Explanations of a Number of Issues in the Specific Application of the Law on Handling Criminal Cases of Using the Internet, Mobile Communication Terminals, and Voice Sets for the Production, Reproduction, Publication, Sale, and Dissemination of Obscene Electronic Information (2)

2010 ◽  
Vol 43 (5) ◽  
pp. 73-79
Author(s):  
Supreme People's Court, Supreme Peo
Author(s):  
M. Syuib ◽  
Maisarah Maisarah

This research is motivated by the number of internet (Wi-Fi) stealing around Syiah Kuala Sub District, Banda Aceh, in which this action can disserve the owner of the internet and against to the law. The method of this research is qualitative in which it describes the result of research objectively to conditions encountered in the gorund. The research problems are how the Wi-Fi internet is theft (modus operandi) and what are juridical consequences of the act according to Article 30 of Law No. 19/2016 concerning Electronic Information and Transactions, and how is the Islamic law perspective on the act of internet stealing. The result showed that the modus operandi of Wi-Fi internet stealing is by using a laptop or mobile phone and downloading certain software or applications they need to break through the security system and obtain a username and password. Theft or internet (Wi-Fi) stealing in Syiah Kuala District, Banda Aceh City, can be punished under Article 30 paragraph (1), (2) and (3) in conjunction with Article 46 paragraph (1), (2) and (3) Law No. 19/2016 concerning Electronic Information and Transactions. The action categorized as illegal access. The theft of the Wi-Fi internet in Islamic law perspective is clearly prohibited (haram) due to someone has used other people property without permission. So, it is expected that the perpetrators or other people in order not to do the actin because it is against to the law, and also expected the Wi-Fi owner could report the case to the police.


Author(s):  
Hind Mohammed Abdul Jabbar Ali

Connecting to the  electronic information network (internet) became the most characteristic that distinguish this era However , the long hours which young men daily spend on the internet On the other hand ,there are many people who are waiting for the chance to talk and convince them with their views This will lead the young people to be part in the project of the “cyber armies “that involved with states and terrorist organizations  This project has been able  to recruitment hundreds of people every day to work in its rank . It is very difficult to control these websites because we can see the terrorist presence in all its forms in the internet   In addition there are many incubation environments that feed in particular the young people minds                                                                                         Because they are suffering from the lack of social justice Also the unemployment, deprivation , social and political repression So , that terrorist organizations can attract young people through the internet by convincing them to their views and ideas . So these organizations will enable to be more  stronger.


Author(s):  
Courtney Deine-Jones

As more libraries offer patron access to the Internet and other on-line services, they must consider the needs of patrons with disabilities who will be using their Internet links either from the library or from remote sites. In planning and implementing technological improvements to optimize access for all patrons, librarians and information specialists must take into account questions of both physical and intellectual access to electronic information. This paper addresses these issues from a pragmatic perspective, reviewing available options and suggesting strategies for improving access for people with various disabilities.


2007 ◽  
Vol 7 (1) ◽  
pp. 17-19 ◽  
Author(s):  
Gerry Power

Gerry Power was invited to go to the University of Jos in April 2006 to present workshops to the Law Faculty and other interested legal professionals on using the internet for legal research. He writes about his experiences in dealing with running online workshops whilst coping with electricity shortages and the incredible experience of Nigeria!


2019 ◽  
Vol 9 (2) ◽  
pp. 103-105
Author(s):  
S. Saravana Raj ◽  
K. Vijayakumar

The present study deals with Utilization of ICT among the faculty members of Siddha Colleges and various level of operating system with the information accessed by the faculty through the internet. The survey was conducted with the help of the questionnaire and personal interview. The responses received from the available faculty are presented in tables and data is analyzed by using simple statistical method. The findings reveals that the access of electronic information is an important component of research activities for faculty members like E-Journals, E-books, E-databases are most preferred electronic information resources.


2021 ◽  
Vol 22 (22) ◽  
pp. 103-185
Author(s):  
林建中 林建中 ◽  
李揚 李揚

內幕交易罪的處理,在證券法的發展歷史中,一直具有理論與實務上之重要意義。此一問題,在中國大陸相對初生但生猛且量體巨大的市場環境中如何被面對,從理論與比較法觀點,均具備特殊的研究價值。立法層面上,中國大陸法對於內幕交易的實體法構成,經二十多年的持續發展,已呈現出一定的複雜與完整面貌。然就執行層面視之,法院對於條文的理解與具體適用仍存在諸多爭議之處,同時,相關實證統計等資料的缺乏,也成為執行層面上對內幕交易罪研究的主要障礙之一。基於上述認識,本文立足於內幕交易刑事處罰執行層面的觀察,試圖呈現相關法律設計在中國大陸的司法實踐現狀。並通過1997年立法以來法院判決的實證研究,本文除一般性地檢驗內幕交易的執法情況外,同時針對法院在解釋犯罪構成上所呈現的爭議,進行進一步的評估。文中依照觀察面向的差異,特別鎖定三個重要的子議題:內幕信息的類型及其認定、被告「知悉」的司法判準、刑事處罰的比例性在內幕交易罪中的運用與體現。以上述實證研究結果為基礎,本文擬對於中國大陸內幕交易罪之司法執行效力提出評估,同時也補充性地可提供臺灣一定之參考。Insider trading has long been recognized as one of the key elements in modern securities law. As a massive but relatively young market, how China handles this issue is a topic rich in comparative value. On its face, the law and regulations prohibiting insider trading in securities transactions have already in place for more than two decades. However, their actual implementation, as well as how courts interpret the elements of insider trading offense in cases, are still obscure to outside observers. The lack of in-depth empirical investigation in its enforcement further creates an extra layer of complexity to the relevant research. Due to the problems mentioned above, this paper conducts an empirical study of the insider trading criminal cases, ranging from 1997 to 2019, to examine how insider trading cases are enforced in China. By observing the actual cases and their attributes, this paper presents a comprehensive picture of who commits insider trading law in China and how courts decide these cases. Three sub-set issues of the implementation are under special scrutiny:types of information and defendants; standard of proving defendant's scienter; and the relationship between sanction and illegal gain. Based on the results of this study, we evaluate the effectiveness of the enforcement on insider trading law in China in its first two decades of existence.


Author(s):  
Lisa Mountford ◽  
Martin Hannibal

Criminal Litigation offers a guide to the areas of criminal litigation covered in the Legal Practice Course. Making use of realistic case studies backed up by online documentation, the text combines theory with practical considerations and encourages a focus on putting knowledge into a practical context. The volume covers all procedural and evidential issues that arise in criminal cases. The more complex areas of criminal litigation are examined using diagrams, flowcharts, and examples, while potential changes in the law are highlighted. This edition has been fully revised to reflect the most recent law and practice in all aspects of criminal litigation.


2018 ◽  
Vol 14 (2) ◽  
pp. NP1-NP2

James E.K. Parker, Towards an Acoustic Jurisprudence: Law and the Long Range Acoustic Device, Law, Culture and the Humanities (LCH). DOI: 10.1177/1743872115615502 The following corrections have been made to the article: Under heading III.1, another paragraph has been added. This paragraph begins ‘Whereas normal loudspeaker works…’ Under heading III.2, a paragraph has been edited: ‘In effect, what ATC did with the LRAD…’ Under heading III.2, the first sentence of the last paragraph has been expanded to clarify that the G-20 summit was held in Pittsburgh: The LRAD seems to have been used by police for the first time in Georgia in 2007, before receiving its first and most notorious outing on American soil in September 2009 at protests relating to the G-20 Summit being held in Pittsburgh.66 Under heading III.4, the sentence below in the second paragraph has been changed as follows: The law of property provides the conditions for the circulation and ownership of knowledge that enable developments in the science of acoustics at a US university in the 1950s to re-emerge as failed commercial prototypes in Japan in the 1980s only to be taken up again in 1996 by ACT before being patented, trademarked and marketed first as HSS® and then as the LRAD.82 Under heading III.4, the following has been added to the end of the paragraph ‘If the LRAD was originally imagined…’: Not that the presiding judge in the Toronto case would know however. In his discussion of a deposition by Professor David Wood, of Queen’s University, relating to ‘videos posted on the internet’ documenting the LRAD’s use at Pittsburgh, Justice Brown notes that, ‘unfortunately, Professor Wood did not attach any of those media reports or videos as exhibits to his affidavit. As a result, I cannot attach any weight to his statements.’93 Indeed, it’s not clear that any recordings of an LRAD in action were ever actually played in court. As far as I know, the LRAD has yet to feature in the ‘judicial soundscape’. In the conclusion the word ‘copyright’ has been replaced with ‘intellectual property’: The LRAD is the product of diverse institutions, jurisdictions and areas of doctrine, stretching from the law of intellectual property through the law of war to constitutional and labor law. The references and reference numbers have been updated accordingly. All the subsequent versions of the article will be corrected.


Sign in / Sign up

Export Citation Format

Share Document