Appendix A
Description of Cybercrimes included in ECOWAS Cybercrimes Directives
5.9.3 Fraud
A. Fraudulent access to computer systems
The act by which a person fraudulently accesses or attempts to access the whole or part of a computer
system;
B. Fraudulently remaining in a computer system
The act by which a person fraudulently remains or attempts to remain within the whole or part of a
computer system.
C Interfering with the operation of a computer system
The act by which a person impedes, alters or attempts to impede or alter the functioning of a computer
system
D. Fraudulent input of data in a computer system
The act by which a person fraudulently inputs or attempts to input data into a computer system;
E. Fraudulent interception of computer data
The act by which a person fraudulently intercepts or attempts to intercept computerized data during their
non-public transmission to, from or within a computer system through technical means;
F. Fraudulent modification of computer data
The act by which a person fraudulently damages or attempts to damage, delete or attempts to delete,
deteriorate or attempting to deteriorate, alter or attempts to alter, modify or attempt to modify computer
data.
G. Fraudulent production of computer data
The act by which a person produces or manufactures a set of digital data through fraudulent input,
deletion or suppression of computerized data stored, processed or transmitted by a computer system,
resulting in counterfeit data, with the intent that it be considered or used for legal purposes as if it were
genuine.
H. Use of fraudulently obtained data
Liberia, like other ECOWAS Member States shall undertake to adopt such legislative measures as may
be necessary to establish as a criminal offence the act of knowingly using data thus obtained.
I. Fraudulently obtaining any benefit whatsoever
The act by which a person fraudulently obtains any benefit for oneself or for another person through the
input, alteration, deletion or suppression of computerized data or through any other form of interference
with the functioning of a computer system
J. Fraudulent manipulation of personal data
The act by which a person, even through negligence, processes, personal data or causes personal data to
be processed without having complied with the prerequisite conditions stipulated by the relevant law on
personal data provided for in each ECOWAS Member State.
49