You are on page 1of 28
PAPERS ROAR APHEALE CTA EREA ICT IM FEDERAL NEGARIT GAZETTE OF THE FEDERAL DEMOCRATIC REPUBLIC OF ETHIOPIA WF Ae ook or ” aaa ni fra OD TERS ROAR ATHOOLT ETHAN anil role ® PHC Ma marr ton 2 Yew Koa [ADDIS ABABA T™ ay. 2016 PK eer HENS) ETE IEA APE. NPR seers WEN HT ThPTEtC @PEA? heokI17 fom ATE PACRI rhea three AGH AbTLee TUNERS 70kEHE ET HAS UE FLO Mowry’ Precis rheen ay thee ee a PNCKD UAHTE ALI ARTE NAVY PIT) PIA I AR Ae Arh ATA PEALE PHP ENG OTEOT AG AOE tev TT 28 Fon Nowy me AR Pe PUIeR NNR NAAN PenT eR Aare of MR WE beremar PLA AT PPR OTA Aoohahar Aes) Aewemceocs tMCNEPED OF SEV ATE POLLED Moors Tart PROCLAMATION No. 958/2016 ‘Computer Crime Proclamation Page 9104 ‘CONTENTS PROCLAMATION No.958/2016 ABROCLAMATION TO PROVIDE FOR THE COMPUTER CRIME. WHEREAS, information and communication technology plays a vital role in the economic, social and politcal development of the country; WHEREAS, unless appropriate protection and security measures are taken, the utilization of technology is ‘vulnerable to various computer crimes and other information communication security threats that can impede the overall development of the country and endanger individual rights; WHEREAS, the existing laws are not adequately tuned with the technological changes and are not sufficient to prevent, control, investigate and prosecute the suspects of computer crimes; SR 126 um ders HE OLY ETL Federal Neparit Garett No. 83.7 jy 2016 page 218, HC WIKAS AehAA: Aeoseunce Nemes WANTON INCHES demttirn PLOT NAD MAES eCOR lat ORY ANA UF awry MARKS ROAR APHELLE CTA V1 avd NYPR IE(B) omded eeaterda BAe hea AIS mean &. APC Con LU NPE Phy OFA APE bec HLA tN Aavba LAA: & 2098 £F0 AN AA FOL FLLAMe HAVY LENG OVE" “AA U) Abgeny MPP TREC ACI MPTREE AI oLe LIPCH Ag FLLOP OFEA? A) bP TREC eheeretC ACTH PP EREC AI one PCH Y Navmbe 16.07 mZNe wIEA: ony ch) UP TRACE NEPUREC ACI OL BPC NN vere PDP TLE AD LNA ars vor B/ PAD Mb TRAC Tear Mar” PCF MY AI fomPna: PME tambien Pew PAW OL PATE MAI OU MECH MAI TRH PULP coat mnt WHEREAS, it has become necessary to incorporate legal procedures in order investigate and prosecute computer crimes and new mechanisms and to prevent, control, facilitate the collection of electronic evidences; NOW, THEREFORE, in accordance with Article 55(1) of the Constitution of the Federal Democratic Republic of Ethiopia, it is hereby proclaimed as follows: PART ONE GENERAL L.Short Title ‘This Proclamation may be cited as the “Computer Crime Proclamation No.958/2016". 2.Definitions In this Proclamation unless the context otherwise requires: Computer crime” means a)A crime committed against a computer, computer system, computer data or computer network; b) A conventional crime committed by means of a computer, computer system, computer data or computer network: or ©) legal computer content data disseminated through a computer, computer system, or computer network; 2/ “data processing service” means the service of reception, storage, processing, emission, routing or transmission of data by means of computer system and includes networking services; ace Veh one sere HEE Oa BY HTL Federal Noganit Garste No, 83 7" aly 2016 page HC Ly PhP IN MOEAEE AG MLCT Ag Phamtdsk PAI TEAMED he AcE TPR ake Ate” Lae oes haohaenk 20d enehean's VPage — mdse AU Lamdeear PIN AAT Lae eas ye Abe Let a “eheEetC A" PE a et ray eet As Preeh 4, eegereet op age Le LoL TPE OP ICL UA 10 renege” IN NS bMS NE LHG OY ofp eNlo'y amt NOT PLLA AFA ADS OL (NL PerIAR Pavamge ogy Cron dtlotl bos HP AI” INT MDgts RMI CIRCE Dee aor | ogee: RAY Ube PR RTT R BeJ9 PA Sor aoa PRIMA 4L4% ereenniy — aat ACHE KeLawre” mo Ange rete one Pen eAg, Ad 10+ HU eeM AIP In ASO: HPAI Paar MNdA: NLAAR bao: Ly MAA roy bce erty ernert oer ance 12 Ak PN AJ Oe PPP TREC DPT PHY Tics Tore age adh — een eae hye A ta 37 “computer or computer syste software and the microchips technology based data processing, storage, analysis. dissemination and communication device or any device that is capable of performing logical, arithmetic or routing function and includes accessories of that device: 4/ “computer data” means any content data, traffic data, computer program, or any other subscriber information in a. form suitable for processing by means of @ computer system; 5/ “computer program” means a set of instructions or commands expressed. in words, codesor schemes which are capable of causing a computer system to perform or achieve a particular task or result; 6/ “traffic data” means any computer generated data relating to a chain of communication by means of a computer system indicating the communication’s origin, destination, route, time, date, duration, size or types of underlying service: 7) “content data” means any computer data found in the form of audio, video, picture, arithmetic formula or any other form that conveys the essence, substance, meani or purpose of a stored or transmitted computer data or_-—_computer communication; oS a ay i ir Ter bree 161 Srecw IN VATS TLE MAS rhe cot ACA AGA AArAAG PAD TEAMED NIATOT Achat ag ATTA KeLLNTA PCA 08 “phpaueee AJ RUT NA PHPLRC AJ NA LMd NIALEECE AATEARAT ANA TROT LUD PAM RMALIAT OFF AA Vopr NALA coal art “petit? IAT NbPyerE ACI 26 AVF LewgMC! OR WPLEEC AC fowns BI EMIT: ChE s AI PITTA: LNT: Lovage: KT HPAP OR AA MNF ander PariAny OL aa Ra PAD TEM HIATT TTT LING Yar: RAG omar AV” TAT NY APE DADO EAH Ctooahto 1G Foy POA KCL MARA Matt LY AT NER PIPT Ae here pA PRCA ROTA PhPLeTC “CFM BTOCH OL AJ ‘0: “mae” TNA ADPRARAY LRT AL, PAF eheretrC AJ OL PA FCAT HIATT Ohba: PATS Le a DLP AA bawdag, Si WIAD Man” TAA Mb"EREC ACH WMT bE PAI TOOT Of Paver acer Mater Hee Prk cond AT MILT LLLPCA har ar rae oe 87 “network” means the interconnection of two’ or more computer systems by which data processing service can be provided or received; 9/ “computer data security” means the protection of a computer data from deleting, changing, and accessing by unauthorized person, compromising its confidentiality or any other damage; 10/ “access” means to communicate with, to enter in, store in, store data in, retrieve, or obtain data from, to view, to receive, move or copy data from a computer system, oF otherwise make use of any data processing service thereof; 11/ “critical infrastructure” means a computer system, network or data where any of the crimes stipulated under article 3 to 6 ofthis, proclamation, is committed against it, would have a considerable damage on public safety and the national interest; 12/ “interception” _—means-_—=—reatime surveillance, recording, _ listening, acquisition, viewing. controlling or any other similar act of data processing service or computer data: 13/ “service provider” means a person who provides technical data processing or communication service or alternative infrastructure to users by means of ‘computer system; m «(imatt REO oe ML aT TAY MUA Fone PNG LY Atom PRA MAL 40 9 DA4 tort Hil 49 wT MA AenPAL 49 ar TE NFL ND owbARCE RI Ue PAAARE FVD Aoki ANY MPL IF AKT PhEA mdag IPE AT LAP OAt EH “Om1G HA" INA NAT tomewcove, AAD Patina AHA Yor INARA MN MARE hee APHEALE TAA aI rare NR 94h) Proahta, Tar hAA Aur? ANY APE newer eran And ey OG PRORe ober AATRROTS Laagrent ERI CP AN UY ARCA FAN one FARGA 7A AM lohag Pitney PHAA 2°00 tent LW REI MN PACA owen AUNT KEW tort 8 “ho” AY Prete doe oe 17 Fhe oat treme AHA rari RN TR Or NOI PI PARE I Laren Federal Negarit Gate No, 8 a 147 “Attorney General” means head of the Federal Attomey General appointed by the House of Peoples Representatives; 15 “Public prosecutor” means lawyer appointed by the Attorney General and administered by public prosecutors administration regulation and included the Attorney General and the deputy attorney generals; 16/ “investigatory organ” mean a person legally invested with the power of investigation; 17/ “regional state” means any state referred to in Article 47(1) of the Constitution of the Federal Democratic Republic of Ethiopia and for the purpose this Proclamation it includes Addis Ababa and Dire Dawa city administrations; 18/ “police” mean Federal Police or Regional State Police to whom the power of the Federal Police is delegated; 19/ “Agency” mean Information Network Security Agency; 20/ “person” means a physical or juridical person; 21/ any expression in the masculine gender includes the feminine, FARE en 2c um ane HE OL 49 RS DEA vAT LhETEPC OFEiF eh NEA AIL MhP TEPC HCIFG bP TEPC AJ Ae £Rdpo% WIE E. h1 oF 22-74% BN VFO dor Wr Ate LAr wes Wrhdme 298 arch, hnkte ACS PETA AD OL PCH RET OBAY VY awd ee NERY hyay Gant NIENAT PAA RAGA OLN WC GE. AOD AC MT, NLLCA code ager luni ebm: 8 nD AVR th NPR (i) AB FroAtto POFEA LCT Ps Rowar: v) ah? Fart cont atime tke MAI AF NeLod eherterC PC PDP LETC A one BTPCH Ag her hdat Goo ROK APOY oor NYRCA Ke ANG AG bac Rah AG AH NeRRCA cobs gabMAL A) NRA comer AT AL hw DAPAY Govt AHH AAC Gan PIRCA Re AAG AT NAC Hi, AON AG BET, NURCA code pabaas: & A oF mat TROP do vr Ade LAr OL brane 4.98 Phere ou £462 PAUYD Ad of9 Pad TOORIT MIATA FeAs NIRV HAPAT 4oor- AYLNAT Re ANG AG NAG TH, ADH NA N22CA amd gabmass 8 any AMR Deh APPR (fh) AL Praottor POIRA LCA Prs.Rqar:- Federal Neparit Gate No. 83.7" july 2016, page PART TWO. COMPUTER CRI ;ECTION ONE CRIMES AGAINST COMPUTER SYSTEM AND COMPUTER DATA 3. Mlegal Access V/ Whosoever, without authorization or in 9108 excess of authorization, intentionally secures access to the whole or any part of computer system, computer data or network shall be punishable imprisonment not exceeding three years or fine from Birr 30,000 to 50, 000 or both. with simple 2/ Where the crime stipulated under sub-article (1) of this Article is committed against: a) a computer system, computer data or network that is exclusively destined for the use of a legal person, the punishment shall be rigorous imprisonment from three years to five years and fine from Birr 30,000 to 50,000; ) a critical infrastructure, the punishment shall be rigorous imprisonment from five years to ten years and fine from Birr 50,000 to 100,000. 4, legal Interception 1/ Whosoever, without authorization or in excess of authorization, intentionally intercepts non-public computer data or data processing service shall be punishable with rigorous imprisonment not exceeding five ‘years and fine from Birr 10,000 to $0,000. 2/ Where the crime stipulated under sub-article (1) of this Article is committed against: MaRT UV) NT Phare owt Atma TRF] a) a computer data or data processing Area Voce sum ore REM AO RE Oe AAMT AF NeroA PhPTREC Bd OL PAI VOONFD MATT 4g tw hAPAy Foor ANH ANC Govt MULCA Re NAGA AT HAG AMT NAD AIG HET, ALRCA omber rhenat A) RAG comer AM ag hur WAAC Gao rOh Ane APA MYRCA Re AAG AG ble HEA, Roh AG HET, ARRCH copom sobnas MP TEC oC9% AL DAS 70% Govt A THage ho Vr ate Lars ofr fhtiner 298 orn, PDP LETC AID AHMAD NGA NIA OLF loner PhP KetC mca oe Boch? ment +m Mhear vy om Nom ERIE Lohr Lakor ORP NIARLT PRET NR What aot DOH APD Soot NeLLCH Re ANA AT hE WL AVEMAT coder Lemar My NR ThA NR (8) ag Frawdltor POFEA C11 Pte.nonarr V) Ah? Pharr eon Atine +P MAM AF NeLOA PDP TREC em AAC Foot MULCA RE NAGA AT hAG WH Aah AIG ART NeRCA oubem SibmMAt Federal Negarit Gazete No. 83.7" jy 2016 page... 9 service that is exclusively destined for the use of a legal person, the punishment shall be rigorous imprisonment from five years to ten years and fine from Birr 50,000 to 100,000. ) a critical infrastructure, the punishment shall be rigorous imprisonment from ten years to fifteen years and fine from Birr 100,000 to 200,000. System V/ Whosoever, without authorization or in excess of authorization, intentionally hinders,impairs, interrupts or disrupts. the proper functioning of the whole or any’ part system by transmitting, deleting or altering computer data shall be punishable with rigorous imprisonment from three years to five years and fine not exceeding Birr 50,000. of computer inputting, 2/ where the crime stipulated under sub-article (1) of this Article is committed against: a) a computer system that is exclusively destined for the use of a legal person, the punishment shall be rigorous imprisonment from five years to ten years and fine from Birr 50,000 to 100,000; FREE pan yeh omen dre HH Oe a PD eNO 1) MRA corde AME Ag Ihr WAAC Anh Ade APT deo MgC Re ANG AT WG HEAL Aah AG ERT, ARCA eobem weg ie has lu a WANS byrne Got OK YL Gat NULLA OF Adder AT MG ERT ADH AG GET, ASC amsbum LdebMass 4 ObP TRC AF Ag PA TELA ATF aP ha Wr Ar LAI OLI Prana BAK aca, PROTEC A, from: ents Ler TORE NAL vr OL AIR ARE NEED REA aut Car Nieuw heh Gant IMATE Re ade AT NAC aii, NMA aber geben 8 AU APR Ted NERO (8) AK Prownhtar POTEA KCLT Prs.Renar: V) Na? Khare aot atone TRE mame AF Aeloa eer Bo ag tut hyd Goode aH APA ont MYKCA RE AGT AT hac ai, Aah AG HA, MRA opm LOPNAE ws Gaur A) Aka comer ATT AL barat nah WAC POLZCd Rr ANG AT bE Hi, Noh AC BET NLLCA coum eobMA 4. Whererc aomesg Be haser 26 freon orEtt NTR ar bo AbEerE cae AnycetG AD oer Merch AL ae A eee NRTA Read ANY gant ) a critical infrastructure, the punishment shall be rigorous imprisonment from 146 years to fifleen years and fine from ‘Btw 400,000 to 200,000 or, in serious case, from igorous imprisonment fifteen years to twentey years and fine from Birr 200,000 to 500,000 6. ising mage to Computer Data 1/, Whosoever, without authorization or in excess of authorization, intentionally alters, deletes, suppresses a computer data, renders it meaningless, useless or inaccessible to authorized users shall be punishable with rigorous imprisonment not exceeding three years and fine not exceeding Birr 30,000. 2/ Where the crime stipulated under sub- article (1) of this Article is committed against: a) a computer data that is exclusively destined for the use of a legal person. the punishment shall be rigorous imprisonment from three years to five years and fine from Birr 30,000 to 0,000; ») a critical infrastructure, the punishment shall be rigorous imprisonment from five years to ten years and fine from Birr $0,000 to 100,000. 7. Criminal Acts Related to Usage _of ‘Computer Devices and Data 1) Whosoever, knowing that it can cause damage to computer system, computer data or network, intentionally transmits ay rid Prk age erat SOUE TS yt Angee PCat NM LAeaa NRW HAP AY Goo MTEMAT PAA ane a, AT LAT oodem ene, HTP ag haw OY APE ha'rbR EAN % etnaNers = POR | RCE AMBRE NIRA ALOP ANY GAT ore ae PLO KDPTRAC OMCLP TS LI PPLE KPH UP Ae OR UIC oar eam ties eben: LNA OL ANT NIALTED LOFT Nie Maar ook MTEMAT Re AdetrE HAG TA AA AG HA, ALREA cme gobM as faves F/T Fay Ao OY APE barra fe Aon KRTULIGAT POKER LCLAT Nendo” AVA MY APER HOA NHR (8) OLP © Praoanery erprerc macert OLP ALPE gw katt NEU bor Gat NTENAT HAA DOG OL HNC BG NAH AAG GT, NRC ambow Lomas 1 TROP ho vr Ake LNAPk OL" htamar 2k arse PhPTAC MCFAN PhPLeREC AJ oLP br Rent PTT PLLVEA POP UREG TEM PPAME DR RAT KLAE FA OL AA ama BI £4 LRLI OL AAA dar nAAG. fhm NIU MAPA Geet NIENAT PAA Add OLE TI hak AW Lb ADH AAT Geet NLLCA Kr Ade AG DAG TH, AAA AG HA, WALCA ome LEMAS 2 3) 4) ‘any computer program — exclusively designed or adapted for this purpose shall be punishable with simple imprisonment rot exceeding five years or fine not exceeding Birr 30.000. Whosoever, knowing that it is,to be used for the commission of unlawful act specified under Articles 3 to 6 of this Proclamation, intentionally imports, produces, offers for sale, distributes or makes available any computer device or ‘computer program designed or adapted exclusively for the purpose of committing such rimes shall be punishable with rigorous imprisonment not exceeding five years and fine from Birr 10,000 to 50,000. Whosoever possesses any computer devices or data specified under sub-article (1) or (2) of this Article with the intention to further the commission of any of the crimes specified under Articles 3 to 6 of this Proclamation shall be punishable with simple imprisonment not exceeding three years or fine from Birr'5.000 to 30, 000. Whosoever, without authorization or in excess of authorization, intentionally discloses or transfers any computer program, secret code, key, password or any other similar data for gaining access to a computer system, computer data or network shall be punishable with simple imprisonment not exceeding five years or in serious cases with rigorous imprisonment not exgeeding five years and fine from Birr 10,000 to 50,000. MURIEL geen 26h um onc Fi ML 49 ETS Oo BMY RR hed APO @) AR Praihtod POTEA SCL WTAE P6000 NI Pk HAIL oot PLMAT PAA ANeE AT DNC TA, PLMAT oobuom PTAs & HOS vase QD APE WAR E ADL HE erovatra TOP LOTEA SCA Pbd.pa00: V) AOIRER TEP OL AIA AdE TFET OMA NeLeodhto HHA PAV PANG bite MARE Pb TREC AJ WLP Ado NTN PDIMERAC PCF OLP BVPCH AL DOL” A) ANFKL UL APE MSOF OL" vrek AM, VED AL APTN OA hur Fok hhhe APA — Good ROH YP APAE Foot NURCA Re RAGA LUG: Deh hea vat ah re. joo. PTICAC! £7, OTE te’ D. PDP TRAC AFF OF dit enor THO” hor PAAod ho tit oes PEP hart OLP Ade OL AAA ho FM, LAU ITFOKte aor age py ATT OLP NUIT AA A Pho'd OL AS ear LT AOs PhP ULE, OR dat fom oer OTE RDPTRAC AD LHX ogee Mv PATA WIR hed Sout AILNAT TAA Ae AG hii, 1c AeNAT embe OL" OFEA HIS OU A RANG Seok NILNAT Re AHA AT hAC Ti, AAN AG BEA NLRCA coe LbmaAr: on Federal Negant Gazette No, 83 7 jby 2016 page... 1 5/ Where the crime stipulated under sub- article (4) of this Article is committed negligently, the punishment shall be simple imprisonment not exceeding one year and fine not exceeding Birr 10,000. 8. Aggravated Cases Where the crime stipulated under Article 3 0.6 of this Proclamation is committed: a) against a computer data or a computer system or network which is designated as top secrete by the concemed body for military interest or international relation, or ») while the country is ata state of emergency or threathe punishment shall be rigorous imprisonment from fifteen years to ‘twenty five years. SECTION TWO COMPUTER RELATED FORGERY. FRAUD AND THEFT ‘9. Computer Related Forgery Whosoever falsifies a computer data, makes false computer data or makes use of such data to injure the rights or interests of another or to procure for himself or for another person any undue right or advantage shall be punishable with simple imprisonment not exceeding three years and fine not exceeding Birr 30,000 or in a serious cases with rigorous imprisonment not exceeding ten years and fine from Birr 10,000 to 100,000. amaETS Ane 26% au HEE MAL 7, Qhr rete ATHY $1407 CIAA OFEA BT ay haw RAN PERC AIP TY Neu Reed NH oLe Webs: OLE wR PLMarE HIG NemRNe WLI FAAar> Ao Phat AME Newavby Aro? ham AAA Red's ORF KONE OTF yrap pe PIR CTA NLR PRETO NY NPAT Gao} AMI LMAT Rr RAGA AT WC Ya MTLNAT combo gePmAr: HTH Oe Meron, PLM PY ATTEN OLI° ALA har AVTTE PHOTREE AI Norror NEY OL AA Tay rar ALLA NAA har AL ATLL PAT PRLA WIRY DAPAY Good OY LMAT Re ANG AG RAG HT AaH AC Hi, 1LCD cote oLF wT HAk Wr ‘Tib AnH A Geet WALCA Br Ade AT hAG Aah AG He, NILE cody LNT Newhart: Ao o'r 1b. fhahterh 1H 1csr TKap dor MY APE NR tae Praphtas PaFEA SCI hendor NHN OL AAA “Tar 947 CAD ho PAAbrerh TH eenecoTT Ad PANE PR ADELA CH AMT faoodts LIT: Kha Le RTE ORF AAA har Poband. ARV WAgAT Gort NILNAT PAA ADE HL NAC WH, NVLNAT codon LbMAr Federal Nogant Gasete No. 83 2" aly 2016 pape. MM 10. Computer Related Fraud 1) Whosoever fraudulently causes a person to act in a manner prejudicial to his rights or those of third person by distributing misleading computer data, misrepresenting his status, concealing facts which he had a duty to reveal or taking advantage of the person’s erroneous beliefs, shall be punishable with rigorous imprisonment not exceeding five and fine exceeding Birr 50,000. years not 2/ Whosoever, with fraudulent intent of procuring any benefit for himself or for another person, causes economic loss to another person by any change, deletion or any other damage of computer data shall be punishable with rigorous imprisonment not exceeding five years and fine from Birr 10,000 to 50,000 or in serious cases with rigorous imprisonment not exceeding ten years and fine from Birr 10,000 to 100,000. 11. Electronic Identity Theft ‘Whosoever, with intent to commit criminal act specified under Article 10 of this Proclamation ‘or for any other purpose produces, obtains, sales, possesses or transfers any data identifying electronic identity of another person without authorization of that person shall be punishable with simple imprisonment not exeeeding five years or fine not exceeding Birr 50,000. Ded hea yar Dhaior Pen 4 TE. ANNA com) QARéO ARE AL Ce1e90~ OFs DEP NeANP MIE te) CU OTE tet Ror do 0) AdNA com fared AK oar £CU MAR AARP tease one APE Mar ANNA com's LARLA AB emtte HAR LCA MIR AO" Pea: AAR owrrtens AP one PAA ther eC PCH Nemavby UP Alte LIES Poeun: ATi ebeM hese ANT NALTE LooFT wf LN 4Pk ePTFE RR OT gawd RO ROG Goma MeYLCA Re Ane geben 8) Tor har aA fare £aitony VICE MONTE ERIE MARE ORF TARE Mb EeEG HCH NM MMGut wf Norah ARMA aon £ARLA AEF A@dAR £61 £1 OF temnooh NIB bene sant Oh OL deme WLRCA Aner gebmas 4) TE, N0P% yng hac Ae terd—e™ wKiet TKO hon Ur cite: a eben COFF Navavhy 11 $he-aar WAR oF" AOA AUF MAA to oer Aro Mrwet ag MS PAT OLF AR” ALA AMA PNB ors eit NIRV hyn Rv 479 SECTION THREE ILLEGAL CONTENT DATA 112. Obseer Against Minors V/ Whosoever intentionally produces. transmits, or Indecent Crimes Committed sales, distributes, makes available or possesses ‘without authorization any picture, poser, video ‘or image through a computer system that depicts: a) a minor engaged in sexually explicit conduct; or b) a person appearing to be a minor engaged in sexually explicit conduct; shall be punishable with rigorous from three imprisonment years totten years. 2/ Whosoever entices or solicits a minor for sexual explicit conduct by transmitting or sending erotic speeches, pictures, text ‘messages or videos through computer system shall be punishable imprisonment from five years to ten years, with rigorous 13. Grimes against Liberty and Reputation of Persons. ‘Whosoever intentionally: Vintimidates or threatens another person or his families with serious danger or injury by disseminating any writing, video, audio cor any other image through a computer systems shall be punishable, with simple imprisonment not exceeding three years or e ey qt NRNAT PA RIG OLE NIROKEA Ak NAPA or O1EMAT Re AAG LPMAL tot oer branes tezwaht Ol OL MARR ADP LETC PCH RMT MRI, Merah: Nom OLP KANALT PhOTeC HPRLNAD Naohsta KOVR hort OLP PPANT HTD Pe NIRV DARA Gat ATLNAT PAA Add OLP NILOTEA MNS NAN Gent NTLMAT Rr ANAT LbMAE PAAd dor RAC ws oman ay Pree RUG HNIC OA oes TASH POA Mb T REC AMT Pade. NAV PIA AME, APCANE heat Soot AEMAT PAA AAG OLF HAC atl, AILNAT ome OLP MAE BMA aM LUNE Ae fbr OIE ONAGKE ARAB AMPHCALL CTAAN POVEA UT AIS BENE PRY TIO Aietale VT ATO ho vr tie AuaeraAn awiha hor: ht ofr TPA NEELAM PLLA RUG THAI PAA SPR OLE VO KA PAA Abe LeEC Po a NIRV YAY oot NILNAT Re NGA Lena 1h Ohererc aca AN haere ahsoes : MVE OP do PCV OLP MATT AMTPOF OLY ATL AVEC UY Ade PMS OkL wmadwnttrs Liar Ph MLA ae — awa 14. Crit 15. ‘@ serious cases with rigorous imprisonment not exceeding five years. 2icauses fear, threat or psychological strain ‘on another person by sending or by repeatedly transmitting information about the victim or his families through computer the victim's under system or by keeping computer communication surveillance shall be punishable with simple imprisonment not exceeding five years or in serious case with rigorous imprisonment not exceeding ten years. 3/disseminates any writing, video, audio or any other image through @ computer system that is defamatory to the honor or reputation of another person shall be punishable, upon complaint, with simple imprisonment not exceeding three years or fine not exceeding Birr 30,000or both, against Public Security Without prejudice to the provisions Article 257 of the Criminal Code of the Federal Democratic Republic of Ethiopia, Whosoever through a computer system any written, video, audio or intentionally disseminates any other picture that incitesviolence, chaos ‘or conflict among people shall be punishable with rigorous imprisonment not exceeding three years. Dissemination of Advertisement_through computer system 1/ Whosoever, with intent to advertise or sell any product or service, disseminates advertisement messages through e-mail or related computer address without shall prior consent from the recipient be RARE ROR IR RN TRE MOF EP RNS Trem rep cE 81 hyn RECT RMT Pea ‘punishable with simple imprisonment not Nig bya Govt aieMaT baa exceeding three years and fine not Ane AT WAC ai, NENA oben exceeding Birr 30,000. or, in serious case, ogy ore has Avy ab. hAgnt saute NLMAT OF ANG AG Mle Hi, ATLMAT eobem gobma:: YPN NPR Th NPR R) KIT 2/ Notwithstanding the provision of sub- as article (1) of this Article, dissemination of with rigerous imprisonment not exceeding five years and fine not exceeding Birr 50,000. a commercial advertisement through email account shall not be punishable provided that: a) the primary purpose ofthe V) WMJakea NESTE RMP TY advertisement is to introduce DARA PORT one NATE 20 AERO Pow hws RPE AIRE he of customers with new products or services and the customers have willing; oF 4) Pahors AMWAY ANH ALE AT b) the advertisement contains valid fond — tba — cbamiiert identity and address of the sender, apd PAFor mA EE NE ahem, PoLEOFA #405 Fhhay valid and simple way for the recipient ne Pen hy FEA to reject or unsubscribe receipt of Aganedyrn further advertisement from the same souree. TH. nana tee: 16. Gr lity of Service Providers Top RATT Man, NLLOS Ce | A service provider shall be criminally liable PHT CAA MTL —ArbAcas | in accordance with Articles 12 to 14, ofthis TH ap PANE wrt alot PLN A Proclamation for any illegal computer MTA VEIT MY APE hav reR TE content data disseminated through _ its Abawah ed $4229°% awmgy | Computer systems by third parties, iit has: nah NOVEA tmee eeoat A) Aton PLUY KJa-d NVAGuLA ogy | —1/ directly involved in the dissemination or ACURA NNLLD MTD PES, We edition of the contentdata; Y av-or een &2 cours NIKat | | °2/ upon obtaining actual knowledge that the sdort athe ope bk content data is illegal, failed to take any ALU ALT ORLOr NEP ‘measure to remove or to disable access to the content data; or LAmdk hr ofr f) aver teat Askord NIALH@I weg | — 3/ failed to take appropriate measure to TRO NALD NIRLRCT enemateror remove or to disable access to the content Ee a data upon obtaining notice from nositine competent administrative authorities. Wg. ia. “TR ay ta SUD APE AFR RAW NPE RECA NERO GR)NHRO GK) on NEO GEG) mar eemANAY Pownce 12 LtON NR WEL Gav (RDAT PAA Aer Le Whe Ki, ALNAT Newbee gmat 8 LY APE comer eeunsod Phere FEA Plame ALY UY Ae REDE Nev DAPAT Gone NVENAT RY ANGT AT NAG YL NENA code ema 004 7 Adres POvEA £C2% MU PEA DbRITET OKT ot 0.4 OFA METRIC MCS ATL rdhom NR AINA Pho 7 TAY, PAPE TReEM, OFFS Abe ERC cet athe rneoge ne 3k OTE MAR ar afer Note aD enenbn AA wFKA Adio NTR AN WEA PUY Phe £0, MPR GLTT 14.907, LAPT ALe 0h} thers ott thine hha ae gh tat OPER! ROAR APHOALE 6TAAN FORA WT NEE A (A) (E) AT (@) AL rego = cP oh PtowAtrto’) WIEA Poor (ad? Aaryt amit Aram AHA AU BI NOE CMa PEA ombum tah bag Wi, Aah fe ERT, eter Sean SECTION FOUR OTHER OFFENCES lure to C " 1 westigation Whosoever: 17. Ei V/faits to comply with the obligations provided for under of “Article 24(2) Article 25(6), Article 30 (2), Article 31(2) ‘or Article 32 (4) of this Proclamation shall be punishable with simple imprisonment not exceeding one year or fine not exceeding Birr 10,000: 2intentionally hinders the investigation process of computer crimes conducted pursuant to this Proclamation shall be punishable with rigorous imprisonment not exceeding five years and fine not ‘exceeding Birr 50,000. 18. Criminal Act Stipulated in Other Laws Where any crime other than those provided for under this Part is committed by means of computer, the relevant law shall apply. 19. Concurrent Crimes Where any of the criminal acts provided for under this Part has resulted in the commission of another crime punishable under any special law or criminal code, the relevant provision shall apply concurrently. 20, Penalty Imposed on Juridical Person Notwithstanding Article 90 (1), (3) and (4) of the Criminal Code of the Federal Democratic Republic of Ethiopi offence’stipulated under this Part is committed where any by juridical person, V/ the penalty shall be fine from Birr 50,000 to 500,000 for a crime punishable with fine; W n@TEA. ernnar nr PALA BOT her PO cont: vy ardh VAT Gan ALLAN WFLA rdK AC PAA NET a A) ANH APA Gow baa ANE? ALLAN OFEA ROK AG HEE Gant Rr NET We ah) ADH APPA AMLLNEN OFEA ROH AC ao) dO AAC Foe HR AEA ALAN OFA ROK AC HED HAAG Gat MAR Re ANG PL LAPD WIZA AVF ANY AIPR Wd NIK (B) abbooAhto here amt howkeen NLTEA: ombom LabM Ars B A@TEA Ptmaw Hn cobem UT aon NIAR bteAht — aobomar APDA ATE LUA: hea yar LoohahAag °PCord. 1L4F coy RB. ecu ae AY NEA AT ANEA AGT AC PERTH OY ACTH: Pecan LRAT AT PN STP EWI oop AT NIGH: Aba NOLtF To BAPhe APP eae PTF ANIRT APHEALR oT A210 ON PEI, OV AVF Oss maa BI ebye FEN — faohahagt FP Came ASA MY NEA &492LPT net LHFOTA® 21 when the penalty provided for is imprisonment, the penalty shall be: a) a fine not exceeding $0,000 Birr for a with simple crime punishable imprisonment not exceeding three vars, b) a fine not exceeding 100,000 Birr for a crime punishable with simple imprisonment not exceeding five years, ¢) a fine not exeeeding 150,000 Birr for a crime punishable with rigorous imprisonment not exceeding five years, 4) a fine not exceeding 200,000 Birr for a crime punishable with rigorous imprisonment not exceeding ten years, ©) a fine of up to the general maximum laid down in sub-article (1) of this Article for a crime punishable with rigorous imprisonment exceeding ten years. 3/ Where fine is expressly provided as punishment for a crime, it shall be five fold. PART THREE IVE AND INVESTIGAT! MEASURES 21. Principle The prevention, investigation and evidence procedures provided in this Part and Part Four of this Proclamation shall be implemented and applied in a manner that ensure protection for human and democratic rights guaranteed under the Constitution of the Federal Democratic Republic of Ethiopia and all international agreements ratified by the country 22, General WComputer crime prevention and investigation shall be conducted in accordance with the provisions of this Part. . RGB 2GR MM Se IT OY RTE PUY AEA 1 T NRA Vo ALY UT DIAG MATTIE PAPE ag. POVEA WD AG AAT AIA eAFor Fad LPT MP TRAC OTE T ALP TENT, LUT Oe BE. fovooGooe MANS BMY APE eter OE rd WT AT 7AM NG fomamcame DAM? AMO AFL WIP PCa LR faved: HAE ta AhPURTEC OTEA ycand WRT IE ONPEERED ned knee kAMAL WRT RETR meh NANETTE INET ANA" Aigcandn PeyTGAL Pbcdas 8%. fheeerc 42> 2H ANTePA A OAT AE Pero NETH Ue AA TRae Mater — hee AbPeAN Ay LRT AL LAS the Veah Ad ogg had ved? MATT 2G MEL eN LLLTE TOs Prod ALPE LH ANDRE Gant LATED LEENA HMC MA ON anne NAIA hatads NobhC Ada NPAMC eed AAN RE. thererc Ae nnwahd Naat art Nebel Vos A PDEA OTKAT AeohahA AT Ro 1M AM, UT ANE recMer Ts MEENA LRT AL LA PhP Ada Pad TEA MAMA OL" PERITE AR UE PT Federal Negarit Gazete No.83 7" jy 2016 page... 712? 2/Without prejudice the provisions of this Part, for issues not clearly covered in this law.the provisions of the Criminal Code and other relevant laws shall be applicable to computer crimes. 23. Investigative Power 1 The public prosecutor and police shall have joint power to investigate criminal acts provided for in this Proclamation, And the public prosecutor shall lead the investigation process. 2/ Where requested to support the investigation process, the Agency shall provide support, analysis on collected information, and technical conduct, provide evidences if necessary. 24, Retention of Computer Data 1 Without prejudice to any provision stipulated in other laws, any service provider shall retain the computer traffic data disseminated through its computer systems or traffic data relating to data processing or communication service for one year. 21 The data shall be kept in secret unless the court orders for disclosure. 25, Real-time Collection of Computer Data Without special provisions stipulated under other laws, prejudice V/ to prevent: computer crimes and collect evidence related information, the investigatory organ may, request court warrant to intercept in real-time or conduct data surveillance, on computer data,

You might also like