مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

595
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

THIRD-PARTY DOCTRINE AND OBTAINING CYBER-CRIMINAL EVIDENCE

Author(s)

FATHI MOHAMMAD JAVAD | ABOLMAALI ALHOSEINI SEYED VAHID | Issue Writer Certificate 

Pages

  101-141

Abstract

 The cases which can be counted as SEARCHing and seizing the evidence without needing the legal warrant, are situations proposed as “Third-Party Consent” doctrine. In the American system, officials can SEARCH any place or object without having a warrant or even a probable cause, provided that a person authorized to consent voluntarily agrees to the inspection. This doctrine has always been involved with two issues including determining: “Third-party consent territory” and “the identity of the authorized persons to consent”. Gradually, foundations of doctrine were challenged and it was claimed that it did not have the capability of surviving in the current situation and according to its old understanding. In fact, the arrival of modern technology in the age of communication and in the cyber territory due to the change of subjects and the conceptual transformation of the doctrine in the field of technologies, it has faced many challenges. Doubts towards efficiency of the doctrine became apparent when it was observed that almost all services in the current age are being provided by Third-Party; hence, the traditional reading of the Doctrine leaves no trace of PRIVACY. In this review, we will explain the Third-Party Doctrine in the cyber environment.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    FATHI, MOHAMMAD JAVAD, & ABOLMAALI ALHOSEINI, SEYED VAHID. (2017). THIRD-PARTY DOCTRINE AND OBTAINING CYBER-CRIMINAL EVIDENCE. CRIMINAL LAW RESEARCH, 5(18 ), 101-141. SID. https://sid.ir/paper/266662/en

    Vancouver: Copy

    FATHI MOHAMMAD JAVAD, ABOLMAALI ALHOSEINI SEYED VAHID. THIRD-PARTY DOCTRINE AND OBTAINING CYBER-CRIMINAL EVIDENCE. CRIMINAL LAW RESEARCH[Internet]. 2017;5(18 ):101-141. Available from: https://sid.ir/paper/266662/en

    IEEE: Copy

    MOHAMMAD JAVAD FATHI, and SEYED VAHID ABOLMAALI ALHOSEINI, “THIRD-PARTY DOCTRINE AND OBTAINING CYBER-CRIMINAL EVIDENCE,” CRIMINAL LAW RESEARCH, vol. 5, no. 18 , pp. 101–141, 2017, [Online]. Available: https://sid.ir/paper/266662/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button