The Quarterly Journal of Judicial Law Views

The Quarterly Journal of Judicial Law Views

Principles for the criminal protection of data in the light of international documents and penal system of Iran and Germany

Authors
Tarbiat Modarres University Law School
Abstract
Criminalization of an act in cyberspace, and limits of other formal, and informal control means is considered as a determining factor for liberation scope; so it should have strategic principles. These criminalization principles are: Principle of Criminal Interaction Intervention with Supportive Interventions, the principle of determination of criminal titles' scope, and other mentioned terms in the Budapest convention on cybercrimes, and additional protocol of 2001, that is a pattern, and guide which determines Selection method, and applying of moral rules, and framework of criteria, and limits based on certain theoretical bases, and normative considerations. In an analytical-descriptive manner, this paper tries to answer this question how much an action is considered in two legal systems of Iran, and Germany to criminalization in cyberspace, and what the useful findings of German criminal system for Iran criminal system are? Findings show that German legislator has made, according to cybercrimes' convention and some international instruments, a determination between criminal scope and limits, and used of pecuniary based on administrative, and civic enforcements as much as possible. But this determination has been not made by Iranian legislator. 
 
Keywords

Bundesdatenschutzgesetz (BGBl.I 1990 S.2954), as amended by the law of 14 September, 1994,available at:< http://www.iuscomp.org/gla/statutes/BDSG.html>. 2013/08/16.
Beale, Sara Sun; & Safwat, Adam. (2004). What Developments in Western Europe Tell Us About American Critiques of Corporate Criminal Liability. 8, Buffalo Criminal Law Review .
Belghoul, Fabrice. (2004). L’extension de la Responsabilité Pénale des Personnes Moral. Mémoire du Dea de Droit Economique et des Affaires d’orléams.
Clarkson, Christopher M. V. (1995). Understanding criminal law (2nd ed). London: Fontana Press of Harper-Collins.
Cseres, Katalin J. Schinkel, & V, Fl.(eds).(2006) Criminalization of competition law enforcement: economic and legal implications for the EU member states. Cheltenham, UK ; Northampton, Edward Elgar.
Convention on Cybercrime,Budapest. 2001,available at: <html://www.covention.coe.int/ Treaty/en/Treaties/Html/185. html>.2006/06/19.
Concil of Europe, (2001),Explanatory report to the Convention on Cybercrime.
Duff, Antony; & Garland, David (eds). (1994). A reader on punishment. Oxford ; New York: Oxford University Press.
European Committee on Crime Problems; & Council of Europe (eds). (1990). Computer-related crime: recommendation no. R. (89) 9 on computer-related crime and final report of the European Committee on Crime Problems. Strasbourg : Croton, N.Y: Council of Europe, Pub. and Documentation Service ; Manhattan Pub. Co.
European Committee on Crime Problems. Strasbourg (2001). Croton, N.Y: Council of Europe, Pub. and Documentation Service ; Manhattan Pub. Co.
Faure, Michael; & Visser, Marjolein. (1995). How to Punish Environmental Pollution-Some Reflections on Various Models of Criminalization of Environmental Harm. Eur. J. Crime Crim. L. & Crim. Just, 3, 316.
Gesetz gegen den unlauteren Wettbewerb vom 3. Juli 2004(BGBl. I 2004 32/1414) available at: <http://www.iuscomp.org/gla/literature/heidenreich.htm.sdfootnote2sym>2012.
Jescheck, Hans-Heinrich. (1996). Lehrbuch des Strafrechts Allgemeiner Teil. Berlin: Duncker & Humblot.
Jareborg, Nils. (1995). What Kind of Criminal Law Do We Want? On Defensive and Offensive Criminal Law Policy. Scandinavian Studies in Law. In: Beware of Punishment: On the Utility and Futility of Criminal Law, 14, 19.
Hetzer, Wolfgang. (2007). Corruption as Business Practice? Corporate Criminal Liability in the European :::::union:::::. European Journal of Crime, Criminal Law and Criminal Justice, 15.
Personal Data protection Code, (2003),sction 4, (1)(b),Recommendation of the Coucil of the OECD Concering, (1997), Guidelines for The Cryptography policy,Strafgesetzbuches,des Gesetzes durch Artikel 3 des Gesetzes vom 2.10.2009 BGBl. I S. 3214.
Sun Beale, Sara; & G, adam. (2004). What Developments in Western Europe Tell Us About American Critiques of Corporate Criminal Liability. Buffalo Criminal Law Review, (89).
Sieber, Ulrich (ed). (1994). Information technology crime: national legislations and international initiatives. Köln.
Sieber.Ulrich, (2000), Information Technology Crime,vo l.
Sieber.Ulrich, (2001),Responsibility of Internet-providers,In Law,Information and Information Technologhy , E.LEDERMAN,R.SHAPIRA(eds.)The Hague,Kluwer International.
Tarelli, Elis. (2004). A Brief Introduction to the Principles and Rules for Determining Corporate Criminal Liability. SSRN Electronic Journal.
Nations, United.( 1994). United Nations Manual on the Prevention and Control of Computer Related Crime. UN,14.