ETD Collection

Permanent URI for this collectionhttps://wiredspace.wits.ac.za/handle/10539/104


Please note: Digitised content is made available at the best possible quality range, taking into consideration file size and the condition of the original item. These restrictions may sometimes affect the quality of the final published item. For queries regarding content of ETD collection please contact IR specialists by email : IR specialists or Tel : 011 717 4652 / 1954

Follow the link below for important information about Electronic Theses and Dissertations (ETD)

Library Guide about ETD

Browse

Search Results

Now showing 1 - 1 of 1
  • Item
    The legal risks in IoTs processing of personal information: a South African perspective
    (2019) Naidoo, Anola
    The technological and competitive landscape has undergone a significant change over the past decade, leading to cheaper processes, improved networking capabilities, smart devices, appliances, vehicles, security systems, machine learning and artificial intelligence that have exponentially enhanced the manner in which humans interact globally. While the Internet of Things has facilitated the Fourth Industrial Revolution, the push for universal access to the internet and the intelligent collaborations between various objects anywhere and at any time, requires the Internet of Things more often than not, to demand an extensive amount of an individual’s personal information be processed in order to perform its daily functions. This processing and increased complexity of these devices creates new safety, security, privacy, and usability challenges far beyond the difficult challenges’ individuals face just securing a single device. Furthermore, without the ability of manufacturers, internet service providers and/or government being able to guarantee an acceptable security level to protect the personal information being processed, this report aims to ascertain the legal risks to data privacy and security when these Internet of Things process a person’s personal information, the importance of one’s Constitutional right to privacy together with attempting to highlight possible ways industry and individuals can mitigate these risks1.