关于知识产权 知识产权培训 树立尊重知识产权的风尚 知识产权外联 部门知识产权 知识产权和热点议题 特定领域知识产权 专利和技术信息 商标信息 工业品外观设计信息 地理标志信息 植物品种信息(UPOV) 知识产权法律、条约和判决 知识产权资源 知识产权报告 专利保护 商标保护 工业品外观设计保护 地理标志保护 植物品种保护(UPOV) 知识产权争议解决 知识产权局业务解决方案 知识产权服务缴费 谈判与决策 发展合作 创新支持 公私伙伴关系 人工智能工具和服务 组织简介 与产权组织合作 问责制 专利 商标 工业品外观设计 地理标志 版权 商业秘密 WIPO学院 讲习班和研讨会 知识产权执法 WIPO ALERT 宣传 世界知识产权日 WIPO杂志 案例研究和成功故事 知识产权新闻 产权组织奖 企业 高校 土著人民 司法机构 遗传资源、传统知识和传统文化表现形式 经济学 性别平等 全球卫生 气候变化 竞争政策 可持续发展目标 前沿技术 移动应用 体育 旅游 PATENTSCOPE 专利分析 国际专利分类 ARDI - 研究促进创新 ASPI - 专业化专利信息 全球品牌数据库 马德里监视器 Article 6ter Express数据库 尼斯分类 维也纳分类 全球外观设计数据库 国际外观设计公报 Hague Express数据库 洛迦诺分类 Lisbon Express数据库 全球品牌数据库地理标志信息 PLUTO植物品种数据库 GENIE数据库 产权组织管理的条约 WIPO Lex - 知识产权法律、条约和判决 产权组织标准 知识产权统计 WIPO Pearl(术语) 产权组织出版物 国家知识产权概况 产权组织知识中心 产权组织技术趋势 全球创新指数 世界知识产权报告 PCT - 国际专利体系 ePCT 布达佩斯 - 国际微生物保藏体系 马德里 - 国际商标体系 eMadrid 第六条之三(徽章、旗帜、国徽) 海牙 - 国际外观设计体系 eHague 里斯本 - 国际地理标志体系 eLisbon UPOV PRISMA UPOV e-PVP Administration UPOV e-PVP DUS Exchange 调解 仲裁 专家裁决 域名争议 检索和审查集中式接入(CASE) 数字查询服务(DAS) WIPO Pay 产权组织往来账户 产权组织各大会 常设委员会 会议日历 WIPO Webcast 产权组织正式文件 发展议程 技术援助 知识产权培训机构 COVID-19支持 国家知识产权战略 政策和立法咨询 合作枢纽 技术与创新支持中心(TISC) 技术转移 发明人援助计划(IAP) WIPO GREEN 产权组织的PAT-INFORMED 无障碍图书联合会 产权组织服务创作者 WIPO Translate 语音转文字 分类助手 成员国 观察员 总干事 部门活动 驻外办事处 职位空缺 采购 成果和预算 财务报告 监督
Arabic English Spanish French Russian Chinese
法律 条约 判决书 按司法管辖区搜索

汤加

TO016

返回

Computer Crimes Act, 2003 (Act 14 of September 8, 2003)

Computer Crimes Act, 2003

PART I - PRELIMINARY 5

Short Title

Interpretation

Jurisdiction

 

PART II - OFFENCES 7

Illegal access

Interfering with data

Interfering with computer system

Illegal interception of data

Illegal devices

 

PART III - PROCEDURAL POWERS 9

Search and seizure warrants

Assisting police

Production of data

Disclosure of traffic data

Preservation of data

Interception of electronic communications

Interception of traffic data

Evidence

Confidentiality and limitation of liability

Regulations

 

 

COMPUTER CRIMES ACT

 

Act 14 of 2003

 

AN ACT TO COMBAT COMPUTER CRIME AND TO PROVIDE FOR THE COLLECTION AND USE OF ELECTRONIC EVIDENCE

 

I assent, TAUFA AHAU TUPOU IV,

18th November, 2003

[8th September, 2003]

 

BE IT ENACTED by the King and Legislative Assembly of Tonga in the Legislature of the Kingdom as follows:

 

PART I - PRELIMINARY

 

1 Short Title

This Act may be cited as the Computer Crimes Act, 2003.

 

2 Interpretation

 

In this Act, unless the context otherwise requires:

 

computer means an electronic, magnetic, optical, electrochemical, or other data processing device, or a group of such interconnected or related devices, performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device or group of such interconnected or related devices, but does not include;

(a) an automated typewriter or typesetter;

(b) a portable hand held calculator; or

(c) a similar device which is non-programmable or which does not contain any data storage facility;

(d) such other device as the Minister may, by notification in the Gazette, prescribe;

 

computer data means any representation of facts, information or concepts in a form suitable for processing in a computer system, including a program suitable to cause a computer system to perform a function;

 

computer data storage medium means any article or material such as a disk, from which information is capable of being reproduced, with or without the aid of any other article or device;

 

computer system means a device or a group of inter-connected or related devices, including the Internet, one or more of which, pursuant to a program, performs automatic processing of data or any other function;

 

hinder, in relation to a computer system, means:

(a)       cutting the electricity supply to a computer system;

(b)       causing electromagnetic interference to a computer system;

(c)        corrupting a computer system by any means; and

(d)       inputting, deleting or altering computer data;

 

seize includes:

(a)       make and retain a copy of computer data, including using on site equipment;

(b)       render inaccessible, or remove, a computer, computer data in the accessed computer system; and

(c)       take a printout of computer data;

 

service provider means a public or private entity that provides to users of its services the ability to communicate by means of a computer system, and any other entity that processes or stores computer data on behalf of that entity or those users; and

 

traffic data means computer data that relates to a communication by means of a computer system; and is generated by a computer system that is part of the chain of communication, and shows the communications origin, destination, route, time, date, size, duration or the type of underlying services.

 

3 Jurisdiction

 

(1)  Where an offence under this Act is committed by any person who is outside the Kingdom, he shall be deemed to have committed the offence within the Kingdom.

(2)  For the purposes of this section, this Act shall apply as if, for the offence in question;

(a) the accused; or

(b) the computer, program or data. was in the Kingdom at the material time.

 

 

PART II - OFFENCES

 

4 Illegal access

 

(1) For the purposes of this section, a computer shall be treated as a protected computer if the person committing the offence knew, or ought reasonably to have known, that the computer or program or data is used directly in connection with or necessary for -

(a) the security, defence or international relations of the Kingdom;

(b) the existence or identity of a confidential source of information relating to the enforcement of a criminal law;

(c) the provision of services directly related to communications infrastructure, banking and financial services, public utilities, public transportation or public key infrastructure; or

(d) the protection of public safety including system related to essential emergency services.

 

(2) A person who wilfully, without lawful excuse, accesses any computer system commits an offence and shall be liable upon conviction to, a fine not exceeding $10,000 or imprisonment for a period not exceeding 2 years or to both.

 

(3) A person who wilfully, without lawful excuse, accesses any protected computer commits an offence and shall be liable upon conviction to a fine not exceeding $100,000 or to imprisonment for a period not exceeding 20 years or to both.

 

(4) For the purposes of any prosecution under this section, it shall be presumed, until the contrary is proved, that the accused has the requisite knowledge referred to in this section if there is, in respect of the computer, program or data, an electronic or other warning exhibited to the accused stating that unauthorised access to that computer, program or data is an offence.

 

5 Interfering with data

 

A person who, wilfully or recklessly without lawful excuse:

(a) destroys or alters data;

(b) renders data meaningless, useless or ineffective;

(c) obstructs, interrupts or interferes with the lawful use of data;

(d) obstructs, interrupts or interferes with any person in the lawful use of data; or

(e) denies access to data to any person entitled to it;

commits an offence and shall be liable upon conviction, to a fine not exceeding $10,000 or to imprisonment for a period not exceeding 2 years or to both.

 

6 Interfering with computer system

 

A person who wilfully or recklessly, without lawful excuse:

(a) hinders or interferes with the functioning of a computer system; or

(b) hinders or interferes with a person who is lawfully using or operating a computer system,

 

commits an offence and shall be liable upon conviction to a fine not exceeding $5,000 or imprisonment for a period not exceeding 1 year or to both.

 

7 Illegal interception of data

 

A person who, wilfully without lawful excuse, intercepts by technical means:

(a) any transmission to, from or within a computer system; or

(b) electromagnetic emissions from a computer system that are carrying computer data,

 

commits an offence and shall be liable upon conviction, to a fine not exceeding $5,000 or imprisonment for a period not exceeding 1 year or to both.

 

8 Illegal devices

 

(1) A person who:

(a) wilfully or recklessly, without lawful excuse, produces, sells, procures for use, imports, exports, distributes or makes available:

(i) a device, including a computer program, that is designed or adapted for the purpose of committing an offence under sections 4, 5, 6, or 7 of this Act; or

(ii) a computer password, access code or similar data by which the whole or any part of a computer system is capable of being accessed;

 

with the intent that it be used by any person for the purpose of committing an offence under sections 4, 5, 6, or 7 of this Act; or

(b) has an item mentioned in subparagraph (i) or (ii) in his possession with the intent that it be used by any person for the purpose of committing an offence under sections 4, 5, 6, or 7 of this Act;

 

commits an offence and shall be liable upon conviction to a fine not exceeding $20,000 or imprisonment for a period not exceeding 4 years or to both.

 

(2) A person who possesses more than one item mentioned in subsection (1) subparagraph (i) or (ii), is deemed to possess the item with the intent that it be used by any person for the purpose of committing an offence under sections 4, 5, 6, or 7 of this Act.

 

PART III - PROCEDURAL POWERS

 

9 Search and seizure warrants

 

(1) If a magistrate is satisfied on sworn evidence that there are reasonable grounds to suspect that there may be in a place a computer, computer system, computer data or data storage medium which:

(a) may be material evidence in proving an offence; or

(b) has been acquired by a person as a result of an offence;

 

the magistrate may issue a warrant authorizing any police officer, with such assistance as may be necessary, to enter the place to search and seize the computer, computer system, computer data or data storage medium.

 

(2) Any person who makes a search or seizure under this section, shall at the time or as soon as practicable:

(a) make a list of what has been seized, with the date and time of seizure; and

(b) give a copy of that list to -

(i) the occupier of the premises; or

(ii) the person in control of the computer system.

 

(3) Subject to subsection (4), on request, any police officer or another authorized person shall:

(a) permit a person who had the custody or control of the computer system, or someone acting on their behalf to access and copy computer data on the system; or

(b) give the person a copy of the computer data.

 

(4) The police officer or another authorized person may refuse to give access or provide copies if he has reasonable grounds for believing that giving the access, or providing the copies may -

(a) constitute a criminal offence; or

(b) prejudice:

(i) the investigation in connection with which the search was carried out;

(ii) another ongoing investigation; or

(iii) any criminal proceedings that are pending or that may be brought in relation to any of those investigations.

 

10 Assisting police

 

(1) A person who is in possession or control of a computer, computer system, computer data or data storage medium that is the subject of a search under section 9 shall permit, and assist if required, the person making the search to -

(a) access and use a computer system or computer data storage medium to search any computer data available to or in the system;

(b) obtain and copy that computer data;

(c) use equipment to make copies; and

(d) obtain an intelligible output from a computer system in a format that can be read.

 

(2) A person who fails without lawful excuse to permit or assist a person acting under a search warrant commits an offence and shall be liable upon conviction to a fine not exceeding $10,000 or imprisonment for a period not exceeding 2 years or to both.

 

11 Production of data

 

A magistrate on application by any police officer that specified computer data, or a printout or other information; is reasonably required for the purpose of a criminal investigation or criminal proceedings, may order;

(a) a person in control of a computer system to produce from the system specified computer data or a printout or other intelligible output of that data;

(b) an internet service provider to produce information about persons who subscribe to or otherwise use the service; and

(c) a person who has access to a specified computer system process to compile specified computer data from the system and give it to a specified person.

 

12 Disclosure of traffic data

 

Where a magistrate is satisfied on the basis of an application by any police officer that specified data stored in a computer system is reasonably required for the purpose of a criminal investigation or criminal proceedings, the magistrate may order that a person in control of the computer system disclose sufficient traffic data about a specified communication to identify:

(a) the service providers; and

(b) the path through which the communication was transmitted.

 

13 Preservation of data

 

(1) Where any police officer is satisfied that:

(a) data stored in a computer system is reasonably required for the purpose of a criminal investigation; and

(b) there is a risk that the data may be destroyed or rendered inaccessible;

 

the police officer may, by written notice given to a person in control of the computer system, require the person to ensure that the data specified in the notice be preserved for a period of up to 7 days as specified in the notice.

 

(2) The Magistrate may upon application authorize an extension not exceeding 14 days.

 

14 Interception of electronic communications

 

Where a magistrate is satisfied on the evidence that there are reasonable grounds to suspect that the content of electronic communications is reasonably required for the purposes of a criminal investigation, the magistrate may:

(a) order an internet service provider to collect or record or to permit or assist competent authorities with the collection or recording of content data associated with specified communications transmitted by means of a computer system; or

(b) authorize any police officer to collect or record that data through application of technical means.

 

15 Interception of traffic data

 

(1) Where any police officer is satisfied that traffic data associated with a specified communication is reasonably required for the purposes of a criminal investigation, the police officer may, by written notice given to a person in control of such data, request that person to:

(a) collect or record traffic data associated with a specified communication during a specified period; and

(b) permit and assist a specified police officer to collect or record that data.

 

(2) Where a magistrate is satisfied on the evidence that there are reasonable grounds to suspect that traffic data is reasonably required for the purposes of a criminal investigation, the magistrate may authorize any police officer to collect or record traffic data associated with a specified communication during a specified period through application of technical means.

 

16 Evidence

 

In proceedings for an offence under this Act the fact that:

(a) it is alleged that an offence of interfering with a computer system has been committed; and

(b) evidence has been generated from that computer system;

 

does not of itself prevent that evidence from being admitted.

 

17 Confidentiality and limitation of liability

 

(1) An Internet service provider who without lawful authority discloses:

 

(a) the fact that an order under sections 11, 12, 13, 14 and 15 has been made;

(b) anything done under the order; or

(c) any data collected or recorded under the order;

 

commits an offence and shall be liable upon conviction to a fine not exceeding $50,000 or imprisonment for a period not exceeding 10 years or to both.

 

(2) An internet service provider shall not be liable under any law for the disclosure of any data or other information that he discloses under sections, 11, 12, 13, 14, or 15.

 

18 Regulations

 

The Minister responsible for Communications may, with the consent of Cabinet make Regulations for the proper and efficient administration of this Act.

 

Passed in the Legislative Assembly this 8 day of September, 2003.