五眼之一的加密法律法规:以新西兰为例

IF 1.8 Q1 LAW
M. Dizon, Philip McHugh
{"title":"五眼之一的加密法律法规:以新西兰为例","authors":"M. Dizon, Philip McHugh","doi":"10.1080/13600834.2021.1988321","DOIUrl":null,"url":null,"abstract":"ABSTRACT This article examines the laws that apply to encryption in New Zealand. Specifically, it analyses the different types of law that constitute an encryption legal framework in the country, namely: export control, substantive cybercrime, criminal procedure, human rights, and information security and data protection. The article then utilises the encryption laws and legal framework to evaluate a proposal by the Five Eyes intelligence alliance to regulate the use of end-to-end encryption in messaging services. The article concludes that the proposal is incompatible with the country's encryption legal framework.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":null,"pages":null},"PeriodicalIF":1.8000,"publicationDate":"2021-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Encryption laws and regulations in one of the Five Eyes: the case of New Zealand\",\"authors\":\"M. Dizon, Philip McHugh\",\"doi\":\"10.1080/13600834.2021.1988321\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ABSTRACT This article examines the laws that apply to encryption in New Zealand. Specifically, it analyses the different types of law that constitute an encryption legal framework in the country, namely: export control, substantive cybercrime, criminal procedure, human rights, and information security and data protection. The article then utilises the encryption laws and legal framework to evaluate a proposal by the Five Eyes intelligence alliance to regulate the use of end-to-end encryption in messaging services. The article concludes that the proposal is incompatible with the country's encryption legal framework.\",\"PeriodicalId\":44342,\"journal\":{\"name\":\"Information & Communications Technology Law\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.8000,\"publicationDate\":\"2021-10-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information & Communications Technology Law\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/13600834.2021.1988321\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"LAW\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information & Communications Technology Law","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/13600834.2021.1988321","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"LAW","Score":null,"Total":0}
引用次数: 0

摘要

本文探讨了适用于新西兰加密的法律。具体来说,它分析了构成该国加密法律框架的不同类型的法律,即:出口管制、实质性网络犯罪、刑事诉讼、人权、信息安全和数据保护。然后,本文利用加密法律和法律框架来评估五眼情报联盟提出的一项提案,该提案旨在规范消息服务中端到端加密的使用。文章的结论是,该提案与该国的加密法律框架不相容。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Encryption laws and regulations in one of the Five Eyes: the case of New Zealand
ABSTRACT This article examines the laws that apply to encryption in New Zealand. Specifically, it analyses the different types of law that constitute an encryption legal framework in the country, namely: export control, substantive cybercrime, criminal procedure, human rights, and information security and data protection. The article then utilises the encryption laws and legal framework to evaluate a proposal by the Five Eyes intelligence alliance to regulate the use of end-to-end encryption in messaging services. The article concludes that the proposal is incompatible with the country's encryption legal framework.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
3.10
自引率
0.00%
发文量
17
期刊介绍: The last decade has seen the introduction of computers and information technology at many levels of human transaction. Information technology (IT) is now used for data collation, in daily commercial transactions like transfer of funds, conclusion of contract, and complex diagnostic purposes in fields such as law, medicine and transport. The use of IT has expanded rapidly with the introduction of multimedia and the Internet. Any new technology inevitably raises a number of questions ranging from the legal to the ethical and the social. Information & Communications Technology Law covers topics such as: the implications of IT for legal processes and legal decision-making and related ethical and social issues.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信