Documents
-
- Download
- Chapter 10
- open access
-
- Download
- Chapter 11
- open access
-
- Download
- References_Appendix A
- open access
-
- Download
- Summary in Dutch
- open access
-
- Download
- Acknowledgements_Curriculum Vitae_Series
- open access
-
- Download
- Propositions
- open access
In Collections
This item can be found in the following collections:
Investigating cybercrime
This study examines the following investigative methods that are commonly used in cybercrime investigations: (1) the gathering of publicly available online information, (2) the issuing of data production orders to online service providers, (3) the use of online undercover investigative methods, and (4) performing hacking as an investigative method. For many of these investigative methods, the legal basis in Dutch law is ambiguous.
However, a clear legal basis for investigative methods that indicates the scope of investigative methods and the manner in which they are applied must be available. It helps prevent arbitrary application of power by governmental authorities and is therefore essential for protecting the rule of law. The author examines how a foreseeable legal framework for the identified investigative methods can be created that meets the requirements that are derived from the right to privacy in art. 8 ECHR....
Show more
This study examines the following investigative methods that are commonly used in cybercrime investigations: (1) the gathering of publicly available online information, (2) the issuing of data production orders to online service providers, (3) the use of online undercover investigative methods, and (4) performing hacking as an investigative method. For many of these investigative methods, the legal basis in Dutch law is ambiguous.
However, a clear legal basis for investigative methods that indicates the scope of investigative methods and the manner in which they are applied must be available. It helps prevent arbitrary application of power by governmental authorities and is therefore essential for protecting the rule of law. The author examines how a foreseeable legal framework for the identified investigative methods can be created that meets the requirements that are derived from the right to privacy in art. 8 ECHR.
The borderless nature of the Internet is also taken into account. The question is addressed to which extent digital investigative methods can be applied unilaterally across State borders. The analysis results in a list of recommendations to improve the regulations for digital investigative methods on both the domestic level and the international level.
Show less
- All authors
- Oerlemans, J.J.
- Supervisor
- Herik, H.J. van den
- Co-supervisor
- Ölçer, F.P.; Schermer, B.W.
- Committee
- Crijns, J.H.; Ducheine, P.A.L.; Duijvenvoorde, G.P. van; Hof, S. van der; Koops, E.J.; Wilt, H.G. van der
- Qualification
- Doctor (dr.)
- Awarding Institution
- eLaw - Center for Law and Digital Technologies, Law, Leiden University
- Date
- 2017-01-10
- Title of host publication
- Meijers-reeks
- Publisher
- Leiden: Meijers Research Institute and Graduate School of the Leiden Law School of Leiden University
- ISBN (print)
- 9789085551096
Publication Series
- Name
- MI-275