[ABELOVSKÝ, Tomáš. Zaistenie elektronického dôkazu vo svetle rekodifikácie trestného poriadku. Revue pro právo a technologie. 2015. vol. 6. no. 11.]Search in Google Scholar
[Act no. 141/1961 Coll., Criminal Procedure Code, as amended by later legal regulations.]Search in Google Scholar
[Act no. 300/2005 Coll., Penal Code, as amended by later legal regulations.]Search in Google Scholar
[Act no. 301/2005 Coll., Criminal Procedure Code, as amended by later legal regulations.]Search in Google Scholar
[Act no. 460/1992 Coll., Constitution of the Slovak republic, as amended by later legal regulations.]Search in Google Scholar
[Additional Protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems, Strasbourg, 28 January 2003, treaty no. 189: Chapter 1 – Common provisions, Article 1 – Purpose.]Search in Google Scholar
[BALKIN, J., GRIMMELMANN, James, KATZ, Eddan, KOZLOVSKI, Nimrod, WAGMAN, Shlomit, ZARSKY, Tal. Cybercrime: Digital Cops in a Networked Environment. NYU Press, 2007.10.1080/15536548.2007.10855811]Search in Google Scholar
[Campbell v. United Kingdom of 25 March 1992, Application no. 13590/88.]Search in Google Scholar
[CARR, Indira, WILLIAMS, Katherine, S. Computers and law. Intellect Books, 1994.]Search in Google Scholar
[CARR, Indira. Computer crime. Routledge, 2017.10.4324/9781315095493]Search in Google Scholar
[Co je cloudové úložiště? [online]. azure.microsoft.com. [cit. 25 August 2019]. Available on ---lt---https://azure.microsoft.com/cs-cz/overview/what-is-cloud-storage/---gt---.]Search in Google Scholar
[Convention on Cybercrime as of 23 November 2001, treaty no. 185.]Search in Google Scholar
[GUTWIRTH, Serge, POULLET, Yves, DE HERT, Paul, LEENES, Ronald. Computers, Privacy and Data Protection: an Element of Choice. Sprienger Science + Business Media, 2011.10.1007/978-94-007-0641-5]Search in Google Scholar
[IGLEZAKIS, Ioannis. The Legal Regulation of Cyber Attacks. Wolters Kluwer, 2016.]Search in Google Scholar
[Judgment of Constitutional Court CZ of 17 July 2007, no. IV. ÚS 23/05-2.]Search in Google Scholar
[Judgment of Constitutional Court SR of 22 March 2011, no. Pl. ÚS 24/10.]Search in Google Scholar
[Judgment of Constitutional Court SR of 29 April 2015, No. PL. ÚS 10/2014.]Search in Google Scholar
[Judgment of Constitutional Court SR of 29 November 1995, no. I. ÚS 33/95.]Search in Google Scholar
[Klass and others v. Germany of 6 September 1978, Application no. 5029/71, Niemietz v. Germany of 16 December 1992, Application no. 13710/88.]Search in Google Scholar
[KLIMEK, Libor a kol. Počítačová kriminalita v európských súvislostiach. Wolters Kluwer, Bratislava 2016, p. 153.]Search in Google Scholar
[Recommendation No. R (89) 9 of the Committee of Ministers to memeber states concerning on computer-related crime (Adopted by the Committee of Ministers on 13 September 1989, at the 428th meeting of the Ministers’Deputies).]Search in Google Scholar
[Recommendation No. R (95) 13 of the Committee of Ministers to memeber states concerning problems of criminal procedural law connected with information technology (Adopted by the Committee of Ministers on 11 September 1995, at the 543rd meeting of the Ministers’Deputies).]Search in Google Scholar
[Resolution of the Supreme court SR of 23 March 2017, no. 5 Tdo 7/2017.]Search in Google Scholar
[ŠÁMAL, Pavel a kol. Trestní zákoník II. Komentář. 2. edition, Praha: C. H. Beck, 2012.]Search in Google Scholar
[See more Judgment of Constitutional Court CZ of 17 July 2007, no. IV. ÚS 23/05.]Search in Google Scholar
[SMEJKAL, Vladimír. Kybernetická kriminalita. Plzeň: Aleš Čeněk, 2015.]Search in Google Scholar
[Standpoint of criminal board of Supreme Court of 25. 6. 2015, sp. zn. Tpjn 306/2014 k otázce výkladu pojmu „jiné prostory, v nichž advokát vykonává advokacii” (section 85b odst. 1 tr. ř.) a k otázce, zda o návrhu ve smyslu section 85b odst. 3 tr. ř. má být vždy rozhodováno formou usnesení, nebo zda přichází v úvahu i jiná forma „rozhodnutí” a za jakých podmínek: „ …..listinou ve smyslu section 85b tr. ř. se rozumí nejen písemnosti, popř. jejich části, ale i nosiče dat. Cloudové úložiště bezesporu má povahu nosiče dat, v němž mohou být v elektronické podobě uložena veškerá data spojená s výkonem advokacie. Je tedy nutné považovat je za listinu ve smyslu section 85b odst. 12 tr. ř.”]Search in Google Scholar
[SZABOVÁ, Eva. Vybrané praktické problémy využitia prostreidkov na zabezpečovanie informácií v prípravnom konaní. In ŠČERBA, Filip, ŠČERBOVÁ, Veronika (eds). Olomoucké právnické dny 2018. Sborník z XII. ročníku mezinárodní vědecké konference Olomoucké právnické dny (Sekce trestního práva) pořádané ve dnech 24.–25. 5. 2018 Právnickou fakultou Univerzity Palackého v Olomouci. 1. vydání Olomouc: Iuridicum Olomoucense, o.p.s., 2018, s. 102–122.]Search in Google Scholar
[Tajemství cloudu odhaleno. [online]. Cloudforce.cz. 26 September 2006. [cit. 25 August 2019]. Available on ---lt---http://www.cloudforce.cz/tajemstvi-cloudu-odhaleno/---gt---.]Search in Google Scholar
[VALUCH, Jozef; GÁBRIŠ Tomáš; HAMUĽÁK, Ondrej. Cyber attacks, information attacks, and postmodern warfare. Baltic Journal of Law ---amp--- Politics, 2017, vol. 10, no. 1, pp. 63–89.10.1515/bjlp-2017-0003]Search in Google Scholar
[VAN DEN HOVEN VAN GENDEREN, Robert. Privacy Limitation Clauses: Trojan Horses under the Disguise of Democracy. Wolters Kluwer, 2016.]Search in Google Scholar