Related documents
- Is amended by 24th Annual Supplement
- Is amended by Computer Misuse and Cybercrimes (Amendment) Act, 2025
- Amends Kenya Information and Communications Act
- Amends Sexual Offences Act
LAWS OF KENYA
COMPUTER MISUSE AND CYBERCRIMES
CAP. 79C
- Published in Kenya Gazette Vol. CXX—No. 58 on 18 May 2018
- Assented to on 16 May 2018
- Commenced on 30 May 2018
- [Revised by 24th Annual Supplement (Legal Notice 221 of 2023) on 31 December 2022]
- [Amended by Computer Misuse and Cybercrimes (Amendment) Act, 2025 (Act No. 17 of 2025) on 4 November 2025]
Part I – PRELIMINARY
1. Short title
This Act may be cited as the Computer Misuse and Cybercrimes Act.2. Interpretation
In this Act, unless the context otherwise requires—"access" means gaining entry into or intent to gain entry by a person through a program or a device to a program or data stored in a computer system and the person either—(a)alters, modifies or erases a program or data or any aspect related to the program or data in the computer system;(b)copies, transfers or moves a program or data to—(i)any computer system, device or storage medium other than that in which it is stored; or(ii)to a different location in the same computer system, device or storage medium in which it is stored;(c)causes it to be output from the computer in which it is held, whether by having it displayed or in any other manner; or(d)uses it by causing the computer to execute a program or is itself a function of the program;"asset" includes all property movable or immovable, physical or virtual and all estates, easements and rights whether equitable or legal in, over or out of property, choses-in-action, money or goodwill whether situated in Kenya or elsewhere;"Authority" means the Communications Authority of Kenya;"authorised person" means an officer in a law enforcement agency or a cybersecurity expert designated by the Cabinet Secretary responsible for matters relating to national security by notice in the Gazette for the purposes of Part III of this Act;"blockchain technology" means a digitized, decentralized, public ledger of all crypto currency transactions;"Cabinet Secretary" means the Cabinet Secretary responsible for matters relating to internal security;"Central Authority" means the Office of the Attorney-General and Department of Justice;"Committee" means the National Computer and Cybercrimes Co-ordination Committee established under section 4;"computer data storage medium" means a device, whether physical or virtual, containing or designed to contain, or enabling or designed to enable storage of data, whether available in a single or distributed form for use by a computer, and from which data is capable of being reproduced;"computer misuse" means the unauthorized use, modification or access to a computer system, program or data;"computer system" means a physical or virtual device, or a set of associated physical or virtual devices, which use electronic, magnetic, optical or other technology, to perform logical, arithmetic storage and communication functions on data or which perform control functions on physical or virtual devices including mobile devices and reference to a computer system includes a reference to part of a computer system;"content data" means the substance, its meaning or purport of a specified communication;"critical information infrastructure system or data" means an information system, program or data that supports or performs a function with respect to a national critical information infrastructure;"critical infrastructure" means the processes, systems, facilities, technologies, networks, assets and services essentials to the health, safety, security or economic well-being of Kenyans and the effective functioning of Government;"cybercrime" means an offence committed through the use of information and communication technology to target networks, systems, data; websites or technology or to facilitate a crime;"cybersquatting" means the acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, or deprive another from registering the same, if the domain name is—(a)similar, identical or confusingly similar to an existing trademark registered with the appropriate government agency at the time of registration;(b)identical or in any way similar with the name of a person other than the registrant, in case of a personal name; or(c)acquired without right or intellectual property interests in it;"data" means any representation of facts, information or concepts in a form suitable for processing in a computer system, including a program suitable to cause a computer system to perform a function;"identity theft" means the use of another person's personal identification information including the name, identification number, SIM card, bank card, bank account information, address, password or any other subscriber information;"interception" means the monitoring, modifying, viewing or recording of non-public transmissions of data to or from a computer system over a telecommunications system, and includes, in relation to a function of a computer system, listening to or recording a function of a computer system or acquiring the substance, its meaning or purport of such function;"interference" means any impairment to the confidentiality, integrity or availability of a computer system, or any program or data on a computer system, or any act in relation to the computer system which impairs the operation of the computer system, program or data;"mobile money" means electronic transfer of funds between banks or accounts' deposit or withdrawal of funds or payment of bills by mobile phone;"national critical information infrastructure" means a vital virtual asset, facility, system, network or process whose incapacity, destruction or modification would have—(a)a debilitating impact on the availability, integrity or delivery of essential services including those services, whose integrity, if compromised, could result in significant loss of life or casualties; or(b)significant impact on national security, national defense, or the functioning of the state;"network" means a collection of hardware components and computers interconnected by communications channels that allow sharing of resources and information;"password" means any data by which a computer service or a computer system is capable of being obtained or used;"pornography" includes the representation in books, magazines, photographs, films, and other media, telecommunication apparatus of scenes of sexual behaviour that are erotic or lewd and are designed to arouse sexual interest;"premises" includes land, buildings, movable structures, a physical or virtual space in which data is maintained, managed, backed up remotely and made available to users over a network, vehicles, vessels or aircraft;"program" means data representing instructions or statements that, if executed in a computer system, causes the computer system to perform a function and reference to a program includes a reference to a part of a program;"requested State" means a state being requested to provide legal assistance under the terms of this Act;"requesting State" means a state requesting for legal assistance and may for the purposes of this Act include an international entity to which Kenya is obligated;"seize" with respect to a program or data includes to—(a)secure a computer system or part of it or a device;(b)make and retain a digital image or secure a copy of any program or data, including using an on-site equipment;(c)render the computer system inaccessible;(d)remove data in the accessed computer system; or(e)obtain output of data from a computer system;"service provider" means—(a)a public or private entity that provides to users of its services the means to communicate by use of a computer system; and(b)any other entity that processes or stores computer data on behalf of that entity or its users;"subscriber information" means any information contained in the form of data or any form that is held by a service provider, relating to subscribers of its services, other than traffic data or content data, by which can be established—(a)the type of communication service used, the technical provisions taken thereto and the period of service;(b)the subscriber's identity, postal, geographic location, electronic mail address, telephone and other access number, billing and payment information, available on the basis of the service agreement or arrangement; or(c)any other information on the site of the installation of telecommunication apparatus, available on the basis of the service agreement or arrangement;"telecommunication apparatus" means an apparatus constructed or adapted for use in transmitting anything which is transmissible by a telecommunication system or in conveying anything which is transmitted through such a system;"telecommunication system" means a system for the conveyance, through the use of electric, magnetic, electro-magnetic, electro-chemical or electro-mechanical energy, of—(a)speech, music or other sounds;(b)visual images;(c)data;(d)signals serving for the impartation, whether as between persons and persons, things and things or persons and things, of any matter otherwise than in the form of sound, visual images or data; or(e)signals serving for the activation or control of machinery or apparatus and includes any cable for the distribution of anything falling within paragraphs (a), (b), (c) or (d);"terrorist act" has the meaning assigned to it under the Prevention of Terrorism Act (Cap. 59B);"traffic data" means computer data relating to a communication by means of a computer system, generated by a computer system that formed a part in the chain of communication, indicating the communication's origin, destination, route, time, date, size, duration or the type of underlying service;"trust accounts" means an account where a bank or trust company is holding funds in relation to mobile money on behalf of the public depositors; and"virtual account" means a digital account acquired through virtual representation.(Act No. 17 of 2025, s. 2.)3. Objects of the Act
The objects of this Act are to—Part II – THE NATIONAL COMPUTER AND CYBERCRIMES CO-ORDINATION COMMITTEE
4. Establishment of Committee
There is established the National Computer and Cybercrimes Co-ordination Committee.5. Composition of the Committee
6. Functions of the Committee
7. Secretariat of the Committee
8. Reports by the Committee etc
The Committee shall submit quarterly reports to the National Security Council.9. Critical information infrastructure
10. Protection of critical information infrastructure
11. Reports on critical information infrastructure
12. Information sharing agreements
13. Auditing of critical information infrastructures to ensure compliance
Part III – OFFENCES
14. Unauthorised access
15. Access with intent to commit further offence
16. Unauthorised interference
17. Unauthorised interception
18. Illegal devices and access codes
19. Unauthorised disclosure of password or access code
20. Enhanced penalty for offences involving protected computer system
21. Cyber espionage
22. False publications
23. Publication of false information
A person who knowingly publishes information that is false in print, broadcast, data or over a computer system, that is calculated or results in panic, chaos, or violence among citizens of the Republic, or which is likely to discredit the reputation of any person commits an offence and shall on conviction, be liable to a fine not exceeding five million shillings or to imprisonment for a term not exceeding ten years, or to both.24. Child pornography
25. Computer forgery
26. Computer fraud
27. Cyber harassment
28. Cybersquatting
A person who, intentionally takes or makes use of a name, business name, trademark, domain name or other word or phrase registered, owned or in use by another person on the internet or any other computer network, without authority or right, commits an offence and is liable on conviction to a fine not exceeding two hundred thousand shillings or imprisonment for a term not exceeding two years or both.29. Identity theft and impersonation
A person who fraudulently or dishonestly makes use of the electronic signature, password or any other unique identification feature of any other person commits an offence and is liable, on conviction, to a fine not exceeding two hundred thousand shillings or to imprisonment for a term not exceeding three years or both.30. Phishing
A person who creates or operates a website or sends a message or email or makes a call through a computer system with the intention to induce the user of a website or the recipient of the message or email or call to disclose personal information for an unlawful purpose or to gain unauthorized access to a computer system, commits an offence and is liable upon conviction to a fine not exceeding three hundred thousand shillings or to imprisonment for a term not exceeding three years or both.(Act No. 17 of 2025, s. 5.)31. Interception of electronic messages or money transfers
A person who unlawfully destroys or aborts any electronic mail or processes through which money or information is being conveyed commits an offence and is liable on conviction to a fine not exceeding two hundred thousand shillings or to a term of imprisonment not exceeding seven years or to both.32. Willful misdirection of electronic messages
A person who willfully misdirects electronic messages commits an offence and is liable on conviction to a fine not exceeding one hundred thousand shillings or to imprisonment for a term not exceeding two years or to both.33. Cyber terrorism
34. Inducement to deliver electronic message
A person who induces any person in charge of electronic devices to deliver any electronic messages not specifically meant for him commits an offence and is liable on conviction to a fine not exceeding two hundred thousand shillings or imprisonment for a term not exceeding two years or to both.35. Intentionally withholding message delivered erroneously
A person who intentionally hides or detains any electronic mail, message, electronic payment, credit and debit card which was found by the person or delivered to the person in error and which ought to be delivered to another person, commits an offence and is liable on conviction a fine not exceeding two hundred thousand shillings or imprisonment for a term not exceeding two years or to both.36. Unlawful destruction of electronic messages
A person who unlawfully destroys or aborts any electronic mail or processes through which money or information is being conveyed commits an offence and is liable on conviction to a fine not exceeding two hundred thousand shillings or imprisonment for a term not exceeding two years, or to both.37. Wrongful distribution of obscene or intimate images
A person who transfers, publishes, or disseminates, including making a digital depiction available for distribution or downloading through a telecommunications network or though any other means of transferring data to a computer, the intimate or obscene image of another person commits an offence and is liable, on conviction to a fine not exceeding two hundred thousand shillings or imprisonment for a term not exceeding two years, or to both.38. Fraudulent use of electronic data
39. Issuance of false e-instructions
A person authorized to use a computer or other electronic devices for financial transactions including posting of debit and credit transactions, issuance of electronic instructions as they relate to sending of electronic debit and credit messages or confirmation of electronic fund transfer, issues false electronic instructions, commits an offence and is liable, on conviction, a fine not exceeding two hundred thousand shillings or imprisonment for a term not exceeding two years, or to both.40. Reporting of cyber threat
41. Employee responsibility to relinquish access codes
42. Aiding or abetting in the commission of an offence
43. Offences by a body corporate and limitation of liability
44. Confiscation or forfeiture of assets
45. Compensation order
46. Additional penalty for other offences committed through use of a computer system
46A. Further court orders
Part IV – INVESTIGATION PROCEDURES
47. Scope of procedural provisions
48. Search and seizure of stored computer data
49. Record of and access to seized data
50. Production order
51. Expedited preservation and partial disclosure of traffic data
52. Real-time collection of traffic data
53. Interception of content data
54. Obstruction and misuse of power
55. Appeal
Any person aggrieved by any decision or order of the Court made under this Part, may appeal to the High Court or Court of Appeal as the case may be within thirty days from the date of the decision or order.56. Confidentiality and limitation of liability
Part V – INTERNATIONAL CO-OPERATION
57. General principles relating to international cooperation
58. Spontaneous information
59. Expedited preservation of stored computer data
60. Expedited disclosure of preserved traffic data
Where during the course of executing a request under section 57 with respect to a specified communication, the investigating agency discovers that a service provider in another State was involved in the transmission of the communication, the Central Authority shall expeditiously disclose to the requesting State a sufficient amount of traffic data to identify that service provider and the path through which the communication was transmitted.61. Mutual assistance regarding accessing of stored computer data
62. Trans-border access to stored computer data with consent or where publicly available
A police officer or authorised person may, subject to any applicable provisions of this Act—63. Mutual assistance in the real-time collection of traffic data
64. Mutual assistance regarding the interception of content data
65. Point of contact
Part VI – GENERAL PROVISIONS
66. Territorial jurisdiction
67. Forfeiture
The court before which a person is convicted of any offence may, in addition to any other penalty imposed, order the forfeiture of any apparatus, device or thing to the Authority which is the subject matter of the offence or is used in connection with the commission of the offence.68. Prevailing Clause
Whenever there is a conflict between this Act and any other law regarding cybercrimes, the provisions of this Act shall supersede any such other law.69. Spent
Part VII – PROVISIONS ON DELEGATED POWERS
70. Regulations
History of this document
04 November 2025 this version
31 December 2022
Revised by
24th Annual Supplement
Read this version
30 May 2018
Commenced
18 May 2018
16 May 2018
Assented to
Cited documents 9
Act 9
| 1. | Proceeds of Crime and Anti-Money Laundering Act | 432 citations |
| 2. | Statutory Instruments Act | 325 citations |
| 3. | Kenya Defence Forces Act | 168 citations |
| 4. | Prevention of Terrorism Act | 161 citations |
| 5. | National Intelligence Service Act | 33 citations |
| 6. | Mutual Legal Assistance Act | 28 citations |
| 7. | Extradition (Contiguous and Foreign Countries) Act | 22 citations |
| 8. | Interpretation and General Provisions Act | 20 citations |
| 9. | National Police Service Act | 13 citations |
Documents citing this one 51
Judgment 36
Gazette 5
| 1. | Kenya Gazette Vol. CXXIV-No. 21 | |
| 2. | Kenya Gazette Vol. CXXV-No. 102 | |
| 3. | Kenya Gazette Vol. CXXV-No. 185 | |
| 4. | Kenya Gazette Vol. CXXV-No. 257 | |
| 5. | Kenya Gazette Vol. CXXVII-No. 25 |
Legal Notice 4
Act 3
| 1. | Kenya Information and Communications Act | 682 citations |
| 2. | Children Act | 264 citations |
| 3. | Virtual Asset Service Providers Act | 3 citations |
Bench Bulletin 2
| 1. | Bench Bulletin - Issue 41 | |
| 2. | Bench Bulletin - Issue 53 |
Bill 1
| 1. | The Computer Misuse and Cybercrimes (Amendment) Bill, 2021 |
Subsidiary legislation
|
Title
|
|
|---|---|
| Computer Misuse and Cybercrime (The Critical Information Infrastructure and Cybercrime Management) Regulations | Legal Notice 44 of 2024 |