Changes

Jump to navigation Jump to search
Line 4: Line 4:  
The Convention is the first international treaty on Internet and computer-network crimes. It focuses on copyright infringement, computer-related fraud, child pornography, and network security violations. It outlines powers and procedures, such as searching computer networks and making interceptions. The aim of the treaty is to reconcile a free Internet, with the free flow of information and effective criminal justice for criminal misuse. Thus, its restrictions are narrowly defined and electronic evidence for criminal proceedings is subject to human rights and legal safeguards.<ref>[https://rm.coe.int/t-cy-2020-16-bc-benefits-rep-provisional/16809ef6ac#:~:text=The%20Budapest%20Convention%20provides%20for,crime%3B%20and%20(iii)%20efficient The benefits and impact of the Budapest Convention, pg 4]</ref>
 
The Convention is the first international treaty on Internet and computer-network crimes. It focuses on copyright infringement, computer-related fraud, child pornography, and network security violations. It outlines powers and procedures, such as searching computer networks and making interceptions. The aim of the treaty is to reconcile a free Internet, with the free flow of information and effective criminal justice for criminal misuse. Thus, its restrictions are narrowly defined and electronic evidence for criminal proceedings is subject to human rights and legal safeguards.<ref>[https://rm.coe.int/t-cy-2020-16-bc-benefits-rep-provisional/16809ef6ac#:~:text=The%20Budapest%20Convention%20provides%20for,crime%3B%20and%20(iii)%20efficient The benefits and impact of the Budapest Convention, pg 4]</ref>
   −
The Convention sets out the following procedural powers: expedited preservation of stored data; expedited preservation and partial disclosure of traffic data; production order; search and seizure of computer data; real-time collection of traffic data; andinterception of content data.
+
The Convention sets out the following procedural powers: expedited preservation of stored data; expedited preservation and partial disclosure of traffic data; production order; search and seizure of computer data; real-time collection of traffic data; and interception of content data.
    
==History==
 
==History==
Bureaucrats, Check users, lookupuser, Administrators, translator
14,932

edits

Navigation menu