Saturday, May 15, 2010

Punishment of cyber crimes in Iran

Unfortunately issue of cyber crimes has emerged later than other countries because of unfamiliarity of information technology in Iran.
By developing information technology and its pervasion among public, managers’ considerations to create necessary laws have been felt. The first formal reference of Iran that felt the need of computer rights is the informatics premium council associated to programming and budgeting organization.
The first law that authorized around cyber crimes was on 1379 (2000) that Islamic council authorized “the law of supporting creators of computer software”.
On year 1381(2002) also plan of e-commerce law was prepared and ultimately its content
authorized by Islamic council. One of the important cases that can be indicated is: fakes,
computer defraud, penal supporting of consumer rights, supporting of copyright and data.
(Cyber crimes and it’s punishments in Iran published in Iran’s police news centre, http://81.28.32.51/NCMS/FullStory/?Id=91002)

Punishments of cyber crimes in Europe

It can be assumed as a whole, in European countries cyber crimes have determinate punishments same as many other traditional crimes and it has been extended among European countries since many years ago. So their punishments also have authorized some deal by their governments.
In advanced European and American countries cyber crimes are developing as well as

computer science which have been considered and developed. But juridical courts of these

countries attempt to move along to contrast with these crimes via authorizing penal

regulations.
(Cybercrime: The Council of Europe Convention, Kristin Archick, September 28, 2006, http://fpc.state.gov/documents/organization/74909.)

Punishments of cyber crimes in Europe

Clause 24 from recipe46/45 of Europe commission makes Europe union countries to accept whole possible and suitable scales for guaranty of complete execution of this recipe.
One of the tenets of this recipe is incurrence of penal sanction against disobeyers of domestic regulations’ tenet. Subject of fundamental rights are considered in relation to personal sanctum and protecting more information in fundamental rights of Europe union.
Crimes related to content: emission of salaciousness, especially in children in internet, also propagation of ethnocentrically terms and persuasive information to aggression make question that how can it possible to collation with these facts via penal regulations. The commission will support the belief that everything illegal from outside of internet should be also illegal during connection to internet networks. The author may be penal responsible for providing subjects.

Punishments of cyber crimes in Europe

Most of regulations about crimes related to computer have been ordained. In countries of Europe union, there are many juridical documents. There isn’t any juridical document from Europe union that directly related to computer crimes, except one case of council’s making decision about salaciousness of children in internet. But there are some juridical related tools which are exist indirectly.
Most of topics in regulation related to particular cyber crimes in Europe union or countries which are its members are: crimes of aggression to personal sanctum: different countries have authorized penal regulations about collection, reservation, change and distortion, revelation and emission of personal illegal information. In Europe union two recipes in way of convergence of regulations of member countries about protecting of personal sanctum in field of personal information have been ordained.

Tuesday, May 4, 2010

Based on the Grabosky , we can classify crime in cyber space at nine types. One is the theft of information services, which may involve the "cloning" of cellular phones, counterfeiting of telephone cards, and unauthorized access to an organization's telephone switchboard. The second crime discussed involves communications in furtherance of criminal conspiracies. In this regard, there is evidence of information systems being used to facilitate organized drug trafficking, money laundering, child pornography, and trade in weapons. A third type of offense encompasses a range of activities collectively referred to as information piracy, counterfeiting, and forgery. Digital technology permits perfect reproduction of software, text, images, sound, and combinations of these. The potential for copyright infringement, falsification of documents, and fabrication of negotiable instruments has never been greater. Other crimes discussed pertain to the dissemination of offensive materials, electronic money laundering, electronic vandalism and terrorism, sales and investment fraud, the illegal interception of information, and electronic funds transfer fraud. Countermeasures are discussed under the topics of prevention, the harnessing of nongovernmental resources, enhancement of the capacity of law enforcement, and the fostering of international cooperation.