Collections
Related documents
Tanzania
Cybercrimes Act, 2015
Act 14 of 2015
- Published in Tanzania Government Gazette 22 on 22 May 2015
- Assented to on 25 April 2015
- Commenced on 1 September 2015
- Note: 2023 R.E. cites GN.528 for commencement date.
- [This is the version of this document as it was from 22 May 2015 to 10 October 2024.]
Part I – Preliminary provisions
1. Short title and commencement
This Act may be cited as the Cybercrimes Act, 2015 and shall come into operation on such date as the Minister may, by Notice published in the Gazette, appoint.2. Application
Save for section 50, this Act shall apply to Mainland Tanzania as well as Tanzania Zanzibar.3. Interpretation
In this Act, unless the context otherwise requires—“access” in relation to any computer system, means entry to, instruct, communicate with, store data in, retrieve data from, or otherwise make use of any of the resources of the computer system or network or data storage medium;“access provider” means a person who provides electronic data transmission service by transmitting information provided by or to a user of the service in a communication network or providing access to a communication network;“caching provider” means a person who provides an electronic data transmission service by automatic, intermediate or temporary storing information, for the purpose of making more efficient the information's onward transmission to other users of the service upon their request;“child” means a person below the age of eighteen years;“child pornography” means pornographic material that depicts presents or represents:(a)a child engaged in a sexually explicit conduct;(b)a person appearing to be a child engaged in a sexually explicit conduct; or(c)an image representing a child engaged in a sexually explicit conduct;“computer system” means a device or combination of devices, including network, input and output devices capable of being used in conjunction with external files which contain computer programmes, electronic instructions, input data and output data that perform logic, arithmetic data storage and retrieval communication control and other functions;“computer data” means any representation of facts, concepts, information or instructions, in a form suitable for processing in a computer system, including a program suitable to cause a computer system to perform a function;"data storage medium" means any device, article or material from which computer data or information is capable of being stored or reproduced, with or without the aid of any other device or material;“device” includes—(a)a computer program, code, software or application;(b)component of computer system such as graphic card, memory card, chip or processor;(c)computer storage component;(d)input and output devices;“electronic communication” means any transfer of a sign, signal or computer data of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photo electronic, photo optical system or in any other similar form;“forensic tool” means an investigative tool or device including software or hardware installed on or in relation to a computer system or part of a computer system and used to perform tasks which includes keystroke logging or collection of investigation information about a use of a computer or computer system;“hinder” in relation to a computer system includes—(a)causing electromagnetic interference to a computer system;(b)corrupting a computer system by any means; or(c)inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data;“hosting provider” means a person who provides an electronic data transmission service by storing information provided by a user of the service;“hyperlink” means a symbol, word, phrase, sentence or image that contains path to another source that points to and causes to display another document when executed;"intellectual property rights" means the rights accrued or related to copyright, patent, trade mark and any other related matters;“interception” in relation to a function of computer, includes acquiring, viewing, listening or recording any computer data communication through any other means of electronic or other means, during transmission through the use of any technical device;“law enforcement officer” means a police officer of the rank of Assistant Inspector or above or an investigator of equivalent rank of inspector and above, member of Tanzania Intelligence Service, prosecutor, or any authorized officer of the authority responsible for regulation of communication or any other person authorised in any written law;“Minister” means the Minister for the time being responsible for Information and Communication Technology;“publish” means distributing, transmitting, disseminating, circulating, delivering, exhibit, exchanging, barter, printing, copying, selling or offering for sale, letting on hire or offering to let on hire, offering in any other way, or making available in any way;"property" means property of any kind, whether movable or immovable, tangible or intangible, and includes—(a)any currency either as a legal tender in the United Republic of Tanzania or not;(b)information, including an electronically produced program or data or copy thereof, human or computer-readable data; or(c)any right or interest in property;“racist and xenophobic material” means any material which advocates, promotes or incites hatred, discrimination or violence, against any person or group of persons based on race, colour, descent, national or ethnic origin or religion;“service provider” means a person or party that makes information system services available to third parties;Part II – Provisions relating to offences and penalties
4. Illegal access
5. Illegal remaining
6. Illegal interception
7. Illegal data interference
8. Data espionage
9. Illegal system interference
A person who intentionally and unlawfully hinders or interferes with—10. Illegal device
11. Computer-related forgery
12. Computer-related fraud
13. Child pornography
14. Pornography
15. Identity related crimes
16. Publication of false information
Any person who publishes information or data presented in a picture, text, symbol or any other form in a computer system knowing that such information or data is false, deceptive, misleading or inaccurate, and with intent to defame, threaten, abuse, insult, or otherwise deceive or mislead the public or councelling commission of an offence, commits an offence, and shall on conviction be liable to a fine of not less than five million shillings or to imprisonment for a term of not less than three years or to both.17. Racist and xenophobic material
18. Racist and xenophobic motivated insult
19. Genocide and crimes against humanity
20. Unsolicited messages
21. Disclosure of details of investigation
22. Obstruction of investigation
23. Cyber bullying
24. Violation of intellectual property rights
25. Principal offenders
26. Attempt
27. Conspiracy to commi offence
Any person who conspires with another person to commit an offence under this Act, commits an offence, and is liable on conviction to a fine of not less than one million shillings or to imprisonment for a term of not less than one year or to both.28. Protection of critical information infrastructure
29. Offences relating to critical information infrastructure
Where a person commits an offence under this Act or any written law in relation to critical information infrastructure, that person shall be liable, on conviction to a fine not less than one hundred million shillings or three times the loss occasioned or to imprisonment for a term not less than five years or to both.Part III – Jurisdiction
30. Jurisdiction
Part IV – Search and seizure
31. Search and seizure
32. Disclosure of data
33. Expedited preservation
34. Disclosure and collection of traffic data
35. Disclosure and collection of content data
Where there is a reasonable ground to suspect or believe that the content of an electronic communication is required for the purposes of investigation, a police officer incharge of a police station or a law enforcement officer of a similar rank may issue an order—36. Court order
Where the disclosure or preservation of data, under sections 31, 32, 33, 34 and 35, as the case may be, can not be done without the use of force or due to resistance from the part holding data or evidential value of data can be preserved through the order of the court, a law enforcement officer may apply to court for an order for the disclosure or preservation.37. Use of forensic tool
38. Hearing of application
The proceedings for hearing of an application under this part shall be exparte and in camera.Part V – Liability of service providers
39. Monitoring obligation
40. Access provider
41. Hosting provider
42. Caching provider
A caching provider shall not be liable for the storage of information provided that the caching provider:43. Hyperlink provider
A hyperlink provider is not liable for the information linked provided that the hyperlink provider:44. Search engine provider
45. Take-down notification
46. Other obligations not affected
This Part shall not affect obligation of a service provider that—Part VI – General provisions
47. Immunity
48. Forfeiture of property
49. Offence by body corporate
If a corporate body is convicted of an offence under this Act, every person who, at the time of commission of the offence was—50. Compounding of offences
51. Power to make regulations
The Minister may make regulations with respect to any matter which, by this Act, is required to be prescribed or which is necessary for giving effect to this Act.Part VII – Consequential amendments
(a) – Amendment of the Electronic and Postal Communications Act, 2010
52. Construction
This Part shall be read as one with the Electronic and Postal Communications Act, hereinafter referred to as the “principal Act”.[No. 3 of 2010]53. Amendment of section 124
The principal Act is amended in section 124, by—(b) – Amendment of the Penal Code, Cap.16
54. Construction
This Part shall be read as one with the Penal Code, hereinafter referred to as the “principal Act”.[cap. 16]55. Amendment of section 109
The principal Act is amended in section 109, by:(c) – Amendment of the Anti-Money Laundering Act, Cap.423
56. Construction
This Part shall be read as one with the AntiMoney Laundering Act, hereinafter referred to as the principal Act.[cap.423]57. Amendment of section 3
The principal Act is amended in section 3, by—(d) – Amendment of the Extradition Act, Cap.368
58. Construction
This Part may be cited as the Extradition Act, and shall be read as one with the Extradition Act, hereinafter referred to as the principal Act.[cap.368]59. Amendment of the schedule
The principal Act is amended in the Schedule by adding immediately after the heading “slave dealings” the following:History of this document
11 October 2024 amendment not yet applied
01 September 2015
Commenced
Note: 2023 R.E. cites GN.528 for commencement date.
22 May 2015 this version
25 April 2015
Assented to
Cited documents 4
Ordinance
1Documents citing this one 24
Judgment
19|
Applicants’ challenge to Cybercrimes Act sections 16 and 39(2) for violating privacy and expression is dismissed.
* Constitutional law – Cybercrimes Act – Sections 16 and 39(2)(a)&(b) – Alleged infringement of right to privacy (Art.16) and freedom of expression (Art.18).
* Statutory interpretation – constitutionality assessed from text, not speculative abuse; presumption of constitutionality.
* Administrative powers – Minister’s power to prescribe procedures for service providers; existence of regulations (GN No.224/2016) and judicial review as safeguards.
* Res judicata – earlier challenges to other provisions did not bar fresh challenge to different provisions.
|
|
High Court cannot revise interlocutory ex parte subordinate-court orders; application challenging phone-access order struck out as incompetent.
* Criminal procedure – Revision – Whether High Court may revise interlocutory/ex parte orders of subordinate courts – interaction of s.372(1) and s.372(2) CPA and s.43(2) MCA.
* Civil procedure – Competence of applications – omnibus applications and related-prayers exception.
* Cybercrime – interim investigative orders (access to phones/social media) challenged by revision.
|
|
High Court declines premature revision of pending trial court proceedings; orders record returned for expeditious ruling on charge validity.
Criminal procedure – Revision under s.372(1) CPA – Intervention in pending subordinate proceedings; Criminal procedure – s.131A CPA – Filing charges before completion of investigation; Judicial restraint – Superior court should not usurp pending determinations of trial court; Remedy – remit record for expeditious determination of reserved ruling.
|
|
Applicant has a constitutional right to access Clubhouse, but no evidence showed state restriction; petition dismissed.
Digital rights – access to social media – Clubhouse – constitutional right to seek, receive and impart information online; limitation of rights – three‑part test (prescribed by law, legitimate aim, necessary and proportionate); burden of proof in constitutional claims; admissibility/credibility of third‑party network reports (OONI); regulatory powers of TCRA to block or restrict under law.
|
|
Electronic exhibit improperly admitted and expunged; remaining evidence proved defamation but 6% monthly interest on damages quashed.
* Civil procedure – production of additional documents under Order XIII, Rule 1 – filing after Plaint and admissibility by consent.
* Evidence – electronic evidence – Section 64A Evidence Act and Section 18(2) Electronic Transactions Act – reliability, integrity and origin requirements; failure to read/display contents; expungement.
* Defamation – publication, meaning of words, proof on balance of probabilities, and effect on reputation.
* Defence of qualified privilege – limits where statements made in public rallies and proper land dispute forums required.
* Damages – assessment of general damages upheld; improper award of interest quashed.
|
|
Application dismissed due to defective affidavit, a non-bailable money laundering count, and applicants' failure to file submissions.
Criminal procedure – affidavit objections – legal argument and undisclosed sources in affidavit; Non-bailable offences – money laundering under s.148(5)(a)(iv) C.P.A. (as amended) bars grant of bail; Prematurity – bail application at committal stage; Procedure – failure to file written submissions amounts to want of prosecution leading to dismissal.
|
|
Conviction for alleged online copyright piracy quashed for lack of reliable link and defective electronic evidence.
Cybercrime / Intellectual property – allegation of website-based piracy; Electronic evidence – admissibility and weight under s.64A Evidence Act and s.18 Electronic Transactions Act (reliability, integrity, origin); chain of custody and identification of seized devices (serial numbers, certificates of seizure); defective affidavit and admissibility of investigator’s report; proof beyond reasonable doubt.
|
|
Court allowed late filing of submissions due to incomplete trial records and ordered the appeal to proceed on merits.
Civil procedure — Written submissions — Failure to file as equivalent to non-appearance — Leave to file out of time — Sufficient reasons required where typed trial proceedings incomplete — Discretion to allow late filings and proceed on merits.
|
|
Message to one person is not ‘publication’ under Cyber Crimes Act; prosecution failed to prove falsity and intent, appeal dismissed.
Criminal law – Cyber Crimes Act s.16 – publication requires communication to the public; sending message to one person is not publication; evidential weight vs admissibility of exhibits; false report to public officer – burden to prove falsity and resultant misuse of power; police investigative duty and improper treatment of complainant as suspect.
|
|
High Court may examine subordinate interlocutory proceedings; unjustified adjournments of bail matters must be expeditiously remedied.
Criminal procedure — Revision under section 372(1) CPA — High Court power to call for and examine subordinate court records even where interlocutory matters remain undecided; Bail — adjournments and right to liberty — bail objections engage urgent consideration and should normally be heard at first arraignment; Registry practice — separate miscellaneous bail objections may cause delay but do not necessarily vitiate proceedings; Judicial conduct — competence and ethics issues not remedied via section 372(1) revision.
|
JOT Documents and Guidelines
2Law Reform Report
1Subsidiary legislation
|
Title
|
|
|---|---|
| Government Notice 86 of 2017 | |
| Government Notice 224 of 2016 |