30.05.2013 Views

Islamic Republic of Iran: Computer Crimes Law

Islamic Republic of Iran: Computer Crimes Law

Islamic Republic of Iran: Computer Crimes Law

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Myroslava Gongadze (widow <strong>of</strong> Georgiy Gongadze) 14<br />

autonomy to determine which ideas they<br />

share, when they share them and with<br />

whom they share them. This sense <strong>of</strong><br />

security is fundamental to the functioning<br />

<strong>of</strong> developing and established democracies.<br />

The HR Committee has held that<br />

interceptions <strong>of</strong> private communications<br />

by Governments must be provided for by<br />

law, be in accordance with the provisions,<br />

aims and objectives <strong>of</strong> the Covenant and be<br />

reasonable in the particular circumstances<br />

<strong>of</strong> the case. 46 It would therefore be unlawful<br />

to employ surveillance and interception<br />

techniques to infringe on individual’s<br />

freedom <strong>of</strong> expression rights as guaranteed<br />

by Article 19 <strong>of</strong> the ICCPR.<br />

This concern is even more acute as ARTICLE<br />

19 is aware that the <strong>Iran</strong>ian Government<br />

systematically monitors and intercepts<br />

the communications <strong>of</strong> people within its<br />

jurisdiction, in violation <strong>of</strong> Article 17 <strong>of</strong><br />

the ICCPR and Article 19 <strong>of</strong> the ICCPR.<br />

For <strong>Iran</strong> this is necessary to enforce broad<br />

content-based restrictions on expression<br />

(see Chapters 4 and 5). To fully comply<br />

with its obligations under the ICCPR, <strong>Iran</strong><br />

must clarify the particulars <strong>of</strong> Article 2 and<br />

specify the limited circumstances in which<br />

public authorities can lawfully intercept<br />

communications with safeguards to prevent<br />

abuse.<br />

Article 2 provides for minimum custodial<br />

sentences and fines. Minimum sentences<br />

do not provide the sentencing judge<br />

with the discretion to modify sentences<br />

to proportionately reflect the nature <strong>of</strong><br />

the <strong>of</strong>fense, the harms caused and any<br />

mitigating factors.<br />

Article 3 <strong>of</strong> the Cyber Crime <strong>Law</strong>, under the<br />

heading <strong>of</strong> “<strong>Computer</strong> Espionage”, broadly<br />

criminalises access to and the sharing <strong>of</strong><br />

“confidential” governmental information.<br />

Three degrees <strong>of</strong> the <strong>of</strong>fense share the<br />

common principal act <strong>of</strong> “illegal access to<br />

confidential data, transmitted or saved, on<br />

computer and telecommunication systems.”<br />

Subparagraphs (a) provides principal<br />

liability for anyone who accesses or obtains<br />

confidential data, or spying on confidential<br />

content being transmitted. Subparagraphs<br />

(b) and (c) provide liability for individuals<br />

who make confidential data available<br />

to unauthorised individuals or foreign<br />

governments, organisations, companies or<br />

groups.<br />

Like previous articles, Article 3 <strong>of</strong> the Cyber<br />

Crime <strong>Law</strong> does not possess the qualities <strong>of</strong><br />

accessibility or certainty to be considered<br />

“prescribed by law” under Article 19(3)<br />

<strong>of</strong> the ICCPR. It again fails to define<br />

what the <strong>Computer</strong> <strong>Crimes</strong> <strong>Law</strong> means by<br />

23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!