Study Manual Book - Cyber and Computer Related Laws Tanzania
Study Manual Book - Cyber and Computer Related Laws Tanzania
PHARES J. OSSERE
| TANZANIA
TUMAINI UNIVERSITY DAR ES SALAAM
TOPIC 1: INTRODUCTION TO CYBER LAW
AND DIGITIZATION.
Cyberlaw, also known as internet law, is a specialised field of law that deals with legal
issues related to the use of the internet, computers, and digital technology. It encompasses a
wide range of legal topics and issues, including but not limited to:
2. Privacy and Data Protection: Cyberlaw governs the collection, storage, and use of
personal information and data online. It includes regulations and laws aimed at protecting
individuals' privacy and ensuring the secure handling of data, such as the General Data
Protection Regulation (GDPR) in Europe and various data protection laws in different
countries.
3. Intellectual Property: This aspect of cyber law deals with issues related to copyright,
trademark, and patent infringement online. It also addresses digital piracy, file sharing, and
the protection of intellectual property rights in the digital age.
7. Freedom of Expression and Censorship: It deals with the balance between freedom of
expression online and efforts to combat hate speech, misinformation, and online censorship.
This aspect of cyberlaw varies significantly from country to country.
9. Digital Evidence: Cyberlaw includes rules and procedures for the collection and
admissibility of digital evidence in legal proceedings.
10. Cyber Insurance: It covers the legal and financial aspects of insurance related to cyber
risks and data breaches.
Cyberlaw is a rapidly evolving field due to the continuously changing nature of technology
and its impact on society. Legal professionals specialising in cyberlaw work to develop and
interpret laws and regulations that address the unique challenges posed by the digital age.
These laws aim to protect individuals, organizations, and society as a whole in the digital
realm
HISTORY OF THE INTERNET
The history of the internet is a complex and fascinating story that spans several decades. It's a
tale of technological innovation, collaboration, and the evolution of communication and
information sharing. Here's a brief overview of the key milestones and developments in the
history of the internet:
1. **Early Precursors (1960s):** The origins of the internet can be traced back to the 1960s
when researchers began experimenting with ways to connect computers over long distances.
The U.S. Department of Defense's ARPANET (Advanced Research Projects Agency
Network) was one of the first networks to use packet-switching technology, which became a
fundamental building block of the internet.
2. **TCP/IP and the Birth of the Internet (1970s):** In the early 1970s, the development of
the Transmission Control Protocol (TCP) and Internet Protocol (IP) by Vinton Cerf and Bob
Kahn allowed different networks to communicate with each other. This laid the foundation
for what we now know as the internet.
3. **The World Wide Web (1980s-1990s):** In 1989, British computer scientist Tim
Berners-Lee invented the World Wide Web (WWW) while working at CERN. The WWW
introduced the concept of hypertext and allowed for easy sharing of information through web
pages. The first web browser, WorldWideWeb (later renamed Nexus), was created in 1990.
4. **Commercialization (1990s):** The 1990s saw the internet transition from a research and
academic network to a commercial one. Internet Service Providers (ISPs) emerged, providing
access to the internet for the general public. The introduction of web browsers like Mosaic
and Netscape made the internet more user-friendly.
5. **Dot-com Bubble (Late 1990s):** The late 1990s saw a period of explosive growth in
internet-related businesses and investments. Many companies with "dot-com" in their names
went public, leading to a speculative bubble that eventually burst in 2000.
6. **Broadband and High-Speed Internet (2000s):** The 2000s saw a rapid expansion of
broadband internet access, enabling faster and more reliable connections. This facilitated the
growth of online services, including streaming media and social networking.
7. **Web 2.0 and Social Media (Mid-2000s):** The concept of Web 2.0 emerged,
emphasizing user-generated content and interactive online experiences. Platforms like
Facebook, YouTube, and Twitter gained prominence and changed the way people
communicate and share information online.
8. **Mobile Internet (Late 2000s-Present):** The advent of smartphones and mobile devices
brought the internet into the palm of people's hands. Mobile internet usage has since become
a dominant force in online activity.
10. **Internet of Things (IoT) and 5G (2010s-Present):** The internet has expanded to
include billions of connected devices, from smart thermostats to autonomous vehicles. The
rollout of 5G networks promises even faster and more reliable internet connectivity.
11. **Challenges and Concerns (Ongoing):** The internet has faced various challenges,
including issues of privacy, cybersecurity, and the spread of disinformation. These challenges
continue to evolve as the internet's role in society grows.
Today, the internet is used by billions of people around the world. It has
revolutionized the way we live and work, and it continues to evolve rapidly. Here are
some of the key milestones in the history of the internet:
The history of the internet is a dynamic and ongoing story, with new developments and
innovations constantly shaping its future. It has transformed the way we communicate, work,
shop, and access information, making it one of the most significant technological
advancements in human history.
DIGITIZATION
Digitization refers to the process of converting analog information or data into a digital
format. It involves representing information in a binary (0s and 1s) format that can be stored,
processed, and transmitted electronically by computers and other digital devices. Digitization
has had a profound impact on various fields, including communication, information storage
and retrieval, media, and more. Here are some key aspects of digitization:
1. **Conversion:** The primary step in digitization is converting analog data into a digital
form. This can involve scanning printed documents, digitizing images and audio recordings,
or using sensors to capture data in digital format.
2. **Binary Representation:** Digital data is represented using binary digits (bits), which can
have values of either 0 or 1. By arranging these bits in specific patterns, information of all
types can be encoded digitally.
3. **Storage:** Digitized data can be easily stored in digital storage devices such as hard
drives, solid-state drives, and optical discs. This allows for efficient and compact data
storage.
5. **Transmission:** Digitized data can be transmitted over networks, including the internet,
using digital communication protocols. This enables rapid and efficient sharing of
information over long distances.
6. **Search and Retrieval:** Digital data can be indexed and searched using keywords and
algorithms, making it easier to find specific information within large datasets. This is
particularly valuable in the context of digital libraries and databases.
7. **Reproduction and Replication:** Digital data can be easily copied and replicated
without any loss of quality, making it ideal for distributing content and information widely.
8. **Preservation:** Digital formats can be more durable than analog formats in some cases,
but they also require ongoing maintenance to prevent data loss due to format obsolescence
and degradation of digital storage media.
Digitization has transformed many aspects of modern life. It has revolutionized industries
such as publishing, entertainment, healthcare, education, and government by making
information more accessible, portable, and easily shareable. Additionally, it has enabled
innovations in fields like artificial intelligence, data analytics, and virtual reality, as these
technologies rely on digital data for their operation.
Tanzania had enacted several laws and regulations related to cyberlaw and cybersecurity to
address various aspects of digital technology, the internet, and cybercrimes. The following
are some key sources of cyber law in Tanzania:
1. The Electronic and Postal Communications Act, 2010 (EPOCA): This law regulates
electronic communications, including telecommunications and online services. It contains
provisions related to licensing, data protection, and cybersecurity.
2. The Cybercrimes Act, 2015: This law specifically addresses cybercrimes in Tanzania. It
defines various cybercrimes, such as hacking, identity theft, and online fraud, and prescribes
penalties for offenders.
3. The Tanzania Information Security Policy, 2016: While not a law, this policy provides
guidance on information security measures and practices for government institutions and
other organisations in Tanzania. It plays a crucial role in enhancing cybersecurity within the
country.
4. The Data Protection Act, 2019: This legislation governs the processing and protection of
personal data in Tanzania. It sets out the rights and responsibilities of data subjects and data
controllers and includes provisions related to data security.
5. The Electronic Transactions Act, 2015: This law recognizes the legal validity of
electronic transactions and digital signatures in Tanzania. It establishes a legal framework for
electronic commerce and contracts conducted online.
6. The Tanzania Communications Regulatory Authority (TCRA): TCRA is the
regulatory body responsible for overseeing and enforcing various aspects of
telecommunications and electronic communications, including aspects related to cyberlaw.
7. Tanzania Penal Code: Some aspects of cybercrimes are covered under the Penal Code of
Tanzania. For instance, unauthorised access to computer systems can be considered an
offence under this code.
Cyber rights
Cyber rights, also known as digital rights or online rights, refer to the basic rights and
freedoms that individuals have in the context of the digital or online environment. These
rights are essential for protecting individuals' privacy, freedom of expression, access to
information, and overall well-being in the digital age. Cyber rights are an extension of
traditional human rights into the digital realm. Here are some key cyber rights.
1. Freedom of Expression: Individuals have the right to express their opinions and ideas
freely online, just as they do offline. This includes the right to freedom of speech, the press,
and creative expression in digital spaces.
2. Privacy: As it is provided by The Personal DAta Protection Act 1, and also enshrined
under article 16 of the URT Constitution , people have the right to control their personal
information and data online. This includes the right to know how data is collected and used,
the right to consent to data processing, and the right to have personal data protected from
unauthorised access and abuse.
3. Access to Information: Everyone has the right to access information online, including
public information and educational resources. Digital access to information is crucial for
education, civic participation, and personal development. In Tanzania, we have Access to
information Act2 This law provides for access to information, it defines the scope of
information which the public has the right to access, and further promotes transparency and
accountability of information holders.
4. Net Neutrality: Net neutrality is the principle that internet service providers should treat
all online data equally, without discriminating or charging differently based on content,
source, or user. It ensures equal access to online content and services.
1 Act 10 of 2022
2 Act No. 6 of 2016
5. Digital Security: Individuals have the right to secure and protect their digital
communications and data. This includes the right to use encryption tools and secure methods
of communication.
6. Protection from Online Harassment and Cyberbullying: Individuals have the right to
be protected from online harassment, cyberbullying, and other forms of online abuse that can
harm their well-being.
7. Freedom from Unlawful Surveillance: People have the right to be free from unwarranted
government surveillance and other forms of invasive monitoring of their online activities.
8. Anonymity and Pseudonymity: Individuals have the right to use online services and
platforms without revealing their true identity when it's not necessary. Anonymity and
pseudonymity can be crucial for privacy and freedom of expression.
9. Digital Access and Inclusion: Access to the internet and digital resources should be
equitable, and efforts should be made to bridge the digital divide to ensure that everyone can
participate in the digital society.
10. Digital Literacy: People have the right to access education and resources to develop
digital literacy skills, enabling them to navigate the digital world safely and effectively.
These cyber rights are recognized and protected to varying degrees in different countries and
legal systems. They are essential for maintaining a free, open, and secure digital environment
that empowers individuals and promotes democracy and human rights in the digital age.
However, the realisation and protection of these rights can be subject to legal, political, and
technological challenges. Therefore, advocacy and awareness efforts are ongoing to
safeguard and expand cyber rights worldwide.
CYBER RIGHTS IN TANZANIA
Tanzania has certain laws and regulations that touch on aspects of cyber rights, particularly in
the context of internet usage and digital communication. However, it's important to note that
the legal landscape related to cyber rights and internet governance can change over time.
Therefore, for the most current and detailed information, it's advisable to consult legal experts
and official government sources in Tanzania. Here are some key aspects related to cyber
rights in Tanzania:
2. Privacy and Data Protection: Tanzania has laws related to data protection, including the
Data Protection Act, 2019. This legislation governs the collection, processing, and protection
of personal data, which is an important aspect of online privacy.
6. Digital Literacy and Inclusion: Promoting digital literacy and ensuring digital inclusion
are important aspects of ensuring that all citizens can benefit from the digital age. Tanzania
has taken steps to expand internet access and promote digital skills.
7. Content Regulation: Tanzania has laws and regulations related to content regulation,
which can affect freedom of expression online. It's important to be aware of these regulations
when engaging in online communication and content creation.
It's worth noting that the enforcement and interpretation of these laws and regulations can
vary, and there have been concerns about restrictions on freedom of expression and digital
rights in Tanzania in recent years. Therefore, individuals and organisations should stay
informed about the evolving legal and regulatory landscape related to cyber rights in the
country.
SPEECH HARM
"Speech harm" is a term used to describe various forms of harm or negative consequences
that can result from speech or communication, particularly in the context of freedom of
speech and legal discussions. It encompasses a wide range of potential harms that can arise
from spoken or written words, including but not limited to:
1. Defamation: Speech that harms a person's reputation by making false statements about
them can lead to defamation claims. Defamation includes both oral (spoken) and written
(published) statements that can damage an individual's or entity's reputation.
2. Incitement to Violence: Speech that directly encourages or incites violence or criminal
behaviour can lead to physical harm or damage to property. Incitement to violence is often
not protected as free speech.
3. Hate Speech: Hate speech involves speech that targets a particular group of people based
on characteristics such as race, religion, ethnicity, gender, or sexual orientation, with the
intention of promoting discrimination, prejudice, or violence against them. Hate speech can
cause harm by fostering hostility and violence.
It's important to note that the concept of "speech harm" is often weighed against the principle
of freedom of speech. Balancing the protection of free speech with the prevention of harm is
a complex and nuanced issue that varies by jurisdiction and legal context. In many legal
systems, speech is protected as a fundamental right, but there are limitations on speech when
it directly leads to harm, such as incitement to violence or defamation.
The boundaries of what constitutes speech harm and the legal remedies available for
addressing it can vary widely depending on the legal and cultural norms of a particular
society or jurisdiction. Legal systems and societies often grapple with striking a balance
between protecting freedom of expression and preventing harm caused by speech.
In Tanzania, as in many countries, there are legal provisions and regulations that address
various forms of speech harm, including defamation, hate speech, incitement to violence,
and other offences related to speech. Here are some key aspects related to speech harm in
Tanzania:
1. Defamation: Defamation is addressed under Tanzanian law, and individuals can pursue
legal action if they believe their reputation has been unjustly harmed by false statements
made about them. Defamation can take the form of either slander (spoken defamation) or
libel (written defamation). To make a successful defamation claim, a plaintiff typically needs
to demonstrate that the statement is false, was published to a third party, has caused harm to
their reputation, and was made negligently or with intent to harm.
2. Hate Speech: Tanzania, like many countries, has laws aimed at addressing hate speech.
Hate speech laws are designed to prevent speech that promotes discrimination, hostility, or
violence against individuals or groups based on characteristics such as race, religion,
ethnicity, gender, or sexual orientation.
4. Cybercrimes Act: Tanzania has the Cybercrimes Act, 2015, which addresses various
forms of cybercrimes, including offences related to harmful online speech, such as
cyberbullying and harassment. The Act includes provisions for prosecuting individuals who
use digital platforms to harm others through false statements, threats, or harassment.
5. Media Regulation: Tanzania has regulatory bodies, such as the Tanzania Communications
Regulatory Authority (TCRA), responsible for overseeing media and communication,
including the broadcast and print media. These bodies may have guidelines and regulations
that govern speech in the media.
It's important to note that the interpretation and enforcement of these laws can vary, and legal
cases involving speech harm may have different outcomes depending on various factors,
including the specific circumstances and evidence presented.
For the most up-to-date information on speech harm and its legal implications in Tanzania, it
is recommended to consult legal professionals and organizations focused on human rights and
freedom of expression within the country. Additionally, understanding the evolving legal
landscape and seeking legal advice when necessary is crucial to navigate issues related to
speech harm in Tanzania.
DEFAMATION
Defamation is a legal term that refers to a false statement or communication made orally
(slander) or in writing (libel) that harms the reputation of an individual, business,
organisation, or other entity. Defamation involves making false statements about someone
that injure their reputation by presenting them in a false or negative light. To be considered
defamation, the statement must meet certain criteria, including:
1. Falsity: The statement must be false or misleading. Truth is generally a complete defense
against defamation claims. If a statement is accurate, it is not considered defamatory.
2. Publication: The false statement must be communicated to a third party. It doesn't need to
be widely published; sharing it with just one person other than the subject of the statement
may be sufficient.
3. Harm to Reputation: The false statement must harm the reputation of the person or entity
it is about. This harm can be in the form of damage to reputation, economic losses, or
emotional distress.
4. Negligence or Intent: Depending on the jurisdiction, the person making the defamatory
statement may need to have acted negligently or with actual malice, meaning they knew the
statement was false or acted with reckless disregard for its truth or falsity.
It's important to note that defamation laws vary from one jurisdiction to another, and what
constitutes defamation in one place may not be the same in another. Additionally, some
countries have stricter defamation laws than others, and the burden of proof may differ. In
many cases, public figures, such as politicians or celebrities, may need to prove that a
defamatory statement was made with actual malice, which can be a higher standard to meet.
Defamation laws in Tanzania, like in many countries, provide legal remedies for individuals
who believe that their reputation has been unjustly harmed by false statements made about
them. Defamation can take the form of both spoken (slander) and written (libel) statements.
Here are some key points to understand about defamation in Tanzania:
- **Harm to Reputation:** The false statement must have harmed the reputation of the
person being talked about. This harm can take various forms, including damage to one's
reputation, economic losses, or emotional distress.
It's important to note that the legal specifics of defamation can vary based on the jurisdiction
within Tanzania and the particular circumstances of the case. Additionally, the enforcement
and interpretation of defamation laws may evolve over time.
If you believe you have a defamation case in Tanzania or are facing a defamation claim, it is
advisable to seek legal counsel from an attorney experienced in defamation law in Tanzania.
They can provide guidance on the specific legal requirements and potential remedies in your
case.
WHAT IS E- COMMERCE
E-commerce, short for "electronic commerce," refers to the buying and selling of goods,
services, or information using the internet or other electronic means. It involves conducting
commercial transactions online, and it has become a significant and rapidly growing sector of
the global economy. E-commerce can take various forms, including online retail stores,
online marketplaces, digital payment systems, and more. Here are some key aspects of e-
commerce:
E- COMMERCE IN TANZANIA
Recently, e-commerce has been gaining momentum in Tanzania, driven by increased internet
penetration and the growing use of smartphones. Here are some key points about e-commerce
in Tanzania based on information available at that time:
1. Online Retail: This is perhaps the most common form of e-commerce. Online retailers sell
a wide range of products directly to consumers over the internet. Customers browse product
listings, add items to their virtual shopping carts, and make payments online. Examples
include Amazon, eBay, kikuu, kupatana.com and online clothing stores.
2. Online Marketplaces: These are platforms that connect multiple sellers (individuals or
businesses) with buyers. Marketplaces facilitate transactions and provide a space for sellers to
list their products or services. Examples include Kupatana.com, jijiletu and Airbnb (for short-
term lodging).
3.Digital Products and Services: E-commerce is not limited to physical goods. Many
businesses sell digital products and services online, such as software, ebooks, music,
streaming video, and online courses. example include audiomack, boomplay etc.
Recently Tanzania has taken steps to regulate e-commerce through various laws and
regulations. However, please note that the legal landscape can change, and new laws may
have been enacted or existing ones may have been amended since then. Here are some key
laws and regulations that were relevant to e-commerce in Tanzania at that time:
1. The Electronic and Postal Communications Act, 2010 (EPOCA): This act regulates
electronic communications, including telecommunications and online services. It provides a
legal framework for e-commerce activities, including licensing requirements for service
providers.
2. The Electronic Transactions Act, 2015: This law recognizes the legal validity of
electronic transactions and digital signatures in Tanzania. It establishes the legal framework
for electronic commerce and electronic contracts, making e-commerce transactions legally
binding.
3. The Consumer Protection Act, 2015: While not specific to e-commerce, this act includes
provisions aimed at protecting consumers in various transactions, including online purchases.
It sets standards for product quality, advertising, and dispute resolution.
4. The Cybercrimes Act, 2015: This legislation addresses various forms of cybercrimes,
including online fraud and hacking, which are relevant to e-commerce security. It includes
provisions to combat cybercrimes that can impact online businesses.
5. Data Protection and Privacy Regulations: Tanzania has started to develop data
protection and privacy regulations to govern the collection, processing, and protection of
personal data, which is significant for e-commerce platforms handling customer data. The
Data Protection Act, 2019, is one such regulation.
10. **Local Government Regulations:** Local government authorities may have specific
regulations or licenses related to business activities, including e-commerce, depending on the
region or municipality.
It's essential for businesses engaged in e-commerce activities in Tanzania to understand and
comply with these laws and regulations. Additionally, businesses should stay updated on
legal developments and seek legal counsel or regulatory guidance as needed to ensure
compliance with the evolving legal landscape related to e-commerce in Tanzania.
TAXATION
Taxation is the process by which governments collect money from individuals and businesses
to fund public expenditures and services. Taxes are a primary source of government revenue
and are used to support various functions, such as building infrastructure, providing public
education and healthcare, maintaining law and order, and implementing social welfare
programs.
1. Types of Taxes:
Property Tax: Assessed on the value of real estate properties and paid by property owners.
Excise duty: Levied on specific goods, such as alcohol, tobacco, and gasoline.
Custom Duty: Taxes on imports and exports, designed to regulate international trade.
Digital technology refers to the use of digital systems, devices, and tools to process, store,
transmit, and manipulate information. It encompasses a wide range of technologies that rely
on digital signals, binary code, and electronic data to function. Digital technology has
transformed various aspects of modern life and is pervasive in today's society. Here are some
key components and aspects of digital technology:
1. **Binary Code:** Digital technology relies on the binary numbering system, which uses
combinations of zeros and ones to represent data and instructions. This binary code is the
foundation of digital computing.
8. **Digital Sensors:** Sensors and sensor technology are used in various applications, from
environmental monitoring and healthcare devices to industrial automation. These sensors
collect and transmit data in digital format.
10. **Cybersecurity:** Digital technology has given rise to cybersecurity measures and tools
designed to protect digital systems, networks, and data from unauthorized access, breaches,
and cyberattacks.
11. **Digital Transformation:** Many industries and organizations are undergoing digital
transformation, using digital technology to streamline operations, improve efficiency, and
enhance customer experiences.
12. **IoT (Internet of Things):** IoT connects physical objects and devices to the internet,
allowing them to collect and exchange data. This technology has applications in smart homes,
smart cities, healthcare, and more.
Illegal Access
Illegal Remaining
Illegal interception
Data espionage
Illegal device
Child pornography
Pornography
The impact of digital technology on the commission of crimes is significant and multifaceted.
While digital technology has brought about numerous benefits and advancements in various
fields, it has also created new opportunities and challenges for individuals and groups
engaged in illegal activities. Here are some key ways in which digital technology has
influenced the commission of crimes:
1. **Cybercrime:** The rise of digital technology has given birth to cybercrime, which
includes various illegal activities conducted online or using digital means. These crimes
encompass a wide range of activities, including hacking, identity theft, phishing, online fraud,
and the distribution of malware and ransomware.
2. **Online Fraud and Scams:** Criminals use digital technology to perpetrate various types
of online fraud and scams. This includes advance-fee fraud, Ponzi schemes, and deceptive
online marketplaces. Victims may lose money or personal information in these schemes.
3. **Identity Theft:** Digital technology has made it easier for criminals to steal and misuse
personal information, such as Social Security numbers, credit card details, and login
credentials. Stolen identities can be used for financial fraud, tax fraud, and other illegal
activities.
5. **Online Harassment and Cyberbullying:** The internet and social media platforms
provide a platform for online harassment and cyberbullying, where individuals may be
targeted with harmful messages, threats, or false information.
6. **Illegal File Sharing and Piracy:** Digital technology has made it easier for individuals
to share copyrighted materials, such as movies, music, and software, without authorization.
This has led to intellectual property theft and financial losses for content creators and
companies.
9. **Phishing and Social Engineering:** Cybercriminals often use phishing emails and social
engineering tactics to trick individuals into revealing sensitive information or performing
actions that compromise their security.
10. **Emerging Threats:** As technology evolves, new threats emerge. This includes threats
related to artificial intelligence, deepfake technology, and the Internet of Things (IoT), which
can be exploited by criminals for malicious purposes.
11. **Financial Crimes:** Digital technology has expanded the scope of financial crimes,
including money laundering, insider trading, and stock market manipulation, with criminals
leveraging online platforms and digital payment systems.
While digital technology has enabled criminals to carry out sophisticated and far-reaching
activities, it has also empowered law enforcement agencies and cybersecurity experts to
develop tools and techniques for tracking, preventing, and mitigating digital crimes. The fight
against cybercrime requires ongoing cooperation among governments, law enforcement
agencies, the private sector, and cybersecurity experts to develop effective strategies and
defenses in the digital age.
TECHNOLOGY
- **Robotics and Automation:** Utilizes robots and automated systems to perform tasks
efficiently and accurately.
5. **Access and Inclusivity:** The digital divide refers to disparities in access to technology
and the internet. Efforts are made to bridge this gap and ensure that technology is accessible
to all, regardless of socioeconomic status or location.
7. **Regulation and Policy:** Governments and regulatory bodies often develop policies and
regulations to ensure the responsible use of technology and address issues like data privacy,
consumer protection, and intellectual property rights.
10. **Global Impact:** Technology has a global reach and can impact international relations,
trade, and geopolitics. It has the potential to address global challenges such as climate change
and healthcare access.
Technology has become an integral part of contemporary life, influencing how we work,
communicate, travel, access information, and interact with the world around us. Its impact on
society and the economy is profound, and it continues to shape our future in ways that are
both exciting and challenging.
Intellectual Property Rights (IPR) in Tanzania are governed by various laws and regulations
aimed at protecting the rights of creators and innovators. These laws provide legal
frameworks for the protection of intellectual property, including copyrights, trademarks,
patents, industrial designs, and trade secrets. Here are the key aspects of Intellectual Property
Rights in Tanzania:
1. **Copyright and Neighboring Rights Act, 1999:** This law governs copyright protection
in Tanzania. It covers literary, artistic, and scientific works, including books, music, films,
software, and architectural designs. Copyright protection is automatic upon the creation of the
work and generally lasts for the lifetime of the author plus 50 years. The law also recognizes
neighboring rights for performers, broadcasters, and producers of sound recordings.
2. **Trade Marks Act, 2008:** The Trademarks Act provides for the registration and
protection of trademarks in Tanzania. A trademark can be a word, logo, symbol, or
combination thereof that distinguishes goods or services. Registration with the Tanzania
Trademarks Office is necessary to obtain exclusive rights to use a trademark.
3. **Patents, Industrial Designs, and Utility Models:** Patents protect inventions, industrial
designs protect the visual appearance of products, and utility models protect functional
innovations. These rights are obtained through registration with the Tanzania Patents Office.
4. **Geographical Indications:** Tanzania has provisions for the protection of geographical
indications, which are used to identify products associated with a particular region and
possess specific qualities, characteristics, or reputation due to their geographical origin.
5. **Trade Secrets and Confidential Information:** The law recognizes the importance of
protecting trade secrets and confidential information. This is crucial for businesses to
safeguard their proprietary knowledge and practices.
6. **Enforcement and Remedies:** Intellectual property rights holders can take legal action
against infringement. The remedies may include injunctions, damages, and orders for the
confiscation or destruction of infringing materials.
It's important for individuals and businesses in Tanzania to understand and protect their
intellectual property rights. Registering intellectual property, such as trademarks, patents, and
copyrights, can provide legal protection and exclusive rights. Consulting with intellectual
property professionals and legal experts in Tanzania is advisable to navigate the intricacies of
intellectual property laws and ensure proper protection of intellectual assets.
E-EVIDENCE
E-evidence, short for electronic evidence, refers to information or data that is stored or
transmitted electronically and can be used as evidence in legal proceedings. In the digital age,
e-evidence has become increasingly significant as it includes a wide range of electronic
information that can be relevant in various legal contexts. Here are some key aspects of e-
evidence:
- **Social Media Posts:** Content shared on social networking platforms, including text,
images, videos, and comments.
- **Website Content:** Information from websites, including web pages, online articles,
and blogs.
- **Digital Images and Videos:** Photos and videos captured or stored in digital format.
- **Metadata:** Information about electronic files, such as creation dates, authorship, and
edit history.
- **Databases and Records:** Digital records from databases, including financial records
and customer databases.
- **GPS and Location Data:** Location-based data from devices, apps, or services.
4. **Privacy and Data Protection:** Handling e-evidence must comply with privacy laws and
data protection regulations, as collecting and using electronic data can involve individuals'
personal information.
6. **Forensic Examination:** In some cases, digital forensics experts may be called upon to
examine electronic devices and data to recover and analyze evidence.
E-EVIDENCE IN TANZANIA
6. **Privacy and Data Protection:** Handling e-evidence must comply with privacy laws and
data protection regulations, especially if it involves individuals' personal information. Proper
procedures must be followed to protect sensitive data.
9. **Standards and Procedures:** Legal standards for the admissibility and weight given to
e-evidence can vary, and legal professionals in Tanzania must be knowledgeable about the
specific rules and procedures in Tanzanian courts.
Investigating e-evidence involves the collection, preservation, and analysis of electronic data
that may be relevant to a legal case. This process is essential to ensure the evidence's integrity
and admissibility. Here are key steps in investigating e-evidence:
- **Collection:** Collect electronic data using forensically sound methods to maintain the
evidence's integrity. This may involve seizing devices, making forensic copies, or using
specialized tools for data extraction.
- **Analysis:** Analyze the collected data to extract relevant information. This may involve
digital forensics experts examining metadata, file contents, timestamps, and other digital
artifacts.
- **Relevance:** Determine the relevance of the e-evidence to the case. Not all electronic
data collected during an investigation may be admissible in court.
**2. Creation of E-Evidence:**
E-evidence can be created in various forms during the course of normal digital activities or
investigations. It's essential to ensure that the created evidence meets legal standards. Here
are common ways e-evidence is created:
- **Emails and Messages:** Electronic communication, such as emails, text messages, and
instant messages, can be created as evidence during digital conversations.
- **Digital Photos and Videos:** Images and videos captured using digital devices can be
used as evidence if they are relevant to a case.
- **Web Content:** Screenshots or archives of web pages, online articles, and social media
posts can be created as e-evidence.
- **Logs and Records:** Digital systems generate logs and records of activities, which can
be used as evidence in certain cases.
For e-evidence to be admissible in court, it must meet specific legal criteria and be presented
in accordance with established procedures. Admissibility depends on factors such as
relevance, authenticity, and the satisfaction of legal standards:
- **Relevance:** E-evidence must be relevant to the case and directly related to the issues in
question.
- **Authentication:** E-evidence must be properly authenticated to establish its legitimacy
and prevent tampering. This may involve demonstrating the source of the evidence, its chain
of custody, and its integrity.
- **Hearsay Rule:** E-evidence that contains statements made outside of court may be
subject to the hearsay rule. Exceptions to the rule may apply in certain circumstances.
- **Legal Standards:** Admissibility standards can vary by jurisdiction and type of case.
Legal professionals must be familiar with the rules and procedures in their respective
jurisdictions.
Proper handling, creation, and presentation of e-evidence are essential to ensure its
admissibility and effectiveness in legal proceedings. Legal professionals and digital forensics
experts often work together to meet these requirements and navigate the complexities of e-
evidence in the legal context.