Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Notas de lectura

Lecture summary

Puntuación
-
Vendido
-
Páginas
38
Subido en
27-09-2025
Escrito en
2024/2025

Lecture summary 'Regulating cybercrime'

Institución
Grado

Vista previa del contenido

Regulating cybercrime

Week 1B – substantive law on cybercrime

Illegal access
Dutch legislator criminalizes the same as when you enter a home
(domestic). Trespassing in a home is criminalized. Computer is seen like a
home, where you have your (digital) valuables.

ECLI:NL:RBMNE:2021:1330
Prosecuted for hacking. In which he procured a way to enter the system of
another person. When he was prosecuted, he said he didn’t use it with
intent, he didn’t want to victimize that person but wanted to make him
aware of weaknesses. According to the court that wasn’t why he did it.

Illegal interception
Intent is very important here.

“The interception without right, made by technical means, of non-
public transmissions of computer data to, from or within a computer
system”
 Non-public transmissions
The term non-public qualifies the nature of the transmission
(communication) process and not the nature of the data transmitted. If
you have public data (data that you can gain anywhere) but you want to
send this to a non-public channel, that is what we’re talking about. It can
be a closed off section of a Facebook page. It is not meant for the general
public. Art. 3 CoC refers to the confidentiality of the transmission process.

 Technical means
Listening to, monitoring or surveillance of the content of communications,
to the procuring of the content of data either directly, through access and
use of the computer system, or indirectly, through the use of electronic
eavesdropping or tapping devices. (See cons. 53 of explanatory report).

 Examples of communication. In the form of how transmission of
computer data can take place:
o Inside a single computer system (from CPU to printer)
o Between two computers communicating with one another
o Computer and a person (e.g. through the keyboard)
 But: reservations possible!

,  Intentionally and without right
o See cons. 58 of explanatory report

Reservations art. 3 CoC
Reservations limit the scope of what should be criminalized. A Party may
require that the offence be committed with dishonest intent, or in
relation to a computer system that is connected to another computer
system.

Illegal interception – CoC/EU
Next to art. 3 we also have art. 6 of the Directive. Member States shall
take the necessary measures to ensure that intercepting, by technical
means, non-public transmissions of computer data to, from or within an
information system, including electromagnetic emissions from an
information system carrying such computer data, intentionally and without
right, is punishable as a criminal offence, at least for cases which are not
minor.

Illegal interception – Dutch Penal Code (CDP)
There where the intention is non-public. A person could have a long-
distance microphone and listening in. And they could be able to record. It
does require a technical device.

Art. 139a/139b DPC
Secretly eavesdropping or recording, by a technical device, of oral
conversation.

Art. 139c DPC
1. A person who intentionally and without right intercepts or records with
the help of a technical device data not intended for himself, which are
processed
or transferred by telecommunications or a computer, is liable by a term of
imprisonment of not more than two years or a fine of the fourth category


2. This provision does not apply to intercepting or recording
(1) data received by a radio receiver, unless a special effort was
made or a prohibited receiver was used to make such reception
possible;

, (2) by a person entitled to the connection used for
telecommunication, except in cases of clear abuse;
(3) for the purpose of ensuring that the telecommunications
infrastructure used to service the general public is working properly,
for the purpose of criminal investigation, or to implement the 2002
Act on the Intelligence and Security Services.

If you’re using an open device, it is not punishable. The receiver side is
here the criteria. It requires that there needs to be a non-public aspect to
it.

Illegal interception – UK law
Investigatory powers act 2016. Section 4 zooms in more on the condition
that needs to be in place. So interestingly the data/communication
shouldn’t be the technical information that’s transmitted (meta data) but
it’s about getting info of what is being transmitted, and not the
transmission. It’s only the content of the communication, of what I am
saying.

Interception related criminalisations – DPC
In the Dutch legal system you have interception related criminalisations.
Art. 139e. Any person who
1. has at his disposal an object in which, as he knows or should reasonably
suspect, data has been stored that was obtained by unlawful ...
interception or recording of ... telecommunications or other type of data
transfer or data processing by a computerised device or system;
2. has obtained data by unlawfully ... intercepting or recording ...
telecommunications or other type of data transfer or data processing by
means of a computerised device or system, or data which has come to his
knowledge, as he knows or should reasonably suspect, as a result of
such ... interception or recording, and who intentionally discloses such
data to another person;
3. intentionally makes an object defined in (1°) available to another
person; shall be liable to a term of imprisonment not exceeding six
months ...

Data interference
Art. 4 CoC
1. Each Party shall adopt such legislative and other measures as may be
necessary to establish as criminal offences under its domestic law, when

, committed intentionally, the damaging, deletion, deterioration, alteration
or suppression of computer data without right.
2. A Party may reserve the right to require that the conduct described in
paragraph 1 result in serious harm.

Data interference – DPC
Dutch legislator is looking at what is similar in the physical world to what is
happening in the cyber world. They think it’s like damaging
property/damaging goods.
Art. 350 DPC damaging property/good
A person who intentionally and unlawfully destroys, damages, renders
unusable or causes to disappear any property belonging to another is
liable ...
- But under Dutch law, data are not considered property (or goods) ...

Art. 350a DPC data interference
1. A person who intentionally and unlawfully alters, erases, renders
useless or inaccessible data stored, processed or transferred by means
of an automated device or by telecommunication, or adds other data
thereto, is liable to a term of imprisonment of not more than two years or
a fine of the fourth category.

A damage is not required for liability here. A lot of the times in the Dutch
legal system you are found guilty when there has damage been done to
the property. The damage is not required in this article. If I send out a
Troyan horse but it wasn’t activated yet, but it’s already covered by this
article.

Art. 350a (continued)
3. A person who intentionally and unlawfully provides or disseminates
data designated to cause damage in an automated work, is liable to
a term of imprisonment of not more than four years ...
- E.g. Worms & viruses -> but article covers all data designated to cause
damage in computer (incl. trojans and logic bombs although they do not
necessarily cause damage in a computer – but may cause damage by
secretly passing on data)
- Damage not required for liability
4. A person who commits the act specified in section 3 with the object of
limiting the damage resulting from such data is not criminally liable.

Art. 350b

Escuela, estudio y materia

Institución
Estudio
Grado

Información del documento

Subido en
27 de septiembre de 2025
Número de páginas
38
Escrito en
2024/2025
Tipo
NOTAS DE LECTURA
Profesor(es)
Mifsud bonnici
Contiene
Todas las clases

Temas

5,99 €
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor

Seller avatar
masterstudentrugitrecht Rijksuniversiteit Groningen
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
3
Miembro desde
6 meses
Número de seguidores
0
Documentos
9
Última venta
3 semanas hace

5,0

1 reseñas

5
1
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes