Proclamation No. 958/2016


A PROCLAMATION TO PROVIDE FOR THE COMPUTER CRIME

WHEREAS, information and communication technology plays a vital role in the economic, social and political development of the country;

WHEREAS, unless appropriate protection and security measures are taken, the utilization of information communication technology is vulnerable to various computer crimes and other security threats that can impede the overall development of the country and endanger individual rights;

WHEREAS, the existing laws are not adequately tuned with the technological changes and are not sufficient to prevent, control, investigate and prosecute the suspects of computer crimes;

WHEREAS, it has become necessary to incorporate new legal mechanisms and procedures in order to prevent, control, investigate and prosecute computer crimes and facilitate the collection of electronic evidences;

NOW, THEREFORE, in accordance with Article 55(1) of the Constitution of the Federal Democratic Republic of Ethiopia, it is hereby proclaimed as follows:

PART ONE

GENERAL

1.Short Title

This Proclamation may be cited as the “Computer Crime Proclamation No.958/2016”.

2.Definitions

In this Proclamation unless the context otherwise requires:

1/ “Computer crime” means

a) A crime committed against a computer, computer system,
   computer data or computer network;

b) A conventional crime committed by means of a computer,
   computer system, computer data or computer network; or

c) Illegal computer content data disseminated through a computer,
   computer system, or computer network;

2/ “data processing service” means the service of reception, storage, processing, emission, routing or transmission of data by means of computer system and includes networking services;

3/ “computer or computer system” means any software and the microchips technology based data processing, storage, analysis, dissemination and communication device or any device that is capable of performing logical, arithmetic or routing function and includes accessories of that device;

4/ “computer data” means any content data, traffic data, computer program, or any other subscriber information in a form suitable for processing by means of a computer system;

5/ “computer program” means a set of instructions or commands expressed in words, codesor schemes which are capable of causing a computer system to perform or achieve a particular task or result;

6/ “traffic data” means any computer generated data relating to a chain of communication by means of a computer system indicating the communication’s origin, destination, route, time, date, duration, size or types of underlying service;

7/ “content data” means any computer data found in the form of audio, video, picture, arithmetic formula or any other form that conveys the essence, substance, meaning or purpose of a stored or transmitted computer data or computer communication;

8/ “network” means the interconnection of two or more computer systems by which data processing service can be provided or received;

9/ “computer data security” means the protection of a computer data from deleting, changing, and accessing by unauthorized person, compromising its confidentiality or any other damage;

10/ “access” means to communicate with, to enter in, store in, store data in, retrieve, or obtain data from, to view, to receive, move or copy data from a computer system, or otherwise make use of any data processing service thereof;

11/ “critical infrastructure” means a computer system, network or data where any of the crimes stipulated under article 3 to 6 of this proclamation, is committed against it, would have a considerable damage on public safety and the national interest;

12/ “interception” means real-time surveillance, recording, listening, acquisition, viewing, controlling or any other similar act of data processing service or computer data;

13/ “service provider” means a person who provides technical data processing or communication service or alternative infrastructure to users by means of computer system;

14/ “Attorney General” means head of the Federal Attorney General appointed by the House of Peoples Representatives;

15 “Public prosecutor” means lawyer appointed by the Attorney General and administered by public prosecutors administration regulation and included the Attorney General and the deputy attorney generals;

16/ “investigatory organ” mean a person legally invested with the power of investigation;

17/ “regional state” means any state referred to in Article 47(1) of the Constitution of the Federal Democratic Republic of Ethiopia and for the purpose this Proclamation it includes Addis Ababa and Dire Dawa city administrations;

18/ “police” mean Federal Police or Regional State Police to whom the power of the Federal Police is delegated;

19/ “Agency” mean Information Network Security Agency;

20/ “person” means a physical or juridical person;

21/ any expression in the masculine gender includes the feminine.

PART TWO

COMPUTER CRIMES

SECTION ONE

CRIMES AGAINST COMPUTER SYSTEM AND COMPUTER DATA

3. Illegal Access

1/ Whosoever, without authorization or in excess of authorization, intentionally secures access to the whole or any part of computer system, computer data or network shall be punishable with simple imprisonment not exceeding three years or fine from Birr 30,000 to 50, 000 or both.

2/ Where the crime stipulated under sub-article (1) of this Article is committed against:

a) a computer system, computer data or network that is exclusively destined for the use of
   a legal person, the punishment shall be rigorous imprisonment
   from three years to five years and fine from Birr 30,000 to 50,000;

b) a critical infrastructure, the punishment shall be rigorous imprisonment
   from five years to ten years and fine from Birr 50,000 to 100,000.

4. Illegal Interception

1/ Whosoever, without authorization or in excess of authorization, intentionally intercepts non-public computer data or data processing service shall be punishable with rigorous imprisonment not exceeding five years and fine from Birr 10,000 to 50,000.

2/ Where the crime stipulated under sub-article (1) of this Article is committed against:

a) a computer data or data processing service that is exclusively destined for the use
   of a legal person, the punishment shall be rigorous imprisonment
   from five years to ten years and fine from Birr 50,000 to 100,000.

b) a critical infrastructure, the punishment shall be rigorous imprisonment
   from ten years to fifteen years and fine from Birr 100,000 to 200,000.

5. Interference with Computer System

1/ Whosoever, without authorization or in excess of authorization, intentionally hinders,impairs, interrupts or disrupts the proper functioning of the whole or any part of computer system by inputting, transmitting, deleting or altering computer data shall be punishable with rigorous imprisonment from three years to five years and fine not exceeding Birr 50,000.

2/ where the crime stipulated under sub-article (1) of this Article is committed against:

a) a computer system that is exclusively destined for the use of a legal person,the punishment
   shall be rigorous imprisonment from five years to ten years and fine from Birr 50,000 to 100,000;

b) a critical infrastructure, the punishment shall be rigorous imprisonment from
   ten years to fifteen years and fine from Birr 100,000 to 200,000 or, in serious case,
   rigorous imprisonment from fifteen years to twentey years and fine from Birr 200,000 to 500,000.

6. Causing Damage to Computer Data

1/ Whosoever, without authorization or in excess of authorization, intentionally alters, deletes, suppresses a computer data, renders it meaningless, useless or inaccessible to authorized users shall be punishable with rigorous imprisonment not exceeding three years and fine not exceeding Birr 30,000.

2/ Where the crime stipulated under sub-article (1) of this Article is committed against:

a) a computer data that is exclusively destined for the use of a legal person, the punishment
   shall be rigorous imprisonment from three years to five years and fine from Birr 30,000 to 50,000;

b) a critical infrastructure, the punishment shall be rigorous imprisonment
   from five years to ten years and fine from Birr 50,000 to 100,000.

7. Criminal Acts Related to Usage of Computer Devices and Data

1/ Whosoever, knowing that it can cause damage to computer system, computer data or network, intentionally transmits any computer program exclusively designed or adapted for this purpose shall be punishable with simple imprisonment not exceeding five years or fine not exceeding Birr 30,000.

2/ Whosoever, knowing that it is to be used for the commission of unlawful act specified under Articles 3 to 6 of this Proclamation, intentionally imports, produces, offers for sale, distributes or makes available any computer device or computer program designed or adapted exclusively for the purpose of committing such crimes shall be punishable with rigorous imprisonment not exceeding five years and fine from Birr 10,000 to 50,000.

3/ Whosoever possesses any computer devices or data specified under sub-article (1) or (2) of this Article with the intention to further the commission of any of the crimes specified under Articles 3 to 6 of this Proclamation shall be punishable with simple imprisonment not exceeding three years or fine from Birr 5,000 to 30, 000.

4/ Whosoever, without authorization or in excess of authorization, intentionally discloses or transfers any computer program, secret code, key, password or any other similar data for gaining access to a computer system, computer data or network shall be punishable with simple imprisonment not exceeding five years or in serious cases with rigorous imprisonment not exceeding five years and fine from Birr 10,000 to 50,000.

5/ Where the crime stipulated under sub-article (4) of this Article is committed negligently, the punishment shall be simple imprisonment not exceeding one year and fine not exceeding Birr 10,000.

8. Aggravated Cases

Where the crime stipulated under Article 3 to 6 of this Proclamation is committed:

a) against a computer data or a computer system or network which is designated as top secrete by the concerned body for military interest or international relation, or

b) while the country is at a state of emergency or threat,the punishment shall be rigorous imprisonment from fifteen years to twenty five years.

SECTION TWO

COMPUTER RELATED FORGERY, FRAUD AND THEFT

9. Computer Related Forgery

Whosoever falsifies a computer data, makes false computer data or makes use of such data to injure the rights or interests of another or to procure for himself or for another person any undue right or advantage shall be punishable with simple imprisonment not exceeding three years and fine not exceeding Birr 30,000 or in a serious cases with rigorous imprisonment not exceeding ten years and fine from Birr 10,000 to 100,000.

10. Computer Related Fraud

1/ Whosoever fraudulently causes a person to act in a manner prejudicial to his rights or those of third person by distributing misleading computer data, misrepresenting his status, concealing facts which he had a duty to reveal or taking advantage of the person’s erroneous beliefs, shall be punishable with rigorous imprisonment not exceeding five years and fine not exceeding Birr 50,000.

2/ Whosoever, with fraudulent intent of procuring any benefit for himself or for another person, causes economic loss to another person by any change, deletion or any other damage of computer data shall be punishable with rigorous imprisonment not exceeding five years and fine from Birr 10,000 to 50,000 or in serious cases with rigorous imprisonment not exceeding ten years and fine from Birr 10,000 to 100,000.

11. Electronic Identity Theft

Whosoever, with intent to commit criminal act specified under Article 10 of this Proclamation or for any other purpose produces, obtains, sales, possesses or transfers any data identifying electronic identity of another person without authorization of that person shall be punishable with simple imprisonment not exceeding five years or fine not exceeding Birr 50,000.

SECTION THREE

ILLEGAL CONTENT DATA

12. Obscene or Indecent Crimes Committed Against Minors

1/ Whosoever intentionally produces, transmits, sales, distributes, makes available or possesses without authorization any picture, poster, video or image through a computer system that depicts:

a) a minor engaged in sexually explicit conduct; or

b) a person appearing to be a minor engaged in sexually explicit conduct;
   shall be punishable with rigorous imprisonment from three years to ten years.

2/ Whosoever entices or solicits a minor for sexual explicit conduct by transmitting or sending erotic speeches, pictures, text messages or videos through computer system shall be punishable with rigorous imprisonment from five years to ten years.

13. Crimes against Liberty and Reputation of Persons

Whosoever intentionally:

1/ intimidates or threatens another person or his families with serious danger or injury by disseminating any writing, video, audio or any other image through a computer systems shall be punishable, with simple imprisonment not exceeding three years or in a serious cases with rigorous imprisonment not exceeding five years.

2/ causes fear, threat or psychological strain on another person by sending or by repeatedly transmitting information about the victim or his families through computer system or by keeping the victim’s computer communication under surveillance shall be punishable with simple imprisonment not exceeding five years or in serious case with rigorous imprisonment not exceeding ten years.

3/ disseminates any writing, video, audio or any other image through a computer system that is defamatory to the honor or reputation of another person shall be punishable, upon complaint, with simple imprisonment not exceeding three years or fine not exceeding Birr 30,000or both.

14. Crimes against Public Security

Without prejudice to the provisions Article 257 of the Criminal Code of the Federal Democratic Republic of Ethiopia, Whosoever intentionally disseminates through a computer system any written, video, audio or any other picture that incitesviolence, chaos or conflict among people shall be punishable with rigorous imprisonment not exceeding three years.

15. Dissemination of Advertisement through computer system

1/ Whosoever, with intent to advertise or sell any product or service, disseminates advertisement messages through e-mail or related computer address without prior consent from the recipient shall be punishable with simple imprisonment not exceeding three years and fine not exceeding Birr 30,000. or, in serious case, with rigorous imprisonment not exceeding five years and fine not exceeding Birr 50,000.

2/ Notwithstanding the provision of sub-article (1) of this Article, dissemination of commercial advertisement through email account shall not be punishable provided that:

a) the primary purpose of the advertisement is to introduce customers with new products or services
   and the customers have willing; or

b) the advertisement contains valid identity and address of the sender, and valid and
   simple way for the recipient to reject or unsubscribe receipt of further advertisement
   from the same source.

16. Criminal Liability of Service Providers

A service provider shall be criminally liable in accordance with Articles 12 to 14, of this Proclamation for any illegal computer content data disseminated through its computer systems by third parties, if it has:

1/ directly involved in the dissemination or edition of the contentdata;

2/ upon obtaining actual knowledge that the content data is illegal, failed to take any measure to remove or to disable access to the content data; or

3/ failed to take appropriate measure to remove or to disable access to the content data upon obtaining notice from competent administrative authorities.

SECTION FOUR

OTHER OFFENCES

17. Failure to Cooperate and Hindrance of Investigation

Whosoever:

1/ fails to comply with the obligations provided for under of Article 24(2) Article 25(6), Article 30 (2), Article 31(2) or Article 32 (4) of this Proclamation shall be punishable with simple imprisonment not exceeding one year or fine not exceeding Birr 10,000;

2/ intentionally hinders the investigation process of computer crimes conducted pursuant to this Proclamation shall be punishable with rigorous imprisonment not exceeding five years and fine not exceeding Birr 50,000.

18. Criminal Act Stipulated in Other Laws

Where any crime other than those provided for under this Part is committed by means of a computer, the relevant law shall apply.

19. Concurrent Crimes

Where any of the criminal acts provided for under this Part has resulted in the commission of another crime punishable under any special law or criminal code, the relevant provision shall apply concurrently.

20. Penalty Imposed on Juridical Person

Notwithstanding Article 90 (1), (3) and (4) of the Criminal Code of the Federal Democratic Republic of Ethiopia, where any offence stipulated under this Part is committed by juridical person,

1/ the penalty shall be fine from Birr 50,000 to 500,000 for a crime punishable with fine;

2/ when the penalty provided for is imprisonment, the penalty shall be:

a) a fine not exceeding 50,000 Birr for a crime punishable
   with simple imprisonment not exceeding three years,

b) a fine not exceeding 100,000 Birr for a crime punishable
   with simple imprisonment not exceeding five years,

c) a fine not exceeding 150,000 Birr for a crime punishable
   with rigorous imprisonment not exceeding five years,

d) a fine not exceeding 200,000 Birr for a crime punishable
   with rigorous imprisonment not exceeding ten years,

e) a fine of up to the general maximum laid down in sub-article (1) of this Article
   for a crime punishable with rigorous imprisonment exceeding ten years.

3/ Where fine is expressly provided as punishment for a crime, it shall be five fold.

PART THREE

PREVENTIVE AND INVESTIGATIVE MEASURES

21. Principle

The prevention, investigation and evidence procedures provided in this Part and Part Four of this Proclamation shall be implemented and applied in a manner that ensure protection for human and democratic rights guaranteed under the Constitution of the Federal Democratic Republic of Ethiopia and all international agreements ratified by the country.

22. General

1/ Computer crime prevention and investigation shall be conducted in accordance with the provisions of this Part.

2/ Without prejudice the provisions of this Part, for issues not clearly covered in this law,the provisions of the Criminal Code and other relevant laws shall be applicable to computer crimes.

23. Investigative Power

1/ The public prosecutor and police shall have joint power to investigate criminal acts provided for in this Proclamation. And the public prosecutor shall lead the investigation process.

2/ Where requested to support the investigation process, the Agency shall provide technical support, conduct analysis on collected information, and provide evidences if necessary.

24. Retention of Computer Data

1/ Without prejudice to any provision stipulated in other laws, any service provider shall retain the computer traffic data disseminated through its computer systems or traffic data relating to data processing or communication service for one year.

2/ The data shall be kept in secret unless the court orders for disclosure.

25. Real-time Collection of Computer Data

Without prejudice special provisions stipulated under other laws,

1/ to prevent computer crimes and collect evidence related information, the investigatory organ may, request court warrant to intercept in real-time or conduct surveillance, on computer data, data processing service, or internet and other related communications of suspects, and the court shall decide and determine a relevant organ that could execute interception or surveillance as necessary

2/ Sub-article (1) of this Article shall only be applicable when there is no other means readily available for collecting such data and this is approved and decided by the Attorney General.

3/ Notwithstanding the provisions of sub-article (1) and (2) of this Article, the Attorney General may give permission to the investigatory organ to conduct interception or surveillance without court warrant where there are reasonable grounds and urgent cases to believe that a computer crime that can damage critical infrastructure is or to be committed.

4/ The Attorney General shall present the reasons for interception or surveillance without court warrant under sub-article (3) of this Article to the President of the Federal High Court within 48 hours, and the president shall give appropriate order immediately.

5/ Any irrelevant information collected pursuant to sub-articles (1) to (4) of this Article shall be destroyed immediately upon the decision of the Attorney General.

6/ Any service provider shall cooperate when requested to carry on activities specified under sub-articles (1) and (3) of this Article.

7/ Without prejudice sub-article (5) of this Article, any information collected in accordance with this Article shall be kept confidential.

26. Protection of Computer, Computer System or Infrastructure from Danger

1/ Where there are reasonable grounds to believe that a computer crimeis to be committed and it is necessary to prevent and control the crime, provide early warning to citizens, to minimize the risks or for effectiveness of the investigation, the Agency, in collaboration with the investigatory organ, and upon court warrant, may conduct sudden searches, conduct digital forensic investigation, provide appropriate security equipment or take other similar measures on computers, computer systems or infrastructures that are suspected to be attacked or deemed to be the sources of attack.

2/ For the implementation of the provision of sub-article (1) of this Article,as may be necessary and upon request, concerned organs shall have duty to cooperate.

27. Duty to Report

1/ Any service provider or government organ who has knowledge of the commission of the crimes stipulated in this Proclamation or dissemination of any illegal content data by third parties through the computer system it administers shall immediately notify the Agency, accordingly report to the police about the crime and take appropriate measures.

2/ The Agency may issue a directive as to the form and procedures of reporting.

28. Arrest and Detention

With out prejudice the provisions stipulated in special laws,

1/ where there are reasonable grounds to believe that a computer crime is committed or under commission, police may arrest suspects in accordance with the provisions of the Criminal Procedure Code.

2/ Where the investigation on the person arrested pursuant to sub-article (1) of this Article is not completed, remand may be granted in accordance with the provisions of the Criminal Procedure Code; provided, however, the overall remand period may not exceed four months.

PART FOUR

EVIDENTIARY AND PROCEDURAL PROVISIONS

29. General

1/ Computer crime proceedings and collection of evidence shall be conducted in accordance with the provisions of this Part.

2/ Without prejudice to the provisions of this Part, the General Part provisions of the Criminal Code and the Criminal Procedure Code shall be applicable to computer Crimes.

30. Order for Preservation of Computer Data

1/ Where there are reasonable grounds to believe that a computer data required for computer crime investigation is vulnerable to loss or modification, the investigatory organ may order, in writing, a person to preserve the specified data under his control or possession.

2/ The person ordered under sub-article (1) of this Article shall immediately take necessary measures to secure the specified computer data and preserve it for three months and keep such order confidential.

3/ The investigatory organ may order only a one-time extension for another three months up on the expiry of the period stipulated under sub-article (2) of this Article.

31. Order for Obtaining of Computer Data

1/ Where a computer data under any person’s possession or control is reasonably required for purposes of a computer crime investigation, the investigatory organ may apply to the court to obtain or gain access to that computer data.

2/ If the court is satisfied, it may, without requiring the appearance of the person concerned, order the person who is in possession or control of the specified computer data, to produce it to the investigatory organ or give access to same.

32. Access, Search and Seizure

1/ Where it is necessary for computer crime investigation, the investigatory organ may,upon getting court warrant, search or access physically or virtually any computer system, network or computer data.

2/ Where the investigatory organ reasonably believes that the computer data sought is stored in another computer system and can be obtained by same computer system, the search or access may be extended to that other computer system without requesting separate search warrant.

3/ In the execution of search under sub-article (1) or (2) of this Article, the investigatory organ may:

a) seize any computer system or computer data;

b) make and retain a copy or photograph data obtained through search;

c) maintain the integrity of the relevant stored data by using any technology;

d) render inaccessible the stored data from the computer system on which search is conducted; or

e) recover deleted data.

4/ In the execution of search, the investigatory organ may order any person who has knowledge in the course of his duty about the functioning of the computer system or network or measures applied to protect the data therein to provide the necessary information or computer data that can facilitate the search or access..

5/ Where the investigatory organ finds the functioning of a computer system or computer data is in violation of the provisions this Proclamation or other relevant laws, it may request the court to order for such computer data or computer system to be rendered inaccessible or restricted or blocked. The court shall give the appropriate order within 48 hours after the request is presented.

6/ Where the search process on juridical person requires the presence of the manager or his agent, the investigatory organ shall take appropriate measure to do so.

33. Admissibility of Evidences

1/ Any document or a certified copy of the document or a certified printout of any electronic record relating to computer data seized in accordance with this Proclamation may be produced as evidence during court proceedings and shall be admissible.

2/ Without prejudice to the admissibility of evidences to be produced in accordance with the Criminal Procedure Code and other relevant laws, any digital or electronic evidence:

a) produced in accordance with this Proclamation; or

b) obtainedby appropriate foreign law enforcement bodies in accordance with Ethiopian Law
   shall be admissible in court of law in relation to computer crimes

34. Authentication

Without prejudice to the authentication of written documents stipulated in other laws, any person who produces evidences provided under Article 33 of this Proclamation in a court proceeding has the burden to prove its authenticity.

35. Original Electronic Document

1/ Any electronic record which is obtained upon proof of the authenticity of the electronic records system or by which the data was recorded or stored shall be presumed original electronic document.

2/ Without prejudice to sub-article (1) of this Article, the electronic printout which is obtained using a secured system under regular operation shall be considered original electronic evidence.

3/ Where the authenticity of an electronic record is not proved, any evidence that shows the following fact shall be admissible.

a) the computer system was operating properly or the fact of its not operating
   properly did not affect the integrity of the electronic record; or

b) it is established that the electronic record was recorded or stored by a party to
   the proceedings who is adverse in interest to the other litigant party seeking to introduce it; or

c) it is established that the electronic record was recorded or stored in the usual and
   ordinary course of business by a person who is not a party to the proceedings and
   who did not record or store it under the control of the party seeking to introduce the record.

36. Presumption of Courts

When assessing the admissibility of evidence in accordance with this Proclamation, the court may have regard to the procedure, standard or manner in which a similar computer system is functioning.

37. Burden of proof

1/ Public prosecutor has the burden of proofing material facts regarding the cases brought to the court in accordance with the standards stipulated in law.

2/ Notwithstanding the provisions of sub-article (1) of this Article, upon proof of basic facts of the case by the public prosecutor if the court believes necessary to shift the burden of proofing to the accused, the court may do so.

PART FIVE

INSTITUTIONS THAT FOLLOW UP CASES OF COMPUTER CRIME

38. Public Prosecutor and Police Following up Cases of Computer Crime

1/ A Public prosecutor or investigative officer empowered to follows up computer crime cases in accordance with the powers conferred by law shall have the responsibility to enforce and cause to enforce the provisions of this Proclamation.

2/ The Attorney General and Police empowered in this Proclamation may organize separate specialized task units when necessary to follow up computer crimes.

39.Duty of the Agency

The Agency shall have duty to establish online computer crimes investigation system and provide other necessary investigation technologies.

40. Jurisdiction

1/ The Federal High Court shall have first instance jurisdiction over computer crime stipulated under this Proclamation.

2/ The judicial jurisdictions stipulated under Article 13 and Article 17 (1) (b) of the Federal Democratic Republic of Ethiopia Criminal Code shall include computer crimes.

41. Establishment of Executing Task Force

1/ Without prejudice the power of the Agency to lead national cyber security operation as stipulated in other relevant laws, a National ExecutingTask Force comprising the Federal Attorney General the Federal Police Commission, and other relevant bodies shall be established in order to prevent and control computer crimes.

2/ The Federal Attorney General shall lead the ExecutingTask Force, identify other relevant organizations to be incorporated in the Task Force and ensure their representation.

3/ The Task Force shall,for the prevention and control computer crimes, develop national discussion forum, discuss on occasional dangers materialized and provide recommendation thereof, design short and long term plans to be performed by the respective institutionsas well as put in place synchronized system by coordinating various relevant organs.

PART SIX

MISCELLANEOUS PROVISIONS

42. International Cooperation

1/ The Federal Attorney General shall cooperate or enter in to an agreement with the competent authority of another country in matters concerning computer crime, including the exchange of information, joint investigations, and extradition and other assistances in accordance with this Proclamation and agreements to which Ethiopia is a party and within the limits of the country’s legal system.

2/ For the effective implementation of this Proclamation, the investigatory organ may exchange information with institutions of another country having similar mission, perform joint cooperation in other forms or sign agreement with institutions of another country, when necessary.

3/ Any information or evidence obtained pursuant to this Article shall apply for the purpose of prevention or investigation of computer crimes.

43. Suspension, Confiscation or Blockage of Computer System or Asset

1/ The court, in sentencing an offender under this Proclamation, may give additional order for the suspension, confiscation or removal of any computer system, data or device or blockage of data processing service used in the perpetration of the offence.

2/ The property or proceedings of the accused that he directly acquired through the computer crime for which he has been convicted shall be confiscateif the accused is convicted through a final decision;

3/ Other relevant laws shall be applicable for the implementation of this article.

44. Power to Issue Regulationand Directive

1/ The Council of Ministers may issue regulations necessary for the implementation of this Proclamation.

2/ The Agency may issue directives necessary for the effective implementation of this Proclamation.

45. Repeal and Inapplicable Laws

1/ Articles 706 to 711 of the Criminal Code of the Federal Democratic Republic of Ethiopia and article 5 of Telecom Fraud Offence proclamation no. 761/2012 are hereby repealed.

2/ No proclamation, regulations, directives or practices shall, in so far as they are inconsistent with this Proclamation, be applicable with respect to matters provided for by this Proclamation.

46.Effective Date

This Proclamation shall enter into force on the date of its publication in the Federal Negarit Gazette.

Done at Addis Ababa, this 7th day of July, 2016

MULATU TESHOME (Dr.)
PRESIDENT OF THE FEDERAL DEMOCRATIC REPUBLIC OF ETHIOPIA