16.	
  

17.	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  

	
  (b)	
  Any	
  person	
  who	
  steals	
  an	
  Automated	
  Teller	
  Machine	
  (ATM)	
  commits	
  an	
  offence	
  
and	
  shall	
  be	
  liable	
  on	
  conviction	
  to	
  imprisonment	
  for	
  a	
  term	
  of	
  not	
  more	
  than	
  7	
  years	
  
or	
   a	
   fine	
   of	
   not	
   more	
   than	
   N10,000,000.00	
   or	
   to	
   both	
   fine	
   and	
   imprisonment.	
   	
   All	
  
proceeds	
  of	
  such	
  theft	
  shall	
  be	
  forfeited	
  to	
  the	
  lawful	
  owners	
  of	
  the	
  ATM.	
  
	
  
(c)	
  Any	
  person	
  who	
  attempts	
  to	
  steal	
  an	
  ATM,	
  commits	
  an	
  offence	
  and	
  shall	
  be	
  liable	
  
on	
  conviction	
  to	
  imprisonment	
  for	
  a	
  term	
  of	
  not	
  more	
  than	
  1	
  year	
  or	
  a	
  fine	
  of	
  not	
  
more	
  than	
  N1,000,000.00	
  or	
  both	
  fine	
  and	
  imprisonment.	
  
	
  
(1)	
   Any	
   person	
   who	
   with	
   intent	
   and	
   without	
   lawful	
   authority	
   directly	
   or	
   indirectly	
  
modifies	
  or	
  causes	
  modification	
  of	
  any	
  data	
  held	
  in	
  any	
  computer	
  system	
  or	
  network,	
  
commits	
  an	
  offence	
  and	
  shall	
  be	
  liable	
  on	
  conviction	
  to	
  imprisonment	
  for	
  a	
  term	
  of	
  
not	
  more	
  than	
  3	
  years	
  or	
  to	
  a	
  fine	
  of	
  not	
  more	
  than	
  N7,000,000.00	
  or	
  to	
  both	
  such	
  
fine	
  and	
  imprisonment.	
  
	
  
(2)	
  For	
  the	
  purpose	
  of	
  this	
  section,	
  a	
  modification	
  of	
  any	
  data	
  held	
  in	
  any	
  computer	
  
system	
  or	
  network	
  includes	
  modifications	
  that	
  	
  take	
  place	
  whereby	
  the	
  operation	
  of	
  
any	
  function	
  of	
  the	
  computer	
  system	
  or	
  network	
  concerned,	
  or	
  any-­‐	
  
	
  
(a)	
  program	
  or	
  data	
  held	
  in	
  it	
  is	
  altered	
  or	
  erased;	
  
	
  
(b)	
  program	
  or	
  data	
  is	
  added	
  to	
  or	
  removed	
  from	
  any	
  program	
  or	
  data	
  held	
  in	
  it;	
  	
  
	
  
(c)	
   program	
   or	
   data	
   is	
   suppressed	
   to	
   prevent	
   or	
   terminate	
   the	
   availability	
   of	
   the	
   data	
  
or	
  function	
  to	
  its	
  authorized	
  users;	
  or	
  
	
  
(d)	
   act	
   occurs	
   which	
   impairs	
   the	
   normal	
   operation	
   of	
   any	
   computer,	
   computer	
  
system	
  or	
  network	
  concerned.	
  	
  
	
  
	
  (3)	
   Any	
   person	
   who	
   without	
   lawful	
   authority,	
   intentionally	
   does	
   an	
   act	
   which	
   causes	
  
directly	
  or	
  indirectly	
  the	
  serious	
  hindering	
  of	
  the	
  functioning	
  of	
  a	
  computer	
  system	
  by	
  
inputting,	
   transmitting,	
   damaging,	
   deleting,	
   deteriorating,	
   altering	
   or	
   suppressing	
  
computer	
  data	
  or	
  any	
  other	
  form	
  of	
  interference	
  with	
  the	
  computer	
  system,	
  which	
  
prevents	
   the	
   computer	
   system	
   or	
   any	
   part	
   thereof,	
   from	
   functioning	
   in	
   accordance	
  
with	
   its	
   intended	
   purpose,	
   commits	
   an	
   offence	
   and	
   shall	
   be	
   liable	
   on	
   conviction	
   to	
  
imprisonment	
   for	
   a	
   term	
   of	
   not	
   more	
   than	
   2	
   years	
   or	
   to	
   a	
   fine	
   of	
   not	
   more	
   than	
  
N5,000,000.00	
  or	
  to	
  both	
  such	
  fine	
  and	
  imprisonment.	
  
	
  
(1)	
   (a)	
   Electronic	
   signature	
   in	
   respect	
   of	
   purchases	
   of	
   goods,	
   and	
   any	
   other	
  
transactions	
  shall	
  be	
  binding.	
  	
  
	
  
(b)	
  Whenever	
  the	
  geniuses	
  or	
  otherwise	
  of	
  such	
  signatures	
  is	
  in	
  question,	
  the	
  burden	
  
of	
  proof,	
  that	
  the	
  signature	
  does	
  not	
  belong	
  to	
  the	
  purported	
  originator	
  of	
  such	
  
electronic	
  signatures	
  shall	
  be	
  on	
  the	
  contender.	
  	
  
	
  
(c)	
  Any	
  person	
  who	
  with	
  the	
  intent	
  to	
  defraud	
  and	
  or	
  misrepresent,	
  forges	
  through	
  
electronic	
  devices	
  another	
  person’s	
  signature	
  or	
  company	
  mandate	
  commits	
  an	
  

	
  

Unauthorized	
  
modification	
  of	
  
computer	
  
systems,	
  
network	
  data	
  
and	
  System	
  
interference.	
  
	
  

Electronic	
  
Signatures.	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  

Select target paragraph3