Cybersecurity impacts many actors within the public domain, including policymakers, the private sector, law enforcement, academia, and civil society; therefore, a multi-stakeholder approach was used in the development of this…
SHOWING THE SUBSTANTIVE LAWS AS AT 31ST DECEMBER, 2020 This is a revised edition of the Substantive Laws, prepared by the Law Revision Commissioner under the authority of the Law…
REVISED EDITION 2020 SHOWING THE SUBSTANTIVE LAWS AS AT 31ST DECEMBER, 2020 This is a revised edition of the Substantive Laws, prepared by the Law Revision Commissioner under the authority…
PART IPreliminary 1. Short title.2. Interpretation. PART IICybercrime Offences 3. Illegal access to a computer system.4. Illegal access to computer data.5. Illegal data interference.6. Illegal system interference.7. Illegal devices and…
ORDER made by the Public Utilities Commission (hereinafter referred to as “the Commission”) in the exercise of the powers conferred upon it by Sections 3, 6, and 12 of the…
ORDER made by the Public Utilities Commission (hereinafter referred to as “the Commission”) in exercise of the powers conferred upon it by Sections 3, 6, 7, 21, 22, 23 and…
REVISED EDITION 2003 SHOWING THE SUBSIDIARY LAWS AS AT 31ST OCTOBER, 2003 This is a revised edition of the Subsidiary Laws, prepared by the Law Revision Commissioner under the authority…