ETS 185 – Cybercrime (Convention), 23.XI.2001
__________________________________________________________________________________
Chapter I – Use of terms
Article 1 – Definitions
For the purposes of this Convention:
a
"computer system" means any device or a group of interconnected or related devices,
one or more of which, pursuant to a program, performs automatic processing of data;
b
"computer data" means any representation of facts, information or concepts in a form
suitable for processing in a computer system, including a program suitable to cause a
computer system to perform a function;
c
"service provider" means:
d
i
any public or private entity that provides to users of its service the ability to
communicate by means of a computer system, and
ii
any other entity that processes or stores computer data on behalf of such
communication service or users of such service.
"traffic data" means any computer data relating to a communication by means of a
computer system, generated by a computer system that formed a part in the chain of
communication, indicating the communication’s origin, destination, route, time, date, size,
duration, or type of underlying service.
Chapter II – Measures to be taken at the national level
Section 1 – Substantive criminal law
Title 1 – Offences against the confidentiality, integrity and availability
of computer data and systems
Article 2 – Illegal access
Each Party shall adopt such legislative and other measures as may be necessary to establish
as criminal offences under its domestic law, when committed intentionally, the access to the
whole or any part of a computer system without right. A Party may require that the offence be
committed by infringing security measures, with the intent of obtaining computer data or other
dishonest intent, or in relation to a computer system that is connected to another computer
system.
Article 3 – Illegal interception
Each Party shall adopt such legislative and other measures as may be necessary to establish
as criminal offences under its domestic law, when committed intentionally, the interception
without right, made by technical means, of non-public transmissions of computer data to, from
or within a computer system, including electromagnetic emissions from a computer system
carrying such computer data. A Party may require that the offence be committed with
dishonest intent, or in relation to a computer system that is connected to another computer
system.
3