SlideShare a Scribd company logo
1 of 20
Download to read offline
‫أكاديمية الحكومة اإللكترونية الفلسطينية‬
         The Palestinian eGovernment Academy
                     www.egovacademy.ps




Tutorial 6: The Legal Framework of New Technologies

                      Session9
                Cybercrime

                Dr. Feras Milhem


                        PalGov © 2011                        1
About

This tutorial is part of the PalGov project, funded by the TEMPUS IV program of the
Commission of the European Communities, grant agreement 511159-TEMPUS-1-
2010-1-PS-TEMPUS-JPHES. The project website: www.egovacademy.ps
Project Consortium:
             Birzeit University, Palestine
                                                           University of Trento, Italy
             (Coordinator )


             Palestine Polytechnic University, Palestine   Vrije Universiteit Brussel, Belgium


             Palestine Technical University, Palestine
                                                           Université de Savoie, France

             Ministry of Telecom and IT, Palestine
                                                           University of Namur, Belgium
             Ministry of Interior, Palestine
                                                           TrueTrust, UK
             Ministry of Local Government, Palestine


Coordinator:
Dr. Mustafa Jarrar
Birzeit University, P.O.Box 14- Birzeit, Palestine
Telfax:+972 2 2982935 mjarrar@birzeit.eduPalGov © 2011
                                                                                                 2
© Copyright Notes
Everyone is encouraged to use this material, or part of it, but should properly
cite the project (logo and website), and the author of that part.


No part of this tutorial may be reproduced or modified in any form or by any
means, without prior written permission from the project, who have the full
copyrights on the material.




                   Attribution-NonCommercial-ShareAlike
                                CC-BY-NC-SA

This license lets others remix, tweak, and build upon your work non-
commercially, as long as they credit you and license their new creations
under the identical terms.

                                    PalGov © 2011                                 3
ILOs


• Introduce legal framework of crimes
  committed through the net in Palestine,
.‫• مقدمة عن اإلطار القانونً الجرٌمة األلكترونٌة فً فلسطٌن‬
Increase the knowledge of the trainee on
  the importance of this subject. Orientation
  on the type of Cybercrimes.
           .‫زٌادة المعرفة حول الجرائم األلكترونٌة وانواعها‬
Orientations on the international efforts to
  overcome crimes of this type.

                    PalGov © 2011                      4
The legal framework of Penal Law
‫اإلطار القانوني لتشريعات الجزاء‬

• In the West Bank: The Penal Law of
  1960.
       1960 ‫• في الضفة الغربية: قانون العقوبات لسنة‬
• In the Gaza Strip: The Penal Law of
  1936
          .1936 ‫• في قطاع غزة: قانون العقوبات لسنة‬

BOTH LAWS do not regulate
 cybercrimes.
              ‫كال القانون ال ينظمان جرائم الحاسوب‬
                 PalGov © 2011                  5
The legal framework of Penal Law
         ‫اإلطار القانوني لتشريعات الجزاء‬


• No other laws provide penalties to crimes
  committed online.

‫• ال يوجد إطار قانون آخر يجرم الجرائم التي ترتكب عن الطريق‬
                                      .‫الشبكة االلكترونية‬

• CONSEQUENCE: Perpetrators escape
  legal accountability

                           PalGov © 2011                     6
What is Cybercrime
‫ما هي الجرائم األلكترونية‬


  Illegal activity committed on the internet.
     This is a broad term that describes
   everything from electronic cracking to
     denial of service attacks that cause
      electronic commerce sites to lose
                                 money".

‫كل أشكال السلوك غٌر المشروع الذى ٌرتكب باستخدام‬
                                         ‫الحاسب‬

                      PalGov © 2011               7
What is Cybercrime
‫ما هي الجرائم األلكترونية‬

Some categorized cybercrimes into three Ref. cyberlaws.net:
- Cybercrimes against persons.
child-pornography, harassment. The trafficking,
  distribution, posting, and dissemination of
  obscene material.
- Cybercrimes against property.
computer vandalism (destruction of others' property),
  transmission of harmful programmes.

- Cybercrimes against government.
Terrorism, money laundry



                      PalGov © 2011                     8
Current Threat
‫التهديدات القائمة‬

Some categorized cybercrimes into three Ref. cyberlaws.net:
- Cybercrimes against persons.
child-pornography, harassment. The trafficking,
  distribution, posting, and dissemination of
  obscene material.
- Cybercrimes against property.
computer vandalism (destruction of others' property),
  transmission of harmful programmes.

- Cybercrimes against government.
Terrorism, money laundry



                    PalGov © 2011                       9
Current Threat
‫التهديدات القائمة‬

- Crackers (Hackers): such as the intent to steal confidential
   data, acquire free software, or perform malicious destruction of
   files.
- Internet Fraud (Crimes of Deception), example trick via email
- Skimming is the theft of credit card information by
  typically dishonest employees
- Phishing: is a way of attempting to acquire
  information such as usernames, passwords, and
  credit card details
  - spam
- Money laundry
- Pornography and Illegal Obscenity



                        PalGov © 2011                                 10
Example Penal Law: Estonia
‫مثال قانون جزاء‬

- Article 268. Computer Fraud
  Acquisition of other’s property or deriving of
  benefits through introduction of computer
  programs or data, as well as their modification,
  deletion, blocking or another kind of
  interference with the procedure of processing
  information that influences its results and
  causes direct property or another damage to a
  person are punished with fine, arrest or
  imprisonment within the term from one to six
  years.
                        ‫- بخصوص األحتٌال عبر األنترنت‬

                  PalGov © 2011                   11
Example Penal Law: Estonia
‫مثال قانون جزاء‬


- Article 269. Deletion of computer
  information or software

  1. Illegal deletion, damage, violation or
  blocking of computer information or
  software are punished with fine or
  arrest
  ‫- بخصوص تجرٌم حذف أو إعتداء أو تخرٌب أو حجب‬
              ‫معلومات من الكمبٌوتر أو أحد برامجه‬

                PalGov © 2011                12
Example Penal Law: Estonia
‫مثال قانون جزاء‬

- Article 270. Computer sabotage
  Introduction of data or programs, their
  modification, deletion or blocking to create
  disturbance interferences in the work of computer
  or telecommunication system are punished with
  fine, arrest or imprisonment within up to two
  years.
     ‫- ٌعاقب كل من أدخل معلومات بشكل غٌر مشروع أو قام بتعدٌل أو‬
    ‫حذف أو حجب لخلق اضطراب على عمل جهاز الكمبٌوتر أو نظام‬
 ‫االتصاالت السلكٌة والالسلكٌة باالعتقال أوالغرامة أو السجن مدة تصل‬
                                                         .‫الى عامٌن‬
 ً‫- هناك تشدٌد للعقوبة لمن أحدث خسران للمعلومات أو قام بعمل تخرٌب‬
                                                     ‫لسجالت الدولة‬


                       PalGov © 2011                            13
Example Penal Law: Estonia
‫مثال قانون جزاء‬


- Article 272. Illegal interruption or blocking
  of the computer system connection
   ‫- تقطٌع أو إغالق غٌر شرعً للربط عبر نظام الحاسوب‬
- Article 273. Obvious spread of computer
  viruses
                         ‫- نشر للفٌروسات عبر الحاسوب‬
- Article 274. Transfer of protecting codes
         ‫- نقل شفرات محمٌة سواء فً البرامج أو الشبكات‬


                  PalGov © 2011                   14
Conventions/treaties
‫مواثيق إتفاقيات‬


• No unified position on international
   agreement.
• Council of Europe: Convention on
   Cybercrime
It is open for other states that the states
   of CoE
                     ‫ال توجد إتفاقٌة مصادق علٌها عالمٌا‬
          ‫مجلس دول أوروبا: إتفاقٌة حول جرائم الحاسوب‬
    ‫االتفاقٌة مفتوحة أمام دول من خارج مجلس دول أوروبا‬
                   PalGov © 2011                    15
Budapest: Convention on Cybercrime
OBJECTIVES


• Pursue a common criminal policy
  aimed at the protection of society
  against cybercrime by adopting
  appropriate legislation and fostering
  international co-operation.
     ‫• السعً نحو سٌاسة جزائٌة موحدة تهدف إلى حماٌة‬
   ً‫المجتمع من جرائم الحاسوب، وذلك عن طرٌق تبن‬
      .ً‫تشارٌع مناسبة وعن طرق تعزٌز التعاون الدول‬


                 PalGov © 2011                 16
Budapest: Convention on Cybercrime


 Called to adopt measures in the national level for:
- Illegal Access
- Illegal interception
- Data interference
- System interference
- Misuse of devices
- Computer related forgery
- Computer related fraud
- Pornography
- Infringements of Copyright
Call to adapt procedural provision


                   PalGov © 2011                       17
Summary

• Palestine laws are silent about Cybercrimes.
  No protection or punishment policies are
  available. However, the new draft Penal Law
  regulates some rules.
       ‫• ال ٌوجد تجرٌم فً فلسطٌن للجرائم المقترفة عبر الشبكة‬
                                                   .‫األلكترونٌة‬
• No international agreements, however, there
  are regional agreements such as Budapest
  convention.
       ‫• ال توجد إتفاقٌات دولٌة وإنما أقلٌمٌة مثل إتفاقٌة بودابست‬
• E-government in Palestine must be protected.

                      PalGov © 2011                           18
References

• Palestine Penal Law of 1936 .
• The Jordanian Penal Law of 1960.
• Florence de Villenfagne, CRIDS, University of Namur,
  PowerPoint Presentation on Cybercrimes, 2011.
• Estonian Penal Law
  http://www.coe.int/t/dlapil/codexter/Source/cyberterrorism
  /Estonia.pdf
•
• Budapest: Convention on Cybercrime
  http://www.coe.int/t/dghl/cooperation/economiccrime/cyb
  ercrime/cy-activity-interface-
  2010/presentations/Ws%203/cyber_octopus_WS_3_alex
  ander_CCC_global_frame.pdf
   ً‫• عبد الفتاح بٌومً حجازي، التجارة األلكترونٌة فً القانون العربً النموذج‬
  2006 ،ً‫لمكافحة جرائم الكمبٌوتر واألنترنت، األسكندرٌة، دار الفكر الجامع‬


                          PalGov © 2011                                19
Session End



    PalGov © 2011   20

More Related Content

What's hot

Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsRaunaq Jaiswal
 
Sookman primetime presentation
Sookman primetime presentationSookman primetime presentation
Sookman primetime presentationbsookman
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Glorisosegughana
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nationsblogzilla
 
Internet Jurisdiction Primer
Internet Jurisdiction PrimerInternet Jurisdiction Primer
Internet Jurisdiction PrimerGraham Smith
 
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaPolicy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaAPNIC
 
Pornography act,2012 bangladesh
Pornography act,2012 bangladeshPornography act,2012 bangladesh
Pornography act,2012 bangladeshOrko Abir
 
20140314 Belgian Senate Judicial action of police on social media
20140314 Belgian Senate Judicial action of police on social media20140314 Belgian Senate Judicial action of police on social media
20140314 Belgian Senate Judicial action of police on social mediaLuc Beirens
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshRabita Rejwana
 
Richard Cooke - Birketts LLP - ICE Bribery Act Presentation
Richard Cooke - Birketts LLP - ICE Bribery Act PresentationRichard Cooke - Birketts LLP - ICE Bribery Act Presentation
Richard Cooke - Birketts LLP - ICE Bribery Act PresentationAndrew Kenyon
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastMichael Owen
 
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIADEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIABenedict Ishabakaki
 

What's hot (18)

Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal Downloads
 
Sookman primetime presentation
Sookman primetime presentationSookman primetime presentation
Sookman primetime presentation
 
Internet in Ukraine
Internet in UkraineInternet in Ukraine
Internet in Ukraine
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
 
CTO Cybersecurity Forum 2013 Alexander Seger Budapest Convention on Cybercrime
CTO Cybersecurity Forum 2013 Alexander Seger Budapest Convention on CybercrimeCTO Cybersecurity Forum 2013 Alexander Seger Budapest Convention on Cybercrime
CTO Cybersecurity Forum 2013 Alexander Seger Budapest Convention on Cybercrime
 
110 koenig
110 koenig110 koenig
110 koenig
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nations
 
Internet Jurisdiction Primer
Internet Jurisdiction PrimerInternet Jurisdiction Primer
Internet Jurisdiction Primer
 
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaPolicy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
 
File000165
File000165File000165
File000165
 
Pornography act,2012 bangladesh
Pornography act,2012 bangladeshPornography act,2012 bangladesh
Pornography act,2012 bangladesh
 
File000167
File000167File000167
File000167
 
20140314 Belgian Senate Judicial action of police on social media
20140314 Belgian Senate Judicial action of police on social media20140314 Belgian Senate Judicial action of police on social media
20140314 Belgian Senate Judicial action of police on social media
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
 
Richard Cooke - Birketts LLP - ICE Bribery Act Presentation
Richard Cooke - Birketts LLP - ICE Bribery Act PresentationRichard Cooke - Birketts LLP - ICE Bribery Act Presentation
Richard Cooke - Birketts LLP - ICE Bribery Act Presentation
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
 
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIADEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
 
Security Wars
Security WarsSecurity Wars
Security Wars
 

Similar to Pal gov.tutorial6.session9.cybercrime

Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-finalAldrin SuperGo
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxRomanoGabrillo1
 
CYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLECYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLEInterMediaKT
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxParasSehgal12
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesDrSamsonChepuri1
 
Pal gov.tutorial6.session6.digital signature & e evidence
Pal gov.tutorial6.session6.digital signature & e evidencePal gov.tutorial6.session6.digital signature & e evidence
Pal gov.tutorial6.session6.digital signature & e evidenceMustafa Jarrar
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)GrittyCC
 
Em505 report(pecha kucha video)
Em505 report(pecha kucha video)Em505 report(pecha kucha video)
Em505 report(pecha kucha video)Eunice Alamag
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxOlusegun Mosugu
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwkamalbhatt9229
 
Pal gov.tutorial6.session0.outline
Pal gov.tutorial6.session0.outlinePal gov.tutorial6.session0.outline
Pal gov.tutorial6.session0.outlineMustafa Jarrar
 
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Winthrop Yu
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 
Amicus curae roskomsvoboda_echr_kharitonov case
Amicus curae roskomsvoboda_echr_kharitonov caseAmicus curae roskomsvoboda_echr_kharitonov case
Amicus curae roskomsvoboda_echr_kharitonov caseSarkis Darbinyan
 
Sookman federal circuit_internet_and_copyright_
Sookman federal circuit_internet_and_copyright_Sookman federal circuit_internet_and_copyright_
Sookman federal circuit_internet_and_copyright_bsookman
 

Similar to Pal gov.tutorial6.session9.cybercrime (20)

Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptx
 
CYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLECYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLE
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
 
Pal gov.tutorial6.session6.digital signature & e evidence
Pal gov.tutorial6.session6.digital signature & e evidencePal gov.tutorial6.session6.digital signature & e evidence
Pal gov.tutorial6.session6.digital signature & e evidence
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
Em505 report(pecha kucha video)
Em505 report(pecha kucha video)Em505 report(pecha kucha video)
Em505 report(pecha kucha video)
 
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by RuyookaUganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Pal gov.tutorial6.session0.outline
Pal gov.tutorial6.session0.outlinePal gov.tutorial6.session0.outline
Pal gov.tutorial6.session0.outline
 
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
Amicus curae roskomsvoboda_echr_kharitonov case
Amicus curae roskomsvoboda_echr_kharitonov caseAmicus curae roskomsvoboda_echr_kharitonov case
Amicus curae roskomsvoboda_echr_kharitonov case
 
CTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
CTO Cybersecurity Forum 2013 Justin Aime Tsanga EbodeCTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
CTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
 
Sookman federal circuit_internet_and_copyright_
Sookman federal circuit_internet_and_copyright_Sookman federal circuit_internet_and_copyright_
Sookman federal circuit_internet_and_copyright_
 

More from Mustafa Jarrar

Clustering Arabic Tweets for Sentiment Analysis
Clustering Arabic Tweets for Sentiment AnalysisClustering Arabic Tweets for Sentiment Analysis
Clustering Arabic Tweets for Sentiment AnalysisMustafa Jarrar
 
Classifying Processes and Basic Formal Ontology
Classifying Processes  and Basic Formal OntologyClassifying Processes  and Basic Formal Ontology
Classifying Processes and Basic Formal OntologyMustafa Jarrar
 
Discrete Mathematics Course Outline
Discrete Mathematics Course OutlineDiscrete Mathematics Course Outline
Discrete Mathematics Course OutlineMustafa Jarrar
 
Business Process Implementation
Business Process ImplementationBusiness Process Implementation
Business Process ImplementationMustafa Jarrar
 
Business Process Design and Re-engineering
Business Process Design and Re-engineeringBusiness Process Design and Re-engineering
Business Process Design and Re-engineeringMustafa Jarrar
 
BPMN 2.0 Analytical Constructs
BPMN 2.0 Analytical ConstructsBPMN 2.0 Analytical Constructs
BPMN 2.0 Analytical ConstructsMustafa Jarrar
 
BPMN 2.0 Descriptive Constructs
BPMN 2.0 Descriptive Constructs  BPMN 2.0 Descriptive Constructs
BPMN 2.0 Descriptive Constructs Mustafa Jarrar
 
Introduction to Business Process Management
Introduction to Business Process ManagementIntroduction to Business Process Management
Introduction to Business Process ManagementMustafa Jarrar
 
Customer Complaint Ontology
Customer Complaint Ontology Customer Complaint Ontology
Customer Complaint Ontology Mustafa Jarrar
 
Subset, Equality, and Exclusion Rules
Subset, Equality, and Exclusion RulesSubset, Equality, and Exclusion Rules
Subset, Equality, and Exclusion RulesMustafa Jarrar
 
Schema Modularization in ORM
Schema Modularization in ORMSchema Modularization in ORM
Schema Modularization in ORMMustafa Jarrar
 
On Computer Science Trends and Priorities in Palestine
On Computer Science Trends and Priorities in PalestineOn Computer Science Trends and Priorities in Palestine
On Computer Science Trends and Priorities in PalestineMustafa Jarrar
 
Lessons from Class Recording & Publishing of Eight Online Courses
Lessons from Class Recording & Publishing of Eight Online CoursesLessons from Class Recording & Publishing of Eight Online Courses
Lessons from Class Recording & Publishing of Eight Online CoursesMustafa Jarrar
 
Presentation curras paper-emnlp2014-final
Presentation curras paper-emnlp2014-finalPresentation curras paper-emnlp2014-final
Presentation curras paper-emnlp2014-finalMustafa Jarrar
 
Jarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 CallsJarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 CallsMustafa Jarrar
 
Habash: Arabic Natural Language Processing
Habash: Arabic Natural Language ProcessingHabash: Arabic Natural Language Processing
Habash: Arabic Natural Language ProcessingMustafa Jarrar
 
Adnan: Introduction to Natural Language Processing
Adnan: Introduction to Natural Language Processing Adnan: Introduction to Natural Language Processing
Adnan: Introduction to Natural Language Processing Mustafa Jarrar
 
Riestra: How to Design and engineer Competitive Horizon 2020 Proposals
Riestra: How to Design and engineer Competitive Horizon 2020 ProposalsRiestra: How to Design and engineer Competitive Horizon 2020 Proposals
Riestra: How to Design and engineer Competitive Horizon 2020 ProposalsMustafa Jarrar
 
Bouquet: SIERA Workshop on The Pillars of Horizon2020
Bouquet: SIERA Workshop on The Pillars of Horizon2020Bouquet: SIERA Workshop on The Pillars of Horizon2020
Bouquet: SIERA Workshop on The Pillars of Horizon2020Mustafa Jarrar
 
Jarrar: Sparql Project
Jarrar: Sparql ProjectJarrar: Sparql Project
Jarrar: Sparql ProjectMustafa Jarrar
 

More from Mustafa Jarrar (20)

Clustering Arabic Tweets for Sentiment Analysis
Clustering Arabic Tweets for Sentiment AnalysisClustering Arabic Tweets for Sentiment Analysis
Clustering Arabic Tweets for Sentiment Analysis
 
Classifying Processes and Basic Formal Ontology
Classifying Processes  and Basic Formal OntologyClassifying Processes  and Basic Formal Ontology
Classifying Processes and Basic Formal Ontology
 
Discrete Mathematics Course Outline
Discrete Mathematics Course OutlineDiscrete Mathematics Course Outline
Discrete Mathematics Course Outline
 
Business Process Implementation
Business Process ImplementationBusiness Process Implementation
Business Process Implementation
 
Business Process Design and Re-engineering
Business Process Design and Re-engineeringBusiness Process Design and Re-engineering
Business Process Design and Re-engineering
 
BPMN 2.0 Analytical Constructs
BPMN 2.0 Analytical ConstructsBPMN 2.0 Analytical Constructs
BPMN 2.0 Analytical Constructs
 
BPMN 2.0 Descriptive Constructs
BPMN 2.0 Descriptive Constructs  BPMN 2.0 Descriptive Constructs
BPMN 2.0 Descriptive Constructs
 
Introduction to Business Process Management
Introduction to Business Process ManagementIntroduction to Business Process Management
Introduction to Business Process Management
 
Customer Complaint Ontology
Customer Complaint Ontology Customer Complaint Ontology
Customer Complaint Ontology
 
Subset, Equality, and Exclusion Rules
Subset, Equality, and Exclusion RulesSubset, Equality, and Exclusion Rules
Subset, Equality, and Exclusion Rules
 
Schema Modularization in ORM
Schema Modularization in ORMSchema Modularization in ORM
Schema Modularization in ORM
 
On Computer Science Trends and Priorities in Palestine
On Computer Science Trends and Priorities in PalestineOn Computer Science Trends and Priorities in Palestine
On Computer Science Trends and Priorities in Palestine
 
Lessons from Class Recording & Publishing of Eight Online Courses
Lessons from Class Recording & Publishing of Eight Online CoursesLessons from Class Recording & Publishing of Eight Online Courses
Lessons from Class Recording & Publishing of Eight Online Courses
 
Presentation curras paper-emnlp2014-final
Presentation curras paper-emnlp2014-finalPresentation curras paper-emnlp2014-final
Presentation curras paper-emnlp2014-final
 
Jarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 CallsJarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 Calls
 
Habash: Arabic Natural Language Processing
Habash: Arabic Natural Language ProcessingHabash: Arabic Natural Language Processing
Habash: Arabic Natural Language Processing
 
Adnan: Introduction to Natural Language Processing
Adnan: Introduction to Natural Language Processing Adnan: Introduction to Natural Language Processing
Adnan: Introduction to Natural Language Processing
 
Riestra: How to Design and engineer Competitive Horizon 2020 Proposals
Riestra: How to Design and engineer Competitive Horizon 2020 ProposalsRiestra: How to Design and engineer Competitive Horizon 2020 Proposals
Riestra: How to Design and engineer Competitive Horizon 2020 Proposals
 
Bouquet: SIERA Workshop on The Pillars of Horizon2020
Bouquet: SIERA Workshop on The Pillars of Horizon2020Bouquet: SIERA Workshop on The Pillars of Horizon2020
Bouquet: SIERA Workshop on The Pillars of Horizon2020
 
Jarrar: Sparql Project
Jarrar: Sparql ProjectJarrar: Sparql Project
Jarrar: Sparql Project
 

Recently uploaded

Moradia Isolada com Logradouro; Detached house with patio in Penacova
Moradia Isolada com Logradouro; Detached house with patio in PenacovaMoradia Isolada com Logradouro; Detached house with patio in Penacova
Moradia Isolada com Logradouro; Detached house with patio in Penacovaimostorept
 
Top Quality adbb 5cl-a-d-b Best precursor raw material
Top Quality adbb 5cl-a-d-b Best precursor raw materialTop Quality adbb 5cl-a-d-b Best precursor raw material
Top Quality adbb 5cl-a-d-b Best precursor raw materialsunnyly512
 
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptxThompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptxtmthompson1
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Understanding Financial Accounting 3rd Canadian Edition by Christopher D. Bur...
Understanding Financial Accounting 3rd Canadian Edition by Christopher D. Bur...Understanding Financial Accounting 3rd Canadian Edition by Christopher D. Bur...
Understanding Financial Accounting 3rd Canadian Edition by Christopher D. Bur...ssuserf63bd7
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDEJIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDEkajalroy875762
 
The Art of Decision-Making: Navigating Complexity and Uncertainty
The Art of Decision-Making: Navigating Complexity and UncertaintyThe Art of Decision-Making: Navigating Complexity and Uncertainty
The Art of Decision-Making: Navigating Complexity and Uncertaintycapivisgroup
 
2024 May - Clearbit Integration with Hubspot - Greenville HUG.pptx
2024 May - Clearbit Integration with Hubspot  - Greenville HUG.pptx2024 May - Clearbit Integration with Hubspot  - Greenville HUG.pptx
2024 May - Clearbit Integration with Hubspot - Greenville HUG.pptxBoundify
 
10 Influential Leaders Defining the Future of Digital Banking in 2024.pdf
10 Influential Leaders Defining the Future of Digital Banking in 2024.pdf10 Influential Leaders Defining the Future of Digital Banking in 2024.pdf
10 Influential Leaders Defining the Future of Digital Banking in 2024.pdfciolook1
 
Ital Liptz - all about Itai Liptz. news.
Ital Liptz - all about Itai Liptz. news.Ital Liptz - all about Itai Liptz. news.
Ital Liptz - all about Itai Liptz. news.htj82vpw
 
Shots fired Budget Presentation.pdf12312
Shots fired Budget Presentation.pdf12312Shots fired Budget Presentation.pdf12312
Shots fired Budget Presentation.pdf12312LR1709MUSIC
 
GURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON ESCORTS SERVICE PROVIDE
GURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON  ESCORTS SERVICE PROVIDEGURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON  ESCORTS SERVICE PROVIDE
GURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON ESCORTS SERVICE PROVIDEkajalroy875762
 
Managerial Accounting 5th Edition by Stacey Whitecotton test bank.docx
Managerial Accounting 5th Edition by Stacey Whitecotton test bank.docxManagerial Accounting 5th Edition by Stacey Whitecotton test bank.docx
Managerial Accounting 5th Edition by Stacey Whitecotton test bank.docxssuserf63bd7
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxDitasDelaCruz
 
Progress Report - Oracle's OCI Analyst Summit 2024
Progress Report - Oracle's OCI Analyst Summit 2024Progress Report - Oracle's OCI Analyst Summit 2024
Progress Report - Oracle's OCI Analyst Summit 2024Holger Mueller
 
PALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTS
PALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTSPALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTS
PALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTSkajalroy875762
 

Recently uploaded (20)

Moradia Isolada com Logradouro; Detached house with patio in Penacova
Moradia Isolada com Logradouro; Detached house with patio in PenacovaMoradia Isolada com Logradouro; Detached house with patio in Penacova
Moradia Isolada com Logradouro; Detached house with patio in Penacova
 
Top Quality adbb 5cl-a-d-b Best precursor raw material
Top Quality adbb 5cl-a-d-b Best precursor raw materialTop Quality adbb 5cl-a-d-b Best precursor raw material
Top Quality adbb 5cl-a-d-b Best precursor raw material
 
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptxThompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Understanding Financial Accounting 3rd Canadian Edition by Christopher D. Bur...
Understanding Financial Accounting 3rd Canadian Edition by Christopher D. Bur...Understanding Financial Accounting 3rd Canadian Edition by Christopher D. Bur...
Understanding Financial Accounting 3rd Canadian Edition by Christopher D. Bur...
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...
 
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDEJIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
 
The Art of Decision-Making: Navigating Complexity and Uncertainty
The Art of Decision-Making: Navigating Complexity and UncertaintyThe Art of Decision-Making: Navigating Complexity and Uncertainty
The Art of Decision-Making: Navigating Complexity and Uncertainty
 
2024 May - Clearbit Integration with Hubspot - Greenville HUG.pptx
2024 May - Clearbit Integration with Hubspot  - Greenville HUG.pptx2024 May - Clearbit Integration with Hubspot  - Greenville HUG.pptx
2024 May - Clearbit Integration with Hubspot - Greenville HUG.pptx
 
10 Influential Leaders Defining the Future of Digital Banking in 2024.pdf
10 Influential Leaders Defining the Future of Digital Banking in 2024.pdf10 Influential Leaders Defining the Future of Digital Banking in 2024.pdf
10 Influential Leaders Defining the Future of Digital Banking in 2024.pdf
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Ital Liptz - all about Itai Liptz. news.
Ital Liptz - all about Itai Liptz. news.Ital Liptz - all about Itai Liptz. news.
Ital Liptz - all about Itai Liptz. news.
 
Shots fired Budget Presentation.pdf12312
Shots fired Budget Presentation.pdf12312Shots fired Budget Presentation.pdf12312
Shots fired Budget Presentation.pdf12312
 
GURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON ESCORTS SERVICE PROVIDE
GURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON  ESCORTS SERVICE PROVIDEGURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON  ESCORTS SERVICE PROVIDE
GURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON ESCORTS SERVICE PROVIDE
 
Managerial Accounting 5th Edition by Stacey Whitecotton test bank.docx
Managerial Accounting 5th Edition by Stacey Whitecotton test bank.docxManagerial Accounting 5th Edition by Stacey Whitecotton test bank.docx
Managerial Accounting 5th Edition by Stacey Whitecotton test bank.docx
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
 
Progress Report - Oracle's OCI Analyst Summit 2024
Progress Report - Oracle's OCI Analyst Summit 2024Progress Report - Oracle's OCI Analyst Summit 2024
Progress Report - Oracle's OCI Analyst Summit 2024
 
Home Furnishings Ecommerce Platform Short Pitch 2024
Home Furnishings Ecommerce Platform Short Pitch 2024Home Furnishings Ecommerce Platform Short Pitch 2024
Home Furnishings Ecommerce Platform Short Pitch 2024
 
PALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTS
PALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTSPALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTS
PALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTS
 

Pal gov.tutorial6.session9.cybercrime

  • 1. ‫أكاديمية الحكومة اإللكترونية الفلسطينية‬ The Palestinian eGovernment Academy www.egovacademy.ps Tutorial 6: The Legal Framework of New Technologies Session9 Cybercrime Dr. Feras Milhem PalGov © 2011 1
  • 2. About This tutorial is part of the PalGov project, funded by the TEMPUS IV program of the Commission of the European Communities, grant agreement 511159-TEMPUS-1- 2010-1-PS-TEMPUS-JPHES. The project website: www.egovacademy.ps Project Consortium: Birzeit University, Palestine University of Trento, Italy (Coordinator ) Palestine Polytechnic University, Palestine Vrije Universiteit Brussel, Belgium Palestine Technical University, Palestine Université de Savoie, France Ministry of Telecom and IT, Palestine University of Namur, Belgium Ministry of Interior, Palestine TrueTrust, UK Ministry of Local Government, Palestine Coordinator: Dr. Mustafa Jarrar Birzeit University, P.O.Box 14- Birzeit, Palestine Telfax:+972 2 2982935 mjarrar@birzeit.eduPalGov © 2011 2
  • 3. © Copyright Notes Everyone is encouraged to use this material, or part of it, but should properly cite the project (logo and website), and the author of that part. No part of this tutorial may be reproduced or modified in any form or by any means, without prior written permission from the project, who have the full copyrights on the material. Attribution-NonCommercial-ShareAlike CC-BY-NC-SA This license lets others remix, tweak, and build upon your work non- commercially, as long as they credit you and license their new creations under the identical terms. PalGov © 2011 3
  • 4. ILOs • Introduce legal framework of crimes committed through the net in Palestine, .‫• مقدمة عن اإلطار القانونً الجرٌمة األلكترونٌة فً فلسطٌن‬ Increase the knowledge of the trainee on the importance of this subject. Orientation on the type of Cybercrimes. .‫زٌادة المعرفة حول الجرائم األلكترونٌة وانواعها‬ Orientations on the international efforts to overcome crimes of this type. PalGov © 2011 4
  • 5. The legal framework of Penal Law ‫اإلطار القانوني لتشريعات الجزاء‬ • In the West Bank: The Penal Law of 1960. 1960 ‫• في الضفة الغربية: قانون العقوبات لسنة‬ • In the Gaza Strip: The Penal Law of 1936 .1936 ‫• في قطاع غزة: قانون العقوبات لسنة‬ BOTH LAWS do not regulate cybercrimes. ‫كال القانون ال ينظمان جرائم الحاسوب‬ PalGov © 2011 5
  • 6. The legal framework of Penal Law ‫اإلطار القانوني لتشريعات الجزاء‬ • No other laws provide penalties to crimes committed online. ‫• ال يوجد إطار قانون آخر يجرم الجرائم التي ترتكب عن الطريق‬ .‫الشبكة االلكترونية‬ • CONSEQUENCE: Perpetrators escape legal accountability PalGov © 2011 6
  • 7. What is Cybercrime ‫ما هي الجرائم األلكترونية‬ Illegal activity committed on the internet. This is a broad term that describes everything from electronic cracking to denial of service attacks that cause electronic commerce sites to lose money". ‫كل أشكال السلوك غٌر المشروع الذى ٌرتكب باستخدام‬ ‫الحاسب‬ PalGov © 2011 7
  • 8. What is Cybercrime ‫ما هي الجرائم األلكترونية‬ Some categorized cybercrimes into three Ref. cyberlaws.net: - Cybercrimes against persons. child-pornography, harassment. The trafficking, distribution, posting, and dissemination of obscene material. - Cybercrimes against property. computer vandalism (destruction of others' property), transmission of harmful programmes. - Cybercrimes against government. Terrorism, money laundry PalGov © 2011 8
  • 9. Current Threat ‫التهديدات القائمة‬ Some categorized cybercrimes into three Ref. cyberlaws.net: - Cybercrimes against persons. child-pornography, harassment. The trafficking, distribution, posting, and dissemination of obscene material. - Cybercrimes against property. computer vandalism (destruction of others' property), transmission of harmful programmes. - Cybercrimes against government. Terrorism, money laundry PalGov © 2011 9
  • 10. Current Threat ‫التهديدات القائمة‬ - Crackers (Hackers): such as the intent to steal confidential data, acquire free software, or perform malicious destruction of files. - Internet Fraud (Crimes of Deception), example trick via email - Skimming is the theft of credit card information by typically dishonest employees - Phishing: is a way of attempting to acquire information such as usernames, passwords, and credit card details - spam - Money laundry - Pornography and Illegal Obscenity PalGov © 2011 10
  • 11. Example Penal Law: Estonia ‫مثال قانون جزاء‬ - Article 268. Computer Fraud Acquisition of other’s property or deriving of benefits through introduction of computer programs or data, as well as their modification, deletion, blocking or another kind of interference with the procedure of processing information that influences its results and causes direct property or another damage to a person are punished with fine, arrest or imprisonment within the term from one to six years. ‫- بخصوص األحتٌال عبر األنترنت‬ PalGov © 2011 11
  • 12. Example Penal Law: Estonia ‫مثال قانون جزاء‬ - Article 269. Deletion of computer information or software 1. Illegal deletion, damage, violation or blocking of computer information or software are punished with fine or arrest ‫- بخصوص تجرٌم حذف أو إعتداء أو تخرٌب أو حجب‬ ‫معلومات من الكمبٌوتر أو أحد برامجه‬ PalGov © 2011 12
  • 13. Example Penal Law: Estonia ‫مثال قانون جزاء‬ - Article 270. Computer sabotage Introduction of data or programs, their modification, deletion or blocking to create disturbance interferences in the work of computer or telecommunication system are punished with fine, arrest or imprisonment within up to two years. ‫- ٌعاقب كل من أدخل معلومات بشكل غٌر مشروع أو قام بتعدٌل أو‬ ‫حذف أو حجب لخلق اضطراب على عمل جهاز الكمبٌوتر أو نظام‬ ‫االتصاالت السلكٌة والالسلكٌة باالعتقال أوالغرامة أو السجن مدة تصل‬ .‫الى عامٌن‬ ً‫- هناك تشدٌد للعقوبة لمن أحدث خسران للمعلومات أو قام بعمل تخرٌب‬ ‫لسجالت الدولة‬ PalGov © 2011 13
  • 14. Example Penal Law: Estonia ‫مثال قانون جزاء‬ - Article 272. Illegal interruption or blocking of the computer system connection ‫- تقطٌع أو إغالق غٌر شرعً للربط عبر نظام الحاسوب‬ - Article 273. Obvious spread of computer viruses ‫- نشر للفٌروسات عبر الحاسوب‬ - Article 274. Transfer of protecting codes ‫- نقل شفرات محمٌة سواء فً البرامج أو الشبكات‬ PalGov © 2011 14
  • 15. Conventions/treaties ‫مواثيق إتفاقيات‬ • No unified position on international agreement. • Council of Europe: Convention on Cybercrime It is open for other states that the states of CoE ‫ال توجد إتفاقٌة مصادق علٌها عالمٌا‬ ‫مجلس دول أوروبا: إتفاقٌة حول جرائم الحاسوب‬ ‫االتفاقٌة مفتوحة أمام دول من خارج مجلس دول أوروبا‬ PalGov © 2011 15
  • 16. Budapest: Convention on Cybercrime OBJECTIVES • Pursue a common criminal policy aimed at the protection of society against cybercrime by adopting appropriate legislation and fostering international co-operation. ‫• السعً نحو سٌاسة جزائٌة موحدة تهدف إلى حماٌة‬ ً‫المجتمع من جرائم الحاسوب، وذلك عن طرٌق تبن‬ .ً‫تشارٌع مناسبة وعن طرق تعزٌز التعاون الدول‬ PalGov © 2011 16
  • 17. Budapest: Convention on Cybercrime Called to adopt measures in the national level for: - Illegal Access - Illegal interception - Data interference - System interference - Misuse of devices - Computer related forgery - Computer related fraud - Pornography - Infringements of Copyright Call to adapt procedural provision PalGov © 2011 17
  • 18. Summary • Palestine laws are silent about Cybercrimes. No protection or punishment policies are available. However, the new draft Penal Law regulates some rules. ‫• ال ٌوجد تجرٌم فً فلسطٌن للجرائم المقترفة عبر الشبكة‬ .‫األلكترونٌة‬ • No international agreements, however, there are regional agreements such as Budapest convention. ‫• ال توجد إتفاقٌات دولٌة وإنما أقلٌمٌة مثل إتفاقٌة بودابست‬ • E-government in Palestine must be protected. PalGov © 2011 18
  • 19. References • Palestine Penal Law of 1936 . • The Jordanian Penal Law of 1960. • Florence de Villenfagne, CRIDS, University of Namur, PowerPoint Presentation on Cybercrimes, 2011. • Estonian Penal Law http://www.coe.int/t/dlapil/codexter/Source/cyberterrorism /Estonia.pdf • • Budapest: Convention on Cybercrime http://www.coe.int/t/dghl/cooperation/economiccrime/cyb ercrime/cy-activity-interface- 2010/presentations/Ws%203/cyber_octopus_WS_3_alex ander_CCC_global_frame.pdf ً‫• عبد الفتاح بٌومً حجازي، التجارة األلكترونٌة فً القانون العربً النموذج‬ 2006 ،ً‫لمكافحة جرائم الكمبٌوتر واألنترنت، األسكندرٌة، دار الفكر الجامع‬ PalGov © 2011 19
  • 20. Session End PalGov © 2011 20