This paper seeks to provide a comprehensive definition of the crime of electronic extortion and how it differs from the traditional crimes of extortion. It deals with the relationship between the crime of electronic extortion and both the right to privacy and the right to personal freedom. It also briefly presents a picture of the reality of the current legal approaches for dealing with this crime at the international and local levels. Finally, the paper reviews some ways to reduce the crime of electronic extortion.
Unwritten Rules: Impacts of the Delayed Executive Regulations of Data Protection Law on Sensitive Data
This paper discusses the different classifications of sensitive data, the obligations of service providers to protect it and the consequences of disclosing it, in addition to the impact of the delay in issuing the executive regulations of the Personal Data Protection Law on sensitive data.
In July 2021, the world followed a flow of investigative reporting by a group of press organizations that worked together to expose the use of the Pegasus spyware, which is produced by NSO Group, to spy on journalists, activists, human rights defenders, and political opponents. Investigations revealed that the spyware was used to target more […]
Introduction The Court of Cassation instituted a new case concerning compensation for the publication and use of personal photos on the Internet without obtaining permission access. The Court of Cassation issued a compensation ruling in the famous case known in the media as the “Airplane Cabin” case, which was set up by the heirs […]
On this page: What are the 5G networks, and what are the possibilities and opportunities it provides? What is the difference between the 5G networks and the 4G networks? What are the problems and negative effects of 5G networks? What are the direct positive and negative effects of the 5G networks on human rights in […]
In a previous article, we discussed “Clubhouse: Security and Privacy Issues“. Clubhouse offers a tool for audio communication that can be used to participate in discussing points of view about different topics and to interact with them. The application also allows much freedom and ease for creating rooms and discussing political, religious, sexuality, and sexual […]
In this Page: Invitation to join the application Who do we follow, and who follows us Who listens to what Weak account protection Texting within the application Recording sessions conversations Fake copies What steps Clubhouse should take to enhance security and privacy? In March 2020, Clubhouse was launched as one of the startup social media […]
Possible Legislative Alternatives.. About the Executive Regulations of the Personal Data Protection Law
In July 2020, the Personal Data Protection Law was passed (No. 151 of 2020), a year after its publication, of which most of the rules stipulated are still suspended, for non–issuance of the executive regulations, where the law referred a large number of procedural aspects to the executive regulations, and even referred to the essential […]
Throughout the last few days, Arab and international media outlets have run stories of a new leak concerning NSO Group, one of the most well known Israeli companies active in the fields of surveillance and spying. NSO develops Pegasos, one of the most well known tools used by oppressive governments and regimes for spying on […]