SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
In	
  the	
  name	
  of	
  the	
  people	
  	
  
The	
  Presidency	
  Council	
  	
  
	
  
Based	
  on	
  what	
  has	
  been	
  approved	
  by	
  the	
  Council	
  of	
  Representatives	
  and	
  ratified	
  
by	
  the	
  Presidency	
  Council,	
  and	
  pursuant	
  to	
  the	
  first	
  clause	
  of	
  Article	
  (61)	
  and	
  the	
  
third	
  clause	
  of	
  Article	
  (73)	
  of	
  the	
  constitution,	
  the	
  following	
  Act	
  has	
  been	
  passed:	
  	
  
	
  
                                               Act	
  No.	
  (	
  	
  	
  )	
  for	
  the	
  year	
  2011	
  
                                           Information	
  Technology	
  Crimes	
  
                                                                                  	
  
                                                             Chapter	
  One	
  
                                                                                  	
  
Definitions	
  and	
  objectives	
  
	
  
Article	
  (1):	
  	
  The	
  following	
  expressions	
  shall	
  have	
  the	
  meanings	
  mentioned	
  towards	
  
                        them,	
  for	
  the	
  purposes	
  of	
  this	
  Act:	
  

First-­‐	
  The	
  computer:	
  Each	
  device	
  or	
  group	
  of	
  devices	
  connected	
  with	
  each	
  other	
  
            that	
  conduct	
  automated	
  processing	
  of	
  data.	
  
	
  
Second-­‐	
  Automated	
  processing	
  of	
  data:	
  the	
  processes	
  and	
  functions	
  that	
  subject	
  
              to	
  computer’s	
  data	
  to	
  create,	
  send,	
  receive,	
  save,	
  and	
  supply	
  them	
  by	
  
              any	
  means.	
  
	
  
Third-­‐	
  Computer	
  data:	
  Facts,	
  information,	
  concepts,	
  or	
  any	
  other	
  means	
  used	
  in	
  
            any	
  form	
  to	
  conduct	
  the	
  automated	
  processing	
  of	
  data	
  including	
  the	
  
            software	
  and	
  systems.	
  
	
  
Fourth-­‐	
  Software:	
  Set	
  of	
  orders	
  that	
  make	
  the	
  system	
  able	
  to	
  perform	
  automated	
  
              processing	
  of	
  data.	
  
	
  
Fifth-­‐	
  Authorities	
  to	
  provide	
  information	
  services:	
  Every	
  natural	
  or	
  judicial	
  person	
  
            providing	
  the	
  users	
  with	
  the	
  website	
  services	
  that	
  allow	
  the	
  computers	
  to	
  
            connect	
  to	
  each	
  other	
  or	
  to	
  any	
  other	
  person	
  who	
  processes	
  the	
  saved	
  data	
  
            on	
  behalf	
  of	
  the	
  service	
  provider.	
  
	
  
Institute	
  for	
  International	
  Law	
  and	
  Human	
  Rights	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  10	
  August	
  2011	
  
	
  
	
  	
  

Sixth-­‐	
  Access	
  data:	
  Codes	
  or	
  figures	
  for	
  logging	
  into	
  the	
  network,	
  devices,	
  
         computers,	
  or	
  any	
  similar	
  definition	
  data	
  sent	
  from	
  or	
  to	
  a	
  point	
  of	
  
         communication	
  including	
  the	
  date,	
  size	
  and	
  time	
  of	
  communication	
  and	
  any	
  
         information	
  that	
  identify	
  the	
  location	
  that	
  the	
  information	
  transferred	
  from	
  
         it	
  or	
  to	
  it	
  by	
  any	
  means	
  of	
  communications	
  including	
  cellular	
  communication.	
  
	
  
Seventh-­‐	
  Subscription	
  data:	
  information	
  required	
  by	
  the	
  service	
  provider	
  and	
  are	
  
                     necessary	
  to	
  identify	
  and	
  distinguish	
  the	
  physical	
  address	
  of	
  the	
  
                     subscriber	
  or	
  the	
  user	
  or	
  to	
  identify	
  the	
  account	
  of	
  the	
  recipient	
  of	
  the	
  
                     communication	
  service	
  from	
  the	
  service	
  provider	
  that	
  includes	
  any	
  
                     information	
  relating	
  to	
  the	
  website,	
  devices,	
  individuals,	
  computers,	
  
                     definition	
  data,	
  services,	
  fees,	
  real	
  place	
  of	
  the	
  devices	
  if	
  they	
  were	
  
                     different	
  from	
  the	
  site	
  that	
  provides	
  access	
  data.	
  
	
  
Eighth-­‐	
  Electronic	
  card:	
  Credit	
  cards,	
  payment	
  or	
  draw	
  cards,	
  or	
  any	
  other	
  card	
  
               issued	
  by	
  an	
  entity	
  licensed	
  by	
  law.	
  
	
  
Ninth-­‐	
  Internet:	
  Set	
  of	
  computers	
  or	
  information	
  processing	
  systems	
  connected	
  
               with	
  each	
  other	
  to	
  obtain	
  the	
  data	
  and	
  information	
  and	
  exchange	
  them	
  
               such	
  as	
  the	
  private	
  networks,	
  public	
  networks,	
  and	
  global	
  networks	
  of	
  the	
  
               internet	
  and	
  the	
  like.	
  
	
  
Tenth-­‐	
  	
  Electronic	
  signature:	
  a	
  personal	
  sign	
  that	
  take	
  the	
  form	
  of	
  letters,	
  figures,	
  
               codes,	
  marks,	
  sounds	
  or	
  others	
  that	
  has	
  unique	
  character	
  indicates	
  its	
  
               belonging	
  to	
  the	
  website	
  and	
  to	
  be	
  approved	
  by	
  the	
  certifier.	
  
	
  
Eleventh-­‐	
  Electronic	
  means:	
  the	
  technology	
  of	
  using	
  electrical,	
  magnetic,	
  optical,	
  
                     electromagnetic,	
  or	
  any	
  similar	
  means	
  in	
  creating,	
  processing,	
  
                     exchanging,	
  and	
  saving	
  the	
  information.	
  	
  	
  
	
  	
  
Twelfth-­‐	
  Information:	
  Date,	
  texts,	
  images,	
  shapes,	
  sounds,	
  codes,	
  database,	
  
                 computer	
  software,	
  and	
  the	
  like	
  that	
  create,	
  save,	
  process,	
  or	
  send	
  by	
  
                 electronic	
  means.	
  
Thirteenth-­‐	
  E-­‐mail:	
  Letter	
  contains	
  information	
  to	
  be	
  created,	
  merged,	
  saved,	
  
            sent,	
  received	
  in	
  whole	
  or	
  in	
  part	
  by	
  electronic,	
  digital,	
  optical	
  or	
  any	
  
            other	
  similar	
  means.	
  



	
                                                                                                                                                                                                                                                                2	
  
Institute	
  for	
  International	
  Law	
  and	
  Human	
  Rights	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  10	
  August	
  2011	
  
	
  
	
  	
  

	
  
Fourteenth-­‐	
  Information	
  processing	
  system:	
  the	
  electronic	
  system	
  used	
  to	
  create	
  
                            messages	
  of	
  information,	
  and	
  to	
  send,	
  receive,	
  process,	
  or	
  save	
  them	
  
                            in	
  any	
  other	
  means.	
  
	
  
Fifteenth-­‐	
  	
  	
  Electronic	
  certificate:	
  The	
  certificate	
  issued	
  by	
  the	
  legally	
  licensed	
  
                           entity	
  to	
  show	
  the	
  belonging	
  of	
  the	
  electronic	
  signature	
  to	
  a	
  specific	
  
                           person	
  based	
  on	
  documented	
  procedures	
  approved	
  by	
  the	
  law.	
  
	
  
Article	
  2-­‐	
  This	
  Act	
  aims	
  at	
  providing	
  legal	
  protection	
  for	
  the	
  legal	
  use	
  of	
  the	
  
computer	
  hardware	
  and	
  the	
  internet,	
  and	
  punishes	
  the	
  natural	
  or	
  judicial	
  persons	
  
who	
  violate	
  the	
  rights	
  of	
  the	
  users	
  of	
  these	
  devices	
  and	
  prevents	
  misusing	
  them	
  in	
  
the	
  information	
  technology	
  crimes.	
  
	
  
                                                               Chapter	
  two	
  
                                                                        	
  	
  
                                                        Punishment	
  provisions	
  
                                                                        	
  
Article	
  3	
  	
  
First-­‐	
  The	
  penalty	
  shall	
  be	
  life	
  imprisonment	
  and	
  a	
  fine	
  of	
  not	
  less	
  than	
  
              (25000000)	
  twenty	
  five	
  million	
  ID	
  and	
  not	
  exceeding	
  (50	
  000000)	
  fifty	
  million	
  
              ID	
  for	
  anyone	
  who	
  uses	
  intentionally	
  the	
  computer	
  hardware	
  and	
  the	
  
              internet	
  with	
  the	
  intention	
  of	
  committing	
  one	
  of	
  the	
  following	
  acts:	
  
	
  
A-­‐ Affect	
  the	
  independency	
  and	
  the	
  unity	
  of	
  the	
  country,	
  or	
  its	
  high	
  economic,	
  or	
  
            political,	
  or	
  military,	
  or	
  security	
  interests.	
  
B-­‐	
  Participate,	
  negotiate,	
  promote,	
  make	
  contract,	
  or	
  deal	
  with	
  the	
  enemy	
  in	
  any	
  
            way	
  in	
  order	
  to	
  destabilize	
  the	
  security	
  and	
  public	
  order,	
  or	
  expose	
  the	
  
            country	
  to	
  dangers.	
  
	
  C-­‐	
  damage,	
  defect	
  or	
  hinder	
  devices,	
  computer	
  systems,	
  software,	
  or	
  the	
  
            information	
  network	
  that	
  belong	
  to	
  the	
  security,	
  military,	
  or	
  intelligence	
  
            agencies	
  with	
  the	
  intention	
  of	
  affecting	
  the	
  internal	
  or	
  external	
  security	
  of	
  the	
  
            country,	
  or	
  exposing	
  them	
  to	
  dangers.	
  
	
  
Second-­‐	
  Any	
  person	
  uses	
  intentionally	
  the	
  computer	
  hardware	
  and	
  their	
  software	
  
                     or	
  their	
  systems	
  or	
  the	
  information	
  network	
  of	
  the	
  security,	
  military,	
  or	
  
                     intelligence	
  agencies	
  with	
  the	
  intention	
  of	
  harming	
  them	
  or	
  copying	
  from	
  


	
                                                                                                                                                                                                                                                                3	
  
Institute	
  for	
  International	
  Law	
  and	
  Human	
  Rights	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  10	
  August	
  2011	
  
	
  
	
  	
  

                                                       them	
  or	
  with	
  the	
  intention	
  of	
  sending	
  their	
  content	
  to	
  the	
  enemy	
  or	
  
                                                       taking	
  advantage	
  of	
  them	
  to	
  execute	
  crimes	
  against	
  the	
  internal	
  or	
  
                                                       external	
  security	
  of	
  the	
  country,	
  or	
  to	
  facilitate	
  hiding	
  the	
  traces	
  of	
  such	
  
                                                       crimes	
  or	
  covering	
  them	
  shall	
  be	
  punished	
  by	
  the	
  penalty	
  stipulated	
  in	
  
                                                       this	
  Article.	
  
	
  
Article	
  4-­‐	
  The	
  penalty	
  shall	
  be	
  life	
  imprisonment	
  and	
  a	
  fine	
  of	
  not	
  less	
  than	
  
                (25000000)	
  twenty	
  five	
  million	
  ID	
  and	
  not	
  exceeding	
  (50	
  000000)	
  fifty	
  
                million	
  ID	
  for	
  anyone	
  who	
  sets	
  up	
  or	
  manage	
  a	
  website	
  on	
  the	
  information	
  
                network	
  with	
  the	
  intention	
  of	
  committing	
  one	
  of	
  the	
  following	
  acts:	
  -­‐	
  
	
  
First-­‐	
  Execute	
  terrorist	
  operations	
  under	
  fictitious	
  names	
  or	
  facilitate	
  the	
  
                communication	
  with	
  the	
  leaders	
  and	
  members	
  of	
  the	
  terrorist	
  groups.	
  
	
  
	
  Second-­‐	
  Promote	
  terrorist	
  acts	
  and	
  their	
  ideas	
  or	
  publish	
  information	
  about	
  
                manufacturing,	
  preparing	
  and	
  using	
  the	
  incendiary	
  or	
  explosive	
  devices,	
  or	
  
                any	
  tools	
  or	
  other	
  materials	
  used	
  in	
  planning	
  or	
  executing	
  the	
  terrorist	
  acts.	
  
	
  
Article	
  5-­‐	
  The	
  penalty	
  shall	
  be	
  life	
  imprisonment	
  and	
  a	
  fine	
  of	
  not	
  less	
  than	
  
                       (30000000)	
  thirty	
  million	
  ID	
  and	
  not	
  exceeding	
  (40	
  000000)	
  forty	
  million	
  
                       ID	
  for	
  whoever	
  commits	
  one	
  of	
  the	
  following	
  acts:	
  -­‐	
  
	
  
First	
  -­‐	
  set	
  up	
  a	
  website	
  or	
  publish	
  information	
  on	
  the	
  information	
  network	
  for	
  the	
  
                purpose	
  of	
  conducting	
  or	
  facilitating	
  any	
  form	
  of	
  human	
  trafficking,	
  or	
  
                promoting	
  it,	
  helping	
  to	
  conduct	
  it,	
  making	
  contracts,	
  dealing,	
  or	
  
                negotiating	
  for	
  the	
  purpose	
  of	
  concluding	
  bargains	
  relating	
  to	
  any	
  form	
  of	
  
                human	
  trafficking.	
  
	
  
	
  Second	
  -­‐	
  set	
  up	
  a	
  website	
  or	
  publish	
  information	
  on	
  the	
  information	
  network	
  for	
  
                the	
  purpose	
  of	
  trading	
  in	
  narcotic	
  or	
  mind	
  altering	
  substances	
  and	
  the	
  like,	
  
                or	
  promoting	
  them,	
  using	
  them,	
  facilitate	
  dealing	
  with	
  them,	
  making	
  
                contracts,	
  dealing,	
  or	
  negotiating	
  for	
  the	
  purpose	
  of	
  concluding	
  bargains	
  
                relating	
  to	
  any	
  form	
  of	
  trading	
  in	
  them.	
  
	
  
Article	
  6-­‐	
  The	
  penalty	
  shall	
  be	
  life	
  imprisonment	
  or	
  temporary	
  detention	
  and	
  a	
  
                       fine	
  of	
  not	
  less	
  than	
  (25000000)	
  twenty	
  five	
  million	
  ID	
  and	
  not	
  
                       exceeding	
  (50	
  000000)	
  fifty	
  million	
  ID	
  for	
  anyone	
  who	
  uses	
  the	
  


	
                                                                                                                                                                                                                                                                4	
  
Institute	
  for	
  International	
  Law	
  and	
  Human	
  Rights	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  10	
  August	
  2011	
  
	
  
	
  	
  

                                                               computer	
  and	
  the	
  information	
  network	
  for	
  the	
  purpose	
  of	
  committing	
  
                                                               one	
  of	
  the	
  following	
  acts:	
  -­‐	
  
	
  
First-­‐	
  Agitate	
  the	
  armed	
  rebellion	
  or	
  threaten	
  by	
  thereof	
  or	
  promote	
  it,	
  or	
  incite	
  
                sectarian	
  or	
  sectarian	
  trends,	
  incite	
  seditions,	
  disturb	
  security	
  and	
  public	
  
                order,	
  or	
  harm	
  the	
  reputation	
  of	
  the	
  country.	
  
	
  
	
  Second	
  -­‐	
  Damage,	
  disrupt,	
  impair,	
  hinder,	
  or	
  harm	
  intentionally	
  the	
  computer	
  
                     systems	
  or	
  computer	
  hardware,	
  or	
  the	
  information	
  network	
  of	
  
                     government	
  departments	
  with	
  the	
  intention	
  of	
  affecting	
  its	
  system	
  and	
  
                     its	
  infrastructure.	
  
	
  
	
  Third-­‐	
  Publish	
  or	
  broadcast	
  false	
  or	
  shaded	
  facts	
  in	
  order	
  to	
  weaken	
  the	
  
                  confidence	
  in	
  the	
  electronic	
  financial	
  system	
  or	
  the	
  electronic	
  commercial	
  
                  and	
  financial	
  papers	
  and	
  the	
  like	
  or	
  damage	
  the	
  national	
  economy	
  and	
  the	
  
                  financial	
  confidence	
  of	
  the	
  country.	
  
	
  
Article	
  7-­‐	
  The	
  penalty	
  shall	
  be	
  temporary	
  detention	
  and	
  a	
  fine	
  of	
  not	
  less	
  than	
  
                     (10000000)	
  ten	
  million	
  ID	
  and	
  not	
  exceeding	
  (30	
  000000)	
  thirty	
  million	
  
                     ID	
  for	
  any	
  whoever	
  commits	
  one	
  of	
  the	
  following	
  acts:	
  -­‐	
  
	
  
First	
  -­‐	
  Use	
  intentionally	
  the	
  computer	
  system	
  or	
  the	
  internet	
  belonging	
  to	
  people,	
  
                companies,	
  institutions,	
  banks,	
  or	
  financial	
  markets	
  and	
  appropriate	
  to	
  
                himself	
  the	
  property	
  of	
  other	
  people	
  or	
  their	
  financial	
  rights,	
  or	
  made	
  for	
  
                himself	
  or	
  for	
  another	
  financial	
  benefit	
  or	
  deprived	
  others	
  of	
  his	
  financial	
  
                rights	
  by	
  any	
  electronic	
  means.	
  
	
  
Second-­‐	
  Use	
  the	
  computers	
  or	
  the	
  information	
  network	
  to	
  appropriate	
  to	
  himself	
  
                    or	
  to	
  others	
  software,	
  information,	
  data,	
  or	
  codes	
  through	
  any	
  electronic	
  
                    transaction,	
  electronic	
  contract,	
  electronic	
  cards,	
  movable	
  property,	
  
                    deed,	
  or	
  signs	
  upon	
  deed	
  using	
  deception,	
  a	
  false	
  name,	
  or	
  
                    impersonation	
  with	
  intent	
  to	
  defraud	
  the	
  victim.	
  
	
  
	
  Third-­‐	
  Tamper,	
  play	
  with,	
  alter,	
  change,	
  or	
  create	
  any	
  data,	
  statements	
  of	
  
                  account,	
  or	
  software	
  related	
  to	
  stocks,	
  deeds,	
  and	
  prices	
  of	
  circulated	
  
                  currency	
  in	
  Iraq,	
  or	
  any	
  data,	
  statements	
  of	
  account,	
  or	
  software	
  used	
  by	
  




	
                                                                                                                                                                                                                                                                5	
  
Institute	
  for	
  International	
  Law	
  and	
  Human	
  Rights	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  10	
  August	
  2011	
  
	
  
	
  	
  

                                               bodies	
  inside	
  Iraq	
  in	
  the	
  activities	
  of	
  circulating	
  stocks,	
  deeds,	
  or	
  
                                               currencies	
  that	
  	
  take	
  place	
  outside	
  of	
  Iraq	
  for	
  the	
  account	
  of	
  others.	
  
	
  
Article	
  8-­‐	
  	
  
First-­‐	
  The	
  penalty	
  shall	
  be	
  temporary	
  detention	
  and	
  a	
  fine	
  of	
  not	
  less	
  than	
  
                   (10000000)	
  ten	
  million	
  ID	
  and	
  not	
  exceeding	
  (15	
  000000)	
  fifteen	
  million	
  ID	
  
                   for	
  whoever	
  commits	
  one	
  of	
  the	
  following	
  acts:	
  -­‐	
  
	
  
A-­‐	
  Forge,	
  imitate,	
  or	
  create	
  by	
  himself	
  or	
  by	
  another	
  person	
  a	
  signature,	
  deed,	
  
         email,	
  approval	
  certificate,	
  or	
  a	
  license	
  to	
  practice	
  e-­‐signature	
  services	
  and	
  the	
  
         like,	
  or	
  intentionally	
  used	
  them	
  illegally.	
  
	
  B	
  -­‐	
  Forge,	
  imitate,	
  or	
  create	
  by	
  himself	
  or	
  by	
  another	
  person	
  in	
  any	
  form	
  an	
  
                electronic	
  card	
  or	
  smart	
  card	
  or	
  any	
  means	
  of	
  transferring	
  the	
  local	
  or	
  foreign	
  
                currency	
  inside	
  Iraq	
  or	
  using,	
  circulating,	
  or	
  dealing	
  with	
  it	
  while	
  he	
  knows	
  
                that	
  it	
  is	
  false.	
  	
  
	
  C	
  -­‐	
  Use	
  or	
  try	
  to	
  use	
  fake	
  or	
  false	
  electronic	
  card	
  while	
  he	
  knows	
  that	
  it	
  is	
  false,	
  or	
  
                accept	
  to	
  pay	
  using	
  the	
  fake	
  or	
  false	
  credit	
  card	
  while	
  he	
  knows	
  that	
  it	
  is	
  false.	
  
	
  D	
  –	
  Create	
  intentionally	
  to	
  himself	
  or	
  to	
  other	
  person	
  any	
  false	
  electronic	
  data,	
  
                documents,	
  registers,	
  or	
  records,	
  or	
  make	
  any	
  change	
  or	
  alteration	
  in	
  any	
  
                electronic	
  deed,	
  or	
  use	
  any	
  of	
  them	
  before	
  any	
  public	
  or	
  private	
  body.	
  
	
  E	
  –	
  Make	
  for	
  the	
  purpose	
  of	
  sale,	
  distribution,	
  or	
  expose	
  any	
  software,	
  hardware,	
  
                data,	
  or	
  any	
  technical	
  means	
  to	
  be	
  used	
  in	
  forgery,	
  counterfeiting,	
  creating,	
  or	
  
                modification	
  with	
  the	
  intention	
  of	
  committing	
  a	
  felony	
  or	
  misdemeanor.	
  
	
  
Second-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  for	
  a	
  term	
  not	
  less	
  than	
  (10)	
  ten	
  years	
  
                         and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (20000000)	
  twenty	
  million	
  ID	
  and	
  not	
  
                         exceeding	
  (30000000)	
  thirty	
  million	
  ID	
  if	
  the	
  acts	
  defined	
  in	
  Sub-­‐Article	
  
                         (First)	
  of	
  this	
  Article:	
  
	
  
A	
  –	
  Relate	
  to	
  the	
  rights	
  of	
  the	
  state,	
  the	
  public	
  sector,	
  or	
  the	
  private	
  entities	
  with	
  
                public	
  benefit.	
  
	
  B	
  -­‐	
  Commit	
  by	
  an	
  officer	
  or	
  by	
  a	
  person	
  in	
  charge	
  of	
  public	
  service	
  during	
  
                performing	
  his	
  job	
  or	
  because	
  of	
  it.	
  
	
  
Article	
  9-­‐	
  	
  
First-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  for	
  a	
  term	
  not	
  less	
  than	
  (10)	
  ten	
  years	
  
                   and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (5000000)	
  five	
  million	
  ID	
  and	
  not	
  exceeding	
  


	
                                                                                                                                                                                                                                                                6	
  
Institute	
  for	
  International	
  Law	
  and	
  Human	
  Rights	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  10	
  August	
  2011	
  
	
  
	
  	
  

                                       (10000000)	
  ten	
  million	
  ID	
  for	
  whoever	
  abstracts	
  or	
  appropriates	
  
                                       intentionally	
  an	
  electronic	
  signature,	
  email,	
  deed,	
  electronic	
  records,	
  
                                       electronic	
  trade	
  and	
  financial	
  papers,	
  or	
  any	
  other	
  electronic	
  output	
  related	
  
                                       to	
  the	
  rights	
  or	
  properties	
  of	
  others	
  to	
  achieve	
  a	
  benefit	
  to	
  him	
  or	
  to	
  others,	
  
                                       and	
  the	
  punishment	
  shall	
  be	
  imprisonment	
  in	
  case	
  of	
  intentional	
  possession	
  
                                       in	
  order	
  to	
  be	
  exploited	
  to	
  bring	
  benefit	
  to	
  himself	
  or	
  to	
  others.	
  
	
  
Second-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  for	
  a	
  term	
  not	
  less	
  than	
  (10)	
  ten	
  years	
  
                    and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (3000000)	
  three	
  million	
  ID	
  and	
  not	
  exceeding	
  
                    (5000000)	
  five	
  million	
  ID	
  for	
  whoever	
  entrusts	
  to	
  devices,	
  software,	
  data,	
  
                    information	
  network,	
  electronic	
  cards,	
  or	
  any	
  other	
  electronic	
  outputs,	
  or	
  
                    entrusted	
  by	
  public	
  authorities	
  to	
  maintain	
  them	
  as	
  a	
  guard	
  or	
  a	
  trustee,	
  
                    and	
  after	
  that	
  he	
  appropriate	
  them	
  with	
  the	
  	
  intention	
  of	
  possession	
  or	
  
                    he	
  act	
  with	
  it	
  according	
  to	
  his	
  interest	
  or	
  others	
  interest,	
  or	
  bring	
  an	
  
                    illegal	
  benefit	
  to	
  him	
  or	
  to	
  another	
  person.	
  
	
  
Article	
  10-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  for	
  a	
  term	
  not	
  less	
  than	
  (7)	
  seven	
  
                      years	
  and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (10000000)	
  ten	
  million	
  ID	
  and	
  not	
  
                      exceeding	
  (30000000)	
  thirty	
  million	
  ID	
  for	
  whoever	
  creates,	
  manages,	
  
                      promotes,	
  or	
  set	
  up	
  a	
  website	
  on	
  the	
  information	
  network	
  to	
  allow	
  or	
  
                      facilitate	
  money	
  laundering	
  or	
  accept	
  illegal	
  financial	
  transactions	
  such	
  
                      as	
  bank	
  drafts	
  and	
  fake	
  trading	
  operations,	
  or	
  move,	
  exchange,	
  use,	
  
                      acquire,	
  or	
  possess	
  the	
  money	
  using	
  electronic	
  means	
  contrary	
  to	
  the	
  
                      law	
  or	
  hide	
  its	
  sources	
  knowingly	
  it	
  is	
  derived	
  from	
  an	
  illegal	
  sources.	
  
	
  
Article	
  11-­‐	
  	
  
First-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  for	
  a	
  term	
  not	
  exceeding	
  (7)	
  seven	
  years	
  
               and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (3000000)	
  three	
  million	
  ID	
  and	
  not	
  exceeding	
  
               (5000000)	
  five	
  million	
  ID	
  for	
  anyone	
  who:	
  -­‐	
  
	
  
A-­‐	
  Threaten	
  another	
  person,	
  by	
  using	
  the	
  computer	
  or	
  the	
  internet,	
  with	
  
       committing	
  a	
  felony	
  against	
  himself	
  or	
  his	
  property,	
  or	
  against	
  another	
  person	
  
       or	
  his	
  property	
  with	
  the	
  intention	
  of	
  intimidating	
  him,	
  or	
  driving	
  him	
  to	
  do	
  
       something	
  or	
  prevent	
  him	
  from	
  doing	
  something.	
  
B	
  -­‐	
  Send	
  or	
  transmit	
  any	
  electronic	
  message,	
  news,	
  or	
  document	
  using	
  the	
  
            computers	
  	
  or	
  the	
  information	
  network	
  knowingly	
  contains	
  threat	
  or	
  



	
                                                                                                                                                                                                                                                                7	
  
Institute	
  for	
  International	
  Law	
  and	
  Human	
  Rights	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  10	
  August	
  2011	
  
	
  
	
  	
  

                       blackmail	
  for	
  a	
  person	
  with	
  the	
  intention	
  of	
  intimidating	
  him,	
  or	
  driving	
  him	
  to	
  
                       do	
  something	
  or	
  prevent	
  him	
  from	
  doing	
  something.	
  
	
  
Second-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (2000000)	
  
                    two	
  million	
  ID	
  and	
  not	
  exceeding	
  (4000000)	
  four	
  million	
  ID	
  for	
  whoever	
  
                    threatens	
  another	
  person	
  with	
  using	
  the	
  computers	
  and	
  the	
  information	
  
                    network	
  in	
  other	
  cases	
  defined	
  in	
  Sub-­‐Article	
  (First)	
  of	
  this	
  Article.	
  
	
  
Article	
  12-­‐	
  
First-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (3000000)	
  
three	
  million	
  ID	
  and	
  not	
  exceeding	
  (5000000)	
  five	
  million	
  ID	
  for	
  whoever	
  creates,	
  
publishes	
  or	
  provides	
  an	
  incorrect	
  electronic	
  certificate.	
  
	
  
Second-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  for	
  a	
  term	
  not	
  less	
  than	
  (3)	
  three	
  
months	
  and	
  not	
  exceeding	
  (1)	
  one	
  year	
  or	
  a	
  fine	
  of	
  not	
  less	
  than	
  (30000000)	
  thirty	
  
million	
  ID	
  and	
  not	
  exceeding	
  (50000000)	
  fifty	
  million	
  ID	
  for	
  whoever	
  practice	
  the	
  
activity	
  of	
  electronic	
  ratification	
  and	
  issuing	
  certificate	
  contrary	
  to	
  the	
  law.	
  
	
  
Article	
  13-­‐	
  	
  
First-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  for	
  a	
  term	
  not	
  less	
  than	
  (3)	
  three	
  years	
  
             and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (5000000)	
  five	
  million	
  ID	
  and	
  not	
  exceeding	
  
             (10000000)	
  ten	
  million	
  ID	
  or	
  of	
  both	
  penalties	
  for	
  anyone	
  who:	
  -­‐	
  
	
  
A-­‐	
  Damage	
  or	
  hurt	
  an	
  electronic	
  signature,	
  means	
  or	
  mail.	
  
B-­‐	
  Use	
  or	
  create	
  intentionally	
  an	
  electronic	
  signature,	
  means	
  or	
  mail	
  contrary	
  to	
  
       the	
  conditions	
  and	
  specifications	
  set	
  by	
  the	
  competent	
  authority.	
  
C-­‐	
  know,	
  due	
  to	
  his	
  position,	
  the	
  data	
  of	
  the	
  electronic	
  signature,	
  electronic	
  
       means,	
  or	
  information	
  and	
  divulges	
  them	
  with	
  the	
  intention	
  of	
  harming	
  the	
  
       others	
  or	
  bringing	
  financial	
  benefit	
  to	
  himself	
  or	
  to	
  the	
  others	
  or	
  using	
  them	
  for	
  
       other	
  purpose	
  for	
  which	
  they	
  were	
  given.	
  
	
  D-­‐	
  Gain	
  unlawfully	
  an	
  electronic	
  signature,	
  means	
  or	
  mail,	
  or	
  get	
  access	
  to	
  this	
  
            electronic	
  means	
  or	
  hinder	
  or	
  impair	
  its	
  role.	
  
	
  
Second-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (3000000)	
  
                    three	
  million	
  ID	
  and	
  not	
  exceeding	
  (10000000)	
  ten	
  million	
  ID	
  for	
  whoever	
  
                    submits	
  incorrect	
  information	
  to	
  an	
  authorized	
  body	
  that	
  practice	
  the	
  




	
                                                                                                                                                                                                                                                                8	
  
Institute	
  for	
  International	
  Law	
  and	
  Human	
  Rights	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  10	
  August	
  2011	
  
	
  
	
  	
  

                                                       activity	
  of	
  issuing	
  the	
  electronic	
  approval	
  certificate	
  with	
  the	
  intention	
  of	
  
                                                       obtaining,	
  suspending	
  or	
  canceling	
  the	
  approval	
  certificate.	
  
	
  
Third-­‐	
  The	
  penalty	
  shall	
  be	
  a	
  fine	
  of	
  not	
  less	
  than	
  (3000000)	
  three	
  million	
  ID	
  and	
  
                    not	
  exceeding	
  (5000000)	
  five	
  million	
  ID	
  for	
  whoever	
  declines	
  to	
  provide	
  
                    the	
  security	
  authorities	
  and	
  bodies	
  responsible	
  for	
  issuing	
  the	
  licenses	
  
                    with	
  the	
  required	
  reports,	
  information	
  and	
  statistics,	
  data,	
  records,	
  
                    electronic	
  commercial	
  and	
  financial	
  papers,	
  software,	
  or	
  any	
  other	
  
                    outputs	
  to	
  the	
  extent	
  that	
  relates	
  to	
  their	
  activities	
  and	
  do	
  not	
  contradict	
  
                    with	
  the	
  intellectual	
  property	
  rights.	
  
	
  
Article	
  14-­‐	
  	
  
First-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  for	
  a	
  term	
  not	
  exceeding	
  (3)	
  three	
  years	
  
               and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (10000000)	
  ten	
  million	
  ID	
  and	
  not	
  exceeding	
  
               (15000000)	
  fifteen	
  million	
  ID	
  for	
  anyone	
  who:	
  -­‐	
  
	
  
A	
  -­‐	
  Damage,	
  defect	
  or	
  disrupt	
  an	
  electronic	
  deed	
  or	
  electronic	
  card	
  that	
  proves	
  a	
  
              debt,	
  dispose,	
  or	
  any	
  financial	
  or	
  moral	
  rights	
  or	
  any	
  other	
  e-­‐mail	
  used	
  to	
  
              prove	
  the	
  rights.	
  	
  
B	
  -­‐	
  Use	
  in	
  his	
  work	
  intentionally	
  electronic	
  commercial	
  or	
  financial	
  papers,	
  
              records,	
  electronic	
  cards,	
  and	
  the	
  like	
  of	
  the	
  computer	
  and	
  information	
  
              network	
  outputs	
  that	
  include	
  other	
  rights	
  and	
  neglects	
  arranging	
  them.	
  
	
  
Second-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  for	
  a	
  term	
  not	
  less	
  than	
  (3)	
  three	
  
                    years	
  and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (15000000)	
  fifteen	
  million	
  ID	
  and	
  not	
  
                    exceeding	
  (25000000)	
  twenty	
  five	
  million	
  ID	
  or	
  either	
  for	
  whoever	
  
                    disrupts	
  intentionally	
  the	
  computers	
  and	
  the	
  internet	
  devoted	
  to	
  the	
  
                    public	
  interest,	
  or	
  damage	
  or	
  hinder	
  their	
  functions.	
  
	
  
Third-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  for	
  a	
  term	
  not	
  exceeding	
  (3)	
  three	
  
               months	
  and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (2000000)	
  two	
  million	
  ID	
  and	
  not	
  
               exceeding	
  (5000000)	
  five	
  million	
  ID	
  for	
  anyone	
  who:	
  -­‐	
  
	
  
A	
  -­‐	
  Entrust	
  with	
  operating	
  the	
  computers	
  and	
  controlling	
  them,	
  and	
  he	
  was	
  
            intentionally	
  the	
  cause	
  of	
  damage,	
  disrupt,	
  hinder	
  or	
  defect	
  the	
  computers	
  or	
  
            their	
  systems,	
  software,	
  or	
  their	
  networks	
  and	
  the	
  like.	
  	
  




	
                                                                                                                                                                                                                                                                9	
  
Institute	
  for	
  International	
  Law	
  and	
  Human	
  Rights	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  10	
  August	
  2011	
  
  	
  
  	
  	
  

 B	
  -­‐	
  Intrude,	
  bother,	
  or	
  call	
  the	
  users	
  of	
  the	
  computers	
  and	
  the	
  internet	
  without	
  
              permission	
  or	
  hinders	
  using	
  them	
  by	
  the	
  beneficiaries.	
  	
  
 C	
  –	
  Log	
  into	
  a	
  website	
  or	
  an	
  information	
  system	
  intentionally,	
  without	
  permission,	
  
              or	
  makes	
  connection	
  with	
  the	
  computer	
  system	
  or	
  with	
  part	
  of	
  it.	
  	
  
 D	
  -­‐	
  Use,	
  without	
  permission,	
  or	
  caused	
  to	
  use	
  the	
  computers	
  belonging	
  to	
  others	
  
              directly	
  or	
  indirectly.	
  	
  
 E	
  –	
  Make	
  use	
  of	
  telecommunications	
  services	
  unlawfully,	
  through	
  the	
  internet	
  or	
  
              one	
  of	
  the	
  computers.	
  
 	
  
 Article	
  15-­‐	
  
First-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (10000000)	
  ten	
  
              million	
  ID	
  and	
  not	
  exceeding	
  (15000000)	
  fifteen	
  million	
  ID	
  for	
  anyone	
  who:	
  
 	
  
 A-­‐	
  Excess	
  the	
  scope	
  of	
  the	
  authorization	
  given	
  to	
  him	
  intentionally	
  or	
  intercepts	
  
              any	
  information	
  during	
  the	
  transmission	
  of	
  the	
  communications.	
  	
  
 B-­‐	
  Eavesdrop	
  or	
  watch	
  the	
  stored	
  and	
  exchanged	
  data	
  in	
  information	
  systems.	
  
 	
  
 Second-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  for	
  a	
  term	
  not	
  less	
  than	
  (4)	
  four	
  years	
  
                      and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (15000000)	
  fifteen	
  million	
  ID	
  and	
  not	
  
                      exceeding	
  (25000000)	
  twenty	
  five	
  million	
  ID	
  if	
  the	
  act	
  provided	
  for	
  in	
  
                      clause	
  (one)	
  of	
  this	
  Article	
  results	
  in	
  the	
  deletion,	
  destruction,	
  alteration,	
  
                      defection,	
  disruption,	
  or	
  republication	
  of	
  data	
  and	
  information	
  belonging	
  
                      to	
  others	
  unlawfully.	
  
 	
  
 Article16-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  for	
  a	
  term	
  not	
  less	
  than	
  (7)	
  years	
  
                       and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (25000000)	
  twenty	
  five	
  million	
  ID	
  and	
  not	
  
                       exceeding	
  (50000000)	
  fifty	
  million	
  ID	
  or	
  either	
  for	
  whoever	
  receives	
  or	
  
                       intercepts,	
  unlawfully,	
  communication	
  transmitted	
  by	
  one	
  of	
  the	
  
                       computers	
  and	
  through	
  the	
  information	
  network	
  with	
  the	
  intention	
  of	
  
                       bringing	
  financial	
  benefits	
  for	
  himself	
  and	
  for	
  others.	
  
 	
  
 Article17-­‐	
  	
  
 First-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  for	
  a	
  term	
  not	
  exceeding	
  (3)	
  years	
  and	
  a	
  
               fine	
  of	
  not	
  less	
  than	
  (5000000)	
  five	
  million	
  ID	
  and	
  not	
  exceeding	
  (10000000)	
  
               ten	
  million	
  ID	
  for	
  whoever	
  decodes	
  or	
  damages	
  the	
  code	
  of	
  an	
  electronic	
  
               signature,	
  computer,	
  information	
  network,	
  or	
  an	
  electronic	
  card	
  of	
  other	
  
               person	
  with	
  the	
  intention	
  of	
  committing	
  one	
  of	
  crimes	
  stipulated	
  in	
  this	
  Act.	
  	
  


  	
                                                                                                                                                                                                                                                             10	
  
Institute	
  for	
  International	
  Law	
  and	
  Human	
  Rights	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  10	
  August	
  2011	
  
	
  
	
  	
  

Second-­‐	
  The	
  penalty	
  shall	
  be	
  temporary detention and	
  a	
  fine	
  of	
  not	
  less	
  than	
  
                  (10000000)	
  ten	
  million	
  ID	
  and	
  not	
  exceeding	
  (15000000)	
  fifteen	
  million	
  
                  ID	
  if	
  the	
  act	
  defined	
  in	
  Sub-­‐Article	
  (First)	
  of	
  this	
  Article	
  was	
  done	
  against	
  
                  computers,	
  software,	
  networks,	
  deeds,	
  electronic	
  cards,	
  or	
  rights	
  of	
  
                  government	
  departments	
  and	
  public	
  institutions	
  or	
  those	
  who	
  work	
  on	
  
                  their	
  behalf.	
  
	
  
Article	
  18-­‐	
  
First-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (5000000)	
  five	
  
           million	
  ID	
  and	
  not	
  exceeding	
  (10000000)	
  ten	
  million	
  ID	
  for	
  anyone	
  who:	
  
	
  
A.	
  Provide	
  false	
  electronic	
  information	
  or	
  data	
  to	
  the	
  judicial	
  or	
  administrative	
  
      authorities	
  knowingly	
  that	
  they	
  are	
  inaccurate.	
  
B.	
  Decline	
  to	
  provide	
  information	
  or	
  data	
  to	
  the	
  judicial	
  or	
  administrative	
  
      authorities.	
  
	
  
Second-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  for	
  a	
  term	
  not	
  exceeding	
  (3)	
  three	
  
                  years	
  and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (2000000)	
  two	
  million	
  ID	
  and	
  not	
  
                  exceeding	
  (3000000)	
  three	
  million	
  ID	
  for	
  anyone	
  who:	
  
	
  
A.	
  Use	
  the	
  computers	
  and	
  the	
  information	
  network	
  and	
  assume	
  a	
  false	
  identity	
  or	
  
      name	
  with	
  the	
  intention	
  of	
  deception	
  and	
  fraud.	
  	
  
B.	
  Set	
  up	
  or	
  use	
  unreal	
  or	
  illusory	
  website,	
  or	
  conceal	
  or	
  helped	
  to	
  conceal	
  the	
  fact	
  
      of	
  a	
  website	
  on	
  the	
  information	
  network	
  with	
  the	
  intention	
  of	
  committing	
  one	
  
      of	
  the	
  crimes	
  defined	
  in	
  this	
  Act.	
  
	
  
Third-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  for	
  a	
  term	
  not	
  less	
  than	
  (7)	
  seven	
  years	
  
                 and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (15000000)	
  fifteen	
  million	
  ID	
  and	
  not	
  exceeding	
  
                 (20000000)	
  twenty	
  million	
  ID	
  if	
  the	
  crime	
  defined	
  in	
  Sub-­‐Article	
  (First)	
  and	
  
                 (Second)	
  of	
  this	
  Article	
  commits	
  by	
  an	
  officer	
  or	
  by	
  a	
  person	
  in	
  charge	
  of	
  
                 public	
  service,	
  or	
  if	
  the	
  false	
  title,	
  name,	
  or	
  the	
  information	
  relates	
  to	
  an	
  
                 public	
  officer	
  or	
  government	
  department.	
  
	
  
Article	
  19-­‐	
  
First-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  for	
  a	
  term	
  not	
  less	
  than	
  (3)	
  three	
  years	
  
             and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (5000000)	
  five	
  million	
  ID	
  and	
  not	
  exceeding	
  
             (10000000)	
  ten	
  million	
  ID	
  for	
  anyone	
  who:	
  


	
                                                                                                                                                                                                                                                             11	
  
Institute	
  for	
  International	
  Law	
  and	
  Human	
  Rights	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  10	
  August	
  2011	
  
	
  
	
  	
  

	
  
A.	
  Obtain	
  illegally	
  information,	
  data,	
  software	
  or	
  any	
  computer	
  outputs	
  and	
  he	
  set	
  
       them	
  up	
  or	
  announce	
  them	
  intentionally	
  by	
  using	
  the	
  computer	
  and	
  the	
  
       information	
  network	
  with	
  the	
  intention	
  of	
  harming	
  others.	
  
	
  B.	
  Disclose	
  any	
  kind	
  of	
  subscribers’	
  information	
  or	
  their	
  secrets	
  or	
  disclose	
  the	
  
       access	
  data	
  to	
  any	
  other	
  party	
  without	
  an	
  approval	
  issued	
  by	
  a	
  competent	
  
       official	
  body.	
  
	
  C.	
  Sell,	
  transfer,	
  or	
  trade	
  in	
  the	
  personal	
  data	
  that	
  the	
  subscribers	
  provided	
  them	
  
       to	
  him	
  for	
  any	
  reason	
  without	
  their	
  permission	
  to	
  bring	
  financial	
  benefit	
  to	
  him	
  
       or	
  to	
  others.	
  
	
  
Second-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  for	
  a	
  term	
  not	
  less	
  than	
  (7)	
  seven	
  
                        years	
  and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (5000000)	
  five	
  million	
  ID	
  and	
  not	
  
                        exceeding	
  (10000000)	
  ten	
  million	
  ID	
  if	
  the	
  acts	
  defined	
  in	
  Sub-­‐Article	
  
                        (First)	
  of	
  this	
  Article	
  Commits	
  by	
  an	
  officer	
  or	
  by	
  a	
  person	
  in	
  charge	
  of	
  
                        public	
  service	
  while	
  he	
  is	
  performing	
  his	
  job	
  or	
  because	
  of	
  it.	
  
	
  
Article	
  20-­‐	
  
First-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (2000000)	
  two	
  
                million	
  ID	
  and	
  not	
  exceeding	
  (5000000)	
  five	
  million	
  ID	
  for	
  whoever	
  uses	
  the	
  
                computer	
  and	
  the	
  information	
  network	
  to	
  commit	
  one	
  of	
  the	
  following	
  acts:	
  
	
  
A	
  –	
  Use,	
  with	
  the	
  intention	
  of	
  fraud,	
  a	
  trademark	
  in	
  Iraq	
  registered	
  in	
  the	
  name	
  of	
  
             other	
  person	
  as	
  a	
  title	
  for	
  his	
  information	
  network,	
  or	
  allowed	
  other	
  side	
  who	
  
             works	
  in	
  the	
  field	
  of	
  technical	
  services	
  in	
  Iraq	
  to	
  use	
  it.	
  
B	
  -­‐	
  Use	
  his	
  electronic	
  card	
  for	
  payment	
  knowingly	
  that	
  he	
  has	
  no	
  balance,	
  or	
  he	
  
             uses	
  it	
  knowingly	
  that	
  it	
  is	
  expired	
  or	
  cancelled,	
  or	
  he	
  uses	
  the	
  electronic	
  card	
  
             that	
  belongs	
  to	
  other	
  person	
  and	
  this	
  card	
  was	
  delivered	
  to	
  him	
  without	
  the	
  
             knowledge	
  of	
  the	
  owner.	
  
	
  
Second-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  for	
  a	
  term	
  not	
  exceeding	
  (10)	
  ten	
  
                        years	
  and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (5000000)	
  five	
  million	
  ID	
  and	
  not	
  
                        exceeding	
  (10000000)	
  ten	
  million	
  ID	
  in	
  one	
  of	
  the	
  two	
  following	
  cases:	
  
	
  
A	
  -­‐	
  If	
  the	
  offender	
  is	
  an	
  officer	
  or	
  a	
  person	
  in	
  charge	
  of	
  public	
  service	
  and	
  
             committed	
  one	
  of	
  the	
  crimes	
  defined	
  in	
  Sub-­‐Article	
  (First)	
  of	
  this	
  Article	
  while	
  
             he	
  is	
  doing	
  his	
  job	
  or	
  because	
  of	
  his	
  job,	
  or	
  he	
  facilitates	
  the	
  crime	
  to	
  others.	
  


	
                                                                                                                                                                                                                                                             12	
  
Institute	
  for	
  International	
  Law	
  and	
  Human	
  Rights	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  10	
  August	
  2011	
  
	
  
	
  	
  

	
  B	
  -­‐	
  If	
  the	
  acts	
  defined	
  in	
  Sub-­‐Article	
  (First)	
  of	
  this	
  Article	
  targets	
  any	
  of	
  the	
  
                computer	
  systems	
  or	
  the	
  information	
  networks	
  that	
  belong	
  to	
  any	
  
                government	
  entity	
  in	
  Iraq,	
  or	
  it	
  works	
  on	
  its	
  behalf.	
  
	
  
Article	
  21-­‐	
  
First-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  for	
  a	
  term	
  not	
  less	
  than	
  (2)	
  two	
  years	
  and	
  
                  not	
  exceeding	
  (3)	
  three	
  years	
  and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (10000000)	
  ten	
  
                  million	
  ID	
  and	
  not	
  exceeding	
  (20000000)	
  twenty	
  million	
  ID	
  for	
  whoever	
  
                  commits	
  one	
  of	
  the	
  following	
  acts:	
  
A-­‐	
  Use	
  the	
  internet	
  and	
  the	
  computer	
  to	
  publish	
  or	
  copy	
  intellectual	
  works,	
  
         literary	
  works,	
  or	
  scientific	
  research	
  belonging	
  to	
  others	
  and	
  that	
  protected	
  by	
  
         laws	
  or	
  international	
  conventions.	
  	
  
B-­‐	
  Access	
  the	
  website	
  of	
  a	
  company,	
  institution	
  or	
  others	
  to	
  change,	
  delete,	
  or	
  
                modify	
  the	
  design	
  of	
  this	
  website	
  or	
  exploit	
  it	
  unlawfully.	
  
	
  
Second-­‐	
  The	
  penalty	
  shall	
  be	
  a	
  fine	
  of	
  not	
  less	
  than	
  (500000)	
  five	
  hundred	
  
                             thousand	
  ID	
  and	
  not	
  exceeding	
  (1000000)	
  one	
  million	
  ID	
  for	
  whoever	
  
                             publishes,	
  copies,	
  or	
  trades	
  in	
  software	
  or	
  information	
  without	
  
                             authorization.	
  
	
  
Third-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  for	
  a	
  term	
  not	
  less	
  than	
  (1)	
  one	
  year	
  and	
  
                       a	
  fine	
  of	
  not	
  less	
  than	
  (2000000)	
  two	
  million	
  ID	
  and	
  not	
  exceeding	
  
                       (5000000)	
  five	
  million	
  ID	
  for	
  whoever	
  violates,	
  in	
  any	
  manner,	
  the	
  religious,	
  
                       moral,	
  family,	
  or	
  the	
  social	
  principles	
  or	
  values,	
  or	
  violates	
  the	
  privacy	
  of	
  
                       the	
  private	
  life	
  by	
  using	
  the	
  information	
  network	
  or	
  the	
  computers	
  in	
  any	
  
                       manner.	
  
	
  
Article	
  22-­‐	
  
First-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  for	
  a	
  term	
  not	
  exceeding	
  (3)	
  three	
  years	
  
                       and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (3000000)	
  three	
  million	
  ID	
  and	
  not	
  exceeding	
  
                       (6000000)	
  six	
  million	
  ID	
  for	
  whoever	
  sets	
  up,	
  runs,	
  or	
  helps	
  to	
  set	
  up	
  a	
  
                       website	
  on	
  the	
  information	
  network	
  for	
  gambling,	
  or	
  practice	
  gambling,	
  or	
  
                       call	
  for	
  or	
  promote	
  gambling	
  using	
  the	
  information	
  network.	
  
	
  
Second-­‐	
  The	
  penalty	
  shall	
  be	
  temporary	
  detention	
  and	
  a	
  fine	
  of	
  not	
  less	
  than	
  
                             (10000000)	
  ten	
  million	
  ID	
  and	
  not	
  exceeding	
  (30000000)	
  thirty	
  million	
  ID	
  
                             for	
  whoever	
  commits	
  one	
  of	
  the	
  following	
  acts:	
  


	
                                                                                                                                                                                                                                                             13	
  
Institute	
  for	
  International	
  Law	
  and	
  Human	
  Rights	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  10	
  August	
  2011	
  
	
  
	
  	
  

	
  
A-­‐	
  Set	
  up,	
  run,	
  or	
  help	
  to	
  set	
  up	
  a	
  website	
  to	
  promote	
  and	
  incite	
  an	
  act	
  of	
  lechery	
  
       and	
  fornication,	
  or	
  any	
  software,	
  information,	
  pictures,	
  or	
  films	
  that	
  breach	
  of	
  
       modesty	
  or	
  public	
  morals,	
  or	
  engages	
  in	
  calling	
  for	
  or	
  promoting	
  them.	
  
B-­‐	
  Expose	
  a	
  minor	
  or	
  juvenile	
  to	
  immorality	
  activities	
  or	
  use	
  the	
  internet	
  to	
  
       promote,	
  product,	
  and	
  distribute	
  prostitution	
  materials,	
  or	
  uses	
  the	
  email,	
  
       computer,	
  or	
  the	
  internet	
  to	
  prepare	
  or	
  run	
  immorality	
  activities	
  or	
  
       communications	
  using	
  a	
  minor,	
  juvenile,	
  or	
  incapacitated	
  person.	
  
	
  
Third-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  for	
  a	
  term	
  not	
  exceeding	
  (2)	
  two	
  years	
  
             and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (3000000)	
  three	
  million	
  ID	
  and	
  not	
  exceeding	
  
             (5000000)	
  five	
  million	
  ID	
  or	
  either	
  for	
  whoever	
  uses	
  the	
  computers	
  and	
  the	
  
             internet	
  to	
  attribute	
  terms,	
  images,	
  sounds	
  or	
  any	
  other	
  means	
  that	
  include	
  
             libel	
  and	
  insult	
  to	
  the	
  others.	
  
	
  
Article	
  23-­‐	
  The	
  penalty	
  shall	
  be	
  imprisonment	
  for	
  a	
  term	
  not	
  less	
  than	
  (1)	
  one	
  year	
  
                       and	
  not	
  exceeding	
  (2)	
  two	
  years	
  and	
  a	
  fine	
  of	
  not	
  less	
  than	
  (3000000)	
  
                       three	
  million	
  ID	
  and	
  not	
  exceeding	
  (5000000)	
  five	
  million	
  ID	
  for	
  
                       whoever	
  produces,	
  sells,	
  imports	
  or	
  distributes	
  intentionally	
  any	
  
                       devices,	
  tools	
  or	
  computer	
  software,	
  or	
  passwords	
  or	
  access	
  codes	
  
                       that	
  led	
  to	
  commit	
  one	
  of	
  the	
  crimes	
  defined	
  in	
  this	
  Act.	
  
	
  
	
  
                                                                    Chapter	
  Three	
  
                       Procedures	
  for	
  collecting	
  of	
  evidence,	
  investigation,	
  and	
  trial

Article	
  24-­‐	
  
First-­‐	
  The	
  investigation	
  agencies	
  shall	
  undertake	
  the	
  investigation	
  procedures	
  and	
  
            collecting	
  of	
  evidence,	
  and	
  request	
  them	
  from	
  their	
  sources	
  concerning	
  the	
  
            crimes	
  defined	
  in	
  this	
  Act.	
  
	
  
Second	
  -­‐	
  It	
  is	
  not	
  permitted	
  for	
  the	
  investigation	
  agencies	
  to	
  start	
  the	
  
                 investigation	
  procedures	
  without	
  an	
  order	
  of	
  the	
  competent	
  judge.	
  
	
  
Third-­‐	
  The	
  chief	
  investigator	
  or	
  the	
  investigator	
  shall	
  undertake	
  the	
  enforcement	
  
            of	
  the	
  procedures,	
  collecting	
  of	
  evidence,	
  or	
  any	
  other	
  investigation	
  
            procedure	
  stipulated	
  in	
  the	
  Criminal	
  procedures	
  Code.	
  


	
                                                                                                                                                                                                                                                             14	
  
Institute	
  for	
  International	
  Law	
  and	
  Human	
  Rights	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  10	
  August	
  2011	
  
	
  
	
  	
  

	
  
Article	
  25-­‐	
  
First-­‐	
  
	
  A-­‐	
  The	
  court	
  of	
  misdemeanors	
  or	
  felonies	
  in	
  Rusafa	
  shall	
  hear	
  the	
  crimes	
  defined	
  
             in	
  this	
  law	
  for	
  a	
  period	
  of	
  three	
  (3)	
  years	
  from	
  the	
  date	
  of	
  its	
  entry	
  into	
  force,	
  
             each	
  court	
  according	
  to	
  its	
  jurisdiction.	
  
B	
  -­‐	
  The	
  court	
  defined	
  in	
  paragraph	
  (A)	
  of	
  this	
  Sub-­‐Article	
  shall	
  continue	
  hearing	
  
             the	
  crimes	
  before	
  it	
  until	
  taking	
  a	
  decision	
  on	
  this	
  crime	
  and	
  reaching	
  the	
  final	
  
             judgment.	
  
	
  
Second	
  -­‐	
  The	
  courts	
  of	
  misdemeanors	
  or	
  felonies	
  shall	
  hear,	
  according	
  to	
  the	
  rules	
  
                      of	
  jurisdiction,	
  the	
  crimes	
  defined	
  in	
  this	
  Act	
  after	
  the	
  expiration	
  of	
  the	
  
                      period	
  defined	
  in	
  Sub-­‐Article	
  (First)	
  of	
  this	
  Article.	
  
	
  
Third	
  -­‐	
  The	
  crimes	
  defined	
  in	
  this	
  Act	
  shall	
  be	
  heard	
  by	
  one	
  or	
  more	
  judges	
  who	
  
                    have	
  experience	
  and	
  competence	
  and	
  received	
  special	
  training.	
  
	
  
Fourth-­‐	
  The	
  competent	
  judge	
  may	
  use	
  the	
  expertise	
  from	
  inside	
  and	
  outside	
  Iraq	
  
                      during	
  the	
  investigation	
  and	
  trial	
  period.	
  
	
  
Article	
  26	
  –	
  	
  
First	
  -­‐	
  The	
  competent	
  judge	
  may:	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
A-­‐	
  Issue	
  the	
  orders	
  to	
  any	
  party	
  to	
  save	
  the	
  computer	
  data,	
  including	
  the	
  
       transmitted	
  information	
  or	
  the	
  data	
  stored	
  in	
  the	
  computer	
  hardware	
  or	
  in	
  its	
  
       accessories	
  and	
  its	
  outputs	
  that	
  could	
  be	
  changed	
  or	
  lost.	
  
B	
  -­‐	
  Issue	
  orders	
  to	
  the	
  parties	
  who	
  provide	
  information	
  network	
  services	
  or	
  the	
  
       different	
  technical	
  services	
  to	
  provide	
  the	
  investigators	
  with	
  the	
  subscription	
  
       date	
  and	
  the	
  password	
  data	
  if	
  that	
  would	
  help	
  in	
  the	
  detection	
  of	
  the	
  crime.	
  
C-­‐	
  Access	
  to	
  the	
  computers	
  and	
  the	
  networks	
  or	
  to	
  any	
  part	
  of	
  them	
  and	
  to	
  the	
  
       data	
  stored	
  in	
  them,	
  and	
  to	
  access	
  to	
  any	
  device	
  or	
  means	
  which	
  can	
  store	
  
       computer	
  data	
  inside	
  Iraq,	
  and	
  to	
  intercept,	
  monitor	
  and	
  control	
  the	
  data	
  by	
  a	
  
       reasoned	
  decision	
  that	
  has	
  specific	
  duration	
  and	
  purpose.	
  
D-­‐	
  Trace	
  the	
  information	
  to	
  the	
  computer	
  systems	
  and	
  the	
  networks	
  connected	
  
       with	
  other	
  suspected	
  computer	
  systems	
  or	
  networks	
  provided	
  that	
  to	
  inform	
  
       the	
  owners	
  of	
  the	
  systems	
  and	
  the	
  networks	
  with	
  this	
  procedure	
  and	
  its	
  scope,	
  
       and	
  provided	
  that	
  this	
  limited	
  procedure	
  do	
  not	
  violate	
  or	
  affect	
  the	
  rights	
  of	
  
       others.	
  


	
                                                                                                                                                                                                                                                             15	
  
Institute	
  for	
  International	
  Law	
  and	
  Human	
  Rights	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  10	
  August	
  2011	
  
	
  
	
  	
  

E	
  -­‐	
  Seize	
  the	
  computers	
  or	
  part	
  of	
  them	
  and	
  the	
  device	
  that	
  the	
  data	
  stored	
  in	
  it	
  
        and	
  transfer	
  them	
  to	
  the	
  investigation	
  site	
  to	
  be	
  analyzed	
  and	
  examined.	
  The	
  
        judge	
  may	
  copy	
  the	
  data	
  without	
  transferring	
  the	
  system,	
  and	
  may	
  remove	
  the	
  
        data	
  that	
  prevent	
  access	
  to	
  the	
  computer	
  system	
  without	
  damaging	
  the	
  system	
  
        or	
  affecting	
  the	
  data	
  and	
  the	
  software	
  that	
  stored	
  in	
  it.	
  
	
  
Second-­‐	
  the	
  side	
  that	
  undertakes	
  collecting	
  of	
  evidence	
  shall:	
  
	
  
A-­‐	
  Prepare	
  two	
  hardcopies	
  of	
  the	
  data	
  to	
  be	
  analyzed	
  and	
  examined,	
  and	
  to	
  
        deliver	
  the	
  first	
  hardcopy	
  directly	
  to	
  the	
  chief	
  investigator	
  before	
  taking	
  any	
  
        action	
  about	
  it,	
  and	
  to	
  start	
  the	
  procedures	
  of	
  analysis	
  and	
  examination	
  on	
  the	
  
        second	
  hardcopy.	
  It	
  is	
  not	
  allowed	
  to	
  make	
  any	
  alteration	
  or	
  change	
  to	
  these	
  
        two	
  copies.	
  
B-­‐	
  Provide	
  the	
  electronic	
  copy	
  of	
  the	
  evidence	
  or	
  the	
  hardcopies	
  of	
  the	
  evidence	
  
        with	
  a	
  detailed	
  report	
  shows	
  the	
  procedures,	
  tools	
  and	
  the	
  equipment	
  used	
  in	
  
        obtaining	
  evidence	
  or	
  recovering	
  them.	
  
	
  
Third-­‐	
  The	
  investigation	
  and	
  the	
  expertise	
  side	
  shall	
  provide	
  the	
  outputs	
  of	
  the	
  
                electronic	
  copies	
  as	
  hardcopies	
  along	
  with	
  a	
  detailed	
  report	
  about	
  the	
  date	
  
                of	
  copying	
  t	
  the	
  hardcopies.	
  
	
  
                                                                  Chapter	
  Four	
  
                                                     General	
  and	
  final	
  provisions	
  
                                                                           	
  
	
  
Article	
  27	
  -­‐	
  The	
  acts	
  stipulated	
  in	
  this	
  Act	
  shall	
  be	
  punished	
  by	
  the	
  penalties	
  
                        stipulated	
  in	
  it	
  without	
  prejudice	
  to	
  any	
  severer	
  punishments	
  
                        stipulated	
  by	
  the	
  applicable	
  laws.	
  
	
  
Article	
  28	
  –	
  	
  
First	
  -­‐	
  The	
  provisions	
  of	
  judicial	
  person’s	
  responsibility	
  stipulated	
  in	
  Penal	
  Code	
  
                No.	
  111	
  for	
  the	
  year	
  1969	
  concerning	
  the	
  crimes	
  stipulated	
  in	
  this	
  Act	
  that	
  
                were	
  committed	
  in	
  his	
  name	
  or	
  for	
  his	
  account,	
  shall	
  be	
  applied.	
  
	
  
Second	
  -­‐	
  The	
  judicial	
  person	
  shall	
  be	
  committed	
  to	
  solidarity	
  with	
  the	
  sentenced	
  
                     person	
  concerning	
  the	
  payment	
  of	
  the	
  fines	
  and	
  compensation	
  decided	
  
                     by	
  the	
  court,	
  if	
  the	
  crime	
  was	
  committed	
  in	
  his	
  name	
  and	
  for	
  his	
  account.	
  


	
                                                                                                                                                                                                                                                             16	
  
Institute	
  for	
  International	
  Law	
  and	
  Human	
  Rights	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  10	
  August	
  2011	
  
	
  
	
  	
  

	
  
Article	
  29-­‐	
  Without	
  prejudice	
  to	
  the	
  rights	
  of	
  bona	
  fide	
  third	
  parties,	
  the	
  court	
  
                may	
  decide	
  to	
  confiscate	
  or	
  damage	
  the	
  tools,	
  equipment,	
  software,	
  
                and	
  devices	
  used	
  in	
  the	
  commission	
  of	
  the	
  crimes	
  stipulated	
  in	
  this	
  Act.	
  	
  
	
  
Article	
  30	
  -­‐	
  The	
  following	
  Codes	
  are	
  applicable	
  unless	
  specifically	
  provided	
  for	
  in	
  
                       this	
  Act:	
  
	
  
	
  First	
  -­‐	
  Penal	
  Code	
  No.	
  111	
  for	
  the	
  year	
  1969.	
  
	
  
	
  Second	
  -­‐	
  Criminal	
  Procedure	
  Code	
  No.	
  23	
  for	
  the	
  year	
  1971.	
  
	
  
	
  Article	
  31	
  -­‐	
  This	
  Act	
  shall	
  enter	
  into	
  effect	
  after	
  ninety	
  (90)	
  days	
  from	
  the	
  date	
  of	
  
                            its	
  publication	
  in	
  the	
  Official	
  Gazette.	
  
	
  
	
  
                                                                      Reasons	
  
	
  
In	
  order	
  to	
  provide	
  legal	
  protection	
  and	
  to	
  reach	
  a	
  punishment	
  system	
  for	
  the	
  
perpetrators	
  of	
  computer	
  and	
  Internet	
  crimes	
  that	
  accompanied	
  the	
  evolution,	
  
growth,	
  and	
  development	
  of	
  computer	
  systems,	
  networks	
  and	
  information	
  
technology	
  revolution.	
  These	
  crimes	
  involves	
  a	
  lot	
  of	
  risks	
  that	
  inflict	
  great	
  
causalities	
  upon	
  the	
  institutions	
  and	
  individuals,	
  where	
  these	
  crimes	
  attack	
  the	
  
data	
  and	
  information	
  and	
  affect	
  the	
  private	
  life	
  of	
  the	
  individuals,	
  threaten	
  the	
  
national	
  security	
  and	
  national	
  sovereignty,	
  weaken	
  the	
  confidence	
  in	
  the	
  new	
  
technologies,	
  threaten	
  the	
  human	
  creativity,	
  and	
  provide	
  legal	
  protection	
  for	
  the	
  
computer	
  systems	
  that	
  the	
  State	
  encourages	
  depending	
  on	
  them	
  in	
  all	
  the	
  
activities.	
  
	
  	
  
This	
  Act	
  initiated.	
  




	
                                                                                                                                                                                                                                                             17	
  

Contenu connexe

Tendances

Ict in the district courts
Ict in the district courtsIct in the district courts
Ict in the district courtsTalwant Singh
 
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...manumelwin
 
Recent trends in use of ict in courts
Recent trends in use of ict in courtsRecent trends in use of ict in courts
Recent trends in use of ict in courtsTalwant Singh
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsSuryakanta Rout
 
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]Kamal Thakur
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...Yar Chaikovsky
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Karnika Seth
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleHemraj Singh Chouhan
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies Network Intelligence India
 
Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.Vaishnavi Meghe
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000Naveen Kumar C
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 

Tendances (20)

Ict in the district courts
Ict in the district courtsIct in the district courts
Ict in the district courts
 
Electronic governance
Electronic governanceElectronic governance
Electronic governance
 
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Recent trends in use of ict in courts
Recent trends in use of ict in courtsRecent trends in use of ict in courts
Recent trends in use of ict in courts
 
Cyber law
Cyber lawCyber law
Cyber law
 
it act 2000
it act 2000it act 2000
it act 2000
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber Laws
 
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using Google
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 

Similaire à proposal of Informatics crimes act in Iraq

The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.pptMaruthi N.E
 
electronic_records_article.pdf
electronic_records_article.pdfelectronic_records_article.pdf
electronic_records_article.pdfDharmendraRai32
 
Cyber Crime Prevention Act 2012
Cyber Crime Prevention Act 2012Cyber Crime Prevention Act 2012
Cyber Crime Prevention Act 2012John Macasio
 
Cybercrimebill3rd reading-version-120329030422-phpapp01
Cybercrimebill3rd reading-version-120329030422-phpapp01Cybercrimebill3rd reading-version-120329030422-phpapp01
Cybercrimebill3rd reading-version-120329030422-phpapp01Baldwin Cruz
 
Draft Implementing Rules and Regulations (IRR) of the Cybercrime Law
Draft Implementing Rules and Regulations (IRR) of the Cybercrime Law Draft Implementing Rules and Regulations (IRR) of the Cybercrime Law
Draft Implementing Rules and Regulations (IRR) of the Cybercrime Law raissarobles
 
e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...
e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...
e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...recoveraccount1
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012Jim Ayson
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)Ms. Parasmani Jangid
 
Nota Padat ICT SPM - Form 4
Nota Padat ICT SPM - Form 4Nota Padat ICT SPM - Form 4
Nota Padat ICT SPM - Form 4D.J Md Thani
 
12the-electronic-transaction-act55.pdf
12the-electronic-transaction-act55.pdf12the-electronic-transaction-act55.pdf
12the-electronic-transaction-act55.pdfNavarajBaniya1
 
Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)Sonnie Santos
 
Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017Povo News
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2Vikas Saw
 
UNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docx
UNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docxUNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docx
UNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docxlillie234567
 

Similaire à proposal of Informatics crimes act in Iraq (20)

Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.ppt
 
electronic_records_article.pdf
electronic_records_article.pdfelectronic_records_article.pdf
electronic_records_article.pdf
 
Cyber Crime Prevention Act 2012
Cyber Crime Prevention Act 2012Cyber Crime Prevention Act 2012
Cyber Crime Prevention Act 2012
 
Cybercrimebill3rd reading-version-120329030422-phpapp01
Cybercrimebill3rd reading-version-120329030422-phpapp01Cybercrimebill3rd reading-version-120329030422-phpapp01
Cybercrimebill3rd reading-version-120329030422-phpapp01
 
Draft Implementing Rules and Regulations (IRR) of the Cybercrime Law
Draft Implementing Rules and Regulations (IRR) of the Cybercrime Law Draft Implementing Rules and Regulations (IRR) of the Cybercrime Law
Draft Implementing Rules and Regulations (IRR) of the Cybercrime Law
 
e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...
e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...
e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
 
Cyber law nepal
Cyber law nepalCyber law nepal
Cyber law nepal
 
Nota Padat ICT SPM - Form 4
Nota Padat ICT SPM - Form 4Nota Padat ICT SPM - Form 4
Nota Padat ICT SPM - Form 4
 
12the-electronic-transaction-act55.pdf
12the-electronic-transaction-act55.pdf12the-electronic-transaction-act55.pdf
12the-electronic-transaction-act55.pdf
 
Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)
 
Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
UNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docx
UNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docxUNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docx
UNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docx
 

Plus de Hayder Hamzoz

حرية التعبير في المنظومة القانونية العراقية
حرية التعبير في المنظومة القانونية العراقيةحرية التعبير في المنظومة القانونية العراقية
حرية التعبير في المنظومة القانونية العراقيةHayder Hamzoz
 
Third annual Meeting of the Arab internet governance forum
Third annual Meeting of the Arab internet governance forumThird annual Meeting of the Arab internet governance forum
Third annual Meeting of the Arab internet governance forumHayder Hamzoz
 
تقرير الرئيس حول المنتدى العربي لحوكمة الإنترنيت في بيروت 2014
تقرير الرئيس حول المنتدى العربي لحوكمة الإنترنيت في بيروت 2014تقرير الرئيس حول المنتدى العربي لحوكمة الإنترنيت في بيروت 2014
تقرير الرئيس حول المنتدى العربي لحوكمة الإنترنيت في بيروت 2014Hayder Hamzoz
 
Iraqi Budget 2015 موازنة العراق
Iraqi Budget 2015 موازنة العراق Iraqi Budget 2015 موازنة العراق
Iraqi Budget 2015 موازنة العراق Hayder Hamzoz
 
UNESCO launches a new publication on the role of Internet intermediaries
UNESCO launches a new publication on the role of Internet intermediariesUNESCO launches a new publication on the role of Internet intermediaries
UNESCO launches a new publication on the role of Internet intermediariesHayder Hamzoz
 
مسودة قانون الاحزاب السياسية 2010 في العراق
مسودة قانون الاحزاب السياسية 2010 في العراقمسودة قانون الاحزاب السياسية 2010 في العراق
مسودة قانون الاحزاب السياسية 2010 في العراقHayder Hamzoz
 
التقرير الوطني للتنمية البشرية في العراق 2014
التقرير الوطني للتنمية البشرية في العراق 2014التقرير الوطني للتنمية البشرية في العراق 2014
التقرير الوطني للتنمية البشرية في العراق 2014Hayder Hamzoz
 
Report from Iraqi Network for Social Media about blocking the Internet in Iraq
Report from Iraqi Network for Social Media about blocking the Internet in IraqReport from Iraqi Network for Social Media about blocking the Internet in Iraq
Report from Iraqi Network for Social Media about blocking the Internet in IraqHayder Hamzoz
 
الاتفاقية العربية لحماية حقوق المؤلف
الاتفاقية العربية لحماية حقوق المؤلفالاتفاقية العربية لحماية حقوق المؤلف
الاتفاقية العربية لحماية حقوق المؤلفHayder Hamzoz
 
قانون تصديق الاتفاقية العربية لحقوق المؤلف رقم 41 لسنة 85
قانون تصديق الاتفاقية العربية لحقوق المؤلف رقم 41 لسنة 85قانون تصديق الاتفاقية العربية لحقوق المؤلف رقم 41 لسنة 85
قانون تصديق الاتفاقية العربية لحقوق المؤلف رقم 41 لسنة 85Hayder Hamzoz
 
قانون حق المؤلف رقم 3 لسنة 71 في العراق
قانون حق المؤلف رقم 3 لسنة  71 في العراققانون حق المؤلف رقم 3 لسنة  71 في العراق
قانون حق المؤلف رقم 3 لسنة 71 في العراقHayder Hamzoz
 
أعرف حقوقك على #الانترنيت
أعرف حقوقك على #الانترنيتأعرف حقوقك على #الانترنيت
أعرف حقوقك على #الانترنيتHayder Hamzoz
 
Know Your Rights On #Internet
Know Your Rights On #InternetKnow Your Rights On #Internet
Know Your Rights On #InternetHayder Hamzoz
 
عدد أصوات جميع المرشحين في أنتخابات برلمان العراق 2014
عدد أصوات جميع المرشحين في أنتخابات برلمان العراق 2014عدد أصوات جميع المرشحين في أنتخابات برلمان العراق 2014
عدد أصوات جميع المرشحين في أنتخابات برلمان العراق 2014Hayder Hamzoz
 
قانون المطبوعات لاقليم كوردستان العراق 1993
قانون المطبوعات لاقليم كوردستان العراق 1993قانون المطبوعات لاقليم كوردستان العراق 1993
قانون المطبوعات لاقليم كوردستان العراق 1993Hayder Hamzoz
 
قانون المطبوعات في العراق رقم (206) لسنة 1968 المعدل
قانون المطبوعات في العراق رقم (206) لسنة 1968 المعدلقانون المطبوعات في العراق رقم (206) لسنة 1968 المعدل
قانون المطبوعات في العراق رقم (206) لسنة 1968 المعدلHayder Hamzoz
 
أستبيان في 15 محافظة عراقية حول العنف ضد المرأة في العراق
أستبيان في 15 محافظة عراقية حول العنف ضد المرأة في العراقأستبيان في 15 محافظة عراقية حول العنف ضد المرأة في العراق
أستبيان في 15 محافظة عراقية حول العنف ضد المرأة في العراقHayder Hamzoz
 
ورقة سياسات خاصة بمشروع قانون حرية التعبير والتظاهر السلمي في العراق
ورقة سياسات خاصة بمشروع قانون حرية التعبير والتظاهر السلمي في العراقورقة سياسات خاصة بمشروع قانون حرية التعبير والتظاهر السلمي في العراق
ورقة سياسات خاصة بمشروع قانون حرية التعبير والتظاهر السلمي في العراقHayder Hamzoz
 
المسّودة المعدلة الغير مكتملة لقانون جرائم المعلوماتية في العراق 2013
المسّودة المعدلة الغير مكتملة لقانون جرائم المعلوماتية في العراق 2013المسّودة المعدلة الغير مكتملة لقانون جرائم المعلوماتية في العراق 2013
المسّودة المعدلة الغير مكتملة لقانون جرائم المعلوماتية في العراق 2013Hayder Hamzoz
 
ورقة سياسات أولية لقانون جرائم المعلوماتية في العراق
ورقة سياسات أولية لقانون جرائم المعلوماتية في العراقورقة سياسات أولية لقانون جرائم المعلوماتية في العراق
ورقة سياسات أولية لقانون جرائم المعلوماتية في العراقHayder Hamzoz
 

Plus de Hayder Hamzoz (20)

حرية التعبير في المنظومة القانونية العراقية
حرية التعبير في المنظومة القانونية العراقيةحرية التعبير في المنظومة القانونية العراقية
حرية التعبير في المنظومة القانونية العراقية
 
Third annual Meeting of the Arab internet governance forum
Third annual Meeting of the Arab internet governance forumThird annual Meeting of the Arab internet governance forum
Third annual Meeting of the Arab internet governance forum
 
تقرير الرئيس حول المنتدى العربي لحوكمة الإنترنيت في بيروت 2014
تقرير الرئيس حول المنتدى العربي لحوكمة الإنترنيت في بيروت 2014تقرير الرئيس حول المنتدى العربي لحوكمة الإنترنيت في بيروت 2014
تقرير الرئيس حول المنتدى العربي لحوكمة الإنترنيت في بيروت 2014
 
Iraqi Budget 2015 موازنة العراق
Iraqi Budget 2015 موازنة العراق Iraqi Budget 2015 موازنة العراق
Iraqi Budget 2015 موازنة العراق
 
UNESCO launches a new publication on the role of Internet intermediaries
UNESCO launches a new publication on the role of Internet intermediariesUNESCO launches a new publication on the role of Internet intermediaries
UNESCO launches a new publication on the role of Internet intermediaries
 
مسودة قانون الاحزاب السياسية 2010 في العراق
مسودة قانون الاحزاب السياسية 2010 في العراقمسودة قانون الاحزاب السياسية 2010 في العراق
مسودة قانون الاحزاب السياسية 2010 في العراق
 
التقرير الوطني للتنمية البشرية في العراق 2014
التقرير الوطني للتنمية البشرية في العراق 2014التقرير الوطني للتنمية البشرية في العراق 2014
التقرير الوطني للتنمية البشرية في العراق 2014
 
Report from Iraqi Network for Social Media about blocking the Internet in Iraq
Report from Iraqi Network for Social Media about blocking the Internet in IraqReport from Iraqi Network for Social Media about blocking the Internet in Iraq
Report from Iraqi Network for Social Media about blocking the Internet in Iraq
 
الاتفاقية العربية لحماية حقوق المؤلف
الاتفاقية العربية لحماية حقوق المؤلفالاتفاقية العربية لحماية حقوق المؤلف
الاتفاقية العربية لحماية حقوق المؤلف
 
قانون تصديق الاتفاقية العربية لحقوق المؤلف رقم 41 لسنة 85
قانون تصديق الاتفاقية العربية لحقوق المؤلف رقم 41 لسنة 85قانون تصديق الاتفاقية العربية لحقوق المؤلف رقم 41 لسنة 85
قانون تصديق الاتفاقية العربية لحقوق المؤلف رقم 41 لسنة 85
 
قانون حق المؤلف رقم 3 لسنة 71 في العراق
قانون حق المؤلف رقم 3 لسنة  71 في العراققانون حق المؤلف رقم 3 لسنة  71 في العراق
قانون حق المؤلف رقم 3 لسنة 71 في العراق
 
أعرف حقوقك على #الانترنيت
أعرف حقوقك على #الانترنيتأعرف حقوقك على #الانترنيت
أعرف حقوقك على #الانترنيت
 
Know Your Rights On #Internet
Know Your Rights On #InternetKnow Your Rights On #Internet
Know Your Rights On #Internet
 
عدد أصوات جميع المرشحين في أنتخابات برلمان العراق 2014
عدد أصوات جميع المرشحين في أنتخابات برلمان العراق 2014عدد أصوات جميع المرشحين في أنتخابات برلمان العراق 2014
عدد أصوات جميع المرشحين في أنتخابات برلمان العراق 2014
 
قانون المطبوعات لاقليم كوردستان العراق 1993
قانون المطبوعات لاقليم كوردستان العراق 1993قانون المطبوعات لاقليم كوردستان العراق 1993
قانون المطبوعات لاقليم كوردستان العراق 1993
 
قانون المطبوعات في العراق رقم (206) لسنة 1968 المعدل
قانون المطبوعات في العراق رقم (206) لسنة 1968 المعدلقانون المطبوعات في العراق رقم (206) لسنة 1968 المعدل
قانون المطبوعات في العراق رقم (206) لسنة 1968 المعدل
 
أستبيان في 15 محافظة عراقية حول العنف ضد المرأة في العراق
أستبيان في 15 محافظة عراقية حول العنف ضد المرأة في العراقأستبيان في 15 محافظة عراقية حول العنف ضد المرأة في العراق
أستبيان في 15 محافظة عراقية حول العنف ضد المرأة في العراق
 
ورقة سياسات خاصة بمشروع قانون حرية التعبير والتظاهر السلمي في العراق
ورقة سياسات خاصة بمشروع قانون حرية التعبير والتظاهر السلمي في العراقورقة سياسات خاصة بمشروع قانون حرية التعبير والتظاهر السلمي في العراق
ورقة سياسات خاصة بمشروع قانون حرية التعبير والتظاهر السلمي في العراق
 
المسّودة المعدلة الغير مكتملة لقانون جرائم المعلوماتية في العراق 2013
المسّودة المعدلة الغير مكتملة لقانون جرائم المعلوماتية في العراق 2013المسّودة المعدلة الغير مكتملة لقانون جرائم المعلوماتية في العراق 2013
المسّودة المعدلة الغير مكتملة لقانون جرائم المعلوماتية في العراق 2013
 
ورقة سياسات أولية لقانون جرائم المعلوماتية في العراق
ورقة سياسات أولية لقانون جرائم المعلوماتية في العراقورقة سياسات أولية لقانون جرائم المعلوماتية في العراق
ورقة سياسات أولية لقانون جرائم المعلوماتية في العراق
 

Dernier

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Dernier (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

proposal of Informatics crimes act in Iraq

  • 1. In  the  name  of  the  people     The  Presidency  Council       Based  on  what  has  been  approved  by  the  Council  of  Representatives  and  ratified   by  the  Presidency  Council,  and  pursuant  to  the  first  clause  of  Article  (61)  and  the   third  clause  of  Article  (73)  of  the  constitution,  the  following  Act  has  been  passed:       Act  No.  (      )  for  the  year  2011   Information  Technology  Crimes     Chapter  One     Definitions  and  objectives     Article  (1):    The  following  expressions  shall  have  the  meanings  mentioned  towards   them,  for  the  purposes  of  this  Act:   First-­‐  The  computer:  Each  device  or  group  of  devices  connected  with  each  other   that  conduct  automated  processing  of  data.     Second-­‐  Automated  processing  of  data:  the  processes  and  functions  that  subject   to  computer’s  data  to  create,  send,  receive,  save,  and  supply  them  by   any  means.     Third-­‐  Computer  data:  Facts,  information,  concepts,  or  any  other  means  used  in   any  form  to  conduct  the  automated  processing  of  data  including  the   software  and  systems.     Fourth-­‐  Software:  Set  of  orders  that  make  the  system  able  to  perform  automated   processing  of  data.     Fifth-­‐  Authorities  to  provide  information  services:  Every  natural  or  judicial  person   providing  the  users  with  the  website  services  that  allow  the  computers  to   connect  to  each  other  or  to  any  other  person  who  processes  the  saved  data   on  behalf  of  the  service  provider.    
  • 2. Institute  for  International  Law  and  Human  Rights                                                                                                                                                                                                                        10  August  2011         Sixth-­‐  Access  data:  Codes  or  figures  for  logging  into  the  network,  devices,   computers,  or  any  similar  definition  data  sent  from  or  to  a  point  of   communication  including  the  date,  size  and  time  of  communication  and  any   information  that  identify  the  location  that  the  information  transferred  from   it  or  to  it  by  any  means  of  communications  including  cellular  communication.     Seventh-­‐  Subscription  data:  information  required  by  the  service  provider  and  are   necessary  to  identify  and  distinguish  the  physical  address  of  the   subscriber  or  the  user  or  to  identify  the  account  of  the  recipient  of  the   communication  service  from  the  service  provider  that  includes  any   information  relating  to  the  website,  devices,  individuals,  computers,   definition  data,  services,  fees,  real  place  of  the  devices  if  they  were   different  from  the  site  that  provides  access  data.     Eighth-­‐  Electronic  card:  Credit  cards,  payment  or  draw  cards,  or  any  other  card   issued  by  an  entity  licensed  by  law.     Ninth-­‐  Internet:  Set  of  computers  or  information  processing  systems  connected   with  each  other  to  obtain  the  data  and  information  and  exchange  them   such  as  the  private  networks,  public  networks,  and  global  networks  of  the   internet  and  the  like.     Tenth-­‐    Electronic  signature:  a  personal  sign  that  take  the  form  of  letters,  figures,   codes,  marks,  sounds  or  others  that  has  unique  character  indicates  its   belonging  to  the  website  and  to  be  approved  by  the  certifier.     Eleventh-­‐  Electronic  means:  the  technology  of  using  electrical,  magnetic,  optical,   electromagnetic,  or  any  similar  means  in  creating,  processing,   exchanging,  and  saving  the  information.           Twelfth-­‐  Information:  Date,  texts,  images,  shapes,  sounds,  codes,  database,   computer  software,  and  the  like  that  create,  save,  process,  or  send  by   electronic  means.   Thirteenth-­‐  E-­‐mail:  Letter  contains  information  to  be  created,  merged,  saved,   sent,  received  in  whole  or  in  part  by  electronic,  digital,  optical  or  any   other  similar  means.     2  
  • 3. Institute  for  International  Law  and  Human  Rights                                                                                                                                                                                                                        10  August  2011           Fourteenth-­‐  Information  processing  system:  the  electronic  system  used  to  create   messages  of  information,  and  to  send,  receive,  process,  or  save  them   in  any  other  means.     Fifteenth-­‐      Electronic  certificate:  The  certificate  issued  by  the  legally  licensed   entity  to  show  the  belonging  of  the  electronic  signature  to  a  specific   person  based  on  documented  procedures  approved  by  the  law.     Article  2-­‐  This  Act  aims  at  providing  legal  protection  for  the  legal  use  of  the   computer  hardware  and  the  internet,  and  punishes  the  natural  or  judicial  persons   who  violate  the  rights  of  the  users  of  these  devices  and  prevents  misusing  them  in   the  information  technology  crimes.     Chapter  two       Punishment  provisions     Article  3     First-­‐  The  penalty  shall  be  life  imprisonment  and  a  fine  of  not  less  than   (25000000)  twenty  five  million  ID  and  not  exceeding  (50  000000)  fifty  million   ID  for  anyone  who  uses  intentionally  the  computer  hardware  and  the   internet  with  the  intention  of  committing  one  of  the  following  acts:     A-­‐ Affect  the  independency  and  the  unity  of  the  country,  or  its  high  economic,  or   political,  or  military,  or  security  interests.   B-­‐  Participate,  negotiate,  promote,  make  contract,  or  deal  with  the  enemy  in  any   way  in  order  to  destabilize  the  security  and  public  order,  or  expose  the   country  to  dangers.    C-­‐  damage,  defect  or  hinder  devices,  computer  systems,  software,  or  the   information  network  that  belong  to  the  security,  military,  or  intelligence   agencies  with  the  intention  of  affecting  the  internal  or  external  security  of  the   country,  or  exposing  them  to  dangers.     Second-­‐  Any  person  uses  intentionally  the  computer  hardware  and  their  software   or  their  systems  or  the  information  network  of  the  security,  military,  or   intelligence  agencies  with  the  intention  of  harming  them  or  copying  from     3  
  • 4. Institute  for  International  Law  and  Human  Rights                                                                                                                                                                                                                        10  August  2011         them  or  with  the  intention  of  sending  their  content  to  the  enemy  or   taking  advantage  of  them  to  execute  crimes  against  the  internal  or   external  security  of  the  country,  or  to  facilitate  hiding  the  traces  of  such   crimes  or  covering  them  shall  be  punished  by  the  penalty  stipulated  in   this  Article.     Article  4-­‐  The  penalty  shall  be  life  imprisonment  and  a  fine  of  not  less  than   (25000000)  twenty  five  million  ID  and  not  exceeding  (50  000000)  fifty   million  ID  for  anyone  who  sets  up  or  manage  a  website  on  the  information   network  with  the  intention  of  committing  one  of  the  following  acts:  -­‐     First-­‐  Execute  terrorist  operations  under  fictitious  names  or  facilitate  the   communication  with  the  leaders  and  members  of  the  terrorist  groups.      Second-­‐  Promote  terrorist  acts  and  their  ideas  or  publish  information  about   manufacturing,  preparing  and  using  the  incendiary  or  explosive  devices,  or   any  tools  or  other  materials  used  in  planning  or  executing  the  terrorist  acts.     Article  5-­‐  The  penalty  shall  be  life  imprisonment  and  a  fine  of  not  less  than   (30000000)  thirty  million  ID  and  not  exceeding  (40  000000)  forty  million   ID  for  whoever  commits  one  of  the  following  acts:  -­‐     First  -­‐  set  up  a  website  or  publish  information  on  the  information  network  for  the   purpose  of  conducting  or  facilitating  any  form  of  human  trafficking,  or   promoting  it,  helping  to  conduct  it,  making  contracts,  dealing,  or   negotiating  for  the  purpose  of  concluding  bargains  relating  to  any  form  of   human  trafficking.      Second  -­‐  set  up  a  website  or  publish  information  on  the  information  network  for   the  purpose  of  trading  in  narcotic  or  mind  altering  substances  and  the  like,   or  promoting  them,  using  them,  facilitate  dealing  with  them,  making   contracts,  dealing,  or  negotiating  for  the  purpose  of  concluding  bargains   relating  to  any  form  of  trading  in  them.     Article  6-­‐  The  penalty  shall  be  life  imprisonment  or  temporary  detention  and  a   fine  of  not  less  than  (25000000)  twenty  five  million  ID  and  not   exceeding  (50  000000)  fifty  million  ID  for  anyone  who  uses  the     4  
  • 5. Institute  for  International  Law  and  Human  Rights                                                                                                                                                                                                                        10  August  2011         computer  and  the  information  network  for  the  purpose  of  committing   one  of  the  following  acts:  -­‐     First-­‐  Agitate  the  armed  rebellion  or  threaten  by  thereof  or  promote  it,  or  incite   sectarian  or  sectarian  trends,  incite  seditions,  disturb  security  and  public   order,  or  harm  the  reputation  of  the  country.      Second  -­‐  Damage,  disrupt,  impair,  hinder,  or  harm  intentionally  the  computer   systems  or  computer  hardware,  or  the  information  network  of   government  departments  with  the  intention  of  affecting  its  system  and   its  infrastructure.      Third-­‐  Publish  or  broadcast  false  or  shaded  facts  in  order  to  weaken  the   confidence  in  the  electronic  financial  system  or  the  electronic  commercial   and  financial  papers  and  the  like  or  damage  the  national  economy  and  the   financial  confidence  of  the  country.     Article  7-­‐  The  penalty  shall  be  temporary  detention  and  a  fine  of  not  less  than   (10000000)  ten  million  ID  and  not  exceeding  (30  000000)  thirty  million   ID  for  any  whoever  commits  one  of  the  following  acts:  -­‐     First  -­‐  Use  intentionally  the  computer  system  or  the  internet  belonging  to  people,   companies,  institutions,  banks,  or  financial  markets  and  appropriate  to   himself  the  property  of  other  people  or  their  financial  rights,  or  made  for   himself  or  for  another  financial  benefit  or  deprived  others  of  his  financial   rights  by  any  electronic  means.     Second-­‐  Use  the  computers  or  the  information  network  to  appropriate  to  himself   or  to  others  software,  information,  data,  or  codes  through  any  electronic   transaction,  electronic  contract,  electronic  cards,  movable  property,   deed,  or  signs  upon  deed  using  deception,  a  false  name,  or   impersonation  with  intent  to  defraud  the  victim.      Third-­‐  Tamper,  play  with,  alter,  change,  or  create  any  data,  statements  of   account,  or  software  related  to  stocks,  deeds,  and  prices  of  circulated   currency  in  Iraq,  or  any  data,  statements  of  account,  or  software  used  by     5  
  • 6. Institute  for  International  Law  and  Human  Rights                                                                                                                                                                                                                        10  August  2011         bodies  inside  Iraq  in  the  activities  of  circulating  stocks,  deeds,  or   currencies  that    take  place  outside  of  Iraq  for  the  account  of  others.     Article  8-­‐     First-­‐  The  penalty  shall  be  temporary  detention  and  a  fine  of  not  less  than   (10000000)  ten  million  ID  and  not  exceeding  (15  000000)  fifteen  million  ID   for  whoever  commits  one  of  the  following  acts:  -­‐     A-­‐  Forge,  imitate,  or  create  by  himself  or  by  another  person  a  signature,  deed,   email,  approval  certificate,  or  a  license  to  practice  e-­‐signature  services  and  the   like,  or  intentionally  used  them  illegally.    B  -­‐  Forge,  imitate,  or  create  by  himself  or  by  another  person  in  any  form  an   electronic  card  or  smart  card  or  any  means  of  transferring  the  local  or  foreign   currency  inside  Iraq  or  using,  circulating,  or  dealing  with  it  while  he  knows   that  it  is  false.      C  -­‐  Use  or  try  to  use  fake  or  false  electronic  card  while  he  knows  that  it  is  false,  or   accept  to  pay  using  the  fake  or  false  credit  card  while  he  knows  that  it  is  false.    D  –  Create  intentionally  to  himself  or  to  other  person  any  false  electronic  data,   documents,  registers,  or  records,  or  make  any  change  or  alteration  in  any   electronic  deed,  or  use  any  of  them  before  any  public  or  private  body.    E  –  Make  for  the  purpose  of  sale,  distribution,  or  expose  any  software,  hardware,   data,  or  any  technical  means  to  be  used  in  forgery,  counterfeiting,  creating,  or   modification  with  the  intention  of  committing  a  felony  or  misdemeanor.     Second-­‐  The  penalty  shall  be  imprisonment  for  a  term  not  less  than  (10)  ten  years   and  a  fine  of  not  less  than  (20000000)  twenty  million  ID  and  not   exceeding  (30000000)  thirty  million  ID  if  the  acts  defined  in  Sub-­‐Article   (First)  of  this  Article:     A  –  Relate  to  the  rights  of  the  state,  the  public  sector,  or  the  private  entities  with   public  benefit.    B  -­‐  Commit  by  an  officer  or  by  a  person  in  charge  of  public  service  during   performing  his  job  or  because  of  it.     Article  9-­‐     First-­‐  The  penalty  shall  be  imprisonment  for  a  term  not  less  than  (10)  ten  years   and  a  fine  of  not  less  than  (5000000)  five  million  ID  and  not  exceeding     6  
  • 7. Institute  for  International  Law  and  Human  Rights                                                                                                                                                                                                                        10  August  2011         (10000000)  ten  million  ID  for  whoever  abstracts  or  appropriates   intentionally  an  electronic  signature,  email,  deed,  electronic  records,   electronic  trade  and  financial  papers,  or  any  other  electronic  output  related   to  the  rights  or  properties  of  others  to  achieve  a  benefit  to  him  or  to  others,   and  the  punishment  shall  be  imprisonment  in  case  of  intentional  possession   in  order  to  be  exploited  to  bring  benefit  to  himself  or  to  others.     Second-­‐  The  penalty  shall  be  imprisonment  for  a  term  not  less  than  (10)  ten  years   and  a  fine  of  not  less  than  (3000000)  three  million  ID  and  not  exceeding   (5000000)  five  million  ID  for  whoever  entrusts  to  devices,  software,  data,   information  network,  electronic  cards,  or  any  other  electronic  outputs,  or   entrusted  by  public  authorities  to  maintain  them  as  a  guard  or  a  trustee,   and  after  that  he  appropriate  them  with  the    intention  of  possession  or   he  act  with  it  according  to  his  interest  or  others  interest,  or  bring  an   illegal  benefit  to  him  or  to  another  person.     Article  10-­‐  The  penalty  shall  be  imprisonment  for  a  term  not  less  than  (7)  seven   years  and  a  fine  of  not  less  than  (10000000)  ten  million  ID  and  not   exceeding  (30000000)  thirty  million  ID  for  whoever  creates,  manages,   promotes,  or  set  up  a  website  on  the  information  network  to  allow  or   facilitate  money  laundering  or  accept  illegal  financial  transactions  such   as  bank  drafts  and  fake  trading  operations,  or  move,  exchange,  use,   acquire,  or  possess  the  money  using  electronic  means  contrary  to  the   law  or  hide  its  sources  knowingly  it  is  derived  from  an  illegal  sources.     Article  11-­‐     First-­‐  The  penalty  shall  be  imprisonment  for  a  term  not  exceeding  (7)  seven  years   and  a  fine  of  not  less  than  (3000000)  three  million  ID  and  not  exceeding   (5000000)  five  million  ID  for  anyone  who:  -­‐     A-­‐  Threaten  another  person,  by  using  the  computer  or  the  internet,  with   committing  a  felony  against  himself  or  his  property,  or  against  another  person   or  his  property  with  the  intention  of  intimidating  him,  or  driving  him  to  do   something  or  prevent  him  from  doing  something.   B  -­‐  Send  or  transmit  any  electronic  message,  news,  or  document  using  the   computers    or  the  information  network  knowingly  contains  threat  or     7  
  • 8. Institute  for  International  Law  and  Human  Rights                                                                                                                                                                                                                        10  August  2011         blackmail  for  a  person  with  the  intention  of  intimidating  him,  or  driving  him  to   do  something  or  prevent  him  from  doing  something.     Second-­‐  The  penalty  shall  be  imprisonment  and  a  fine  of  not  less  than  (2000000)   two  million  ID  and  not  exceeding  (4000000)  four  million  ID  for  whoever   threatens  another  person  with  using  the  computers  and  the  information   network  in  other  cases  defined  in  Sub-­‐Article  (First)  of  this  Article.     Article  12-­‐   First-­‐  The  penalty  shall  be  imprisonment  and  a  fine  of  not  less  than  (3000000)   three  million  ID  and  not  exceeding  (5000000)  five  million  ID  for  whoever  creates,   publishes  or  provides  an  incorrect  electronic  certificate.     Second-­‐  The  penalty  shall  be  imprisonment  for  a  term  not  less  than  (3)  three   months  and  not  exceeding  (1)  one  year  or  a  fine  of  not  less  than  (30000000)  thirty   million  ID  and  not  exceeding  (50000000)  fifty  million  ID  for  whoever  practice  the   activity  of  electronic  ratification  and  issuing  certificate  contrary  to  the  law.     Article  13-­‐     First-­‐  The  penalty  shall  be  imprisonment  for  a  term  not  less  than  (3)  three  years   and  a  fine  of  not  less  than  (5000000)  five  million  ID  and  not  exceeding   (10000000)  ten  million  ID  or  of  both  penalties  for  anyone  who:  -­‐     A-­‐  Damage  or  hurt  an  electronic  signature,  means  or  mail.   B-­‐  Use  or  create  intentionally  an  electronic  signature,  means  or  mail  contrary  to   the  conditions  and  specifications  set  by  the  competent  authority.   C-­‐  know,  due  to  his  position,  the  data  of  the  electronic  signature,  electronic   means,  or  information  and  divulges  them  with  the  intention  of  harming  the   others  or  bringing  financial  benefit  to  himself  or  to  the  others  or  using  them  for   other  purpose  for  which  they  were  given.    D-­‐  Gain  unlawfully  an  electronic  signature,  means  or  mail,  or  get  access  to  this   electronic  means  or  hinder  or  impair  its  role.     Second-­‐  The  penalty  shall  be  imprisonment  and  a  fine  of  not  less  than  (3000000)   three  million  ID  and  not  exceeding  (10000000)  ten  million  ID  for  whoever   submits  incorrect  information  to  an  authorized  body  that  practice  the     8  
  • 9. Institute  for  International  Law  and  Human  Rights                                                                                                                                                                                                                        10  August  2011         activity  of  issuing  the  electronic  approval  certificate  with  the  intention  of   obtaining,  suspending  or  canceling  the  approval  certificate.     Third-­‐  The  penalty  shall  be  a  fine  of  not  less  than  (3000000)  three  million  ID  and   not  exceeding  (5000000)  five  million  ID  for  whoever  declines  to  provide   the  security  authorities  and  bodies  responsible  for  issuing  the  licenses   with  the  required  reports,  information  and  statistics,  data,  records,   electronic  commercial  and  financial  papers,  software,  or  any  other   outputs  to  the  extent  that  relates  to  their  activities  and  do  not  contradict   with  the  intellectual  property  rights.     Article  14-­‐     First-­‐  The  penalty  shall  be  imprisonment  for  a  term  not  exceeding  (3)  three  years   and  a  fine  of  not  less  than  (10000000)  ten  million  ID  and  not  exceeding   (15000000)  fifteen  million  ID  for  anyone  who:  -­‐     A  -­‐  Damage,  defect  or  disrupt  an  electronic  deed  or  electronic  card  that  proves  a   debt,  dispose,  or  any  financial  or  moral  rights  or  any  other  e-­‐mail  used  to   prove  the  rights.     B  -­‐  Use  in  his  work  intentionally  electronic  commercial  or  financial  papers,   records,  electronic  cards,  and  the  like  of  the  computer  and  information   network  outputs  that  include  other  rights  and  neglects  arranging  them.     Second-­‐  The  penalty  shall  be  imprisonment  for  a  term  not  less  than  (3)  three   years  and  a  fine  of  not  less  than  (15000000)  fifteen  million  ID  and  not   exceeding  (25000000)  twenty  five  million  ID  or  either  for  whoever   disrupts  intentionally  the  computers  and  the  internet  devoted  to  the   public  interest,  or  damage  or  hinder  their  functions.     Third-­‐  The  penalty  shall  be  imprisonment  for  a  term  not  exceeding  (3)  three   months  and  a  fine  of  not  less  than  (2000000)  two  million  ID  and  not   exceeding  (5000000)  five  million  ID  for  anyone  who:  -­‐     A  -­‐  Entrust  with  operating  the  computers  and  controlling  them,  and  he  was   intentionally  the  cause  of  damage,  disrupt,  hinder  or  defect  the  computers  or   their  systems,  software,  or  their  networks  and  the  like.       9  
  • 10. Institute  for  International  Law  and  Human  Rights                                                                                                                                                                                                                        10  August  2011         B  -­‐  Intrude,  bother,  or  call  the  users  of  the  computers  and  the  internet  without   permission  or  hinders  using  them  by  the  beneficiaries.     C  –  Log  into  a  website  or  an  information  system  intentionally,  without  permission,   or  makes  connection  with  the  computer  system  or  with  part  of  it.     D  -­‐  Use,  without  permission,  or  caused  to  use  the  computers  belonging  to  others   directly  or  indirectly.     E  –  Make  use  of  telecommunications  services  unlawfully,  through  the  internet  or   one  of  the  computers.     Article  15-­‐   First-­‐  The  penalty  shall  be  imprisonment  and  a  fine  of  not  less  than  (10000000)  ten   million  ID  and  not  exceeding  (15000000)  fifteen  million  ID  for  anyone  who:     A-­‐  Excess  the  scope  of  the  authorization  given  to  him  intentionally  or  intercepts   any  information  during  the  transmission  of  the  communications.     B-­‐  Eavesdrop  or  watch  the  stored  and  exchanged  data  in  information  systems.     Second-­‐  The  penalty  shall  be  imprisonment  for  a  term  not  less  than  (4)  four  years   and  a  fine  of  not  less  than  (15000000)  fifteen  million  ID  and  not   exceeding  (25000000)  twenty  five  million  ID  if  the  act  provided  for  in   clause  (one)  of  this  Article  results  in  the  deletion,  destruction,  alteration,   defection,  disruption,  or  republication  of  data  and  information  belonging   to  others  unlawfully.     Article16-­‐  The  penalty  shall  be  imprisonment  for  a  term  not  less  than  (7)  years   and  a  fine  of  not  less  than  (25000000)  twenty  five  million  ID  and  not   exceeding  (50000000)  fifty  million  ID  or  either  for  whoever  receives  or   intercepts,  unlawfully,  communication  transmitted  by  one  of  the   computers  and  through  the  information  network  with  the  intention  of   bringing  financial  benefits  for  himself  and  for  others.     Article17-­‐     First-­‐  The  penalty  shall  be  imprisonment  for  a  term  not  exceeding  (3)  years  and  a   fine  of  not  less  than  (5000000)  five  million  ID  and  not  exceeding  (10000000)   ten  million  ID  for  whoever  decodes  or  damages  the  code  of  an  electronic   signature,  computer,  information  network,  or  an  electronic  card  of  other   person  with  the  intention  of  committing  one  of  crimes  stipulated  in  this  Act.       10  
  • 11. Institute  for  International  Law  and  Human  Rights                                                                                                                                                                                                                        10  August  2011         Second-­‐  The  penalty  shall  be  temporary detention and  a  fine  of  not  less  than   (10000000)  ten  million  ID  and  not  exceeding  (15000000)  fifteen  million   ID  if  the  act  defined  in  Sub-­‐Article  (First)  of  this  Article  was  done  against   computers,  software,  networks,  deeds,  electronic  cards,  or  rights  of   government  departments  and  public  institutions  or  those  who  work  on   their  behalf.     Article  18-­‐   First-­‐  The  penalty  shall  be  imprisonment  and  a  fine  of  not  less  than  (5000000)  five   million  ID  and  not  exceeding  (10000000)  ten  million  ID  for  anyone  who:     A.  Provide  false  electronic  information  or  data  to  the  judicial  or  administrative   authorities  knowingly  that  they  are  inaccurate.   B.  Decline  to  provide  information  or  data  to  the  judicial  or  administrative   authorities.     Second-­‐  The  penalty  shall  be  imprisonment  for  a  term  not  exceeding  (3)  three   years  and  a  fine  of  not  less  than  (2000000)  two  million  ID  and  not   exceeding  (3000000)  three  million  ID  for  anyone  who:     A.  Use  the  computers  and  the  information  network  and  assume  a  false  identity  or   name  with  the  intention  of  deception  and  fraud.     B.  Set  up  or  use  unreal  or  illusory  website,  or  conceal  or  helped  to  conceal  the  fact   of  a  website  on  the  information  network  with  the  intention  of  committing  one   of  the  crimes  defined  in  this  Act.     Third-­‐  The  penalty  shall  be  imprisonment  for  a  term  not  less  than  (7)  seven  years   and  a  fine  of  not  less  than  (15000000)  fifteen  million  ID  and  not  exceeding   (20000000)  twenty  million  ID  if  the  crime  defined  in  Sub-­‐Article  (First)  and   (Second)  of  this  Article  commits  by  an  officer  or  by  a  person  in  charge  of   public  service,  or  if  the  false  title,  name,  or  the  information  relates  to  an   public  officer  or  government  department.     Article  19-­‐   First-­‐  The  penalty  shall  be  imprisonment  for  a  term  not  less  than  (3)  three  years   and  a  fine  of  not  less  than  (5000000)  five  million  ID  and  not  exceeding   (10000000)  ten  million  ID  for  anyone  who:     11  
  • 12. Institute  for  International  Law  and  Human  Rights                                                                                                                                                                                                                        10  August  2011           A.  Obtain  illegally  information,  data,  software  or  any  computer  outputs  and  he  set   them  up  or  announce  them  intentionally  by  using  the  computer  and  the   information  network  with  the  intention  of  harming  others.    B.  Disclose  any  kind  of  subscribers’  information  or  their  secrets  or  disclose  the   access  data  to  any  other  party  without  an  approval  issued  by  a  competent   official  body.    C.  Sell,  transfer,  or  trade  in  the  personal  data  that  the  subscribers  provided  them   to  him  for  any  reason  without  their  permission  to  bring  financial  benefit  to  him   or  to  others.     Second-­‐  The  penalty  shall  be  imprisonment  for  a  term  not  less  than  (7)  seven   years  and  a  fine  of  not  less  than  (5000000)  five  million  ID  and  not   exceeding  (10000000)  ten  million  ID  if  the  acts  defined  in  Sub-­‐Article   (First)  of  this  Article  Commits  by  an  officer  or  by  a  person  in  charge  of   public  service  while  he  is  performing  his  job  or  because  of  it.     Article  20-­‐   First-­‐  The  penalty  shall  be  imprisonment  and  a  fine  of  not  less  than  (2000000)  two   million  ID  and  not  exceeding  (5000000)  five  million  ID  for  whoever  uses  the   computer  and  the  information  network  to  commit  one  of  the  following  acts:     A  –  Use,  with  the  intention  of  fraud,  a  trademark  in  Iraq  registered  in  the  name  of   other  person  as  a  title  for  his  information  network,  or  allowed  other  side  who   works  in  the  field  of  technical  services  in  Iraq  to  use  it.   B  -­‐  Use  his  electronic  card  for  payment  knowingly  that  he  has  no  balance,  or  he   uses  it  knowingly  that  it  is  expired  or  cancelled,  or  he  uses  the  electronic  card   that  belongs  to  other  person  and  this  card  was  delivered  to  him  without  the   knowledge  of  the  owner.     Second-­‐  The  penalty  shall  be  imprisonment  for  a  term  not  exceeding  (10)  ten   years  and  a  fine  of  not  less  than  (5000000)  five  million  ID  and  not   exceeding  (10000000)  ten  million  ID  in  one  of  the  two  following  cases:     A  -­‐  If  the  offender  is  an  officer  or  a  person  in  charge  of  public  service  and   committed  one  of  the  crimes  defined  in  Sub-­‐Article  (First)  of  this  Article  while   he  is  doing  his  job  or  because  of  his  job,  or  he  facilitates  the  crime  to  others.     12  
  • 13. Institute  for  International  Law  and  Human  Rights                                                                                                                                                                                                                        10  August  2011          B  -­‐  If  the  acts  defined  in  Sub-­‐Article  (First)  of  this  Article  targets  any  of  the   computer  systems  or  the  information  networks  that  belong  to  any   government  entity  in  Iraq,  or  it  works  on  its  behalf.     Article  21-­‐   First-­‐  The  penalty  shall  be  imprisonment  for  a  term  not  less  than  (2)  two  years  and   not  exceeding  (3)  three  years  and  a  fine  of  not  less  than  (10000000)  ten   million  ID  and  not  exceeding  (20000000)  twenty  million  ID  for  whoever   commits  one  of  the  following  acts:   A-­‐  Use  the  internet  and  the  computer  to  publish  or  copy  intellectual  works,   literary  works,  or  scientific  research  belonging  to  others  and  that  protected  by   laws  or  international  conventions.     B-­‐  Access  the  website  of  a  company,  institution  or  others  to  change,  delete,  or   modify  the  design  of  this  website  or  exploit  it  unlawfully.     Second-­‐  The  penalty  shall  be  a  fine  of  not  less  than  (500000)  five  hundred   thousand  ID  and  not  exceeding  (1000000)  one  million  ID  for  whoever   publishes,  copies,  or  trades  in  software  or  information  without   authorization.     Third-­‐  The  penalty  shall  be  imprisonment  for  a  term  not  less  than  (1)  one  year  and   a  fine  of  not  less  than  (2000000)  two  million  ID  and  not  exceeding   (5000000)  five  million  ID  for  whoever  violates,  in  any  manner,  the  religious,   moral,  family,  or  the  social  principles  or  values,  or  violates  the  privacy  of   the  private  life  by  using  the  information  network  or  the  computers  in  any   manner.     Article  22-­‐   First-­‐  The  penalty  shall  be  imprisonment  for  a  term  not  exceeding  (3)  three  years   and  a  fine  of  not  less  than  (3000000)  three  million  ID  and  not  exceeding   (6000000)  six  million  ID  for  whoever  sets  up,  runs,  or  helps  to  set  up  a   website  on  the  information  network  for  gambling,  or  practice  gambling,  or   call  for  or  promote  gambling  using  the  information  network.     Second-­‐  The  penalty  shall  be  temporary  detention  and  a  fine  of  not  less  than   (10000000)  ten  million  ID  and  not  exceeding  (30000000)  thirty  million  ID   for  whoever  commits  one  of  the  following  acts:     13  
  • 14. Institute  for  International  Law  and  Human  Rights                                                                                                                                                                                                                        10  August  2011           A-­‐  Set  up,  run,  or  help  to  set  up  a  website  to  promote  and  incite  an  act  of  lechery   and  fornication,  or  any  software,  information,  pictures,  or  films  that  breach  of   modesty  or  public  morals,  or  engages  in  calling  for  or  promoting  them.   B-­‐  Expose  a  minor  or  juvenile  to  immorality  activities  or  use  the  internet  to   promote,  product,  and  distribute  prostitution  materials,  or  uses  the  email,   computer,  or  the  internet  to  prepare  or  run  immorality  activities  or   communications  using  a  minor,  juvenile,  or  incapacitated  person.     Third-­‐  The  penalty  shall  be  imprisonment  for  a  term  not  exceeding  (2)  two  years   and  a  fine  of  not  less  than  (3000000)  three  million  ID  and  not  exceeding   (5000000)  five  million  ID  or  either  for  whoever  uses  the  computers  and  the   internet  to  attribute  terms,  images,  sounds  or  any  other  means  that  include   libel  and  insult  to  the  others.     Article  23-­‐  The  penalty  shall  be  imprisonment  for  a  term  not  less  than  (1)  one  year   and  not  exceeding  (2)  two  years  and  a  fine  of  not  less  than  (3000000)   three  million  ID  and  not  exceeding  (5000000)  five  million  ID  for   whoever  produces,  sells,  imports  or  distributes  intentionally  any   devices,  tools  or  computer  software,  or  passwords  or  access  codes   that  led  to  commit  one  of  the  crimes  defined  in  this  Act.       Chapter  Three   Procedures  for  collecting  of  evidence,  investigation,  and  trial Article  24-­‐   First-­‐  The  investigation  agencies  shall  undertake  the  investigation  procedures  and   collecting  of  evidence,  and  request  them  from  their  sources  concerning  the   crimes  defined  in  this  Act.     Second  -­‐  It  is  not  permitted  for  the  investigation  agencies  to  start  the   investigation  procedures  without  an  order  of  the  competent  judge.     Third-­‐  The  chief  investigator  or  the  investigator  shall  undertake  the  enforcement   of  the  procedures,  collecting  of  evidence,  or  any  other  investigation   procedure  stipulated  in  the  Criminal  procedures  Code.     14  
  • 15. Institute  for  International  Law  and  Human  Rights                                                                                                                                                                                                                        10  August  2011           Article  25-­‐   First-­‐    A-­‐  The  court  of  misdemeanors  or  felonies  in  Rusafa  shall  hear  the  crimes  defined   in  this  law  for  a  period  of  three  (3)  years  from  the  date  of  its  entry  into  force,   each  court  according  to  its  jurisdiction.   B  -­‐  The  court  defined  in  paragraph  (A)  of  this  Sub-­‐Article  shall  continue  hearing   the  crimes  before  it  until  taking  a  decision  on  this  crime  and  reaching  the  final   judgment.     Second  -­‐  The  courts  of  misdemeanors  or  felonies  shall  hear,  according  to  the  rules   of  jurisdiction,  the  crimes  defined  in  this  Act  after  the  expiration  of  the   period  defined  in  Sub-­‐Article  (First)  of  this  Article.     Third  -­‐  The  crimes  defined  in  this  Act  shall  be  heard  by  one  or  more  judges  who   have  experience  and  competence  and  received  special  training.     Fourth-­‐  The  competent  judge  may  use  the  expertise  from  inside  and  outside  Iraq   during  the  investigation  and  trial  period.     Article  26  –     First  -­‐  The  competent  judge  may:                                                                                                                                                                                                                                 A-­‐  Issue  the  orders  to  any  party  to  save  the  computer  data,  including  the   transmitted  information  or  the  data  stored  in  the  computer  hardware  or  in  its   accessories  and  its  outputs  that  could  be  changed  or  lost.   B  -­‐  Issue  orders  to  the  parties  who  provide  information  network  services  or  the   different  technical  services  to  provide  the  investigators  with  the  subscription   date  and  the  password  data  if  that  would  help  in  the  detection  of  the  crime.   C-­‐  Access  to  the  computers  and  the  networks  or  to  any  part  of  them  and  to  the   data  stored  in  them,  and  to  access  to  any  device  or  means  which  can  store   computer  data  inside  Iraq,  and  to  intercept,  monitor  and  control  the  data  by  a   reasoned  decision  that  has  specific  duration  and  purpose.   D-­‐  Trace  the  information  to  the  computer  systems  and  the  networks  connected   with  other  suspected  computer  systems  or  networks  provided  that  to  inform   the  owners  of  the  systems  and  the  networks  with  this  procedure  and  its  scope,   and  provided  that  this  limited  procedure  do  not  violate  or  affect  the  rights  of   others.     15  
  • 16. Institute  for  International  Law  and  Human  Rights                                                                                                                                                                                                                        10  August  2011         E  -­‐  Seize  the  computers  or  part  of  them  and  the  device  that  the  data  stored  in  it   and  transfer  them  to  the  investigation  site  to  be  analyzed  and  examined.  The   judge  may  copy  the  data  without  transferring  the  system,  and  may  remove  the   data  that  prevent  access  to  the  computer  system  without  damaging  the  system   or  affecting  the  data  and  the  software  that  stored  in  it.     Second-­‐  the  side  that  undertakes  collecting  of  evidence  shall:     A-­‐  Prepare  two  hardcopies  of  the  data  to  be  analyzed  and  examined,  and  to   deliver  the  first  hardcopy  directly  to  the  chief  investigator  before  taking  any   action  about  it,  and  to  start  the  procedures  of  analysis  and  examination  on  the   second  hardcopy.  It  is  not  allowed  to  make  any  alteration  or  change  to  these   two  copies.   B-­‐  Provide  the  electronic  copy  of  the  evidence  or  the  hardcopies  of  the  evidence   with  a  detailed  report  shows  the  procedures,  tools  and  the  equipment  used  in   obtaining  evidence  or  recovering  them.     Third-­‐  The  investigation  and  the  expertise  side  shall  provide  the  outputs  of  the   electronic  copies  as  hardcopies  along  with  a  detailed  report  about  the  date   of  copying  t  the  hardcopies.     Chapter  Four   General  and  final  provisions       Article  27  -­‐  The  acts  stipulated  in  this  Act  shall  be  punished  by  the  penalties   stipulated  in  it  without  prejudice  to  any  severer  punishments   stipulated  by  the  applicable  laws.     Article  28  –     First  -­‐  The  provisions  of  judicial  person’s  responsibility  stipulated  in  Penal  Code   No.  111  for  the  year  1969  concerning  the  crimes  stipulated  in  this  Act  that   were  committed  in  his  name  or  for  his  account,  shall  be  applied.     Second  -­‐  The  judicial  person  shall  be  committed  to  solidarity  with  the  sentenced   person  concerning  the  payment  of  the  fines  and  compensation  decided   by  the  court,  if  the  crime  was  committed  in  his  name  and  for  his  account.     16  
  • 17. Institute  for  International  Law  and  Human  Rights                                                                                                                                                                                                                        10  August  2011           Article  29-­‐  Without  prejudice  to  the  rights  of  bona  fide  third  parties,  the  court   may  decide  to  confiscate  or  damage  the  tools,  equipment,  software,   and  devices  used  in  the  commission  of  the  crimes  stipulated  in  this  Act.       Article  30  -­‐  The  following  Codes  are  applicable  unless  specifically  provided  for  in   this  Act:      First  -­‐  Penal  Code  No.  111  for  the  year  1969.      Second  -­‐  Criminal  Procedure  Code  No.  23  for  the  year  1971.      Article  31  -­‐  This  Act  shall  enter  into  effect  after  ninety  (90)  days  from  the  date  of   its  publication  in  the  Official  Gazette.       Reasons     In  order  to  provide  legal  protection  and  to  reach  a  punishment  system  for  the   perpetrators  of  computer  and  Internet  crimes  that  accompanied  the  evolution,   growth,  and  development  of  computer  systems,  networks  and  information   technology  revolution.  These  crimes  involves  a  lot  of  risks  that  inflict  great   causalities  upon  the  institutions  and  individuals,  where  these  crimes  attack  the   data  and  information  and  affect  the  private  life  of  the  individuals,  threaten  the   national  security  and  national  sovereignty,  weaken  the  confidence  in  the  new   technologies,  threaten  the  human  creativity,  and  provide  legal  protection  for  the   computer  systems  that  the  State  encourages  depending  on  them  in  all  the   activities.       This  Act  initiated.     17