Académique Documents
Professionnel Documents
Culture Documents
IN TANZANIA
i
© Iringa University College –2007
ii
DEDICATION
Dedicated to our dear parents who have supported our academic life since
childhood.
iii
ABSTRACT
iv
This work reveals that steps taken so far with regards to the admissibility of
electronic evidence do not adequately address the gap created by the
advancement of ICT in the Law of Evidence -Tanzania.
The survey conducted reveals that the impact of ICT on rules of evidence can
best be responded to by enacting a comprehensive legislation which gives
legal recognition to electronically generated evidence. Currently, Tanzania
has no law on ICT and on Electronic Transactions in general, despite the fact
that cases related to ICT have started to be referred to courts of law.
v
ACKNOWLEDGEMENTS
The success of this work has, to a great extent depended on efforts, support,
contributions, and encouragement from a number of individuals. Without them
this work would not have been possible to accomplish. Indeed, we are grateful
to all of them. It would have been a good idea to mention all of them by name,
but due to shortage of space, we will only mention a few.
First and foremost, we express our special gratitude to all those who provided
constructive criticisms, comments and suggestions on the first draft of the
original manuscript, as their names appear in the Masters Thesis.
Fourthly, we would like to extend our gratitude to Dr. Sally Harris who had
spent her precious time to proofread the manuscript. Her linguistic comments
and corrections added valuable inputs to this book.
We would like also to thank the Finnish Evangelical Lutheran Mission (FELM),
who, through the IUCo Research and Publication Committee, provided
financial support in the printing and other stages necessary for the production
of this work. All persons mentioned above are in no way responsible for any
omissions, or faulty commissions in this work, for which we remain solely
responsible. We sincerely thank everybody, mentioned and those not
mentioned. To all we say “MAY GOD ALMIGHTY BLESS YOU.”
vi
TABLE OF CONTENTS
Copyright……………………………………………………………………………ii
Abstract……………………………………………………………………………...iv
Acknowledgments……………………………………………………………………vi
Table of contents…………………………………………………………………...vii
Abbreviations………………………………………………………………………..xiv
IN TANZANIA 1
CHAPTER ONE 2
1.1 Introduction………………………………………………………………………..2
1.6 Conclusion………………………………………………………………………..21
CHAPTER TWO 23
vii
2.1 Introduction………………………………………………………………………23
2.5 Conclusion………………………………………………………………………..41
CHAPTER THREE 43
3.1 Introduction………………………………………………………………………43
viii
PART TWO: THE LAW OF EVIDENCE IN TANZANIA 54
CHAPTER FOUR 54
IN LEGAL TRANSACTIONS 54
4.1 Introduction……………………………………………………………………....54
4.6.1 Orally………………………………………………………............................58
4.8 Conclusion…………………………………………………...…………………...66
CHAPTER FIVE 67
5.1 Introduction………………………………………………….…………………...67
5.2 Definition of the Term „Evidence‟ under the Evidence Act, 1967………………67
ix
5.5 Forms and Methods of Presenting Evidence under the Evidence Act,
1967…………………….……………………………… ………………………..68
5.5.2.2 Satisfaction of the Best Evidence Rule under the TEA 1967……............71
TANZANIA 76
CHAPTER SIX 76
6.1 Introduction………………………………………………………………………76
x
6.7 Electronic Signatures: Meeting the Law‟s Functional Requirement……………..87
6.9 Conclusion………………………………………………………………………..92
CHAPTER SEVEN 93
EVIDENCE 93
7.1 Introduction…………………………………………………………...……….....93
xi
7.7.2 Judicial Intervention………………………………………………………...118
7.8 Conclusion………………………………………………………….…………...120
8.1Conclusions…………………………………………….......................................122
8.2 Recommendations………………………………………..……………………..124
REFERENCES 127
APPENDICES 130
xii
ABBREVIATIONS
EU -European Union
UN -United Nations
xiii
UNCITRAL -United Nations Commission of International Trade Law
xiv
PART ONE: ELECTRONIC TRANSACTIONS AND ICT DEVELOPMENT
IN TANZANIA
Kofi A. Annan
Former Secretary-General of the United Nations
1
CHAPTER ONE
1.1 Introduction
1
Ralph Amassah, “Reflecting the Borderless Electronic Commercial Environment in Contracting” in
<http//www.lexmercatoria.org> last accessed, 12/9/2006
2
Tapio Puurunen. Dispute Resolution in International Electronic Commerce, Licentiate Academic
Dissertation, Faculty of Law, University of Helsinki, Helsinki 2005, p.2
2
The main question of the study was whether the law of evidence in Tanzania
accommodates the new methods of adducing evidence resulting from the
advancement of computer technologies. As will be discussed later in this
work, the main part of the law of evidence that has adversely been affected by
ICT is documentary evidence as well as rules of authentication. It is doubtful
whether principles governing admissibility of paper-based documents can be
applied in admitting evidence in electronic form. In January 2007, while this
work was still in progress, a Bill intended to amend various laws was tabled
before Parliament. To keep pace with development in science and
technology, the Evidence Act is among the various laws proposed to be
amended. The Bill proposes to introduce new types of evidence which would
be admissible by courts of law.4 However, the bill leaves a lot to be desired,
as it addresses the whole issue of electronic evidence in a very narrow sense.
This work endeavours to address some of the challenges raised above and
will suggest possible solutions.
5Lederman E., & Shapira R, “Law, Information and Information law”, 2001, Kluwer Law
International, Volume 13 at p. 3
6
Ibid
3
are increasingly using computers to create, transmit and store information in
electronic format.7
7
Malik, V., “Cyber Law: A Comparative Study for the Legal Framework for E-Commerce in India and
the United States”, The Southern Law Journal xii, Fall 2000
8
Kamal, A & Gelbstain E., Information Insecurity: A survival guide to the uncharted territories of
cyber-threats and cyber-security, UNITAR, 2002
9
Ibid
10
Source: International Data Corporation, (Nov 2000), online: http://www.idc.ca ; cited in Industry
Canada, “Canadian Internet Commerce Statistics Summary Sheet” (date accessed: 07 Nov 2000)
11
The source of this information is a document on ICT Policy in Tanzania accessed at
www.ethinktanktz.org/ICTPolicy-Workshop.htm visited on 20/12/2004
12
Ibid
13
Ibid
4
influencing technological innovations and the development of new ICT
products and markets that are relevant to their circumstances.14
Since the mid-1990‟s, the Civil Service Department of Tanzania has initiated a
series of measures for transforming itself into becoming more efficient,
effective, and customer-oriented. These efforts have put in place the
foundations for what is now known as E-Government, while sector reforms
recognize and promote the use of ICT in their respective sectors.15
In the above spirit and like the rest of the continent, Tanzania's banking sector
has made remarkable progress in deployment of ICT by introducing a branch
of banking commonly referred to as electronic banking. The term electronic
banking is defined as “an array of data -processing, electronic and telematic
techniques and infrastructures that make it possible to exchange funds in a
paperless fashion within a two-way and sometimes three-way relationship
between banks, merchants and consumers.”16 Some of the banks have
invested significantly in information technology by introducing different forms
of electronic banking in Tanzania to facilitate electronic cash movement,
Automatic on-line cashier terminals and centralized database-processing
facilities.17Such banks have Cash Machines called ATM (Automatic Teller
Machines) with 24-hour access for customers to cash and basic banking
services. Automatic Teller Machines are electronic terminals that let a bank
customer bank almost any time. To withdraw cash, make deposits, or transfer
funds between accounts, one has to generally insert an ATM card and enter a
PIN.18 Apart from introducing ATMs, Barclays Bank has introduced Business
Master, an electronic cash management proprietary software system that links
14
Ibid
15
Ibid
16
Bwana, A. J., Electronic Banking and Law in Tanzania: Approaches
Postal Bank.
18
See http://www.ftc.gov/bcp/conline/pubs/credit/elbank.htm last accessed on 12/07/2005
5
the customer's computer to the Bank's financial system (PC-Banking). It
enables customers to see their balance and transaction reporting, money
transfers and electronic mail services. The NBC (1997) Ltd has also recently
introduced Internet banking services.19
CRDB Bank Limited has introduced a debit card branded as “Tembo Card”.
This card can be used to withdraw cash from Tembo Card Cash Points or to
purchase goods or services from retail outlets, which accept the card as a
means of payment.20 Tembo Card Cash Points offer cash service 24 hours a
day, 7 days a week.21 The product has a number of benefits: Firstly, it is
protected by Pin thus holders can do their shopping safely; secondly, it is
easier to carry than cash; third and last, customers can access to the Bank
services 24 hours daily at ATMs.22 In addition, CRDB provides PC Banking to
some of its customers.23
19
Bwana J. A., Op. Cit at p. 10
20
see http://www.crdbbank.com/Tembo card.asp last accessed on 14/07/2005
21
Tembo Card Cash Points are available at CRDB Bank branches in Dar es Salaam, Moshi, Arusha,
Mwanza, Dodoma, Morogoro, Tanga, Mtwara, Bukoba, Shinyanga, Mbeya, Iringa, Songea and
Musoma and the Dar es Salaam International Airport.
22
Ibid
23
Bwana, A. J., op cit at p. 11
24
The information is available in the Bank‟s brochures available at the customers‟ care desk in the
Bank‟s premises located in the Headquarters, Dar es Salaam and also in some branches where this
product has so far been introduced.
6
institutionally and at the individual level. For instance, apart from the
Commercial Division of the High Court, court records at the other divisions
and registries of the High Court as well as the Court of Appeal are still kept on
hard copies despite the existence of a number of computers. On the part of
the Commercial Division of the High Court, basic records related to cases
have been computerized. The computerized records enable availability of
case reports including a daily and weekly cause list, which is displayed on
video screens available within the court premises.25 These records however,
are not yet available online.
25
Source: an informal interview held between the Registrar, Commercial Division of the High Court of
Tanzania on 14th May, 2005
7
The problem is aggravated by computer hackers who are technically
knowledgeable people who have skills in software development. They know
how to identify security weaknesses in products.26 Kamal27 points out in
respect of insecurity of computerized information, that in early 2002,
Computer Economics Inc., a U. S. company reported that their estimate for
the total cost of computer virus and worm attacks to the U. S economy
amounted to 17 billion dollars.28 In Tanzania, an elementary survey conducted
by the authors reveals that there are very little known about crimes related to
computers.
As shall be seen below, the laws of evidence are used to dealing with
information contained in a single medium such as printed documents, records,
photographs, newspapers and others of a similar nature. A printed document
or record presents no problem because it appears on a piece of paper. Thus,
an e-mail, though transmitted electronically, presents little problems when
printed on a paper because it is permanently visible. Equally, there should be
no problems in admitting information in electronic form resident in the
computer once printed because it is permanently visible, though it may be
argued that it is hearsay evidence,30 the reason being, such records or
documents are copies of information supplied to the computer by human
26
Kamal, A., Op. Cit, at p. 8 at p. 25
27
Ibid at p.21
28
Ibid
29
See an article entitled Uniform Electronic Evidence Act Consultation Paper, by Uniform Law
Conference of Canada accessed at Uniform Law Conference of Canada at
http://www.law.ualberta.ca/alri/ulc/current/eelev.htm on 25/02/2005
30
See Chissick, M., Op. Cit, at p. 171
8
beings.31 This information is normally created when a document is typed and
saved to a computer hard disk or when an entry is made to the computer
database resident in the computer hard disk.
The field survey revealed that seventy percent of lawyers interviewed are
concerned with the reliability of electronic evidence. They put more trust on
information resident on paper than a similar piece of information in an
electronic form. For example, in court proceedings, a witness swears by
raising a Bible (or any sacred book) on his right hand. The question would be
whether it would be a different thing if another witness were to swear by
raising a compact disk that contains an electronic Bible similar to the one
used by the other witness. Indeed, it is very difficult to convince many people,
including computer literate ones, that the compact disk the witness used to
swear upon contains a similar version of the Bible the other witness had used
to swear upon. Thus, more trust is likely to be accorded to the Bible which can
physically be seen and touched than the one on a compact disk. In a similar
vein, businesspersons, companies and institutions decline to computerize
records and to do away with paper-based records because they are not sure
whether the electronic version of records they keep can be accepted in court
in the event a dispute arises.
The third reason is lack of legal framework. Tanzania has yet to have cyber
laws. This fact is revealed by a survey conducted at the office of the Chief
Parliamentary Draftsman.32 According to this survey, Tanzania currently does
not have a law that recognizes electronic transactions. The Law Reform
Commission of Tanzania in the following words supports this position “While
some countries have adopted the new laws to cover this area, Tanzania is far
behind in this area. Most of her pieces of legislation are offline oriented hence
to be changed to focus online. The rationale behind is to protect consumer
and boost our economy”33. Restating the above, the Commission puts it that
31 Ibid
32
The fact was revealed by Mr. Nzori of the office of the Chief Parliamentary Draftsman, Dar es
Salaam
33
Law Reform Commission of Tanzania position paper on e-commerce, accessed at www.http:lrct.tz
9
“though Electronic Commerce started roughly 10 years ago, in Tanzania there
is no law to regulate this area. Therefore, the importance of having an
effective legal framework to cater across this area cannot be over-
emphasized.”34
It is argued in this work that the shift of the economy as discussed above from
a paper-based to an electronic-based commercial information environment
raises a number of legal challenges. The laws of evidence are among the
main branches of the law that have been affected by advancement of
information communication technology, the main area being documentary
evidence. In a study conducted by the Law Reform Commission of Tanzania
34
A Draft Discussion Paper on the Introduction of a Legal Framework for Electronic Commerce in
Tanzania , by the Law Reform Commission of Tanzania, 2004
35
The author of this work personally attended and participated in the workshop.
10
on introduction of a legal framework for e-commerce in Tanzania, one of the
main concerns raised by stakeholders is admissibility of electronic documents
as original evidence. The Commission accepts the recommendation by the
stakeholders that electronic documents should be tendered and admitted in
courts as original documents and it goes further to propose an amendment of
the Evidence Act, 1967 to accommodate these current changes.36
36
Source: A Draft Discussion Paper on Introduction of a Legal Framework for Electronic Commerce in
Tanzania, a Paper presented by the Law Reform Commission of Tanzania in a Stakeholders Workshop
held on 8th June 2005 in Dar es Salaam, at p. 75. The Act has already been amended to recognize the
electronic documents as evidence, although in our views, the step taken is far from being satisfactory.
37
S. 64(1) of the Tanzania Evidence Act, 1967
38
Ibid at ss. 67 and 68
11
Various countries have enacted cyber laws including the laws of evidence to
address the challenges pointed above. A good example is the Indian
Information Technology Act of 2000, which amends various provisions of the
Indian Evidence Act, 1872 to respond to advancement of technologies. Other
countries that have pursued the same course include Canada, Australia, the
United States of America, Singapore, United Kingdom and South Africa, to
mention but a few. The cyber laws of the above mentioned jurisdictions came
as a response to the call made under the UNCITRAL Model Law on E-
Commerce. The Preamble to this instrument requires countries to harmonise
their laws to give legal recognition to electronic transactions for the aim of
promoting e-commerce. In this respect, various countries adopted this piece
of legislation while others enacted their laws in this respect based on the
principles of the Model Law.
It is in the above spirit that it is argued here that computer technologies are
increasingly eliminating paper-based transactions, resulting in the formation of
a paper-less economy, commonly referred to as E-commerce. It becomes
imperative therefore that the principles of the law of evidence should be re-
examined with the view to accommodating electronic evidence. This will
enable conclusion of contracts and creation of rights and obligations through
an electronic medium.
It is also argued that absence of the legal framework in this area in Tanzania
is likely to impede the growth of E-commerce in Tanzania due to lack of
confidence amongst people who would wish to conclude various transactions
in electronic form.
Issues regarding evidence attract much attention in the common law system,
often with complex rules on which evidence is admissible and which is not.
For example, regardless of how relevant and trustworthy it may seem in a
particular case, “hearsay” is normally not admissible as evidence, except
12
under special circumstances.39 The interest of finding and proving the truth
therefore frequently comes in conflict with the rigid rules of evidence.40
The term „evidence‟ is derived from the Latin word, „Evidentia‟ which means
„being clear‟ or „plain‟, or „apparently clear‟.41 Section 3 of the Evidence Act,
1967 defines the term „evidence‟ to denote “the means by which an alleged
matter of fact, the truth of which if submitted to investigation, is proved or
disproved; and without prejudice to the proceeding generality, includes
statements and admissions by accused persons.”
The word „means‟ used in the definition of the term „evidence‟ above is
defined by the Oxford Advanced Learners‟ Dictionary42 as an action by which
a result is brought about or a method(s). In other words, therefore, evidence is
a method used to present facts in court for the aim of either proving or
disproving an alleged matter.
39
See for instance supra note 3, ss. 62 and 66.
40
See Bogdam, M. Comparative Law, Kluwer Law and Taxation Publishers, Norstedts Juridik Tano,
1994, p.107
41
Rao, S. R., Lectures on Law of Evidence (Indian Evidence Act, 1872 as amended by Act No. 4 of
2003), Asian Law House, 2004
42
Hornby, A. S., Oxford Advanced Learner‟s Dictionary of Current English, Fourth Edition, Oxford
University Press, 1989 at p. 772
43
Buzzard, J. H., Phipson on Evidence, 13th ed. sweet & Mascrel, London 19 & 2 at p.2
13
which govern admissibility of documents are exceptions to the hearsay rule
and the best evidence rule. Exception to the hearsay rule is enshrined in
section 34 of the Tanzania Evidence Act, 1967 that lays down conditions for
admissibility of hearsay evidence. One of the exceptions is when the
statement whether written or oral was made in the ordinary course of
business by a person who cannot be found by reason of either death,
diplomatic immunity, refusal to testify, or the exorbitant expenses of procuring
him. The best evidence rule is provided for under section 63 of the Act, which
provides that contents of documents may be proved by either primary or by
secondary evidence.44 Section 66 of the Tanzania Evidence Act provides for
the best evidence rule as follows:
Primary evidence is defined under section 64(1) which states that primary
evidence is the document itself produced for the inspection of the court. Under
sections 67 and 68, secondary evidence may be admitted in court where the
original cannot be found. The principle stated above was reiterated in Shirin
Rajabali Jessa v. Alipio Zorilla M.45 as follows;
From the analysis of the provisions above, it is clear that the terms
“documents”, “books”, “records”, “written”, “signed” assume existence of a
tangible thing which under, normal circumstances, entails a piece of paper.
The ordinary construction given to these terms excludes evidence derived
from electronic transactions. They are thus suited only to a paper-based
economy. It can therefore correctly be stated that the Evidence Act of 1967
44
Law of Evidence Act, 1967
45
[1973] LRT n. 34
14
was enacted to govern paper-based transactions. The reason is based on the
requirement posed that a document or record must be in writing and must
bear a signature. The main legal challenges facing electronic evidence under
the current paper-based statutes, including the Evidence Act of 1967, is the
requirement of writing and signatures.
15
the law of evidence to facilitate electronic transactions, including e-commerce,
is overdue. It will be suggested that, rather than introducing a few provisions
in the amendment of the Evidence Act as has recently been done, new
comprehensive statute on evidence which will take into account electronic
records in addition to all other aspects of evidence is required. The end result
of whatever approach to be adopted should be a legal framework that provide
for clear guidelines for recognition of electronic evidence in court.
The objective of the study leading to this work was to examine whether the
principles governing recognition and admissibility of evidence under the
Evidence Act, 1967 can accommodate evidence generated from electronic
transactions. This study has therefore identified the problems in relation to
admissibility of electronic evidence, analyzed them and recommended the
solutions based on experiences drawn from various jurisdictions that have
legal frameworks and which recognize electronically obtained evidence in
place.
The study was limited to the assessment of the impact of the advancement of
Information Communication Technology in commercial transactions generally,
16
and on the law of evidence in Tanzania. The various pieces of legislation were
analysed with the main focus on the Evidence Act, 1967. The relevant
information on development of ICT in Tanzania was collected from three
regions, namely Dar es Salaam, Arusha and Mwanza.
The subject of Electronic Transactions and the Law of Evidence has not
attracted many researchers in Tanzania. The consequence of this scenario is
that there is little literature on this subject area. The little literature available is
a few reports by the Law Reform Commission of Tanzania. At the
international level, a number of studies have been done in relation to this
subject. Sarkar46 is one of the famous researchers who explored on
admissibility of electronic evidence under the Indian Evidence Act, 187247 as
amended by Information Technology Act, 2000.48 His work reveals the fact
that the law of evidence of India has undergone many changes as a result of
advancement of information technology. Sarkar‟s work is of great significance
for Tanzania in that Tanzania‟s law of evidence traces its origin to India.
However, the Tanzania Evidence Act, 1967, as shall be elaborated further in
this book, has remained rigid and insensitive to technological changes.
Kahn & Blair49 jointly explored admissibility of electronic mail as evidence. The
work of these authors is very important because it contains a discussion on
the anatomy of the e-mail. The authors point out that, before a court admits an
e-mail, it must be satisfied of its integrity and authenticity. The study, however,
addresses the American position. It will be argued that the study is indeed
relevant in the Tanzania situation because the subject matter of this study is
universal. Moreover, the Internet originated in America and many internet
46
Sarkar, M. C. Sarkar on Evidence, 15th edn, Wadhwa & Company Nagpur, 2001 Vols. I and II.
47
Act No. 1 of 1872 (India)
48
Act No. 21 of 2000
49
Kahn, R. A., & Blair, B. T., The Anatomy of An E-mail Message: Why Good e-Business Records
Require More than Meets the Eye, accessed at http://www.kahnconsultinginc.com/library/KCI-
Anatomy-of-an-Email.pdf on 25/02/2005
17
servers are located in America. Hence, legal development taking place in
America in relation to the internet should have an effect in the Tanzanian legal
system as well.
Eckberg52 in his article warns lawyers “e-mail is the best thing since slippery
banana peels”. According to Eckberg, a survey carried in 840 U. S companies
by Policy Institute and the American Management Association in 2004
revealed that one in five firms have either received subpoenas for employee
e-mail or have used e-mail to defend the firm against allegations of sexual,
racial or other discrimination claims.
50
Accessed at http://www.asianlaws.org/cyberlaw/library/india/cc/dig_evi_legal.htm on 25/02/2005
51
Accessed at http://deltabravo.net/custody/email.htm on 03/03/2005
52
Eckberg J., E-Mail: Messages are evidence, accessed at
http://www.enqurer.com/editions/2004/07/27/biz_biz2.html on 03/03/2005
53
Dror, Yuval, Haaret‟z 21.11.2002 accessed at http://www.aliroo.com/corporate/haaretz.html
accessed on 03/03/2005
18
Glordano54 discussed admissibility and recovery of electronic evidence in both
the California and Federal Courts of the United States of America. The study
though not addressed to the Tanzania situation is important because it
addresses various steps that can be taken to make sure that electronic
evidence is authentic. The study also will be used in this paper as background
material.
Hagberg,55 addressing admissibility of e-mail, noted that e-mail can play a key
role in discovery and trial for the reason that it contains a wealth of
information. The author further discusses a few cases in which e-mail
evidence has played a substantial role despite the fact that some courts are
still grappling with the admissibility of e-mail and documents retrieved from the
computer‟s hard disk.
Harris57 further points out that before the 1983 Computer Evidence Act; South
Africa was rooted in reliance to oral testimony and authentic documents. Proof
of contents of documents is made by production of the original. The law
allows production of copies, but the courts must be convinced that copies
have been produced in the ordinary course of business and subjected to
stringent control mechanisms.
54
Giordano, S. M., Authenticating Electronic Evidence in California and Federal Court,. accessed at
http://www.ceb.com/newsletterv7/Civ_lit.htm on 03/03/2005
55
Hagberg, Karen L., and A. Max Olson. "Shadow Data, E-mail Play a Key Role in Discovery, Trial."
19
An Article prepared by the London Office of Sidley & Austin, 58 is also relevant
to this study because it addresses the circumstances under which e-mail is
admissible as evidence under the Civil Evidence Act 1995 of the United
Kingdom. The study addresses the UK position. However, it will be used as
background material in this study.
Ryan & Shpantzer59 jointly discussed admissibility of digital evidence from the
American perspective. The other author, Krishnamachari60 discusses the law
of evidence of India as amended by the Information Technology Act of 2000.
Similar to Sakar‟s work, Krishnamachari‟s work is important to this study
because it shows how the Indian Evidence Act of 1872 has been amended to
respond to changes brought by computer technologies.
58
Accessed at http://www.sidley.com/cyberlaw_new.asp on 24/2/2005
59
Ryan D. J., & Shpantzer, G., “Legal Aspects of Digital Forensics”, The George Washington
University, Washington, D. C.
60
Krishnamachari, V., Law of Evidence, Fifth Edition, S. Gogia & Company, Hyderabad, 2003
61
Takach, S. G., Computer Law, 2nd ed. (2003) at Chapter 6.
62
See an article entitled Uniform Electronic Evidence Act Consultation Paper, by Uniform Law
Conference of Canada accessed at Uniform Law Conference of Canada at
http://www.law.ualberta.ca/alri/ulc/current/eelev.htm on 25/02/2005
20
Though the studies reviewed above do not describe the situation as prevailing
in Tanzania in respect of the subject under discussion, they are significant
and important to this study because Tanzania is likely to draw from them
some lessons that may assist it in addressing the challenges that computer
technology has posed in the law of evidence. For this reason, the studies will
be used to form the background materials to this study.
It is also expected that the work will lay a foundation for debate or further
discussion that may ultimately lead to having a clear legal framework on
electronic transactions and electronic evidence in Tanzania. It will also
contribute to the availability of literature on the impact of ICT on the rules of
evidence. The findings of this work will also excite further research on this
subject.
1.6 Conclusion
63
See supra note 4
21
electronic documents or to have the current principles applicable to
documentary evidence extended by courts to cover electronic documents,
would lead to having such a proposed legal framework in place. The recent
amendment to the Tanzania Evidence Act is an ideal development. 64 Yet it is
inadequate, given the huge impact posed by ICT on various transactions. The
rationale is to have a law that accommodates new developments caused by
ICT in the law of evidence. It has been observed that computer technology is
rapidly changing the world economy from paper-based to information-based
economy. The law should therefore be able to regulate such information-
based economy for promotion and growth of E-Commerce.
64
Ibid Sections 33-36.
22
CHAPTER TWO:
INTERNATIONAL ELECTRONIC COMMERCE
2.1 Introduction
The origins of the Internet go back to the 1960s when new ways of
communicating between researchers were sought. In 1969, the ARPANET
was established between several U.S universities with support from the U.S
Department of Defence. The ARPANET allowed communication between
users through the “Network Control Protocol” which converted messages into
streams of packets at the source, and then reassembled them back into
messages at the destination. During the first decade, the ARPANET was
mainly used to facilitate e-mail (The first one was sent in 1972,) to support
discussion groups, to allow access to distant databases, and support the
transfer of files between government agencies, companies and universities.
The U.S became briefly interested in the ARPANET as a wartime
communication tool, but this idea was quickly abandoned. During the early
1980s, the TCP/IP Protocol was introduced; it set standards for the flow of
information across networks and allowed the identification of users through
internet addresses or domain names. This gave rise to communication
between various interconnected networks and, thus, the internet was born.
In 1990, the World Wide Web (www) was created, allowing for the first time
the online transmission of web pages, which integrated text and graphics. In
order to facilitate information exchange over the web, various programs and
applications were introduced, which made the once research-oriented system
more accessible for commercial and private use. Commercial activities on the
internet, such as virtual shopping and online banking, started in 1994.
Meanwhile, public support of the internet in the United States had been
largely phased out.
Since its beginning in 1969, the internet has experienced rapid growth. The
number of Internet users grew from 32 in 1972, 1,000,000 in 1992 to
6,499,697,060 in 2006.65
65
Internet World Statistics accessed at http://www.internetworldstats.com/stats.htm on 27 September,
2006. See also Hobbes Zakon, R. “Internet Timeline” 1997; Hafner and Lon, 1996;OECD, 1997f;
Wendel,K. “Internet History”, 1997.
23
The first international online links were established in 1973, with connections
between the United States, the United Kingdom and Norway. In 1997, more
than 110 countries were connected to the Internet and universal coverage
continued increasing to date.
But the Internet is only one among many instruments for creating electronic
transactions. Six main instruments of electronic transactions can be
distinguished: the telephone, the fax, television, electronic payment and
money transfer systems, electronic data interchange (EDI) and the Internet
itself. This list creates a broad definition of “electronic transactions”. In many
discussions, “electronic transactions” refer only to the Internet and other
network-based communications.
24
between individuals themselves, within government, or between the public
and government and, last, between business and government”66
It refers to transactions between buyers and sellers over open computer
networks such as the Internet. It is the paperless exchange of business
information using Electronic Data Interchange (EDI), electronic e-mail,
Electronic bulletin boards, Electronic Funds Transfer and other network based
technologies. Not only does it automate manual processes and paper
transactions, but it also helps organisations move to a fully electronic
environment and change the way they operate businesses.
This definition encompasses the many kinds of business activities that are
being conducted electronically and conveys the notion that electronic
commerce is much more comprehensive than simply the purchasing goods
and services electronically.
66
Green Paper on Electronic Commerce for South Africa - A public discussion paper accessed at
http://docweb.pwv.gov.za/Ecomm-Debate/myweb/greenpaper 12 August 2002
25
Countries have to work together to remove barriers or impediments to the free
flow of electronic products and services across jurisdictions and to resolve
problems that may arise due to its borderless character. Government is
shown to be the appropriate vehicle to ensure that this is possible.
The main benefits of e-commerce are demonstrated by the following
achievements:
Improved response time. It provides quick and cost-efficient ways through
which to communicate and update information.
Improved competitive positioning. Electronic commerce has a potential to
level the playing field for small and large entities throughout the world. Small
and medium enterprises and public-sector customers reap the benefits of e-
commerce.
Ease of concluding deals and financial transactions. Click-and-pay
technology is gaining popularity as a means through which to transact.
Published information, communicating, buying, selling, paying and checking
orders occurs 24 hours a day, 365 days a year.
Extended market reach and thus increased revenue potential.
Geographic barriers or boundaries are removed. An increased number of
Internet users exist to whom to market products and services at lower cost
and greater speed.
Increased consumer convenience and choice. Consumers can easily
locate hard-to-find goods and services, and also have a wide choice from
which to make a purchase anytime, anywhere.
Reduced prices. Increased competition forces organisations to produce
better quality products at reduced cost.
Improved customer service. Information is shared more quickly through the
use of an electronic medium.
In the long term, e-commerce via the internet is certainly the mechanism with
the highest volume of electronic transactions, as it creates a world-wide
market without the necessity for buyer and seller ever to meet. This market is
growing at an explosive rate, with software companies already selling and
26
transmitting their software over the Internet, and online banks opening
accounts with customers in far-flung parts of the world.67
On the international level, e-commerce has been one of the most visible
examples of the way in which ICT can contribute to international economic
growth. It helps countries improve trade efficiency and facilitates the
integration of developing countries into the global economy. It allows
businesses and entrepreneurs to become more competitive.68
Traditional international trade essentially consists of moving goods and/or
services in one direction and of money in the other. This cannot be done
without sharing information between all the parties involved in the transaction,
parties such as the manufacturer, agents and brokers, suppliers of transport
services, banks, insurers, custom authorities in at least two countries, etc.
Fifty parties or more may be involved in one trade transaction.
But paper documents represent an old and ineffective technology. If
information is communicated on paper, one needs to transport a lot of paper
in addition to the actual information. It takes time, and it is expensive. The
paper is bulky, and it is an insecure technology for storing and transmission of
information. For those reasons, there is a strong desire to get rid of paper in
trade, transport, finance and administration. One wants to utilize modern
information technology for a more effective and rational handling of
information.
However, in any such new developments, challenges are inevitably apparent.
The major legal challenges resulting from these developments are not related
to the technology as such, but to the utilization of such new technologies that
have changed the way business and its administration are done.
67
“International Electronic Commerce” Report to the Ranking Senate Minority
Member of the Joint Economic Committee, United States General Accounting Office
March 2002
68
Annan, Kofi in E-Commerce and Development Report 2002, last accessed on September 26, 2006 at
http://www.unctad.org/ecommerce/ecommerce_en/edr02_en.htm
27
2.2 Legal Aspects of International E-Commerce
The existing international legal rules did not at first fit the new business
infrastructure. The communication of legally significant information in the form
of paperless messages was hindered by legal obstacles to the use of such
messages or by the uncertainty as to their legal effect or validity.69
With rapidly increasing interest in doing business over the Internet and the
corresponding legal challenges, the international community has shown
concern and has taken various legislative steps for many years now.70
As far back as 1985, the UNCITRAL adopted a recommendation to
governments and international organizations to elaborate legal texts relating
to trade. They were required to review the rules within their competence
relating to automatic data processing with a view to eliminating unnecessary
obstacles to the use of automatic data processing in international trade.71
A few years later, further legislative steps were taken. This time, the UN
adopted the Model Law on E-Commerce with Guide to Enactment.72 The
purpose of the Model Law was to offer national legislators a set of
internationally acceptable rules as to how a number of legal obstacles to
electronic commerce might be removed. The principles expressed in the law
were also intended to facilitate the use of modern means of communications
and storage of information. It was based on the establishment of a functional
equivalent for electronic media of paper-based concepts such as "writing",
"signature" and "original". By providing standards by which the legal value of
electronic messages could be assessed, the Model Law was intended to play
a significant role in enhancing the use of paperless communication. It also
69
Spyrelli, C, „Electronic Signatures: A Transatlantic Bridge? An EU and US
28
contained rules for electronic commerce in specific areas, such as carriage of
goods, contracts and the like.
Furthermore, the Model law may be useful in certain cases as a tool for
interpreting existing international conventions and other international
instruments that create legal obstacles to the use of electronic commerce.
It should be noted that, while the Model law was drafted with constant
reference to the more modern communication techniques such as EDI and
electronic mails, the principles on which it was based, as well as its
provisions, are intended to apply also in the context of less advanced
communication techniques, such as telecopy. There exist situations where
digitalized information initially dispatched in the form of a standardised EDI
message might, at some point in the communication chain between the
sender and the recipient, be forwarded in the form of a computer print-out.
Such situations are covered by the Model law based on the understanding
that more communication techniques are in rapid developments, and future
situations need to be covered as well.
In a more focused legal approach, the Model law establishes rules relating to
admissibility and evidential weight to be accorded to electronic data message
in e-commerce.73
With respect to admissibility, the Model Law establishes that data messages
should not be denied admissibility as evidence in legal proceedings on the
sole ground that they are in electronic form.74 This puts emphasis on the
general principle stated in the law, and is needed to make it expressly
applicable to admissibility of evidence, an area in which particularly complex
issues might arise in certain jurisdictions as will be discussed elsewhere in
this book. The term "best evidence" is a term understood in, and necessary
for, certain common law jurisdictions. However, the notion of "best evidence"
could raise a great deal of uncertainty in legal systems in which such a rule is
73
Article 9 of the Model Law
74
Ibid, para 1
29
unknown. States in which the term would be regarded as meaningless and
potentially misleading may wish to enact the Model Law without the reference
to the "best evidence" rule.
As regards the assessment of the evidential weight of a data message, the
Model Law provides useful guidance as to how the evidential value of data
messages should be assessed (e.g., depending on whether they were
generated, stored or communicated in a reliable manner).
In yet another development, the UN adopted the Model Law on Electronic
Signatures.75 The Model Law aims at bringing additional legal certainty to the
use of electronic signatures. Building on the flexible principle contained in the
UNCITRAL Model Law on Electronic Commerce, it establishes criteria of
technical reliability for the equivalence between electronic and hand-written
signatures. The Model Law follows a technology-neutral approach, which
avoids favouring the use of any specific technical product. It further
establishes basic rules of conduct that may serve as guidelines for assessing
possible responsibilities and liabilities for the signatory, the relying party and
trusted third parties intervening in the signature process.
75
UNCITRAL Model Law on Electronic Signatures with Guide to Enactment, Adopted by
UNCITRAL on 5 July 2001
30
means including writing, orally or by conduct.76 Other countries may require
that contracts, especially involving those above a set amount of money,
should be in or evidenced in writing. In such a case the question that arises is
whether an Internet contract satisfies the requirement. Under pre-Internet era
traditional law, such a contract would not normally satisfy the requirement of
writing because that would require visible representation in tangible form
whereas computer data is, strictly speaking, intangible. This problem has
been largely resolved in many countries through the passing of legislation that
operates using a „functional equivalence‟ approach of giving the same legal
effect to data messages as to paper-based documents. Incidentally, the
legislation in different countries exhibits similarities in part because most can
trace provenance in some way or other to an instrument of the United Nations
Commission on International trade Law (UNCITRAL) Model Law on Electronic
Commerce of 1996.
The most recent of the series of UN developments on the area of e-commerce
is perhaps the adoption of the UN Convention on the Use of Electronic
Communications in International Contracts (hereinafter referred to as
Electronic Contracts Convention), 2005.77
The Convention aims to enhance legal certainty and commercial predictability
where electronic communications are used in relation to international
contracts.
The convention applies to the use of electronic communications in connection
with the formation or performance of a contract between parties whose places
of business are in different States.78
The fact that the parties have their places of business in different States is to
be disregarded whenever this fact does not appear either from the contract or
from any dealings between the parties or from information disclosed by the
76 Emily M. Weitzenboeck, “Electronic Agents and the Formation of Contracts” International Journal
of Law and Information Technology, Vol.9, No.3 (2001): pp. 204-234, accessed at
<http://www.ijlit.oxfordjournals.org/cgi/content/abstract/9/3/204>
77
UNGA Res. A/60/21, 23 November 2005. As of July 2006, only six states have signed the text of the
Convention, and none has so far formally ratified it.
78
Ibid, Article 10
31
parties at any time before or at the conclusion of the contract. In accordance
with the provisions of this convention, neither the nationality nor the civil or
commercial character of the parties or of the contract is to be taken into
consideration in determining the application of the Convention.79
The Convention assures companies and traders around the world that
contracts negotiated electronically are as valid and enforceable as traditional
paper-based transactions.80 The treaty seeks to remove obstacles to the use
of electronic communications in international contracting, including obstacles
that might arise under current international trade law instruments, most of
which were negotiated long before the development of technologies such as
e-mail, electronic data interchange and the Internet.
The provisions of the Convention deal with, among other things, determining a
party's location in an electronic environment; the time and place of dispatch
and receipt of electronic communications; and the use of automated message
systems for contract formation.81
Other provisions contain criteria establishing functional equivalence between
electronic communications and paper documents, including "original" paper
documents as well as between electronic authentication methods and
handwritten signatures.82
79
See Ibid, Article 1
80
Ibid, Article 8
81
Ibid, Articles 6 and 12
82
Ibid, Article 8 and 9
83
Vienna, 11 April 1980
84
Supra note….
32
2.2.2 Electronic Commerce and the International Sale of Goods
The introduction of newer technologies and applications such as fax,
electronic data interchange (EDI) and the internet have also had great impact
on the existing legal regime for the international sale of goods. The question
of international sale of goods is regulated by a number of international
treaties, including the UN Convention for the International Sale of Goods 1980
(CISG).85 Although the advent of modern communication techniques provides
a challenge to the traditional rules of sale of goods contracts, the provisions of
the CISG form a coherent body of contract law, well suited to deal adequately
with modern communications techniques in international business.
The CISG is applicable to all sales contracts where the parties to the contract
have their place of business in different States and where, firstly, the States in
question are parties to the Convention, or secondly, where the normal private
international law rules lead to the application of the law of a Contracting State,
or thirdly, where the parties choose the CISG as the applicable law directly or
indirectly.86
Thus, if G, who has his place of business in Germany (Contracting State),
orders goods from A, who has his place of business in Australia (Contracting
State), then the CISG will apply to their agreement, unless they expressly
exclude the application of the Convention, since both countries are
Contracting States.
Similarly, if S who has place of business in South Africa (non-Contracting
State) orders goods from A, who has his place of business in Austria
(Contracting State), then the CISG will apply to their agreement if the normal
private international law rules make the Austrian law applicable, since the
CISG is regarded as part of Austrian domestic law
One must, however, be careful in the second type of situation because, in
terms of the CISG, a number of countries have made reservations to the
effect that the CISG will not apply where one of the parties has its place of
85
Adopted by a diplomatic conference on 11 April 1980, the Convention establishes a comprehensive
code of legal rules governing the formation of contracts for the international sale of goods, the
obligations of the buyer and seller, remedies for breach of contract and other aspects of the contract.
The Convention entered into force on 1 January 1988.
86
Ibid, Article 1
33
business in a non-Contracting State.87 Therefore, if S with its business place
in South Africa (non-Contracting State) concludes a sales agreement with U,
who has his place of business in the United States (Contracting State), then
the CISG will not apply even if the normal private international law rules refer
to the law of the United States because the United States has made use of
the right of reservation when ratifying the CISG.88
Thirdly if S with its business place in South Africa (non-Contracting State)
concludes a sales agreement with G, who has his place of business in
Germany (Contracting State), and the parties agree to a choice of law clause
in their agreement choosing German law, then the CISG will also apply as
part of the German domestic law.
In this case one can say that the CISG has been chosen indirectly because
often parties will not even be aware that the CISG will apply. A direct choice,
in contrast, will contain a specific reference to the applicability of the
Convention.
The analysis of offer and acceptance which forms part of the structure of the
CISG is often difficult to make in complicated negotiations where there is a
great deal of communication between the parties, as is often the case in
international trade. This is further complicated by the introduction of methods
of communication such as EDI which requires a more flexible approach than
the strict offer-acceptance dichotomy. It seems, however, that with the
provisions contained in the Convention, there is enough flexibility to evade the
constraints of forcing communications into either the offer or acceptance
mould.
The question as to when communications will become valid and binding in the
case of parties who are not in touch directly has been solved in a number of
87
For example: Upon ratifying the Convention, Denmark, Finland, Norway and Sweden declared, in
accordance with article 92, paragraph 1, that they would not be bound by Part II of the Convention
("Formation of the Contract"). Upon ratifying the Convention, Denmark, Finland, Norway and Sweden
declared, pursuant to article 94, paragraph 1 and 94, paragraph 2, that the Convention would not apply
to contracts of sale where the parties have their places of business in Denmark, Finland, Iceland,
Sweden or Norway. In a notification effected on 12 March 2003, Iceland declared, pursuant to article
94, paragraph 1, that the Convention would not apply to contracts of sale or to their formation where
the parties had their places of business in Denmark, Finland, Iceland, Norway or Sweden.
88
In terms of Article 95 of the Convention, a ratifying state may declare that it will not be bound by
subparagraph 1(b) of Article 1 of the CISG.
34
different ways. Each of these approaches in essence determines which of the
parties carries the risk of a communication being lost, destroyed or damaged
in the transition process.
Unless determined by agreement between the parties themselves there are
four main theories which may be applied:
(a) the information theory which determines that a communication only
becomes effective once the recipient takes notice of the content of the
communication. This theory is usually applied to direct forms of
communication such as telephone and may often also be the default position
in cases of uncertainty;
(b) the reception theory which determines that a communication only
becomes effective once the recipient has actually physically received the
communication or has at least been made available to the recipient, even
though he or she has not yet taken notice of the content. In terms of this
theory, the deciding moment is dependent upon the communication being
available to the recipient in the sense that it has been placed at his or her
disposal in a place in which he or she would expect to receive
communications in the normal course of business and in a manner which is
comprehensible to him or her. It is usually used in regard to indirect forms of
communication such as telegram and telex and has its origin in civil law
systems;
(c) the postal or dispatch theory in terms of which the communication is
effective once it has been posted or sent by the sender. This is usually
applied to cases of indirect communications and has its origins in the
Common Law where it was introduced to handle the issue of revocability of
offers;
(d) the formulation theory in terms of which the communication becomes
effective the moment that the responder begins to formulate its
communication. This theory is usually only used in conjunction with the postal
theory to prevent a party from retracting an offer or communication once the
other party has started to respond to that communication.89
89
http://www.cisg.law.pace.edu/cisg/biblio/eiselen1.html
35
Although these theories or principles were developed first and foremost to
deal with the risks of communications in the contract negotiations phase, they
are generally applied today to all forms of communications between
contractual parties.
When dealing with communications in electronic trade, a strong case can be
made out for the use of one of the variants of the reception theory rather than
the information or dispatch theory in the absence of any provision by the
parties. If EDI for instance, is being applied, it is quite easy to determine when
a party had access to a message, or when it had received it. On the other
hand, it may be very difficult to determine when a person actually became
informed of the existence or content of the message in a subjective sense.
Very often an electronic order will be acknowledged by the supplier's system
and executed by its plant without any person with executive powers actually
taking notice of the communication. In these circumstances, it is unrealistic to
apply the information theory. This theory also provides opportunities for the
recipient to play ducks and drakes with its opponent, and it encumbers the
sender with an almost impossible burden of proof.
It is therefore fair to conclude that the fear has not yet been realized that the
CISG would become an unchanging and static monument of legal unification
unable to deal with changing circumstances in a fast changing world. The
electronic revolution that has taken place in the last part of the twentieth
century, the new forms of communication brought with it and new ways of
doing business as a result of it, provide an excellent field to test the hardiness
and flexibility of the CISG. The foregoing discussion shows that the
Convention and its underlying principles are sufficiently robust and flexible to
deal with the changes and challenges posed by the new forms of
communication and that virtually no changes need be made to the
Convention. The areas where the approach or solution followed in the CISG
has been shown to be problematic stem not from the use of more modern
forms of communication, but rather are structural or conceptual deficiencies
that existed from the outset and are applicable to all forms of communication.
36
The above analysis clearly shows that the CISG is a coherent and logical
body of law able to survive and grow in the modern world.90
90
Siegfried Eiselen. “Electronic commerce and the UN Convention on Contracts for the International
Sale of Goods (CISG) 1980” EDI Law Review (1999) 21-46
91
Loibl, Gerhard, “International Economic Law” in Malcom, Evans (ed), International Law, Oxford
37
businesses engaging in e-commerce, since it determines which multilateral
trade rules and obligations apply to these transactions.92
Similarly, the existing GATS framework will not suffice. Unlike the GATT, the
GATS do not require Members to remove existing barriers to trade. Indeed, a
Member is not obligated to liberalize any part of its market for services unless
it specifically commits to do so. Members may decide whether to subject
themselves to National Treatment in a particular services sector and may
claim exemptions from the application of MFN. In light of these flexible legal
arrangements, it is not surprising that most WTO Members to date have made
very limited commitments to remove barriers to trade in services, although
some detailed proposals are being developed to reform the GATS framework,
giving it more bite. We support this work.
In light of the regime's current limitations, however, it would not make sense to
rely on GATS as the principal tool for eliminating barriers to electronic
commerce and coordinating regulatory policy.
Despite the importance of TRIPs, it also will not serve as a tool for preventing
or eliminating most potential barriers to electronic commerce. TRIPs covers
intellectual property, not goods or services, and thus will not prevent barriers
to trade in either of these areas. Moreover, TRIPs was not fully implemented,
until 2006. Thus, although TRIPs provides a good model for WTO's role,
TRIPs alone cannot serve to coordinate national efforts to regulate electronic
commerce.93
2.4 Dispute Settlement in International Electronic Commerce.
The subject of dispute resolution is of great relevance to the development of
international electronic commerce. Disputes in electronic commerce have
much in common with disputes in other contexts; however, there are also
some differences which require new or adapted solutions. It also has to be
92
Tim, Brightbill and Sarah Dylag, “Barriers to International Electronic commerce: Recent Issues and
Developments” in <http://www.wrf.com/docs/publications/11623.pdf>
93
WTO and Electronic Commerce: Issues for World Trade: A Microsoft White Paper, published in
September, 1999, in <http://www.microsoft.com/issues/essays/1999/11-15wto-b.mspx> Last accessed,
September 26, 2006
38
remembered that the types of disputes which can arise are very diverse in
nature, and therefore, solutions proposed must respond to this diversity.
When discussing international electronic disputes and the methods of their
settlement, a distinction is made between contractual and non-contractual
disputes. In the latter case, the subject of this discussion, the differences in
the contracts concerned must be taken into account. Three categories of
contracts appear particularly relevant:
(a)The first category is that which has perhaps attracted the most attention
among practitioners. It concerns the telecommunications infrastructure for
electronic commerce and specifically contracts between enterprises that
operate this infrastructure and enterprises that want to use it in order to offer
different or competing services to third parties. Such "interconnection"
agreements often affect public licences, and therefore have a special legal
status.
Disputes in this category tend to be particularly complex for a variety of
reasons. They concern questions of contract interpretation as well as
problems of contract modification which occur quite frequently since the
conditions of contract can change very quickly and the agreements reached in
a contract can be affected by provisions of other contracts. Finally, in many
countries regulatory bodies exist which have the power to intervene in the
conclusion and execution of such contracts. This last point is probably the
main reason why domestic rules of law (especially those relevant to the
licensing of telecommunication operations) often contain dispute-resolution
mechanisms. Disputes of this kind have already arisen and have been
brought before the courts94 or settled in special proceedings.
On the international level, the World Bank dispute resolution system under the
International Center for Settlement of Investment Disputes (ICSID) and the
new dispute resolution procedures of the World Trade Organisation, may play
a role in this area although at present only governments can be party to them.
94
This was the case with the dispute between Mercury and OFTEL, the British regulatory body,
concerning the basis on which British Telecom (BT) determined interconnect prices. On 9 February
1995, the House of Lords upheld Mercury‟s claim and revised the interpretation which OFTEL had
given to its agreement with BT.
39
(b) A second group of contracts consists of those which are concluded
between users of the Information Highway and firms that grant access to it. In
this group fall contracts regarding telecommunication services, in particular
those of "service providers" who grant access to communications networks.
The provisions of such contracts are normally set forth in the service
provider's general conditions of contract. Disputes in this area most often
concern bills and conditions of access, so that the amount in dispute is
generally quite small. However, this category includes more than simple billing
disputes, such as controversies with regard to the liability of service providers
or duties of the user concerning information transmitted.
(c) The most important and also interesting area is that of contracts between
users. It is in this group that the special characteristics of electronic commerce
and the variety of relationships to which it gives rise become particularly
apparent. In considering contracts between users, one could differentiate
between commercial contracts on the one hand and consumer contracts on
the other, based on both the differing treatment of these two categories of
contracts in national and international law and by the differing interests
involved. However, the criteria for differentiation are not entirely uniform and
the differences are often difficult to detect, particularly since world-wide
computer networks open up a global market even for the smallest purveyor of
goods and services.
One clearly notes from the foregoing that the rapid development of electronic
commerce must be expected to give rise to many disputes of various kinds.
The question of how these disputes can best be resolved has received little
attention, and there are few if any mechanisms available at present which are
adequate to the medium. It can be expected that the lack of suitable dispute-
resolution mechanisms will constitute a serious obstacle to the further
development of international electronic commerce.
Both the business and the legal communities need fundamentally to rethink
the approach to dispute resolution as it is now practised in court and
arbitration proceedings. Not only do existing laws and legal instruments need
to be re-evaluated, but also dispute resolution mechanisms need to be
reviewed to determine how they can be adapted to meet the needs of
electronic commerce.
40
Dispute-resolution mechanisms, which are consistent with the electronic
medium and make use of its potential, pose some new legal questions. Some
of them require domestic and international legislative action; others can be
resolved through private action by those directly involved in commercial
transactions or professional bodies.
The electronic medium, and in particular the facility of rapid communication
with all parts of the world, offers new possibilities to accelerate the
proceedings for dispute settlement. It also offers new dimensions for dispute
avoidance and resolution, in particular through the possibilities of consulting
interested and concerned circles, for instance through collective procedures
as they may be developed in user groups or expert fora.
There is a wide spectrum of dispute-resolution methods and mechanisms
which may be adapted for use in electronic commerce. In view of the variety
and complexity of the situations which may arise, it is suggested that a flexible
two-tier system of summary proceedings with a possible appeal in arbitration
is a suitable solution which with procedural fairness combines speed of
communication and efficiency.
2.5 Conclusion.
International electronic commerce poses a great challenge to the way
businesses are currently conducted.
The discussion in this chapter reveals that dramatic changes in the fabric of
international commerce necessarily require parallel changes in the
international legal framework to address those changes. An examination of
legislative interventions so far taken under the auspices the UNCITRAL on
international electronic commerce has been made. Approaches in the
formation of international electronic contracts and sale of goods have been
discussed showing the challenges they create to the existing traditional
trading systems at the international level.
It has been pointed out in this chapter that, although the international bodies
charged with duty of overseeing international business have taken serious
steps in modernising and harmonizing international electronic commerce legal
frameworks, much has yet to be done. The initiatives taken have a very
limited scope and are far from satisfactory for online business, especially in
41
the area of settlement of disputes arising from international electronic
commerce.
One more important challenge to the international community is to ensure that
current and future developments in the area are adopted and implemented
within States‟ legal frameworks for the expansion of international electronic
trading transactions.
42
CHAPTER THREE
3.1 Introduction.
The history of ICT in Tanzania is very much associated with the development
of informatics which goes as far back as 1960s when the first computer, ICT
1500, was installed in the Ministry of Finance. By the early 1970s there were
seven computers in the country and the Ministry of Finance had acquired a
new computer, an ICL 1900.95
95
Klodwig Mgaya, “Development of Information Technology in Tanzania”
43
importation of computers and all related accessories was banned by the
government.96
96
This came as the result of criticisms from members of parliament and the general public.
97
National ICT Policy: Ministry of Communication and Transport, 2003
44
companies, government offices or Internet cafés throughout the country. Most
of the customers are located in Dar es Salaam.98 Internet Cafés therefore
provide a viable access option for enterprises/individuals that do not have
their own computers and telecommunications access. Furthermore, the
Tanzania Communications Commission (TCC)99 has licensed six companies
to provide public data communication services including Internet bandwidth.
98
National Policy on ICT, p. 18
99
Government regulator of Communication and broadcasting established by S. 3 of Tanzania
45
digital divide.100 The government therefore prepared the National ICT Policy of
Tanzania in 2003 to coordinate all matters related to ICT in the country. 101
The policy is divided into several key areas which include (but are not limited
to) the development of ICT infrastructure and Universal Access. One may
however ask, five years later, how successful has the National policy been?
Has it achieved any of its stated aims or objectives? The success-so far-of the
policy can be evaluated through two representative examples: the creation of
the Tanzanian Internet Exchange and the Rural Telecommunications
Development Fund.
The National ICT Policy has as its first objective the need to:-
“Foster efficient, inter-operable, reliable and sustainable national ICT
Infrastructure commensurate with grass-roots needs and compliant with
regional and international standards, with increasing access while reducing
cost”
The Policy acknowledges the wide range of converging activities, the dangers
of the digital divide and the risk of being excluded further from the knowledge
economy, all these being issues that pressed the Government to formulate a
100
Ibid
101
The policy can be viewed at www.ethinktanktz.org/esecretariat/DocArchive/zerothorder.pdf visited
on 30 June 2002
46
policy framework through which coordinating mechanisms and harmonised
strategies for ICT might be nurtured.102
The Policy states its vision in the following words: “By exploiting its unique
geographical position, Tanzania becomes a regional hub of ICT infrastructure
providing ICT-based solutions that enhance sustainable socio-economic
development, which addresses national and regional poverty reduction
concerns.”103 The Policy states that its mission is “to coordinate ICT activities
in the public and private sectors and to provide a conducive legal and
regulatory framework and private infrastructure investments in e-commerce
capacity building (infrastructure and human capital), software and hardware
development and production, and promoting regional and international
cooperation.”104
The objectives of the Policy are grouped into nine main areas. These are:
strategic ICT leadership, legal and regulatory framework, capacity building,
ICT infrastructure, ICT industry, ICT productive sectors, service sectors,
universal access, and local content. The main focus of this study is legal and
regulatory framework. It is the Policy‟s objective to establish and maintain an
enabling legal and regulatory framework aligned with Tanzania‟s constitutional
provisions, legislative and regulatory environment and consistent with regional
and global best practices. It further aims at ensuring that legislation is put in
place to address intellectual property rights issues unique to the use of ICT
networks. Finally, it is the objective of the Policy that Tanzania does not
become a haven for perpetrators of cyber-crimes.
102
Article 1.1 of the Tanzania ICT Policy
103
Ibid, article 1.2
104
Ibid, article 1.3
47
3.7 ICT Legal and Regulatory Framework in Tanzania
On the key role of monitoring, the functions of the TCRA are laid out in the
Act:
To monitor the performance of the regulated sectors including in
relation to –levels of investment, availability, quality and
standards of service, the cost of services, the efficiency of
105
Section 6
48
production and distribution of services and other matters relevant
to the Authority106
As far as licensing is concerned, there are currently five basic categories of
telecommunications operators of which three are relevant:
• Public data communication operators
• Private data communication operators
• Internet service providers
There is full competition in each of these categories. The barriers to entry are
primarily financial (namely, start up capital and licence fees) rather than
regulatory.
We understand that there is an Electronic and Postal Communications Bill of
2005 which is aimed at providing for and regulating activities in the Electronic
and Postal Communications sectors and related matters.107 This Bill is not
intended to replace the Tanzanian Communications Regulatory Authority Act
of 2003, although, if enacted, it will make extensive amendments, including
repealing and replacing sections 6, 36 and 47 of the previous Act.108 It also
repeals the Tanzania Communications Act, 1993 and the Broadcasting
Services Act, 1993, and amends the Fair Competition Act, 2003.
It remains clear, however, that regulation of ICT in Tanzania is still at very
initial stage, and much needs to be done in the ICT legal framework.
The Policy underscores the new needs, rights and vulnerability brought by
globalisation and by the pervasiveness of the Internet. The policy underlines
that for secure electronic transactions to occur, an environment of trust must
be created and sustained through the legal and regulatory apparatus, taking
cognisance of constitutional rights and provisions of criminal, civil and
commercial laws.109
106
See Section 6(1) (c ).
107
According to available records, this Bill has not yet been tabled to Parliament for enactment
108
See Section 129 of the Electronic and Postal Communications Bill Act, 2005
109
ICT National Policy, part 3.5
49
The Policy acknowledges that Tanzania‟s legal framework, regulatory
capacity and related institutional infrastructure are inadequate in quantity, and
quality, diversity and that Tanzania currently lacks technological capacity
conducive for ICT development and application. It then identifies the need for
specific and effective legislative instruments on privacy, security, cyber crime,
ethical and moral conduct, encryption, digital signatures, copyrights,
intellectual property rights, fair trade practices and anti-trust practices as
some legal issues that should be addressed. The Policy proceeds to declare
the government‟s desire of providing a consolidated, effective legal and
regulatory framework that offers an environment conducive to the
development of ICT which can into account issues associated with the
convergence of telecommunication, broadcasting and information systems, so
that new opportunities are created for the citizens of Tanzania, in line with
their Constitution. It purposes, furthermore, to promote business in electronic
form in a secure environment and to put in place a legal framework to provide
the guiding principles, rules and legislation.
On placing the legal framework for ICT, the Policy promises that “the
Government will review existing laws and regulations in order to repeal or
adjust those that are not conducive to the healthy growth of the ICT industry
and enact new ones that take account of issues associated with Internet
Governance and the convergence of telecommunication, broadcasting and
information systems.”
The Policy emphasizes introduction of the legal and regulatory framework that
would be conducive for development of ICT in Tanzania. The way forward
proposed in the Policy is to review existing laws and regulations in order to
repeal or amend those that are not conducive to the growth of ICT. This
statement in the authors‟ view is too general. One would expect that thorough
research would be conducted with the intent of identifying the laws that have
been affected by ICT and the new areas that will require a completely new
piece of legislation. The present study makes a thorough research on the
impact which ICT has caused on the law of evidence, with the aim of coming
50
up with recommendations that may lead to creating a legal frame work that
gives electronic evidence legal recognition.
As shall be discussed later in this work, it is the view of the author, supported
by both literature and field survey, that the kind of reform suitable for Tanzania
is to have a comprehensive legislation which addresses all aspects of
ICT. The proposed legislation should be able to make amendment to all the
laws that have been affected by advancement of ICT. Specific pieces of
legislation, guidelines and rules peculiar to a particular field may be
promulgated. The rationale for this approach is the need to have a legal
framework that enhances predictability for parties transacting business that
uses the modern technologies, regardless of the medium used.
51
Additionally there is no local manufacture of ICT equipment in Tanzania: all
local dealers or agents import these products. There are no standards guiding
the imports of either hardware or software. Few local companies are
developing computer application packages. Most of the software used by both
public and private sectors is imported at considerable cost. The use of open-
source software is on the lower side. Overall, Tanzania has a small emerging
skilled capacity to support the ICT industry in terms of developing, selling or
supporting hardware and software.
52
Given the fact that e-commerce has taken pace in many parts of the world
today various efforts have to be made in Tanzania to create the necessary
awareness of the potential benefits of e-commerce. Despite rapid adoptions of
Internet Technology in Tanzania, the wider application of e-commerce is still
far beyond reach in the country.
Due to legal framework and technological infrastructure limitations, the
opportunities embedded on e-commerce are far beyond reach in Tanzania
today. As far as technological infrastructure is concerned, the Tanzanian
Communication Commission has licensed only six companies to provide
public data communication services.113 From the point of view of legal
framework limitations, the rapid growth of e-commerce over the world has put
Tanzania in the position of facing challenges to various commercial laws and
other related laws. The legal system is mainly based on common law.
Regulatory steps to secure electronic transactions such as digital signatures,
reforms to contract law, dispute settlement and others have not yet been
promulgated. The basic commercial laws in Tanzania are derived from the
19th century. The laws were designed to facilitate paper-based transactions.
Despite the changes and regulatory reforms made by the country since
Independence, most of the laws enacted since British Colonial rule before the
1960s are still in force.
However there have been deliberate efforts by the Government and other
institutions to increase general e-commerce awareness and to propose legal
framework changes to favour the adoption of e-commerce.
113
These include Wilken Afsat, Datel Tanzania, Equant Tanzania, Simbanet Tanzania, Soft Tech
Tanzania, Fastcom Africa. There are presently more than thirteen licensed ISPs in Tanzania where the
more prominent are: Computer and Telecommunication Systems Ltd (CATS), Cyber Twiga, Simunet,
a wholly owned subsidiary of TTCL, Planetel Communications
53
PART TWO: THE LAW OF EVIDENCE IN TANZANIA
CHAPTER FOUR
4.1 Introduction
The thrust of this Chapter is to explore the significance of the law of evidence
and rules of authentication in legal transactions. In this context, the Chapter
will address the meaning of evidence, functions of evidence, and various
forms of evidence as well as methods of presenting evidence in court.
Law may be broadly categorized under two heads, namely: substantive law
and procedural law. The substantive law defines what facts go to constitute a
right or liability. The procedural law, on the other hand is the means by which
substantive law is applied to particular cases. The law of evidence is a
procedural law.114
As has already been pointed out elsewhere in this work, the term „evidence‟ is
derived from the Latin word, „Evidentia‟ which means „being clear‟ or „plain‟, or
114
Krishnamachari, V., Op. Cit, at p. 4
115
Ibid
54
„apparent and clear‟.116 In other words, evidence is any matter of fact, the
effect, tendency or design of which is to produce in the mind a persuasion,
affirmative or disaffirmative, of the existence of some other matter of
fact.117 The term is further defined as documentary or oral statements and the
material objects admissible as testimony in a court of law.118
In this study, the term evidence shall mean the fact which tends to generate
proof in legal proceedings. Thus, proof of facts is central to the law of
evidence. Twining119 points out that proof is the establishment of the
existence or non-existence of some fact, factum probandum or fact in issue to
the satisfaction of a legal tribunal charged with determining the fact in issue.
The degree of satisfaction required is prescribed by the applicable standard of
proof, for example, „balance of probability‟ or „beyond reasonable doubt.‟ 120
The logic of proof is concerned with the validity, cogency and appropriateness
of arguments as the rational basis for persuasion towards making or justifying
a decision or conclusion on a question of fact.
116
Rao, S. R., Lectures on Law of Evidence (Indian Evidence Act, 1872 as amended by Act No. 4 of
2003), Asian Law House, 2004
117
Twining, at p. 179
118
See http://www.answers.com/topic/evidence last accessed on 30/05/20005
119
William Twining, Rethinking Evidence: Exploratory Essays, Basil Blackwell, 1990, at p. 179.
120
Ibid
121
Sarkar, Op. Cit at p. 5
55
determination by a court or other legally constituted tribunal.122 It is the total
process from the formal institution of legal proceedings to a final order or act,
which makes a case res judicata.
The fundamental principles that underlie the English civil procedure are firstly,
the principle of party autonomy; secondly, the court as an umpire and the
principle of specialization of functions; thirdly, the principle of orality; and
fourthly, the principle that adjudicative decisions should be based on the
issues, the evidence and the arguments presented in open court. 123
According to the second principle, the court stands as an uninterested and
neutral umpire and the parties are expected to show, by presenting evidence,
that what they are asserting is true. This is the reason why the court itself
cannot undertake a search for relevant evidence but must reach its decision
solely on the basis of such evidence as is presented by the parties.
As mentioned above, the main principle in the law of evidence is based on the
fact that only relevant evidence may be admitted or heard. The fact seeking to
prove the fact-in-issue must be relevant to a material fact or fact-in-issue.125
The fact is relevant when it tends to support or negate the fact-in-issue. The
weight depends on the strength or weakness of the support or negation.
There are a number of types of evidence. These are, firstly, oral evidence,
which is confined to words spoken by mouth. It includes all statements which
the court permits or requires to be made before it by witnesses, in relation to
122
Twining, W., Op. Cit, at p. 179
123
Ibid, p.185
124
Basu, N., The Law of Evidence in British India, at p. 872
125
See for example Section 7 of the TEA, 1967
56
matters of fact under inquiry. They are verbal utterances of witnesses made
with a view to prove or disprove an alleged matter of fact.
The second type of evidence, direct evidence presupposes that a fact is given
by a witness, which comes to him through his own senses, or evidence from a
document or item produced before court. In other words, direct evidence is
that which an eyewitness or expert describes from his or her own first hand
observations.
A sixth type is original evidence. This is evidence which comes from its source
without passing through any intermediate channel. A good example is where
a witness deposes to a fact within his own knowledge or where a thing or
original document is produced before the court. Original oral evidence is
57
sometimes called “immediate real evidence” and original documentary
evidence is sometimes referred to as “primary evidence”.
There are three main ways of proving a fact in a court or tribunal. These are
firstly, by oral evidence; secondly, by documentary evidence; and thirdly, by
real evidence (in other words, production of things or material objects). A brief
discussion of each of these methods follows.
4.6.1 Orally
As pointed out earlier in this Chapter, the basic rule of evidence is that it must
be the oral sworn account of facts of which the witness has personal
knowledge. The witness must be available in person in court to have his
statement or her account tested by cross-examination. For this reason, oral
evidence is the main method of presenting evidence in legal proceedings. It
includes signs made by a person who in account of some illness or physical
injury is unable to speak. These include deaf and dumb persons provided that
they have sufficient understanding. The signs must however be interpreted
58
and if those who are unable to speak are literate, they may write their
evidence.
A party who appears before a tribunal to adduce oral evidence must present
primary evidence. Primary evidence in this respect is an oral account of the
original evidence.126 A good example is the statement or testimony of a
person who saw what happened and who gives an account of it to be
recorded by the court. Primary evidence is the best evidence in the eye of the
law, in that it affords the greatest certainty of the fact in issue.
126
Sarkar, Op. Cit., at p. 1053 Sarkar, Op. Cit., at p. 1053
127
[1974] 2 All ER at 472
128
4th ed., p. 121
129
10th, ed., para 1681
130
bid
59
A party in legal proceedings before a court of law is permitted to present a
written proof on top of the verbal or oral proof. The rationale for allowing
parties to do so is based on the maxim “vox audata perit, litera scripta
manet.”131 Krishnamachari quoting Best on Evidence expounded this maxim
in the following words, “ The false relations of what never took place, and
even in the case of real transactions, the decayed memories, the imperfect
recollections, and willful misrepresentations of witnesses, added to the
certainty of the extinction sooner or later, of the primary source of evidence of
their death--all show the wisdom of proving some better or at least more
lasting mode of proof for matters which are susceptible of it, and are in
themselves of sufficient consequence to overbalance the trouble and expense
of its attainment.” 132
131
The meaning of this Latin word according to an Open-dictionary.com accessed last at
http://www.yahoo.com/ on 21/07/2005 is that “A heard voice perishes, but the written letter remains”
132
Krishnamachari, V., Law of Evidence (as Amended by 4 of 2003), at p. 277
133
Ibid, p.279
134
Ibid, p.277
60
respect is Grant and Another v. Southwestern and County Properties Ltd and
another.135 In this case it was held that “A tape recording was a document if
what was recorded was information or evidence and a tape recording of a
conversation could properly be described as documentary evidence of the
conversation.”
A very modern type of real evidence is DNA.138 The English case of R (on the
application of Marper) v Chief Constable of South Yorkshire139 underscored
the significance of this type of evidence in the following words by Lord Steyn:
135
[1974] 2 All ER at 455
136
Ibid, p.276
137
Mapunda B. T., OLW 202 Evidence Part One, p. 3
138
Deoxyribonucleic acid (DNA) is a nucleic acid that contains the genetic instructions specifying the
biological development of all cellular forms of life (and many viruses). DNA is often referred to as the
molecule of heredity, as it is responsible for the genetic propagation of most inherited traits. During
reproduction, DNA is replicated and transmitted to the offspring. Source:
http://en.wikipedia.org/wiki/DNA accessed last on 13/09/2005
139
[2004] 4 All ER at 193
61
“My Lords, it is of paramount importance that law enforcement agencies
should take full advantage of the available techniques of modern technology
and forensic science. Such real evidence has the inestimable value of
cogency and objectivity. It is in large measure not affected by the subjective
defects of other testimony. It enables the guilty to be detected and the
innocent to be rapidly eliminated from inquiries.” 140
140
Ibid
141
[1985] 1 All ER at 87
142
[1968] 2 All ER at 195
143
2nd ed, vol. 4, p 2783
62
a mark to represent his name, by himself or by his authority … with the
intention of authenticating a document as being of, or as binding on, the
person whose name or mark is so written or affixed … ”
The Macquarie Dictionary defines the term „to authenticate' as 'to make
authoritative or valid; to establish as genuine'. Further the term 'valid' is
defined in part as 'legally sound, effective, or binding; having legal force;
sustainable at law.'144 Black‟s Law Dictionary provides several definitions of
the term “authentic”. However, important to our purpose, the term means,
“genuine; true; real; pure; reliable; trustworthy; having the character and
authority of an original; dully vested with all necessary formalities and legally
attested. Competent, credible and reliable as evidence.” „Authentication” is
said to be “the act or mode of giving authority or legal authenticity to a statute,
record or other written instrument, or a certified copy thereof, so as to render it
legally admissible in evidence…An attestation made by a proper officer by
which he certifies that a record is in due form of law, and that the person who
certifies it is the officer appointed so to do. Acts done with a view of causing
an instrument to be known and identified.”145
The above definitions from various sources demonstrate, in the author‟s view,
the main key function of authentication, which is to certify that a record is real,
genuine, trustworthy and original and that it may be relied in evidence in the
court of law. The word “record” is significant in this study because it will be
proposed later in this study that the same be used in the place of the word
“document”. From this discussion, it is now apparent that signature is one of
the methods of authenticating documents.
144
Websters Dictionary defines 'valid' in similar terms as does the Oxford dictionary.
145
Leaderman and Ron Shapira, Op. Cit at p. 378
63
Black‟s Law Dictionary146 also defines the term signature as “the act of putting
one‟s name at the end of an instrument to attest the validity; the name thus
written.
146
Black’s Law Dictionary at p. 963
147
(1884) 10 VLR 322
148
Ibid
64
This case149 dealt with a pawn-broker's pledge ticket that was not signed by
the pawn-broker in accordance with the relevant legislation but was signed by
an authorised agent even though the name of the pawn-broker was printed on
the pledge ticket.
149
Ibid
150
Ibid
151
Reed, C. Op. Cit
152
Ibid
153
Ibid
65
These cases suggest that the primary function of signatures is for
authentication purposes. In other words, the function of signatures is primarily
evidential. The leading case in this position is Goodman v. J. Eban Ltd supra,
where it was stated that the validity of a particular signature method is found
by referring to the function it performs. The signature will thus be valid if it
provides evidence of authentication of the document by the signatory. Any
signature method must be able to evidence the identity of signatory, intention
to sign and intention to adopt the document.
4.8 Conclusion
This Chapter was aimed at highlighting the significance of evidence and rules
of authentication in legal transactions. It has been observed that the purpose
of any litigation is to determine the rights and liabilities of parties. The court
thus has a duty of applying rules of evidence and authentication to sift facts
presented to it before it arrives at a conclusion. In this respect, the rules of
evidence determine which fact is relevant and thus admissible in court.
66
CHAPTER FIVE
5.1 Introduction
The aim of this Chapter is to examine the Tanzania Evidence Act (TEA) with a
view to identifying principles governing admissibility of evidence in Tanzania.
The Chapter will briefly highlight major features of the TEA, identify forms and
methods of presenting evidence under the TEA and finally discuss the rules of
authentication.
The TEA provides for rules of evidence for courts in the Tanzania Mainland
except for primary courts. It defines the term „evidence‟ to denote “the means
by which an alleged matter of fact, the truth of which if submitted to
investigation, is proved or disproved; and without prejudice to the proceeding
generality, includes statements and admissions by accused persons”154
The term „means‟ used in the above definition is defined by the Oxford
Advanced Learners‟ Dictionary155 as an action by which a result is brought
about or a method(s). In other words, therefore, evidence is a method used to
present facts in court for the aim of either proving or disproving an alleged
matter.
154
Section 3 of the Evidence Act, 1967
155
Hornby, A. S., Oxford Advanced Learner’s Dictionary of Current English, Fourth Edition, Oxford
University Press, 1989 at p. 772
67
The Act has a total of 180 sections, which are divided, in three main parts.
Sections 7 to 57 forms Part One and it covers generally on relevancy of facts.
Part Two comprises sections 4 to 6 and 58 to 126, which deals with
production, proof and effect of evidence. The last is Part Three, which is
composed of sections 127 to 180, which provides for witnesses.
The general rule on admissibility is covered under section 7 of the TEA. The
purpose of this section is to the effect that no other evidence is admissible
which is not covered under this Act. However, it is correctly observed that the
decision on admissibility of a certain piece of evidence rests on the court,
which at the end determines whether the same is relevant to a matter before
it, hence admissible to prove the fact in issue.
To this end, the TEA provides for oral as well as documentary evidence. It
also provides for authentication of documents. The next sections will provide a
detailed discussion in this respect.
Section 61 of TEA provides that “all facts, except the contents of documents,
may be proved by oral evidence.” The analysis of this provision reveals that
oral evidence must be the (sworn) oral account of facts of which the witness
has personal knowledge. The witness has therefore to be available in person
in court to have his or her account tested by cross-examination. In this
respect, Section 62 (2) of TEA provides that “oral evidence must, in all cases
156
Section 3
68
whatever, be direct; that is to says (a) if it relates to a fact which could be
seen, it must be the evidence of a witness who says he saw it; (b) if it refers to
a fact which could be heard, it must be the evidence of a witness who says he
heard it; (c) if it refers to a fact which could be perceived by any other sense,
or in any other manner, it must be the evidence of a witness who says he
perceived it by that sense or in that manner and (d) if it refers to an opinion or
to the grounds on which that opinion is held, it must be the evidence of the
person who holds that opinion or, as the case may be, who holds it on those
grounds.” It is this rule of evidence that forbids hearsay evidence.
The Evidence Act provides for admissibility of a variety of records. These are
records made in the course of business, public records, books of accounts
and banker‟s books. Business records are admissible under Section 34 (b)
which provides for admissibility of statements whether written or oral made in
the ordinary course of business by a person who cannot be found by reason
of either death, diplomatic immunity, refusal to testify, or the exorbitant
expenses of procuring him. According to this section, the statements made in
this manner must consist of “an entry or memorandum made by him in books
or records kept in the ordinary course of business or the discharge of
professional duty, or of an acknowledgement written or signed by him of the
receipt of money, goods, securities or properties of any kind, or of the date of
a letter or other documents usually dated, written or signed by him;” This is an
exception to the hearsay rule.
Case law may assist in clarifying this provision. In Yahaya Hussein v. Ohan
Transport Ltd and Another,157 the Court of Appeal (as per Nyalali C. J., as he
then was), declined to admit a post-mortem report prepared by the doctor on
request by the counsel for the plaintiff for the reason that the record (Post-
mortem Report) was not made in the ordinary course of business.
157
[1980] TLR 59
69
The above case is significant in that it construed Section 34 (b) of the TEA as
follows: “It seems to me quite clear that paragraph (b) deals with four kinds of
statements. Firstly, statements made in the ordinary course of business;
secondly, written acknowledgments for receipts of money, goods, securities or
other property; thirdly, commercial documents, and fourthly and lastly, dates
in letters or documents which are usually dated.”158 It was further observed in
this case that statements made in the ordinary course of business are
particularized as an entry or memorandum in books or records kept in the
ordinary course of business or kept in the discharge of professional duty. The
issue is whether electronic records can be admissible as records kept in the
ordinary course of business. The following section endeavours to address this
issue.
158
Ibid
70
governing admissibility of banker‟s book. These are proofs (1) that the book
was at the time of the making of the entry one of the ordinary books of the
bank, (2) that the entry was made in the usual and ordinary course of
business, and (3), that the book must be in the custody or control of the bank.
The best evidence rule is embodied under section 66 of the Evidence Act,
1967 which provides that documents must be proved by primary evidence.
The Act defines primary evidence as the document itself produced for the
inspection of the court.159 Krishnamachari clarifies that primary evidence is
the evidence, which the law requires to be given first.160 The law requiring the
production of primary evidence of a disputed document is in accordance with
the Best Evidence Rule.161 This document must be the „document itself‟. In
other words, the document itself is the original. This position was restated in
Shirin Rajabali Jessa v. Alipio Zorilla162 where Onyiuke J. held: “A document
must be proved by primary evidence by producing the document itself for the
inspection of the court, and by secondary evidence when it falls under the
categories of s. 67 [of the] Tanzania [sic] Evidence Act, 1967.”
159
See section 64 (1) of the Act. For other definitions see 32A C.S.J. s.776, Lukas v. Williams & Sons
(1892) 2Q.B. 113 at p. 116 per Lord Esher MR
160
Krishnamachari, Op. Cit., at p. 279
161
Ibid
162
[1973] LRT No. 84
71
sought to be proved; or (ii) a person out of reach of, or not subject to, the
process of the court; or (ii) a person legally bound to produce it, and when,
after the notice specified in section 68, such person does not produce it;”
163
Krishnamachari., Op. Cit., at p. 282
164
[1985] TLR 228 (HC)
165
Ibid
72
admissible. In most cases, the dispute is over the meaning of the contents of
the message, so authentication is not an issue.
Parties may enter a verbal agreement for the sale and purchase of
property.166 However, with passage of time, memory of what was agreed upon
may fade and both parties will at some stage die. The land goes on forever
and either the parties or their successors may at some time have to determine
just what was agreed upon. It is these problems which have caused the law to
require some agreements to be reduced to written form and authenticated by
the signature of the party or parties responsible for the creation of
documents.167
The word “sign” is defined under the Interpretation of Laws Act 169 as follows:
“sign,” with its grammatical variations and cognate expressions, includes with
reference to a person who is unable to write his name, “mark”, with its
grammatical variations and cognate expressions”. This definition leaves much
to be desired. In the first place, it defines the term “sign” in respect of a person
who is not able to write, leaving out those who can write. It is not clear
whether a person who is able to write is covered under this definition.
Secondly, the Act does not define the term “signature”.
However, the analysis of the above statutes together with many others which
provide for writing and signature, is that transactions must be authenticated by
166
Lloyd, I. J. Information Technology, 3rd ed. Butterworths p. 571
167
Ibid
168
Section 68 of the Tanzania Evidence Act, 1967
169
Section 4 of the Interpretation of Laws Act, CAP 1 R. E. 2002
73
affixing a personal signature on a piece of paper. The reason is that a “mark,”
as stated earlier in this study, has to be placed on something tangible: in this
case, a piece of paper. Thus, in the eyes of an ordinary person this requires
ink on paper that result in producing something visible and that which alters
the thing marked. It is doubtful whether electronic signatures can meet the
requirement of a manuscript signature.
5.7 Conclusion
This Chapter was aimed at exploring the TEA with the view to identifying
types and methods of presenting evidence in court or tribunal. It also
discussed signature as one of the methods of authentication of documents.
The analysis above reveals that even before the amendment of the TEA to
accommodate new methods of presentation of evidence, courts have not
remained silent on technological advancement. They have been ready to
extend some principles of the law of evidence to accommodate changes in
the technology. A good example is Tanzania Cotton Marketing Board v.
Corgecot Cotton Company SA170 the Court of Appeal stated as follows:“ While
it is an undisputed fact that under Rule 4 of the Arbitration Rules, 1957, the
award is to be forwarded to the Registrar of the High Court by registered post,
the words „registered post‟ should be interpreted widely enough to take into
account the current development in communication technology that has taken
place….”171 The court thus went on to extend the definition of „registered post‟
to include postage by DHL.172
Applying the same spirit, it is argued here that this is an opportune moment;
the court is invited to hold that “current development in communication
technology” includes the Internet and Email, in which case an award, decrees,
pleadings, agreements and other legal documents may be communicated
through the mentioned media.
170
[1997] TLR 165
171
Ibid
172
DHL is an acronym for Dalsey, Hillblom and Lynn, founders of DHL World Express. Source:
http://www.acronymfinder.com/afquery.asp?p=dict&String=exact&Acronym=DHL
74
In 2000, the Commercial Division of the High Court applied the reasoning
above in Trust Bank Tanzania Ltd v. Le Marsh Enterprises Ltd and
Others,173 Nsekela J. (as he then was), underscoring the need for the
Judiciary to be ready to adopt changes caused by technological revolution
engulfing the world, proceeded to extend the definition of banker‟s books to
include evidence emanating from computers subject to the same safeguards
applicable to other banker‟s books under section 78 and 79 of TEA.
It is argued in this study that the courts should apply the same line of
argument to accommodate electronic evidence and modern rules of
authentication by use of electronic signatures under rules of evidence in
Tanzania. Having addressed the Impact of ICT on the TEA 1967 in Chapter
Six, Chapter Seven will examine the legal framework for admissibility of
electronic evidence by looking at the steps taken by various jurisdictions to
accommodate electronic evidence in their legal systems.
173
H.C., (Com.Div.) at DSM, C.C. No. 4 of 2000, (unreported)
75
PART THREE: THE IMPACT OF ICT ON THE RULES OF EVIDENCE IN
TANZANIA
CHAPTER SIX
6.1 Introduction
The main issue will be whether computer evidence and electronic signatures
are admissible in court proceedings in Tanzania under the current TEA. It will
be concluded in the final analysis that, provided a signature technology
produces signatures that meet the functional requirement similar to paper-
based or manuscript signatures, an electronic signature produced thereby
should be treated as legally valid under the law of evidence of Tanzania. On
electronic documents, it will be argued that the principles governing
admissibility of paper-based documents be extended to cover documents in
electronic form.
76
various methods or kinds of evidence, few of which are oral evidence,
documentary evidence, circumstantial evidence, and real evidence and
hearsay evidence. The authors of this work would add electronic evidence to
the list.
The analysis of the above definition is that the definition of the term „evidence‟
does not envisage evidence in electronic form. Before examining the impact
of ICT on rules of evidence, it is pertinent to address the nature of electronic
evidence, including electronic signatures.
This section is aimed at addressing the meaning and the manner in which
electronic evidence is generated. The section will as well examine the nature
and challenges facing electronic evidence. The section will end up with a
discussion on the impact of ICT on electronic evidence under the TEA.
174
Uniform Law Conference of Canada, Op. Cit.
175
Electronic Evidence: A Gold Mine Waiting to be Explored, an article Gross, J.R., accessed at
http://www.willyancey.com/electronic_evidence.htm#Litigation on 08/07/2007
176
Uniform Law Conference of Canada, Op. Cit.
77
6.2.2 How is an Electronic Evidence Created?
In the first method, computer software may process data entered into the
computer by reorganising, comparing, evaluating, re-grouping or selectively
retrieving the relevant information. The good example is when a telephone
company compiles raw data into a phone bill for a certain subscriber and a bill
is produced. The bill may be literally a statement that may read as follows:
“The following long distance calls were placed from your phone to these
numbers on these days and times”.
In the above example, the computer adds new information in the process of
turning raw evidence into processed evidence. It is argued that this kind of
evidence is hearsay because the processed information is partly a result of
raw data that is entered into the computer by human beings. As a general rule
of evidence, hearsay evidence is not admissible. The rationale behind
hearsay evidence is that human beings can easily forget a fact which came to
their knowledge by being narrated to them by other human beings.
78
out that, imaging by use of scanners is quickly replacing microfilming
technology.177
In the event a dispute arises from such transaction, the records that the
computer automatically created are likely to be tendered in evidence. For
instance in R. v. Masquid Ali178 it was asserted that “the law is bound these
days to take cognizance of the fact that mechanical means replace human
effort”.179 In this spirit, the automatic records created by a radar showing the
location of two ships which were involved in a collision was admitted as real
evidence based on the reason that the records were made a mechanical
device without human intervention.180
177
Uniform Law Conference of Canada
178
[1966] 1 Q. B. 688
179
Ibid
180
The Statue of Liberty [1968] 1 W. L. R. 739
79
mechanical means without the intervention of a human mind, the record made
by the machine is admissible in evidence, provided of course, it is accepted
that the machine is reliable.”181 This statement was cited and approved in R.
v. Spiby.182 In this case, the prosecution, in a case involving an appellant who
was convicted for unlawful importation of cannabis, relied upon telephone
print-outs from the hotel‟s computer to prove that a particular guest at that
hotel had called the appellant at his home. The court of Criminal Appeal held
that the print-outs were real evidence since the computer had automatically
logged the lifting of the phone receiver and the making of the call.
Different from paper-based documents, which are visible and tangible, much
of electronic evidence cannot be seen with naked eye. It takes a number of
technological steps for an electronic evidence to be obtained. It tends to be
hidden among immense data files. This evidence is measured by kilobytes,
megabytes, gigabytes and terabytes. Thus, in the electronic or digital world,
the information is divided into two parts. The binary strings of 0s and 1s that
make up the genetic code of data allow information to be fruitful and multiply,
181
Chissick., Op. Cit., at p. 172
182
[1990] 91 Cr App R 186 cited in R. v. Shepherd [1993] 1 All ER, 332
183
Ibid, p.179
80
and also allow people to create, manipulate, and share data. 184 In the event
one sends this information to another person using computers, the information
is transmitted through many phases. First, the sender creates it. Then the
information to be communicated is broken down into small packets that
contain some portion of the contents of the communication as well as the
sender‟s and the recipient‟s Internet Protocol addresses and some accounting
information. The packets are individually transmitted from the sender‟s
computer to a nearby packet switch and then forwarded to the next available
switch in the direction of their ultimate destination. Different packets may take
different routes through the network as they travel from sender to recipient,
depending on link availability and loading in the network. Upon receipt, the
packets are reassembled into an exact replica of the original file. Thus,
information passes through several stages of disassembly, storing and
forwarding and reassembly, before becoming available to the recipient. The
recipient may store the file for future reference for some period before deleting
it.185 The issue is how to ensure trustworthiness, reliability, integrity and
security of electronic evidence. It is argued that since digital evidence usually
takes the form of a writing, or at least a form which can be analogized to a
writing, it must be authenticated and satisfy the requirements of the best
evidence rule.186
The problem with electronic evidence lies in the very temporary nature of
digital data. It is very easy to view, copy, modify or destroy a digital record; be
it a number, document or image. Although digital technology permits perfect
reproduction and easy dissemination of print, graphics, sound, and multimedia
combinations,187 the combination of a high percentage of fraud with employee
184
Smith, A., Why Digitize? An Article accessed at http://www.irmt.org/evidence/wbediscussion.html.
last accessed on 27 July,2005
185
Ryan D. J., & Shpantzer, G., “Legal Aspects of Digital Forensics”, The George Washington
University, Washington, D. C
186
Ibid
187
http://www.tribuneindia.com/2002/20020218/login/main4.htm last accessed on 27 July, 2005
81
involvement and the possibility that raw data can be modified by an individual
with immediate access to the system means that any evidence collected from
the system has a questionable and unverifiable level of integrity. 188
As pointed out above, the best evidence rule is applied to ensure reliability,
that is to say integrity, of the document or record. The issue is whether the
same rule can apply to electronic evidence. The next section will endeavour to
address this issue.
Earlier in this work, the authors briefly discussed the best evidence rule under
the TEA. As observed, the rule requires production of an original of the
document for examination by the court. The Act defines primary evidence as
the document itself, produced for the inspection of the court.189 According to
this rule, the document itself is the original.
188
Meherry, M., The Problem with Electronic Evidence, accessed at
http://estrategy.co.za/news.asp?pklNewsID=9637&pklIssueID=308&pklCategoryID=145 on
28/06/2005
189
See section 64 (1) of the Act. For other definitions see 32A C.S.J. s.776, Lukas v. Williams & Sons
(1892) 2Q.B. 113 at p. 116 per Lord Esher MR
82
numbers stored in the computer‟s memory.190 What is displayed on the screen
is a translation of the numbers by the computer, after application of a coding
convention, into a form of words for the reader.191
Under the Evidence Act,192 therefore, the definition of the term „document‟
entails existence of elements of physicality, visibility by sight and permanence
of the record. In all senses, this excludes electronic records and
documents.193
Until very recently, the position of the law of evidence in Tanzania in respect
of admissibility of records in electronic form was that such records were not
admissible as evidence in court proceedings. The issue is whether, in the
absence of any statutory provision, the principles set in Trust Bank Case194
could be applied to this form of evidence or records. It is doubtful whether
either under case law or statutory law a party may produce a floppy disk or
compact disk or a computer hard disk to prove the contents of records
resident therein. The reason, as pointed above, is that records resident in the
items above are not visible unless displayed on a computer screen or as a
computer- printout.
190
Christensen., Op. Cit, at p. 13
191
Ibid
192
Ibid
193
Section 2 of the Tanzania Evidence Act, 1967
194
See supra note 167
83
manuscript signature performs. The rationale is that, as pointed out earlier in
this study, such manuscript signatures work well for paper-based
transactions. The section will as well examine the impact of ICT on electronic
signatures.
195
Source: www.scc-assessor.org/dictionary_of_terms.html accessed on 23/02/2005
196
Source: www.nela.net/Parents/loeleglo.htm accessed on 23/02/2005
197
Source www.scc-assessor.org/dictionary_of_terms.html accessed on 23/02/2005
84
proposed new definition of signature in this study would encompass any
electronic or digital signature. The difference between electronic and digital
signatures will be addressed later in this book.
198
Ibid
199
Semidinghoff., Op. Cit
200
Reed C., Op. Cit
85
of electronic signature are achieved by way of using cryptography
technology.201
For example, Bob has been given two keys. One of Bob's keys is called a
Public Key, the other is called a Private Key. Bob's Public key is available to
anyone who needs it, but he keeps his Private Key to himself. Keys are used
to encrypt information. Encrypting information means "scrambling it up" so
that only a person with the appropriate key can make it readable again.
Either one of Bob's two keys can encrypt data, and the other key can decrypt
that data.
Consider this message Susan sends to Bob: “Hey Bob, how about lunch at
Taco Bell. I hear they have free refills!" With a public key, Susan encrypts this
message. The encrypted message would appear like this: “HNFmsEm6Un
BejhhyCGKOK JUxhiygSBCEiC 0QYIh/Hn3xgiK BcyLK1UcYiY
201
Ibid
202
Ibid
203
Zekos G. I., ePen Technology and Electronic Signatures, Intellectual Property & Information
Technology Law, Vol. 8, Isuse 6, Dec. 31, 2003 at p. 2
86
lxx2lCFHDC/A”. Bob gets the message in an unintelligible form as it appears
above. With a private key Bob decrypts the message. The decrypted
message would appear as follows: “"Hey Bob, how about lunch at Taco Bell. I
hear they have free refills!” As can be noted, the decrypted message appears
in the form Susan sent before she encrypts with a public key. Thus, any of
Bob's coworkers might have access to the message Susan encrypted, but
without Bob's Private Key, the data is worthless.
Therefore, in order for a digital signature to qualify as such, it must meet the
following conditions. First, it should be unique to the subscriber affixing it.
Second, it should be capable of identifying such subscriber. Third, it should be
created in a particular manner using a means under the exclusive control of
the subscriber. Fourth, it should be linked to the electronic record to which it
relates in such a manner that if the record were altered, the digital signature
would be invalidated.204
204
Ibid
205
Sulner, H. F., Op. Cit. at p. 10
87
Manuscript signatures meet these functional requirements in a number of
ways. Identity is established by comparing the signature on the document with
other signatures, which can be proved, by extrinsic evidence, to have been
written by the signatory. The assumption is that manuscript signatures are
unique, and that therefore such a comparison is all that is necessary to
provide evidence of identity. In practice, manuscript signatures are usually
acknowledged by the signatory once they are shown to him, and extrinsic
evidence is only required where it is alleged that the signature has been
forged.
Electronic signatures can equally meet the law's functional requirements, but
in rather different ways. To begin with, the signature itself does not provide
sufficient evidence of the signatory's identity. To establish this, further
evidence is required which links the signature key or other signature device
used to the signatory himself.209
206
Ibid
207
See also the case of L'Estrange v. Graucob [1934] 2 KB 394, 403 per Scrutton LJ
208
See Saunders v. Anglia Building Society [1971] AC 1004.
209
Reed C. supra
88
effected with the signatory's secret key are verifiable using the public key. 210
Once the Certification Authority is satisfied as to the signatory's identity, it
issues an electronic certificate, which includes, inter alia, a certification of the
signatory's identity and of his public key.211 This certificate may be used by
the recipient to prove the signatory's identity.212
It is argued that, once identity has been proved, the very fact that an
electronic signature has been affixed to a document should raise the same
presumptions as for manuscript signatures.213 There is one difference,
however. In the case of a manuscript signature, the signatory has to be
present in person and must have the document to be signed in front of him.
Electronic signature technology is a little different. There are essentially two
options. Firstly, the signature is effected by selecting from an on-screen menu
or button, with the signature key stored on the signatory's computer.
Secondly, the signature key is stored on a physical token, such as a smart
card, which needs to be present before the signature software can affix the
signature.214
In either case, a third party who had access to the computer or to the storage
device would be able to make the signature. For this reason, an electronic
signature should be treated as more closely analogous to a rubber stamp
signature.215 The party who is seeking to rely on the validity of the signature
may need to adduce extrinsic evidence that the signature was applied with the
authority of the signatory. In many cases, where an electronic signature which
has previously been acknowledged by the signatory is effected by an
unauthorised third party, the apparent signatory will be estopped from denying
210
Smedinghoff, supra
211
Ibid
212
Ibid
213
Reed C. supra
214
Ibid
215
Ibid
89
that it was his signature216 because courts presume that a third party who is
given access to the signature technology has been authorised by the
signatory to sign on his behalf.217 Does this lead to a conclusion that an
electronic signature fails to meet the evidential requirements because a
successful forgery cannot be detected easily? The answer is, no. The reason
is that no such requirement is imposed for paper-based signatures.
Thus, while handwritten signatures in most cases serve merely to indicate the
signer's intent, signatures in an electronic environment typically serve three
critical purposes for the parties engaged in an e-commerce transaction: to
identify the sender, to indicate the sender's intent and to ensure the integrity
of the document signed.218
216
See Brown v. Westminster Bank Ltd. [1964] 2 Lloyd's Rep. 187
217
Smedinghoff, supra
218
Ibid
219
Reed C, 'What is a Signature?', 2000 (3) The Journal of Information, Law and Technology (JILT).
http://elj.warwick.ac.uk/jilt/00-3/reed.html/ p. 1
90
The field survey revealed that 15 percent of practicing lawyers scan their
signatures and embed them on electronic documents. One would be tempted
to doubt whether judges are prepared to admit the documents so signed
electronically. The study revealed that thirty percent of judges responded that
they would allow a party in a case to tender a document signed in electronic
221
form. Seventy percent of judges were, however, reluctant to admit
documents signed electronically. Two main reasons can be attributed to this
reluctance. First, the TEA does not provide for electronic signatures; and
second, the meaning of signature does not include a signature in electronic
form.
During the period of enactment of these statutes, the Legislature did not
contemplate technological advancement which makes it feasible to create
documents in electronic form. For example, the Interpretation of Laws Act 222
defines writing as “any expression referring to writing include printing,
lithography, typewriting, photography and other modes of representing or
reproducing words in visible form.”223 From this definition, it is clear that
digital information is not a representation or reproduction of words in a visible
form. However, courts may adopt a purposive approach to the meaning of this
definition and hold that an electronic document is a set of data from which
words in visible form can be reproduced if required.
220
Reed, C., Op. Cit at. 1
221
Ibid
222
Cap. 1 Revised Edition of 2002
223
Ibid
91
It is admitted that, given the ease with which the original of an electronic mail
message can be forged, authentication may present a problem should the
other party deny authorship of the message.
Simply relying on the e-mail address in the `From:' field of the message or on
the person's typed name appearing at the bottom of the message for
authentication may therefore not be enough. However, there are a number of
common-sense measures that can be taken. These can include use of a
private VAN which provides independent record of message origin and reply
to the stated e-mail address with an acknowledgement of receipt. An
unrejected acknowledgement may be accepted as evidence of authentication.
If the order is from a known customer, the acknowledgement may be sent by
fax or regular mail. The use of special customer codes or passwords known
only to the customer may also be an alternative for meeting the rules of
authentication.
6.9 Conclusion
92
CHAPTER SEVEN
7.1 Introduction
The courts have also addressed the need to have a legislative response
towards ICT. This Chapter will therefore examine the initiatives made so far,
both at the national level for those countries which have so far legislated in
this area and at the International level. The aim here is to draw lessons that
Tanzania may find relevant for addressing the impact of ICT on its law of
evidence.
It is these lessons that if adopted, may guide Tanzania to create a legal frame
that recognizes electronic evidence as well as modern rules of authentication
of documents in electronic form.
It will be argued in this Chapter that the importance of having the legal
framework which creates confidence amongst those in the business
community currently employing ICT in transactions of basic operations is that
doing so will promote electronic commerce.
93
legislation should clearly and unambiguously state that electronic signatures
satisfy legal signature requirements `and that writing in electronic form can
satisfy legal writing requirements. The legal framework for admissibility of
electronic evidence in different countries is discussed below.
It was pointed out earlier that Tanzania has not made any progress in
enacting any legislation to regulate electronic transactions, including
electronic evidence. However, there have been some initiatives that may
ultimately lead to having a legal frame for regulation of ICT in general, and
particularly of electronic evidence. The initiatives can be grouped into three
forms. These are legislative, judicial and administrative. On legislative
initiatives, there are ongoing efforts by the Law Reform Commission of
Tanzania, which has so far made a study on introduction of the legal
framework to regulate ICT in Tanzania. The draft discussion paper in this
respect was a subject of discussion in a series of stakeholders‟ workshops. In
these workshops, the stakeholders said that Tanzania definitely needs a law
on ICT and that in fact it should have been in place many years ago.
224
Mambi, Adam, “The Status of Cyber Laws in Tanzania” Paper presented in the Cyber Laws
94
The timely processing of the proposed Bills towards their enactment into laws
remains to be seen.
In yet another development in the area, the TEA has been amended to give
partial recognition to evidence generated electronically.225
Part IX of the amending Act, proposes to amend the Evidence Act, Cap. 6
(the Principal Act) and it reads: -
34.The principal Act is amended by adding immediately after section 40 the following
section-
35.The principal Act is amended by adding immediately after the definition of the
word “bank”, appearing in section 76, the following new definition –
36. Finally, the Bill seeks to amend the principal Act by adding immediately after
section 78 the following section –
95
such print out, and when such print out is supported by a proof
stipulated under subsection (2) of section 78 that it was made in the
usual and ordinary course of business, and that the book is in the
custody of the bank, it shall be received in evidence under this Act.
(2) Any entry in any banker‟s book shall be deemed to be primary evidence of
such entry and any such banker‟s book shall be deemed to be a
“document” for the purposes of subsection (1) of section 64.
The marginal note in the new section 78 A is “Electronic records.‟
Nevertheless, as pointed out early in this work, this initiative alone is seriously
inadequate in so far as electronic transactions and their nature are concerned.
In the first place, the amendment does not cover all aspects of challenges
posed by electronic transactions on the law of evidence. Only some few
sections of the Tanzania Evidence are amended, leaving untouched a number
of other provisions of the same law which relate to documentary evidence.
The amendment is also inadequate if one takes into account the fact that
there are various other laws in the country which touch upon documents as
potential pieces of evidence.
Furthermore, the amendment does not cover all issues relating to ICT,
electronic commerce and Internet transactions in general, particularly in
relation to legal certainty.
96
factual statements fall foul of the hearsay prohibition.226 But as has been
observed in R v. Minors227 if computer outputs cannot be relatively used as
evidence in criminal cases, much crime will in practice be immune from
prosecution. The result of the decision was however that in order to ensure
mechanisms for the authentication of electronically generated evidence, or
computer printouts under the (English) Police and Criminal Evidence Act,
1984, all computer evidence have to comply with the provisions of section 69,
which reads:
a) that there are no reasonable grounds for believing that the statement
is inaccurate because of improper use of the computer;
To satisfy the court that the conditions under the provisions of section 69(1)
above have been met, it is necessary to obtain either a signed statement or
oral testimony from a person who occupies a responsible position in relation
to the operation of the computer system.
226
See A.Singh, Principles of the Law of Evidence, 1st ed, Central Law Publishers, Allahabad, 1977
227
[1982] 2 All ER 208 at 210
228
See Sections 65A and 65B of the (Indian) Information Technology Act, 2000
97
a) It is necessary that the computer output containing the information was
produced by the computer, which was used regularly to store or
process the information for the purposes of any activities being
regularly carried on by the person having lawful control over the use of
the computer;
b) The information is of the kind which was regularly fed into the computer
in the ordinary course of its activities;
c) The computer should have been operating properly during the period of
the data feeding. If it was not operating properly during that period or
was out of operation, it is necessary that the gap was not such as to
affect the electronic record or the accuracy of its contents;
In addition, two distinct kinds of Rules have been put in place for the
authentication of electronically generated documents.
These rules are The Information and Communication Technology (Certifying
Authorities) rules 2000 and the Cyber Regulations Appellate Tribunal
(Procedure) Rules, 2000.
The Information Technology (Certifying Authorities) Rules 2000 detail various
aspects and issues concerning the Certification Authorities for digital
signatures. These rules specify the manner in which information has to be
authenticated by means of digital signatures, the creation and verification of
digital signatures, licensing of certification authorities and the terms of the
proposed licenses to issue digital signatures. The said rules also stipulate
security guidelines for certification authorities and maintenance of mandatory
databases by the said certification authorities and the generation, issue, term
and revocation of digital signature certificates.
The said rules further mandate the audit of the operations of the Certification
Authority and classify various kinds of information.
98
Therefore, when a statement has to be produced in evidence under the above
section, it has to be accompanied by a certificate that identifies the electronic
record containing the statement.
For these reasons, this work concludes that more needs to be done in
addressing the challenges posed by electronic transactions on the law of
evidence in Tanzania.
The second initiative is judicial. The leading case in this respect is Trust Bank
Tanzania Ltd vs Le-Marsh Enterprises Ltd.229 The case will be discussed in
this Chapter when addressing the judicial response to the impact of ICT in
Tanzania. The third initiative is administrative. In this, the Government of
Tanzania in 2003 issued a policy on ICT as briefly discussed earlier in
Chapter Three.
A good number of jurisdictions that follow the common law legal system and
some others that follow the continental legal system may assist in providing a
solution to admissibility of electronic records and documents. Among the
jurisdictions to be examined are the United Kingdom, Canada, India and
South Africa. Other jurisdictions like United States of America will also be
examined, due to the fact that computer technology including the Internet
traces its origin from this country.
229
Supra note 167
230
The Evidence Act of Canada (RS. 1985 Chapter C. 5 last accessed at http://laws.justice.gc.ca/en/C-
5/text.html on 27/04/2005
99
whole or any part of any book, document, paper, card, tape or other thing on
or in which information is written, recorded, stored or reproduced, and, except
for the purposes of subsections (3) and (4), any copy or transcript admitted in
231
evidence under this section pursuant to subsection (3) or (4).” Section 31.8
of the Act defines the term “data” to mean representation of information or of
concepts in any form. This would include, in our view, data or records in
electronic form.
As was discussed in the preceding sections of this work, Tanzania has also
adopted similar safeguards placed on admissibility of electronic records by
way of amending the Evidence Act of 1967.234 The definition of the term
„record‟ under the Canada Evidence Act may as well be adopted in the
Tanzania Evidence Act. Safeguards under section 78 of the Tanzania
Evidence Act of 1967 together with such other safeguards have been made
applicable to electronic records.
231
Ibid, s.30 (12)
232
Ibid, s.30 (1)
233
Ibid, s. 31 (1)
234
See supra note 4
100
7.3.2 Position in the United States of America
In the United States of America, most federal courts that have evaluated the
admissibility of computer records have focused on computer records as
potential hearsay.235 The courts generally have admitted computer records
upon showing that the records fall within the business records
236 237
exception. Kahn points out that most federal and state laws have roughly
kept pace with the adoption of information technology necessitating existing
laws to be rewritten. The purpose is to have the laws account for new
technological developments. In this spirit, some new laws have been created
in some cases, while other laws have remained untouched. However, for the
untouched laws, wide interpretation is made to include new technology. As
the focus of this study is limited to examination of admissibility of electronic
records, evidence statutes of America will be examined.
Federal Rule of Evidence 801(c) defines hearsay as "a statement, other than
one made by the declarant while testifying at the trial or hearing, offered in
evidence to prove the truth of the matter asserted." A "statement" is defined to
include a written assertion.238 Hearsay is not admissible in Federal court
except as provided by the Federal Rules of Evidence "or by other rules
prescribed by the Supreme Court pursuant to statutory authority or by Act of
Congress.”239 Among the exceptions enumerated under these rules are
Federal Rules of Evidence 803 that are particularly relevant to computer
printouts records of regularly conducted activity not excluded by the hearsay
235
Kerr S. Orin., Computer Records and the Federal Rules of Evidence, USA Bulletin (March 2001),
accessed at http://www.usdoj.gov/criminal/cybercrime/usamarch2001_4.htm on 30/03/2005 Kerr S.
Orin., Computer Records and the Federal Rules of Evidence, USA Bulletin (March 2001), accessed at
http://www.usdoj.gov/criminal/cybercrime/usamarch2001_4.htm on 30/03/2005
236
Ibid
237
Kahn, R., Op. Cit., at p. 9
238
Federal Rule of Evidence 801(c).
239
Federal Rule of Evidence 80 (2).
101
rule, even though the declarant is available as a witness. These records are a
memorandum, report, record, or data compilation, in any form, or acts, events,
conditions, opinions, or diagnoses, made at or near the time by, or from
information transmitted by a person with knowledge, if kept in the course of a
regularly conducted business activity, and if it was the regular practice of that
business activity to make the memorandum, report, record, or data
compilation, all as shown by the testimony of the custodian or other qualified
witness, unless the source of information or the method or circumstances of
preparation indicate lack of trustworthiness. The term "business" as used in
this paragraph includes business, institution, association, profession,
occupation, and calling of every kind, whether or not conducted for profit. The
phrase “in any form” would include such records in electronic form and print
out made in the course of business.
Tanzania should also adopt this provision and amend s. 34 (b) of the
Evidence Act which is similar to this provision to recognize business records
generated or stored by computers in electronic form.
Case law supports the above provision of the law. In Minnesota v. Philip
Morris Inc.,240 it was held that printing out large amounts of data results in the
receiving party spending time analyzing the information. Receiving the data in
only electronic form still allows the receiving party to conduct necessary
analysis. Another case taking this position is National Union Electric Corp. v.
Matsushita Electric Industrial Co.,241 where it was held that electronic
evidence can be required to be produced in electronic form.
240
No. CI-94-8565 (Dist. Ct. Minn.)
241
494 F. Supp. 1257 (E. D. 1980)
242
138 F. 3d 1164 (7th Cir. 1998)
102
hard drives, software, or onsite access to the producing party‟s computer
system. Further, in Fennel v. First Step Designs, Ltd.243 access to a hard drive
was denied in light of the lack of probative justification after relevant
documents had been provided on disk.
The position was made clearer upon adoption of the Rules on Electronic
Evidence by the Supreme Court of the United States of America on July 17,
2001. Under the Rules, “whenever a rule of evidence refers to the term
writing, document, record, instrument, memorandum, or any other form of
writing, such term shall be deemed to include an electronic document”. The
Rules also state that “an electronic document is admissible in evidence if it
applies with the rules on admissibility prescribed by the Rules of Court and
related laws and is authenticated in a manner prescribed” by the Rules.
Moreover, the Rules amend the Best Evidence Rule in the Rules of Court. It
states “electronic documents shall be regarded as the equivalent of an original
document under the Best Evidence Rule if it is printout or output readable by
sight or other means, shown to reflect the data accurately.”
243
83 F. 3d 526 (1st Cir. 1996)
244
292 N. J. Super. 11 (App. Div. 1996)
245
See Eckberg, J., E-mail: Messages are evidence accessed last at
http://www.enquirer.com/editions/2004/07/27/biz_biz2a.html. on 05/04/2005
103
7.3.3 Position in India
Before the enactment of the Indian Information Technology Act, 2000,246 the
Indian Evidence Act, 1872 regulated evidence matters. In practice, the Indian
law of evidence has been apt to accommodate new modern scientific
techniques of investigation. Thus, in India, strict adherence to doctrines of
best evidence rule, the necessity of direct evidence, prohibition of hearsay,
personal appearance of witnesses, precedence of documentary evidence, the
concept of a document and privileged communications beyond disclosure
have been re-examined with the view to making the law responsive to
changes brought about by information technology. 247
In this spirit, the Indian Information Technology Act of 2000 was enacted. As
shown in the preamble to this Act, the purpose of enacting it was to provide
legal recognition for transactions carried out by means of electronic data
interchange and other means of electronic communication which involve the
use of alternatives to paper-based methods of communication and storage of
information, to facilitate electronic filing of documents with the Government
agencies and further to amend the Indian Penal Code, the Indian Evidence
Act, 1872, the Banker‟s Books Evidence Act, 1891 and the Reserve Bank of
India Act, 1934.
Section 2 (d) of the said Information Technology Act of 2000 defines the
phrase „electronic records‟ to mean “data, records or data generated, image
or sound stored, received or sent in an electronic form or micro film or
computer generated micro fiche.”
“where any law provides that information or any other matter shall be in
writing or in the typewritten or printed form, then, notwithstanding anything
246
Act No. 21 of 2000 (India)
247
see the preface to the fifteenth edition in Sarkar., Op. Cit.,
104
contained in such law, such requirement shall be deemed to have been
satisfied if such information or matter is-
As said above, the Act amended various provisions in the statutes mentioned
above including the Indian Evidence Act of 1872. The aim of the amendment
is to accommodate electronic evidence including electronic records, which is
the focus of this study. In this spirit, the term „evidence‟ has been amended to
include “all documents including electronic records produced for the
inspection of the court.”248 Section 34, which lays down the evidentiary value
of entry made in books of accounts, has been amended. Thus, the words
“Entries in Books of Accounts, includes books maintained in an electronic
form” have been substituted for “Entries in books of accounts”, appearing in
section 34 of the TEA 1967.
From the discussion above, the position of the law, as of now in India, is that
electronic records enjoy the same status as paper-based records. Sections
65A provides for admissibility of electronic records while section 65B provides
for safeguards on admissibility of electronic records. This Chapter will further
discuss these safeguards.
As pointed out earlier, the Indian Evidence Act of 1872 is similar to the
Tanzania Evidence Act, 1967. Before enactment of the Tanzania Evidence
Act, Indian Evidence Act of 1872 was made applicable to Tanzania under the
reception clause to regulate evidence matters.
248
Section 3 of India Evidence Act of 1872
105
The main lesson that can be adopted in Tanzania is amending sections 34,
36, 37, and 76 – 82 to include records made in the course of business in
electronic form, books of account to include books of account kept in
electronic form and a banker‟s book to include a banker‟s book kept or stored
in electronic form.
The conditions that must be shown to exist for such evidence to be admissible
are: first, that the document containing the statement was produced by the
computer during a period over which the computer was used regularly to store
or process information for the purposes of any activities regularly carried on
over that period, whether for profit or not, by any body, whether corporate or
not, or by any individual; second, that over that period there was regularly
supplied to the computer in the ordinary course of those activities information
of the kind contained in the statement or of the kind from which the
information so contained is derived; third, that throughout the material part of
that period the computer was operating properly or, if not, that any respect in
which it was not operating properly or was out of operation during that part of
that period was not such as to affect the production of the document or the
accuracy of its contents; and fourth, that the information contained in the
106
statement reproduces or is derived from information supplied to the computer
in the ordinary course of those activities.
This position of the law was once given judicial interpretation where the views
of the Judge were well applied to the Act. This was in the English case of
Barker v. Wilson249
It was stated as follows:
"The Bankers‟ Books Evidence Act 1879 [of England] was enacted with
the practice of bankers in 1879 in mind. It must be construed in 1980 in
relation to the practice of bankers, as we now understand it. So
construing the definition of "bankers‟ books‟ and the phrase on "entry in
a banker‟s book", it seems to me that clearly both phrases are apt to
include any form of permanent record kept by the bank of transactions
relating to the bank‟s business made by any of the methods which
modern technology makes available…"
The case initiated a revolutionary move in the English evidence practice where, for
the first time, the court recognized the changes brought about by information and
communication technologies (modern technologies) in proving bankers‟ books.
249
[1980] 2 All E.R. 80 at page 82
250
1983 (Government Gazette, May 11, 1983; No. 8100 No.2, Act No. 57, 1983).
251
Ibid
107
question; second, examination of all relevant records and facts concerning the
operation of the computer and the data and instructions supplied to it.
The analysis of the legal framework discussed above reveals that the
procedure for admissibility of paper-based records made in the course of
business can and should be employed to admit electronic stored records
made in the course of business in Tanzania. The main tests are reliability,
trustworthiness and authenticity of such records.
The courts have always insisted on production of the original for the purpose
of testing the authenticity of records before admitting them as evidence in
courts proceedings. The Evidence Act of Tanzania provides that documents
must be proved by primary evidence. The Act defines primary evidence as the
document itself produced for the inspection of the court.252 According to this
rule, the document itself is the original. This position was restated in Shirin‟s
case253 where Onyiuke J. held: - “A document must be proved by primary
252
See section 64 (1) of the Act. For other definitions see 32A C.S.J. s.776, Lukas v. Williams & Sons
(1892) 2Q.B. 113 at p. 116 per Lord Esher MR.
253
Supra note 157
108
evidence by producing the document itself for the inspection of the court, and
by secondary evidence when it falls under the categories of s. 67 [of the]
Tanzania [sic] Evidence Act, 1967.”
The United Nations Draft Model Law on electronic records as well as the
Indian Evidence provides good guidance in this respect. Experiences drawn
from the cited instruments may provide some lessons that Tanzania may
adopt in laying down a legal framework conducive to admissibility of records
in electronic form.
254
See s. 2 of the Tanzania Evidence Act, 1967
255
Ibid
256
Ibid
109
a record of any other kind, and the time that the information is
displayed.”
Section 65A provides that the contents of electronic evidence may be proved
in accordance with the provisions of section 65B. Section 65B provides
admissibility of any information contained in an electronic record, which is
printed on paper, stored, recorded or copied in optical or magnetic media
produced by a computer (computer output) which are deemed under the
provision as documents.259 Based on the above analysis, it is clear that a
party to a case is allowed to bring in the courtroom a hard disk, a flash disk,
compact disk or a floppy diskette to prove the alleged fact using electronic
documents resident therein. However to be admissible as such, a party must
satisfy the conditions set out under section 65B (2) of the Act.
257
See Article 9 (1) of the Draft Model Law
258
See Article 9 (2) of the Draft Model Law
259
See s. 65B (1) of the Indian Evidence Act, 1872 as amended by the Information Technology Act,
2000
110
The conditions are as follows: first, that the computer output containing the
information has to be produced by the computer during the period over which
the computer was used regularly to store or process information for the
purposes of any activities regularly carried on over that period by the person
having lawful control over the use of the computer; second, that during the
said period, information of the kind contained in the electronic record or of the
kind from which the information so contained is derived was regularly fed into
the computer in the ordinary course of the said activities; third, that throughout
the material part of the said period, the computer was operating properly, or, if
not, then in any respect of any period in which it was not operating properly or
was out of operation during that part of the period, was not such as to affect
the electronic record or accuracy of its contents; and fourth, that the
information contained in the electronic record reproduces or is derived from
such information fed into the computer in the ordinary course of the said
activities.
From the provision discussed above, it is clear that the concept of original in
an electronic environment is different from original in a paper-based
environment. As seen above, the original in paper-based records and
documents is the document itself, presented for inspection of the court. In the
electronic environment, due to the nature of the electronic records, the
emphasis is placed on reliability of the system that generates or stores
260
65B (4) of the Indian Evidence Act, 1872 as amended by the Information Technology Act, 2000
111
electronic documents. Thus, it must be proved that the system was working
properly at the period the records or documents were either generated or
stored.
The United Kingdom's Electronic Communications Act 2000 ("UK ECA") came
into force on 25 May 2000. The Act defines electronic signature as so much of
anything in electronic form as is incorporated into or otherwise logically
associated with any electronic communication or electronic data and which
purports to be so incorporated or associated for the purpose of being used in
establishing the authenticity of the communication or data, the integrity of the
communication or data, or both.
261
Semidinghoff, Op. Cit
262
Ibid
112
From the above discussion, an electronic signature is defined generally as
being data in electronic form which is attached to or logically associated with
other electronic data and which serves as a method of identification. This
might include, for example, using a name on an email and sending it from an
identifiable email address.
Before the enactment of the Indian Information Technology Act, 2000, 263 the
Indian Evidence Act, 1872 regulated evidence matters. In 2000 the Indian
Information Technology Act was enacted. As shown in the preamble to this
Act, the purpose of enacting it was to provide legal recognition for
transactions carried out by means of electronic data interchange and other
means of electronic communication, which involve the use of alternatives to
paper-based methods of communication and storage of information, to
facilitate electronic filing of documents with the Government agencies and
further to amend the Indian Penal Code, the Indian Evidence Act, 1872, the
Banker‟s Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934.
The Act defines "hash function" to mean “an algorithm mapping or translation
of one sequence of bits into another, generally smaller sets known as "hash
result" such that an electronic record yields the same hash result every time
the algorithm is executed with the same electronic record as its input making it
computationally infeasible”
113
On legal validity of electronic signatures, the Act provides that “where any law
provides that information or any other matter shall be authenticated by affixing
the signature or any document shall be signed or bear the signature of any
person then, notwithstanding anything contained in such law, such
requirement shall be deemed to have been satisfied, if such information or
matter is authenticated by means of digital signature affixed in such manner
as may be prescribed by the Central Government.”
Two forms of signatures are recognized under the Directive. These are
electronic signatures and advanced electronic signatures.267 The Directive
defines electronic signature as data in electronic form which are attached to or
logically associated with other electronic data and which serves as a method
of authentication. The second form is advanced electronic signature.268
264
Section 35 of the Indian Information Technology Act, 2000
265
Article 1 of the EU Electronic Signatures Directive (1999/93/EC) ("ES Directive").
266
Ibid
267
Ibid, Article 2 (1)
268
Ibid
114
The advanced electronic signature is defined as electronic signature which
meets the following requirements: it is uniquely linked to the signatory,
capable of identifying the signatory, created using means that the signatory
can maintain under his sole control and lastly, linked to the data to which it
relates in such a manner that any subsequent change for the data is
detectable.269 This advanced form of electronic signature will require the use
of some form of encryption.270
The Model Law defines electronic signatures as “data in electronic form in,
affixed to or logically associated with, a data message, which may be used to
identify the signatory in relation to the data message and to indicate the
signatory‟s approval of the information contained in the data message.” 272 The
Model Law defines “certificate” as “a data message or other record confirming
the link between a signatory and signature creation data” 273 The data
message is defined as “information generated, sent, received or stored by
electronic, optical or similar means including, but not limited to, electronic data
interchange (EDI), electronic mail, telegram, telex or telecopy”274
269
Ibid
270
Loyyd., Op. Cit at p. 555
271
UNCITRAL Model Law on Electronic Signatures
272
Ibid, Ariticle 1
273
Ibid
274
Ibid
115
On reliability and security of electronic signatures, the Model Law provides
that an electronic signature is considered to be reliable if first, the signature
creation data are within the context in which they are used, linked to the
signatory and to no other person. Second, the signature creation data were, at
the time of signing, under the control of the signatory and of no other person.
Third, any alteration to the electronic signature, made after the time of signing,
is detectable. Last, if any alteration made to that information after the time of
signing is detectable. The purpose of these requirements is to assure integrity
of the electronic records.
As observed elsewhere in this study, the Tanzania Evidence Act of 1967 does
not accommodate electronic evidence and modern rules of authentication of
electronic documents. It is argued here that the same safeguards can be
applied to govern admissibility of electronic records. However, as learned
from jurisdictions examined above, this requires a combination of two
mechanisms. These are legislative and judicial intervention.
275
Smedinghoff, Op. Cit.
116
the U.S. alone, fifty-seven new electronic signature bills were introduced in
the state legislatures during the first two months of 1999.276
At the International level, the Model Laws of the United Nations in this respect
is also a good example. These Model Laws are UNCITRAL Model Law on
Electronic Commerce and UNCITRAL Model Law on Electronic Signatures. At
the regional level, the European Union adopted the Directives on E-commerce
and Electronic Signatures.
The field survey reveals that 75 percent of judicial officers are of the view that
the most suitable approaches for Tanzania are to amend the TEA to
accommodate electronic evidence and for principles governing paper-based
documents to be extended through precedent to cover documents in
electronic form. As indicated above, while this work was still in progress, the
parliament amended the TEA 1967 for that purpose.
Practicing lawyers took a more or less different approach. They suggest two
approaches. The first one is enactment of a single comprehensive legislation
on ICT and the second, is to have a comprehensive statute of evidence that
provides for electronic evidence.
The authors are in consensus with the view taken by practicing lawyers, that
is to have a single law on ICT. However, there are some areas that may need
to have a specific piece of legislation to address fully peculiar features in that
area. The law of evidence is one of those where mere amendment is
insufficient; there is a need to have a comprehensive piece of legislation to
regulate this area. A good example of this is the commonwealth model law on
electronic evidence. The need to have a law on this are was correctly stated
by Hon. Nsekela J., (as he then was) in the following words:- “… inasmuch as
I subscribe to the view that the court should not be ignorant of modern
business methods and shut its eyes to the mysteries of the computer, it would
276
Ibid
117
however, have been much better if the position were clarified beyond all
doubts by legislation rather than by judicial intervention.” 277.
The law proposed to be enacted will have to provide for requirements for the
satisfaction of an original, which, as learned from other jurisdiction, is satisfied
by proof of reliability of the system that stored or generated electronic records.
The role of the Judiciary in the interpretation of the law is a crucial one. In
adopting a purposive approach, the court may remove the writing and
signature barriers on electronic transactions by replacing the term “document”
for the term “record”. The intention of this is to include electronic or digital
records within the meaning of records. Thus, when a statute requires a record
to be in writing, an electronic record would satisfy the requirement.
277
See supra note
118
parties to an agreement, their legitimacy and the intention that the formalized
agreement be acted upon.
National Bank of Commerce v. Milo Construction Co. Ltd and two others282
was the case involving a claim on recovery of an amount of money alleged to
have arisen out of an overdraft facility. It was alleged that the plaintiff
defaulted repayment of the said facility. Two statements were tendered in
court. One was the processed easy bank computer program and the other
278
Supra note 168, p.13
279
Justice Nsekela is currently a judge of the Court of Appeal of Tanzania
280
Supra note 168
281
Commercial Case No. 71 of 2002 (Unreported)
119
was the processed inflexible banking computer program. The court found
discrepancies between the two statements as some entries were not reflected
in one of the statements. The Plaintiff did not adduce sufficient explanation on
the discrepancies. The court therefore found that the plaintiff has failed to
prove the exact amount the first Defendant borrowed from the Plaintiff.
The analysis of this case reveals that the Plaintiff had bank-produced
statements generated by two different computer programs. The later program
did not have features similar to the earlier one. Unfortunately, the Bank failed
to lead expert evidence to clear the discrepancies noted. The court was
therefore justified in rejecting the claim in absence of sufficient explanations
regarding the operation of the two computer programs. One would expect the
bank to make use of the software programmers who created the two
computer programs. Perhaps it is an opportune moment for the courts to
make use of forensic experts, who would assist it in analyzing computer-
related evidence.
7.8 Conclusion
The thrust of this chapter centred on the legal framework for admissibility of
electronic evidence in Tanzania. The Tanzania position was addressed, and it
was observed that, although there are some recent legislative as well as
administrative and judicial initiatives, the current legal system does not
adequately address the impact of ICT on the rules of evidence in Tanzania.
Lessons from other jurisdictions were drawn, and it was found that such
jurisdictions have responded to the impact of ICT by enacting pieces of
legislation on various areas. The law of evidence is one of the areas that have
been legislated from.
120
The role of the court in extending the existing principles of documentary
evidence and rules of authentication to cover electronic documents and
electronic signatures as observed is also a crucial one. This is important
because parties transacting online need to be assured that the transactions
they are engaged in will in the end, be protected by the law. In absence of the
legislation to this effect, it is argued in this work that judges should be
prepared to extend the principles applicable to paper-based documents and
rules of authentication to cover documents and signatures in electronic form
by giving a wider interpretation to terms like “signature”, “writing”, “document”,
“record” and other terms of similar nature.
121
CHAPTER EIGHT
8.1 Conclusions
The discussion in this book aimed at assessing the impact of ICT on rules of
evidence in Tanzania. It endeavoured to examine the legal framework under
which electronic transactions are currently conducted in Tanzania.
122
It was concluded that, as ICT development necessitated changes in the way
business transactions are currently conducted, the main challenge posed by
these developments, in turn, is the necessity of parallel changes in both
national and international legal framework to accommodation the changes.
Part Two of the book looked at the law of evidence in Tanzania, in general,
and the significance of evidence and rules of authentication in legal
transactions, in particular. It was found out that the law of evidence governs
modes and methods for provision of facts and information to enable a judicial
conclusion. It was further revealed that electronic evidence is a new method
of presenting evidence in court. It is therefore imperative that a clear legal
framework should be established for this newly developing method and type
of evidence and that it should be incorporated in the existing law of evidence.
Judicial intervention was also discussed. It was found out that courts have not
remained silent to the new techniques of presentation of evidence. The
amendment of the banker‟s book to include a computer-generated statement
is one proof of this fact.
The impact of ICT on rules of evidence under the TEA was explored, and it
was observed that the best evidence rule and rules governing authentication
of documents under the TEA have been affected by the advancement of ICT.
The conclusion is that principles governing admissibility of paper-based
documents and rules of authentication under the Act can hardly be applied to
documents in electronic form. The reason is based on the nature of electronic
123
evidence, to wit, not tangible, not visible, not permanent, easy to manipulate
and on some occasions, automatically generated by computers or
computerized devices.
In Tanzania, there are various other ongoing initiatives to have a law that
recognizes electronic transactions, including electronic evidence, in place.
Some of these are the introduction of the ICT policy which, as observed, did
not fully address how the legal framework in this respect should be put in
place, apart from mentioning a need to reform the existing pieces of
legislations and enacting specific ones to accommodate electronic
transactions. The other two initiatives are commendable. The first one is led
by the Law Reform Commission of Tanzania, which is carrying out a review of
the laws affected by ICT with a view to recommending legislative intervention
and the second on a by the Judiciary which has started to respond to the
impact as a result of advancement of ICT by giving “banker‟s book” a wide
interpretation to include a computer-generated bank statement.
8.2 Recommendations
For the legislative process, two approaches are recommended. The first is to
enact a comprehensive piece of legislation on ICT and electronic evidence to
124
provide for admissibility of electronic records and documents as well as
electronic signatures. It is proposed in this study that there should also be a
specific statute to govern electronic signatures. This is because this area is
very wide, and it needs special attention. A good example is the UNCITRAL
Model Law on Electronic Signatures. This approach has also been adopted in
the United States of America where there are a number of statutes specifically
regulating electronic signatures. The laws to be enacted could then amend all
other laws touching upon and/or requiring electronic records.
A similar view was taken in the English case of R. v. Shepherd.284 Though this
case was criminal in nature, the principle set in this case is relevant to the
point under discussion. It was held that “… proof that a computer was reliable
283
Ibid
284
[1993] I All ER at 213
125
could be provided by calling a witness who was familiar with its operation in
the sense of knowing what the computer was required to do and who could
say that it was doing it properly, and such a witness needs not be someone
responsible for the operation of the computer.285
Furthermore, in the view of the authors, this also would have been a good
opportunity for the court to give directives to guide admissibility of electronic
evidence in Tanzania. The precedent set by the Supreme Court of America, in
this respect, is worth emulating.
285
Ibid
126
REFERENCES
PAPERS
Kahn, R. A., & Blair, B. T., “The Anatomy of An E-mail Message: Why Good
http://www.kahnconsultinginc.com/library/KCI-Anatomy-of-an-Email.pdf on
25/02/2005
www.unctad.org/ecommerce/event_docs
Ryan D. J., & Shpantzer, G., “Legal Aspects of Digital Forensics”, The George
Washington University, Washington, D.C, 2006.
Canada at http://www.law.ualberta.ca/alri/ulc/current/eelev.htm
127
REPORTS
Hagberg, Karen L., and A. Max Olson. "Shadow Data, E-mail Play a Key Role
from the Global Periphery” National Archives of South Africa Journal of the
Kerr S. Orin, “Computer Records and the Federal Rules of Evidence”, USA
the Internet,” African Affairs: The Journal of the Royal African Society, Vol.105
(b) Books
Bacchetta, M, et al. Electronic commerce and the role of the WTO: World
Trade Organization, Geneva, 1998
Chissick, M., Electronic Commerce: Law and Practice, 3rd Ed., London,
128
Sweet &Maxwell, 2000
Mapunda, B. T., Evidence, Part One, The Open University of Tanzania, First
Edition, 2004
Singh, A. Principles of the Law of Evidence, 1st ed, Central Law Publishers,
Allahabad, 1977
ELECTRONIC SOURCES
http://www.standardchartered.com/global/cib/electronic_banking/eb_cr_01.ht
ml
http://www.sidley.com/cyberlaw_new.asp on 24/2/2005
http://www.asianlaws.org/cyberlaw/library/india/cc/dig_evi_legal.htm
http://deltabravo.net/custody/email.htm
http://www.usdoj.gov/criminal/cybercrime/usamarch2001_4.htm on
30/03/2005
http://www.asianlaws.org/cyberlaw/library/india/cc/dig_evi_legal.htm
http://deltabravo.net/custody/email.htm
129
APPENDICES
AN ACT to make provisions for the legal recognition of electronic records and to
facilitate the admission of such records into evidence in legal proceedings.
Short Title 1. This Act may be cited as the Electronic Evidence Act..
Scope of Act (2) A court may have regard to evidence adduced under
this Act in applying any common law or statutory rule
130
relating the admissibility of records.
131
be presented in respect of any standard, procedure, usage
or practice on how electronic records are to be recorded or
preserved, having regard to the type of business or endeavour
that used, recorded or preserved the electronic record and the
nature and purpose of the electronic record.
(2) Any party to the proceedings may, with leave of the court,
cross examine a person referred to in subsection 7(c).
132
APPENDIX I1: ELECTRONIC TRANSACTIONS MODEL LAW
3. Objects
The objects of this Act are:
a) to eliminate legal barriers to the effective use of electronic
communications in transactions;
b) to promote the harmonization of legal rules on electronic
transactions across national boundaries;
c) to facilitate the appropriate use of electronic transactions;
d) to promote business and community confidence in electronic
transactions; and
e) to enable business and the community to use electronic
communications in their transactions with government.287
4. Definitions
(1) In this Act:
“electronic” includes created, recorded, transmitted or stored in digital or
other intangible form by electronic, magnetic, optical or by any other means
that has capabilities for creation, recording, transmission or storage similar to
those means.288
133
(a) a Minister, ministry or department of government;
(b) courts
(c) bodies exercising statutory authority, of legislative,
executive or judicial nature
(d) subnational or local public authorities, including
municipalities.291
5. Crown/Government/State to be bound
This Act binds the Crown/Government/State .292
6. Non-discrimination against electronic information
134
retained, the consequences are achieve if the section is
complied with.
7. Writing requirements
(1) A rule of law that requires information to be in writing or
to be given in writing is satisfied by information in
electronic form if the information is accessible so as to be
usable for subsequent reference.
(2) In subsection (1), giving information includes, but is not
limited to, the following
(a) making an application;
(b) making, filing or lodging a claim;
(c) giving, sending or serving a notification;
(d) filing or lodging a return;
(e) making a request;
(f) making a declaration;
(g) filing, lodging or issuing a certificate;
(h) making, varying or canceling an election;
(i) filing or lodging an objection;
(j) giving a statement of reasons.
8. Prescribed forms
(1) A rule of law that requires a person to provide information in a
prescribed non-electronic form to another person is satisfied by the
provision of the information in an electronic form that is
9. Signature requirements
(1) If a rule of law requires the signature of a person, that
requirement is met by an electronic signature.295
294
This section is intended to interpret a rule of law saying “give” or “send” or “deliver” information in
writing (like a notice). The point is that the information has to be put within the control of the
addressee.
295
Enacting countries may wish to give power to their regulation making authority to prescribe that
signatures for particular purposes must be as reliable as appropriate in the circumstances, including any
relevant agreement, or that they must use a method specified in the regulation. If a reliability test is
135
(2) Parties may agree to use a particular method of electronic
signature, unless otherwise provided by law.296
wanted, it may be expressed in the language of Articles 6 (1) through (4) of the UNCITRAL Model
Law on Electronic Signatures.
296
The Experts‟ Group recommended that electronic signatures in general should not have to meet a
test of their reliability. Handwritten signatures are subject to no such test. If a person who wants to
rely on a signature proves the identity of the person who signed and the signer‟s intention to be linked
to the information that should be sufficient to meet a requirement that information must be signed.
Having to show in addition that the signature method was appropriately reliable adds uncertainty to
proof that would suffice to support a manual signature.
297
This provision may not be needed for the law of evidence if the enacting country has made other
rules about electronic evidence, and might then be expressly excluded.
298
Need a note about risks of electronic storage – difficulty and expense of keeping hardware and
software current.
136
document is accessible so as to be usable for subsequent
reference to any person entitled to have access to the
information or to require its production.299
(2) Subsection (1) is subject to any rule of law that expressly prohibits
the use of electronic means or expressly requires them to be used in
specified ways.
137
(c) control processes and procedures to ensure integrity,
security and confidentiality of the information;
(d) any other attributes for the information that are currently
specified for corresponding information on paper.
(5) The requirements of subsections 7 (1) and (3) and section 8 also
apply to information described in subsection (4).
15. Exclusion301
This Act does not apply to:
A: It can be limited to commercial transactions only. Footnote **** of the U.N. Model
Law on Electronic Commerce indicates usefully the scope of such an application.
The Advantages of such a limit are that it does not permit the use of electronic
communications in areas where many countries are finding them useful, such as
communications between citizen and government, and that it is sometimes hard to
know if a particular transaction is commercial: consider the provision of services to
government or to a not-for-profit organization.
B: The scope can be expanded to all information or documents, not just (commercial)
transactions. As a drafting alternative, the expanded statute could focus not on
transactions or communications but on electronic records. For example, most
Canadian statutes discuss electronic documents or information. The advantages of
such an expansion are that it is very flexible; it avoids having to know exactly what a
transaction is: consider applications, or the retention of a document. To extent that the
main body of incidents not a transaction relates to dealing with government, and the
Act contains rules about public bodies‟ communication – inbound and outbound – then
there may be no particular risk in expanding scope to all communications. Risks can
be dealt with by exempting particularly risky documents of transactions from the scope
and by ensuring that parties to communications have a choice whether to accept them
in electronic form, i.e. that they can opt into the electronic system.
302
This means that bills of lading cannot be done electronically under this Act. To extend the statute to
transport documents one would need express legislative authority, not necessarily in this Act.
303
Probate documents are not listed here because they are issued by a public body – a court – which
will determine under section 14 whether and how they may be created and submitted electronically.
138
(1) Nothing in this Act limits the operation of any other rule of law
that expressly authorizes, prohibits or regulates the use of information in
electronic form, including a method of electronic signature.
(2) Nothing in this Act limits the operation of any other rule of law
requiring information to be posted or displayed in a specified manner or
requiring any information to be transmitted by a specified method.
17. Consent
(1) Nothing in this Act requires a person to use, provide or accept
information in electronic form without consent, but a person’s consent to do
so may be inferred from the person’s conduct.304
(2)Despite subsection (1), the consent of a public body use the term also used
in s. 14 for government to accept information in electronic form may not be
inferred from its conduct but must be expressed by communication accessible
to the public or to those likely to communicate with it for particular
purposes.305
(3)Nothing in this Act authorizes a public body use the term also used in s. 14
for government to require any person to use, provide or accept information
in electronic form without consent.306
18. Contracts
(1)Unless the parties agree otherwise, an offer, the acceptance of an offer or
any other matter that is material to the formation or operation of a contract
may be expressed:
304
This provision allows a person to set conditions on acceptance, based on readiness or estimations of
compatibility of formats or reliability standards, or to accept electronic communication for some
purposes and not for others. It does not prevent a person from being bound by other means – such as
by contract‟ to communicate electronically.
305
This provision allows government to opt into electronic communications gradually, department by
department, agency by agency, or even program. Some enacting countries may wish to compel all
parts of government to be ready for electronic communications at the same time. Such countries may
state that the consent of government is not needed for electronic communications to it to be legally
effective. Nevertheless governments will have legitimate reasons to insist on standards of
interoperability, reliability, proof of delivery and the like. These are now dealt with expressly in
section 14 of the Act.
306
While “nothing in this Act” authorizes a government to require the use of electronic
communications, governments may have or give themselves such authority by other means. It is
generally thought inappropriate to do so in generally applicable legislation.
139
(a)
by means of information in electronic form; or
(b)
by an act that is intended to result in electronic communication,
such as touching or clicking on an appropriate icon or other
place on a computer, or by speaking.
(2)A contract is not invalid or unenforceable by reason only of being
in electronic form.
307
This section applies to declarations of intention outside the context of a transaction, such as
declarations of trust, gifts without delivery, and the like. The usual law about their validity and
enforceability continues to apply.
140
(2) An electronic communication is presumed to be received by the
addressee,
(3) Subsections (1) and (2) apply unless the parties agree otherwise
(5) If the sender or the addressee has more than one place of business, the
place of business for the purpose of subsection (4) is the one with the closest
relationship to the underlying transaction to which the electronic
communication relates or, if there is no underlying transaction, the person’s
principal place of business.
(6) If the sender or addressee does not have a place of business, the person’s
place of habitual residence is deemed to be the place of business for the
purposes of subsection (4).
308
These provisions could be put in a general statute about consumer protection. Otherwise it may be
necessary to sate how one decides that someone is a consumer. The provisions are adapted from the
OECD Guidelines for Consumer Protection in the context of Electronic Commerce.
141
(a) the legal name of the person, its principal geographic address,
and an electronic means of contact or telephone number;
(b) prompt, easy and effective consumer communication with the
seller;
(c) service of legal process.
309
If such a regulation is made, it may be helpful to incorporate into the regulation, or the statute, the
tests of reliability in the UNCITRAL Model Law on Electronic Signatures, Articles 6.
142
APPENDIX II1: COMPUTER AND COMPUTER RELATED BILL
PART II
OFFENCES
5. Illegal access
6. Interfering with data
7. Interfering with a computer system or systems
8. Illegal interception of data, etc.
9. Illegal devices
10. Child pornography
PART III
PROCEDURAL POWERS
11. Definitions for this Part
12. Search and seizure warrants
13. Assisting police
14. Record of and access to seized data
15. Production of data
16. Disclosure of stored traffic data
17. Preservation of data
18. Interception of electronic communications
19. Interception of traffic data
20. Evidence
21. Confidentiality and limitation of liability
143
COMPUTER AND COMPUTER RELATED CRIMES BILL
PART I
INTRODUCTION
144
(a) that relates to a communication by means of a
computer system; and
(b) is generated by a computer system that is part of
the chain of communication; and
(c) shows the communication’s origin, destination,
route, time date, size, duration or the type
underlying services.
OFFENCES
145
(d) obstructs, interrupts or interferes with any person
in the lawful use of data; or
(e) denies access to data to any person entitled to it;
146
available:
Child 10.(1) A person who, intentionally, does any of the following acts:
Pornography
(a) publishes child pornography through a computer
system; or
(b) produces child pornography for the purpose of its
publication through a computer system; or
(c) possesses child pornography in a computer system
or on a computer data storage medium;
311
Subsection 3 is an optional provision. For some countries such a presumption may prove very
useful while for others, it may not add much value, in the context of this particular offence. Countries
need to consider whether the addition would be useful within the particular legal context.
147
commits an offence punishable, on conviction, by imprisonment
for a period not exceeding period or to a fine not exceeding
[amount]312 or both.313
“publish” includes:
148
(c) print, photograph, copy or make in any other manner
(whether of the same or of a different kind or nature) for
the purpose of doing an act referred to in paragraph (a).
PART III315
PROCEDURAL POWERS
“seize” includes:
315
As most jurisdictions already have legislative or common law search powers, the purpose of
sections 11 and 12 is to illustrate the amendments necessary to existing powers to ensure that such
powers include search and seizure in relation to computer systems and computer data. The example
given is of necessary amendments to a sample general search warrant provision but similar
amendments would need to be made to all search powers, including powers of search on arrest, search
without warrant in exigent circumstances, and plain view seizures.
149
(a) that may be material as evidence in proving an
offence; or
(b) that has been acquired by a person as a result of an
offence;
150
(i) the occupier of the premises; or
(ii) the person in control of the computer
system.
318 As noted in the expert group report, in some countries it may be necessary to apply the same
standard for production orders as is used for a search warrant because of the nature of the material
that may be produced. In other countries it may be sufficient to employ a lower standard because the
151
Disclosure of Option 1
Stored traffic
data
16. If a police officer is satisfied that data stored in a computer system
is reasonably required for the purposes of a criminal investigation, the
police officer may, by written notice given to a person in control of the
computer system, require the person to disclose sufficient traffic data
about a specified communication to identify:
Option 2
production process is less invasive that the search process. Countries may wish to consider whether
subparagraph 15(c ) is appropriate for inclusion in domestic law because while it may be of great
practical use, it requires the processing and compilation of data by court order, which may not be
suitable for some jurisdictions.
152
Interception 18. If a magistrate or judge is satisfied on the basis of
of electronic information on oath affidavit that there are
communications reasonable grounds to suspect to believe that the
content of electronic communications is reasonably required for
the purposes of a criminal investigation, the
magistrate/judge [may] [shall]:
a) order an internet service provider whose service is
available in [enacting country] through application of
technical means to collect or record or to assist
competent authorities with the collection or recording
of content data associated with specified
communications transmitted by means of a computer
system; or;
b) authorize a police officer to collect or record that data
through application of technical means.
153
does not of itself prevent that evidence from being
admitted.
Confidentia- 21. (1) An Interest service provider who without lawful authority
lity and discloses:
limitation of
liability
(a) the fact that an order under section 13, 15,
16, 17, 18 and 19 has been made; or
(b) anything done under the order; or
(c) any data collected or recorded under the
order;
(2) An Internet service provider is not liable under a civil or criminal law
of (enacting country) for the disclosure of any data or other
information that he or she discloses under sections 13, 15, 16, 18 or 19.
154
TABLE OF LEGISLATION
Berne Convention for the Protection of Literary and Artistic Works (Paris Text
1971)
Tanzanian Statutes.
The Broadcasting Services Act, 1993
The Copyright and Neighbouring Rights Act, No. 7 of 1999 (Cap 218,
R.E.2002)
The Evidence Act, No. 6 1967 (Cap 6, R.E.2002)
The Fair Competition Act, No. 4 of 1994 (Cap 285, R.E.2002)
The Interpretation of Laws Act, No. 4 of 1996 (Cap 1 R. E. 2002)
The Law of Contract Act, 1961 (Cap 345, R.E.2002)
The Tanzanian Communications Regulatory Authority Act of 2003
155
TABLE OF CASES
156
The Statue of Liberty Owners of Motorship Sappord Maru v. Owners of Steam
Tanker Statue of Liberty [1968] 2 All ER 195 her [1980] TLR 59
Trust Bank Tanzania Ltd v. Le Marsh Enterprises Ltd and Others, Commercial
Case. No. 4 of 2000, H.C. (Com.Div) (unreported)
157