The Crime of Unlawful Access to Computers and Information Systems: A Critical Study of the Exciting Legal Provisions in Oman | ||||
مجلة حقوق دمياط للدراسات القانونية والاقتصادية | ||||
Article 7, Volume 5, Issue 5, January 2022, Page 767-817 PDF (446.85 K) | ||||
Document Type: البحوث العلمیة الأصیلة المکتوبة باللغات العربیة والإنجلیزیة والفرنسیة | ||||
DOI: 10.21608/mhdl.2022.215161 | ||||
View on SCiNiTO | ||||
Authors | ||||
سيف الرواحى1; آمنة المعمرىة2 | ||||
1جامعة عمان | ||||
2القضاء | ||||
Abstract | ||||
The crime of unlawful access to computers and information systems is one of the most prevalent information-related crimes, as most crimes can be committed by simply accessing computers. Unlawful access is the gateway and the line between the offender and various other data crimes[1], so the legislation gave great attention to it. Some legislature calls it the primary crime and the other subsequent crimes, mere consequences. The crime of unlawful access to computers or information system is very similar to entering a person’s memory. Access has a material connotation that the person may have tried to enter or actually entered into, and according to the moral perception of the idea of access, it is achieved in any form of infringement, i.e. that which involves mental activity by the perpetrator in the information system’s memory, equals to be direct or indirect. [1] Agileh, A. (2014). Criminal protection for electronic documents. Cairo :Arab Renaissance House, P302. Khalifa, M. (2007). Criminal Protection of Computer Data in Algerian and Comparative Law. Azaytah: The New University House, p 40. | ||||
Keywords | ||||
unlawful access; bypass authorized access; information systems; unlawful stay; the owner of the system | ||||
Statistics Article View: 155 PDF Download: 267 |
||||