4.	
  

	
  
5.	
  

6.	
  

	
  
(d)	
  infrastructural	
  or	
  procedural	
  rules	
  and	
  requirements	
  for	
  securing	
  the	
  integrity	
  and	
  
authenticity	
   of	
   data	
   or	
   information	
   contained	
   in	
   any	
   designated	
   critical	
   national	
  
information	
  infrastructure;	
  	
  
	
  
(e)	
   the	
   storage	
   or	
   archiving	
   of	
   data	
   or	
   information	
   designated	
   as	
   critical	
   national	
  
information	
  infrastructure;	
  	
  
	
  
(f)	
   recovery	
   plans	
   in	
   the	
   event	
   of	
   disaster,	
   breach	
   or	
   loss	
   of	
   the	
   critical	
   national	
  
information	
  infrastructure	
  or	
  any	
  part	
  of	
  it;	
  and	
  	
  
	
  
(g)	
  any	
  other	
  matter	
  required	
  for	
  the	
  adequate	
  protection,	
  management	
  and	
  control	
  
of	
  data	
  and	
  other	
  resources	
  in	
  any	
  critical	
  national	
  information	
  infrastructure.	
  
	
  
The	
  Presidential	
  Order	
  made	
  under	
  section	
  3	
  of	
  this	
  Act	
  may	
  require	
  the	
  Office	
  of	
  the	
  
National	
  Security	
  Adviser	
  to	
  audit	
  and	
  inspect	
  any	
  Critical	
  National	
  Information	
  
Infrastructure	
  at	
  any	
  time	
  to	
  ensure	
  compliance	
  with	
  the	
  provisions	
  of	
  this	
  Act.	
  
PART	
  III	
  -­‐	
  OFFENCES	
  AND	
  PENALTIES	
  
	
  
(1)	
   Any	
   person	
   who	
   with	
   intent,	
   commits	
   any	
   offence	
   punishable	
   under	
   this	
   Act	
  
against	
   any	
   critical	
   national	
   information	
   infrastructure,	
   designated	
   pursuant	
   to	
  
section	
  3	
  of	
  this	
  Act,	
  shall	
  be	
  liable	
  on	
  conviction	
  to	
  imprisonment	
  for	
  a	
  term	
  of	
  not	
  
more	
  than	
  10	
  years	
  without	
  an	
  option	
  of	
  fine.	
  	
  
	
  
(2)	
   Where	
   the	
   offence	
   committed	
   under	
   subsection	
   (1)	
   of	
   this	
   section	
   results	
   in	
  
grievous	
   bodily	
   harm	
   to	
   any	
   person,	
   the	
   offender	
   shall	
   be	
   liable	
   on	
   conviction	
   to	
  
imprisonment	
  for	
  a	
  term	
  of	
  not	
  more	
  than	
  15	
  years	
  without	
  option	
  of	
  fine.	
  	
  
	
  
(3)	
  Where	
  the	
  offence	
  committed	
  under	
  subsection	
  (1)	
  of	
  this	
  section	
  results	
  in	
  the	
  
death	
  of	
  person(s),	
  the	
  offender	
  shall	
  be	
  liable	
  on	
  conviction	
  to	
  life	
  imprisonment.	
  
	
  
(1)	
  Any	
  person,	
  who	
  without	
  authorization,	
  intentionally	
  accesses	
  in	
  whole	
  or	
  in	
  part,	
  
a	
  computer	
  system	
  or	
  network	
  for	
  fraudulent	
  purposes	
  and	
  obtain	
  data	
  that	
  are	
  vital	
  
to	
   national	
   security,	
   commits	
   an	
   offence	
   and	
   shall	
   be	
   liable	
   on	
   conviction	
  
to	
  imprisonment	
  for	
  a	
  term	
  of	
  not	
  more	
  than	
  5	
  years	
  or	
  to	
  a	
  fine	
  of	
  not	
  more	
  than	
  
N5,000,000.00	
  or	
  to	
  both	
  fine	
  and	
  imprisonment.	
  
	
  
(2)	
   Where	
   the	
   offence	
   provided	
   in	
   subsection	
   (1)	
   of	
   this	
   section	
   is	
   committed	
   with	
  
the	
  intent	
  of	
  obtaining	
  computer	
  data,	
  securing	
  access	
  to	
  any	
  program,	
  commercial	
  
or	
   industrial	
   secrets	
   or	
   classified	
   information,	
   the	
   punishment	
   shall	
   be	
   imprisonment	
  
for	
  a	
  term	
  of	
  not	
  more	
  than	
  7	
  years	
  or	
  a	
  fine	
  of	
  not	
  more	
  than	
  N7,	
  000,000.00	
  or	
  to	
  
both	
  such	
  fine	
  and	
  imprisonment.	
  
	
  
	
  
(3)	
   Any	
   person	
   who,	
   with	
   the	
   intent	
   to	
   commit	
   an	
   offence	
   under	
   this	
   section,	
   uses	
  
any	
  device	
  to	
  avoid	
  detection	
  or	
  otherwise	
  prevent	
  identification	
  or	
  attribution	
  with	
  
the	
   act	
   or	
   omission,	
   commits	
   an	
   offence	
   and	
   shall	
   be	
   liable	
   on	
   conviction	
   to	
  

	
  

Audit	
  and	
  
Inspection	
  of	
  
critical	
  national	
  
information	
  
infrastructure.	
  

	
  
Offences	
  against	
  
critical	
  national	
  
information	
  
infrastructure.	
  
	
  

Unlawful	
   access	
  
to	
  a	
  computer.	
  
	
  
	
  

Select target paragraph3