Zambia
Cyber Security Act, 2025
Act 3 of 2025
- Published in Supplement to the Government Gazette on 15 April 2025
- Assented to on 8 April 2025
- Not commenced
- [This is the version of this document from 15 April 2025.]
Part I – Preliminary provisions
1. Short title and commencement
This Act may be cited as the Cyber Security Act, 2025, and shall come into operation on the date appointed by the President by statutory instrument.2. Interpretation
In this Act, unless the context otherwise requires—“access” has the meaning assigned to the word in the Electronic Communications and Transactions Act, 2021;[Act No. 4 of 2021]“Agency” means the Zambia Cyber Security Agency established under section 3;“article” means a computer, computer data, computer program, computer data storage medium or computer system which—(a)on reasonable grounds, is believed to be concerned with, or connected with the commission of a crime or suspected commission of a crime;(b)may afford evidence of the commission, or suspected commission of a crime; or(c)is intended to be used or is, on reasonable grounds, believed to be intended to be used in the commission of a crime;“Authority” means the Zambia Information and Communications Technology Authority established under the Information and Communication Technologies Act, 2009;[Act No. 15 of 2009]“bank” has the meaning assigned to the word in the Banking and Financial Services Act, 2017;[Act No. 7 of 2017]“call-related information” means data or details that are associated with a telephone call or communication session and includes—(a)switching, dialling or signalling information that identifies the origin, destination, termination, duration and equipment of each communication generated or received by a customer or user of any equipment;(b)a facility or service provided by a service provider; or(c)where applicable, the location of the user within the telecommunications system;“Centre” means the Central Monitoring and Co-ordination Centre continued under section 21;“certificate of registration” means a certificate of registration issued under section 24;“communication” has the meaning assigned to the word in the Electronic Communications and Transactions Act, 2021;[Act No. 4 of 2021]“communications data” means information relating to the usage of an electronic communications service;“computer” has the meaning assigned to the word in the Electronic Communications and Transactions Act, 2021;[Act No. 4 of 2021]“computer data” means a representation of facts, concepts or information in a form suitable for processing in a computer or computer system, including a program suitable to cause a computer or computer system to perform a function;“computer data storage medium” means a device or medium used for storing and retrieving digital data or information from a computer;“computer system” means a set of integrated devices that input, output, process and store data and information including the internet;“controller” means a person who controls or is responsible for critical information or critical information infrastructure that is registered under this Act;“critical information” means computer data that relates to public safety, public health, economic stability, national security, international stability and the sustainability and restoration of critical cyberspace including—(a)personal data that is managed, stored or transmitted through critical information infrastructure or processed by a controller;(b)information relating to any research and development in relation to critical information infrastructure;(c)information needed to operate critical information infrastructure; or(d)information relating to risk management and business continuity in relation to critical information infrastructure;“critical information infrastructure” means a computer system, device, network, computer program or computer data that—(a)is vital to a country such that the incapacity or destruction of, or interference with, the computer system, device, network, computer program or computer data would have a debilitating impact on national security, economy, public health or safety; or(b)supports the processing of critical information or an essential service;“cyber attack” means malicious activities targeting the confidentiality, integrity or availability of computer systems, computer data or services rendered by computer systems;“cyber audit” means a third party audit of an organisation’s cyber security practices, involving the assessment of that organsation’s information security management system, penetration testing and vulnerability assessments for purposes of identifying and mitigating cyber security risks;“Cyber resilience” means the ability to prepare for, respond to and recover from cyber attacks, ensuring that essential functions continue despite adverse conditions;“cyber security” means tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurances and technologies used to protect the cyber environment, organisation and user assets;“cyber security incident” means an unauthorised activity or event which may result in jeopardising or adversely impacting the confidentiality, availability or integrity of information, a computer, a computer system or a network;“Cyber Security Risk Register” means the Cyber Security Risk Register kept and maintained under section 20;“cyber security service” means a service listed under section 41;“cyber security threat” means a potential danger or risk to a computer, computer system, network, or data that may imminently jeopardise or affect adversely, without lawful authority, the cyber security of that computer, computer system or network or another computer, computer system or network;“cyber security risk assessment” means the process of identifying, analysing, and evaluating potential threats and vulnerabilities in an information system, network or asset;“cyber security service provider” means a person licensed under section 45 to provide a cyber security service;“device” means a unit of physical or virtual hardware or equipment that provides one or more computing functions and includes a computer program, application, a component of a computer system, a computer storage component, an input or output device, or an apparatus which can be used to intercept a wire or electronic communication;“digital forensics” means the practice of collecting, analysing, and preserving electronic data in a manner that maintains electronic data’s integrity and reliability, and is admissible as evidence in a court of law;“Director-General” means the person appointed as Director-General under section 5;“electronic communication” has the meaning assigned to the words in the Electronic Communications and Transactions Act, 2021;[Act No. 4 of 2021]“electronic communications service” has the meaning assigned to the words in the Information and Communication Technologies Act, 2009;[Act No. 15 of 2009]“electronic communications system” has the meaning assigned to the words in the Electronic Communications and Transactions Act, 2021;[Act No. 4 of 2021]“electronic communications service provider” means a person licensed to provide an electronic communications service under the Information and Communication Technologies Act, 2009;[Act No. 15 of 2009]“essential service” means a service that is fundamental to the operation of society, ensuring public safety, health, economic stability, national security, international order and the maintenance and recovery of critical cyber space infrastructure;“financial institution” has the meaning assigned to the words in the Banking and Financial Services Act, 2017;[Act No. 7 of 2021]“fit and proper person” means a person who is of good character, honest, possesses financial integrity, probity, personal integrity, is of good repute, competent, capable and dependable;“geolocation” means the process or technique of identifying the geographical location of a person or device by means of digital information processed through the internet;“hosting” has the meaning assigned to the word in the Electronic Communications and Transactions Act, 2021;[Act No. 4 of 2021]“information security audit” means a comprehensive evaluation of information security practices including physical, administrative and technical controls that ensures overall data privacy protection, cyber security, cyber resilience and regulatory compliance;“inspector” means a person appointed as a cyber security inspector under section 55;“interception” means an act by a person who is not party to an electronic communication of listening to, monitoring, viewing, reading or recording a private communication in transit, without the knowledge of the person making and receiving the communication, whether such communication is done in real time or otherwise between—(a)persons;(b)a person and a device; or(c)devices;“internet connection record” means a record which contains information about internet connections made by a particular device and includes—(a)connections which are made automatically by a person, browser or device;(b)a customer account reference such as an account number or identifier of the customer’s device or internet connection;(c)a time stamp of a session log;(d)source and destination internet protocol addresses and the associated identity information;(e)the volume of data transferred in either or both directions;(f)the name of the internet service or the server that the service is connected to;(g)elements of a universal resource locator which constitutes communications data; or(h)any other related meta data;“information infrastructure” means communication networks and their associated software that support interaction among people and organisations;“information system” has the meaning assigned to the words in the Electronic Communications and Transactions Act, 2021;[Act No. 4 of 2021]“information technology auditor” means a person who possesses the expertise to examine and evaluate an information security management system as it relates to information technology infrastructure;“judge” means a judge of the High Court;“law enforcement officer” means—(a)a police officer;(b)an officer of the Anti Corruption Commission;(c)an officer of the Drug Enforcement Commission;(d)an officer of the Zambia Security Intelligence Service;(e)an officer of the National Anti-Terrorism Centre; and(f)any other person that the President may, by statutory instrument, designate for purposes of this Act;“legally disqualified” means the absence of legal capacity as provided under section 4 of the Mental Health Act, 2019;[Act No. 6 of 2019]“licence” means a licence issued under section 45;“licensee” means a person licensed under this Act;“monitor” means to observe and analyse digital activities including network traffic, system logs, or user behaviour, with the goal of detecting and preventing cyber security threats or cyber security incidences;“orally” means communication or transmission of information through spoken words whether delivered in person, via real time conversation through recorded media or text based formats that capture the essence of communication;“penetration testing” means assessing, testing or evaluating the cyber security of a computer or computer system and the integrity of any information stored in or processed by the computer or computer system, by searching for vulnerabilities in, and compromising, the cyber security defences of the computer or computer system with express permission of the system owner;“personal data” has the meaning assigned to the words in the Data Protection Act, 2021;[Act No. 3 of 2021]“private communication” means an electronic communication which is reasonable for the sender or the intended recipient to expect that the communication shall not be intercepted;“repealed Act” means the Cyber Security and Cyber Crimes Act, 2021 repealed under section 74;[Act No. 2 of 2021]“service provider” means an entity authorised to—(a)provide or offer an electronic communications system;(b)process or store computer data on behalf of an electronic communications service provider or user of such service; or(c)own an electronic communications system to provide or offer an electronic communications service;“Staff Board” means the Staff Board Constituted in the Schedule;“Zambia Cyber Incident Response Team” means the Zambia Cyber Incidence Response Team constituted under section 6; and“Zambia Security Intelligence Service” means the Zambia Security Intelligence Service continued under the Zambia Security Intelligence Service Act, 1998.[Act No. 14 of 1998]Part II – The Zambia Cyber Security Agency
3. Establishment of Zambia Cyber Security Agency
4. Functions of Agency
The functions of the Agency are to—5. Director-general and other staff
Part III – Cyber Incident Response Teams
6. Zambia Cyber Incident Response Team
7. Constitution of sectoral Cyber Incident Response Teams
Part IV – Protection of critical information and critical information infrastructure
8. Critical sector
For the purposes of this Part, a critical sector includes—9. Designation of critical information or critical information infrastructure
10. Categories of critical information and critical information infrastructure
11. Registration of critical information and critical information infrastructure
12. Hosting of critical information and critical information infrastructure
13. Change in ownership of critical information or critical information infrastructure
14. Auditing of critical information or critical information infrastructure
15. Non-compliance to cyber audit requirements
16. Report on cyber security situational awareness
A controller shall submit to the Agency, a report on cyber security situational awareness in a manner determined by the Agency.17. Duty to report cyber security incidents in respect of critical information and critical information infrastructure
18. Power to investigate cyber security incident and cyber security threat
19. Cyber security exercise
20. Cyber Security Risk Register
The Agency shall keep and maintain an electronic Cyber Security Risk Register which shall contain the following information:Part V – Interception of communications
21. Central monitoring and co-ordination centre
22. Prohibition of interception of communication
23. Prohibition of use, manufacture or possession of interception device
24. Registration of interception device
25. Variation of certificate of registration
A holder of a certificate of registration may, at any time during the validity of the certificate of registration, apply to the Centre for a variation of the certificate of registration, in a prescribed manner and form, on payment of a prescribed fee.26. Surrender of certificate of registration
27. Transfer of certificate of registration
A certificate of registration issued under this Part shall not be transferred to a third party.28. Cancellation or suspension of certificate of registration
29. Lawful interception
30. Interception of communication to prevent bodily harm, loss of life or damage to property
31. Prohibition of use, acquisition, etc of geolocation and interception information
32. Interception of communication for purposes of determining location
33. Technical assistance for purposes of determining location or illegal use of spectrum
34. Prohibition of access and use of intercepted communication
35. Disclosure of intercepted communication by law enforcement officer
36. Privileged communication to retain privileged character
A privileged communication intercepted in accordance with the provisions of this Act shall not lose its privileged character.37. Prohibition of random monitoring
38. Interception of satellite transmission
39. Assistance by electronic communications service provider
40. Interception capability of electronic communications service provider
Part VI – Licensing of cyber security service providers
41. Cyber security services
For the purposes of this Act, the following are cyber security services:42. Prohibition of providing cyber security service without licence
43. Categories of licences
There shall be categories of licences as may be prescribed for purposes of providing cyber security services specified under section 41.44. Application for licence
45. Grant of licence
46. Rejection of application
47. Variation of licence
A holder of a licence may, at anytime during the validity of the licence, apply to the Agency for a variation of the licence in a prescribed manner and form on payment of a prescribed fee.48. Surrender of licence
The holder of a licence shall, where the holder of a licence does not intend to continue operating as a cyber security service provider to which the licence relates, surrender the licence to the Agency.49. Transfer of licence
A licence issued under this Part shall not be transferred to a third party.50. Renewal of licence
51. Cancellation or suspension of licence
52. Register of cyber security service provider
The Agency shall keep and maintain a register of cyber security service providers in the prescribed manner and form.Part VII – International cooperation in maintaining cyber security
53. Identifying areas of cooperation
Subject to section 3(3), the Agency shall identify and ensure that the Agency cooperates with private bodies, organisations and Government entities involved in cyber security matters, within and outside the Republic.54. Entering into agreement
Subject to the Mutual Legal Assistance in Criminal Matters Act, the Republic may enter into an agreement with a foreign State or international body relating to the provision of mutual assistance and cooperation in the investigation and prosecution of—Part VIII – Inspectorate
55. Appointment of cyber security inspector
56. Power to access, search and seize
57. Appointment of cyber security technical expert
Part IX – General provisions
58. Appeals
A person aggrieved by a decision of the Agency may, within thirty days of the decision, appeal to the High Court.59. Search and seizure by law enforcement officer
60. Restoration of property
61. Assistance
A person, who is not a suspect of a crime or otherwise excluded from an obligation to provide assistance, but who has knowledge about the functioning of a computer or computer system or measures applied to protect the computer data that is the subject of a search under this Act may, permit and assist where reasonably required and requested by a person authorised to make the search by—62. Evidence obtained by unlawful interception not admissible in criminal proceedings
Despite any other law, evidence which is obtained by means of an interception effected in contravention of this Act, shall not be admissible in any criminal proceedings except with the leave of the court, and in granting or refusing such leave, the court shall have regard to the circumstances in which the evidence was obtained, the potential effect of its admission or exclusion on issues of national security and the unfairness to the accused person that may be occasioned by its admission or exclusion.63. Prohibition of obstruction of law enforcement officer
64. Submission of information by controller
65. General penalty
A person who commits an offence under this Act for which no penalty is provided for is liable, on conviction, in the case of—66. Power of court to order cancellation of licence, forfeiture etc.
67. Guidelines
68. Standards
The Agency may develop standards for the regulation of cyber security in the Republic.69. Exemptions
70. Compounding of certain offences by Agency
Subject to the written consent of the Director of Public Prosecutions and where the Agency is satisfied after an investigation, and a person admits that the person has committed an offence under this Act, the Agency may compound the offence by collecting from that person a sum of money that the Agency considers appropriate, but not exceeding fifty percent of the maximum amount of the fine to which that person would have been liable on conviction, and a person having made that payment shall not thereafter be prosecuted in relation to the offence so compounded.71. Administrative penalty
72. Regulations
73. Repeal of Act No. 2 of 2021
The Cyber Security and Cyber Crimes Act, 2021 is repealed.History of this document
15 April 2025 this version
08 April 2025
Assented to