ABCDEFGHIJKLMNOPQRSTUVWXYZ
1
CountrySources
2
Albania
https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/albania
https://www.legislationline.org/download/id/8236/file/Albania_CPC_1995_am2017_en.pdf
https://www.shish.gov.al/files/Ligjet/Ligji%20nr.9157,%20dat%C3%AB%204.12.2003.pdf
3
Algeria
https://www.douane.gov.dz/IMG/pdf/loi_n_2000-03_du_05_aout_2000.pdf
https://www.arpce.dz/fr/doc/reg/loi/F09-04.pdf
4
Angola
http://www.mtti.gov.ao/verlegislacao.aspx?id=458
http://www.mtti.gov.ao/verlegislacao.aspx?id=456
5
Antigua and Barbuda
http://laws.gov.ag/wp-content/uploads/2019/02/a2013-14.pdf
6
Argentina
http://servicios.infoleg.gob.ar/infolegInternet/anexos/315000-319999/319681/norma.htm
7
Armenia
https://www.sns.am/en/licensing/
https://www.americanconference.com/7th-advanced-industry-forum-global-encryption-controls/wp-content/uploads/sites/1741/2017/03/Day1_115am_Gershberg.pdf
8
Australia
https://www.legislation.gov.au/Details/C2018C00495
https://www.legislation.gov.au/Details/C2018C00486
https://defence.gov.au/ExportControls/ICT.asp
https://dsgl.defence.gov.au/dsglcontent/Pages/5A002.aspx
9
Austria
https://www.ris.bka.gv.at/GeltendeFassung.wxe?Abfrage=Bundesnormen&Gesetzesnummer=10002326
10
Azerbaijan
https://www.legislationline.org/documents/action/popup/id/8876
11
Bahamas
http://laws.bahamas.gov.bs/cms/images/LEGISLATION/PRINCIPAL/2003/2003-0002/ComputerMisuseAct_1.pdf
http://laws.bahamas.gov.bs/cms/images/LEGISLATION/PRINCIPAL/2003/2003-0004/ElectronicCommunicationsandTransactionsAct_1.pdf
http://laws.bahamas.gov.bs/cms/images/LEGISLATION/PRINCIPAL/2000/2000-0003/TelecommunicationsAct_1.pdf
12
Bahrain
https://www.legalaffairs.gov.bh/AdvancedSearchDetails.aspx?id=71971#.W8dDuGhKhNK
https://tra-website-content-prod-2019-do-not-delete.s3-eu-west-1.amazonaws.com/Media/mediafiles/document/THE%20TELECOMMUNICATIONS%20LAW.pdf
13
Bangladesh
http://bdlaws.minlaw.gov.bd/act-1261/section-47518.html
14
Barbados
https://commerce.gov.bb/wp-content/uploads/2020/01/CAP-308B-ETA.pdf
https://commerce.gov.bb/wp-content/uploads/2020/01/computer_misuse_act_2005-4.pdf
15
Belarus
http://pravo.levonevsky.org/bazaby09/sbor76/text76050.htm
https://www.americanconference.com/7th-advanced-industry-forum-global-encryption-controls/wp-content/uploads/sites/1741/2017/03/Day1_115am_Gershberg.pdf
16
Belgium
http://www.ejustice.just.fgov.be/eli/loi/1998/11/30/1998007272/justel
http://www.ejustice.just.fgov.be/eli/loi/2005/06/13/2005011238/justel
http://www.ejustice.just.fgov.be/cgi_loi/change_lg.pl?language=fr&la=F&table_name=loi&cn=1998113032
http://www.ejustice.just.fgov.be/cgi_loi/change_lg.pl?language=fr&la=F&cn=2005061332&table_name=loi
http://www.ejustice.just.fgov.be/cgi_loi/loi_a1.pl?sql=%28text%20contains%20%28%27%27%29%29&language=fr&rech=1&tri=dd%20AS%20RANK&value=&table_name=loi&F=&cn=2003010942&caller=image_a1&fromtab=loi&la=F
https://www.loc.gov/law/help/encrypted-communications/belgium.ph
p
http://www.ejustice.just.fgov.be/eli/loi/1808/11/17/1808111701/justel
17
Belize
https://www.oas.org/juridico/PDFs/cyb_tto_int2010.pdf
18
Brazil
https://www.constituteproject.org/constitution/Brazil_2017?lang=en
http://www.planalto.gov.br/ccivil_03/_ato2011-2014/2014/lei/l12965.htm
https://www.anatel.gov.br/legislacao/en/resolutions/740-resolution-614
https://canalcienciascriminais.jusbrasil.com.br/artigos/310735589/o-que-ninguem-falou-sobre-o-caso-do-facebook?ref=topic_feed
19
Brunei
http://www.agc.gov.bn/AGC%20Images/LOB/PDF/Computer%20Misuse.pdf
20
Cameroon
https://www.minpostel.gov.cm/images/Les_textes/Lois/Loi_2010-012_cybersecurite_cybercriminalite.pdf
https://www.camgovca.cm/images/downloads/articles/D%C3%A9cret%20fixant%20les%20modalit%C3%A9s%20de%20d%C3%A9claration%20et%20d'autorisation%20pr%C3%A9alables,%20ainsi%20que%20les%20conditions%20d'obtention%20du%20certificat%20d'homologation%20en%20vue%20de%20la%20fourniture,%20moyens%20crypto.pdf
21
Canada
https://laws-lois.justice.gc.ca/eng/Const/page-15.html
https://laws-lois.justice.gc.ca/eng/acts/E-19/
https://laws-lois.justice.gc.ca/eng/acts/C-46/
https://www.canlii.org/en/qc/qcca/doc/2010/2010qcca1108/2010qcca1108.html
22
Cape Verde
http://www.anac.cv/images/stories/legislacao_tec/DLegislativo07-2005.pdf
23
Chad
https://2009-2017.state.gov/e/eb/rls/othr/ics/2015/241514.htm
https://arcep.td/sites/default/files/LOI-09.pdf
24
China
http://www.asianlii.org/cn/legis/cen/laws/rocec383/
http://www.npc.gov.cn/npc/c30834/201910/6f7be7dd5ae5459a8de8baf36296bc74.shtml
https://ec.europa.eu/home-affairs/sites/homeaffairs/files/what-we-do/policies/organized-crime-and-human-trafficking/encryption/csis_study_en.pdf
25
Colombia
http://www.secretariasenado.gov.co/senado/basedoc/ley_1621_2013_pr001.html
http://www.secretariasenado.gov.co/senado/basedoc/ley_0104_1993.html
26
Croatia
https://www.zakon.hr/z/174/Zakon-o-kaznenom-postupku
27
Cuba
https://www.gacetaoficial.gob.cu/es/resoluci%C3%B3n-128-de-2011-de-ministerio-de-la-inform%C3%A1tica-y-las-comunicaciones
https://freedomhouse.org/country/cuba/freedom-net/2019
https://www.ohchr.org/Documents/Issues/Opinion/Communications/States/Cuba.pdf
28
Czechia
https://www.zakonyprolidi.cz/cs/1961-141
https://www.zakonyprolidi.cz/cs/2005-127
29
Denmark
https://www.retsinformation.dk/eli/lta/2017/1101
https://www.retsinformation.dk/eli/lta/2014/128
https://ens.dk/sites/ens.dk/files/Tele/act_on_electronic_communications_networks_and_services.pdf
https://clfr.globalnetworkinitiative.org/country/denmark/
https://uprdoc.ohchr.org/uprweb/downloadfile.aspx?filename=2347&file=EnglishTranslation (PDF)
30
Dominican Republic
https://docs.republica-dominicana.justia.com/nacionales/codigos/codigo-procesal-penal.pdf
31
Ecuador
https://www.telecomunicaciones.gob.ec/wp-content/uploads/downloads/2016/05/Ley-Org%C3%A1nica-de-Telecomunicaciones.pdf
32
Egypt
https://www.marefa.org/%D9%82%D8%A7%D9%86%D9%88%D9%86_%D8%AA%D9%86%D8%B8%D9%8A%D9%85_%D8%A7%D9%84%D8%A7%D8%AA%D8%B5%D8%A7%D9%84%D8%A7%D8%AA_(eg)
https://clfr.globalnetworkinitiative.org/country/egypt/
33
El Salvador
http://www.lexmundi.com/Document.asp?DocID=1857
http://www.oas.org/juridico/PDFs/mesicic4_slv_telecom.pdf
34
Estonia
https://www.riigiteataja.ee/en/eli/ee/530012017002/consolide/current
35
Eswatini (formerly Swaziland)
http://www.gov.sz/images/smilies/cybercrime%20draft%20%20bill%20-%20swaz%2008%2013f%20draft%203.pdf
https://www.state.gov/reports/2018-investment-climate-statements/eswatini/
36
Ethiopia
https://sherloc.unodc.org/cld/document/eth/2012/telecom_fraud_offence_proclamation.html?
https://www.ilo.org/dyn/natlex/docs/ELECTRONIC/103967/126636/F1922468791/ETH103967.pdf
https://www.eff.org/deeplinks/2016/06/ethiopias-new-cybercrime-law-allows-more-efficient-and-systematic-prosecution-online
37
Fiji
http://www.taf.org.fj/getattachment/Publications/Laws---Regulations/tp2008.pdf.aspx
https://www.fiji.gov.fj/getattachment/19dba47d-64e0-4b55-97bc-68dc4cc77c77/Cybercrime-Bill-2020.aspx
38
Finland
https://www.finlex.fi/fi/laki/alkup/2004/20040516
https://www.finlex.fi/fi/laki/ajantasa/2011/20110806#L8P23
39
France
https://www.legifrance.gouv.fr/loda/id/JORFTEXT000000801164/2020-09-16/#LEGISCTA000006117690
https://www.legifrance.gouv.fr/affichCode.do?cidTexte=LEGITEXT000025503132&dateTexte=20181024
https://www.legifrance.gouv.fr/affichCode.do?cidTexte=LEGITEXT000006071154&dateTexte=20181024
https://www.cnil.fr/fr/lacces-des-autorites-publiques-aux-donnees-chiffree
s
https://clfr.globalnetworkinitiative.org/country/france/
40
Gabon
http://www.droit-afrique.com/uploads/Gabon-Ordonnance-2018-15-cybersecurite-cybercriminalite.pdf
41
Gambia
http://www.pura.gm/wp-content/uploads/2018/01/IC-Info-Comms-Act-2009.pdf
42
General sources
https://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31996G1104:EN:HTML
https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:02000R1334-20090102
43
Georgia
https://matsne.gov.ge/ka/document/download/90034/64/en/pdf
44
Germany
http://www.gesetze-im-internet.de/tk_v_2005/BJNR313600005.html
https://www.bundesnetzagentur.de/SharedDocs/Downloads/DE/Sachgebiete/Telekommunikation/Unternehmen_Institutionen/Anbieterpflichten/OeffentlicheSicherheit/TechnUmsetzung110/Downloads/TRTK%C3%9CV%20englische%20Version.pdf?__blob=publicationFile&v=7
https://www.gesetze-im-internet.de/englisch_stpo/englisch_stpo.html
https://www.theregister.com/2019/05/28/german_government_encryption/
https://www.privateinternetaccess.com/blog/new-german-law-would-force-isps-to-allow-secret-service-to-install-trojans-on-user-devices/
45
Ghana
https://moc.gov.gh/sites/default/files/downloads/Electronic%20Transactions%20Act%20772.pdf
https://clfr.globalnetworkinitiative.org/country/ghana/
46
Greece
https://www.lawspot.gr/nomikes-plirofories/nomothesia/proedriko-diatagma-47-2005
47
Grenada
http://www.easterncaribbeanlaw.com/wp-content/uploads/2014/07/Electronic-Crimes-Act.pdf
48
Guinea-Bissau
https://arn.gw/activeapp/wp-content/uploads/2015/03/3.-%c2%a6SUP.-B.-O.-N.-%c2%a6-21-2010.pdf
49
Guyana
https://web.oas.org/mla/en/G_Countries_MLA/Guyan_mut_leg_eng_4.pdf
50
Honduras
http://www.poderjudicial.gob.hn/CEDIJ/Leyes/Documents/Ley%20Especial%20sobre%20Intervencion%20de%20las%20Comunicaciones%20Privadas%20(8,2mb).pdf
51
Hong Kong
https://www.stc.tid.gov.hk/english/circular_pub/stc12_04.html
http://www.onc.hk/en_US/the-requirement-to-decrypt-information-in-hong-kong/
https://www.elegislation.gov.hk/hk/cap589?xpid=ID_1438403494067_001
https://www.elegislation.gov.hk/hk/cap455
https://www.elegislation.gov.hk/hk/cap575
52
Hungary
https://tasz.hu/cikkek/hungarian-government-plans-to-enforce-encryption-backdoors-1
https://www.hoover.org/sites/default/files/research/docs/severson_webreadypdf.pdf
https://net.jogtar.hu/jogszabaly?docid=a0400180.kor
53
India
https://www.meity.gov.in/content/view-it-act-2000
https://dot.gov.in/granted-issue-guidelines
54
Iran
http://ilo.org/dyn/natlex/docs/ELECTRONIC/91715/106512/F1311829502/IRN91715.pdf
http://tpo.ir/index.aspx?fkeyid=&siteid=1&pageid=24254
55
Ireland
http://www.irishstatutebook.ie/eli/2017/act/11/section/7/enacted/en/html#sec7
http://www.irishstatutebook.ie/eli/2000/act/27/enacted/en/index.html
http://www.irishstatutebook.ie/eli/2009/act/19/enacted/en/html
56
Israel
https://www.mod.gov.il/English/Encryption_Controls/Pages/order.aspx
https://www.nevo.co.il/law_html/law01/999_876.htm
https://www.unodc.org/res/cld/document/computer-law_html/Israel_Computers_Law_5755_1995.pdf
57
Italy
https://www.legislationline.org/download/id/4357/file/Italy_CPC_updated_till_2012_Part_1_it.pdf
https://clfr.globalnetworkinitiative.org/country/italy/
https://iclg.com/practice-areas/telecoms-media-and-internet-laws-and-regulations/italy
58
Jamaica
https://moj.gov.jm/sites/default/files/laws/The%20Interception%20of%20Communications%20Act.pdf
59
Japan
http://www.japaneselawtranslation.go.jp/law/detail/?printID=&ft=2&re=02&dn=1&yo=criminal&ia=03&x=0&y=0&ky=&page=2&vm=02
https://www.loc.gov/law/help/encrypted-communications/japan.php
https://elaws.e-gov.go.jp/search/elawsSearch/elaws_search/lsg0500/detail?lawId=411AC0000000137&openerCode=1#52
https://www.cistec.or.jp/english/export/Overview4th.pdf
60
Jordan
https://ppp.worldbank.org/public-private-partnership/sites/ppp.worldbank.org/files/documents/Jordan_telecomunication%20law_1995_EN.pdf
https://trc.gov.jo/EchoBusV3.0/SystemAssets/%D8%A7%D9%84%D8%A5%D8%B3%D8%AA%D8%B1%D8%A7%D8%AA%D9%8A%D8%AC%D9%8A%D8%A9%20%D8%A7%D9%84%D9%88%D8%B7%D9%86%D9%8A%D8%A9%20%D9%84%D8%B6%D9%85%D8%A7%D9%86%20%D8%A7%D9%85%D9%86%20%D8%A7%D9%84%D9%85%D8%B9%D9%84%D9%88%D9%85%D8%A7%D8%AA%20%D9%88%D8%A7%D9%84%D8%A3%D9%85%D9%86%20%D8%A7%D9%84%D8%B3%D9%8A%D8%A8%D8%B1%D8%A7%D9%86%D9%8A%20%202012.pdf
61
Kazakhstan
https://online.zakon.kz/Document/?doc_id=34205812#pos=409;-54
https://advox.globalvoices.org/2019/08/30/kazakhstan-pauses-interception-of-encrypted-traffic-but-for-how-long/
https://www.americanconference.com/7th-advanced-industry-forum-global-encryption-controls/wp-content/uploads/sites/1741/2017/03/Day1_115am_Gershberg.pdf
http://www.elicense.kz/LicensingContent/Passport?servicesType=El4&servicesParameters=%7B%22PackageCode%22%3A%22%D0%A0%D0%945%22%2C%22ServiceCode%22%3A%22%D0%A0%D0%945%22%2C%22VersionPackage%22%3A%222.0.10%22%2C%22OperationTypeId%22%3A%221%22%2C%22ActivityTypeCode%22%3A%22EL4-R12_05-V1%22%7D
http://adilet.zan.kz/eng/docs/Z1400000202
62
Kenya
https://www.unodc.org/res/cld/document/ken/1930/information-and-communications-act_html/Kenya_Information_and_Communications_Act_2_of_1998.pdf
63
Kiribati
http://www.paclii.org/ki/legis/num_act/ca2012176/
https://unctad.org/en/PublicationsLibrary/dtlstict2019d15_en.pdf
64
Kyrgyzstan
https://www.americanconference.com/7th-advanced-industry-forum-global-encryption-controls/wp-content/uploads/sites/1741/2017/03/Day1_115am_Gershberg.pdf
https://www.legislationline.org/documents/section/criminal-codes
65
Latvia
https://likumi.lv/ta/en/en/id/96611
66
Lebanon
https://uprdoc.ohchr.org/uprweb/downloadfile.aspx?filename=2121&file=EnglishTranslation
67
Lesotho
https://clfr.globalnetworkinitiative.org/country/lesotho/
68
Liberia
https://www.wto.org/english/thewto_e/acc_e/lbr_e/WTACCLBR15_LEG_38.pdf
https://www.export-u.com/CCGs/Liberia%20CCG%202017.pdf
69
Liechtenstein
https://www.regierung.li/media/medienarchiv/312_0_11_07_2017_en.pdf
70
Lithuania
https://www.e-tar.lt/portal/lt/legalAct/TAR.82D8168D3049/asr
71
Luxembourg
http://legilux.public.lu/eli/etat/leg/loi/2000/08/14/n8/jo
http://legilux.public.lu/eli/etat/leg/code/procedure_penale/20181101
72
Malawi
https://www.macra.org.mw/wp-content/uploads/2014/07/E-Transactions-Act-2016.pdf/
https://malawilii.org/mw/legislation/act/2016/33
https://www.mra.mw/custom-and-excise/prohibited-and-restricted-imports
73
Malaysia
http://www.agc.gov.my/agcportal/uploads/files/Publications/LOM/EN/Act%20708%2028_4_2015.pdf
https://www.miti.gov.my/index.php/pages/view/sta2010#Strategic%20Items%20List
74
Mali
https://www.malibuzz.tv/loi-n2019-056-du-05-decembre-2019-portant-repression-de-la-cybercriminalite-au-mali/
http://ekladata.com/LsjkdrhWPde9g2eCO7mJBMqn7-k.pdf
75
Malta
https://legislation.mt/eli/cap/9/eng/pdf
https://legislation.mt/eli/cap/426/eng/pdf
76
Mauritius
https://www.icta.mu/docs/laws/cyber.pdf
77
Mexico
https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/mexico
http://www.diputados.gob.mx/LeyesBiblio/pdf/CNPP_220120.pdf
78
Micronesia
https://www.legis.md/cautare/getResults?doc_id=12753&lang=ro
79
Moldova
https://www.legis.md/cautare/getResults?doc_id=12753&lang=ro
https://cancelaria.gov.md/sites/default/files/document/attachments/proiectul_28_0.pdf
80
Monaco
https://journaldemonaco.gouv.mc/Journaux/2016/Journal-8304/Loi-n-1.435-du-8-novembre-2016-relative-a-la-lutte-contre-la-criminalite-technologique
https://www.legimonaco.mc/305/legismclois.nsf/ViewCode/E8A2881850417B7EC125807A002EDBDD!OpenDocument
81
Montenegro
http://www.ekip.me/download/Zakon%20o%20elektronskim%20komunikacijama.pdf
https://clfr.globalnetworkinitiative.org/country/montenegro/
82
Morocco
http://adala.justice.gov.ma/production/legislation/ar/civil/AR5584_1-07-129_3879_10.htm
http://adala.justice.gov.ma/production/html/ar/188917.htm
83
Mozambique
http://www.vertic.org/media/National%20Legislation/Mozambique/MZ_Codigo_de_Processo_Penal.pdf
https://clfr.globalnetworkinitiative.org/country/mozambique/
84
Myanmar (formerly Burma)
https://www.burmalibrary.org/docs23/2013-10-08-Telecommunications_Law-en.pdf
85
Nepal
http://www.tepc.gov.np/uploads/files/12the-electronic-transaction-act55.pdf
86
Netherlands
https://wetten.overheid.nl/BWBR0001903/2019-06-01
87
New Zealand
http://www.legislation.govt.nz/act/public/2013/0091/latest/DLM5177923.html
http://www.legislation.govt.nz/act/public/2012/0024/175.0/DLM2136536.html
88
Nigeria
https://www.cert.gov.ng/ngcert/resources/CyberCrime__Prohibition_Prevention_etc__Act__2015.pdf
https://www.ncc.gov.ng/docman-main/legal-regulatory/regulations/839-lawful-interception-of-comunications-regulations-1/file
89
North Macedonia (formerly Macedonia)
https://www.state.gov/reports/2019-investment-climate-statements/north-macedonia/
90
Norway
https://news.bloomberglaw.com/privacy-and-data-security/norway-would-monitor-encryption-tech-under-new-strategy
91
Oman
https://www.omantel.om/wcm/connect/8b3a12b1-7da6-4a59-9194-97831bb07c53/1_TelecomAct-English.pdf?MOD=AJPERES&CVID=lkMuRIh
https://muscatdaily.com/layout/set/print/Archive/Stories-Files/Encryption-Law-in-Oman-5cup/(language)/eng-GB
92
Pakistan
http://www.pakistancode.gov.pk/english/UY2FqaJw1-apaUY2Fqa-apaUY2Jvbp8%3D-sg-jjjjjjjjjjjjj
https://www.pta.gov.pk/media/monitoring_telephony_traffic_reg_070510.pdf
https://privacyinternational.org/state-privacy/1008/state-privacy-pakistan
93
Philippines
https://www.privacy.gov.ph/memorandum-circulars/npc-circular-16-01-security-of-personal-data-in-government-agencies/#8
https://www.privacy.gov.ph/data-privacy-act/
https://www.lawphil.net/statutes/repacts/ra2012/ra_10175_2012.html
94
Poland
http://isap.sejm.gov.pl/isap.nsf/download.xsp/WDU20041711800/U/D20041800Lj.pdf
https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/poland
95
Portugal
https://sherloc.unodc.org/res/cld/document/prt/2009/cybercrime_law_of_portugal_html/Law_109-2009_cybercrime_law.pdf
https://clfr.globalnetworkinitiative.org/country/portugal/
96
Russia
http://pravo.gov.ru/proxy/ips/?docbody=&prevDoc=102072404&backlink=1&&nd=102147413
https://www.wto.org/english/thewto_e/acc_e/rus_e/WTACCRUS58_LEG_369.pdf
http://www.consultant.ru/document/cons_doc_LAW_61798/9ab7abe2b9fe407f507610f7e6e14a951d575585/
https://www.kommersant.ru/doc/4165544
https://sozd.duma.gov.ru/bill/729516-
7
https://globalcompliancenews.com/russia-importation-and-local-use-of-encryption-based-products-in-russia-and-the-eurasian-economic-union-26082020-2
/
https://www.hrw.org/news/2020/06/18/russia-growing-internet-isolation-control-censorship
97
Rwanda
https://minict.gov.rw/fileadmin/Documents/Mitec2018/Policies___Publication/ICT_Laws/Law_on_prevention_and_punishment_of_cyber_crimes.pdf
98
Saint Lucia
http://www.easterncaribbeanlaw.com/wp-content/uploads/2014/07/INTERCEPTION-OF-COMMUNICATIONS-ACT-Cap.3.12.pdf
99
Saint Vincent and the Grenadines
http://www.oas.org/juridico/spanish/cyb_svg_electronic_act_2007.pdf
100
Samoa
https://www.ilo.org/dyn/natlex/docs/ELECTRONIC/102756/124332/F305888617/WSM102756.pdf
https://www.regulator.gov.ws/images/Act/TELECOMMUNICATIONS_ACT_2005_-_Eng.pdf