You are on page 1of 4

The Cybersecurity and Cybercrime Bill 2021

New law not without difficulties and concerns

The Cybersecurity and Cybercrime Bill 2021 (“CC Bill”) replaces the existing cybercrime legislation, the Computer
Misuse and Cybercrime Act 2003. The CC Bill comes at the right moment after the FATF has taken Mauritius off
the grey list. There is a clear link between technological innovation and financial crime. One of the first cases
surrounding the illegal use of crypto assets was “Silk Road” used by criminals, including terrorists. The Bill also
aims to protect personal integrity from harmful use of a computer system, including the internet, but the broad
outlay of the investigative and penal provisions triggers the question of potential misuse.

In this legal update, we set out the main provisions of the CC Bill.

The CC Bill creates the following new offences: downloading movies, music files or pirated
software applications for gain or against
• Misuse of fake profile: making use of a remuneration, or posting a copyrighted
fake profile to cause harm. A ‘fake profile’ work online for gain or against
is defined as an untrue online remuneration.
representation, existent or non-existent.
• Failure to moderate undesirable content:
failure by the administrator of an online
• Cyberbullying: any behaviour using account to moderate and control
information and communication undesirable content that has been brought
technologies which are, for example, to the administrator’s attention by the
repetitive, persistent and intentionally authority. An undesirable content includes
harmful. an online content that is inaccurate and
which is posted with intent to defame, or
• Cyber extortion: using the internet to a content that threatens public health or
demand money or other goods or national security or promotes racism.
behaviour from another person by
threatening to inflict harm to his person, • Unlawful disclosure of details of an
reputation, or property. investigation: except if the person
disclosing the details of an investigation of
• Revenge pornography: using a computer an offence under the CC law does so by
system to disclose or publish a sexual virtue of a statutory power or in the
photograph or film without the consent of performance of is lawful duties or
the person who appears in the photograph contractual obligation or pursuant to a
or film, and with the intention of causing legal obligation, the investigation must be
distress to that person. kept confidential.

• Cyberterrorism: accessing or causing to be • Obstruction of investigation: destroying,


accessed a computer system or network deleting, altering, concealing, modifying or
for carrying out an act of terrorism. rendering a computer data meaningless,
ineffective or useless with intent to
• Infringement of copyright and relates obstruct or delay an investigation.
rights: using a computer system to, for
example, publish or distribute another
person’s work for commercial purposes The CC Bill investigation procedures which existed
without the person’s consent, or in the Computer Misuse and Cybercrime Act 2003

Page | 1
are reproduced in the CC Bill and in some instances
have been enhanced. • Deletion order: the deletion of data that is
unlawful which is found in a computer
• Expedited preservation and partial
system or on a device, or disactivating
disclosure of traffic data: the investigatory
access to unlawful activity which is made
authority may serve a notice on a person
available through a computer system.
who is in possession or control of traffic
data stored in a computer system or
• International cooperation: In addition to
device, which is required for investigation
the Extradition Act and the Mutual
if the investigatory authority has
Assistance in Criminal and Related Matters
reasonable grounds to believe that there is
Act, the Attorney-General who is the
a risk that the traffic data may be modified,
Central Authority, may make a request for
lost, destroyed, or rendered inaccessible.
mutual legal assistance in any criminal
The integrity of the data must be
matter to a foreign State, for example, for
maintained for a period not exceeding 90
the collection of evidence in electronic
days. However, this period of 90 days may
form of any criminal offence. The types of
be extended pursuant to a judicial order.
criminal offences for which this power is
exercised is not limited to offences under
• Production order: a person may be
the CC Bill. The Attorney-General may also
compelled, under the authority of a
grant legal assistance in the same manner
judicial order, to submit specified data to
to a foreign State. Furthermore, subject to
an investigatory authority.
the provisions of the CC Bill and any other
relevant law, the Attorney-General may
• Powers of access, search and seizure for forward to a foreign State information
purposes of investigation: a computer obtained in a Mauritian investigation if he
data storage medium or a computer considers that the disclosure of such
system or part of the computer system, information may assist the foreign State in
may be accessed, searched and seized for initiating an investigation or proceedings
the purpose of an investigation or concerning offences relating to cybercrime
prosecution of an offence under the and cybersecurity. The Attorney-General
authority of a judicial order. may require that the information is kept
confidential and if disclosed only subject to
• Real-time collection of traffic data: the conditions that he may imposed. The
collection or recording of traffic data (e.g., mutual assistance extends to the real-time
date, time and route of a communication) collection of traffic data and the
on the Mauritian territory and compelling interception of content data.
a service provider, within its technical
capabilities, to collect and record such • 24/7 point of contact: For the purposes of
traffic data, under the authority of a investigations or proceedings concerning
judicial order. criminal offences related to computer
systems and computer data, or for the
• Interception of content data: the collection of electronic evidence of a
collection and recording of content data criminal offence, the Commissioner of
(e.g., the message that is being Police shall designate a 24/7 point of
transmitted) in the territory of Mauritius in contact available on twenty-four-hour,
real-time, and, within the technical seven-day-a-week basis to provide
capabilities of the service provider, to immediate assistance to the point of
cooperate and assist the investigatory contact of another Party on an expedited
authority in such collection and recording. basis.

Page | 2
Critical information infrastructure providers and the path through which
communication was transmitted.
In addition to the provisions which create the
Requiring the preservation of traffic data is
offences and the procedural provisions mentioned
not intrusive as opposed to, for example,
above, the CC Bill also provides that the National
the disclosure of content data for which a
Cybersecurity Committee may, after consultation
judicial order is required.
with the regulatory authority in control of an
information infrastructure, identity information
• Internet content monitoring: The CC Bill
structures which need to be declared critical
does not impose a general monitoring
information structures. A critical information
obligation of internet content: to impose a
infrastructure is an asset, facility, system network
general obligation of monitoring could
or process, whose incapacity, destruction, or
disproportionately limit users’ freedom of
modification would, for example, have a
expression and freedom to receive
devastating effect on the availability, integrity or
information, and in addition, could be
delivery of essential services, or a significant impact
considered as an undue interference on
on the national security, national defence, of the
the conduct of their business. However,
functioning of the State.
the precise offence which is created in
clause 23(2) is unclear. Besides, the CC Bill
does not define who is an administrator of
Computer Emergency Response Team of Mauritius an online account. Surprisingly, the
(CERT-MU) expression “online account” is defined in
an unconventional manner. An “online
The CERT-MU which already exists and operates
account” as defined, includes pages on
under the aegis of the National Computer Board
search engine service. A search engine
since 2008 and which itself is under the Ministry for
allows users to search the internet for
Information Technology, Communication and
content using keywords. Google, Yahoo,
Innovation, is transferred under the direct
Baidu and Bing are popular search engines.
supervision of the Ministry: the CERT-MU is now set
As drafted, clause 23(1) of the CC Bill
up within the Ministry. Like the National
allows a Mauritian investigatory authority
Cybersecurity Committee, which is established
to require a search engine service provider
under the CC Bill, one of the functions of the CERT-
to moderate and control undesirable
MU is to advise and assist the Government on the
content, such content that, according to
development and implementation of cybersecurity.
the investigatory authority, is for example,
Comments deceptive or inaccurate and posted with
intent to defame. Whether this may or
It is not proposed to critically examine the
may not have been the intention of the
provisions of the CC Bill in this legal update. We
Government, this provision may have
shall address a few points only.
unintended.
• International cooperation: The
international cooperation regime which is • Absence of proportionality in the
contained in the CC Bill is a significant sentences: It is undisputed that the
improvement on the existing regime. In National Assembly has the power to make
addition, it will be possible for the laws for the peace, order and good
investigatory authority to serve a notice on governance of the country. This power to
a person (including a service provider) who make laws also include the power to set
is in possession or control of traffic data, the sentence for criminal offences. On the
requiring that person to expeditiously other hand, due respect must be given to
preserve the traffic data or disclose the the necessity of upkeeping a
required traffic data to identify the service proportionality with the seriousness of the

Page | 3
offence. In Reyes v. The Queen [2002] data. However, clause 11 which makes it
UKPC 11, the Judicial Committee an offence the intentional and
reiterated that it is and has always been unauthorised modification of computer
considered a vital precept of just penal data provides as sentence, a fine not
laws that the punishment should fit the exceeding one million rupees and penal
crime. This case has been cited with servitude for a term not exceeding 20
approval by the Supreme Court of years. The nature of the two offences is
Mauritius on numerous occasions. Whilst not so different: in both cases, computer
‘proportionality’ is an issue at the stage of data are deleted without authority and
sentencing, however, the sentencing intentionally. Clause 23 of the Bill which
provisions ought to give an indication concerns the failure to moderate
about the severity of the offences. This is undesirable content provides for a fine not
however not the case with the sentencing exceeding one million rupees and to penal
provisions which are contained in the CC servitude for a term not exceeding 20
Bill. As an example, clause 9 which creates years. It appears that failure to moderate
the offence of unauthorised hindrance of a undesirable content must be treated more
computer system provides as sentence, a severely than the unauthorised hindrance
fine not exceeding one million rupees and of a computer system.
penal servitude for a term not exceeding
10 years. Such hindrance may be caused
by the alteration or deletion of computer

Written by

Ammar Oozeer

Senior Associate at BLC Robert

Counsel and Head of Compliance

Page | 4

You might also like