Fighting the Information Forgery Crime in the Light of the Comparative Laws
DOI:
https://doi.org/10.35246/jols.v36i1.389Keywords:
المانياAbstract
Legislation may be often not enough for protecting information, and regulatory strategies are insufficient as well. Technical means are not also sufficient in preventing risks threating information whatever their effectiveness is. Thus, the protection is a complex structure consisting of law, regulation strategy and technology. The increasing use of and reliance on computer information systems has highlighted the need for good information system management. Legislative control can have a positive effect on this system by providing deterrence and increasing the public awareness of users about the problem.
Consequently, it is required looking for legislative means at the time in which the fight is more effective against this kind of criminality, and creating a safe environment and regulated according to legislations providing an acceptable amount of the protection of information circulated within the range of the technological society through making a comparative study of some legislations in order to establish a common ground if we want to find effectively legislative fight.
Downloads
References
2. Andrzj Adamski, “Cybercrime Legislation in Poland”, Nicolaus Copernicus University, Torun – Poland, available at: http://www.cybercrime.umk.pl/files/files/Cybercrime%20Legislation%20_PL_2010.pdf. (01/03/2015).
3. Commonwealth Model Laws on Computer and Computer-related Crime (2002)
4. Criminal Code of Lithuania no VIII-1968
5. Cybercrime Prevention Act 2012 of Republic of Philippines
6. ESCWA, Cyber Legislations Directives: Regional Harmonization of Cyber Legislations to Promote the Knowledge Society in the Arab World. Beirut: 2012, available at: http://isper.escwa.un.org/Portals/0/Cyber%20Legislation/Regional%20Harmonisation%20Project/Directives/Directives-Full.pdf. (13/09/2012). (الاسكوا. ارشادات الاسكوا للتشريعات السيبرانية: مشروع تنسيق التشريعات السيبرانية لتحفيز مجتمع المعرفة في المنطقة العربية. بيروت، 2012)
7. Grzegorz Kopczyński and Maciej Szostak, “The Notion of The Document in The Polish Penal Code Of 1997,” “Dokumento sąvoka 1997 m. Lenkijos baudžiamajame kodekse,” Jurisprudencija, 2000, t. 18(10), available at: https://www.mruni.eu/lt/mokslo_darbai/jurisprudencija/archyvas/?l=103771. (10/03/2013).
8. Hussein Saeed Al-Ghafri, “Legal Views on Fighting the Information Technology Crimes”, Oman Daily, Monday 07/05/2012, an analytical essay was published on the former website of Oman Daily, available at: http://www.main.omandaily.om/node/94898. (22/10/2012)
حسين سعيد الغافري، "رؤى قانونية حول مكافحة جرائم تقنية المعلومات"، الاثنين/ 07 مايو 2012 ، مقال تحليلي نشر على الموقع السابق لصحيفة عُمان.
9. Law of the Republic of Indonesia Number 11 of 2008 Concerning Electronic Information and Transactions
10. ¬Lorenzo Picotti and Ivan Salvadori, “within the framework of the Project on Cybercrime of the Council of Europe, Economic Crime Division and Directorate General of Human Rights and Legal Affairs”, Strasbourg – France, 28 August 2008, available at: http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/documents/reports-presentations/567%20study2-d-version8%20_28%20august%2008.pdf. (19/02/2013)
11. Michela Menting Yoell, Research on Legislation in Data Privacy, Security and the Prevention of Cybercrime (First Printing, Geneva: International Telecommunication Union, 2006)
12. Morocco Criminal Code
13. Moshtaq Talib Wahaib, “Information Forgery as One of the Information Crimes in the Light of the Iraqi Law”, University of Szczecin Faculty of Law and Administration, Doctor Dissertation, 2015.
14. Dr. Moshtaq Talib Wahaib Alnaimi, “Information Forgery as One of the Information Crimes: Comparative Study”, Al-Halabi Legal Publications, Lebanon, Beirut, 1st Edition, 2018 د. مشتاق طالب وهيب النعيمي، "تزوير المعلومات كأحد صور الجرائم المعلوماتية: دراسة مقارنة"، مشنورات الحلبي الحقوقية، لبنان، بيروت، الطبعة الاولى، 2018.
15. Mustafa Blassey, “Features of the Cybercrimes Law (3-5)”, a series of analytic essays published by Oman Daily, available at: http://omandaily.om/?p=194033. (13/04/2015)
مصطفى بلاسي، "ملامح قانون مكافحة جرائم تقنية المعلومات (3-5)." سلسلة مقالات تحليلة نشرت في صحفية عُمان متاح على الموقع اعلاه)..
16. Rizgar Mohammed Kadir, “The Scope and the Nature of Computer Crimes Statutes – A Critical Comparative Study”, Germany Law Journal: Vol. 11 No. 1, June 2010, available at: https://www.germanlawjournal.com/. (10/01/2014)
17. Stein Schjolberg, “The History of Global Harmonization on Cybercrime Legislation: The Road to Geneva”, December, 2008, available at: http://www.cybercrimelaw.net/documents/cybercrime_history.pdf. (05/02/2011)
18. Sulaiman Ahmed Fadl, “Legislative and Security Addressing of Crimes Arising from the Use of the International Information Network (Internet), (Cairo: Dar Al Nahda Al-Arabia, 2007). (فضل، سليمان احمد. الموجهة التشريعية والامنية للجرائم الناشئة عن استخدام شبكة المعلومات الدولية – الانترنت. القاهرة: دار النهضة العربية ، 2007).
19. The Council of Europe Convention on Cybercrime ‘Budapest – 2001
20. The Criminal Code of Finland
21. The Criminal Code of the Republic of Croatia No. 110 of October 21, 1997
22. The Federal Law of UAE No. 2 of 2006 on the Prevention of Information Technology Crimes
23. The German Criminal Code
24. The Iraqi Penal Code
25. The Jordan Law Draft on Information Systems Crimes of 2009
26. The Penal Code of the French 1962
27. The Polish Criminal Code of 1997 “Kodeks karny”
28. The Portugal Cybercrime Law no 209/2009
29. The UAE Guiding Law to fight information technology crimes and related crimes
30. Unauthorized Computer Access Law of Japan no 128 of 1999
31. UNCITRIAL model laws on Electronic Commerce and also on Electronic Signature
32. Younis Arab, “Laws and Legislations Concerning the Internet in the Arab Countries”, (Working paper submitted to the conference and exhibition of the international and Arabic banking technologies, Union of Arab Banks, Jordan - Amman, held from 28-29/10/2002)
يونس عرب ، "التعاقد والدفع الالكتروني تحديات النظامين الضريبي والكمركي." ورقة عمل مقدمة الى ندوة متخصصة حول التجارة الالكترونية – معهد التدريب والإصلاح القانوني ، الخرطوم ، كانون الأول 2002 ، ص 1 – 20).
Downloads
Published
Issue
Section
License
Copyright and Licensing:
For all articles published in Journal of Legal Sciences, copyright is retained by the authors. Articles are licensed under an open access Creative Commons CC BY 4.0 license, meaning that anyone may download and read the paper for free. In addition, the article may be reused and quoted provided that the original published version is cited. These conditions allow for maximum use and exposure of the work.
Reproducing Published Material from other Publishers: It is absolutely essential that authors obtain permission to reproduce any published material (figures, schemes, tables or any extract of a text) which does not fall into the public domain, or for which they do not hold the copyright. Permission should be requested by the authors from the copyrightholder (usually the Publisher, please refer to the imprint of the individual publications to identify the copyrightholder).
Permission is required for: Your own works published by other Publishers and for which you did not retain copyright.
Substantial extracts from anyones' works or a series of works.
Use of Tables, Graphs, Charts, Schemes and Artworks if they are unaltered or slightly modified.
Photographs for which you do not hold copyright.
Permission is not required for: Reconstruction of your own table with data already published elsewhere. Please notice that in this case you must cite the source of the data in the form of either "Data from..." or "Adapted from...".
Reasonably short quotes are considered fair use and therefore do not require permission.
Graphs, Charts, Schemes and Artworks that are completely redrawn by the authors and significantly changed beyond recognition do not require permission.
Obtaining Permission
In order to avoid unnecessary delays in the publication process, you should start obtaining permissions as early as possible. If in any doubt about the copyright, apply for permission. Journal of Legal Sciences cannot publish material from other publications without permission.
The copyright holder may give you instructions on the form of acknowledgement to be followed; otherwise follow the style: "Reproduced with permission from [author], [book/journal title]; published by [publisher], [year].' at the end of the caption of the Table, Figure or Scheme.