Description |
1 online resource (241 stran) |
Series |
Publications of the Masaryk University ; file number 573 = Acta Universitatis Brunensis Iuridica ; vol. 573. Theoretical series. Scientia |
|
Masarykova univerzita. Právnická fakulta.
Spisy. Řada teoretická. Scientia
|
Contents |
Intro -- Table of Contents -- 1 Security Architecture and the Interceptionof Telecommunication -- 1.1 National Security Architecture -- Two Frameworks of Interception -- 1.2 Powers for interception of telecommunication -- Legislative grounds -- 1.2.1 The law of criminal procedure -- 1.2.2 Law of intelligence agencies -- 1.2.3 Financial and Customs Investigation Service -- 1.3 Responsibility for the technical performance of interception measures -- a general overview -- 1.4 Legitimacy of data transfers between different security services -- 1.5 Statistics on Telecommunication Interception |
|
2 Constitutional and Statutory Safeguards of Telecommunications -- 2.1 Areas of constitutional protection -- 2.2 Proportionality of access to data -- 2.2.1 Secrecy of telecommunications -- 2.2.2 Secrecy of retained traffic data -- 2.2.3 Secrecy of information systems -- 2.3 Statutory consequences of constitutional protection -- 2.3.1 Protection of the secrecy of telecommunications -- 2.3.2 Protection of the confidentiality and integrity of information systems -- 2.3.3 Protection of the core area of privacy -- 2.3.4 Criminal liability for the unlawful infringement of the telecommunication secrecy |
|
2.3.5 Protection of professional secrets in criminal procedural law -- 2.3.6 The principle of the "purpose limitation of personal data" -- 3 Powers for Accessing Telecommunication Data -- 3.1 Overview -- 3.2 Requirement of (reasonable) clarity for powers in the law of criminal procedure -- 3.3 Differentiation and classification of powers in the law of criminal procedure -- 4 Interception of Content Data -- 4.1 Object of interception -- 4.2 Special protection of confidential communication content -- 4.3 Execution of telecommunication interception |
|
4.4 Duties of telecommunication service providers to cooperate -- 4.5 Formal prerequisites of interception orders -- 4.6 Substantive prerequisites of interception orders -- 4.7 Consent by a communication participant to the measure -- 4.8 Duties to record, report, and destroy -- 4.9 Notification duties and remedies -- 4.10 Confidentiality requirements -- 5 Collection and Use of Traffic and Subscriber Data -- 5.1 Collection of traffic data -- 5.2 Collection of subscriber data -- 5.3 "Data retention" -- 6 Access to (Temporarily) Stored Communication Data |
|
6.1 Online searches with the help of remote forensic software -- 6.2 Search and seizure of stored communication data -- 6.3 Duties to cooperate: production and decryption orders -- 7 Use of Electronic Communicati on Data in Judicial Proceedings -- 7.1 Use of electronic communication data in the law of criminal procedure -- 7.2 Inadmissibility of evidence as a consequence of inappropriate collection -- 7.3 Use of data outside the main proceedings -- 7.3.1 Data from other criminal investigations -- 7.3.2 Data from preventive investigations -- 7.3.3 Data from foreign jurisdictions |
Notes |
Na obálce nad názvem: Masaryk University, Faculty of Law |
Bibliography |
Obsahuje bibliografii a bibliografické odkazy |
Notes |
Print version record |
Subject |
Computer networks -- Access control -- Czech Republic
|
|
Computer networks -- Access control -- Slovakia
|
|
Data protection -- Czech Republic
|
|
Data protection -- Slovakia
|
|
LAW -- Military.
|
|
elektronická komunikace -- Česko.
|
|
elektronická komunikace -- Slovensko.
|
|
elektronická komunikace -- právní aspekty.
|
|
electronic communication -- Czechia.
|
|
electronic communication -- Slovakia.
|
|
electronic communication -- legal aspects.
|
|
Computer networks -- Access control
|
|
Data protection
|
|
Czech Republic
|
|
Slovakia
|
Genre/Form |
Kolektivní monografie.
|
|
Collective monographs.
|
Form |
Electronic book
|
Author |
Masarykova univerzita. Právnická fakulta
|
ISBN |
9788021086845 |
|
802108684X |