100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4,6 TrustPilot
logo-home
Exam (elaborations)

LCR4805 Assignment 2 Semester 2 | Due 4 September 2025

Rating
-
Sold
2
Pages
9
Grade
A+
Uploaded on
01-09-2025
Written in
2025/2026

LCR4805 Assignment 2 Semester 2 | Due 4 September 2025










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
September 1, 2025
Number of pages
9
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

LCR4805 Assignment 2
Semester 2 | Due 4
September 2025
NO PLAGIARISM

[Pick the date]
[Type the company name]


, Exam (elaborations)
LCR4805 Assignment 2 Semester 2 | Due 4
September 2025
Course

 Selected Private and Criminal Law Principles of th (LCR4805)
 Institution
 University Of South Africa (Unisa)

QUESTION 1 1. We live in an "information age" and the question which often
arises is whether information can be stolen. Refer to the common law
definition of "theft" and critically discuss whether the law in South Africa has
adapted to keep up with technological advancements. Discuss comparatively
by referring to the positions in other jurisdictions and include case law,
legislation and academic commentary where applicable.


Theft and Information in the Information
Age: Has South African Law Kept Pace?
Introduction
We live in what many call the "information age" — a world in which data, digital files and
electronic systems are integral to commerce, governance and social life. This raises a deceptively
simple question: can information be stolen? On the face of it, the common-law crime of theft in
South African law is rooted in the appropriation of movable corporeal property. Digital
information, however, is intangible, replicable and often remains even after being copied. This
essay critically examines whether South African law has adapted to technological change and
whether the conceptual and doctrinal tools of the common law — or statutory developments —
capture the moral wrongs and social harms of taking information without permission. The
discussion proceeds in four parts.

1. A primer: the common-law definition of theft under South African law and doctrinal
obstacles in capturing information.
2. Statutory and criminal-law responses in South Africa — the Electronic Communications
and Transactions Act and the Cybercrimes Act — and their interaction with the common
law.
3. Comparative perspectives: how England & Wales, the United States and Australia
approach "theft" or the broader category of cybercrime and misappropriation of data.
4. Critical assessment and recommendations: doctrinal coherence, prosecutorial practice,
civil remedies and final conclusions.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ivymwendwa47820 University of South Africa (Unisa)
View profile
Follow You need to be logged in order to follow users or courses
Sold
357
Member since
1 year
Number of followers
156
Documents
887
Last sold
3 months ago

3,6

71 reviews

5
29
4
13
3
13
2
5
1
11

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions