https://zimbabwe.misa.org

Cybersecurity and Cybercrime
Laws in the SADC Region

References
African Union. (2013). AU Convention on Cyber Security
and Personal Data Protection. Retrieved from https://au.int/
sites/default/files/treaties/29560-treaty-0048_-_african_
union_convention_on_cyber_security_and_personal_data_
protection_e.pdf
African Union. (2019). Declaration on Principles of Freedom
of Expression and Access to Information in Africa. https://
www.achpr.org/public/Document/file/English/draft_
declaration_of_principles_on_freedom_of_expression_
in_africa_eng.pdf
African Declaration on Internet Rights and Freedoms
(AFDEC). (2020). Privacy and Personal Data Protection in
Africa Advocacy Toolkit. Johannesburg.
Brenner, S. W. & Schwerha, J. J. (2007-2008). Cybercrime
havens: Challenges and solutions. Business Law Today,
17(2), 49-79.
Cou nc i l of Eu rope. (20 0 4). T he Budapest
Convention. Retrieved from https://w w w.europarl.
europa.eu/meetdocs/2014_2019/documents/libe/
dv/7_conv_budapest_/7_conv_budapest_en.pdf
Electronic Frontier Foundation. (2013). The Necessary
and Proportionate Principles. Retrieved from https://
necessaryandproportionate.org/citations/page/5/
Freedom House (2019). Freedom in the World — Zambia
Country Report. Retrieved from https://freedomhouse.org/
country/zambia
Gillis, A., & Jackson, W. (2002). Research methods for
nurses: Methods and interpretation. Philadelphia: F.A.
Davis Company.
Government of Botswana. (2018). Cyber Crime and Computer
Related Crimes Act. Retrieved from https://www.bocra.
org.bw/sites/default/files/documents/18%20Act%2029-062018%20Cybercrime%20and%20Computer%20Related%20
Crimes.pdf
Government of Tanzania. (2015). Cybercrime Act. Retrieved
https://rsf.org/sites/default/files/the_cyber_crime_act_2015.
pdf
Government of Malawi. (2016). Electronic Transactions
and Cyber Security Act. https://crm.misa.org/upload/web/
e-transactions-act-2016.pdf
Government of Namibia. (2017). Electronic Transactions
and Cybercrime Bill. Retrieved from https://www.iwits.me/
story/namibian-electronic-and-cybercrime-bill/
Gover n ment of Lesot ho. (2020). Computer Cr i me
and Cyber Bi l l. Retrieved from https://w w w.gov.ls/
cyber-crime-a-risk-to-lesotho/
Government of South Africa. (2016). Cybercrimes and
Cybersecurity Bill. Retrieved from https://www.justice.
gov.za/legislation/bills/CyberCrimesBill2017.pdf
Government of Zambia. (2017). Cyber Security and Cyber
Crimes Bill . https://www.lusakatimes.com/wp-content/
uploads/2018/06/The-Cyber-Security-and-the-Cyber-CrimesDRAFT-Bill-2017.pdf
Government of Zimbabwe. (2020). Cybersecurity and Data
Protection Bill. Retrieved from http://veritaszim.net/sites/

veritas_d/files/Cyber%20Security%20and%20Data%20
Protection%20Bill.pdf
Hove, K. (2017, July 8). The SADC Model Law on Computer
Crime and Cybercrime: A Harmonised Assault on the Right
to Privacy? https://www.linkedin.com/pulse/sadc-modellaw-computer-crime-cybercrime-harmonised-assaultkuda-hove/
Hunter, M. and Mare, A. A Patchwork for Privacy: Mapping
communications surveillance laws in southern Africa.
Media Policy and Democracy Project. DOI: 10.13140/
RG.2.2.33154.71363
Leininger, M. M. (1985). Qualitative Research Methods in
Nursing. Orlando: Grune and Stratton.
Lincoln, Y. S. (1992). Sympathetic connections between
qualitative methods and health research. Qualitative Health
Research, 2(4), 375-391.
IPPR and Action Namibia. (2017). Submission: Draft
Provisions of the Electronic Transactions and Cybercrime
Bill (2017). Retrieved from https://action-namibia.org/wpcontent/uploads/2017/10/ACTION-IPPR-Submission-on-ETCBill-June2017.pdf
Mare, A. (2020). Internet Shutdowns in Africa| StateOrdered Internet Shutdowns and Digital Authoritarianism
in Zimbabwe. International Journal of Communication,
14, 4244-4263.
Mare, A. (2018). Politics unusual? Facebook and political
campaigning during the 2013 harmonised elections in
Zimbabwe. African Journalism Studies, 38(2), 1–22.
MISA-Zimbabwe. (2020). Cybersecurity and Data Protection
Bill entrenches surveillance: MISA Zimbabwe analysis of
the Cybersecurity and Data Protection Bill, 2019. Retrieved
from https://zimbabwe.misa.org/wp-content/uploads/
sites/13/2020/05/Cybersecurity-and-Data-Protection-Billentrenches-surveillance-MISA-Zimbabwe-analysis.pdf
Orji, U. J. (2015). Multilateral Legal responses to cyber
Security in Africa: Any Hope for Effective International
cooperation? A paper presented during the 7th International
Conference on Cyber Conflict: Architectures in Cyberspace,

105-118.
SADC. (2013). SADC Model Law on Computer Crime and
Cybercrime. Retrieved from https://www.itu.int/en/ITU-D/
Cybersecurity/Documents/SADC%20Model%20Law%20
Cybercrime.pdf
Seger, A. (2016). ‘Implementat ion of t he Budapest
Convention on Cybercrime’. [PowerPoint Presentation].
Retr ieved f rom ht t p://w w w.oas.org /jur id ico/pd fs/
cyb9_coe_cyb_oas_dec16_v1.pdf.
Wuest, J. (1995). Feminist grounded theory: An exploration
of the congruency and tensions between two traditions in
knowledge discovery. Qualitative Health Research, 5(1),
125–137.
Zuboff, S. (2018). The Age of Surveillance Capitalism: The
Fight for a Human Future at the New Frontier of Power.
London: Profile Books.

41

Select target paragraph3