{"id":1695,"date":"2021-12-07T03:49:49","date_gmt":"2021-12-06T23:49:49","guid":{"rendered":"https:\/\/venturelawltd-com.stackstaging.com\/?p=1695"},"modified":"2021-12-07T03:59:54","modified_gmt":"2021-12-06T23:59:54","slug":"cybersecurity-and-cybercrime-act-2021","status":"publish","type":"post","link":"https:\/\/www.venturelawltd.com\/index.php\/2021\/12\/07\/cybersecurity-and-cybercrime-act-2021\/","title":{"rendered":"The Cybersecurity and Cybercrime Act 2021"},"content":{"rendered":"<body><p><span style=\"font-weight: 400;\">The new Cybersecurity and Cybercrime Act 2021 (the \u2018\u2019Act\u2019\u2019) enacted on 19 November 2021 repeals the Computer Misuse and Cybercrime Act 2003. The new legislation provides for a National Cybersecurity Committee (the \u2018\u2018Committee\u2019\u2019) and a comprehensive legal framework to deal with cybercrime.<\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69f75cc289779\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69f75cc289779\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.venturelawltd.com\/index.php\/2021\/12\/07\/cybersecurity-and-cybercrime-act-2021\/#Bodies_established_by_the_Act\" >Bodies established by the Act<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.venturelawltd.com\/index.php\/2021\/12\/07\/cybersecurity-and-cybercrime-act-2021\/#Offences\" >Offences<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.venturelawltd.com\/index.php\/2021\/12\/07\/cybersecurity-and-cybercrime-act-2021\/#Investigatory_powers\" >Investigatory powers<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.venturelawltd.com\/index.php\/2021\/12\/07\/cybersecurity-and-cybercrime-act-2021\/#Critical_Information_Infrastructure\" >Critical Information Infrastructure\u00a0<\/a><\/li><\/ul><\/nav><\/div>\n<h4><span class=\"ez-toc-section\" id=\"Bodies_established_by_the_Act\"><\/span><span style=\"text-decoration: underline;\"><strong>Bodies established by the Act<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Amongst its several functions, the Committee established under the Act will advise Government on cybersecurity and cybercrime and implement Government policy relating to cybersecurity and cybercrime.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Moreover, the Act further establishes the Computer Emergency Response Team of Mauritius (CERT-MU) which will act as the national agency for coordinating cybersecurity response activities and promoting cybersecurity at national level.<\/span><\/p>\n<h4><span class=\"ez-toc-section\" id=\"Offences\"><\/span><span style=\"text-decoration: underline;\"><b>Offences<\/b><\/span><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Part III of the Act covers a multiple range of offences which may impact the cyber security operations of a business. Most of these offences will involve acts conducted intentionally and\/or without an authorization. Some of these offences include:\u00a0\u00a0\u00a0<\/span><\/p>\n<ol style=\"list-style-type: lower-roman;\">\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">unauthorised access to any program or data held in a computer system;\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">unauthorised interception of computer service;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">hindering of the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data, also referred to as an unauthorized interference;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">gaining of access to any computer program or computer data held in a computer system with intent to commit offences;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">unauthorised modification of computer data;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">unauthorised disclosure of any password, access code, biometric authentication, token, two-factor authentication, multi-factor authentication or any other means of gaining access to any computer program or computer data held in a computer system for its production, sale, procurement for use, import or distribution;\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">electronic fraud which occurs when a person, causes loss of property to another person by:<\/span>\n<ol style=\"list-style-type: lower-alpha;\">\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">any input, alteration, deletion or suppression of data; or<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">any interference with the functioning of a computer system, <\/span>to procure for himself or another person any form of advantage.<\/li>\n<\/ol>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">computer-related forgery;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">cyber extortion which involves the use of the internet to demand money or other goods or behaviour from another person by threatening to inflict harm to his person, reputation, or property;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">infringement of copyright and related rights which would involve:\u00a0<\/span>\n<ol style=\"list-style-type: lower-alpha;\">\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">the attempt to use, publish or distribute another person\u2019s work for commercial purpose, through a computer system;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">the downloading of movies, music files or pirated software applications for gain or against remuneration; or<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">the posting of a copyrighted work such as writing or graphics, online for gain or against remuneration, <\/span><\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p style=\"padding-left: 40px;\">without the express authorization of the copyright author or owner of the copyright.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Investigatory_powers\"><\/span><span style=\"text-decoration: underline;\"><b>Investigatory powers<\/b><\/span><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Investigatory authorities have been vested with powers for the implementation or enforcement of the Act. The Act defines an investigatory authority as the police or any other body lawfully empowered to investigate any offence.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">An investigatory authority can now serve a notice on a person who is in possession or control of traffic data for the expedited preservation or partial disclosure of the traffic data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Following the principles of the Computer Misuse and Cybercrime Act 2003, an investigatory authority may have recourse to the Courts of Mauritius (more specifically the Judge in Chambers) for, amongst others :\u00a0<\/span><\/p>\n<ol style=\"list-style-type: lower-roman;\">\n<li><span style=\"font-weight: 400;\">Production orders where the disclosure of data is required for the purpose of a criminal investigation or prosecution of an offence;\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The issue of warrants to enter any premises to access, search and seize stored data relevant for the purpose of an investigation or the prosecution of an offence<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Orders compelling the real-time collection or recording of traffic data<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Orders for the interception of content data<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Orders for the deletion or destruction of computer data.\u00a0<\/span><\/li>\n<\/ol>\n<h4><span class=\"ez-toc-section\" id=\"Critical_Information_Infrastructure\"><\/span><span style=\"text-decoration: underline;\"><b>Critical Information Infrastructure\u00a0<\/b><\/span><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span style=\"font-weight: 400;\">The critical information infrastructure newly introduced in the Act is an asset, facility, system, network or process, whose incapacity, destruction or modification would have \u2013 (a) a debilitating impact on the availability, integrity or delivery of essential services, including those services whose integrity, if compromised, could result in significant loss of life or casualties, or (b) a significant impact on national security, national defence, or the functioning of the State.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Committee, after consultation with a regulatory authority in control of any information infrastructure can identify an information structure which needs to be declared a critical information infrastructure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A system is selected as a critical information infrastructure if a disruption of the system or its data would result in:<\/span><\/p>\n<ol style=\"list-style-type: lower-alpha;\">\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">the interruption of a life sustaining service such as the supply of water, health services and energy;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">an important effect on the economy;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">an event that would result in massive casualties or fatalities; or<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">failure or substantial disruption of the money market.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Certain offences committed on a critical information infrastructure will result in increased penalties which could on conviction, attract a fine not exceeding 2 million rupees and imprisonment for a term not exceeding 25 years.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Important Note: This article is not intended to be a substitute for legal advice or a legal opinion. It deals in broad terms only and is intended to merely provide a brief overview and give general information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Emmanuel Travailleur<\/span><span style=\"font-weight: 400;\">, Associate<\/span><\/p>\n<p><a href=\"https:\/\/www.venturelawltd.com\/index.php\/people\/sameer-tegally\/\"><span style=\"font-weight: 400;\">Sameer K. Tegally<\/span><\/a><span style=\"font-weight: 400;\">, Partner<\/span><\/p>\n<\/body>","protected":false},"excerpt":{"rendered":"<p>The new Cybersecurity and Cybercrime Act 2021 (the &#8221;Act&#8221;) enacted on 19 November 2021 repeals the Computer Misuse and Cybercrime Act 2003.<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1695","post","type-post","status-publish","format-standard","hentry","category-publications"],"_links":{"self":[{"href":"https:\/\/www.venturelawltd.com\/index.php\/wp-json\/wp\/v2\/posts\/1695","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.venturelawltd.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.venturelawltd.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.venturelawltd.com\/index.php\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.venturelawltd.com\/index.php\/wp-json\/wp\/v2\/comments?post=1695"}],"version-history":[{"count":6,"href":"https:\/\/www.venturelawltd.com\/index.php\/wp-json\/wp\/v2\/posts\/1695\/revisions"}],"predecessor-version":[{"id":1702,"href":"https:\/\/www.venturelawltd.com\/index.php\/wp-json\/wp\/v2\/posts\/1695\/revisions\/1702"}],"wp:attachment":[{"href":"https:\/\/www.venturelawltd.com\/index.php\/wp-json\/wp\/v2\/media?parent=1695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.venturelawltd.com\/index.php\/wp-json\/wp\/v2\/categories?post=1695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.venturelawltd.com\/index.php\/wp-json\/wp\/v2\/tags?post=1695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}