Fighting the Information Forgery Crime in the Light of the Comparative Laws

Authors

  • Moshtaq Talib Wahaib, د

DOI:

https://doi.org/10.35246/jols.v36i1.389

Keywords:

المانيا

Abstract

Legislation may be often not enough for protecting information, and regulatory strategies are insufficient as well. Technical means are not also sufficient in preventing risks threating information whatever their effectiveness is. Thus, the protection is a complex structure consisting of law, regulation strategy and technology. The increasing use of and reliance on computer information systems has highlighted the need for good information system management. Legislative control can have a positive effect on this system by providing deterrence and increasing the public awareness of users about the problem.

Consequently, it is required looking for legislative means at the time in which the fight is more effective against this kind of criminality, and creating a safe environment and regulated according to legislations providing an acceptable amount of the protection of information circulated within the range of the technological society through making a comparative study of some legislations in order to establish a common ground if we want to find effectively legislative fight.

Downloads

Download data is not yet available.

References

1. Aleš Završnik, “Towards an Overregulated Cyberspace: Criminal Law Perspective,” Masaryk University Journal of Law and Technology: Iss. 2/10, p. 174, available at: http://mujlt.law.muni.cz/view.php?cisloclanku=2010120003. (05/03/2013).
2. Andrzj Adamski, “Cybercrime Legislation in Poland”, Nicolaus Copernicus University, Torun – Poland, available at: http://www.cybercrime.umk.pl/files/files/Cybercrime%20Legislation%20_PL_2010.pdf. (01/03/2015).
3. Commonwealth Model Laws on Computer and Computer-related Crime (2002)
4. Criminal Code of Lithuania no VIII-1968
5. Cybercrime Prevention Act 2012 of Republic of Philippines
6. ESCWA, Cyber Legislations Directives: Regional Harmonization of Cyber Legislations to Promote the Knowledge Society in the Arab World. Beirut: 2012, available at: http://isper.escwa.un.org/Portals/0/Cyber%20Legislation/Regional%20Harmonisation%20Project/Directives/Directives-Full.pdf. (13/09/2012). (الاسكوا. ارشادات الاسكوا للتشريعات السيبرانية: مشروع تنسيق التشريعات السيبرانية لتحفيز مجتمع المعرفة في المنطقة العربية. بيروت، 2012)
7. Grzegorz Kopczyński and Maciej Szostak, “The Notion of The Document in The Polish Penal Code Of 1997,” “Dokumento sąvoka 1997 m. Lenkijos baudžiamajame kodekse,” Jurisprudencija, 2000, t. 18(10), available at: https://www.mruni.eu/lt/mokslo_darbai/jurisprudencija/archyvas/?l=103771. (10/03/2013).
8. Hussein Saeed Al-Ghafri, “Legal Views on Fighting the Information Technology Crimes”, Oman Daily, Monday 07/05/2012, an analytical essay was published on the former website of Oman Daily, available at: http://www.main.omandaily.om/node/94898. (22/10/2012)
حسين سعيد الغافري، "رؤى قانونية حول مكافحة جرائم تقنية المعلومات"، الاثنين/ 07 مايو 2012 ، مقال تحليلي نشر على الموقع السابق لصحيفة عُمان.
9. Law of the Republic of Indonesia Number 11 of 2008 Concerning Electronic Information and Transactions
10. ¬Lorenzo Picotti and Ivan Salvadori, “within the framework of the Project on Cybercrime of the Council of Europe, Economic Crime Division and Directorate General of Human Rights and Legal Affairs”, Strasbourg – France, 28 August 2008, available at: http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/documents/reports-presentations/567%20study2-d-version8%20_28%20august%2008.pdf. (19/02/2013)
11. Michela Menting Yoell, Research on Legislation in Data Privacy, Security and the Prevention of Cybercrime (First Printing, Geneva: International Telecommunication Union, 2006)
12. Morocco Criminal Code
13. Moshtaq Talib Wahaib, “Information Forgery as One of the Information Crimes in the Light of the Iraqi Law”, University of Szczecin Faculty of Law and Administration, Doctor Dissertation, 2015.
14. Dr. Moshtaq Talib Wahaib Alnaimi, “Information Forgery as One of the Information Crimes: Comparative Study”, Al-Halabi Legal Publications, Lebanon, Beirut, 1st Edition, 2018 د. مشتاق طالب وهيب النعيمي، "تزوير المعلومات كأحد صور الجرائم المعلوماتية: دراسة مقارنة"، مشنورات الحلبي الحقوقية، لبنان، بيروت، الطبعة الاولى، 2018.
15. Mustafa Blassey, “Features of the Cybercrimes Law (3-5)”, a series of analytic essays published by Oman Daily, available at: http://omandaily.om/?p=194033. (13/04/2015)
مصطفى بلاسي، "ملامح قانون مكافحة جرائم تقنية المعلومات (3-5)." سلسلة مقالات تحليلة نشرت في صحفية عُمان متاح على الموقع اعلاه)..
16. Rizgar Mohammed Kadir, “The Scope and the Nature of Computer Crimes Statutes – A Critical Comparative Study”, Germany Law Journal: Vol. 11 No. 1, June 2010, available at: https://www.germanlawjournal.com/. (10/01/2014)
17. Stein Schjolberg, “The History of Global Harmonization on Cybercrime Legislation: The Road to Geneva”, December, 2008, available at: http://www.cybercrimelaw.net/documents/cybercrime_history.pdf. (05/02/2011)
18. Sulaiman Ahmed Fadl, “Legislative and Security Addressing of Crimes Arising from the Use of the International Information Network (Internet), (Cairo: Dar Al Nahda Al-Arabia, 2007). (فضل، سليمان احمد. الموجهة التشريعية والامنية للجرائم الناشئة عن استخدام شبكة المعلومات الدولية – الانترنت. القاهرة: دار النهضة العربية ، 2007).
19. The Council of Europe Convention on Cybercrime ‘Budapest – 2001
20. The Criminal Code of Finland
21. The Criminal Code of the Republic of Croatia No. 110 of October 21, 1997
22. The Federal Law of UAE No. 2 of 2006 on the Prevention of Information Technology Crimes
23. The German Criminal Code
24. The Iraqi Penal Code
25. The Jordan Law Draft on Information Systems Crimes of 2009
26. The Penal Code of the French 1962
27. The Polish Criminal Code of 1997 “Kodeks karny”
28. The Portugal Cybercrime Law no 209/2009
29. The UAE Guiding Law to fight information technology crimes and related crimes
30. Unauthorized Computer Access Law of Japan no 128 of 1999
31. UNCITRIAL model laws on Electronic Commerce and also on Electronic Signature

32. Younis Arab, “Laws and Legislations Concerning the Internet in the Arab Countries”, (Working paper submitted to the conference and exhibition of the international and Arabic banking technologies, Union of Arab Banks, Jordan - Amman, held from 28-29/10/2002)
يونس عرب ، "التعاقد والدفع الالكتروني تحديات النظامين الضريبي والكمركي." ورقة عمل مقدمة الى ندوة متخصصة حول التجارة الالكترونية – معهد التدريب والإصلاح القانوني ، الخرطوم ، كانون الأول 2002 ، ص 1 – 20).

Downloads

Published

2021-07-31

How to Cite

Wahaib, Moshtaq Talib. 2021. “Fighting the Information Forgery Crime in the Light of the Comparative Laws”. Journal of Legal Sciences 36 (1): 291-322. https://doi.org/10.35246/jols.v36i1.389.