KNOWLEDGE IS THE KEY TO RICHES . IS THE LAW ( OR ANYTHING ELSE ) PROTECTING IT ADEQUATELY ?

Information has brought about a new way of thinking and trading and a new concept of what is really valuable. In the present article the author explores whether efforts to catch up in various areas of law have kept pace with these developments. In the process some nice distinctions have to be made between data, information and intelligence and the various senses in which these terms are being used, depending on the context. In the end, one has to turn to legal philosophy and concepts such as post-modernism and empiricism in order to try to find a satisfying answer.


Introduction
In my own humble opinion, the life of Sir Francis Bacon was a good illustration of the abstract theories he espoused.Not only did he invent the scientific method of empiric investigation, but he is also well-known for informed works of science fiction such as Atlantis.Some people 1 are of the opinion that only a man of his erudite learning possessed the skill and talent to author works of genius such as the plays of "Shakespeare", the latter being a character whose curriculum vitae does not quite measure up to these standards.
Whatever the pros and cons of his other utterances, there is little doubt of the prophetic wisdom of Bacon's statement as quoted at the beginning of this article, particularly at the beginning of the 21 st Century.Amongst all his other talents, Bacon was a lawyer too and he should, perhaps, have warned us of the law's lack of capacity 2 to protect data, information, knowledge or even wisdom.
At the risk of over-simplifying matters, this is probably as a result of the development of technology's outpacing legal development by a considerable distance.
In a previous article 3 endeavoured to explain how the invention of certain Industrial Age technologies, such as the printing press (by Gutenberg) and PER / PELJ 2008(11)4 3/184 movable type (by Caxton), forced the legal system to conceptualise and invent a whole new branch of the law, namely that of Intellectual Property (IP) law.IP law has coped reasonably well with that generation of technologies, but has proved to be less adept in dealing with the very latest technology wave, variously termed 'computer law', 'Information Technology' (IT) and 'Information and Communication Technology' (ICT) law, amongst other similar phrases.
These developments have been lumped together descriptively in the term 'The Third Wave ', 4 as representing a qualitatively new wave of development.

2
The Information Revolution (The Third Wave) The phrase, the 'Third Wave', originated with futurologist Alvin Toffler, author of the work by the same name. 5Toffler distinguishes between three so-called 'waves' of technological development. 6e first wave of development took place when kings started rewarding the loyalty of their subjects by giving pieces of land to them.Often a recipient of the king's favour in this kind became known by his piece of land, as, for instance 'the Duke of Norfolk', 'the Earl of Surrey' or even, in the case of the king's heir apparent, 'the Prince of Wales'.In South Africa, the Voortrekker 7 leader Piet Retief tried to earn a grant of land from the King of the Zulus by reclaiming some cattle from another chief.That deal, unfortunately, did not work out and ended with extreme prejudice to one of the parties.
The second wave of development took place in the so-called 'modern' era, perhaps better known as the "age of industrialisation".Because farmers started replacing their manual labourers with farming machinery those, labourers had to move to the cities to help to operate larger and more sophisticated pieces of 4 This term is fully explained under the following heading.5 Toffler The Third Wave.6 See Van der Merwe, supra n 3, 199-200.7  A group of white settlers moving into the interior of South Africa to farm.

D VAN DER MERWE
PER / PELJ 2008(11)4 4/184 industrial machinery. 8A characteristic of the industrial revolution was, of course, when people started organising themselves into organised labour movements, to help prevent exploitation by the capitalists.The ultimate Utopia of this movement was perhaps Mao Tse Toung's vision of "an iron-smelting oven in every back yard".This would simply have caused a lot of pollution and it is only now, having fully embraced the third wave of development, that former 'Third World' countries such as India and China are taking their rightful position amongst other nations.
The second wave was also characterised by excessive centralisation, a phenomenon particularly visible in the civil service.In the name of automation and economies of scale, there was one centralised Post Office, one centralised Railway Company, one centralised provider of electricity, etcetera. 9Instead of economies of scale, the public was confronted with the inefficiencies of a 'civil' service which was anything but, because no competition was built into the system.
The third wave, which is also known as the information age, has changed all of that dramatically.The asset now considered to be most worthwhile is data, information, knowledge; and the interplay between, and even the basic meaning of, these concepts have had different interpretations.One of the present author's favourite taxonomies comes from Tony Twine, as quoted in a previous edition of one of my works. 10At a conference entitled "Knowledge Management -overcoming the information overload", 11 Twine arranged the above concepts in an ascending order of 'data', 'information', 'knowledge' and 'wisdom'.In the fifth place, the concept of 'intelligence' operates as a catalyst for the other four, transforming, say, data to information, information to 8 The present author recalls how a survey (by show of hands) in high school during the 1960s revealed that 80% of our parents had grown up on a farm, whereas we were all being schooled in an urban environment in the rapidly industrialising city of Port Elizabeth.9 South Africa may rue the over-centralisation of the provision of electricity with 'brown-outs' 5/184 knowledge and knowledge to wisdom.He then argues that among the four assets 12 we have been discussing so far, namely land, capital, labour and entrepreneurship, only the last-mentioned asset possesses the intelligence to 'process' the other factors.
Again in the work quoted above, 13 I defined 'data' in an objective sense, in the sense that it lies out there, waiting (like gold ore) for anyone to discover it.
'Knowledge' seems characterised by having become part of a specific person's range of information (often gained by means of experience), whereas 'information' seemed to be a specific person's range of knowledge, but with an element of marketability (transforming it into a commodity) built into it.
'Wisdom', interestingly enough, is defined by an authoritative source 14 as: (possession of) experience and knowledge together with the power of applying them critically or practically, sagacity, prudence, common sense.
It is interesting to note the emphasis in the latter term on practical application and common sense. 15This reminds one of the quote from Kahlil Gibran: "A little knowledge that acts is worth infinitely more than much knowledge that is idle." 16nally, the Concise Oxford Dictionary defines 'intelligence' as "intellect, understanding, quickness of understanding, sagacity, information (especially of military value)".This seems to imply evaluation, which is a good thing according to another well-known source, 17 which finds evaluation to be one of the highest-rated skills and mere understanding to be one of the lowest.As explained above, an interesting shift in emphasis has occurred between the last two major developments, namely from the Industrial to the Information 'revolutions'.More and more companies are appointing 'CIOs'. 18Terms such as 'databases', 'data exchange' and 'data protection' are vying for attention with terms such 'knowledge bases', 'knowledge engineering' and 'knowledge management'.
Each of these terms has developed an own field of expertise surrounding it, with a highly sophisticated group of professionals making a very good living out of mining this new ore.In addition, some very old professions have gained a new lease of life, such as that of the archivist. 19The present article will concentrate on the last-mentioned profession of archivist, because these people (whether we call them 'database managers' or 'knowledge engineers') seem to be the "keepers of the keys" to the gold of the twenty-first century.
18 Chief Information Officers.
19 The oldest profession of all, rather less respectable than that of the archivists, has also adapted quite well to the IT world, but perhaps the less said about that, the better!PER / PELJ 2008(11)4

7/184
One of the foremost archivists, Lester J Cappon, was of the opinion that an archivist was "somewhere between the librarian and the historian". 20He saw prior stages of the "the still-emergent discipline" as much less developed than even at the stage of his writing that particular article (in 1940). 21

8/184
On the other hand, one also finds an equally impressive list of words with the antecedents 'archa' or 'archae-', where the relevant prefixes may be translated as 'ancient' or 'pre-historical'. 28Examples of these include 'archaeology', 'archaic' and 'archaeopterix' (the last meaning "the oldest known fossil bird, with a tail like a reptile's")!This etymological debate is not quite as tangential to the main theme of this article as it might prima facie appear to be.According to archival science, as well as according to the Oxford Dictionary definition, archivists should confine themselves to public or corporate records and should leave 'private papers' to the 'historians'.To my mind, such a limiting definition simply means that archival science is denying itself the important role it was surely destined to play in the brave new world of Information and Communications Technology (ICT).This is acknowledged in the work on Lester Cappon quoted above, 29 where the fact is bemoaned that personal manuscripts have been ignored by archivists "missing the fact that archives encompass personal papers".
More germane to the central theme of the present article is what the effect of modern technology, with its emphasis on ICT, is likely to have on archives and archival science.Cappon was still of the 'old school' in this respect and "began to argue with archivists who thought that the new technologies were transforming basic principles" (of archival science). 30A sympathetic commentator feels that this might simply be because Cappon had been upon the scene for too long when the computer made its entrance: Had the issue of machine-readable or electronic records emerged in full force a decade or two earlier, I think we would have seen Cappon delve into the history of recordkeeping as he had genealogical research or documentary editing or the administration of presidential libraries.1.An infrequently accessed but comprehensive collection of data.The first part of the definition obviously tries to convey that it refers to data which has been placed "in a cupboard" for a considerable period of time, for possible use later on.It seems to imply a longer period of time than ordinary ICT 'storage', which happens every few minutes automatically when one is busy working on an ordinary word-processing program, for instance. 33e second part of the definition incorporates the technical process of 'compression', for which there is really no equivalent in the older world of paper documents.The data undergoes a conversion which dramatically decreases the size of the file concerned, and each of the three main computer operating systems has its own version of a compression program.It is therefore a form of 'deep storage' which needs a (computer-based) technical process to unlock the data for further use.

A file
For purposes of the Law of Evidence it is interesting to note that the compression process also enables the receiving machine to detect whether the data message has undergone any changes en route.It does so by keeping count of all the bits and bytes which have been compressed into a 'hash total' before going on its inter-computer journey, and counting these again when they arrive on the other side.The digital effects of computers on information which 10/184 has to be brought before court as evidence have been adequately explored by the present author in other articles and the reader is referred to those sources for further reference. 34Perhaps one of the main points to keep in mind is the distinction between the 'Paper' and the 'Protocol' approaches.The former tries to approximate the record-keeping and security functions of paper as closely as possible, going so far as to try to replicate the traditional best-evidence rule by creating an artificial 'original' from one of the many print-outs.The 'Protocol' approach gets away from paper, 'hard copies' and 'wet signatures' entirely and places its trust in an adherence to standards and best practice, especially those adopted by those engaged "in the ordinary course of business".
In conclusion though, it would seem that data -knowledge -or information science is going to struggle to protect data (whether 'raw' or in one of its more refined forms) adequately without the normative and coercive support of the courts and the lawyers. 35It is this topic which will be explored under the next heading.In order to keep from having to make the quadruple distinction between all of these abovementioned forms, the present article will simply use the term 'knowledge', even though it might not be quite correct in the technical sense.

Has the Law kept up with developments in Information
Technology?

The Law of Intellectual Property
The Law of Intellectual Property ('IP law') has unfortunately not coped as well with the Information Era as it has with the Industrial Era.Nonetheless, the question still remains: Can one register a patent on information?A practical illustration, showing that this is not merely an academic debate, is the struggle continuing around the promising data structure XML. 41I have explored the benefits of XML in another article, 42 but suffice it to say that it enables users to extract much better value out of their databases.It may be compared to the metal smelter/purifier extracting the refined product from the ore which has been mined.The fact that Microsoft has spent so much time and effort in trying to patent its own 'flavour' of XML, called OOXML, 43 shows that the company has firmly placed its trust in patent to protect one of its most precious assets, namely information, as well as into one of the most valuable tools for imposing structure onto information.
The matter is finally settled neither in the United Kingdom nor in South Africa.In the former country, the government is appealing a High Court court ruling that granted the company Symbian a right of patent in certain 'firmware' which drives the Dynamic Link Library (DLL) in many operating systems. 44The South

12/184
African Minister of Public Service and Administration, Geraldine Fraser-Moloketi, at a recent inter-Africa conference (in Senegal) criticised the firm Microsoft for pushing its own (expensive) software instead of adopting the (free) Open Document Format. 45us an idea, by itself, is firmly excluded from patentability by the South African Patent Act. 46Nonetheless, the fact that a patentable 'contraption' still has to be adequately described and the description itself lodged with the Patent Office before a patent may be granted means that supplying information 47 is an important step towards obtaining a valid patent.
Copyright law has, almost as an afterthought, also decided to protect information.After an amendment by the Copyright Amendment Act, 48 the South African Copyright Act 49 has now been specifically changed in this regard.
Section One has always listed a 'literary work' as one of the categories of works which may be protected by copyright.The Amendment Act has now extended the definition so as to also include 'tables and compilations' under literary works.
There is no doubt that 'tables and compilations' would probably include certain structured information, but the question remains exactly how far the definition goes in this regard.In her work Recordkeeping Ethics and the Law 50 Livia Iacovino expresses optimism as to the capabilities of copyright to protect information: Intangible personal property, protected through intellectual property (law), in particular copyright, patents and trademarks, has been the major developmental areas in Internet regulation.Copyright, in particular, because of its obvious connection to the content on the Internet, may provide a preferable legal means of ownership of 13/184 electronic records rather than concepts of personal property already discussed.
Personally, I would rather go along with the opinion of John Perry Barlow 51 (as quoted in Lawrence Lessig's Code), 52 who is rather more pessimistic about the potential of the Law of Intellectual Property to protect information: (C)opyright and patent law was designed to convey forms and methods of expression entirely different from the vaporous cargo it is now being asked to carry.Does the criminal law hold out any better hope for adequate legal protections of 'the vaporous cargo' represented by information?This will be discussed under the next heading.

Criminal Law
Before one gets to information crime, one should perhaps look at information security because "an ounce of prevention is worth a pound of cure". 53The area of information security is also one that is well-developed but space will not allow us to explore this field adequately in the present article.Suffice it to say that encryption is probably one of the most effective ways to prevent unauthorised persons from getting access to sensitive information.
As was said above, encryption is also one way of making sure that information comes before court in the form of uncorrupted evidence.The ways in which information helps the law to 'do its job' may be termed 'legal informatics', in contrast to 'informatics law', where the law has to try and help information scientists solve their troubles. 54 14/184 Can one steal information?Using the computer as a tool in order to steal money 56 is, of course, not quite the same thing.To give a brief answer to this question, the British decision of Oxford v Moss 57 decided that a student looking at an examination paper cannot be charged with theft, because the information contained in the paper was not 'corporeal' enough.
In one of the earliest works on computer crime in South Africa (entitled, quite aptly, Computer Crime in South Africa) 58 the authors split computer crime up into several categories.One of these types is entitled 'Theft of information'.
In a prior work, Computers and the Law, 59 the present author's reaction to the outcome of the cases cited in this work was not very flattering: The second category, theft of information, did not lead to any legal sanction in any of the cases discussed.The worst thing that happened to any of the perpetrators was a reprimand!Most of the cases involved unauthorised users looking at information or authorised users later on making use of information in unauthorised ways.All these cases seem to me to illustrate that information is an exceedingly valuable asset and that it would be a defect in the criminal law to deny dogmatically the possibility of the theft of information or even to try to and force all such cases in to the mould of trade secrets. 60is stands in very sharp contrast to any type of information which might be of use to the military.It is popularly assumed that "spies might be shot".
Reference has been made above 61 to the concept of 'intelligence', which would seem to highest up in the various forms of information, because it supplies the logical and conceptual infrastructure to help make sense of the incoming streaming of data by evaluating such data: 56 Even though the 'money' might be in a digitised form.57 (1978)  "crime intelligence" means intelligence used in the prevention of crime or to conduct criminal investigations and to prepare evidence for the purpose of law enforcement and the prosecution of offenders; "departmental intelligence" means intelligence about any threat or potential threat to the national security and stability of the Republic which falls within the functions of a department of State, and includes intelligence needed by such department in order to neutralise such a threat; "domestic intelligence" means intelligence on any internal activity, factor or development which is detrimental to the national stability of the Republic, as well as threats or potential threats to the constitutional order of the Republic and the safety and the well-being of its people; "domestic military intelligence" means intelligence required for the planning and conduct of military operations within the Republic to ensure security and stability for its people.
From the above four definitions it is clear that the first two should do excellently well to combat ordinary crime, of the type with which South Africa seems presently to be over-burdened with.The relevant 'department' spoken of could be the Department of Justice, the Police, Prisons et cetera.

16/184
The last two would seem to fit in better with one's conventional idea of espionage and counter-espionage in the form of 'intelligence-gathering'.The same would go for the corresponding concepts of 'foreign intelligence': "foreign intelligence" means intelligence on any external threat or potential threat to the national interests of the Republic and its people, and intelligence regarding opportunities relevant to the protection and promotion of such national interests irrespective of whether or not it can be used in the formulation of the foreign policy of the Republic and (especially) "foreign military intelligence": "foreign military intelligence" means intelligence regarding the war potential and military establishment of foreign countries (including their capabilities, intentions, strategies and tactics) which can be used by the Republic in the planning of its military forces in time of peace and for the conduct of military operations in time of war.
It is a pity that the Act has not given us a pure definition of intelligence by itself, given the tremendous importance which all these definitions obviously attach to the concept of 'intelligence'.In the end, one would probably not be too far off from the Concise Oxford Dictionary definition 65 of "information (especially of military value)".
Besides the protection and gathering of intelligence, the South African Parliament has also tried to arrange for the same to be done with regard to 'information', by means of a Protection of Information Act. 66 17/184 Nature of information 4. 'Information,' for the purposes of this Act includes any facts, particulars or details of any kind, whether true or false, and contained in any form, whether material or not, including, but not limited to: (a) Documents, records, data, communications and the like whether in paper, electronic, digital, audio-visual format, DVD, microform C, microfilm and microfiche form or format or any other form or format; and (b) conversations, opinions, intellectual knowledge, voice communications and the like not contained in material or physical form or format.
In the opinion of the present author it seems strange to classify documents, records and communications next to data, whereas the foregoing really all consist of manifestations of data, especially when in digital format.18/184 waardige inligting".The adjective is impossible to translate with one word, and one would probably have to come up with a phrase such as 'information which is worthy of protection'.Of interest, too, is her introduction of concepts such as 'ideas' and 'wisdom', which she discusses together with the concepts that the reader has been confronted with so far.
In summation, on the public law side information seems to be given its proper protection, especially when any kind of war-like, espionage situation is involved.
The same cannot be said of the private law, however.There is no doubt that a great amount of industrial espionage takes place, yet it seems that the criminal law is not overly concerned with, or perhaps capable of, protecting the victims in this instance.

Private Law
After the work entitled 1984, 71 the prospect of one's personal privacy being invaded by an 'all-seeing eye' is probably everyone's favourite nightmare.
However, using a modern version of the law of contract in order to accomplish 'e-commerce' is as much part of modern private law as is taking one's refuge in the law of privacy.One would, for instance, sometimes have to give up some information 'voluntarily' in order to take part in e-commerce, thus suffering the lesser of the two evils.
Because of South African private law's unique development in this regard, 72 it would not serve much purpose to look comparatively at the "Law of Obligations" of countries such as the United Kingdom, Canada, Australia and New Zealand.
Looking at the concept of the protection of personal privacy first, what has developed into a very well-profiled area of law in these (and many other) 71 A book written in 1948 by George Orwell (also author of the futuristic Animal Farm).To express the future in the title of the first book he simply swopped around the final two digits of the year he was writing in.72 Being an uncodified civil law system, based on Roman law as it was developed by the Dutch before that country's system was codified.Annaliese Roos describes the contents of this last concept as follows: Data protection 73 can be defined as a set of measures aimed at safeguarding individuals (or persons) (called data subjects) from harm resulting from the computerised or manual processing of their personal information by data controllers.These measures embody a group of principles on the processing of personal information.
According to Roos, 74 the concept of 'personal data' can be defined as: any information relating to an identified or identifiable person.An identifiable person is one who can be identified directly or indirectly by reference to an identification number or to one or more other factors that are specific to the person's physical, physiological, mental, economic, cultural or social identity.
Even though the South African Constitution 75 guarantees each citizen the right to privacy, legislation along the lines recommended has been a long time in coming.The South African Law Reform Committee (SALRC) has brought out a concept proposal in this regard in the form of a draft Bill and legislation along those lines will probably be enacted in the near future.The product of the SALRC is entitled Privacy and data protection 76 and shows evidence of careful research.It is to be hoped that the legislation will not bedelayed any further, for whatever reasons.
The ECT Act contains a number of sections in this regard, 77 but these are not binding on participants in the process of electronic commerce.

21/184
As the Internet empowers citizens and democratizes societies, it is also changing the way business is conducted: entrepreneurs are able to start new businesses more easily by accessing the Internet's worldwide network of customers; world trade involving computer software, entertainment products, information services, professional consulting, financial services, education businesses, medical diagnostics, advertising, and technical services is increasing rapidly as the Internet dramatically lowers costs and facilitates new types of commercial transactions; engineers, product developers, and managers thousands of miles apart can collaborate to design and manufacture new products more efficiently; businesses can work more efficiently with their suppliers and customers; consumers have greater choice and can shop in their homes for a wide variety of products from manufacturers and retailers all over the world, and they will be able to view these products on their computers or televisions, access information about the products, and order and pay for their choices, all from their living rooms.
According to Eiselen, Chapter III of the ECT Act 83 has now firmly taken South Africa into the e-commerce era.He notes that many people had expected 'Electronic Data Interchange' (EDI) to be huge success, but that this technology has been almost entirely replaced by people contracting directly with each other by means of the Internet.EDI was a form of regular 'business-to-business' (B2B) 84 electronic contact with fixed trading partners, whereas the Internet, of course, enables 'business-to-customer' (B2C) electronic contact, on a twentyfour-hours-a-day basis, if necessary.In this regard, Amazon.com is probably the example that springs to mind almost immediately, in that it sells its books (and related products) to the world by means of the Internet.
As with Criminal Law, Private Law seems to be having mixed success in South Africa.Privacy is still not protected and the Law of Things is uncertain, whereas electronic contracting is taking place every minute and being governed by the provisions of the ECT Act.With the latter one has to keep in mind, however, that the Internet is simply an instrument by means of which (ordinary) goods are bought and sold.

22/184
As soon as one starts dealing with information itself as the object of the electronic transactions on the Internet, the situation becomes slightly more complicated.The success stories in this regard, namely sites such as 'Google' 85 and the 'Wikipedia', 86 do not charge for their services at all.
The final question to be answered as far as e-commerce in the form of trading in information is concerned is how sites such as Google "make a living".The answer probably lies in the number of visitors which such Internet sites attract daily. 87The fact that there are so many "feet on the beat" means that advertising on such a site becomes a prized commodity -so prized, in fact, that it probably pays the running costs of the site itself as well as handsome profit for the founders and proprietors.In addition, the site owners gather valuable information concerning their electronic visitors, which information may be further sold.

Legal philosophy
In a field as complicated as the present one, it often helps to go back to the fundamental principles of law in order to find guiding principles of law which would help to answer difficult legal questions.

23/184
Another good example of this 'convergence' is how the (legally) distinct categories of goods, which were severally protected by copyright, have now merged into 'multimedia' products, which cannot be situated easily in any one category.An example here would be the multimedia encyclopaedia 'Encarta', 90 which contains audio, video, music and a lot of text.It is time for copyright lawyers to show some vision and start thinking "out of the box".
In her work Recordkeeping, Ethics and the Law, Livia Iacovino does a manful (sic) job of marrying the law and record-keeping to the online world.She contrasts three different models in this regard, namely the postmodernist, the historical-analytical and the practice skills models. 91Iacovino seems to favour the postmodernist stance.This may be described as a reaction against the Kantian classification of everything into absolute categories, as a rediscovery of values and as the realisation that every legal subject might be a "law unto themselves".Even though she admits that "postmodernism has not had much direct impact on legal thinking and practice" 92 there is hope that the influence which this system of philosophy has had on European thinking might lead to a convergence in approach by legal systems, including those having to deal with information matters.This view is supported by Reinhard Zimmermann in his work The Law of Obligations: Roman Foundations of the Civilian Tradition. 93He makes it clear that in the Law of Obligations, particularly at the structural level, the differences between common and civil law systems are not that great.
On the public law side, governance in the world of the Internet is also an interesting matter, because this would determine who the law-giver should be.24/184 impossible, for a government to control its own citizens when they are wandering around in cyberspace: 95 Governments, for example Singapore, have been unsuccessful at control over the content distributed over the Internet, due to regulatory arbitrage, which allows moving an activity to a jurisdiction which is favourable to non-control.
Another victory for the postmodernists, it would seem therefore!

Conclusion
If the present author had to choose between the two absolute models presented under the previous heading, one would probably have to come down on the side of postmodernist stance.There might be a middle way, however, which would also fundamentally affect the way in which one views the relationship between law and information.
This article started with a reference to the English author and philosopher, Sir Francis Bacon.Bacon seems to be placed firmly on the 'scientific' side of the above debate.He would seem to be more of an empiricist, however, arguing by induction from specific (observations) to general (conclusions), than a theorist, arguing by deduction from general (theorems) to specific conclusions.Bacon has been called "the great genius behind the scientific revolution" and historians of the philosophy of science have seen in him the beginning of inductive reasoning. 96en though "(t)oday's historians of science try to present Bacon as a thorough-going materialist" 97 the modern author Black paints another picture in 25/184 that "Bacon also believed in the same ethereal intermediary between spirit and matter as Newton". 98uld this intermediary, acting as a medium between the intangible and the tangible, be information itself?Could this be the 'vaporous cargo' referred to above? 99 According to Marshall McLuhan's work Understanding Media, 100 specifically in the essay entitled "The Medium is the Massage", 101 this might very well be the case.Only when a society or an industry starts dealing with information intensively does it become an 'information society' or an 'information industry': Indeed, it is only too typical that the "content" of any medium blinds us to the character of the medium.It is only today that industries have become aware of the various kinds of business in which they are engaged.When IBM 102 discovered that it was not in the business of making office equipment of business machines, but that it was in the business of processing information, then it began to navigate with clear vision.
What McLuhan seems to be trying to say is that what one is exercising one's wits on might very well influence those very wits themselves in the course of time.In other words, by working with information one becomes 'attuned to' such information and therefore equipped for working with the Information Society.
Whether one calls this educated entity 'mind', 'intellect' or 'spirit' does not really matter -it comes down to a deep understanding.
Hopefully lawyers will lift their heads from their legal practices long enough to do some thinking 103 about the age in which they find themselves and will also be able to deal with informatics law (as well as with legal informatics) "with clear vision". 31 wonders what Cappon (or even more 'modern' archivists) would make of the following definition of the ICT version of an 'archive': The protection of information by means of the Criminal Law has spawned some interesting doctoral research in South Africa.One of the first of these was Die Regsbeskerming van Inligting 69 by Tertius Geldenhuys.He makes the point that it is not so much information itself which is being protected, but individual and community interests with regard to information.These interests may be divided up into private and public law interests.With regard to the private law interests, many categories of information already enjoy protection as the objects of subjective rights.With regard to the public law interests in information, after an exhaustive research Geldenhuys finds that the interests of the executive are perhaps over-protected, particularly as far as state secrets are concerned.In contrast, Catharina Nienaber's Strafregtelike Beskerming van Inligting 70 concentrates a bit more on private law interests, particularly as far as industrial espionage is concerned.Given the uncertainty of the protection of common-law proprietary rights in information, she creates a new concept: "beskermings-69 The Legal Protection of Information (translation).See Geldenhuys Regsbeskerming van Inligting.70 The Protection of Information by means of Criminal Law (translation).See Nienaber Strafregtelike Beskerming van Inligting.
protection of individual privacy by means of protecting personal data, under the title of 'data protection'.

83
Act 25 of 2002.84 And mostly one specific company with another specific company.

D VAN DER MERWE PER / PELJ 2008(11)4
designed for space-efficient storage or distribution that contains two or more original files.In Unix the most popular archive program is tar, which lacks compression capabilities.In Microsoft Windows, WinZip is the most popular archiving and compression program, while Stuff It holds this place among Macintosh users.32 The Law of Patent used to work quite well by giving companies a limited 36 legal monopoly on 34 See for instanceVan der Merwe 2005 Obiter 665ff and 2005 JCRDL 69.35Especially given that ethical and moral restraints seem even lower when data is at stake.36 Twenty years ito the Patents Act 57 of 1977.
It would probably rely on a 'contract' created by the users having clicked on a button entitled 'I agree' before starting the programme.41 'eXtensible Markup Language'.42 Van der Merwe 2005 Obiter 665 ff.43 'Open Office XML'.This is in opposition to the open source program ODF ('Open Document Format').44 Anon 2008 BBCNews http://news.bbc.co.uk/21 Mar.
In this regard, an important part of legal informatics consists of 'forensics' which really means "science in the service of the court".
5551Barlow 1994Wired 85. 52 Lessig Code 264, n 14. 53 According to imperial measure there were 16 ounces to one pound of weight.54 See in this regard the present author's Computers and the Law (2000) 265ff.55 The Latin words forum and forensics mean 'court'.PER / PELJ 2008(11)4 One may very well ask what benefit then accrues to such 'voluntary' participants.The answer 73 From a soon-to-be published work entitled ICT Law together with co-authors Eiselen, Pistorius and Van der Merwe.According to Roos the term originates from the German term 'Datenschutz', although many countries, such as the USA, prefer to use the term data or information privacy, rather than data protection.74 Ibid.75 Constitution of the Republic of South Africa,1996.76 SALRC Privacy and Data Protection Discussion Paper 109 http://www.doj.gov.za/salrc/21 Mar.77 Act 25 of 2002, s 50ff.

95
Ibid, 216.96BlackSecret History of the World 334.97 Ibid.

98
Ibid. 99 See the end of par 4.1 above.100 McLuhan Understanding Media.101 Ibid, 15ff.102 An acronym for 'International Business Machines'.103 It is said that a former chairman of IBM had a single plaque affixed to the wall of each employee's office, reading simply 'THINK!'.