Third-Party Doctrine and Obtaining Cyber-Criminal Evidence
The cases which can be counted as searching and seizing the evidence without needing the legal warrant,are situations proposed as “Third-Party Consent” doctrine. In the American system, officials can search any place or object without having a warrant or even a probable cause, provided that a person...
Main Authors: | , |
---|---|
Format: | Article |
Language: | fas |
Published: |
Allameh Tabataba'i University Press
2017-05-01
|
Series: | Faṣlnāmah-i Pizhūhish-i Huqūq-i Kiyfarī |
Subjects: | |
Online Access: | https://jclr.atu.ac.ir/article_7402_5f455a1683b67a8a05ecc53ca4f3df74.pdf |
_version_ | 1797369167521775616 |
---|---|
author | mohamad javad fathi seyed vahid abolmaali alhoseini |
author_facet | mohamad javad fathi seyed vahid abolmaali alhoseini |
author_sort | mohamad javad fathi |
collection | DOAJ |
description | The cases which can be counted as searching and seizing the evidence without
needing the legal warrant,are situations proposed as “Third-Party Consent”
doctrine. In the American system, officials can search any place or object
without having a warrant or even a probable cause, provided that a person
authorized to consent voluntarily agrees to the inspection. This doctrine has
always been involved with two issues including determining: “Third-party
consent territory” and “the identity of the authorized persons to consent”.
Gradually, foundations of doctrine were challenged and it was claimed that it did
not have the capability of surviving in the current situation and according to its
old understanding. In fact, the arrival of modern technology in the age of
communication and in the cyber territory due to the change of subjects and the
conceptual transformation of the doctrine in the field of technologies, it has
faced many challenges. Doubts towards efficiency of the doctrine became
apparent when it was observed that almost all services in the current age are
being provided by Third-Party; hence, the traditional reading of the Doctrine
leaves no trace of privacy. In this review, we will explain the Third-Party
Doctrine in the cyber environment. |
first_indexed | 2024-03-08T17:42:46Z |
format | Article |
id | doaj.art-628f3abac65d4216b90286f217b13025 |
institution | Directory Open Access Journal |
issn | 2345-3575 2476-6224 |
language | fas |
last_indexed | 2024-03-08T17:42:46Z |
publishDate | 2017-05-01 |
publisher | Allameh Tabataba'i University Press |
record_format | Article |
series | Faṣlnāmah-i Pizhūhish-i Huqūq-i Kiyfarī |
spelling | doaj.art-628f3abac65d4216b90286f217b130252024-01-02T10:55:05ZfasAllameh Tabataba'i University PressFaṣlnāmah-i Pizhūhish-i Huqūq-i Kiyfarī2345-35752476-62242017-05-0151810114110.22054/jclr.2017.74027402Third-Party Doctrine and Obtaining Cyber-Criminal Evidencemohamad javad fathi0seyed vahid abolmaali alhoseini1دانشیار حقوق جزا و جرم شناسی دانشگاه تهران، پردیس فارابیدانشجوی دکتری رشته حقوق جزا و جرم شناسی دانشگاه تهران پردیس فارابیThe cases which can be counted as searching and seizing the evidence without needing the legal warrant,are situations proposed as “Third-Party Consent” doctrine. In the American system, officials can search any place or object without having a warrant or even a probable cause, provided that a person authorized to consent voluntarily agrees to the inspection. This doctrine has always been involved with two issues including determining: “Third-party consent territory” and “the identity of the authorized persons to consent”. Gradually, foundations of doctrine were challenged and it was claimed that it did not have the capability of surviving in the current situation and according to its old understanding. In fact, the arrival of modern technology in the age of communication and in the cyber territory due to the change of subjects and the conceptual transformation of the doctrine in the field of technologies, it has faced many challenges. Doubts towards efficiency of the doctrine became apparent when it was observed that almost all services in the current age are being provided by Third-Party; hence, the traditional reading of the Doctrine leaves no trace of privacy. In this review, we will explain the Third-Party Doctrine in the cyber environment.https://jclr.atu.ac.ir/article_7402_5f455a1683b67a8a05ecc53ca4f3df74.pdfkeywords: searchseizureprivacythird - party consent doctrine |
spellingShingle | mohamad javad fathi seyed vahid abolmaali alhoseini Third-Party Doctrine and Obtaining Cyber-Criminal Evidence Faṣlnāmah-i Pizhūhish-i Huqūq-i Kiyfarī keywords: search seizure privacy third - party consent doctrine |
title | Third-Party Doctrine and Obtaining Cyber-Criminal Evidence |
title_full | Third-Party Doctrine and Obtaining Cyber-Criminal Evidence |
title_fullStr | Third-Party Doctrine and Obtaining Cyber-Criminal Evidence |
title_full_unstemmed | Third-Party Doctrine and Obtaining Cyber-Criminal Evidence |
title_short | Third-Party Doctrine and Obtaining Cyber-Criminal Evidence |
title_sort | third party doctrine and obtaining cyber criminal evidence |
topic | keywords: search seizure privacy third - party consent doctrine |
url | https://jclr.atu.ac.ir/article_7402_5f455a1683b67a8a05ecc53ca4f3df74.pdf |
work_keys_str_mv | AT mohamadjavadfathi thirdpartydoctrineandobtainingcybercriminalevidence AT seyedvahidabolmaalialhoseini thirdpartydoctrineandobtainingcybercriminalevidence |