Page 44 - CyberSecurityEssentialsEnglish
P. 44
CHAPTER 5
THE EGYPTIAN CYBERCRIME Legislations
It has become more conspicuous that creating a safe cyberspace and establishing a sustainable knowledge
society require a robust legislative and regulatory ecosystem that regulates cyberspace usage, secures digital
assets, addresses legal issues arising from the use of information and communication technology and various
technical applications, tackles cybercrimes, enhances data protection, privacy and networks security.
Manifestly, this makes it the cornerstone for reinforcing cyberspace security, developing knowledge society,
enhancing confidence in electronic services and transactions, protecting cyberspace users from cyber and
information crimes.
In this Chapter, we will introduce three relevant laws: the "Anti-Cyber and Information Technology Crimes
Law" No. 175 of 2018, the Personal Data Protection Law No. 151 of 2020 and finally the Egyptian Child Law
No. 12 of 1996, as amended by Law No. 126 of 2008.In fact, the Constitution of the Arab Republic of Egypt
stipulates in Chapter III (Rights and Freedoms), Article (57):
[Private life is inviolable, safeguarded and may not be infringed upon. Telegraph, postal, and electronic
correspondence, telephone calls, and other forms of communication are inviolable, their confidentiality is
guaranteed and they may only be confiscated, examined or monitored by causal judicial order, for a limited
period of time, and in cases specified by the law. The state shall protect the rights of citizens to use all forms
of public means of communication, which may not be arbitrarily disrupted, stopped or withheld from citizens,
as regulated by the law.]
The "Anti-Cyber and Information Technology Crimes Law" No. 175 of 2018:
This Law, made up of forty-five articles, ensures the safe and secure use of technology. Most importantly,
this Law came, after a spur of new laws that aimed at protecting investment and growth in a modern
paperless economy to highlight the fact that technology and cyberspace must be protected, secured and held
in the highest regard. This Law convicts any attempt to hack computer systems, or broadcast any publicity
42

