Success, we'll get back to you

26 Jul 2023, by Rights Connect Admin

Cybercrime Act 2015 of Tanzania: Data Interference (Part 6)

Welcome back to our exploration of the Cybercrime Act, where we now delve into Section 7: Illegal Data Interference. This section addresses various actions that are considered offenses under the law, all aimed at protecting computer data from unauthorized tampering, destruction, or obstruction. Let's embark on this digital journey and uncover the crucial aspects of illegal data interference.


1. Damaging, Deleting, and Altering Computer Data:

Section 7(1) addresses intentional and unlawful actions that harm or manipulate computer data. Offenses include damaging or deteriorating computer data, deleting it without authorization, altering its content, rendering it useless, or obstructing its lawful use. 


For example, a disgruntled employee may deliberately erase critical financial records from a company's database to disrupt their operations.


Penalty: Fine of not less than ten million shillings or three times the value of undue advantage received, whichever is greater, or imprisonment for a term of not less than three years, or both.


2. Communicating Unlawful Computer Data:

Section 7(2) focuses on offenses related to the unauthorized communication and receipt of computer data. This includes sharing computer data or codes with unauthorized individuals or intentionally obtaining computer data without proper authorization.


For instance, an individual might share confidential company emails containing sensitive information with unauthorized parties, such as competitors.


Penalty: Fine of not less than two million shillings or three times the value of the undue advantage received, whichever is greater, or imprisonment for a term of not less than one year, or both.


3. Destruction or Alteration of Vital Computer Data:

Section 7(3) addresses intentional and unlawful actions involving the destruction or alteration of critical computer data that is required by law or serves as evidence in legal proceedings. This includes damaging or tampering with computer data or programs, using malicious software to alter data, or manipulating access codes to obstruct justice. 


For example, a cybercriminal might deliberately alter digital evidence crucial to a fraud investigation or ongoing legal procedures.


Penalty: Fine of not less than twenty million shillings or three times the value of undue advantage received, whichever is greater, or imprisonment for a term of not less than one year, or both.


Conclusion:


Understanding the provisions of Section 7 is essential for safeguarding our digital landscape. By upholding the integrity of computer data and respecting authorized access, we foster a secure online environment for everyone. Join us for the next installment of our series, where we delve into more aspects of the Cybercrime Act and its significance in today's digital age in Tanzania.


Sources:


Cybercrime Act of 2015, Edition 3

Real-world examples inspired by documented cybercrime cases

Related Articles