18/ “police” mean Federal Police or Regional State Police to whom the power of the
Federal Police is delegated;
19/ “Agency” mean Information Network Security Agency;
20/ “person” means a physical or juridical person;
21/ any expression in the masculine gender includes the feminine.
PART TWO – COMPUTER CRIMES
SECTION ONE – CRIMES
COMPUTER DATA

AGAINST

COMPUTER

SYSTEM AND

3. Illegal Access
1/ Whosoever, without authorization or in excess of authorization, intentionally
secures access to the whole or any part of computer system, computer data or network
shall be punishable with simple imprisonment not exceeding three years or fine from
Birr 30,000 to 50, 000 or both.
2/ Where the crime stipulated under sub-article (1) of this Article is committed
against:
a) a computer system, computer data or network that is exclusively destined for the
use of a legal person, the punishment shall be rigorous imprisonment from three to
five years and fine from Birr 30,000 to 50,000;
b) a critical infrastructure, the punishment shall be rigorous imprisonment from five to
10 years and fine from Birr 50,000 to 100,000.
4. Illegal Interception
1/ Whosoever, without authorization or in excess of authorization, intentionally
intercepts non-public computer data or data processing service shall be punishable
with rigorous imprisonment not exceeding five years and fine from Birr 10,000 to
50,000.
2/ Where the crime stipulated under sub-article (1) of this Article is committed
against:
a) a computer data or data processing service that is exclusively destined for the use
of a legal person, the punishment shall be rigorous imprisonment from five to 10
years and fine from Birr 50,000 to 100,000.
b) a critical infrastructure, the punishment shall be rigorous imprisonment from 10 to
15 years and fine from Birr 100,000 to 200,000.
5. Interference with Computer System

Select target paragraph3