{"title":"The concept of access to computerized information according to art. 259 of the Criminal Code of the Republic of Moldova","authors":"Alexandru Strimbeanu","doi":"10.52277/1857-2405.2022.3(62).02","DOIUrl":null,"url":null,"abstract":"The concept of „access to computerized information” refers to one of the components of the objective side of the offenses provided in art. 259 of the Criminal Code of the Republic of Moldova. The main result of the present study is the definition of this concept that generates controversies in the theory and practice of criminal law. Another notable result consists in supporting with arguments the solution to qualify the acts of: 1) maintaining illegal access to computerized information after the withdrawal or expiration of the authorization; 2) illegal intrusion into the computer, the data storage device, the computer system or the computer network, in which or on which the computerized information is located, if, due to reasons independent of the perpetrator’s will, the illegal access to that information is not committed.","PeriodicalId":254422,"journal":{"name":"The Journal of the National Institute of Justice","volume":"63 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Journal of the National Institute of Justice","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.52277/1857-2405.2022.3(62).02","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The concept of „access to computerized information” refers to one of the components of the objective side of the offenses provided in art. 259 of the Criminal Code of the Republic of Moldova. The main result of the present study is the definition of this concept that generates controversies in the theory and practice of criminal law. Another notable result consists in supporting with arguments the solution to qualify the acts of: 1) maintaining illegal access to computerized information after the withdrawal or expiration of the authorization; 2) illegal intrusion into the computer, the data storage device, the computer system or the computer network, in which or on which the computerized information is located, if, due to reasons independent of the perpetrator’s will, the illegal access to that information is not committed.