dc.description |
This research paper titled “A critical analysis of the Protection of Right to Privacy against the Development of Information Communication Technology in Tanzania” contains a total of five chapters mainly focusing on challenges of the protection right to privacy faces due to the development of Information Technology. Chapter One introduces the topic by providing the definitions, literature review, scope and limitations, hypothesis and objectives of the research. The main objective of this research was to analyze various legislations polices if any and the weakness of the law on private data protection. Chapter Two comprises of Conceptual Framework, consisting of various definitions and concepts from different authors. Chapter Three consist of the Legal framework. It explains the concepts on the topic and laws relating on the right to privacy including The Cyber Crimes Act 2015, The Electronic and Postal Communications Act of 2010, Tanzania Communication Regulation Authority Act together with the Constitution of the United Republic of Tanzania of 1977 and, foreign jurisdiction laws. Chapter Four provides for the data findings and analysis of findings. Finding has shown that there are weaknesses in various legislation touching on Right to privacy in Tanzania against the development of Information Communication Technology and there no piece of legislation which is enacted to exclusively deal with it and only there scatted pieces of legislation each attempting to provide for private data protection, on existing laws there is no procedure and limitation on interception of individual persona data, lack of notification , and on compliance with international law on private data protection Tanzania has comply with international law only on issue of mandatory registration of but does not comply with international law on issue of procedure and limitation on interception of private data, international laws require data subject to be notified before his or her data processed. Here the hypothesis is tested, and evidence of the researched questions and objectives are presented. The last Chapter Five provides for the recommendations which are and conclusive remarks of the researcher on the whole research. In conclusion and recommendation, the researcher has recommended to the government to enact a single legislation which will create procedure and limitation of private data protection. This research has opened doors for other scholars to venture more and come up with new finding regarding the critical analysis on the protection of right to privacy against the development of Information Communication Technology in Tanzania. |
|