Rédigé par des étudiants ayant réussi Disponible immédiatement après paiement Lire en ligne ou en PDF Mauvais document ? Échangez-le gratuitement 4,6 TrustPilot
logo-home
Notes de cours

Lecture summary

Note
-
Vendu
-
Pages
38
Publié le
27-09-2025
Écrit en
2024/2025

Lecture summary 'Regulating cybercrime'

Établissement
Cours

Aperçu du contenu

Regulating cybercrime

Week 1B – substantive law on cybercrime

Illegal access
Dutch legislator criminalizes the same as when you enter a home
(domestic). Trespassing in a home is criminalized. Computer is seen like a
home, where you have your (digital) valuables.

ECLI:NL:RBMNE:2021:1330
Prosecuted for hacking. In which he procured a way to enter the system of
another person. When he was prosecuted, he said he didn’t use it with
intent, he didn’t want to victimize that person but wanted to make him
aware of weaknesses. According to the court that wasn’t why he did it.

Illegal interception
Intent is very important here.

“The interception without right, made by technical means, of non-
public transmissions of computer data to, from or within a computer
system”
 Non-public transmissions
The term non-public qualifies the nature of the transmission
(communication) process and not the nature of the data transmitted. If
you have public data (data that you can gain anywhere) but you want to
send this to a non-public channel, that is what we’re talking about. It can
be a closed off section of a Facebook page. It is not meant for the general
public. Art. 3 CoC refers to the confidentiality of the transmission process.

 Technical means
Listening to, monitoring or surveillance of the content of communications,
to the procuring of the content of data either directly, through access and
use of the computer system, or indirectly, through the use of electronic
eavesdropping or tapping devices. (See cons. 53 of explanatory report).

 Examples of communication. In the form of how transmission of
computer data can take place:
o Inside a single computer system (from CPU to printer)
o Between two computers communicating with one another
o Computer and a person (e.g. through the keyboard)
 But: reservations possible!

,  Intentionally and without right
o See cons. 58 of explanatory report

Reservations art. 3 CoC
Reservations limit the scope of what should be criminalized. A Party may
require that the offence be committed with dishonest intent, or in
relation to a computer system that is connected to another computer
system.

Illegal interception – CoC/EU
Next to art. 3 we also have art. 6 of the Directive. Member States shall
take the necessary measures to ensure that intercepting, by technical
means, non-public transmissions of computer data to, from or within an
information system, including electromagnetic emissions from an
information system carrying such computer data, intentionally and without
right, is punishable as a criminal offence, at least for cases which are not
minor.

Illegal interception – Dutch Penal Code (CDP)
There where the intention is non-public. A person could have a long-
distance microphone and listening in. And they could be able to record. It
does require a technical device.

Art. 139a/139b DPC
Secretly eavesdropping or recording, by a technical device, of oral
conversation.

Art. 139c DPC
1. A person who intentionally and without right intercepts or records with
the help of a technical device data not intended for himself, which are
processed
or transferred by telecommunications or a computer, is liable by a term of
imprisonment of not more than two years or a fine of the fourth category


2. This provision does not apply to intercepting or recording
(1) data received by a radio receiver, unless a special effort was
made or a prohibited receiver was used to make such reception
possible;

, (2) by a person entitled to the connection used for
telecommunication, except in cases of clear abuse;
(3) for the purpose of ensuring that the telecommunications
infrastructure used to service the general public is working properly,
for the purpose of criminal investigation, or to implement the 2002
Act on the Intelligence and Security Services.

If you’re using an open device, it is not punishable. The receiver side is
here the criteria. It requires that there needs to be a non-public aspect to
it.

Illegal interception – UK law
Investigatory powers act 2016. Section 4 zooms in more on the condition
that needs to be in place. So interestingly the data/communication
shouldn’t be the technical information that’s transmitted (meta data) but
it’s about getting info of what is being transmitted, and not the
transmission. It’s only the content of the communication, of what I am
saying.

Interception related criminalisations – DPC
In the Dutch legal system you have interception related criminalisations.
Art. 139e. Any person who
1. has at his disposal an object in which, as he knows or should reasonably
suspect, data has been stored that was obtained by unlawful ...
interception or recording of ... telecommunications or other type of data
transfer or data processing by a computerised device or system;
2. has obtained data by unlawfully ... intercepting or recording ...
telecommunications or other type of data transfer or data processing by
means of a computerised device or system, or data which has come to his
knowledge, as he knows or should reasonably suspect, as a result of
such ... interception or recording, and who intentionally discloses such
data to another person;
3. intentionally makes an object defined in (1°) available to another
person; shall be liable to a term of imprisonment not exceeding six
months ...

Data interference
Art. 4 CoC
1. Each Party shall adopt such legislative and other measures as may be
necessary to establish as criminal offences under its domestic law, when

, committed intentionally, the damaging, deletion, deterioration, alteration
or suppression of computer data without right.
2. A Party may reserve the right to require that the conduct described in
paragraph 1 result in serious harm.

Data interference – DPC
Dutch legislator is looking at what is similar in the physical world to what is
happening in the cyber world. They think it’s like damaging
property/damaging goods.
Art. 350 DPC damaging property/good
A person who intentionally and unlawfully destroys, damages, renders
unusable or causes to disappear any property belonging to another is
liable ...
- But under Dutch law, data are not considered property (or goods) ...

Art. 350a DPC data interference
1. A person who intentionally and unlawfully alters, erases, renders
useless or inaccessible data stored, processed or transferred by means
of an automated device or by telecommunication, or adds other data
thereto, is liable to a term of imprisonment of not more than two years or
a fine of the fourth category.

A damage is not required for liability here. A lot of the times in the Dutch
legal system you are found guilty when there has damage been done to
the property. The damage is not required in this article. If I send out a
Troyan horse but it wasn’t activated yet, but it’s already covered by this
article.

Art. 350a (continued)
3. A person who intentionally and unlawfully provides or disseminates
data designated to cause damage in an automated work, is liable to
a term of imprisonment of not more than four years ...
- E.g. Worms & viruses -> but article covers all data designated to cause
damage in computer (incl. trojans and logic bombs although they do not
necessarily cause damage in a computer – but may cause damage by
secretly passing on data)
- Damage not required for liability
4. A person who commits the act specified in section 3 with the object of
limiting the damage resulting from such data is not criminally liable.

Art. 350b

École, étude et sujet

Établissement
Cours
Cours

Infos sur le Document

Publié le
27 septembre 2025
Nombre de pages
38
Écrit en
2024/2025
Type
Notes de cours
Professeur(s)
Mifsud bonnici
Contient
Toutes les classes

Sujets

€5,99
Accéder à l'intégralité du document:

Mauvais document ? Échangez-le gratuitement Dans les 14 jours suivant votre achat et avant le téléchargement, vous pouvez choisir un autre document. Vous pouvez simplement dépenser le montant à nouveau.
Rédigé par des étudiants ayant réussi
Disponible immédiatement après paiement
Lire en ligne ou en PDF

Faites connaissance avec le vendeur
Seller avatar
masterstudentrugitrecht
5,0
(1)

Faites connaissance avec le vendeur

Seller avatar
masterstudentrugitrecht Rijksuniversiteit Groningen
S'abonner Vous devez être connecté afin de suivre les étudiants ou les cours
Vendu
3
Membre depuis
6 mois
Nombre de followers
0
Documents
9
Dernière vente
3 semaines de cela

5,0

1 revues

5
1
4
0
3
0
2
0
1
0

Documents populaires

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions