You are on page 1of 2

Page 1

32 OFFICIAL JOURNAL OF THE GABONESE REPUBLIC FEBRUARY 28, 2018 - N ° 386 Ter

Article 121: Certification of transactions of The Minister of the Interior and Security, in charge of
information society services is provided by a Decentralization and Local Development
authority empowered by decree, on the proposal of the Minister Lambert Noël MATHA
in charge of the Digital Economy. ___________

Article 122: Any dispute arising from the application or Ordinance n ° 00000015
00000015
/ PR// 2018 of 23 February
of 23 February
2018 2018
the interpretation of the provisions of this regulating cybersecurity and the fight
order, is first submitted to the authorities against cybercrime in the Gabonese Republic
competent in the sector.
THE PRESIDENT OF THE REPUBLIC,
In the event of non-conciliation, the dispute is brought HEAD OF STATE ;
before the competent court.
Considering the Constitution;
Title VI: Transitional and final provisions Considering the law n ° 023 / PR / 2017 of December 29, 2017
authorizing the President of the Republic to legislate by
Article 123: The regulations in force in Gabon in ordinances during parliamentary intersession;
matters of electronic commerce does not restrict the Considering the law n ° 021/63 of May 31, 1963 relating to the Code
freedom to provide information society services Penal, together the subsequent amending texts;
by a service provider established in a member country of the Considering the ordinance n ° 10/89 / PR of September 28
CEEAC or CEMAC, subject to reciprocity. 1989 regulating the activities of
trader, industrialist or craftsman in the Republic
Article 124: Any operator working in the sector of Gabonese;
electronic transactions has a period of six months Considering the ordinance n ° 00000008 / PR / 2012 of 13
from the date of publication to comply February 2012 establishing and organizing the Agency
to the provisions of this Ordinance. of Regulation of Electronic Communications and
Post, ratified by law n ° 006/2012 of August 13, 2012,
Article 125: Regulatory texts determine, in together the subsequent amending texts;
as necessary, provisions of any kind Considering the decree n ° 0212 / PR of January 27, 2011
necessary for the application of this ordinance. establishing and organizing the National Agency
Digital Infrastructures and Frequencies;
Article 126: This ordinance will be registered, Considering the decree n ° 0406 / PR / MENCP of March 12
issued under the emergency procedure and executed as 2013 on the attributions and organization of the Ministry of
state law. the Digital Economy, Communication and
Done in Libreville, February 23, 2018 Post;
Considering decree n ° 0473 / PR of September 28, 2016
By the President of the Republic, appointing the Prime Minister, Head of
Head of state Government;
Ali BONGO ONDIMBA Considering the decree n ° 252 / PR of August 21, 2017 on
reshuffle of the Government of the Republic,
The Prime Minister, Head of Government together the subsequent amending texts;
Emmanuel ISSOZE NGONDET
The Council of State consulted;
The Minister of State, Minister of Communication, The Council of Ministers heard;
Digital Economy, Culture, Arts and
Traditions, in charge of Popular Education and ORDERS:
Civic Instruction, Spokesperson for the Government
Alain Claude BILLE-BY NZE Article 1 st : This ordinance, taken into
application of the provisions of article 47 of the
The Minister of the Economy, Foresight and Constitution, regulates cybersecurity and
Sustainable Development Programming of the fight against cybercrime in the French
Régis IMMONGAULT TATANGANI Gabonese.

The Minister for the Promotion of Private Investments, Title I: General provisions
Small and Medium Enterprises, Trade and
Of the industry Chapter I st : Object and the scope
Madeleine BERRE
Article 2: This ordinance aims at the protection and
the security of electronic communications networks,
of systems of information, of transactions

Page 2

FEBRUARY 28, 2018 - N ° 386 Ter OFFICIAL JOURNAL OF THE GABONESE REPUBLIC 33

electronic, privacy and minors in the communications electronic, of a system


cyberspace. information or terminal equipment;

As such, it aims in particular to: -cryptology activity: any activity aimed at the
production, use, import, export or
-define and punish any offense committed on the marketing of means of cryptology;
cyberspace;
- fight against telephone fraud; -administration in charge of communications
-fix the tariff for international telecommunications; electronic: ministry or minister, as the case may be,
- build trust in the networks of invested on behalf of the Government of a
electronic communications and systems general competence in the communications sector
of information ; electronic and information technology and
-fixing the legal regime for digital proof, Communication ;
security, cryptography and certification activities
electronic; -approval: consists of the formal recognition that the
-protect the fundamental rights of people product or system evaluated can protect up to one
physical, including the right to human dignity, to level specified by an approved body;
honor and respect for private life, as well as
legitimate interests of legal persons; -algorithm: series of mathematical operations
-protect the infrastructure essential of elements to be applied to data to arrive at a
information; desired result;
-promote the use of security technologies
information as a means of protecting rights -cryptological algorithm: process allowing, with
intellectual property; using a key, to encrypt and decrypt messages
-Ensure a balance between the interests of the public sector and or documents;
those in the private sector.
-asymmetric algorithm: encryption algorithm
Article 3: Are excluded from the scope of the using a public key to encrypt and a private key
present ordinance, specific applications different from the latter to decipher the
used in national defense and security messages;
public.
-symmetric algorithm: decryption algorithm
Article 4: This ordinance applies when using the same key to encrypt and decrypt
the offense is committed: messages;

-on the territory of the Gabonese Republic by a - active attack: act modifying or altering the
Gabonese citizen; resources targeted by the attack, such as
-on the territory of the Gabonese Republic by a integrity, availability and confidentiality of
foreigner or stateless person, against foreigners, interests data;
nationals or foreigners, and whose extradition has not been
requested by the competent foreign authority, before - passive attack: act that does not alter its target such as
that a final judgment is rendered against him, by passive listening, breach of confidentiality;
the competent court;
-on board a vessel flying the Gabonese flag or a - breach of integrity : provoking
aircraft registered there; intentionally a serious disturbance or
- abroad by a Gabonese or by a foreigner having his system interruption
habitual residence in Gabon. information, a communications network
electronic or terminal equipment, in
Chapter II: Definitions introducing, transmitting, damaging, erasing,
deteriorating, modifying, suppressing or rendering
Article 5: For the purposes of this ordinance, we mean inaccessible data;
through :
-safety audit: methodical examination of
- secret access: mechanism allowing to conceal a components and actors of security, politics,
access to data or a computer system without measures, solutions, procedures and
authorization of the legitimate user; means implemented by an organization, to
secure their environment;
- illicit access: intentional access, without having the right,
to all or part of a network of

Page 3

34 OFFICIAL JOURNAL OF THE GABONESE REPUBLIC FEBRUARY 28, 2018 - N ° 386 Ter

-authentication: security criterion defined by a reading, listening, illegal copying of origin


process implemented in particular to verify intentional or accidental during storage,
the identity of a natural or legal person and ensure treatment or transfer;
that the identity provided matches the identity of this
previously registered person; -content: set of information relating to
data belonging to natural persons or
-competent authority: regulatory authority for legal, transmitted or received through the networks of
electronic communications or public operator electronic communications and systems
in charge of digital infrastructures and frequencies; of information ;

-key-bi: public key and private key pair used in -lawful content: content undermining dignity
asymmetric cryptography algorithms; human, privacy, honor or security
national;
-encryption: any technique, any process thanks to
which are transformed using a convention -secret convention: agreement of wills relating to
secret called key, digital data, unpublished keys necessary for the implementation of a
clear information into unintelligible information by means or a service of cryptology for
third parties who have no knowledge of the key; encryption or decryption operations;

-block encryption: encryption operating on -Email: any message in the form of


clear information blocks and on information text, voice, sound or image sent over a network
encrypted; public or private communication, which can be stored
in the network or in the terminal equipment of the
-encrypt: action aimed at ensuring the confidentiality of a recipient until the latter collects it;
information, using secret codes, to make it
unintelligible to third parties, using mechanisms -encryption: use of unusual codes or signals
offered in cryptography; allowing the conservation of information to
transmit in signals incomprehensible by
-key: in an encryption system, it corresponds to third party;
a mathematical value, a word, a sentence which
allows, thanks to the encryption algorithm, to encrypt -cryptanalysis: operation which aims to restore a
or to decipher a message; inimitable information in clear information without
know the encryption key that was used;
- encryption key: series of symbols controlling the
encryption and decryption operations; -cryptogram: encrypted or coded message;

-private key: key used in the mechanisms of -cryptography: application of mathematics


asymmetric encryption or public key encryption, allowing the information to be written, so as to make it
belonging to an entity and having to be secret; unintelligible to those not possessing the capacities of
to decipher;
- public key: key used to encrypt a message
in an asymmetric system and therefore freely diffused; -cryptology: science relating to the protection and
information security, in particular for
-secret key: key known to the sender and recipient confidentiality, authentication, integrity and non
serving as encryption and decryption of messages repudiation of transmitted data;
and using the symmetric encryption mechanism;
-cybercriminality: all offenses carried out
-source code: all the technical specifications, through cyberspace by means other than those
without restriction of access or implementation, of a software usually implemented, and in a
or communication or interconnection protocol, complementary to classic crime;
exchange or data format;
-cybersecurity: set of preventive,
-electronic communication: emission, transmission technical protection and deterrence,
or reception of signs, signals, writings, images or organizational, legal, financial, human, procedural
of sounds by electronic means; and other actions to achieve the objectives of
security set through communications networks
-confidentiality: maintaining the secrecy of information and electronic systems, information systems and for
transactions to prevent unauthorized disclosure protection of the privacy of individuals;
authorized information to non-recipients allowing

Page 4

FEBRUARY 28, 2018 - N ° 386 Ter OFFICIAL JOURNAL OF THE GABONESE REPUBLIC 35

-cyberespace: digitized data set - severity of the impact: appreciation of the level of severity
constituting a universe of information and a an incident, weighted by its frequency of occurrence;
global interconnection communication
automated data processing equipment - critical infrastructure: installation, system or part
digital; of it, both public and private, essential to
maintenance of the vital functions of the State and of society;
- denial of service: attack by saturating a resource
information system or network -data integrity: security criterion defining
electronic communications, so that it collapses and does not the state of an electronic communications network,
can no longer perform the services expected of him; information system or terminal equipment that
has remained intact and ensures that the
-distributed denial of service: simultaneous attack of resources have not been tampered with;
information system or network resources
electronic communications, in order to saturate them and - illegal interception: access without having the right or
amplify the effects of hindrance; authorization, to the data of a
communications electronic, of a system
-availability: security criterion allowing information or terminal equipment;
resources of networks of communications
electronic systems, information systems or - legal interception: authorized access to the data of a
terminal equipment is accessible and usable electronic communications network, a system
as needed (the time factor); information or terminal equipment;

- computer data: representation of facts, -intrusion by interest: intentional and unauthorized access
information or concepts in a form likely to in an electronic communications network or in
to be processed by terminal equipment, including a an information system, with the aim of either harming or
program allowing the latter to execute a to derive an economic, financial, industrial benefit,
function; security or sovereignty;

-connection data: set of information -intrusion by intellectual challenge: intentional access,


relating to the access process in a communication without having the right or authorization, in a network of
electronic; electronic communications or in a system
information, in order to meet an intellectual challenge
- traffic data: data relating to a that can help improve the performance of the
electronic communication indicating the origin, organizational security system;
destination, route, time, date, size and location
duration of the call or type of network service - deceptive software: software performing operations
underlying; on a terminal equipment of a user without
inform this user in advance of the exact nature
- terminal equipment: any equipment intended to be operations that this software will perform on its
connected directly or indirectly to a point of terminal equipment or without asking the user if
termination of a network for the purpose of transmission, consents to the software performing these operations;
processing or receiving information;
- spyware: special type of deceptive software
-reliability: suitability of an information system or collecting personal information from a
electronic communications network to operate user of the electronic communications network;
without incident for a sufficiently long time;
- potentially unwanted software: software
-provider of communications services representing characteristics of deceptive software
electronic: natural or legal person or spyware;
mainly providing services of
electronic communications; - racist and xenophobic material: any medium
digital technology that advocates or encourages hatred,
- physical international gateway: platform for discrimination or violence, against a person or
unique international telecommunication allowing group of people, because of race, color,
management and technical and financial regulation of national or ethnic descent or origin, or
all voice and data telecommunications religion;
entering and leaving Gabonese national territory;

Page 5

36 OFFICIAL JOURNAL OF THE GABONESE REPUBLIC FEBRUARY 28, 2018 - N ° 386 Ter

-means of cryptology: set of scientific tools - IT system: any isolated device or


and techniques for encrypting or decrypting; set of interconnected or related devices,
which provides automated data processing;
- non-repudiation: security criterion ensuring the
availability of evidence which can be opposed to a -vulnerability: security flaw in the architecture
third parties and used to demonstrate the traceability of a of an electronic communications network or in the
electronic communication that has taken place; design of an information system resulting in
a violation of the security policy.
-operator: any legal person operating a network
electronic communications open to the public or Article 6: Terms and expressions not defined in the
providing the public with a communications service present ordinance, retain their definitions or
electronic; meanings given by the texts in force.

-security policy: security reference established by Article 7: The institutional framework for cybersecurity
an organization, reflecting its security strategy and includes:
specifying the means to achieve it;
-the Ministry of the Digital Economy in charge of
- child pornography: any data whatever to develop and implement the national policy of
either the nature or the form or the medium representing: cybersecurity in collaboration with others
competent administrations and organizations;
-a minor engaging in behavior -the personalized public service responsible for monitoring and
sexually explicit; monitoring of system security activities
-realistic images representing a minor information and communication networks;
engaging in sexual behavior -the advisory and guidance body for implementation
explicit; national cybersecurity policies.

-cryptography service: operation aimed at The other powers of the bodies referred to in
implementation, on behalf of others or of oneself, of paragraph 1 st above are set by regulation.
means of cryptography;
Title II: Cybersecurity
-cryptology service provider: any
person, natural or legal, who provides a service Chapter I st : From infrastructure protection
cryptology; reviews

-direct prospecting: any sending of any message Article 8: The Minister in charge of the Digital Economy
intended to promote, directly or indirectly, develops standards and procedures for
goods, services or the image of a person selling security policies and recovery plans, upon notice
goods or providing services; of the organization in charge of alerts and responses to
attacks on information systems, created by
-electronic communications network: regulatory.
transmission allowing the routing of signals by
cable, over the air, by optical means or by All other skills are exercised according to the
other electromagnetic means; provisions of Law No. 05/2001 of June 27, 2001 on
regulation of the telecommunications sector,
-security: situation in which someone, something in particular with regard to the establishment of the
thing is not exposed to any danger. Mechanism intended for physical international gateway.
prevent a harmful event, or limit the
effects ; Article 9: Each ministerial department identifies the
critical infrastructures, falling within its sector.
-detection system: system for detecting
incidents that could lead to violations of the This identification is the subject of a classified decree
security policy and making it possible to diagnose top secret. This order is notified to the operator
potential intrusions; critical infrastructure in the same forms.

-information system: organized set of Article 10: The critical infrastructure operator is required
resources for collecting, grouping, classifying, to take all necessary steps to organize and
process and disseminate information; ensure the security of said infrastructure in the
conditions set by regulation.

Page 6

FEBRUARY 28, 2018 - N ° 386 Ter OFFICIAL JOURNAL OF THE GABONESE REPUBLIC 37

Chapter II: Protection of networks of They are also required to put in place
electronic communications technical mechanisms to deal with infringements
prejudicial to the permanent availability of
Article 11: Network operators systems, their integrity, their authentication, their
electronic communications and providers of non-repudiation by third-party users, at the
electronic communications services must data privacy and physical security.
take all technical and administrative measures
necessary to guarantee the security of the services offered The mechanisms provided for in paragraph 2 above,
and set up all the procedures and means are subject to approval and compliant visa by
techniques to fight against fraud the competent authority.
international telephone.
Information systems are the subject of
To do this, operators will have to take the protection against possible radiation and
interconnection measures to the platform put in place intrusions that may compromise the integrity of
by the determined physical international gateway and transmitted data and against any other external attack.
agreed by the relevant authority.
Article 14: Legal persons whose activity is
As such, they are notably required to inform to offer access to information systems are
users : in particular required to inform users:

-the danger incurred in the event of use of their networks; -the danger incurred in the use of the systems
-special risks of breach of security; insecure information;
-the existence of technical means allowing -the need to install control devices
to ensure the security of their communications. parental;
- specific risks of security breach;
The provisions of this article are - the existence of technical means allowing
supplemented by regulation. restrict access to certain services and offer them
at least one of these ways.
Article 12: Network operators and suppliers
of electronic communications services have Article 15: Information system operators
the obligation to: inform users of the ban on using
the electronic communications network to disseminate
- keep connection and traffic data for illegal content or any other act that may affect
a period of ten years; security of networks or information systems.
-Install mechanisms for monitoring traffic
data from their networks. These data can be The ban also covers the design
accessible during judicial investigations. deceptive, spyware, potentially unwanted software
or any other tool leading to behavior
The responsibility of network operators and fraudulent.
those of communications service providers
electronic data is committed if the use of the above Article 16: Information systems operators
cited, violates the individual freedoms of have the obligation to:
users.
-keep the connection and traffic data of their
Communications network operators information systems for a period of ten years;
electronic devices are required to have a -install monitoring and control mechanisms
operational management of their infrastructures on the access to the data of their information systems
National territory. for the purposes of forensic investigations.

Chapter III: Protection of systems The installations of the system operators


information information may be subject to search or
seizure by order of a judicial authority in the
Article 13: Information system operators conditions provided for by this ordinance.
take all technical measures and
administrative procedures to guarantee the security of services Article 17: Information system operators
offered. As such, they have standardized systems assess, review their security systems and
allowing them to identify, assess, process and manage in introduce, if necessary, the modifications
continuous system security risks appropriate in their practices, measures and techniques
information. security according to the evolution of technologies.

Page 7

38 OFFICIAL JOURNAL OF THE GABONESE REPUBLIC FEBRUARY 28, 2018 - N ° 386 Ter

Information systems operators and - set up filters to deal with infringements


their users can cooperate in the development and harmful to personal data and life
the implementation of practices, measures and techniques of user privacy;
security of their systems. -keep the contents as well as the stored data
in their facilities for a period of ten years;
Article 18: Communication networks - set up filters to deal with infringements
electronic and information systems are subject harmful to personal data and life
a mandatory and periodic security audit regime users' privacy.
of their security systems according to the terms set out
by regulation. Article 25: Use of communications networks
electronic systems and information systems for
Chapter IV: Protection of content store information or access information
stored in a person's terminal equipment
Article 19: Any operator is required to host a copy physical or moral, can only be done with its
of its data on national territory according to prior consent.
terms and conditions set by regulation.
Article 26: The sending of electronic messages to
Article 20: The operators and operators of the prospecting purposes by concealing the identity of the issuer
electronic communications and systems in whose name the communication is made, or without
information ensures the confidentiality of indicate a valid address to which the recipient can
communications routed through networks of send a request to stop these
electronic communications and systems information is prohibited.
information including traffic data.
The emission of spoofing electronic messages
Article 21: It is prohibited for any natural person or the identity of others is prohibited.
moral to listen, intercept, store the
communications and traffic data Article 27: Staff of network operators
related, or submit them to any other means electronic communications providers or
interception or surveillance, without consent electronic communications services are constrained
of the users concerned, except in the case of authorization professional secrecy regarding the requisitions received.
legal.
Chapter V: Cryptology
However, the technical storage prior to
the routing of any communication is authorized to Article 28: The use, supply, import and
operators and operators of communications networks the export of the means of cryptology ensuring
electronic, without prejudice to the principle of exclusively for authentication or
confidentiality. integrity checks are free, in particular:

Article 22: Recording of communications and -when the means or the service of cryptology
related traffic data, carried out as part of does not ensure confidentiality functions,
professional in order to provide digital proof especially when it can only have as an object
of an electronic communication, is authorized within to authenticate a communication or to ensure the integrity
conditions set by this ordinance. the message transmitted;
-when the supply, transfer from or to a country
Article 23: Service providers or suppliers member of ECCAS-CEMAC, import and
of electronic communications, are required to inform the export of cryptology means ensures
their subscribers of the existence of technical means exclusively for authentication or
allowing access to certain services to be restricted, integrity check;
select them or offer them at least one of these -when the means or service performs functions
means. confidentiality and only uses conventions
secret managed according to procedures and by the authority
Article 24: Content providers of internet networks competent in cryptology.
electronic communications and information systems
are required to: Article 29: The terms of use of the size of
some keys are fixed by regulation.
-ensure the availability of content, as well as that of
data stored in their facilities according to Article 30: The supply or import of a means
terms set by regulation; of cryptology not exclusively ensuring
authentication or integrity control functions is

Page 8

FEBRUARY 28, 2018 - N ° 386 Ter OFFICIAL JOURNAL OF THE GABONESE REPUBLIC 39

subject to a prior declaration to the authority Article 33: Searches and seizures are
competent in cryptology. carried out in accordance with the provisions of the texts in
force.
The provider or the person carrying out the
supply or import of a cryptology service Article 34: When it appears that the data entered or
keeps at the disposal of the competent authority obtained during the investigation or investigation made
cryptology a description of the characteristics the object of transformation operations preventing
techniques of this means of cryptology, as well as the code unencrypted access or are likely to compromise the
source of software used. information contained therein, the Public Prosecutor
Republic, the Examining Magistrate or the jurisdiction of
Cryptology service providers are judgment can requisition any person
subject to professional secrecy. qualified physical or legal person, in order to carry out
technical operations to obtain the version in
A regulatory text specifies the modalities clear of said data.
application of this article.
When a means of cryptography has been used,
Title III: Cybercrime the judicial authorities can demand the agreement
cryptogram decryption secret.
Chapter I st : In the procedure
Article 35: The requisition provided for in article 33 above
Article 31: In the event of a cybernetic offense, the can be made to any expert. In this case, its execution
Judicial Police officers with general competence and is made in accordance with the provisions of the Code of
agents authorized by the competent authority, proceed Criminal procedure relating to the expert commission.
investigations in accordance with the provisions of the texts
in force. Article 36: The judicial authorities may give
letters rogatory both national and international, to
Before taking up their duties, officers any legal or natural person to search for
authorized by the competent authority take an oath, constituent elements of cybercrime offenses,
before the competent Court of First Instance. of which at least one of the constituent elements has been
committed on the national territory or of which one of the authors
They can, during investigations, access the or accomplices is in said territory.
means of transport, to any premises for professional use, to
exclusion from private homes, with a view to finding, Subject to the rules of reciprocity between the
to note the infringements, to request the Gabon and foreign countries bound by an agreement of
communication of all professional documents and judicial cooperation, letters rogatory are
take a copy, collect, on convocation or on executed in accordance with the provisions of the texts in
place, information and supporting documents. force.

Article 32: Searches relating to Article 37: Natural or legal persons who
cybercrime are likely to involve provide cryptography services aimed at
objects, documents and data that may be ensure a confidentiality function, are required to
physical media or copies made in the presence hand over to Judicial Police Officers or agents
people who are present at the search. empowered, at their request, agreements allowing
decryption of the transformed data by means of
When a copy of the data entered has been made, services they provided.
it can be destroyed on the instruction of the Public Prosecutor
the Republic for security reasons. Judicial Police Officers and Agents
authorized suppliers can request
By agreement of the Public Prosecutor, only services referred to in paragraph 1 st above to them-
will be kept under seal by the Police Officer even implement these conventions.
Judicial, objects, documents and data used for
manifestation of truth. Article 38: When the necessities of the investigation or
the instruction justifies it, the hearing or the questioning
The people present during the search of a person or the confrontation between several
may be requisitioned in order to provide people, can be carried out at several points of the
information on objects, documents and data national territory being connected by means of
seized. communications electronic guaranteeing the
confidentiality of transmission.

Page 9

40 OFFICIAL JOURNAL OF THE GABONESE REPUBLIC FEBRUARY 28, 2018 - N ° 386 Ter

In each place, a Minutes of Article 45: Anyone who intentionally uses


operations carried out is drawn up, these can make data obtained under the conditions set out by
audiovisual or sound recording object. the provisions of the above articles will be punished with
imprisonment for five to ten years and a fine of
When the circumstances require it, fifty to one hundred million CFA francs or one of
interpretation can be done during a hearing, these two penalties only.
questioning or confrontation by
means of electronic communications. Article 46: Anyone who imports, holds, offers, sells,
sells or makes available, in any form whatsoever
The methods of application of this article either a computer program, a password, a
are defined by regulation. access code or any similar computer data
designed or specially adapted, to allow
Chapter II: Offenses and penalties to access an electronic communications network
or an information system will be punished with
Article 39: Anyone who fraudulently accesses everything imprisonment for five to ten years and a fine of
or part of a computer system, including by any fifty to one hundred million CFA francs or one of
means promoting or organizing telephone fraud these two penalties only.
international, will be punished by imprisonment of two to
ten years and a fine of twenty to one hundred million The penalties provided for in
CFA francs or one of these two penalties only. paragraph 1 st above, anyone who intentionally
causes serious disturbance, in particular by fraud,
Fraudulent access referred to in paragraph 1 st above or an interruption of a communications network
also includes exceeding an authorized access. electronic or an information system.

Article 40: Anyone who fraudulently maintains himself Article 47: Whoever introduces, alters, removes
in all or part of a computer system will be punished fraudulently of data computer science
imprisonment for two to five years and one authentic, will be punished with imprisonment of two to
fine of twenty to fifty million CFA francs or five years and a fine of twenty to fifty million
only one of these two penalties. CFA francs or one of these two penalties only.

Article 41: Anyone who hinders, by any means Article 48: Any provider of cryptology services
whether, the operation of a computer system who does not meet the obligation to communicate the
will be punished with imprisonment for two to five years and description of the technical characteristics of the
a fine of twenty to fifty million francs cryptology under the conditions provided for by this
DWI or one of these two penalties only. order, is punishable by imprisonment for three months
to two years and a fine of five hundred thousand to two
Article 42: Anyone who fraudulently introduces million CFA francs or one of these two penalties
computer data in a computer system only.
will be punished by imprisonment for five to ten years and one
a fine of fifty to one hundred million CFA francs or Article 49: Anyone who supplies or imports a means of
only one of these two penalties. cryptology not exclusively providing functions
authentication or integrity check without
Article 43: Anyone who fraudulently intercepts by fulfill the obligation of prior declaration, is
technical means of computer data during punishable by imprisonment of six months to five years and
of their non-public transmission to the destination, a fine of one to five million CFA francs or
origin or within a computer system, including one of these two penalties only, without prejudice to
including electromagnetic emissions from tax provisions in force.
of a computer system carrying such data
computer, will be punished with imprisonment of five to Article 50: Anyone who exports a means of cryptology
ten years and a fine of fifty to one hundred million not ensuring not exclusively of functions
CFA francs or one of these two penalties only. authentication or integrity check without having
obtained prior authorization, is punished by a
Article 44: Anyone who damages, deletes, extracts imprisonment from six months to five years and a fine
fraudulently computer data will be punished from one to five million CFA francs or one of these
imprisonment for five to ten years and a fine two sentences only, without prejudice to the provisions
from fifty to one hundred million CFA francs or one tax in force.
of these two penalties only.

Page 10

FEBRUARY 28, 2018 - N ° 386 Ter OFFICIAL JOURNAL OF THE GABONESE REPUBLIC 41

Article 51: Whoever provides services of million CFA francs or one of these two penalties
cryptology without having previously obtained approval only.
of the National Cryptology Commission provided for
article 30 of this ordinance is punishable by Article 60: Anyone who offers or makes available by
imprisonment from one to five years and a fine of one electronically any illicit product or substance will be
million to twenty million CFA francs or one of these punishable by imprisonment for two to five years and one
two sentences only. a fine of five to ten million CFA francs or one
of these two penalties only.
Article 52: Anyone who makes available to others
means of cryptology which has been the subject of a ban Article 61: Anyone who creates, downloads, distributes or updates
of use and putting into circulation, is punished by a provision in any form, by way of
imprisonment from one to five years and a fine of one electronic racist or xenophobic content, will be
million to twenty million CFA francs or one of these punishable by imprisonment from three months to ten years and
two sentences only. a fine of one to ten million CFA francs or
one of these two penalties only.
Article 53: Anyone who hinders the exercise of Article 62: Anyone who utters a threat or
control mission of the National Commission of insult by electronic means, towards a person in
Cryptology is punished with imprisonment from one to three reason for belonging to a group, a race, a
months and a fine of one hundred to five hundred thousand francs color, ancestry, religion or origin,
DWI or one of these two penalties only. will be punished by imprisonment from three months to ten years and
a fine of ten to thirty million CFA francs or
Article 54: Anyone who sets up a secret access to only one of these two penalties.
data or an information system without
the authorization of the legitimate user, is punishable by Article 63: Anyone who broadcasts or makes available through
imprisonment for two to five years and a fine of electronically data that denies, minimizes
two to thirty million CFA francs or one of these rudely, approve or justify acts
two sentences only. constituting genocide or crimes against humanity
as defined by international law, will be punished with
Article 55: Anyone who produces, registers, updates imprisonment for five to ten years and a fine of
disposes, transmits, imports or exports ten to thirty million CFA francs or one of these
child pornography through a system two sentences only.
computer will be punished with imprisonment from five to
ten years and a fine of fifty to one hundred million Article 64: Shall be punished by imprisonment of three to
CFA francs or one of these two penalties only. five years and a fine of five to ten million francs
CFA or one of these two penalties only,
Article 56: Anyone who obtains pornography anyone who will voluntarily:
childish through a computer system, will be
punishable by imprisonment for two to five years and one -used a protected computer system to relay or
fine of five to twenty million CFA francs or forward multiple emails in
one of these two penalties only. intention to deceive or mislead, as to
the origin of these messages the recipients or any
Article 57: Anyone in possession of pornography e-mail or email service provider
childish in a computer system, will be punished with internet services;
imprisonment for two to five years and a fine of - materially falsified the information in
five to twenty million CFA francs or one of these multiple email message headers and
two sentences only. triggers their transmission;
- triggered the transmission of emails
Article 58: Anyone who facilitates access or disseminates multiple from or through a system
minor images, documents, sound or computer science.
pornographic representation, will be punished by a
imprisonment for five to ten years and a fine of Article 65: Anyone who usurps the digital identity of a
five to ten million CFA francs or one of these third party or one or more data allowing to
two sentences only. to identify him, with the intention of harming others, will be punished
imprisonment for one to five years and a fine
Article 59: Anyone who proposes, by electronic means, from five to ten million CFA francs or one of these
a meeting with a minor child, in order to two sentences only.
commit one of the offenses against him
by articles 55 to 58 above, will be punished with
imprisonment for two years and a fine of twenty

Page 11

42 OFFICIAL JOURNAL OF THE GABONESE REPUBLIC FEBRUARY 28, 2018 - N ° 386 Ter

Article 66: Any damage to property, persons, Article 74: The request for mutual assistance must be
rights of others committed electronically is punished in particular specify:
penalties provided for by the Penal Code.
-the requesting competent authority;
Article 67: Fraud, breach of trust, concealment, -the offense being investigated or prosecuted,
blackmail, extortion and theft committed by as well as a statement of the facts;
electronically are punished by the penalties provided for by the -the information system or computer data
Penal Code. subject to the request for search, seizure or
conservation and their relation to the offense;
Article 68: Any attempt made by -all the information available to identify the
a commencement of execution, if it has not been target person;
suspended or if it failed in effect only by -the need for search, seizure or
circumstances beyond the control of its author conservation of the information or data system
is considered the offense itself. concerned.

Article 69: The accomplice of one of the foreseen offenses Article 75: Mutual assistance requests from
by this ordinance will be punished as the author. Gabonese judicial authorities and intended for the authorities
foreign courts are transmitted through
Article 70: For any recurrence of the offenses provided for of the Ministry in charge of Foreign Affairs.
by this ordinance, the penalties are increased to
double. The execution documents are returned to
authorities of the requesting State through the same channel.
Article 71: Breaches of the provisions of
present ordinance, when they are committed in Article 76: Mutual assistance requests from
organized gang are punished with criminal imprisonment foreign judicial authorities are transmitted to
time. Ministry of Justice which seized the Attorney General
competent.
Article 72: The perpetrators of breaches of the provisions of
this ordinance are punishable by Article 77: The irregularity of the transmission of
additional following: request for mutual assistance cannot constitute a cause of
nullity of acts performed in execution of this
-the dissolution, when the legal person is request.
diverted from its purpose to commit the facts
incriminated; Article 78: When the execution of a request
-the provisional or definitive prohibition to exercise; assistance from a foreign judicial authority is
-the temporary or definitive closure of one or more likely to prejudice public order or the interests
several of the company's establishments; of the Nation, the Minister in charge of
- provisional or definitive exclusion from tendering; Justice notifies the requesting authority of what it cannot
-the provisional or definitive prohibition to appeal be followed up on his request.
public savings;
-the ban for a period of five years at most Article 79: Other modalities relating to the procedure
issue checks to third parties; mutual legal assistance are fixed by the texts
-the confiscation of the thing that was used or was intended for individuals.
commit the offense or the thing that is the offense
product; Title V: Miscellaneous and final provisions
-the display or dissemination of the decision pronounced to the
costs of the perpetrator. Article 80: The competent national authority
fight against cybercrime must adhere to the
Title IV: International judicial cooperation regional and international organizations in this area.

Article 73: The competent authority may, subject to Article 81: No stay may be granted for
reciprocity, provide upon request from an authority offenses provided for by this ordinance.
foreign jurisdiction, mutual legal assistance with a view to
research and identification of criminal offenses Article 82: Regulatory texts determine, in
provided for by this ordinance. as necessary, provisions of any kind
necessary for the application of this ordinance.
Mutual legal assistance concerns measures of
search, seizure or retention of the system
information or data.

Page 12

FEBRUARY 28, 2018 - N ° 386 Ter OFFICIAL JOURNAL OF THE GABONESE REPUBLIC 43

Article 83: This ordinance will be registered, The Minister of Justice, Keeper of the Seals, in charge of
issued under the emergency procedure and executed as Human rights
state law. Edgard Anicet MBOUMBOU MIYAKOU

Done in Libreville, February 23, 2018 The Minister of Presidential Affairs and Defense
National
By the President of the Republic, Etienne MASSARD KABINDA MAKAGA
Head of state
Ali BONGO ONDIMBA The Minister of the Interior and Security, in charge of
Decentralization and Local Development
The Prime Minister, Head of Government Lambert Noël MATHA
Emmanuel ISSOZE NGONDET
The Minister of State, Minister of Communication,
Digital Economy, Culture, Arts and
Traditions, in charge of Popular Education and
Civic Instruction, Spokesperson for the Government _____________________________________________
Alain Claude BILLE-BY NZE _____________________________________________

Page 14
13

You might also like