Success, we'll get back to you

09 Oct 2023, by Rights Connect Admin

Cybercrime Act 2015 of Tanzania: Data Espionage (Part 7)

Welcome to the next part of our journey through the Cybercrime Act. In Section 8, we're going to look at data espionage. This section is all about making sure important information is kept safe and not accessed without permission. It's a crucial part of keeping our digital world secure.


Understanding Data Espionage:


Section 8(1) says that, except for what's mentioned in the National Security Act, it's not allowed to get computer data that's protected against unauthorized access unless you have explicit permission. This means we need to respect the rules in place to keep sensitive information safe.


Real-life Examples:


Imagine a situation where a competitor tries to get into a company's private financial reports without permission. This not only invades privacy but also creates unfair competition, and it can lead to serious legal trouble.


The Consequences:


Breaking Section 8(1) is a very serious matter. If caught, the person responsible might face a big fine, at least twenty million shillings, or three times the value of what they gained unfairly, whichever is more. They could also be sent to prison for a minimum of five years, or both.



Sources:


Cybercrime Act of 2015, Edition 3


Real-world examples inspired by documented cybercrime cases

Related Articles