Posting Strike Footage in the Middle East Could Lead to Legal Consequences

In today’s digital age, footage of military strikes often circulates rapidly on social media. While such content may seem like news-sharing or activism, posting strike footage in the Middle East can carry serious legal risks. These risks arise from national security laws, anti-terrorism regulations, and restrictions on media and speech in conflict zones. National Security […]

Cyberbullying – Legal Remedies to Protect Children

Attend any welcoming event at the beginning of a school year and you are guaranteed that the topic of cyberbullying will feature somewhere in the principal’s speech.  Cyberbullying refers to when a person is bullied by another using electronic devices, such as cell phones and computers.  The struggle against cyberbullying is real – parents and […]

WhatsApp and the Law

Although the legal position regarding legal liability for posts on WhatsApp has been pretty set since 2022, we do often get enquiries about the legal consequences of posts that are made or shared on WhatsApp, and especially about the legal liability of group administrators. South Africans have been warned repeatedly over the years that they […]

Legal Battle Over Unpaid Levies and Electricity Charges

In a recent legal case, The Body Corporate v JM Katisi (judgment delivered on 3 January 2025), the Body Corporate sought a monetary judgment against one of its members for unpaid levies and electricity charges amounting to R107,940.631. The Body Corporate also requested authorization to disconnect the electricity supply to the property until the outstanding […]

The Tender Evaluation Scoring Matrix

A tender evaluation scoring matrix is a crucial tool used to assess submitted bids and determine the one that provides the best value for money. It allows buyers to systematically score and weigh supplier responses against predefined award criteria. Here are the key components of such a matrix: Steps in Using the Scoring Matrix Remember that bid […]

The Essential Duties of a Tender Evaluator

Tender Evaluators are professionals who play a pivotal role in the procurement process, ensuring transparency, fairness, and value for money. Here’s a comprehensive breakdown: Remember, the evaluator’s role extends beyond mere scoring; it encompasses integrity, expertise, and adherence to established procedures. Their diligence contributes to successful procurement outcomes. The information provided in this article does […]

The Role of a Tender Evaluation Panel

A Tender Evaluation Panel is a group of individuals responsible for reviewing and assessing tenders submitted in response to a request for proposal (RFP) or tender invitation. Their primary goal is to ensure that the procuring organization selects the most economically advantageous tender while adhering to legal requirements and achieving value for money. Here are the key […]

Applying for a Protection Order Under the Protection from Harassment Act, 2011

The Protection from Harassment Act, 2011 (Act 17 of 2011) was enacted to address harassment and stalking behaviors that violate an individual’s right to privacy and dignity. This Act provides a civil remedy for victims of harassment, offering protection through a court-issued protection order. Here’s how to apply for a protection order under this Act: […]

AI and the Processing Personal Information in South Africa

Artificial Intelligence (AI) has seen significant growth across various industries, driven by machine learning and fuelled by data. As the importance of data rises, so do the associated legal issues. In South Africa, businesses need to ensure that their AI systems are compliant with the Protection of Personal Information Act, 2013 (POPIA). AI and Data […]

Protection of Personal Information (POPI Act)

The Protection of Personal Information (POPI) Act is a landmark piece of legislation that brings South Africa in line with Europe in terms of personal information and online privacy.   In essence, the POPI Act was introduced to provide a form of security to prohibit the reckless misuse of people’s personal information by others without their […]

TOP