ebook img

fite÷fsfror diaRlAge si9°t14-Acre GTsflAsh FEDERAL NEGARIT GAZETTE OF THE FEDERAL ... PDF

28 Pages·2016·7.52 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview fite÷fsfror diaRlAge si9°t14-Acre GTsflAsh FEDERAL NEGARIT GAZETTE OF THE FEDERAL ...

(cid:9)(cid:9) fite÷fsfror diaRlAge si9°t14-Acre GTsflAsh FEDERAL NEGARIT GAZETTE OF THE FEDERAL DEMOCRATIC REPUBLIC OF ETHIOPIA Yr 0.A.111(cid:9) Opt: lee 4R4.1ce 4..111144-PT erilttit 22 1 Year No 83 h4.A Mil M.(cid:9) NIT.X '11" r.101.11(cid:9) rtu: (cid:9) inottO. raw; ADDIS ABABA 7Ih July. 2016 hirkt 4111: OYU' Yil.fi; PROCLAMATION No. 958/2016 rtisr-eit+c WIXA WP, (cid:9) wt. Ori.iivi? Computer Crime Proclamation (cid:9) Page 9104 a/ami CONTENTS PROCLAMATION No.958/2016 h,PS 4rre NM/ Nn.* A PROCLAMATION TO PROVIDE FOR THE COMPUTER CRIME l'it.161Cesalts.(cid:9) *tierAsA WHEREAS, information and communication technology plays a vital role in the economic, AY14.11 h.11';'" uTi "vilmie.v; rA1:111: N.(1:14* social and political development of the country; tAtI: "VS Yel."1.001 WHEREAS, unless appropriate protection rh.16:(:"Vti3t; (cid:9) •I;)iTA"k and security measures are taken, the utilization of itinfr+SP 4111. plfr.kg p0,43 IIA•1•KIAA). information communication technology is 1116.141(cid:9) "Rc+ft: ?0,V.o.s." vulnerable to various computer crimes and other 116/4•1 rlA Y/54. hr.' nX A.TA. A07. 4.A. security threats that can impede the overall 07X/el. Ay A.A..:1% development of the country and endanger individual rights; WHEREAS, the existing laws are not 11/-10(cid:9) "'A. 11114.12 (cid:9) tihAi adequately tuned with the technological changes f•kitirttilf Am-01:f .1c: (1114: and are not sufficient to prevent, control, f"7.4Z4. AS(cid:9) (07 A1 AtinlielhAt investigate and prosecute the suspects of tlomPaiinc:t Afinemi:anc:c •I•in1:MGP/T1 a)R computer crimes; 11011 A"'1+1.11 f1 f'.1 .•./1.4. mint r Unit Price(cid:9) 49.5-0 1 Negarit G. P.O.Box 80001 (cid:9) It.r.4•A(cid:9) .utLal 48TC lee Ak o 47 (cid:9) (s.r Federal Negaril Gazelle No. 83 711' July 2016 page (cid:9) 9105 (07XA7 Aanti411A: ften4alint:: WHEREAS, • it has become necessary to Armoncan(:s1 )bA,1011,1%)/ nYAI.X$04.1 Aant11114.11 incorporate new legal mechanisms and r"Lea-A. 10n4.1) AA4.4.766 p1:1441 procedures in order to prevent, control, investigate and prosecute computer crimes and 11'1* facilitate the collection of electronic evidences; NOW, THEREFORE, in accordance IIM•tit.t) 4a,4-1111; 4.(111/441..PI: GT•11A.b with Article 55(1) of the Constitution of the tr1(cid:9) 1114X• 94(fi) mina' Federal Democratic Republic of Ethiopia, it is hereby proclaimed as follows: hcA PART ONE m+44 GENERAL k. iev•C GNI 1.Short Titk htrk (cid:9) to7XA M' 4:11: This Proclamation may be cited as the "Computer Crime Proclamation No.958/20 I o", tull+A AT4A:= . C 2. Definitions rfrA. hviii A.4 .11:1•9" Y"Zfiltilm• I1A111 In this Proclamation unless the context 1111-1-ght: 1111.1) otherwise requires: el "rtirwittc tolgA" 1/"Computer crime" means 0) fibril:NI:: 11119"1:11-11: 111:54.1 a)A crime committed against a computer, computer system, computer data or 11119"1:1=41: AO• titer hilli(:tt 4/1. computer network; Y"Y.6.09" oi7XA = A) tir-cgl.cli Ylirecittc 11c54.11 b) A conventional crime committed by nisi—cr.-Pc A0.7 (DAY° t•I•9it:h7 means of a computer, computer system. 11"Y.d.t1," f/DX,11i4 ortgAi computer data or computer network; or (Ler' ,h) (cid:9) tor.Y" c) Illegal computer content data disseminated ).4.Pi(:tr hml11180• r1.4106/.'• morr through a computer, computer system, or computer network; Ao. k/ "PA:). T(7411.10/ hlA1tt-10 2/ "data processing service" means the service of reception, storage, processing, emission, p1:54.(cid:9) 40.7 routing or transmission of data by means of ray+tiA:(cid:9) rmily7:149(cid:9) ran-114.1= computer system and includes networking a)M' services; A.tP7 rti-pch hotAefiA0 fisr .e61.1.re-A = (cid:9) 1.14÷ :MA 4111: .iev ilk 1.0 +1 K?i.X 4.9" Federal Negarit Gazette No. 83 7"' July 2016 page (cid:9) 9106 01, "11$ 1:1=.11: (PM" 3/ "computer or computer system" means any "7/14. (16ft:idEl:(cid:9) flAtur:1:1" -1;tiTte.4 software and the microchips technology based data processing, storage, analysis, r'1"414•14 11/4:)' TCA11.11: dissemination and communication device 4.1.14/11 11(:'I." 1.1 17744. (DAP' A.A":1• or any device that is capable of performing Y.41141: 01,Kr hatrtr-We 4-1114.4.1 logical, arithmetic or routing function and r"telicinpl 07111m.Y" unt16.? includes accessories of that device; Foollelo(cid:9) htiAlr AtJa.sful,A: "rtir(cid:9) A;P" 4/ "computer data" means any content data, hifec'tie 11.+1/4.1 r"Y.TA traffic data, computer program, or any arfilm.sou rAtpl• A0.1(cid:9) ;P: other subscriber information in a form suitable for processing by means of a rti9"1:11.11: Ttrnilor a),,e,sou gllins14.1 computer system; 11"%ofilt(cid:9) urfilal•P' h.161Cmi71•7(cid:9) : "11119°1:11.11: Tiro/4.r" "7114. hl(': 5/ "computer program" means a set of /i1:14' 441111.1 774.fticapl instructions or commands expressed in ASP' r.4.1111(0.7 aPtn.4. N7/4..et1'ef words, codesor schemes which are capable 11,4'14.1 (lti.e.. a),e,yu (MA, of causing a computer system to perform or achieve a particular task or result; ?"%ilAN YananG.P 0).KY" ri•eltti ital. V "114.k6gh A:)." 11/14• 6/ "traffic data" means any computer roy.x1.017 tiriAlL7i1 generated data relating to a chain of communication by means of a computer fin It a(cid:9) zmi (cid:9) rvriPri. system indicating the communication's *Ad.! 11/4:J•m•(cid:9) laiviAitty4. origin, destination, route, time, date, °JAY" "OA rtirrAhail 1116/14. duration, size or types of underlying fltirl:g+C(cid:9) 11"Zentl.h service; Pe;). 110).: 'f,/ "115'40. PI:P " "1/t1:1. 11.K•r8: (14.1#4,4171 7/ "content data" means any computer data 11Y.4411: 4'unC 0),K9" (IAA found in the form of audio, video, picture, arithmetic formula or any other form that • "Y7Plour 1'co ?"7:117(cid:9) a),e,y0 conveys the essence, substance, meaning fri 4;). mr,sou or purpose of a stored or transmitted rtip-cf41: 11s/or-VON siu7s.1.: (1:6(cid:9) (:: computer(cid:9) data(cid:9) or(cid:9) computer 3 11:7.vo (cid:9) a)Ar (cid:9) einAtiti4. communication; .14;)" 9107 411•C *V Ilk (.4(cid:9) k11.* 'Er(cid:9) Federal Negarit Gazette No. 83 7'1' July 2016 page (cid:9) X/ "%-1.91(:h" ‘1114. 0.A4.; hH.,P (MA 8/ "network" means the interconnection of two or more computer systems by which Etir'1:441: eq:144 NCA MU) data processing service can be provided or ila7A-1.411(:(cid:9) TCAA.11 received; Afmtitivl. 0),e9° Aw/174. ?"?..ell*A /"C'14. 9/ "computer data security" means the "IIISP"1:1=11:(cid:9) /M.(cid:9) Ri)14."(cid:9) aVA4. protection of a computer data from flir1:1=41:(cid:9) N114,etn4-: N'MPAIC: deleting, changing, and accessing by 1Art.6.+KA4. hilA(cid:9) N1A,P01: 1 unauthorized person, compromising its 9°11M.01:5•1: NIA.P.,9tvp to.esiu AA confidentiality or any other damage; "Y3 'm•9"(cid:9) NIA ',RCM+ untnil+ "Ke:iii."(cid:9) htir-cit-Pc Ac54. 10/ "access" means to communicate with, to enter in, store in, store data in, retrieve, or 117.54• reinfi:tn(:: tog tisP"1:1=-N: tu:1•1: obtain data from, to view, to receive, move &J. raYtia're-1: 114.11"Yr3 14;1- or copy data from a computer system, or 11174.: 11"7114.: VantIPAr:: 1"114'11+As otherwise make use of any data processing tog AA `littlY untUf l'enelAtIT WAY° service thereof; AA(cid:9) miln'ailu(cid:9) 1114,4.(cid:9) TCAA.11 ?"7"17i. -1.111(: r hl "4:Att: Am/4." "Mi. (111.1) I I/ "critical infrastructure" means a computer °NV+ system, network or data where any of the hh1+8(cid:9) hAI) a 141-08,1111-Um- Iltrem-9" crimes stipulated under article 3 to 6 of this ra)1YA(cid:9) (1.4.K9"11-7. proclamation, is committed against it, .1z.135l• As(cid:9) p+tri, 'u, would have a considerable damage on 7-14 4.(cid:9) tt.eR,Cti(cid:9) 1)"7:4.A public safety and the national interest; 1111/"1:13-41:(cid:9) k-i-a)Ch a),e.r 141. 'um *DU "InA4."(cid:9) ntiritth,111 %K.). 12/ "interception"(cid:9) means(cid:9) real-time surveillance,(cid:9) recording,(cid:9) listening, "Al rfirl:441: A;)- cnAr acquisition, viewing. controlling or any towitt.4• emi10-4-A: !m4444.: (cid:9) other similar act of data processing service "YA anp anaPel.e: : 11P4.: fin oPiliffiC or computer data; (HAP" AA -1-en1111,e "kmaitt—). Auk" "911:1. 111151"7:11,PC 13/ "service provider" means a person who 11. "711Ti4. .1:tatl7! r.(4).(cid:9) ai.er provides technical data processing or 1"111.4. tu:34• teiA1A0:1• inity" yn:01 communication service or alternative A"7:1.(cid:9) (lap infrastructure to users by means of computer system; (cid:9) 7k (cid:9) finial 7.74+ "Kai 4erc *re ta 4:4 +7 Nit* 99`(cid:9) Federal Negarit Gazette No. 83 7"' July 2016 page (cid:9) 9 108 of "in4,11k, 5.+IL(cid:9) "/A4.(cid:9) +ffitiV4 14/ "Attorney General" means head of the Soyht: (cid:9) 114KI,A m+41: `MIL Federal Attorney General appointed by the :516. Wwt House of Peoples Representatives; X6/ "1.411,(cid:9) n7A4• flat+die iffrIL avi• 15 "Public prosecutor" means lawyer appointed +WI" 111.+IL.11(cid:9) 01"1-ARG.P 8741 by the Attorney General and administered onwa• rinl.+AR(:(cid:9) iinne..r: no') by public prosecutors administration ai+111, 5,11, a'/•3S rhi•A in+1.e regulation and included the Attorney General and the deput5, attorney generals; 1.+11,51 .1117 AturGA1 "ffist:"74 ?OA" "Ytti• runt int: On t: 16/ "investigatory organ" mean a person Y•hAtnm• MIA yap: legally invested with the power of investigation; jjl "hAA"(cid:9) Ilk-i•tity 17/ "regional state" means any state referred to 4.9"hG-11.(cid:9) Griirth in Article 47(1) of the Constitution of the Federal Democratic Republic of Ethiopia h14%* flY,(4) y•honittpro)'• Wu) and for the purpose this Proclamation it hAA (U1 AH.V terk himsor includes Addis Ababa and Dire Dawa city ?Intl hiani ?AI 111:•44? hinl administrations; Mg -:A1RC. 7 At.u.s0"10A1 "ri1.11" /17A4. fd.RG-A PAM (0.er 18/ "police" mean Federal Police or Regional State Police to whom the power rA.A PAM, ilaPtiAc r.minap MAA of the Federal Police is delegated; "tbrm." 07A.1.(cid:9) an411 19/ "Agency" mean Information Network R1/7 ,7* IbnA. Security Agency; "Anpn(cid:9) tlaP tHAY" 11,117 20/ "person" means a physical or juridical rila0•i. m114* 11+11inm• AtiA 'low= person; "InnIm.sm fiur3X; (cid:9) 111-1ARm. 11.4.151" 21/ any expression in the masculine gender includes the feminine. At.u.SouGA:: 4,11.4.A(cid:9) 911.111 4I1'C lit At. 4.4 +1 kn.*(cid:9) Federal Negarit Gazette No. 83 7111 July 2016; page (cid:9) 9109 hdA ifiA÷ PART TWO rhrtg+C co7VriT (cid:9) hcA h7P COMPUTER CRIMES SECTION ONE fiti9'"Cg+C P'CLI÷S° fihrtg+C 45- 4A CRIMES AGAINST COMPUTER SYSTEM AND COMPUTER DATA rrid.earN (1)7X11•T E. all am KIAD÷ 3. Illegal Access s/ "TS'n)./D Am- tP5 .11A0(cid:9) to.e9u 1/ Whosoever, without authorization or in 11.1•Aaim• Lfr.e: °Pat rtirl:fitil: 11CI•1•I excess of authorization, intentionally rtir'Cit'll: PO' ai.er -1101:i'i XL-7M. secures access to the whole or any part of computer system, computer data or network fllid.AY"(cid:9) 110D-A• y17 hIRt11 t1Y'114. shall be punishable with simple 11"7.PMAT 4,11A(cid:9) air,y0 NAh .111: 7f, (1"Y.XCII (In+ 1.14. ingar imprisonment not exceeding three years or fine from Birr 30,000 to 50, 000 or both. 110.A.1:9," 4/ MU)(cid:9) )'tl.hX•(cid:9) 4.e 2/ Where the crime stipulated under sub-article ra)7XA Pc•/.4• ri-i.nonaps (1) of this Article is committed against: I)) (1,111 rela04- 00414. tvilion- .1-*9u a) a computer system, computer data or network that is exclusively destined for MA1A04. 41$ 11"Yo•A rtir the use of a legal person, the punishment to.er shall be rigorous imprisonment from %-1.50Ch(cid:9) bin 1011-1. tion4. ?Jib three years to five years and fine from 11"1/..KCA Rip NA104• XS Birr 30,000 to 50,000; hAh 41c 97f, flusaCA (/D.N.bb .PA.ha/A: A) 11.1:Ati: 00/01.4. AuY4.(cid:9) WI b) a critical infrastructure, the punishment lihr/14. lemi• hlth Mt: 5a04. shall be rigorous imprisonment from Y"/ .CA(cid:9) hA4.4. XS(cid:9) ?dila five years to ten years and fine from Birr 50,000 to 100,000. 41C iiY f, 11"Y.KCII anitt.bb "1143a1A:: Q. ail (DT mA4- 4. illegal Interception m111; 0),ID Am• in(cid:9) fAd..+K- tp,er 1/ Whosoever, without authorization or in d.fr.e:(cid:9) .e.4.1: excess of authorization, intentionally /4:). tr.er 11$;:i• TtrAA:37 intercepts non-public computer data or data processing service shall be punishable with t1hrA4. 1°14 rigorous imprisonment not exceeding five nml,efIAT(cid:9) XS h41c 7f. Mb years and fine from Birr 10,000 to 50,000. 11"7..KCA fm+thb A.ha/A:: 0./ (cid:9) hlgiN 3h.A is741V (6) 4.e. 2/ Where the crime stipulated under sub-article ra)1XA (I) of this Article is committed against: (cid:9) Nit* 9110 dg.X4-A 1.94+ MIA 4191: 'ICI.' l (f) +1 9.r Federal Negarit Gazette No. 83 7'11 July 2016 page (cid:9) U) flail I' tlaPS4. 00414. A-hilino). 1-4311) a) a computer data or data processing kiAlley+ 4IY flaY.aPA ?h? "1.71141: service that is exclusively destined for the use of a legal person, the punishment /V. wAsy° ?AO. TCAA.T7 shall be rigorous imprisonment from five 4,e hill hti9u11le Ian+ hAh Mc years to ten years and fine from Birr lap+ (1"7.RCA(cid:9) hAZ-1. X; IHI(: 50,000 to 100,000. filth tic fief. 11"7..r.CA(cid:9) +661. M'al A A) IltAtt: innol.4. A°14• 4,e tin b) a critical infrastructure, the punishment shall be rigorous imprisonment from ten 5c o (cid:9) hith (cid:9) ii9u114. years to fifteen years and fine from Bin flaXRCti (cid:9) h4IC 100,000 to 200,000. hAh 4IC(cid:9) flaY.KCA au4,661. ,PA4,11/61 = 6. fltirTRI•C(cid:9) alg. MAO en0711+ 5. Interference with Computer System 1/ Whosoever, without authorization or in ml7n4aPr Am• tYS 4111° fA6..4't °IASI" excess of authorization, intentionally 114•Amm.(cid:9) aPat Ytir"1:?-41: /4.4.1 hinders,impairs, interrupts or disrupts the flaYTI7149 flaYAGaa..1.1 (laYitei- 4. aker proper functioning of the whole or any part floottaYr rtir1:1=11: A-05.1.1 (DAY° of computer system by inputting, k'NoCtil an&fl' 4.'101C 11hd.Ar U', transmitting, deleting or altering computer anql. Am.& .?R S4,4. Jambi faMeiD data shall be punishable with rigorous WM" h14.5t4T YR4'i h7A01, 116114- imprisonment from three years to five years 5004• hAh hrA.1. 5014 11"xRCA and fine not exceeding Bin 50,000. NAG-4. NS tHIC !at naYktlevP (n+6" AdhaiA:: gi lULL) )041V ltt-A Al+X• (6) 4,e 2/ where the crime stipulated under sub-article fro7XA (1) of this Article is committed against: a) a computer system that is exclusively U) (Pei lanaPS-). aD41.1. A÷Aintn- 4.*913 destined for the use of a legal person, he/Ag'/A°4. 41Y 11"7.m. A Ilislul:441: the punishment shall be rigorous eLe Inn Wririli• 4)004. Mit imprisonment from five years to ten At1C ion+ (PIACI)(cid:9) NA104• hc years and fine from Bin 50,000 to hAh 4IC Of.(cid:9) IlaY.RCA 100,000; 0D+01. fli+alA; (cid:9)(cid:9) Ak I!) St') 1-ederal Negarit Gazette No. 83 7th July 2016 page . :1101 49'C (cid:9) b) a critical infrastructure, the punishment A) 11.1:Att:(cid:9) A`1.1. •151, shall be rigorous imprisonment from lan ?dill hill, h9" 100.1. tat 4i-ears to fifteen years and line from li"YACA y, hAIA. Nt"; IHIC h jf7ti Mg 400.000 to 200,000 or, in serious hlttl 411: is ir7ti, 11"7.Y.C11 00.1q.1.6 cnr.P' case, rigorous imprisonment from .1.(cid:9) 11115(cid:9) itYDA1. fifteen years to lwentey years and fine 51/10. NMI 'If 'Ian+ 11"7.XCA from Birr 200,000 to 500,000. ?lc 1141C(cid:9) NAti .IIC jf7i. 11"7.XCA fin+ 6.4. 11+mA : : 6. (ausinellantage.to Computer Data ntirtg+c /V- 4g. 7.11÷ (cid:9) '411 1/ Whosoever, without authorization or in "r}V 0)-9" elm• in(cid:9) ,PAL. y: aker excess of authorization, intentionally alters, b-prima).(cid:9) A:).1 deletes, suppresses a computer data, rAtnalt(cid:9) .1.(:7•Y" ?OA 5:T4m. renders it meaningless, useless or l:e (DAY"(cid:9) VP4 An?r.yu ta inaccessible to authorized users shall be in;P"7.917. .1. RI;li N114 ifttrl fRIA punishable with rigorous imprisonment not IlaYeetiAls X"P exceeding three years and fine not hc IPt1C(cid:9) (1`17fAlAT 1/0.1.01. exceeding Birr 30,000. 51..1"11A:: 2/ Where the crime stipulated under sub- g/ fltl.t1 h14%* 11%-ta h34P8 (1) el.e. article (1) of this Article is committed to1XA PCV1. P-I•ditun(p: against: a) a computer data that is exclusively 0) (MO 11)60 an411. 11.1111tna. .t*r destined for the use of a legal person. MAitto 41Y fluZaPA 1•119'1:1=.11: the punishment shall be rigorous 14;J•(cid:9) liV'Ai• 5ffis1• NA11 imprisonment from three years to five hrtli• 51/8"1. (1"ZKI":11(cid:9) hAlA• hi; years and fine from Birr 30.000 to NAti 4IC tin. (1"7.XCA 50,000; tni+tm• $11.1'aiA: A) 114 :Aft: anwl.4- AmPl• *IA 71111 b) a critical infrastructure, the punishment shall be rigorous imprisonment from bhrni•(cid:9) ?alb MC ifini• five years to ten years and fine from r"ZRCA(cid:9) At (cid:9) b4ic 97i. Mb Birr 50,000 to 100,000. 41C fiffi. timacti an+661. titirtfotC agolGic (cid:9) ismfr+r .9c 7. Criminal Acts Related to Usage of r-t-ffn. 07Xtr* Computer Devices and Data 1/ Whosoever, knowing that it can cause 6/ arPs' in•SP) (cid:9) Am.(cid:9) 111151"1:4.11: damage to computer system, computer 14:). aker (0,4•9'(:h data or network, intentionally transmits it.rxcer N1X"7.1A. hgtn+ Art I) (cid:9) Wei 6..r.4-A 1.14+ :Mat *MC 'itt(cid:9) 4'1(cid:9) Federal Negarit Gazette No. 83 rh July 2016 page (cid:9) 9112 .1'.11/1m.(cid:9) cok.sm ?-1•411A. any computer program exclusively designed or adapted for this purpose shall Te."VI,VTI try be punishable with simple imprisonment h"Yief5i. not exceeding five years or fine not k3gtr5(cid:9) 9uo4. 11"7.e1lAT ./MA exceeding Birr 30,000. Ni14.4. (DAY" hill(: E.471. 11"7.ellAT 00+Lbb 0/ "VIn'ai•Y°(cid:9) num ?ICE tih111,x•(cid:9) Nttii 2/ Whosoever, knowing that it is, to be used for the commission of unlawful act ruilXA specified under Articles 3 to 6 of this NIX"Y.aPtl. Nftn.h AK!) git1a7 Proclamation,(cid:9) intentionally(cid:9) imports, Y"Y.m.tt• rtir1:1=11: ani1G.e$04.1 (PAY" produces, offers for sale, distributes or 14:J•5071.1 trl -(IA" wit Olt: makes available any computer device or apAls(cid:9) fanz.1.1 Aw fv, computer program designed or adapted tok,510 Alt04. N14..•"1";—/. YariFST exclusively for the purpose of committing N'iRtr5 tih9"t1-1.(cid:9) 080 11"7 An (cid:9) X"I• such crimes shall be punishable with id (cid:9) ti (cid:9) NtItt .11(: 971. rigorous imprisonment not exceeding five an+ 1,14, k,, lia;A years and fine from Birr 10,000 to 50,000. 3/ Whosoever possesses any computer V/ nY3Va)-9° Am. (hit)(cid:9) ttill+A• E devices or data specified under sub-article NolgA(cid:9) Aunii.or (I) or (2) of this Article with the intention 11111111 MIA/ h1.11V 10.(1 h1.1%- (fi) (PAY" to further the commission of any of the (0) r+rnittli.114.1 rii9"-1:1=-11: alai& f$04. crimes specified under Articles 3 to 6 of (0.e9" 14;)•9111.(cid:9) ri-TV NIxit") this Proclamation shall be punishable with ilawl• 11m/A(1AT (HA(cid:9) isn,er tHic simple imprisonment not exceeding three NAla 'II(: Off. noxxct) (ID+ thb years or fine from Birr 5,000 to 30, 000. `11Vm•Y°(cid:9) .(1fr (cid:9) a),er 4/ Whosoever, without authorization or in excess of authorization, intentionally awth 1119°1:13-41: p'Cli.: discloses or transfers any computer rtise"1:1=-11: 4;1. a),er k,4.9)Ch xe.7b4. program, secret code, key, password or "717.1. ?"1/.fi1TA rti9°l:g41: any other similar data for gaining access Vrtim.0(cid:9) tAiz: ?"..Ace. frA 0),e9° to a computer system, computer data or AA aunt% 14.0. M.(cid:9) AAA Am. network shall be punishable with simple MAC: feun NIKtr5(cid:9) gun, I. imprisonment not exceeding five years or 11"7,ellAT .1,11A(cid:9) 0.e9° 'ill- toir: in serious cases with rigorous lltr5 J,ti. hAtt (cid:9) 5cm4. 11"9.RCA imprisonment not exceeding five years NAIA• he tHic X71. Mit .11t: and fine from Birr 10,000 to 50,000. „ (1"7.RCA a01,04. ,e+ /A:: (cid:9) OUP (cid:9) 4.Y.4-A 5.94+ .910/ 41TC lit 0, (I) +1(cid:9) 9.r Federal Negarit Gazette No. 83 7" July 2016 page . (cid:9) 9113 6/ (MO(cid:9) h1+8 (0) ity, 5/ Where the crime stipulated under sub- V-1-antapta)-1 cia),YA(cid:9) 11:11A+ Ii. article (4) of this Article is committed negligently, the punishment shall be +01.11 WOK' simple imprisonment not exceeding one VI/AflAT 4'itA(cid:9) Nr; WIC RI'. year and fine not exceeding Birr 10,000. VVA(IAT(cid:9) ,elrgA hq infrPof 8. AuravateoiCak row kalk loockx. i NM) Where the crime stipulated under Article 3 to 6 "73m•1° ra)IYA of this Proclamation is committed: U) Aa).).ge-sq: ir+YD aqtr AtiA9u h+ti: a) against a computer data or a computer "11"Pli• (1.11A (1"Y.anAh.ta). 11.11+ system or network which is designated as JpilatC -1-11A° (1.1-11Fon A;J. top secrete by the concerned body for military interest or international relation, or rn,(P A;Pm- fluY:11111• rtiY"7:?--t-C prC4-1. (PAY°(cid:9) -23(:3i 4y, hiMai,e,v° A) t.111 f, 7,11, Plq3k (cid:9) mM" 0•16.1; b) while the country is at a state of emergency (1.241. Ilk 11$1°4-11(1-1. a)+I. ht15: or threat,the punishment shall be rigorous +apt: hhhe• hrAi.(cid:9) hAh imprisonment from fifteen years to Poo M.(cid:9) nagiAci) twenty five years. AtfcA: : 7h./1 hCA VIA+ SECTION TWO nilr'rg+C ita7teci• fttLeink ii°761111COCI COMPUTER RELATED FORGERY., rat#AA P S l'AC++ t07)Elt4 FRAUD AND THEFT P. 1117Cg.I.0 P..#, Ing hAI 00AaT 9. Computer Related Forgery (/"A'aPYI) (la). YA.110).1(cid:9) a)Ar Whosoever falsifies a computer data, makes T4'1° Arlie/JO. a)Ar AG-41. (DAY" AA,4 (la)• false computer data or makes use of such data j'Atf5 all(rra).1y° em.(1-1. my,y° T+1° to injure the rights or interests of another or to procure for himself or for another person any A°Ya/7.1. mfr(cid:9) (1"7641 (71:01: undue right or advantage shall be punishable m•/n,4•(cid:9) to,eY° A.irZaP with simple imprisonment not exceeding three P11511 1:g-1-1: 14)- mg dii)./• rAmin a)Ar years and fine not exceeding Birr 30,000 or in a the1-1-21;' (cid:9) 14:).(cid:9) in,ev" (111.1). serious cases with rigorous imprisonment not (14-1A1A NIRO",(cid:9) (rYAllAT exceeding ten years and fine from Birr 10,000 4,11A(cid:9) XS /VA 41C 11(1,e.(1AT to 100,000. co+61.1' (cid:9) WM- ntYS 1,16 hill[: (ImmilAT(cid:9) N111.-4- ?lc 1141C in. N1111 1l(: Off. 11"7.R1.711 tilulq." Atha/A: :

Description:
vulnerable to various computer crimes and other security threats "Computer Crime Proclamation No.958/20 I o",. 2. 5004• hAh hrA.1. 5014 11"
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.