Third-Party Doctrine and Obtaining Cyber-Criminal Evidence

The cases which can be counted as searching and seizing the evidence without needing the legal warrant,are situations proposed as “Third-Party Consent” doctrine. In the American system, officials can search any place or object without having a warrant or even a probable cause, provided that a person...

Full description

Bibliographic Details
Main Authors: mohamad javad fathi, seyed vahid abolmaali alhoseini
Format: Article
Language:fas
Published: Allameh Tabataba'i University Press 2017-05-01
Series:Faṣlnāmah-i Pizhūhish-i Huqūq-i Kiyfarī
Subjects:
Online Access:https://jclr.atu.ac.ir/article_7402_5f455a1683b67a8a05ecc53ca4f3df74.pdf
_version_ 1797369167521775616
author mohamad javad fathi
seyed vahid abolmaali alhoseini
author_facet mohamad javad fathi
seyed vahid abolmaali alhoseini
author_sort mohamad javad fathi
collection DOAJ
description The cases which can be counted as searching and seizing the evidence without needing the legal warrant,are situations proposed as “Third-Party Consent” doctrine. In the American system, officials can search any place or object without having a warrant or even a probable cause, provided that a person authorized to consent voluntarily agrees to the inspection. This doctrine has always been involved with two issues including determining: “Third-party consent territory” and “the identity of the authorized persons to consent”. Gradually, foundations of doctrine were challenged and it was claimed that it did not have the capability of surviving in the current situation and according to its old understanding. In fact, the arrival of modern technology in the age of communication and in the cyber territory due to the change of subjects and the conceptual transformation of the doctrine in the field of technologies, it has faced many challenges. Doubts towards efficiency of the doctrine became apparent when it was observed that almost all services in the current age are being provided by Third-Party; hence, the traditional reading of the Doctrine leaves no trace of privacy. In this review, we will explain the Third-Party Doctrine in the cyber environment.
first_indexed 2024-03-08T17:42:46Z
format Article
id doaj.art-628f3abac65d4216b90286f217b13025
institution Directory Open Access Journal
issn 2345-3575
2476-6224
language fas
last_indexed 2024-03-08T17:42:46Z
publishDate 2017-05-01
publisher Allameh Tabataba'i University Press
record_format Article
series Faṣlnāmah-i Pizhūhish-i Huqūq-i Kiyfarī
spelling doaj.art-628f3abac65d4216b90286f217b130252024-01-02T10:55:05ZfasAllameh Tabataba'i University PressFaṣlnāmah-i Pizhūhish-i Huqūq-i Kiyfarī2345-35752476-62242017-05-0151810114110.22054/jclr.2017.74027402Third-Party Doctrine and Obtaining Cyber-Criminal Evidencemohamad javad fathi0seyed vahid abolmaali alhoseini1دانشیار حقوق جزا و جرم شناسی دانشگاه تهران، پردیس فارابیدانشجوی دکتری رشته حقوق جزا و جرم شناسی دانشگاه تهران پردیس فارابیThe cases which can be counted as searching and seizing the evidence without needing the legal warrant,are situations proposed as “Third-Party Consent” doctrine. In the American system, officials can search any place or object without having a warrant or even a probable cause, provided that a person authorized to consent voluntarily agrees to the inspection. This doctrine has always been involved with two issues including determining: “Third-party consent territory” and “the identity of the authorized persons to consent”. Gradually, foundations of doctrine were challenged and it was claimed that it did not have the capability of surviving in the current situation and according to its old understanding. In fact, the arrival of modern technology in the age of communication and in the cyber territory due to the change of subjects and the conceptual transformation of the doctrine in the field of technologies, it has faced many challenges. Doubts towards efficiency of the doctrine became apparent when it was observed that almost all services in the current age are being provided by Third-Party; hence, the traditional reading of the Doctrine leaves no trace of privacy. In this review, we will explain the Third-Party Doctrine in the cyber environment.https://jclr.atu.ac.ir/article_7402_5f455a1683b67a8a05ecc53ca4f3df74.pdfkeywords: searchseizureprivacythird - party consent doctrine
spellingShingle mohamad javad fathi
seyed vahid abolmaali alhoseini
Third-Party Doctrine and Obtaining Cyber-Criminal Evidence
Faṣlnāmah-i Pizhūhish-i Huqūq-i Kiyfarī
keywords: search
seizure
privacy
third - party consent doctrine
title Third-Party Doctrine and Obtaining Cyber-Criminal Evidence
title_full Third-Party Doctrine and Obtaining Cyber-Criminal Evidence
title_fullStr Third-Party Doctrine and Obtaining Cyber-Criminal Evidence
title_full_unstemmed Third-Party Doctrine and Obtaining Cyber-Criminal Evidence
title_short Third-Party Doctrine and Obtaining Cyber-Criminal Evidence
title_sort third party doctrine and obtaining cyber criminal evidence
topic keywords: search
seizure
privacy
third - party consent doctrine
url https://jclr.atu.ac.ir/article_7402_5f455a1683b67a8a05ecc53ca4f3df74.pdf
work_keys_str_mv AT mohamadjavadfathi thirdpartydoctrineandobtainingcybercriminalevidence
AT seyedvahidabolmaalialhoseini thirdpartydoctrineandobtainingcybercriminalevidence