100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CML1501 Assignment 1 & 2 Semester 2 2024 | Due 16 August 2024

Rating
4,3
(3)
Sold
4
Pages
11
Grade
A+
Uploaded on
10-08-2024
Written in
2024/2025

CML1501 Assignment 1 & 2 Semester 2 2024. All Questions answered with references. Assignment 1 - Due 16 August. 1.1 Write brief notes on THREE of the following: (a) The various types of licences available for broadcasting purposes. (3) (b) Possible crimes that can be committed in respect of information on a computer network. (3) (c) The liability of an employer should he/she read an employee's e-mail. (3) (d) The sanctions that can be imposed by the Independent Communications Authority of South Africa (ICASA) if a licensee has contravened the Electronic Communications Act 36 of 2005 or the conditions of his/her licence. (3) 1.2 List the fields of broadcasting and telecommunication which are regulated by means of statutes. [15] 2.1 A newspaper publishes a report regarding a prisoner who has escaped from prison. The photograph of a well-known actor is accidentally published next to the report, which creates the impression that he is the escaped prisoner. The actor threatens to institute proceedings for defamation and the newspaper publishes an apology in the next issue. May the actor institute proceedings for defamation against the owner of the newspaper? Discuss fully. (5) Assignment 2 - Due 19 September 2024. Question 1 (a) Explain whether the element of fault exists in a “delict” as either intention or negligence. (5) (b) Explain the meaning of the term “Damage” in delict. Give examples from case law.(5) (c) Explain the meaning of the word “damages” in delict. Give examples from case law.(5) Question 2 (a) What is meant by the statement that the fundamental principle of our law of evidence and criminal procedure demands that no person should be obliged to incriminate himself or herself? Give examples.(5) (b) Explain whether the law obliges journalists to answer questions lest they are sentenced to a term of imprisonment.(5) (c) What does section 205 of the Criminal Procedure Act, 1977 provides. Is that provision consistent with the Constitution of the Republic of South Africa, 1996?(5) Question 3 (a) Explain the claim of false disparagement.(5) (b) Explain the claim of passing off.(5) (c) Explain the claim of contravention of the Consumer Affairs (Unfair Business Practices) Act 71 of 1988 (5) Question 4 (a) Who can claim Copyright protection? (5) (b) Does the Copyright Act 98 of 1978 give a list of various categories of works that are protected? Explain each of them. (5) (c) Can any type or category of creation be protected under law? (5) Question 5 (a) Explain what is meant by Contempt of court. (5) (b) Explain contempt in facie curiae. (5) (c) When does a criminal case commence? (5) (d) Explain the constitution of a trade coupon. Is it may be constituting of a contract; a printed offer directed at a target group of clients, which may, in return, be returned by the consumer in order to receive something of value. (5)

Show more Read less









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
August 10, 2024
Number of pages
11
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

, PLEASE USE THIS DOCUMENT AS A GUIDE TO ANSWER YOUR ASSIGNMENT

Please note that the author of this document will not responsibility for any plagiarizing you
commit.

 Assignment 1 - Due: 16 August 2024

1.1. Write brief notes on THREE of the following:

A) The various types of licences available for broadcasting purposes.

 Individual Licence: This type of license is issued to a specific broadcaster or operator. It is
often tailored to the particular needs and circumstances of the applicant and may include
specific terms and conditions related to the content, reach, or technical aspects of the
broadcasting service. Individual licenses typically involve a thorough vetting process and are
granted based on factors like the operator's qualifications and resources.

 Class Licence: A class license is a more general broadcasting license that applies to a category
or class of broadcasters rather than a single entity. Broadcasters that fall under this category
can operate without needing to apply for an individual license. The conditions and
requirements for a class license are predefined, and as long as broadcasters adhere to these,
they are covered by the license. This type of license simplifies the regulatory process and is
often used for smaller or less critical broadcasting operations.

 Exempt Licence: An exempt license allows certain types of broadcasting activities to be
carried out without the need for a formal license, typically because they are considered to be
low-risk or of minimal impact. For example, small-scale, non-commercial broadcasters, or
operators who only provide content within a very limited area or for a specific purpose, might
be exempt from licensing requirements. However, even under an exempt license, broadcasters
may still need to comply with certain basic regulatory standards.

(Study Guide - Page: 268)

B) Possible crimes that can be committed in respect of information on a computer network.

 Hacking: Unauthorized access to computer systems or networks, often with malicious intent
such as stealing sensitive information, disrupting operations, or damaging systems. Hackers
may exploit security vulnerabilities or use social engineering to gain access to systems.

 Phishing: A form of cybercrime where attackers deceive individuals into providing
confidential information, such as passwords or credit card numbers, by pretending to be a
legitimate entity. Phishing is commonly executed through fraudulent emails, websites, or
messages that appear trustworthy.

 Distribution of Malware: The intentional spreading of malicious software, including viruses,
worms, and ransomware, to infiltrate and damage computer systems or networks. Malware can
be used to steal data, disrupt services, or extort money from individuals or organizations.
Attackers may distribute malware through infected email attachments, compromised websites,
or malicious downloads.
(Study Guide - Page: 304-305)
R50,00
Get access to the full document:
Purchased by 4 students

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Reviews from verified buyers

Showing all 3 reviews
1 year ago

1 year ago

1 year ago

4,3

3 reviews

5
2
4
0
3
1
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Aimark94 University of South Africa (Unisa)
View profile
Follow You need to be logged in order to follow users or courses
Sold
6575
Member since
6 year
Number of followers
3168
Documents
1326
Last sold
2 weeks ago
Simple & Affordable Study Materials

Study Packs & Assignments

4,2

520 reviews

5
277
4
124
3
74
2
14
1
31

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions