
This tool is co-funded by the GLACY and Cybercrime@Octopus projects

- Article 1 – “Computer system”, “computer data”, “service provider”, “traffic data”:
- Article 2 – Illegal access
- Article 3 – Illegal interception
- Article 4 – Data interference
- Article 5 – System interference
- Article 6 – Misuse of devices
- Article 7 – Computer-related forgery
- Article 8 – Computer-related fraud
- Article 9 – Offences related to child pornography
- Article 10 – Offences related to infringements of copyright and related rights
- Article 11 – Attempt and aiding or abetting
- Article 12 – Corporate liability
- Article 13 – Sanctions and measures
- Article 14 – Scope of procedural provisions
- Article 15 – Conditions and safeguards
- Article 16 – Expedited preservation of stored computer data
- Article 17 – Expedited preservation and partial disclosure of traffic data
- Article 18 – Production order
- Article 19 – Search and seizure of stored computer data
- Article 20 – Real-time collection of traffic data
- Article 21 – Interception of content data
- Article 22 – Jurisdiction
- Article 24 – Extradition
- Article 25 – General principles relating to mutual assistance
- Article 26 – Spontaneous information
- Article 27 – Procedures pertaining to mutual assistance requests in the absence of applicable international agreements
- Article 28 – Confidentiality and limitation on use
- Article 29 – Expedited preservation of stored computer data
- Article 30 – Expedited disclosure of preserved traffic data
- Article 31 – Mutual assistance regarding accessing of stored computer data
- Article 32 – Trans-border access to stored computer data with consent or where publicly available
- Article 33 – Mutual assistance in the real-time collection of traffic data
- Article 34 – Mutual assistance regarding the interception of content data
- Article 35 – 24/7 Network
- Article 42 – Reservations