सुजाण विद्यार्थी (Prudent Students) ‘ सुजाण ‘ A joint initiative for legal awareness, by Pune DLSA, Pune (District Legal Services Authority) & Prithu Skills
This document provides an introduction to computer literacy and the basic components and functions of a computer system. It discusses what a computer is, the typical components of a computer including input, output, processing, storage and communications devices. It also describes computer software, different categories of computers, examples of computer usage, and applications of computers in society. The document is made up of a series of pages from a textbook that provide definitions and explanations of key computer literacy terms in a hierarchical, lesson format.
The document provides an overview of cyber law in India. It discusses:
1) Cyber law is a vast study that includes many acts like the IT Act, Evidence Act, IPC, and CrPC. Understanding cyber issues like http and https is challenging for lawyers.
2) The IT Act aims to provide legal recognition for electronic transactions and commerce. It has administrative, civil, and criminal provisions to regulate cyber issues.
3) Other laws like the IPC, Evidence Act, and CrPC also apply to cyber crimes in areas like hacking, identity theft, and online fraud. The Evidence Act has provisions for digital evidence admissibility.
4) Investigating cyber crimes is difficult due to the
This document discusses various sections of the Information Technology Act 2000 of India related to cyber crimes. It begins with providing context on the objectives and structure of the IT Act. It then defines cyber crimes and provides a brief overview of the IT Act of 2000. Next, it discusses some notable features and sections of the Act including Section 43 on penalties for unauthorized access, Section 65 on tampering with computer source documents, Section 66 on computer related offenses, and provides relevant case studies for each. The document is an assignment submitted to a professor providing an overview of key aspects of India's cyber law and the IT Act of 2000.
This document provides an overview of chapter 1 from the textbook Discovering Computers 2011. It introduces key topics such as defining computer literacy, the components and functions of computers, types of computer users, and applications of computers in society. The chapter objectives are to understand the importance of computer literacy, identify computer components and types of users, discuss uses of the internet and applications of computers.
The document discusses several topics related to ICT projects including software piracy, copyright, cyber law, and the Indian Software Act. It defines software piracy as the unauthorized copying of software and discusses how most software companies now use registration and licensing to discourage piracy. It also outlines the main types of software copyright protection in India and how the Indian Copyright Act was amended to recognize computer software. Finally, it discusses cyber laws in India, defines different types of cyber crimes, and categorizes crimes as those targeting computers or using computers as weapons to enable real-world crimes.
This document provides an overview of the Information Technology Act including:
1. An introduction to the reasons for enactment of the IT Act including facilitating e-commerce and providing legal protections for electronic transactions.
2. Explanations of important terms referenced in the IT Act such as digital signature, electronic signature, e-governance, and certifying authority.
3. Sections on cyber crimes, important sections of the IT Act, the role of IT in banking, cyber crime statistics in India, and a comparison of the IT Acts of India and Brazil.
The document summarizes key sections of the Information Technology Act, 2000 related to cyber security in India. It discusses sections establishing protected computer systems, designating agencies responsible for critical infrastructure protection and incident response, penalties for various cyber crimes, and intermediary liability exemptions. The sections establish national agencies to coordinate cyber security, empower agencies to investigate offenses, and outline penalties including imprisonment and fines for offenses like unauthorized access, privacy breaches, and publishing false digital signatures.
सुजाण विद्यार्थी (Prudent Students) ‘ सुजाण ‘ A joint initiative for legal awareness, by Pune DLSA, Pune (District Legal Services Authority) & Prithu Skills
This document provides an introduction to computer literacy and the basic components and functions of a computer system. It discusses what a computer is, the typical components of a computer including input, output, processing, storage and communications devices. It also describes computer software, different categories of computers, examples of computer usage, and applications of computers in society. The document is made up of a series of pages from a textbook that provide definitions and explanations of key computer literacy terms in a hierarchical, lesson format.
The document provides an overview of cyber law in India. It discusses:
1) Cyber law is a vast study that includes many acts like the IT Act, Evidence Act, IPC, and CrPC. Understanding cyber issues like http and https is challenging for lawyers.
2) The IT Act aims to provide legal recognition for electronic transactions and commerce. It has administrative, civil, and criminal provisions to regulate cyber issues.
3) Other laws like the IPC, Evidence Act, and CrPC also apply to cyber crimes in areas like hacking, identity theft, and online fraud. The Evidence Act has provisions for digital evidence admissibility.
4) Investigating cyber crimes is difficult due to the
This document discusses various sections of the Information Technology Act 2000 of India related to cyber crimes. It begins with providing context on the objectives and structure of the IT Act. It then defines cyber crimes and provides a brief overview of the IT Act of 2000. Next, it discusses some notable features and sections of the Act including Section 43 on penalties for unauthorized access, Section 65 on tampering with computer source documents, Section 66 on computer related offenses, and provides relevant case studies for each. The document is an assignment submitted to a professor providing an overview of key aspects of India's cyber law and the IT Act of 2000.
This document provides an overview of chapter 1 from the textbook Discovering Computers 2011. It introduces key topics such as defining computer literacy, the components and functions of computers, types of computer users, and applications of computers in society. The chapter objectives are to understand the importance of computer literacy, identify computer components and types of users, discuss uses of the internet and applications of computers.
The document discusses several topics related to ICT projects including software piracy, copyright, cyber law, and the Indian Software Act. It defines software piracy as the unauthorized copying of software and discusses how most software companies now use registration and licensing to discourage piracy. It also outlines the main types of software copyright protection in India and how the Indian Copyright Act was amended to recognize computer software. Finally, it discusses cyber laws in India, defines different types of cyber crimes, and categorizes crimes as those targeting computers or using computers as weapons to enable real-world crimes.
This document provides an overview of the Information Technology Act including:
1. An introduction to the reasons for enactment of the IT Act including facilitating e-commerce and providing legal protections for electronic transactions.
2. Explanations of important terms referenced in the IT Act such as digital signature, electronic signature, e-governance, and certifying authority.
3. Sections on cyber crimes, important sections of the IT Act, the role of IT in banking, cyber crime statistics in India, and a comparison of the IT Acts of India and Brazil.
The document summarizes key sections of the Information Technology Act, 2000 related to cyber security in India. It discusses sections establishing protected computer systems, designating agencies responsible for critical infrastructure protection and incident response, penalties for various cyber crimes, and intermediary liability exemptions. The sections establish national agencies to coordinate cyber security, empower agencies to investigate offenses, and outline penalties including imprisonment and fines for offenses like unauthorized access, privacy breaches, and publishing false digital signatures.
The document discusses the computerization of District Courts of Delhi. It outlines the challenges faced in implementing ICT systems, as well as the strategies and solutions adopted. Key points include:
1) Over 471,000 cases were pending computerization across civil and criminal matters. All case details were entered manually by court staff without external help.
2) Linux-based systems were implemented as they are cost-effective and allow for free/low-cost upgrades. Hardware including PCs, servers, and UPS systems were installed across three court complexes.
3) Customized software was developed with input from judges and staff to automate processes like cause lists, monthly statements, and case reports. This streamlined
This presentation provides an overview of e-governance efforts in India. It defines e-governance as using information and communication technologies to deliver government services, exchange information, and integrate systems between government, citizens, and businesses. The presentation notes that e-governance aims to provide convenient, efficient, and transparent access to government services. It also discusses key provisions of the Information Technology Act, 2000 regarding legal recognition of electronic records and digital signatures, use of electronic records and digital signatures by the government, retention of electronic records, and rules for digital signatures.
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...manumelwin
In discharge of its international responsibility, the Government of India enacted a Law in 2000 known as Information Technology Act 2000. The Act extends to the whole of India and it applies also to any offence or contravention thereon committed outside India by any person.
The IT Act was enacted in 2000, making India the 12th country to adopt cyber laws. The objectives of the Act were to provide legal recognition to electronic transactions and records, facilitate e-filing with government agencies and e-payments, and amend related laws. The Act defines key terms like "secure system" and "security procedure". It also legally recognizes digital signatures and regulations electronic records and publications. The Act contains provisions to tackle cybercrimes like hacking, publishing obscene content, unauthorized access, and breach of privacy and confidentiality. Various cybercrimes are punishable under the IT Act and other laws like the IPC.
1) Delhi District Courts have rapidly adopted technology over the past decade, transitioning from one typewriter per court to courts now equipped with multiple computers, screens, printers, and other digital tools.
2) The computerization of Delhi District Courts began in 2003 and has expanded significantly since, with over 1,500 computers and 600 printers now installed across courts.
3) The courts have implemented and plan to further implement various digital initiatives like digitizing records, introducing digital signatures, upgrading websites, installing CCTV, implementing biometric attendance tracking, and moving towards e-filing and paperless courts.
This document summarizes key aspects of India's Information Technology Act, including:
1) It defines digital signatures and electronic signatures, and outlines requirements for their use in authentication.
2) It establishes rules for electronic governance, electronic records, controllers who regulate certifying authorities, and adjudication of related offenses and compensation.
3) The case study discusses how information was retrieved from laptops of terrorists involved in a Parliament attack case, which revealed their motives and allowed for punishment under the law.
The document discusses the objectives and key provisions of the Information Technology Act, 2000 in India. The key points are:
1) The Act aims to provide legal recognition for electronic commerce and electronic records on par with paper documents. It also aims to facilitate e-governance and electronic filing of documents.
2) The Act defines important terms related to digital infrastructure and transactions. It also establishes authorities like the Controller of Certifying Authorities to regulate digital signature certificates.
3) The Act addresses issues like legal recognition of electronic documents and digital signatures to support e-commerce. It also establishes mechanisms for offenses and justice systems related to cybercrimes.
Cyber law governs all legal aspects of the internet and cybersecurity. As internet usage has increased globally for activities like business, banking, and social interaction, it has also been misused for criminal activities, necessitating cyber laws. If someone becomes a victim of a cybercrime, they should preserve electronic evidence and report the breach to authorities. However, victims still have a legal duty to exercise due diligence. Challenges include criminals operating across international borders where different laws apply. While no international cyber laws exist, some countries have bilateral agreements, and national laws vary in their scope and coverage of issues like privacy and infrastructure protection. Companies should inform customers of breaches and advise them on appropriate steps.
This document discusses the history and types of cyber crimes. It provides an overview of the categories of cyber crimes like crimes against persons, property, and government. It describes the types of cyber criminals and discusses cyber crime statistics in India. It highlights the need for cyber laws in India to tackle increasing cyber crimes and protect internet users. The Information Technology Act, 2000 is mentioned as the primary law governing cyber crimes in India.
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]Kamal Thakur
This document outlines penalties under Indian law for various cybercrimes and offenses related to unauthorized access and damage to computers and networks. It discusses 5 major points: 1) Penalties for damaging computers or introducing viruses without permission, up to 1 crore rupees. 2) Penalties for failing to provide information to authorities, up to 1.5 lakh rupees. 3) A general residual penalty up to 25,000 rupees for violating rules. 4) The process for adjudicating violations and imposing penalties or compensation. 5) Factors adjudicating officers must consider like any unfair gains or losses caused.
The document outlines major types of cyber crimes such as data diddling, Trojan horse attacks, and computer viruses. It then discusses methods to minimize cyber crimes like using strong passwords and security software. The document mainly focuses on India's Information Technology Act of 2000 which aims to provide legal recognition for electronic transactions. The key aspects of the Act include digital signatures, duties of certifying authorities, penalties for cyber crimes, and establishment of organizations to regulate the cyber space.
The document outlines major types of cyber crimes such as data diddling, Trojan horse attacks, and computer viruses. It then discusses methods to minimize cyber crimes like using strong passwords and scanning for viruses. The document primarily focuses on India's Information Technology Act of 2000 which aims to provide legal recognition for electronic transactions. The key aspects of the Act include provisions around digital signatures, certifying authorities, digital signature certificates, and penalties for cyber crimes. Adjudicating officers and the Cyber Appellate Tribunal are established to investigate offenses and hear appeals.
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...Yar Chaikovsky
This document summarizes a report from the ABA Section of Intellectual Property Law's Committee 711 on Online Security & E-Privacy. The committee did not propose any resolutions in its second year. It is planning a CLE seminar on data breach notification for an upcoming ABA conference. The document then summarizes a subcommittee report on spyware that discusses defining spyware and existing federal spyware laws, including the Wiretap Act and Computer Fraud and Abuse Act. It notes there was no consensus to propose a resolution on spyware legislation.
Cybercrime Investigations and IT Act,2000Karnika Seth
This document provides an overview of the legal framework for cybercrime investigations in India. It discusses the Information Technology Act 2000 and 2008 amendments, which provide the main legal statutes governing cybercrimes. The amendments aimed to address new cybercrimes, strengthen evidence collection and increase accountability of intermediaries. Key aspects covered include cybercrime definitions, investigating agency powers, adjudicating authorities, and responsibilities of network service providers.
Information Technology act 2000 & Threats to India using GoogleHemraj Singh Chouhan
This presentation is delivered at Income tax department on Information & Technology Act 2000 in India + Online threats to India by various terrorist organisations + Bitcoins + Ransom-ware + How dangerous it could be if we use smart phone and provide our data to Google.
What does IT Act 2000 legislation deals with? The Act essentially deals with the following issues: Legal Recognition of Electronic Documents, Legal Recognition of Digital Signatures, Offenses and Contraventions, Justice Dispensation Systems for cyber crimes.
This document provides a summary of key definitions from Section 2 of the Information Technology Act, 2000 of India. It defines important terms related to digital technology, electronic records, cryptography, and cybersecurity. Some of the terms defined include digital signature, electronic form, electronic record, computer, digital signature certificate, cyber cafe, intermediary, secure system, subscriber, and certifying authority. The definitions section provides clarity on the technical meaning of these terms as used in the Information Technology Act.
The Information Technology Act, 2000 provides the legal framework for electronic governance in India. Some key points covered in the act include:
- Legal recognition of electronic records and digital signatures.
- Regulation of certifying authorities that issue digital signature certificates.
- Establishment of the Cyber Appellate Tribunal to hear appeals related to the act.
- Offences and penalties related to cyber crimes like hacking and publishing obscene content.
- Procedures for adjudicating violations and determining appropriate penalties.
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
This document provides an overview of cyber crimes and the Information Technology Act 2000 in India. It discusses the types of cyber crimes such as hacking, phishing, spamming, and cyber terrorism. It then outlines the objectives of the IT Act which aims to provide legal recognition for e-commerce transactions and facilitate electronic governance. The document explains the extent of application of the Act and key definitions. Finally, it summarizes the various cybercrime provisions under the IT Act 2000, listing the relevant sections of the Act that penalize offenses such as tampering with computer systems, publishing offensive content, and failure to assist in decrypting data upon request from authorities.
This document is the Cybercrime Prevention Act of 2012 from the Philippines. It defines cybercrime and establishes punishments for illegal computer access, data interference, system interference, misuse of devices, cyber-squatting, computer-related forgery, fraud and identity theft, cybersex, child pornography, unsolicited commercial communications, and libel committed through computer systems. It assigns the National Bureau of Investigation and Philippine National Police to enforce cybercrime laws and authorizes them to collect traffic data in real-time related to communications with a warrant. Corporations can also face liability and fines if cybercrimes are committed on their behalf.
Indian law and cyber crime who as dont know the punishment of crime, this ppt helps you what are the penalty is there and what are the information technology does give the information about crime and what are the punishment their in the indian constitution. indian constitution is the bigg support for who are sufforing from injusties.
The document discusses the computerization of District Courts of Delhi. It outlines the challenges faced in implementing ICT systems, as well as the strategies and solutions adopted. Key points include:
1) Over 471,000 cases were pending computerization across civil and criminal matters. All case details were entered manually by court staff without external help.
2) Linux-based systems were implemented as they are cost-effective and allow for free/low-cost upgrades. Hardware including PCs, servers, and UPS systems were installed across three court complexes.
3) Customized software was developed with input from judges and staff to automate processes like cause lists, monthly statements, and case reports. This streamlined
This presentation provides an overview of e-governance efforts in India. It defines e-governance as using information and communication technologies to deliver government services, exchange information, and integrate systems between government, citizens, and businesses. The presentation notes that e-governance aims to provide convenient, efficient, and transparent access to government services. It also discusses key provisions of the Information Technology Act, 2000 regarding legal recognition of electronic records and digital signatures, use of electronic records and digital signatures by the government, retention of electronic records, and rules for digital signatures.
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...manumelwin
In discharge of its international responsibility, the Government of India enacted a Law in 2000 known as Information Technology Act 2000. The Act extends to the whole of India and it applies also to any offence or contravention thereon committed outside India by any person.
The IT Act was enacted in 2000, making India the 12th country to adopt cyber laws. The objectives of the Act were to provide legal recognition to electronic transactions and records, facilitate e-filing with government agencies and e-payments, and amend related laws. The Act defines key terms like "secure system" and "security procedure". It also legally recognizes digital signatures and regulations electronic records and publications. The Act contains provisions to tackle cybercrimes like hacking, publishing obscene content, unauthorized access, and breach of privacy and confidentiality. Various cybercrimes are punishable under the IT Act and other laws like the IPC.
1) Delhi District Courts have rapidly adopted technology over the past decade, transitioning from one typewriter per court to courts now equipped with multiple computers, screens, printers, and other digital tools.
2) The computerization of Delhi District Courts began in 2003 and has expanded significantly since, with over 1,500 computers and 600 printers now installed across courts.
3) The courts have implemented and plan to further implement various digital initiatives like digitizing records, introducing digital signatures, upgrading websites, installing CCTV, implementing biometric attendance tracking, and moving towards e-filing and paperless courts.
This document summarizes key aspects of India's Information Technology Act, including:
1) It defines digital signatures and electronic signatures, and outlines requirements for their use in authentication.
2) It establishes rules for electronic governance, electronic records, controllers who regulate certifying authorities, and adjudication of related offenses and compensation.
3) The case study discusses how information was retrieved from laptops of terrorists involved in a Parliament attack case, which revealed their motives and allowed for punishment under the law.
The document discusses the objectives and key provisions of the Information Technology Act, 2000 in India. The key points are:
1) The Act aims to provide legal recognition for electronic commerce and electronic records on par with paper documents. It also aims to facilitate e-governance and electronic filing of documents.
2) The Act defines important terms related to digital infrastructure and transactions. It also establishes authorities like the Controller of Certifying Authorities to regulate digital signature certificates.
3) The Act addresses issues like legal recognition of electronic documents and digital signatures to support e-commerce. It also establishes mechanisms for offenses and justice systems related to cybercrimes.
Cyber law governs all legal aspects of the internet and cybersecurity. As internet usage has increased globally for activities like business, banking, and social interaction, it has also been misused for criminal activities, necessitating cyber laws. If someone becomes a victim of a cybercrime, they should preserve electronic evidence and report the breach to authorities. However, victims still have a legal duty to exercise due diligence. Challenges include criminals operating across international borders where different laws apply. While no international cyber laws exist, some countries have bilateral agreements, and national laws vary in their scope and coverage of issues like privacy and infrastructure protection. Companies should inform customers of breaches and advise them on appropriate steps.
This document discusses the history and types of cyber crimes. It provides an overview of the categories of cyber crimes like crimes against persons, property, and government. It describes the types of cyber criminals and discusses cyber crime statistics in India. It highlights the need for cyber laws in India to tackle increasing cyber crimes and protect internet users. The Information Technology Act, 2000 is mentioned as the primary law governing cyber crimes in India.
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]Kamal Thakur
This document outlines penalties under Indian law for various cybercrimes and offenses related to unauthorized access and damage to computers and networks. It discusses 5 major points: 1) Penalties for damaging computers or introducing viruses without permission, up to 1 crore rupees. 2) Penalties for failing to provide information to authorities, up to 1.5 lakh rupees. 3) A general residual penalty up to 25,000 rupees for violating rules. 4) The process for adjudicating violations and imposing penalties or compensation. 5) Factors adjudicating officers must consider like any unfair gains or losses caused.
The document outlines major types of cyber crimes such as data diddling, Trojan horse attacks, and computer viruses. It then discusses methods to minimize cyber crimes like using strong passwords and security software. The document mainly focuses on India's Information Technology Act of 2000 which aims to provide legal recognition for electronic transactions. The key aspects of the Act include digital signatures, duties of certifying authorities, penalties for cyber crimes, and establishment of organizations to regulate the cyber space.
The document outlines major types of cyber crimes such as data diddling, Trojan horse attacks, and computer viruses. It then discusses methods to minimize cyber crimes like using strong passwords and scanning for viruses. The document primarily focuses on India's Information Technology Act of 2000 which aims to provide legal recognition for electronic transactions. The key aspects of the Act include provisions around digital signatures, certifying authorities, digital signature certificates, and penalties for cyber crimes. Adjudicating officers and the Cyber Appellate Tribunal are established to investigate offenses and hear appeals.
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...Yar Chaikovsky
This document summarizes a report from the ABA Section of Intellectual Property Law's Committee 711 on Online Security & E-Privacy. The committee did not propose any resolutions in its second year. It is planning a CLE seminar on data breach notification for an upcoming ABA conference. The document then summarizes a subcommittee report on spyware that discusses defining spyware and existing federal spyware laws, including the Wiretap Act and Computer Fraud and Abuse Act. It notes there was no consensus to propose a resolution on spyware legislation.
Cybercrime Investigations and IT Act,2000Karnika Seth
This document provides an overview of the legal framework for cybercrime investigations in India. It discusses the Information Technology Act 2000 and 2008 amendments, which provide the main legal statutes governing cybercrimes. The amendments aimed to address new cybercrimes, strengthen evidence collection and increase accountability of intermediaries. Key aspects covered include cybercrime definitions, investigating agency powers, adjudicating authorities, and responsibilities of network service providers.
Information Technology act 2000 & Threats to India using GoogleHemraj Singh Chouhan
This presentation is delivered at Income tax department on Information & Technology Act 2000 in India + Online threats to India by various terrorist organisations + Bitcoins + Ransom-ware + How dangerous it could be if we use smart phone and provide our data to Google.
What does IT Act 2000 legislation deals with? The Act essentially deals with the following issues: Legal Recognition of Electronic Documents, Legal Recognition of Digital Signatures, Offenses and Contraventions, Justice Dispensation Systems for cyber crimes.
This document provides a summary of key definitions from Section 2 of the Information Technology Act, 2000 of India. It defines important terms related to digital technology, electronic records, cryptography, and cybersecurity. Some of the terms defined include digital signature, electronic form, electronic record, computer, digital signature certificate, cyber cafe, intermediary, secure system, subscriber, and certifying authority. The definitions section provides clarity on the technical meaning of these terms as used in the Information Technology Act.
The Information Technology Act, 2000 provides the legal framework for electronic governance in India. Some key points covered in the act include:
- Legal recognition of electronic records and digital signatures.
- Regulation of certifying authorities that issue digital signature certificates.
- Establishment of the Cyber Appellate Tribunal to hear appeals related to the act.
- Offences and penalties related to cyber crimes like hacking and publishing obscene content.
- Procedures for adjudicating violations and determining appropriate penalties.
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
This document provides an overview of cyber crimes and the Information Technology Act 2000 in India. It discusses the types of cyber crimes such as hacking, phishing, spamming, and cyber terrorism. It then outlines the objectives of the IT Act which aims to provide legal recognition for e-commerce transactions and facilitate electronic governance. The document explains the extent of application of the Act and key definitions. Finally, it summarizes the various cybercrime provisions under the IT Act 2000, listing the relevant sections of the Act that penalize offenses such as tampering with computer systems, publishing offensive content, and failure to assist in decrypting data upon request from authorities.
This document is the Cybercrime Prevention Act of 2012 from the Philippines. It defines cybercrime and establishes punishments for illegal computer access, data interference, system interference, misuse of devices, cyber-squatting, computer-related forgery, fraud and identity theft, cybersex, child pornography, unsolicited commercial communications, and libel committed through computer systems. It assigns the National Bureau of Investigation and Philippine National Police to enforce cybercrime laws and authorizes them to collect traffic data in real-time related to communications with a warrant. Corporations can also face liability and fines if cybercrimes are committed on their behalf.
Indian law and cyber crime who as dont know the punishment of crime, this ppt helps you what are the penalty is there and what are the information technology does give the information about crime and what are the punishment their in the indian constitution. indian constitution is the bigg support for who are sufforing from injusties.
This document discusses the admissibility and proof of electronic records in court. It defines key terms related to electronic records under the Information Technology Act such as electronic record, data, computer, computer system, and computer network. It outlines various forms of digital evidence that can be obtained from electronic devices and computer outputs. It explains the requirements for proving electronic records in court according to Section 65B of the Indian Evidence Act. Overall, the document provides information on establishing the authenticity and admissibility of different types of electronic records as evidence in legal proceedings.
This document is a draft bill for the Philippine Congress titled the "Cybercrime Prevention Act of 2012". It aims to define cybercrime offenses and establish penalties. Key points:
- It defines various cybercrime offenses against data/systems integrity and availability like illegal access, data interference, and system interference.
- It also defines computer-related offenses like forgery and fraud. And content-related offenses like cybersex, child pornography, and unsolicited commercial communications.
- Penalties for offenses include imprisonment and/or fines depending on the specific crime, with increased penalties for crimes against critical infrastructure.
- It also establishes liability for aiding/abetting or attempting cybercrimes.
Draft Implementing Rules and Regulations (IRR) of the Cybercrime Law raissarobles
This document contains the draft implementing rules and regulations for the Cybercrime Prevention Act of 2012 in the Philippines. It defines key terms related to cybercrime and establishes punishments for various cybercrime offenses such as illegal access of computer systems, computer-related forgery, cyber-squatting, cybersex, and online libel. The penalties imposed range from fines to prison terms depending on the severity of the offense and whether it was committed against critical infrastructure. The regulations aim to combat cybercrime while facilitating detection, investigation and prosecution of related offenses under Philippine law.
The document discusses e-commerce law in the Philippines. It defines key terms related to electronic transactions and documents. The Electronic Commerce Act of 2000 (Republic Act 8792) provides the legal framework for e-commerce and recognizes electronic signatures and contracts. It aims to facilitate online transactions and protect cybersecurity. Some important provisions include giving legal status to electronic documents, allowing e-contracts, and mandating government e-commerce capabilities. The law also provides guidelines around data access, liability, and penalties for hacking or intellectual property infringement.
This slide is a guide to the Cyber Law regime in India. It covers up the IT Act 200 in a simple childish approach.
Shankey Gupta
Advocate
Cyber Law & Forensic Consultant.
www.shivamgupta.com
The Philippine Cybercrime Prevention Act of 2012Jim Ayson
The document is a draft bill for the Cybercrime Prevention Act of 2012 being considered by the Senate of the Philippines. It aims to define cybercrime offenses and provide for the prevention, investigation and punishment of such offenses. Some key points covered include defining terms related to computers, computer data and systems; classifying illegal access, interception and interference with computer systems and data as cybercrime offenses; and clarifying the role of service providers in relation to interception or monitoring of communications data.
Information Technology Act 2000: Introduction to Cyber Law in India, Importance of Cyber Law, E-Commerce, Paperless Society, Digital Signatures, Cybercrimes, Salient features of IT Act 2000, Recent amendments of IT Act 2008.
Right to Information Act 2005: Objectives of the RTI Act, Scope, Suo motu disclosure, Method of seeking information, Who is eligible to get information, Authorities, RTE 2008 and its features.
(1) The Electronic Transactions Act was enacted to regulate electronic records and digital signatures by providing them legal validity and recognition.
(2) Key terms like electronic form, electronic record, digital signature, originator, addressee etc. are defined to have the same meaning when used in reference to electronic records as they would have in reference to physical documents.
(3) The act provides for legal recognition of electronic records and digital signatures by establishing them as valid alternatives to physical documents signed using handwritten signatures when prevailing law requires written, printed or signed records.
This document provides an overview of computer systems and networking. It discusses the history of computer generations from vacuum tubes to modern integrated circuits. It also covers networking topics like topologies, protocols, standards, and network devices. Security measures are described like authentication, verification, filtering, and preventing computer crimes. The roles of hardware, software, operating systems, and networking components are defined.
This document outlines key aspects of Nepal's Electronic Transactions Act of 2063 (2008).
1. It establishes the legal validity and recognition of electronic records and digital signatures, allowing electronic transactions to have the same legal standing as traditional written documents.
2. Digital signatures created using an asymmetric cryptosystem and hash function will authenticate an electronic record. The public key can then verify the record was signed by the private key holder.
3. The Act provides definitions for important terms related to digital signatures, electronic records, cryptography, and information technology to clarify how they will be applied under the law.
This document is an Act being proposed in the Congress of the Philippines to define cybercrime offenses and penalties. It recognizes the importance of protecting computer systems and data from misuse and illegal access. The Act defines key terms related to cybercrime and computer systems. It outlines several cybercrime offenses against the confidentiality, integrity and availability of computer data and systems, including illegal access, illegal interception of data, interference with data or computer systems, and misuse of devices. The purpose is to adopt legal powers to effectively prevent, detect, investigate and prosecute cybercrime domestically and internationally.
Zimbabwe's cybercrime & cybersecurity bill 2017Povo News
This document is the Cybercrime and Cybersecurity Bill of 2017 from Zimbabwe. It aims to curb cybercrime and increase cybersecurity. Some key points:
- It establishes a Cybersecurity Centre to deal with cybercrime issues and provides for its functions and management by a Cybersecurity Committee.
- It defines various cybercrime related terms and offences against computer systems, electronic communications, intellectual property, identity theft, cyber-terrorism, and child pornography.
- It provides for investigation and collection of electronic evidence of cybercrimes, and the admissibility of such evidence.
- It outlines obligations of service providers and provisions regarding jurisdiction, extradition, and forfeiture related to cybercrimes.
This document discusses cyber law and cyber crimes in India. It provides definitions of cybercrime in both a narrow sense relating to computer crimes and a broader sense relating to computer-related crimes. It outlines some key sections of the Information Technology Act 2000 relating to penalties for offenses such as unauthorized access to computers, computer contamination, and tampering with computer source documents. It also provides case studies related to each section, such as cases involving fraudulent access to bank accounts and manipulation of cell phone codes.
The document provides an overview of cyber law and ethics topics including:
- The Information Technology Act of 2000 which provides the legal framework for cyber crimes and electronic transactions in India. It defines key terms related to computers, networks, and digital evidence.
- Concepts of encryption, digital signatures, and the legal recognition of digital signatures in verifying electronic records.
- The "Ten Commandments of Computing" which outline ethics principles for computer users.
- An introduction to intellectual property rights, copyright, and distinctions between shareware, freeware, and public domain software licenses.
This document summarizes key sections of the Information Technology Act 2000 of India related to cyber crimes and offenses. It provides:
1) An overview of cyber crimes and how they are defined in a narrow and broader sense under the IT Act.
2) Summaries of specific sections of the IT Act that outline penalties for offenses such as unauthorized access to computers, computer contamination, tampering with computer source documents, and transmitting offensive content.
3) Descriptions of relevant case studies that demonstrate how various sections of the IT Act have been applied and interpreted in court rulings related to cyber crimes.
UNOFFICIAL TRANSLATION
Law on Combating Cybercrime in the Kingdom of Bahrain
On information technology crimes
We are Hamad bin Isa Al Khalifa, King of the Kingdom of Bahrain.
After reviewing the Constitution,
The Penal Code promulgated by Legislative Decree No. 15 of 1976 and its
amendments,
And Decree-Law No. (17) of 1976 regarding Juveniles, amended by Legislative
Decree No. (23) of 2013,
And Decree-Law No. 4 of 2001 on the Prohibition and Combating of Money
Laundering and its amendments,
And Decree-Law No. (28) of 2002 on electronic transactions and its
amendments,
And the Code of Criminal Procedure promulgated by Legislative Decree No. 46 of
2002 and its amendments,
And Decree-Law No. (47) of 2002 regarding the organization of the press,
printing and publishing,
And the Telecommunications Law promulgated by Legislative Decree No. 48 of
2002,
Law No. (19) of 2004 approving the accession of the Kingdom of Bahrain to the
Optional Protocols to the Convention on the Rights of the Child on the
involvement of children in armed conflict and on the sale of children, child
prostitution and child pornography,
Law No. (22) for the year 2006 regarding the protection of copyright and related
rights and its amendments,
Law No. (58) for the year 2006 regarding the protection of society from terrorist
acts and amended by Legislative Decree No. (20) of 2013,
Law No. 64 of 2006 promulgating the Central Bank of Bahrain Law and financial
institutions,
The Shura Council and the Council of Representatives approved the following
law, which we have ratified and issued:
Introductory chapter
Article (1)
In the application of the provisions of this Law, the following words and
expressions shall have the meanings assigned to each of them unless the context
otherwise requires.
Information technology : includes all forms of technology used to create, process,
store, share, use and display information in various formats.
Information : All that can be stored, processed, generated and transmitted using
IT means, in particular, writing, still images, mobile, sound, numbers, letters,
symbols, signs, etc.
Means any electronic, magnetic, optical, electrochemical, or any instrument that
integrates communication, computing or any other device that has the ability to
receive, transmit, process, store and retrieve data very quickly.
IT system : A related or related tool or set of tools, one or more of which
automatically processes the IT data in accordance with a software program.
IT data : representation of facts, facts, information, or concepts in an appropriate
form that allows the IT system to process them.
Program : A set of instructions expressed in words, symbols, methods or
otherwise, if included in any of the machine-readable media, is capable of making
an IT tool perform a particular work or produce a specific result.
Service Provider, any of the following:
A) a.
Similar to proposal of Informatics crimes act in Iraq (20)
Third annual Meeting of the Arab internet governance forumHayder Hamzoz
This document provides information about the Third Annual Meeting of the Arab Internet Governance Forum (AIGF-III) taking place from November 25-27, 2014 in Beirut, Lebanon. It will include a one-day capacity building pre-event on November 25th followed by the main two-day event on November 26-27th. The event will address topics such as internet infrastructure, public policy, openness and privacy with the goal of shaping the future of the internet from an Arab perspective. It is organized by ESCWA and the League of Arab States with support from various partners and will bring together stakeholders from across the Arab world and beyond.
تقرير الرئيس حول المنتدى العربي لحوكمة الإنترنيت في بيروت 2014Hayder Hamzoz
تقرير رئيس المنتدى العربي لحوكمة الإنترنيت في بيروت 2014 ودور الشبكة العراقية للإعلام المجتمعي ( أنسم ) في حديثها حول الحقوق والمسؤوليات في الإنترنيت في إحدى جلسات المنتدى الرئيسية
UNESCO launches a new publication on the role of Internet intermediariesHayder Hamzoz
CC BY SA
“Fostering Freedom Online: the Role of Internet Intermediaries” is the title of a new title in the UNESCO Internet freedom series. With the rise of Internet intermediaries that play a mediating role on the internet between authors of content and audiences, UNESCO took a joint initiative, with the Open Society Foundations, the Internet Society, and Center for Global Communication Studies at the University of Pennsylvania’s Annenberg School for Communication, to examine this recent historical phenomenon and how it impacts on freedom of expression and associated fundamental rights such as privacy.
Source: http://www.unesco.org/new/en/communication-and-information/resources/news-and-in-focus-articles/all-news/news/unesco_launches_a_new_publication_in_its_internet_freedom_series/
مسودة قانون الاحزاب السياسية 2010 في العراقHayder Hamzoz
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
التقرير الوطني للتنمية البشرية في العراق 2014Hayder Hamzoz
التقرير الوطني للتنمية البشرية في العراق 2014 الذي تم من قبل وزارة التخطيط بالتعاون مع البرنامج الانمائي للامم المتحدة في العراق. حمل هذا التقرير عنوان "شباب العراق تحديات... وفرص" حيث يحتوي بيانات ومعلومات واحصائيات حول التنمية البشرية للشباب في العراق. مرفق النسخة العربية.
The document outlines 10 principles of "Click Rights" which assert that all people have equal rights to access and use the open internet freely without censorship or interference. The principles address issues like privacy, expression, accessibility, and ensuring the internet's governance is founded on human rights and social justice.
قانون المطبوعات لاقليم كوردستان العراق 1993Hayder Hamzoz
The document discusses the benefits of exercise and a healthy lifestyle. It notes that regular physical activity can help reduce the risk of diseases like heart disease and diabetes. Maintaining a balanced diet and getting recommended exercise each week are important steps everyone can take to improve overall health and well-being.
المسّودة المعدلة الغير مكتملة لقانون جرائم المعلوماتية في العراق 2013Hayder Hamzoz
نسخة من مسّودة قانون جرائم المعلوماتية في العراق المعدل وغير مكتمل ويحوي على تعديلات عن النسخة الأولى التي سحبت من مجلس النواب بعد حملة لمدة سنة ونصف السنة من قبل الشبكة العراقية للإعلام الإجتماعي لضعف القانون في حماية المدونين واستخدام الإنترنيت، ومعاقبتهم بعقوبات تصل إلى المؤبد و الخمسين مليون دينار عراقي كغرامة
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Introduction of Cybersecurity with OSS at Code Europe 2024
proposal of Informatics crimes act in Iraq
1. In
the
name
of
the
people
The
Presidency
Council
Based
on
what
has
been
approved
by
the
Council
of
Representatives
and
ratified
by
the
Presidency
Council,
and
pursuant
to
the
first
clause
of
Article
(61)
and
the
third
clause
of
Article
(73)
of
the
constitution,
the
following
Act
has
been
passed:
Act
No.
(
)
for
the
year
2011
Information
Technology
Crimes
Chapter
One
Definitions
and
objectives
Article
(1):
The
following
expressions
shall
have
the
meanings
mentioned
towards
them,
for
the
purposes
of
this
Act:
First-‐
The
computer:
Each
device
or
group
of
devices
connected
with
each
other
that
conduct
automated
processing
of
data.
Second-‐
Automated
processing
of
data:
the
processes
and
functions
that
subject
to
computer’s
data
to
create,
send,
receive,
save,
and
supply
them
by
any
means.
Third-‐
Computer
data:
Facts,
information,
concepts,
or
any
other
means
used
in
any
form
to
conduct
the
automated
processing
of
data
including
the
software
and
systems.
Fourth-‐
Software:
Set
of
orders
that
make
the
system
able
to
perform
automated
processing
of
data.
Fifth-‐
Authorities
to
provide
information
services:
Every
natural
or
judicial
person
providing
the
users
with
the
website
services
that
allow
the
computers
to
connect
to
each
other
or
to
any
other
person
who
processes
the
saved
data
on
behalf
of
the
service
provider.
2. Institute
for
International
Law
and
Human
Rights
10
August
2011
Sixth-‐
Access
data:
Codes
or
figures
for
logging
into
the
network,
devices,
computers,
or
any
similar
definition
data
sent
from
or
to
a
point
of
communication
including
the
date,
size
and
time
of
communication
and
any
information
that
identify
the
location
that
the
information
transferred
from
it
or
to
it
by
any
means
of
communications
including
cellular
communication.
Seventh-‐
Subscription
data:
information
required
by
the
service
provider
and
are
necessary
to
identify
and
distinguish
the
physical
address
of
the
subscriber
or
the
user
or
to
identify
the
account
of
the
recipient
of
the
communication
service
from
the
service
provider
that
includes
any
information
relating
to
the
website,
devices,
individuals,
computers,
definition
data,
services,
fees,
real
place
of
the
devices
if
they
were
different
from
the
site
that
provides
access
data.
Eighth-‐
Electronic
card:
Credit
cards,
payment
or
draw
cards,
or
any
other
card
issued
by
an
entity
licensed
by
law.
Ninth-‐
Internet:
Set
of
computers
or
information
processing
systems
connected
with
each
other
to
obtain
the
data
and
information
and
exchange
them
such
as
the
private
networks,
public
networks,
and
global
networks
of
the
internet
and
the
like.
Tenth-‐
Electronic
signature:
a
personal
sign
that
take
the
form
of
letters,
figures,
codes,
marks,
sounds
or
others
that
has
unique
character
indicates
its
belonging
to
the
website
and
to
be
approved
by
the
certifier.
Eleventh-‐
Electronic
means:
the
technology
of
using
electrical,
magnetic,
optical,
electromagnetic,
or
any
similar
means
in
creating,
processing,
exchanging,
and
saving
the
information.
Twelfth-‐
Information:
Date,
texts,
images,
shapes,
sounds,
codes,
database,
computer
software,
and
the
like
that
create,
save,
process,
or
send
by
electronic
means.
Thirteenth-‐
E-‐mail:
Letter
contains
information
to
be
created,
merged,
saved,
sent,
received
in
whole
or
in
part
by
electronic,
digital,
optical
or
any
other
similar
means.
2
3. Institute
for
International
Law
and
Human
Rights
10
August
2011
Fourteenth-‐
Information
processing
system:
the
electronic
system
used
to
create
messages
of
information,
and
to
send,
receive,
process,
or
save
them
in
any
other
means.
Fifteenth-‐
Electronic
certificate:
The
certificate
issued
by
the
legally
licensed
entity
to
show
the
belonging
of
the
electronic
signature
to
a
specific
person
based
on
documented
procedures
approved
by
the
law.
Article
2-‐
This
Act
aims
at
providing
legal
protection
for
the
legal
use
of
the
computer
hardware
and
the
internet,
and
punishes
the
natural
or
judicial
persons
who
violate
the
rights
of
the
users
of
these
devices
and
prevents
misusing
them
in
the
information
technology
crimes.
Chapter
two
Punishment
provisions
Article
3
First-‐
The
penalty
shall
be
life
imprisonment
and
a
fine
of
not
less
than
(25000000)
twenty
five
million
ID
and
not
exceeding
(50
000000)
fifty
million
ID
for
anyone
who
uses
intentionally
the
computer
hardware
and
the
internet
with
the
intention
of
committing
one
of
the
following
acts:
A-‐ Affect
the
independency
and
the
unity
of
the
country,
or
its
high
economic,
or
political,
or
military,
or
security
interests.
B-‐
Participate,
negotiate,
promote,
make
contract,
or
deal
with
the
enemy
in
any
way
in
order
to
destabilize
the
security
and
public
order,
or
expose
the
country
to
dangers.
C-‐
damage,
defect
or
hinder
devices,
computer
systems,
software,
or
the
information
network
that
belong
to
the
security,
military,
or
intelligence
agencies
with
the
intention
of
affecting
the
internal
or
external
security
of
the
country,
or
exposing
them
to
dangers.
Second-‐
Any
person
uses
intentionally
the
computer
hardware
and
their
software
or
their
systems
or
the
information
network
of
the
security,
military,
or
intelligence
agencies
with
the
intention
of
harming
them
or
copying
from
3
4. Institute
for
International
Law
and
Human
Rights
10
August
2011
them
or
with
the
intention
of
sending
their
content
to
the
enemy
or
taking
advantage
of
them
to
execute
crimes
against
the
internal
or
external
security
of
the
country,
or
to
facilitate
hiding
the
traces
of
such
crimes
or
covering
them
shall
be
punished
by
the
penalty
stipulated
in
this
Article.
Article
4-‐
The
penalty
shall
be
life
imprisonment
and
a
fine
of
not
less
than
(25000000)
twenty
five
million
ID
and
not
exceeding
(50
000000)
fifty
million
ID
for
anyone
who
sets
up
or
manage
a
website
on
the
information
network
with
the
intention
of
committing
one
of
the
following
acts:
-‐
First-‐
Execute
terrorist
operations
under
fictitious
names
or
facilitate
the
communication
with
the
leaders
and
members
of
the
terrorist
groups.
Second-‐
Promote
terrorist
acts
and
their
ideas
or
publish
information
about
manufacturing,
preparing
and
using
the
incendiary
or
explosive
devices,
or
any
tools
or
other
materials
used
in
planning
or
executing
the
terrorist
acts.
Article
5-‐
The
penalty
shall
be
life
imprisonment
and
a
fine
of
not
less
than
(30000000)
thirty
million
ID
and
not
exceeding
(40
000000)
forty
million
ID
for
whoever
commits
one
of
the
following
acts:
-‐
First
-‐
set
up
a
website
or
publish
information
on
the
information
network
for
the
purpose
of
conducting
or
facilitating
any
form
of
human
trafficking,
or
promoting
it,
helping
to
conduct
it,
making
contracts,
dealing,
or
negotiating
for
the
purpose
of
concluding
bargains
relating
to
any
form
of
human
trafficking.
Second
-‐
set
up
a
website
or
publish
information
on
the
information
network
for
the
purpose
of
trading
in
narcotic
or
mind
altering
substances
and
the
like,
or
promoting
them,
using
them,
facilitate
dealing
with
them,
making
contracts,
dealing,
or
negotiating
for
the
purpose
of
concluding
bargains
relating
to
any
form
of
trading
in
them.
Article
6-‐
The
penalty
shall
be
life
imprisonment
or
temporary
detention
and
a
fine
of
not
less
than
(25000000)
twenty
five
million
ID
and
not
exceeding
(50
000000)
fifty
million
ID
for
anyone
who
uses
the
4
5. Institute
for
International
Law
and
Human
Rights
10
August
2011
computer
and
the
information
network
for
the
purpose
of
committing
one
of
the
following
acts:
-‐
First-‐
Agitate
the
armed
rebellion
or
threaten
by
thereof
or
promote
it,
or
incite
sectarian
or
sectarian
trends,
incite
seditions,
disturb
security
and
public
order,
or
harm
the
reputation
of
the
country.
Second
-‐
Damage,
disrupt,
impair,
hinder,
or
harm
intentionally
the
computer
systems
or
computer
hardware,
or
the
information
network
of
government
departments
with
the
intention
of
affecting
its
system
and
its
infrastructure.
Third-‐
Publish
or
broadcast
false
or
shaded
facts
in
order
to
weaken
the
confidence
in
the
electronic
financial
system
or
the
electronic
commercial
and
financial
papers
and
the
like
or
damage
the
national
economy
and
the
financial
confidence
of
the
country.
Article
7-‐
The
penalty
shall
be
temporary
detention
and
a
fine
of
not
less
than
(10000000)
ten
million
ID
and
not
exceeding
(30
000000)
thirty
million
ID
for
any
whoever
commits
one
of
the
following
acts:
-‐
First
-‐
Use
intentionally
the
computer
system
or
the
internet
belonging
to
people,
companies,
institutions,
banks,
or
financial
markets
and
appropriate
to
himself
the
property
of
other
people
or
their
financial
rights,
or
made
for
himself
or
for
another
financial
benefit
or
deprived
others
of
his
financial
rights
by
any
electronic
means.
Second-‐
Use
the
computers
or
the
information
network
to
appropriate
to
himself
or
to
others
software,
information,
data,
or
codes
through
any
electronic
transaction,
electronic
contract,
electronic
cards,
movable
property,
deed,
or
signs
upon
deed
using
deception,
a
false
name,
or
impersonation
with
intent
to
defraud
the
victim.
Third-‐
Tamper,
play
with,
alter,
change,
or
create
any
data,
statements
of
account,
or
software
related
to
stocks,
deeds,
and
prices
of
circulated
currency
in
Iraq,
or
any
data,
statements
of
account,
or
software
used
by
5
6. Institute
for
International
Law
and
Human
Rights
10
August
2011
bodies
inside
Iraq
in
the
activities
of
circulating
stocks,
deeds,
or
currencies
that
take
place
outside
of
Iraq
for
the
account
of
others.
Article
8-‐
First-‐
The
penalty
shall
be
temporary
detention
and
a
fine
of
not
less
than
(10000000)
ten
million
ID
and
not
exceeding
(15
000000)
fifteen
million
ID
for
whoever
commits
one
of
the
following
acts:
-‐
A-‐
Forge,
imitate,
or
create
by
himself
or
by
another
person
a
signature,
deed,
email,
approval
certificate,
or
a
license
to
practice
e-‐signature
services
and
the
like,
or
intentionally
used
them
illegally.
B
-‐
Forge,
imitate,
or
create
by
himself
or
by
another
person
in
any
form
an
electronic
card
or
smart
card
or
any
means
of
transferring
the
local
or
foreign
currency
inside
Iraq
or
using,
circulating,
or
dealing
with
it
while
he
knows
that
it
is
false.
C
-‐
Use
or
try
to
use
fake
or
false
electronic
card
while
he
knows
that
it
is
false,
or
accept
to
pay
using
the
fake
or
false
credit
card
while
he
knows
that
it
is
false.
D
–
Create
intentionally
to
himself
or
to
other
person
any
false
electronic
data,
documents,
registers,
or
records,
or
make
any
change
or
alteration
in
any
electronic
deed,
or
use
any
of
them
before
any
public
or
private
body.
E
–
Make
for
the
purpose
of
sale,
distribution,
or
expose
any
software,
hardware,
data,
or
any
technical
means
to
be
used
in
forgery,
counterfeiting,
creating,
or
modification
with
the
intention
of
committing
a
felony
or
misdemeanor.
Second-‐
The
penalty
shall
be
imprisonment
for
a
term
not
less
than
(10)
ten
years
and
a
fine
of
not
less
than
(20000000)
twenty
million
ID
and
not
exceeding
(30000000)
thirty
million
ID
if
the
acts
defined
in
Sub-‐Article
(First)
of
this
Article:
A
–
Relate
to
the
rights
of
the
state,
the
public
sector,
or
the
private
entities
with
public
benefit.
B
-‐
Commit
by
an
officer
or
by
a
person
in
charge
of
public
service
during
performing
his
job
or
because
of
it.
Article
9-‐
First-‐
The
penalty
shall
be
imprisonment
for
a
term
not
less
than
(10)
ten
years
and
a
fine
of
not
less
than
(5000000)
five
million
ID
and
not
exceeding
6
7. Institute
for
International
Law
and
Human
Rights
10
August
2011
(10000000)
ten
million
ID
for
whoever
abstracts
or
appropriates
intentionally
an
electronic
signature,
email,
deed,
electronic
records,
electronic
trade
and
financial
papers,
or
any
other
electronic
output
related
to
the
rights
or
properties
of
others
to
achieve
a
benefit
to
him
or
to
others,
and
the
punishment
shall
be
imprisonment
in
case
of
intentional
possession
in
order
to
be
exploited
to
bring
benefit
to
himself
or
to
others.
Second-‐
The
penalty
shall
be
imprisonment
for
a
term
not
less
than
(10)
ten
years
and
a
fine
of
not
less
than
(3000000)
three
million
ID
and
not
exceeding
(5000000)
five
million
ID
for
whoever
entrusts
to
devices,
software,
data,
information
network,
electronic
cards,
or
any
other
electronic
outputs,
or
entrusted
by
public
authorities
to
maintain
them
as
a
guard
or
a
trustee,
and
after
that
he
appropriate
them
with
the
intention
of
possession
or
he
act
with
it
according
to
his
interest
or
others
interest,
or
bring
an
illegal
benefit
to
him
or
to
another
person.
Article
10-‐
The
penalty
shall
be
imprisonment
for
a
term
not
less
than
(7)
seven
years
and
a
fine
of
not
less
than
(10000000)
ten
million
ID
and
not
exceeding
(30000000)
thirty
million
ID
for
whoever
creates,
manages,
promotes,
or
set
up
a
website
on
the
information
network
to
allow
or
facilitate
money
laundering
or
accept
illegal
financial
transactions
such
as
bank
drafts
and
fake
trading
operations,
or
move,
exchange,
use,
acquire,
or
possess
the
money
using
electronic
means
contrary
to
the
law
or
hide
its
sources
knowingly
it
is
derived
from
an
illegal
sources.
Article
11-‐
First-‐
The
penalty
shall
be
imprisonment
for
a
term
not
exceeding
(7)
seven
years
and
a
fine
of
not
less
than
(3000000)
three
million
ID
and
not
exceeding
(5000000)
five
million
ID
for
anyone
who:
-‐
A-‐
Threaten
another
person,
by
using
the
computer
or
the
internet,
with
committing
a
felony
against
himself
or
his
property,
or
against
another
person
or
his
property
with
the
intention
of
intimidating
him,
or
driving
him
to
do
something
or
prevent
him
from
doing
something.
B
-‐
Send
or
transmit
any
electronic
message,
news,
or
document
using
the
computers
or
the
information
network
knowingly
contains
threat
or
7
8. Institute
for
International
Law
and
Human
Rights
10
August
2011
blackmail
for
a
person
with
the
intention
of
intimidating
him,
or
driving
him
to
do
something
or
prevent
him
from
doing
something.
Second-‐
The
penalty
shall
be
imprisonment
and
a
fine
of
not
less
than
(2000000)
two
million
ID
and
not
exceeding
(4000000)
four
million
ID
for
whoever
threatens
another
person
with
using
the
computers
and
the
information
network
in
other
cases
defined
in
Sub-‐Article
(First)
of
this
Article.
Article
12-‐
First-‐
The
penalty
shall
be
imprisonment
and
a
fine
of
not
less
than
(3000000)
three
million
ID
and
not
exceeding
(5000000)
five
million
ID
for
whoever
creates,
publishes
or
provides
an
incorrect
electronic
certificate.
Second-‐
The
penalty
shall
be
imprisonment
for
a
term
not
less
than
(3)
three
months
and
not
exceeding
(1)
one
year
or
a
fine
of
not
less
than
(30000000)
thirty
million
ID
and
not
exceeding
(50000000)
fifty
million
ID
for
whoever
practice
the
activity
of
electronic
ratification
and
issuing
certificate
contrary
to
the
law.
Article
13-‐
First-‐
The
penalty
shall
be
imprisonment
for
a
term
not
less
than
(3)
three
years
and
a
fine
of
not
less
than
(5000000)
five
million
ID
and
not
exceeding
(10000000)
ten
million
ID
or
of
both
penalties
for
anyone
who:
-‐
A-‐
Damage
or
hurt
an
electronic
signature,
means
or
mail.
B-‐
Use
or
create
intentionally
an
electronic
signature,
means
or
mail
contrary
to
the
conditions
and
specifications
set
by
the
competent
authority.
C-‐
know,
due
to
his
position,
the
data
of
the
electronic
signature,
electronic
means,
or
information
and
divulges
them
with
the
intention
of
harming
the
others
or
bringing
financial
benefit
to
himself
or
to
the
others
or
using
them
for
other
purpose
for
which
they
were
given.
D-‐
Gain
unlawfully
an
electronic
signature,
means
or
mail,
or
get
access
to
this
electronic
means
or
hinder
or
impair
its
role.
Second-‐
The
penalty
shall
be
imprisonment
and
a
fine
of
not
less
than
(3000000)
three
million
ID
and
not
exceeding
(10000000)
ten
million
ID
for
whoever
submits
incorrect
information
to
an
authorized
body
that
practice
the
8
9. Institute
for
International
Law
and
Human
Rights
10
August
2011
activity
of
issuing
the
electronic
approval
certificate
with
the
intention
of
obtaining,
suspending
or
canceling
the
approval
certificate.
Third-‐
The
penalty
shall
be
a
fine
of
not
less
than
(3000000)
three
million
ID
and
not
exceeding
(5000000)
five
million
ID
for
whoever
declines
to
provide
the
security
authorities
and
bodies
responsible
for
issuing
the
licenses
with
the
required
reports,
information
and
statistics,
data,
records,
electronic
commercial
and
financial
papers,
software,
or
any
other
outputs
to
the
extent
that
relates
to
their
activities
and
do
not
contradict
with
the
intellectual
property
rights.
Article
14-‐
First-‐
The
penalty
shall
be
imprisonment
for
a
term
not
exceeding
(3)
three
years
and
a
fine
of
not
less
than
(10000000)
ten
million
ID
and
not
exceeding
(15000000)
fifteen
million
ID
for
anyone
who:
-‐
A
-‐
Damage,
defect
or
disrupt
an
electronic
deed
or
electronic
card
that
proves
a
debt,
dispose,
or
any
financial
or
moral
rights
or
any
other
e-‐mail
used
to
prove
the
rights.
B
-‐
Use
in
his
work
intentionally
electronic
commercial
or
financial
papers,
records,
electronic
cards,
and
the
like
of
the
computer
and
information
network
outputs
that
include
other
rights
and
neglects
arranging
them.
Second-‐
The
penalty
shall
be
imprisonment
for
a
term
not
less
than
(3)
three
years
and
a
fine
of
not
less
than
(15000000)
fifteen
million
ID
and
not
exceeding
(25000000)
twenty
five
million
ID
or
either
for
whoever
disrupts
intentionally
the
computers
and
the
internet
devoted
to
the
public
interest,
or
damage
or
hinder
their
functions.
Third-‐
The
penalty
shall
be
imprisonment
for
a
term
not
exceeding
(3)
three
months
and
a
fine
of
not
less
than
(2000000)
two
million
ID
and
not
exceeding
(5000000)
five
million
ID
for
anyone
who:
-‐
A
-‐
Entrust
with
operating
the
computers
and
controlling
them,
and
he
was
intentionally
the
cause
of
damage,
disrupt,
hinder
or
defect
the
computers
or
their
systems,
software,
or
their
networks
and
the
like.
9
10. Institute
for
International
Law
and
Human
Rights
10
August
2011
B
-‐
Intrude,
bother,
or
call
the
users
of
the
computers
and
the
internet
without
permission
or
hinders
using
them
by
the
beneficiaries.
C
–
Log
into
a
website
or
an
information
system
intentionally,
without
permission,
or
makes
connection
with
the
computer
system
or
with
part
of
it.
D
-‐
Use,
without
permission,
or
caused
to
use
the
computers
belonging
to
others
directly
or
indirectly.
E
–
Make
use
of
telecommunications
services
unlawfully,
through
the
internet
or
one
of
the
computers.
Article
15-‐
First-‐
The
penalty
shall
be
imprisonment
and
a
fine
of
not
less
than
(10000000)
ten
million
ID
and
not
exceeding
(15000000)
fifteen
million
ID
for
anyone
who:
A-‐
Excess
the
scope
of
the
authorization
given
to
him
intentionally
or
intercepts
any
information
during
the
transmission
of
the
communications.
B-‐
Eavesdrop
or
watch
the
stored
and
exchanged
data
in
information
systems.
Second-‐
The
penalty
shall
be
imprisonment
for
a
term
not
less
than
(4)
four
years
and
a
fine
of
not
less
than
(15000000)
fifteen
million
ID
and
not
exceeding
(25000000)
twenty
five
million
ID
if
the
act
provided
for
in
clause
(one)
of
this
Article
results
in
the
deletion,
destruction,
alteration,
defection,
disruption,
or
republication
of
data
and
information
belonging
to
others
unlawfully.
Article16-‐
The
penalty
shall
be
imprisonment
for
a
term
not
less
than
(7)
years
and
a
fine
of
not
less
than
(25000000)
twenty
five
million
ID
and
not
exceeding
(50000000)
fifty
million
ID
or
either
for
whoever
receives
or
intercepts,
unlawfully,
communication
transmitted
by
one
of
the
computers
and
through
the
information
network
with
the
intention
of
bringing
financial
benefits
for
himself
and
for
others.
Article17-‐
First-‐
The
penalty
shall
be
imprisonment
for
a
term
not
exceeding
(3)
years
and
a
fine
of
not
less
than
(5000000)
five
million
ID
and
not
exceeding
(10000000)
ten
million
ID
for
whoever
decodes
or
damages
the
code
of
an
electronic
signature,
computer,
information
network,
or
an
electronic
card
of
other
person
with
the
intention
of
committing
one
of
crimes
stipulated
in
this
Act.
10
11. Institute
for
International
Law
and
Human
Rights
10
August
2011
Second-‐
The
penalty
shall
be
temporary detention and
a
fine
of
not
less
than
(10000000)
ten
million
ID
and
not
exceeding
(15000000)
fifteen
million
ID
if
the
act
defined
in
Sub-‐Article
(First)
of
this
Article
was
done
against
computers,
software,
networks,
deeds,
electronic
cards,
or
rights
of
government
departments
and
public
institutions
or
those
who
work
on
their
behalf.
Article
18-‐
First-‐
The
penalty
shall
be
imprisonment
and
a
fine
of
not
less
than
(5000000)
five
million
ID
and
not
exceeding
(10000000)
ten
million
ID
for
anyone
who:
A.
Provide
false
electronic
information
or
data
to
the
judicial
or
administrative
authorities
knowingly
that
they
are
inaccurate.
B.
Decline
to
provide
information
or
data
to
the
judicial
or
administrative
authorities.
Second-‐
The
penalty
shall
be
imprisonment
for
a
term
not
exceeding
(3)
three
years
and
a
fine
of
not
less
than
(2000000)
two
million
ID
and
not
exceeding
(3000000)
three
million
ID
for
anyone
who:
A.
Use
the
computers
and
the
information
network
and
assume
a
false
identity
or
name
with
the
intention
of
deception
and
fraud.
B.
Set
up
or
use
unreal
or
illusory
website,
or
conceal
or
helped
to
conceal
the
fact
of
a
website
on
the
information
network
with
the
intention
of
committing
one
of
the
crimes
defined
in
this
Act.
Third-‐
The
penalty
shall
be
imprisonment
for
a
term
not
less
than
(7)
seven
years
and
a
fine
of
not
less
than
(15000000)
fifteen
million
ID
and
not
exceeding
(20000000)
twenty
million
ID
if
the
crime
defined
in
Sub-‐Article
(First)
and
(Second)
of
this
Article
commits
by
an
officer
or
by
a
person
in
charge
of
public
service,
or
if
the
false
title,
name,
or
the
information
relates
to
an
public
officer
or
government
department.
Article
19-‐
First-‐
The
penalty
shall
be
imprisonment
for
a
term
not
less
than
(3)
three
years
and
a
fine
of
not
less
than
(5000000)
five
million
ID
and
not
exceeding
(10000000)
ten
million
ID
for
anyone
who:
11
12. Institute
for
International
Law
and
Human
Rights
10
August
2011
A.
Obtain
illegally
information,
data,
software
or
any
computer
outputs
and
he
set
them
up
or
announce
them
intentionally
by
using
the
computer
and
the
information
network
with
the
intention
of
harming
others.
B.
Disclose
any
kind
of
subscribers’
information
or
their
secrets
or
disclose
the
access
data
to
any
other
party
without
an
approval
issued
by
a
competent
official
body.
C.
Sell,
transfer,
or
trade
in
the
personal
data
that
the
subscribers
provided
them
to
him
for
any
reason
without
their
permission
to
bring
financial
benefit
to
him
or
to
others.
Second-‐
The
penalty
shall
be
imprisonment
for
a
term
not
less
than
(7)
seven
years
and
a
fine
of
not
less
than
(5000000)
five
million
ID
and
not
exceeding
(10000000)
ten
million
ID
if
the
acts
defined
in
Sub-‐Article
(First)
of
this
Article
Commits
by
an
officer
or
by
a
person
in
charge
of
public
service
while
he
is
performing
his
job
or
because
of
it.
Article
20-‐
First-‐
The
penalty
shall
be
imprisonment
and
a
fine
of
not
less
than
(2000000)
two
million
ID
and
not
exceeding
(5000000)
five
million
ID
for
whoever
uses
the
computer
and
the
information
network
to
commit
one
of
the
following
acts:
A
–
Use,
with
the
intention
of
fraud,
a
trademark
in
Iraq
registered
in
the
name
of
other
person
as
a
title
for
his
information
network,
or
allowed
other
side
who
works
in
the
field
of
technical
services
in
Iraq
to
use
it.
B
-‐
Use
his
electronic
card
for
payment
knowingly
that
he
has
no
balance,
or
he
uses
it
knowingly
that
it
is
expired
or
cancelled,
or
he
uses
the
electronic
card
that
belongs
to
other
person
and
this
card
was
delivered
to
him
without
the
knowledge
of
the
owner.
Second-‐
The
penalty
shall
be
imprisonment
for
a
term
not
exceeding
(10)
ten
years
and
a
fine
of
not
less
than
(5000000)
five
million
ID
and
not
exceeding
(10000000)
ten
million
ID
in
one
of
the
two
following
cases:
A
-‐
If
the
offender
is
an
officer
or
a
person
in
charge
of
public
service
and
committed
one
of
the
crimes
defined
in
Sub-‐Article
(First)
of
this
Article
while
he
is
doing
his
job
or
because
of
his
job,
or
he
facilitates
the
crime
to
others.
12
13. Institute
for
International
Law
and
Human
Rights
10
August
2011
B
-‐
If
the
acts
defined
in
Sub-‐Article
(First)
of
this
Article
targets
any
of
the
computer
systems
or
the
information
networks
that
belong
to
any
government
entity
in
Iraq,
or
it
works
on
its
behalf.
Article
21-‐
First-‐
The
penalty
shall
be
imprisonment
for
a
term
not
less
than
(2)
two
years
and
not
exceeding
(3)
three
years
and
a
fine
of
not
less
than
(10000000)
ten
million
ID
and
not
exceeding
(20000000)
twenty
million
ID
for
whoever
commits
one
of
the
following
acts:
A-‐
Use
the
internet
and
the
computer
to
publish
or
copy
intellectual
works,
literary
works,
or
scientific
research
belonging
to
others
and
that
protected
by
laws
or
international
conventions.
B-‐
Access
the
website
of
a
company,
institution
or
others
to
change,
delete,
or
modify
the
design
of
this
website
or
exploit
it
unlawfully.
Second-‐
The
penalty
shall
be
a
fine
of
not
less
than
(500000)
five
hundred
thousand
ID
and
not
exceeding
(1000000)
one
million
ID
for
whoever
publishes,
copies,
or
trades
in
software
or
information
without
authorization.
Third-‐
The
penalty
shall
be
imprisonment
for
a
term
not
less
than
(1)
one
year
and
a
fine
of
not
less
than
(2000000)
two
million
ID
and
not
exceeding
(5000000)
five
million
ID
for
whoever
violates,
in
any
manner,
the
religious,
moral,
family,
or
the
social
principles
or
values,
or
violates
the
privacy
of
the
private
life
by
using
the
information
network
or
the
computers
in
any
manner.
Article
22-‐
First-‐
The
penalty
shall
be
imprisonment
for
a
term
not
exceeding
(3)
three
years
and
a
fine
of
not
less
than
(3000000)
three
million
ID
and
not
exceeding
(6000000)
six
million
ID
for
whoever
sets
up,
runs,
or
helps
to
set
up
a
website
on
the
information
network
for
gambling,
or
practice
gambling,
or
call
for
or
promote
gambling
using
the
information
network.
Second-‐
The
penalty
shall
be
temporary
detention
and
a
fine
of
not
less
than
(10000000)
ten
million
ID
and
not
exceeding
(30000000)
thirty
million
ID
for
whoever
commits
one
of
the
following
acts:
13
14. Institute
for
International
Law
and
Human
Rights
10
August
2011
A-‐
Set
up,
run,
or
help
to
set
up
a
website
to
promote
and
incite
an
act
of
lechery
and
fornication,
or
any
software,
information,
pictures,
or
films
that
breach
of
modesty
or
public
morals,
or
engages
in
calling
for
or
promoting
them.
B-‐
Expose
a
minor
or
juvenile
to
immorality
activities
or
use
the
internet
to
promote,
product,
and
distribute
prostitution
materials,
or
uses
the
email,
computer,
or
the
internet
to
prepare
or
run
immorality
activities
or
communications
using
a
minor,
juvenile,
or
incapacitated
person.
Third-‐
The
penalty
shall
be
imprisonment
for
a
term
not
exceeding
(2)
two
years
and
a
fine
of
not
less
than
(3000000)
three
million
ID
and
not
exceeding
(5000000)
five
million
ID
or
either
for
whoever
uses
the
computers
and
the
internet
to
attribute
terms,
images,
sounds
or
any
other
means
that
include
libel
and
insult
to
the
others.
Article
23-‐
The
penalty
shall
be
imprisonment
for
a
term
not
less
than
(1)
one
year
and
not
exceeding
(2)
two
years
and
a
fine
of
not
less
than
(3000000)
three
million
ID
and
not
exceeding
(5000000)
five
million
ID
for
whoever
produces,
sells,
imports
or
distributes
intentionally
any
devices,
tools
or
computer
software,
or
passwords
or
access
codes
that
led
to
commit
one
of
the
crimes
defined
in
this
Act.
Chapter
Three
Procedures
for
collecting
of
evidence,
investigation,
and
trial
Article
24-‐
First-‐
The
investigation
agencies
shall
undertake
the
investigation
procedures
and
collecting
of
evidence,
and
request
them
from
their
sources
concerning
the
crimes
defined
in
this
Act.
Second
-‐
It
is
not
permitted
for
the
investigation
agencies
to
start
the
investigation
procedures
without
an
order
of
the
competent
judge.
Third-‐
The
chief
investigator
or
the
investigator
shall
undertake
the
enforcement
of
the
procedures,
collecting
of
evidence,
or
any
other
investigation
procedure
stipulated
in
the
Criminal
procedures
Code.
14
15. Institute
for
International
Law
and
Human
Rights
10
August
2011
Article
25-‐
First-‐
A-‐
The
court
of
misdemeanors
or
felonies
in
Rusafa
shall
hear
the
crimes
defined
in
this
law
for
a
period
of
three
(3)
years
from
the
date
of
its
entry
into
force,
each
court
according
to
its
jurisdiction.
B
-‐
The
court
defined
in
paragraph
(A)
of
this
Sub-‐Article
shall
continue
hearing
the
crimes
before
it
until
taking
a
decision
on
this
crime
and
reaching
the
final
judgment.
Second
-‐
The
courts
of
misdemeanors
or
felonies
shall
hear,
according
to
the
rules
of
jurisdiction,
the
crimes
defined
in
this
Act
after
the
expiration
of
the
period
defined
in
Sub-‐Article
(First)
of
this
Article.
Third
-‐
The
crimes
defined
in
this
Act
shall
be
heard
by
one
or
more
judges
who
have
experience
and
competence
and
received
special
training.
Fourth-‐
The
competent
judge
may
use
the
expertise
from
inside
and
outside
Iraq
during
the
investigation
and
trial
period.
Article
26
–
First
-‐
The
competent
judge
may:
A-‐
Issue
the
orders
to
any
party
to
save
the
computer
data,
including
the
transmitted
information
or
the
data
stored
in
the
computer
hardware
or
in
its
accessories
and
its
outputs
that
could
be
changed
or
lost.
B
-‐
Issue
orders
to
the
parties
who
provide
information
network
services
or
the
different
technical
services
to
provide
the
investigators
with
the
subscription
date
and
the
password
data
if
that
would
help
in
the
detection
of
the
crime.
C-‐
Access
to
the
computers
and
the
networks
or
to
any
part
of
them
and
to
the
data
stored
in
them,
and
to
access
to
any
device
or
means
which
can
store
computer
data
inside
Iraq,
and
to
intercept,
monitor
and
control
the
data
by
a
reasoned
decision
that
has
specific
duration
and
purpose.
D-‐
Trace
the
information
to
the
computer
systems
and
the
networks
connected
with
other
suspected
computer
systems
or
networks
provided
that
to
inform
the
owners
of
the
systems
and
the
networks
with
this
procedure
and
its
scope,
and
provided
that
this
limited
procedure
do
not
violate
or
affect
the
rights
of
others.
15
16. Institute
for
International
Law
and
Human
Rights
10
August
2011
E
-‐
Seize
the
computers
or
part
of
them
and
the
device
that
the
data
stored
in
it
and
transfer
them
to
the
investigation
site
to
be
analyzed
and
examined.
The
judge
may
copy
the
data
without
transferring
the
system,
and
may
remove
the
data
that
prevent
access
to
the
computer
system
without
damaging
the
system
or
affecting
the
data
and
the
software
that
stored
in
it.
Second-‐
the
side
that
undertakes
collecting
of
evidence
shall:
A-‐
Prepare
two
hardcopies
of
the
data
to
be
analyzed
and
examined,
and
to
deliver
the
first
hardcopy
directly
to
the
chief
investigator
before
taking
any
action
about
it,
and
to
start
the
procedures
of
analysis
and
examination
on
the
second
hardcopy.
It
is
not
allowed
to
make
any
alteration
or
change
to
these
two
copies.
B-‐
Provide
the
electronic
copy
of
the
evidence
or
the
hardcopies
of
the
evidence
with
a
detailed
report
shows
the
procedures,
tools
and
the
equipment
used
in
obtaining
evidence
or
recovering
them.
Third-‐
The
investigation
and
the
expertise
side
shall
provide
the
outputs
of
the
electronic
copies
as
hardcopies
along
with
a
detailed
report
about
the
date
of
copying
t
the
hardcopies.
Chapter
Four
General
and
final
provisions
Article
27
-‐
The
acts
stipulated
in
this
Act
shall
be
punished
by
the
penalties
stipulated
in
it
without
prejudice
to
any
severer
punishments
stipulated
by
the
applicable
laws.
Article
28
–
First
-‐
The
provisions
of
judicial
person’s
responsibility
stipulated
in
Penal
Code
No.
111
for
the
year
1969
concerning
the
crimes
stipulated
in
this
Act
that
were
committed
in
his
name
or
for
his
account,
shall
be
applied.
Second
-‐
The
judicial
person
shall
be
committed
to
solidarity
with
the
sentenced
person
concerning
the
payment
of
the
fines
and
compensation
decided
by
the
court,
if
the
crime
was
committed
in
his
name
and
for
his
account.
16
17. Institute
for
International
Law
and
Human
Rights
10
August
2011
Article
29-‐
Without
prejudice
to
the
rights
of
bona
fide
third
parties,
the
court
may
decide
to
confiscate
or
damage
the
tools,
equipment,
software,
and
devices
used
in
the
commission
of
the
crimes
stipulated
in
this
Act.
Article
30
-‐
The
following
Codes
are
applicable
unless
specifically
provided
for
in
this
Act:
First
-‐
Penal
Code
No.
111
for
the
year
1969.
Second
-‐
Criminal
Procedure
Code
No.
23
for
the
year
1971.
Article
31
-‐
This
Act
shall
enter
into
effect
after
ninety
(90)
days
from
the
date
of
its
publication
in
the
Official
Gazette.
Reasons
In
order
to
provide
legal
protection
and
to
reach
a
punishment
system
for
the
perpetrators
of
computer
and
Internet
crimes
that
accompanied
the
evolution,
growth,
and
development
of
computer
systems,
networks
and
information
technology
revolution.
These
crimes
involves
a
lot
of
risks
that
inflict
great
causalities
upon
the
institutions
and
individuals,
where
these
crimes
attack
the
data
and
information
and
affect
the
private
life
of
the
individuals,
threaten
the
national
security
and
national
sovereignty,
weaken
the
confidence
in
the
new
technologies,
threaten
the
human
creativity,
and
provide
legal
protection
for
the
computer
systems
that
the
State
encourages
depending
on
them
in
all
the
activities.
This
Act
initiated.
17