{"id":1675,"date":"2006-10-15T00:00:00","date_gmt":"2006-10-15T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/10\/15\/saudi-passes-cybercrime-laws\/"},"modified":"2021-12-30T11:39:47","modified_gmt":"2021-12-30T11:39:47","slug":"saudi-passes-cybercrime-laws","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/10\/15\/saudi-passes-cybercrime-laws\/","title":{"rendered":"Saudi passes cybercrime laws"},"content":{"rendered":"<p>The council responsible for enacting laws in Saudi Arabia has passed the Kingdom\u2019s first legislation to address the rise in electronic crime..  The 120-member Shoura Council last week approved all 16 sections of the law, which deals with offences such as hacking, defamation and the spread of terrorism.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The maximum punishment under the new legislation is a prison sentence of ten years and a fine of US$1.3million, which can be imposed on anyone found guilty of hacking into government networks to steal information related to national security or using the internet in support of terrorism.<\/p>\n<p>Any person who gains unauthorised access to a public network or who installs viruses on that network will be subject to a fine of around US$800,000 and\/or up to four years in prison.<\/p>\n<p>http:\/\/www.itp.net\/news\/details.php?id=22318&#038;srh=&#038;tbl=itp_news<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1675","post","type-post","status-publish","format-standard","hentry","category-regulations"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1675"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1675\/revisions"}],"predecessor-version":[{"id":4162,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1675\/revisions\/4162"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}