pal gov.tutorial6.session9.cybercrime

20
1 PalGov © 2011 1 PalGov © 2011 فلسطينيةلكترونية الديمية الحكومة ا أكاThe Palestinian eGovernment Academy www.egovacademy.ps Dr. Feras Milhem Tutorial 6: The Legal Framework of New Technologies Session9 Cybercrime

Upload: mustafa-jarrar

Post on 12-Jul-2015

274 views

Category:

Business


0 download

TRANSCRIPT

Page 1: Pal gov.tutorial6.session9.cybercrime

1PalGov © 2011 1PalGov © 2011

أكاديمية الحكومة اإللكترونية الفلسطينية

The Palestinian eGovernment Academy

www.egovacademy.ps

Dr. Feras Milhem

Tutorial 6: The Legal Framework of New Technologies

Session9

Cybercrime

Page 2: Pal gov.tutorial6.session9.cybercrime

2PalGov © 2011 2PalGov © 2011

About

This tutorial is part of the PalGov project, funded by the TEMPUS IV program of the

Commission of the European Communities, grant agreement 511159-TEMPUS-1-

2010-1-PS-TEMPUS-JPHES. The project website: www.egovacademy.ps

University of Trento, Italy

University of Namur, Belgium

Vrije Universiteit Brussel, Belgium

TrueTrust, UK

Birzeit University, Palestine

(Coordinator )

Palestine Polytechnic University, Palestine

Palestine Technical University, PalestineUniversité de Savoie, France

Ministry of Local Government, Palestine

Ministry of Telecom and IT, Palestine

Ministry of Interior, Palestine

Project Consortium:

Coordinator:

Dr. Mustafa Jarrar

Birzeit University, P.O.Box 14- Birzeit, Palestine

Telfax:+972 2 2982935 [email protected]

Page 3: Pal gov.tutorial6.session9.cybercrime

3PalGov © 2011 3PalGov © 2011

© Copyright Notes

Everyone is encouraged to use this material, or part of it, but should properly

cite the project (logo and website), and the author of that part.

No part of this tutorial may be reproduced or modified in any form or by any

means, without prior written permission from the project, who have the full

copyrights on the material.

Attribution-NonCommercial-ShareAlike

CC-BY-NC-SA

This license lets others remix, tweak, and build upon your work non-

commercially, as long as they credit you and license their new creations

under the identical terms.

Page 4: Pal gov.tutorial6.session9.cybercrime

4PalGov © 2011 4PalGov © 2011

ILOs

• Introduce legal framework of crimes

committed through the net in Palestine,

.مقدمة عن اإلطار القانون الجرمة األلكترونة ف فلسطن•

Increase the knowledge of the trainee on

the importance of this subject. Orientation

on the type of Cybercrimes.

. زادة المعرفة حول الجرائم األلكترونة وانواعها

Orientations on the international efforts to

overcome crimes of this type.

Page 5: Pal gov.tutorial6.session9.cybercrime

5PalGov © 2011 5PalGov © 2011

The legal framework of Penal Law

اإلطار القانوني لتشريعات الجزاء

• In the West Bank: The Penal Law of 1960.

1960قانون العقوبات لسنة : في الضفة الغربية•

• In the Gaza Strip: The Penal Law of 1936

. 1936قانون العقوبات لسنة : في قطاع غزة•

BOTH LAWS do not regulate cybercrimes.

كال القانون ال ينظمان جرائم الحاسوب

Page 6: Pal gov.tutorial6.session9.cybercrime

6PalGov © 2011 6PalGov © 2011

The legal framework of Penal Law

اإلطار القانوني لتشريعات الجزاء

• No other laws provide penalties to crimes

committed online.

ال يوجد إطار قانون آخر يجرم الجرائم التي ترتكب عن الطريق •

.الشبكة االلكترونية

• CONSEQUENCE: Perpetrators escape

legal accountability

Page 7: Pal gov.tutorial6.session9.cybercrime

7PalGov © 2011 7PalGov © 2011

What is Cybercrime

ما هي الجرائم األلكترونية

Illegal activity committed on the internet.This is a broad term that describes

everything from electronic cracking to

denial of service attacks that cause

electronic commerce sites to lose

money".

كل أشكال السلوك غر المشروع الذى رتكب باستخدام

الحاسب

Page 8: Pal gov.tutorial6.session9.cybercrime

8PalGov © 2011 8PalGov © 2011

What is Cybercrime

ما هي الجرائم األلكترونية

Some categorized cybercrimes into three Ref. cyberlaws.net:

- Cybercrimes against persons.

child-pornography, harassment. The trafficking, distribution, posting, and dissemination of obscene material.

- Cybercrimes against property.

computer vandalism (destruction of others' property), transmission of harmful programmes.

- Cybercrimes against government.

Terrorism, money laundry

Page 9: Pal gov.tutorial6.session9.cybercrime

9PalGov © 2011 9PalGov © 2011

Current Threat

التهديدات القائمة

Some categorized cybercrimes into three Ref. cyberlaws.net:

- Cybercrimes against persons.

child-pornography, harassment. The trafficking, distribution, posting, and dissemination of obscene material.

- Cybercrimes against property.

computer vandalism (destruction of others' property), transmission of harmful programmes.

- Cybercrimes against government.

Terrorism, money laundry

Page 10: Pal gov.tutorial6.session9.cybercrime

10PalGov © 2011 10PalGov © 2011

Current Threat

التهديدات القائمة

- Crackers (Hackers): such as the intent to steal confidential data, acquire free software, or perform malicious destruction of files.

- Internet Fraud (Crimes of Deception), example trick via email

- Skimming is the theft of credit card information by typically dishonest employees

- Phishing: is a way of attempting to acquire information such as usernames, passwords, and credit card details - spam

- Money laundry

- Pornography and Illegal Obscenity

Page 11: Pal gov.tutorial6.session9.cybercrime

11PalGov © 2011 11PalGov © 2011

Example Penal Law: Estonia

مثال قانون جزاء

- Article 268. Computer Fraud

Acquisition of other’s property or deriving of benefits through introduction of computer programs or data, as well as their modification, deletion, blocking or another kind of interference with the procedure of processing information that influences its results and causes direct property or another damage to a person are punished with fine, arrest or imprisonment within the term from one to six years.

بخصوص األحتال عبر األنترنت -

Page 12: Pal gov.tutorial6.session9.cybercrime

12PalGov © 2011 12PalGov © 2011

Example Penal Law: Estonia

مثال قانون جزاء

- Article 269. Deletion of computer

information or software

1. Illegal deletion, damage, violation or

blocking of computer information or

software are punished with fine or

arrest

بخصوص تجرم حذف أو إعتداء أو تخرب أو حجب -

معلومات من الكمبوتر أو أحد برامجه

Page 13: Pal gov.tutorial6.session9.cybercrime

13PalGov © 2011 13PalGov © 2011

Example Penal Law: Estonia

مثال قانون جزاء

- Article 270. Computer sabotage

Introduction of data or programs, their modification, deletion or blocking to create disturbance interferences in the work of computer or telecommunication system are punished with fine, arrest or imprisonment within up to two years.

عاقب كل من أدخل معلومات بشكل غر مشروع أو قام بتعدل أو -حذف أو حجب لخلق اضطراب على عمل جهاز الكمبوتر أو نظام

االتصاالت السلكة والالسلكة باالعتقال أوالغرامة أو السجن مدة تصل .الى عامن

هناك تشدد للعقوبة لمن أحدث خسران للمعلومات أو قام بعمل تخرب -لسجالت الدولة

Page 14: Pal gov.tutorial6.session9.cybercrime

14PalGov © 2011 14PalGov © 2011

Example Penal Law: Estonia

مثال قانون جزاء

- Article 272. Illegal interruption or blocking

of the computer system connection

تقطع أو إغالق غر شرع للربط عبر نظام الحاسوب-

- Article 273. Obvious spread of computer

viruses

نشر للفروسات عبر الحاسوب-

- Article 274. Transfer of protecting codes

نقل شفرات محمة سواء ف البرامج أو الشبكات-

Page 15: Pal gov.tutorial6.session9.cybercrime

15PalGov © 2011 15PalGov © 2011

Conventions/treaties

مواثيق إتفاقيات

• No unified position on international

agreement.

• Council of Europe: Convention on

Cybercrime

It is open for other states that the states

of CoE

ال توجد إتفاقة مصادق علها عالما

إتفاقة حول جرائم الحاسوب : مجلس دول أوروبا

االتفاقة مفتوحة أمام دول من خارج مجلس دول أوروبا

Page 16: Pal gov.tutorial6.session9.cybercrime

16PalGov © 2011 16PalGov © 2011

Budapest: Convention on Cybercrime

OBJECTIVES

• Pursue a common criminal policy

aimed at the protection of society

against cybercrime by adopting

appropriate legislation and fostering

international co-operation.

السع نحو ساسة جزائة موحدة تهدف إلى حماة •

المجتمع من جرائم الحاسوب، وذلك عن طرق تبن

. تشارع مناسبة وعن طرق تعزز التعاون الدول

Page 17: Pal gov.tutorial6.session9.cybercrime

17PalGov © 2011 17PalGov © 2011

Budapest: Convention on Cybercrime

Called to adopt measures in the national level for:

- Illegal Access

- Illegal interception

- Data interference

- System interference

- Misuse of devices

- Computer related forgery

- Computer related fraud

- Pornography

- Infringements of Copyright

Call to adapt procedural provision

Page 18: Pal gov.tutorial6.session9.cybercrime

18PalGov © 2011 18PalGov © 2011

Summary

• Palestine laws are silent about Cybercrimes. No protection or punishment policies are available. However, the new draft Penal Law regulates some rules.

ال وجد تجرم ف فلسطن للجرائم المقترفة عبر الشبكة •. األلكترونة

• No international agreements, however, there are regional agreements such as Budapest convention.

ال توجد إتفاقات دولة وإنما أقلمة مثل إتفاقة بودابست •

• E-government in Palestine must be protected.

Page 19: Pal gov.tutorial6.session9.cybercrime

19PalGov © 2011 19PalGov © 2011

References

• Palestine Penal Law of 1936 .

• The Jordanian Penal Law of 1960.

• Florence de Villenfagne, CRIDS, University of Namur, PowerPoint Presentation on Cybercrimes, 2011.

• Estonian Penal Law http://www.coe.int/t/dlapil/codexter/Source/cyberterrorism/Estonia.pdf

• Budapest: Convention on Cybercrime http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/cy-activity-interface-2010/presentations/Ws%203/cyber_octopus_WS_3_alexander_CCC_global_frame.pdf

عبد الفتاح بوم حجازي، التجارة األلكترونة ف القانون العرب النموذج •2006لمكافحة جرائم الكمبوتر واألنترنت، األسكندرة، دار الفكر الجامع،

Page 20: Pal gov.tutorial6.session9.cybercrime

20PalGov © 2011 20PalGov © 2011

Session End