International review of criminal policy - Nos. 43 and 44

International review of criminal policy: United Nations Manual on the prevention and control of computer-related crime

The burgeoning of the world of information technologies has, however, a negative side: it has opened the door to antisocial and criminal behavior in ways that would never have previously been possible. Computer systems offer some new and highly sophisticated opportunities for law-breaking, and they create the potential to commit traditional types of crimes in non-traditional ways. In addition to suffering the economic consequences computer crime, society relies on computerized systems foralmost everything in life, from air, train and bus traffic control to medical service coordination and national security. Even a small glitch in the operation of these systems can put human lives in danger. Society's dependence on computer systems, therefore, has a profound human dimension. The rapid transnational expansion of large-scalecomputer networks and the ability to access many systems through regular telephone lines increases the vulnerability of these systems and the opportunity for misuse or criminal activity. The consequences of computer crime may have serious economic costs as well as serious costs in terms of human security.

CONTENTS

Introduction   The international problem  Regional action  The need for global action  Eighth United Nations Congress on the Prevention of Crime and the Treatment of Offenders

I. THE PHENOMENON OF COMPUTER CRIME   Definition of computer crime  The extent of crime and losses  Perpetrators of computer crime  The vulnerability of computer systems to crime  Common types of computer crime

II. SUBSTANTIVE CRIMINAL LAW PROTECTING THE HOLDER OF DATA AND INFORMATION   Background  The development of national law <li> The international harmonization of criminal law</ol>

III. SUBSTANTIVE CRIMINAL LAW PROTECTING PRIVACY <ol style="list-style-type: upper-alpha;"> <li> Background <li> The development of national law <li> International harmonization</ol>

IV. PROCEDURAL LAW <ol style="list-style-type: upper-alpha;"> <li> Background <li> The coercive powers of prosecuting authorities <li> Specific problems with personal data <li> Admissibility of computer generated evidence <li> International harmonization</ol>

V. CRIME PREVENTION IN THE COMPUTER ENVIRONMENT <ol style="list-style-type: upper-alpha;"> <li> Security in the electronic data processing environment <li> Assets <li> Security measures <li> Law enforcement and legal training <li> Victim cooperation in reporting computer crime <li> Developing a computer ethic <li> International security of information systems</ol>

VI. INTERNATIONAL COOPERATION <ol style="list-style-type: upper-alpha;"> <li> General aspects <li> The jurisdiction issue <li> Transborder search of computer data banks <li> Mutual assistance in transborder computer related crime <li> Extradition <li> Transfer of proceedings in criminal matters <li> Concluding remarks and suggestions</ol>

VII. CONCLUSION

<BR />