Amazon cover image
Image from Amazon.com

Interception of electronic communications in the Czech Republic and Slovakia / Radim Polčák et al.

By: Contributor(s): Material type: TextTextSeries: Masarykova univerzita. Spisy. Řada teoretická. Scientia. ; Publisher: Brno : Masaryk University, 2016Edition: First editionDescription: 1 online resource (241 stran)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9788021086845
  • 802108684X
Subject(s): Genre/Form: Additional physical formats: Print version:: Interception of electronic communications in the Czech Republic and Slovakia.DDC classification:
  • 343.09944 23
LOC classification:
  • KJP5407.8.C65
Online resources:
Contents:
Intro -- Table of Contents -- 1 Security Architecture and the Interceptionof Telecommunication -- 1.1 National Security Architecture -- Two Frameworks of Interception -- 1.2 Powers for interception of telecommunication -- Legislative grounds -- 1.2.1 The law of criminal procedure -- 1.2.2 Law of intelligence agencies -- 1.2.3 Financial and Customs Investigation Service -- 1.3 Responsibility for the technical performance of interception measures -- a general overview -- 1.4 Legitimacy of data transfers between different security services -- 1.5 Statistics on Telecommunication Interception
2 Constitutional and Statutory Safeguards of Telecommunications -- 2.1 Areas of constitutional protection -- 2.2 Proportionality of access to data -- 2.2.1 Secrecy of telecommunications -- 2.2.2 Secrecy of retained traffic data -- 2.2.3 Secrecy of information systems -- 2.3 Statutory consequences of constitutional protection -- 2.3.1 Protection of the secrecy of telecommunications -- 2.3.2 Protection of the confidentiality and integrity of information systems -- 2.3.3 Protection of the core area of privacy -- 2.3.4 Criminal liability for the unlawful infringement of the telecommunication secrecy
2.3.5 Protection of professional secrets in criminal procedural law -- 2.3.6 The principle of the "purpose limitation of personal data" -- 3 Powers for Accessing Telecommunication Data -- 3.1 Overview -- 3.2 Requirement of (reasonable) clarity for powers in the law of criminal procedure -- 3.3 Differentiation and classification of powers in the law of criminal procedure -- 4 Interception of Content Data -- 4.1 Object of interception -- 4.2 Special protection of confidential communication content -- 4.3 Execution of telecommunication interception
4.4 Duties of telecommunication service providers to cooperate -- 4.5 Formal prerequisites of interception orders -- 4.6 Substantive prerequisites of interception orders -- 4.7 Consent by a communication participant to the measure -- 4.8 Duties to record, report, and destroy -- 4.9 Notification duties and remedies -- 4.10 Confidentiality requirements -- 5 Collection and Use of Traffic and Subscriber Data -- 5.1 Collection of traffic data -- 5.2 Collection of subscriber data -- 5.3 "Data retention" -- 6 Access to (Temporarily) Stored Communication Data
6.1 Online searches with the help of remote forensic software -- 6.2 Search and seizure of stored communication data -- 6.3 Duties to cooperate: production and decryption orders -- 7 Use of Electronic Communicati on Data in Judicial Proceedings -- 7.1 Use of electronic communication data in the law of criminal procedure -- 7.2 Inadmissibility of evidence as a consequence of inappropriate collection -- 7.3 Use of data outside the main proceedings -- 7.3.1 Data from other criminal investigations -- 7.3.2 Data from preventive investigations -- 7.3.3 Data from foreign jurisdictions
Item type:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode
Electronic-Books Electronic-Books OPJGU Sonepat- Campus E-Books EBSCO Available

Na obálce nad názvem: Masaryk University, Faculty of Law.

Obsahuje bibliografii a bibliografické odkazy.

Print version record.

Intro -- Table of Contents -- 1 Security Architecture and the Interceptionof Telecommunication -- 1.1 National Security Architecture -- Two Frameworks of Interception -- 1.2 Powers for interception of telecommunication -- Legislative grounds -- 1.2.1 The law of criminal procedure -- 1.2.2 Law of intelligence agencies -- 1.2.3 Financial and Customs Investigation Service -- 1.3 Responsibility for the technical performance of interception measures -- a general overview -- 1.4 Legitimacy of data transfers between different security services -- 1.5 Statistics on Telecommunication Interception

2 Constitutional and Statutory Safeguards of Telecommunications -- 2.1 Areas of constitutional protection -- 2.2 Proportionality of access to data -- 2.2.1 Secrecy of telecommunications -- 2.2.2 Secrecy of retained traffic data -- 2.2.3 Secrecy of information systems -- 2.3 Statutory consequences of constitutional protection -- 2.3.1 Protection of the secrecy of telecommunications -- 2.3.2 Protection of the confidentiality and integrity of information systems -- 2.3.3 Protection of the core area of privacy -- 2.3.4 Criminal liability for the unlawful infringement of the telecommunication secrecy

2.3.5 Protection of professional secrets in criminal procedural law -- 2.3.6 The principle of the "purpose limitation of personal data" -- 3 Powers for Accessing Telecommunication Data -- 3.1 Overview -- 3.2 Requirement of (reasonable) clarity for powers in the law of criminal procedure -- 3.3 Differentiation and classification of powers in the law of criminal procedure -- 4 Interception of Content Data -- 4.1 Object of interception -- 4.2 Special protection of confidential communication content -- 4.3 Execution of telecommunication interception

4.4 Duties of telecommunication service providers to cooperate -- 4.5 Formal prerequisites of interception orders -- 4.6 Substantive prerequisites of interception orders -- 4.7 Consent by a communication participant to the measure -- 4.8 Duties to record, report, and destroy -- 4.9 Notification duties and remedies -- 4.10 Confidentiality requirements -- 5 Collection and Use of Traffic and Subscriber Data -- 5.1 Collection of traffic data -- 5.2 Collection of subscriber data -- 5.3 "Data retention" -- 6 Access to (Temporarily) Stored Communication Data

6.1 Online searches with the help of remote forensic software -- 6.2 Search and seizure of stored communication data -- 6.3 Duties to cooperate: production and decryption orders -- 7 Use of Electronic Communicati on Data in Judicial Proceedings -- 7.1 Use of electronic communication data in the law of criminal procedure -- 7.2 Inadmissibility of evidence as a consequence of inappropriate collection -- 7.3 Use of data outside the main proceedings -- 7.3.1 Data from other criminal investigations -- 7.3.2 Data from preventive investigations -- 7.3.3 Data from foreign jurisdictions

eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide

There are no comments on this title.

to post a comment.

O.P. Jindal Global University, Sonepat-Narela Road, Sonepat, Haryana (India) - 131001

Send your feedback to glus@jgu.edu.in

Hosted, Implemented & Customized by: BestBookBuddies   |   Maintained by: Global Library