Indeed, article 13 of the new law defines any act of damage to networks oftelecommunications or systems of information as a terrorist act. For this, sanctionscan range from 5 years to 20 years in prison with a fine whose value varies between50,000 and 100,000 dinars.
In article 15, Bill shows specific on the matter of transport and facilitation oftransport of electronic or computer hardware or software that could be used todesign, manufacture, or carry biological, chemical or nuclear weapons.
Then, it is in article 30 Bill considers the fact to glorify a terrorist or a terroristorganization as well as his ideas and opinions as part of a terrorist act. Thus, astraightforward interpretation of this article states that any publication on twitter orFacebook where its owner shows its support to terrorist groups is consideredbeautiful is good as a terrorist in the eyes of the law. He is liable to a term ofimprisonment with the maximum period of 5 years and a fine ranging from 5 to 10thousand dinars.
In article 33, the Andalucian draft Bill considered terrorist action to provideequipment, web sites, documents, or photos for the doing of a terrorist crime. In thisarticle, the first question that comes to mind is the following: an a hosting spaceprovider is, thus, considered him as a terrorist? Because in this case, of great hostslike GoDaddy, OVH or even our own phone as operators themselves provide Cloudhosting solutions.
In article 49, Bill gives legal pole of counter-terrorism powers to decide on thedeletion or censorship of audio / audiovisual or digital publications, or computerdata that are related to acts of terrorism.
About this axis, the question that should be asked is the framing content types thatmay or may not be relayed by the media in the context of their journalistic work.Thus, if an online media relays a screenshot of an account that publishes photospraising terrorism be obliged to censor the content?
PIs: How will this pole delete it? By contacting the administrator of support bysending him a requisition with a receipt of the requisition processing time? Or willthey be granted the right to hack says digital media and delete the contents? Andthen, how will they do with foreign media/media? Are they going to send themrequisitioning 'international '? Or apply this procedure only with the media/mediabased/hosted in Tunisia?
The people's representatives Assembly continues the discussion of the anti-terrorism Act in commissions. We concentrated on the pane ICT of this law whichprovides for fines and penalties of prisons for all those who broadcast messagesglorifying terrorists on the Net as well as those who use ICTs to sow terror (read thefirst part of the article by clicking here). In this second part continues to unravelother aspects ICT of the said Act.
In article 52 of this Bill, it is the issue of interception of communications which isprocessed. And this interception of communications includes traffic data, of listening, of the exploration of the content of communications, the fact to save, orcopy. The article quotes so the need for involvement of the technicaltelecommunications Agency (A2T), telecommunications operators, access networksoperators, access and internet service providers, etc.
The duration of an interception operation may not last more than four months,renewable one time and cannot be triggered only by a decision of the public prosecutor or a judge of investigation.
In the event that the interception operation does not result in a criminal trial, article54 provides that the data collected are subject to protection such as those dictatedby the laws of the area of protection of personal data. That said, it makes sense tomention that the Bill cites no reference to these laws in question!