Tech and Law
Data Protection Guide for Companies
This guide seeks to clarify the categories addressed by the Personal Data Protection Law and to explain the obligations that are imposed once the law is issued, and the technical responsibilities associated with the executive regulations of the law that have not yet been issued. The guide also deals with the different types of licenses required to carry out data collection, processing, or storage activities, distinguishing between the different types of personal data that require different degrees of protection, as well as the activities excluded from the Personal Data Protection Law.
Amendments to the Telecommunications Law: New Restrictions on the Use and Operation of Telecommunications Equipment
This paper deals with the 2014 proposal to amend the Egyptian Telecommunications Regulatory Law and then moves on to the content of the amendments that have already been approved and entered into force in 2022. These amendments include harsher penalties related to the import or manufacture of telecommunications equipment and the introduction of penalties for new criminalized forms. The paper also deals with the powers of NTRA to grant permits to import, use and operate equipment, in addition to the justifications of the Ministry of Communications and the Egyptian Parliament for approving the amendment of the law and finally, comments on those justifications.
Unwritten Rules: Impacts of the Delayed Executive Regulations of Data Protection Law on Sensitive Data
This paper discusses the different classifications of sensitive data, the obligations of service providers to protect it and the consequences of disclosing it, in addition to the impact of the delay in issuing the executive regulations of the Personal Data Protection Law on sensitive data.
Legislative Effect of the Crime of “Administering an Account to Commit a Crime”
Since the executive regulations of the Anti-Cyber and Information Technology Crimes Law (Cybercrime Law) were issued, the General Prosecution has expanded in referring cases of digital nature to the Economic Court, being the competent court for hearing this type of crimes.
Flood Sending Messages (Spam) In Light of Judicial Interpretation
The Anti-Cyber and Information Technology Crimes Law (Cybercrime Law) has handled the sanctity of private life in a separate chapter under the title of “Crimes Related to Violating the Sanctity of Private Life and Informatic Illegal Content.
Compensation for the Publication and Use of Personal Photos on the Internet
Introduction The Court of Cassation instituted a new case concerning compensation for the publication and use of personal photos on the Internet without obtaining permission access. The Court of Cassation issued a compensation ruling in the famous case known in the media as the “Airplane Cabin” case, which was set up by the heirs […]
Legislative Contexts for the Passage of Internet Laws
With the acceleration of the issuance of laws related to rights and freedoms on the Internet, and laws related to communication technology in general, questions about the reasons and motives associated with the adoption of some of these legislations increase. In addition to other questions about the timing of their issuance, who was involved in making them, their relevance to each other, and their implications.
Blocking: An Established Censorship Tool in Egyptian Legislation
The legislative environment and judicial rulings in Egypt are full of rules and principles related to imposing forms of censorship over contents of different forms, visual, vocal, and read. Naturally, these tools have evolved along with technology, and the increasing role of the Internet in recent years in enriching contents, providing alternative platforms and unlimited […]
How the Cybercrime Law Imposes Several Responsibilities on Website Administrators
On this page: How does the law define website administrators? General responsibilities related to managing and using the website, account, or email. Responsibilities related to negligence, shortcomings, or failing to implement security and protection measures. Responsibilities related to hiding or tampering with digital evidence in case of a crime committed through the website. The […]
- « Previous
- 1
- 2
- 3
- Next »