Nell’era del digitale la nostra vita è ormai legata a doppio filo a smartphone e tablet che ci accompagnano in ogni nostro movimento. è proprio la natura itinerante di tali mezzi che li rende ...perfetti “contenitori” per accogliere i c.d. captatori informatici, ovvero i malware utilizzati a fini investigativi, per il perseguimento dei reati. In questo lavoro si approfondisce come la giurisprudenza e il legislatore abbiano cercato di regolare l’avvento di questi nuovi mezzi di ricerca della prova nel tentativo di trovare un bilanciamento tra il soddisfacimento dell’interesse pubblico nell’accertamento dei reati, previsto e tutelato dall’art. 112 Cost. relativo al principio dell’obbligatorietà dell’azione penale e l’art. 15 Cost., che sancisce il principio di inviolabilità della riservatezza e segretezza di qualsiasi forma di comunicazione. Al contempo, però, si vuole sottolineare come sia essenziale il contrasto al crimine informatico, attuato anche mediante l’utilizzo di tali strumenti e un adeguato sviluppo di risorse tecnologiche per la sicurezza informatica in grado di creare sistemi che siano “cyber resilienti”. In tal senso, si porta alla luce la duplice natura, benevola e malevola, dello stesso mezzo: il malware.
The urgency of the study is stipulated by the necessity to clarify the criteria allowing courts to determine a balance between the right to freedom of expression (Article 10 of the Convention for the ...Protection of Human Rights and Fundamental Freedoms) and the right to reputation protection as part of the right to privacy (Article 8 of the Convention for the Protection of Human Rights and Fundamental Freedoms), given the complex nature and equivalence of these rights on conditions of a a democratic society. The purpose of the article is to elucidate, through the European Court of Human Rights practice, the provisions allowing defamation cases to be resolved and additional criteria that can be used to consider such cases to be formed. The research is based on the perception of human rights as natural, inalienable and equal human opportunities, which are universal in nature, but may have a regional content, allowing us to talk about the social and cultural nature of law in general. The study takes into account the implicit nature of the Convention for the Protection of Human Rights and Fundamental Freedoms provisions, which enshrine the relevant human rights, respectively, it is the decisions of the European Court of Human Rights that are “filling” these rights with the “content”. The principle of the Convention’s norms dynamic interpretation is taken into account by the Court, which ensures the effectiveness of human rights institutions and a modern understanding of the content of protected rights. The article clarifies that the criteria for finding a balance between the right to freedom of expression and reputation protection are the following: the content of the publication; degree of public interest in disseminated information; the degree of publicity of the interested person, the form and consequences of the publication, the method of obtaining information, the behavior of the interested party to the publication; as additional criteria for determining the balance between the right to freedom of expression and the protection of reputation, it is suggested to use the purpose of the publication (whether, the publication aims to create a “platform” for discussion of public interest or is used as a means of black PR or this interest is limited to unhealthy curiosity), as well as the results of linguistic examination.
Search and seizure are important legal procedures in many legal systems. Search and seizure are regulated by the 1982 Constitution and their enforcement depends on the decision of a judge. In terms ...of tax law, search and seizure are applied within the scope of tax auditing. Searching can be enforced only by the judge’s decision which must be based on signs of tax evasion. However, after the judge’s decision, it seems that the tax administration has very broad powers in the procedure. There is no limit on the seizures, the seizure doesn’t depend on the decision of a judge and the taxpayer is not given an opportunity to file an appeal against this procedure. Although the purpose of compensating tax loss is considered to be effective here, these powers are contrary to the 1982 Constitution. However, the European Court of Human Rights held that the search and seizure regulated by the Tax Procedure Code did not violate the European Convention on Human Rights. Contrary to the European Convention on Human Rights, the inclusion of additional safeguards in the 1982 Constitution does not make it possible to make a different assessment. The solution is thought to be the recognition of additional safeguards in the 1982 Constitution for the taxpayer too.
Kvaliteta odrastanja u današnje vrijeme značajno je određena pojavom novih, virtualnih prostora koji omogućavaju dijeljenje informacija i druženje. Korištenje društvenih mreža određeno je starosnom ...dobi korisnika, ali to ne znači da su od sudjelovanja zaštićena i djeca najmlađe dobi. Djeca rane i predškolske dobi pojavljuju se na fotografijama na instagramskim profilima svojih roditelja, pa je cilj ovog istraživanja bio utvrditi poštuju li se prava djeteta na privatnost na tim fotografijama te kakvu sliku o djeci imaju roditelji. Kvantitativnom i kvalitativnom metodom te analizom sadržaja fotografija i videozapisa djece na deset javnih roditeljskih profila na području Hrvatske utvrđena je primjetna učestalost dijeljenja informacija o vlastitoj djeci, olako shvaćanje odgovornosti u pogledu zastupanja prava djeteta i nepoštovanje prava djeteta na privatnost. Stvaranje djetetova digitalnog identiteta bez pristanka djeteta moguće je povezati s još uvijek prisutnom tradicionalnom slikom o djeci.
The quality of growing up nowadays has been significantly determined by the emergence of new, virtual spaces which provide sharing information and socializing. The use of virtual social networks is determined by the minimum age of the user. Nevertheless, this does not mean that even very young children are protected from participation. Young children and preschoolers appear in photos on their parents’ Instagram profiles. Therefore, the aim of this research was to establish the respect of children’s rights to privacy regarding this phenomenon, and to identify the way in which parents perceive their children. Quantitative and qualitative methods and content analysis of children’s photos and videos on ten public parental profiles in Croatia revealed a noticeable frequency of sharing information about one’s own children, a frivolous understanding of the responsibility towards representation of children’s rights and non-respect of children’s right to privacy. The creation of a child’s digital identity without the child’s consent can be correlated with the still-present traditional perception of children.
OBJETIVO: El presente estudio de investigación tiene por objetivo el análisis del principio de proporcionalidad en los derechos fundamentales con énfasis en la videovigilancia masiva, el cual debe ...tenerse en cuenta para evitar una posible violación de derechos fundamentales, pues defendemos que no hay derechos ilimitados o absolutos.
MÉTODO: La metodología que se ha empleado en el presente trabajo se centra en el método deductivo, partiendo de una serie de premisas de lo general a lo particular, conjugada con una investigación jurisprudencia y doctrinal.
RELEVANCIA/ORIGINALIDAD: Es por todos conocido que no hay derechos absolutos y, por tanto, deben aplicarse ciertos límites. En este sentido, se ha hecho un estudio sobre el principio de proporcionalidad en los derechos fundamentales con el objetivo de ponderar los conflictos que puedan darse entre el derecho a la libertad de información y el derecho a la intimidad personal.
RESULTADOS: Se concluye que: (1) La preocupación por la pérdida de derechos en relación con la privacidad o la intimidad se ha incrementado; (2) Cada vez se usan más los dispositivos de videovigilancia por parte de empresas, gobierno, personas etc., para controlar a los individuos; (3) En muchas ocasiones, el uso de estos dispositivos está justificado para garantizar la seguridad ciudadana o evitar infracciones, pero no siempre es así; (4) Esta cuestión pone en riesgo la privacidad de las personas ya que, de no cumplirse determinados límites o garantías, se podrán vulnerar derechos fundamentales como, por ejemplo, la intimidad personal o familiar, la libertad de expresión, la propia libertad individual, el secreto de las comunicaciones, entre otros.
CONTRIBUCIONES TEÓRICAS/METODOLÓGICAS: Dentro de este contexto, el estudio que se propone realizar se centrará en el análisis de los límites de la videovigilancia y si ese mecanismo de grabación vulnera los derechos fundamentales.
Warren and Brandeis’ article, written more than 130 years ago, laid the foundation of the right to privacy. It mainly comprises two parts: the first is a condemnation against yellow journalism and ...the second is a compelling and efficacious plea for privacy laws. This paper illustrates how Warren and Brandeis differentiate the right to privacy from the property right and create a whole new chapter in the constitutional jurisprudence. Additionally, this paper analyzes the constitutional migration of the concept in the Nepalese legal system. Following doctrinal research methodology, we discuss the evolution of the right to privacy in the context of Nepal alongside three constitutional enactments and three distinct political regimes: monarchical, unitary republic, and federal republic systems. Hence, the considerations will focus on whether the migration of constitutional principles was effective by tracing a trajectory of case laws and what the recent privacy act entails. The analysis shows that privacy laws have been gradually improving in Nepal but require comprehensive revision.
In this paper, we defend what we call the ‘Hybrid View’ of privacy. According to this view, an individual has privacy if, and only if, no one else forms an epistemically warranted belief about the ...individual’s personal matters, nor perceives them. We contrast the Hybrid View with what seems to be the most common view of what it means to access someone’s personal matters, namely the Belief-Based View. We offer a range of examples that demonstrate why the Hybrid View is more plausible than the Belief-Based View. Finally, we show how the Hybrid View generates a more plausible fit between the concept of privacy, and the concept of a (morally objectionable) violation of privacy.