Article 1
This law shall be known as the “Information Systems Crime Law for the year 2010”.
Article 2
The following words and expressions shall, unless repugnant to the meaning thereof, have the meanings hereinafter respectively assigned to them:
Information System | A set of programs and tools designed to create, send, receive, process, store, or manage data or information electronically |
Data | Numbers, letters, symbols, figures, sounds and images that have no significance on their own. |
Information | Data that has been processed and has significant meaning |
Information Network | A link between more than one information system to acquire and exchange the data and information. |
Website | A place where information on the Internet is available through a specific address |
Permission | The authorization granted by the person concerned or the competent judicial authority to one or more persons or the public to access or use information system, website or the information network in order to view, cancel, delete, add, change, re-disseminate data or information, block access, or stop the operation of the hardware, change a website or cancel or modify its contents |
Programs | A set of orders and technical instructions intended to accomplish a task that can be implemented using information systems |
Article 3
Article 4
Anyone who installs ,publishes or uses intentionally a program through an information network or information system, with the purpose of canceling, deleting, adding, destroying, disclosing, extinguishing, blocking, altering, changing, transferring, copying, capturing, or enabling others to view data or information, or obstructing, interfering, hindering, stopping the operation of an information system or preventing access to it, or altering a website or canceling it, destroying it, or altering its content or operating it, assuming its identity or the identity of the owner without authorization or in violation or excess of the authorization shall be punished by imprisonment for a term not less than three months and not exceeding one year or by a fine of no less than JD200 and no more than JD1000, or by both punishments.
Article 5
Anyone who intentionally and without a legitimate reason captures, interferes or intercepts what is transmitted through an information network or any information system shall be punished by imprisonment for a term not less than one month and not exceeding one year or by a fine of no less than JD200 and no more than JD1000, or by both punishments.
Article 6
Article 7
The punishment shall be doubled for the crimes stipulated in Articles 3, 4, 5 and 6 of this Law in respect of whoever perpetrates any of those crimes while in service or work or by exploiting either one of them.
Article 8
Anyone who intentionally transmits or publishes data or information through an information system or any information network that involves abasement, denigration, or libel to anyone shall be punished by a fine of no less than JD100 and no more than JD2000.
Article 9
Article 10
Anyone who intentionally uses an information system or any information network to promote prostitution shall be punished by imprisonment for a term not less than six months and by a fine of no less than JD300 and no more than JD5000.
Article 11
Anyone who intentionally uses an information system or the information network to transmit or publish data or information or set up a website to facilitate terrorist activities or to contact, fund or promote the principles of a group, organization or association which conducts terrorist activities shall be punished by temporary penal servitude.
Article 12
Article 13
Article 14
Anyone who intentionally participates in, interferes or incites the committal of any of the crimes stipulated in this law shall be punished in the same manner specified for its perpetrators.
Article 15
Anyone who commits a crime that is punishable pursuant to any other applicable legislation by using the information network or any information system or participating in, interfering with inciting its committal shall be punished in the same manner stipulated in that legislation.
Article 16
Article 17
It is permissible to bring a public or private right proceedings against the defendant before the Jordanian judiciary if any of the crimes stipulated in this Law were committed by using information systems within the Kingdom or has caused damage to any of its interests, or any of its residents or the consequences of such crime were realized in it, whether partially or fully or if it was committed by any of its residents.
Article 18
The Prime Minister and the Ministers shall be responsible for the implementation of the provisions of this Law.
Attachment | Size |
---|---|
![]() | 136.97 KB |
![]() | 66.41 KB |