Skip to main content

Illegal Interception of Data

  • Chapter
  • First Online:
Cybersecurity and Data Laws of the Commonwealth
  • 189 Accesses

Abstract

The interception of data as an offence is interrelated with a number of the other provisions compared in this book. It can be argued the interception of data fundamentally related to cybersecurity. This chapter identifies whether the Commonwealth countries compared in this book have adopted such a provision. Arguably, there is a strong economic benefit for having such an offence provision in the national laws. It provides another layer of protection to trade and investment that, utilises personal data. Yet, the interception of data is likely here to stay. As technology advances to protect the data, equally technology is developed to intercept the data. Thus, it is important for all member countries to have this provision in their respective national laws.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Model Law on Computer and Computer Related Crime, Office of Civil and Criminal Justice Reform, 2017, https://production-new-commonwealth-files.s3.eu-west-2.amazonaws.com/migrated/key_reform_pdfs/P15370_11_ROL_Model_Law_Computer_Related_Crime.pdf.

  2. 2.

    Matthew Zakaras, International computer crimes General Report, Revue internationale de droit pénal, (Vol. 72), (2001), pp. 813–815.

  3. 3.

    Ibid.

  4. 4.

    Peter Csonka, The Council of Europe’s Convention on Cyber-crime and Other European Initiatives, Revue internationale de droit pénal Volume 77, Issue 3, 2006, p. 484.

  5. 5.

    Electronic Crimes Act 2013, section 6, http://laws.gov.ag/wp-content/uploads/2019/02/a2013-14.pdf.

  6. 6.

    Ibid, section 3.

  7. 7.

    Telecommunications (Interception and Access) Act 1979, section 5.

  8. 8.

    Computer Misuse Act 2007, section 2, https://www.agc.gov.bn/AGC%20Images/LAWS/ACT_PDF/C/CHAPTER%20194.pdf.

  9. 9.

    Digital Security Act 2018, section 19 https://www.cirt.gov.bd/wp-content/uploads/2020/02/Digital-Security-Act-2020.pdf.

  10. 10.

    Computer Misuse Act, 2005, section 7 http://www.oas.org/juridico/spanish/cyb_bbs_computer_misuse_2005.pdf.

  11. 11.

    Cybercrime and related Crimes Act 2018, Section 9, https://www.bocra.org.bw/cybercrime-and-computer-related-crimes-act-2018.

  12. 12.

    Computer Misuse Act 2007, Section 6, https://www.agc.gov.bn/AGC%20Images/LAWS/ACT_PDF/C/CHAPTER%20194.pdf.

  13. 13.

    Criminal Code 1985, https://laws-lois.justice.gc.ca/pdf/c-46.pdf.

  14. 14.

    Computer Crime and Cybercrime Act No.6 of 2022, Section 8 https://www.esccom.org.sz/legislation/COMPUTER%20CRIME%20&%20CYBERCRIME%20ACT.pdf.

  15. 15.

    Cybersecurity Act 2020, Section 71, 72, 73.74, 75 https://csdsafrica.org/wp-content/uploads/2021/08/Cybersecurity-Act-2020-Act-1038.pdf.

  16. 16.

    Cyber Crime Act 2018, https://parliament.gov.gy/publications/acts-of-parliament/cyber-crime-act-2018.

  17. 17.

    Information Technology Act (2000), https://thelawreviews.co.uk/title/the-privacy-data-protection-and-cybersecurity-law-review/india, and https://www.indiacode.nic.in/handle/123456789/1999 Section 69.

  18. 18.

    Ibid.

  19. 19.

    Ibid.

  20. 20.

    The Cyber Crimes Act 2015, Section 6 https://www.japarliament.gov.jm/attachments/339_The%20Cybercrimes%20Acts,%202015.pdf.

  21. 21.

    Computer Misuse and Cybercrimes Act 2018, Section 17 https://ictpolicyafrica.org/en/document/pb8w26fcso?page=2.

  22. 22.

    Cybercrime Act 2021, Sections 8 and 28 https://www.mict.gov.ki/download/file/fid/320.

  23. 23.

    The Computer Crimes and Cyber Security Bill, 2022, https://senate.parliament.ls/2022/05/19/computer-crime-and-cyber-security-bill-2022/

  24. 24.

    Electronic Transactions and Cyber Security Act 2017, Section 84 https://media.malawilii.org/files/legislation/akn-mw-act-2016-33-eng-2017-12-31.pdf.

  25. 25.

    Cybersecurity and Cybercrime Act 2021, Section 8 https://ncb.govmu.org/ncb/legislations/THE%20CYBERSECURITY%20AND%20CYBERCRIME%20ACT%202021.pdf.

  26. 26.

    Cybercrime Act 2015, Section 7 http://ronlaw.gov.nr/nauru_lpms/files/acts/a59d9691f5a195412b877493a2a95e8b.pdf.

  27. 27.

    Crimes Act 1961, Section 216B, https://www.legislation.govt.nz/act/public/1961/0043/latest/DLM330422.html.

  28. 28.

    Cyber Crime Act 2015, Section 9 and 12, https://lawpadi.com/wp-content/uploads/2015/08/CyberCrime_ProhibitionPreventionetc_Act_2015.pdf.

  29. 29.

    The Prevention of Electronic Crimes 2016, Section 17 https://na.gov.pk/uploads/documents/1470910659_707.pdf.

  30. 30.

    Cybercrime Code Act 2016, Section 4 https://www.parliament.gov.pg/uploads/acts/16A_35.pdf.

  31. 31.

    Law Nº 60/2018 OF 22/8/2018 on prevention and punishment of cyber crimes, Article 19 https://www.risa.rw/fileadmin/user_upload/Others%20documents/Cyber_Crimes_Law.pdf Note there are other offences relates to accessing a computer and data.

  32. 32.

    Cyber Crime Act 2020, Section 25, 26 http://www.sierra-leone.org/Laws/2020-Cybercrime%20Act.pdf.

  33. 33.

    Cybercrimes Act 2021, Section 3 https://cybercrimesact.co.za.

  34. 34.

    Electronic Crimes Bill 2009, Section 22 https://www.govt.lc/media.govt.lc/www/resources/legislation/ElectronicCrimesBill.pdf.

  35. 35.

    Electronic Crimes Bill 2017, Section 7 https://aglcskn.info/wp-content/documents/Act17TOC/Ch-04_41-Electronic-Crimes-Act.pdf.

  36. 36.

    Cybercrime Act 2016, Section 7 https://www.gov.vc/images/PoliciesActsAndBills/SVG_Cybercrime_Act_2016.pdf.

  37. 37.

    Jaani Riordan, The Liability of Internet Intermediaries, Data Retention and Interception, Oxford University Press (2016) p. 564.

  38. 38.

    The Cybercrimes Bill 2017, https://ttcsirt.gov.tt/wp-content/uploads/2022/04/Cyber_Crime_Bill_DRAFT_2017.pdf.

  39. 39.

    Computer crimes Act 2003, Section 7 https://ago.gov.to/cms/images/LEGISLATION/PRINCIPAL/2003/2003-0014/ComputerCrimesAct2003_1.pdf.

  40. 40.

    Computer Misuse Act, 2011, Section 15 https://ulii.org/akn/ug/act/2011/2/eng@2011-02-14.

  41. 41.

    Cybercrimes Act, 2015, Section 6 https://rsf.org/sites/default/files/the_cyber_crime_act_2015.pdf.

  42. 42.

    The Cyber Security and Cyber Crimes Act, 2021, Part VI https://www.parliament.gov.zm/sites/default/files/documents/acts/Act%20No.%202%20of%202021The%20Cyber%20Security%20and%20Cyber%20Crimes.pdf.

  43. 43.

    Computer Misuse Act 1990, https://www.legislation.gov.uk/ukpga/1990/18/contents.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Robert Walters .

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Walters, R. (2023). Illegal Interception of Data. In: Cybersecurity and Data Laws of the Commonwealth. Springer, Singapore. https://doi.org/10.1007/978-981-99-3935-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-3935-0_17

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-3934-3

  • Online ISBN: 978-981-99-3935-0

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics