You are on page 1of 8

Michela Menting

October 2011

Cybercrime Laws By Country & Other Resources

_____________________________________________________________________
________________________
International
_____________________________________________________________________
________________________
Council of Europe (CoE): Convention on Cybercrime
Council of Europe Survey of Countries' Cybercrime Legislation
Cybercrimelaw.net: A Survey of Cybercrime Laws Worldwide
Interpol: Information Technology Crime Resources
Microsoft: Asia Pacific Legislative Analysis: Current and Pending
Online Safety and Cybercrime Laws, 2007
Models for Cyber Legislation in Economic and Social Commission for
Western Asia (ESCWA) Member Countries, 2007
UNICTRAL Model Law on Electronic Commerce with Guide to
Enactment 1996, United Nations Commission on International Trade
Law, 1996
UNCITRAL Model Law on Electronic Signatures with Guide to
Enactment 2001, United Nations Commission on International Trade
Law, 2001
The Commonwealth: Model Law on Computer and Computer Related
Crime, 2002
Draft Stanford Convention: International Convention to Enhance
Protection from Cyber Crime and Terrorism, 2001
_____________________________________________________________________
________________________
National
_____________________________________________________________________
________________________
Albania - Convention For Crime In The Cybernetic Area 2002 / Penal
Code Articles 123, 255, 286/a
Argentina - Data Protection Act

Michela Menting

October 2011

Armenia - Chapter 24 of the Criminal Code of the Republic of


Armenia: Crimes against computer information security /
Australia - Cybercrime Act 2001 / Australian Security Intelligence
Organization Act 1979 / Criminal Code Act 1995 /
Telecommunications (Interception) Act 1997 / Australian Crime
Commission Act 2002 / Credit Card Skimming Offences 2004 /
Australian Anti-Terrorism Act 2005 / Australian Government eAuthentication Framework, AGIMO (Department of Finance and
Administration), 2005 / Australian Government Smartcard
Framework, AGIMO (Department of Finance and Administration),
2006 Gatekeeper Framework, AGIMO (Department of Finance and
Administration), 2006 / Australian Government Protective Security
Manual, Attorney-Generals Department, 2005 / Australian
Government Information and Communications Technology Security
Manual, Defence Signals Directorate, Sep 2006
Austria - Strafrechtsanderungsgesetz 2002 (1166 d.B.)
Azerbaijan - Criminal Code Chapter 30: Computer information
crimes; Article 271. Unauthorized access to computer information;
Article 272. Production, use and spread of detrimental electronic
computer programs; Article 273. Violation of electronic computer,
system or network operating rules
Bangladesh - Information and Communication Technology Act,
2006
Belarus - Criminal Code Section XII, Chapter 31: Crimes against
information security; Article 349. Unauthorized access to computer
information; Article 350. Modification of computer information;
Article 351. Computer sabotage; Article 352. Unauthorized capture
of computer information; Article 353. Production or marketing of
special means designed to obtain unauthorized access to computer
systems or networks; Article 354. Development, use or spread of
detrimental computer programs; Article 355. Violation of computer
system or network operating rules
Belgium - IV. Computer Hacking Article 550(b) of the Criminal Code
Bulgaria - Penal Code Article 319 (amended 2002)
Brazil - Law no. 9,983 of July 7, 2000 Insertion of fake data into
systems of information Article 313-A / Non-authorized modification
or alteration of systems of information Article 313-B
Brunei Darussalam - Computer Misuse order of 2000, Article 3-5,
penalizes illegal access, illegal interception, data interference,
system interference and misuse of devices.
Canada - Canada Evidence Act / Canada Criminal Code / Personal
Information Protection and Electronic Documents Act / Federal
prosecution under the Copyright Act / 1998 Criminal Code of Canada
- Making, having or dealing in instruments for forging or falsifying
credit cards -- s. 342.01(1)

Michela Menting

October 2011

Chile - Law on Automated Data Processing Crimes no. 19.223,


published June 7, 1993
China - Regulations on Safeguarding Computer Information
Systems, Feb. 1996 / Criminal Law of the Peoples Republic of China
Art 285, 286, 287
Croatia - Penal Code Article 223 Damage to secrecy integrity and
availability of computer data, programmes or systems
Denmark - Penal Code Articles 193, 263.
Estonia - Criminal Code Computer information crimes Article
268. Computer Fraud; Article 269. Deletion of computer information
or software; Article 270. Computer sabotage; Article 271. Illegal use
of computers, their systems or networks; Article 272. Illegal
interruption or blocking of the computer system connection; Article
273. Obvious spread of computer viruses; Article 274. Transfer of
protecting codes.
Finland - Penal Code Chapter 38 Section 8
France - Law no.2004-575 of June 21, 2004, Articles 323
Georgia - Criminal Code Chapter 35: Computer crimes, Article
284. Unauthorized access to computer information; Article
285. Production, use or spread of electronic computer detrimental
programs, Article 286; Violation of electronic computer, system or
network operating rules;
Germany - German Criminal Code (Strafgesetzbuch (StGB) /
German Telecommunications Act (Telekommunikationgesetz (TKG)
/ German Regulatory Offences Act (Gesetz ber
Ordnungswidrigkeiten (OWig) / German Code of Criminal
Procedure (Strafprozessordnung (StPO) / German Copyright Act
(Urheberrechtsgesecht (UrhG).
Greece - Law 1805/1988 / Penal Code Article 370C2
Hong Kong - Telecommunication Ordinance Section 27A:
Unauthorized access to computer by telecommunication; Section
161: Access to computer with criminal or dishonest intent.
Hungary - Penal Code Criminal Conduct for Breaching Computer
Systems and Computer Data Section 300/C / Compromising or
Defrauding the Integrity of the Computer Protection System or
Device Section 300/E
Iceland - Law amending the Criminal Code, the law of criminal
procedure and law on telecommunications 2006
India - Information Technology Act, 2000 / Karnataka Cyber Cafe
Regulations / Gujarat Information technology Rules, 2004 / IN
Domain Name Dispute Resolution Policy (INDRP) / Rules for
Information Technology Act 2000 / Semiconductor Intergrated
Circuits Layout Design Act 2000 / Semiconductor Integrated Circuits

Michela Menting

October 2011

Layout-Design Rules, 2001 / .IN Domain Name Registration Policy /


The Information Technology (Amendment) Bill, 2006.
Indonesia - Electronic Information and Transaction Law 2008
Ireland - Criminal Justice (Theft and Fraud Offences) Act 2001
section 9 / Criminal Damages Act 1991 section 5
Israel - The Computer Laws of 1995, Chapter 2
Italy - Penal Code Article 615 ter: Unauthorized access into a
computer or telecommunication systems, -615 quater: Illegal
Possession and Diffusion of Access Codes to Computer or
Telecommunication Systems / -615 quinquies: Diffusion of Programs
Aimed to Damage or to Interrupt a Computer System / ratification
Convention on Cybercrime
Jamaica - Electronic Transactions Policy, 2003
Japan - Unauthorized Computer Access Law, Law No. 128 of 1999 /
Penal Code Articles 258, 259.
Kazakhstan - Criminal Code Chapter 7: Economic activity crimes,
Article 227. Unauthorized access to computer information, as well as
production, use or spread of electronic computer detrimental
programs
Kirghizstan - Criminal Code Chapter 28. Computer information
crimes Article 289. Unauthorized access to computer information;
Article 290. Production, use and spread of detrimental electronic
computer programs; Article 291. Violation of electronic computer,
system or network operating rules
Korea - Criminal Code Article 141 (Invalidity of Public Documents,
etc. and Destruction of Public Goods); Article 227-2 (False
Preparation or Alteration of Public Electromagnetic Records); Article
232-2 (Falsification or Alteration of Private Electromagnetic
Records); Article 316 (Violation of Secrecy); Article 347-2 (Fraud by
The Use of Computer, etc.); Article 366 (Destruction and Damage,
etc. of Property) / Act on promotion of information and
communications network utilization and information protection, etc.
Chapter VI Stability of the Information and Communications Network
/ Information infrastructure protection act
Latvia - Chapter XX: Criminal Offences against General Safety and
Public Order Section 241. Arbitrarily Accessing Computer Systems;
Section 242. Unauthorised Acquisition of Computer Software;
Section 243. Damaging of Computer Software; Section 244.
Disseminating a Computer Virus; Section 245. Violation of Safety
Provisions Regarding Information Systems
Lithuania - Penal Code Article 196: Destruction or interference of
computer data; Article 197: Destruction or interference of computer
program; Article 198: Interception and distribution of computer data

Michela Menting

October 2011

Luxembourg - Act of July 15th, 1993, relating to the reinforcement


of the fight against financial crime and computer crime Section VI concerning certain infractions in computer material, Article 509-1
Malaysia Computer Crimes Act 1997
Malta Criminal Code Computer Misuse Unlawful access to, or use
of, information, Article 337
Mauritius Computer Misuse and Cybercrime Act 2003 / Spam Act
2003
Mexico Cdigo penal federal de Mxico Part 9, Chapter II, Article
211
Netherlands Criminal Code, Article 138a
New Zealand Crimes Act 1961 (Reprint as at 1 June 2005),
Articles 249 - 254
Nigeria Advance Fee Fraud and other Fraud Related Offences Act
2006
Norway Penal Code Section 145
Pakistan - Electronic Crimes Act 2004
Peru Cdigo Penal 1991 Chapter X, Title V, Book Two
Philippines Republic Act 8792 (E-Commerce Act)
Poland Penal Code Part 3 Article 267 269
Portugal Law 109/91 of August 17, 1991, Chapter 1 Article 7
Romania Anti-corruption law 161/2003 Title III, Law 64, 24 March
2004 ratifying the Convention on Cybercrime
Russian Federation Criminal Code Chapter 28. Computer
information crimes Article 272. Unauthorized access to computer
information; Article 273. Production, use and spread of detrimental
electronic computer programs; Article 274. Violation of electronic
computer, system or network operating rules
Saudi Arabia IT Criminal Act
Singapore Computer Misuse Act / Electronic Transactions Act
(ETA)
Slovak Republic Draft Penal Code
Republic of Slovenia Penal Code Article154
South Africa Electronic Communications and Transactions Act 25
Of 2002 Chapter XIII
Spain Penal Code Chapter I, Article 197, Section 1, Article 248 /
264 / 256 / 270, Section 2, Article 273
Sri Lanka - Computer Crime Act 2007
Sweden Penal Code Chapter 4, Section 9 c

Michela Menting

October 2011

Switzerland Code Penal Article 143bis, Article 144bis


Tajikistan Criminal Code Section XII, Chapter 28, Crimes against
information security.
Thailand Act on Computer Crime B.E. 2550 (2007)
Turkey Penal Code Article 243 - 246
Turkmenistan Criminal Code Chapter 33 Computer information
crimes, Article 333. Breach of algorithm, electronic computer
software, databases and integral microcircuit topology legal
protection; Article 334. Unauthorized access to computer
information; Article 335. Production, use and spread of detrimental
electronic computer software
Ukraine Criminal Code Section XVI. Crimes committed by using
electronic computers, their systems or networks, Article 36. Illegal
interference with the work of electronic computers, their systems or
networks; Article 362. Theft, misappropriation, extortion of
computer information or its capture by swindling or abusing official
position; Article 363. Violation of automated electronic computer
operating rules
United Arab Emirates Federal Law No. (2) 2006 on the
Prevention of Information Technology Crimes
United Kingdom Computer Misuse Act 1990 (c. 18) / Police and
Justice Act 2006 Chapter 48 (amends the Computer Misuse Act, Part
5 sections 35-38) / The Computer Misuse Act of 1990 (CMA) (chapter
18) / The Regulation of Investigatory Powers Act 2000 (RIPA)
(chapter 23) / The Anti-Terrorism, Crime, and Security Act 2001
(chapter 24) / Data Protection Act of 1998 (chapter 29) / The Fraud
Act 2006 (chapter 35) / The Forgery and Counterfeiting Act 1981
(chapter 45) / Privacy and Electronic Communications Regulations
2003 (EC Regulations)
United States Homeland Security Act of 2002 (Amendments) Text
of Section 225 (also known as the Cyber Security Enhancement Act
of 2002) / USA Patriot Act Text of the USA PATRIOT Act (via Thomas)
Field Guidance on New Authorities that Relate to Computer Crime
and Electronic Evidence Enacted in the USA Patriot Act of 2001 / 18
U.S.C. 1029. Fraud and Related Activity in Connection with Access
Devices / 18 U.S.C. 1030. Fraud and Related Activity in Connection
with Computers / 18 U.S.C. 1362 Communication Lines, Stations,
or Systems / 18 U.S.C. 2510 et seq. Wire and Electronic
Communications Interception and Interception of Oral
Communications / 18 U.S.C. 2701 et seq. Stored Wire and
Electronic Communications and Transactional Records Access / 18
U.S.C. 3121 et seq. Recording of Dialing, Routing, Addressing, and
Signaling Information / U.S. Sentencing Guidelines that Relate to
Computer Intrusions / U.S. Sentencing Commission's Proposed
Amendments to the Guidelines that Relate to Computer Intrusions
(Effective November 1, 2003)

Michela Menting

October 2011

Uzbekistan Criminal Code Section III Economic crimes


Venezuela Ley Especial Contra Los Delitos Informaticos
_____________________________________________________________________
________________________
Journals
_____________________________________________________________________
________________________
Journal of Information Warfare - http://www.mindbooks.com/extranet/article.asp?
section=extranet&ContentID=jiw_main
British Journal of Criminology
Communications Law
Computer and Telecommunications Law Review
Computer Law & Security Review
Computer Law & Security Report
Computers & Law
Criminal Law Forum
Criminal Law Review
Data Protection Law & Policy
Digital Evidence and Electronic Signature Law Review
E-Commerce Law & Policy
E-Finance & Payments Law & Policy
European Intellectual Property Review
European Journal of Law and Technology
Fraud Intelligence
Information & Communications Technology Law
Intellectual Property Quarterly
International Journal of Law & Information Technology
International Review of Law Computers & Technology
Journal of Financial Crime
Journal of Information, Law & Technology
Journal of Money Laundering Control
Privacy Laws & Business International Newsletter
World Communications Regulation Report
World Data Protection Report
World Online Gambling Law Report
_____________________________________________________________________
________________________
Organisations, Associations, Repositories
_____________________________________________________________________
________________________

Michela Menting

October 2011

Computer Crime & Intellectual Property Section, United States


Department of Justice - http://www.cybercrime.gov/
CyberCrime Law - http://www.cybercrimelaw.net/Cybercrimelaw.html
Privacy International - http://www.privacyinternational.org
International Telecommunication Union
- http://www.itu.int/cybersecurity/
International Multilateral Partnership Against Cyber Threats (IMPACT)
- http://www.impact-alliance.org/home/index.html
The Information Warfare Site - http://www.iwar.org.uk/ecoespionage/

You might also like