Cybersecurity Crime and Legal Responsibility for Violating Data and Information Privacy in UAE Law: A Descriptive and Analytical Study
Contributors
Mohammed Hassan Merdad Obaid
Norfadhilah Mohamad Ali
Ahmad Zaki Salleh
Keywords
Proceeding
Track
Article
License
Copyright (c) 2023 Mohammed Hassan Merdad Obaid; Norfadhilah Mohamad Ali; Ahmad Zaki Salleh;
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Abstract
The study aims to clarify the problem of the forms of assault on information privacy in cyber breaches and the assault on the privacy of data and personal information, especially confidential and personal ones, through full or partial access to those private secrets so that certainty can be known and understood. If the secrets are in a language that the perpetrator does not understand, first it is better to analyze them. Access was not achieved except through the integration of the image and the interconnection of its parts. If what the actor viewed were nothing but unconnected particles, without a useful meaning, then access would not be achieved either. This access must in itself be illegal and must be carried out by a person who does not legally have a license to access that information. Information, and for this picture to be achieved, the access must be abstract, that is, the intent of the perpetrator is merely to view that confidential information and merely have personal knowledge of it. The research relied on the descriptive analytical inductive method in order to reach objective results that achieve the goal of the study. The research reached an important result, which is what distinguishes the crime of cyber hacking, which is that it is a quick-executing crime, as in most cases the physical element is nothing but pressing a specific key on the device, with the possibility of implementing this remotely without the requirement of being present at the crime scene. Therefore, electronic crime, due to the ease with which it is committed, has constituted an element of temptation for criminals, since committing it is no more than the availability of the possibility of exploiting technology and modern technology, especially when the perpetrator is a public employee or in one of the companies that rely on the computer in the nature of its work related to information or money, so that it has all the necessary information. To achieve multiple successive breakthroughs in the company's computer systems and achieve huge profits. For this reason, the need arose for strong protection methods for information stored in computers or electronic transmission media, an example of which is what are called firewalls or firewalls, which are protection programs that prevent penetration or unauthorized entry. The research came up with recommendations, the most important of which is allocating a legal article in the Rumors and Electronic Crimes Law that criminalizes the use of cyber hacking systems to commit the crime and introducing a special penalty in the Crimes and Penalties Law for the crime of hacking government information systems.