No.14

Cybercrimes

2015

29

(b) does not select the receiver of the transmission;
or
(c) does not select or modify the information
contained in the transmission.
(2) The transmission and provision of access
referred to in subsection (1) include the automatic,
intermediate and transient storage of the information
transmitted in so far as this takes place(a) for the purpose of carrying out the transmission in
the information system;
(b) in a manner that makes it inaccessible to a person
other than the anticipated recipient; and
(c) for a period no longer than is reasonably necessary
for the transmission.
Hosting
provider

30

41.-(1)
A hosting provider is not liable for
information stored at the request of a user of the service, on
condition that the hosting provider (a) immediately removes or disables access to
the information after receiving an order from any
competent authority or court to remove specific
illegal information stored; or
(b) upon becoming aware of illegal information
stored in means than a competent authority, shall
immediately inform the relevant authority.
(2) The provision of subsection (1) shall not apply
where the user of the service is acting under the authority or
control of the hosting provider.

No.14

Cybercrimes

2015

Select target paragraph3