Confidentiality at Work Places with the Computerized systems

65
1 MZUMBE UNIVERSITY FACULTY OF LAW NAME: JACOB MOGENDI REG.NO: 10254/T.09 TOPIC: Enforcing Confidentiality Clauses in Tanzania; a Critical Analysis of the Legal Challenges Facing Employers and Employees SUPERVISOR: MRS. MWAJUMA KADILU, ADVOCATE. A DISSERTATION SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF BACHELOR OF LAWS (LL.B) DEGREE OF MZUMBE UNIVERSITY.

Transcript of Confidentiality at Work Places with the Computerized systems

1

MZUMBE UNIVERSITY

FACULTY OF LAW

NAME: JACOB MOGENDI

REG.NO: 10254/T.09

TOPIC:

Enforcing Confidentiality Clauses in Tanzania; a Critical Analysis of

the Legal Challenges Facing Employers and Employees

SUPERVISOR: MRS. MWAJUMA KADILU, ADVOCATE.

A DISSERTATION SUBMITTED IN PARTIAL FULFILLMENT OF THE

REQUIREMENTS FOR THE AWARD OF BACHELOR OF LAWS (LL.B) DEGREE

OF MZUMBE UNIVERSITY.

i

Certification

I, the undersigned, certify that we have read and hereby recommend for acceptance by

the Mzumbe University, a research entitled Enforcing Confidentiality Clauses in

Tanzania; a Critical Analysis of the Legal Challenges Facing Employers and

employees, in partial/fulfillment of the requirements for award of the Bachelor of Laws

of Mzumbe University.

Signature

___________________________

Supervisor

ii

Declaration

I, Jacob Mogendi, declare that this Research is my own original work and that it has not

been presented and will not be presented to any other university for a similar or any

other degree award.

Signature ___________________________

Date________________________________

Copyright

This Research is a copyright material protected under the Berne Convention, the

Copyright and Neighboring Rights Act [Cap 218 RE: 2002] and other international and

national enactments, in that behalf, on intellectual property. It may not be reproduced by

any means in full or in part, except for short extracts in fair dealings, for research or

private study, critical scholarly review or discourse with an acknowledgement, without

the written permission of Mzumbe University, on behalf of the author.

Copyright © 2012 Jacob Mogendi

iii

Acknowledgement

Completion of this work has been possible due to effort and assistance from a number of

persons. And therefore I wish to expressly acknowledge the assistance I got when

undertaking this research, the assistance without which my work would have been

relatively impossible. First of all I thank the Almighty God for keeping me alive and

healthy.

My warm thanks are due to my supervisor, distinguished member of Mzumbe University

–Faculty of Law and a member of Tanzania Bar –Mrs. Mwajuma Kadilu, Advocate, for

her guidance and excellent assistance in the research preparation and completion of this

work. Many stimulating discussion, constructive criticism and comments about this

study have contributed to the final shape and content of this work. However, I am solely

responsible for the contents or error in this work.

I am much obliged to Vice Commissioner for Labor- Ministry of Employment and

Labor Mr.Josephat Lugakingira for accepting my field attachment application despite

the delay of application, the great appreciation to resident labor commissioner - Temeke

Labor Office Rene Nkaya who assigned me to Miss Agnes Shio ,Advocate, Labour

Officer to work with me , I cannot deny the great role that she played to the availability

of the data that I got, she showed me practical means to get data and exposed me to

important people for data that were needed.

I am extremely grateful for Mr. Innocent L. Mgeta a distinguished member Faculty of

Law Mzumbe University for his advice and material assistance.

I am indebted to many friends, colleagues, teachers, librarians and others for their help

during my study. Their kindness and support are too numerous to list here. I feel obliged

to thank Airtel TZ the former Zain TZ, working with the company drew my

understanding a lot and added my practical experience at work which at last helped me

to secure this comprehensive research. I thank the company management and all my

colleagues in general. Finally I owe the greatest debt to my family members especially

Felister Nyanchini, Pius Nyanchini and Flora Mogendi to mention few.

iv

Dedication

Dedicated to my beloved mother Felister N Jacob and those who afforded me the rare

opportunity to consider to contemplate and to chronicle my view of this area of law.

v

List of Abbreviations

ADV- Advocate.

AIDS - Acquired Immuno Deficiency Syndrome

ATE - Association of Tanzania Employers

BP - British Petroleum

CRDB - Commercial Rural Development Bank

HIV- Hummane Immuno Virus

ICC - International Criminal Court

ICCPR- International Covenant on Civil and Political Rights

ICT Information Communication Technology

ILO- International Labour Organization

IT- Information Technology

NGO‘s - Non Government Organization‘s

OECD- Organization for Economic Cooperation and Development

TRIP—Trade Related Aspects of Intellectual Property Rights

U.K - United Kingdom

U.S.A – United States of America

UDHR- Universal Declaration of Human Rights

URT - United Republic of Tanzania

WHO-World Health Organization

vi

ABSTRACT

The problem of confidentiality clauses enforcement is critical nowadays. The problem

has been intensified by the computer technology and use.It is difficult to notice how our

dependencies are moving from the real world to the digitally networked world. Despite

number of enactments still there are legal challenges Facing Employers and Employees

in enforcing Confidentiality Clauses one of which being Identification of defendant.

The Objectives of this research were to know; the methods used by the employees or

employers associated in leaking the confidentiality clauses ,the means used by

employers and employees to avoid the breach of confidentiality clauses ,the means used

by employers and employees to keep confidential information, the legal challenges

facing employees and employers on the breach of confidentiality clauses, The legal

challenges brought by computer use at work place on the aspect of confidentiality

clauses also to investigate the causes for the breach of the confidentiality clauses and to

explore the reasonable penalties to be imposed.

This research was preceded by the following hypothesis;

That, the penalties imposed do not suffice /That, the law enforcers have little knowledge

on the aspect of confidentiality clauses /That, the breach of confidentiality clause is due

to unethical actions of the employers and employees/That, the increase use of computer

and internet, increases the breach of confidentiality clauses.

The research was planned to be purely doctrinal, however, during the course of research

the researcher found necessary to supplement findings by having information

Magistrates, Judges, Advocates, Human Rights Activist, Law teachers, Employers,

Trade unions officials, Information and communication Technology experts, employees

and International Organization Officials example International Labour Organization

(ILO)

In relation to library research, primary and secondary sources were obtained for the

purpose of this study. Various legislation both principal and subsidiary cases reported

were dealt with.

vii

The researcher used qualitative method to analyze data. This was useful to enable the

researcher to interpret data collected and finally make conclusion and recommendations.

Findings from the research inter alia shows that, penalties under different laws covering

confidentiality clauses are not sufficient also the knowledge of confidential information

sensitivity is not well fed to employees again the most of the methods of keeping data do

not comply with the current social change . This is due to the continuance of the problem

and means used to divulge confidential information like unauthorized interception on

computer.

It is concluded that, the use of computer properly is of vital advantage however the

opposite can be of great disadvantage to other party. The best computer programs should

be for the protection of confidential information.

Researcher inter alia recommends that, organization privacy policy be put in strict sense,

adoption of current methods like installing special programme in computer to record all

events on desktop in picture, surveillance cameras and to maintain friendly relations in

solving the disputes arising at work place.

viii

TABLE OF CONTENTS

Certification ....................................................................................................................... i

Declaration ....................................................................................................................... ii

Copyright ......................................................................................................................... ii

Acknowledgement .......................................................................................................... iii

Dedication ........................................................................................................................ iv

List of Abbreviations ....................................................................................................... v

ABSTRACT ..................................................................................................................... vi

List of Statutes ................................................................................................................. xi

List of International Instruments ................................................................................ xii

List of Cases .................................................................................................................. xiii

TABLE OF CONTENTS ............................................................................................. viii

CHAPTER ONE: ............................................................................................................. 1

1.1 GENERAL INTRODUTION ................................................................................ 1

1.2 Background of the Problem ...................................................................................... 2

1.3 Statement of the Problem ......................................................................................... 5

1.4 Hypotheses ............................................................................................................... 6

1.5.0 Objectives of the Research .................................................................................... 7

1.5.1 General Objective .................................................................................................. 7

1.5.2 Specific Objectives ................................................................................................ 7

1.6.0 Significance of the Research ................................................................................. 8

1.7 Literature Review ................................................................................................... 9

1.8.0 Research Methodology ...................................................................................... 16

1.8.1Area of Study .................................................................................................... 16

1.8.2 Unity of inquiry ............................................................................................... 17

1.8.3 Sample Population ........................................................................................... 17

ix

1.8.4 Sampling Techniques ....................................................................................... 17

1.8.5 Data Collection Methods ................................................................................. 17

1.8.6 Primary Data and Secondary Data ................................................................... 17

1.8.7 Data Presentation and Analysis ....................................................................... 18

CHAPTER TWO ........................................................................................................... 19

CONFIDENTIALITY CLAUSES UNDER DIFFERENT LAWS ............................ 19

2.0 Introduction ............................................................................................................ 19

2.1 Position of the Law on Disclosure of Confidential Information. ........................... 19

2.2 Personal Right to Privacy under International Instruments, the United Republic of

Tanzania Constitution and other Legislations. ............................................................. 24

2.3 Difficulties on How to Determine Confidentiality of Information. ....................... 28

2.4 Rights of Employers and Employees on Confidentiality. ...................................... 29

2.5 Computer and Privacy Protection ........................................................................... 30

2.6 Conclusion .............................................................................................................. 32

CHAPTER THREE ....................................................................................................... 33

RESEARCH FINDINGS ............................................................................................... 33

3.0 Introduction ............................................................................................................ 33

3.1 Methods used to keep Data and Leakage Ways ..................................................... 34

3.2 Legal Challenges Facing Employers and Employees on the Aspect ..................... 38

3.4 Computer use and the Enforceability of Confidential Clauses .............................. 41

3.4 Critical area on Confidentiality Clauses Enforcement in Tanzania ....................... 42

3.5 Conclusion .............................................................................................................. 43

CHAPTER IV: ............................................................................................................... 44

SUMMARY OF FINDINGS, CONCLUSION AND RECOMMENDATIONS ....... 44

4.0 Summary of Findings ............................................................................................. 44

4.1Conclusion ............................................................................................................... 45

x

4.2 Recommendations .................................................................................................. 46

REFERENCES ............................................................................................................... 49

xi

List of Statutes

Local Statutes

Arbitration Act [Cap 15 RE: 2002]

Bank of Tanzania Act, Act no 4 of 2004

Banking and Financial Institutions Act, Act no.5 of 2006.

Employment and Labour relations Act, Act no.6 of 2004

Labour institutions Act, Act no 7 of 2004

Penal Code [Cap 15 RE: 2002]

Information Technology Act, 2000

Other jurisdiction’s Statutes

India Legislation

Information Technology Act, 2000

xii

International Instruments

Charter of Fundamental Rights of the European Union (2000)

Declaration of Human Rights (UDHR 1948)

European Convention on Human Rights (1950)

International Covenant on Civil and Political Rights (ICCPR 1966)

United Nations Convention on the Rights of the Child (1990)

United Nations Guidelines concerning Computerized Personal Data( 1990)

xiii

List of Cases

Coco v. A.N.Clark (Engineers) Ltd [1969] R.P.C. 41

Lancashire Fires Ltd v. SA Lyons &Sons [1996] FSR 629

Littlewoods Organization Ltd v. Harris [1978] 1 All ER 1026 (CA)

Morrison v. Moat (1851)9 Hare 241

Prince Albert v. Strange (1849) 47 ER 1302 (RR 479).

Reddy v. Siemens 2007 (2) SA 486 (SCA)

Saltman Engineering Co. Ltd. v. Campbell Engineering Co. Ltd [1963]3All ER 413

Trust Bank Tanzania Ltd v. Le Marsh Enterprises Ltd

1

CHAPTER ONE

1.1 GENERAL INTRODUTION

A confidentiality clause is a legally binding clause between employers and employees

which assigns severe penalties where certain information is revealed.1

A confidentiality clause is the most crucial provision in a non-disclosure agreement or

confidentiality agreement. It provides that the individual who enters into it with another

must not disclose certain pieces of information that he or she has been given access to

without the consent of the individual who has granted access to it. A breach of this

agreement may result in payment of damages or some other form of restitution2.

This work is all about checking the relationship which exists between the employers –

employee relations as duty of confidentiality is concerned; it will show the legal

challenges that face the parties in enforcing the confidentiality information.

This work is going to provide basic answers for many questions of whether the

weakness of law or non compliance of work ethics is or is the basic challenges that we

face in this aspect of confidentiality clauses enforcement. This study is going to be at

Dar es salaam City, where we believe that many employers and employees are centered,

the researcher visited different companies and organization to seek for clear information

on the subject, and researcher will use methods like questionnaire, interview and

observation.

The work will be as follows the first chapter as proposal, and then will be followed by

chapter two which will entail the legal perspective on the confidentiality clauses then

next chapter will be about the field observation and lastly recommendations.

1 Data Theft in Cyber Space Issues and Laws accessed on http:// www.wisegeek.com/what-is-a-confidentiality-

clause.htm at 20:00 hrs 4th January, 2012 2 Ibid

2

Therefore with expansion of modern technology it has been a critical problem where by

the computer use has been in some way changed to be an easy means to leak some

important information.

1.2 Background of the Problem

The problem of breach of confidentiality clauses is so common in working places such

as governmental institutions, Non Government Organization‘s and various Companies;

this is even more sparkled in this era of computer technology and internet usage.

Basically ,the employer owe a duty to keep the information of the employee being

health, education or family matters like wills and the amount of salary, This being the

case ,the employee as well has a legal duty to insure the office confidential information

does not get out. In this regard we experience a lot of complaints from employers and

employees regarding the issues concerning their personal or business confidence in

public; it is obvious that someone somewhere has breached a duty to owe the privacy of

another.

The law relating to breach of confidence has an erratic history. From earlier beginnings

it largely developed in England and spurt in the early to middle of the 19th

century, and

then lay relatively dormant until the late 1940‘s when it was realized that this was an

extremely useful area of law.

One of the most venerated and tenets of political philosophy since the time of the Greek

has been the dichotomy between private and public realms. From the age of Socrates and

Aristotle to the present day discussions of human nature and appropriate role of

government and individual have utilized the notion of boundary that marks what is

private and what is public3.

Almost the first page of the bible introduces us to the feeling of shame as a violation of

privacy, after Adam and Eve had eaten the fruit of the tree of knowledge the eyes of both

3 Richard C.T. and Anita L.A.(2002)Privacy Law, 2nd Edition, West Group .p 3

3

were opened and they knew that they were naked, and they sewed fig leaves together

and made themselves aprons.

Thus mythically, we have been taught that our very knowledge of good and evil –our

moral nature as men –in somehow, by divine ordinance linked with a sense and realm of

privacy4.

Some of the early cases involved patent medicines .It was obvious that a lot of money to

be made from these magic cures, bearing in mind that conventional medicine was still

fairy primitive at this time and the public at large was relatively ignorant and

uneducated.5 The term breach of confidence was not used at the stage and the breach of

faith was actionable per se and was not dependent upon the existence of a contract as in

case law, in the case of Morrison v. Moat 6 where the plaintiff had a medicine named

‗Morrison Vegetable Universal Medicine‟ where by the partner Moat had improperly

told his son of the recipe as against the agreement of privacy between them due to

dispute within the partners Moat and Morison this was seen as a breach of faith and of

contract by partner

The modern English law of confidence stems from the judgment of the Lord Chancellor,

Lord Cottenham in which he restrained the defendant from publishing a catalogue of

private teachings made by Queen Victoria and Prince Albert (Prince Albert v Strange)7

However, the jurisprudential basis of confidentiality remained largely unexamined until

the case of Saltman Engineering Co. Ltd. v Campbell Engineering Co. Ltd 8.in

which the Court of Appeal upheld the existence of an equitable doctrine of confidence,

independent of contract.

4 Milton .R.K (1966) Privacy and Law: A Philosophical Prelude, p 272. 5 Bainbridge,D. (2002)Intellectual property,5th Ed, Pearson Education Management.p274

6 (1851)9 Hare 241 7 (1849) 47 ER 1302 (RR 479). 8 [1963]3All ER 413

4

In Coco v A.N.Clark (Engineers) Ltd 9 Megarry, J .Developed an influential tri-partite

analysis of the essential ingredients of the cause of action for breach of confidence: the

information must be confidential in quality, it must be imparted so as to import an

obligation of confidence, and there must be an unauthorized use of that information to

the detriment of the party communicating it.

Globally computer development, unfortunately, and abuse of computers, or abuse of

data and information that are processed modern information technologies. The mass use

of computers in different circumstances, with the increasing use of telecommunication

equipment by increasing the number of users, enables a growing number of thieves, and

unauthorized persons (hacker) to break through the protective codes of authorized users

and their joining the system creates a lot of damage and cause unforeseeable

consequences, developed methods of protection, which prevent unauthorized use of

insurance on the basis of confidentiality. The paper will show the modern information

technologies to protect data and information with special emphasis on their legal

protection. Use of modern information technology enables the collection and processing

large amounts of data from various different areas of human activity10

In Tanzania the situation is not better the breach of confidentiality information do exist

either directly or technically by use of electronic means or either way foristance, The

Guardian, Tuesday 14, 2011 in its page for International Business News /Analysis

posted vacancies for Job in Oxfam where by the employer allowed the salary of a

particular post to be published, the same information posted in the website

www.oxfam.org.uk/jobs , something which at prima facie will create a breach of

confidence to an employee when gets the vacancy, but again it can also influence people

to know the status of the said member staff in income level.

9 [1969] R.P.C. 41, 10 Lawyer‘s club India Article, Data Theft in Cyber Space Issues and Laws accessed at

http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5606114 on 25th Sept, 2011.

5

There some provisions in our laws which talk of confidentiality though still there are

extreme reports on breach of confidentiality clauses which is quite an interesting

question as to whether the weakness of the law ,poverty or the lack of job ethics that

make this subject continue. Good example of the provisions which stipulate this concept

are s101 11

which provide for an offence for disclosure of information of another relating

to business or financial affairs of another person and s.59 12

is actually of the same

wording, something to notice here is that the law creates an offence without giving out a

strong penalty this is an open loop holes which are present into our laws.

That it has been noticed recently that due to this cyber era, the computer theft has eased,

especially in the companies and in government institutions also the confidential

information are leaked as well, so to say the technology has brought challenges to

employers which through this study the researcher is going to pinpoint them critically

especially in Dar es salaam city where many companies, employers and employees are

situated in Tanzania.

1.3 Statement of the Problem

The problem of confidentiality clauses enforcement is critical nowadays. The problem

has been intensified by the computer technology and use.

It is difficult to notice how our dependencies are moving from the real world to the

digitally networked world. The next step in this evolution is the way that we are moving

from a society where work is tied to geography to one where geography has no meaning

in the sense that interception of confidential information can be made by a person

through access of a computer say in Canada while the confidential information breached

11 Employment and Labor relations Act, Act no.6 of 2004

12 Labour institutions Act, Act no. 7 of 2004

6

is in Tanzania. It‘s an evolution similar to how mobile phone networks transformed

telephone.13

In Tanzania different laws has tried to provide for confidentiality clauses these include14

,

Arbitration Act15

, Penal Code16

, Bank of Tanzania Act17

, Banking and Financial

Institutions Act18

, Employment and Labour relations Act 19

and Labour Institutions Act20

,

still the gap in law is seen as no single law amongst these which talk of the reasonable

penalty for the breach of the offence established.

In this study the researcher critically analyzed the laws which support confidentiality

and analyze challenges of the laws, challenges facing employers brought by the

computer technology and computer use respectively and the study came to give out the

steps taken to the challenges facing employers in enforcing the confidentiality clauses.

Therefore this research covered three aspects namely, weaknesses of the law governing

confidentiality clauses in Tanzania, the legal challenges facing employers and

employees due to the computer technology in enforcing the confidential clauses and

lastly the method used by employers to encumber the challenges in enforcing

confidentiality clauses.

1.4 Hypotheses

This research was preceded by the following hypothesis;

That, the penalties imposed do not suffice/

13

Lawyer‘s club India Article, Data Theft in Cyber Space Issues and Laws accessed at http://www.lawyersclubindia.com/articles/print_this_page.asp?article_id=383 at 20:00hrs October 2011. 14

Labor relations Act [Cap 15 RE: 2002] 15

Arbitration Act [Cap 15 RE: 2002] 16

Penal Code[Cap 15 RE: 2002] 17

Act no 4 of 2004 18

Act no.5 of 2006 19

Act no.6 of 2004 20

Act no 7 of 2004

7

That, the law enforcers have little knowledge on the aspect of confidentiality clauses/

That, the breach of confidentiality clause is due to unethical actions of the employers

and employees/

That, the increase use of computer and internet, increases the breach of confidentiality

clauses/

1.5.0 Objectives of the Research

From the above hypotheses the following objectives have been advanced and

categorized into general and specific objectives;

1.5.1 General Objective

The General objective is whether the laws enacted in Tanzania to protect confidentiality

clauses are sufficient and effective.

1.5.2 Specific Objectives

Specifically, the research found out the following;

i. The methods used by the employees or employers associated in leaking the

confidentiality clauses.

ii. The means used by employers and employees to avoid the breach of

confidentiality clauses.

iii. The means used by employers and employees to keep confidential information.

iv. The legal challenges facing employees and employers on the breach of

confidentiality clauses.

v. The legal challenges brought by computer use at work place on the aspect of

confidentiality clauses.

vi. To investigate the causes for the breach of the confidentiality clauses.

8

vii. To explore the reasonable penalties to be imposed.

1.6.0 Significance of the Research

Like all medical information, the results of genetic tests can potentially reveal personal

information such as current health status or susceptibility to an illness.

To show that protecting the confidentiality information is necessary to ensure that third

parties (employees, individuals, employers) cannot access personal information without

the consent of the individual to whom the information relates.

To help every organization know that has a need to keep certain information

confidential. HR typically is entrusted with maintaining sensitive employee data and

information relating to employee and management issues, and such information should

be confined to those with a need to know.

To educate employees on the importance to keep or maintain confidentiality during and

after employment tenure.

To show the gaps which are left in our laws for sake of enforcing confidentiality clauses.

Helps the employers and employees to know the means which are currently used by the

other organizations to prevent the breach of confidentiality clauses.

9

1.7 Literature Review

The literature on this study is very limited. Despite the wide range of journals, articles,

and textbooks relating to secrecy and confidentiality, particularly the ways the

confidential information are to be interpreted and kept, only a handful of them are useful

for purposes of this research. The existing literature is general, outdated, and

insufficient. Apart from statutes governing confidentiality clauses in Tanzania there is

no textbooks which could be relied upon by the author of this report, instead, foreign

literatures were resorted to which again are not pertinent sometimes in construing the

current position of law of Tanzania on enforcement of confidential clauses.

An employee owes a duty of confidence to his employer and this duty may be expressly

stated in the contract of employment, and in any case will be implied by law. It can be

said that an employee always has a duty of care to act in his employers best interest

together with a of good faith, and this will obviously include a duty not to divulge

confidential information about his employers best interests together with a duty of

good faith, and this will obviously include a duty not to divulge confidential information

about his employers business to others without the consent of the employer21

.

The law of breach of confidence began about 50 years ago .It become apparent that this

area of law was extremely well suited to protecting confidential information during the

development stages before other legal rights were able to afford protection.22

Where the information would be likely to be regarded by employees as confidential

information it is not essential that the employer specifically points out this in

Lancashire Fires Ltd v SA Lyons &Sons23

Lord Bingham MR commented that we do

not accept that it is incumbent on an employer to point out to his employee the precise

limits of that which he seeks to protect as confidential, particularly where as here, what

is new is an integral party of a process.

21 Bainbridge,D. (2002)Intellectual property,5th Ed, Pearson Education Management.p291 22 Bainbridge,D. (2002)Intellectual property,5th Ed, Pearson Education Management.p275 23[ 1996]FSR 629

10

Underlying many critiques of privacy is the peculiarly modern anxiety that the

empowerment of privacy is just one more wheel bolted onto the juggernaut of

individualism.

It is said that our age is the era of loss community, notable by the pre occupation of the

contemporary thought with personal alienation and cultural disintegration24

.

Attaching the pursuit of privacy rights to the modern canonization of individualism,

critics reason that privacy, beneath its benevolent exterior, is a threat to building and

maintaining community ,they argue that it embodies an anachronism, a vision of discrete

and autonomous person in an era that must judge such a view as life threatening.

They aver further that any sort of right to privacy that anchors such an attitude in legal

rules and principles ends up sanctioning social and political irresponsibility.

It undermines participation in the res publica, corrodes the sense of communal

responsibility and undermines social negligence at a time when the keyword is not

privacy but responsibility25

The problem of data theft which has emerged as one of the major cyber crimes

worldwide has attracted little attention of law makers in India , unlike U.K which has

The Data Protection Act, 1984 there is no specific legislation in India to tackle this

problem, though India boasts of its Information Technology Act, 2000 to address the

ever growing menace of cyber crimes, including data theft. The truth is that Indian IT

Act, 2000 is not well equipped to tackle such crimes as an example in protection against

breach of confidentiality and privacy of the data it provides that, any person upon whom

powers have been conferred under IT Act and allied rules to secure access to any

electronic record, book, register, correspondence, information document of other

24

Richard C.T. and Anita L.A.(2002)Privacy Law, 2nd Edition, West Group .p 19 25

Ibid.

11

material discloses it to any other person, shall be punished with imprisonment which

may extend to two years or with fine which may extend to one lakh rupees or both26

.

In Tanzania there some confidentiality clauses which are attached in the job contracts

which give the obligation to employees to keep secret of the matters pertaining the

company until he is allowed to do so, this can be exemplified in the Airtel employment

contract whose confidentiality clause reads the employee shall not, either during the

continuance of his or her employment hereunder or within 3 years thereafter ,except in

the proper course of his /her duties or in the event of prior written consent of the

company, divulge to any person whosoever ,any information concerning the business or

finances of the company or any of its dealings ,transactions or affairs which come to his

/her knowledge during or in the course of his/her employment and affairs which come to

his/her knowledge during or in the course of his or her employment and he /she shall not

communicate with any person or authority in connection with any matters concerning

the company without such consent as aforesaid specified.

The laws which entails about the confidentiality clauses in Tanzania, as clearly seen in

the background of the problem the laws set out the loop hole by not mentioning a

reasonable penalty for one who breach the law on that aspect, this is amongst major

challenge that faces the enforcement of confidentiality clauses, this research is going to

come up with suggestions on how to cover up this aspect well in our laws.

The question of data theft which is under the confidentiality clause has been settled

down a bit by some laws in different jurisdictions as a matter of example in India as

discussed.

Data is a valuable asset in this modern era of Information Technology (IT). Data is an

important raw-material for Call Centers and I.T. Companies. Confidential information

26

Information Technology Act, 2000 ,S.72

12

has also become an important tool and weapon for Corporate to capture larger market

shares. Due to the importance of Data in this new era, its security has become a major

issue with the I.T. industry. The piracy of data is a threat, faced by the I.T. players, who

spend millions to compile or buy data from the market. Their profits depend upon the

security of the confidential information27

The major issue regarding confidential information is its International character, for

example Systems may be accessed in USA, the data manipulated in China and the

consequences felt in India. The result of this ability is that different sovereignties,

jurisdictions, laws and rules will come into play which again is an issue in itself. Further,

collection of evidence in such circumstances become another issue as investigation in

three different countries, all of whom may not be in talking terms, is almost impossible

and poor technical know-how of our cops adds to the woes. Also, the lack of

coordination between different investigating agencies and a not-so-sure extradition

process is another head ache. However the biggest of all these issues is the lack of

specific laws in the country dealing with this crime, so even if the culprit is caught he

can easily get away by picking and choosing any of the of various loopholes in our

law.28

Concerns about workplace privacy are becoming more widespread as electronic

monitoring becomes more prevalent. It is easy to purchase and install a video camera,

and there's wide agreement that it is appropriate to install security cameras in stairwells

and parking garages. However, most would argue that it is not appropriate to install

cameras in areas such as bathrooms, dressing rooms and locker rooms. Many employers

argue that there are compelling business reasons to use video cameras to monitor their

employees, such as to help deter theft and other inappropriate behavior. Courts generally

perceive an employer's videotaping of open and public work areas as a logical and

27

Lawyer‘s club India Article, Data Theft in Cyber Space Issues and Laws accessed at

http://www.lawyersclubindia.com/articles/print_this_page.asp?article_id=383 28 ibid

13

lawful extension of activities that could be seen by a supervisor. But if an employer

targets a camera on one workstation, for example, a court may find the use of such

selective surveillance to be overly intrusive29

.

Many states have provisions that limit or prohibit video surveillance. And employers of

union workers may be required to bargain with the union to implement video

surveillance.

In addition, unnecessary monitoring can create poor employee morale. Furthermore,

employers that target certain employees or groups of employees for monitoring may

expose themselves to discrimination claims.

As David R Johnson and David post have pointed out ,‖events on internet occur

everywhere but nowhere in particular .communication are engaged in by on –line

personae who are human and real but ,who are not at the same time „unreal‟ in that they

might not be traceable to any particular person. No physical jurisdiction has a more

compelling claim than any other to subject these communications and events exclusively

to its laws” therefore is an obvious problem to trace the particular person who have

leaked the confidential information thus why some jurisdiction has tried to prevent it just

by putting some restraints in their employees contracts.

In avoidance of the side effects where by the ex employees breach confidential clauses

the employers can safeguard their confidential information by making the following as

Australia employers has put them in practice;

1. Ensure that employees are subject to contractual restraints extending beyond the

term of their employment agreement which spell out in as much detail as possible

the nature of the information which the employer considers to be confidential.

29 Naomi Cossack, Margaret R. Fiester, John Sweeney, (2006) Prompted resignation, surveillance, confidentiality

accessed at http://findarticles.com/p/articles/mi_m3495/is_10_51/ai_n27011518/ on 01st Jan, 2012, 20:00hrs

14

2. Ensure that employers impose positive obligations on employees to deliver up or

destroy all documents in their employees' possession and otherwise permanently

delete all records (including electronic records) which contain the employer's

confidential information upon termination of an employee's employment.

3. Consider imposing a post-employment restraint on employees to prevent them

from developing a business in competition with their former employer for a

specified period of time30

.

However the following remark of Lord Denning 31

was recently quoted with approval

by the Supreme Court of Appeal in Reddy v Siemens32

.it is thus established that an

employer can stipulate for protection against having his confidential information passed

on to a rival in trade. But experience has shown that it is not satisfactory to have simply

a covenant against disclosing confidential information. The reason is because it is so

difficult to draw the line

Between information which is confidential and information which is not; and it is very

difficult to prove a breach when the information is of such a character that a servant can

carry it away in his head. The difficulties are such that the only practical solution is to

take a covenant from the servant by which he is not to go to work for a rival in trade.

Such a covenant may well be held to be reasonable if limited to a short period33

.

From Lord Denning line of view is that not every information kept is confidential

information, information to be confidential needs to be identified as confidential and

observed as confidential by all the parties, there is no use of an employer to say the

information is confidential while he pass the same to third parties as per Lord Denning it

30 Davies Collison Cave Darron Saltzman and Timothy Creek (May 10 2011) Damages awarded for misuse of

confidential information by former employees to create competing product , accessed at

http://www.lexology.com/library/detail.aspx?g=05034234-c785-4165-97fb-42103db88571 on 20 sept,2011 at 6.00

am 31 Glyn Marais (2009),Crime Prevention Asset Forfeiture and Collateral Damage to Creditors 1st Edition 32 2007 (2) SA 486 (SCA) 33 From The Littlewoods Organization Ltd v Harris [1978] 1 All ER 1026 (CA) 1033c-d

15

is wealth for one to have a restraint of trade not to be employed by rival trader who need

use the information rather than restraint not to pass confidential information ,because

some information can easily be taken by his head no need of document hence difficult to

prove breach.

There as well several ways in which the data can be trapped away from the computer in

this cyber era most of the confidential information are kept in the folders in a computer

and even in emails over internet so when website is accessed cookies record and track

and store to the users computer and browser ,if a user returns to the website ,in this way

the cookie can tell the website that this is the same computer that was here some time

ago, thus tracking the movement of users of particular computers.

Cookies can be set in the metatag of a web page as well as being set and read using Java

script (a computer language), generally speaking cookies contain code or other data that

uniquely identifies a users computer ;this enables the site to track and profile the users

activities on that site as well as other sites. The cookies may itself not contain personally

identifying information but the website may know the identity of a user whose browser

sends the cookies for instance a website that collect the users names or email addresses

from an on line enquiries, registration or sales is readily able to connect personally

identifying information to a cookie sent by users browser and to the other information

obtained about the user34

.

But a gain it has been evidenced that the information can leak through html-enabled

email programmes example Microsoft outlook in this instance the sender of an email

message can include personally identifying information about the recipient hidden in the

code of e-mail .when the reader reads the message or access a page mentioned in the

34 Lim,Y.F (2007) Cyberspace Law Commentaries and Materials, 2nd Ed, oxford university press, London

16

email a cookie is set and the site then receives details of the person associated with the

cookie.

Generally the literature shows that still the problem of confidentiality clauses

enforceability is a critical challenge in this cyber era. The literature are obviously

concentrated on the employers side where most of literatures entails the breach of

confidentiality clauses by an employee but forgetting about the breach by the employers,

this research is going to deal with all these parties equally in a sense that the breach by

employers to employee will be analyzed and breach by employee to employer will be

checked to know well the methods applied and come up with good data and ways to

reduce if not to eliminate the problem.

1.8.0 Research Methodology

This research was carried out in specific areas which are directly involved to the

problem in question; also the researcher employed different types of data collection as

here under explained.

1.8.1Area of Study

This research was done in Dar es Salaam city by visiting different government offices,

Non Governmental Organizations (NGO‘S), companies and international organizations

for data, it was centered in Dar es Salaam due to the fact that, it is believed to be a place

which has a lot of companies and offices as well as many employees and employers

hence it was a wealth place for this research.

17

1.8.2 Unity of inquiry

For the purpose of this research 25 respondents were questioned, the number can be

seen as small but the people who were asked are so resourceful in this topic ,hence there

were no need to take many respondents ,on top of that observation method was used to

ascertain the information.

1.8.3 Sample Population

The sample populations were the Magistrates, Judges, Advocates, Human Rights

Activist, Law teachers, Employers, Trade unions officials, Information and

communication Technology experts, employees and International Organization Officials

example International Labour Organization (ILO)

1.8.4 Sampling Techniques

The sampling technique was specific, because the researcher needed to have specific

details for people who directly have knowledge on the aspect and are wealth in aspect of

confidentiality clauses as opposed to random sampling.

1.8.5 Data Collection Methods

To make this research effective the researcher employed both primary data collection

method and secondary data collection method which enhanced the desired results.

1.8.6 Primary Data and Secondary Data

Primary methods involved interviews, questionnaires and observation, the aim of using

questionnaire was to help the researcher to deal with the problem of access to the

respondents. The purpose of using interview was to help the researcher to get clear

information from the individuals since it is face to face interaction, observation method

18

was of essence because the researcher could have a direct picture of the problem hence

get data to write. On the other hand secondary data were through literature review,

media material and internet sources, the researcher visited and construed published

resource materials which cover confidentiality clauses in Tanzania and other

jurisdictions to get all the materials the research bought some books; visited library and

internet so as to enable him to get reliable information.

1.8.7 Data Presentation and Analysis

The researcher used qualitative method to analyze data. Qualitative analysis refers to

non-empirical analysis. According to Miles and Huberman35

qualitative analysis consists

of three concurrent flows activity: data reduction, data display and conclusion drawing

and verification. Data reduction refers to the process of selecting, focusing simplifying,

abstracting, and transforming the data that appear in transcription, in this research,

writing summaries and teasing themes were employed to reduce data. The second

activity is data display. A display is an organized, compressed, assembly of information

that permits conclusion drawing; this was done using charts that were drawn to

categorize data. This was useful to enable the researcher complete the third stream of

data analysis, which is conclusion drawing and verification.

35

M.B Miles and A. M Huberman(1998) An Expanded Source Book-Qualitative Data Analysis p11

19

CHAPTER TWO

CONFIDENTIALITY CLAUSES UNDER DIFFERENT LAWS

2.0 Introduction

This chapter tries to exhaust different laws covering the aspect of confidentiality issues

both Internationally and domestically by referring to different sources moreover the

chapter explores the aspect of computer technology in relation to privacy, Generally the

researcher has put these details under the following subtitles ; Position of the Law on

Disclosure of Confidential Information, Personal Right to Privacy by Some Laws,

Difficulties on How to Determine Confidentiality of Information, Rights of Employers

and Employees on Confidentiality, Computer and Privacy Protection and lastly chapter

conclusion.

Employers and employees face different legal challenges in enforcing confidentiality

clauses as part of this chapter, the challenges are expressed by measure of right and

duties over privacy issues as addressed under different laws.

2.1 Position of the Law on Disclosure of Confidential Information.

The disclosure of information to employees/workers or third parties in Tanzania has

always been a matter which depended largely on the relationship between the employer

and the employees as well as the employer‘s goodwill towards the employees.

Information disclosure in Tanzania is examined in this research. It is demonstrated that

the situation regarding the disclosure of information to employees and employers has

changed substantially since the commencement of the Employment and Labour

Relations Act36

no.6 of 2004 and Labour Institutions Act37

no. 7 of 2004. The research

also reports the views of management and of worker representatives of a number of

surveyed organizations regarding the disclosure of information. Some inferences are

36 Act no.6 of 2004 37Act no. 7 of 2004

20

drawn from the findings of the research, the organizations and people visited are

Magistrates, Judges ,Advocates, Human Rights Activist, Law teachers, Employers,

Trade unions officials, Information and communication Technology experts, employees,

International Organization‘s Officials for example International Labour Organization

(ILO) and Association of Tanzania Employers‘ (ATE).

It is sad to concede that in Tanzania there is no comprehensive privacy legislation.

While ICT has stormed Tanzania and the citizens are deploying ICT in everyday life the

framework for privacy protection in these emerging technologies is not known. Of

course this does not mean that right to privacy is not recognized in Tanzania Of course

this does not mean that right to privacy is not recognized in Tanzania. The United

Republic of Tanzania (URT) Constitution 38

defines privacy as follows:

„…Every person is entitled to respect and protection of his person, the privacy of his

own person, his family and of his matrimonial life, and respect and protection of his

residence and private communications…

Article 16(1) and (2) of United Republic of Tanzania Constitution of 197739

provides for

right to privacy. Article 16(2) of URT constitution provides for possibility of other laws

to encroach the right to privacy. The said article stipulates clearly that the law maker

will enact law to stipulate how privacy right may be protected, pursued or encroached by

government agents. Unfortunately this requirement has not been put into

implementation. Ironically in Tanzania there are more laws restricting privacy than laws

protecting privacy.40

38

(Cap 2 R:E 2002]S.16 (2) 39 Ibid

40 Ubena J (June 8, 2010) Law as the Lifeblood of Human Being: Tanzania Lag on Privacy Law at

http://tanlex.wordpress.com/2010/06/08/tanzania-lag-on-privacy-law/

21

Employment and Labour Relations Act41

clearly establish breach of confidentiality

clause as an offence under s.101 (1)42

.However under subsection 2 of the same section

it provides some exceptions which are if information disclosed are in compliance of this

Act, which are; 43

The Act went further to establish a penalty under subsection 4 of

s.10244

further to that the Labour Institutions Act, no.7 of 2004 under s. 59 (1) and (2)

tell the same as in Act no.6 of 2004.

These two Acts has put a clear path to justice as it puts liability to any party may be

employer or employee as the case may be. However it is a challenge still that the penalty

mentioned in some case might not be enough as for instance a person divulge

information in exchange of say 5 million Shillings while the penalty is not to exceed one

Million shillings in this regard it may be easy for a person to breach on a good cash.

The Tanzania Communication Regulatory Authority (TCRA) under s.2445

has a duty to

maintain confidentiality on the information obtained due its duty performance and also it

has placed confidentiality requirements on service providers /operators for all

information they get from the customers.

The Bank of Tanzania Act46

under section 16 clearly stipulates the duty of confidential

information47

.This Act also stipulates the obligation to both employer and employee

duty to confidentiality clause.

41 Act no.6 of 2004 42 It is an offence for any person to disclose any information relating to the financial or business affairs of another

person if that information was acquired in the performance of any function or the exercise of any power under this

Act.

43 (a) to enable person perform or exercise a power under this act (b) in accordance with any written law (c) for

proper administration of this Act (d) for purposes of administration of justice.

44

Any person convicted of an offence under s. 101 shall be sentenced to a fine not exceeding one million

shillings. 45

Tanzania Communication Regulatory Authority Act ,Act no. 2003 46 Act no.4 of 2006

22

Banking and Financial Institutions Act48

stipulates that ―Every Bank or financial

institution shall observe, except as otherwise required by the law the practices and

usages customary among bankers, and in particular, shall not divulge any information

relating to its customers or their affairs except in circumstances which, in accordance

with the law or practices and usages it is necessary or appropriate for the bank to

divulge such information”49

.

On top of that the Act went further and stating that ―Every director and every member of

a committee, auditor, advisor, manager, officer and employee of the bank or financial

institution shall, before assuming his duties make a written declaration of fidelity and

secrecy which shall be witnessed by the chief Executive officer or the Secretary of the

bank or financial Institution concerned”50

.

However this Act appears self satisfactory whereby it even impose a strong penalty on

the defaulting party as it stipulates that ―Any person who contravenes the provisions of

this section commits an offence and shall be liable on conviction to a fine not exceeding

twenty million shillings or to imprisonment for a term not exceeding three years or to

both“51

.

The laws regarding Banking are in most cases strict as compared to general law

governing employment, something which makes the problem go higher to non banking

organizations.

I know not so many Tanzanians are aware of how Communication Service providers are

using consumers‘ personal information. They are using such information for marketing

47 Unless for the purposes of performance of his functions, when so required by the law or authorized by the board ,no

member of the board or staff of the Bank shall disclose any information relating to the Bank or to any transaction or

customer of the bank acquired in the course of employment or discharge of his duties. 48 Act no 5 of 2006. 49 Ibid s.48(1) 50

Op cit s.48(2) 51

Op cit s.48(6)

23

purposes. They also use such information to evaluate their businesses. Hence

monitoring and surveillance in Tanzania is rampant particularly online surveillance.

As that is not enough one will be surprised as the surveillance is not done by website

owners or communication service providers only but even employers are reading

employees e mails, this for sure is surveillance. Thus employees‘ privacy is not secured

in Tanzania.

It is important to this of privacy in broad perspectives. We should not limit ourselves to

privacy infringement in traditional sense like where the policy come to a person‘s home

and search the premises or where a person is stopped by police and searched. You here a

person saying you are interfering with my personal integrity.

We need to retain such integrity even online. But that has been made difficult by our lag

in enacting Privacy legislation in Tanzania. We have to blame ourselves for such lag.It is

worth of note that so long we visit websites so long we use ICT facilities, so long we use

our credit cards, our Internet banking, we shop in the supermarkets then we are not

going to be left alone.

We will be able to balance national security and other interests with privacy only if we

enact privacy legislation. In this way our privacy online will be guaranteed52

52 Ubena J (June 8, 2010) Law as the Lifeblood of Human Being: Tanzania Lag on Privacy Law at

http://tanlex.wordpress.com/2010/06/08/tanzania-lag-on-privacy-law/

24

2.2 Personal Right to Privacy under International Instruments, the United

Republic of Tanzania Constitution and other Legislations.

The right to privacy is internationally guaranteed as many international instruments

mention this right, the following are instruments that ascertain the privacy; under the

Universal Declaration of Human Rights (UDHR 1948) provision which provide for

privacy stipulates ―that No one shall be subjected to arbitrary interference with his

privacy, family, home or correspondence, nor to attacks upon his honour and

reputation. Everyone has the right to the protection of the law against such interference

or attacks53

.

The United Nations Convention on the Rights of the Child, This was adopted on 20

November 1989, and entered into force on 2 September 1990. It includes the following

provisions on privacy;

1. No child shall be subjected to arbitrary or unlawful interference with his or her

privacy, family, home or correspondence, nor to unlawful attacks on his or her

honour and reputation.

2. The child has the right to the protection of the law against such interference or

attacks.54

53 UDHR 1948, Article 12 accessed at http// www.un.org/en/documents/udhr/index.shtml on 21st May 2012.

54 The United Nations Convention on the Rights of the Child. Article16 accessed at

http://www.unhchr.ch/html/menu3/b/k2crc.htm on 11 May 2012 , 20:00hrs

25

The International Covenant on Civil and Political Rights (ICCPR 1966)55

.It includes the following provisions on privacy or confidentiality under Article 17;

1. No one shall be subjected to arbitrary or unlawful interference with his privacy,

family, home or correspondence, nor to unlawful attacks on his honour or

reputation.

2. Everyone has the right to protection of the law against such interference or

attacks'.

Furthermore, The European Convention on Human Rights (1950)56

which inter alia

under Article 8 speaks of Right to respect for private and family life thus;

Everyone has the right to respect for his private and family life, his home and his

correspondence. There shall be no interference by a public authority with the exercise of

this right except such as is in accordance with the law and is necessary in a democratic

society in the interests of national security, public safety or the economic well-being of

the country, for the prevention of disorder or crime, for the protection of health or

morals, or for the protection of the rights and freedoms of others.

Again The Charter of Fundamental Rights of the European Union (2000)57

under Article 7 stipulates on Respect for private and family life ,whereas it stipulates

that ;

Everyone has the right to respect for his or her private and family life, home and

communications.

It goes further and Article 8 speaks of Protection of personal data

55 The document is at http://www.unhchr.ch/html/menu3/b/a_ccpr.htm Accessed on 19th May 2012 at 20:00hrs 56 The document is at http://conventions.coe.int/Treaty/en/Treaties/Html/005.htm 57 Greenleaf G.W. & Waters N. (Eds.) (1994-) 'Privacy Law & Policy Reporter', monthly, available from

http://www.austlii.edu.au/au/other/plpr/index.html accessed on 12th May 2012.

26

1. Everyone has the right to the protection of personal data concerning him or her.

2. Such data must be processed fairly for specified purposes and on the basis of the

consent of the person concerned or some other legitimate basis laid down by

law. Everyone has the right of access to data which has been collected

concerning him or her, and the right to have it rectified.

3. Compliance with these rules shall be subject to control by an independent

authority.

Also under The United Nations Guidelines concerning Computerized Personal Data

Files, This was adopted by the General Assembly on 14 December 199058

The OECD Guidelines59

Organization for Economic Cooperation and Development's

Guidelines on the Protection of Privacy and Transborder Flows of Personal Data

(OECD, Paris, 1981), this speaks of the data security which involve confidentiality

.However note that the OECD is all about economic development, not about social

issues or civil liberties.More over Guideline 5 of the International Guidelines on

HIV/AIDS and Human Rights calls on States to enact or strengthen laws that ensure

privacy and confidentiality and ethics in Research involving human rights subjects and

this invariably includes the duty to ensure that testing on humans and body tissues and

fluids is done in a humane and ethical manner60

.

The Joint ILO/WHO Guidelines on Health Services and HIV/AIDS summarily captures

the different facets of HIV testing that ―The acceptance of HIV testing depends on

58 Bygrave L. (1998) 'Data Protection Pursuant to the Right to Privacy in Human Rights Treaties' International

Journal of Law and Information Technology, 1998, 6, 247-284, at

http://folk.uio.no/lee/oldpage/articles/Human_rights.pdf

59 Better Policies for better Lives; OECD Guidelines on the Protection of Privacy and Transborder Flows of

Personal Data http://www.oecd.org/document/18/0,2340,en_2649_201185_1815186_1_1_1_1,00.html 60Richard Elliott( 2010) International Council of AIDS Council Organisation Guideline 5 of the International

Guidelines on HIV/AIDS and Human Rights Available at

http://www.icaso.org/publications/Advocates_Guide_EN.pdf accessed on 20th November 2011 at 20:00hrs

27

improved protection from stigma and discrimination as well as assured access to

integrated services for prevention, treatment and care. Confidentiality is very important

as far as encouraging people to undergo HIV testing61

.

It inspires faith and confidence in persons infected by the scourge and dilutes the fears of

stigma and discrimination. There must be legal and administrative mechanism

prohibiting the disclosure of information relating to the one‘s health status except upon

ones consent or legal authorization. Those medical practitioners and those responsible

for conducting tests or providing health services to victims must comply with ethics

requiring non disclosure of information. Heath sector employees and employer should

provide a maximum privacy for people‘s confidential information.

Domestically, the Constitution of United Republic of Tanzania62

which under A.16 (1)

inter alia states that Every person is entitled to respect and protection of his person, the

privacy of his own person, his family and of his matrimonial life .

The same said under the Constitution of Zanzibar of 1984 provides for the confidential

and voluntary aspect of HIV by guaranteeing the right of every individual to privacy and

Personal security albeit in general terms. Article 15(1) thereof states inter alia thus:63

The Occupational Safety and Health Act, 2005 Act No. 8 of 2005 also provides for

testing and confidentiality of testing by providing thereof for medical examinations by

employer for Purposes of establishing fitness to work.

All these legislations provide for confidentiality; however the problems still persist due

to unethical actions by the people but again due to absence or insufficient penalties

stipulated under the laws.

61 Holvast J., Madsen W. & Roth P. (2000-) 'The Global Encyclopaedia on Data Protection Regulation',

Looseleaf, Kluwer Law International. P 271 62 [Cap 2 R:E 2002] 63 Every person is entitled to respect and protection of his person, the privacy of his own person, his family and of his

matrimonial life ...

28

2.3 Difficulties on How to Determine Confidentiality of Information.

Confidentiality clauses as previously explained that are an implied clauses that are

between employer and employee, the issue arise of whether what is termed as

confidential is real confidential or not, an information to be confidential the following

should be in place Confidentiality clauses can assist in creating certainty by defining

what amounts to a business secret and bringing its existence to the mind of the

employee. Where it is clear that the employee does possess confidential information, the

courts have been robust in upholding restraints. It will not assist the employee to claim

that there are less restrictive ways to protect the information. It may not even help to

assert that the restraint, when read as a whole, is unreasonable as to extent.

The following remark of Lord Denning was recently quoted with approval by the

Supreme Court of Appeal in Reddy v Siemens64

.

“It is thus established that an employer can stipulate for protection against having his

confidential information passed on to a rival in trade. But experience has shown that it

is not satisfactory to have simply a covenant against disclosing confidential information.

The reason is because it is so difficult to draw the line between information which is

confidential and information which is not; and it is very difficult to prove a breach when

the information is of such a character that a servant can carry it away in his head. The

difficulties are such that the only practical solution is to take a covenant from the

servant by which he is not to go to work for a rival in trade. Such a covenant may well

be held to be reasonable if limited to a short period.” 65

In the same aspect Article 39 (2) of Trade-Related Aspects of Intellectual Property

Rights (TRIP) does require that the undisclosed information to be protected be secret. It

then gives a binding definition of the secrecy requirement:

64

2007 (2) SA 486 (SCA) 65

From The Littlewoods Organization Ltd v Harris [1978] 1 All ER 1026 (CA) 1033c-d

29

―Natural and legal persons shall have the possibility of preventing information lawfully

Within their control from being disclosed to, acquired by, or used by others without their

consent in manner contrary to honest commercial practices so long as such information

- is secret in the sense that it is not, as a body or in the precise configuration and

assembly of its components, generally known among or readily accessible to persons

within the circles that normally deal with the kind of information in question;

- has commercial value because it is secret; and

- has been subject to reasonable steps under the circumstances, by the person lawfully in

control of the information, to keep it secret".

2.4 Rights of Employers and Employees on Confidentiality.

The most delicate area for the worldwide harmonization of the law of confidential

information shall probably be the interpretation of honest commercial practices

regarding employees who depart from a company. The employee undoubtedly enjoys a

right freely to use his personal capacities, in-born or acquired skill, zeal, exactitude and

memory. Now in his memory, some confidential information of his former employer

will not fade away before he has been able to put them to use in the service of his new

employer, or for himself if he works independently. To which extent is the employee

prevented to have recourse to the confidential information he has been acquainted with

by virtue of his employment? Practical, if not very refined test would be to prohibit any

use of information that is taken away on documents or electronic supports. This test was

applied in a recent computer software case in the United States: in view of the striking

similarity between both programs, the trier of facts could not believe that the particulars

of the "old" program belonging to the former employer that were on a disquette in a

drawer three offices down the hall of the desk of the developer of the "new" program

had not been put to his disposal by the employee who had just changed his job.

Nonetheless, the employee should enjoy the opportunity to use documents if they

embody information that is generally known or easily accessible. Further, the employer

30

may legitimately obtain an injunction against the use of one secret formula, even if kept

in the mind of the departing employee. Hence, there is no ready-made standard to reach

a solution in every instance. The basic principle is, however, that employment is not a

"soul-destroying business"

An employee may compete with his former employer and do researches on his own or

on behalf of a new employer. The sensitivities of various countries in that area shall be

delicate to harmonize.

2.5 Computer and Privacy Protection

The revolution in communication and data processing that is occurring in the United

States and much of the world including Tanzania has created a realm of activity

popularly referred as ―cyberspace‖

The most conspicuous offshoot of the new information technology is the internet; the

internet is internationally linked system of computer networks in which the data flows

.The information super highway is a metaphor for the communication links of the

internet while ―cyberspace‖ is a metaphor for the medium whereby data processing and

communication between the computer networks occurs. Not only is there no central

entity that manages the linked computer network of the internet ,the nature of

cyberspace also means that ―data ―is not in any geographical location but in space –the

electronically linked computer networks66

.

Currently the most popular way to access the internet is through the World Wide Web

(the web) the web consist of millions of websites; each website is separate but inter

linked and each website may have hundred of web pages. With proper software internet

users may create own WebPages and post in digital form sound, images and text on the

webpage .Internet users may also view the images ,read the text and listen to the sound

of other websites .Web browser‘s are used to access information on the web.

66

Richard C.T. and Anita L.A.(2002)Privacy Law, 2nd Edition, West Group. P.398

31

The information super Highway ,cyberspace, and the internet are possible because of

digital technology .the use and importance of computer technology to the Tanzania and

the world has magnified the privacy issues that are raised by Arthur Miller and other

writers in the 1970.

The central feature of the revolution in communications and data processing from analog

to digital technology, Analog technology is based upon replication of form of

communications or image that is transmitted .The replicated phenomena is transmitted in

continuous uninterrupted form example in analog based telephone communications, the

sound wave produced by the voice is transmitted by an electronic signal with the same

frequency as the voice. The whole replicated conversation is transmitted by an electronic

signal with the same frequency as the voice. The whole replicated conversation is

transmitted with analog technology.

Digital technology takes samples of the actual sound wave or image or text and converts

the samples into arithmetic quantities that are expressed in binary digits or bits with

eight bits forming one ―byte‖ 67

Digital technology has dramatically increased the capacity to access data because

computer data based may be matched or linked and data instantaneously acquired .Once

information is Keyed into one computer it may be transmitted to another computer

without having to re-key the data.

Digital technology makes it possible to merge and mix data.68

The unprecedented capacity for loss of informational privacy is the result of special

features of digital technology in three phases of data processing, data acquisition, data

merging and data profiling.

67

Henry H.P, Jr (2001) Law and Information Superhighway.p.20 68

Richard C.T. and Anita L.A.(2002)Privacy Law, 2nd Edition, West Group p.399

32

2.6 Conclusion

It is well established that the laws, internationally and domestically cover an aspect of

confidentiality however there are some challenges on its implementation such as the

prohibition on use of confidential information especially acquired knowledge in due

process of working, but most important is to avoid ruining of the others business, there is

a need to set standards of the said confidential information .again laws need to provide

strong penalties for the offence and not just establishing an offence.

However referring Posner‘s economic Theory presumes that privacy is not something

that is desired for its own sake .Privacy is valued as a means to produce income or some

other benefit69

.

Hence there is a need of having a comprehensive legislation on privacy matters.

69 Richard .A.P(1979) Utilitarianism, Economics and Legal Theory also in his earlier book titled Right of Privacy

(1978)

33

CHAPTER THREE

RESEARCH FINDINGS

3.0 Introduction

This chapter intends to give out the field results, which a researcher upon applying

different methods of data collection and interpretation he came out with some

observations which are categorized in the following subtitles Methods used to keep Data

and Leakage Ways, Legal Challenges Facing Employers and Employees on the Aspect,

Steps taken by Organizations to Prevent Leakage of the Confidential Information,

Computer use and the Enforceability of Confidential Clauses, the critical area on the

problem of confidentiality and lastly the conclusion of the chapter.

This research took a case study of Dar es salaam therefore the researcher interviewed

employees at the Ministry for Labour and Employment especially labour officers,

secretaries ,the researcher went further and sent questionnaires to different organizations

for employees and employers such as Mic Tanzania commonly Tigo Tanzania ,Airtel

Tanzania, Barclays Bank, CRDB Bank ,IT specialists, Magistrates ,BP Tanzania

employees ,Keko Pharmaceuticals Ltd,International Labour Organization (ILO) also the

researcher went further interviewing Health officials like nurses and doctors in Massana

Hospital and Mbezi Beach Health Center at Doctors Plaza ,the researcher valued each

and every persons contribution and maintain anonymity in his research.

The researcher went further by interviewing some security agencies employees,

Association of Tanzania Employers (ATE) and successful he got the important data to

this research. However the researcher used much of library search and used Internet

browsing to get some more data to help in his research, from those sources the

researcher came out with the following results;

34

3.1 Methods used to keep Data and Leakage Ways

The ways which are mostly applied in keeping data are still local as opposed to modern

means in particular at government offices, the technology is not yet exploited into

practice though there are some movement towards the use of new technology to keep the

data in most safe ways, the observations shows that common methods used in keeping

confidential information are;

i. special registry books

ii. folders in hard copy

iii. Tape recording, video and surveillance camera

iv. Folders in soft copy

v. Emailed document

vi. Files according to confidentiality of the matter.

Special registry book, is a special book where the records of a particular document are

recorded, the recording is done once the document is received signed by both the

deliverer and the receiver. This helps to know that particular document is received and

kept in a certain place by a particular person and exactly time of particular information is

received. This is common in both Government offices and the private companies,

whereby the data shows that all twenty five (25) respondents, confirmed use of this

method.

Folders in hard copy, there special folders in hard copy form which are kept on special

shelves in special chambers, this is again used in both government and private

institutions ,in government this is the main means of storing data however in private

companies is an alternative means to store data as mainly they use soft copy.

The communication via e-mails are also used to keep special confidential information

where by the attachments kept on emails and the whole e mail, however can be hacked

35

and divulge information to third parties. E mails are very commonly used by private

companies, most of the e mails they contain a special clause which requires

confidentiality to be maintained however many employers and employees do overlook

the clause and transfer information to third parties. Fifteen (15) respondents commented

positively on the use of emails as a fast and modern means to keep data in the modern

commercial world however ten (10) respondents criticized the use of this particular

method to store data as they argue that is not well secured in terms of privacy as it is

easy one to hack somebody‘s account and divulge information without any physical

presence at the company.

Tape recording, video and surveillance cameras are amongst the ways used by

organizations to keep and protect the security of confidential information. The special

recordings of communications by tape recording or video are taken as a means to keep

the confidential information.

Tape recording, is used to keep information especially in media and security agencies

,however the video and surveillance cameras are most preferable means of keeping data

and act as security system as well ,most of the private companies use surveillance

cameras for the security purposes ,this include data security it is easy to identify a person

responsible for omission of particular thing when recorded by using the surveillance

camera. Twenty (20) respondents supported the use of surveillance camera however five

(5) questioned much on the aspect of privacy, and limits of surveillance.

Folders in soft copy, due to technological development, the use of computer system,

there special data base created for particular information, and the confidential

information are kept in special folders. Fifteen (15) respondents confirmed use of this

method, However the left number most especially government agencies lag behind the

technology and concentrate much on the hard copy.

36

Folders in accordance to confidentiality of the subject, there are the folders which are

specifically used for keeping confidential matters and there confidential folders are kept

due to sensitivity of the information. This is common in government agencies especially

in security agencies.

However the first two are the most commonly used in government institutions, the rest

mostly used in private institutions where the use of computer technology is at large

extent used as compared to government entities. But still whatever way used to keep

data (confidential information), the leakage of the information exists. This is so because

it is observed that the ways used to leak the said confidential information are through;

i. Unauthorized interception on computer

ii. Former employee who either retired or resigned

iii. Data theft

iv. Face to face with secretary for corruption.

The unauthorized interception on computer Cyber criminals often obtain valuable

information by intercepting and monitoring communications sent via the internet or

other information networks. Electronic mail messages can easily be intercepted by third

parties, thereby enabling them to obtain bank account numbers, password, access code

and various other form of confidential information, a good example is a complaint rose

by Louis Moreno Ocampo the International Criminal Court (ICC) prosecutor that there

some hacking of some personnel‘s and witnesses emails which lead to disclosure of

confidential information70

.

However there is legal and unlawful interception, lawful one permitted by the law while

unlawful interception is not permitted by law and it is among cyber crimes, though the

challenge arises as to the balance on freedom of expression and unauthorized

70 16th March 2012 Sunday News, 1st page.

37

interception, this cover the disclosure of confidential information of various states by

wiki leaks.

Use of ex –employees of a certain organizations ,the question of resignation and retiring

of some employee comes as a way to breach the confidentiality clauses ,the ex-employee

who knows some confidential information if not bound well with the confidentiality

clauses it attracts infringement of privacy as they will be easily a pass way to dispose

such information ,some companies confidentiality clauses do real bind the employees

even after their end of employee tenure for example in Airtel Tanzania confidentiality

clauses to its employees as it stipulates that reads “the employee shall not, either during

the continuance of his or her employment hereunder or within 3 years thereafter ,except

in the proper course of his /her duties or in the event of prior written consent of the

company, divulge to any person whosoever ,any information concerning the business or

finances of the company or any of its dealings ,transactions or affairs which come to his

/her knowledge during or in the course of his/her employment and affairs which come to

his/her knowledge during or in the course of his or her employment and he /she shall not

communicate with any person or authority in connection with any matters concerning

the company without such consent as aforesaid specified.”

Data theft through unlawful devices and unlawful programs as the organizations and

government developed ways to keep the confidential data by electronic technology;

criminals frequently use sophiscated technology to intrude in these protected systems so

as to commit crimes. This may happen by criminals using skimming devices to capture

all the data contained on the magnetic strip and thereafter, with assistance of a computer

terminal, download such data and use them for any unlawful activity including fraud

acts.

Face to face with Secretary and corruption attempts, this is a way which mostly used by

unloyal and unethical workers in regards to leakage of the confidential information as

38

the secretaries or office assistants who to a large extent knows a lot of the confidential

matters of the organization can be blackmailed by money or anything in kind to betray

his employment contract on the aspect on confidentiality clauses.

In this regard is obviously observed that in whatever means used to keep the confidential

information still leakage may occur whenever any of the way used to get the data.

3.2 Legal Challenges Facing Employers and Employees on the Aspect

The legal challenges that arise on the aspect of enforceability of confidentiality clauses

by employers and employees, many cases are;

i. Identification of defendant

ii. Admissibility of electronic evidence.

iii. Corruption attempts

iv. Influence of alcohol

When the confidential information are leaked it is a challenge first to identify the

defendant, the actual person who breached the clause, this is so because the breach is

done mostly in secret manner.

Generally, before the year 2000, electronic evidence was inadmissible .In the year 2000

in the High court commercial division, Nsekela J, in the case of Trust Bank Tanzania

Ltd v. Le Marsh Enterprises Ltd71

the court saw the need for the judiciary to be ready

to adopt changes caused by technological revolution engulfing the world and it

proceeded to extend the definition of banker‘s books to include evidence emanating

from computer. Despite such observations by learned Judge –no significant changes

were made to existing law till 2007.were the significant development was the

amendment to the Evidence Act by Act no.15 of 2007,the Evidence Act was amended

71

Case no. 4 of 2000

39

by ;adding s.40 on admissibility of electronic Evidence in criminal proceeding .In this

regard for civil cases the challenge is still ahead.

Challenge to find evidence to a person who leak information via word of mouth only

without use of documents.

Corruption attempts put ahead a very challenging obstacle to obtain justice, the people

are paid to leak the information and this sometimes go higher as compared to their

salaries.

Some breach the confidentiality clauses under the influence of alcohol; it is a challenge

to master a person from his alcohol drinking behavior, therefore others take advantage of

alcoholism to obtain confidential information from the people who are drunk.

3.3 Steps taken by Organizations to Prevent Leakage of the Confidential

Information.

The steps taken by the employers to prevent the leakage of confidential clauses are;

i. Installing surveillance cameras

ii. Password ( authentication )

iii. Education on the importance of keeping confidentiality clauses.

iv. Termination without pay (summary dismissal)

v. Legal proceedings for those who disclose confidential information.

vi. Special entrance door card.

vii. Special Programme on computer to records events on desktop.

Most of the private companies has put forward the first two ways plus the rest ways

however the government bodies is very much invested in the three last ways though

some government offices use the first two ways too.

40

Surveillance cameras, these are special camera which are installed to record the video

for a particular area 24 hours, these enables to record all activity that take place in there

so if the leakage occurs or any attempt to theft appears it is easy to identify the defendant

for easy legal action, it is a commonly used in private companies and some government

offices as well.

The use of passwords is a method used to allow some people only, an access to the door

of certain special room which keeps confidential information even the computer access

and pass code for the folders keeping the confidential information.

The education on the enforcement of confidentiality clauses, it is observed that some

employees or employers are not aware of ways used to leak the confidential information

as there some cases where by the information are trapped unknowingly by a third party

in presence of the employee or employer this mostly is by computer interception and

data theft .for this it has been seen there is a need to give education to the people who

handle the confidential information be employer or employee.

Upon the noticing of a person who breached the confidentiality clause, the summary

termination takes place at once followed by legal action, this is a step adopted to prevent

the leakage, however this applies only to an existing employee for a parting or resigned

is a challenge.

Legal action is taken only when there is an evidence to identify the offence and the

person so responsible.

Special card for entrance and exit, the organization and some individuals has now taken

step to security of people and property and data in particular by using new technology of

installing special doors which require identification of a person before entrance and exit

so the system records who and at what time he entered and left the room in assistance of

surveillance cameras it is easy to recognize the people who breach confidence.

41

Special Programme on a computer which shows exactly the documents opened at a

particular time and by who, therefore it is easy to have an evidence of breach of

confidence.

3.4 Computer use and the Enforceability of Confidential Clauses

With the coming of mobile phones and internet, ICT application in Tanzania got many

clients. And the concern of about information security was and yet is more alarming.

There are hackers, malicious programs like computer viruses, worms, just to mention a

few.

Attackers are assumed to have various levels of expertise, resources, and motivation.

Attackers can either be insiders or outsiders. Relevant expertise may be in general

semiconductor technology, software engineering, hacker techniques, or the specific

system. Resources may range from personal computers and inexpensive card

reading/coding devices to very expensive and sophisticated engineering test,

measurement devices, and replica of Company vending devices. They may also include

software routines, some of which are readily available on the Internet. Motivation may

include economic reward, resentment, or notoriety of defeating high-grade security72

The attackers mentioned might be employers or employees or any person with

connection with any of the two so as to grab particular information.

The development of technology has led the intensive use of computer at work places

especially on very sensitive matters concerning business .The computer keeps

information in a special data base created by the organization, which may either require

special password to access the information.

72

Job A.C, 2000 …Framework for Evaluation of Information Security Systems, A Case Study of Tanzania Electric

Supply Company (TANESCO). Available at

www.icsa.cs.up.ac.za/issa/2005/Proceedings/Full/062_Article.pdf- last visited on 01/02/2011

42

Also on the other hand the changing ways of leakage becomes a problem as the

computer use intensify the problem as the ways of which are used are a bit challenging

as a person can interrupt certain confidential information without even physical presence

at the scene through interception but again the lack of knowledge amongst the

employees where by a person can easily disclose his/her password to a third party or just

leave another employee or third part use his computer without his presence.

Just observation, due to computer illiteracy, the secretary in a certain office was able to

allow a person to put his flash on the office computer and took some confidential

information, which a secretary did not realize the intention as she did not know what he

was doing, so if the secretary could have sufficient skills on the computer, she could

have prevented the leakage.

Therefore it is obviously seen that the use of computer technology sharpens the problem

and even makes very hard to control and avoid.

3.4 Critical area on Confidentiality Clauses Enforcement in Tanzania

From the researchers data and interpretation the problem seen is both the law and the

practice, this is so because the law under the Employment and Labour Relations Act73

,

stipulates the penalties of which in some cases is not able to give a real deterrence for a

kind of loss so caused from the offence, however the strict laws on banking are so

because they deal with money but even in some other organizations the confidential and

very important information can be leaked and cause moral or financial loss to a great

extent ,is my call to the government to make strict laws on the aspect of privacy.

The practice also shows that the employers assist on one way or other to leakage of

confidential information, as they fail to give education to their employees on privacy,

also the issue of corruption which paves a way to employers silence on the offence.

73

Act no 6 of 2004, s.102(4)

43

As one of the respondent said, the law might be present but if at all our people are not

educated we cannot prevent leakage of information.

The education on confidentiality clauses need to be given to employees so as to master

their true habits ,thus unintentional breach will be covered ,whoever breaches will be

presumed to have an intention thus attracts heavy penalty.

3.5 Conclusion

The findings shows that the methods employed to keep data especially in many

government offices do not comply with the current social change unlike private

institutions, however despite that the problem of breach still exists and as such we need

a strong legislation which will speak reasonable penalties so as to reduce the increase of

the problem, the refresher training should take part from time to time to update

employees on the aspect of privacy issues and to make sure that the organization policy

are put into real action.

44

CHAPTER FOUR

SUMMARY OF FINDINGS, CONCLUSION AND RECOMMENDATIONS

4.0 Summary of Findings

Generally, ―Enforcing Confidentiality Clauses in Tanzania with Critical Analysis on the

Legal Challenges Facing Employers and Employees, can be summarized as follows, the

respondents whom I used, that is 25 respondents amongst whom 20 respondents said

that the problem is still increasing and even worse through the use of computer, it is

observed that lack of privacy knowledge and even smooth legal consequences

contributes to the increase of the problem.

It was observed that the penalties under different laws are not sufficient to end the

problem, the Banking and Financial Institutions Act74

at least put a strict penalty on the

person who committed an offence but again it is of course due to the reason that the

Financial Institution and Banks are institutes which deals with money, at this juncture it

is not appropriate to put strict laws only for Banks as the leakage of confidential

information occurs in different organizations and cause a great loss to particular

organization.

It was observed that the knowledge of confidential information sensitivity is not well fed

to employees, of importance the knowledge on the subject matter especially the negative

effects of such information to the organization. However some institutions are very strict

to the provision of information to outsiders whereby you need to write a special

application expressing reasons for the information you need and to promise not to use

such information otherwise, after the confirmation by the organization leadership then

the person will be allowed to take the information and only for the purpose asked for,

74 Act no. 5 of 2006.

45

unlike many institutions where by the staffs can easily divulge the information even

unknowingly.

4.1Conclusion

There Legal challenges face the employers and employees in enforcing the

confidentiality clauses in Tanzania, and is observed that the computer use has intensified

the problem.

Despite the initiatives undertaken there is yet still a problem particularly on the legal

system. The legal infrastructure in Tanzania is yet to incorporate Information Security as

an area worth legal safeguard. In this way it is not surprising to find hackers or those

defrauding the IT system walking away unpunished by the law.

It is therefore prudent and sound that the initiatives should not only be on technical area

put also the legal infrastructure should address such matters related to information

security in Tanzania.

The problem is not absence of provisions of law but its loose nature to the extent that the

penalties put for an offence on breach of confidentiality clauses does not discourage the

continuance of the problem on the other hand the poor knowledge on information

keeping by employees and some employers also add to the problem, this includes poor

job ethics by the employee for example the alcoholism is seen as other factor which

contribute the presence of the problem, the corruption song is still the major challenge as

mostly people receive something in kind for the information they share to the third

parties.

The hypotheses proves the problem existence, as little penalties, unethical actions,

computer use seem to be the great reasons for the extension of the problem.

46

The organization privacy policy are not put into implementation by some organizations

this leaves a chance to the organizations staffs to have an opportunity to divulged the

confidential information. Lastly in some organizations it clearly observed that the

information is not kept in a precise manner as in regards to this cyber era.

4.2 Recommendations

Keeping in mind the research findings and conclusion by the researcher, he goes further

recommending on the topic namely ―Enforcement of confidentiality clauses in Tanzania

A critical analysis on the legal challenges facing employers and employees”. Taking

into account the current technological advancement, the researcher recommends the

following. It is important to this of privacy in broad perspectives. We should not limit

ourselves to privacy infringement in traditional sense like where the employer come to a

employees‘ home and search the premises or where a employee is stopped by employer

and searched. You hear a person saying you are interfering with my personal integrity.

We need to retain such integrity even online. But that has been made difficult by our lag

in enacting Privacy legislation in Tanzania. We have to blame ourselves for such lag75

.

It is worth of note that so long we visit websites so long we use ICT facilities at work, so

long we use our credit cards, our Internet banking, we shop in the supermarkets then we

are not going to be left alone. We will be able to enforce successful employees and

employers confidentiality clauses and other interests with privacy only if we enact

privacy legislation. In this way our privacy online will be guaranteed.

75 Ubena J (June 8, 2010) Law as the Lifeblood of Human Being: Tanzania Lag on Privacy Law. at

http://tanlex.wordpress.com/2010/06/08/tanzania-lag-on-privacy-law/

47

It is suggested that the privacy policy of different organization be put into action and the

refresher training amongst the employees be provided time to time to shape them with

the proper methods on how to observe job ethics and also materials like brochures and

some adverts to be put on desks of the employers and employees just to remind them of

the keeping the confidentiality clauses.

Further recommends that the organization privacy policy shall be put into a strict sense

and in action. The ways of keeping the confidential information is of great seriousness

and only with special permission confidential information is shared, on the other hand

the penalties are extended and the summary dismissal is provided for the persons who

have committed the offence.

Further requests the education to be provided to the employees and employers on the

privacy importance from time to time also emphasizes reasonable use of passwords and

surveillance cameras to be used identifying the defendants.

Encourages the use of proper ways to identify the cyber criminals over the

confidentiality clauses to be adopted by the employers meanwhile the employers to be

careful in disclosure of their employee‘s confidential information to third parties as the

use can be against the employees wish hence breach of confidentiality clause.

Calls upon the employers and employees have a table talk on employees‘ benefits and

salary increment and maintain friendly relations in solving disputes arising at work

place.

Generally information security is secured by Information security program, blending

best management practices with key physical and information technology safeguards.

Drilling down to the critical building blocks of information security, covers security

policies, awareness, administration, models, mechanisms, and architectures; availability,

48

backup, recovery, and business continuity planning; firewalls; user authentication;

cryptography; network concepts and security76

Lastly the employers should take proper and reasonable steps to prevent the occurrence

of the problem for example to install special computer programs to record the events on

the desktop containing confidential information. However this should be done only on

the computers with confidential information so as to balance freedom of privacy to an

employee.

76 http://www.tgdlc.go.tz/Index.php?id=news_course last visited on 01/02/2012.

49

REFERENCES

Books

Bainbridge,D. (2002)Intellectual property,5th

Ed, Pearson Education Management

Bainbridge,D. (2009)Intellectual property,7th

Ed, Pearson Education Management

Henry H.P, Jr (2001) Law and Information Superhighway, 1st Edition oxford

university press, London

Holvast J., Madsen W. & Roth P. (2000-) 'The Global Encyclopaedia on Data

Protection Regulation', Looseleaf, Kluwer Law International

Ian J. Lloyd (2008), Information Technology Law, 5th Ed, oxford university press,

London.

Lim,Y.F(2007)Cyberspace Law Commentaries and Materials, 2nd

ed, oxford

university press, London.

M.B Miles and A. M Huberman(1998) An Expanded Source Book-Qualitative Data

Analysis

Milton .R.K (1966) Privacy and Law: A Philosophical Prelude, 1st Edition, West

Group

Richard C.T. and Anita L.A. (2002) Privacy Law, 2nd

Edition, West Group

50

Articles and Journals

Araujo and I. Araujo (2011)Developing trust in Internet commerce Proceedings of

Conference of the Centre for Advanced Studies on Collaborative Research.

Better Policies for better Lives; OECD Guidelines on the Protection of Privacy and

Transborder Flows of Personal Data : Available at

http://www.oecd.org/document/18/0,2340,en_2649_201185_1815186_1_1_1_1,00.ht

ml

Bygrave L. (1998) 'Data Protection Pursuant to the Right to Privacy in Human

Rights Treaties' International Journal of Law and Information Technology, 1998, 6,

247-284

D. Banisar (1999), Privacy and data protection around the world. Proceedings of

the21st International Conference on Privacy & Personal Data Protection.

Davies Collison Cave Darron Saltzman and Timothy Creek (May 10 2011) Damages

awarded for misuse of confidential information by former employees to create

competing product.

Glyn Marais (2009), Crime Prevention Asset Forfeiture and Collateral Damage to

Creditors 1st Edition Lawyer‘s club India Article, Data Theft in Cyber Space Issues

and Laws.

Naomi Cossack, Margaret R. Fiester, John Sweeney, (2006) Prompted resignation,

surveillance confidentiality.

Richard Elliott( 2010) International Council of AIDS Council Organisation Guideline 5

of the International Guidelines on HIV/AIDS and Human Rights Available at

http://www.icaso.org/publications/Advocates_Guide_EN.pdf accessed on 20th

November 2011 at 20:00hrs

51

Ubena J (June 8, 2010) Law as the Lifeblood of Human Being: Tanzania Lag on

Privacy Law at http://tanlex.wordpress.com/2010/06/08/tanzania-lag-on-privacy-law/

Websites

Data Theft in Cyber Space Issues and Laws accessed on http://

www.wisegeek.com/what-is-a-confidentiality-clause.htm

http://findarticles.com/p/articles/mi_m3495/is_10_51/ai_n27011518/ on 01st Jan, 2012,

20:00hrs

E-Security and Cyber Crimes Training Workshop at http://agumba.biz/index.php?id=33

Howard Shila, Effectiveness of Informatics Policy Instruments in Africa, Tanzania.

Available at

http://www.uneca.org/aisi/tanzania.htm visited on 03/11/2011

National Information and Communications and Technology Policy

http://www.tanzania.go.tz/policiesf.html

http://tanlex.wordpress.com/2010/06/08/tanzania-lag-on-privacy-law/

http://www.tgdlc.go.tz/Index.php?id=news_course last visited on 01/02/2012