with verified citations

Unlock full access with a free 7-day trial
Transform your legal research with vLex
-
Complete access to the largest collection of common law case law on one platform
-
Generate AI case summaries that instantly highlight key legal issues
-
Advanced search capabilities with precise filtering and sorting options
-
Comprehensive legal content with documents across 100+ jurisdictions
-
Trusted by 2 million professionals including top global firms
-
Access AI-Powered Research with Vincent AI: Natural language queries with verified citations

Unlock full access with a free 7-day trial
Transform your legal research with vLex
-
Complete access to the largest collection of common law case law on one platform
-
Generate AI case summaries that instantly highlight key legal issues
-
Advanced search capabilities with precise filtering and sorting options
-
Comprehensive legal content with documents across 100+ jurisdictions
-
Trusted by 2 million professionals including top global firms
-
Access AI-Powered Research with Vincent AI: Natural language queries with verified citations

Unlock full access with a free 7-day trial
Transform your legal research with vLex
-
Complete access to the largest collection of common law case law on one platform
-
Generate AI case summaries that instantly highlight key legal issues
-
Advanced search capabilities with precise filtering and sorting options
-
Comprehensive legal content with documents across 100+ jurisdictions
-
Trusted by 2 million professionals including top global firms
-
Access AI-Powered Research with Vincent AI: Natural language queries with verified citations
