Source: https://www.itu.int/en/ITU-D/Cybersecurity/Documents/HIPCAR Model Law Cybercrimes.pdf