Interception of electronic communications in the Czech Republic and Slovakia /
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Autor Corporativo: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Brno :
Masaryk University,
2016.
|
Edición: | First edition. |
Colección: | Publications of the Masaryk University ;
file number 573 = Acta Universitatis Brunensis Iuridica ; vol. 573. Theoretical series. Scientia |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Intro
- Table of Contents
- 1 Security Architecture and the Interceptionof Telecommunication
- 1.1 National Security Architecture
- Two Frameworks of Interception
- 1.2 Powers for interception of telecommunication
- Legislative grounds
- 1.2.1 The law of criminal procedure
- 1.2.2 Law of intelligence agencies
- 1.2.3 Financial and Customs Investigation Service
- 1.3 Responsibility for the technical performance of interception measures
- a general overview
- 1.4 Legitimacy of data transfers between different security services
- 1.5 Statistics on Telecommunication Interception
- 2 Constitutional and Statutory Safeguards of Telecommunications
- 2.1 Areas of constitutional protection
- 2.2 Proportionality of access to data
- 2.2.1 Secrecy of telecommunications
- 2.2.2 Secrecy of retained traffic data
- 2.2.3 Secrecy of information systems
- 2.3 Statutory consequences of constitutional protection
- 2.3.1 Protection of the secrecy of telecommunications
- 2.3.2 Protection of the confidentiality and integrity of information systems
- 2.3.3 Protection of the core area of privacy
- 2.3.4 Criminal liability for the unlawful infringement of the telecommunication secrecy
- 2.3.5 Protection of professional secrets in criminal procedural law
- 2.3.6 The principle of the "purpose limitation of personal data"
- 3 Powers for Accessing Telecommunication Data
- 3.1 Overview
- 3.2 Requirement of (reasonable) clarity for powers in the law of criminal procedure
- 3.3 Differentiation and classification of powers in the law of criminal procedure
- 4 Interception of Content Data
- 4.1 Object of interception
- 4.2 Special protection of confidential communication content
- 4.3 Execution of telecommunication interception
- 4.4 Duties of telecommunication service providers to cooperate
- 4.5 Formal prerequisites of interception orders
- 4.6 Substantive prerequisites of interception orders
- 4.7 Consent by a communication participant to the measure
- 4.8 Duties to record, report, and destroy
- 4.9 Notification duties and remedies
- 4.10 Confidentiality requirements
- 5 Collection and Use of Traffic and Subscriber Data
- 5.1 Collection of traffic data
- 5.2 Collection of subscriber data
- 5.3 "Data retention"
- 6 Access to (Temporarily) Stored Communication Data
- 6.1 Online searches with the help of remote forensic software
- 6.2 Search and seizure of stored communication data
- 6.3 Duties to cooperate: production and decryption orders
- 7 Use of Electronic Communicati on Data in Judicial Proceedings
- 7.1 Use of electronic communication data in the law of criminal procedure
- 7.2 Inadmissibility of evidence as a consequence of inappropriate collection
- 7.3 Use of data outside the main proceedings
- 7.3.1 Data from other criminal investigations
- 7.3.2 Data from preventive investigations
- 7.3.3 Data from foreign jurisdictions