09.02.2015 Views

The evolution of European Union criminal law (1957-2012)

The evolution of European Union criminal law (1957-2012)

The evolution of European Union criminal law (1957-2012)

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Italy and Slovenia, on the other hand, only <strong>criminal</strong>ised hacking when the system was<br />

protected by security measures, a condition not required by the Framework Decision. In<br />

addition, Greece did not <strong>criminal</strong>ise the illegal interference with data, whereas the<br />

United Kingdom, Belgium, Spain and Finland <strong>criminal</strong>ised only the alteration,<br />

damaging or deterioration <strong>of</strong> computer data, 636 but not the deletion, suppression or<br />

rendering inaccessible <strong>of</strong> the same data, as required by the Article 4 <strong>of</strong> Framework<br />

Decision. Finally, the Danish <strong>criminal</strong> code was extended in order to also <strong>criminal</strong>ise<br />

invasion <strong>of</strong> privacy and damage to property in a “systematic or organised” manner,<br />

whereas Finland extended the cases to be considered <strong>of</strong> serious damaged to property. 637<br />

Furthermore, the Framework Decision on combating fraud and counterfeiting <strong>of</strong> noncash<br />

means <strong>of</strong> payment required the <strong>criminal</strong>isation, at least in relation to credit cards,<br />

Euro-cheque cards, other cards issued by financial institutions, travellers’ cheques,<br />

Euro-cheques and bills <strong>of</strong> exchange <strong>of</strong> the<br />

“theft or other un<strong>law</strong>ful appropriation <strong>of</strong> payment instruments”, <strong>of</strong> “the counterfeiting<br />

or falsification <strong>of</strong> payment instrument in order for it to be used fraudulently”, <strong>of</strong> the<br />

“receiving, obtaining, transporting, sale or transfer to another person or possession <strong>of</strong><br />

a stolen or otherwise un<strong>law</strong>fully appropriated, or a counterfeiting or falsified payment<br />

instrument in order for it to be used fraudulently”, and <strong>of</strong> “the fraudulent use <strong>of</strong> a<br />

stolen or otherwise un<strong>law</strong>fully appropriated or <strong>of</strong> a counterfeited or falsified<br />

payment.” 638<br />

Performing these same acts intentionally, without right “introducing, altering, deleting<br />

or suppressing computer data” by interfering with the functioning <strong>of</strong> a computer<br />

programme or system, 639 or the fraudulent making, receiving, obtaining, sale or transfer<br />

to another person or possession <strong>of</strong> “instruments, articles, computer programmes and<br />

any other means peculiarly adapted for the commission <strong>of</strong> the previous referred<br />

<strong>of</strong>fences” were also specified as matters which should be considered a <strong>criminal</strong><br />

<strong>of</strong>fence. 640<br />

Sanction Penales en Europe, vol.5 (Paris: Societe de Legislation Compare, Unite Mixte de<br />

recherché de Droit Compare de Paris, 2003) 353, 355-356.<br />

636 Idem.<br />

637 T. Elholm, “Does EU Criminal Cooperation Necessarily Mean Increased Repression” (2009)<br />

17 <strong>European</strong> Journal <strong>of</strong> Crime, Criminal Law and Criminal Justice 191, 201.<br />

638 Article 2 <strong>of</strong> the Framework Decision 2001/413/JHA, supra note 411.<br />

639 Article 3, ibid..<br />

640 Article 4, ibid..<br />

170

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!