

- #CYBER TERMINATORS CRITICAL OPS HACK REGISTRATION#
- #CYBER TERMINATORS CRITICAL OPS HACK SOFTWARE#
- #CYBER TERMINATORS CRITICAL OPS HACK CODE#
Under Section 18(2), knowingly receiving or being in possession of a program or computer password, device, access code or similar data, designed or adapted primarily for committing an offence or assisting in the commission of an offence, constitutes an offence and, upon conviction, is liable to a fine of not more than KES 10 million.
#CYBER TERMINATORS CRITICAL OPS HACK SOFTWARE#
Possession or use of hardware, software or other tools used to commit cybercrime Under Section 18(1), manufacturing, selling, adapting, importing, distribution or any other way of making available a device, password, access code or similar data, designed or adapted primarily for committing an offence under the Act, is an offence and, upon conviction, results in a fine not exceeding KES 20 million, imprisonment for a maximum term of 10 years, or both.

Where the act leads to a person’s significant loss, threatens security, causes physical injury or the death of a person, or threatens public health or safety, the penalty upon conviction is a fine of not more than KES 20 million, imprisonment for up to 10 years, or both.ĭistribution, sale or offering for sale of hardware, software or other tools used to commit cybercrime The penalty is a fine of not more than KES 10 million, imprisonment for not more than five years, or both.

The offence entails causing interference to a computer system, program or data intentionally and without authorisation, and it is immaterial whether the act is directed at a specific computer system program or data, a program or data of any kind, or a program or data held in any particular computer system. While the Act does not specifically define the offence of unauthorised interference to include the infection of IT systems with malware, the definition of the offence is broad enough to cover such infection of IT systems.

Infection of IT systems with malware (including ransomware, spyware, worms, trojans and viruses) Phishing is identified as an offence under Section 30 of the Computer Misuse and Cybercrimes Act and conviction results a penalty of KES 300,000 in fines, imprisonment for a maximum term of three years, or both. The penalty is a fine not exceeding KES 25 million, imprisonment of up to 20 years, or both.
#CYBER TERMINATORS CRITICAL OPS HACK REGISTRATION#
A protected computer system is defined as a system used in connection with: security and defence or international relations of Kenya the provision of services directly related to communications infrastructure, banking and financial services, payment and settlement systems and instruments, and public utilities or transportation, including government services that are delivered electronically and essential emergency services such as the police, civil defence and medical services, national registration systems and other related or similar services. Section 20 provides for enhanced penalties for offences of unauthorised access, access with intent to commit further offences, unauthorised interference and unauthorised interception involving protected computer systems. Unauthorised access with the intent to commit or facilitate commission of a further offence is an offence and, upon conviction, results in a fine not exceeding KES 10 million, imprisonment for a term not exceeding 10 years, or both. The penalty for unauthorised access upon conviction is a fine not exceeding KES 5 million, imprisonment for a term not exceeding three years, or both. Unauthorised access constitutes a crime under Section 14 of the Computer Misuse and Cybercrimes Act, 2018. 1.1 Would any of the following activities constitute a criminal or administrative offence in your jurisdiction? If so, please provide details of the offence, the maximum penalties available, and any examples of prosecutions in your jurisdiction:
