Table Of Content(cid:9)(cid:9)
fite÷fsfror diaRlAge  si9°t14-Acre  GTsflAsh 
FEDERAL NEGARIT GAZETTE 
OF THE FEDERAL DEMOCRATIC REPUBLIC OF ETHIOPIA 
Yr 0.A.111(cid:9)  Opt: lee  4R4.1ce 4..111144-PT erilttit 
22 1  Year No 83 
h4.A Mil M.(cid:9)  NIT.X '11"  r.101.11(cid:9)  rtu: (cid:9) inottO. raw; 
ADDIS ABABA 7Ih  July. 2016 
hirkt 4111: OYU' Yil.fi;  PROCLAMATION No. 958/2016 
rtisr-eit+c WIXA WP,  (cid:9) wt.  Ori.iivi?  Computer Crime Proclamation (cid:9) Page 9104 
a/ami  CONTENTS 
PROCLAMATION No.958/2016 
h,PS 4rre NM/ Nn.* 
A PROCLAMATION TO PROVIDE FOR THE  
COMPUTER CRIME 
l'it.161Cesalts.(cid:9)  *tierAsA  WHEREAS, information and communication 
technology plays a vital role in the economic, 
AY14.11  h.11';'" uTi "vilmie.v; rA1:111:  N.(1:14* 
social and political development of the country; 
tAtI: "VS Yel."1.001 
WHEREAS, unless appropriate protection 
rh.16:(:"Vti3t; (cid:9) •I;)iTA"k 
and security measures are taken, the utilization of 
itinfr+SP 4111. plfr.kg  p0,43  IIA•1•KIAA). 
information communication technology is 
1116.141(cid:9)  "Rc+ft: ?0,V.o.s." 
vulnerable to various computer crimes and other 
116/4•1 rlA Y/54.  hr.'  nX  A.TA. A07. 4.A. 
security threats that can impede the overall 
07X/el. Ay A.A..:1% 
development of the country and endanger 
individual rights; 
WHEREAS, the existing laws are not 
11/-10(cid:9)  "'A.  11114.12 (cid:9) tihAi 
adequately tuned with the technological changes 
f•kitirttilf  Am-01:f  .1c: (1114: 
and are not sufficient to prevent, control, 
f"7.4Z4. AS(cid:9)  (07 A1  AtinlielhAt 
investigate and prosecute the suspects of 
tlomPaiinc:t  Afinemi:anc:c  •I•in1:MGP/T1  a)R 
computer crimes; 
11011 A"'1+1.11 
f1 f'.1  .•./1.4. mint r 
Unit Price(cid:9)  49.5-0  1 Negarit G. P.O.Box 80001
(cid:9)
It.r.4•A(cid:9)  .utLal  48TC lee Ak o 47 (cid:9) (s.r  Federal Negaril Gazelle No. 83 711' July  2016 page  (cid:9)   9105 
(07XA7  Aanti411A: ften4alint::  WHEREAS, • it has become necessary to 
Armoncan(:s1  )bA,1011,1%)/ nYAI.X$04.1 Aant11114.11  incorporate new legal mechanisms  and 
r"Lea-A.  10n4.1) AA4.4.766  p1:1441  procedures in order to prevent, control, 
investigate and prosecute  computer crimes and 
11'1* 
facilitate the collection of electronic evidences; 
NOW, THEREFORE, in  accordance 
IIM•tit.t) 4a,4-1111; 4.(111/441..PI: GT•11A.b 
with Article 55(1) of the  Constitution of the 
tr1(cid:9)  1114X• 94(fi)  mina' 
Federal Democratic Republic of  Ethiopia, it is 
hereby proclaimed as follows: 
hcA  
PART ONE  
m+44  GENERAL 
k. iev•C  GNI   1.Short Titk 
htrk (cid:9) to7XA  M'  4:11:  This Proclamation may be cited as the 
"Computer Crime Proclamation No.958/20 I o", 
tull+A AT4A:= 
.   C   2.  Definitions 
rfrA. hviii A.4 .11:1•9" Y"Zfiltilm• I1A111  In this Proclamation unless the  context 
1111-1-ght: 1111.1)  otherwise requires: 
el  "rtirwittc tolgA"  1/"Computer crime" means 
0)  fibril:NI:: 11119"1:11-11: 111:54.1  a)A crime committed against a computer, 
computer system,  computer data or 
11119"1:1=41: AO• titer hilli(:tt  4/1. 
computer network; 
Y"Y.6.09" oi7XA = 
A)  tir-cgl.cli  Ylirecittc 11c54.11  b) A conventional crime  committed by 
nisi—cr.-Pc  A0.7 (DAY° t•I•9it:h7  means of a computer, computer system. 
11"Y.d.t1," f/DX,11i4  ortgAi  computer data or computer network; or 
(Ler' 
,h) (cid:9) tor.Y"  c)  Illegal  computer content data  disseminated 
).4.Pi(:tr hml11180•  r1.4106/.'• morr  through a computer,  computer  system, or 
computer network; 
Ao. 
k/ "PA:). T(7411.10/  hlA1tt-10   2/ "data processing service" means the service 
of reception, storage, processing, emission, 
p1:54.(cid:9)  40.7 
routing or transmission of data by means of 
ray+tiA:(cid:9)  rmily7:149(cid:9)  ran-114.1= 
computer system and includes networking 
a)M' 
services; 
A.tP7 rti-pch hotAefiA0 fisr 
.e61.1.re-A =
(cid:9)  
1.14÷ :MA 4111:  .iev ilk 1.0 +1 K?i.X 4.9"  Federal Negarit Gazette No. 83 7"' July 2016 page  (cid:9) 9106 
01,
"11$ 1:1=.11: (PM"  3/ "computer or computer system" means any 
"7/14.  (16ft:idEl:(cid:9)  flAtur:1:1"  -1;tiTte.4  software and the microchips technology 
based data processing, storage, analysis, 
r'1"414•14  11/4:)' TCA11.11: 
dissemination and communication device 
4.1.14/11  11(:'I." 1.1  17744.  (DAP' A.A":1• 
or any device that is capable of performing 
Y.41141: 01,Kr  hatrtr-We 4-1114.4.1 
logical, arithmetic or routing function and 
r"telicinpl  07111m.Y"  unt16.? 
includes accessories of that device; 
Foollelo(cid:9)  htiAlr AtJa.sful,A: 
"rtir(cid:9)  A;P"  4/ "computer data" means any content data, 
hifec'tie 11.+1/4.1 r"Y.TA  traffic data, computer program, or any 
arfilm.sou rAtpl• A0.1(cid:9)  ;P:  other subscriber information in a form 
suitable for processing by means of a 
rti9"1:11.11: Ttrnilor a),,e,sou gllins14.1 
computer system; 
11"%ofilt(cid:9)  urfilal•P' h.161Cmi71•7(cid:9)  : 
"11119°1:11.11:  Tiro/4.r" "7114. hl(':  5/ "computer program" means a set of 
/i1:14' 441111.1 774.fticapl  instructions or commands expressed in 
ASP'  r.4.1111(0.7  aPtn.4.  N7/4..et1'ef  words, codesor schemes which are capable 
11,4'14.1 (lti.e.. a),e,yu (MA,  of causing a computer system to perform 
or achieve a particular task or result; 
?"%ilAN YananG.P 0).KY"  ri•eltti 
ital. 
V  "114.k6gh A:)."  11/14•  6/ "traffic data" means any computer 
roy.x1.017  tiriAlL7i1  generated data relating to a chain of 
communication by means of a computer 
fin It a(cid:9)  zmi (cid:9) rvriPri. 
system indicating the communication's 
*Ad.! 11/4:J•m•(cid:9)  laiviAitty4. 
origin, destination, route, time, date, 
°JAY" "OA rtirrAhail 1116/14. 
duration, size or types of underlying 
fltirl:g+C(cid:9)  11"Zentl.h 
service; 
Pe;).  110).: 
'f,/  "115'40. PI:P  " "1/t1:1. 11.K•r8: (14.1#4,4171  7/ "content data" means any computer data 
11Y.4411: 4'unC 0),K9" (IAA  found in the form of audio, video, picture, 
arithmetic formula or any other form that • 
"Y7Plour 1'co ?"7:117(cid:9)  a),e,y0 
conveys the essence, substance, meaning 
fri 4;). mr,sou 
or purpose of a stored or transmitted 
rtip-cf41: 11s/or-VON siu7s.1.: (1:6(cid:9)  (:: 
computer(cid:9)  data(cid:9)  or(cid:9)  computer 
3
11:7.vo (cid:9) a)Ar (cid:9) einAtiti4. 
communication; 
.14;)"
9107 
411•C  *V Ilk (.4(cid:9)  k11.* 'Er(cid:9)  Federal Negarit Gazette No. 83 7'1' July 2016 page  (cid:9)
X/  "%-1.91(:h"  ‘1114.  0.A4.;  hH.,P (MA  8/ "network" means the interconnection of 
two or more computer systems by which 
Etir'1:441: eq:144 NCA MU) 
data processing service can be provided or 
ila7A-1.411(:(cid:9)  TCAA.11 
received; 
Afmtitivl.  0),e9°  Aw/174. ?"?..ell*A 
/"C'14. 
9/ "computer data security" means the 
"IIISP"1:1=11:(cid:9)  /M.(cid:9)  Ri)14."(cid:9)  aVA4. 
protection of a computer data from 
flir1:1=41:(cid:9)  N114,etn4-: N'MPAIC: 
deleting, changing, and accessing by 
1Art.6.+KA4. hilA(cid:9)  N1A,P01: 
1
unauthorized person, compromising its 
9°11M.01:5•1:  NIA.P.,9tvp to.esiu  AA 
confidentiality or any other damage; 
"Y3 'm•9"(cid:9)  NIA ',RCM+ untnil+ 
"Ke:iii."(cid:9)  htir-cit-Pc Ac54.  10/ "access" means to communicate with, to 
enter in, store in, store data in, retrieve, or 
117.54• reinfi:tn(:: tog tisP"1:1=-N:  tu:1•1: 
obtain data from, to view, to receive, move 
&J. raYtia're-1: 114.11"Yr3 14;1- 
or copy data from a computer system, or 
11174.: 11"7114.: VantIPAr:: 1"114'11+As 
otherwise make use of any data processing 
tog AA  `littlY  untUf  l'enelAtIT WAY° 
service thereof; 
AA(cid:9)  miln'ailu(cid:9)  1114,4.(cid:9)  TCAA.11 
?"7"17i. -1.111(: 
r hl  "4:Att:  Am/4." "Mi. (111.1)  I I/ "critical infrastructure" means a computer 
°NV+ 
system, network or data where any of the 
hh1+8(cid:9)  hAI) a 141-08,1111-Um- Iltrem-9" 
crimes stipulated under article 3 to 6 of this 
ra)1YA(cid:9)  (1.4.K9"11-7. 
proclamation, is committed against it, 
.1z.135l• As(cid:9)  p+tri,  'u, 
would have a considerable damage on 
7-14 4.(cid:9)  tt.eR,Cti(cid:9)  1)"7:4.A 
public safety and the national interest; 
1111/"1:13-41:(cid:9)  k-i-a)Ch a),e.r 141. 
'um 
*DU "InA4."(cid:9)  ntiritth,111 %K.).  12/ "interception"(cid:9)  means(cid:9)  real-time 
surveillance,(cid:9)  recording,(cid:9)  listening, 
"Al rfirl:441: A;)- cnAr 
acquisition, viewing. controlling or any 
towitt.4• emi10-4-A: !m4444.:  
(cid:9) other similar act of data processing service 
"YA anp  anaPel.e: :  11P4.:  fin oPiliffiC 
or computer data; 
(HAP" AA -1-en1111,e 
"kmaitt—). Auk" "911:1. 111151"7:11,PC  13/ "service provider" means a person who 
11. "711Ti4.  .1:tatl7!  r.(4).(cid:9)  ai.er  provides technical data processing or 
1"111.4. tu:34•  teiA1A0:1• inity"  yn:01  communication service or alternative 
A"7:1.(cid:9)  (lap   infrastructure to users by means of 
computer system;
(cid:9)
7k (cid:9) finial  7.74+ "Kai 4erc  *re ta 4:4  +7 Nit* 99`(cid:9)  Federal Negarit Gazette No. 83 7"' July 2016 page  (cid:9)  9 108 
of 
"in4,11k, 5.+IL(cid:9)  "/A4.(cid:9)  +ffitiV4  14/ "Attorney General" means head of the 
Soyht: (cid:9) 114KI,A m+41: `MIL  Federal Attorney General appointed by the 
:516. Wwt  House of Peoples Representatives; 
X6/ "1.411,(cid:9)  n7A4• flat+die iffrIL  avi•  15 "Public prosecutor" means lawyer appointed 
+WI" 111.+IL.11(cid:9)  01"1-ARG.P  8741  by the Attorney General and administered 
onwa•  rinl.+AR(:(cid:9)  iinne..r: no')  by public prosecutors administration 
ai+111, 5,11, a'/•3S rhi•A in+1.e  regulation and included the Attorney 
General and the deput5,  attorney generals; 
1.+11,51 .1117 AturGA1 
"ffist:"74  ?OA"  "Ytti•  runt int: On t:  16/ "investigatory organ" mean a person 
Y•hAtnm• MIA yap:  legally invested with the power of 
investigation; 
jjl  "hAA"(cid:9)  Ilk-i•tity  17/ "regional state" means any state referred to 
4.9"hG-11.(cid:9)  Griirth  in Article 47(1) of the Constitution of the 
Federal Democratic Republic of Ethiopia 
h14%* flY,(4) y•honittpro)'•  
Wu)  and for the purpose this Proclamation it 
hAA (U1 AH.V  terk himsor 
includes Addis Ababa and Dire Dawa city 
?Intl hiani  ?AI 111:•44? hinl 
administrations; 
Mg -:A1RC. 7 At.u.s0"10A1  
"ri1.11" /17A4. fd.RG-A  PAM  (0.er  18/ "police" mean Federal Police or 
Regional State Police to whom the power 
rA.A PAM, ilaPtiAc 
r.minap MAA  of the Federal Police is delegated; 
"tbrm."  07A.1.(cid:9)  an411  19/ "Agency" mean Information Network 
R1/7 ,7* IbnA.  Security Agency; 
"Anpn(cid:9)  tlaP  tHAY"  11,117  20/ "person" means a physical or juridical 
rila0•i. m114* 11+11inm• AtiA 'low=  person; 
"InnIm.sm fiur3X; (cid:9) 111-1ARm. 11.4.151"  21/ any expression in the masculine gender 
includes the feminine. 
At.u.SouGA::
4,11.4.A(cid:9)  911.111 4I1'C lit At. 4.4 +1 kn.*(cid:9)  Federal Negarit Gazette No. 83 7111  July 2016;  page  (cid:9)  9109 
hdA ifiA÷  PART TWO  
rhrtg+C co7VriT (cid:9) hcA h7P  COMPUTER CRIMES SECTION ONE  
fiti9'"Cg+C P'CLI÷S° fihrtg+C 45- 4A  CRIMES AGAINST COMPUTER SYSTEM  
AND COMPUTER DATA  
rrid.earN  (1)7X11•T 
E.  all am KIAD÷ 
3. Illegal Access  
s/ 
"TS'n)./D Am- tP5 .11A0(cid:9)  to.e9u  1/ Whosoever, without authorization or in 
11.1•Aaim• Lfr.e: °Pat rtirl:fitil: 11CI•1•I  excess of authorization, intentionally 
rtir'Cit'll:  PO' ai.er -1101:i'i  XL-7M.  secures access to the whole or any part of 
computer system, computer data or network 
fllid.AY"(cid:9)  110D-A•  y17  hIRt11 t1Y'114. 
shall be punishable with simple 
11"7.PMAT 4,11A(cid:9)  air,y0 
NAh .111: 7f, (1"Y.XCII  (In+ 1.14.  ingar   imprisonment not exceeding three years or 
fine from Birr 30,000 to 50, 000 or both. 
110.A.1:9," 
4/ MU)(cid:9)  )'tl.hX•(cid:9)  4.e  2/ Where the crime stipulated under sub-article 
ra)7XA Pc•/.4• ri-i.nonaps  (1) of this Article is committed against: 
I)) (1,111 rela04- 00414. tvilion- .1-*9u  a) a computer system, computer data or 
network that is exclusively destined for 
MA1A04. 41$ 11"Yo•A rtir 
the use of a legal person, the punishment 
to.er 
shall be rigorous imprisonment from 
%-1.50Ch(cid:9)  bin 1011-1. tion4. ?Jib 
three years to five years and fine from 
11"1/..KCA Rip NA104•  XS 
Birr 30,000 to 50,000; 
hAh 41c 97f,  flusaCA 
(/D.N.bb .PA.ha/A: 
A) 11.1:Ati:  00/01.4.  AuY4.(cid:9)  WI  b)  a critical infrastructure, the punishment 
lihr/14.  lemi• hlth Mt:  5a04.  shall be rigorous imprisonment from 
Y"/ .CA(cid:9)  hA4.4. XS(cid:9)  ?dila  five years to ten years and fine from 
Birr 50,000 to 100,000. 
41C iiY f, 11"Y.KCII  anitt.bb  "1143a1A:: 
Q.  ail (DT  mA4-  4. illegal Interception  
m111; 0),ID  Am•  in(cid:9)  fAd..+K-  tp,er  1/ Whosoever, without authorization or in 
d.fr.e:(cid:9)  .e.4.1:  excess of authorization, intentionally 
/4:). tr.er 11$;:i• TtrAA:37  intercepts non-public computer data or data 
processing service shall be punishable with 
t1hrA4. 
1°14 
rigorous imprisonment not exceeding five 
nml,efIAT(cid:9)  XS  h41c 7f. Mb 
years and fine from Birr 10,000 to 50,000. 
11"7..KCA  fm+thb A.ha/A:: 
0./ (cid:9) hlgiN 3h.A is741V (6) 4.e.  2/ Where the crime stipulated under sub-article 
ra)1XA  (I) of this Article is committed against:
(cid:9)
Nit*  9110 
dg.X4-A 1.94+ MIA 4191:  'ICI.' l (f) +1  9.r  Federal Negarit Gazette No. 83 7'11  July 2016 page  (cid:9)  
U) flail I' tlaPS4. 00414. A-hilino). 1-4311)  a)  a computer data or data processing 
kiAlley+  4IY flaY.aPA ?h? "1.71141:  service that is exclusively destined for 
the use of a legal person, the punishment 
/V. wAsy° ?AO. TCAA.T7 
shall be rigorous imprisonment from five 
4,e  hill hti9u11le  Ian+ hAh Mc 
years to ten years and fine from Birr 
lap+ (1"7.RCA(cid:9)  hAZ-1. X; IHI(: 
50,000 to 100,000. 
filth tic fief. 11"7..r.CA(cid:9)  +661. 
M'al A 
A) IltAtt: innol.4. A°14• 4,e  tin  b) a critical infrastructure, the punishment 
shall be rigorous imprisonment from ten 
5c o (cid:9) hith (cid:9) ii9u114. 
years to fifteen years and fine from Bin 
flaXRCti (cid:9) h4IC 
100,000 to 200,000. 
hAh 4IC(cid:9)  flaY.KCA  au4,661. 
,PA4,11/61 = 
6. fltirTRI•C(cid:9)  alg.  MAO en0711+  5. Interference with Computer System  
1/ Whosoever, without authorization or in 
ml7n4aPr  Am• tYS 4111° fA6..4't °IASI" 
excess of authorization, intentionally 
114•Amm.(cid:9)  aPat  Ytir"1:?-41: /4.4.1 
hinders,impairs, interrupts or disrupts the 
flaYTI7149 flaYAGaa..1.1 (laYitei- 4.  aker 
proper functioning of the whole or any part 
floottaYr rtir1:1=11: A-05.1.1 (DAY° 
of computer system by inputting, 
k'NoCtil  an&fl' 4.'101C 11hd.Ar  U', 
transmitting, deleting or altering computer 
anql. Am.&  .?R  S4,4. Jambi  faMeiD 
data shall be punishable with rigorous 
WM" h14.5t4T YR4'i h7A01,  116114- 
imprisonment from three years to five years 
5004• hAh hrA.1. 5014 11"xRCA 
and fine not exceeding Bin 50,000. 
NAG-4. NS  tHIC  !at  naYktlevP  (n+6" 
AdhaiA:: 
gi  lULL) )041V ltt-A Al+X• (6) 4,e  2/ where the crime stipulated under sub-article 
fro7XA  (1) of this Article is committed against: 
a) a computer system that is exclusively 
U)  (Pei lanaPS-). aD41.1. A÷Aintn- 4.*913  
destined for the use of a legal person, 
he/Ag'/A°4. 41Y 11"7.m. A Ilislul:441: 
the punishment shall be rigorous 
eLe  Inn Wririli•  4)004.  Mit 
imprisonment from five years to ten 
At1C  ion+ (PIACI)(cid:9)  NA104• hc 
years and fine from Bin 50,000 to 
hAh  4IC Of.(cid:9)  IlaY.RCA 
100,000; 
0D+01. fli+alA;
(cid:9)(cid:9)
Ak I!) St')  1-ederal Negarit Gazette No. 83 7th  July 2016 page . 
:1101 49'C (cid:9)
b) a critical infrastructure, the punishment 
A) 11.1:Att:(cid:9)  A`1.1. •151, 
shall be rigorous imprisonment from 
lan ?dill hill, h9" 100.1. 
tat 4i-ears to fifteen years and line from 
li"YACA y,  hAIA. Nt";  IHIC  h jf7ti 
Mg 400.000 to 200,000 or, in serious 
hlttl  411: is ir7ti,  11"7.Y.C11 00.1q.1.6  cnr.P' 
case, rigorous imprisonment from 
.1.(cid:9)  11115(cid:9)  itYDA1. 
fifteen years to lwentey years and fine 
51/10. NMI 'If 'Ian+ 11"7.XCA 
from Birr 200,000 to 500,000. 
?lc 1141C(cid:9)  NAti .IIC jf7i. 
11"7.XCA fin+ 6.4. 11+mA : : 
6. (ausinellantage.to Computer Data  
ntirtg+c /V- 4g. 7.11÷ (cid:9) '411  
1/ Whosoever, without authorization or in 
"r}V 0)-9" elm•  in(cid:9)  ,PAL. y: aker 
excess of authorization, intentionally alters, 
b-prima).(cid:9)  A:).1 
deletes, suppresses a computer data, 
rAtnalt(cid:9)  .1.(:7•Y"  ?OA 5:T4m. 
renders it meaningless, useless or 
l:e 
(DAY"(cid:9)  VP4 An?r.yu ta
inaccessible to authorized users shall be 
in;P"7.917. .1. RI;li  N114 ifttrl fRIA 
punishable with rigorous imprisonment not 
IlaYeetiAls X"P 
exceeding three years and fine not 
hc IPt1C(cid:9)  (1`17fAlAT 1/0.1.01.  exceeding Birr 30,000. 
51..1"11A:: 
2/ Where the crime stipulated under sub-
g/ fltl.t1  h14%* 11%-ta h34P8 (1) el.e. 
article (1) of this Article is committed 
to1XA PCV1. P-I•ditun(p: 
against: 
a) a computer data that is exclusively 
0) (MO 11)60 an411. 11.1111tna.  .t*r 
destined for the use of a legal person. 
MAitto 41Y  fluZaPA 1•119'1:1=.11: 
the punishment shall be rigorous 
14;J•(cid:9)  liV'Ai•  5ffis1• NA11 
imprisonment from three years to five 
hrtli• 51/8"1. (1"ZKI":11(cid:9)  hAlA• hi;  years and fine from Birr 30.000  to 
NAti 4IC tin. (1"7.XCA 
50,000; 
tni+tm• $11.1'aiA: 
A) 114 :Aft:  anwl.4-  AmPl• *IA 71111  b) a critical infrastructure, the punishment 
shall be rigorous imprisonment from 
bhrni•(cid:9)  ?alb MC ifini• 
five years to ten years and fine from 
r"ZRCA(cid:9)  At (cid:9) b4ic 97i. Mb 
Birr 50,000 to 100,000. 
41C  fiffi. timacti an+661. 
titirtfotC agolGic (cid:9) ismfr+r  .9c  7.  Criminal Acts Related to Usage of 
r-t-ffn. 07Xtr*   Computer Devices and Data  
1/ Whosoever, knowing that it can cause 
6/ arPs' in•SP) (cid:9) Am.(cid:9)  111151"1:4.11: 
damage to computer system, computer 
14:).  aker (0,4•9'(:h 
data or network, intentionally transmits 
it.rxcer  N1X"7.1A. hgtn+  Art I)
(cid:9)
Wei  6..r.4-A 1.14+ :Mat  *MC 'itt(cid:9)  4'1(cid:9)  Federal Negarit Gazette No. 83 rh  July 2016 page  (cid:9)  9112 
.1'.11/1m.(cid:9)  cok.sm ?-1•411A.  any computer program exclusively 
designed or adapted for this purpose shall 
Te."VI,VTI  try 
be punishable with simple imprisonment 
h"Yief5i. 
not exceeding five years or fine not 
k3gtr5(cid:9)  9uo4. 11"7.e1lAT ./MA 
exceeding Birr 30,000. 
Ni14.4.  (DAY"  hill(:  E.471.  11"7.ellAT  00+Lbb 
0/ "VIn'ai•Y°(cid:9)  num ?ICE tih111,x•(cid:9)  Nttii  2/ Whosoever, knowing that it is, to be used 
for the commission of unlawful act 
ruilXA 
specified under Articles 3 to 6 of this 
NIX"Y.aPtl.  Nftn.h AK!)  git1a7 
Proclamation,(cid:9)  intentionally(cid:9)  imports, 
Y"Y.m.tt• rtir1:1=11:  ani1G.e$04.1 (PAY" 
produces, offers for sale, distributes or 
14:J•5071.1  trl -(IA" wit Olt: 
makes available any computer device or 
apAls(cid:9)  fanz.1.1 Aw fv, 
computer program designed or adapted 
tok,510  Alt04.  N14..•"1";—/.  YariFST 
exclusively for the purpose of committing 
N'iRtr5 tih9"t1-1.(cid:9)  080 11"7 An (cid:9) X"I• 
such crimes shall be punishable with 
id (cid:9) ti (cid:9) NtItt .11(: 971. 
rigorous imprisonment not exceeding five 
an+ 1,14,  k,, lia;A 
years and fine from Birr 10,000 to 50,000. 
3/ Whosoever possesses any computer 
V/ nY3Va)-9° Am. (hit)(cid:9)  ttill+A• E 
devices or data specified under sub-article 
NolgA(cid:9)  Aunii.or 
(I) or (2) of this Article with the intention 
11111111 MIA/  h1.11V  10.(1 h1.1%-  (fi) (PAY" 
to further the commission of any of the 
(0) r+rnittli.114.1 rii9"-1:1=-11: alai& f$04. 
crimes specified under Articles 3 to 6 of 
(0.e9"  14;)•9111.(cid:9)  ri-TV NIxit") 
this Proclamation shall be punishable with 
ilawl•  11m/A(1AT (HA(cid:9)  isn,er tHic 
simple imprisonment not exceeding three 
NAla 'II(: Off. noxxct)  (ID+ thb 
years or fine from Birr 5,000 to 30, 000. 
`11Vm•Y°(cid:9)  .(1fr (cid:9) a),er  4/ Whosoever, without authorization or in 
excess of authorization, intentionally 
awth 1119°1:13-41: p'Cli.: 
discloses or transfers any computer 
rtise"1:1=-11: 4;1. a),er k,4.9)Ch xe.7b4. 
program, secret code, key, password or 
"717.1.  ?"1/.fi1TA rti9°l:g41: 
any other similar data for gaining access 
Vrtim.0(cid:9)  tAiz: ?"..Ace. frA 0),e9° 
to a computer system, computer data or 
AA aunt% 14.0. M.(cid:9)  AAA Am. 
network shall be punishable with simple 
MAC:  feun  NIKtr5(cid:9)  gun, I. 
imprisonment not exceeding five years or 
11"7,ellAT .1,11A(cid:9)  0.e9° 'ill- toir: 
in serious cases with rigorous 
lltr5 J,ti.  hAtt (cid:9) 5cm4.  11"9.RCA 
imprisonment not exceeding five years 
NAIA•  he  tHic X71.  Mit  .11t: 
and fine from Birr 10,000 to 50,000. 
„
(1"7.RCA a01,04. ,e+ /A::
(cid:9)
OUP  (cid:9)
4.Y.4-A 5.94+ .910/ 41TC lit 0, (I) +1(cid:9)  9.r  Federal Negarit Gazette No. 83 7" July 2016 page . (cid:9)  9113 
6/ (MO(cid:9)  h1+8  (0) ity,  5/ Where the crime stipulated under sub-
V-1-antapta)-1  cia),YA(cid:9)  11:11A+ Ii.  article (4) of this Article is committed 
negligently, the punishment shall be 
+01.11 WOK' 
simple imprisonment not exceeding one 
VI/AflAT 4'itA(cid:9)  Nr; WIC RI'. 
year and fine not exceeding Birr 10,000. 
VVA(IAT(cid:9)  ,elrgA 
hq infrPof  8. AuravateoiCak 
row  kalk  loockx.  i  NM)  Where the crime stipulated under Article 3 to 6 
"73m•1° ra)IYA  of this Proclamation is committed: 
U)  Aa).).ge-sq:  ir+YD  aqtr AtiA9u h+ti:  a) against a computer data or a computer 
"11"Pli•  (1.11A  (1"Y.anAh.ta).  11.11+  system or network which is designated as 
JpilatC  -1-11A°  (1.1-11Fon  A;J.  top secrete by the concerned body for 
military interest or international relation, or 
rn,(P  A;Pm-  fluY:11111•  rtiY"7:?--t-C 
prC4-1. (PAY°(cid:9)  -23(:3i  4y, hiMai,e,v° 
A) t.111 f,  7,11,  Plq3k (cid:9) mM" 0•16.1;  b) while the country is at a state of emergency 
(1.241. Ilk 11$1°4-11(1-1. a)+I.  ht15:  or threat,the punishment shall be rigorous 
+apt: hhhe•  hrAi.(cid:9)  hAh  imprisonment from  fifteen years to 
Poo M.(cid:9)  nagiAci)  twenty five years. 
AtfcA: : 
7h./1 hCA VIA+  
SECTION TWO  
nilr'rg+C ita7teci• fttLeink ii°761111COCI  
COMPUTER RELATED FORGERY., 
rat#AA P S l'AC++ t07)Elt4  FRAUD AND THEFT 
P.  1117Cg.I.0 P..#, Ing hAI 00AaT  9. Computer Related Forgery  
(/"A'aPYI) (la). YA.110).1(cid:9)  a)Ar  Whosoever falsifies a computer data, makes 
T4'1° Arlie/JO.  a)Ar  AG-41. (DAY" AA,4 (la)•  false computer data or makes use of such data 
j'Atf5 all(rra).1y°  em.(1-1.  my,y° T+1°  to injure the rights or interests of another or to 
procure for himself or for another person any 
A°Ya/7.1.  mfr(cid:9)  (1"7641 (71:01: 
undue right or advantage shall be punishable 
m•/n,4•(cid:9)  to,eY° A.irZaP 
with simple imprisonment not exceeding three 
P11511 1:g-1-1: 14)-  mg  dii)./• rAmin a)Ar 
years and fine not exceeding Birr 30,000 or in a 
the1-1-21;' (cid:9) 14:).(cid:9)  in,ev"  (111.1). 
serious cases with rigorous imprisonment not 
(14-1A1A  NIRO",(cid:9)  (rYAllAT 
exceeding ten years and fine from Birr 10,000 
4,11A(cid:9)  XS /VA 41C 11(1,e.(1AT 
to 100,000. 
co+61.1' (cid:9) WM- ntYS 1,16  hill[: 
(ImmilAT(cid:9)  N111.-4- ?lc 1141C  in. 
N1111  1l(: Off.  11"7.R1.711  tilulq."  Atha/A: :
Description:vulnerable to various computer crimes and other security threats  "Computer Crime Proclamation No.958/20 I o",. 2. 5004• hAh hrA.1. 5014 11"