Legal Aspects of Cybersecurity Artur Appazov



Download 1,04 Mb.
Pdf ko'rish
bet19/34
Sana13.06.2022
Hajmi1,04 Mb.
#665529
1   ...   15   16   17   18   19   20   21   22   ...   34
Bog'liq
Legal Aspects of Cybersecurity

6.1
 
Criminalization 
At the national level, both existing and new (or planned), cybercrime laws most often 
concern criminalization, indicating a predominant focus on establishing specialized 
offences for core cybercrime acts. Globally, many jurisdictions tend to perceive their 
criminal and procedural law frameworks to be sufficient, although this masks large 
regional differences.
121
While many countries in Europe tend to consider their legislation 
sufficient, the picture is reversed in Africa, the Americas, Asia and Oceania, where more 
countries view laws as only partly sufficient, or not sufficient at all.
122
Also, while high-level consensus exists regarding broad areas of criminalization, the 
detailed provisions reveal more divergent approaches. Thus, offences involving illegal 
access to computer systems and data differ with respect to the object of the offence (data, 
system, or information), and regarding the criminalization of ‘mere’ access as an inchoate 
crime or the requirement for further intent, such as to cause loss or damage. The requisite 
intent for an offence also differs in approaches to criminalization of interference with 
computer systems or data. Most countries require the interference to be intentional, while 
others include reckless interference.
123
For interference with computer data, the conduct 
constituting interference ranges from damaging or deleting, to altering, suppressing, 
inputting or transmitting data. Criminalization of illegal interception differs by virtue of 
whether the offence is restricted to non-public data transmissions or not, and concerning 
whether the crime is restricted to interception by technical means.
Not all countries 
criminalize computer misuse tools. For those that do, differences arise regarding whether 
119
Susan W. Brenner, 
Toward a Criminal Law for Cyberspace: a New Model of Law Enforcement?
, 30 R
UTGERS 
C
OMPUTER AND 
T
ECHNOLOGY 
L
AW 
J
OURNAL
, 39 (2004). 
120
Kelly, B
OSTON 
U
NIVERSITY 
L
AW 
R
EVIEW
, 1693-1694 (2012). 
121
Comprehensive Study on Cybercrime xviii. 2013. 
122
Id. at. 
123
Id. at, xx. 


37 
the offence covers possession, dissemination, or use of software (such as malware) and/or 
computer access codes (such as victim passwords). From the perspective of international 
cooperation, such differences may have an impact upon findings of dual-criminality 
between countries.
124

Download 1,04 Mb.

Do'stlaringiz bilan baham:
1   ...   15   16   17   18   19   20   21   22   ...   34




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish