Cyber Law at Greece

Greece has established a robust legal and institutional framework to address cybercrime, data protection, and cybersecurity, aligning with European Union directives and international standards. Here's an overview of the key components:

🧾 Key Cyber Laws

Criminal Code Provisions on Cybercrime

Article 292B:Criminalizes unauthorized access to information systems

Article 292C:Imposes penalties for the production, sale, or possession of tools intended for cybercrime

Article 370F:Sanctions the production or distribution of surveillance devices capable of intercepting communications

Article 386A:Addresses identity theft and fraud through data manipulation

Articles 370C & 370D:Penalize breaches of state and non-state secrets, including electronic theft 

Law 4624/2019 – Data Protection

Aligns with the EU General Data Protection Regulation (GDPR), establishing

Criminal Sanctions:Up to 10 years imprisonment and fines up to €300,000 for unauthorized data processing

Administrative Fines:Up to €10 million for violations

πŸ›‘οΈ Institutional Framework

Cyber Crime Division (Hellenic Police)

Established in 2004, this division investigates cybercrimes, including fraud, child exploitation, and cyberstalkin. It operates 24/7 and offers services such as the CyberKid app for reporting incidents involving minor. 

National Cybersecurity Authority (NCA)

Established under Law 5160/2024, the NCA oversees cybersecurity measures, ensuring compliance with national and EU regulation. ξˆƒIt supervises critical sectors and enforces incident reporting protocol.

🌐 International Cooperatio

Greece is a signatory to the Budapest Convention on Cybercrime and has implemented the EU's NIS II Directive through Law 5160/2024, enhancing cross-border collaboration and cybersecurity resiliene.

πŸ“Œ Summary

Greece's legal framework effectively addresses cybercrime and data protection, supported by specialized institutions and international cooperation.The alignment with EU directives ensures a comprehensive approach to cybersecurty.

LEAVE A COMMENT

0 comments