Page 46 - CyberSecurityEssentialsEnglish
P. 46
✓ Electronic mail
A means of exchanging electronic messages through a specific address, between more than a natural or legal
person, via information network or other electronic connection means through computers and the like.
✓ Interception
Unduly viewing or obtaining data or information for the purpose of eavesdropping, disabling, storing, copying,
recording, changing content, misusing, modifying or redirecting the path for illegal reasons.
✓ Hacking
Unauthorized access or that is in violation of the license provisions or access to an Information System,
Computer, information network and equivalent thereof by any illegitimate way.
✓ Content
Any data which constitute, solely or jointly, with other data or information, a piece of information, trend,
orientation, conception, meaning or reference to other data.
In addition, the "Anti-Cyber and Information Technology Crimes Law" No. 175 of 2018 stipulates several
significant articles
✓ Article (2) (Obligations and Duties of the Service Provider)
Stipulates the necessity of securing data and information in a way that maintains confidentiality, and
guarantees their protection against disclosure or damage.
✓ Article (4) on (International Cooperation Against Cyber and Information Technology Crimes)
The concerned Egyptian authorities shall facilitate cooperation with their foreign counterparts, within the
framework of ratified international, regional and bilateral agreements, or in implementation of the principle of
reciprocity, by exchanging information in a way that ensures the avoidance of perpetrating cyber and
information technology crimes, assists in investigating them, and tracks down the perpetrators of these crimes,
provided that the Egyptian Computer Emergency Readiness Team (EG-CERT) at the National Telecom
Regulatory Authority (NTRA) is the technical point accredited in this regard.
✓ Article (12) (Crimes and Penalties)
Without prejudice to any severer penalty provided for in Penal Code or any other law, and subject to the
provisions of Law No. 12 of 1996 promulgating the Child Law, the following crimes shall be punished according
to the penalties ascribed to each crime.
Law Chapters Summary
Chapter One: Attacking the Security of Information Networks, Systems and Information Technologies, The
Crime of Unauthorized Utilization of the Telecommunications, Information Services and Technologies
✓ Article (13)
Anyone who unduly utilizes a telecom service or one of the audio or visual broadcasting channels
services via the information system network or any information technology means shall be punishable
with imprisonment for a term of no less than three months and a fine of no less than ten thousand
Egyptian pounds and no more than fifty thousand Egyptian pounds, or with one of the two penalties.
✓ Article (14) (The Unauthorized Access Crime)
Anyone, who intentionally or unintentionally gains access to, and unduly remains in a website, private
account or prohibited information system shall be punishable with imprisonment for a term of no less
than one year and a fine of no less than fifty thousand Egyptian pounds and no more than one hundred
thousand Egyptian pounds, or with one of the two penalties. If such access resulted in damaging,
removing, changing, copying or republishing the data or information in the website, private account
or information system, such person shall be punishable with imprisonment for no less than two years
and a fine of no less than one hundred thousand Egyptian pounds and no more than two hundred
thousand Egyptian pounds, or with one of the two penalties.
44

