Please use this identifier to cite or link to this item:https://hdl.handle.net/20.500.12259/32453
Type of publication: Straipsnis / Article
Author(s): Marcinauskaitė, Renata
Title: Neteisėto prisijungimo prie informacinės sistemos kriminalizavimo ypatumai ir kvalifikavimo problemos
Other Title: The criminalization peculiarities and qualification problems of unlawful access to information system
Is part of: Teisės apžvalga, 2016, nr. 2(14), p. 250-266
Date: 2016
Keywords: Baudžiamoji teisė;Neteisėtas prisijungimas prie informacinės sistemos;Nusikalstamų veikų kvalifikavimas;Kriminalizavimas;Criminal law;Unlawful access;Information system;Criminalization
Abstract: Straipsnyje, atsižvelgiant į tarptautinius ir Europos Sąjungos teisės aktus bei teismų praktikos aktualijas, aptariami įvairūs neteisėto prisijungimo prie informacinės sistemos aiškinimo ir kvalifikavimo aspektai. Nors, kaip pabrėžiama, ši informacinės sistemos konfidencialumą pažeidžianti veika Lietuvoje yra kriminalizuota daugiau nei prieš dešimtmetį, tikrosios jos inkriminavimo problemos išryškėjo palyginti neseniai. Straipsnyje bandoma išsiaiškinti, ar iš tiesų tinkamai nustatomas šios veikos santykis su kitomis elektroninėje erdvėje padaromomis nusikalstamomis veikomis, taip pat ar nekelia problemų besiformuojantis šios veikos sudėties požymių aiškinimas.
The development of information technologies and electronic networks created preconditions for different types of large-scale dissemination of information, new accesses to information, and information exchange at the national and international levels. Information technologies have in one way or the other pervaded almost every aspect of human activities. These developments have given rise to an unprecedented changes, but they also determined the emergence of new types of crime as well as the commission of traditional crimes by means of information technologies. The paper analyses one of the offences against the security of information systems (IS) – unlawful access to IS, which is criminalized in Lithuanian CC Article 1981, and presents various aspects of its interpretation and qualification. This analysis is based on international and European Union legal documents, also Lithuanian case-law practice. It is important that the last changes of the CC Article 1981 were determined by the Directive 2013/40/EU of the European Parliament and of the Council of 12 August 2013 on attacks against information systems and replacing Council Framework Decision 2005/222/JHA. The author also agrees, that a criminal prohibition of unauthorized access is able to give additional protection to the system and the data at an early stage, but it is important to avoid overcriminalization of such offence. The author draws attention, that the breach of confidentiality of IS was criminalized a decade ago in Lithuania, but real incrimination problems of such offence emerged recently. Considering quite different qualification practice, unlawful access to IS problem solving options are suggested in the paper. For example, it is offered to qualify the perpetrator’s actions of unlawfully connecting to e-banking or e-mail as an independent criminal act, provided in CC Article 1981. It is concluded that violation of security measures should be interpreted, inter alia, as a violation of determined restrictions (requirements), when damage for these security measures was not caused. The analysis also revealed that the separation of criminal offence against confidentiality of IS from similar criminal offences against the financial system and crimes against inviolability of a person’s private life is problematic.
Internet: https://eltalpykla.vdu.lt/1/32453
http://dx.doi.org/10.7220/2029-4239.14.15
https://hdl.handle.net/20.500.12259/32453
Appears in Collections:Teisės apžvalga / Law Review 2016, nr. 2(14)

Files in This Item:
Show full item record

Page view(s)

52
checked on Aug 17, 2019

Download(s)

46
checked on Aug 17, 2019

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.