12. Theft of incorporeal property
PART II: MALICIOUS COMMUNICATIONS
13. Definitions14. Data message which incites damage to property or violence15. Data message which threatens persons with damage to property or violence16. Distribution of data message of intimate image
PART III: ATTEMPTING, CONSPIRING, AIDING, ABETTING, INDUCING, INCITING, INSTIGATING, INSTRUCTING, COMMANDING OR PROCURINGTO COMMIT OFFENCE
17. Attempting, conspiring, aiding, abetting, inducing, inciting, instigating,instructing, commanding or procuring to commit offence
PART IV: COMPETENT VERDICTS
18. Competent verdicts
PART V: SENTENCING
19. Sentencing
PART VI: ORDERS TO PROTECT COMPLAINANTS FROM THE HARMFUL EFFECT OF MALICIOUS COMMUNICATIONS
20. Order to protect complainant pending finalisation of criminal proceedings21. Electronic communications service provider or person in control of computersystem to furnish particulars to court22. Orders on finalisation of criminal proceedings23. Penalties
CHAPTER 3JURISDICTION
24. Jurisdiction
CHAPTER 4POWERS TO INVESTIGATE, SEARCH, ACCESS OR SEIZE
25. Definitions26. Standard Operating Procedures27. Application of provisions in this Chapter28. Search for, access to, or seizure of certain articles29. Article to be searched for, accessed or seized under search warrant30. Oral application for search warrant or amendment of warrant31. Search for, access to, or seizure of article without search warrant with consentof person who has lawful authority to consent32. Search for, access to, or seizure of article involved in the commission of anoffence without search warrant33. Search for, access to and seizure of article on arrest of person34. Assisting police official or investigator35. Obstructing or hindering police official or investigator and authority toovercome resistance36. Powers conferred upon police official or investigator to be conducted in decentand orderly manner with due regard to rights of other persons37. Wrongful search, access or seizure and restriction on use of instrument, device,password or decryption key or information to gain access38. False information under oath or by way of affirmation39. Prohibition on disclosure of information351015202530354045