WARNING: This legislation is over 10 years old.
The HTML structure of old legislation was often quite different, and so we may not have extracted it all correctly. Titles, chapters, articles, paragraphs, recitals, annexes, and footnotes could be missing.
Be sure to reference the official source document.
It looks like you're a bot or automated crawler (sorry if you're not).
We don't generate full content for automated requests.
For the full experience, please visit with a regular browser.
Article 1: Subject matter
Article 2: Definitions
Article 3: Illegal access to information systems
Article 4: Illegal system interference
Article 5: Illegal data interference
Article 6: Illegal interception
Article 7: Tools used for committing offences
Article 8: Incitement, aiding and abetting and attempt
Article 9: Penalties
Article 10: Liability of legal persons
Article 11: Sanctions against legal persons
Article 12: Jurisdiction
Article 13: Exchange of information
Article 14: Monitoring and statistics
Article 15: Replacement of Framework Decision 2005/222/JHA
Article 16: Transposition
Article 17: Reporting
Article 18: Entry into force
Article 19: Addressees
Recitals
Recital 1
Recital 2
Recital 3
Recital 4
Recital 5
Recital 6
Recital 7
Recital 8
Recital 9
Recital 10
Recital 11
Recital 12
Recital 13
Recital 14
Recital 15
Recital 16
Recital 17
Recital 18
Recital 19
Recital 20
Recital 21
Recital 22
Recital 23
Recital 24
Recital 25
Recital 26
Recital 27
Recital 28
Recital 29
Recital 30
Recital 31
Recital 32
Recital 33
Recital 34
Definitions
computer data
information system
legal person
without right
Footnote p0: Done at Brussels, 12 August 2013.