United Nations Educational, Scientific and Cultural Organization
عربي
Home » Jordanian Conventions, Laws & Media Regulation » Jordan Information Systems Crime Law
Jordan Information Systems Crime Law

Article 1

This law shall be known as the “Information Systems Crime Law for the year 2010”.

Article 2

The following words and expressions shall, unless repugnant to the meaning thereof, have the meanings hereinafter respectively assigned to them:

Information System A set of programs and tools designed to create, send, receive, process, store, or manage data or information electronically
Data Numbers, letters, symbols, figures, sounds and images that have no significance on their own.
Information Data that has been processed and has significant meaning
Information Network A link between more than one information system to acquire and exchange the data and information.
Website A place where information on the Internet is available through a specific address
Permission The authorization granted by the person concerned or the competent judicial authority to one or more persons or the public to access or use information system, website or the information network in order to view, cancel, delete, add, change, re-disseminate data or information, block access, or stop the operation of the hardware, change a website or cancel or modify its contents
Programs A set of orders and technical instructions intended to accomplish a task that can be implemented using information systems

Article 3

  1. Accessing a website or information system, intentionally and in any manner without authorization or in violation or excess of an authorization, shall result in imprisonment for a term not less than one week and no more than three months, or by a fine of no less than JD100 and no more than JD200, or by both punishments.
  2. Where the access stipulated in paragraph (A) of this Article is for the purpose of cancelling, deleting, adding, destroying, disclosing, extinguishing, blocking, altering, changing, transferring or copying data or information or stopping or disabling the operation of an information system, changing a website or cancelling, destroying or altering its content or assuming its identity or the identity of its owner, the perpetrator shall be punished by imprisonment for a term not less than three months and not exceeding one year or by a fine of no less than JD200 and no more than JD1000, or by both punishments.

Article 4

Anyone who installs ,publishes or uses intentionally a program through an information network or information system, with the purpose of canceling, deleting, adding, destroying, disclosing, extinguishing, blocking, altering, changing, transferring, copying, capturing, or enabling others to view data or information, or obstructing, interfering, hindering, stopping the operation of an information system or preventing access to it, or altering a website or canceling it, destroying it, or altering its content or operating it, assuming its identity or the identity of the owner without authorization or in violation or excess of the authorization shall be punished by imprisonment for a term not less than three months and not exceeding one year or by a fine of no less than JD200 and no more than JD1000, or by both punishments.

Article 5

Anyone who intentionally and without a legitimate reason captures, interferes or intercepts what is transmitted through an information network or any information system shall be punished by imprisonment for a term not less than one month and not exceeding one year or by a fine of no less than JD200 and no more than JD1000, or by both punishments.

Article 6

  1. Anyone who intentionally and without a legitimate reason obtains through an information network or any information system data or information relating to credit cards or data or information that is used in the execution of electronic financial or banking transactions shall be punished by imprisonment for a term not less than three months and not exceeding two years or by a fine of no less than JD500 and no more than JD 2000, or by both punishments.
  2. Anyone who intentionally and without a legitimate reason uses through an information network or any information system data or information relating to credit cards or data or information that is used in execution of electronic financial or banking transactions to obtain to oneself or others the data, information, assets or services of others shall be punished by imprisonment for a term not less than one year and by a fine of no less than JD1000 and no more than JD 5000.

Article 7

The punishment shall be doubled for the crimes stipulated in Articles 3, 4, 5 and 6 of this Law in respect of whoever perpetrates any of those crimes while in service or work or by exploiting either one of them.

Article 8

Anyone who intentionally transmits or publishes data or information through an information system or any information network that involves abasement, denigration, or libel to anyone shall be punished by a fine of no less than JD100 and no more than JD2000.

Article 9

  1. Anyone who intentionally transmits or publishes through an information system or any information network anything heard, read or graphic containing pornographic materials involving or relating to anyone who has not attained eighteen years of age shall be punished by imprisonment for a term not less than three months or by a fine of no less than JD300 and no more than JD5000.
  2. Anyone who intentionally uses an information system or any information network to prepare, store, process, display, print, publish or promote pornographic activities or work for the purpose of inciting or exploiting those who have not attained eighteen years of age to commit a crime, deviate, work in prostitution and pornographic activities, or defaming or selling them shall be punished by imprisonment for a term not less than a months and a fine of no less than JD500 and no more than JD5000.

Article 10

Anyone who intentionally uses an information system or any information network to promote prostitution shall be punished by imprisonment for a term not less than six months and by a fine of no less than JD300 and no more than JD5000.

Article 11

Anyone who intentionally uses an information system or the information network to transmit or publish data or information or set up a website to facilitate terrorist activities or to contact, fund or promote the principles of a group, organization or association which conducts terrorist activities shall be punished by temporary penal servitude.

Article 12

  1. Anyone who intentionally and without authorization or in violation or excess of an authorization accesses a website or information system in any manner with the purpose of viewing data or information that is not available to the public and which touches upon national security, foreign relations of the Kingdom, general security or national economy, shall be punished by imprisonment for a term not less than four months and by a fine no less than JD500 and no more than JD5000.
  2. Where the access stipulated in paragraph (A) of this Article with the intention of deleting, extinguishing, destroying, altering, changing, transferring or copying data or information, the perpetrator shall be punished by temporary penal servitude and a fine of no less than JD1000 and no more than JD5000.

Article 13

  1. Subject to the terms and provisions stipulated in the relevant legislations, it is permissible for the officers of the judicial police to enter into any location which is suspected to be used to commit any of the crimes stipulated in this Law and it is permissible for the judicial police to inspect equipment, tools, programs, systems and any means which is suspected to be used to commit any of the said crimes, except for houses which need the permission of the competent public prosecutor. In all cases, the officer who conducts the inspection shall prepare a report and submit it to the competent public prosecutor.
  2. Subject to the rights of others acting in good faith, and with the exception of licensees pursuant to the Telecommunications Law who did not participate in any crime stipulated in this Law, it is permissible for the officers of the judicial police to seize equipment, tools, programs, systems and any means used to commit any of the crimes stipulated herein or included in this Law, and any money generated from it and hold the information and data relating to the committal of any crime stipulated herein or included in this Law.
  3. It is permissible for the competent court to confiscate equipment, tools, programs, and means or stop or disable the operation of any information system or website that is used to commit any of the crimes stipulated herein or included in this Law and any money generated from such crimes and order that the violation is removed at the expense of the perpetrator of the crime.

Article 14

Anyone who intentionally participates in, interferes or incites the committal of any of the crimes stipulated in this law shall be punished in the same manner specified for its perpetrators.

Article 15

Anyone who commits a crime that is punishable pursuant to any other applicable legislation by using the information network or any information system or participating in, interfering with inciting its committal shall be punished in the same manner stipulated in that legislation.

Article 16

  1. Applying the provisions of this Law shall be without prejudice to any more severe punishment stipulated in any other law.
  2. The punishment stipulated in this Law shall be doubled in the event that any of the stipulated crimes are repeated.

Article 17

It is permissible to bring a public or private right proceedings against the defendant before the Jordanian judiciary if any of the crimes stipulated in this Law were committed by using information systems within the Kingdom or has caused damage to any of its interests, or any of its residents or the consequences of such crime were realized in it, whether partially or fully or if it was committed by any of its residents.

Article 18

The Prime Minister and the Ministers shall be responsible for the implementation of the provisions of this Law.

© 2017 Developed by Blue Ray for Web Solutions. All rights reserved