INFORMATION TECHNOLOGY LAW Lecture 10- Cybercrimes

Slides:



Advertisements
Benzer bir sunumlar
Avukat ÖZGÜR ERALP – ANKARA Avukat ÖZGÜR ERALP Av.Özgür Eralp.
Advertisements

NASIL BAĞLANIYOR?.
© 2011 IFRS Foundation 1 IFRS for SMEs Konu 2.5(b) Test ve Tartışma Varlıklar Bölümler 14 &15.
Türk Ceza Kanunu’nda Bilişim Suçları
BİLİŞİM ALANINDA SUÇLAR
Alakalı müşterileri hedefleyin. Google ile Yeniden Pazarlama Remarketing with Google. Target customers who are already showing interest in your business.
U LUSLARARASI Ö ĞRENCI DEĞIŞIM VE UYGULAMALI SEKTÖR EĞİTİMİ P ROGRAMLAR I.
Bilkent Üniversitesi Kütüphane Müdürü 41. Kütüphane Haftası, Ankara
Polis memurları beş günlük bir izlemeden sonra beş kişiyi bir çiflikte kamyona çok pahalı ceketlerle dolu kutuları yüklerken tutukladı. Ceketler iki ay.
Hareket halindeki insanlara ulaşın.Mobil Arama Ağı Reklamları Reach customers with Mobile Search Network.
Başkent Üniversitesi Ticari Bilimler Fakültesi
NOUN CLAUSES (İSİM CÜMLECİKLERİ).
Kampanyanızı optimize edin. Görüntülü Reklam Kampanyası Optimize Edici'yi Kullanma Display Ads Campaign Optimizer. Let Google technology manage your diplay.
Bu proje Avrupa Birliği ve Tu ̈ rkiye Cumhuriyeti tarafından finanse edilmektedir. Technical Assistance for Increasing Primary School Attendance Rate of.
SÜLEYMAN DEM İ REL PRIMARY AND SECONDARY SCHOOL. GENERAL INTRODUCTION SCHOOL DIRECTORY, TEACHERS AND OTHER STAFF CLASSROOMS PARTS OF THE SCHOOL GALLERY.
Birthday party. birthday party new year's party new year's party New Year's Party.
Onur Görür Ürün Grubu Pazarlama Müdürü Microsoft Türkiye.
COSTUMES KILIKLAR (KOSTÜMLER)
Gizli / İsimsiz Raporlama Tanıtımı
SERVING WATER TO A THIRSTY PERSON Bu Proje AB Tarafından Finanse edilmektedir. This Project is funded by European Union. Responsibility for the information.
BM-305 Mikrodenetleyiciler Güz 2015 (6. Sunu) (Yrd. Doç. Dr. Deniz Dal)
Emotional Freedom Techniques Duygusal Özgürlük Tekniği.
Database for APED Büşra Bilgili | Emirhan Aydoğan | Meryem Şentürk | M. Arda Aydın COMPE 341.
 C H I L D B R I D E S.   Marriages in early ages are seen all over the world.  Marriages under 18 are accepted as «child» marriages.
INFORMED CONSENT Assist.Prof.Dr. Mehmet KARATAS Dept. of History of Medicine & Ethics.
S ÜLEYMAN Ş AH ÜN İ VERS İ TES İ DERS KAYIT İŞ LEMLER İ / COURSE REGISTRATION PROCESS.
Superstatious. Two people should never wash their hands together in the same water - this will lead to a quarrel between them. (İki insan aynı suda ellerini.
  Shifting deictic centre as source of ambiguity: (20) [on the phone]: There’s a hospital at the opposite end of town.  (21) [letter.
What is lost in translation?
AVRUPA BİRLİĞİ GUNDTVİG ÖĞRENME ORTAKLIĞI ‘ALTIN ÇOCUKLAR ALTIN EBEVEYNLER’ PROJESİ EUROPEAN UNION GRUNDTVIG LEARN PARTNERSHIP GOLDEN PARENTS FOR GOLDEN.
Practice your writing skills
This is beak. There are feet. There are wings. There are eyes. This is tongue.
DISCUSSION
CHILD PORNOGRAPHY IŞIK ÜNİVERSİTESİ
Students social life and join the social clubs. BARIŞ KILIÇ - EGE DÖVENCİ IŞIK ÜNİVERSİTESİ
Self-Registration on the Coats Supplier Portal
Present Perfect & Simple Past I love to travel. I have been to more than 10 countries.
BİLİMSEL ÇALIŞMA BASAMAKLARI SCIENTIFIC WORKING STEPS MHD BASHAR ALREFAEI Y
LEFM and EPFM LEFM In LEFM, the crack tip stress and displacement field can be uniquely characterized by K, the stress intensity factor. It is neither.
Inventory(Stock, Good) :(Stok, Ürün)
German shepherd dog. These dogs are said to be intelligent before they say.
Ac POWER ANALYSIS Part III..
Bir Problemin Programa Dönüştürülme Süreci
Chapter 1 (Bölüm 1) The accounting equation(muhasebe denklemi) and the balance sheet(bilanço)
THE CANTERVILLE GHOST by Oscar WILDE CHARACTERS.
Siber zorbalık İsmail KIRCA İzzettin CESUR
If you delete this after reading... you'll spend a year of ill luck!
tomorrow soon next week / year in five minutes/ in two hours later today I'll go to the market tomorrow. Don’t worry. He will be here soon. There.
Döngüler ve Shift Register
NİŞANTAŞI ÜNİVERSİTESİ
Turkish cuisine is very popular around the world. It has a very wide options for everyone. The variety of the recipes and the ingredients which are grown.
NİŞANTAŞI ÜNİVERSİTESİ
PRODUCTION. CONTENT  WHAT IS PRODUCTION  BENEFITS OF PRODUCTION  ELEMENTS THAT CHARACTERIZE THE PRODUCTION PROCESS  CLASSIFICATION OF PRODUCTION SYSTEMS.
HERŞEY DAHİL KATILIM ÜCRETLERİ /ALL INCLUSIVE REGISTRATION FEE
BİLL GATES Şule Eslem ÖZTÜRK NUN OKULLARI Prep-A.
Multipoint programlama
NİŞANTAŞI ÜNİVERSİTESİ
Chapter 2 (Bölüm2) The double entry system for assets, liabilities and capital (Varlıklar, borçlar ve sermaye için çift kayıt sistemi)
NİŞANTAŞI ÜNİVERSİTESİ
Feminism, unlike the idea of ​​ mankind, is a trend that is prioritized to bring gender inequality to the agenda. The notion of feminism, which is not.
Chapter 5 – Balancing of accounts
Chapter 4 - The effect of profit or loss on capital and double entry system for expenses and revenues Bölüm 4 – Kâr ve zararın sermaye üzerindeki etkisi.
THE MYSTERIOUS ISLAND JULES VERNE. INFORMATION ABOUT THE BOOK  Name of the book: The Mysterious Island  Author: Jules Verne  Type: Adventure  Number.
NİŞANTAŞI ÜNİVERSİTESİ
SUBJECT NAME Prepeared by Write the names of group members here
People with an entrepreneurial mindset are always brave.
NİŞANTAŞI ÜNİVERSİTESİ
Examples: In the Figure, the three points and coordinates are given that is obtained with CAD program. If these three points are represented by the curve.
TWINSPACE Anthony RIOU Coşku AKER TR Teacher Multilateral Contact Seminar, İ zmir, April 2019.
Sunum transkripti:

INFORMATION TECHNOLOGY LAW Lecture 10- Cybercrimes Dr. Kadir Bas

Definition of Cybercrimes Cybercrimes can be defined in two ways: it can be defined as including all types of crimes committed through the cyberspace (broad definition). This definition covers the infringement of intellectual property rights and personal rights on the cyberspace. It can be defined as including only crimes which can only be committed through the cyberspace (narrow definition). This definition mainly covers hacking.

Type of Cybercrimes Turkish Criminal Code lists there types of cybercrimes within the meaning of narrower definition. These are: 3 tane cybercrime suçu var: 1.Entering an information technology system (bilisim sistemine girme)- Criminal Code art.243- 2.Hindering or disrupting the system or deleting or changing data (Sistemi engelleme, bozma, verileri yok etme veya değiştirme) – Criminal Code art.244- 3.illegal use of bank or credit cards (Banka veya kredi kartlarının kötüye kullanılması)- Criminal Code art.255-

Entering Information Technology System Article 243 of the Criminal Code states that: Any person who unlawfully enters a part or whole of an information technology system and continue to stay there shall be sentence to imprisonment of up to one year or judicial fine. [Bir bilişim sisteminin bütününe veya bir kısmına, hukuka aykırı olarak giren ve orada kalmaya devam eden kimseye bir yıla kadar hapis veya adlî para cezası verilir.]

Entering Information Technology System An unlawful entering an information technology system is punished in order to protect various interests, including: to protect the trust to information technology system to protect privacy of the system users to protect communication freedom of the users.

Entering Information Technology System Physical element of the Crime This crime can be committed only if a person carries out the following two actions together: to unlawfully enter a part or whole of an information technology system; and to continue to stay there. Therefore, if a person only unlawfully enters an information system, but leave it immediately, this will not constitute this crime.

Entering Information Technology System Moral Element of the Crime Unlawfully Entering an information technology system and stay there will be a crime only if the person has an intention (kasit) to do this. If a person enter another person’s information technology system (such as facebook page) and stay there by mistake, this will not constitute a crime.

Entering Information Technology System Defences that prevent criminal liability Entering an information technology system and continue to stay there will not be a crime if the person shows a defence that legalises his/her action. For example, if the owner of the information technology system has given permission to the person to enter his system, this entrance will not constitute a crime unless this person exceeds the limits of the permission. Entering an information system will not also be a crime if it is permitted by law.

Entering Information Technology System Mitigating Factor (cezayi azaltici hal) Article 243 par. 2 states that: If the crime defined in the above paragraph is committed against systems which can be used upon paying a price, the punishment shall be decreased by half. [Yukarıdaki fıkrada tanımlanan fiillerin bedeli karşılığı yararlanılabilen sistemler hakkında işlenmesi halinde, verilecek ceza yarı oranına kadar indirilir] Systems which can be used upon paying a price can include: Websites which gives online services (example Neflix) Internet cafes

Entering Information Technology System Aggravating Factor (cezayi arttirici hal) If this action results in the deletion or changing of the data included in the system, this will lead to an increase in punishment. for this purpose, the deletion or changing of the data must be done by mistake. If it is done intentionally, this will constitute the crime of hindering or disrupting the system or deleting or changing data.

Hindering or Disrupting the System or Deleting or Changing Data Article 244 para. 1 of the Criminal Code states that: Any person who hinders or disrupts the working of an information technology system shall be sentenced to imprisonment from 1 year to 5 years. [Bir bilişim sisteminin işleyişini engelleyen veya bozan kişi, bir yıldan beş yıla kadar hapis cezası ile cezalandırılır.] Article 244 para 2 states that: Any person who garbles, deletes, changes or prevents access to the data in the system, or installs data into the system or sends the available data to other places shall be sentenced to imprisonment from 6 months to 3 years. [Bir bilişim sistemindeki verileri bozan, yok eden, değiştiren veya erişilmez kılan, sisteme veri yerleştiren, var olan verileri başka bir yere gönderen kişi, altı aydan üç yıla kadar hapis cezası ile cezalandırılır.]

Hindering or Disrupting the System or Deleting or Changing Data Physical element of the crimes in Article 244 The crime in para 1 can be committed if a person hinders or disrupts the working of an information technology system For example, sending virus to another person’s computer or sending tons of emails to another person in order to block his access to his emails. The crime in para 2 can be committed if a person carries out any of the following actions: garbling, deleting or changing the data in the system preventing access to the data in the system installing data into the system sending the data in the system to other places

Hindering or Disrupting the System or Deleting or Changing Data Moral Element of the Crime The crimes mentioned in Article 244 can only be committed intentionally. For example, If a person send virus to another person’s computer unintentionally, this will not constitute a crime.

Hindering or Disrupting the System or Deleting or Changing Data Defences that prevent criminal liability The actions mentioned above will not lead to criminal responsibility if they are permitted by the right holder or they are made in order to carry out a legal order.

Hindering or Disrupting the System or Deleting or Changing Data Mitigating and Aggravating Factors There is no mitigating factor specific to the crimes in Article 244. According to paragraphs 3 and 4 of Article 22, the punishment mentioned in paragraphs 1 and 2 will be increased if: these crimes are committed on the systems of banks or credit institutions or public institutions or entities; or they are committed in order to gain an unfair benefit for himself or another person.

Illegal Use of Bank or Credit Cards Article 255 of the Criminal Code provides three types of crimes. According to Paragraph 1 of the article: If any person who acquires or holds bank or credit cards of another person(s) for whatever the reason provides unfair benefit for himself or another person by using these cards without consent of the card holder, he shall be sentenced to imprisonment from 3 years to 6 years and judicial fine. [Başkasına ait bir banka veya kredi kartını, her ne suretle olursa olsun ele geçiren veya elinde bulunduran kimse, kart sahibinin veya kartın kendisine verilmesi gereken kişinin rızası olmaksızın bunu kullanarak veya kullandırtarak kendisine veya başkasına yarar sağlarsa, üç yıldan altı yıla kadar hapis ve beşbin güne kadar adlî para cezası ile cezalandırılir.] Paragraph 2 of the article states that: Any person who creates, sells, transfers, purchases or accepts a falsified bank or credit card that can be linked to bank accounts of other persons shall be sentenced to imprisonment from 3 years to 7 years and judicial fine. [Başkalarına ait banka hesaplarıyla ilişkilendirilerek sahte banka veya kredi kartı üreten, satan, devreden, satın alan veya kabul eden kişi üç yıldan yedi yıla kadar hapis ve onbin güne kadar adlî para cezası ile cezalandırılır.] Paragraph 3 of the article states that: A person who provides unfair benefit for himself or another person by using a faked or falsified bank or credit card, unless this action constitutes another crime leading to heavier punishment, shall be sentenced to imprisonment from 4 years to 8 years and judicial fine. [Sahte oluşturulan veya üzerinde sahtecilik yapılan bir banka veya kredi kartını kullanmak suretiyle kendisine veya başkasına yarar sağlayan kişi, fiil daha ağır cezayı gerektiren başka bir suç oluşturmadığı takdirde, dört yıldan sekiz yıla kadar hapis ve beşbin güne kadar adlî para cezası ile cezalandırılır.]

Illegal Use of Bank or Credit Cards Physical Elements The crime mentioned in para1 will be committed only if three actions are made together: to have acquired or hold bank or credit cards of another person(s) for whatever the reason to use these cards without consent of the card holder to provide unfair benefit for himself or another person

Illegal Use of Bank or Credit Cards Physical Elements The crime mentioned in para 2 will be committed if any of the following actions is made: to create to sell to transfer to purchase or to accepts a falsified bank or credit card that can be linked to bank accounts of other persons.

Illegal Use of Bank or Credit Cards Physical Elements The crime mentioned in para 3 will be committed only if two following actions are made together: to use a faked or falsified bank or credit card to provides unfair benefit for himself or another person The person who commits this crime will not be punished for this crime, if these actions constitute another crime which requires heavier punishment.

Illegal Use of Bank or Credit Cards Moral Elements The crimes mentioned in Article 245 can only be committed intentionally.

Illegal Use of Bank or Credit Cards Defences that prevent criminal liability The actions mentioned above may lead to criminal responsibility even if they are permitted by the right holder. However, there will be no criminal responsibility if these crimes are committed in detriment to any of the following persons: spouse lineal descendants (children, grand children) and ancestors (parents, grand parents) and those of his/her spouse adopter or adopted persons (evlat edinen ve evlatlik) Siblings (kardesler) who live in the same house.

THANK YOU!