Turkey

PART 11 : Felonies on IT

Article 525/a - (Annexed by Code 3756 Art. 21, 06.06.1991)
Whoever obtains programs or data or another component from an automatic data
processing system illegally, shall be punished by imprisonment for one year to
three years and a heavy fine of 1,000,000 to 15,000,000 liras.
Whoever uses, transfers or copies programs, data or another component in an
automatic data processing system, with the purpose of harming anybody, shall
suffer the punishment in the above mentioned paragraph.

Article 525/b - (Annexed by Code 3756 Art. 22, 06.06.1991)
Whoever destroys or changes or deletes or prevents from operating or ensures
incorrectly operating an automatic data processing system or data or another
component, completely or partially, for the purpose of harming anyone or deriving
a benefit for himself or anybody else, shall be punished by imprisonment for two
years to six years and a heavy fine of 5,000,000 to 50,000,000 liras.
Whoever derives a legal benefit for himself or anybody else, using an automatic
data processing system, shall be punished by imprisonment for one year to five
years and a heavy fine of 2,000,000 to 20,000,000 liras.

Article 525/c - (Annexed by Code 3756 Art. 23, 06.06.1991)
Whoever puts data or other components into an automatic data processing system
or alters existing data or other components, in order to generate a counterfeit
document for the purpose of using as evidence in jurisprudence, shall be punished
by imprisonment for one year to three years. Whoever uses knowingly the
abovementioned-altered one shall be punished by imprisonment for six months
year to two years

Article 525/d - (Annexed by Code 3756 Art. 24, 06.06.1991)
Whoever violates the Article 525/a and 525/b by virtue of performing or while
performing his profession, shall also be disqualified from holding the public office
subject to offense or performing his profession or trade subject to offense for six
months to three years, in addition to punishment prescribed in the Articles
mentioned

HomeCybercrimelaw.htmlCybercrimelaw.htmlshapeimage_1_link_0