Case Law[2023] ZAGPJHC 771South Africa
Mazetti Management Services (Pty) Ltd and Another v Amabhungane Centre for Investigative Journalism NPC and Others (2023-050131) [2023] ZAGPJHC 771; 2023 (6) SA 578 (GJ) (3 July 2023)
High Court of South Africa (Gauteng Division, Johannesburg)
3 July 2023
Headnotes
PDF format RTF format
Judgment
begin wrapper
begin container
begin header
begin slogan-floater
end slogan-floater
- About SAFLII
About SAFLII
- Databases
Databases
- Search
Search
- Terms of Use
Terms of Use
- RSS Feeds
RSS Feeds
end header
begin main
begin center
# South Africa: South Gauteng High Court, Johannesburg
South Africa: South Gauteng High Court, Johannesburg
You are here:
SAFLII
>>
Databases
>>
South Africa: South Gauteng High Court, Johannesburg
>>
2023
>>
[2023] ZAGPJHC 771
|
Noteup
|
LawCite
sino index
## Mazetti Management Services (Pty) Ltd and Another v Amabhungane Centre for Investigative Journalism NPC and Others (2023-050131) [2023] ZAGPJHC 771; 2023 (6) SA 578 (GJ) (3 July 2023)
Mazetti Management Services (Pty) Ltd and Another v Amabhungane Centre for Investigative Journalism NPC and Others (2023-050131) [2023] ZAGPJHC 771; 2023 (6) SA 578 (GJ) (3 July 2023)
Download original files
PDF format
RTF format
Links to summary
PDF format
RTF format
make_database: source=/home/saflii//raw/ZAGPJHC/Data/2023_771.html
sino date 3 July 2023
REPUBLIC OF SOUTH
AFRICA
IN THE HIGH COURT OF
SOUTH AFRICA
GAUTENG DIVISION,
JOHANNESBURG
Case no
2023-050131
REPORTABLE
OF INTEREST TO OTHER
JUDGES
03.07.23
In
the matter between:
MAZETTI
MANAGEMENT SERVICES (PTY) LTD
First
Applicant
AMMETTI
HOLDINGS (PTY) LTD
Second
Applicant
And
AMABHUNGANE
CENTRE FOR INVESTIGATIVE JOURNALISM NPC
First
Respondent
STEPHEN
PATRICK SOLE
Second
Respondent
ROSHAN
MICAH REDDY
Third
Respondent
DIEWALD
VAN RENSBURG
Fourth
Respondent
As
Amici Curiae:
SOUTH
AFRICAN EDITORS FORUM
First
Amicus
MEDIA
MONITORING AFRICA TRUST
Second
Amicus
CAMPAIGN
FOR FREE EXPRESSION
Third
Amicus
CORRUPTION
WATCH (RF) NPC
Fourth
Amicus
This judgment has been
delivered by uploading it to the court online digital data base of
the Gauteng Division of the High Court
of South Africa, Johannesburg,
and by email to the attorneys of record of the parties. The deemed
date and time of the delivery
is 15H00 on 3 July 2023.
THE
ORDER
(1)
The order granted to the applicants on 1 June 2023 and amended on 3
June 2023 is set aside in its entirety.
(2)
The applicants shall bear the costs of the first to Fourth
Respondents on the attorney and client scale including the
costs of
two counsel.
JUDGMENT
Sutherland
DJP:
Introduction
[1] In our law,
there is a fundamental norm that no decision adverse to a person
ought to be made without giving that person
an opportunity to be
heard. In a court of law, this norm is scrupulously observed.
However, in the real world, prudence dictates
that sometimes
pragmaticism must be applied and in exceptional circumstances that
sacred right of
audi
alterem partem
may
be relaxed, but when it is appropriate to do so, such a decision is
hedged with safeguards. The principle which governs whether
to grant
an order against a person without their prior knowledge is
straightforward: only when the giving of notice that a particular
order is sought would defeat the legitimate object of the order.
[1]
This procedure is rare and is called an
ex
parte
application.
The classic examples of its usage are where the applicant is the
victim of a theft and seeks an order to either recover
the stolen
goods from the thief or procure evidence of the crime through an
unannounced raid on the premises of the alleged perpetrator,
a spouse
who seeks protection from a violent partner or a creditor who seeks
to freeze the bank account of a debtor when grounds
exist to fear
illegitimate dissipation, especially in insolvency proceedings. Any
order made
ex
parte
is
provisional. The uniform Rules of Court, make provision for an urgent
reconsideration of such an order.
[2] Rule 6(12)(c)
provides:
‘
A person against
whom an order was granted in his absence in an urgent application may
by notice set down the matter for reconsideration
of the order.’
[3] The proceedings
before this court have been convened pursuant to that rule.
[4] The applicants
obtained an order
ex parte
and
in camera
on 1 June 2023
in the urgent motion court. The founding affidavit was signed
on 25 May 2023 and the application issued on
the day the order was
granted. The relief sought and obtained was twofold. In its essence
the relief was, first, a final order
that digital documentation
allegedly stolen from the applicants, (being companies in business)
by an ex-employee and allegedly
in the possession of the respondents
(an investigative journalistic enterprise, and its individual
journalists) be returned within
48 hours, and second, an interdict
forbidding publication of anything that was based on the
documentation or in any other way using
the documentation. Together
with this was a rule nisi – in effect a notice to show cause on
2 October 2023, four months hence,
why these orders should not be
made final. In respect of the first order to deliver up the
documentation the rule nisi was a nonsense
as compliance would have
had to precede the return date. In any event, upon being served with
the orders, the respondents brought
the matter before the urgent
motion court on 3 June, where a modification to the first order was
agreed upon to read that pending
the reconsideration proceedings, the
respondents would not destroy any of the documentation. Thereafter,
the reconsideration
hearing was set down for 27 June 2023.
[5] Much of what
has been argued in this hearing has addressed the age-old debate
about the scope which ought to be allowed
to the Press to snoop
uninhibited into the affairs of people and entities and publish
information about them that reveals to the
world what they would
prefer to remain unknown. A key dimension of effective investigative
journalism is receiving information
from sources that wish to remain
anonymous. This in turn precipitates an ethical obligation to protect
their anonymity. Within
limits, in general, the law acknowledges the
propriety of protecting sources from being unmasked. To this
end, three civil
society organisations devoted specifically to the
promotion of the freedom of the Press joined as amici curaie - the
South African
Editors Forum, Media Monitoring Trust, and Campaign for
Free Expression. A fourth civil society organisation, Corruption
Watch,
joined as an amicus to contribute its perspective on the
critical value of an effective investigative media in unveiling the
corruption,
which to the knowledge of all South Africans, infects our
lives and is often connived at by persons of influence in all
quarters
of society. I express my appreciation for the contributions
they have made to the proceedings.
[6] The function of
the courts in holding an appropriate balance between the rights of
privacy and confidentiality in private
matters, on one hand, and the
public interest in a free flow of news and especially news exposing
skulduggery, on the other, is
a well-traversed terrain. How the
courts go about doing so, contrary to popular belief, is quite
unspectacular. Everyone is entitled
to expect the courts and the
process of the courts to afford them fair treatment. The Law and the
Rules of Court provide the scaffolding
for that aim to be achieved.
Getting the simple things done correctly is often quite enough to
take care of the big things. This
is a case which provides an example
of just that.
Evaluation of the
initial ex parte application
[7] The elephant in
this case is not press freedom or a violation of privacy. Rather, it
is a most egregious abuse of the
process of court. It is manifest
that the order granted on 1 June should never have been sought ex
parte, still less granted. There
is not a smidgeon of justification
for it being brought ex parte.
[8] The relevant
facts are few and common cause.
8.1 In February 2023, the
applicants were confronted with questions posed to them by the
respondents, preparatory to publishing
an article. The questions
evidenced a critical and unwelcome intrusion. Thereafter articles
were published on 17 February, 28 April
and 17 May. All were severely
critical of the applicants and its principal director, Mr Zunaid
Moti. The subject matter concerned
the business activities of the
applicants and alluded, among other matters, to the ostensibly
curious correlation between the flourishing
of the businesses and the
intimate proximity of Mr Moti to political elites in Zimbabwe.
Dealings in South Africa that were supposedly
dodgy if not downright
criminal were also addressed.
8.2 The content of the
publications showed that the respondents had read and either
possessed or had access to internal documents
of the applicants.
Indeed some of the documents were displayed as part of the articles.
The respondents were thereupon challenged
with being in improper
possession of documents which the applicants alleged had been
‘stolen’ by an ex-legal advisor,
Clinton van Niekerk.
[2]
The first of several demands by the applicants for the ‘return’
of the documents was made on 12 April 2023.
8.3 During the period
February to May 2023, there were frequent exchanges of communications
between the applicants and the respondents,
either directly or via
their respective attorneys. The thrust of the exchanges records the
ire of the applicants that the respondents
had access to the
documents, demands that the respondents disgorge them and, moreover,
that it was unfair to be asked to comment
on allegations based on
documents that were not first shown to the applicants,
notwithstanding that the documents emanated from
their own records.
The respondents were steadfast in refusing to send copies of the
material that they had either possessed to
which they had access.
Throughout this time the refusal was explained on the premise that
the respondents, as they saw themselves,
were ethical and responsible
journalists, and had a duty not to reveal their sources which would
have that effect if the documents
were shown.
[3]
8.4 This series of
communications reached a notable point on 13 April. The
attorneys of the respondents wrote a letter that
contained statements
that are significant for these proceedings; the relevant passages
read:
‘
4.1
To the extent that our client has access to any documentation with a
view to publishing content pertaining to the Moti Group,
our client
declines to provide you with such documentation. This is apart from
anything else, because to do so may reveal the identity
of
confidential sources. Our client is in any event under no legal
obligation to provide you with any details pertaining to their
sources or their journalistic research, and there is no basis for
your demand that they do so.
4.2 In any event we are
instructed to inform you that our client is not currently in
possession of any such documentation. There
is no such documentation
stored in physical form or in virtual form on any hard drives or
computers currently in the possession
of our client or its employees.
4.3 Instead, the only
access of our client and its employees to any such materials is via
two secured servers located outside of
South Africa. One server is
not controlled by our client, whereas the second is. In respect of
the second server, our client and
its employees have no intention to
delete or destroy such materials and undertake not to do so for a
period of at least a year
from today’s date.
5. Lastly, we are
concerned that the tone of your letter suggests that your client may
be intending to launch a court application
of some sort against our
client. Our client is concerned that your client may be inclined to
do so on an ex parte basis, which
would in the circumstances be
unlawful:
5.1 We deny that there is
any basis for such an application.
5.2
But even if there were, in light of the facts set out above, there
would certainly be no basis for such an application to proceed
ex
parte. The ordinary requirements for ex parte applications are not
met.
Moreover, any relief granted against
our client would seriously harm threaten our client’s rights
and obligations to freedom
of expression
and
the media, including multiple ongoing investigations into a range of
issues.’
8.5 Thereaf8ter, the
applicants’ attorney offered a riposte on the same day, inter
alia, demanding that the respondents not
publish anything on the
topics put to the applicants for comment until after 8 May. The
respondents replied to offer an extension
to 28 April.
8.6 Onwards continued the
exchanges.
8.7
On
5 May a letter of inordinate length was written by Attorney Stephen
May to several police officials and the NPA. This was copied
to the
applicants. Apparently, it had been thought that the applicants had
laid criminal charges against one or more of the respondents.
The
letter was aimed at forestalling any arrests and provided, for the
convenience of the police, a crash course in criminal procedure.
Inter alia, it cautioned the police not to become an accomplice to
the applicants’ allegedly likely efforts to abuse the
criminal
process to achieve a SLAPP suit which they allegedly would be unable
to achieve in a civil court.
[4]
The applicants’ attorney replied on 10 May to offer his
thoughts on aspects of the criminal law and demand explanations from
the respondents for the basis upon which Mr Moti was accused of
several crimes, including allegations of corruption, fraud, money
laundering and racketeering.
8.8 On 15 May the
comments solicited by the applicants were provided by Mr Moti. Among
several emotive remarks evidencing understandable
irritation, this
document declared that the applicants were themselves instituting
their own investigation into the respondent’s
activities.
8.9 On 18 May the third
of the critical articles was published by the respondents. On 25 May,
a week later, the founding affidavit
for the ex parte application was
signed.
[9] Regardless of
the calibre of the merits of the substantive relief sought, to which
I shall advert later, the decision
to seek an order ex parte against
this background calls for examination. Ex parte applications are
always brought under circumstances
of, at least, alleged urgency, and
therefore that attribute is suffused with the justification for the
ex parte character.
[10] What was offered to
justify the ex parte character of the application was this, as
appears from these passages in the founding
affidavit:
62. Considering the
manner in which the stolen documents were initially acquired and are
now being concealed from the application
from the applicants and the
Moti Group, there is a real apprehension that if the interim order
that is sought, is not granted or
if Amabhungane were to receive
notice of this application, the information that they have collected
will be concealed, wiped from
their servers or even destroyed.
63. Put differently there
was no reason for Amabhungane to previously refuse to identify to the
applicants and URA, the precise
stolen confidential documents,
admittedly taken by Van Niekerk from Mazetti and the Moti Group,
unless the intention was, and is,
to hide the identity of the
documents from the applicants and use them clandestinely against Mr
Moti and the Moti Group in future.
64. The documents are
stated to be “leaked” which means that they did not come
into the possession of Amabhungane and
the journalists via legitimate
means.
65. In such
circumstances, the applicants have been compelled to institute this
application.
66.
66.1 This Court will
appreciate from the articles and correspondence that the matter has
received considerable attention in the
media and the disputes between
Mr Moti on the one hand and Amabhungane, Mr Lutzie and Van Niekerk on
the other hand have garnered
significant public attention.
66.2 If this matter is
placed on the ordinary roll there is every likelihood that it will
come to the attention of Amabhungane and
the journalists.
66.3 Invariably the press
and journalists are never far from our Courts as there are always
matters that may form the basis of a
newsworthy story.
66.4 If this matter is
placed on the ordinary roll, there is every likelihood that the
respondents will learn of this application
and take steps to defeat
its purpose, notwithstanding the previous undertaking to keep
documents on one of the servers, because
this undertaking to keep
documents on one of the servers, because this undertaking is
meaningless when Amabhungane and the journalists
refuse to identify
the very documents etc that the articles are going to be based on.
66.5 In the circumstances
the undertaking is meaningless and of cold comfort to the applicant.
66.6 The applicants
accordingly submit that this is a matter which deserved to be heard
in camera
and ask that it be so heard.
[11] The facts described
demonstrate an egregious example of the abuse of the ex parte
procedure. Throughout a period of three months
of verbal jousting
including between the attorneys representing the parties, the points
of contestation between the parties were
articulated repeatedly.
The point was whether an obligation existed to show the applicants
what material the respondents
had and whether the critical statements
published were actionable. An undertaking had been given to preserve
what the respondents
had. A reason for not showing the
documents was given by the respondents, i.e., the protection of the
sources. I leave aside
whether these reasons relied upon by the
respondents were meritorious; indeed, for the purposes of examination
of the ex parte
character of the application, it may be assumed they
were specious.
[12] I have already
described what justifies an ex parte application. On these facts, a
sincere belief that the respondents would
destroy (whatever that
means in respect of digital data) any documents derived from the
applicants is hard to credit. Even if there
were cogent grounds
expressed for doubting the efficacy of the undertaking given via the
respondents’ attorney, which are
absent here, there remains the
inherent improbability of a journalist alienating the very evidence
necessary to justify the publication
of defamatory statements.
[5]
The contention that a refusal to show the documents – on the
principled ground of protecting a source - lends weight to the
notion
that the undertaking given was false and deceitful is unsustainable.
[13] Moreover, the
interaction between the legal representatives over this period and
the express caution against taking an order
behind the respondents
back are material factors why any legal proceedings to determine the
rights and wrongs of the parties' respective
well-known stances could
not justifiably have been brought ex parte. The decision to do
was an abuse of the process. The
courts cannot tolerate abuse of the
process.
[14] Rule 6(12)(c)
confers a wide discretion on the court hearing the reconsideration
application. The scheme of the Rules
of Court as a whole and,
no less, of Rule 6 itself is to facilitate orderly and fair
proceedings. Rule 6(12)(c) exists to remedy
an injustice if one was
done when the ex parte order was granted. What it creates is the
opportunity for the respondent to rebut
the case for the order. To
that end a respondent may either argue that the order was unjustified
on its own terms or provide additional
facts on affidavit to support
an argument that on an enlarged factual matrix the order should be
set aside. If a respondent introduces
additional evidence, an
applicant has a right of reply, but it is not open to an applicant to
seek fresh relief or introduce, itself,
new allegations of fact. The
scheme of the Rule takes as its point of departure that the applicant
has got its order and
the reconsideration is about whether it can
keep its order. To belabour the point – an applicant cannot
make out a better
case for the ex parte order than the case it put
before the court when the order was granted. It was for this reason
that an attempt
by the applicants to bring a counterclaim to seek
further relief was dismissed by me out of hand. It was irregular and
yet another
abuse of the process.
[15] Nothing that has
legitimately been put before me in the papers filed for the
reconsideration offers a justification for seeking
the order on an ex
parte basis. This is a sufficient reason to set aside the order in
its entirety. Only were there a question
of the interests of justice
being compromised by a dismissal would a different result be
appropriate. There is no such risk on
these facts.
[16] Lastly an aspect
seemingly ignored in the application is the well-established norm
against pre-publication restraints on the
media. This norm does not
articulate an absolute prohibition, but rather, that such an order
should be made only where the public
interest is not served by
publication. I shall address this aspect in due course in a broader
context.
[17] I have yet to deal
with the substantive merits, if any, of the application, and strictly
speaking, in the light of the conclusions
to which I have already
come it could be argued it is unnecessary because, were the
substantive relief sought, either in whole
or in part, have been
meritorious, the proper route to obtaining such relief would, in any
event, have been proceedings launched
upon proper notice.
[18] I turn to deal with
the two legs of the applicants’ case.
The ‘return’
of the data
18.1 The first
point of contestation was whether the respondents should be compelled
to ‘return’ the ‘stolen’
documents they
possess, or have access to, because they belong to the applicants or,
on the other hand, that the respondents are
justified to refuse
because to do so would unmask their source.
[19] Several tricky legal
and forensic issues bedevil the notion of ‘documentation’
in digital form being, by unauthorised
means, downloaded and copied
onto other digital data bases constituting theft. For the purposes of
this judgment, I am content
to refer to the conduct of Van Niekerk as
theft, leaving aside whether that label is jurisprudentially accurate
or is merely a
colloquial usage.
[6]
Plainly, the evidence marshalled constitutes a powerful case to
demonstrate that Van Niekerk appropriated the data and did so,
at
very least in breach of his contractual obligations to his former
employer and that this conduct by van Niekerk is actionable
at law.
This betrayal by Van Niekerk is quite justifiably regarded as
outrageous by the applicants. They need not apologise
for their
sensitivities. Furthermore, whether or not Van Niekerk has claimed or
can claim protection under the Protected Disclosures
Act 4 of 2013
(PDA) is unimportant.
[20] The more interesting
question is whether the data that the respondents allegedly have, in
one way or another,
[7]
is
susceptible to a
rei
vindicatio
.
This is an aspect that does seem to have been appropriately
ventilated in the initial hearing. What is plain, and confirmed by
counsel for the applicants is that the decision in
Waste-tech
(Pty) Ltd v Wade Refuse (Pty) Ltd
[8]
was not drawn to the
attention of the judge in the urgent motion court. In that case the
respondent came into possession of copies
of documentation taken from
the applicant by an ex-employee turned thief. The Court addressed the
question of whether relief in
the form of a
rei
vindicatio
could
be invoked to seize the copies containing allegedly confidential
information. It was held that the remedy lay in delict not
upon a
proprietary claim. It was doubted whether copies of information could
be classed as property. After citing the earlier authorities,
it was
held at 842F-843D:
‘
Neither
of those judgments, however, in the passages quoted, suggests that
the action to restrain use of confidential information
is based on
a proprietary right. Specifically, the Courts categorised the
action as one in delict. There is in any event a
more substantial
impediment in the applicant's way in contending that it has a
proprietary right in such information. I raised
with Mr
Nugent
the
first part of the judgment in the
Dun
and Bradstreet
case
where it was contended by counsel that the information contained in
the plaintiff's credit records 'constituted property
in the
plaintiff's hands and that the unlawful misappropriation and use of
this property by defendant constituted a delict in our
law' (at
215F-G). The judgment continues at 215H:
'What
the plaintiff is claiming is that the subject-matter of these
contractual rights, viz the confidential information imparted
in
"credit records", and not the rights themselves, is
incorporeal property at common law and that plaintiff is
entitled to
be protected against the unlawful us of this property by defendant.
In my view, this claim is unfounded. I do not think
that, except in a
somewhat loose sense, such information, as distinct from the
contractual rights, can be regarded as property
at common law; nor do
I believe that the plaintiff can found a cause of action upon an
alleged invasion of its rights of "property"
in
such information (cf
Nelson and Meurant v Quin and Co
(supra))
.'
The
latter judgment (reported in 1874 Buch 46) is a judgment by De
Villiers CJ and Denyssen J. The issue was whether the writer
of the
letters, Nelson, was entitled to an interdict against a newspaper,
the
Fort Beaufort Advocate
, preventing it from publishing
letters of which he was the author. It was contended on his behalf
that he had a right of property
in the letters which he could not be
deprived of without his consent. At 51 in the judgment of De Villiers
CJ it was held:
'In
order to make good Mr
Cole's
contention, it would be
necessary for him to show that, by the law of this Colony, every
person has a clear and undoubted
right of property in his own
composition, to the extent of being entitled to prevent everyone
else from multiplying copies
of such compositions, whether they be of
a purely literary character or not, and whether they have been
communicated to others
or not. No authority from the civil law
bearing on this point has been cited in the argument, nor have I been
able to find any
but the most remote references to it.'
Later
at 51 the Court held:
'In
Justinian's
Institutes
(2. 1. 33), it is said that "if Titius has
written a poem, a history, or a speech on your paper or parchment,
you, and
not Titius, are the owner of the written paper".'
I
am not aware of any decision in South African law in more recent
times in which it has been held that information, whether
confidential
or otherwise, is the subject-matter of proprietary
rights at common law in the absence of statutory protection under
intellectual
property statutes
.’
[9]
(Emphasis
supplied)
[21] The proposition that
the respondents had some form of access to or control over some or
all of the information in data files
which the applicants discovered
had been appropriated by Van Niekerk is demonstrated with reasonable
certainty.
[22] What the legal
standing of the respondents’ relationship’ with this data
is the true point of controversy. The
applicants contend that the
respondents are, at best for them, accomplices, after the fact, to
theft. This belief is incorrect.
[23] All legal concepts
originate in the imagination as an idea which is translated into a
rule to deal with real world needs. On
what grounds would it thought
useful to society that a journalist who is granted access to a
digital data file by a person not
authorised to do so, ie, a thief,
be also committing the crime of theft? In our Law there are
indeed crimes of possession,
as alluded to in
Wastetech
; for
example, in respect of uncut diamonds and of unwrought gold, which
have been created by statute. These are examples of laws
which
protect the integrity of a critical industry from being compromised
when it is thought that unregulated possession could
afflict the
national interest. What these examples illustrate is that an activity
can be criminalised to serve a purpose thought
to a social good.
[24] Contraband
information in the hands of a journalist is certainly not in such a
category; on the contrary, there is overwhelming
support for such
activity being a positive and necessary good in society. In
contemporary South African society there could be
a cogent argument
advanced that such activity is an essential good without which our
country cannot crawl out of the corrupt morass
in which we find
ourselves.
[25] The resistance to
disgorgement of information on the ground of protecting a source is
functional and not optional to the work-process
of investigative
journalism. This conduct is not mala fide but is rooted in a norm
both practical and ethical. In
Bosasa
Operation (Pty) Ltd v Basson
[10]
the question arose in an
action for defamation against a journalist whether he should be
compelled, in the discovery process, to
provide documents that would
identify his sources. He had tendered redacted copies. The
court dismissed an application for
such disclosure; in respect of the
principles pertinent to whether such an order as sought could be
appropriate it was held at
para [38]:
‘
Having
regard to the authorities cited above, it is apparent that
journalists, subject to certain limitations, are not expected
to
reveal the identity of their sources. If indeed the freedom of the
press is fundamental and a sine qua non for democracy, it
is
essential that in carrying out this public duty for the public good,
the identity of sources should not be revealed, particularly
when the
information so revealed would not have been publicly known. The
essential and critical role of the media, which is more
pronounced in
our nascent democracy, founded on openness, where corruption has
become cancerous, needs to be fostered rather than
denuded.’
[26]
Bosasa
was
subsequently cited with approval by the Constitutional Court in
Amabhungane
v Minister of Justice
[11]
where at para [115] it
was held:
‘
I
agree that keeping the identity of journalists' sources confidential
is protected by the rights to freedom of expression and the
media.
This court has acknowledged the constitutional importance of the
media in our democratic society and has confirmed that
'(t)he
Constitution thus asserts and protects the media in the performance
of their obligations to the broader society, principally
through the
provisions of s 16'. It follows that the confidentiality of
journalists' sources, which is crucial for the performance
by the
media of their obligations, is protected by s 16(1)
(a)
.
Like the High Court, I place reliance on Tsoka J who held as much
in
Bosasa
.
Relying on local and foreign authorities, he put it thus:
'(I)t
is apparent that journalists, subject to certain limitations, are not
expected to reveal the identity of their sources. If
indeed freedom
of press is fundamental and
sine qua non
for
democracy, it is essential that in carrying out this public duty for
the public good, the identity of their sources should
not be
revealed, particularly, when the information so revealed, would not
have been publicly known. This essential and critical
role of the
media, which is more pronounced in our nascent democracy founded on
openness, where corruption has become cancerous,
needs to be fostered
rather than denuded.'
[27] I have been favoured
with a plethora of authorities from other jurisdictions and from
international courts supportive of affording
journalists, in the
public interest, a freedom to function which embraces the notion that
it is proper to protect sources. I do
not cite them all. It suffices
to allude to some of the international instruments.
[28] The United Nations
Joint Declaration on Media Freedom and Democracy of 2 May 2023,
includes recommendations to member states
thus:
‘
(f) Take measures
to protect journalists and media outlets from strategic lawsuits
against public participation and the misuse of
criminal law and the
judicial system to attack and silence the media, including by
adopting laws and policies that prevent and/or
mitigate such cases
and provide support to victims. In particular, States should consider
that legal proceedings against journalists
that excessively extend
over time or are accumulated in bad faith harm journalistic work
and/or the operation of the media. In
addition, data protection laws
should be designed and applied in ways not interfering with media
freedom, for example by establishing
disproportionate obstacles to
investigations and reporting.
(g) Ensure the full
protection of confidentiality of journalistic sources in law and in
practice. Any limitations on source confidentiality,
including via
surveillance, should be pursuant to clearly defined exceptions set
out in law, which apply only where necessary to
protect an overriding
interest, with judicial authorisation, and in compliance with
international human rights law. Whistle-blowers’
ability to
resort to the media should be correspondently protected.’
[29] The Declaration of
Principles of Freedom of Expression and Access to Information in
Africa issued in 2019 by the African Commission
on Human and Peoples
rights addresses this issue in principle 25:
‘
1. Journalists and
other media practitioners shall not be required to reveal
confidential sources of information or to disclose
other material
held for journalistic purposes excerpt where disclosure has been
ordered by a court
after
a full and fair public hearing.
2. The disclosure
of sources of information or journalistic material ordered by a court
shall only take place where:
(a) the identity of the
source is necessary for the investigation or prosecution of a serious
crime, or the defence of a person
accused of a criminal offence.
(b) the information or
similar information leading to the same suit cannot be obtained
elsewhere; and
(c) the public interest
in disclosure outweighs the harm to freedom of expression.’
(Emphasis supplied)
[30] The United Nations
Convention against Corruption adopted on 31 October 2003 and in force
from 14 December 2005 was ratified
by South Africa on 22 November
2004. Among the provisions is article 13(c) which requires
signatories to take steps that
have the effect of:
‘
Respecting,
promoting and protecting the
freedom
to seek receive publish and disseminate information concerning
corruption
.
That freedom may be subject to certain restrictions, but these shall
only be such as are provided for by law and are necessary.’
(Emphasis supplied)
[31] More pointedly, the
International Covenant on Civil and political rights to which South
Africa is a signatory provides in article
19(2) for the free flow of
information. The general comment no 34 on article 19(2) by the UN
Human Rights committee states that
signatories should:
‘…
recognise
and respect that element of the right of freedom of expression that
embraces
the limited journalistic privilege not to disclose information
sources.
’
(Emphasis supplied)
[32] The decision in the
European Court of Human Rights,
Goodwin
v United Kingdom
[12]
reflects these norms at
para [46]:
‘…
Having
regard to the importance of the protection of journalistic sources
for press freedom in a democratic society and the potentially
chilling effect an order of source disclosure has on the exercise of
that freedom such a measure cannot be compatible with article
10 of
the convention unless it is justified by an overriding requirement in
the public interest’.
Evaluation of the
publication of confidential information
[33] The second point of
contestation is whether the respondents likely future publication of
more articles about the applicants
and Mr Moti, using the applicants’
data, ought to be interdicted. Self-evidentially, the constitutional
guarantees in section
16 of the Constitution are implicated. The
critical part reads:
‘
(1)
Everyone has the right to freedom of expression, which includes-
(a)
freedom of the press and other media.
(b)
freedom
to receive
or impart information or ideas;’
(Emphasis
supplied)
[34] A South African
court shall not shut the mouth of the media unless the fact-specific
circumstances convincingly demonstrate
that the public interest is
not served by such publication. This is likely to be rare; the
Constitutional Court in
Print Media
South Africa and
Another v Minister of Home Affairs and Another
at para [22]
expresses this proposition thus:
‘
The case law
recognises that an effective ban or restriction on a publication by a
court order even before it has ‘seem the
light of day’ is
something to be approached with circumspection and should be
permitted in narrow circumstances only.’
[13]
[35] This rationale was
addressed at length by the SCA in
Midi
Television (Pty) Ltd v Director of Public Prosecutions
[14]
The case concerned an
application to interdict the screening of interviews with witnesses
in an upcoming prosecution:
‘
[19]
In
summary, a publication will be unlawful, and thus susceptible to
being prohibited, only if the prejudice that the publication
might
cause to the administration of justice is demonstrable and
substantial and there is a real risk that the prejudice will occur
if
publication takes place.
Mere
conjecture or speculation that prejudice might occur will not be
enough. Even then publication will not be unlawful unless
a court is
satisfied that the disadvantage of curtailing the free flow of
information outweighs its advantage. In making that evaluation
it is
not only the interests of those who are associated with the
publication that need to be brought to account but, more important,
the interests of every person in having access to information.
Applying the ordinary principles that come into play when a
final
interdict is sought, if a risk of that kind is clearly established,
and it cannot be prevented from occurring by other means,
a ban on
publication that is confined in scope and in content and in duration
to what is necessary to avoid the risk might be considered.
[20]
Those principles would seem to me to be applicable whenever a court
is asked to restrict the exercise of press freedom for
the protection
of the administration of justice, whether by a ban on publication or
otherwise. They would also seem to me to apply,
with appropriate
adaptation, whenever the exercise of press freedom is sought to be
restricted in protection of another right.
And where a temporary
interdict is sought, as pointed out by this Court in
Hix
Networking Technologies
, the
ordinary rules, applied with those principles in mind, are also
capable of ensuring that the freedom of the press is not unduly
abridged.
Where it is alleged, for
example, that a publication is defamatory, but it has yet to be
established that the defamation is unlawful,
an award of damages
is usually capable of vindicating the right to reputation if it is
later found to have been infringed, and
an anticipatory ban on
publication will seldom be necessary for that purpose.
Where there is a risk to rights that are not capable of subsequent
vindication a narrow ban might be all that is required if any
ban is called for at all. It should not be assumed, in other
words, that once an infringement of rights is threatened, a
ban
should immediately ensue, least of all a ban that goes beyond the
minimum that is required to protect the threatened right.’
(Emphasis
supplied)
[36] It was urged on me
to invoke the example in the
OUTA
case
[15]
where the Constitutional Court held that an interdict against an
organ of state should be rarely granted if there was a risk that
such
organ would be inhibited from fulfilling its mandate. I am
unpersuaded this is an opposite comparison to the circumstances
of
freedom of the press. In
OUTA
there
were considerations pertinent to the separation of powers among the
principal arms of the state, an aspect absent here.
[37] On the facts, the
first question that arises is whether the information in the data
files is indeed ‘confidential’?
The applicants’
mere say so is unhelpful in establishing that proposition. In
general, the attribute of ‘confidentiality’
in a document
is a value derived from more than simply being something not intended
for random circulation.
[16]
However, for the purposes of the analysis I shall assume, without
deciding, that at least some of the information in the data files
could fairly be categorised as confidential. The relevant question is
whether the attribute of confidentiality was lost as a result
of the
leak?
[38] The decision is
SABC
v Avusa Ltd and Another
[17]
is direct authority for
the proposition that there is a forfeiture of confidentiality upon
the information being leaked to the world
at large. This case too,
seems not to have been drawn to the attention of the urgent court in
the ex parte hearing. The facts of
that case are on all fours with
the facts of this case; an embarrassing internal report of the SABC
was copied and leaked to the
Sunday Times and other media. At
para [18] it was held:
‘
…
.
Confidentiality is certainly no 'sacred virtue' and I accept, as
Mr
Trengove
,
who together with Ms
Hofmeyr
appears
for the respondents, contended, that confidentiality may, from time
to time, have to yield to higher interests. Notwithstanding
the fact
that confidentiality is not necessarily a paramount interest, my
difficulty, in any event, is this: the respondents have
not breached
a duty of confidentiality owed to the SABC. The respondents owe it
none, although SABC's employees and office-bearers
may well have such
an obligation. The respondents have not acted wrongfully or
unlawfully. The
Sunday
Times
'
possession of a copy of the report is not wrongful or unlawful. In
NM
and Others v Smith and Others (Freedom of Expression Institute as
Amicus Curiae)
it
was held that even where a litigant wishes to rely on the common law
of the
actio
injuriarum
for
an invasion of privacy, the element of wrongfulness must also be
established. I do not see how the delivery by the
Sunday
Times
of
a copy of the report, at this stage, can protect the SABC's interest
in confidentiality.
Even
if one accepts that the SABC has a right to privacy in respect of the
document, I cannot see how, consequent upon the events
recorded
above, the delivery of the copy of the report will, in any event,
affect this privacy: the horse has bolted. That,
it seems to me,
is the end of the matter.’
(Emphasis
supplied)
[39] Endorsing that
proposition, the decision in
South
African Airways SOC v BDFM Publishers (Pty) Ltd and others
[18]
held that:
‘
[37]
In
SABC
v Avusa
…
Willis
J dealt with a demand by the SABC to return to it a confidential
document revealing various irregularities, which had
fallen into the
hands of the
Sunday
Times
.
The court affirmed a right to the protection of a person's
confidential information, distinguishing that right from privacy
rights.
In para 26 Willis J remarked that 'confidentiality was lost
when the copy of the report was handed over to the
Sunday
Times
and
handing it back will not restore the confidentiality which has been
lost'. The absence of any duty of confidentiality by the reporters
of the
Sunday
Times
to
the SABC, unlike the duties of persons who stood in some form of
relationship to the SABC from which such a duty could derive,
like
employees, meant that possession and dissemination of the information
by the newspaper could not attract a liability to desist
(para 18).
[38]
Moreover, an interdict is an appropriate form of relief to
prevent
future
harm, not afford redress for past harm. Once
confidentiality is shattered, like Humpty Dumpty, it cannot be put
back
together again. It is not apparent how frank SAA was when
addressing the urgent judge and whether the difficulties arising from
the extent of publication were properly drawn to her attention, and
moreover whether the case law on the approach of the courts
to
lost confidentiality was mentioned. It seems rather plain that, had
these matters, no less the real inadequacies of service,
been fully
dealt with, the order might not have been so readily granted.’
[40] In argument during
the hearing, it seemed as if was implied that some of the data files
could contain information subject to
legal privilege; this was
unclear, and it could be that the concepts of confidentiality and
privilege were merely elided. This
notion adds no strength to the
applicants’ case. In respect of information deemed to be the
subject of legal privilege, the
court in
BDFM Publishers
held:
[47]
Moreover, in divining the exact nature of the right, its rationale
must dictate the nature of the right. The rationale for
the concept
of legal advice privilege has been distilled from what has been
understood to be the essence of the adversarial legal
system. The
right of a person to a guarantee of confidentiality over
communications with that person's legal advisor is an
indispensable
attribute of the right to counsel and the adversarial litigation
system. The professional duty of legal practitioners
towards their
clients is inseparable from the duty to respect their clients' wishes
about the secrets revealed by the clients and
the confidential advice
given to the clients. The legal advisor is by reason of that
relationship forbidden to reveal the
communications in any
proceedings because the relationship between the legal advisor and
the client establishes a right by the
client against the legal
advisor to preserve confidentiality. It is plain that the privilege
is so called precisely because it
is an exception to the rule about
what
must
be adduced.
[48]
By invoking such legal advice privilege, no less than litigation
privilege, the client invokes a 'negative' right, ie the right
entitles a client to refuse disclosure by holding up the
shield
of privilege
. What the right to refuse to disclose legal advice
in proceedings cannot be is a 'positive right', ie a right to
protection
from the world learning of the advice if the advice is
revealed to the world without authorisation. The client may indeed
restrain
a legal advisor on the grounds of their relationship and may
also restrain a thief who takes a document evidencing confidential
information on delictual grounds.’
[49]
But if the confidentiality is lost and the world comes to know of the
information, there is no remedy in law to restrain publication
by
strangers who learn of it. This is because what the law gives to the
client is a 'privilege' to refuse to disclose, not a right
to
suppress publication if the confidentiality is breached. A client
must take steps to secure the confidentiality and, if these
steps
prove ineffective, the quality or attribute of confidentiality in the
legal advice is dissipated. The concept of legal advice
privilege
does not exist to secure confidentiality against misappropriation; it
exists solely to legitimise a client in proceedings
refusing to
divulge the subject-matter of communications with a legal advisor,
received in confidence. This vulnerability
to loss of the
confidentiality of the information over which a claim of privilege
can and is made, flows from the nature of the
right itself.
[41] Does the subject
matter of the data files place the information in a category which
the public interest requires not to be
revealed? There are
examples where the publication of private details is indeed not
appropriate for publication. For example,
usually, the details of
family squabbles over children may not be shared with the public.
The classic illustration of the
forbidden category is that in
Tshabalala–Msimang
v Makanya
[19]
in which the publication
of the applicant’s personal medical records was forestalled on
the principle that there could be
no public interest that trumped the
rights to privacy of the applicant. This was so notwithstanding that
the applicant as a cabinet
member was a public figure of considerable
stature and was embroiled in a controversy over her allegedly
questionable decision
- making in respect the issue of an existential
threat to the health of the South African populace and the death of
thousands from
Aids infections.
[42] In
Financial Mail
(Pty) Ltd v Sage Holdings Ltd
1993 (2) SA) 451
(AD),
The
Appellate Division, in the pre-Constitutional era, dealt with a case
in which the current confidential information about Sage’s
current business dealings were obtained by a phone tap and then
disseminated to the press. The Court interdicted the information
so
derived from publication. On the facts, the court found that there
was no public interest demonstrated in the dissemination
of the
information. It was held thus at 452E – 463G:
‘
I
need not essay a definition of the right to privacy. Suffice it to
identify two forms which an invasion thereof may take, viz
(i) an
unlawful intrusion upon the personal privacy of another and (ii) the
unlawful publication of private facts about a person
(see
McQuoid-Mason
the
Law of Privacy in South Africa
at
37-9, 86-8, 135
et
seq
,
169
et
seq; Deliktereg (op cit
at
346-7); Neethling
Persoonlikheidsreg
2nd
ed at 217-34). Of course, not all such intrusions or publications are
unlawful. And in demarcating the boundary between lawfulness
and
unlawfulness in this field, the Court must have regard to the
particular facts of the case and judge them in the light of
contemporary
boni
mores
and
the general sense of justice of the community as perceived by
the Court (cf
Schultz
v Butt
1986
(3) SA 667
(A) at 679B-C;
S
v A and Another
1971
(2) SA 293 (T)
at 299C-D;
S
v I and Another
1976
(1) SA 781
(RA) at 788H-789B;
Deliktereg
(op cit
at
346)). Often, as was pointed out by Joffe J (see reported judgment at
130C-131E), a decision on the issue of unlawfulness will involve
a consideration and a weighing of competing interests. For example,
in the case of
S
v I and Another (supra)
the
Appellate Division of Rhodesia held (in a prosecution for
criminal
injuria)
that
where an estranged wife, together with a private detective employed
by her, had peeped at night into her husband's bedroom,
this invasion
of his privacy was 'justified' in that they did so solely with
the
bona
fide
motive
ofobtaining evidence of the husband's adultery; and that accordingly
the wife and private detective were not guilty of criminal
injuria
.
Here the Court had to weigh the husband's right to privacy against
the wife's interest in obtaining evidence of his infidelity.
Similarly, in a case of the publication in the press of private facts
about a person, the person's interest in preventing the public
disclosure of such facts must be weighed against the interest of
the public, if any, to be informed about such facts. In this
weighing-up process there are usually a number of factors to be taken
into account (see
Persoonlikheidsreg
(op cit
at
243
et
seq)
).
Whether the defendant's competing interest should be regarded as a
ground of justification ('regverdigingsgrond' -
see
Persoonlikheidsreg
(op cit
at
237
et
seq)
)
which rebuts a
prima
facie
unlawfulness
or whether it is simply one of the facts to be taken into
account in determining unlawfulness in the first place
need not now
be considered.
I
now return to the facts of this case. The telephone-tapping which
occurred was manifestly an unlawful invasion of the privacy
of Sage
and its corporate executives and appellants did not seek to justify
the tapping; nor is there any acceptable evidence on
record which
would possibly provide such justification. Indeed, I did not
understand appellants' counsel to argue to the contrary.
The actual
tapping, however, is not the real issue in the case. The real issue
is whether appellants, having come into possession
of the tapes that
were produced in the tapping process, were entitled to use
information derived therefrom in an article to
be published in
the
Financial Mail
. Furthermore, it should be pointed out
that in the Court
a quo
the legal proceedings were
for an interdict to prevent unlawful publication; not for damages
arising from an unlawful publication
which had taken place.
In
considering this issue, the fact that the information in question was
obtained by means of an unlawful intrusion upon privacy
is a factor
of major significance. In
Persoonlikheidsreg
, Prof
Neethling states (at 223):
'Dit
behoef myns insiens geen betoog nie dat indien 'n persoon kennis van
private feite deur 'n onregmatige indringingshandeling
bekom, enige
openbaarmaking van sodanige feite deur daardie persoon, of trouens
enige ander persoon, die benadeelde se reg op privaatheid
skend.'
While
I agree, with respect, with this as a general proposition, I would be
hesitant to hold that it is subject to no exceptions.
It might well
be that, if in the case of information obtained by means of an
unlawful intrusion the nature of the information was
such that there
were overriding grounds in favour of the public being informed
thereof, the Court would conclude that publication
of the
information should be permitted, despite its source or the manner in
which it was obtained.’
[43] What is notable
about this decision is that the weight to be given to an unlawful
intrusion is a factor to be taken into account
within the prevailing
social context to determine whether an interdict is appropriate. In
the context of 2023, the broader public
interest about the need to
weed out corruption would be a factor of foremost importance, lending
itself to perhaps a more generous
pragmaticism than in the relatively
innocent age of 1993. Significantly, the information sought to be
broadcast about Sage did
not suggest corrupt activity.
[44] How can the
applicants’ legitimate interests be protected which is
consistent with the public interest? The allegation
is made that the
publications are defamatory; I shall assume without deciding that
they are indeed defamatory. The important question
is however whether
the defaming of the applicants and of Mr Moti is unlawful. The
self-evident reaction is to exercise a right
of rebuttal to the
publications and if need be, sue for unlawful defamation. The
articles contain prolific citations of denials
and challenges by the
applicants, derived from the comment offered to the questions put by
the respondents to the applicants. In
addition, the papers reveal
that the applicants’ Mr Moti has engaged with social media to
voice the applicants’ perspectives.
Conclusions
[45] In summary:
On the law:
1.1 As a general
principle, a journalist who has received information in confidence is
justified in refusing to perform an act which
would unmask the
source, unless the refusal would be inconsistent with the public
interest.
1.2 As a general
principle, an interdict to restrain or forbid an intended publication
by a journalist must be brought on appropriate
notice to the
journalist.
On the facts:
1.4 The ex parte
application was an abuse of the process of court.
1.5 The attempt in the
proceedings in terms of Rule 6(12) c) to claim fresh relief was an
abuse of the process of the court.
1.6 No cogent case has
been made out to compel the respondents to disgorge the data files
which are the subject matter of the application.
1.7 No cogent case has
been made out to interdict the respondents from ` publishing
articles which refer to the data files
provided to them.
The Costs
[46] I have already
alluded to aspects of the prosecution of this case which, on the part
of the applicants, constitute an abuse
of the process of court. There
must be consequences.
[47] There have been
three hearings and prolific papers drawn. Had the applicants
initiated an application in the ordinary way,
even if by way of
urgency, huge effort could have been spared.
[48] In such
circumstances the appropriate order is to mulct the applicants by an
order of costs on the attorney and client scale.
The Order
(1) The order
granted to the applicants on 1 June 2023 and amended on 3 June 2023
is set aside in its entirety.
(2) The applicants
shall bear the costs of the first to Fourth Respondents on the
attorney and client scale including the
costs of two counsel.
Roland Sutherland
Deputy Judge
President, Gauteng Division, Johannesburg
Heard:
27 June 2023
Delivered:
3 July 2023
Appearances:
For
the Applicant:
Adv
V Maleka SC, with him,
Adv
P Strathern SC, Adv L Sisilana, Adv D Wild, Adv S Meyer,
Heads
of argument prepared by Adv V Maleka SC, Adv P Strathern SC, Adv T
Ngukaitobi SC, Adv D Mahon, Adv L Sisilana, Adv K Premhid,
Adv D
Wild, Adv S Meyer
Instructed
by Ulrich Roux & Associates.
For
the First to Fourth Respondents:
Adv
S Budlender SC, with him,
Adv
L Goodman,
Heads
of argument prepared by Adv I Goodman and Adv B Winks
Instructed
by Webber Wentzel.
For
the First to Third Amici Curiae:
For
the First to Third Amici Curiae:
Attorney
M Power
Heads
of argument prepared by Adv M Bishop, Attorney M Power, and Attorney
T Power.
Instructed
by Power & Associates Inc.
For
the Fourth Amicus curiae:
Adv
P Hathorn SC, with him,
Adv
T Masvika and Adv D Sive,
Instructed
by Norton Rose Fulbright Africa Inc
[1]
See:
Shoba,
Officer Commanding Temporary Police Camp, Wagendrift Dam and another
et al
1995 (4) SA 1
(A),
a
case decided in respect of Anton Piller application; at 15 H - I the
three requirements are stated, of which the third articulates
the
proposition.
Further, in a case
similar to this application, where a reconsideration of an ex parte
order was being dealt with, the court in
South African Airways
SOC v BDFM Publishers
2016 (2) SA 561
(GJ)
held at para [22]:
‘
The principle of
audi
alterem partem
is sacrosanct
in the South African legal system. Although, like all other
constitutional values, it is not absolute and
must be flexible
enough to prevent inadvertent harm, the only times that a court will
consider a matter behind a litigant's back
are in exceptional
circumstances. The phrase 'exceptional circumstances' has
regrettably, through overuse and the habits of hyperbole,
lost much
of its impact. To do that phrase justice it must mean 'very rarely'
— only if a countervailing interest is so
compelling that a
compromise is sensible, and then a compromise that is parsimonious
in the deviation allowed. The law on
the procedure is well
established.
’
[2]
It may be noted that the conclusion of the applicants that Van
Niekerk was responsible for the appropriation of digitally held
data
from the servers of the applicants on a great scale is wholly
plausible. Van Niekerk, so the applicants’ investigations
revealed, had during September – October 2022 appropriated
some 4000 data files, said to belong to several entities in
the Moti
Group of companies. Van Niekerk resigned from the employ of the
applicants on 7 October 2022. In November 2022, a former
business
partner, Lutzkie attached documents belonging to the Moti Group in
litigation papers; this is what first alerted the
applicants to the
misappropriation of their documentation.
[3]
The Press Council of South Africa issued in January 2019 ‘The
Code of Ethics and Conduct for the South African Print and
online
Media’ (The Press code) which, inter alia, stipulates thus:
11.
Confidential and Anonymous Sources:
The
media shall:
11.1
protect confidential sources of information – the protection
of sources is a basic principle in a democratic and free
society.
11.2
avoid the use of anonymous sources unless there is no other way to
deal with a story, and shall take care to corroborate
such
information; and
11.3
not publish information that constitutes a breach of confidence,
unless the public interest dictates otherwise.’
[4]
A SLAPP suit is the anagram for Strategic Lawsuit against Public
Participation. The use of that label has widened beyond its
literal
meaning to refer to any legal proceedings by a well-resourced entity
aimed at harassing a vulnerable person or entity
by outspending them
in litigation and thereby forcing a capitulation.
[5]
See:
National
Media Ltd v Bogoshi
1998 (4) SA 1196
(SCA)
where
the principles upon which a journalist who publishes a defamatory
statement which is later proven to be untrue could escape
liability
by being able to show a good faith and reasonable belief in the
accuracy of the falsehood.
[6]
The Provisions of the Cyber Crimes Act of 19 of 2020 as they apply
to Van Niekerk’s conduct probably do establish that
his acts
were criminal – at least on the version of the applicants. I
deliberately refrain from trying Van Niekerk’s
case in his
absence from these proceedings.
[7]
See para 8.4 of this judgment supra, where the respondents’
attorney’s letter is cited: in para 4.2 and 4,3 it is
stated
what the ‘relationship’ of the respondents is to the
‘documentation’.
[8]
1993
(1) SA 833
(W) at 842H – 845 A.
[9]
In the reconsideration hearing, an attempt was made to suggest that
the Cyber Crimes Act 19 of 2020 which declares the crime
of theft to
encompass not only the misappropriation of data but also the
possession of data helped to overcome the proposition
upheld in
Wastetech.
The relevant text in
section 3 re
ads: ‘(1) Any person who
unlawfully and intentionally intercepts data, …., is guilty
of an offence. (2) Any person
who unlawfully and intentionally
possesses data or the output of data, with the knowledge that such
data was intercepted unlawfully
as contemplated in subsection (1),
is guilty of an offence’.
In
my view this text does not assist. The text suggests that possession
must be
unlawful
possession
independently
of knowledge of its being wrongfully procured. Moreover, the
expansion of the concept of theft for the purposes
of imposing
criminal liability does not automatically extend beyond the compass
of the problem the statute was intended to address.
Certain
remarks made in
ABSA Insurance and Financial Advisers (Pty) v
Moller
[2014] ZAWCHC 176
(21 November 2014) at para [10]
were
referred to as suggestive that the point made in
Wastetech
was compromised
.
The Court in that case stated that the
categorisation of the relief as vindicatory in an Anton Piller
application, although said
to be incorrect, was not destructive of
the validity of the claim for seizure of certain information in a
procedure as an Anton
Piller application. This observation does not
diminish the effect of the decision in
Wastetech.
[10]
2013
(2) SA 570 (GSJ)
[11]
2021(3)
SA 246 (CC)
[12]
22 Eur.
Ct H R 123 (1996)
[13]
2012
(6) SA 443
(CC)
[14]
2007
(5) SA 540 (SCA).
[15]
National
Treasury v Opposition to Urban Tolling Alliance
2012 (6) SA 223
(CC);
see
para [45]
[16]
The need to prove confidentiality in the context of a restraint of
trade application was set out
in
Alum-Phos (Pty) Ltd v Spatz and another
(1997) 1 ALL SA 616
(GP)
at
623:
‘
In
order to qualify as confidential information, the information
concerned must comply with three requirements. First, it must
involve and be capable of application in trade or industry: i.e., it
must be useful (Van Heerden & Neethling,
Unlawful
competition
at
225). Second, it must not be public knowledge and public property:
i.e. objectively determined it must be known only to a restricted
number of people or to a closed circle (
Saltman
Engineering Co Ltd v Campbell Engineering Co Ltd
[1948]
65 RPC 203
(CA) at 211 and 215:
Harvey
Tiling Co
(
Pty
)
Ltd
v Rodomac
(
Pty
)
Ltd
1977 (1) SA 316 (T)
at 321G-H:
Van
Castricum v Theunissen and another
1993 (2) SA 726 (T)
at 731C-E and the cases there cited). Third, the information
objectively determined must
be of economic value to the person
seeking to protect it (
Coolair
Ventilator Co
(
SA
)
(
Pty
)
Limited
v Liebenberg
1967 (1) SA 686 (W)
at 691B-C:
Van
Castricum v Theunissen supra
at
732A-F). The nature of the information is irrelevant. If it complies
with the requirements stated it will be confidential (
SA
Historical Mint
(
Pty
)
Ltd
v Sutcliffe and
another
1983 (2) SA 84 (C)
at 89H-90D:
Meter
Systems Holdings Limited v Venter
1993 (1) SA 409 (W)
at 428A-430H). Ordinary general infor- mation about a business does
not become confidential
because the proprietor chooses to call it
confidential (
SA
Historical Mint
(
Pty
)
Ltd
v Sutcliffe and another supra
at
89H). Whether or not what appears to be a commonplace piece of
business information is confidential will depend on all the
relevant
circumstances (
SA
Historical Mint
(
Pty
)
Ltd
v Sutcliffe and another supra
at
90A-C).
’
[17]
2010
(1) SA 280 (GSJ)
[18]
2016
(2) SA 562 (GJ)
[19]
[2007] ZAGPHC 161
;
2008
(6) SA 102
(W)
sino noindex
make_database footer start
Similar Cases
Mazibuko v Passenger Rail Agency of South Africa (6371/2017) [2024] ZAGPJHC 585 (21 June 2024)
[2024] ZAGPJHC 585High Court of South Africa (Gauteng Division, Johannesburg)99% similar
Mazibuko v S (A304/2017) [2025] ZAGPJHC 845 (21 August 2025)
[2025] ZAGPJHC 845High Court of South Africa (Gauteng Division, Johannesburg)99% similar
Mazwai v Nkosi (2021/14182) [2024] ZAGPJHC 86 (30 January 2024)
[2024] ZAGPJHC 86High Court of South Africa (Gauteng Division, Johannesburg)99% similar
Mazule Energy and Resources (Pty) Ltd v Tulsalogix (Pty) Ltd (2021/12086) [2022] ZAGPJHC 139 (14 March 2022)
[2022] ZAGPJHC 139High Court of South Africa (Gauteng Division, Johannesburg)99% similar
Mazibo v Mahlangu and Another (038392/2023) [2024] ZAGPJHC 201 (29 February 2024)
[2024] ZAGPJHC 201High Court of South Africa (Gauteng Division, Johannesburg)99% similar