Close Menu
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact

Subscribe to Updates

Get the latest technology news from TechFinancials News about FinTech, Tech, Business, Telecoms and Connected Life.

What's Hot

R6.5M Range Rover SV Polar Night: Only 5 for SA

2025-09-01

Pepe Coin Price Forecasts; Floki Inu Latest News & Top Crypto Investment To Make In 2025

2025-08-31

BNB Hits $900 In August As Analysts Give Their Latest Binance Coin Price Predictions

2025-08-31
Facebook X (Twitter) Instagram
Trending
  • R6.5M Range Rover SV Polar Night: Only 5 for SA
Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp RSS
TechFinancials
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact
TechFinancials
Home»Opinion»New Standard Operating Procedures For The Investigation, Search, Access Or Seizure Of Cyber Articles
Opinion

New Standard Operating Procedures For The Investigation, Search, Access Or Seizure Of Cyber Articles

A 'cyber article' is broadly defined under the CCA to mean any data, computer program, computer data storage medium, or computer system, which is concerned with, may afford evidence of, or is intended to be used for the commission or suspected commission of any offence (or reasonably suspected as such).
ContributorBy Contributor2023-11-29No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Cybercrime
Cybercrime. Image by kalhh from Pixabay
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

The Standard Operating Procedures (SOPs) for the Investigation, Search, Access or Seizure of Articles in terms of section 26 of the Cybercrimes Act 19 of 2020 (CCA) were published by the Department of Police on 6 October 2023.

The CCA creates legal mechanisms to address cybercrime in South Africa. The aim of the SOPs enacted in terms of the CCA is to ensure that investigations conducted by the South African Police Service (SAPS) are compliant with legislation. The SOPs also ensure that the Constitutional rights to privacy and to a fair trial are duly observed and protected during the exercise of any powers given to SAPS in the CCA.

Scope and application of the SOPs

Once publicised in the Government Gazette, the SOPs must be observed by members of SAPS as well as any other person or agency afforded investigative powers in respect of any offence committed by means of, or facilitated through the use of, a cyber article.

What is a “cyber article”?

A ‘cyber article’ is broadly defined under the CCA to mean any data, computer program, computer data storage medium, or computer system, which is concerned with, may afford evidence of, or is intended to be used for the commission or suspected commission of any offence (or reasonably suspected as such).

Who may search for, seize, or access the cyber article?

Only police officials may search for, access, or seize a cyber article. They may, however, be assisted by an investigator (such as a digital forensic expert) where required, provided that they obtained the necessary authorisation.

Police officials are expressly instructed to refuse any help offered from “unauthorised persons” (i.e., possible suspects) during an investigation.

How are searches and seizures carried out?

There are essentially four ways in which a police official can be authorised to search for and/or seize a cyber article:

  • in terms of a warrant;
  • where lawful consent is provided;
  • during a lawful arrest; or
  • where they can show urgency or exceptional circumstances.

Generally, section 29(1) of the CCA provides that a police official can only search for, access, or seize a cyber article by virtue of a search warrant issued by a competent court. A warrant is, however, not necessary in all instances.

Firstly, it is also possible for a police official to conduct a search and seizure without a warrant if they have obtained consent in writing from a person who has lawful authority to consent. In this instance, the police official will have all the same powers as they would have under an issued search warrant.

A police official may also have full powers of search and seizure despite not having obtained a warrant if they can show urgency and exceptional circumstances. The official will, more specifically, have to show that they reasonably believe that a search warrant would be issued if applied for, and that the delay created by first bringing an application would have resulted in the object of the search and seizure being defeated.

Furthermore, police officials are given limited powers to seize cyber articles without a warrant during an arrest made in terms of the CCA.  However, the official will not be allowed to access the data or computer programs until they have obtained a warrant unless they can show urgency.

Depending on how the search or seizure has to be carried out, the police official conducting the search will likely require different types of legal permission or authorization in each particular case. This may mean a warrant obtained under the CCA in relation to relevant cyber articles and a subpoena under the Criminal Procedure Act 51 of 1977 in relation to historical information such as bank records or cell phone records.

Methods of search, access, or seizure

The search, access, and seizure of a cyber article generally involve two steps:

  • the physical seizure of the device (computer data storage medium or computer system); and
  • the seizure (copying or printing) of the data and computer programs stored thereon.

The action of ‘seizing’ is narrowly defined in the CCA to mean:

  1. removal of a computer data storage medium or any part of a computer system;
  2. rendering inaccessible data, a computer program, a computer data storage medium or any part of a computer;
  3. making and retaining a copy of data or a computer program; or
  4. making and retaining a printout of the output of data or a computer program.

These are the only actions which are permissible once the police official has obtained a search warrant.

The SOPs also give SAPS officers powers to search and document any information necessary for the subsequent analysis of a cyber article, such as passwords, email accounts, and Personal Identification Numbers (PINs). Importantly, where a police official obtains or uses an instrument, device, equipment, password, decryption key, or data to get access to a cyber article, they may only do so to the extent, in the manner, and for the purposes specified in the warrant.

Where the cyber article belongs to an innocent third party or witness, SAPS must try to follow a process which is proportionally the least intrusive to that person when acquiring the evidence. The first point of call is to obtain consent from the third party – only where the third party refuses to give consent should steps be taken to obtain a warrant. This also applies in cases where the data is held by a third party or an independent data holder.

Individuals must understand what powers are conferred onto SAPS, and when SAPS may execute such powers. While the SOP intends to create separate procedures around the search, access, and seizure of cyber articles, it remains to be seen how these distinct and nuanced procedures will play out in practice, given the apparent cybersecurity skills gap present in South Africa.

  • Wendy Tembedza, Partner, Prineil Padayachy, Senior Associate & Danielle van der Watt, Candidate Attorney from Webber Wentzel

Cyber Articles SAPS
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Contributor

Related Posts

Amid Uncertainty, Navigating The AI transition, A Roadmap For Africa

2025-08-26

Where Are The Black Investors And VCs?

2025-08-25

Why South Africa Is The Hidden Powerhouse For Global Executive Search

2025-08-25

Your WiFi Router Is About To Start Watching You

2025-08-21

It’s Time To Fight AI With AI In The Battle For Cyber-Resilience

2025-08-20

Securing Our Data In The Fast (Payments) Lane

2025-08-19

SAPS Warns Of Increase Of ATM-Related Scams

2025-08-19

What Businesses Should Be Doing Instead Of Buying More Tech

2025-08-08

Africa’s Innovations Are Overlooked Because Global Measures Don’t Fit: What Needs To Change

2025-08-05
Leave A Reply Cancel Reply

DON'T MISS
Breaking News

BankservAfrica Rebrands As PayInc

The financial market infrastructure giant BankservAfrica has officially been rebranded to PayInc. The launch, held…

KZN’s First Supercar-Centric Luxury Residential Development Unveiled

2025-08-27

Government Pensions Administration Agency CEO Placed On Precautionary Suspension

2025-08-26

Airtel Africa & Vodacom Forge Landmark Infrastructure Partnership

2025-08-12
Stay In Touch
  • Facebook
  • Twitter
  • YouTube
  • LinkedIn
OUR PICKS

R6.5M Range Rover SV Polar Night: Only 5 for SA

2025-09-01

SA’s Skhokho 2.0 Puts Enterprise AI In SME Hands

2025-08-28

Vodacom Invests R400M To Expand Network In Free State And Northern Cape

2025-08-26

Elon Musk’s Starlink Backs BEE Equity Equivalents, Not 30% Ownership

2025-08-18

Subscribe to Updates

Get the latest tech news from TechFinancials about telecoms, fintech and connected life.

About Us

TechFinancials delivers in-depth analysis of tech, digital revolution, fintech, e-commerce, digital banking and breaking tech news.

Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp Reddit RSS
Our Picks

R6.5M Range Rover SV Polar Night: Only 5 for SA

2025-09-01

Pepe Coin Price Forecasts; Floki Inu Latest News & Top Crypto Investment To Make In 2025

2025-08-31

BNB Hits $900 In August As Analysts Give Their Latest Binance Coin Price Predictions

2025-08-31
Recent Posts
  • R6.5M Range Rover SV Polar Night: Only 5 for SA
  • Pepe Coin Price Forecasts; Floki Inu Latest News & Top Crypto Investment To Make In 2025
  • BNB Hits $900 In August As Analysts Give Their Latest Binance Coin Price Predictions
  • SUI Price Prediction: Remittix Expected To Rise Over 4,000% This Year After Winning Top Crypto Presale Award
  • Ethereum Price Heading Towards $4,000 As Crypto Markets Drop But This Altcoin Continues To Surge
TechFinancials
RSS Facebook X (Twitter) LinkedIn YouTube WhatsApp
  • Homepage
  • Newsletter
  • Contact
  • Advertise
  • Privacy Policy
  • About
© 2025 TechFinancials. Designed by TFS Media.

Type above and press Enter to search. Press Esc to cancel.

Ad Blocker Enabled!
Ad Blocker Enabled!
Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.