Act on Cybercrime/Online Intellectual Property Protection [108]
Age Verification [0]
Cooperation and International Efforts [52]
Criminal Code/Law Enforcement [33]
CSAM [0]
Cybersecurity and Critical Infrastructure Protection [73]
Data Protection and Privacy [58]
Fraud [0]
Illegal Gambling [8]
KCSIE [0]
Online Hate Speech and Illegal Content [90]
Pornography/Explicit Content [0]
Suicide [0]
Age Verification [0]
Cooperation and International Efforts [52]
Criminal Code/Law Enforcement [33]
CSAM [0]
Cybersecurity and Critical Infrastructure Protection [73]
Data Protection and Privacy [58]
Fraud [0]
Illegal Gambling [8]
KCSIE [0]
Online Hate Speech and Illegal Content [90]
Pornography/Explicit Content [0]
Suicide [0]
73 articles found.
This act establishes a framework for cybersecurity in the Czech Republic. It defines the roles and responsibilities of public authorities and private entities regarding the…
This act addresses the protection of critical infrastructure, defining what constitutes critical infrastructure and the measures required to safeguard it. It outlines the…
This act addresses the protection of critical infrastructure, defining what constitutes critical infrastructure and the measures required to safeguard it. It outlines the…
This law establishes a framework for cybersecurity, particularly for critical infrastructure sectors such as telecommunications, energy, finance, healthcare, and…
Zimbabwe engages with international bodies and frameworks to enhance its cybersecurity efforts, including partnerships with organizations such as the African…
The Anti-Cybercrime Law (Royal Decree No. M/17, 2007) plays a vital role in protecting critical infrastructure by addressing various types of cybercrimes that may threaten the…
As part of the move toward digital transformation, Saudi Arabia has adopted cloud computing solutions across industries, including critical infrastructure. In 2020, the…
This law addresses cybercrimes, including unauthorized access to data and systems. It complements the Cybersecurity Act by criminalizing actions that threaten the integrity of…
The Computer Misuse Act (CMA) complements the Cybersecurity Act by targeting cybercrimes and protecting all computer systems from unauthorized access, modification, or…
The Computer Misuse Act is the UK’s primary law for addressing cybercrime, covering activities like hacking, denial-of-service attacks, and unauthorized access to computer…
This act provides a legal framework to address various cybercrimes, such as hacking, data interference, identity theft, and cyberbullying. It establishes penalties for offenders…
The IT Act and the National Cyber Security Policy outline that CII includes systems and facilities whose incapacitation would have a debilitating impact on national security,…
The KRITIS Regulation is a central part of the IT Security Act that focuses on protecting critical infrastructure. It defines which sectors and companies qualify as critical…
This Act is to increase cyber security in order to build confidence and trust in the secure use of information and communication technologies by data controllers, their…
The Cybersecurity Act was enacted to enhance national security against cyber threats and to protect critical information infrastructure (CII) from…