Page 44 - CyberSecurityEssentialsEnglish
P. 44

CHAPTER 5


       THE EGYPTIAN CYBERCRIME Legislations

































       It has become more conspicuous that creating a safe cyberspace and establishing a sustainable knowledge
       society require a robust legislative and regulatory ecosystem that regulates cyberspace usage, secures digital
       assets, addresses legal issues arising from the use of information and communication technology and various
       technical  applications,  tackles  cybercrimes,  enhances  data  protection,  privacy  and  networks  security.
       Manifestly, this makes it the cornerstone for reinforcing cyberspace security, developing knowledge society,
       enhancing confidence in electronic services and transactions, protecting cyberspace users from cyber and
       information crimes.

       In this Chapter, we will introduce three relevant laws: the "Anti-Cyber and Information Technology Crimes
       Law" No. 175 of 2018, the Personal Data Protection Law No. 151 of 2020 and finally the Egyptian Child Law
       No. 12 of 1996, as amended by Law No. 126 of 2008.In fact, the Constitution of the Arab Republic of Egypt
       stipulates in Chapter III (Rights and Freedoms), Article (57):

       [Private  life  is  inviolable,  safeguarded  and  may  not  be  infringed  upon.  Telegraph,  postal,  and  electronic
       correspondence, telephone calls, and other forms of communication are inviolable, their confidentiality is
       guaranteed and they may only be confiscated, examined or monitored by causal judicial order, for a limited
       period of time, and in cases specified by the law. The state shall protect the rights of citizens to use all forms
       of public means of communication, which may not be arbitrarily disrupted, stopped or withheld from citizens,
       as regulated by the law.]

       The "Anti-Cyber and Information Technology Crimes Law" No. 175 of 2018:

       This Law, made up of forty-five articles, ensures the safe and secure use of technology. Most importantly,
       this  Law  came,  after  a  spur  of  new  laws  that  aimed  at  protecting  investment  and  growth  in  a  modern
       paperless economy to highlight the fact that technology and cyberspace must be protected, secured and held
       in the highest regard. This Law convicts any attempt to hack computer systems, or broadcast any publicity

          42
   39   40   41   42   43   44   45   46   47   48   49