Computer Misuse and Cybercrimes Act: Laws of Kenya
Computer Misuse and Cybercrimes Act: Laws of Kenya
Computer Misuse and Cybercrimes Act: Laws of Kenya
NO. 5 OF 2018
NO. 5 OF 2018
3
No. 5 of 2018
Computer Misuse and Cybercrimes
4
No. 5 of 2018
Computer Misuse and Cybercrimes
NO. 5 OF 2018
COMPUTER MISUSE AND CYBERCRIMES ACT
[Date of assent: 16th May, 2018.]
[Date of commencement: 30th May, 2018.]
AN ACT of Parliament to provide for offences relating to computer
systems; to enable timely and effective detection, prohibition, prevention,
response, investigation and prosecution of computer and cybercrimes;
to facilitate international co-operation in dealing with computer and
cybercrime matters; and for connected purposes
[Act No. 5 of 2018.]
PART I – PRELIMINARY
1. Short title
This Act may be cited as the Computer Misuse and Cybercrimes Act, 2018.
2. Interpretation
In this Act, unless the context otherwise requires —
"access" means gaining entry into or intent to gain entry by a person to a
program or data stored in a computer system and the person either—
(a) alters, modifies or erases a program or data or any aspect related
to the program or data in the computer system;
(b) copies, transfers or moves a program or data to—
(i) any computer system, device or storage medium other than
that in which it is stored; or
(ii) to a different location in the same computer system, device
or storage medium in which it is stored;
(c) causes it to be output from the computer in which it is held, whether
by having it displayed or in any other manner; or
(d) uses it by causing the computer to execute a program or is itself
a function of the program;
"Authority" means the Communications Authority of Kenya;
"authorised person" means an officer in a law enforcement agency or
a cybersecurity expert designated by the Cabinet Secretary responsible for
matters relating to national security by notice in the Gazette for the purposes
of Part III of this Act;
"blockchain technology" means a digitized, decentralized, public ledger
of all crypto currency transactions;
"Cabinet Secretary" means the Cabinet Secretary responsible for matters
relating to internal security;
"Central Authority" means the Office of the Attorney General and
Department of Justice;
"Committee" means the National Computer and Cybercrimes Co-
ordination Committee established under section 4;
5
No. 5 of 2018
Computer Misuse and Cybercrimes
6
No. 5 of 2018
Computer Misuse and Cybercrimes
7
No. 5 of 2018
Computer Misuse and Cybercrimes
8
No. 5 of 2018
Computer Misuse and Cybercrimes
9
No. 5 of 2018
Computer Misuse and Cybercrimes
10
No. 5 of 2018
Computer Misuse and Cybercrimes
11
No. 5 of 2018
Computer Misuse and Cybercrimes
secure practices.
(d) identify any other risk-based security factors appropriate and
necessary to protect public health and safety, or national socio-
economic security; and
(e) recommend to the owners of systems designated as critical
infrastructure, methods of securing their systems against cyber
threats.
11. Reports on critical information infrastructure
(1) The owner or operator of a system designated as critical infrastructure shall
report to the Committee any incidents likely to constitute a threat in the nature of
an attack that amounts to a computer and cybercrime and the action the owner or
operator intends to take to prevent the threat.
(2) Upon receipt of a report by the Committee, under subsection (1), the
National Security Council shall provide technical assistance to the owner or
operator of a critical infrastructure to mitigate the threat.
(3) The Director may institute an investigation of a computer and cybercrime
attack on his or her own volition and may take necessary steps to secure any critical
infrastructure without reference to the entity.
(4) The Director shall submit a report on any threat in the nature of a computer
and cybercrime reported by the owners or operators of critical infrastructure
periodically to the National Security Council.
12. Information sharing agreements
(1) A private entity may enter into an information sharing agreement with a
public entity on critical information infrastructure.
(2) An agreement under subsection (1) shall only be entered into for the
following purposes and in line with a critical infrastructure framework—
(a) to ensure cyber security;
(b) for the investigation and prosecution of crimes related to cyber
security;
(c) for the protection of life or property of an individual; and
(d) to protect the national security of the country.
(3) Prior to the sharing of information under subsection (1), a party to an
agreement shall review the information and ascertain whether the information
contains personal details that may identify a specific person not directly related to
a threat that amounts to a computer and cybercrime and remove such information.
(4) A person shall not, under this Part, share information relating to the health
status of another person without the prior written consent of the person to whom
the information relates.
13. Auditing of critical information infrastructures to ensure compliance
(1) The owner or person in control of a critical information infrastructure shall
annually submit a compliance report on the critical information infrastructure to
the Committee in line with a critical infrastructure framework in order to evaluate
compliance.
(2) The Director, shall within a reasonable time before an audit on a critical
information infrastructure or at any time there is an imminent threat in the nature of
12
No. 5 of 2018
Computer Misuse and Cybercrimes
an attack that amounts to a computer and cybercrime, notify the owner or person
in control of a critical information infrastructure in writing—
(a) the date on which an audit is to be performed; and
(b) the particulars and contact details of the person who is responsible
for the overall management and control of the audit.
(3) The Director shall monitor, evaluate and report on the adequacy and
effectiveness of any audit.
(4) The Director may request the owner or person in control of a critical
information infrastructure to provide such additional information as may be
necessary within a specified period in order to evaluate the issues raised from the
audit.
(5) An owner or authorised person in control of a critical information
infrastructure commits an offence and if convicted is liable to a fine not exceeding
two hundred thousand shillings or to term of imprisonment not exceeding five years
or both if the owner or authorized person —
(a) fails to file a compliance report and fails to cooperate with an audit
to be performed on a critical information infrastructure in order to
evaluate compliance with the directives issued;
(b) fails to provide to the Director such additional information as may be
necessary within a specified period in order to evaluate the report of
an audit in line with the critical infrastructure after he or she has been
requested to do so to the Director;
(c) hinders, obstructs or improperly attempts to influence any member of
the Committee, person or entity to monitor, evaluate and report on the
adequacy and effectiveness of an audit;
(d) hinders, obstructs or improperly attempts to influence any person
authorized to carry out an audit;
(e) fails to co-operate with any person authorized to carry out an audit; or
(f) fails to assist or provide technical assistance and support to a person
authorized to carry out an audit.
(6) A person shall not perform an audit on a critical information infrastructure
unless he or she—
(a) has been authorized in writing by the Director to perform such audit; or
(b) is in possession of a certificate of appointment, in the prescribed form,
issued by the Director, which certificate must be submitted to the
owner or person in control of a critical information infrastructure at the
commencement of the audit.
PART III – OFFENCES
14. Unauthorised access
(1) A person who causes, whether temporarily or permanently, a computer
system to perform a function, by infringing security measures, with intent to gain
access, and knowing such access is unauthorised, commits an offence and is liable
on conviction, to a fine not exceeding five million shillings or to imprisonment for a
term not exceeding three years, or to both.
(2) Access by a person to a computer system is unauthorised if—
13
No. 5 of 2018
Computer Misuse and Cybercrimes
(a) that person is not entitled to control access of the kind in question to
the program or data; or
(b) that person does not have consent from any person who is entitled
to access the computer system through any function to the program
or data.
(3) For the purposes of this section, it is immaterial that the unauthorised access
is not directed at—
(a) any particular program or data;
(b) a program or data of any kind; or
(c) a program or data held in any particular computer system.
15. Access with intent to commit further offence
(1) A person who commits an offence under section 14 with intent to commit a
further offence under any law, or to facilitate the commission of a further offence by
that person or any other person, commits an offence and is liable, on conviction, to
a fine not exceeding ten million shillings or to imprisonment for a term not exceeding
ten years, or to both.
(2) For the purposes of subsection (1), it is immaterial that the further offence
to which this section applies is committed at the same time when the access is
secured or at any other time.
16. Unauthorised interference
(1) A person who intentionally and without authorisation does any act which
causes an unauthorised interference, to a computer system, program or data,
commits an offence and is liable on conviction, to a fine not exceeding ten million
shillings or to imprisonment for a term not exceeding five years, or to both.
(2) For the purposes of this section, an interference is unauthorised, if the
person whose act causes the interference —
(a) is not entitled to cause that interference;
(b) does not have consent to interfere from a person who is so entitled.
(3) A person who commits an offence under subsection (1) which—
(a) results in a significant financial loss to any person;
(b) threatens national security;
(c) causes physical injury or death to any person; or
(d) threatens public health or public safety, is liable, on conviction, to a
fine not exceeding twenty million shillings or to imprisonment for a
term not exceeding ten years, or to both.
(4) For the purposes of this section, it is immaterial whether or not the
unauthorised interference is directed at —
(a) any particular computer system, program or data;
(b) a program or data of any kind; or
(c) a program or data held in any particular computer system.
(5) For the purposes of this section, it is immaterial whether an unauthorised
modification or any intended effect of it is permanent or temporary.
14
No. 5 of 2018
Computer Misuse and Cybercrimes
15
No. 5 of 2018
Computer Misuse and Cybercrimes
16
No. 5 of 2018
Computer Misuse and Cybercrimes
17
No. 5 of 2018
Computer Misuse and Cybercrimes
18
No. 5 of 2018
Computer Misuse and Cybercrimes
19
No. 5 of 2018
Computer Misuse and Cybercrimes
20
No. 5 of 2018
Computer Misuse and Cybercrimes
21
No. 5 of 2018
Computer Misuse and Cybercrimes
not exceeding two hundred thousand shillings or imprisonment for a term not
exceeding two years, or to both.
(3) A person who with intent to defraud, franks electronic messages,
instructions, subscribes any electronic messages or instructions, commits an
offence and is liable on conviction a fine not exceeding two hundred thousand
shillings or imprisonment for a term not exceeding two years, or to both.
(4) A person who manipulates a computer or other electronic payment device
with the intent to short pay or overpay commits an offence and is liable on conviction
to a fine not exceeding two hundred thousand shillings or imprisonment for a term
not exceeding two years, or to both.
(5) A person convicted under subsection (4) shall forfeit the proprietary interest
in the stolen money or property to the bank, financial institution or the customer.
39. Issuance of false e-instructions
A person authorized to use a computer or other electronic devices for
financial transactions including posting of debit and credit transactions, issuance
of electronic instructions as they relate to sending of electronic debit and credit
messages or confirmation of electronic fund transfer, issues false electronic
instructions, commits an offence and is liable, on conviction, a fine not exceeding
two hundred thousand shillings or imprisonment for a term not exceeding two years,
or to both.
40. Reporting of cyber threat
(1) A person who operates a computer system or a computer network, whether
public or private, shall immediately inform the Committee of any attacks, intrusions
and other disruptions to the functioning of another computer system or network
within twenty four hours of such attack, intrusion or disruption.
(2) A report made under subsection (1) shall include—
(a) information about the breach, including a summary of any information
that the agency knows on how the breach occurred;
(b) an estimate of the number of people affected by the breach;
(c) an assessment of the risk of harm to the affected individuals; and
(d) an explanation of any circumstances that would delay or prevent the
affected persons from being informed of the breach.
(3) The Committee may propose the isolation of any computer systems or
network suspected to have been attacked or disrupted pending the resolution of
the issues.
(4) A person who contravenes the provisions of subsection (1) commits an
offence and is liable upon conviction a fine not exceeding two hundred thousand
shillings or imprisonment for a term not exceeding two years, or to both.
41. Employee responsibility to relinquish access codes
(1) An employee shall, subject to any contractual agreement between
the employer and the employee, relinquish all codes and access rights to
their employer's computer network or system immediately upon termination of
employment.
(2) person who contravenes the provision of this subsection (1) commits an
offence and shall be, liable on conviction, to a fine not exceeding two hundred
thousand shillings or imprisonment for a term not exceeding two years, or to both.
22
No. 5 of 2018
Computer Misuse and Cybercrimes
23
No. 5 of 2018
Computer Misuse and Cybercrimes
24
No. 5 of 2018
Computer Misuse and Cybercrimes
25
No. 5 of 2018
Computer Misuse and Cybercrimes
26
No. 5 of 2018
Computer Misuse and Cybercrimes
(3) The period of preservation and maintenance of integrity may be extended for
a period exceeding thirty days if, on an application by the police officer or authorised
person, the court is satisfied that—
(a) an extension of preservation is reasonably required for the purposes
of an investigation or prosecution;
(b) there is a risk or vulnerability that the traffic data may be modified,
lost, destroyed or rendered inaccessible; and
(c) the cost of the preservation is not overly burdensome on the person
in control of the computer system.
(4) The person in possession or control of the computer system shall be
responsible to preserve the data specified—
(a) for the period of notice for preservation and maintenance of integrity
or for any extension thereof permitted by the court; and
(b) for the period of the preservation to keep confidential any preservation
ordered under this section.
(5) Where the person in possession or control of the computer system is a
service provider, the service provider shall be required to—
(a) respond expeditiously to a request for assistance, whether to facilitate
requests for police assistance, or mutual assistance requests; and
(b) disclose as soon as practicable, a sufficient amount of the non-content
data to enable a police officer or an authorised person to identify any
other telecommunications providers involved in the transmission of
the communication.
(6) The powers of the police officer or an authorised person under subsection
(1) shall apply whether there is one or more service providers involved in the
transmission of communication which is subject to exercise of powers under this
section.
52. Real-time collection of traffic data
(1) Where a police officer or an authorised person has reasonable grounds to
believe that traffic data associated with specified communications and related to
the person under investigation is required for the purposes of a specific criminal
investigation, the police officer or authorised person may apply to the court for an
order to—
(a) permit the police officer or authorised person to collect or record
through the application of technical means traffic data, in real-time;
(b) compel a service provider, within its existing technical capability—
(i) to collect or record through application of technical means traffic
data in real time; or
(ii) to cooperate and assist a police officer or an authorised
person in the collection or recording of traffic data, in real-time,
associated with specified communications in its jurisdiction
transmitted by means of a computer system.
(2) In making an application under subsection (1), the police officer or an
authorised person shall—
(a) state the grounds they believe the traffic data sought is available with
the person in control of the computer system;
27
No. 5 of 2018
Computer Misuse and Cybercrimes
(b) identify and explain, the type of traffic data suspected to be found on
such computer system;
(c) identify and explain the subscribers, users or unique identifier the
subject of an investigation or prosecution suspected as may be found
on such computer system;
(d) identify and explain the offences identified in respect of which the
warrant is sought; and
(e) explain the measures to be taken to prepare and ensure that the traffic
data shall be sought—
(i) while maintaining the privacy of other users, customers and
third parties; and
(ii) without the disclosure of data to any party not part of the
investigation.
(3) Where the court is satisfied with the explanations provided under subsection
(2), the court shall issue the order provided for under subsection (1).
(4) For purposes of subsection (1), real-time collection or recording of traffic
data shall be ordered for a period not exceeding six months.
(5) The court may authorize an extension of time under subsection (4), if it is
satisfied that—
(a) such extension of real-time collection or recording of traffic data
is reasonably required for the purposes of an investigation or
prosecution;
(b) the extent of real-time collection or recording of traffic data is
commensurate, proportionate and necessary for the purposes of
investigation or prosecution;
(c) despite prior authorisation for real-time collection or recording of traffic
data, additional real-time collection or recording of traffic data is
necessary and needed to achieve the purpose for which the warrant
is to be issued;
(d) measures taken to prepare and ensure that the real time collection or
recording of traffic data is carried out while maintaining the privacy of
other users, customers and third parties and without the disclosure of
information and data of any party not part of the investigation;
(e) the investigation may be frustrated or seriously prejudiced unless the
real-time collection or recording of traffic data is permitted; and
(f) the cost of such preservation is not overly burdensome upon the
person in control of the computer system.
(6) A court may, in addition to the requirement specified under subsection (3)
require the service provider to keep confidential the order and execution of any
power provided under this section.
(7) A service provider who fails to comply with an order under this section
commits an offence and is liable on conviction—
(a) where the service provider is a corporation, to a fine not exceeding
ten million shillings; or
(b) in case of a principal officer of the service provider, to a fine not
exceeding five million shillings or to imprisonment for a term not
exceeding three years, or to both.
28
No. 5 of 2018
Computer Misuse and Cybercrimes
29
No. 5 of 2018
Computer Misuse and Cybercrimes
30
No. 5 of 2018
Computer Misuse and Cybercrimes
(2) A service provider shall not be liable under this Act or any other law for
maintaining and making available the provision of their service.
(3) A service provider shall not be liable under this Act or any other law for the
disclosure of any data or other information that the service provider discloses only
to the extent required under this Act or in compliance with the exercise of powers
under this Part.
PART V – INTERNATIONAL CO-OPERATION
57. General principles relating to international cooperation
(1) This Part shall apply in addition to the Mutual Legal Assistance Act, 2011
(No. 36 of 2011) and the Extradition (Contiguous and Foreign Countries) Act (Cap.
76).
(2) The Central Authority may make a request for mutual legal assistance in
any criminal matter to a requested State for purposes of—
(a) undertaking investigations or proceedings concerning offences
related to computer systems, electronic communications or data;
(b) collecting evidence of an offence in electronic form; or
(c) obtaining expeditious preservation and disclosure of traffic data,
real-time collection of traffic data associated with specified
communications or interception of content data or any other means,
power, function or provisions under this Act.
(3) A requesting State may make a request for mutual legal assistance to the
Central Authority in any criminal matter, for the purposes provided in subsection (2).
(4) Where a request has been received under subsection (3), the Central
Authority may, subject to the provisions of the Mutual Legal Assistance Act, 2011
(No. 36 of 2011), the Extradition (Contiguous and Foreign Countries) Act (Cap. 76),
this Act and any other relevant law—
(a) grant the legal assistance requested; or
(b) refuse to grant the legal assistance requested.
(5) The Central Authority may require a requested State to—
(a) keep the contents, any information and material provided in a
confidential manner;
(b) only use the contents, information and material provided for the
purpose of the criminal matter specified in the request; and
(c) use it subject to other specified conditions.
58. Spontaneous information
(1) The Central Authority may, subject to this Act and other relevant law,
without prior request, forward to a foreign State information obtained within the
framework of its own investigations when it considers that the disclosure of such
information might assist the foreign State in initiating or carrying out investigations
or proceedings concerning criminal offences or might lead to a request for co-
operation by the foreign State under this Act.
(2) Prior to providing the information under subsection (1), the Central Authority
may request that such information be kept confidential or only subject to other
specified conditions.
31
No. 5 of 2018
Computer Misuse and Cybercrimes
(3) Where a foreign State cannot comply with the specified conditions specified
under subsection (2), the State shall notify the Central Authority as soon as
practicable.
(4) Upon receipt of a notice under subsection (3), the Central Authority may
determine whether to provide such information or not.
(5) Where the foreign State accepts the information subject to the conditions
specified by the Central Authority, that State shall be bound by them.
59. Expedited preservation of stored computer data
(1) Subject to section 57, a requesting State which has the intention to make
a request for mutual legal assistance for the search or similar access, seizure or
similar securing or the disclosure of data, may request the Central Authority to
obtain the expeditious preservation of data stored by means of a computer system,
located within the territory of Kenya.
(2) When making a request under subsection (1), the requesting State shall
specify—
(a) the authority seeking the preservation;
(b) the offence that is the subject of a criminal investigation or
proceedings and a brief summary of the related facts;
(c) the stored computer data to be preserved and its connection to the
offence;
(d) any available information identifying the custodian of the stored
computer data or the location of the computer system;
(e) the necessity of the preservation; and
(f) the intention to submit a request for mutual assistance for the search
or similar access, seizure or similar securing or the disclosure of the
stored computer data.
(3) Upon receiving the request under this section, the Central Authority shall
take the appropriate measures to preserve the specified data in accordance with
the procedures and powers provided under this Act and any other relevant law.
(4) A preservation of stored computer data effected under this section, shall
be for a period of not less one hundred and twenty days, in order to enable the
requesting State to submit a request for the search or access, seizure or securing,
or the disclosure of the data.
(5) Upon receipt for a request under this section, the data shall continue to be
preserved pending the final decision being made with regard to that request.
60. Expedited disclosure of preserved traffic data
Where during the course of executing a request under section 57 with respect
to a specified communication, the investigating agency discovers that a service
provider in another State was involved in the transmission of the communication,
the Central Authority shall expeditiously disclose to the requesting State a sufficient
amount of traffic data to identify that service provider and the path through which
the communication was transmitted.
61. Mutual assistance regarding accessing of stored computer data
(1) Subject to section 57, a requesting State may request the Central Authority
to search or similarly access, seize or similarly secure, and disclose data stored by
32
No. 5 of 2018
Computer Misuse and Cybercrimes
means of a computer system located within the territory of Kenya, including data
that has been preserved in accordance with section 60.
(2) When making a request under subsection (1), the requesting State shall —
(a) give the name of the authority conducting the investigation or
proceedings to which the request relates;
(b) give a description of the nature of the criminal matter and a statement
setting-out a summary of the relevant facts and laws;
(c) give a description of the purpose of the request and of the nature of
the assistance being sought;
(d) in the case of a request to restrain or confiscate assets believed
on reasonable grounds to be located in the requested State, give
details of the offence in question, particulars of the investigation
or proceeding commenced in respect of the offence, and be
accompanied by a copy of any relevant restraining or confiscation
order;
(e) give details of any procedure that the requesting State wishes to
be followed by the requested State in giving effect to the request,
particularly in the case of a request to take evidence;
(f) include a statement setting out any wishes of the requesting State
concerning any confidentiality relating to the request and the reasons
for those wishes;
(g) give details of the period within which the requesting State wishes the
request to be complied with;
(h) where applicable, give details of the property, computer, computer
system or electronic device to be traced, restrained, seized or
confiscated, and of the grounds for believing that the property is
believed to be in the requested State;
(i) give details of the stored computer data, data or program to be seized
and its relationship to the offence;
(j) give any available information identifying the custodian of the stored
computer data or the location of the computer, computer system or
electronic device;
(k) include an agreement on the question of the payment of the damages
or costs of fulfilling the request; and
(l) give any other information that may assist in giving effect to the
request.
(3) Upon receiving the request under this section, the Central Authority shall
take all appropriate measures to obtain necessary authorisation including any
warrants to execute upon the request in accordance with the procedures and
powers provided under this Act and any other relevant law.
(4) Where the Central Authority obtains the necessary authorisation in
accordance with subsection (3), including any warrants to execute the request, the
Central Authority may seek the support and cooperation of the requesting State
during such search and seizure.
(5) Upon conducting the search and seizure request, the Central Authority
shall, subject to section 59, provide the results of the search and seizure as well
as electronic or physical evidence seized to the requesting State.
33
No. 5 of 2018
Computer Misuse and Cybercrimes
34
No. 5 of 2018
Computer Misuse and Cybercrimes
(a) the authority seeking the use of powers under this section;
(b) the offence that is the subject of a criminal investigation or
proceedings and a brief summary of the related facts;
(c) the name of the authority with access to the relevant communication;
(d) the location at which or nature of the communication;
(e) the intended purpose for the required communication;
(f) sufficient information to identify the communications;
(g) details of the data of the relevant interception;
(h) the recipient of the communication;
(i) the intended duration for the use of the communication;
(j) the necessity for use of powers under this section; and
(k) the terms for the use and disclosure of the communication to third
parties.
(3) Upon receiving the request under this section, the Central Authority shall,
take all appropriate measures to obtain necessary authorisation including any
warrants to execute upon the request in accordance with the procedures and
powers provided under this Act and any other relevant law.
(4) Where the Central Authority obtains the necessary authorisation, including
any warrants to execute upon the request, the Central Authority may seek the
support and cooperation of the requesting State during the search and seizure.
(5) Upon conducting the measures under this section the Central Authority
shall subject to section 57, provide the results of such measures as well as real-
time collection or recording of content data of specified communications to the
requesting State.
65. Point of contact
(1) The Central Authority shall ensure that the investigation agency responsible
for investigating cybercrime, shall designate a point of contact available on a
twenty-four hour, seven-day-a-week basis, in order to ensure the provision of
immediate assistance for the purpose of investigations or proceedings concerning
criminal offences related to computer systems and data, or for the collection of
evidence in electronic form of a criminal offence, including carrying out the following
measures—
(a) the provision of technical advice;
(b) the preservation of data pursuant to sections 59 and 60;
(c) the collection of evidence, the provision of legal information, and
locating of suspects, within expeditious timelines to be defined by
regulations under this Act.
(2) The point of contact shall be resourced with and possess the requisite
capacity to securely and efficiently carry out communications with other points of
contact in other territories, on an expedited basis.
(3) The point of contact shall have the authority and be empowered to
coordinate and enable access to international mutual assistance under this Act.
35
No. 5 of 2018
Computer Misuse and Cybercrimes
36
No. 5 of 2018
Computer Misuse and Cybercrimes
SCHEDULE
[Section 69.]
37
No. 5 of 2018
Computer Misuse and Cybercrimes
38
No. 5 of 2018
Computer Misuse and Cybercrimes
39