Tech and Law
Explanatory Memorandum: Legislative Effect of the Crime of Intentional Disturbance Using Telecommunication Means
Masaar, through this explanatory memorandum, seeks to point out the issues related to the text and application of Article 76 of the Telecommunications Law and provides potential legislative alternatives for avoiding them. The memorandum starts with an explanation of the intentional disturbance crime in Egyptian laws, before moving to the aspects of Article 76 suspected unconstitutionality, and it ends with recommendations for amending that article.
The Obligations of the Data Protection Officer under the Personal Data Protection Law
This paper deals with the definition of the position of the Data Protection Officer and the obligations imposed on them by the Personal Data Protection Law. The paper also presents the conditions for appointing a Data Protection Officer and the impact of lack of commitment to these conditions, in addition to the impact of the Data Protection Officer breaching their legal obligations.
Issues of the Crime of Intentional Disturbance Using Telecommunication Means in Egypt
This paper aims to provide an explanation of the offense of “intentional disturbance and harassing through misusing telecommunication devices” by highlighting the legislative evolution of the concept of disturbance, starting from the Egyptian Penal Code and extending to the Cybercrime Law.
Legal Tech: Balancing Justice and Challenges
This paper examines the importance of legal tech today, its application in different countries, its negative impacts on justice, balancing positive and negative effects, and its impacts on rights and freedoms. The core benefits are more efficient legal processes, enhanced access to justice, better decision-making, improved collaboration, and improved compliance.
Data Protection Guide for Companies
This guide seeks to clarify the categories addressed by the Personal Data Protection Law and to explain the obligations that are imposed once the law is issued, and the technical responsibilities associated with the executive regulations of the law that have not yet been issued. The guide also deals with the different types of licenses required to carry out data collection, processing, or storage activities, distinguishing between the different types of personal data that require different degrees of protection, as well as the activities excluded from the Personal Data Protection Law.
Amendments to the Telecommunications Law: New Restrictions on the Use and Operation of Telecommunications Equipment
This paper deals with the 2014 proposal to amend the Egyptian Telecommunications Regulatory Law and then moves on to the content of the amendments that have already been approved and entered into force in 2022. These amendments include harsher penalties related to the import or manufacture of telecommunications equipment and the introduction of penalties for new criminalized forms. The paper also deals with the powers of NTRA to grant permits to import, use and operate equipment, in addition to the justifications of the Ministry of Communications and the Egyptian Parliament for approving the amendment of the law and finally, comments on those justifications.
Unwritten Rules: Impacts of the Delayed Executive Regulations of Data Protection Law on Sensitive Data
This paper discusses the different classifications of sensitive data, the obligations of service providers to protect it and the consequences of disclosing it, in addition to the impact of the delay in issuing the executive regulations of the Personal Data Protection Law on sensitive data.
Legislative Effect of the Crime of “Administering an Account to Commit a Crime”
Since the executive regulations of the Anti-Cyber and Information Technology Crimes Law (Cybercrime Law) were issued, the General Prosecution has expanded in referring cases of digital nature to the Economic Court, being the competent court for hearing this type of crimes.
Flood Sending Messages (Spam) In Light of Judicial Interpretation
The Anti-Cyber and Information Technology Crimes Law (Cybercrime Law) has handled the sanctity of private life in a separate chapter under the title of “Crimes Related to Violating the Sanctity of Private Life and Informatic Illegal Content.
- « Previous
- 1
- 2
- 3
- 4
- Next »