Comparative perspectives on cybercrime legislation in Nigeria and the UK - a case for revisiting the "hacking" offences under the Nigerian Cybercrime Act 2015
Nigeria recently passed a cybercrime law which criminalises certain activities. This paper analyses the provisions of the law on unauthorised access into computer systems. It addresses two significant shortcomings of the law. First, it argues that the omission or failure to criminalise bare unauthorised access or 'basic hacking' into computer systems is inimical to the overall effectiveness of the provisions of the law dealing with unauthorised access. Second, it contends that it is unnecessary and counter-productive for the law to include a finite list of further offences that a hacker may intend to commit. In identifying the possible interpretation, implementation and enforcement challenges of the law, the paper examines the UK Computer Misuse Act (CMA) 1990 and the rationale of the Law Commission in proposing the 'basic hacking' offence. The paper concludes that although perceptions of cybercrime and cybercriminals are relative to social contexts and differ across jurisdictions, criminalisation and punishment for 'basic hacking' demonstrates recognition for the threats posed by hacker and is an increasingly significant way to deter hackers and improve cybersecurity at national and international levels.
EJLT is an open access journal, aiming to disseminate academic work and perspectives as widely as possible to the benefit of the author and the author’s readers. It is the assumption of the EJLT that authors who publish in the journal wish their work to be available as freely and as widely as possible through the open access publishing channel.
Authors who publish with EJLT will retain copyright and moral rights in the underlying work but will grant all users the rights to copy, store and print for non-commercial use copies of their work. Commercial mirroring may also be carried out with the consent of the journal. The work must remain as published – without redaction or editing – and must clearly state the identity of the author and the originating EJLT url of the article. Any commercial use of the author’s work - apart from mirroring - requires the permission of the author and any aspects of the article which are the property of EJLT (e.g. typographical format) requires permission from EJLT.
Authors can sometimes become no longer contactable (through, for example, death or retirement). If this occurs, any rights in the work will pass to the European Journal of Law and Technology which will continue to make the work available in as wide a manner as possible to achieve the aims of open access and ensuring that an author's work continues to be available. An author - or their estate - can recover these rights from EJLT by providing contact information.
The European Journal of Law and Technology holds rights in format, publication and dissemination.
EJLT, as a non-commercial organisation - which receives donations to allow it to continue publishing – must retain information on reader access to journal articles. This means that we will not give permission to mirror the journal unless we can be provided with full details as to reader access to each and every journal article. We prefer and encourage deep linking rather than mirroring. Encouragement is thus given for all users – commercial and non-commercial – to provide indexes and links to articles in the EJLT where the index or link points to the location of the article on the EJLT server, rather than to stored copies on other servers.
Please contact the European Journal of Law and Technology if you are in any doubt as to what this statement of use covers.