Article 15: Anyone who uses computer or telecommunication systems or data carriers and storage devices to perpetrate the following activities, will receive the appropriate punishments described below: A) If, in…
-
ArticlesFree Tribune of LawyersHuman Rights Education
-
ArticlesFree Tribune of LawyersHuman Rights Education
A simplified legal analysis of the Cyber Crimes Law: Section Nine
by adminlby adminlArticle 13: “Anyone who, without any legal permit and license, uses computer and telecommunication systems in order to enter, alter, delete or distort computer data, so as to obtain financial…
-
ArticlesFree Tribune of LawyersHuman Rights Education
A simplified legal analysis of the Cyber Crimes Law: Section Eight
by adminlby adminlThe Punishment: There are two types of punishments for this crime and these are applicable in three ways: 1. The punishment of this crime could be imprisonment from one year…
-
ArticlesFree Tribune of LawyersHuman Rights Education
A simplified legal analysis of the Cyber Crimes Law: Section Seven
by adminlby adminlThe Punishment: There are two types of punishments for this crime and these are applicable in three ways: 1. The punishment of this crime could be imprisonment from one year…
-
ArticlesFree Tribune of LawyersHuman Rights Education
A simplified legal analysis of the Cyber Crimes Law: Section Six
by adminlby adminlArticle 5: “If the governmental officials, who are responsible for protecting secret data (as determined by Article 3 of these laws) or the related systems and have received appropriate training…
-
ArticlesFree Tribune of LawyersHuman Rights Education
A simplified legal analysis of the Cyber Crimes Law: Section Five
by adminlby adminlArticle 3: “Anyone who unlawfully commits the following actions in relation to confidential and classified data which are in transition and traffic electronically, or are stored and saved – by…
-
ArticlesFree Tribune of LawyersHuman Rights Education
A simplified legal analysis of the Cyber Crimes Law: Section Four
by adminlby adminlArticle 2: “Anyone who illegally eavesdrops on the traffic of non-public content in the computer or telecommunications systems or electromagnetic waves and fibre optics, will be sentenced to between six…
-
ArticlesFree Tribune of LawyersHuman Rights Education
A simplified legal analysis of the Cyber Crimes Law: Section Three
by adminlby adminlArticle 1: “Anyone who gains illegal access to data, computers and telecommunication systems, which are protected by security measures, can be punished by imprisonment terms ranging between 91 days…
-
ArticlesFree Tribune of LawyersHuman Rights Education
A simplified legal analysis of the Cyber Crimes Law- Second Section
by adminlby adminlThe Cyber Crimes Law does not provide a clear definition of these criminal acts, and the legislators have merely given a few examples and instances of computer-related criminal activities, and…
-
ArticlesFree Tribune of LawyersHuman Rights Education
A simplified legal analysis of the Cyber Crimes Law- First Section
by adminlby adminlWith the approval of the Cyber Crimes Law on 5 Khordad 1388 [26 May 2009], another chapter was added to the 29 chapters of the Islamic Penal Law. Given…
