Law Cer
  • Home
  • Attorney
  • Law
    • Accident Law
    • Business Law
    • Child Law
    • Copyright Law
    • Criminal law
    • Family law
    • International Law
    • Real Estate Law
    • Traffic law
    • Women Law
  • Cyber law
  • Divorce
  • Legal Advice
  • Pages
    • About Us
    • Privacy Policy
    • Disclaimer
    • DMCA
    • Cookie Policy
    • Terms of Use
  • Contact Us
No Result
View All Result
  • Home
  • Attorney
  • Law
    • Accident Law
    • Business Law
    • Child Law
    • Copyright Law
    • Criminal law
    • Family law
    • International Law
    • Real Estate Law
    • Traffic law
    • Women Law
  • Cyber law
  • Divorce
  • Legal Advice
  • Pages
    • About Us
    • Privacy Policy
    • Disclaimer
    • DMCA
    • Cookie Policy
    • Terms of Use
  • Contact Us
No Result
View All Result
Law Cer
No Result
View All Result
Home Cyber law

Egypt: New Anti-Cyber And Information Technology Crimes Law

Clyde Osborne by Clyde Osborne
August 5, 2025
in Cyber law
0

The Anti-Cyber and Information Technology Crimes Law (Law No. One hundred seventy-five of the year 2018) has been ratified and published within the authentic Gazette to top off a year of modern and superior legal gadgets. The new law addresses problems that include hacking country statistics structures, committing crimes via statistics systems, era, email, or publishing content online that threatens the security or financial system. It is a much-needed replacement for the outdated 2004 counterpart, which best addressed telecommunications. This made the law insufficient to cope with modern-day cybercrimes, which often gave judges difficulty finding the precise rules to match alleged crimes. This undermined key ideas such as prison fact and equity. Now, this law, although no longer immediately or in reality, is an economic regulation that may be used to offer a warranty for investors and entrepreneurial human beings, as it is a key device in any modern-day criminal justice system.

Egypt: New Anti-Cyber And Information Technology Crimes Law 1

The law, made up of 45 articles, revolves around ensuring security and securing the use of technology, not restraining its users. Accordingly, below is a precis of the new liabilities that the law enforces:
For Citizens

People who publish a photo of someone without their consent get at the very least 6 months in jail and a quality of 50 – 100K.
Any content material published that can be regarded as “against family standards and values upheld with the aid of Egyptian society” is also punishable under the law under Article 25.
Making amusing or parody bills of public figures is likewise punishable under the new regulation, yet under Article 24.
Anyone creating an email, internet site, or non-public account on social media and falsely attributes it to a registered character or organization also faces first-degree and jail time.
VPNs or nameless browsers used to privatize customers’ browsing behavior are illegal as well if the motive of using them is proven to be unlawful or cannot be determined.
Sharing net connections, wi-fi networks, and Cable TVs have also been blanketed within the regulation beneath Article thirteen.
Hacking also is now punishable whether intentionally or now not. Act of gaining access to files via any character without permission are penalized through prison time & any damages to those files extend the sentence.
All unique content material published that violates the privacy of others without their consent is a problem to punishment regardless of the validity of information concerned.

Article Summary show
For Editors or Publishers of the Media
For Internet Service Providers (ISPs)
For Telecom Companies
For Digital Security Experts
For Web, Account, Email, or Information System Administrators

For Editors or Publishers of the Media

For the internet site where the photo is published, considered as the facilitator for a criminal offense, the wrongdoer gets a minimum of 2 years in jail and a satisfactory of 20-200k.

For Internet Service Providers (ISPs)

They must now not acquire surfing statistics for an internet site or publisher, or they will be challenged to a fine of up to five-10 million and a ban of license. – Censorship orders issued and now not properly enforced are punishable by a sizable pleasant below Article 30.
Eavesdropping or intercepting browsing activities of customers speculated to be non-public is also punishable by a satisfactory of fifty 000 to 250,000 thousand EGP and a year in prison under provisions of article 16.
Censoring or redirecting users from certain websites is also illegal without an order or directive by using a duly authorized authority. Censorship orders are issued through the court or the NTRA.
Service vendors also ought to get user approval earlier than their statistics for advertising and marketing. Still, the law does not outline the phrases for the purchaser or person to offer consent or revoke it.
Companies offering services to others, such as website hosts, are vulnerable to punishment if they no longer document any crimes committed.

For Telecom Companies

New policies define storing and sharing purchaser facts. They have to preserve information on customers& site visitors’ data for up to a hundred and eighty days and offer it when required. Penalties concerning this problem stipulated in article 33 are between 5 million and 10 million, with a chance of revoking the license to work in Egypt. Furthermore, the information has to be secured from potential loss or hacking, as such measures could make it susceptible.
Telecom corporations are also liable for offering the era needed that allows the authorities to investigate.

For Digital Security Experts

Accessing a website, private account of a facts device for an extended time longer than authorized by the security clearance is difficult to punish, no matter their purpose. There is a separate sentence for perpetrators relying on their intentions, whether or not they meant to make malicious movements or not; however, both are punishable, regardless. Therefore, this article is extraordinary for government entities.
For credit score information, distinctive punishments are described. For example, individuals who get admission to credit records get a lower sentence than people who use credit cards to make purchases or gain from them. However, there’s no language inside the article to define acts of coming across a vulnerability in the machine without causing harm to the party to whom the data belongs.
Lighter penalties are described for hacking into emails or personal money owed; however, the reason is not crucial. Harsher consequences are set for hacking into people of legal occupations. – Changing the design of an internet site in any way is also an offense, punishable per article 19.

For Web, Account, Email, or Information System Administrators

All content published in social media or on the net with the aid of the account held by this character is under their responsibility. If the content material is illegal or towards societal values, the administrator is held responsible.
An internet site, personal account, or records gadget involved or facilitating a criminal offense penalizes the directors or owners of the website. – Erasing proof of a crime is likewise punishable. Comments, emails, or every other digital evidence might not be erased or concealed in case of involvement in a crime.

Clyde Osborne

Clyde Osborne

My passion is writing, blogging and speaking about issues related to children, women, social development, religion, politics and economics. I have written articles for magazines, newspapers and news websites. I have spoken at many conferences and events and published several books. I have worked as an editor and publisher of an international magazine and two online newspapers. In addition to my professional work, I am also very active in my community and I do volunteer work.

Related Posts

Cyber Law: How To Protect Your Business
Cyber law

Cyber Law: How To Protect Your Business

September 15, 2025
Legal Issues In Cyber Security 
Cyber law

Legal Issues In Cyber Security 

September 8, 2025
Cyber Peace Foundation, DSCI
Cyber law

Cyber Peace Foundation, DSCI

August 14, 2025
Next Post
Why Did the Gujarat Police Detain and Torture Me?

Why Did the Gujarat Police Detain and Torture Me?

Law student’s evidence tool to help town’s cyber police

Law student’s evidence tool to help town’s cyber police

Expert calls for Cyber Act to combat spread of extremism in Sri Lanka

Expert calls for Cyber Act to combat spread of extremism in Sri Lanka

  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • DMCA
  • Cookie Policy
  • Terms of Use
  • Privacy Policy
Maill us: admin@lawcer.com

© 2025 lawcer - All Rights Reserved lawcer.

No Result
View All Result
  • Home
  • Attorney
  • Law
    • Accident Law
    • Business Law
    • Child Law
    • Copyright Law
    • Criminal law
    • Family law
    • International Law
    • Real Estate Law
    • Traffic law
    • Women Law
  • Cyber law
  • Divorce
  • Legal Advice
  • Pages
    • About Us
    • Privacy Policy
    • Disclaimer
    • DMCA
    • Cookie Policy
    • Terms of Use
  • Contact Us

© 2025 lawcer - All Rights Reserved lawcer.