(cid:9)(cid:9) fite÷fsfror diaRlAge si9°t14-Acre GTsflAsh FEDERAL NEGARIT GAZETTE OF THE FEDERAL DEMOCRATIC REPUBLIC OF ETHIOPIA Yr 0.A.111(cid:9) Opt: lee 4R4.1ce 4..111144-PT erilttit 22 1 Year No 83 h4.A Mil M.(cid:9) NIT.X '11" r.101.11(cid:9) rtu: (cid:9) inottO. raw; ADDIS ABABA 7Ih July. 2016 hirkt 4111: OYU' Yil.fi; PROCLAMATION No. 958/2016 rtisr-eit+c WIXA WP, (cid:9) wt. Ori.iivi? Computer Crime Proclamation (cid:9) Page 9104 a/ami CONTENTS PROCLAMATION No.958/2016 h,PS 4rre NM/ Nn.* A PROCLAMATION TO PROVIDE FOR THE COMPUTER CRIME l'it.161Cesalts.(cid:9) *tierAsA WHEREAS, information and communication technology plays a vital role in the economic, AY14.11 h.11';'" uTi "vilmie.v; rA1:111: N.(1:14* social and political development of the country; tAtI: "VS Yel."1.001 WHEREAS, unless appropriate protection rh.16:(:"Vti3t; (cid:9) •I;)iTA"k and security measures are taken, the utilization of itinfr+SP 4111. plfr.kg p0,43 IIA•1•KIAA). information communication technology is 1116.141(cid:9) "Rc+ft: ?0,V.o.s." vulnerable to various computer crimes and other 116/4•1 rlA Y/54. hr.' nX A.TA. A07. 4.A. security threats that can impede the overall 07X/el. Ay A.A..:1% development of the country and endanger individual rights; WHEREAS, the existing laws are not 11/-10(cid:9) "'A. 11114.12 (cid:9) tihAi adequately tuned with the technological changes f•kitirttilf Am-01:f .1c: (1114: and are not sufficient to prevent, control, f"7.4Z4. AS(cid:9) (07 A1 AtinlielhAt investigate and prosecute the suspects of tlomPaiinc:t Afinemi:anc:c •I•in1:MGP/T1 a)R computer crimes; 11011 A"'1+1.11 f1 f'.1 .•./1.4. mint r Unit Price(cid:9) 49.5-0 1 Negarit G. P.O.Box 80001 (cid:9) It.r.4•A(cid:9) .utLal 48TC lee Ak o 47 (cid:9) (s.r Federal Negaril Gazelle No. 83 711' July 2016 page (cid:9) 9105 (07XA7 Aanti411A: ften4alint:: WHEREAS, • it has become necessary to Armoncan(:s1 )bA,1011,1%)/ nYAI.X$04.1 Aant11114.11 incorporate new legal mechanisms and r"Lea-A. 10n4.1) AA4.4.766 p1:1441 procedures in order to prevent, control, investigate and prosecute computer crimes and 11'1* facilitate the collection of electronic evidences; NOW, THEREFORE, in accordance IIM•tit.t) 4a,4-1111; 4.(111/441..PI: GT•11A.b with Article 55(1) of the Constitution of the tr1(cid:9) 1114X• 94(fi) mina' Federal Democratic Republic of Ethiopia, it is hereby proclaimed as follows: hcA PART ONE m+44 GENERAL k. iev•C GNI 1.Short Titk htrk (cid:9) to7XA M' 4:11: This Proclamation may be cited as the "Computer Crime Proclamation No.958/20 I o", tull+A AT4A:= . C 2. Definitions rfrA. hviii A.4 .11:1•9" Y"Zfiltilm• I1A111 In this Proclamation unless the context 1111-1-ght: 1111.1) otherwise requires: el "rtirwittc tolgA" 1/"Computer crime" means 0) fibril:NI:: 11119"1:11-11: 111:54.1 a)A crime committed against a computer, computer system, computer data or 11119"1:1=41: AO• titer hilli(:tt 4/1. computer network; Y"Y.6.09" oi7XA = A) tir-cgl.cli Ylirecittc 11c54.11 b) A conventional crime committed by nisi—cr.-Pc A0.7 (DAY° t•I•9it:h7 means of a computer, computer system. 11"Y.d.t1," f/DX,11i4 ortgAi computer data or computer network; or (Ler' ,h) (cid:9) tor.Y" c) Illegal computer content data disseminated ).4.Pi(:tr hml11180• r1.4106/.'• morr through a computer, computer system, or computer network; Ao. k/ "PA:). T(7411.10/ hlA1tt-10 2/ "data processing service" means the service of reception, storage, processing, emission, p1:54.(cid:9) 40.7 routing or transmission of data by means of ray+tiA:(cid:9) rmily7:149(cid:9) ran-114.1= computer system and includes networking a)M' services; A.tP7 rti-pch hotAefiA0 fisr .e61.1.re-A = (cid:9) 1.14÷ :MA 4111: .iev ilk 1.0 +1 K?i.X 4.9" Federal Negarit Gazette No. 83 7"' July 2016 page (cid:9) 9106 01, "11$ 1:1=.11: (PM" 3/ "computer or computer system" means any "7/14. (16ft:idEl:(cid:9) flAtur:1:1" -1;tiTte.4 software and the microchips technology based data processing, storage, analysis, r'1"414•14 11/4:)' TCA11.11: dissemination and communication device 4.1.14/11 11(:'I." 1.1 17744. (DAP' A.A":1• or any device that is capable of performing Y.41141: 01,Kr hatrtr-We 4-1114.4.1 logical, arithmetic or routing function and r"telicinpl 07111m.Y" unt16.? includes accessories of that device; Foollelo(cid:9) htiAlr AtJa.sful,A: "rtir(cid:9) A;P" 4/ "computer data" means any content data, hifec'tie 11.+1/4.1 r"Y.TA traffic data, computer program, or any arfilm.sou rAtpl• A0.1(cid:9) ;P: other subscriber information in a form suitable for processing by means of a rti9"1:11.11: Ttrnilor a),,e,sou gllins14.1 computer system; 11"%ofilt(cid:9) urfilal•P' h.161Cmi71•7(cid:9) : "11119°1:11.11: Tiro/4.r" "7114. hl(': 5/ "computer program" means a set of /i1:14' 441111.1 774.fticapl instructions or commands expressed in ASP' r.4.1111(0.7 aPtn.4. N7/4..et1'ef words, codesor schemes which are capable 11,4'14.1 (lti.e.. a),e,yu (MA, of causing a computer system to perform or achieve a particular task or result; ?"%ilAN YananG.P 0).KY" ri•eltti ital. V "114.k6gh A:)." 11/14• 6/ "traffic data" means any computer roy.x1.017 tiriAlL7i1 generated data relating to a chain of communication by means of a computer fin It a(cid:9) zmi (cid:9) rvriPri. system indicating the communication's *Ad.! 11/4:J•m•(cid:9) laiviAitty4. origin, destination, route, time, date, °JAY" "OA rtirrAhail 1116/14. duration, size or types of underlying fltirl:g+C(cid:9) 11"Zentl.h service; Pe;). 110).: 'f,/ "115'40. PI:P " "1/t1:1. 11.K•r8: (14.1#4,4171 7/ "content data" means any computer data 11Y.4411: 4'unC 0),K9" (IAA found in the form of audio, video, picture, arithmetic formula or any other form that • "Y7Plour 1'co ?"7:117(cid:9) a),e,y0 conveys the essence, substance, meaning fri 4;). mr,sou or purpose of a stored or transmitted rtip-cf41: 11s/or-VON siu7s.1.: (1:6(cid:9) (:: computer(cid:9) data(cid:9) or(cid:9) computer 3 11:7.vo (cid:9) a)Ar (cid:9) einAtiti4. communication; .14;)" 9107 411•C *V Ilk (.4(cid:9) k11.* 'Er(cid:9) Federal Negarit Gazette No. 83 7'1' July 2016 page (cid:9) X/ "%-1.91(:h" ‘1114. 0.A4.; hH.,P (MA 8/ "network" means the interconnection of two or more computer systems by which Etir'1:441: eq:144 NCA MU) data processing service can be provided or ila7A-1.411(:(cid:9) TCAA.11 received; Afmtitivl. 0),e9° Aw/174. ?"?..ell*A /"C'14. 9/ "computer data security" means the "IIISP"1:1=11:(cid:9) /M.(cid:9) Ri)14."(cid:9) aVA4. protection of a computer data from flir1:1=41:(cid:9) N114,etn4-: N'MPAIC: deleting, changing, and accessing by 1Art.6.+KA4. hilA(cid:9) N1A,P01: 1 unauthorized person, compromising its 9°11M.01:5•1: NIA.P.,9tvp to.esiu AA confidentiality or any other damage; "Y3 'm•9"(cid:9) NIA ',RCM+ untnil+ "Ke:iii."(cid:9) htir-cit-Pc Ac54. 10/ "access" means to communicate with, to enter in, store in, store data in, retrieve, or 117.54• reinfi:tn(:: tog tisP"1:1=-N: tu:1•1: obtain data from, to view, to receive, move &J. raYtia're-1: 114.11"Yr3 14;1- or copy data from a computer system, or 11174.: 11"7114.: VantIPAr:: 1"114'11+As otherwise make use of any data processing tog AA `littlY untUf l'enelAtIT WAY° service thereof; AA(cid:9) miln'ailu(cid:9) 1114,4.(cid:9) TCAA.11 ?"7"17i. -1.111(: r hl "4:Att: Am/4." "Mi. (111.1) I I/ "critical infrastructure" means a computer °NV+ system, network or data where any of the hh1+8(cid:9) hAI) a 141-08,1111-Um- Iltrem-9" crimes stipulated under article 3 to 6 of this ra)1YA(cid:9) (1.4.K9"11-7. proclamation, is committed against it, .1z.135l• As(cid:9) p+tri, 'u, would have a considerable damage on 7-14 4.(cid:9) tt.eR,Cti(cid:9) 1)"7:4.A public safety and the national interest; 1111/"1:13-41:(cid:9) k-i-a)Ch a),e.r 141. 'um *DU "InA4."(cid:9) ntiritth,111 %K.). 12/ "interception"(cid:9) means(cid:9) real-time surveillance,(cid:9) recording,(cid:9) listening, "Al rfirl:441: A;)- cnAr acquisition, viewing. controlling or any towitt.4• emi10-4-A: !m4444.: (cid:9) other similar act of data processing service "YA anp anaPel.e: : 11P4.: fin oPiliffiC or computer data; (HAP" AA -1-en1111,e "kmaitt—). Auk" "911:1. 111151"7:11,PC 13/ "service provider" means a person who 11. "711Ti4. .1:tatl7! r.(4).(cid:9) ai.er provides technical data processing or 1"111.4. tu:34• teiA1A0:1• inity" yn:01 communication service or alternative A"7:1.(cid:9) (lap infrastructure to users by means of computer system; (cid:9) 7k (cid:9) finial 7.74+ "Kai 4erc *re ta 4:4 +7 Nit* 99`(cid:9) Federal Negarit Gazette No. 83 7"' July 2016 page (cid:9) 9 108 of "in4,11k, 5.+IL(cid:9) "/A4.(cid:9) +ffitiV4 14/ "Attorney General" means head of the Soyht: (cid:9) 114KI,A m+41: `MIL Federal Attorney General appointed by the :516. Wwt House of Peoples Representatives; X6/ "1.411,(cid:9) n7A4• flat+die iffrIL avi• 15 "Public prosecutor" means lawyer appointed +WI" 111.+IL.11(cid:9) 01"1-ARG.P 8741 by the Attorney General and administered onwa• rinl.+AR(:(cid:9) iinne..r: no') by public prosecutors administration ai+111, 5,11, a'/•3S rhi•A in+1.e regulation and included the Attorney General and the deput5, attorney generals; 1.+11,51 .1117 AturGA1 "ffist:"74 ?OA" "Ytti• runt int: On t: 16/ "investigatory organ" mean a person Y•hAtnm• MIA yap: legally invested with the power of investigation; jjl "hAA"(cid:9) Ilk-i•tity 17/ "regional state" means any state referred to 4.9"hG-11.(cid:9) Griirth in Article 47(1) of the Constitution of the Federal Democratic Republic of Ethiopia h14%* flY,(4) y•honittpro)'• Wu) and for the purpose this Proclamation it hAA (U1 AH.V terk himsor includes Addis Ababa and Dire Dawa city ?Intl hiani ?AI 111:•44? hinl administrations; Mg -:A1RC. 7 At.u.s0"10A1 "ri1.11" /17A4. fd.RG-A PAM (0.er 18/ "police" mean Federal Police or Regional State Police to whom the power rA.A PAM, ilaPtiAc r.minap MAA of the Federal Police is delegated; "tbrm." 07A.1.(cid:9) an411 19/ "Agency" mean Information Network R1/7 ,7* IbnA. Security Agency; "Anpn(cid:9) tlaP tHAY" 11,117 20/ "person" means a physical or juridical rila0•i. m114* 11+11inm• AtiA 'low= person; "InnIm.sm fiur3X; (cid:9) 111-1ARm. 11.4.151" 21/ any expression in the masculine gender includes the feminine. At.u.SouGA:: 4,11.4.A(cid:9) 911.111 4I1'C lit At. 4.4 +1 kn.*(cid:9) Federal Negarit Gazette No. 83 7111 July 2016; page (cid:9) 9109 hdA ifiA÷ PART TWO rhrtg+C co7VriT (cid:9) hcA h7P COMPUTER CRIMES SECTION ONE fiti9'"Cg+C P'CLI÷S° fihrtg+C 45- 4A CRIMES AGAINST COMPUTER SYSTEM AND COMPUTER DATA rrid.earN (1)7X11•T E. all am KIAD÷ 3. Illegal Access s/ "TS'n)./D Am- tP5 .11A0(cid:9) to.e9u 1/ Whosoever, without authorization or in 11.1•Aaim• Lfr.e: °Pat rtirl:fitil: 11CI•1•I excess of authorization, intentionally rtir'Cit'll: PO' ai.er -1101:i'i XL-7M. secures access to the whole or any part of computer system, computer data or network fllid.AY"(cid:9) 110D-A• y17 hIRt11 t1Y'114. shall be punishable with simple 11"7.PMAT 4,11A(cid:9) air,y0 NAh .111: 7f, (1"Y.XCII (In+ 1.14. ingar imprisonment not exceeding three years or fine from Birr 30,000 to 50, 000 or both. 110.A.1:9," 4/ MU)(cid:9) )'tl.hX•(cid:9) 4.e 2/ Where the crime stipulated under sub-article ra)7XA Pc•/.4• ri-i.nonaps (1) of this Article is committed against: I)) (1,111 rela04- 00414. tvilion- .1-*9u a) a computer system, computer data or network that is exclusively destined for MA1A04. 41$ 11"Yo•A rtir the use of a legal person, the punishment to.er shall be rigorous imprisonment from %-1.50Ch(cid:9) bin 1011-1. tion4. ?Jib three years to five years and fine from 11"1/..KCA Rip NA104• XS Birr 30,000 to 50,000; hAh 41c 97f, flusaCA (/D.N.bb .PA.ha/A: A) 11.1:Ati: 00/01.4. AuY4.(cid:9) WI b) a critical infrastructure, the punishment lihr/14. lemi• hlth Mt: 5a04. shall be rigorous imprisonment from Y"/ .CA(cid:9) hA4.4. XS(cid:9) ?dila five years to ten years and fine from Birr 50,000 to 100,000. 41C iiY f, 11"Y.KCII anitt.bb "1143a1A:: Q. ail (DT mA4- 4. illegal Interception m111; 0),ID Am• in(cid:9) fAd..+K- tp,er 1/ Whosoever, without authorization or in d.fr.e:(cid:9) .e.4.1: excess of authorization, intentionally /4:). tr.er 11$;:i• TtrAA:37 intercepts non-public computer data or data processing service shall be punishable with t1hrA4. 1°14 rigorous imprisonment not exceeding five nml,efIAT(cid:9) XS h41c 7f. Mb years and fine from Birr 10,000 to 50,000. 11"7..KCA fm+thb A.ha/A:: 0./ (cid:9) hlgiN 3h.A is741V (6) 4.e. 2/ Where the crime stipulated under sub-article ra)1XA (I) of this Article is committed against: (cid:9) Nit* 9110 dg.X4-A 1.94+ MIA 4191: 'ICI.' l (f) +1 9.r Federal Negarit Gazette No. 83 7'11 July 2016 page (cid:9) U) flail I' tlaPS4. 00414. A-hilino). 1-4311) a) a computer data or data processing kiAlley+ 4IY flaY.aPA ?h? "1.71141: service that is exclusively destined for the use of a legal person, the punishment /V. wAsy° ?AO. TCAA.T7 shall be rigorous imprisonment from five 4,e hill hti9u11le Ian+ hAh Mc years to ten years and fine from Birr lap+ (1"7.RCA(cid:9) hAZ-1. X; IHI(: 50,000 to 100,000. filth tic fief. 11"7..r.CA(cid:9) +661. M'al A A) IltAtt: innol.4. A°14• 4,e tin b) a critical infrastructure, the punishment shall be rigorous imprisonment from ten 5c o (cid:9) hith (cid:9) ii9u114. years to fifteen years and fine from Bin flaXRCti (cid:9) h4IC 100,000 to 200,000. hAh 4IC(cid:9) flaY.KCA au4,661. ,PA4,11/61 = 6. fltirTRI•C(cid:9) alg. MAO en0711+ 5. Interference with Computer System 1/ Whosoever, without authorization or in ml7n4aPr Am• tYS 4111° fA6..4't °IASI" excess of authorization, intentionally 114•Amm.(cid:9) aPat Ytir"1:?-41: /4.4.1 hinders,impairs, interrupts or disrupts the flaYTI7149 flaYAGaa..1.1 (laYitei- 4. aker proper functioning of the whole or any part floottaYr rtir1:1=11: A-05.1.1 (DAY° of computer system by inputting, k'NoCtil an&fl' 4.'101C 11hd.Ar U', transmitting, deleting or altering computer anql. Am.& .?R S4,4. Jambi faMeiD data shall be punishable with rigorous WM" h14.5t4T YR4'i h7A01, 116114- imprisonment from three years to five years 5004• hAh hrA.1. 5014 11"xRCA and fine not exceeding Bin 50,000. NAG-4. NS tHIC !at naYktlevP (n+6" AdhaiA:: gi lULL) )041V ltt-A Al+X• (6) 4,e 2/ where the crime stipulated under sub-article fro7XA (1) of this Article is committed against: a) a computer system that is exclusively U) (Pei lanaPS-). aD41.1. A÷Aintn- 4.*913 destined for the use of a legal person, he/Ag'/A°4. 41Y 11"7.m. A Ilislul:441: the punishment shall be rigorous eLe Inn Wririli• 4)004. Mit imprisonment from five years to ten At1C ion+ (PIACI)(cid:9) NA104• hc years and fine from Bin 50,000 to hAh 4IC Of.(cid:9) IlaY.RCA 100,000; 0D+01. fli+alA; (cid:9)(cid:9) Ak I!) St') 1-ederal Negarit Gazette No. 83 7th July 2016 page . :1101 49'C (cid:9) b) a critical infrastructure, the punishment A) 11.1:Att:(cid:9) A`1.1. •151, shall be rigorous imprisonment from lan ?dill hill, h9" 100.1. tat 4i-ears to fifteen years and line from li"YACA y, hAIA. Nt"; IHIC h jf7ti Mg 400.000 to 200,000 or, in serious hlttl 411: is ir7ti, 11"7.Y.C11 00.1q.1.6 cnr.P' case, rigorous imprisonment from .1.(cid:9) 11115(cid:9) itYDA1. fifteen years to lwentey years and fine 51/10. NMI 'If 'Ian+ 11"7.XCA from Birr 200,000 to 500,000. ?lc 1141C(cid:9) NAti .IIC jf7i. 11"7.XCA fin+ 6.4. 11+mA : : 6. (ausinellantage.to Computer Data ntirtg+c /V- 4g. 7.11÷ (cid:9) '411 1/ Whosoever, without authorization or in "r}V 0)-9" elm• in(cid:9) ,PAL. y: aker excess of authorization, intentionally alters, b-prima).(cid:9) A:).1 deletes, suppresses a computer data, rAtnalt(cid:9) .1.(:7•Y" ?OA 5:T4m. renders it meaningless, useless or l:e (DAY"(cid:9) VP4 An?r.yu ta inaccessible to authorized users shall be in;P"7.917. .1. RI;li N114 ifttrl fRIA punishable with rigorous imprisonment not IlaYeetiAls X"P exceeding three years and fine not hc IPt1C(cid:9) (1`17fAlAT 1/0.1.01. exceeding Birr 30,000. 51..1"11A:: 2/ Where the crime stipulated under sub- g/ fltl.t1 h14%* 11%-ta h34P8 (1) el.e. article (1) of this Article is committed to1XA PCV1. P-I•ditun(p: against: a) a computer data that is exclusively 0) (MO 11)60 an411. 11.1111tna. .t*r destined for the use of a legal person. MAitto 41Y fluZaPA 1•119'1:1=.11: the punishment shall be rigorous 14;J•(cid:9) liV'Ai• 5ffis1• NA11 imprisonment from three years to five hrtli• 51/8"1. (1"ZKI":11(cid:9) hAlA• hi; years and fine from Birr 30.000 to NAti 4IC tin. (1"7.XCA 50,000; tni+tm• $11.1'aiA: A) 114 :Aft: anwl.4- AmPl• *IA 71111 b) a critical infrastructure, the punishment shall be rigorous imprisonment from bhrni•(cid:9) ?alb MC ifini• five years to ten years and fine from r"ZRCA(cid:9) At (cid:9) b4ic 97i. Mb Birr 50,000 to 100,000. 41C fiffi. timacti an+661. titirtfotC agolGic (cid:9) ismfr+r .9c 7. Criminal Acts Related to Usage of r-t-ffn. 07Xtr* Computer Devices and Data 1/ Whosoever, knowing that it can cause 6/ arPs' in•SP) (cid:9) Am.(cid:9) 111151"1:4.11: damage to computer system, computer 14:). aker (0,4•9'(:h data or network, intentionally transmits it.rxcer N1X"7.1A. hgtn+ Art I) (cid:9) Wei 6..r.4-A 1.14+ :Mat *MC 'itt(cid:9) 4'1(cid:9) Federal Negarit Gazette No. 83 rh July 2016 page (cid:9) 9112 .1'.11/1m.(cid:9) cok.sm ?-1•411A. any computer program exclusively designed or adapted for this purpose shall Te."VI,VTI try be punishable with simple imprisonment h"Yief5i. not exceeding five years or fine not k3gtr5(cid:9) 9uo4. 11"7.e1lAT ./MA exceeding Birr 30,000. Ni14.4. (DAY" hill(: E.471. 11"7.ellAT 00+Lbb 0/ "VIn'ai•Y°(cid:9) num ?ICE tih111,x•(cid:9) Nttii 2/ Whosoever, knowing that it is, to be used for the commission of unlawful act ruilXA specified under Articles 3 to 6 of this NIX"Y.aPtl. Nftn.h AK!) git1a7 Proclamation,(cid:9) intentionally(cid:9) imports, Y"Y.m.tt• rtir1:1=11: ani1G.e$04.1 (PAY" produces, offers for sale, distributes or 14:J•5071.1 trl -(IA" wit Olt: makes available any computer device or apAls(cid:9) fanz.1.1 Aw fv, computer program designed or adapted tok,510 Alt04. N14..•"1";—/. YariFST exclusively for the purpose of committing N'iRtr5 tih9"t1-1.(cid:9) 080 11"7 An (cid:9) X"I• such crimes shall be punishable with id (cid:9) ti (cid:9) NtItt .11(: 971. rigorous imprisonment not exceeding five an+ 1,14, k,, lia;A years and fine from Birr 10,000 to 50,000. 3/ Whosoever possesses any computer V/ nY3Va)-9° Am. (hit)(cid:9) ttill+A• E devices or data specified under sub-article NolgA(cid:9) Aunii.or (I) or (2) of this Article with the intention 11111111 MIA/ h1.11V 10.(1 h1.1%- (fi) (PAY" to further the commission of any of the (0) r+rnittli.114.1 rii9"-1:1=-11: alai& f$04. crimes specified under Articles 3 to 6 of (0.e9" 14;)•9111.(cid:9) ri-TV NIxit") this Proclamation shall be punishable with ilawl• 11m/A(1AT (HA(cid:9) isn,er tHic simple imprisonment not exceeding three NAla 'II(: Off. noxxct) (ID+ thb years or fine from Birr 5,000 to 30, 000. `11Vm•Y°(cid:9) .(1fr (cid:9) a),er 4/ Whosoever, without authorization or in excess of authorization, intentionally awth 1119°1:13-41: p'Cli.: discloses or transfers any computer rtise"1:1=-11: 4;1. a),er k,4.9)Ch xe.7b4. program, secret code, key, password or "717.1. ?"1/.fi1TA rti9°l:g41: any other similar data for gaining access Vrtim.0(cid:9) tAiz: ?"..Ace. frA 0),e9° to a computer system, computer data or AA aunt% 14.0. M.(cid:9) AAA Am. network shall be punishable with simple MAC: feun NIKtr5(cid:9) gun, I. imprisonment not exceeding five years or 11"7,ellAT .1,11A(cid:9) 0.e9° 'ill- toir: in serious cases with rigorous lltr5 J,ti. hAtt (cid:9) 5cm4. 11"9.RCA imprisonment not exceeding five years NAIA• he tHic X71. Mit .11t: and fine from Birr 10,000 to 50,000. „ (1"7.RCA a01,04. ,e+ /A:: (cid:9) OUP (cid:9) 4.Y.4-A 5.94+ .910/ 41TC lit 0, (I) +1(cid:9) 9.r Federal Negarit Gazette No. 83 7" July 2016 page . (cid:9) 9113 6/ (MO(cid:9) h1+8 (0) ity, 5/ Where the crime stipulated under sub- V-1-antapta)-1 cia),YA(cid:9) 11:11A+ Ii. article (4) of this Article is committed negligently, the punishment shall be +01.11 WOK' simple imprisonment not exceeding one VI/AflAT 4'itA(cid:9) Nr; WIC RI'. year and fine not exceeding Birr 10,000. VVA(IAT(cid:9) ,elrgA hq infrPof 8. AuravateoiCak row kalk loockx. i NM) Where the crime stipulated under Article 3 to 6 "73m•1° ra)IYA of this Proclamation is committed: U) Aa).).ge-sq: ir+YD aqtr AtiA9u h+ti: a) against a computer data or a computer "11"Pli• (1.11A (1"Y.anAh.ta). 11.11+ system or network which is designated as JpilatC -1-11A° (1.1-11Fon A;J. top secrete by the concerned body for military interest or international relation, or rn,(P A;Pm- fluY:11111• rtiY"7:?--t-C prC4-1. (PAY°(cid:9) -23(:3i 4y, hiMai,e,v° A) t.111 f, 7,11, Plq3k (cid:9) mM" 0•16.1; b) while the country is at a state of emergency (1.241. Ilk 11$1°4-11(1-1. a)+I. ht15: or threat,the punishment shall be rigorous +apt: hhhe• hrAi.(cid:9) hAh imprisonment from fifteen years to Poo M.(cid:9) nagiAci) twenty five years. AtfcA: : 7h./1 hCA VIA+ SECTION TWO nilr'rg+C ita7teci• fttLeink ii°761111COCI COMPUTER RELATED FORGERY., rat#AA P S l'AC++ t07)Elt4 FRAUD AND THEFT P. 1117Cg.I.0 P..#, Ing hAI 00AaT 9. Computer Related Forgery (/"A'aPYI) (la). YA.110).1(cid:9) a)Ar Whosoever falsifies a computer data, makes T4'1° Arlie/JO. a)Ar AG-41. (DAY" AA,4 (la)• false computer data or makes use of such data j'Atf5 all(rra).1y° em.(1-1. my,y° T+1° to injure the rights or interests of another or to procure for himself or for another person any A°Ya/7.1. mfr(cid:9) (1"7641 (71:01: undue right or advantage shall be punishable m•/n,4•(cid:9) to,eY° A.irZaP with simple imprisonment not exceeding three P11511 1:g-1-1: 14)- mg dii)./• rAmin a)Ar years and fine not exceeding Birr 30,000 or in a the1-1-21;' (cid:9) 14:).(cid:9) in,ev" (111.1). serious cases with rigorous imprisonment not (14-1A1A NIRO",(cid:9) (rYAllAT exceeding ten years and fine from Birr 10,000 4,11A(cid:9) XS /VA 41C 11(1,e.(1AT to 100,000. co+61.1' (cid:9) WM- ntYS 1,16 hill[: (ImmilAT(cid:9) N111.-4- ?lc 1141C in. N1111 1l(: Off. 11"7.R1.711 tilulq." Atha/A: :
Description: