{"title":"The Crime of Invasion Electronic Data and Information in the Emeriti Law","authors":"","doi":"10.62271/pjc.16.2.47.60","DOIUrl":null,"url":null,"abstract":"This study examines the crime of unauthorized access to electronic data and information, focusing on the role of the UAE legislator in combating this crime through Federal Decree-Law No. 34 of 2021 on Combatting Rumors and Cybercrimes. It assesses the law’s effectiveness in addressing unauthorized activities such as the destruction or removal of information and data, and invasions of privacy. The paper concludes with recommendations to strengthen legal measures against such crimes. Key suggestions include defining “invasion” within the law to clarify the crime and its penalties, distinguishing between personal and professional email breaches with harsher penalties for the latter due to their significant impact on both state-owned and private enterprises, and recognizing the disruption of information networks as a punishable offense. These recommendations aim to enhance the UAE’s legal framework for protecting electronic data and information.","PeriodicalId":516769,"journal":{"name":"Pakistan Journal of Criminology","volume":"197 S571","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Pakistan Journal of Criminology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.62271/pjc.16.2.47.60","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This study examines the crime of unauthorized access to electronic data and information, focusing on the role of the UAE legislator in combating this crime through Federal Decree-Law No. 34 of 2021 on Combatting Rumors and Cybercrimes. It assesses the law’s effectiveness in addressing unauthorized activities such as the destruction or removal of information and data, and invasions of privacy. The paper concludes with recommendations to strengthen legal measures against such crimes. Key suggestions include defining “invasion” within the law to clarify the crime and its penalties, distinguishing between personal and professional email breaches with harsher penalties for the latter due to their significant impact on both state-owned and private enterprises, and recognizing the disruption of information networks as a punishable offense. These recommendations aim to enhance the UAE’s legal framework for protecting electronic data and information.