Trans border Access to Computer Data

Document Type : Original Article

Authors

1 Islamic Azad University, Isfahan (Khorasgan), Iran

2 Department of Law, Faculty of Humanities and Law, Islamic Azad University, Isfahan (Khorasgan), Iran

Abstract

Computer data is flowing in cyber space regardless the national borders. In many cases data related to crimes as electronic evidence is not accessible in territory of crime prosecuting state. In these cases, success in prosecuting the crimes requires the access of trans-border data related the crime. Traditionally this access is possible through mutual legal assistance between states based on acquiring consent of the state where the data is stored. This approach is leaded by territorial sovereignty principle but is not preparing the enough speed for gathering electronic evidence. Nowadays states access the data directly and without acquiring consent of the state where data is stored. This direct access to data has been accepted by some of the international frameworks in specific conditions. In spite of this, there is not international unique method for accessing to trans-national data. Each of the trans-border access methods has advantages and disadvantages which should be considered in initiating a new international frame by states.

Keywords


کتابها
1- Gercke, M. Understanding Cybercrime: Phenomena, Challenge and Legal Response. First Ed. Vienna: International Telecommunication Union, 2012.
2- Nadelmann, Ethan A.  Cops Across Borders: The Internationalization of U.S. Criminal Law Enforcement. First Ed. Pennsylvania: Penn State University Press, 1993.
3- United Nation Office of Drugs and Crime. Comprehensive Study on Cybercrime. First Ed.Vienna: UNODC Publications, 2012.
4- Walden, I. Accessing Data in the Cloud: The Long Arm of the Law Enforcement Agentin: Privacy and Security for Cloud Computing, Edited by Siani Pearson. First Ed. New York: Springer.
5- Walden, I. Computer Crimes and Digital Investigations. Second Ed. Oxford: Oxford University Press, 2007.
 
مقالات
1- Bradshaw, S., and C. Millard and I. Walden, “Contracts for Clouds: Comparison and Analysis of the Terms and Conditions of Cloud Computing Services,” International Journal of Law and Information Technology 19, 2011.
2- Goldsmith J. L., “The Internet and the Legitimacy of Remote Cross-Border Searches,” The University of Chicago Legal Forum 103, 2001.
3- Kerr, O. S., “Fourth Amendment Seizures of Computer Data,” Yale Law Journal 119, 2010
4- O’Floinn, M., “It Wasn’t All White Light before Prism: Law Enforcement Practices in Gathering Data Abroad, and Proposals for Further Transnational Access at the Council of Europe,” Computer Law & Security Review 29, 2013.
5- Seitz, N., “Transborder Search: A New Perspective in Law Enforcement,” Yale Journal of Law and Technology 7, 2004.
6- Trudel, P., “Jurisdiction over the Internet: A Canadian Perspective,” The International Lawyer 32, 1998.
 
منابع الکترونیک
1- Benson, K., and R. Dowsley, and H. Shacham, Do you know where your cloud files are?, Proceedings of the 3rd ACM Workshop on Cloud Computing Security (October 2010), available at: http://iks.ira.uka.de/fileadmin/User/Dowsley/pdf/BenDowSha11.pdf (last visited on 11/10/2018).
2- Council of Europe Cybercrime Convention Committee (T-CY), Trans-border Access and Jurisdiction: What Are the Options, Council of Europe (December 2012), 9, available at: https://rm.coe.int/16802e79e8 (last visited on 11/10/2018).
3- Council of Europe Cybercrime Convention Committee (T-CY), T-CY Assessment report: The Mutual Legal Assistance Provisions of the Budapest Convention on Cybercrime, Council of Europe (December 2014), 31, available at: https://rm.coe.int/16802e726c(last visited on 11/9/2018).
4- European Committee of Crime Problem, Explanatory Report to the Convention on Cybercrime, Council of Europe (November 2001), 53, available at: https://rm.coe.int/16800ce5b (last visited on 11/9/2018).
 
5- Facebook Company, Information for Law Enforcement Authorities, Facebook Website, available at: http://www.facebook.com/safety/groups/law/guidelines/(last visited on 11/10/2018).
6- Giles, K., Russia’s Public Stance on Cyberspace Issues, 4th International Conference on Cyber Conflict (January 2012), available at: https://www.researchgate.net/publication/261044707_Russia's_public_stance_on_cyberspace_issues (last visited on 11/9/2018).
7- New Zealand Law Commission, Search and Surveillance Powers, lawcom.govt.nz (June 2007), 226, available at: http://www.lawcom.govt.nz/sites/default/files/projectAvailableFormats/NZLC%20R97.pdf (last visited on 11/9/2018).
 
8- Peterson, Z.N.J., and Gondree, M., and Beverly, R., 2011. A Position Paper on Data Sovereignty: The Importance of Geolocating Data in the Cloud, Usenix (June 2011), available at: https://www.usenix.org/legacy/events/hotcloud11/tech/final_files/Peterson.pdf  (last visited on 11/10/2018).
9- Schwerha, J. J.,Law Enforcement Challenges in Transborder Acquisition of Electronic Evidence from Cloud Computing Providers, Council of Europe Project on Cybercrime Discussion (January 2010), available at: https://rm.coe.int/16802fa3dc (last visited on 11/10/2018).
 
پرونده‎ها
The Case of the S.S. Lotus, Fr. v. Turk, 1927 P.C.I.J. Reports, ser. A, No. 10, at 4 (Decision No. 9)