Affiliation:
1. Saint Petersburg University of the Ministry Internal Affairs of Russian Federation
Abstract
The article analyses the legal characteristics of the criminal laws of foreign States belonging to the Anglo-Saxon legal family (in the case of Great Britain and the United States of America) with regard to criminal liability for crimes committed by electronic means of payment. The peculiarities of this legal family are noted, which affect the position of the legislator with regard to the regulation of cybercrime, including the legal nature of criminal law; The importance of resolutions of the Royal (Westminster) Courts, the Supreme Court on the constitutionality or unconstitutional nature of ordinary («current») laws (USA), in Canada, Australia and other English-speaking States, in which acts of the highest courts on identical subjects have acquired special importance. Problems affecting criminal legislation have been identified: the de facto absence of systematic rules on the limits of the criminal law; There are contradictions between the written sources of criminal law (in particular with regard to fraud and computer crimes; Recognition of the interpretation of the law by sources of criminal law, etc.). It is noted that there is no Criminal Code in the UK, however, issues of criminal liability for computer crimes are regulated at the level of written law: in the Law on Computer Crimes the adoption of which was facilitated by the judicial precedent of 1988 (R v Gold & Schifreen), in the Law on Fraud of 2006, which classifies the elements of crimes committed in the form of fraudulent fraud. The peculiarities of the criminal law of the United States, which like Great Britain, does not have a codified system of criminal law at the federal level, are noted. An analysis of the two-tier legal system of the United States, the peculiarities of criminal liability for cybercrime in certain states, including FOR theft and fraud by the use of payment cards, has been carried out.
Publisher
Saint-Petersburg University of the Ministry of Internal Affairs of the Russian Federation
Reference11 articles.
1. Мирончик А. С., Суслопаров А. В. Хищения в электронной среде как разновидность информационных преступлений: проблемы разграничения и квалификации // Юридические исследования. – 2019. – № 9. – С. 17–30., Mironchik A. S., Susloparov A. V. Hischeniya v elektronnoy srede kak raznovidnost' informacionnyh prestupleniy: problemy razgranicheniya i kvalifikacii // Yuridicheskie issledovaniya. – 2019. – № 9. – S. 17–30.
2. Гайсаров Р. И. История англосаксонской правовой семьи //Вопросы студенческой науки. – 2019. – № 4 (32). – С. 77–81., Gaysarov R. I. Istoriya anglosaksonskoy pravovoy sem'i //Voprosy studencheskoy nauki. – 2019. – № 4 (32). – S. 77–81.
3. Рассказов Л. П. Англосаксонская правовая семья: генезис, основные черты и важнейшие источники // Научный журнал КубГАУ. – 2015. – № 105 (01). – С. 12–16., Rasskazov L. P. Anglosaksonskaya pravovaya sem'ya: genezis, osnovnye cherty i vazhneyshie istochniki // Nauchnyy zhurnal KubGAU. – 2015. – № 105 (01). – S. 12–16.
4. Комаров А. А. Британское уголовное право: о проблеме юрисдикции транснациональных компьютерных преступлений // Гуманитарные научные исследования. – 2016. – № 8 [Электронный ресурс]. – URL: http://human.snauka.ru/2016/08/16133 (дата обращения: 11.02.2020)., Komarov A. A. Britanskoe ugolovnoe pravo: o probleme yurisdikcii transnacional'nyh komp'yuternyh prestupleniy // Gumanitarnye nauchnye issledovaniya. – 2016. – № 8 [Elektronnyy resurs]. – URL: http://human.snauka.ru/2016/08/16133 (data obrascheniya: 11.02.2020).
5. Чернякова А. В. Международный и зарубежный опыт уголовно-правового противодействия хищениям, совершаемым с использованием компьютерной информации // Юридическая наука и правоохранительная практика. – 2018. – № 4 (46). – С. 168–179., Chernyakova A. V. Mezhdunarodnyy i zarubezhnyy opyt ugolovno-pravovogo protivodeystviya hischeniyam, sovershaemym s ispol'zovaniem komp'yuternoy informacii // Yuridicheskaya nauka i pravoohranitel'naya praktika. – 2018. – № 4 (46). – S. 168–179.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献