Supreme Court Act, 1959
R 385
Electronic Communications Act, 2005 (Act No. 36 of 2005)RegulationsRegulations on the use of Television White Spaces, 201815. Geo-location Spectrum Database Security Mechanisms |
(1) | Communications security must be instituted to protect GLSDs from unauthorised data input and modification. |
(2) | Authentication procedures must be instituted to ensure that GLSDs are protected from unauthorised alteration of stored data. |
(3) | Communications between secondary GLSD and WSDs must be secured to prevent unauthorized parties from accessing or modifying information during transmission. |
(4) | Communications between reference GLSD and secondary GLSDs must be secured to prevent unauthorized parties from accessing or modifying information during transmission. |
(5) | Communications among secondary GLSDs must be secured to prevent unauthorized parties from accessing or modifying information during transmission. |
(6) | Communications between Master WSDs and Client WSDs must be secured to prevent unauthorized parties from accessing or modifying information during transmission. |
(7) | GLSDs must incorporate sufficient security measures to prevent the unauthorised WSDs from accessing GLSDs. |
(8) | A Master WSD must only obtain Operational Parameters from a secondary GLSD authorised by the Authority for the purpose. |