DeathtoStock Wired7[Gespot door: redactie Juridisch PAO Leiden | bron: Jan-Jaap Oerlemans, Researching IT law, criminal law and digital investigations]

This study examines the following investigative methods that are commonly used in cybercrime investigations: (1) the gathering of publicly available online information, (2) the issuing of data production orders to online service providers, (3) the use of online undercover investigative methods, and (4) performing hacking as an investigative method. For many of these investigative methods, the legal basis in Dutch law is ambiguous.

However, a clear legal basis for investigative methods that indicates the scope of investigative methods and the manner in which they are applied must be available.

It helps prevent arbitrary application of power by governmental authorities and is therefore essential for protecting the rule of law. The author examines how a foreseeable legal framework for the identified investigative methods can be created that meets the requirements that are derived from the right to privacy in art. 8 ECHR. The borderless nature of the Internet is also taken into account. The question is addressed to which extent digital investigative methods can be applied unilaterally across State borders.

The analysis results in a list of recommendations to improve the regulations for digital investigative methods on both the domestic level and the international level. Lees hier verder.

credits foto: deathtostock

AANSLUITENDE KENNISTIPS VOOR JURIDISCHE PROFESSIONALS

Cursus: Cybercrime & cybersecurity voor juristen: een introductie
Woensdag 29 november 2017 van 09.30 tot 16.30 uur, te Leiden
6 PO NOvA

Met o.a. prof. mr. G-J. (Gerrit-Jan) Zwenne (cursusleiding), dr. Jan-Jaap Oerlemans en Brenno de Winter.
Bekijk hier het cursusprogramma

MEER POSTACADEMISCHE CURSUSSEN EN KENNIS-SESSIES ELAW EN ICT-RECHT?
Bekijk hier het uitgebreide cursusprogramma