Abstract
Objective: the purpose of this study is a determination of the procedural status of electronic documents as electronic evidence and identification of gaps in legislation regarding their legal regulation.
Theoretical framework: theoretical materials were based on international scientific publications, reports, and scientific papers. And also for a more complete and objective presentation of the problem being studied, also practical materials from criminal cases were used.
Method: is a dialectical method of understanding general patterns and particular manifestations of the essence of phenomena of objective reality. The comparative legal method made it possible to qualitatively study foreign legislation from the point of view of the legal regulation of electronic evidence and their application in practice. The method of mathematical analysis and logic made it possible to analyze everything that could relate to electronic evidence, identifying their characteristics.
Results and conclusion: electronic evidence is information in electronic digital form, suitable for communication, interpretation or processing. In the electronic digital environment, the main interacting objects are various kinds of information objects (data sets, files, programs, etc.) with a complex hierarchical structure. Data in electronic digital form are intended to transmit information through media, information systems and telecommunication networks, and in the event of a crime being committed against them, their protection is of primary interest, and the nature and content of this data fades into the background.
Originality/value: the value of the study lies in the fact that, based on a comprehensive analysis, electronic evidence has a unique structure and ensuring their safety is one of the criteria for their use, as well as the possibility of introducing a copying function will expand the process of processing evidence. The concept of “computer information” is the author’s definition, which will allow us to consolidate electronic evidence as an independent type.
Publisher
South Florida Publishing LLC
Subject
Law,Development,Management, Monitoring, Policy and Law
Reference11 articles.
1. A. Sharkov. (2004) Unlawful access to computer information: criminality and qualification problems. Stavropol, University Press, 30 p.
2. A.S. Nurkhan. (2018) Legislation of the Republic of Kazakhstan Regarding Criminal Infractions and the Law Enforcement Practice. Journal of Advanced Research in Law and Economics, 9(1), 194-203 DOI:10.14505//jarle.v9. 1(31).24
3. Borka Jerman Blažič & Tomaž Klobučar. (2020) Removing the barriers in cross-border crime investigation by gathering e-evidence in an interconnected society, Information & Communications Technology Law, 29(1), 66-81, DOI: 10.1080/13600834.2020.1705035
4. D.K. Piragoff. (1992) Computer Crimes and Other Crimes against Information Technology in Canada.Wurzbuerg (Germany), Toulouse, 210 p.
5. Dan Jerker, B. Svantesson, Lodewijk van Zwieten. (2016) Law enforcement access to evidence via direct contact with cloud providers – identifying the contours of a solution. Computer Law & Security Review, 32(5), 671-682. https://doi.org/10.1016/j.clsr.2016.07.011
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献