جريمة الدخول غير المشروع وفقا للقرار بقانون رقم (10)‎ لعام 2018 بشأن الجرائم الإلكترونية الفلسطيني

Other Title(s)

Hacking crimes in accordance with decree no 10 of the Year 2018 on Palestinian cybercrimes

Author

عبد الله ذيب محمود

Source

مجلة جامعة القدس المفتوحة للبحوث الإنسانية و الاجتماعية

Issue

Vol. 1, Issue 48 (31 Mar. 2019), pp.1-11, 11 p.

Publisher

al-Quds Open University Deanship of Scientific Research and Graduate Studies

Publication Date

2019-03-31

Country of Publication

Palestine (West Bank)

No. of Pages

11

Main Subjects

Law
Information Technology and Computer Science

Topics

Abstract EN

This study dealt with the hacking crimes of computers and networks in accordance with article 4 of the law No.

10 for the year 2018 on cybercrimes.

The Palestinian legislator stipulated that hacking crimes should be considered a planned action, as stated in the first paragraph of the text of Article 4.

However, the researcher noted that there is ambiguity in this aspect in the third and fourth paragraph of the text of the said article.

The crime of hacking as defined by the Palestinian legislator is illegal as it is done to delete copy or publish data and information in an unauthorized and illegal way.

The Palestinian legislator did not consider that the process of deleting, copying and publishing data is an intentional action and must be treated as hacking.

The researcher addressed hacking crimes in their simple and strict manners.

When the perpetrator of such crime is fully aware of what he/she is doing and continues the hacking process of the system or the network, then, his/her action is considered a crime.

While on the other hand, if the perpetrator of such crimes is not aware that he/she is hacking a system or a network, his/her action is not considered a crime because he/she did not continue what he/she is doing as stated in the first paragraph of Article 4 of the new Palestinian law.

In it, the legislator mentioned that the perpetrator of these crimes is aware and he/she knows that he/she is hacking the system.

One of the findings that the researcher has reached is that a crime is committed when the user oversteps his/her specific clearance, or accesses others’ data, or exceeds the time allocated for access.

This is all due to the work of the legislator, to draft a law that provides more security measures for protecting the systems, networks and data.

American Psychological Association (APA)

عبد الله ذيب محمود. 2019. جريمة الدخول غير المشروع وفقا للقرار بقانون رقم (10) لعام 2018 بشأن الجرائم الإلكترونية الفلسطيني. مجلة جامعة القدس المفتوحة للبحوث الإنسانية و الاجتماعية،مج. 1، ع. 48، ص ص. 1-11.
https://search.emarefa.net/detail/BIM-887330

Modern Language Association (MLA)

عبد الله ذيب محمود. جريمة الدخول غير المشروع وفقا للقرار بقانون رقم (10) لعام 2018 بشأن الجرائم الإلكترونية الفلسطيني. مجلة جامعة القدس المفتوحة للبحوث الإنسانية و الاجتماعية مج. 1، ع. 48 (آذار 2019)، ص ص. 1-11.
https://search.emarefa.net/detail/BIM-887330

American Medical Association (AMA)

عبد الله ذيب محمود. جريمة الدخول غير المشروع وفقا للقرار بقانون رقم (10) لعام 2018 بشأن الجرائم الإلكترونية الفلسطيني. مجلة جامعة القدس المفتوحة للبحوث الإنسانية و الاجتماعية. 2019. مج. 1، ع. 48، ص ص. 1-11.
https://search.emarefa.net/detail/BIM-887330

Data Type

Journal Articles

Language

Arabic

Notes

يتضمن مراجع ببليوجرافية : ص. 11

Record ID

BIM-887330