Introduction to the Problem: This research analyses the norms of substantive criminal Law regarding Information and Electronic Transaction Act Number No. 11 of 2008 in conjunction with Bill Number 19 ...of 2016 on Amendments to Information and Electronic Transactions Act No. 11 of 2008 and its compliance with the Convention on Cybercrime, 2001.
Purpose/Objective Study: This research aims to analyze the conformity of offenses, criminal liability, and criminal sanction in the Information and Electronic Transaction Act (IETA) to the principles promulgated in the Convention on Cybercrime, 2001.
Design/Methodology/Approach: This research is a normative legal study using statute and conceptual approaches.
Findings: This study concluded that, in general, offenses regulated in IETA had confirmed the Convention. Nevertheless, the provision of computer-related fraud in IETA has a broader range than that of the Convention. IETA also lacks formulation concerning when and who bears criminal liability for corporate crime as suggested in the Convention. The research also finds that IETA did not adopt the principle of effectiveness and proportionality in promulgating both punishment and treatment. This study suggests that IETA should adopt criminal liability for a corporation, set the penal punishment proportionate to the seriousness of conduct and culpability of the actor, and regulate treatment.
Paper Type: Research Article
The article analyses the harmonisation framework under TFEU of the Directive 2008/99/EC and the possible difficulties in implementing the document in national legislation. An inadequately chosen ...legitimate purpose and the lack of the prioritisation of environmental crime in the Member States result in harmonisation and implementation problems related to issues of the definitions of the offences, their differentiation and compliance with fundamental principles of the law.
The era when criminal law was solely a matter of national legislation is long gone. In the European Union, the approximation of substantive criminal norms and procedural rights has not escaped the ...attention of the European legislator. Inevitably, the move towards supranational criminal law has affected the field of sentencing and criminal sanctions. This paper seeks to discuss the changes that the development of EU criminal law brings on sentencing. The focus lies on the approximation of criminal sanctions within the EU, in an attempt to understand the scope and the added value of the EU’s approach in the field. First, the legal basis of article 83 TFEU is presented and analyzed, in order to define the limits of the Union’s competence in the field of sentencing. Subsequently, the approach of the European legislator when adopting minimum rules on the approximation of criminal sanctions is unravelled, and the relationship between functional approximation and mutual recognition is discussed. Finally, this paper concludes with some critical reflections upon the approximation of criminal sanctions in the EU, with an eye towards the future of Europe’s Area of Freedom, Security and Justice (AFSJ).
The aims of the present study are to describe the modern forms of cybercrime and analyze the substantive computer-specific offences of the Austrian Penal Code by the means of specialist literature ...and – as available – relevant judgments. Based on the debate about the terms “cybercrime” or “computer criminal law” and the term of data in the Austrian Penal Code, the specific substantive computer-specific offences, including the penal provision of the Data Protection Code concerning the criminal protection of personal data, are presented and discussed systematically.
This paper analyses the case-law of the European Court of Justice on the substantive scope of
in transnational cases and evaluates the findings in light of the different concepts of legal interests ...inherent in the concept of crime as a material notion. I argue that the application of the interpretation of the ECJ to crimes against collective interests is insufficiently justified. As a result, the interpretation of
based on material facts appears only partially correct and a sense of distrust seems to be cemented between member states creating obstacles to a successful reform of the principle. Part one attempts to defend that the reasoning put forward by the court lacks relevance and evaluates how this affects mutual trust. Part two analyses this interpretation in the light of different forms of legal interest. Part three examines how later case-law has tried to explain the problematic interpretation of early cases and its relationship with the Charter of Fundamental Rights of the European Union. The article will conclude by summarising the findings which may put into perspective the more general challenges of cooperation in criminal matters within the EU.
The aims of the present study are to describe the modern forms of cybercrime and analyze the substantive computer-specific offences of the Austrian Penal Code by the means of specialist literature ...and – as available – relevant judgments. Based on the debate about the terms “cybercrime” or “computer criminal law” and the term of data in the Austrian Penal Code, the specific substantive computer-specific offences, including the penal provision of the Data Protection Code concerning the criminal protection of personal data, are presented and discussed systematically.
Ziel des vorliegenden Werks ist es, moderne Erscheinungsformen der Computerkriminalität technisch zu beschreiben sowie legistische Bemühungen des europäischen wie österreichischen Gesetzgebers, die bis dato entwickelten Literaturmeinungen und – soweit vorhanden – einschlägige Judikate aus rechtspolitischer und insbesondere dogmatischer Sicht wissenschaftlich zu analysieren. Ausgehend von der Befassung mit den Begrifflichkeiten „Computerkriminalität“ bzw „Computerstrafrecht“ und der Aufarbeitung des strafrechtlichen Datenbegriffs werden die spezifischen materiellrechtlichen Computerdelikte systematisch dargestellt und besprochen. Im Zuge der Ausarbeitung werden die Anwendbarkeit und Wirksamkeit dieser Strafbestimmungen anhand moderner Phänomene der Computerkriminalität (wie etwa Denial-of-Service-Attacks, Hacktivismus, Malware, Cyber-Terrorismus, Cyber-Stalking, Cyber-Grooming, Kinderpornographie, Missbräuche im Zahlungsverkehr, Phishing, Skimming, Datenfälschungen usw) untersucht.
We have been researching and developing a system called “PROLEG” which incorporates “Yoken-jijitsu-ron.” This logically organizes the abstract facts necessary to allege or prove in each statute in ...civil procedure. In civil procedure, since there have already been quite formally logical arguments based on the theory above mentioned, only what we had to do was creating rule bases subject to the civil law books in regards to this theory. However, this implementation process means that this system can only correspond to civil procedure. Since criminal procedure is also a procedure in courts, and we discuss it using similar legal concepts, we believe that criminal procedure, what we call “Yoken-jijitsu-ron” of Japanese criminal codes, is also able to be created and incorporated into “PROLEG for criminal law.” In the courses of developing “PROLEG for criminal law,” we faced and solved some implementational problems in relation to general parts of criminal law of which arguments do not generally exist in civil law. In this paper, we will explain PROLEG system and criminal law and how to combine two things by showing program codes and the visualization of output using some practically important cases. By doing this, we can see PROLEG is adaptable to criminal procedure and it can be used for EdTech and other purposes.
To what extent do constitutional basic rights limit the legislator in the field of substantive criminal law? This is the main question of this article. Its dilemma is that, at least from a ...continental view, we have two 'disciplines' dealing with them: constitutional law and criminal law. The divergence culminates in the concept of the Rechtsgut (public value or interest), which serves as a starting point in the criminal law arena. This difference was decisive in a case where the German Constitutional Court stated that the punishment of incest between natural siblings is not contrary to the German Basic Law. Criminal lawyers disagree with that ruling because the criminal law provision does not protect a legitimate Rechtsgut. The 'criminal law school' of the Rechtsgut puts all aspects of legitimate ariminalization into one and only box: 'the' Rechtsgut. This is not convincing from the point of view of constitutional law.
Die Arbeit untersucht das mit der Verbreitung strafrechtlicher Sanktionen für Kartellrechtsverstöße verbundene Konfliktpotenzial auf internationaler Ebene und beleuchtet dabei insbesondere die ...Gefahren, die sich aus dem parallelen Eingreifen mehrerer nationaler Kartellstrafregime auf einen internationalen Kartellverstoß ergeben. Dabei werden vorgelagert die auf strafrechtlicher und auf kartellrechtlicher Seite bestehenden internationalen Kooperations- und Koordinierungsmechanismen auf ihre Verfügbarkeit bei der Durchsetzung nationaler Kartellstraftatbestände hin untersucht. In diesem Zusammenhang wird unter anderem ein umfassendes Lösungsmodell dazu entwickelt, inwieweit die Staatsanwaltschaften der EU-Mitgliedsstaaten den Instrumenten der europäischen Kartellverfahrensverordnung (Verordnung 1/2003) unterliegen und wann ein nationaler Straftatbestand als „einzelstaatliches Wettbewerbsrecht“ im Sinne dieser Verordnung anzusehen ist.