South Africa: Committee Urges South African Police Service (SAPS) to Prioritise Training to Ensure that all Stations Respond Adequately in Missing Children Cases
The Portfolio Committee on Police has reiterated its concern that some South African police stations continue to ignore the National Commissioner's directive that police must respond immediately in cases of missing persons. The committee held a follow-up meeting with the SAPS and Women Empowerment Platform on violence against children regarding the matter of Jayden Lee Meek and other missing children.
'What came out of all the cases of missing children is the lethargy that the SAPS at police stations have generally responded when the case is reported. If the SAPS adhered to the directive that there is no waiting time to respond, many of these children could have been found alive,' said Mr Ian Cameron.
The committee reiterated that no 24- or 48-hour rule precludes members of the public from opening a missing person's report. A missing person report must be opened and investigated immediately. An insistence to prevent the opening of a missing person report is irresponsible and runs counter to the directive issued by the National Commissioner of the SAPS. 'The committee has also emphasised that in a case where an officer refuses to open a case they can be reported.
The committee also emphasised the communication shortcomings from the SAPS in keeping families updated on the progress of the case. According to the committee, continuous updates are necessary to assure communities and families that the SAPS is continuously investigating and that justice will be attained. It is important that SAPS also follow every lead to ensure justice. It is unacceptable that some cases are closed as undetected. For example, the case of Mia Botha has been ongoing for over 1 000 days, and there has not been tangible progress.
The importance of the police K9 unit was also highlighted as an intervention that could have assisted the search in the Jayden Lee Meek and other similar cases. It remains unacceptable that the K9 unit in the SAPS remains severely underfunded and under-resourced. 'The continued disregard of this critical capability in the SAPS is illogical and undermines the police's ability to undertake effective search and rescue missions, 'Mr Cameron emphasised.
Despite these concerns, the committee welcomed the active participation of civil society, such as the Women Empowerment Platform on violence against children. The contributions by civil society in finding solutions to the high crime rate must be encouraged. 'We reiterate the call that combating crime requires a whole-of-society approach if it is to be successful. The SAPS alone cannot effectively fight crime,' Mr Cameron said.
Meanwhile, the Chairperson reiterated the committee's apologies for the miscommunication that resulted in erroneous reporting following the meeting held on 11 June 2025. The committee emphasised that there was no clarity that the meeting will be virtual and that representatives of the Women Empowerment Platform had planned to travel to Parliament and to hand over a memorandum. The committee reiterate its agreement with the Women Empowerment Platform that cases of violence against children must be investigated to ensure justice.
Distributed by APO Group on behalf of Republic of South Africa: The Parliament.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Zawya
2 days ago
- Zawya
South Africa is a prime target for ransomware attacks: How to safeguard your system?
Ransomware attacks have become a significant threat to South African businesses, with the country emerging as a top target in Africa. The prevalence of these attacks is driven by a combination of factors, including the rapid digital transformation of businesses, the increasing sophistication of cybercriminals, and the economic incentives for attackers. South Africa's relatively strong economy and high levels of digital adoption make it an attractive target for ransomware operators, who know that businesses and institutions here are more likely to pay ransoms to recover critical data. Why South Africa is a hotspot for ransomware South Africa's position as a regional economic hub means that its businesses and government institutions store vast amounts of sensitive data online. Cybercriminals are well aware of this, and they exploit vulnerabilities in outdated systems, weak passwords, and human error to infiltrate networks. For instance, a healthcare provider could fall victim to a ransomware attack if its systems are not updated with the latest security patches, allowing attackers to encrypt patient records and demand a hefty ransom. Similarly, a financial institution might be targeted if employees click on a phishing email, granting attackers access to the network. Common tactics used by ransomware operators Ransomware attacks often begin with phishing emails, where attackers use social engineering to trick employees into clicking malicious links or downloading infected attachments. Once inside the network, the ransomware spreads rapidly, encrypting files and rendering them inaccessible. Attackers then demand payment in exchange for decryption keys. In some cases, they also steal sensitive data and threaten to leak it if the ransom is not paid. Another common tactic is using exploit kits, which scan systems for vulnerabilities and deploy ransomware payloads without the need for user interaction. For example, a manufacturing company could be targeted through a compromised website, where an exploit kit silently installs ransomware on its systems. The cost of ransomware attacks The financial impact of ransomware attacks can be devastating. Beyond the ransom itself, businesses face costs related to downtime, lost revenue, and reputational damage. A retail chain might lose millions of rands in sales during a ransomware-induced shutdown, while a logistics company could suffer delays in delivering goods, leading to customer dissatisfaction. Moreover, the recovery process could take weeks or months, compounding the financial losses. Prevention is key: building resilient infrastructure Businesses must adopt a proactive approach to cybersecurity to protect themselves from ransomware. This starts with regular employee training to recognise phishing attempts and other social engineering tactics. Companies should also implement robust password policies and multi-factor authentication (MFA) to reduce the risk of unauthorised access. Keeping software and systems up to date is crucial, as outdated systems are a common entry point for ransomware. Partnering with an experienced IT security provider can make a significant difference in preventing ransomware attacks. An expert partner can help businesses identify vulnerabilities, implement advanced monitoring tools, and develop a comprehensive incident response plan. For example, a small business might work with an IT partner to deploy endpoint protection software that detects and blocks ransomware before it can encrypt files. Additionally, regular backups of critical data, stored securely offsite, can ensure businesses recover quickly without paying a ransom. A multi-layered defence strategy A multi-layered approach to cybersecurity is essential for safeguarding against ransomware. This means having multiple layers of security measures in place, each one adding a different level of protection, such as firewalls, email security, and intrusion detection systems, which can be used to block attacks at the perimeter. Inside the network, businesses should use tools that monitor for suspicious activity and automatically respond to potential threats. For example, a financial institution might use machine learning algorithms to analyse network traffic and detect anomalies that could indicate a ransomware attack. While prevention is the best defence, cyber insurance can provide additional protection. Policies that cover ransomware attacks can help businesses recover financially from the costs of downtime, data recovery, and ransom payments. However, insurers are increasingly scrutinising the cybersecurity measures of their clients, meaning businesses with stronger defences might benefit from lower premiums. Ransomware attacks are a growing threat to South African businesses but are not inevitable. By investing in robust cybersecurity measures, training employees, and working with expert IT partners, businesses can significantly reduce their risk of becoming a target. Prevention is key, and a proactive approach to cybersecurity can help ensure that businesses remain resilient in this evolving threat.


Zawya
2 days ago
- Zawya
South Africa Local trade marks v genuine imports: SCA ruling clarifies 'counterfeit' and 'infringement'
When can genuine, brand name goods still be labelled 'counterfeit'? The Supreme Court of Appeal (SCA) has just answered that question in Yossi Barel v Popular Trading CC (handed down 23 June 2025) - and its guidance will matter to every South African company that imports, distributes or enforces branded products. Setting the scene How the brand began – Italian designer Enrico Coveri turned his colourful style into a global fashion label in the 1980s. When he passed away in 1990, his sister Silvana Anna Maria Coveri stepped in as general manager of Enrico Coveri S.r.l., which still licenses the mark internationally. The South African twist – The 'Enrico Coveri' trade mark was first registered here between 1985 and 1988, but the registration lapsed after renewal fees went unpaid in the wake of the designer's death. In the 2000s, local footwear manufacturer Yossi Barel registered the mark in his own name (including for footwear) and began selling shoes made in China and Turkey under the label. Parallel imports arrive – KwaZulu-Natal-based Popular Trading has brought in Enrico Coveri footwear for more than two decades. After an early stint with non-authentic stock from China, it has, since 2010, imported authentic Italian-made shoes supplied by the brand's licensed manufacturers. How the case unfolded Believing the imports infringed his South African registration, Yossi Barel obtained a search-and-seizure warrant under the Counterfeit Goods Act (CGA) in December 2021. Popular Trading persuaded the High Court to set the warrant aside; Yossi Barel appealed, sending the matter to the Supreme Court of Appeal (SCA). A three-judge majority dismissed the appeal, stressing that: - the seized shoes were genuine products from the Italian rights-holder; and - counterfeiting under the CGA requires proof of an intent to deceive, not merely an unauthorised use of a registered mark. Two judges dissented, favouring the view that any unauthorised use of Barel's registration should count as counterfeiting. Why does it matter? - Intent is now central. The majority read the word 'calculated' in the CGA as importing mens rea: you must prove the alleged counterfeiter meant consumers to think the goods came from the trade mark owner. Simply showing the mark was used without consent is no longer enough. - Authenticity defeats a 'counterfeit' claim. The court emphasised that genuine goods, even if they bear a trade mark registered by another party, do not constitute counterfeit goods if there is no intent to deceive. - Trade mark infringement and counterfeiting are distinct. Brand owners can still sue for civil infringement, but seizure-and-destruction remedies under the CGA demand proof of deliberate copying. The court held that not all acts of trade mark infringement amount to counterfeiting, as counterfeiting involves a high standard of deliberate and fraudulent infringement. - Importers gain clarity. Businesses that buy directly from authorised foreign suppliers can rely on documentation of authenticity to fend off counterfeit raids. Ultimately, the SCA has drawn a bright line: the Counterfeit Goods Act is a weapon against deliberate fakes, not a shortcut for brand owners to stop genuine parallel imports. Rights holders who want CGA relief must now arrive with hard evidence that the alleged infringer intended to deceive, while importers can shield themselves by keeping airtight documentation of their products' authentic, licensed origin. By insisting on proof of fraudulent intent, the Court rebalances the playing field - encouraging trade mark owners to keep their registrations current and their enforcement strategies proportionate and giving compliant distributors greater confidence that legitimate goods will not be swept up in 'counterfeit' raids. All rights reserved. © 2022. Provided by SyndiGate Media Inc. (


Zawya
2 days ago
- Zawya
Crisis mode: South Africa's new strategies for supply-chain disruptions
Crisis is no longer the exception — it's the default setting of global trade. From pandemic shocks to port gridlocks, geopolitical ruptures to tariff reversals, the world's supply chains are being stress-tested like never before. For South Africa, the latest upheaval — a US court ruling reigniting tariff uncertainties — is more than a blip on the radar. It's a flashing red warning that the country must stop reacting and start re-engineering how it sources, partners, and prepares. What's at stake isn't just exports. It's economic resilience — and survival. The decision to overturn former President Donald Trump's 'reciprocal' tariffs has triggered confusion among global importers, sending freight rates soaring and igniting fears of renewed congestion across global shipping lanes. According to PwC, over R47bn ($2.5bn) in South African exports to the United States, primarily steel and aluminium, are at risk from the possible reinstatement of Section 232 tariffs. If enforced, these tariffs could shrink South Africa's exports to the US by up to 35% in key sectors, with knock-on effects including supply-chain contraction, job losses, and increased operational costs due to rerouting and compliance burdens. Supply chain strain 'Geopolitical risk is no longer theoretical. It is immediate, material, and embedded in how our supply chains are designed,' says Paul Vos, Regional Managing Director: Chartered Institute of Procurement & Supply (CIPS) Southern Africa. 'South African businesses must ask themselves not just how to respond, but how to build resilience into every layer of their procurement strategy proactively.' The warning signs are already visible. Global freight rates have surged in recent weeks: the Shanghai Containerised Freight Index spiked by 487 points, and Drewry's World Container Index climbed by over 10% to $2,508 per 40-foot container. This has been driven by a rush of US-bound cargo ahead of expected tariff enforcement, which has tightened capacity on major routes and triggered a wave of reinstated services and container delays. Locally, South African ports have been strained by both volume and fragility. In the final week of May alone, over 84,000 containers (TEUs) moved through the country's ports, up 17% from the previous week, despite adverse weather, equipment breakdowns, and staffing shortages. Cross-border trade flows are similarly under pressure, with delays and border queue times costing the transport industry an estimated R168m in a single week, according to the latest Business Unity South Africa (Busa) and South African Association of Freight Forwarders (Saaff) cargo movement update. Procurement leads transformation Vos says that the lessons from past crises, such as Covid-19, the Ukraine war, and Red Sea shipping risks, must no longer be treated as one-offs. 'What these events all underscore is the systemic fragility of global supply networks. For South Africa, resilience must become a national priority, not a boardroom afterthought.' The country has made some strides since the pandemic, particularly in supplier diversification and localisation. Larger corporations have led the way, investing in the development of local suppliers and reshoring elements of their supply chains. But Vos cautions that progress is uneven and not always strategic. 'Much of what we see is compliance-driven localisation, designed to meet procurement thresholds, not create competitive advantage. To truly localise, we need supply-chain ecosystems: infrastructure, access to markets, skills development, and sustained demand.' Vos believes the procurement profession must play a leading role in rethinking how organisations assess and mitigate risk. This starts with visibility, not just into Tier 1 suppliers, but deep into second- and third-tier networks. Digital control towers, scenario planning, AI-driven risk analysis, and real-time geopolitical alert systems are fast becoming standard tools in resilient supply chains. However, he warns that these tools are only as good as the data, governance, and talent behind them. Another critical step is redefining how value is measured. Vos argues that procurement teams need to move beyond focusing on the lowest-cost wins. 'Efficiency and resilience are not opposites. Long-term competitiveness comes from total cost of ownership thinking, factoring in risk, sustainability, supplier health, and ESG performance.' He points to dual sourcing models, inventory buffers for critical inputs, and deeper supplier partnerships as practical measures that pay off in times of disruption. Prepare for disruption The state has a role to play, too. Vos calls for national policy frameworks that support industrial incentives, regulatory coherence, and the renewal of logistics infrastructure. But more importantly, he believes in the importance of public-private collaboration to drive change. 'Sector-wide procurement platforms, shared supplier development programmes, and joint accountability for skills and jobs- these are the mechanisms that build real resilience.' Professionalising the procurement function will also be key to long-term resilience. Qualifications like MCIPS equip practitioners with the ethical frameworks, strategic insight, and risk management tools necessary to lead through complexity. 'Professionalisation is the foundation of ethical, capable supply chains, particularly in the public sector, where procurement must be the first line of defence against waste and corruption,' says Vos. Looking ahead, South African businesses must prepare for future disruptions that are no longer hypothetical. These include the impact of carbon border taxes, cybersecurity threats, political instability, climate-driven shocks, and persistent infrastructure constraints in energy, transport and logistics. Vos argues that future-proofing means not just responding to these risks, but anticipating them, and acting now. That future will belong to those who digitise, decentralise, and decarbonise. 'To thrive through uncertainty - not just survive it - we must embed resilience in how we buy, build, and partner. The next crisis is not a matter of if, but when.'