{"title":"Adjacent action from the composition of the offenses provided in art. 259 of the Criminal Code","authors":"Alexandru Strimbeanu","doi":"10.59295/sum3(163)2023_18","DOIUrl":null,"url":null,"abstract":"The object of the investigation is represented by the six normative variants of the adjacent action from the composition of the prejudicial act provided in art. 259 of the Criminal Code of the Republic of Moldova: 1) destroying computerized information; 2) deteriorating computerized information; 3) changing computerized information; 4) blocking computerized information; 5) copying computerized information; 6) malfunction of the computers, computer systems or networks. As a result of the examination of doctrinal opinions, relevant normative provisions and examples from national jurisprudence, one’s own view on the meaning of each of the notions that refer to the six modalities is proposed. During the investigation, the shortcomings that characterize the text of the criminal law are established and, as a result, solutions to remedy them are recommended.","PeriodicalId":30700,"journal":{"name":"Studia Universitatis Moldaviae Stiinte Sociale","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Studia Universitatis Moldaviae Stiinte Sociale","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.59295/sum3(163)2023_18","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The object of the investigation is represented by the six normative variants of the adjacent action from the composition of the prejudicial act provided in art. 259 of the Criminal Code of the Republic of Moldova: 1) destroying computerized information; 2) deteriorating computerized information; 3) changing computerized information; 4) blocking computerized information; 5) copying computerized information; 6) malfunction of the computers, computer systems or networks. As a result of the examination of doctrinal opinions, relevant normative provisions and examples from national jurisprudence, one’s own view on the meaning of each of the notions that refer to the six modalities is proposed. During the investigation, the shortcomings that characterize the text of the criminal law are established and, as a result, solutions to remedy them are recommended.