Applications of cybercrime legal framework (IV)

The stalking offense is born to give a punishable legal response to those behaviors that, although they have no legal reserve in the criminal type of harassment or threat, but nonetheless, are completely illegitimate behaviors, in In any case, since

Applications of cybercrime legal framework (III)

In this post we will summarize the resolution 238/2014 of the criminal court No. 4 Alcalá de Henares where the Prosecutor launches the accusation in the following terms:Discovery of secrets (article 197-2 of the Criminal Code.)Between 17 and 28 August

Applications of cybercrime legal framework (II)

In this post we will summarize the resolution 161/2010 of the Criminal court number two of Salamanca where the absence of criminal liability is settled on a denial-of-service attack to a web server of the Cancer Research Center, that at

Applications of cybercrime legal framework (I)

Given the wide case mix that make up the jurisprudential doctrine of this type of crimes, we thought it is appropriate to bring up curious and instructive cases. STC (2nd Penal Chamber) 7 November 2011, facts: The defendant gives brought his computer

Cybercrime and legal framework (IV)

Finally we address the 4th Section of Title XVIII, which is similarity to traditional crimes of documentary falsehoods in public/private documents (in its different variants). Equally we address those crimes that are committed in the exercise of the functions and duties of custody because

Cybercrime and legal framework (III)

We continue analyzing technological crimes from a legal point of view. This time based on economic and intellectual/industrial property actions. In this section (TÍTULO XIII, Delitos contra el patrimonio y contra el orden socioeconómico) fit habitual behaviors such as phishing,