Cyber Crime
Cyber Crime
Cyber Crime
INTRODUCTION
OBJECTIVE
The law also penalises fraudulent use of network facilities, network service applications, and
content services. (Section 121)
PRECEDENTS/CASE LAWS
These are cases decided by the superior court or courts of records, which are the sources of law, specifically cybercrime.
• PSSSF v. Siriel Mchembe (Civil Appeal No. 126 of 2018, CAT at DSM). In this case, Mchembe claimed compensation of
100 million to his previous employer being compensation for publishing defamatory statements in Jamii forum and
Wazalendo forum that she is possessed with the evil spirit of prostitution and adultery at the workplace.
• Jamii Media Company Ltd v. The AG & IGP, (Miscellaneous Civil Cause No. 9 of 2016, High Court of Tanzania at Dar es
Salaam). In this case the petitioner challenged the provision of Section 32 and Section 38 of Cyber Crimes Act to be
unconstitutional but failed to prove how the said sections are unconstitutional.
• Mathayo mziba & others v Gaming Africa (T) Ltd t/a Meridian bet (civil case no 34 of 2020, HC
• BONIFACE Maombe & others v. R (Misc. Criminal Application No. 161 of 2019
• Emmanuel Masonga & 3 others V. IGP & Another, (MISC Civil cause no 7 of 2022)
• William Benjamin Kahale v. AG. (Misc. civil cause no 23 of 2019, HC at DSM), in this case, the petitioner was challenging
the provision of Section 6 of the Right to Access Information Act to be contradicting the provision of Article 18 of CURT
that provides for the right to have a free opinion, seek information and disseminate information. The court held that they
do not contravene the limitation clause.
• R v. Hussein Malulu & Elias Hussein & 3 others ( Criminal Session Case 48 of 2021), in this case, the culprit of murder
were arrested with the help of cyber forensic examination through a confession made through a mobile phone chat, a
phone that the accidentally left at the scene of a crime. And the court held that the best confession is the one made by
the accused themselves.
• Heidman Steel Products v. Computer Corp,(1999 U.S. Dist LEXIS 217000), In this case, the Ohio Federal court refused to
extend the concept of professional malpractice to a negligent computer consultant. The court held that, “ courts will not
apply the professional standards of care to software engineers and other professionals until they can reliably assess the
skills and expertise required of software engineers.
Common law
▪ This is a law developed from the English court legal systems that was adopted in our
jurisdiction during the reception clause in 1920 and later enclosed into the Judicature and
Application of Laws Act under the provision of S.9 of the Act. Common law is used when
there is a lacuna in our laws. However, some common law principles, as said earlier, have
been adopted in our jurisdiction, such as nullum crimen sine lege which means a person
can not be punished for an act not prescribed by law when the person committed the act.
So for a person to be punished for a cyber crime offence, the law should provide that is an
offence.
▪ Also, the doctrine of the duty of care in the tort of negligence vs cyber crimes, that
the owner of a computer has a duty of care towards his customer based on
injury/harm caused by a third party in relation to computer-related crimes for an
example a person could be held liable for negligently permitting a third party to
hack into a computer and steal data or information which is likely to injure
another person as a result of an inadequate security system.
INTERNATIONAL LAW AND INSTRUMENTS
• Various international instruments form the basis of cyber crimes and cyber security, such as the
United Nations Convention Against Transmission Organized Crime (2000), the Convention on
the Rights of the Child, 2001 together with Optional Protocol to the Convention, Convention
on Cybercrime, 2001 known as Budapest Convention (first convention aimed at reducing
computer-related crime by harmonizing national laws, improving legislative techniques and
increase national cooperation.
• The Budapest Convention, 2001 was enacted to deter/fight against computer networks, systems
and data offences. The convention, apart from criminalising actions against confidentiality,
integrity and misuse of computer systems it has considered other conventions such as the CRC,
Convention on Civil and Political Rights, Convention on Human Rights and Fundamental
Freedom and Worst Forms of Child Labour Convention. Tanzania is not yet a member of this
convention, although our cyber crimes Act has tried to align with what the convention has
stipulated.
• The Malabo Convention (The African Union Convention on Cyber Security and Personal Data
Protection). This was adopted in the year 2014 for the purpose of addressing cyber crimes and
security in Africa. The convention is centred on protecting against child pornography, personal
data protection, cybercrime, and electronic commerce. And the convention has urged member
states to establish authorities and legislations in their respective territories to protect them.
However, Tanzania is not a member state of this convention.
Literary works
The works of prominent authors can also form the basis or the source of cyber crime
and cyber security. Example Books, articles, researches etc
NATURE OF CRIMES
In ancient times any act by a person or even an animal which caused harm to
any other person was considered a punishable crime, and the wrongdoers
were beheaded or thrown out of the country as per their acts. Due to
changes that continue to occur in societies, governments created laws
outlining which acts are crimes and which are not. A crime is deemed
harmful to society, although its immediate victim is an individual.
ELEMENTS OF CRIMES