The Cybercrime Act of Nepal
Preamble:
WHEREAS, it is essential to underline the relevance that information and communication technology has for the citizens of Nepal,
And whereas a foundation to foster the development was laid out by the National Broadband Policy, the National ICT Policy and the National Cybersecurity Policy,
And whereas it is expedient to develop an updated legal framework that safeguard the security of electronic systems and networks by criminalizing serious violations,
Now, therefore, be it enacted by the House of Representatives in the …… Year of the issuance of the Proclamation of the House of Representatives, 2063(2007).
Chapter – 1
Preliminary
Short Title, Extension and Commencement:
(1) This Act may be called “The Cybercrime Act, x (2018)”.
(2) This Act shall be deemed to have been commenced from
(3) This Act shall extend throughout Nepal and shall also apply to any person residing anywhere by committing an offence in contravention to this Act.
Definitions: Unless the subject or context otherwise requires, in this Act,-
a) “Access” means means an opportunity of gaining entry into, logical, arithmetical or resources of memory function of any electronic system, computer system or network;
b) “Access provider” means any person providing any electronic communication transmission service by transmitting information provided by or to a user of the service in a communication network or providing access to a communication network;
c) “Caching provider” means any person providing an electronic data transmission service by automatic, intermediate and temporary storing information, performed for the sole purpose of making more efficient the information’s onward transmission to other users of the service upon their request;
d) “Child” means a minor not having completed the age of sixteen years;
e) “Child pornography” means material that, –
depicts or presents a child engaged in sexually explicit conduct; or depicts or presents a person appearing to be a child engaged in sexually explicit conduct; or realistically represents a person appearing to be child engaged in sexually explicit conduct; this includes, but is not limited to, any visual (images, animations or videos), audio or text material.
f) “Critical infrastructure” means electronic systems, devices, networks, computer programs, electronic data, vital for the security, defense or international relations of Nepal ; or the existence or identity of a confidential source of information relating to the enforcement of criminal law; or the provision of services directly related to communications infrastructure, banking and financial services, public utilities, courts, public transportation, public key infrastructure, payment systems infrastructure or e-commerce infrastructure; or the protection of public safety including systems related to essential emergency services such as police, civil defense and medical services; the purpose declared as such by the Ministry of Defense in accordance with the prescribed procedure; where the incapacity or destruction of or interference with such systems and assets would have a debilitating impact on the country.
g) “Electronic” includes but not limited to electrical, digital, analogue, magnetic, optical, biochemical, electrochemical, electromechanical, electromagnetic, radio electric or wireless technology;
h) “Electronic communication” means any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by electronic means; i) “Electronic data” means any representation of facts, concepts, information (being either texts, images, audio, or video) machine-readable code or instructions, in a form suitable for processing in an electronic system, including a program suitable to cause an electronic system to perform a function;
j) “Electronic device” means any hardware or equipment which performs one or more specific functions and operates on any form or combination of electrical energy and includes but is not limited to components of electronic systems such as computer, graphic cards, mobile phones, memory, chips; storage components such as hard drives, memory cards, compact discs, tapes; iii. input devices such as keyboards, mouse, track pad, scanner, digital cameras; iv. output devices such as printer, screens;
k) “Electronic mail message” means any data generated by an electronic system for one or more electronic mail addresses;
l) “Electronic storage medium” means any article or material (for example, a disk) from which information is capable of being reproduced, with or without the aid of any other article or device.
m) “Electronic system” means any electronic device or a group of interconnected or related devices, one or more of which, pursuant to a program or manual or any external instruction, performs automatic processing of information or electronic data and may also include a permanent, removable or any other electronic storage medium;
n) “Hinder” in relation to an electronic system includes but is not limited to: i. cutting the electricity supply to an electronic system; or causing electromagnetic interference to an electronic system; or corrupting an electronic system by any means; or damaging, deleting, deteriorating, altering or suppressing electronic data; o) “Hosting provider” means any person providing an electronic data transmission service by storing of information provided by a user of the service;
p) “Information” includes text, message, data, voice, sound, database, video, signals, software, computer programs, codes including object code and source code;
q) “Interception” means tapping into an electronic communication not directed to the one who is tapping in including but is not limited to the acquiring, viewing and capturing of any electronic communication whether by wire, wireless, electronic, optical, magnetic, or other means, during transmission through the use of any technical device;
r) “Internet Service Provider” means a natural or legal person that provides to users services mentioned in Sections 27-29;
s) “Remote Forensic Tool” means an investigative tool such as software or hardware installed on or applied with regard to an electronic system and used to perform tasks that include but are not limited to keystroke logging or transmission of an IP-address;
t) “Seize” includes:
activating any onsite electronic system and electronic storage media; ii. making and retaining a copy of electronic data, including by using onsite equipment; iii. maintaining the integrity of the relevant stored electronic data;
rendering inaccessible, or removing, electronic data in the accessed electronic system;
taking a printout of output of electronic data; or
secure an electronic system or part of it or an electronic storage medium; u) “Spam” means the unsolicited transmission of a harmful, fraudulent, misleading or illegal electronic mail message to any person or causing an electronic system to show such message for commercial or illegal purpose.
v) “Traffic data” means electronic data that:
1) relates to a communication by means of an electronic system; and
2) is generated by an electronic system that is part of the chain of communication ; and
3) shows the communication’s origin, destination, route, time date, size, duration or the type of underlying services; “Thing” includes but not limited to:
1) an electronic system or part of an electronic system;
2) another electronic system, if: electronic data from that electronic system is available to the first electronic system being searched; and there are reasonable grounds for believing that the electronic data sought is stored in the other electronic system;
3) an electronic data storage medium.
Chapter – 2 Jurisdiction
Notwithstanding anything contained in the prevailing laws, if any person commits any act or an omission which constitutes an offence under this Act in the territory of Nepal; or on a ship or aircraft registered in Nepal; or by a national of Nepal outside the territory of Nepal if the person’s conduct would also constitute an offence under a law of the country where the offence was committed; or by a national of Nepal outside the jurisdiction of any country a case may be filed against such a person and shall be punished accordingly.
Chapter – 3 Offences Related to Electronic Systems and Electronic Data
Illegal Access to an Electronic System
1) If any person will fully and with mala fide intention, without lawful excuse or justification or in excess of a lawful excuse or justification, accesses the whole or any part of an electronic system by infringing security measures, such a person shall be liable to the punishment with the fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both.
2) If the act described in Subsection (1) includes wilful and mala fide access to critical infrastructure the person shall be liable to the punishment with the fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both.
Explanation: (to be deleted in the final version): In the following provisions “wilfully” will mainly be used to describe the mens rea. The provision above includes wilful and with mala fide as international and regional models (such as the Council of Europe Convention on Cybercrime) allow such restriction with regard to illegal access. With regard to most other provisions such restriction is not allowed. In order to meet those standards the restriction was not included in other provisions.
Illegal Remaining in am Electronic System
If any person wilfully, without lawful excuse or justification or in excess of a lawful excuse or justification, remains logged in an electronic system or part of an electronic system or continues to use an electronic system, such a person shall be liable to the punishment with the fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both, depending on the degree of the offence.
Illegal Interception
If any person wilfully, without lawful excuse or justification or in excess of a lawful excuse or justification, intercepts by technical means: any non-public transmission to, from or within an electronic system; or electromagnetic emissions from an electronic system such a person shall be liable to the punishment with the fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both, depending on the degree of the offence.
Illegal Data Interference
If any person wilfully, without lawful excuse or justification or in excess of a lawful excuse or justification, interferes with an electronic data owned or managed by someone else by doing any of the following acts:
damages or deteriorates electronic data; or deletes electronic data; or alters electronic data; or renders electronic data meaningless, useless or ineffective; or obstructs, interrupts or interferes with the lawful use of electronic data; or vi. obstructs, interrupts or interferes with any person in the lawful use of electronic data; or denies access to electronic data to any person authorized to access it; such a person shall be liable to the punishment with the fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both, depending on the degree of the offence.
Illegal Acquisition of Data
1) If any person wilfully, without lawful excuse or justification or in excess of a lawful excuse or justification, obtains, for himself or for another, electronic data which are not meant for him, and which are not public or protected against unauthorized access, such a person shall be liable to the punishment with the fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both, depending on the degree of the offence.
2) If the act described in Subsection
(1) includes confidential electronic data such a person shall be liable to the punishment with the fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both, depending on the degree of the offence.
Illegal System Interference
1) If any person wilfully, without lawful excuse or justification or in excess of a lawful excuse or justification:
Hinders, denies or interferes with the functioning of an electronic system; or ii. Hinders, denies or interferes with a person who is lawfully using or operating an electronic system;
such a person shall be liable to the punishment with the fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both.
2) If the act described in Subsection (1) affects an electronic system that is exclusively for the use of critical infrastructure operations, or in the case in which such is not exclusively for the use of critical infrastructure operations, but it is used in critical infrastructure operations and such conduct affects that use or impacts the operations of critical infrastructure such a person shall be liable to the punishment with the fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both, depending on the degree of the offence.
Illegal Devices
1) If any person wilfully, without lawful excuse or justification or in excess of a lawful excuse or justification, produces, sells, procures for use, imports, exports, distributes or otherwise makes available:
a software, electronic system or an electronic device, that is designed or adapted for the purpose of committing an offence defined by Section 4-9 of this Act and that is contained in a schedule published by Nepal Telecommunications Authority; or
a password, access code or similar data by which the whole or any part of an electronic system or electronic data is capable of being accessed;
with the intent that it be used by any person for the purpose of committing an offence defined by Section 4-9 of this Act, such a person shall be liable to the punishment with the fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both, depending on the degree of the offence.
2) If any person wilfully, without lawful excuse or justification or in excess of a lawful excuse or justification has an item mentioned in Subparagraph (1) (i) or (1) (ii) in possession with the intent that it be used by any person for the purpose of committing an offence defined by other provisions of Section 4-9 of this Act, such a person shall be liable to the punishment with the fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both, depending on the degree of the offence.
3) Explanation: This provision shall not be interpreted as imposing criminal liability where the production, sale, procurement for use, import, distribution or otherwise making available or possession referred to in Subsection 1 is not for the purpose of committing an offence established in accordance with other provisions of Section 4-9 of this Act, such as for the authorized testing or protection of an electronic system.
Electronic Forgery
If any person wilfully, without lawful excuse or justification or in excess of a lawful excuse or justification inputs, alters, deletes, or suppresses electronic data, resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible, such a person shall be liable to the punishment with the fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both, depending on the degree of the offence.
Electronic Fraud
If any person wilfully, without lawful excuse or justification or in excess of a lawful excuse or justification, causes a loss of property to another person by:
any input, alteration, deletion or suppression of electronic data;
any interference with the functioning of an electronic system,
with fraudulent or dishonest intent of procuring, without right, an economic benefit for oneself or for another person, such a person shall be liable to the punishment with the fine not
exceeding […] Rupees and with imprisonment not exceeding […] years or with both, depending on the degree of the offence.
Child Pornography
1) If any person wilfully, without lawful excuse or justification or in excess of a lawful excuse or justification
produces child pornography for the purpose of its distribution through an electronic system;
offers or makes available child pornography through an electronic system; iii. distributes or transmits child pornography through an electronic system; iv. procures and or obtains child pornography through an electronic system for oneself or for another person;
possesses child pornography in an electronic system or on an electronic storage medium; and
knowingly obtains access, through electronic system, to child pornography, such a person shall be liable to the punishment with the fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both, depending on the degree of the offence.
2) Explanation: It is a defense to a charge of an offence under Subsection (1) (ii) to Subsection (1) (vi) if the person establishes that the child pornography was offered, distributed, procured or kept for bona fide religious, research, law enforcement or medical purposes. If child pornography was stored for such purpose, the authorized persons need to ensure that it is deleted as soon as it is not legally required anymore.
Pornography
If any person wilfully, without lawful excuse or justification or in excess of a lawful excuse or justification by using an electronic system in any stage of the offence, makes pornography available to one or more children or facilitates the access of children to pornography such a person shall be liable to the punishment with the fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both, depending on the degree of the offence.
Identity-Related Crime
If any person wilfully, without lawful excuse or justification or in excess of a lawful excuse or justification by using an electronic system in any stage of the offence, transfers, possesses, or uses a means of identification of another person with the intent to commit, or to aid or abet, or in connection with, any unlawful activity that constitutes a crime, such a person shall be liable to the punishment with the fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both, depending on the degree of the offence.
Solicitation of Children
If any person wilfully, through an electronic system proposes to a child, to meet him or her, with the intent of sexually exploiting the child, whether or not such proposal has been followed by material acts, such a person shall be liable to the punishment with the fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both, depending on the degree of the offence.
Chapter – 4 Investigations and Evidence
Admissibility of Electronic Evidence
In proceedings for an offence against a law of Nepal, the fact that evidence has been generated from an electronic system does not by itself prevent that evidence from being admissible.
Search and Seizure
1) If the [court /Information Technology Tribunal], based on an application by a police officer and on the basis of [sworn evidence] [affidavit][reasonable information] is satisfied, that there are reasonable grounds [that there may be in a place an electronic device or electronic data:
that may be material as evidence in proving an offence; or
that has been acquired by a person as a result of an offence;
the [court/Information Technology Tribunal] may issue a warrant authorizing a police officer, with such assistance as may be necessary, to enter the place to search and seize the electronic device or electronic data including search or similar access:
a) an electronic system or part of it and electronic data stored therein; and
b) an electronic storage medium in which electronic data may be stored in the territory of Nepal.
2) Any person who makes a search or seizure under this section, shall at the time or as soon as practicable:
make a list of what has been seized, with the date and time of seizure; and give a copy of that list to [xxx]
iii. the occupier of the premises; or the person in control of such electronic devices.
3) Subject to Subsection (4), on request, a police officer or another authorized person shall: i. permit a person who had the custody or control of the electronic devices, or someone acting on their behalf to access and copy electronic data on the system or give the person a copy of the electronic data.
4) The police officer or another authorized person may refuse to give access or provide copies if he or she has reasonable grounds for believing that giving access, or providing the copies may — constitute a criminal offence; or prejudice the investigation in connection with which the search was carried out; another ongoing investigation; or any criminal proceedings that are pending or that may be brought in relation to any of those investigations.
5) If the police officer that is undertaking a search based on Subsection (1) has grounds to believe that the data sought is stored in another electronic system or part of it in its territory, and such data is lawfully accessible from or available to the initial system, he or she shall be able to expeditiously extend the search or similar access to the other system.
6) Police officer that is undertaking a search is empowered to seize or similarly secure electronic data accessed according Subsection (1) and Subsection (2).
Assistance
A person who is not a suspect of a crime but is in possession or control of an electronic device or electronic data that is the subject of a search under Section 18 (1) shall at his own cost permit, and assist if required, the police officer making the search to — access and use an electronic device or electronic data; obtain and copy that electronic data;
iii. use an electronic device to make copies, and obtain an intelligible output from an electronic device in a format that can be read. 20. Production Order
If the [court/Information Technology Tribunal] on application by a police officer is satisfied on the basis of [sworn evidence] [affidavit][reasonable information] that specified electronic data or a printout or other information is reasonably required for the purpose of a criminal investigation or criminal proceedings, it may order:
a person in control of an electronic device or electronic system of electronic devices to produce specified electronic data or printout of such information; and ii. a service provider to produce information about persons who subscribe to or use their services.
Expedited Preservation
1) If a police officer not below the rank of the sub-inspector is satisfied that:
electronic data stored in an electronic device is reasonably required for the purpose of a criminal investigation; and
there is a risk that the data may be destroyed or rendered inaccessible;
the police officer may, by written notice given to a person in control of the electronic device, require the person to ensure that the data specified in the notice be preserved for a period of up to 7 days as specified in the notice.
2) The [court/Information Technology Tribunal] may upon application authorize an extension not exceeding 14 days.
Partial Disclosure
1) If the [court/Information Technology Tribunal] on application by a police officer is satisfied on the basis of [sworn evidence] [affidavit][reasonable information] that specified data stored in an electronic device or system of electronic devices is required for the purpose of a criminal investigation or criminal proceedings, the [court/Information Technology Tribunal] may order such person to disclose sufficient traffic data about a specified communication to identify: the service providers; and the path through which the communication was transmitted.
2) In investigations based on reasonable information an immediate threat to the life of a victim exists, a police officer not below the rank of the sub-inspector, that is satisfied that specified data stored in an electronic device or system of electronic devices is required for the purpose of saving the life of the victim may order such person to disclose sufficient traffic data about a specified communication to identify: the service providers; and the path through which the communication was transmitted.
Collection of Traffic Data
1) If the [court/Information Technology Tribunal] on application by a police officer is satisfied on the basis of [sworn evidence] [affidavit][reasonable information] that traffic data associated with a specified communication is reasonably required for the purposes of a criminal investigation, the [court/Information Technology Tribunal] may, by written notice given to a person in control of such data, request that person to: collect or record traffic data associated with a specified communication during a specified period in real time; and permit and assist police officer to collect or record that data in real time.
2) If the [court/Information Technology Tribunal] on application by a police officer is satisfied on the basis of [sworn evidence] [affidavit][ reasonable information] that traffic data associated with a specified communication is reasonably required for the purposes of a criminal investigation, the [court/Information Technology Tribunal] may authorize any police officer to collect or record traffic data associated with a specified communication during a specified period through application of technical means n real time.
Lawful Interception of Content Data
If the [court/Information Technology Tribunal] on application by a police officer is satisfied on the basis of [sworn evidence] [affidavit][reasonable information] that content of electronic communications is reasonably required for the purposes of a criminal investigation, the [court/Information Technology Tribunal] may: order a service provider whose service is available in Nepal through application of technical means to collect or record, to permit or assist competent authorities with the collection or recording of content data associated with specified communications transmitted by means of an electronic system in real time; orauthorize a police officer to collect or record that data through application of technical means in real time.
Forensic Tools
1) If the [court/Information Technology Tribunal] on application by a police officer is satisfied on the basis of [sworn evidence] [affidavit][reasonable information] that in an investigation concerning an offence listed in Subsection (7) herein below there are reasonable grounds to believe that essential evidence can not be collected by applying other instruments listed in Chapter 4 but is reasonably required for the purposes of a criminal investigation, the [court/Information Technology Tribunal] may authorize a police officer to utilize a remote forensic tool with the specific task required for the investigation and install it on the suspect’s or his service provider’s electronic system in order to collect the relevant evidence. The application needs to contain the following information: suspect of the offence and his service provider, if possible with name and address, and description of the targeted electronic system, and
iii. description of the intended measure, extent and duration of the utilization, and iv. reasons for the necessity of the utilization.
2) Within such investigation it is necessary to ensure that modifications to the electronic system of the suspect or his service provider are limited to those essential for the investigation and that any changes if possible can be undone after the end of the investigation. During the investigation it is necessary to log: the technical mean used and time and date of the application; and the identification of the electronic system and details of the modifications undertaken within the investigation; and any information obtained.
Any such information obtained by the use of such software need to be protected against any modification, unauthorized deletion and unauthorized access.
3) The duration of authorization in Subsection (1) is limited to 3 months. If the conditions of the authorization are no longer met, the action taken are to stop immediately.
4) If the installation process requires physical access to a place the requirements of Section 18 need to be fulfilled.
5) If necessary police officer may pursuant to the order granted in Subsection (1) above requests that the [court/Information Technology Tribunal] order a service provider to support the installation process.
6) [List of offences]
The Cybercrime Act of Nepal Chapter – 5
Criminal Liability of Internet Service Provider
No Monitoring Obligation
Internet service providers do not have a general obligation to monitor the information which they transmit or store on behalf of another, nor do they have a general obligation to actively seek facts or circumstances indicating illegal activity to avoid criminal liability. This provision does not affect the possibility for a court to require an Internet service provider to terminate or prevent an infringement based on any law enacted in Nepal.
Access Provider
1) An Access provider is not criminally liable for providing access and transmitting information on condition that the provider:
does not initiate the transmission;
does not select the receiver of the transmission; or
iii. does not select or modify the information contained in the transmission. 2) The acts of transmission and of provision of access referred to in paragraph 1 include the automatic, intermediate and transient storage of the information transmitted in so far as this takes place for the sole purpose of carrying out the transmission in the
communication network, and provided that the information is not stored for any period longer than is reasonably necessary for the transmission.
Hosting Provider
1) A Hosting provider is not criminally liable for the information stored at the request of a user of the service, on condition that:
the Hosting provider expeditiously removes or disables access to the information after receiving an order from any public authority or court of law to remove specific illegal information stored; or
the Hosting provider, upon obtaining knowledge or awareness about specific illegal information stored by other ways than an order from a public authority,
expeditiously takes appropriate action to remedy and inform [the relevant public authority] to enable them to evaluate the nature of the information and if necessary issue an order to remove the content.
2) Subparagraph (1) shall not apply when the user of the service is acting under the authority or control of the Hosting provider.
3) If the Hosting provider is removing the content pursuant to Subparagraph (1) he is exempted from contractual obligations with his customer to ensure the availability of the service.
Caching Provider
A Caching provider is not criminally liable for the automatic, intermediate and temporary storage of that information, performed for the sole purpose of making more efficient the information’s onward transmission to other users of the service upon their request, on condition that:
the Caching provider does not modify the information;
the [Caching provider] complies with conditions of access to the information;
iii. the Caching provider complies with rules regarding the updating of the information, specified in a manner widely recognised and used by industry;
the Caching provider does not interfere with the lawful use of technology, widely recognised and used by industry, to obtain data on the use of the information; and
the Caching provider acts expeditiously to remove or to disable access to the information it has stored upon obtaining actual knowledge of the fact that the information at the initial source of the transmission has been removed from the network, or access to it has been disabled, or that a court or an administrative authority has ordered such removal or disablement.
Chapter – 6
Miscellaneous
Government of Nepal may issue Directives:
Government of Nepal may, in regard to the implementation of this Act, issue necessary directives to Telecommunication and Internet Service Providers and in such a case, it shall be a duty of the Internet Service Providers, as the case may be, to comply with such directives. 31. Power of Frame Rules:
The government of Nepal may in order to fulfil the objective of this Act, frame necessary Rules.
To Frame and Enforce the Directive:
To Frame and Enforce the Directives: The government of Nepal may, in order to achieve the objective of this Act, frame and enforce necessary directives, subject to this Act and Rules framed hereunder.
Appendix 1
Sample Language for Provisions Discussed during Stakeholder Consultations
Pornography (different approach – not limited to interaction with children)
If any person wilfully, without lawful excuse or justification or in excess of a lawful excuse or justification
produces pornography for the purpose of its distribution through an electronic system;
offers or makes available pornography through an electronic system;
iii. distributes or transmits pornography through an electronic system;
procures and or obtains pornography through an electronic system for oneself or for another person;
possesses pornography in an electronic system or on an electronic storage medium; and
knowingly obtains access, through electronic system, to pornography,
such a person shall be liable to the punishment with the fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both, depending on the degree of the offence.
Racist and Xenophobic Material
If any person wilfully, without lawful excuse or justification or in excess of a lawful excuse or justification
produces racist and xenophobic material for the purpose of its distribution through an electronic system;
offers or makes available racist and xenophobic material through an electronic system;
iii. distributes or transmits racist and xenophobic material through an electronic system;
such a person shall be liable to the punishment with the fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both, depending on the degree of the offence.
Racist and Xenophobic Insult
If any person wilfully, without lawful excuse or justification or in excess of a lawful excuse or justification, through an electronic system
persons for the reason that they belong to a group distinguished by race, colour, descent or national or ethnic origin, as well as religion, if used as a pretext for any of these factors; or
a group of persons which is distinguished by any of these characteristics
such a person shall be liable to the punishment with the fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both, depending on the degree of the offence.
Denial of Genocide and Crimes against Humanity
If any person wilfully, without lawful excuse or justification or in excess of a lawful excuse or justification, distributes or otherwise makes available, through an electronic system to the public, material which denies, grossly minimises, approves or justifies acts constituting genocide or crimes against humanity, such a person shall be liable to the punishment with the fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both, depending on the degree of the offence.
Disclosure of Details of an Investigation
If any Internet service provider who receives an order related to a criminal investigation that explicitly stipulates that confidentiality is to be maintained or such obligation is stated by law willfully and without lawful excuse or justification or in excess of a lawful excuse or justification, discloses:
the fact that an order has been made; or
anything done under the order; or
iii. any data collected or recorded under the order;
such a person shall be liable to the punishment with a fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both, depending on the degree of the offence.
Failure to permit Assistance
If any person other than the suspect, wilfully, without lawful excuse or justification or in excess of a lawful excuse or justification, fails to permit or assist a person based on an order as specified by Sections X, such a person shall be liable to the punishment with the fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both, depending on the degree of the offence.
Harassment utilizing means of Electronic Communication
If any person wilfully, without lawful excuse or justification or in excess of a lawful excuse or justification,, initiates any electronic communication, with the intent to coerce, intimidate, harass, or cause substantial emotional distress to a person and thereby using an electronic system to support severe, repeated, and hostile behaviour, such a person shall be liable to the punishment with the fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both, depending on the degree of the offence.
SPAM
3) If any person wilfully, without lawful excuse or justification or in excess of a lawful excuse or justification:
initiates the transmission of spam; or
uses a protected electronic system to relay or retransmit spam, with the intent to deceive or mislead users, or any electronic mail or service provider, as to the origin of such messages, or
iii. materially falsifies header information in spam and intentionally initiates the transmission of such messages,
such a person shall be liable to the punishment with the fine not exceeding […] Rupees and with imprisonment not exceeding […] years or with both, depending on the degree of the offence.
4) Explanation: The transmission of single or multiple electronic messages within a customer or business relationship is not considered to be covered by Subsection (1)(i) provided that the customer did not actively reject the submission of such electronic messages prior to the transmission.
Appendix 2
Explanatory Notes to the Draft
(a) Access
While some comparable pieces of legislation in other countries limit the definition of access to acts of entering a computer system the definition included in the Bill was extracted from the Electronic Transactions Act. Based on the definition there access means an opportunity of gaining entry into, logical, arithmetical or resources of memory function of any electronic system, computer system or network. It is therefore in line with the approaches undertaken by other countries but more precise by describing the specificities of the act.
(b) Child
The term “child” on an international level is defined by Article 1 of the UN Convention of the Rights of the Child. Based on this definition a child is a person below the age of 18. However, the Childrens Act, 2048 uses a different definition. Based Sec. 2 of the Childrens Act, 2048, child includes a minor not having completed the age of sixteen years. Despite the difference to the UN Convention this definition was used in the Bill. To ensure consistancy within the legislation in case of modifications to the Childrens Act a reference to the definition could be included in the definition. Details of the determination of age, for example the question if the appearance can be used in cases where information about the real age of the child cannot be obtained, are left to interpretation by courts to determine this in accordance with the requirements of domestic laws. The definition of child pornopgraphy in this respect contains certain guidance.