Bachelorarbeit, 2020
84 Seiten
CHAPTER ONE
INTRODUCTION AND BACKGROUND OF THE PROBLEM
1.1 Background of the problem
1.2 Statement of the Problem
1.3 Research Hypothesis
1.4 Research Objectives
1.4.1 General Objective
1.4.2 Specific Objectives
1.5 Literature Review
1.6 Scope of the Study
1.7 Significance of the Study
1.8 Limitation of the Study
1.9 Research Methodology
1.9.1 Research design
1.9.2 Study Area
1.9.3. Sample Population
1.9.3 Sample size
1.9.4 Sampling method
1.9.5 Data collection methods
1.9.5.1 Library Research
1.9.5.2Field Research
1.9.5.2.1 Interview
1.9.5.2.2 Questionnaire
1.10 Data Presentation and Analysis
1.11 Chapterization
CHAPTER TWO
CONCEPTUAL FRAMEWORK ON PROTECTION OF RIGHT TO PRIVACY
2.0. Introduction
2.1 The General Concept of Privacy
2.2 Types of Privacy
2.3 Importance of Privacy
2.4 The concept of Information and Communication Technology
2.5 The Concept of Cyber Space
2.6 Relationship between Privacy and Cyber Space
2.7 Consequences of Privacy Invasion
2.8 Conclusion
CHAPTER THREE
INTERNATIONAL LEGAL AND INSTITUTIONAL FRAMEWORK IN PROTECTION OF RIGHT TO PRIVACY TANZANIA
3.0 Introduction
3.1 Legal Framework at International level
3.1.1 Right to Privacy under Universal Declaration of Human Rights.
3.1.2 Guarantee of Right to Privacy in the Cyber Space Under the International Covenant on Civil and Political Rights.
3.2.1 The Human Rights Committee
3.3 Regional Legal Framework
3.3.1 The Protection of Privacy Under the African Union (Malabo Convention)
3.4 Sub Regional Legal Framework
3.4.1 Privacy Protection Under the Economic Community of West African States (ECOWAS).
3.4.2 Right to Privacy Under the East African Community (EAC) for Cyber Law.
3.5 Conclusion
CHAPTER FOUR
NATIONAL LEGAL AND INSTITUTIONAL FRAMEWORK IN PROTECTION OF RIGHT TO PRIVACY
4.0 Introduction
4.1 Legal Framework
4.1.1 The Guarantee of Right to Privacy in the Cyber Space Under the Constitution of the United Republic of Tanzania of 1977
4.1.2 National Information and Communications Technology Policy.
4.1.3 Privacy and Confidentiality of the Customers Under Tanzania Communications Regulation Authority Act.
4.1.4 Prohibition of Illegal Access and Illegal Interference under the Cybercrimes Act.
4.1.6 Protection of Consumer Information under the Electronic and Postal Communication (Consumer protection) Regulations.
4.1.7 Prohibition of Disclosure of User’s Information under the Electronic and Postal Communications (Online Content) Regulations.
4.2 Laws which Posse Potential Risk to Privacy Infringement in the Cyber Space
4.2.1 Threat of Police Power to the Protection of Privacy in the Cyber Space Under the Cybercrimes Act.
4.2.2 Interception and Disclosure of Information Under the Electronic and Postal Communications Act.
4.2.3 Impact of Law Enforcement Agents to the Right to Privacy in the Cyberspace under the Media Service Act
4.2.4 Interception of Communication and Threat of Right to Privacy in the Cyber space under the Prevention of Terrorism Act.
4.2.5 Effect of Police Power in Search under the Police Force and Auxiliary Services Act.
4.2.6 Impact of Surveillance to Right to Privacy under Tanzania Intelligence and Security Service Act.
4.2.7 Impact of Mandatory SIM card Registration to the Protection of Right to Privacy in the Cyber Space under the Electronic and Postal Communications (Sim Card Registration) Regulations of 2020
4.3 Tanzanian Institutional Framework in Protection of Right to Privacy
4.3.1 Power and Function of Tanzania Communications Regulatory Authority in Protection of Right to Privacy
4.3.2 The Information and Communication Technologies. (ICT) Commission in Protection of Right to Privacy
4.3.3 The Police
4.3.3 Protection of Right to Privacy in the Cyber Space by the Court During Adjudication of Privacy Cases
4.4 Conclusion
CHAPTER FIVE
AN APPRAISAL OF TANZANIAN LEGAL AND INSTITUTIONAL FRAMEWORK GORVERNING PROTECTION OF RIGHT TO PRIVACY IN CYBER SPACE
5.0 Introduction
5.1 The Analysis of Guarantee by Legal and Institutional Framework in Protection of Right to Privacy in the Cyber Space.
5.2 The Assessment of Effectiveness of Tanzanian legal and Institutional Framework in Protection of Right to Privacy in Cyber Space.
5.2.1 The Comprehensive Legislation that Established for the Purpose of Protection of Right to Privacy.
5.2.2 Compliance of Tanzanian laws with International, Regional and Sub regional Standards
5.2.3 Analysis of effectiveness of Bodies which are Protecting of Privacy.
5.2.4 Assessment of Police Power and other law enforcers during Surveillance and Interception of Communications in Relation to the Protection of Right to Privacy
5.2.5 Analysis of Mandatory SIM card Registration in Relation to the Right to Privacy in the Cyber Space
5.3 Examination of Necessity of Having Mechanism that Protect Privacy Cyber Space
5.6 Conclusion
CHAPTER SIX
SUMMARY OF THE MAJOR FINDINGS, CONCLUSION AND RECOMMENDATION
6.0 Summary of the Major Findings
6.1 Conclusion
6.2 Recommendations.
The research report provides an appraisal of the legal and institutional framework in Tanzania regarding the protection of the right to privacy within cyberspace. The work aims to identify existing legal lacunae and examine whether the current regulatory measures sufficiently protect citizens while meeting international human rights standards.
1.1 Background of the problem
Privacy is the right of the individual to be protected against intrusion into his personal life or affairs, or those of his family, by direct physical means or by publication of information. Privacy enable us to create boundaries and protect ourselves from unwarranted interference in our lives, allowing us to negotiate who we are and how we want to interact with the world around us, also privacy protect us from arbitrary and unjustified use of power by state, companies and other person.
The growth of internet in the country lead to increase of violation of privacy and there are several ways in which the privacy of the individual can be violated in cyber space. If a person is victimized of privacy infringement over internet, it involves various complex issues to be settled which are what amounts to violation? Who is liable for the same? and, that shall be the remedy offered?
Privacy benchmarks at an international level are found in the international human rights treaties. The Universal Declaration of Human Rights of 1948 where under Article 12 that ‘no one should be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks on his honor or reputation. Everyone has the right of being protected by the law against such interferences or attacks’. This provision is reproduced in Article 17 in the International Covenant on Civil and Political Rights. Other international human rights instruments that specifically recognize privacy as a right include Article 14 of the United Nations Convention on Migrant Workers 1990. However, these instrument stipulates the right to privacy but did not provide any model or framework on how this right can be protected and other related procedures.
CHAPTER ONE: INTRODUCTION AND BACKGROUND OF THE PROBLEM: Provides the foundation of the study, covering the problem of privacy violations in the digital age, research hypotheses, and the methodology utilized for data collection.
CHAPTER TWO: CONCEPTUAL FRAMEWORK ON PROTECTION OF RIGHT TO PRIVACY: Defines the core concepts of privacy, cyberspace, and information technology, and establishes the theoretical relationship between these concepts.
CHAPTER THREE: INTERNATIONAL LEGAL AND INSTITUTIONAL FRAMEWORK IN PROTECTION OF RIGHT TO PRIVACY TANZANIA: Analyzes international and regional legal standards that serve as benchmarks for protecting privacy rights.
CHAPTER FOUR: NATIONAL LEGAL AND INSTITUTIONAL FRAMEWORK IN PROTECTION OF RIGHT TO PRIVACY: Examines specific Tanzanian statutes and institutions currently tasked with regulating cyberspace and managing consumer data.
CHAPTER FIVE: AN APPRAISAL OF TANZANIAN LEGAL AND INSTITUTIONAL FRAMEWORK GORVERNING PROTECTION OF RIGHT TO PRIVACY IN CYBER SPACE: Presents the primary findings from field research and assesses the effectiveness of the current legal system in safeguarding privacy.
CHAPTER SIX: SUMMARY OF THE MAJOR FINDINGS, CONCLUSION AND RECOMMENDATION: Concludes the study by highlighting key findings regarding legal loopholes and proposing legislative and institutional improvements.
Privacy, Cyberspace, Cybercrimes Act, Data Protection, Tanzania, Legal Framework, Human Rights, Surveillance, SIM Card Registration, Constitutional Law, Information and Communication Technology, Institutional Reform, Interception, Consumer Protection, Legislation.
The research focuses on evaluating the legal and institutional framework in Tanzania to determine how effectively it protects the right to privacy in cyberspace, particularly in the absence of comprehensive data protection legislation.
Key themes include the constitutional right to privacy, the impact of surveillance and SIM card registration laws, the role of institutions like the TCRA, and the need for new legislation to address digital privacy challenges.
The objective is to identify gaps (lacunae) in existing Tanzanian laws, determine the necessity for stronger privacy laws, and recommend specific mechanisms to enhance the protection of individual privacy in the cyber environment.
The researcher adopted a qualitative approach, combining library/archival research with field studies, including structured and unstructured interviews and open-ended questionnaires distributed to magistrates, advocates, and TCRA officers.
The main body evaluates international standards, analyzes current Tanzanian laws (such as the Cybercrimes Act and Media Service Act), and provides an appraisal based on empirical findings from the field regarding the enforcement and effectiveness of these laws.
The research is best characterized by terms such as privacy, cyberspace, data protection, Tanzanian legal framework, human rights, and institutional reform.
The author argues that mandatory SIM card registration creates extensive databases that facilitate location tracking and surveillance, potentially eroding the anonymity of users and complicating liability in cases of privacy violation.
The research identifies that certain laws, like the Cybercrimes Act, grant excessive powers to police to search and seize computer systems without judicial oversight, which poses a significant threat to the constitutional right to privacy.
The author suggests that existing bodies like the TCRA are multipurpose and lack the specific expertise or mandate to investigate data privacy breaches, unlike specialized data protection boards found in other jurisdictions.
The author concludes that existing Tanzanian laws are insufficient and fail to meet international standards, necessitating the enactment of a comprehensive data protection law that balances security interests with individual privacy rights.
Der GRIN Verlag hat sich seit 1998 auf die Veröffentlichung akademischer eBooks und Bücher spezialisiert. Der GRIN Verlag steht damit als erstes Unternehmen für User Generated Quality Content. Die Verlagsseiten GRIN.com, Hausarbeiten.de und Diplomarbeiten24 bieten für Hochschullehrer, Absolventen und Studenten die ideale Plattform, wissenschaftliche Texte wie Hausarbeiten, Referate, Bachelorarbeiten, Masterarbeiten, Diplomarbeiten, Dissertationen und wissenschaftliche Aufsätze einem breiten Publikum zu präsentieren.
Kostenfreie Veröffentlichung: Hausarbeit, Bachelorarbeit, Diplomarbeit, Dissertation, Masterarbeit, Interpretation oder Referat jetzt veröffentlichen!

