Regulations – S3lab http://s3lab.deusto.es S3lab Security Blog Wed, 06 May 2020 12:51:35 +0000 en-US hourly 1 https://wordpress.org/?v=5.1.5 Applications of cybercrime legal framework (IV) http://s3lab.deusto.es/applications-cybercrime-legal-4/ Fri, 16 Dec 2016 10:57:35 +0000 http://s3lab.deusto.es/?p=8717 The stalking offense is born to give a punishable legal response to those behaviors that, although they have no legal reserve in the criminal type of harassment or threat, but nonetheless, are completely illegitimate behaviors, in In any case, since

The post Applications of cybercrime legal framework (IV) appeared first on S3lab.

]]>
The stalking offense is born to give a punishable legal response to those behaviors that, although they have no legal reserve in the criminal type of harassment or threat, but nonetheless, are completely illegitimate behaviors, in In any case, since it results in an infringement and impairment of the right to freedom regulated under Article 14 of the EC within the “Fundamental Rights of Persons” chapter,

The post Applications of cybercrime legal framework (IV) appeared first on S3lab.

]]>
Applications of cybercrime legal framework (III) http://s3lab.deusto.es/applications-cybercrime-legal-3/ Sat, 05 Nov 2016 18:10:27 +0000 http://s3lab.deusto.es/?p=8604 In this post we will summarize the resolution 238/2014 of the criminal court No. 4 Alcalá de Henares where the Prosecutor launches the accusation in the following terms:Discovery of secrets (article 197-2 of the Criminal Code.)Between 17 and 28 August

The post Applications of cybercrime legal framework (III) appeared first on S3lab.

]]>
In this post we will summarize the resolution 238/2014 of the criminal court No. 4 Alcalá de Henares where the Prosecutor launches the accusation in the following terms:Discovery of secrets (article 197-2 of the Criminal Code.)Between 17 and 28 August which was operating this website, 70,000 users downloaded the virus and Trojan program. Hard disk of the accused Serial No. 3HR19EA9

The post Applications of cybercrime legal framework (III) appeared first on S3lab.

]]>
Applications of cybercrime legal framework (II) http://s3lab.deusto.es/applications-cybercrime-legal-2/ Fri, 23 Sep 2016 09:04:25 +0000 http://s3lab.deusto.es/?p=8474 In this post we will summarize the resolution 161/2010 of the Criminal court number two of Salamanca where the absence of criminal liability is settled on a denial-of-service attack to a web server of the Cancer Research Center, that at

The post Applications of cybercrime legal framework (II) appeared first on S3lab.

]]>
In this post we will summarize the resolution 161/2010 of the Criminal court number two of Salamanca where the absence of criminal liability is settled on a denial-of-service attack to a web server of the Cancer Research Center, that at this time depends on the University of Salamanca.

The post Applications of cybercrime legal framework (II) appeared first on S3lab.

]]>
Applications of cybercrime legal framework (I) http://s3lab.deusto.es/applications-cyber-crime-legal-1/ Sat, 16 Jul 2016 14:51:33 +0000 http://s3lab.deusto.es/?p=8366 Given the wide case mix that make up the jurisprudential doctrine of this type of crimes, we thought it is appropriate to bring up curious and instructive cases. STC (2nd Penal Chamber) 7 November 2011, facts: The defendant gives brought his computer

The post Applications of cybercrime legal framework (I) appeared first on S3lab.

]]>
Given the wide case mix that make up the jurisprudential doctrine of this type of crimes, we thought it is appropriate to bring up curious and instructive cases. STC (2nd Penal Chamber) 7 November 2011, facts: The defendant gives brought his computer to repair. The repairman founde files containing child pornography and puts the facts

The post Applications of cybercrime legal framework (I) appeared first on S3lab.

]]>
Cybercrime and legal framework (IV) http://s3lab.deusto.es/cyber-crime-legal-framework-4/ Wed, 08 Jun 2016 09:57:31 +0000 http://s3lab.deusto.es/?p=8234 Finally we address the 4th Section of Title XVIII, which is similarity to traditional crimes of documentary falsehoods in public/private documents (in its different variants). Equally we address those crimes that are committed in the exercise of the functions and duties of custody because

The post Cybercrime and legal framework (IV) appeared first on S3lab.

]]>
Finally we address the 4th Section of Title XVIII, which is similarity to traditional crimes of documentary falsehoods in public/private documents (in its different variants). Equally we address those crimes that are committed in the exercise of the functions and duties of custody because of their office, reflecting an increase in the penalty. Always keeping in mind that once the faults have disappeared, this in itself implies a serious hardening of the penalties to apply this legal framework. Finally, we mention the crimes of what has come to be called cyberterrorism.

The post Cybercrime and legal framework (IV) appeared first on S3lab.

]]>
Cybercrime and legal framework (III) http://s3lab.deusto.es/cyber-crime-legal-framework-3/ Wed, 01 Jun 2016 09:57:48 +0000 http://s3lab.deusto.es/?p=8207 We continue analyzing technological crimes from a legal point of view. This time based on economic and intellectual/industrial property actions. In this section (TÍTULO XIII, Delitos contra el patrimonio y contra el orden socioeconómico) fit habitual behaviors such as phishing,

The post Cybercrime and legal framework (III) appeared first on S3lab.

]]>
We continue analyzing technological crimes from a legal point of view. This time based on economic and intellectual/industrial property actions. In this section (TÍTULO XIII, Delitos contra el patrimonio y contra el orden socioeconómico) fit habitual behaviors such as phishing, denial of service attacks,WiFi theft etc.

The post Cybercrime and legal framework (III) appeared first on S3lab.

]]>