Tech and Law
Social Media Influencers: Exceptional Responsibilities and Absence of Guarantees under the Media Regulation Law
This paper aims to identify the risks posed directly by the Press and Media Regulation Law on influencers. The paper also discusses the impacts related to the policies and regulations produced by the Supreme Council for Media Regulation (SCMR) on the work of influencers’ pages. Finally, the paper addresses the absence of any guarantees for influencers in the face of the multiple responsibilities imposed by the laws and regulations of the Press and Media Regulation Law.
Explanatory Memorandum: Legislative Effect of the Crime of Intentional Disturbance Using Telecommunication Means
Masaar, through this explanatory memorandum, seeks to point out the issues related to the text and application of Article 76 of the Telecommunications Law and provides potential legislative alternatives for avoiding them. The memorandum starts with an explanation of the intentional disturbance crime in Egyptian laws, before moving to the aspects of Article 76 suspected unconstitutionality, and it ends with recommendations for amending that article.
This paper deals with the definition of the position of the Data Protection Officer and the obligations imposed on them by the Personal Data Protection Law. The paper also presents the conditions for appointing a Data Protection Officer and the impact of lack of commitment to these conditions, in addition to the impact of the Data Protection Officer breaching their legal obligations.
This paper aims to provide an explanation of the offense of “intentional disturbance and harassing through misusing telecommunication devices” by highlighting the legislative evolution of the concept of disturbance, starting from the Egyptian Penal Code and extending to the Cybercrime Law. The paper also discusses the stance of Egyptian courts regarding the offense and their attempts to formulate a definition of the concept of disturbance. Furthermore, the paper seeks to explain the manifestations of criminal behavior according to certain judicial provisions, in addition to clarifying the issues related to the elements of the offense and how they impact the users of telecommunication means.
This paper examines the importance of legal tech today, its application in different countries, its negative impacts on justice, balancing positive and negative effects, and its impacts on rights and freedoms. The core benefits are more efficient legal processes, enhanced access to justice, better decision-making, improved collaboration, and improved compliance.
This guide seeks to clarify the categories addressed by the Personal Data Protection Law and to explain the obligations that are imposed once the law is issued, and the technical responsibilities associated with the executive regulations of the law that have not yet been issued. The guide also deals with the different types of licenses required to carry out data collection, processing, or storage activities, distinguishing between the different types of personal data that require different degrees of protection, as well as the activities excluded from the Personal Data Protection Law.
Amendments to the Telecommunications Law: New Restrictions on the Use and Operation of Telecommunications Equipment
This paper deals with the 2014 proposal to amend the Egyptian Telecommunications Regulatory Law and then moves on to the content of the amendments that have already been approved and entered into force in 2022. These amendments include harsher penalties related to the import or manufacture of telecommunications equipment and the introduction of penalties for new criminalized forms. The paper also deals with the powers of NTRA to grant permits to import, use and operate equipment, in addition to the justifications of the Ministry of Communications and the Egyptian Parliament for approving the amendment of the law and finally, comments on those justifications.
Unwritten Rules: Impacts of the Delayed Executive Regulations of Data Protection Law on Sensitive Data
This paper discusses the different classifications of sensitive data, the obligations of service providers to protect it and the consequences of disclosing it, in addition to the impact of the delay in issuing the executive regulations of the Personal Data Protection Law on sensitive data.
Since the executive regulations of the Anti-Cyber and Information Technology Crimes Law (Cybercrime Law) were issued, the General Prosecution has expanded in referring cases of digital nature to the Economic Court, being the competent court for hearing this type of crimes.