Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "remote investigation software" wg kryterium: Temat


Wyświetlanie 1-1 z 1
Tytuł:
Remote Search of IT System in Polish Legislation and Its Importance in Fight Against Cybercrime
Autorzy:
Olber, Paweł
Powiązania:
https://bibliotekanauki.pl/articles/1374844.pdf
Data publikacji:
2019
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
covert surveillance
remote search of IT system
remote investigation software
digital evidence
Opis:
The issues of remote access by law enforcement authorities to data in remote IT systems are extremely difficult and controversial. The literature stresses that such activities threaten the right to privacy of the parties involved in the proceedings and the right to a fair trial. However, on the other hand, the dynamic development of new technologies and the need to combat cybercrime effectively require that law enforcement and judicial authorities make use of adequate legal and technical solutions. One such a solution may be a remote search of an IT system, which exists in many European countries, including Belgium, Romania and Germany. In the case of Poland, a search of an IT system as a procedural activity is only allowed in respect of a system in which the person concerned is a dispatcher or user. The Polish legislator has not implemented procedural provisions enabling remote searches via the Internet. In case of the necessity of a system remote search, it will be necessary to conduct a parallel search. Another way of obtaining remote access to data and IT systems may be new methods of covert surveillance, which have been introduced into the Police Act. The new regulations generate a lot of interest among Polish police officers, but at the same time they provoke a lot of discussion. The diversity of the existing approach leads to the development of a uniform interpretation of the introduced regulations, which has been adopted as the subject of this study.
Źródło:
Internal Security; 2019, 11(2); 141-149
2080-5268
Pojawia się w:
Internal Security
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-1 z 1

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies