Download Legal Support of the Users` Privacy in Cyber Space

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Psychological effects of Internet use wikipedia , lookup

Legal anthropology wikipedia , lookup

Contemporary history wikipedia , lookup

Transcript
Legal Support of the Users` Privacy in Cyber Space
Aida Jafari
Ma law private of tarbiat modares university
Email : [email protected]
Abstract
Today, one of the most important problems and troubles of the users of cyber space is the issue
of support of their privacy against the illegal actions of the juridical and real people as well as
internet safety. All of the accomplished proceedings (including electronic crimes law, convention
of cyber crimes and ancestral and Vienna convention) follow a common aim which is the issue
of support. Cyber space has provided remarkable opportunities for human beings, but there are
like each nascent technology of the world. Affrication of the data (plagiary), sabotaging,
disabling and inactivating of computer systems, defraudation and espial can be named as the
destructive effects of cyber space for human life. According to the results of this study as well as
the necessity of the correction of the law of crimes of the faults of this law as the junior and upto-dated law which must accompany with dynamicity based on the exigencies and the current
needs of commercial needs and ultra-nation and international approach of the commerce, the
correction of the legal deficiencies and shortages is offered for supporting of the users because of
its necessity. Nevertheless, the ignorance of the users of this space cause misusing occasionally.
1
Key Words: cyber crimes, computer, cyber space, the rights of moral and spiritual ownership
Introduction
The information and communication technology has changed the worldwide society thoroughly
and fundamentally. Also, it has affected the method and style of the human life and economical,
2
cultural, social and political relations of the societies. In near future, vital infrastructures in
economical fields, cultural, social and defensive issues as well as the national security of the
countries will be connected and related to the information and communication technology. These
infrastructures are : energy ( electricity power , oil and gas) , transportation
( railway ,
aerial and marine), banking , communications , general hygiene, emergency services , water
system, defensive industries , feeding , agriculture, the affairs of lading of cargoes and etc.
Therefore, there are some problems, shortages and challenges in the investigation of the
perpetrated crimes in cyber spaces in inner and international aspects. Some crimes have been
perpetrated by the expansion of worldwide web of information
(internet) because of the
mentioned problems and juridical systems of different countries have not been able to take
actions and control them seriously. The consequence of this matter is that internet network
continues its path disregarding to the domination of the laws in the world.
The Concept of Internet Security (Safety)
Internet security (safety) means the cautions, forethoughts and the proceedings which must be
adopted for protecting of the security of the users – particularly children and teenagers- in
internet environment against the dangers which threaten the users, data and their systems 1. The
frame of these policies is determined in the laws and regulations of each country and the
1
www.ehow.com/about_6577504_definition-internet-safety.htm
3
governmental, general and private parts must observe them. Also, the parents and the children
can be informed and trained about the dangers and the safety against them.
There is a dual approach in the international documents and conventions about cyber crimes.
The meaning of this is that perpetration of the mere cyber crimes such as hacking as well as
perpetration of some crimes such as traditional offences via the computer system such as
breaching of the rights of moral and spiritual ownership have been considered criminalizing. In
Iran, according to the definitions of the draft of cyber crimes, the crimes and offences have been
divided into the crimes such as computer defraudation, computer fabrication, computer espial ,
computer sabotage ( alteration , deletion , stoppage , monitoring of the communicative lines and
etc) , computer sabotage, impermissible access, illegal interception and etc . Accordingly, some
penalties and punishments have been determined for them.
Some writers such as Susan Berner –American jurist- believe that there is no necessity to the
distinctive laws and new legislation for the phenomena of the computers or internet. In fact, they
say that the correction and alteration of the traditional penal laws can be applied against the
computer- cyber crimes. These writers believe that no new law was created by invention of
telephone such as tele crime, so using of cyber space is a new technology for perpetration of the
crime merely. On the other hand, some jurists such as Don Parker believe that legislation of
independent penal law is necessary for cyber crimes for the following reasons:
1. Symbolically, cyber space is a new world which must be regulated through independent
regulation like the real world
4
2. The cyber criminals are different in respect of criminology from the common and general
criminals and they need different crimes and treatments
3. The damages of the cyber crimes are much more than the general and common crimes.
Recognizing of the Cyber Space
Is cyber space a kind of environment and space or a kind of communication mean? Replying to
this question affects the answer of the hypotheses of the present study. The reason is that there is
no justification and legitimation for making challenge in juridical laws with the assumption of
being a kind of mean. On the other hand, if it is considered a kind of space, it needs a kind of
separate, legal regulation.
Usually, the people think that cyber space is a kind of space in which there is no regulation and
law. They think that every thing is free in this space and they interpret freedom not as being
cyber but as limitless and boundless such as free marketplace, free merchants, free will, and free
election. So, it is thought that impossibility of controlling of internet is the genuine property of
the online world. The manifesto of independency of cyber space emphasized on this matter but
today this theory can not be applied. The reason is that this ideology can challenge the new
political and social system and eliminate that social order and regulation. So, we can say that the
first claimed and genuine property of this phenomenon (freedom of regulation) has been
annulled and the other property (being worldwide) has been remained in its own place and
position. So, we can say that cyber space is a kind of ultra-nation space. The movement of
5
electronic rights has been created based on this. So, we can say that cyber space is not a kind of
means merely and a kind of special legal system is necessary to dominate on this space2.
The Challenges of the Users in the View of the Private Law
In the view of the private law, internet has made some troubles and challenges for all countries
such as the local competency of the courts, the law which is dominated on the case and the
opposition and contradiction of the laws of different countries. In juridical aspects, the
emergence and development of internet threats has created new crimes, offences and special
procedures and it has challenged some fields of criminal sciences.
Some times, these crimes or threats are perpetrated against the safety and security of the country.
The most distinctive ones are computer espial and computer sabotage. Some times it has had
security approach and it has challenged the national security and safety.
Penal laws have not been accompanied with the development though they are ambiguous. So, a
closed range (spectrum) of the terms is supported by them. It is in the occasion that the range
(spectrum) of political and military espial have become broadened and enlarged to industrial
commercial, economical, financial, etc. on the other hand, new forms causes the escape of some
people from the domain of the crimes. The type of perpetration has been developed during the
time and its new type occurs in digital form.
Mohammad, Bagheri & Ebrahim Noshadi. (March 2011). “The Challenges of the Legal and
Commercial Actions in Cyber Space”. Quarterly Periodical of Programming and Budget.
P.30
2
6
The most important discussions in respect of internet crimes are the manner of hearing and
procedures in these types of crimes. This thing has made some troubles and difficulties in
juridical system about the pursuance and investigation. It is in the way that different and various
ways of penal hearings are not respondent of different aspects of these crimes in most cases and
this matter has made many troubles and difficulties in the procedure of hearing and investigation.
In the first occasion, investigation and examination of the place of perpetration of the crime and
the seizing of the instruments and tools of perpetration of the crime need the presence of special
skill and profession in the officials who investigate the crime to be able to have useful
investigation in the cyber space. As one of the other troubles and difficulties of internet crimes,
we can refer to this case that the place of the perpetration of the crime of the criminal is the place
which is different from the place of influence and effectiveness of the crime generally. Some
times it is indefinite or indiscriminate basically and this characteristic of absent (non-presence)
perpetration of the crime has made some troubles and difficulties in the researches, especially in
the field of the competencies.
Juridical and Legal Challenges
1. The current ambiguities about recognizing the rights of moral and spiritual ownership
officially: one of the most important challenges of the economy of the world is the
7
feeling of non-security and non-safety in the private ownership of the people. Although
the troubles and difficulties of this field and area can be solved in regarding to the law of
the support of the authors and the researchers of the year 2005, translation law of the year
of 1973 and the law of the support of computer software which has been approved
recently . Nevertheless, we cannot consider it sufficient generally, totally and definitely
and there are some ambiguities in the performance. The information and communication
technology makes clear and transparent the list of the assets of the people by its own
development. For the purpose of accompaniment and cooperation of the people in the
path of development of this technology, initially, it is necessary that the strata of the
people be convinced about the veneration of their moral and spiritual rights.
2. Non- identifying of the rights of the originative in the laws: one of the vital challenges of
the informative services is defining and recognizing the ownership rights of the
originative officially. Veneration of the rights of the moral and spiritual ownership can
motivate the originative for creating and development of new products. It is clear that the
originative will not have any motive for creating and distribution of the products
provided that the cost of copyright of the digital products is zero (none). So, recognizing
the ownership rights of the originative of the informative products of the inside of the
country officially is necessary for development of these kinds of activities and
development of the production of these kinds of products. The other aspect of this matter
is the international aspect of the matter. The reason is that the country must become the
member of the worldwide organization of the right of the originative (author) for support
8
of the export of the software. Of course, determination of entrance or non-entrance and
the time of the entrance to the organization need the expertise works.
3. The comprehensive and public law of electronic commerce: according to the alteration of
the commercial environment in the case of the development of electronic commerce,
legislation and approval of the proper commercial laws is essential.
4. Infringement of the laws which are in relation to the crimes of information and
communication technology: according to the essential and natural difference of electronic
crimes with the general and common crimes, some troubles have been made in the
juridical structure of Iran in respect of the laws, the knowledge of the judges and the
executive guaranty in electronic crimes in the present circumstances.
5. International sanctions: according to the necessity of the country to the foreign countries
(especially America) in the groundwork of hardware and software technologies which are
related to information and communication, international sanctions can be a serious
threaten in the procedure of development of information and communication technology.
6. Non- recognizing of electronic signature officially: recognizing of electronic signature
officially in the related laws is one of the critical necessity for development of its
application and usage of information and communication technology in the official,
9
commercial, financial and juridical affairs. Non- recognizing of electronic signature
officially is one of the critical difficulty of this technology nowadays. Non-usage of
electronic signature, in the current situation, may be because of the absence of the
necessary security and safety in the communicative networks of the country.
7. The absence of the executive guaranty for supporting of the rights of the consumer: the
possibility of transgression of the seller about the committed specifications of the
exchanged commodity increases because the development of electronic commerce causes
the decreasing of the face-to-face meeting of the parties of the commercial exchanges.
Development of the usage of this technology will be faced with problem in the occasion
that the right of the consumer has not been defined precisely or it doesn’t have necessary
executive guaranty.
8. The laws of redeployment of the foreign currency (exchange): one of the consequences of
the development of information and communication technology is the necessity of
transportation of the foreign currency (exchange) for buying of foods and services as well
as investment or withdrawal of the income of the capital. In this case we can say that the
current law of Iran is one of the most important obstacles in this way3.
2.Hassan Beigi , Ebrahim. (March 2004). “Development of the National Network of Data. The Anabatic
Challenges and the Related Threatens of National Security: History of Islamic Ideology”. No 9. P79
3
10
The Time and Place of Signing of Electronic Contract in Iran
Determination of the time and place of signing of the contract has different consequences and
effects. The place of signing of the contract is determined according the time of its signing.
When a kind of contract is signed in a parliament – it means the necessitated and the acceptant
sign the contract in a congress- there would be no problem in determination of the time and place
of the contract. The legal problems and discussions are considered when the parties of the
contract have spatial (local) and temporal distances. Also, signing of contract in electronic
commerce occurs among the people who have spatial (local) temporal distances4.
As the stipulation 23 of Vienna convention has explained, the contract is signed when it is
accepted. In general, about the time and place of signing of electronic contract, it can be said
that, in these kinds of contracts, the parties do not sign the contract in the presence of each other
and they have spatial distance – even geographically, time distance (60) - , so, there is difference
between the time and place of the issuance of causation or acceptance and information of it by
the audience. In this respect, the situation and status of electronic contracts is similar to the
corresponsive conventions and the contracts whose causation and acceptance is done through
post. In this way of announcement of will, in respect of the time of becoming determinate of the
issuance of “acceptance”, there are some disagreements. Also, the comments have been
Ghorban Vand , Mohammad Bagher. (July 2010).” The Time and Place of Signing of Electronic
Contracts of the Periodical: Law” . Law Study. No 29. P 271
4
11
announced, delivered, receipted, informed and presented. Also, different countries have accepted
one of these comments and views in regarding to its internal rights5.
The Corrective Solutions
The close relation of police and the people has been resulted in creation of the sense of trust .The
result of more inclination of people to the police is that the people can follow their problems and
challenges in cyber space. Combating with the crimes of the cyber space - in different fields such
as security, political, cultural, social and economical- is one of the most important missions of
cyber police. Also, the absence of knowledge of the users in the use of this space can cause
misusing.
The rule which is regulated for investigation of the cyber crimes must be in the way that protects
the rights of the people. Also, disciplinary force must be able to oppose the criminal in the
manner which is proper to his own crime. Currently, the efficiency, presentation and offering of
our legal laws is very limited against the development of cyber space and its crimes and don’t
have any congruency with each other.
Education or training is one of the proper methods of increasing of the level of knowledge of the
people such as the training of the methods through which the cyber terrorists attack.
Alsan , Mostafa. (Sept 2005). “Signing of the Electronic Contracts of the Periodical: Economy”.
Commercial Research Paper. no 36 . p 145
5
12
Conclusion
The aim of this study is to create safety for the internet networks and internet environments and
prohibit these crimes. The critical and vital point in internet crimes is elimination of the place
and space in the realm of physical place and the limitation of political reign. It is possible that the
crime is perpetrated in the limitation and realm which is out of geography and the realm of the
reign of the county and criminalization is the requirement of ignoring of the principle of regional
(local) competency and development of the geographical boundaries.
Although there have been much effort in worldwide level for approval of the proper regulations
in this case, the discussion about the place and time of the signing of the contract and the
antitypes of the cyber crimes and the legal effects of the automatic contracts have not been
13
analyzed precisely and some times, some faults have been mentioned about these contracts.
Assigning of special, penal courts and competent judges in this field is inevitable according to
the increasing of the occurrences of these kinds of crimes. Electronic commercial law of Iran – in
spite of its elevated heading- has not solved the legal problems and ambiguities which is the
result of emergence and development of electronic signatures. In addition, it has enkindled some
incompetency and inadequacies by regulation of absolute, abstract and imperfect rules- some of
them have been mentioned in the recent discussion- .
No country can be successful in combating with cyber criminals in its own. All countries must be
united for protecting of the users` privacy in the cyber space and consider the best solutions for
prohibition of the crime. The cyber crimes have universal nature and opposing them needs the
similar, international actions. If these crimes don’t be defined similarly in the juridical systems of
different countries, the efforts of the executive regulators will be complicated for hormonal
opposing with these crimes. International police, European convention of cyber crimes and the
advices of the United Nations are seeking for a similar literature in this field. It seems that some
rules must be regulated to be able to determine the responsibility of investigation of these crimes
in international level. Although we can not deny the effectiveness of the governments and the
extraordinary and huge management of the region, it must be accepted that prohibition of cyber
terrorism is different from the other crimes because the mere training and education can not be
sufficient for decreasing of the crime. Using of the new technologies, familiarity of law with new
and changing methods of cyber crimes and cooperation of the countries with each other are the
other necessities which must be considered in combating with cyber crimes.
14
Sources
1. Mellat Newspaper. (27 sept 2012). “The absence of legal and judicial infrastructures in
cyber space”.
2. Hassan Beigi , Ebrahim. (March 2004). “Development of the National Network of Data.
The Anabatic Challenges and the Related Threatens of National Security: History of
Islamic Ideology”. No 9. P79
3. Mohammad, Bagheri & Ebrahim Noshadi. (March 2011). “The Challenges of the Legal
and Commercial Actions in Cyber Space”. Quarterly Periodical of Programming and
Budget
4. Alsan , Mostafa. (Sept 2005). “Signing of the Electronic Contracts of the Periodical:
Economy”. Commercial Research Paper. no 36 . pp 30-178
15
5. Ghorban Vand , Mohammad Bagher. (July 2010).” The Time and Place of Signing of
Electronic Contracts of the Periodical: Law” . Law Study. No 29. P 271
16