ChapterPDF Available

Case Update - #PairOfButtocks: Uganda v. Stella Nyanzi

Authors:

Figures

No caption available
… 
No caption available
… 
No caption available
… 
No caption available
… 
No caption available
… 
Content may be subject to copyright.
An Annual
Publication of
Human Rights
Awareness and
Promotion Forum
The Computer Misuse Act, 2011:
Yet Another Legal Fetter to the
Basic Rights and Freedoms of
Marginalised Persons
FOURTH ISSUE - NOVEMBER 2017
SOURCE: hps://www.shuerstock.com
THE
HUMAN RIGHTS
ADVOCATE
FOURTH ISSUE - NOVEMBER 2017
The Computer Misuse Act, 2011: Yet Another Legal Fetter to
the Basic Rights and Freedoms of Marginalised Persons
An Annual Publicaon of Human Rights Awareness and Promoon Forum
NOVEMBER 2017
Copyright: Human Rights Awareness and Promoon Forum (HRAPF), 2017
Human Rights Awareness and Promoon Forum (HRAPF)
Plot 390, Professor Apolo Nsibambi Road,
Namirembe, Kampala
P.O. Box 25603, Kampala – Uganda
Tel: +256-414-530683 or +256-312-530683
Email: info@hrapf.org Website: www.hrapf.org
The Human Rights Advocate | Fourth Issue - November 2017
4
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
EDITOR’S NOTE
It is my pleasure to present to you the fourth issue of
The Human Rights Advocate. This magazine is an annual
publicaon of Human Rights Awareness and Promoon
Forum (HRAPF) that focuses on how parcular laws or bills aect
the rights of Ugandans, especially marginalised persons. Each
issue is dedicated to one law or bill that is analysed by various
writers from dierent angles.
HRAPF is an independent, not-for-prot, non-parsan and non-
governmental organisaon, which aims to raise awareness and
defend the rights of marginalised groups in Uganda. HRAPF
strives to advocate for a legal regime that respects and promotes
the rights of marginalised persons. This is done through legal
research, legislave advocacy, legal and policy analysis, research
and documentaon and strategic ligaon. HRAPF also provides
access to jusce to marginalised groups through legal aid services
provision and legal empowerment.
This fourth issue of The Human Rights Advocate is dedicated to the
Computer Misuse Act, 2011. This law came under the spotlight
recently when the state used its provisions to charge renowned
academic, social media acvist and government cric Dr. Stella
Nyanzi. Through the online social media plaorm, Facebook, Dr.
Nyanzi had used language with sexual imagery to cricise the
government for its failure to live up to its promises to provide
girls with sanitary pads. In one parcular post, she had reportedly
referred to the President as a ‘pair of buocks’ - something that
aracted the charge of cyber harassment under secon 24 of
the Act. Her other posts were met with the charge of ‘oensive
communicaon’ under secon 25 of the same Act. On an earlier
occasion, secon 25 was used to charge Mr. Robert Shaka who
was thought to be the person using the account of Tom Voltaire
Okwalinga (TVO) on Facebook to crique the president and key
government ocials. It was also used against Mr. Swaibu Nsamba
who posted a photoshopped picture of President Museveni in a
con to show how he would celebrate the President’s death.
However, prior to the Dr. Nyanzi, TVO and Swaibu Nsamba cases,
this law was already being implemented, albeit without much
public aenon, against LGBTI persons. HRAPF had registered
two cases where suspected members of the LGBTI community
were charged under secon 25 of the Computer Misuse Act for
sending an SMS and posng photos on Facebook, respecvely. In
the view of HRAPF’s legal team, the communicaons could not
be classied as ‘oensive’ as understood in the context of the
Act. The fact that only members of marginalised communies or
government crics are charged under the Act, and this following
acons to which the applicaon of the Act is quesonable, shows
that the Computer Misuse Act is being implemented in a targeted
way.
The Computer Misuse Act, according to its long tle, was enacted
‘to make provision for the safety and security of electronic
transacons and informaon systems; to prevent unlawful access,
Editorial Team
Editor
Adrian Jjuuko
Sub-editor
Joaninne Nanyange
Reviewer
Linee Du Toit
An Annual
Publication of
Human Rights
Awareness and
Promotion Forum
The Computer Misuse Act, 2011:
Yet Another Legal Fetter to the
Basic Rights and Freedoms of
Marginalised Persons
FOURTH ISSUE - NOVEMBER 2017
Human Rights Awareness and Promoon Forum (HRAPF) 5
www.hrapf.org
abuse or misuse of informaon systems including
computers; to make provision for securing the
conduct of electronic transacons in a trustworthy
electronic environment and to provide for other
related maers.’ The Act has penal sancons on
computer misuse and also deals with the use
of computer programs, references to programs,
data content modicaon, authorised access,
invesgave measures and procedures. It thus
has good intenons, and if applied appropriately,
could adequately deal with cybercrime.
HRAPF’s concern with the law is the vagueness
of some of its provisions and the targeted
prosecuons of unpopular minories, their allies,
and government crics. Secon 25 of the Act is
parcularly problemac. It creates the oense
of oensive communicaons. The provision is
vague and thus open to subjecve interpretaon
by the law enforcers. It is thus becoming the
weapon of choice by prosecutors for use against
marginalised persons, their allies and government
crics. It joins a long list of vague provisions that
are used to jusfy the arrest of LGBTI persons
and other marginalised persons. Such a provision
cannot meet the constuonal requirement that
criminal oences be well-dened, and the limited
condions under which the right to freedom of
expression may be limited.
It is upon this background that HRAPF has decided
to elicit academic reecons and opinions and to
publish them in this fourth issue of The Human
Rights Advocate. The purpose of this issue is to
draw the aenon of the public to the connuing
need to ght the eects of this law, and similar
laws, in order to protect and promote the
enjoyment of human rights in Uganda.
The magazine contains an editorial, an overview
of the Act, a feature, legal and human rights
analyses, opinions, and commentaries. The
editorial discusses the vague nature of secon 25
and calls for a revision of this parcular provision.
It is followed by the overview of the Act, which
discusses the contents and context of the Act.
This is followed by a legal analysis of the dierent
provisions based on freedom of expression and
the right to privacy. A comparave analysis of
similar laws in India, Tanzania and the UK follows.
This is followed by an analysis on how the Act
fares as regards the internaonal human rights
framework. A commentary on the impact of
the Act for sexual minories follows; and then
an opinion on how the Act aects Ugandan
communicators. This is followed by a commentary
on how the Act silences dissenng voices; and
nally, a commentary on the rule of law in today’s
Uganda. Two case updates follow, and the rst
one is uniquely wrien by Dr. Stella Nyanzi, the
subject of the legal processes; and the second
one is on the Robert Shaka case. The Appendix
contains HRAPF’s statement on the Stella Nyanzi
prosecuon and the full text of the Act.
As with the previous issues of this magazine,
arcles have been contributed by a variety of
authors represenng civil society, academia and
the legal profession. The organisaon would like
to give a special word of thanks to the external
authors contribung to this issue: Mr. Edward
Ssemambo of Kizza, Tumwesige & Ssemambo
Advocates and Board Chair, HRAPF; Ms. Linee
du Toit an independent researcher; Dr. Stella
Nyanzi of the Makerere Instute for Social
Research; Ms. Dorothy Mukasa of Unwanted
Witness Uganda; Ms. Arinda Daphine, a story-
teller, lawyer and poet and Mr. Andrew Karamagi,
a lawyer and polical acvist. We also thank
our sta, Jusne Balya, Susan Baluka, Patricia
Kimera, Joaninne Nanyange and Adrian Jjuuko for
contribung arcles.
We hope you nd this edion useful, and that the
arcles herein re-enforce awareness of the need
for deliberate advocacy against the use of the
over-broad provisions of the Computer Misuse
Act as well as such other vague and over-broad
laws to curtail the enjoyment of human rights by
unpopular persons and populaons in Uganda.
It is thus becoming the
weapon of choice by
prosecutors for use against
marginalised persons,
their allies and government
critics.
Adrian Jjuuko
Editor
The Human Rights Advocate | Fourth Issue - November 2017
6
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
Table of Contents
EDITOR’S NOTE 4
EDITORIAL 7
Secon 25 on Oensive Communicaons has no place in the Computer Misuse Act 7
OVERVIEW OF THE ACT 10
The Computer Misuse Act, 2011: Background and Overview 10
HUMAN RIGHTS ANALYSIS 14
The Computer Misuse Act and the Right to Freedom of Expression and Privacy 14
FEATURE 19
In kindred company: The Computer Misuse Act and the other vague and broad laws that threaten
the rights of sexual minories 19
COMPARATIVE PERSPECTIVE 27
Picking a leaf from other jurisdicons: What Uganda can learn from recent developments on oensive
communicaons laws in India, Tanzania and the UK 27
INTERNATIONAL LAW PERSPECTIVE 30
How does the Computer Misuse Act measure up to internaonal standards of privacy and
freedom of expression on the Internet? 30
COMMENTARY 35
Provisions of the Computer Misuse Act and how they violate constuonally protected rights
of LGBTI persons in Uganda 35
OPINION 39
For Ugandan communicators in the wake of Dr. Nyanzi’s arrest: how free is our freedom
of expression?* 39
COMMENTARY 42
How the Computer Misuse Act, 2011 silences dissenng voices 42
OPINION 43
Computer Misuse Act 2011: Rule of by law under pax Musevenica 43
CASE UPDATE 46
#PairOfBuocks: Uganda v. Stella Nyanzi 46
A CASE UPDATE 50
The case of Uganda v Robert Shaka 50
APPENDICES 51
1. HRAPF’ STATEMENT ON THE PROSECUTION OF DR. STELLA NYANZI 51
2. FULL TEXT OF THE COMPUTER MISUSE ACT 53
Human Rights Awareness and Promoon Forum (HRAPF) 7
www.hrapf.org
EDITORIAL
Secon 25 on Oensive Communicaons has no place in the Computer Misuse Act
The Computer Misuse Act, 2011 is an
important and mely law. There was lile
that law enforcers could do without an
eecve legal framework to curb computer cyber
crimes. Its long tle shows that indeed the law
was intended to control the misuse of computers
as it provides that it is an Act
…to make provision for the safety and
security of electronic transacons and
informaon systems; to prevent unlawful
access, abuse or misuse of informaon
systems including computers and to make
provision for securing the conduct of
electronic transacons in a trustworthy
electronic environment and to provide for
other related maers.
As is common with the regulaon of various social
aspects in Uganda, the Act takes the criminalisaon
approach and imposes heavy punishments for
acons that constute oences under the Act.
Most of the criminal oences deal with conduct
that is punishable. These include aspects like:
unauthorised modicaon of the contents of
computer material (secon 14); unauthorised
use or intercepon of electronic communicaons
(secon 15); unauthorised obstrucon of the
use of a computer (secon 16); unauthorised
disclosure of access codes or passwords (secon
17); unauthorised disclosure of informaon
(secon 18); electronic fraud (secon 19); child
pornography through computers (secon 23);
cyber harassment (secon 24); cyber stalking
(secon 26); provision for preservaon orders;
searches and seizures (secon 28); and provision
for the use of electronic evidence in legal
proceedings (secon 29).
SOURCE: hps://www.shuerstock.com
The Human Rights Advocate | Fourth Issue - November 2017
8
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
The only provision that if largely out of place is
secon 25 on oensive communicaon. This
is because whereas all the others focus on
using computers to harm others through fraud,
extoron, interference with systems, violaon
of children, among others, this provision focuses
on criminalising very broad conduct with the
intenon of protecng people (read the powerful)
from being oended. Vague and ineptly dened
provisions violate the right to a fair trial, while
protecon of people from being oended should
not be a legimate reason for the enactment of a
law as that is undue restricon which violates the
internaonal standards pertaining to the right to
freedom of expression.
These two aspects both aect the rights of
marginalised groups who are the ones most likely
to be accused of being oensive to others due
to their conduct or behaviour, and at the same
me they are also the ones most likely to be
targeted by vague provisions that have no clear
denion as this helps to have them arrested and
‘taught a lesson’. HRAPF has in the past, through
previous issues of this magazine and various other
advocacy tools and avenues, strongly opposed
such vague provisions, parcularly: Secon 44 of
the Non-Governmental Organisaons Act, 2016
which imposes undened obligaons upon Non-
Governmental Organisaons;1 provisions of the
now nullied An-Homosexuality Act 2014 on
the promoon of homosexuality and aiding and
abeng homosexuality;2 and the now nullied
secon 15(6)(d) of the Equal Opportunies
Commission Act which prevented the Equal
Opportunies Commission from invesgang
maers regarded as immoral or socially
unacceptable by the majority.3 The reason for
this opposion is the huge potenal and actual
impact of such vague provisions on the rights of
marginalised groups, parcularly LGBTI persons
and sex workers.
Secon 25 criminalises the wilful and repeated
use of ‘electronic communicaon to disturb
or aempt to disturb the peace, quiet or right
of privacy of any person without purpose
of legimate communicaon.’ Although the
head note, describes the oence asoensive
communicaon’, what is indeed covered in
the body of the provision is not oensive
communicaon but rather communicaon that
‘disturbssomeone else’s peace, quite or right of
privacy. What does it mean to ‘disturb the peace,
quiet or right of privacy’ of another person? Is
it sending many messages or publishing what is
untrue, or insulng them? What is the test? Do we
refer to the subjecve intenon of the accused
to oend or the subjecve experience of ‘being
oended’ by the person on the receiving end?
Which objecve measure should be used? What
it actually means is not clear, and so one cannot
be sure if what they are doing may be regarded
as oensive. This makes acons which can
constute the oence unpredictable and gives
law enforcer the discreon to pick and choose
what qualies as oensive. Indeed, any acon or
communicaon which has a sexual connotaon or
concerns sexuality expressed beyond the neatly-
drawn boundary lines of majoritarian views can
be regarded as ‘oensive’ and this explains why
LGBTI persons and other sexual minories are
most likely to bear the brunt of the law. Indeed,
this provision was used against Dr. Stella Nyanzi
because her Facebook posts had sexual imagery.
1 This was the subject of the third issue of The Human Rights
Advocate. The provision sll remains on the law books.
2 This was the subject of the second issue of The Human
Rights Advocate. The Act was declared unconstuonal on
procedural grounds by the Constuonal Court of Uganda
in the case of Prof. J Oloka Onyango & 9 Others v Aorney
General, Constuonal Peon No. 009 of 2014.
3 This was the subject of the rst issue of The Human Rights
Advocate. The provision was declared unconstuonal
by the Constuonal Court in the case of Jjuuko Adrian v
Aorney General, Constuonal Peon No. 001 of 2009.
HRAPF has in the past,
through previous issues of
this magazine and various
other advocacy tools and
avenues, strongly opposed
such vague provisions,
particularly: Section 44
of the Non-Governmental
Organisations Act, 2016 ...
Human Rights Awareness and Promoon Forum (HRAPF) 9
www.hrapf.org
Arcle 28(12) of the Constuon provides that
Except for contempt of court, no person shall be
convicted of a criminal oence unless the oence
is dened and the penalty for it prescribed by law.
This implies that in as far as what constutes this
oence is undened, it is unconstuonal and it
should not be applied. This provision therefore
violates Arcle 28(12) of the Constuon, as it
violates the fair trial guarantee that a criminal
oence should be well dened.
Besides its vagueness, Secon 25 also violates
the right to freedom of expression as it limits
the right beyond constuonally acceptable
limitaons. The Constuon, in Arcle 29(1)(a)
guarantees freedom of speech and expression,
which includes freedom of the press and other
media. The Supreme Court of Uganda, in Charles
Onyango Obbo & Andrew Mujuni Mwenda v Aorney
General4 made it clear that expression which
oends, shocks or disturbs is also protected. The
Court also made it clear that whereas the right
can be limited, this can only be so under parcular
circumstances, which meet the limitaon test laid
down in Arcle 43. Arcle 43(1) provides that
‘no person shall prejudice the fundamental or
other human rights and freedoms of others or
the public interest.’ Arcle 43(2)(c) provides that
the public interest shall not permit, among others:
polical persecuon, and ‘any limitaon of the
enjoyment of the rights and freedoms prescribed
by Chapter Four of the Constuon beyond what
is acceptable and demonstrably jusable in a
free and democrac society.’ The Supreme Court
found that this provision constuted a ‘limitaon
within a limitaon’ and that it was the right
rather than the limitaon that had to be given
prominence. From this analysis of freedom of
expression, it is quite clear that communicaons
that are oensive are sll protected under the
right to freedom of expression. Secon 25 is
therefore a violaon of this right, as it is a very
wide limitaon that covers very wide grounds,
and is not properly jused. Being oensive is
subjecve and such a subjecve ground should
not be the basis for liming a fundamental right.
The need to balance the protecon of individuals
from oensive communicaons with the freedom
of expression is important. Whereas individuals
should not be allowed to say all they want
without any restricons, the restricons must be
well understood and must serve a purpose that
is in the public interest, and which is jusable
4 Constuonal Appeal No.2 of 2002.
in a free and democrac society. To create this
balance, other countries do not criminalise
oensive communicaons at all, and those
that do, for example the United Kingdom, only
criminalise grossly oensive communicaons and
make it clear that the intenon must be to cause
annoyance, inconvenience, needless anxiety or
distress to the recipient. An example of such a law
is Secon 127 of the UK’s Communicaons Act
2003 which punishes ‘grossly oensive messages’.
However, even then, prosecutors are issued with
guidelines on how to handle such cases and
prosecuon is only allowed if doing so serves
the public interest. To avoid the provisions being
misused, the secon is limited to cases which go
beyond words that are ‘oensive, shocking or
disturbing; or sarical, iconoclasc or rude; or
the expression of unpopular; or unfashionable
opinion about serious or trivial maers, or banter
or humour, even if distasteful to some or painful
to those subjected to it’.5 No such clear denion
of an oensive communicaon is found in the
Computer Misuse Act and no such guidelines to
prosecutors have so far been issued.
Sexuality has always been used as an excuse
for clamping down on people, as it is a sensive
subject for most members of society. However,
this me, this excuse should not be accepted,
and Ugandans should see Secon 25 of the
Computer Misuse Act for what it is: an aempt
to se the voices of marginalised persons and
a connued ploy to deny both sexual minories
and polical opponents their rights and freedoms.
The Stella Nyanzi case should wake all of us up to
the fact that this law can be used against anyone
regardless of their posion in society. It is thus in
the best interests of everyone to oppose it.6
5 See The Crown Prosecuon Service ‘Guidelines on
prosecung cases involving communicaons sent via social
media’ available online at hp://www.cps.gov.uk/legal/a_
to_c/communicaons_sent_via_social_media/ (accessed
15 October 2017).
6 A constuonal challenge against the provision was already
launched in the case of Andrew Karamagi & Robert Shaka
v Aorney General, Constuonal Peon No. 5 of 2016,
which is sll pending before the Constuonal Court of
Uganda. We expectantly await the Constuonal Court ‘s
decision in this maer.
The Human Rights Advocate | Fourth Issue - November 2017
10
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
OVERVIEW OF THE ACT
The Computer Misuse Act, 2011: Background and Overview
Background
The Computer Misuse Act, No. 2 of 2011
started its life as the Computer Misuse Bill,
No. 23 of 2008. The Bill was prepared by
the Uganda Law Reform Commission, and tabled
before Parliament by the Minister of Informaon
and Computer Technology. It was one of the
three laws on computer usage that were later
passed by Parliament in 2011. The other two are:
The Electronic Signatures Act and The Electronic
Transacons Act. These two Acts are concerned
with streamlining and regulang electronic
economic transacons while the Computer
Misuse Act focuses on punishing the use of
computers to commit fraud and other crimes.
According to the Memorandum to the Computer
Misuse Bill, 2008, the Bill was intended to enable
the full ulisaon of the opportunies emanang
from the rise in the use of Informaon and
Communicaon Technologies in the country, and
as such create a conducive environment that
was free of abuse and misuse.1 The long Title to
the Act indeed captures this essence as it shows
that the Act was intended to prevent abuse and
misuse of informaon systems by regulang
the conduct of electronic transacons, and the
safety and security of informaon transmied
electronically.2
This arcle presents the Act as it stands today,
poinng out the salient features of the dierent
parts. It deals with each part of the Act separately:
1 Memorandum to the Computer Misuse Bill, No. 23 of
2008.
2 Long Title of the Computer Misuse Act, 2010.
Adrian Jjuuko
Execuve Director, HRAPF
Jusne Balya
Legal Assistant, HRAPF
Part I of the Act
This part contains commencement informaon
and interpretaon of terms used in the Act. The
Act was to come into force on a date appointed by
the Minister. The interpretaon secon contains
various denions of the key terms used in the
Act. A computer is dened in very wide terms to
refer to
an electronic, magnec, opcal,
electrochemical or other data processing
device or a group of such interconnected
or related devices, performing logical,
arithmec or storage funcons; and
includes any data storage facility or
communicaons facility directly related
to or operang in conjuncon with such a
device or group of such interconnected or
related devices.
This includes smart telephones, laptops, and
other such devices. Other terms dened include:
access, applicaon, content, data, informaon,
intercept, and program.
Part II of the Act: General Provisions
This part of the Act contains provisions that further
explain the meanings assigned to key terms used
in the Act, parcularly those concerning how data
is accessed or modied on a computer. These
terms include: ‘securing access’;3 using a program;4
authorised access;5 references;6 modicaon of
contents7 and unauthorised modicaon.8
Part III: Invesgaons and Procedures
This part of the Act provides for three orders,
which can be issued by court in relaon to
data on computers. These are: the preservaon
order; the disclosure of preservaon order; and
the producon order. The preservaon order is
issued at the request of an ocer invesgang the
3 The Computer Misuse Act, Sec 3.
4 Sec 4.
5 Sec 5.
6 Sec 6.
7 Sec 7.
8 Sec 8.
Human Rights Awareness and Promoon Forum (HRAPF) 11
www.hrapf.org
commission of any oence, to access, preserve
or procure any computer data necessary for the
invesgaon. The order is issued where data on a
computer is reasonably suspected to be in danger
of modicaon, loss or damage and yet that data
is reasonably necessary for the invesgaon
of an oence.9 The disclosure of preservaon
order is issued for data that has been preserved
to be disclosed to an ocer invesgang the
commission of an oence, no maer how or by
whom such data was stored or transmied.10 The
producon order enforces the giving of data on
a computer to an invesgang ocer in a format
in which it can be taken away and in which it is
visible and legible.11 The process of obtaining the
orders does not give the owner of the data or
the persons against whom the order is issued an
opportunity to appear in court and show cause as
to why the orders should not be issued. They are
issued enrely on the basis of what the person
applying for them says.
Part IV: Computer Misuse Oences
This part is the crux of the Act, as it puts in place
penal measures to punish computer misuse. The
oences created can be categorised based on the
nature of the oence. There are those concerning
fraud and exploitaon through computers; those
concerning access to computers and intercepon
of communicaons; and those involving
harassment of other persons.
The rst category of oences are those involving
fraud and exploitaon through computers, and
these are treated as the most serious oences
in the Act. They are punishable by a ne of
up to Uganda Shillings 7,200,000 Uganda or
imprisonment of up to 15 years, or both such
imprisonment and ne. Where the oence
involves ‘protected computers’, life imprisonment
can be imposed.12 Protected computers are
computers used for or in connecon with naonal
security and diplomac relaons, nancial services
or banking, communicaons infrastructure, public
ulies, public safety and emergency services.
Electronic fraud is one of the oences created. It
is dened as:
decepon deliberately performed
with the intenon of securing an
unfair or unlawful gain where part of a
9 Sec 9.
10 Sec 10.
11 Sec 11.
12 Sec 20.
communicaon is sent through a computer
network or any other communicaon
and another part through the acon of
the vicm of the oence or the acon is
performed through a computer network or
both.13
The other oences are: unauthorised modicaon,
which is about acts that impair the operaon of
the computer generally or access to the computer
or any of the programs/data on the computer;
14 unauthorised use or intercepon of computer
services which is dened to include, inter alia,
knowingly doing anything on a computer so as
to secure access to a computer service without
authorisaon;15 unauthorised obstrucon of use
of a computer;16 and unauthorised disclosure of
access codes.17
Another important oence that falls under this
category is child pornography. This is dened
to include pornographic materials that depict a
child engaged in sexually suggesve or explicit
conduct; a person appearing to be a child engaged
in sexually suggesve or explicit conduct; or
realisc images represenng children engaged
in sexually suggesve or explicit conduct.18 The
acts that constute the oence include: making
pornographic materials available to a child;19
producing child pornography for the purposes
of its distribuon through a computer; oering
or making available child pornography through
a computer; distribung or transming child
pornography through a computer; procuring child
pornography through a computer; or unlawfully
possessing child pornography on a computer.20
The second category is about unauthorised
access to computers and intercepon of
communicaons. These are punishable with a ne
of 4,800,000 Uganda shillings or imprisonment
for a period not exceeding 10 years, or both such
imprisonment and ne. This category includes
‘unauthorized access’ which is about unlawfully
adapng, producing, distribung, selling or using a
computer program designed to overcome security
13 Sec 19.
14 Sec 14.
15 Sec 15.
16 Sec 16.
17 Sec 17.
18 Sec 23(3).
19 Sec 23(2).
20 Sec 23(1).
The Human Rights Advocate | Fourth Issue - November 2017
12
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
protocols, or denying service to a legimate user.21
The category also includes ‘accessing with the
intent to commit or facilitate the commission
of another oence’;22 unauthorised use or
intercepon of computer data or service,23 and
unauthorised disclosure of informaon on a
computer.24
The third category are oences involving cyber
harassment. These are regarded as less serious
crimes and are punished with smaller nes and
imprisonment of less than ve years.
Secon 24 criminalises cyber harassment. This
is commied when a person uses a computer
to: ‘make any request, suggeson or proposal
which is obscene, lewd, lascivious or indecent’;
or to threaten someone with physical injury or
harm to their person or property; and knowingly
perming another person to use a computer for
any of the purposes listed. The punishment for
this is a ne of Uganda shillings 1,440,000 or
imprisonment not exceeding three years or both.
Secon 25 criminalises oensive communicaons.
Any person who ‘willfully and repeatedly uses
electronic communicaon to disturb or aempt
to disturb the peace, quiet or right of privacy
of any person with no purpose of legimate
communicaon whether or not a conversaon
ensues’ is liable to be convicted under it. It is
regarded as a misdemeanor and a convict is liable
to a ne not exceeding Uganda shillings 480,000
or imprisonment not exceeding one year or both.
It is perhaps the most controversial provision in
the Act as its vague and wide-sweeping provisions
make it a provision that is easy to abuse and to
use to unduly restrict freedom of expression.25
The nal oence under this category is ‘cyber
stalking’. This is commied when a person
‘willfully, maliciously, and repeatedly uses
electronic communicaon to harass another
person and makes a threat with the intent to
place that person in reasonable fear for his or her
safety or to a member of that person’s immediate
family. The crime aracts a punishment of
Uganda shillings 2,400,000 or imprisonment not
exceeding ve years or both.
21 Sec 12.
22 Sec 13.
23 Sec 15.
24 Sec 18.
25 For a full discussion of the human rights challenges posed
by this provision, see editorial to this issue above.
Aempts to commit an oence are also
criminalised, and contrary to the usual pracce
where these aract a lesser punishment, they
are punished the same way as the full oence.
Perhaps the reason for this is the conaon of
aempts with abetment in secon 21.
The Act requires compensaon to be ordered in
every case where a person is convicted. This a
mandatory requirement. The convict is supposed
to be ordered to pay the aggrieved party such
sum of money, which in the court’s opinion is
‘just, having regard to the loss suered by the
aggrieved party. The order of compensaon is
enforceable under the execuon provisions of the
Civil Procedure Act.
Part V: Miscellaneous Provisions of the Act
This secon contains provisions on enforcement
of the Act. These include: the powers of courts
to issue search and seizure orders; the evidenal
value of electronic informaon; the jurisdicon of
the courts under the Act including extra-territorial
jurisdicon; and the power of the Minister to
amend the schedule to the Act.
For search orders, a magistrate has powers to
issue an order for the search of any premises,
data or copies thereof that may be reasonably
suspected to be necessary, among others, for
the invesgaon of a suspected oence. Once
a search order is issued, the police ocer can
then search and seize any computer system or
applicaons that he/she reasonably believes are
concerned in the commission of a crime. Such an
ocer can demand for informaon from persons
in charge of the computer system or compel
service providers to provide informaon within
their technical abilies. It is a crime to hinder or
prevent the ocer from doing his/her work, and
a person found guilty is liable on convicon to a
ne not exceeding Uganda shillings 240,000 or
imprisonment not exceeding six months or both.26
The secon requires that police ocers execung
such search warrants ‘shall have due regard to the
rights and interests of a person aected by the
seizure to carry on his or her normal acvies.27
However, it does not in fact give the person
whose data is concerned the opportunity to show
cause why their privacy should not be so limited,
but merely oers the magistrate the right to issue
a carte blanche order of sorts, baring all personal
data of any individual before the state upon a
mere whim or suspicion.
26 Sec 28(7).
27 Sec 28(6).
Human Rights Awareness and Promoon Forum (HRAPF) 13
www.hrapf.org
It is important to note that the Act gives a meline
within which the seized computer system or
applicaon is to be returned and this should not
exceed 72 hours, unless an order extending the
me has been obtained from court.28
Secon 29 suspends the rules of evidence that
would render electronic evidence inadmissible
because it is in electronic form, or because it is
not in its original form. Such evidence should also
allowed where it is the best evidence that could
be obtained in the circumstances. Secon 29(7)
makes it clear that all other rules of evidence
apply without modicaon.
The Act has extra-territorial applicaon, which
means that it applies to anyone regardless of their
naonality or their presence in Uganda,29 provided
they were in Uganda at the me of commission
of the oence or the program used was based in
Uganda at that me.30
A Chief Magistrate or Magistrate Grade 1 has
powers to listen to any oences under the Act,
regardless of what other laws may provide as to
sentencing jurisdicon.31
Finally, the Minister of Informaon and Computer
Technology has powers to amend the only
schedule to the Act, which lays out the value of
a currency point.32 It is surprising that for such a
law, the Minister was not given powers to make
Regulaons for its enforcement.
Conclusion
The Computer Misuse Act, 2011 largely lives
up to its promise of enacng provisions aimed
at ensuring that computers are not abused or
used for fraud. However, some of its provisions
depart from the usual rules on punishments for
aempted oences; the rules of evidence and
those on jurisdicon. Also, it gives wide powers to
the police and courts as regards issuance of orders
under the Act, and yet it does not give the subject
of these orders a chance to show cause as to why
they should not be issued. Such provisions are
likely to be abused by law enforcement ocers.
The punishments, such as mandatory
compensatory orders, are deterrent and thus
28 Sec 28(8).
29 Sec 30(1).
30 Sec 30(2).
31 Sec 31.
32 Sec 32.
help to reduce on incidences of cybercrime.
The provisions on child pornography as well as
those on cyber stalking and cyber harassment are
wide and deterrent. The provision on oensive
communicaons ought to be removed from the
Act as it is vague and also goes against the right
to freedom of expression.
The Act is thus a welcome step in the protecon
of the privacy of personal data stored and shared
electronically, as well as protecon of the integrity
of computer systems and communicaons, but
it also presents enormous potenal for abuse in
the absence of adequate safeguards protecng
the fundamental rights to liberty, administrave
fairness, freedom of thought, conscience, opinion,
belief and expression as well as press freedom in
Uganda.
...it gives wide powers to
the police and courts as
regards issuance of orders
under the Act, and yet it
does not give the subject
of these orders a chance to
show cause as to why they
should not be issued. Such
provisions are likely to be
abused by law enforcement
officers.
The Human Rights Advocate | Fourth Issue - November 2017
14
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
HUMAN RIGHTS ANALYSIS
The Computer Misuse Act and the Right to Freedom of Expression and Privacy
Introducon
The rights to privacy and freedom of
expression are guaranteed in Uganda’s
Constuon1 and other regional and
internaonal human rights instruments that
Uganda is party to. The government of Uganda has
made eorts towards creang a legal and policy
environment to foster and regulate these rights
amidst ever-increasing reliance on technology
for informaon access, sharing and storage. This
is evidenced by the wide range of cyber-related
laws that have been recently enacted.2 While
such eorts are commendable, the exisng cyber
laws pose a grave danger to the enjoyment of
the online freedom of expression and the right to
privacy.3 One law that requires parcular focus is
the Computer Misuse Act, 2011. The long tle to
the Computer Misuse Act spulates that it is
‘an Act meant to make provision for
the safety and security of electronic
transacons and informaon systems; to
prevent unlawful access, abuse or misuse of
informaon systems including computers
1 See Arts 41, 27 and 29 of the Constuon of the Republic
of Uganda, 1995.
2 These include: The An-Terrorism Act, 2002; The Naonal
Informaon Technology Authority Uganda Act, 2010;
The Regulaon of Intercepon of Communicaons Act,
2010; The Electronic Signatures Act 2011; The Computer
Misuse Act 2011; The Electronic Transacons Act 2011;
The Uganda Communicaons Act 2013; and The An-
Pornography Act 2014.
3 Collaboraon on Internaonal ICT Policy in East and
Southern Africa (2014), State of Internet Freedoms in Uganda
2014: An Invesgaon into Policies and Pracces Dening
Internet Freedom in Uganda. Available online at hps://
cipesa.org/?wp_dl=181(accessed on 26 September
2017).
and to make provision for securing the
conduct of electronic transacons in a
trustworthy electronic environment.4
This is a clear indicaon that the Act was
enacted primarily to provide for privacy and data
protecon rights of internet and computer users.
The Act however has provisions that have the
potenal to infringe upon the right to freedom
of expression to an extent that is not in line with
domesc, regional and internaonal human rights
standards.
This arcle examines certain key provisions of the
Computer Misuse Act 2011 in relaon to the right
to freedom of speech and expression, as well as
the right to privacy.
The Right to Freedom of Expression
Domesc context
Arcle 29(1) of the 1995 Constuon of the
Republic of Uganda spulates that every individual
shall have the right to freedom of expression,
which includes the right to freedom of press and
other media. This right is not absolute and while
it does not have a specic clawback clause, the
parameters for its restricon can be found in
Arcle 43 of the Constuon. The Arcle is to
the eect that in the enjoyment of human rights
and freedoms spulated in Chapter Four of the
Constuon, no person shall prejudice the rights
and freedoms of other individuals or the public
interest. The Arcle further states that public
interest shall not permit polical persecuon or
violaon of a right beyond what is jusable in a
free and democrac society. The Supreme Court
of Uganda in the case of Charles Onyango Obbo
& Andrew Mujuni Mwenda v Aorney General5
discussed this limitaon and found that the
limitaon itself, has a further limitaon showing
clearly that the right has to be given more
prominence than the limitaon, and the limitaon
must be jused, and legimate in order to be in
public interest.
The Regional Context
The African Charter on Human and Peoples’
4 The Uganda Gazee, Acts Supplement No. 2 (2011).
5 Constuonal Appeal No.2 of 2002.
Susan Baluka
Legal Ocer, HRAPF
Human Rights Awareness and Promoon Forum (HRAPF) 15
www.hrapf.org
Rights (African Charter) also provides for
freedom of expression and opinion, as long as
such expression is within the limits of the law.6
The African Charter, limits this right through
the general limitaon clause in arcle 27(2).
The limitaon clause is to the eect that all the
individual rights and freedoms recognised in the
Charter shall be exercised ‘with due regard to the
rights of others, collecve security, morality and
common interest.’ The African Commission on
Human and Peoples’ Rights (African Commission)
adopted the Declaraon of Principles on Freedom
of Expression in Africa. The Declaraon armed
freedom of expression as ‘a fundamental and
inalienable human right and an indispensable
component of democracy.7 It further stated that
‘Any restricons on freedom of expression shall
be provided by law, serve a legimate interest
and be necessary in a democrac society.8 The
requirement that the limitaon be provided for by
law does not simply mean that any law qualies. It
must be a law of general applicaon as the African
Commission noted and held in Constuonal
Rights Project and others v Nigeria.9 In that case, the
military government in Nigeria had made decrees
specically naming the newspapers that were
not allowed to operate in Nigeria. The African
Commission found this to contravene Arcle 9
on freedom of expression. On serving legimate
interests, and necessity, the state must show
what those interests are why the law is necessary.
Here the proporonality test is applied. The
extent of the limitaon must be proporonate
to the interests that have to be protected. In
Independent Journalists Associaon of Zimbabwe,
the Zimbabwe Lawyers for Human Rights, the Media
Instute for Southern Africa v Zimbabwe,10 the
African Commission stated that proporonality
is about balancing between the ‘protecon of
the rights and freedoms of the individual and the
interests of the society as a whole.
The Commission stated that
6 Art 9(2) of the African Charter on Human and Peoples’
Rights.
7 The African Commission on Human and Peoples’ Rights
‘Resoluon on the Adopon of the Declaraon of Principles
on Freedom of Expression in Africa’ Adopted at The African
Commission on Human and Peoples’ Rights, meeng at
its 32nd Ordinary Session, in Banjul, The Gambia, from
17th to 23rd October 2002, Para I(1) hp://www.achpr.
org/sessions/32nd/resoluons/62/ (accessed 21 October
2017).
8 Above, Para II (2).
9 (2000) AHRLR 227 (ACHPR 1999) Para 44
10 Communicaon No.297 of 2005.
‘In determining whether an acon is proporonate,
the Commission will have to answer the following
quesons:
• Were there sucient reasons supporng the
acon?
• Was there a less restricve alternave?
• Was the decision-making process procedurally
fair?
• Were there any safeguards against abuse?
• Does the acon destroy the very essence of the
Charter rights in issue?11
The noon of proporonality was further
discussed by the African Court in Lohe Issa
Konate V Burkina Faso,12 where a sentence of
12 months’ imprisonment, a ne of USD 2,900
and a compensaon fee of USD 7,800 that
were imposed against two editors of a weekly
newspaper in Burkina Faso for publishing a
libelous arcle against an allegedly corrupt state
prosecutor was held to be in contravenon of the
right to freedom of expression as provided for
under Arcle 9 of the African Charter. The Court
reasoned that the sentence was disproporonate
to the purpose that the impugned provisions of
the Informaon and Criminal Codes of Burkina
Faso sought to serve; which was to protect the
honor and reputaon of persons working in public
oces. The Court found that the provisions were
a disproporonate interference with the exercise
of the right to freedom of expression, exceeding
the bounds of necessity and unanimously ordered
Burkina Faso to amend its criminal defamaon
laws by repealing custodial sentences for acts
of defamaon. Indeed, following this decision,
Burkina Faso has since amended its criminal
defamaon laws.13
Therefore from the above analysis, secon 24
and 25 of the Computer Misuse Act have to be
jused by the state and a balance made as to
whether they are proporonate to the mischief
that they seek to address.
11 Above. Para 176.
12 Applicaon No.004 of 2013 available online at hp://
www.ijrcenter.org/2015/02/03/african-court-addresses-
freedom-of-expression-in-burkina-faso-in-landmark-
judgment/
13 The ACTHPR Monitor, Protecng the Safety of Journalists:
The Role of the African Court available at hp://www.
acthprmonitor.org/protecng-the-safety-of-journalists-
the-role-of-the-african-court/(Accessed on 22 October
2017).
The Human Rights Advocate | Fourth Issue - November 2017
16
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
The Internaonal Context
Arcle 19(2) of the Internaonal Covenant on
Civil and Polical Rights provides for the right
to freedom of expression, which includes the
right to seek, receive and impart informaon.
As already menoned, this right can only be
restricted for the purpose of respecng the rights
and reputaons of other individuals, as well as
protecng naonal security, public order and
public morals. The Human Rights Commiee has
stated that the right to freedom of expression
extends to both electronic and internet-based
plaorms.14 It has further stated that aacks on
individuals, including arbitrary arrests, because of
the exercise of their right to freedom of opinion
or expression are not a jusable restricon on
the right to freedom of expression. Addionally,
laws that restrict freedom of expression must be
clear on which sorts of expressions are limited
and which ones are not, and they must not give
unfeered discreon to those charged with their
14 Human Rights Commiee (2011), General Comment No.
34 to Arcle 19 of the Internaonal Covenant on Civil and
Polical Rights, para 23, available online at hp://www2.
ohchr.org/english/bodies/hrc/docs/gc34.pdf (Accessed on
27 September 2017).
execuon to restrict freedom of expression.15
The Computer Misuse Act and the aforemenoned
standards
Secon 25 of the Computer Misuse Act creates
the oence of oensive communicaon.
The Secon is to the eect that any person
who wilfully and repeatedly uses electronic
communicaon to disturb the peace, quiet or right
to privacy of any other person, with no purpose
of legimate communicaon and whether or not
a conversaon ensues, commits a misdemeanor,
and is liable on convicon to a ne not exceeding
24 currency points and 1 year’s imprisonment in
the alternave. This provision does not provide
clear guidance as to what communicaon
amounts to ‘disturbing of the peace,’ neither does
it disnguish between legimate and illegimate
communicaon. As such, the provision gives
leeway to law enforcement ocials to apply
their individual interpretaons on whether a
communicaon is illegimate and amounts to
disturbance of the peace. This is in contravenon
of aforemenoned principles that have been
enunciated by the Human Rights Commiee.16
The danger posed by this provision was
demonstrated when it was used to arrest and
prosecute Dr. Stella Nyanzi, a human rights acvist
that ardently cricised President Museveni, for
repeatedly using the social media plaorm of
Facebook to post messages that were allegedly
meant to ‘disturb the peace of the president’.17 By
not clearly dening what amounts to disturbance
of the peace and illegimate communicaon,
Secon 25 of the Computer Misuse Act gives
unfeered discreon to law enforcement
ocials to unjusably restrict individuals’ right
to freedom of expression and subject them to
arbitrary arrest, contrary to the spirit of Arcle 19
of the Internaonal Covenant on Civil and Polical
Rights and Arcle 29(1) of the 1995 Constuon
of the Republic of Uganda.
The non-compliance of Secon 25 of the
Computer Misuse Act with the standard of
certainty and clarity as a key feature of legislaon
that limits the right to freedom of expression can
further be demonstrated in the decision of the
Constuonal Court in East Africa Media Instute
15 Above, para 15.
16 Above.
17 The Guardian, 23rd April 2017, How Insults and Campaign
Over Sanitary Towels Landed Acvist in Jail, accessed at
hps://www.theguardian.com/world/2017/apr/22/acvist-
uganda-president-buocks-jail-stella-nyanzi (Accessed on 27
September 2017).
Additionally, laws that
restrict freedom of
expression must be
clear on which sorts of
expressions are limited
and which ones are not,
and they must not give
unfettered discretion to
those charged with their
execution to restrict
freedom of expression.
Human Rights Awareness and Promoon Forum (HRAPF) 17
www.hrapf.org
and Andrew Mwenda v Aorney General18, where
similarly broad and vague provisions of Secons
39 and 40 of the Penal Code Act creang the
oence of sedion were held to be too vague
to warrant a jusable limitaon of the right
to freedom of speech and expression. Secon
25 of the Computer Misuse Act is essenally a
recurrence of the nullied sedion provisions, the
vagueness of which was exploited by government
to wantonly subject individuals that voiced
dissenng and crical opinions and issues against
it to criminal prosecuon.19
Secon 24 of the Computer Misuse Act also makes
it an oence for an individual to use a computer
to make a request, proposal or suggeson that
is obscene, lewd, lascivious or indecent. From
the onset, this provision would be within the
protecon of public morals as an excepon to
observance of the right to freedom of expression.
However, the ‘morals’ excepon is not to be
unfeered.20 Any limitaon must be within what is
necessary and jusable in a free and democrac
18 Consolidated Constuonal Peons No. 12 of 2005 and
No. 3 of 2006
19 Human Rights Watch A Media Mineeld: Increased Threats
to Freedom of Expression in Uganda (2010) available online
at hps://www.hrw.org/report/2010/05/02/media-
mineeld/increased-threats-freedom-expression-uganda
(Accessed on 22 October 2017).
20 Arcle 19 Freedom of Expression Handbook (1998)
available online at hps://www.arcle19.org/data/les/
pdfs/publicaons/1993-handbook.pdf (Accessed on 27
September 2017).
society.21 The broad criminalisaon of obscene,
lewd, lascivious and indecent suggesons,
proposals and requests under Secon 24 of the
Computer Misuse Act, without specifying the
circumstances under which it is prohibited leaves
room for it to be applied arbitrarily to limit the
right to freedom of expression.
Addionally, as regards the principle of
proporonality, while both Secons 25 and 24
of the Act seek to protect the quiet enjoyment
of various forms of electronic media by their
users, such an aim, when juxtaposed against
the right to freedom of expression in a free and
democrac society, does not warrant the placing
of criminal sancons on communicaon that some
individuals may or may not nd oensive. Indeed,
as pointed out by the African Court in Lohe Issa
Konate V Burkina Faso,22 criminal sancons are not
a jusable limitaon on the exercise of the right
to freedom expression. The balance between the
individual right to privacy and the right to freedom
of expression is suciently catered for by civil law
in the torts of defamaon and nuisance.
The Right to Privacy
Domesc Context
Arcle 27 of the 1995 Constuon of Uganda
provides for the right to privacy of informaon
wherein it spulates that no person shall be
subjected to interference with the privacy of
21 Art 43(2)(c) of the Constuon of the Republic of Uganda,
1995.
22 n 12 above.
SOURCE: hps://www.shuerstock.com
The Human Rights Advocate | Fourth Issue - November 2017
18
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
their correspondence, communicaon or other
property. The right to privacy, as are other
non-derogable rights provided for in the bill
of rights, is subject to limitaon on grounds of
protecon of the rights of other individuals and
the public interest, as spulated in Arcle 43 of
the Constuon. In Uganda, this right has mainly
been limited on the basis of protecng the public
interest, specically, the need to ensure naonal
security.23 According to the Supreme Court in
Aorney General v Maj. General David Tinyefuza24,
an asseron that the infringement upon the right
to informaon is necessary to ensure naonal
security is not sucient, as the state must
adduce evidence to prove it. While this case was
primarily about the right to access to informaon,
in the absence of elaborate case law on the right
to privacy of communicaon and informaon
in Uganda, its rao decidendi is very helpful in
demonstrang that infringement on a right by the
state, including the right to privacy, on grounds
of naonal security, is only permissible where
evidence of the necessity of such infringement to
the protecon of naonal security is adduced by
the state.
Regional and Internaonal Context
While at the regional level, the African Charter
does not address the right of the privacy of
communicaon, it has been addressed at the
internaonal level by the Internaonal Covenant
on Civil and Polical Rights (ICCPR), as well as the
Commiee on Civil and Polical Rights.
Arcle 17 of the ICCPR spulates that the no
one shall be subjected to unlawful and arbitrary
interference with their privacy, family, home or
correspondence. The Commiee on Civil and
Polical Rights oers great guidance on what
amounts to ‘unlawful and arbitrary interference.
According to the Commiee, unlawful interference
with the right to privacy is that which is not
provided for by law, while arbitrary interference
is that which may be provided for by law, but is
not in line with the objecves of the ICCPR and is
unclear and unreasonable in the circumstances.25
23 K Mayambala, Phone Tapping and the Right to Privacy
in Uganda (2008) accessed at hp://www.bileta.ac.uk/
content/les/conference%20papers/2008/Phone-
tapping%20and%20the%20Right%20to%20Privacy%20
[Ronald%20Kakungulu].pdf
(Accessed on 24 October 2017).
24 Constuonal Appeal No. 1 of 1997.
25 Commiee on Civil and Polical Rights (1988), General
Comment No.16 on the Right to Privacy, Family, Home and
Correspondence, and Protecon of Honour and Reputaon,
paras 3-4 accessed at hp://www.refworld.org/
docid/453883f922.html (Accessed on 24 October 2017).
Reasonableness has been interpreted by the
Human Rights Commiee in Toonen v Australia26
to mean that any interference with privacy must
be proporonal to the end sought and must be
necessary in the circumstances of any given case.
The Computer Misuse Act and Domesc, Regional
and Internaonal Standards on the Right to Privacy
Secon. 9 of the Computer Misuse Act spulates
that an invesgang ocer may apply to court
for an order to preserve data that he or she
reasonably believes to be in danger of geng
lost or modied. According to subsecon 2, data
includes subscriber informaon. The danger with
this provision is that, contrary to the constuonal
requirement that a right can only be limited
according to what is acceptable and demonstrably
jusable in a free and democrac society, it does
not clearly address the issue of the relevance of
the data that is to be the subject of the court
order to the case being invesgated. This gives
leeway to the invesgang ocer to intercept
personal communicaon and correspondences of
subscribers, even in circumstances where it is not
jusable.
Secon 10 of the Act provides for the applicaon
of an order for disclosure of data that had been
preserved by the invesgang ocer. The danger
with this provision is that it is not clear on the
persons or authories to whom such informaon
is to be disclosed, and what the envisioned
purpose of the disclosure will be. While clause (b)
of the Secon makes reference to interpretaon of
data as a ground for disclosure, it does not clearly
make the linkage as to the ulmate objecve of
such interpretaon. This again leaves room for
violaon of the right to privacy of the subscribers,
whose personal informaon may be disclosed to
unauthorised persons, and without good cause.
Conclusion
As evidenced from its long tle, the enactment
of the Computer Misuse Act was well intenoned
in as far as protecon of individual rights of
computer and Internet users, as well as data
protecon are concerned. Unfortunately, the
Act has provisions that are too broad and do not
provide for specic and well-dened restricons
on the right to freedom of expression and privacy.
As such, there is a denite need to have most of
the provisions in the Act amended to bring them
in line with domesc, regional and internaonal
standards on informaon and expression rights
and freedoms.
26 Communicaon No. 488 of 1992.
Human Rights Awareness and Promoon Forum (HRAPF) 19
www.hrapf.org
Introducon
The Computer Misuse Act, with its
vague and overly broad provisions,
joins ranks with a number of laws in
Uganda that suer the same deciency. While
some laws with ambiguous provisions have
existed since colonial mes, the most recent
laws have been strategically enacted over the
past decade or so with the specic intenon
of reducing dissent, criminalising diversity,
liming free thought and sing opposing
voices. These vague laws however have the
eect of restricng the rights of marginalised
persons, parcularly sexual minories, much
more than other persons. This arcle puts into
context the vague provisions of the Computer
Misuse Act by showing how it simply joins
the other laws to further restrict the rights
of sexual minories. It analyses some of the
laws in Uganda that contain vague provisions,
which have been used or have the potenal
to be used discriminately against marginalised
persons. The focus will be on sexual minories
as they face the harshest marginalisaon
because of prejudices, and there are specic
laws that aempt to criminalise their conduct.
Vagueness an d broadness: A co nc eptual
analysis
Vagueness and broadness of laws are two
related but dierent concepts, with dierent
meanings and dierent framings. The two
concepts of ‘void for vagueness’ and ‘void for
overbreadth’ help to disnguish them:
FEATURE
In kindred company: The Computer Misuse Act and the other vague and broad
laws that threaten the rights of sexual minories
Joaninne Nanyange
Ag. Deputy Execuve
Director, HRAPF
The Void for vagueness Doctrine
Vagueness of criminal laws in Uganda is dealt
with under Arcle 28(12) of the Constuon,
which provides that except in cases of contempt
of court, no person shall be convicted of a
criminal oence unless that oence is dened
and a punishment prescribed by law. This is the
‘Void-for-Vagueness’ Doctrine.
Arcle 28(12) has however not been fully
interpreted in Ugandan jurisprudence and
legislaon, and therefore the ‘void-for
vagueness’ doctrine has not fully taken root.
As a result, many vague provisions remain
on the law books and are used to prosecute
people despite Arcle 28(12). This is what the
state has exploited to further ostracise already
marginalised groups.
In the United States legal system, the doctrine
of ‘Void-For-Vagueness’ has been developed
extensively. The doctrine, in as far as the United
States is concerned, is derived from their due
process clauses of the h and fourteenth
amendments to the US Constuon that
require criminal laws to be draed in language
that is clear enough for the average person
to comprehend.1 The doctrine is to the eect
that if a person of ordinary intelligence cannot
determine which persons are regulated, what
conduct is prohibited, or what punishment may
be imposed under a parcular law, then the
law will be deemed unconstuonally vague.
The void-for-vagueness doctrine has four
underlying principles, which will be discussed
in turn.2 These tested principles can be
extrapolated to Uganda’s context.
1 AE Goldsmith ‘The Void-For-Vagueness Doctrine in
the Supreme Court, Revisited’ 30 American Journal of
Criminal Law (2003) 282; Encyclopedia, American Law
and Legal Informaon ‘Void for vagueness doctrine
available online at hp://law.jrank.org/pages/11152/
Void-Vagueness-Doctrine.html (accessed 20 October
2017).
2 As above.
The Human Rights Advocate | Fourth Issue - November 2017
20
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
First, it requires legislators and government to
disnguish between conduct that is lawful and
that which is unlawful. This principle exists to
ensure that people are given adequate noce of
what conduct is criminalised and what conduct is
not. When the populace is given adequate noce,
they know how to conduct themselves within the
legal framework. Vague and unclear laws that do
not give people fair warning and noce become
a trap for marginalised groups that suer under
societal prejudices.
Second, the doctrine requires that laws are
precise, clear and discernible not just to the
people that are required to obey them, but also
to those that are required to enforce them.3
This is intended to curb the arbitrary and
discriminatory enforcement of such laws. In a
study conducted by Human Rights Awareness
and Promoon Forum in 2016 for example, it
was found that ‘vagrancy oences’ in Uganda are
mainly enforced against marginalised groups like
LGBTI persons, sex workers and drug users.4 Such
laws give enforcement ocers wide discreon to
implement the law as they think t. When such
ocers interface with groups of persons that are
marginalised and suer prejudice, they exploit the
vagueness of the provisions and enforce the laws
discriminately.
Third, the doctrine requires judicial ocers not
to apply vaguely worded laws.5 This principle is
to the eect that if such laws are to be applied
by courts and tribunals, judicial ocers should
give them very narrow interpretaons. It further
provides that those that are too vague to be
narrowly interpreted by judicial ocers should be
struck down as unconstuonal.
Fourth, the doctrine cauons against vague laws
aecng the enjoyment of rights.6 Since vague
and ambiguous laws create uncertainty as to
what conduct is prohibited and what is not, they
have the eect of creang self-censorship among
cizens, who are conscious that they might
engage in something that could be interpreted
as criminal. Addionally, the wide discreon
3 Goldsmith (n 1 above) 285.
4 See Human Rights Awareness and Promoon Forum ‘The
Implicaons of the Enforcement of ‘Idle and Disorderly’ Laws
on the Human Rights of Marginalised Groups in Uganda’ 2016
5 Goldsmith (n 1 above) 285.
6 For a discussion on the level of certainty which criminal
laws were historically required to provide, see CD
Lockwood ‘Dening indeniteness: Suggested revisions
to the Void for Vagueness Doctrine’ 8 Cardozo Public Law,
Policy and Ethics Journal (2009) 171-2.
given to law enforcers by vague laws creates an
opportunity for them to use these laws to clamp
down on the legimate enjoyment of rights. Such
laws have for example been used to violate the
right to liberty of marginalised groups in Uganda
through arbitrary arrests and rights to freedoms
of associaon and assembly through police raids
on legimate events and organising.
As already noted, marginalised and unwanted
populaons bear the brunt of vague and ambiguous
laws. In Uganda, some of these populaons
include drug users, sex workers, LGBTI persons,
pey traders, market vendors, unemployed and
homeless persons, street children and polical
crics. The reason for this is that somemes the
typical behavior or characteriscs of unpopular
groups (such as unemployed or homeless persons)
are not criminalised and yet society wants to use
the law to repress them or remove them from
the public eye. In many cases where the acons
of undesirable minories are criminalised, the
oences they could be charged with are hard
to prosecute and prove as in the case of sexual
minories. Enforcers subsequently resort to
the vague and broad laws that give them wide
discreonary powers to decide what conduct is
prohibited.
The over-breadth doctrine
This doctrine is by and large related to the void-
...marginalised and unwanted
populations bear the brunt of
vague and ambiguous laws.
...some of these populations
include drug users, sex
workers, LGBTI persons, petty
traders, market vendors,
unemployed and homeless
persons, street children and
political critics.
Human Rights Awareness and Promoon Forum (HRAPF) 21
www.hrapf.org
for-vagueness doctrine. Over-breadth however
concerns oences that sweep up into their
prospecve net both constuonally protected
and constuonally unprotected acvity.7 As
developed in the United States, this doctrine is
mainly used against provisions or laws that are
so broad that they extend to acvies and rights
that are protected by the constuon.8
This doctrine has been explored in the Ugandan
case of Charles Onyango Obbo and Andrew
Mwenda v Aorney General9 where the appellants
challenged secon 50 of Uganda’s Penal Code Act
that created the oence of publicaon of false
news. In declaring the secon unconstuonal,
Uganda’s Supreme Court noted that the secon
was too broad and capable of very wide applicaon
and the eect of this was to perpetually place
the aected persons in a dilemma over what
was criminalised and what was not. The court
noted that the secon would have the eect of
either some people taking the plunge and geng
prosecuted or create self-censorship among those
that were cauous enough to avoid prosecuon.
In any case, the court noted that the eects
were injurious to enjoyment of the freedom of
expressions and democracy. Addionally, the
court also noted that the broadness of the secon
had the eect of giving prosecutors unfeered
discreon to determine, from me to me,
what was criminalised and what was not, which
cannot be acceptable or jusable in a free and
democrac society.
7 Roenstein Group ‘What does it mean when a law is “void
for vagueness” or “overbroad”? hp://www.rotlaw.com/
legal-library/what-does-it-mean-when-a-law-is-void-for-
vagueness-or-overbroad/ (accessed 23 October 2017)
8 As above.
9 Constuonal Appeal No. 2 of 2002.
The Onyango Obbo case highlights the most
glaring shortcomings of broad laws, namely they
put the public in a dilemma as to what conduct
is criminalised and give law enforcers unfeered
discreon to make that decision. As noted,
this either leaves many people suscepble to
persecuon in the form of prosecuon, or creates
a chilling eect on the public where people avoid
engagement in legimately protected conduct
because they are wary of being caught up in the
ambit of the criminal provisions. Needless to
emphasise, both situaons are catastrophic to
the enjoyment of rights and are claw backs to the
aspiraons of a free and democrac society.
It should, however, be noted that courts
acknowledge the fact that almost all laws aect
conduct that is ordinarily protected in Bills of
Rights, and that striking down every law that
seems to aect protected conduct would be
problemac. Courts have therefore created space
to allow existence of laws that are wrien in
general terms by introducing the substanality
test.10 In essence, this test requires that for a law
to be struck down as overly broad, one must show
that it not only aects conduct that is protected,
but that it aects such conduct in a substanal
manner as to make the protecon of the conduct
illusory.
Vague an d overly br oa d la ws i n Ug anda an d
their impact on Sexual minories
The following laws contain vague and/or overly
broad provisions that disproporonately aect
sexual minories. They are classied between
those that directly aect sexual minories and
those that indirectly aect sexual minories:
10 Ashcro v Free Speech Coalion 535 U.S 234 (2002).
SOURCE: hps://www.shuerstock.com
The Human Rights Advocate | Fourth Issue - November 2017
22
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
Vague and broad laws that directly aect
sexual minories
Unnatural Oences under the Penal Code Act
The Penal Code Act is Uganda’s cardinal criminal
law. Secons 145 and 146 of the Penal Code
Act criminalise carnal knowledge against the
order of nature, which has been (mis)interpreted
as criminalising homosexuality.11 This common
misunderstanding of this provision by law
enforcement ocers and various duty bearers
is not accidental. It is a result of the vagueness
of the provision. The provision does not dene
the term ‘order of nature’ and neither does
the Act. As a result, the provisions are oen
subjecvely interpreted and what ‘against order
of nature’ means more oen than not, depends
on whom you ask. The provisions have not been
the subject of extensive ligaon. However, a
few cases have shed light on its meaning. In the
case of Kasha Jacqueline Nabagesera & Others
v Rolling Stone Newspaper & Another12 the judge
stated that secon 145 is limited to sexual acts
and not identy and orientaon. However, in the
subsequent case of Kasha Jacqueline Nabagesera
& Others v Aorney General & Another,13 the High
Court held that holding a skills training workshop
for LGBTI persons is against the law as it amounts
to conspiracy to commit the oences created in
secons 145 and 146. This case disnguished
the earlier decision on the basis that it dealt with
dierent circumstances. The rst interpretaon
is the one employed by organisaons working to
protect the rights of LGBTI persons, for example
HRAPF,14 while some state agencies such as the
Uganda Registraon Services Bureau (URSB)
choose to use the second wider interpretaon
to refuse incorporaon of organisaons whose
names or objecves explicitly menon working
with sexual minories.15
From the above, the posion of the law remains
vague. This vagueness, coupled with the prevalent
homophobia in Uganda, connue to be leading
11 Human Rights Awareness and Promoon Forum and the
Civil Society Coalion on Human Rights and Constuonal
Law Protecng ‘Morals’ by Dehumanising Suspected
LGBTI Persons? A Crique of the Enforcement of the Laws
Criminalisng Same-sex Conduct in Uganda (2013) 43.
12 Miscellaneous Cause No. 163 of 2010.
13 High Court Miscellaneous Cause No. 33 of 2012.
14 See Human Rights Awareness and Promoon Forum
(HRAPF) A Guide to the Normave Legal Framework on the
Human Rights of LGBTI Persons in Uganda 25.
15 The case of Frank Mugisha & Others v URSB High Court
Miscellaneous Cause No. 96 of 2016.
causes of violaons of rights of LGBTI persons.
The An-Homosexuality Act, 2014 (now nullied)
The An Homosexuality Act was passed by
Uganda’s Parliament in December 2013 and
signed into law by the President in February
2014. The Act remains Uganda’s greatest aempt
at comprehensively and directly criminalising
homosexuality. As previously discussed, the
current criminal framework only criminalises
carnal knowledge against the order of nature. The
An-Homosexuality Act expressly criminalised
same sex sexual conduct and extended to
aiding and abeng homosexuality and what
was termed ‘promong homosexuality’. In March
2014, the Civil Society Coalion on Human
Rights and Constuonal Law led a peon
in Uganda’s Constuonal Court16 challenging
the constuonality of some of the provisions
of the Act and the manner of its passing (that it
was passed without quorum). The Constuonal
Court heard the case and on 1st August 2014,
declared the Act unconstuonal as it had been
passed without quorum. Aempts to re-table a
similar Bill in Parliament have not materialised.
The Act is currently not in force but its eects
remain.
16 Constuonal Peon No. 008 of 2014.
Sections on aiding and
abetting and promoting
homosexuality were
unconstitutionally
broad in as far as they
prohibited legitimate and
constitutionally protected
work like health service
provision and human rights
advocacy.
Human Rights Awareness and Promoon Forum (HRAPF) 23
www.hrapf.org
The environment in Uganda is permeated with
an undeniable phobia for LGBTI persons, and
since the early 2000s when the debate on
homosexuality truly gained tracon in Uganda, the
general feeling has been that there is not enough
restricon in the law to ‘curb’ homosexuality.
This feeling manifested itself in various events
occurring between 2005 and 2014 in Uganda,
both on the legislave and law enforcement
fronts and in social circles in Uganda, which
culminated in the passing of the highly publicised
and controversial An-Homosexuality Act.
During its existence, the law posed a grave
threat to the very lives of suspected LGBTI
persons in Uganda as it occasioned such
intense discriminaon and homophobia.
Among others, the law created oences of
‘aempt to commit homosexuality’,17 ‘aiding
and abeng homosexuality’18 and ‘promoon
of homosexuality.19 Secons like aempt to
commit homosexuality were so vague in nature
in as far as they did not criminalise specic
conduct. Secons on aiding and abeng and
promong homosexuality were unconstuonally
broad in as far as they prohibited legimate
and constuonally protected work like health
service provision and human rights advocacy.
As a maer of fact, during the existence of the
Act, organisaons were raided20 and suspended,
21 individuals arrested and a number of other
violaons commied. If the law had stood the
test of constuonal muster, these provisions
would have posed a grave danger to the lives
and well-being of LGBTI persons and would
have hampered service provision to them. Even
when the law was annulled, its halo remains and
is exhibited in instances when LGBTI persons are
arrested and charged with oences under it, and
the persistence of ‘promoon of homosexuality/
recruitment into homosexuality’ propaganda by
an-gay groups and acvists. The eects of this
law remain visible in the enforcement of exisng
legislaon, and in the development of new
legislaon,22 which are being used to clamp down
17 Sec 4.
18 Sec 7.
19 Sec 13.
20 hps://2009-2017.state.gov/r/pa/prs/ps/2014/04/
224431.htm (Accessed 23 October 2017).
21 hps://76crimes.com/2015/01/23/uganda-refugee-
project-survives-an-gay-aacks-of-2014/ (Accessed 23
October 2017).
22 For example some provisions of the NGO Act 2016 were
included to curb against organisaons that ‘promote
homosexuality’ since the An-Homosexuality Act was
annulled.
Laws that indirectly aect sexual minories
The Non-Governmental Organisaons Act, 2016
The NGO Act of 201623 is the law that governs
the registraon and operaon of NGOs in
Uganda. Among others, the Act puts special
obligaons on all NGOs to refrain from engaging
in acvies that are prejudicial to the ‘security
and laws of Uganda’ and the ‘interests and dignity’
of the people of Uganda.24 As expected, the Act
does not dene ‘security’, ‘interests’ or ‘dignity’ of
Ugandans. The Act does not state the status of
the ‘special obligaons’ and what would happen if
an organisaon breaches any of the obligaons.25
These obligaons seem to be core requirements
for organisaons operang in Uganda and
since there is no guidance as to their eect or
implicaons, law enforcers can implement them
23 See Human Rights Awareness and Promoon Forum Legal
Analysis of the NGO Bill, 2015 (2016) and Human Rights
Awareness and Promoon Forum ‘The Likely Implicaons
of the Non-Governmental Organisaons Act 2016 on
Marginalised Groups’ 3 The Human Rights Advocate (2016)
for detailed discussions of the provisions of this law,
available online at www.hrapf.org.
24 Sec 44 of the Act lays out the special obligaons of NGOs.
25 Sec 40(1)(d) provides that an organisaon commits an
oence that engages in any acvity prohibited by the
Act. However, it is debatable whether the breach of a
special obligaon would amount to engaging in an acvity
prohibited by the Act.
enjoyment of rights by sexual minories.
SOURCE: hps://www.shuerstock.com
The Human Rights Advocate | Fourth Issue - November 2017
24
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
in any way they deem t.
Considering the backdrop against which the
Act was enacted, its overly broad and almost
unenforceable provisions create a potenal threat
for organisaons that work on unpopular issues or
with unpopular persons such as sexual minories.
These provisions could be used to close down
organisaons or even impose criminal liability on
directors of such organisaons. The provisions
are too vague for a person to understand what is
really prohibited and too broad to the extent that
they substanvely limit legimately protected
rights of associaon, assembly and expression.
While the impact of these secons has not yet
materialised with sexual minories, the Act is
already being used to close down operaons of
organisaons involved in polical dissent and it
is a maer of me before this enforcement is
extended to organisaons working with unpopular
populaons like sexual minories.
The Public Order Management Act, 2013
This Act was adopted to regulate the exercise
of the freedom to assemble and to demonstrate
together with others in a peaceful and unarmed
manner and to peon in accordance with Arcles
29(1)(d) and 43 of the Constuon.26 The Act
however has been unnecessarily restricve and
has led to the arbitrary limitaon of the freedoms
it sought to operaonalise. One of the reasons
for this is that some of the Act’s provisions are so
vague and ambiguous and grant extremely wide
discreonary powers to implemenng ocers to
interpret the Act as they deem t.
Secon 4 denes a public meeng to mean ‘a
gathering…held for the purposes of discussing…a
maer of public interest’. The Act however does
not dene what would amount to a maer of
public interest, yet this denion determines the
types of meengs that should be subjected to the
requirements laid down in the Act. Any maer
can be said to be a maer of public interest,
depending on the implemenng ocer. It should
be noted that under the Act, there are restricons
on the holding of meengs that qualify as public
meengs, with the Act establishing requirements
of nocaon of the police three days before
such a meeng is held,27 and giving powers
to law enforcement authories to refuse the
holding of such meengs. Since such restricons
substanvely aect the enjoyment of protected
freedoms, it would be prudent to ensure that the
enabling law is as precise as possible regarding
26 Sec 2.
27 Sec 5.
the extent to which the law can be applied.
While the secon goes ahead to provide for what
a public meeng is not, this list is not all-inclusive,
as the legislature could not be reasonably expected
to foresee all types of meengs. What would be
easier would be a much more precise denion of
what a public meeng is, and not what it is not.
The eect of the ambiguous denion of a public
meeng is that it leaves the decision of which
meengs should be brought under the operaon
of this law and which ones should not be in the
hands of law enforcement ocers. As discussed
above on the populaons that oen bear the
brunt of such laws, it is marginalised groups that
are likely to be aected by such wide discreon.
In August 2016, a beauty pageant held during
the LGBTI pride week was raided and stopped
on the grounds that it was a public meeng and
that the requisite noce had not been sought
from police. From the denion given in the Act,
one could say that this was a social event that
excluded it from being a public meeng, or that
the event was never intended to discuss any
maer of public interest, as it was merely a beauty
pageant for the pride celebraons. However, all
these arguments could not be validly made as
one can not tell for sure whether this was a public
meeng or not. Even if one could, the law leaves
the discreon with the enforcement ocer to
decide what is a public meeng and what is not.
As a result, organisers and acvists were arrested
at that event and brutalised, simply because the
In August 2016, a beauty
pageant held during the
LGBTI pride week was raided
and stopped on the grounds
that it was a public meeting
and that the requisite notice
had not been sought from
police.
Human Rights Awareness and Promoon Forum (HRAPF) 25
www.hrapf.org
ocers had the power to decide whether the
Public Order Management Act applied or not. This
law therefore presents high potenal for abuse,
especially against criminalised and prejudiced
minories like LGBTI persons and sex workers.
The Companies Act, 2012
Many organisaons working on issues of sexual
minories have up to now elected to register
as companies limited by guarantee. Even under
the new NGO regime, all organisaons seeking
to operate as NGOs will be required to rst be
incorporated as companies limited by guarantee.
The Companies Act gives the Registrar of
Companies powers to refuse the reservaon of
a company name that is regarded as undesirable.28
The Act does not dene what ‘undesirable’ means
and neither do the Regulaons to the Act. This
provision gives the Registrar much discreon to
decide which name is desirable and which one is
not. This provision has been used before to refuse
the reservaon of the name Sexual Minories
Uganda (SMUG), on grounds that the name was
undesirable.
The reasons given by the Registrar of Companies
for deciding that the name ‘Sexual Minories
Uganda’ was undesirable was that the objecves
of the organisaon showed that it intended
to work with LGBTI persons whose perceived
behaviour is criminalised under secon 145 of
the Penal Code Act. Although the case is currently
in the High Court pending determinaon,29 it was
dicult to contest the legimacy of this decision
because the Act does not provide clear guidance
to the Registrar’s exercise of these powers. It is
important to note that failure to reserve a name
puts a halt to the incorporaon exercise of an
organisaon. While a name can be changed, the
decision made in the SMUG case was not merely
based on a name, but rather on the objecves
of the organisaon. The refusal to reserve the
name based on the objecves of the organisaon
was essenally a refusal to incorporate the
organisaon, except if the organisaon changed
its objecves.
Due to the wide discreon granted under
the provision, it was used by the Registrar of
Companies to not only refuse the reservaon
of the name of an intending organisaon, but
also essenally to stop the incorporaon of an
organisaon. This interpretaon would arguably
go beyond the applicaon of secon 36, but this
would be a queson of interpretaon for the
28 Sec 36 of the Act.
29 The Frank Mugisha Case (n 16 above).
courts to determine as the secon is quite broad
and undened. Such a secon has aected, and
carries the risk of connuing to aect, the rights
of associaon for organisaons intending to work
with unpopular groups like sexual minories.
The Vagrancy and nuisance laws in the Penal Code
Act
The vagrancy and nuisance laws are found in
secons 167 and 168 of the Penal Code Act.
These provisions create the oences of being idle
and disorderly and being a rogue and vagabond
respecvely. The oence of being idle and
disorderly among others criminalises any person
who publicly conducts himself or herself in a
manner likely to cause a breach of the peace and
any person who in any place solicits or loiters for
immoral purposes. The oence of being a rogue
and vagabond on the other hand criminalises a
suspected person who has no visible means of
subsistence and cannot give a good account of
himself or herself and persons found wandering
in or upon or near any premises or in any road
or highway or any place adjacent thereto or in
any public place at such me and under such
circumstances as to lead to the conclusion that
such person is there for an illegal or disorderly
purpose, among others.
Many sexual minories who come into conict
with the law are charged with these oences
instead of the actual oences for which they
are arrested i.e. suspicions of homosexuality
(carnal knowledge against the order of nature)
and sex work. In a few instances, parcularly
for transgender women, police have used the
oence of being a common nuisance, which is
created under secon 160.30 This secon provides
that any person who does an act not authorised
by law or omits to discharge a legal duty and
thereby causes any common injury, or danger or
annoyance or obstructs or causes inconvenience
to the public in the exercise of common rights
commits an oence of common nuisance. In
a study conducted in 2016, it was found that
these oences were generally favoured by the
Uganda Police Force for charging and prosecung
suspected sexual minories because they were
broad enough to cover a wide range of innocuous
behavior and were far easier to prove than the
unnatural oences or prostuon charges.31
It has indeed been shown that convicons on
30 HRAPF (n 14 above) 26.
31 See Human Rights Awareness and Promoon Forum The
Implicaons of the Enforcement of ‘Idle and Disorderly’ Laws
on the Human Rights of Marginalised Groups in Uganda
(2016) 25; Also see Lanzea v New Jersey 306 US 451.
The Human Rights Advocate | Fourth Issue - November 2017
26
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
charges of having carnal knowledge against
the order of nature or prostuon are almost
impossible to obtain, so in most cases suspected
sexual minories will be charged under these
vagrancy laws.32 The oences are broad enough
to cover conduct as harmless as moving around,
but not so broad as to make it impossible to
prosecute cases under them. The implicaon
this has had is that sexual minories in Uganda
essenally have no right to liberty and freedom
of movement except as granted by the arresng
ocer. Also, the provisions have been used to
extort money from sexual minories, punish them
for their behaviour and subject them to unlawful
detenon. These provisions are a classic example
of laws that oend the over-breadth doctrine
discussed above, as they limit conduct that is
protected by Uganda’s Constuon in Arcle 23
in a substanal and unjused manner.
Conclusion
The Computer Misuse Act is part of a series of
laws that seek to limit the rights of unpopular
minories through legal sancons based on
provisions that are far too vague and broad to
pass constuonal muster.33 It has therefore
become necessary to examine the eect of this
law in the general scheme of such legislaons and
the likely implicaons of its enforcement on the
basic rights of marginalised persons in Uganda.
With the annulment of the An-Homosexuality
Act, connued absence of the tabling of a
new law akin to the An-Homosexuality Act
32 See HRAPF and CSCHRCL (n 11 above) 21-2.
33 Art 28(1) of the Constuon, Salvatori Abuki & Another v
Aorney General, Supreme Court Case No. 1 of 1998.
and the apparent reluctance for the oences
on sex work to be enforced, vague and broad
oences have become the most obvious choice
for law enforcers when dealing with unpopular
populaons like sexual minories. They cast a net
wide enough to cover a broad range of conduct,
and do not present considerable challenges to
prosecuon, as they require minimal evidence.
However, their connued selecve enforcement
is a cause for concern as it grossly violates the
human rights of targeted populaons. Advocacy
eorts should be engaged in to ensure that these
laws are amended, or at the very least, that they
are not enforced in a manner that is deliberately
discriminatory, opportunisc and marginalising to
minority groups.
The Computer Misuse Act is
part of a series of laws that
seek to limit the rights of
unpopular minorities through
legal sanctions based on
provisions that are far too
vague and broad to pass
constitutional muster.
SOURCE: hps://www.shuerstock.com
Human Rights Awareness and Promoon Forum (HRAPF) 27
www.hrapf.org
COMPARATIVE PERSPECTIVE
Picking a leaf from other jurisdicons: What Uganda can learn from recent
developments on oensive communicaons laws in India, Tanzania and the UK
Introducon
The use of computers has undoubtedly
made communicaon and research
easier, connecon simpler, business
cheaper, security stronger and data storage
cheaper. It has promoted entertainment,
educaon, and made history more accessible
in real me with just the click of a buon. The
internaonal network is generally linked to
computers and other computer based devices
such as smart phones and smart televisions.
Whereas these gadgets have made life seem
much easier, they have also brought up a new
era of virtual crime which was probably never
envisaged in the earlier years. The ability to
achieve what one wants no maer where they
are without having to be physically be present
has made it easy for certain unique crimes.
Various countries’ legislatures have come up
with legislaon to try and curb such crimes and
deter persons from misusing computers.
In Uganda the Computer Misuse Act, 2011 was
enacted purposely to handle, among others,
crimes that arise from the use of the computer.1
The Act denes a computer to mean an
electronic, magnec, opcal, electrochemical
or other data processing device or a group
of such interconnected or related devices,
1 The purpose of the Act is to make provision for the
safety and security of electronic transacons and
informaon systems; to prevent unlawful access, abuse
or misuse of informaon systems including computers
and to make provision for securing the conduct of
electronic transacons in a trustworthy electronic
environment and to provide for other related maers.
Edward Ssemambo
Lawyer,
Kiiza, Tumwesige &
Ssemambo Advocates
performing logical, arithmec or storage
funcons; and includes any data storage
facility or communicaons facility directly
related to or operang in conjuncon with
such a device or group of such interconnected
or related devices.2 It should be noted that
the computer is merely a means or a plaorm
for comming oences already prohibited by
other legislaons; and most if not all these
oences predate the invenon and adopon
of computers and social media in Uganda.
In this era of the increasing access to the internet
and access to computers and mobile devices,
Secon 25, which criminalises ‘oensive
communicaons’, is of parcular interest as it
can essenally aect the diverse social media
plaorms including facebook, twier, linked-
in, and google. These modes have been used
to communicate, do business, and generally
to inuence society and any law which curbs
the use of these mediums have to be assessed
crically. This arcle considers Secon 25 of
the Act, in light of similar provisions regulang
oensive communicaon in other jurisdicons
in various parts of the world.
A comparison on the restricon of oensive
communicaon
The Act of 2011 creates several computer
misuse oences,3 their punishments,
jurisdicon, invesgaon procedure,
admissibility of evidence and the burden of
proof among others. It applies to both natural
and arcial persons such as corporaons.
Under Secon 25, it’s an oence to willfully
and repeatedly use electronic communicaon
to disturb or aempt to disturb the peace,
quiet or right to privacy of any person with
no purpose of legimate communicaon
whether or not a conversaon ensues. The
person found guilty commits a misdemeanor
and upon convicon the penalty is either a
ne not exceeding Ug.Shs 480,000 (Uganda
Shillings Four Hundred Eighty Thousand) or
2 See Sec 2.
3 All of which are felonies save for one.
The Human Rights Advocate | Fourth Issue - November 2017
28
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
imprisonment not exceeding one year or both.
It should be noted that, just like it is in other parts
of the world especially the developing world, the
internet has proved to be the most cost eecve,
easy entry way of sharing ideas and informaon.
In fact, computers are increasingly replacing the
tradional means of communicaon. In light
of the broad and vague nature of Secon 25,
communicaon via the internet has to be done
with cauon not to amount to a breach of the
law. This Secon is comparavely assessed in
light of similar laws in the United Kingdom, India
and Tanzania. These countries were selected
because they share a common heritage of
inuence of Brish Law with Uganda and,
though their socio-polical contexts vary, are
appropriate comparators to Uganda. Their levels
of development dier, with the UK being the most
developed, followed by India and then Tanzania,
which is almost comparable to Uganda in terms of
development, and consequently computer access
and penetraon. The countries will be discussed
in this order.
The United Kingdom
The United Kingdom (UK) has many laws that
are sensive to human rights. The UK’s criminal
law provision against oensive communicaon
is found in the Communicaons Act of 2003
which in Secon 127(1)(a) provides that ‘a
person is guilty of an oence (a) if he sends by
means of a public electronic communicaons
network a message or other maer that is grossly
oensive or of an indecent, obscene or menacing
character’. The Malicious Communicaons Act
19884 furthermore, under Secon 1 provides
that a person is guilty of an oense if they send
an electronic communicaon or arcle of any
descripon which is grossly oensive and if
their purpose in sending it is that it should cause
distress or anxiety to the recipient.
Laws against oensive communicaon have
a direct impact on the right to freedom of
expression, and for this reason the standard in
relaon to the oense is high, requiring that the
statement must be ‘grossly oensive’. The UK is
party to a number of internaonal instruments
including The European Convenon on Human
Rights (ECHR) whose provisions on the right to
freedom of associaon clearly protect expression
of views that may shock, annoy, disturb or
oend the deeply held beliefs of others.5 The
4 As amended by S.43 (1) of The Criminal Jusce and Police
Act 2001
5 See Art 10 of the European Convenon on Human Rights.
term ‘grossly oensive’ has also been dened
narrowly by the courts in order to limit the level
of infringement which it makes on the right to
freedom of expression. In the case of Director of
Public Prosecuons v McConnell6 the court held that
it was for the court to determine as a queson
of fact whether or not a message was ‘grossly
oensive’ by applying the standards of an open
and just society, taking into account the context
of the words and all relevant circumstances. There
is furthermore an intent requirement on the part
of the sender. In this case, a Chrisan pastor had
made negave remarks on Islam during a sermon
which was later streamed on the internet. The
court, taking into consideraon the accused’s
right to freedom of expression as protected under
the ECHR held that his expression was merely
oensive. The court also reiterated that courts
must be careful not to allow the criminal law to
censor speech which is merely oensive.7 In an
earlier case, the House of Lords had held that the
oense in Secon 127 of the Communicaons
Act went no further than necessary in restricng
the right to freedom of expression.8 The secon
has the legimate aim of protecng the rights and
reputaons of others from aack through the use
of the public electronic communicaons network
without making unnecessary inroads into the
rights of the communicator.
Indeed the UK’s Crown Prosecuon Service has
gone ahead and issued guidance to prosecutors
on how to handle cases arising out of computer
misuse, including those involving oensive
communicaon. The Guidelines rst note that
cases may be more appropriately prosecuted
under other laws. Prosecutors are expressly
required to balance between the right to freedom
of expression and the public interest. The context
within which the communicaon as made must
also be considered and the provisions of arcle
10 of the European Charter on Human Rights.
The prosecuon must both be necessary and
proporonate to what was done.9
The UK’s oensive communicaon provisions sets
a good example for Uganda and other countries
in that only grossly oensive communicaons are
6 [2016] NIMag 1.
7 F Cranmer ‘”Grossly oensive” or merely “oensive”? DPP v
McConnell: A noteLaw and Religion UK 5 January 2016.
8 Director of Public Prosecuons v Collins [2006] UKHL 40.
9 The Crown Prosecuon Service ‘Guidelines on prosecung
cases involving communicaons sent via social media’
available online at hp://www.cps.gov.uk/legal/a_to_c/
communicaons_sent_via_social_media/ (accessed 15
October 2017).
Human Rights Awareness and Promoon Forum (HRAPF) 29
www.hrapf.org
criminalised and that there has to be intent to
insult on the part of the sender. The provisions,
and the way they have been applied by the courts,
strikes a balance between protecon of the right
to dignity and the right to freedom of expression.
Such provisions cannot easily be used for ulterior
purposes such as clamping down on vulnerable
minories and quieng polical dissent.
India
India has recently taken a bold step toward the
protecon of the freedom of expression by declaring
unconstuonal its oensive communicaon
provision. Oensive communicaon was
provided for in the Informaon Technology Act
2000. Secon 66 A thereof makes it an oense
to send informaon that is grossly oensive or of
a menacing character or to send any informaon
which the sender knows to be false, for the
purpose of causing annoyance, inconvenience,
danger, obstrucon, insult, injury, criminal
inmidaon, enmity, hatred or ill will by making
use of a computer resource or a communicaon
device. The secon further criminalised sending
an electronic mail message for the purpose
of causing annoyance or inconvenience or to
deceive or mislead the recipient about the origins
of the message. The punishment imposed for this
oense was imprisonment for up to three years
with a ne.
This secon was challenged in the Supreme
Court in the case of Shreya Singhal v Union of
India.10 The Court considered the provision in
light of Arcle 19 of India’s Constuon, which
guarantees the right to freedom of expression.
Arcle 19(2) provides that the freedom of speech
and expression may be restricted by a law where
this serves ‘the sovereignty and integrity of India,
the security of the State, friendly relaons with
other States, public order, decency or morality
or in relaon to contempt of court, defamaon
or incitement to an oence.’ The Court held that
Secon 66A was unconstuonal on the basis
that it was over-broad and vague. The Act failed
to dene and delineate clearly the instances in
which the Act would apply.
Tanzania
Tanzania has recently adopted the Cybercrimes
Act, 2015 to make provision for the criminalisaon
of oences related to computer systems and
Informaon Communicaon Technologies. The
Act has two provisions that are comparable to
the ‘oensive communicaon’ provisions in the
legislaon of Uganda, the United Kingdom and
10 See Writ Peon No.167 Of 2012.
India. Secon 18 of the Act prohibits insults
through a computer system on the basis of
race, colour, descent, ethnicity, naonality or
religion. The oence is punishable with a ne
or imprisonment of not less than one year.
This provision delineates more clearly the kind
of communicaon that is prohibited than the
Ugandan legislaon which merely states that
‘oensive’ communicaon is prohibited. It also
makes a point to criminalise communicaons
which have the potenal to have serious harmful
consequences to naon building as opposed to
communicaons which are merely ‘oensive’.
The Ugandan Act could perhaps be amended
to deal with specic, dened oensive
communicaons, transmied through a computer
system, which are known to be likely to feed into
volale situaons such as tribal conict. Uganda
may draw a lesson from its neighbor in avoiding
the use of criminal law to regulate and address
the communicaon of expressions which are
merely oensive to individuals.
Conclusion
Along with technological advancement, there is a
connuous need for legislaon which keeps up
with evolving means of comming crimes. The
four jurisdicons considered have each dealt
dierently with communicaons transmied
through computer systems and which are
oensive to the recipient. A ne line has to be
drawn between the regulaon of oensive
communicaon through the use of computers
and unwarranted limitaon of the right to
freedom of expression. The UK puts in place
enough safeguards so that the right to freedom
of expression is protected while also protecng
persons from very oensive communicaon. India
on the other hand has it oensive communicaons
law struck down for being unconstuonal, while
Tanzania does not use vague and broad language
but clearly denes what it criminalises. Thus
of the three countries at the dierent levels of
development that have been discussed here,
Uganda stands alone in maintaining such a vague
provision. Secon 25 of Uganda’s Computer
Misuse Act, 2011 is undoubtedly suscepble
to constuonal challenge due to its broad
and vague nature and would benet from an
amendment which either limits criminalisaon to
‘grossly oensive’ communicaons or delineates
the oence to only apply to communicaons
which are likely to incite violence and hatred
through the use of a computer system. The
decision of the Constuonal Court in the case of
Andrew Karamagi & Robert Shaka is thus eagerly
awaited.
The Human Rights Advocate | Fourth Issue - November 2017
30
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
INTERNATIONAL LAW PERSPECTIVE
How does the Computer Misuse Act measure up to internaonal standards of privacy
and freedom of expression on the Internet?
Introducon
This arcle analyses the Computer Misuse
Act, 2011 from an internaonal law
perspecve. It focuses on the internet, a key
aspect of computer communicaons. It analyses
the compability of the Act with internaonal
human rights standards on privacy and freedom of
expression on the internet. In the rst part of the
arcle, the applicable principles provided under
internaonal law will be set out and discussed. In
the second part, selected provisions of the Act will
be analysed and considered in light of the stated
recognised principles in order to determine their
level of compability with internaonal human
rights law. The purpose of the Act is ‘to make
provision for the safety and security of electronic
transacons and informaon systems’, ‘to
prevent unlawful access, abuse or misuse of
informaon systems including computers’ and
‘to make provision for securing the conduct of
electronic transacons’.1 It is expected that the
objecves of securing informaon systems and
prevenng the misuse of informaon should be
carefully balanced against the rights to privacy
and the right to freedom of expression.
1. The internaonal legal framework on the
right to privacy and freedom of expression
on the internet
The rights applicable generally also apply to
the internet. Therefore, the internaonal legal
framework on the right to privacy and freedom of
expression applies to the internet too.
a) The right to privacy
The right to privacy is protected under Arcle
17 of the Internaonal Covenant on Civil and
1 According to the long tle of the Act.
Linee du Toit
Researcher, HRAPF
Polical Rights (ICCPR)2:
1. No one shall be subjected to arbitrary or
unlawful interference with his privacy,
family, home or correspondence, nor
to unlawful aacks on his honour or
reputaon.
2. Everyone has the right to the protecon
of the law against such interference or
aacks.
The right is also protected under Arcle 12 of the
Universal Declaraon of Human Rights:
No one shall be subjected to arbitrary
interference with his privacy, family, home
or correspondence, nor to aacks upon his
honour and reputaon. Everyone has the
right to the protecon of the law against
such interference or aacks.
This right is furthermore protected in the United
Naons Convenon on Migrant Workers3 and the
United Naons Convenon on the Protecon of
the Child.4
The United Naons Human Rights Commiee, in
interpreng Arcle 17 of the ICCPR, has stated
that any interference with privacy have to be
envisaged by law and that the law on which such
an interference is based has to comply with ‘the
provision, aims and objecves of the Covenant’,
otherwise the interference will nevertheless be
unlawful.5 The Commiee has expressed that
even an interference provided for under the law
can be classied as an ‘arbitrary interference’ if
it is not reasonable to interfere with the privacy
of the individual in the parcular circumstances
of the case.6 The Commiee recognises that
2 Adopted by the General Assembly of the United Naons in
1966 and raed by Uganda in 1995.
3 Art 14.
4 Art 16.
5 Human Rights Commiee General Comment No. 16, U.N.
Doc CCPR/C/CG/16 (8 April 1988) (Arcle 17: Right to
Privacy: The right to respect of privacy, family, home and
correspondence, and protecon of honour and reputaon)
at para 3.
6 n 5 above at para 4.
Human Rights Awareness and Promoon Forum (HRAPF) 31
www.hrapf.org
competent public authories should be able to
access informaon relang to the private lives
of individuals if such knowledge is essenal for
the protecon of the ‘interests of society’ as
protected under the Covenant.7 Interference
in private life needs to be governed by law and
needs to specify in detail the exact circumstances
under which interferences would be permied.8
State pares are under a duty to provide a legal
framework prohibing interferences inconsistent
with the ICCPR.9 Importantly, the Commiee
states that the gathering and holding of personal
informaon on computers and other devices must
be regulated by law and that States have to take
eecve measures to ensure that informaon
concerning a person’s private life does not reach
the hands of an unauthorised person.10
b) The right to freedom of expression on the
internet
The right to freedom of expression is protected
under the ICCPR as well as the Universal
Declaraon. Arcle 19 of the ICCPR provides:
1. Everyone shall have the right to hold
opinions without interference.
2. Everyone shall have the right to
freedom of expression; this right shall
include freedom to seek, receive and
impart informaon and ideas of all kinds,
regardless of froners, either orally, in
wring or in print, in the form of art, or
through any other media of his choice.
3. The exercise of the rights provided for
in paragraph 2 of this arcle carries with
it special dues and responsibilies.
It may therefore be subject to certain
restricons, but these shall only be
such as are provided by law and are
necessary:
(a) For respect of the rights or
reputaons of others;
(b) For the protecon of naonal security
or of public order (ordre public), or of
public health or morals’
7 n 5 above at para 7.
8 n 5 above at paras 7-8.
9 n 5 above at para 9.
10 n 5 above at para 10.
Arcle 19 of the Universal Declaraon provides:
Everyone has the right to freedom of
opinion and expression; this right includes
freedom to hold opinions without
interference and to seek, receive and
impart informaon and ideas through any
media and regardless of froners.
The United Naons Human Rights Commiee, the
body that oversees the ICCPR, has stated that the
right to freedom of expression includes electronic
and internet-based modes of expression.11 Arcle
19(2) explicitly extends beyond the content and
also cover the means of communicaon.12 It
includes ‘any other media’, which is interpreted to
extend to the internet.13
The Human Rights Commiee has also made it
clear that in order for a norm to be characterised
as ‘law’, it is essenal for the provision to have
been expressed with the necessary precision
that would enable members of the public to
adapt their conduct accordingly.14 Laws must also
provide sucient guidance to those responsible
for their enforcement in order to know with
certainty which conduct is restricted.15
In 2011, representaves of three regions - Africa,
the Americas and Europe16, as well as the UN Special
Rapporteur on Freedom of Expression and leading
internaonal Non-Governmental Organisaons
advocang for freedom of expression17 agreed
on the internaonal law principles concerning
the internet and freedom of expression. The
Joint Declaraon on Freedom of Expression and
the Internet (JDFEI) was subsequently adopted.
The Declaraon summarises the internaonal
11 Human Rights Commiee General Comment No. 34, U.N.
Doc. CCPR/C/GC/34 (12 September 2011) (describing
the applicaon of art. 19 of the ICCPR on freedoms of
opinion and expression).
12 See M Land ‘Toward an Internaonal Law on the Internet’
(2013) 54 Harvard Internaonal Law Journal 401.
13 As above.
14 As above.
15 As above.
16 These representaves were the African Commission
on Human and Peoples’ Rights’ Special Rapporteur
on Freedom of Expression; the Special Rapporteur for
Freedom of Expression of the Inter-American Commission
for Human Rights of the Organizaon of American States
and the Organisaon for Security and Cooperaon in
Europe Representave on Freedom of the Media.
17 ARTICLE 19, Global Campaign for Free Expression and The
Centre for Law and Democracy.
The Human Rights Advocate | Fourth Issue - November 2017
32
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
law principles pertaining to the exercise of the
freedom of expression in an online context
and will therefore be used as the standard for
considering the compability of the Computer
Misuse Act, 2011 with the internaonal law
standards in respect of this right.
The principles stress that the internet has a
transformave nature which enhances the ability
of billions of people to express themselves and
to access informaon. They also acknowledge
that some governments have taken acon which
unduly restricts the freedom of expression on the
Internet and which fails to take into consideraon
the parcular characteriscs of the Internet,
resulng in an undue restricon of the right to
freedom of expression.
The JDFEI covers the following six aspects:
i) General principles
The Declaraon makes it clear that restricons on
freedom of expression on the internet are only
acceptable if they are provided for by law which
is clear and accessible and is necessary to protect
an interest recognised under internaonal law.
According to the ICCPR, such ‘interests’ recognised
under internaonal law include the respect of the
reputaon and rights of others and the protecon
of public health and morals, naonal security or
public order.18 The principles state that the interest
that a restricon is protecng must be weighed
against its impact ‘on the ability of the internet to
deliver posive freedom of expression outcomes’.19
The principles suggest self-regulaon as a tool for
addressing harmful speech and promote internet
literacy.20
ii) Intermediary liability
Providers of technical internet services should not
be held accountable for the content generated
and transmied, unless they had intervened in
the content or have failed to carry out a court
order requiring them to remove the content.
iii) Filtering and blocking
The blocking of enre websites and types of
uses – such as social networking – is an extreme
measure which can only be jused in accordance
with internaonal standards.
iv) Criminal and civil liability
18 Art 19(3).
19 General Principle 1(b).
20 General Principle 1(e).
The principles suggest that legal cases relang
to internet content should be undertaken in
the States to which the cases have a real and
substanal connecon. Private pares should
bring cases in a jurisdicon where they can
establish they have suered substanal harm.
Standards of liability should consider the overall
public interest in protecng both the expression
and the forum in which it is made.
v) Network neutrality
This aspect of the principles provide that there
should be no discriminaon in the treatment of
internet data and trac, based on factors such
as the author or the origin and desnaon of
the content. Internet intermediaries should
furthermore be required to be transparent
in respect of their informaon management
pracces.
vi) Access to the internet
According to this aspect of the principles, States
are obliged to promote universal access to internet
in order to give eect to the right to freedom of
expression. It is recognised that access to internet
is necessary in order to promote respect for other
rights and that cung o access to the internet
can never be jused. To deny individuals access
to internet as a form of punishment is also an
extreme measure. Other limitaons, such as
requiring providers to register, have to comply
with internaonal standards in order to be
legimate.
2. Compability of the Computer Misuse
Act, 2011 with internaonal human rights
standards
In this secon, selected provisions of the Act
will be discussed in terms of compliance with
the internaonal human rights standards set out
above.
a) The right to privacy
The Act fails to meet the internaonal standards
in respect of the right to privacy in various ways.
Firstly, Secon 9 of the Act allows an invesgave
ocer to obtain an order for the preservaon of
data, stored or processed by means of a computer
system or other informaon and communicaon
technologies. The only grounds detailed to jusfy
such an order being granted is that there should
be ‘reasonable grounds’ to believe that data is
‘vulnerable to loss or modicaon’. Contrary to
the requirements of the internaonal law regime,
the law does not specify in detail the precise
circumstances under which an interference in the
Human Rights Awareness and Promoon Forum (HRAPF) 33
www.hrapf.org
right to privacy will be permied.21
Secon 9(3) of the Act suggests that the purpose
of the preservaon order would be to retain
data which could serve as evidence in the case
of suspected criminal acvity. The Act, however,
omits providing details on the seriousness of
the crimes involved and the importance of the
evidence, held on a computerised system, for the
prosecuon of the crime. As it stands, suspicion
of any oence would fall within the ambit of the
secon. The ocer would need to meet a very
low standard of proof in jusfying the granng of
the preservaon order. Even though internaonal
law requires that private informaon of individuals
ought to only be accessed where this is essenal
for the protecon of the interests of society
(as recognised under the ICCPR), this provision
provides for such an infringement on the mere
suspicion that an oence of negligible gravity had
been commied.22 The Act is furthermore unclear
in as far as the meaning of ‘retenon of data’ is
concerned. The Act does not set out whether the
order is against the owner or controller of the data
to prevent them from destroying or modifying the
data or whether it gives someone else the right
to preserve the data. It is also not made clear
whether the Act intends for the relevant data
to be taken o the device or whether the whole
device ought to be retained. The Act furthermore
fails to create safeguards for ensuring that the
private data is accessed in the process of taking
the relevant data o the device.
21 n 5 above at para 7-8.
22 Unwanted Witness & Civil Rights Defenders ‘Analyzed
Cyber Laws of Uganda 2016’ (2016).
Along the same vein, the Act in Secon 10
provides that an invesgave ocer may apply
to a court of law for an order for the disclosure
of all preserved data and the path through which
the data was submied. Secon 11 of the Act
provides that an invesgang ocer may apply
to court for an order compelling any person to
submit specied data in that person’s possession
or control, which is stored in a computer system
and any services provider to submit subscriber
informaon in its possession or control. Once
again, the Act does not require any prima facie
evidence on the part of the invesgang ocer
in order to jusfy the granng of such an order.
The Act does not provide for the interference
with the right to privacy to be weighed up against
the interests which such an interference aims to
achieve and falls short of ‘the provisions, aims
and objecves of the Covenant’ in that regard.23
The interference with privacy detailed in secon
9 to 11 of the Act can therefore be regarded as
unlawful under internaonal law standards.
In Secon 28 of the Act, police ocers are given
broad powers of search and seizure where they
suspect that an oence has been commied
under the Act. A Magistrate may grant an order
to enter and search premises if the police ocer
can provide reasonable grounds for believing that
an oence has been commied or is about to be
commied under the Act. An authorised ocer
is furthermore permied to seize computer
systems or take samples or copies of applicaons
or data which are believed to have been used or is
intended for use in the commission of an oence.
‘Reasonable grounds’ does not require a high
level of evidence for the granng of an extremely
invasive order. Considering the vagueness of
many of the oences provided for in the Act,
as will be discussed in greater detail below, this
secon seems to make provision for the granng
of invasive orders on imsy grounds.
b) The right to freedom of expression
As discussed elsewhere in this issue, there are
a number of provisions in the Act that create
oences, punishable with imprisonment, but are
not clearly and unambiguously dened. These
oences appear in Secon 24 and Secon 25 of
the Act and criminalise ‘Cyber harassment’ and
‘Oensive communicaons’ respecvely. Apart
from the constuonal standard for the limitaon
of the right to freedom of expression which
these oences fail to meet, they also represent
violaons of the right in terms of internaonal law
23 n 5 above at para 4.
The Act, however, omits
providing details on the
seriousness of the crimes
involved and the importance
of the evidence, held on a
computerised system, for the
prosecution of the crime.
The Human Rights Advocate | Fourth Issue - November 2017
34
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
standards.
Firstly, the ICCPR makes is clear that it is only
‘arbitrary’ and ‘unlawful’ interferences with a
person’s privacy that are prohibited.24 The right to
freedom of expression may be limited by a ‘law’.25
The Human Rights Commiee has expressed
that a norm can only be characterised as ‘law’
if it is expressed with the necessary precision
that would inform members of the public about
exactly which conduct is prohibited.26 Under the
crime of ‘Cyber harassment’, the terms ‘obscene,
lewd, lascivious or indecent’ are not dened,
yet requests or proposals qualifying as such are
regarded as oences punishable by law. Equally,
under the oence of ‘Oensive communicaons’,
the term ‘breach of peace’ is not dened and can
be taken to apply to a very broad range of acons.
The undened oences create uncertainty
Secondly, internaonal law provides that laws
must also provide sucient guidance to those
responsible for their enforcement in order to
know with certainty which conduct is restricted.27
In the same way that the undened terms in the
oences create uncertainty to those to which the
law applies, it also grants unguided discreon to
the implementers of the law. Enforcement ocers
can only rely on their subjecve understanding of
the oence and may easily be swayed by their
24 Art 19(1) of the ICCPR.
25 Art
26 As above.
27 As above.
personal prejudices and preconceived ideas in
applying the law.
Finally, contrary to the principle of ‘Network
neutrality’ as agreed to under the JDFEI, Secon
24 and 25 have been applied to target parcular
individuals.28 This principle provides that there
should be no discriminaon in the treatment of
internet data and trac, based on factors such as
the author of the content.29 Charges have rarely
been laid under these provisions apart from in
cases where the author of the content are known
crics of the leadership of the country.30 It is
clear that these provisions are not in line with the
safeguards imposed and expected by internaonal
human right law and that the right to freedom of
expression is arbitrarily infringed by this Act.
3. Conclusion
The Computer Misuse Act misses the mark as far
as internaonal standards of privacy and freedom
of expression are concerned. Internaonal human
rights law recognises the infringement of rights
which the Act facilitates and its failure to give
expression to the rights as required by the various
treaes. The Act is in need of urgent amendment
in order for Uganda to comply with its obligaons,
freely taken on as a member of the internaonal
community.
28 See discussion above under ‘Freedom of Expression’.
29 As above.
30 Notably, two of the persons to have been charged
under these provisions are two well-known crics of the
Museveni regime: Stella Nyanzi and Robert Shaka. See
details of these cases in case updates below.
SOURCE: hps://www.shuerstock.com
Human Rights Awareness and Promoon Forum (HRAPF) 35
www.hrapf.org
COMMENTARY
Provisions of the Computer Misuse Act and how they violate constuonally
protected rights of LGBTI persons in Uganda
Introducon
Even though there have been
improvements in the treatment of LGBTI
people across some parts of the world as
well as legal recognion of their basic humanity,
dignity and fundamental rights and freedoms,
it remains a fact that a number of countries in
the world, Uganda being one of these, are sll
quite hosle toward LGBTI people. In 2011,
the government enacted the Computer Misuse
Act, 2011 for the preservaon and protecon
of computer data and programs from unlawful
interference and access, as well as protecng
private individuals from interference with their
privacy and aacks on their character through
oensive communicaons, cyber stalking and
harassment and unauthorised access to and
modicaon of computer data and programs.
The basic idea was to protect the privacy of
individuals, to preserve data for purposes
of law enforcement and to protect vital data
from wanton distracon. Unfortunately,
this Act is likely to be problemac for LGBTI
persons because it has some secons which,
if interpreted and enforced against Uganda’s
homophobic, transphobic, and biphobic
background, will have catastrophic eects for
the constuonally protected rights of LGBTI
persons in Uganda. Some of these secons
are inherently harmful whereas others merely
have the potenal to be harmful given the
context in which they are likely to be enforced.
This arcle considers the likely implicaons of
some provisions of this Act for the rights of
sexual minories in Uganda, and also the real
implicaons as already recorded by HRAPF.
Patricia Kimera
Head, Access to Jusce
Division, HRAPF
The Constuon of Uganda and the
rights of LGBTI persons
The Constuon of the Republic of Uganda
is the supreme law of the country to which
any other law must conform and derive its
validity1 and any other law that is inconsistent
to it is void to the extent of its inconsistency.
Despite the absence of a specic provision
in the Constuon that expressly recognises
rights of LGBTI persons, the High Court and
the Constuonal Court in Uganda have
armed the universality of Human Rights as
entlements to every one irrespecve of their
sexual orientaon and gender identy and
percepons of the majority of the populace.
These pronouncements have been made in
various cases as discussed below.
Victor Juliet Mukasa and Yvonne Oyo v AG2: The
case involved the unlawful interference with
the applicants’ privacy through unauthorised
search. The unlawful search was conducted by
the police and local authories on suspicions
that the applicants were homosexuals. The
search was allegedly intended to unearth
evidence of homosexuality. In the process,
one of the applicants was arrested, fondled
and denied access to toilets by the police
ocers. Upon hearing the case, the High Court
found that the acons amounted to breach
of fundamental human rights and were a
violaon of various human rights instruments.
It was emphasised that it did not maer that
the applicants were actual or suspected
homosexuals. The ruling was a landmark in
clarifying the principle of universality of human
rights that accrue to all irrespecve of their
sexual orientaon or Gender Identy and as a
bar to arbitrary police intrusion into the private
lives of persons.
Kasha Jacqueline and 3 others v Rolling Stone
Newspaper3: In this case, the respondent tabloid
1 Art 2 of the Constuon of the Republic of Uganda,
1995 as amended.
2 Miscellaneous Applicaon No. 24 of 2006.
3 Miscellaneous Applicaon No. 163 of 2010.
The Human Rights Advocate | Fourth Issue - November 2017
36
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
published the photos, names and addresses of
suspected homosexuals including the applicants,
calling upon the public to hang them, as they
were aer children (allegedly recruing children
into homosexuality). In court, the applicants
argued that their rights to privacy and dignity
were violated, and the respondents contended
that that was not the case as the applicants were
openly homosexual. The judge claried that the
case was not about homosexuality but about
fundamental rights and freedoms. The court
further held that the scope of Secon 1454 was
narrower than gayism generally and that one
had to commit an act prohibited under Secon
145 in order to be regarded criminal. The court
therefore agreed with the applicants that there
was a violaon of rights.
The case of Jjuuko Adrian v AG5 challenged the
constuonality of secon 15(6)(d) of the Equal
Opportunies Commission Act, which barred
the Commission from handling and invesgang
maers which are considered immoral and socially
harmful and unacceptable by the majority of the
cultural and social communies in Uganda. The
Constuonal Court struck down the secon as
being unconstuonal for seeking to create a class
of social mists undeserving of the protecon of
the law in violaon of Arcle 21. The import of
the judgment is that every person in Uganda is
deserving of protecon of the law, and no-one
should be discriminated against or suer prejudice
on grounds of morality or public opinion.
The above cases directly and indirectly forfy the
posion that LGBTI persons are entled to the
same rights as everyone else. It should however
be noted that enjoyment of the rights provided
for under the Constuon can be limited within
the bounds of Arcle 43. This limitaon should
however not be beyond what is acceptable and
demonstrably jusable in a free and democrac
society.6 As far as LGBTI persons are concerned,
same sex conduct is criminalised in the Penal Code
Act and this was interpreted as a liming factor on
the enjoyment of their rights in the case of Kasha
J. Nabagesera and 3 Others v AG and Rev. Fr. Simon
Lokodo,7 in which the High Court acknowledged
the applicants’ rights to associate, express and
assemble, but noted that this was limited by the
Penal Code’s criminalisaon of same sex conduct.
The case is however subject of an appeal.
4 Penal Code Act Cap 120.
5 Constuonal Peon No. 1 of 2009.
6 Art 43(2)(c).
7 Miscellaneous Cause No. 33 of 2012.
In conclusion, although the majority of the
populaon in Uganda does not recognise LGBTI
persons as entled to the same rights as everyone
else, the legal regime is protecve of their
rights and oers various mechanisms for their
enforcement. Beyond Uganda’s legal framework,
the sub-regional, regional and internaonal
frameworks are also extensively protecve and
cognisant of the rights of LGBTI persons and have
taken deliberate steps to enforce them.8
Key Rights that are violated/threatened by
provisions of the Computer Misuse Act
i) The right to privacy
The right to privacy is guaranteed by Arcle
27 of Uganda’s Constuon9 as well as other
internaonal human rights instruments10. The
Arcle prohibits unlawful search of a person, their
property or home; and also prohibits unlawful
entry by others on the premises of another
person. This right underpins human dignity and
other key values such as freedom of associaon
and freedom of speech, and has become one of
the most important issues in the modern age of
technological advancement.
In relaon to LGBTI persons, privacy of body, home
and correspondence is crucial to them parcularly
those who idenfy as transgender. The violaon
8 Human Rights Awareness and Promoon Forum A Guide
to the Normave Legal Framework on the Human Rights of
LGBTI Persons in Uganda (2015).
9 Constuon of the Republic of Uganda, 1995.
10 See Art 12 of the UDHR, Art 17 of the ICCPR and General
Comment No 16 on the right to privacy.
The violation of this right
[to privacy] is often rooted
in simple curiosity by law
enforcement officers and the
general public but they are
perpetrated in such a way as
to give the process a cloak of
legitimacy, thereby allowing
egregious abuses of this right.
Human Rights Awareness and Promoon Forum (HRAPF) 37
www.hrapf.org
of this right is oen rooted in simple curiosity by
law enforcement ocers and the general public
but they are perpetrated in such a way as to give
the process a cloak of legimacy, thereby allowing
egregious abuses of this right. Some of the more
common violaons of the right to privacy faced
by LGBTI people in Uganda include unlawful/
unnecessary body searches, being forced to
undress in order to ascertain one’s gender/sex,
being spied on by neighbours upon suspicion of
one’s sexual orientaon or gender identy as well
as invasions of their homes and oces to search
through their properes and correspondences for
evidence of unnatural oences upon suspicion of
their sexual orientaon and gender identy.11
The Computer Misuse Act provides in Part II for
orders of court to preserve any data, disclose such
data or produce it for purposes of invesgang an
oence, and this order can be obtained without
the knowledge of the data subject since there
is no requirement in the law that the subject be
noed of such an order or applicaon for it.
Although sexual orientaon and gender identy
are not actually criminalised in Uganda with the law
focusing on sexual acts, the ruse of ‘invesgang
unnatural oences’ is oen used to harass,
inmidate and dehumanise suspected LGBTI
persons by both state and non-state actors.12 This
mode of enforcement has been transferred to
the enforcement of the Computer Misuse Act,
and was witnessed in a case where a transgender
woman was charged under Secon 24 of the
Act13 and the invesgang ocer admied to
having checked her Facebook account and found
some ‘strange pictures of her wearing dresses
that insgated him to further probe about her
gender identy’. Although the charges were later
dropped, her right to privacy had been violated.
This was done without obtaining the requisite
court order. Even then, the order can easily be
obtained as there is not much to prove besides
‘reasonable suspicion’ and the other party is not
given a chance to oppose the applicaon.
This is the same mischief likely to be occasioned
11 See Human Rights Awareness and Promoon Forum and
the Consorum on Monitoring Violaons Based on Sexual
Orientaon, Sex Determinaon and Gender Identy
Uganda Report of Violaons Based on Sexual Orientaon and
Gender Identy (2015).
12 Refer to the Civil Society Coalion on Human Rights
and Constuonal Law (SCCHRCL) and Human Rights
Awareness and Promoon Forum (HRAPF) Protecng
morals by dehumanizing LGBTI persons? A crique of the
enforcement of the laws criminalising same sex conduct in
Uganda (2013).
13 HRAPF/T/27/02/2017.
by Secon 28 of the Act which authorises a
magistrate, upon an applicaon by an invesgang
ocer, to order the search of any premises and
the seizure of any data, program, copies of data
or any computers ‘reasonably believed’ to be
evidence of the commission of an oence under
the Act. This provision in much the same way as
the foregoing provisions will impact negavely on
the right to privacy of LGBTI persons in Uganda as
it may be used injudiciously by law enforcement
agencies to target them for the simple fact that
they are an unpopular minority.
ii) The right to freedom of conscience, expression
and belief
This right is protected under Arcle 29 of
the Constuon of Uganda and in various
internaonal legal instruments which Uganda
has raed.14 It is a right that has connually
come under threat in Uganda of recent, with
various persons who have expressed strong
opinions cricising the government coming
under scruny and even being dragged to court
by the government in an aempt to curtail this
freedom.15 This Act now goes further to criminalise
some forms of expression in Secon 24 of the
Act, which criminalises cyber harassment. Part of
this secon denes cyber harassment to include,
among others, ‘making any request, suggeson
or proposal which is obscene, lewd, lascivious
or indecent.’ As always with laws alluding to
decency, morality or public dignity and interest,
these concepts remain nebulous and ambiguous,
giving wide discreon to the enforcing ocer to
determine what communicaon may qualify as
‘lewd’ or ‘lascivious’ or ‘indecent’. This will expose
suspected LGBTI persons to possible abuse
when communicaons such as texts and emails
between lovers are interpreted by law enforcers,
because of the fact that such communicaons
are between two persons of the same sex, to
be indecent or lewd. The same criteria would of
course not automacally apply to heterosexual
couples in the same situaon, unless there is a
reason to target that person specically.
14 Art 9 of the African Charter on Human and Peoples’ Rights;
Art 18 of the Internaonal Covenant on Civil and Polical
Rights.
15 Obbo and Another v Aorney-General Supreme Court
of Uganda, Constuonal Appeal No. 002 of 2002
at paragraph 62; See also N Slawson ‘Fury over arrest
of academic who called Uganda’s president a pair of
buocks’ The Guardian 13 April 2017 available online at
hps://www.theguardian.com/global-development/2017/
apr/13/stella-nyanzi-fury-arrest-uganda-president-a-pair-
of-buocks-yoweri-museveni-cyber-harassment about the
arrest of Dr. Stella Nyanzi.
The Human Rights Advocate | Fourth Issue - November 2017
38
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
iii) The right to equality and freedom from
discriminaon
This right is provided for under Arcle 21 of the
Constuon and provides that all persons are
equal before and under the law and that a person
shall not be discriminated against on grounds
spulated under Arcle 21(3). Although sexual
orientaon and gender identy are not protected
grounds under the Constuon, Uganda is a
signatory to the Internaonal Covenant on Civil
and Polical Rights (ICCPR). The Human Rights
Commiee,16 which oversees this instrument, has
declared sex as a protected ground, by implicaon
binding Uganda which is a state party. In addion,
as discussed above, all rights in the Constuon
apply to persons equally, including LGBTI persons.
Given the homophobic nature of the enforcement
of the various laws that aect LGBTI persons, it
is quite plausible that this Act will result in the
infringement of the right to equality of sexual
minories in Uganda in as far as there is great
potenal to use it to target unpopular minority
groups.17 These acts of unfair discriminaon on
the basis of sexual orientaon or gender identy
are given a kind of legimacy on the grounds that
same-sex sexual acvity is prohibited in Uganda.
In one of the cases handled at the legal aid clinic18
a client was terminated from employment aer
being charged with the oence of cyber stalking
which charges were later dismissed for want of
prosecuon. The charges were based on text
messages that the person sent to a fellow woman,
seeking a romanc relaonship. It is arguably
correct that if a person was sending the same text
messages to someone of the opposite sex, these
charges would not suce. It is therefore plausible
that secons of the Computer Misuse Act will
be used to witch hunt persons of the same
sex who innocently exchange sexual/romanc
communicaons with others, merely on grounds
that same sex expression of love is frowned upon.
iv) The right to a fair trial
This right is protected under Arcle 28 of the
Constuon. Arcle 28(12) of the Constuon
requires that every criminal oence be stated
in clear and unambiguous terms for it to be an
oence valid under the law. Vague and broadly
dened oences are not constuonal despite
their presence on the books of law and every
16 Toonen v Australia Communicaon 488/1992, UN Doc
CCPR/C/50/D/488/1992(1994).
17 See Human Rights Awareness and Promoon Forum The
Implicaons of the Enforcement of Idle and Disorderly Laws on
the Human Rights of Marginalised Groups in Uganda (2016).
18 NAK-C 200/2015.
arrest under such a law is a violaon of the right
to liberty. The Computer Misuse Act has various
provisions that are broad and vague and would
not pass the constuonality test. Secons 24
and 25 of the Act that create the oences of
cyber harassment and oensive communicaon
respecvely create broad undened oences.
These secons broadly prohibit ‘indecent’
‘lewd’ and ‘lascivious’ conduct, and prohibit
communicaon that ‘aempts to disturb the
peace’ of another person, among others. These
terms are not dened and it becomes hard to
know what conduct exactly is criminalised.
Considering the prejudice faced by LGBTI persons
in Uganda, these provisions are ferle ground for
abuse, as has been seen in the above case where
a woman sending text messages to another was
considered a criminal oence under the Act. As
was seen in that case, there was no evidence
adduced by the state and it was dismissed for
want of prosecuon.
Conclusion
The LGBTI movement in Uganda has fought for
and connues to ght for legal recognion of
the rights and dignity of LGBTI persons on the
same foong as all other persons. The Computer
Misuse Act with its vague provisions can be
abused if there are no safeguards for the respect
and protecon of fundamental rights. Whereas
the government is allowed to limit the enjoyment
of rights and freedoms, these limitaons must
be narrowly dened and must conform to the
internaonal standards to which Uganda has
agreed. The Computer Misuse Act falls short of
these accepted standards. As always, we sll have
great need to focus on advocacy for legal reform
to do away with all legal provisions, parcularly
those that impose criminal sancons, that are
over-broad or vague and that can therefore
be used to target LGBTI persons and legimise
homophobia and transphobia in Uganda.
...despite their [offences]
presence on the books of law
and every arrest under such
a law is a violation of the
right to liberty.
Human Rights Awareness and Promoon Forum (HRAPF) 39
www.hrapf.org
OPINION
For Ugandan communicators in the wake of Dr. Nyanzi’s arrest: how free is our freedom
of expression?*
In March 2017 Stella Nyanzi; a ‘thinker,
scholar, poetess, lyricist, writer, Facebooker
and creave producer’1 was charged by
the Uganda Police, for oensive communicaon
contrary to secon 25 of the Computer Misuse
Act 2011.
The parculars of the oense read as follows:
‘Stella Nyanzi … made a suggeson or
proposal referring his Excellency Yoweri
Kaguta Museveni as among others ‘A pair
of Buocks’ which suggeson/proposal is
obscene or indecent.2
Since Nyanzi’s arrest, Ugandan communicators
including those who ulize social media
plaorms such as Blogs, Facebook and Twier
have been debang the queson, ‘How free is
* An earlier version of this arcle was rst published on
Arinda Daphine’s blog ‘EVABella’ on 20th April, 2017.
It can be found at hps://arindaphine.wordpress.
com/2017/04/20/for-ugandan-communicators-in-the-
wake-of-nyanzis-arrest-when-do-we-cross-the-line-
of-freedom-of-expression/ (Accessed on 20th October,
2017).
1 Aljazeera and News Agencies, Museveni cric Stella Nyanzi
to Appear in Court, 10th April, 2017, Available online hp://
www.aljazeera.com/news/2017/04/museveni-cric-
stella-nyanzi-court-170410074726763.html (Accessed
on 20th October, 2017).
2 Bwesigye Bwa Mwesigire, African Arguments, Uganda:
Stella Nyanzi Charged for Calling President Museveni
a “Pair of Buocks”, April 10, 2017. Available online
hp://africanarguments.org/2017/04/10/uganda-
stella-nyanzi-charged-calling-president-museveni-pair-
buocks/ (Accessed on 26th October, 2016).
Arinda Daphine
Story teller, Lawyer and
Poet
our freedom of expression and when does
oensive language become criminal?’ This
arcle seeks to contribute to that debate.
The freedom of expression is guaranteed
under Arcle 29(1) (a) of the 1995 Constuon
of the Republic of Uganda. This provision
states that ‘every person shall have the right
to freedom of speech and expression which
shall include freedom of the press and other
media.’ ‘Other media’ in this context includes
social media plaorms like Facebook that
Stella Nyanzi ulized to voice her crique on
how Uganda is being governed.
While the current Constuon is lauded
for being progressive and democrac3, it
gives no denion of the right to freedom
of expression. The old 1962 and 1967
Constuons dened the right to freedom of
expression as ‘Freedom to hold opinion and
to receive and impart ideas and informaon
without interference. This denion is sll
relevant today as was held by the Supreme
Court of Uganda.4
Every person therefore has a right to hold
an opinion as well as the right to decide
whether to express it or not. An opinion can
be disseminated through polical discourse,
canvassing, cultural and arsc expression,
religious discourse, teaching, and through
commercial adversing.5 Stella Nyanzi
3 JP Muto-Ono P ‘Freedom of Expression “Uganda
Laws Best in Africa” Black Star News 23rd July
2015. Available online hp://www.blackstarnews.
com/global-polics/africa/freedom-of-
expression-%E2%80%9Cuganda-laws-best-in-
africa%E2%80%9D-media (Accessed 11 November
2017).
4 Obbo and Another v Aorney General 20040 AHRLR
256 9ugSc 2004 available online hp://www.chr.
up.ac.za/index.php/browse-by-subject/486-uganda-
obbo-and-another-v-aorney-general-2004-ahrlr-
256-ugsc-2004.html (Accessed 11 November 2017).
5 Human Rights Commiee, General Comment No. 34,
12th September 2011. Available online hp://www.
refworld.org/docid/4ed34b562.html (Accessed 11
November 2017).
The Human Rights Advocate | Fourth Issue - November 2017
40
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
prefers cultural and arsc expression. In 2016 she
staged an undress protest at Makerere University
and while her acons were misconstrued as lewd,
she was making a strong cultural statement that
resonates with what Aili Mari Tripps said:
‘Women give life, and so to put the most
private symbols of motherhood into the
public arena is to negate that life, and say
those in power are dead to Society’6.
‘Pair of Buocks’ is an arsc and cultural
expression. Charles Onyango Obbo explains the
connecon between Nyanzi’s words and culture
when he writes,
the derriere … is also where we get rid
of the waste in our bodies, and the most
snging source of African insult. Nyanzi
drew from the laer.7
The term ‘oensive’ should only be accorded
to grave expressions such as those that incite
discriminaon on the basis of race, religion
6 The real African Undress for Redress: The Rise of Naked
Protests in Africa 15th June 2016.
7 C Onyango Obbo, Uganda: ‘A pair of Buocks” and the
Big Silent War Over the Museveni Years. The Monitor
19th April , 2017. Available online hp://allafrica.com/
stories/201704190015.html (Accessed 11 November
2017).
or naonality. In Malcom Ross v Canada,8 a
teacher lost his teaching posion because of
the expression of his views as an author. The
Human Rights Commiee stated that this was
a restricon on his freedom of expression that
had to be jused. It was held that the author’s
statements were discriminatory against persons
of the Jewish faith and ancestry and therefore the
restricon was jused on those grounds.
Recent developments in Uganda reveal that most
of what is referred to as ‘oensive language’ by
the state is usually personal opinions against the
8 Malcom Ross v Canada The Human Rights Commiee,
Communicaon No. 736/1997, UN DOC. Available
online hp://hrlibrary.umn.edu/undocs/736-1997.html
(Accessed 11 November 2017).
SOURCE: www.washingtonpost.com
Dr. Stella Nyanzi
Besides Stella Nyanzi, other
Ugandans have had their right
to freedom of expression
gagged on grounds of
‘offensive language’.
Human Rights Awareness and Promoon Forum (HRAPF) 41
www.hrapf.org
regime and does not qualify to be categorised as
‘oensive.
Besides Stella Nyanzi, other Ugandans have had
their right to freedom of expression gagged on
grounds of ‘oensive language’. In October 2016,
the Uganda Communicaons Commissions (UCC)
issued a direcve against NTV compelling the
TV staon to stop broadcasng programmes
featuring Frank Gashumba as a guest speaker
because the polical analyst was allegedly using
profane and abusive language.9 In November
2015, the UCC issued a similar direcve against
ve radio staons as well as four television
staons, which rounely hosted Mirundi Tamale,
a renowned polical analyst.10
The pernent queson to pose here is: in what
circumstances is the state jused to restrict the
right to freedom of expression?
The right to hold opinions and to impart ideas and
informaon’ is not an absolute one and according
to Arcle 43 of the Constuon, it can be limited
if its enjoyment will prejudice the freedoms of
others or if public interest demands so. Ugandan
communicators only cross the line of freedom of
expression if their expressions threaten naonal
security, or, public health, or, public order, or,
public morals, or, amount to an infringement of the
rights of others. Only then, can the State restrict
the Communicator’s freedom of expression.
However before being imposed, the restricon
must be subjected to the three tests:11 it must for
be provided by the law, have a legimate aim and
must be necessary.
Regarding the rst test, the law that was relied
on in the case of Stella Nyanzi is the Computer
Misuse Act 2011 which creates the crime of
‘oensive communicaon’. Secon 25 of that law
provides that a person commits the crime when
he/she willfully and repeatedly uses electronic
communicaon to disturb or aempts to disturb
the peace, quiet or right of privacy of any person
with no legimate purpose. Determining what
amounts to ‘disturbing the peace and quiet’ is
9 UCC Statement to NTV Uganda, 10th October 216. Available
online hps://www.scribd.com/document/329243268/
UCC-statement-to-NTV-Uganda (Uploaded by African
Centre for Media Excellence) (Accessed 11 November
2017).
10 N Bwire & N Wesonga, UCC Blocks Mirundi from TV, Radio,
Daily Monitor, 2nd December, 2016. Available online
hps://www.scribd.com/document/329243268/UCC-
statement-to-NTV-Uganda
11 Art 19(3) of the Internaonal Convenant on Civil and
Polical Rights.
a legal queson that must be answered before
convicng the individual.
In 1985 Yong-Joo Kang of Korea was arrested
and detained under allegaons of contravening
the Naonal Security Law because he wrote
publicaons that were said to be aimed at
destroying the free and democrac basic order
of Korea. The Human Rights Commiee heard
his case and found that any law that compels
an individual to alter his/her polical opinion
restricts the freedom of expression.12 Holding a
dissenng view about the ruling party does not
amount to ‘disturbing the peace’ and therefore
Ugandan communicators are entled by right to
hold opposing opinions against the government
and to express these opinions through various
mediums.
Secondly, the restricon must have a legimate
aim. The law should be aimed at protecng
naonal security, or, public health, or, public
order, or, public morals, or, the rights of others. A
desire to shield a government from cricism can
never jusfy restricons on free speech as was
enunciated in the case of Yong-Joo Kang above.
Thirdly, the restricon must be necessary. In Obbo
and Another V Aorney General13, a case challenging
the law criminalizing the ‘publicaon of false news’,
the Supreme Court of Uganda expounded that
this test has three elements; it requires that the
objecve of the restricon should be suciently
important to override a fundamental right, that
the measures set to achieve the objecve must
not be arbitrary, unfair or based on irraonal
consideraons, and, that those measures must
be proporonate and necessary to achieve the
objecve of the restricon.
Ugandan Communicators should boldly hold and
express their views, plainly or metaphorically.
We should not be inmidated when the State
threatens us, as has been done to some of
the vocal polical analysts. If we know when
the restricons on our rights apply, then we
can comfortably speak our minds. Cricism of
government is pernent in aaining a free and
democrac Uganda and we can legally do this
using our art, our words and our bodies as long as
we keep within the permissible boundaries set by
both naonal and internaonal laws.
12 Yong-Joo Kang v Republic of Korea, Communicaon Number
878/1999 U.N. Doc. Available online hp://hrlibrary.umn.
edu/undocs/878-1999.html (Accessed 11 November
2017).
13 Supra, note 4.
The Human Rights Advocate | Fourth Issue - November 2017
42
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
COMMENTARY
How the Computer Misuse Act, 2011 silences dissenng voices
In 2011, the President of Uganda assented
to the Computer Misuse Act, 2011. He thus
added to the number of already exisng
cyber laws in the country. The legislaon was
introduced due to an increase in the number of
cizens ulising the internet and thus the need
to control the internet more. However, rather
than introducing it for real protecon reasons, the
Act was introduced more as a way of controlling
the internet, as the state saw it as one of the
remaining independent plaorms where a decent
and sound debate can take place and where ideas
can be shared without polical interference.
As a result, the online space is increasingly
shrinking as acons that threaten the enjoyment
of online freedoms and rights in Uganda are
stemming from the exisng cyber legal framework,
including the Computer Misuse Act, 2011. The
Act is responsible for creang oences related
to computers and introducing heavy penales.
The oences include: as cyber harassment, child
pornography, oensive communicaons and
cyber stalking. The maximum penales for these
oences range from 1 to 5 years of prison with the
excepon of child pornography, which generates
a maximum sentence of 15 years.
In the framers’ perspecve, the Act makes
provision for safety and security of electronic
transacons and informaon systems, to prevent
unlawful access, abuse or misuse of informaon
systems including computers. This presents a rosy
picture of the Act while its deeper analysis reveals
the violaon of cizens’ rights to privacy, freedom
of expression and access to informaon.
Indeed, the Act is commonly used by security
agencies to criminalise freedom of expression
Dorothy Mukasa
Research Ocer,
Unwanted Witness
online, parcularly Secon 25 of the Act, which
has been repeatedly invoked to charge users with
oensive communicaon. Notably, individuals
charged had expressed dissenng polical views.
Individuals like former Makerere research fellow,
Dr. Stella Nyanzi and polical acvists Swaibu
Nsamba are among those that have faced the
wrath of this secon.
In describing liability for oences related to
computers, the Act sets vague denions for
condions required for the oences to be at
hand thus contravening the requirement of
both unambiguous and foreseeable provisions
in Internaonal law and can have a hampering
eect on freedom of expression. The Act also
gives police ocers wide discreonary powers to
search and seize if they suspect commission of an
oence and yet the level of evidence required is
low, only amounng to the reasonable grounds
in order for the extensive search powers to be
triggered. These far reaching powers of search
and seizure combined with the low threshold of
evidence required constute a threat to privacy
and freedom of expression.
Notwithstanding, the awareness of these
extensive powers can have a chilling eect on
the use of freedom of expression in the digital
environment as people can be afraid of risking a
police search on loose grounds.
... the Act sets vague definitions
for conditions required for the
offences to be at hand thus
contravening the requirement
of both unambiguous and
foreseeable provisions in
International law and can have a
hampering effect on freedom of
expression.
Human Rights Awareness and Promoon Forum (HRAPF) 43
www.hrapf.org
OPINION
Computer Misuse Act 2011: Rule of by law under pax Musevenica
Argument
There is no humane way to rule people
against their will.
‘To protest in the name of morality against
“excesses” or ‘’abuses’’ is an error which hints at
acve complicity…” wrote Simon de Beauvoir.1
It is in the same spirit that I invite the reader
to think about and interpret the Computer
Misuse Act of 2011. It is one of a series of
incessant excesses that have been visited
onto civic space in Uganda by the Museveni
Administraon.
It is neither an aberraon nor is it a mistake;
it is a logical progression (or more accurately,
a natural regression) of a hybrid regime that
is increasingly intolerant of both alternave
thought and dissent.
Substanve Arcle
In addion to coloured water cannons,
stockpiles of teargas, batons and pepper spray
to quell demonstraons and protests, a regime
such as the one that Gen. Yoweri Museveni
leads must naturally enact laws like the
anquated Polical Pares and Organisaons
(Amendment) Act Number 2 of 2010, the
infamous Public Order Management Act 2013,
the dubious An-Money Laundering Act 2013,
the annulled An-Homosexuality Act of 2014,
1 N Klein Shock Doctrine: The Rise of Disaster Capitalism
(2008) 132.
Andrew Karamagi,
Lawyer and Polical
Acvist
the misogynist An-Pornography Act of 2014,
the Non-Governmental Organisaons Act
2016 and the latest amendments to the An-
Terrorism (Amendment) Act of 2017.
Oppression is a sine qua non for regime
longevity.
Put in other words, oppression must become
legal. Suce it to say that the legislave
agenda of the long-standing Museveni
Regime over the past decade has le a clear
and unmistakable footprint that aspires to
criminalise constuonally-protected liberes
and freedoms like assembly, associaon and
expression.
This can be gleaned by a cursory perusal of
the Hansard, as the foregoing litany of Acts
shows. This is the backdrop against which
the Computer Misuse Act of 2011 should be
viewed and understood. It is not a stand-alone
legislaon but a natural evoluon of a polical
establishment that brooks no dissent.
Far from the rosy wording of the Act’s objecve
which purports to have been enacted to make
provision for the safety and security of electronic
transacons and informaon systems; to
prevent unlawful access, abuse or misuse of
informaon systems including computers and
to make provision for securing the conduct
of electronic transacons in a trustworthy
electronic environment, Secons 9 through 11
of the law as a maer of fact aspire to enable
state intelligence agencies to overstep privacy
rights without restricon and proer charges
on the basis of an individual’s refusal to so
disclose ‘data’ which has been broadly, vaguely
and disproporonately dened to mean and
include electronic representaons of any form.
Under these three secons (9-11) any person
can be compelled to hand over any ‘data’ for
purposes of assisng with invesgaons. It
doesn’t maer if my tablet computer’s memory
card contains my private health informaon,
bank statements or privileged communicaons:
I must hand it over and trust(!) the state to
behave prudently with my informaon as it
The Human Rights Advocate | Fourth Issue - November 2017
44
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
pursues whatever invesgaon.
Telecom service providers are equally compellable.
Contrary to the tenets of criminal law which
requires specicity, Secon 12 creates
indeterminate oences that are open to overly
broad and arbitrary denions given the unique
and evolving nature of informaon and compung
technologies.
Secon 13 concerns itself with ‘access with intent
to commit or facilitate the commission of a further
oence.’ It is not clear how the State will lead
evidence insofar as the intenon of an accused
person to commit or facilitate the commission of
a further oence will be proved or disproved.
Secon 14 worsens an already bad situaon by
(potenally) enacng to the eect that private
informaon stored on a computer may not be
concealed, protected or modied for whatever
reason, notwithstanding that the user is the
owner of the said device. The Secon does not
take into consideraon the work of the broad
range of arsts whose work revolves around use
of informaon to convey a parcular message.
This provision is equally ripe for abuse and misuse.
Secon 18 and 20 are not accommodave of
the place of whistleblowers who by their very
nature engage in the disclosure of unauthorised
informaon of the kind that is enumerated under
sub-secons (2)(a) to (d).
The most egregious enactment under this law
is arguably Secons 24 and 25 which create
the crimes of cyber harassment and oensive
communicaons respecvely. As I have argued
in a yet-to-be-heard peon that I led with
another cizen, Robert Shaka, before the
Constuonal Court, I nd the impugned Secon
to be an excessive restricon on my freedom of
speech and expression.2 It provides the Director
of Public Prosecuon unbridled administrave
and prosecutorial discreon which has indeed
resulted in several cases of selecve prosecuon
of Internet users based on certain views deemed
objeconable by the Government or high ranking
policians and public ocers.
Two recent cases stand out: the arrest, detenon
without charge and later prosecuon of my co-
2 Andrew Karamagi & Robert Shaka v Aorney General,
Constuonal Peon No. 5 of 2016.
peoner, Robert Shaka and my co-author,3
Dr Stella Nyanzi. In the former case, the
prosecuon alleges that Shaka disguised himself
as ‘Tom Voltaire Okwalinga’—a popular an-
Establishment Facebook page—between 2011
and 2015, Kampala, of willfully and repeatedly
using a computer with no purpose of legimate
communicaon, disturbed the right to privacy
of President Museveni by posng statements
regarding his health condion on social media.4
For her part, Nyanzi, who is an academic and cric
of the Museveni Administraon, was violently
arrested, detained and slapped with a litany of
charges, among them oensive communicaons,
especially for referring to President Museveni as a
‘pair of buocks’.5
An erstwhile Police spokesperson, Fred Enanga,
once circulated a warning about the dangers of
making posng polically-related informaon or
content on social media because of the likelihood
of being prosecuted for the same. Indeed, a few
people were interrogated by Police over such
posngs. This kind of behaviour and conduct by
the Police is most reprehensible, amounts to an
abuse of its civilian mandate and an aront to the
Constuon.
3 S Nyanzi & A Karamagi ‘The socio-polical dynamics of
an-homosexuality legislaon in Uganda’ 29:1 Agenda
(2015) 24-38.
4 n 3 above.
5 S Allison ‘Uganda: Stella Nyanzi, the vulgar acvist, takes
on the Pair-of-Buocks-in-Chief’ Daily Maverick 11th April
2017 available online at hps://www.dailymaverick.co.za/
arcle/2017-04-11-uganda-stella-nyanzi-the-vulgar-
acvist-takes-on-the-pair-of-buocks-in-chief/#.WO8-
AGz9ly0 (Accessed 21 October 2017); N Slawson ‘Fury
over arrest of academic who called Uganda’s president a pair
of buocks’ The Guardian 13 April 2017 available online at
hps://www.theguardian.com/global-development/2017/
apr/13/stella-nyanzi-fury-arrest-uganda-president-a-
pair-of-buocks-yoweri-museveni-cyber-harassment
(Accessed 21 October 2017).
Section 25 has placed
journalists, artists, students
and academics as well as the
broader public in constant
fear of violating the law.
Human Rights Awareness and Promoon Forum (HRAPF) 45
www.hrapf.org
Secon 25 has placed journalists, arsts, students
and academics as well as the broader public in
constant fear of violang the law. This fear is
obviously one of the intended consequences
of the law. Without a doubt, this amounts to
a violaon of the right to free thought (and
ulmately expression) which is the foundaon of
Arcle 29(1)(a) of the 1995 Constuon of the
Republic of Uganda.
Needless to say, both Secons are also vague
and overly broad. They fall short of giving proper
noce of the conduct that they seek to proscribe
and terms such as ‘disturb or aempt to disturb
the peace, quiet or right of privacy’ are not dened
in the Act, and cannot be conclusively dened
by a regular user of the internet. Consequently,
and consistent with the repressive agenda that
is reected by the laws preceding and coming
aer the Computer Misuse Act of 2011, the
Police and governmental authories will arrest
and prosecute otherwise confused cizens in an
arbitrary and whimsical manner.
Secon 28 is, as with previously highlighted
provisions, prone to abuse and selecve
applicaon to the extent that it aords the State
an unbridled ability to conduct searches and
seizures on homes, oce premises (especially
media house), vehicles or cras and any other
locaon on the ostensible claim that there
are reasonable grounds for believing that an
oence under the Act has been or is about to be
commied in any premises. This would embolden
and provide ‘legal’ grounds for outrages like the
police raid on The Monitor Publicaons in May
2013 which was executed on the imsy grounds
that a leer wrien (and already published) by
the same newspaper, aributed to renegade Gen.
David Sejusa was a threat to naonal security!6
What is to stop the regime from raiding, searching
and seizing especially media houses on the pretext
of the belief that an oence has or is about to be
commied under the said Act?
Before the enactment of the Public Order
Management Act in 2013, the Police rounely
clobbered and dispersed peaceful demonstraons
and protests arguing that they were illegal. This
notwithstanding the Supreme Court decision
to the eect that the Police had no power to
prohibit public gatherings but only to regulate
6 S Kafeero ‘Sejusa Leer: How we were closed, reopened’
Daily Monitor 5th August 2017 available online at hp://
www.monitor.co.ug/News/Naonal/Sejusa-leer-
Monitor-Kayihura-Muhoozi-Grace-Akullo/688334-
4044870-13my9qn/index.html (Accessed 21 October
2017).
and provide security when such gatherings (about
which the Police has been noed not requested
to authorise) are so convened. The enactment
of that law legalised what the Police was already
doing but wanted to do with legal cover. The
same can be said of the fortunately annulled An-
Homosexuality Act of 2014 which aorded the
regime the short-lived latude to harass persons
of sexual orientaons that individual higher-ups
within the regime nd ‘disgusng and unnatural’.
The perennial harassment of Non-Governmental
Organisaons, parcularly those involved in
governance-related work, had to be codied in
the NGO (Registraon) Act of 2016 so that it
connues under a veneer of legality. Similarly,
the targeng of dissenng voices under the An-
Money Laundering or An-Terrorism Acts had to
be sanised through the enactment of a law.
At the me of wring this piece, everybody is
talking about the proposed amendment to Arcle
26 of the Constuon to allow for compulsory
acquision of land for public purposes—contrary
to the current spulaon of the said Arcle
which enacts to the eect that acquision of
private land by government must be done aer
prior and adequate compensaon.7 Yet several
parcels of private (and in other cases public) land
have been acquired without prior and adequate
compensaon. This has led to a phenomenon that
is referred to as ‘land grabbing’. It has occurred
for years and is now commonplace—almost
always perpetrated by those with possession or
access to arms and/or ‘polical connecons’ that
enable this criminality with absolute impunity.
Amending Arcle 26 will in essence legalise land
grabbing. Like the Public Order Management
Act sought to criminalise the rights to assembly;
the An-Homosexuality Act butchered equality
before and under the law regardless of one’s
sexual orientaon or other such disncon;
the Computer Misuse Act was enacted for the
sole purpose of proscribing dissent and contra-
Establishment opinions as conveyed on social
media sites and plaorms.
It is a legislave agenda that is predicated on
the unsustainable premises of subjugaon and
inmidaon.
Yet, as history and current events connually
remind us, a land ruled by fear can never be happy
or secure.
7 Constuonal (Amendment) Bill No. 13 of 2017.
The Human Rights Advocate | Fourth Issue - November 2017
46
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
respecvely contravene sub-secons 24(1)(2)
(a) and 25 of this legislaon. The wording of this
charge sheet, perhaps, heightened the notoriety
of this case to its fever-pitch levels. Specifying the
parculars of the rst count of cyber harassment,
the verbam statement reads:
Stella Nyanzi on the 28th January 2017
at Kampala district or thereabout used a
computer to post on her Facebook page
‘Stella Nyanzi’ wherein she made a suggeson
or proposal referring his Excellency Yoweri
Kaguta Museveni as among others ‘a pair
of buocks’ which suggeson/ proposal is
obscene or indecent.
The air waves, television screens, and newspapers
comprising tradional public media and diverse
social media plaorms went into overdrive mode
discussing the wording of ‘a pair of buocks’.
Comedians, cartoonists, musicians, poets,
dramasts and computer graphics designers
produced creave works using this reference.
Consequently #PairOfBuocks was organically
created, circulated and trended for weeks on
end on the World Wide Web – parcularly on
Twier, Facebook and Instagram. Rather than
arresng its further circulaon, my arrest and pre-
trial detenon instead refueled the currency of
this tongue-in-cheek metaphor that I applied to
describe the president of Uganda. Copies of this
charge sheet were shared widely on social media
plaorms – parcularly Whatsapp, Facebook and
Twier.
On the charge sheet, the parculars of the second
count - namely oensive communicaon were
stated verbam as follows:
Stella Nyanzi between January 2017 and
March 2017 in Kampala district willfully and
repeatedly used electronic communicaon
to post messages oensive in nature via
Facebook, transmied over the internet to
disturb or aempted to disturb the peace,
quiet or right of privacy of His Excellency
the President of Uganda Yoweri Kaguta
Museveni with no purpose of legimate
communicaon.
On the night of 7th April 2017, I was abducted
from a car by eight men and two women who
Considering that I am the accused party
in the most notorious local case based
on the Computer Misuse Act (2011), it
is a wonderful opportunity for me to provide an
insight into Buganda Road Criminal Case No.
319 of 2017, Uganda v. Stella Nyanzi. I am wring
in direct response to the intensity and volume
of widespread local, regional and internaonal
interest in the case proceedings; arising from
the lay public, legal praconers, human rights
advocates, academics, journalists and other public
media workers, members of the opposion in
Uganda, and social media users. Although several
narraves have been told about this case, I value
the opportunity to add my own interjecon
in which I tell my own story. However, it is
noteworthy that in a bid to cancel my bail, the
State Prosecutor has already alleged before court
that my social media posts wrien subsequent to
my release contravene the subjudice rule and are
thereby in contempt of court. Thus, in this arcle,
I will self-censor by desisng from discussing the
merits and limitaons of the arguments of the
case. Rather, I will focus on providing the facts of
the case, as well as detail the progress so far to the
present me.
The Polics of Naming Cases
The charges leveled against me arise out of the
Computer Misuse Act (2011). In a revised charge
sheet from the headquarters of the Criminal
Invesgaon Department dated 23rd March
2017, bearing reference number E/79/2017 and
prepared by Deputy Assistant Superintendent
of Police (D/ASP) Kayiza Henry, two counts of
oences are stated – namely cyber harassment
and oensive communicaon. These crimes
CASE UPDATE
#PairOfBuocks: Uganda v. Stella Nyanzi
Stella Nyanzi (PhD),
Makerere Instute of
Social Research
Email:
snyanzi@misr.mak.ac.ug
Human Rights Awareness and Promoon Forum (HRAPF) 47
www.hrapf.org
were not wearing uniforms. My immediate captor
was wearing a woolen mask over his face. They
neither had idencaon papers, nor an arrest
warrant. They neither explained my alleged crime,
nor revealed where they were taking me. Although
they proceeded to search the vehicle from which
they bundled me, they did not produce a search
warrant. They dumped me into one of their three
vehicles and drove circuitously around Kampala
city; somemes stopping adjacent to police staons
and then moving on. Aer three hours of aimless
driving, they sped to Kira Division Police Staon
where I was locked up in a cell for three nights.
On the evening of 9th April 2017, in the presence
of my legal team (comprising Nicholas Opiyo,
Sheillah Nyanzi, Lilian Drabo and Shawn Mubiru),
I underwent the roune Charge and Cauon
procedure in which the rst charge sheet read to
me was solely focused on the crime of solicing
for money from the public using the internet in
contravenon to the law which requires nofying
the police before undertaking any fundraising.
These allegaons were based on a fundraising
drive that I started on my Facebook meline,
inving concerned cizens to contribute nancially
and in kind towards the #Pads4GirlsUg campaign
aimed at distribung menstrual hygiene materials
(including soap, re-useable and disposable sanitary
pads) to school-girls in Uganda. The campaign to
collect and distribute sanitary pads was a direct
challenge to both President Museveni’s failed
promise made during elecons campaigns, and the
First Lady’s declaraon that government lacked
money to provide the promised sanitary pads.
Aer the charges were read to me, I chose not to
say anything in my statement to the police ocers.
On 10th April 2017, amidst ght security, I was
arraigned before the chief magistrate at Buganda
Road Court to begin my incredible experience
with the judicial system in a repressive military
dictatorship.
Twists and Turns of #PairOfBuocks
Criminal Case
This criminal case was allocated to Chief Magistrate
James Ereemye Mawanda. The state (oce of the
Director of Public Prosecuons) was represented
by Resident State Aorney Jonathan Muwaganya.
My defense counsel comprised Nicholas Opiyo,
Isaac Semakadde, Julius Galisonga, Lilian Drabo
and Eron Kiiza. Within a courtroom jam-packed
with local and foreign journalists, uniformed and
plain-clothed security personnel, human rights
defenders, social media acvists, family, friends
and supporters, the revised charges of cyber
harassment and oensive communicaon were
read to me. However, before the Chief Magistrate
proceeded to ask me about how I pleaded, the
SOURCE: hps://cs.mg.co.za
Dr. Stella Nyanzi in court.
state prosecutor hijacked the court processes
by introducing what he termed as a pre-plea-
taking applicaon for the court to subject me to
involuntary mental examinaon in accordance
with the Mental Treatment Act (1938). Court
adjourned for a short interlude, in order for the
magistrate to examine the new applicaon for
mental examinaon. Thereaer, I pleaded ‘Not
Guilty’ to both charges of cyber harassment and
oensive communicaon of the president. My legal
team expected to proceed with the applicaon for
release on bail. However, under undue pressure
to impress the state, the magistrate refused to
hear my applicaon for bail. Instead, he proceeded
to remand me to maximum security prison unl
25th April 2017. In uer disbelief, I boarded the
maroon prison bus with several other accused
and sentenced persons – and made my way to
Luzira Women’s Prison where I was to spend the
next thirty-three days of my life.
Unbeknownst to me, on 11th April 2017, my legal
team wrote an applicaon to the Registrar of the
High Court, seeking for revision of the proceedings
against me in the lower court specically
quesoning the jusce in the magistrate’s refusal
to hear my bail applicaon, as well as seeking
guidance about whether the trial should proceed
under the Magistrates Courts Act and the
Computer Misuse Act, rather than relying on an
applicaon invoking the archaic Mental Treatment
Act. The deputy registrar of the Criminal Division
of the High Court, Eleanor Khainza, summoned
for my case le, as well as updated notes of the
trial proceedings. The case was assigned to Jusce
Elizabeth Kabanda and scheduled for 26th April
2017.
On 24th April 2017, Nicholas Opiyo of Chapter
Four Uganda and Wade McMullen of Robert F.
Kennedy Human Rights submied a joint peon
to the United Naons Working Group on Arbitrary
Detenon regarding this case.
The Human Rights Advocate | Fourth Issue - November 2017
48
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
On 25th April 2017, when I appeared before the
lower court, all pares agreed that in light of the
pending guidance and ruling from the High Court,
the case would only come up for menon. Court
was adjourned to 10th May 2017.
Drumming up the most elaborate drama and
fanfare, Jusce Elizabeth Kabanda ordered all
journalists and other public media workers to be
barred from aending the proceedings in the High
Court. Rather than hear the submissions of my legal
team in a courtroom open to the public, she chose
to hold closed-door hearings in her ny chambers
which could hardly accommodate the enrety of
my enlarged legal team which was buered up
by addional counsel. In the absence of wrien
submissions, she allocated the lawyers only ve
minutes in which to make their oral submissions.
In spite of their elaborate preparaons, only two
of the lawyers were allowed the opportunity to
speak in that me. She adjourned the session unl
03:30PM, when she would give her ruling. Given
the congeson of the session in her chambers, as
well as the public interest in the proceedings, the
defense team requested for relocaon to one of
the many available open courtrooms. In her High
Court Ruling No. 9 of 2017, Jusce Elizabeth
Kabanda sent the case back to the lower court,
directed the magistrate to expediously handle
my bail applicaon, and also insisted that the
magistrate has power to hear the applicaon for
mental examinaon under the Mental Treatment
Act. I returned to maximum security prison.
Although I was physically weak from illness,
diagnosed with and treated for severe malaria by
the prison health workers, I appeared at Buganda
Road Magistrates Court on 10th May 2017. This
me around, the magistrate entertained my
applicaon for bail and was physically introduced
to my ve surees – namely Dr. Moses Khisa, Ms.
Solome Nakaweesi-Kayondo, Ms. Sheillah Nyanzi,
Mr. Georey Wokulira Ssebaggala, and Ms. Annet
Nana. The state prosecutor belaboured to make a
case for the need for the court to subject me to
mental examinaon and requisite mental treatment,
prior to granng me bail. The prosecutor also
aempted to advise the magistrate to condion
my release on bail upon restricng my freedom of
expression and social media wrings parcularly
insisng that I should be barred from wring about
members of the president’s household. Ignoring
these arguments, I was released on bail and
given non-cash court bond of ten million Uganda
Shillings. Court was adjourned to 25th May 2017.
In the period immediately aer my release on
bail, a new legal team was constuted upon
receiving my wrien instrucons to 1) peon
the Constuonal Court against arcles in the
Mental Treatment Act that contravene several
rights provided for in the constuon, 2) submit
an applicaon to the Chief Magistrate to halt the
mental examinaon procedure arising out of the
Mental Treatment Act – pending the ruling on the
peon, and 3) proceed with the hearing and trial
of the criminal case arising out of the Computer
Misuse Act. On 25th May 2017, my new legal team
under the leadership of Constuonal Law expert
Peter Walubiri introduced Constuonal Court
Peon No. 18 of 2017, Stella Nyanzi v. Aorney
General and applied to the lower court to stay
the state prosecutor’s applicaon to subject me
to mental examinaon. Furthermore, my lawyers
prayed that court proceeds with the hearing and
trial of the criminal case in which I am charged with
cyber harassment and oensive communicaon
against the president. Court was adjourned to 7th
June 2017.
Although copies of our submissions were
previously given to the state prosecutor, on 7th
June 2017 Resident State Aorney Jonathan
Muwaganya denied having received the same
documents, and asked the court to give him more
me to examine both the Constuonal Peon
and the applicaon to the lower court to halt the
proceedings of the mental examinaon applicaon.
In spite of protestaons from my defense lawyers,
the Chief Magistrate agreed to give the state
prosecutor two weeks to read the documents
and prepare his rebual. Disappointed about the
gimmicks of legal professionals wasng the me
of court, I wrote about the state prosecutor’s
The prosecutor also attempted
to advise the magistrate to
condition my release on bail
upon restricting my freedom
of expression and social media
writings particularly insisting
that I should be barred from
writing about members of the
president’s household.
Human Rights Awareness and Promoon Forum (HRAPF) 49
www.hrapf.org
sloppiness, tardiness and underhandedness on my
Facebook meline. I decried the blatant waste of
public resources contained within the audacity of
a public ocial coming to court without preparing
by reading documents provided for a hearing.
A new twist was introduced into the court hearing
on the morning of 20th June 2017. Full of renewed
gusto, the state prosecutor asked the Chief
Magistrate to cancel my release on bail because
he alleged that I violated the subjudice rule in my
social media wrings about the case. Subming
copies of my Facebook posts about his previous
performance in court, he argued that I had violated
a condion of my bail namely that I should not
publicly discuss the merits and weaknesses of
the case. My legal team combated all the new
allegaons. Aer a break, the Chief Magistrate
gave his ruling in which he maintained my bail
and also temporarily stayed the state prosecutor’s
applicaon for me to be subjected to mental
examinaon pending the Constuonal Court’s
ruling on my peon against the constuonality
of the provisions of the Mental Treatment Act.
Importantly, in this ruling, the Chief Magistrate
disnguished between violang the subjudice rule
and wring to complain about the inadequacies of
court procedures or personnel.
In the following court session of 21st July
2017, my defense lawyers requested that the
state prosecutor produces both the evidence
and witnesses to my alleged crimes of cyber
harassment and oensive communicaon against
the president. The state prosecutor insisted that
it was his understanding that court was waing
for the ruling of the Constuonal Court about
my peon against the Mental Treatment Act.
Furthermore, he insisted again about the need for
me to be subjected to mental examinaon and
requisite treatment before proceeding with the
court hearing. My defense lawyers countered this
by disnguishing between the mental healthcare
procedures arising out of the Mental Treatment
Act, on the one hand, and the court hearing
procedures arising out of the Computer Misuse Act.
We asked court to proceed with the examinaon
and cross-examinaon of witnesses and their
evidence, or else dismiss the charges as baseless.
In response, the state prosecutor asked for more
me to consult the Director of Public Prosecuons
(DPP) about how to proceed. Given that the state
prosecutor received his instrucons from the DPP,
the Chief Magistrate granted him the me for
these consultaons. Court was adjourned to 21st
August 2017.
On two consecuve pre-scheduled dates of 21st
August 2017 and 21st September 2017, in spite
of the state prosecutor and my defense counsel
aending on me, the Chief Magistrate neither
showed up to court nor gave any explanaons for
this absence. The hearing was adjourned to 23rd
October 2017 a day when state prosecutors were
on strike against poor working condions. Thus
courts were not working. Court was adjourned to
24th November 2017.
Although the ongoing local court proceedings
have been drawn out because of undue delays
caused by either an absent Chief Magistrate or
an absent state prosecutor, the case received a
decision at the internaonal level. The United
Naons Working Group on Arbitrary Detenon
gave a decision in favour of freedom of expression
online, determined that I was arbitrarily detained
for my Facebook posts cricizing the president,
and proposed several remedies1.
Conclusion
Although the #PairOfBuocks case was not the
rst criminal case in Uganda to arise out of the
Computer Misuse Act, it gained notoriety because
of the colourful language of discussion and debate
that it generated on both the public and social
media in Uganda, Africa and the world at large. The
disproporonate severity of reprisals and pre-trial
penales meted out by the state – specically the
arbitrary pre-trial detenon on remand for thirty-
three days, denial to hear an applicaon for bail,
and applicaon for involuntary mental examinaon
of the accused – highlighted how this was polical
scape-goang aimed at controlling, inmidang
and deterring other opposional voices cricising
the leadership of President Yoweri Museveni.
However, rather than halt the cricisms on the
internet and in the public media, this criminal
case generated new froners of further engaged
crique. Arising out of this criminal case, a peon
was led challenging the constuonality of some
of the provisions of the Mental Treatment Act.
Although it was led in June 2017, no hearing date
has yet been assigned to this Constuonal Court
peon. It is good that another Constuonal
Peon was led challenging provisions of the
Computer Misuse Act that are being employed
by the state to quell dissent (Andrew Karamagi &
Robert Shaka v Aorney General).2 Furthermore, a
peon was led to the United Naons Working
Group on Arbitrary Detenon which decided that
I was arbitrarily detained using a veneer of law
which is in conict with internaonal human rights
that protect freedom of expression.
1 A/HRC/WGAD/2017/57 Opinion no. 57/2017 concerning
Stella Nyanzi (Uganda).
2 Andrew Karamagi&Robert Shaka v Aorney
General,Constuonal Peon No. 5 of 2016.
The Human Rights Advocate | Fourth Issue - November 2017
50
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
On June 8th 2015, Mr. Robert Shaka was
arrested by a group of about 10 policemen.
He was taken to the Special Invesgaons
Unit headquarters and told that the reasons for
his arrests were the following:
i) That using computers and other
electronic devices, he issued oensive
communicaons against the sovereign
state of Uganda, bringing it into hatred
and contempt and accordingly comming
the oence of promoon of sectarianism
contrary to secon 41 of the Penal Code
Act.
ii) That using computers and other electronic
devices, he used oensive communicaon
against President Yoweri Museveni, Janet
Museveni, Kale Kayihura, a one “Mbabazi”
and a one “Kelen” thereby comming
the oence of oensive communicaon
contrary to Secon 25 of the Computer
Misuse Act.
For a long me, it has been suspected that
Mr. Shaka is Tom Voltaire Okwalinga. He has
been persistently persecuted by police since
February 2015. On June 11th 2015, Mr. Shaka
was produced before Buganda Road Magistrates
Court and charged with the oence of oensive
communicaon under Secon 25 of the Computer
Misuse Act. The parculars of the charge were
that:
‘Mr. Shaka, disguising himself as Tom Voltaire
Okwalinga (TVO), between 2011 and 2015,
willfully and repeatedly using a computer,
with no purpose of legimate communicaon,
disturbed the right of privacy of President
Museveni by posng statements as regards to
his health condion on social media, to wit,
Facebook.
Mr. Shaka was granted bail by the Magistrates
Court but the hearing of the case never took place.
On February 3rd 2016, Robert Shaka and Andrew
Karamagi led a Peon in the Constuonal
Court challenging the constuonality of Secon
25 of the Computer Misuse Act, the Secon Mr.
Shaka was charged under. His lawyers applied
to court for a stay of the criminal proceedings,
which was granted on 22nd April 2016, pending
determinaon of the Constuonal Peon.
The Constuonal Peon
On February 3rd 2016, Robert Shaka and
Andrew Karamagi led a peon challenging the
constuonality of Secon 25 of the Computer
Misuse Act.1 In their Peon, the two contend that
the secon, which declares it an oence for any
person to ‘willfully and repeatedly use electronic
communicaon to disturb or aempt to disturb
the peace, quiet or right of privacy of any person
with no purpose of legimate communicaon’ is
inconsistent with and in contravenon of Arcle
29(1)(a) of the Constuon. They also state that
the secon is an insidious form of censorship,
which restricts the free ow of opinions and
ideas essenal to sustain the collecve life of
the cizenry in the digital age; it is vague and
overly broad; and that there is no evidence that
Government could not achieve the intended
purpose with less drasc measures.
They then ask court to make a declaraon that the
secon is inconsistent with or in contravenon of
Arcle 29(1)(a) of the Constuon and is to that
extent null and void. They also ask the Court to
direct the Director of Public Prosecuons to stay
the prosecuon of all and any cizens currently
on trial for violang the secon and an order
staying the enforcement of the secon or similar
provisions of the law, which disproporonately
curtail enjoyment of the freedom of speech and
expression by cizens.
The Aorney General led a response to the
Peon and contended that the Peon does
not raise any quesons for Constuonal
interpretaon and is thus devoid of any merit.
The response also argues that secon 25 of the
computer Misuse Act is not inconsistent with
or in contravenon of Arcles 29(1)(a) of the
Constuon, and that the Peoners are not
entled to the declaraons sought.
1 Andrew Karamagi & Robert Shaka v Aorney General,
Constuonal Peon No. 5 of 2016.
CASE UPDATE
The case of Uganda v Robert Shaka
Human Rights Awareness and Promoon Forum (HRAPF) 51
www.hrapf.org
APPENDICES
1. HRAPF’ STATEMENT ON THE PROSECUTION OF DR. STELLA NYANZI
Plot 390 Prof. Apolo Nsibambi Road, Namirembe, Kampala.
P. O. Box 25603, Kampala.
Tel: +256-414-530683/+256-312-530683
Email: info@hrapf.org. Website: www.hrapf.org
Kampala, Thursday 13 April 2017
THE COMPUTER MISUSE ACT SHOULD NOT BE MISUSED TO GAG FREE EXPRESSION
IN UGANDA
On the night of 7th April 2017, Makerere University researcher Dr. Stella Nyanzi was kidnapped by state
agents who aer driving her around the city for hours eventually took her to Kiira Police Division where
she was detained. She was then produced before the Buganda Road Chief Magistrate on 10th April, and
charges of cyber harassment and oensive communicaons under secons 24(1) and (2)(a), and 25 of
the Computer Misuse Act of 2011 respecvely were read to her. She pleaded not guilty to both charges,
and was remanded to Luzira Prison unl 25th April 2015.
Dr. Nyanzi’s arrest and prosecuon arises from her posts on the social media site Facebook, in which
she used colourful and poec language with sexual metaphors to cricise the President, his wife and
the government for misrule, and for failed pledges. This aracted the oensive communicaons charge.
Her 28th January 2017 post in which she referred to the President as a ‘pair of buocks’ was specically
pointed out and used as the basis for the oensive communicaons charge.
The Computer Misuse Act, 2011 was enacted partly to ensure the ‘safety and security of electronic
transacons and informaon systems’ and to prevent ‘abuse or misuse of informaon systems including
computers’ which are both noble objecves. However, secon 24(1) and (2)(4) and secon 25 are
being misused. Secon 24(1) criminalises cyber harassment which is in part dened in secon 24(2)
(a) asmaking any request, suggeson or proposal which is obscene, lewd, lascivious or indecent’.
These provisions are becoming increasingly popular to deal with any behaviour regarded as morally
inappropriate. Since the Act came into force, HRAPF has recorded two cases where these provisions
were used against people regarded as ‘immoral’ because of their behaviour, work, sexual orientaon
or gender identy. The Constuon, which is Uganda’s supreme law in Arcle 29(1)(a) guarantees the
freedom of speech and expression which includes freedom of the press and other media. According to
the Supreme Court of Uganda, the speech and expression protected extends to that which oend, shock
and disturb. Indeed, the Constuon provides for a limitaon on all rights including the right to freedom
of expression. Arcle 43(5) provides that ‘no person shall prejudice the fundamental or other human
rights and freedoms of others or the public interest.’ However, arcle 43(6) provides that the public
interest shall not permit, among others: polical persecuon, and any limitaon of the enjoyment of the
rights and freedoms prescribed by this Chapter beyond what is acceptable and demonstrably jusable
in a free and democrac society. In interpreng this provision, the Supreme Court found that it was a
‘limitaon within a limitaon’ and that it is the right that had to be given prominence. Therefore, speech
that involves discussion of sex, sexual orientaon or gender identy or sexual acts should not necessarily
be limited simply because it is regarded by the majority as being ‘obscene, lewd, lascivious or indecent.
Again, these statements were made by a self-declared supporter of the polical opposion in the context
of cricising government decisions. All the messages menoned in the charge contain legimate polical
The Human Rights Advocate | Fourth Issue - November 2017
52
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
concerns despite the choice of language. Therefore arresng her for such speech amounts to polical
persecuon. This provision therefore falls short of constuonal standards, and ought to be repealed.
Secon 25 criminalises the wilful and repeated use of ‘electronic communicaon to disturb or aempts to
disturb the peace, quiet or right of privacy of any person without purpose of legimate communicaon.’
The facts of Dr. Nyanzi’s case do not support such a charge. The statement cannot be said to have
disturbed the ‘peace, quiet or right of privacy’ of any person and more so the President. The President is
in a posion where cricism and public discussion of all aspects of his personal and polical life can be
expected. The communicaon was clearly made with a purpose of polical comment, and so cannot be
said to have been made ‘without purpose.
Therefore the Computer Misuse Act, which has such good intenons, is now becoming the new legal
basis for policing morals and sacricing the gem of freedom of expression. Usually, issues of defamaon
are dealt with under the realm of tort law. A person who feels that he or she has been harassed or
defamed is free to instute civil proceedings against the perpetrator. Using the criminal law to ght
polical bales and to save face by public gures is an abuse of court process and a waste of scarce state
resources. Nothing stops the President from bringing a civil acon against Dr. Nyanzi if he feels insulted
and defamed.
HRAPF therefore calls upon the state to:
1. Stop the misuse of the Computer Misuse Act by applying it only where it is appropriate and not
for harassing polical opponents and unpopular minories.
2. Review secon 24(2)(a) of the Computer Misuse Act which only restricts speech and expression
on the basis that it is ‘obscene, lewd, lascivious or indecent’; something that limits freedom of
speech beyond the constuonal parameters.
3. Drop the unconstuonal and trumped up charges against Dr. Stella Nyanzi.
Taking human rights to all
Human Rights Awareness and Promoon Forum (HRAPF) 53
www.hrapf.org
2. FULL TEXT OF THE COMPUTER MISUSE ACT
ACTS
SUPPLEMENT No. 2 14th Febuary, 2011.
ACTS SUPPLEMENT
to The Uganda Gazette No. 10 Volume CIV dated 14th February, 2011.
Printed by UPPC, Entebbe, by Order of the Government.
Act 2 Computer Misuse Act 2011
THE COMPUTER MISUSE ACT, 2011.
_________
ARRANGEMENT OF SECTIONS.
PART I—PRELIMINARY.
Section.
1. Commencement.
2. Interpretation.
PART II—GENERAL PROVISIONS.
3. Securing access.
4. Using a program.
5. Authorised access.
6. References.
7. Modification of contents.
8. Unauthorised modification.
PART III—INVESTIGATIONS AND PROCEDURES.
9. Preservation Order.
10. Disclosure of preservation Order.
11. Production Order.
PART IV—COMPUTER MISUSE OFFENCES.
12. Unauthorised access.
13. Access with intent to commit or facilitate commission of further
offence.
14. Unauthorised modification of computer material.
15. Unauthorised use or interception of computer service.
16. Unauthorised obstruction of use of computer.
17. Unauthorised disclosure of access code.
1
The Human Rights Advocate | Fourth Issue - November 2017
54
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
Section.
18. Unauthorised disclosure of information.
19. Electronic fraud
20. Enhanced punishment for offences involving protected computers.
21. Abetments and attempts.
22. Attempt defined.
23. Child pornography.
24. Cyber harassment.
25. Offensive communication.
26. Cyber stalking.
27. Compensation.
PART V—MISCELLANEOUS.
28. Search and seizure.
29. Administratively and evidential weight of a data message or an
electronic record.
30. Territorial jurisdiction.
31. Jurisdiction of courts.
32. Power of Minister to amend Schedule to this Act.
SCHEDULE.
Currency point.
2
Act 2 Computer Misuse Act 2011
Human Rights Awareness and Promoon Forum (HRAPF) 55
www.hrapf.org
THE COMPUTER MISUSE ACT, 2011
An Act to make provision for the safety and security of electronic
transactions and information systems; to prevent unlawful
access, abuse or misuse of information systems including
computers and to make provision for securing the conduct of
electronic transactions in a trustworthy electronic environment
and to provide for other related matters.
DATE OF ASSENT: 1st November, 2010.
Date of Commencement: See Section 1.
BE IT ENACTED by Parliament as follows:
PART I—PRELIMINARY.
1. Commencement.
This Act shall come into force on a date appointed by the Minister by
statutory instrument
2. Interpretation.
In this Act, unless the context otherwise requires—
3
Act 2 Computer Misuse Act 2011
The Human Rights Advocate | Fourth Issue - November 2017
56
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
“access” means gaining entry to any electronic system or data held
in an electronic system or causing the electronic system to
perform any function to achieve that objective;
“application” means a set of instructions that, when executed in
a computer system, causes a computer system to perform a
function and includes such a set of instructions held in any
removable storage medium which is for the time being in a
computer system;
“authorised officer” has the meaning assigned to it in section 28;
“child” means a person under the age of eighteen years;
“computer” means an electronic, magnetic, optical, electrochemical
or other data processing device or a group of such
interconnected or related devices, performing logical,
arithmetic or storage functions; and includes any data storage
facility or communications facility directly related to or
operating in conjunction with such a device or group of such
interconnected or related devices;
“computer output” or “output” means a statement, information
or representation, whether in written, printed, pictorial,
graphical or other form—
(a) produced by a computer; or
(b) accurately translated from a statement or
representation so produced from a computer;
“computer service” includes computer time, data processing and
the storage retrieval of data;
“content” includes components of computer hardware and
software;
“currency point” means the value of a currency point specified
in the Schedule;
4
Act 2 Computer Misuse Act 2011
Human Rights Awareness and Promoon Forum (HRAPF) 57
www.hrapf.org
“damage” means any impairment to a computer or the integrity or
availability of data, program, system or information that—
(a) causes any loss;
(b) modifies or impairs or potentially modifies or impairs
the medical examination, diagnosis, treatment or care
of one or more persons;
(c) causes or threatens physical injury or death to any
person; or
(d) threatens public health or public safety;
“data” means electronic representations of information in any
form;
“data message” means data generated, sent, received or stored
by computer means; and includes—
(a) voice, where the voice is used in an automated
transaction; and
(b) a stored record;
“electronic device”, “acoustic device”, or “other device” means
any device or apparatus that is used or is capable of being
used to intercept any function of a computer;
“electronic record” means data which is recorded or stored on
any medium in or by a computer or other similar device,
that can be read or perceived by a person or a computer
system or other similar device and includes a display,
printout or other out put of that data;
“function” includes logic, control, arithmetic, deletion, storage,
retrieval and communication or telecommunication to,
from or within a computer;
“information” includes data, text, images, sounds, codes,
computer programs, software and databases;
5
Act 2 Computer Misuse Act 2011
The Human Rights Advocate | Fourth Issue - November 2017
58
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
“information system” means a system for generating, sending,
receiving, storing, displaying or otherwise processing data
messages; and includes the internet or any other
information sharing system;
“information system services” includes a provision of
connections, operation facilities, for information systems,
the provision of access to information systems, the
transmission or routing of data messages between or among
points specified by a user and the processing and storage of
data, at the individual request of the recipient of the service;
“intercept”, in relation to a function of a computer, includes
listening to or recording a function of a computer or acquiring
the substance, meaning or purport of such a function;
“Minister” means the Minister responsible for information and
communications technology;
“person” includes any company or association or body of
persons corporate or unincorporate;
“program” or “computer program” means data representing
instructions or statements that, when executed in a
computer, causes the computer to perform a function;
“traffic data” means any computer data relating to
communication by means of a computer system generated
by a computer system that formed a part in the chain of
communication, indicating the communication’s origin,
destination, route, time, date, size, duration or type of
underlying service.
PART II—GENERAL PROVISIONS.
3. Securing access.
A person secures access to any program or data held in a computer if
that person—
6
Act 2 Computer Misuse Act 2011
Human Rights Awareness and Promoon Forum (HRAPF) 59
www.hrapf.org
(a) views, alters or erases the program or data;
(b) copies or moves it to any storage medium other than that in
which it is held or to a different location in the storage
medium in which it is held;
(c) uses or destroys it; or
(d) causes it to be output from the computer in which it is held
whether by having it displayed or in any other manner.
4. Using a program.
A person uses a program if the function he or she causes the computer
to perform—
(a) causes the program to be executed; or
(b) is itself a function of the program.
5. Authorised access.
Access by a person to any program or data held in a computer is
authorised if—
(a) the person is entitled to control access to the program or
data in question; or
(b) the person has consent to access that program or data from
any person who is charged with giving that consent.
6. References.
(1) A reference to a program or data held in a computer includes
a reference to any program or data held in any removable storage
medium and a computer may be regarded as containing any program
or data held in any such medium.
(2) A reference to a program includes a reference to part of a
program.
7
Act 2 Computer Misuse Act 2011
The Human Rights Advocate | Fourth Issue - November 2017
60
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
7. Modification of contents.
A modification of the contents of any computer takes place if, by the
operation of any function of the computer concerned or any other
computer connected to it result into—
(a) a program, data or data message held in the computer
concerned being altered or erased; or
(b) a program, data or data message being added to its contents.
8. Unauthorised modification.
Modification is unauthorised if—
(a) the person whose act causes it, is not entitled to determine
whether the modification should be made; and
(b) he or she does not have consent to the modification from a
person who is entitled.
PART III—INVESTIGATIONS AND PROCEDURES.
9. Preservation Order.
(1) An investigative officer may apply to court for an order for
the expeditious preservation of data that has been stored or processed
by means of a computer system or any other information and
communication technologies, where there are reasonable grounds to
believe that such data is vulnerable to loss or modification.
(2) For the purpose of subsection (1), data includes traffic data
and subscriber information.
(3) An order made under subsection (1) shall remain in force—
(a) until such time as may reasonably be required for the
investigation of an offence; or
(b) where prosecution is instituted, until the final determination
of the case or until such time as the court deems fit.
8
Act 2 Computer Misuse Act 2011
Human Rights Awareness and Promoon Forum (HRAPF) 61
www.hrapf.org
10. Disclosure of preservation Order.
The investigative officer may, for the purpose of a criminal
investigation or the prosecution of an offence, apply to court for an
order for the disclosure of—
(a) all preserved data, irrespective of whether one or more
service providers were involved in the transmission of such
data; or
(b) sufficient data to identify the service providers and the path
through which the data was transmitted; or electronic key
enabling access to or the interpretation of data.
11. Production Order.
(1) Where the disclosure of data is required for the purposes of
a criminal investigation or the prosecution of an offence, an
investigative officer may apply to court for an order compelling—
(a) any person to submit specified data in that person's possession
or control, which is stored in a computer system; and
(b) any service provider offering its services to submit
subscriber information in relation to such services in that
service provider's possession or control.
(2) Where any material to which an investigation relates consists
of data stored in a computer, computer system or preserved by any
mechanical or electronic device, the request shall be deemed to
require the person to produce or give access to it in a form in which
it can be taken away and in which it is visible and legible.
PART III—COMPUTER MISUSE OFFENCES.
12. Unauthorised access.
(1) A person who intentionally accesses or intercepts any program
or data without authority or permission to do so commits an offence.
9
Act 2 Computer Misuse Act 2011
The Human Rights Advocate | Fourth Issue - November 2017
62
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
(2) A person who intentionally and without authority to do so,
interferes with data in a manner that causes the program or data to be
modified, damaged, destroyed or rendered ineffective, commits an offence.
(3) A person who unlawfully produces, sells, offers to sell,
procures for use, designs, adapts for use, distributes or possesses any
device, including a computer program or a component which is
designed primarily to overcome security measures for the protection
of data or performs any of those acts with regard to a password,
access code or any other similar kind of data, commits an offence.
(4) A person who utilises any device or computer program
specified in subsection (3) in order to unlawfully overcome security
measures designed to protect the program or data or access to that
program or data, commits an offence.
(5) A person who accesses any information system so as to
constitute a denial including a partial denial of service to legitimate
users commits an offence.
(6) The intent of a person to commit an offence under this
section need not be directed at—
(a) any particular program or data;
(b) a program or data of any particular kind; or
(c) a program or data held in any particular computer.
(7) A person who commits an offence under this section is liable
on conviction to a fine not exceeding two hundred and forty currency
points or imprisonment not exceeding ten years or both.
13. Access with intent to commit or facilitate the commission of
a further offence.
(1) A person who commits any acts specified under section 12
with intent to—
(a) commit any other offence; or
(b) facilitate the commission of any other offence,
commits an offence.
10
Act 2 Computer Misuse Act 2011
Human Rights Awareness and Promoon Forum (HRAPF) 63
www.hrapf.org
(2) The offence to be facilitated under subsection (1)(b) may be
one committed by the person referred to in subsection (1) or by any
other person.
(3) It is immaterial for the purposes of this section whether the
act under this section is committed on the same occasion as the
offence under section 12 or on any future occasion.
(4) A person who commits an offence under this section is liable
on conviction to a fine not exceeding two hundred and forty currency
points or imprisonment not exceeding ten years or both.
14. Unauthorised modification of computer material.
(1) A person who—
(a) does any act which causes an unauthorised modification of
the contents of any computer; and
(b) has the requisite intent and the requisite knowledge at the
time when he or she does the act,
commits an offence.
(2) For the purposes of subsection (1)(b) the requisite intent is an
intent to cause a modification of the contents of any computer and by
doing so—
(a) to impair the operation of any computer;
(b) to prevent or hinder access to any program or data held in
any computer; or
(c) to impair the operation of any such program or the
reliability of any such data.
(3) The intent under subsection (1)(b) need not be directed at—
(a) any particular computer;
11
Act 2 Computer Misuse Act 2011
The Human Rights Advocate | Fourth Issue - November 2017
64
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
(b) any particular program or data or a program or data of any
particular kind; or
(c) any particular modification or a modification of any
particular kind.
(4) For the purposes of subsection (1)(b) the requisite knowledge
is knowledge that any modification that the person intends to cause is
unauthorised.
(5) It is immaterial for the purposes of this section whether an
unauthorised modification or any intended effect of it of a kind
specified in subsection (2) is intended to be permanent or temporary.
(6) A person who commits an offence under this section is liable
on conviction, to a fine not exceeding three hundred and sixty
currency points or imprisonment not exceeding fifteen years or both.
15. Unauthorised use or interception of computer service.
(1) Subject to subsection (2), a person who knowingly—
(a) secures access to any computer without authority for the
purpose of obtaining, directly or indirectly, any computer
service;
(b) intercepts or causes to be intercepted without authority,
directly or indirectly, any function of a computer by means
of an electro-magnetic, acoustic, mechanical or other
device whether similar or not; or
(c) uses or causes to be used, directly or indirectly, the
computer or any other device for the purpose of committing
an offence under paragraph (a) or (b),
commits an offence and is liable on conviction to a fine not exceeding
two hundred and forty currency points or to imprisonment not
exceeding ten years or both; and in the case of a subsequent
conviction, to a fine not exceeding three hundred and sixty currency
points or imprisonment not exceeding fifteen years or both.
12
Act 2 Computer Misuse Act 2011
Human Rights Awareness and Promoon Forum (HRAPF) 65
www.hrapf.org
(2) If any damage is caused as a result of an offence under this
section, a person convicted of the offence is liable to a fine not
exceeding one hundred and sixty eight currency points or
imprisonment not exceeding seven years or both.
(3) For the purposes of this section, it is immaterial that the
unauthorised access or interception is not directed at—
(a) any particular program or data;
(b) a program or data of any kind; or
(c) a program or data held in any particular computer.
16. Unauthorised obstruction of use of computer.
A person who, knowingly and without authority or lawful excuse—
(a) interferes with or interrupts or obstructs the lawful use of, a
computer; or
(b) impedes or prevents access to or impairs the usefulness or
effectiveness of any program or data stored in a computer,
commits an offence and is liable on conviction to a fine not exceeding
two hundred and forty currency points or to imprisonment not
exceeding ten years or both; and in the case of a subsequent
conviction, to a fine not exceeding three hundred and sixty currency
points or imprisonment not exceeding fifteen years or both.
17. Unauthorised disclosure of access code.
(1) A person who knowingly and without authority discloses any
password, access code or any other means of gaining access to any
program or data held in any computer knowing or having reason to
believe that it is likely to cause loss, damage or injury to any person
or property, commits an offence.
13
Act 2 Computer Misuse Act 2011
The Human Rights Advocate | Fourth Issue - November 2017
66
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
(2) A person who commits an offence under subsection (1) is liable
on conviction to a fine not exceeding two hundred and forty currency
points or to imprisonment not exceeding ten years or both; and in the case
of a subsequent conviction, to a fine not exceeding three hundred and sixty
currency points or imprisonment not exceeding fifteen years or both.
18. Unauthorised disclosure of information.
(1) Except for the purposes of this Act or for any prosecution for
an offence under any written law or in accordance with an order of
court, a person who has access to any electronic data, record, book,
register, correspondence, information, document or any other
material, shall not disclose to any other person or use for any other
purpose other than that for which he or she obtained access.
(2) A person who contravenes subsection (1) commits an offence
and is liable on conviction to a fine not exceeding two hundred and forty
currency points or imprisonment not exceeding ten years or both.
19. Electronic fraud.
(1) A person who carries out electronic fraud commits an
offence and is liable on conviction to a fine not exceeding three
hundred and sixty currency points or imprisonment not exceeding
fifteen years or both.
(2) For the purposes of this section “electronic fraud” means
deception, deliberately performed with the intention of securing an
unfair or unlawful gain where part of a communication is sent
through a computer network or any other communication and another
part through the action of the victim of the offence or the action is
performed through a computer network or both.
20. Enhanced punishment for offences involving protected
computers.
(1) Where access to any protected computer is obtained in the
course of the commission of an offence under section 12, 14, 15 or
16, the person convicted of an offence is, instead of the punishment
prescribed in those sections, liable on conviction, to imprisonment for
life.
14
Act 2 Computer Misuse Act 2011
Human Rights Awareness and Promoon Forum (HRAPF) 67
www.hrapf.org
(2) For the purposes of subsection (1), a computer is treated as a
“protected computer” if the person committing the offence knows or
ought reasonably to have known, that the computer or program or
data is used directly in connection with or necessary for—
(a) the security, defence or international relations of Uganda;
(b) the existence or identity of a confidential source of
information relating to the enforcement of a criminal law;
(c) the provision of services directly related to communications
infrastructure, banking and financial services, public
utilities or public key infrastructure; or
(d) the protection of public safety including systems related to
essential emergency services such as police, civil defence
and medical services.
(3) For the purposes of any prosecution under this section, it shall be
presumed, until the contrary is proved, that the accused has the requisite
knowledge referred to in subsection (2).
21. Abetment and attempts.
(1) A person who abets another person in committing an offence
under this Act, commits that offence and is liable on conviction to the
punishment prescribed for the offence.
(2) Any person who attempts to commit any offence under this
Act commits that offence and is liable on conviction to the
punishment prescribed for the offence.
22. Attempt defined.
(1) When a person, intending to commit an offence, begins to put
his or her intention into execution by means adapted to its fulfillment,
and manifests his or her intention by some overt act, but does not
fulfill his or her intention to such an extent as to commit the offence,
he or she is deemed to attempt to commit the offence.
15
Act 2 Computer Misuse Act 2011
The Human Rights Advocate | Fourth Issue - November 2017
68
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
(2) It is immaterial—
(a) except so far as regards punishment, whether the offender
does all that is necessary on his or her part for completing
the commission of the offence, or whether the complete
fulfillment of his or her intention is prevented by
circumstances independent of his or her will, or whether the
offender desists of his or her own motion from the further
prosecution of his or her intention; or
(b) that by reason of circumstances not known to the offender it
is impossible in fact to commit the offence.
23. Child pornography.
(1) A person who—
(a) produces child pornography for the purposes of its
distribution through a computer;
(b) offers or makes available child pornography through a
computer;
(c) distributes or transmits child pornography through a
computer;
(d) procures child pornography through a computer for himself
or herself or another person; or
(e) unlawfully possesses child pornography on a computer,
commits an offence.
(2) A person who makes available pornographic materials to a
child commits an offence.
(3) For the purposes of this section “child pornography” includes
pornographic material that depicts—
(a) a child engaged in sexually suggestive or explicit conduct;
(b) a person appearing to be a child engaged in sexually
suggestive or explicit conduct; or
16
Act 2 Computer Misuse Act 2011
Human Rights Awareness and Promoon Forum (HRAPF) 69
www.hrapf.org
(c) realistic images representing children engaged in sexually
suggestive or explicit conduct.
(4) A person who commits an offence under this section is liable
on conviction to a fine not exceeding three hundred and sixty
currency points or imprisonment not exceeding fifteen years or both.
24. Cyber harassment.
(1) A person who commits cyber harassment is liable on
conviction to a fine not exceeding seventy two currency points or
imprisonment not exceeding three years or both.
(2) For purposes of this section cyber harassment is the use of a
computer for any of the following purposes—
(a) making any request, suggestion or proposal which is
obscene, lewd, lascivious or indecent;
(b) threatening to inflict injury or physical harm to the person
or property of any person; or
(c) knowingly permits any electronic communications device
to be used for any of the purposes mentioned in this section.
25. Offensive communication.
Any person who willfully and repeatedly uses electronic
communication to disturb or attempts to disturb the peace, quiet or right
of privacy of any person with no purpose of legitimate communication
whether or not a conversation ensues commits a misdemeanor and is
liable on conviction to a fine not exceeding twenty four currency points
or imprisonment not exceeding one year or both.
26. Cyber stalking.
Any person who willfully, maliciously, and repeatedly uses electronic
communication to harass another person and makes a threat with the
intent to place that person in reasonable fear for his or her safety or to
a member of that person's immediate family commits the crime of
cyber stalking and is liable on conviction to a fine not exceeding one
hundred and twenty currency points or imprisonment not exceeding
five years or both.
17
Act 2 Computer Misuse Act 2011
The Human Rights Advocate | Fourth Issue - November 2017
70
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
27. Compensation.
Where a person is convicted under this Act, the court shall in addition
to the punishment provided therein, order such person to pay by way
of compensation to the aggrieved party, such sum as is in the opinion
of the court just, having regard to the loss suffered by the aggrieved
party; and such order shall be a decree under the provisions of the
Civil Procedure Act, and shall be executed in the manner provided
under that Act.
PART V—MISCELLANEOUS.
28. Searches and seizure.
(1) Where a Magistrate is satisfied by information given by a
police officer that there are reasonable grounds for believing—
(a) that an offence under this Act has been or is about to be
committed in any premises; and
(b) that evidence that such an offence has been or is about to be
committed is in those premises,
the Magistrate may issue a warrant authorising a police officer to enter
and search the premises, using such reasonable force as is necessary.
(2) An authorised officer may seize any computer system or take
any samples or copies of applications or data—
(a) that is concerned in or is on reasonable grounds believed to
be concerned in the commission or suspected commission
of an offence, whether within Uganda or elsewhere;
(b) that may afford evidence of the commission or suspected
commission of an offence, whether within Uganda or
elsewhere; or
(c) that is intended to be used or is on reasonable grounds believed
to be intended to be used in the commission of an offence.
(3) A computer system referred to in subsection (2) may be
seized or samples or copies of applications or data may be taken, only
by virtue of a search warrant.
18
Act 2 Computer Misuse Act 2011
Human Rights Awareness and Promoon Forum (HRAPF) 71
www.hrapf.org
(4) The provisions of section 71 of the Magistrates Court’s Act
apply with the necessary modifications to the issue and execution of
a search warrant referred to in subsection (3).
(5) An authorised officer executing a search warrant referred to
in subsection (3), may—
(a) at any time search for, have access to and inspect and check the
operation of any computer system, application or data if that
officer on reasonable grounds believes it to be necessary to
facilitate the execution of that search warrant;
(b) require a person having charge of or being otherwise
concerned with the operation, custody or care of a
computer system, application or data to provide him or her
with the reasonable assistance that may be required to
facilitate the execution of that search warrant; and
(c) compel a service provider, within its existing technical
capability—
(i) to collect or record through the application of
technical means; or
(ii) to co-operate and assist the competent authorties in the
collection or recording of traffic data in real time,
associated with specified communication transmitted
by means of a computer system.
(6) In seizing any computer system or taking any samples or
copies of applications or data or performing any of the actions
referred to in subsection (5), an authorised officer shall have due
regard to the rights and interests of a person affected by the seizure to
carry on his or her normal activities.
(7) A person who obstructs, hinders or threatens an authorised
officer in the performance of his or her duties or the exercise of his or
her powers under this section commits an offence and is liable on
conviction to a fine not exceeding twelve currency points or
imprisonment not exceeding six months or both.
19
Act 2 Computer Misuse Act 2011
The Human Rights Advocate | Fourth Issue - November 2017
72
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
(8) A computer system seized or samples or copies of applications
or data taken by the authorised officer shall be returned within seventy
two hours unless the authorised officer has applied for and obtained an
order in an inter party application for extension of the time.
(9) In this section—
“authorised officer” means a police officer who has obtained an
authorising warrant under subsection (1); and
“premises” includes land, buildings, movable structures,
vehicles, vessels, aircraft and hover craft.
29. Admissibility and evidential weight of a data message or an
electronic record.
(1) In any legal proceedings, the rules of evidence shall not be
applied so as to deny the admissibility of a data message or an
electronic record—
(a) merely on the ground that it is constituted by a data
message or an electronic record;
(b) if it is the best evidence that the person adducing it could
reasonably be expected to obtain; or
(c) merely on the ground that it is not in its original form.
(2) A person seeking to introduce a data message or an
electronic record in any legal proceeding has the burden of proving
its authenticity by evidence capable of supporting a finding that the
electronic record is what the person claims it to be.
(3) Subject to subsection (2), where the best evidence rule is
applicable in respect of an electronic record, the rule is satisfied upon
proof of the authenticity of the electronic records system in or by
which the data was recorded or stored.
(4) When assessing the evidential weight of a data message or an
electronic record, the court shall have regard to—
20
Act 2 Computer Misuse Act 2011
Human Rights Awareness and Promoon Forum (HRAPF) 73
www.hrapf.org
(a) the reliability of the manner in which the data message was
generated, stored or communicated;
(b) the reliability of the manner in which the authenticity of the
data message was maintained;
(c) the manner in which the originator of the data message or
electronic record was identified; and
(d) any other relevant factor.
(5) The authenticity of the electronic records system in which an
electronic record is recorded or stored shall, in the absence of
evidence to the contrary, be presumed where—
(a) there is evidence that supports a finding that at all material
times the computer system or other similar device was
operating properly or, if it was not, the fact of its not operating
properly did not affect the integrity of the electronic record
and there are no other reasonable grounds on which to doubt
the authenticity of the electronic records system;
(b) it is established that the electronic record was recorded or
stored by a party to the proceedings who is adverse in
interest to the party seeking to introduce it; or
(c) it is established that the electronic record was recorded or
stored in the usual and ordinary course of business by a
person who is not a party to the proceedings and who did
not record or store it under the control of the party seeking
to introduce the record.
(6) For the purposes of determining whether an electronic record
is admissible under this section, evidence may be presented in respect
of any set standard, procedure, usage or practice on how electronic
records are to be recorded or stored, with regard to the type of
business or endeavours that used, recorded or stored the electronic
record and the nature and purpose of the electronic record.
21
Act 2 Computer Misuse Act 2011
The Human Rights Advocate | Fourth Issue - November 2017
74
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
(7) For the avoidance of doubt, this section does not modify the
common law or a statutory rule relating to the admissibility of
records, except the rules relating to authentication and best evidence.
30. Territorial jurisdiction.
(1) Subject to subsection (2), this Act shall have effect, in
relation to any person, whatever his or her nationality or citizenship
and whether he or she is within or outside Uganda.
(2) Where an offence under this Act, is committed by any person
in any place outside Uganda, he or she may be dealt with as if the
offence had been committed within Uganda.
(3) For the purposes of this Act, this section applies if, for the
offence in question—
(a) the accused was in Uganda at the material time; or
(b) the computer, program or data was in Uganda at the
material time.
31. Jurisdiction of courts.
A court presided over by a chief magistrate or magistrate grade I has
jurisdiction to hear and determine all offences in this Act and,
notwithstanding anything to the contrary in any written law, has
power to impose the full penalty or punishment in respect of any
offence under this Act.
32. Power of Minister to amend Schedule
The Minister may by statutory instrument with the approval of the
Cabinet, amend the Schedule to this Act.
22
Act 2 Computer Misuse Act 2011
Human Rights Awareness and Promoon Forum (HRAPF) 75
www.hrapf.org
Act 2 Computer Misuse Act 2011
SCHEDULE
Section 2.
Currency point
One currency point is equivalent to twenty thousand shillings.
23
The Human Rights Advocate | Fourth Issue - November 2017
76
The Computer Misuse Act, 2011: Yet Another Legal Fetter
to the Basic Rights and Freedoms of Marginalised Persons
Cross reference
Magistrates Courts Act, Cap.16.
24
Act 2 Computer Misuse Act 2011
SOURCE: hps://www.shuerstock.com
Human Rights Awareness and Promoon Forum (HRAPF)
Plot 390 Prof. Apolo Nsibambi Road,
Namirembe, Kampala
P. O. Box 25603, Kampala.
Telephone:+256-414-530683
Email:info@hrapf.org
Website:www.hrapf.org
Facebook:hrapf.uganda
Twier:@hrapf_uganda
ResearchGate has not been able to resolve any citations for this publication.
ResearchGate has not been able to resolve any references for this publication.