ابدأ بالتواصل مع الأشخاص وتبادل معارفك المهنية

أنشئ حسابًا أو سجّل الدخول للانضمام إلى مجتمعك المهني.

متابعة

What is the law on cybercrimes in the Middle East?

user-image
تم إضافة السؤال من قبل Rana Alnajjar , Web developer , Lebcards
تاريخ النشر: 2013/06/17
مستخدم محذوف‎
من قبل مستخدم محذوف‎

Most countries in the region do not have specialized laws on electronic crime, and few countries are trying to enact legislation for this type of crime, such as the UAE, Saudi Arabia, but it is still in its early stages, and the need to further improvements and revision, and because of political problems in the region, most of countries resort to the use of what is known as the laws of Emergency Emergency Laws, instead of specialized e-crime laws as a means of deterrence for e-crime methods, for example: the arrest of bloggers on charges of libel and others, and some other countries to resort to blocking websites that can occur in any type of cyber crime, and both cases, of course, are not effective at all in the fight against cyber crime, and there is no clear definition in the law currently available for e-crime, leading to the development of ordinary citizens not guilty behind bars on charges related to electronic crime; but it really is not as well because the crime that use the Internet totally different legally different from the crime that rely on the Internet!

 

And the lack of specialized extension laws indicate a lack of knowledge or awareness of the implementing agencies of the law in the region in the absence of training and tools used to combat cyber-crime, or even investigated.

 

Middle East suffer from poverty in the laws governing intellectual property, and infringed upon the use of modern technologies such as the Internet, according to a report Symantec Corporation, Egypt is one of the first countries to virus infection in the Middle East.

 This extension gives us meaning to that Egypt also is the first in violation of intellectual property rights and software piracy; because the viruses transmitted through executables, and in pirated software across networks Peer - to - Peer

المزيد من الأسئلة المماثلة