Open Access

Preservation and Rendition of Computer Data in Slovak Criminal Procedure Code


Cite

ABELOVSKÝ, Tomáš. Zaistenie elektronického dôkazu vo svetle rekodifikácie trestného poriadku. Revue pro právo a technologie. 2015. vol. 6. no. 11.Search in Google Scholar

Act no. 141/1961 Coll., Criminal Procedure Code, as amended by later legal regulations.Search in Google Scholar

Act no. 300/2005 Coll., Penal Code, as amended by later legal regulations.Search in Google Scholar

Act no. 301/2005 Coll., Criminal Procedure Code, as amended by later legal regulations.Search in Google Scholar

Act no. 460/1992 Coll., Constitution of the Slovak republic, as amended by later legal regulations.Search in Google Scholar

Additional Protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems, Strasbourg, 28 January 2003, treaty no. 189: Chapter 1 – Common provisions, Article 1 – Purpose.Search in Google Scholar

BALKIN, J., GRIMMELMANN, James, KATZ, Eddan, KOZLOVSKI, Nimrod, WAGMAN, Shlomit, ZARSKY, Tal. Cybercrime: Digital Cops in a Networked Environment. NYU Press, 2007.10.1080/15536548.2007.10855811Search in Google Scholar

Campbell v. United Kingdom of 25 March 1992, Application no. 13590/88.Search in Google Scholar

CARR, Indira, WILLIAMS, Katherine, S. Computers and law. Intellect Books, 1994.Search in Google Scholar

CARR, Indira. Computer crime. Routledge, 2017.10.4324/9781315095493Search in Google Scholar

Co je cloudové úložiště? [online]. azure.microsoft.com. [cit. 25 August 2019]. Available on ---lt---https://azure.microsoft.com/cs-cz/overview/what-is-cloud-storage/---gt---.Search in Google Scholar

Convention on Cybercrime as of 23 November 2001, treaty no. 185.Search in Google Scholar

GUTWIRTH, Serge, POULLET, Yves, DE HERT, Paul, LEENES, Ronald. Computers, Privacy and Data Protection: an Element of Choice. Sprienger Science + Business Media, 2011.10.1007/978-94-007-0641-5Search in Google Scholar

IGLEZAKIS, Ioannis. The Legal Regulation of Cyber Attacks. Wolters Kluwer, 2016.Search in Google Scholar

Judgment of Constitutional Court CZ of 17 July 2007, no. IV. ÚS 23/05-2.Search in Google Scholar

Judgment of Constitutional Court SR of 22 March 2011, no. Pl. ÚS 24/10.Search in Google Scholar

Judgment of Constitutional Court SR of 29 April 2015, No. PL. ÚS 10/2014.Search in Google Scholar

Judgment of Constitutional Court SR of 29 November 1995, no. I. ÚS 33/95.Search in Google Scholar

Klass and others v. Germany of 6 September 1978, Application no. 5029/71, Niemietz v. Germany of 16 December 1992, Application no. 13710/88.Search in Google Scholar

KLIMEK, Libor a kol. Počítačová kriminalita v európských súvislostiach. Wolters Kluwer, Bratislava 2016, p. 153.Search in Google Scholar

Recommendation No. R (89) 9 of the Committee of Ministers to memeber states concerning on computer-related crime (Adopted by the Committee of Ministers on 13 September 1989, at the 428th meeting of the Ministers’Deputies).Search in Google Scholar

Recommendation No. R (95) 13 of the Committee of Ministers to memeber states concerning problems of criminal procedural law connected with information technology (Adopted by the Committee of Ministers on 11 September 1995, at the 543rd meeting of the Ministers’Deputies).Search in Google Scholar

Resolution of the Supreme court SR of 23 March 2017, no. 5 Tdo 7/2017.Search in Google Scholar

ŠÁMAL, Pavel a kol. Trestní zákoník II. Komentář. 2. edition, Praha: C. H. Beck, 2012.Search in Google Scholar

See more Judgment of Constitutional Court CZ of 17 July 2007, no. IV. ÚS 23/05.Search in Google Scholar

SMEJKAL, Vladimír. Kybernetická kriminalita. Plzeň: Aleš Čeněk, 2015.Search in Google Scholar

Standpoint of criminal board of Supreme Court of 25. 6. 2015, sp. zn. Tpjn 306/2014 k otázce výkladu pojmu „jiné prostory, v nichž advokát vykonává advokacii” (section 85b odst. 1 tr. ř.) a k otázce, zda o návrhu ve smyslu section 85b odst. 3 tr. ř. má být vždy rozhodováno formou usnesení, nebo zda přichází v úvahu i jiná forma „rozhodnutí” a za jakých podmínek: „ …..listinou ve smyslu section 85b tr. ř. se rozumí nejen písemnosti, popř. jejich části, ale i nosiče dat. Cloudové úložiště bezesporu má povahu nosiče dat, v němž mohou být v elektronické podobě uložena veškerá data spojená s výkonem advokacie. Je tedy nutné považovat je za listinu ve smyslu section 85b odst. 12 tr. ř.”Search in Google Scholar

SZABOVÁ, Eva. Vybrané praktické problémy využitia prostreidkov na zabezpečovanie informácií v prípravnom konaní. In ŠČERBA, Filip, ŠČERBOVÁ, Veronika (eds). Olomoucké právnické dny 2018. Sborník z XII. ročníku mezinárodní vědecké konference Olomoucké právnické dny (Sekce trestního práva) pořádané ve dnech 24.–25. 5. 2018 Právnickou fakultou Univerzity Palackého v Olomouci. 1. vydání Olomouc: Iuridicum Olomoucense, o.p.s., 2018, s. 102–122.Search in Google Scholar

Tajemství cloudu odhaleno. [online]. Cloudforce.cz. 26 September 2006. [cit. 25 August 2019]. Available on ---lt---http://www.cloudforce.cz/tajemstvi-cloudu-odhaleno/---gt---.Search in Google Scholar

VALUCH, Jozef; GÁBRIŠ Tomáš; HAMUĽÁK, Ondrej. Cyber attacks, information attacks, and postmodern warfare. Baltic Journal of Law ---amp--- Politics, 2017, vol. 10, no. 1, pp. 63–89.10.1515/bjlp-2017-0003Search in Google Scholar

VAN DEN HOVEN VAN GENDEREN, Robert. Privacy Limitation Clauses: Trojan Horses under the Disguise of Democracy. Wolters Kluwer, 2016.Search in Google Scholar

eISSN:
2464-6601
Language:
English