Zambia
Cyber Crimes Act, 2025
Act 4 of 2025
- Published in Supplement to the Government Gazette on 15 April 2025
- Assented to on 8 April 2025
- Not commenced
- [This is the version of this document from 15 April 2025.]
Part I – Preliminary provisions
1. Short title and commencement
This Act may be cited as the Cyber Crimes Act, 2025, and shall come into operation on the date appointed by the Minister by statutory instrument.2. Interpretation
In this Act, unless the context otherwise requires—“access” has the meaning assigned to the word in the Electronic Communications and Transactions Act, 2021;[Act No. 4 of 2021]“article” has the meaning assigned to the word in the Cyber Security Act, 2025;[Act No. of 2025]“child” has the meaning assigned to the word in the Constitution;[Cap. 1]“child grooming” means a process, behaviour or an action used to establish a relationship of trust or an emotional connection with a child for purposes of facilitating or encouraging sexual conduct with that child;“child pornography” means a material whether real or simulated, that depicts a presentation or a representation of—(a)a child engaged in explicit sexual conduct;(b)an image of a child engaged in sexually explicit conduct; or(c)the sexual parts of a child for sexual purposes;“child solicitation” means persuading, luring, or attempting to persuade or lure a child into sexual activity through the use of a computer or computer system, regardless of the outcome;“communication” has the meaning assigned to the word in the Electronic Communications and Transactions Act, 2021;[Act No. 4 of 2021]“communications data” means information relating to the usage of an electronic communications service;“computer” has the meaning assigned to the word in the Electronic Communications and Transactions Act, 2021;[Act No. 4 of 2021]“computer data” has the meaning assigned to the words in the Cyber Security Act, 2025;[Act No. of 2025]“computer data storage medium” has the meaning assigned to the words in the Cyber Security Act, 2025;[Act No. of 2025]“computer system” has the meaning assigned to the words in the Cyber Security Act, 2025;[Act No. of 2025]“critical information” has the meaning assigned to the words in the Cyber Security Act, 2025;[Act No. of 2025]“critical information infrastructure” has the meaning assigned to the words in the Cyber Security Act, 2025;[Act No. of 2025]“cyber attack” has the meaning assigned to the words in the Cyber Security Act, 2025;[Act No. of 2025]“cyber crime” means a crime committed in, by or with the assistance of, a simulated environment or state of connection or association with electronic communications or networks including the internet;“cyber security” has the meaning assigned to the words in the Cyber Security Act, 2025;[Act No. of 2025]“cyber security risk assessment” has the meaning assigned to the words in the Cyber Security Act, 2025;[Act No. of 2025]“cyber terrorism” means the use of a computer or computer system to attack or threaten to attack computers, networks and information stored on the computers and networks with intent to intimidate or coerce a government or its people in furtherance of political or social objectives and to cause severe disruption or widespread fear in society;“device” has the meaning assigned to the word in the Cyber Security Act, 2025;[Act No. of 2025]“digital file” means a computer file that contains computer data or information in electronic form, which can be stored, processed, and transmitted;“electronic communication” has the meaning assigned to the words in the Electronic Communications and Transactions Act, 2021;[Act No. 4 of 2021]“electronic communications service” has the meaning assigned to the words in the Information and Communication Technologies Act, 2009;[Act No. 15 of 2009]“harassment” has the meaning assigned to the word in the Anti-Gender Based Violence Act, 2011 and the word “harass” shall be construed accordingly;[Act No. 1 of 2011]“header information” means identifying or descriptive data that is included at the beginning of a digital file or electronic communication;“hinder” includes—(a)disconnecting the electricity supply to a computer or computer system;(b)causing electromagnetic interference to a computer system;(c)corrupting a computer or computer system; or(d)damaging, deleting, deteriorating, altering or suppressing a computer programme;“interception” has the meaning assigned to the word in the Cyber Security Act, 2025;[Act No. of 2025]“internet connection record” has the meaning assigned to the words in the Cyber Security Act, 2025;[Act No. of 2025]“information infrastructure” has the meaning assigned to the words in the Cyber Security Act, 2025;[Act No. of 2025]“information system” has the meaning assigned to the words in the Electronic Communications and Transactions Act, 2021;[Act No. 4 of 2021]“judge” means a judge of the High Court;“law enforcement officer” has the meaning assigned to the words in the Cyber Security Act, 2025;[Act No. of 2025]“malicious software” means a computer programme intentionally designed to—(a)gain unauthorised access to a computer, computer system or computer data;(b)cause unauthorised modification or transmission of computer data;(c)deprive access to a computer or computer system; or(d)interfere with normal computer or computer system usage;“monitor” means to observe and analyse digital activities including network traffic, system logs, or user behavior, with the goal of detecting and preventing cyber security threats or cyber crimes;“penetration testing” has the meaning assigned to the words in the Cyber Security Act, 2025;[Act No. of 2025]“pornography” means audio or visual material whether real or simulated that depicts images of a person engaged in explicit sexual conduct;“private communication” has the meaning assigned to the words in the Cyber Security Act, 2025;[Act No. of 2025]“sexual conduct” includes sexual intercourse whether between persons or between a person and an animal, masturbation, sexual sadistic or masochistic abuse or lascivious exhibition of the genitals or pubic area of any person;“telecommunication infrastructure” means infrastructure that facilitates the conveyance of signals by wire, radio, optical, or other electro-magnetic means, including satellite networks and electronic communication service provider networks;“trafficking in persons” has the meaning assigned to the words in the Anti-Human Trafficking Act, 2008; and[Act No. 11 of 2018]“traffic data” means digital data that—(a)relates to a communication by means of a computer system;(b)is generated by a computer system that is part of the chain of communication; and(c)shows the communication’s origin, destination, route, time, date, size, duration or the type of underlying services.Part II – Offences
3. Prohibition of unauthorised access to computer system and data
4. Prohibition of unauthorised interference with computer system and data
5. Prohibition of unauthorised disclosure of data relating to critical information or critical information infrastructure
6. Prohibition of unauthorised possession of data relating to critical information or critical information infrastructure
7. Illegal acquisition of data
8. Prohibition of introduction of malicious software into computer system
9. Illegal system interference
10. Prohibition of recording of private conversation without prior notice
11. Prohibition of illegal devices and software
12. Prohibition of computer related misrepresentation and computer fraud
13. Prohibition of cyber extortion
14. Prohibition of identity related crimes
15. Prohibition of child pornography
16. Prohibition of child solicitation
17. Prohibition of child grooming
18. Prohibition of on-line human trafficking
19. Transmission of deceptive electronic communication
20. Prohibition of use of computer or computer system for offences
21. Prohibition of unlawful disclosure of details of investigation
22. Prohibition of harassment, humiliation etc.
23. Prohibition of cyber attack
24. Prohibition of cyber terrorism
25. Offences resulting in incapacity or destruction of critical information and critical information infrastructure
Despite the penalties set out in any other provision of this Act or any other written law, a person is liable, on conviction, to a fine not exceeding one million penalty units or to imprisonment for a term not exceeding twenty five years, or to both where that person commits an offence under this Act or any other written law and the offence results in the incapacity or destruction of, or interference with, electronic data, computer or computer system or a computer network that—Part III – General provisions
26. Entering into agreement
Subject to the Mutual Legal Assistance in Criminal Matters Act, the Republic may enter into an agreement with a foreign State or international body relating to the provision of mutual assistance and cooperation in the investigation and prosecution of—27. Search and seizure by law enforcement officer
28. Restoration and forfeiture of property
29. Assistance
A person who has knowledge about the functioning of a computer or computer system or measures applied to protect the computer data that is the subject of a search under this Act may, permit and assist where reasonably required and requested by a person authorised to make the search by—30. Expedited preservation order
31. Disclosure of traffic data
A law enforcement officer may, with a warrant, where the law enforcement officer is satisfied that computer data is reasonably required for the purposes of a criminal investigation, by written notice given to a person in control of the computer or computer system, require the person to disclose relevant traffic data about a specified communication to identify—32. Collection of traffic data
33. Extradition
An offence under the provisions of this Act is an extraditable offence or extraditable crime for the purposes of the Extradition Act.[Cap. 94]History of this document
15 April 2025 this version
08 April 2025
Assented to