Legal regulation of evidence in cybercrimes in UAE legislations
Keywords:
cybercrime, electronic fingerprint, evidence, legal regulation, UAE legislationAbstract
The study aims mainly to evaluate the legal regulation of evidence in cybercrime in the United Arab Emirates compared to the provisions of Islamic laws by explaining the concept of cybercrime, its types, elements, and ways to confront it. The study will examine the legal and judicial framework to combat cybercrime in the United Arab Emirates, and define the means, conditions, the evidentiary requirements of cybercrime in Islamic law and UAE legislation. The researcher has used the descriptive-analytical method in his research. The study concludes with several results. The most important of which is that cybercrime differs from its traditional counterpart in nature and methods of gathering evidence to prove it. The study also concludes that there are difficulties in proving electronic evidence, in addition to the fact that the UAE legislator did not provide for means of evidence for cybercrimes. The study also concludes with several recommendations. There is also a need to enact legislation that compels technical companies and social media platforms to ask users and customers to provide personal documents that prove their identities when registering on any platform on the Internet, these documents will serve as an "electronic fingerprint”.
Downloads
References
Abd al-Latif Rabiah, (2016) Electronic crimes (criminalization, prosecution, and evidence), research presented to the first conference of electronic crimes in Palestine. Held at An-Najah National University. Nablus.
Abeer Baqiqi (2018). Evidence in information crimes in Algerian law. Ph.D. thesis. Biskra University. Algeria
Ahmed Bahnasi (2000). Evidence theory in criminal jurisprudence, MA thesis. Naif Arab Academy for Security Sciences, Riyadh
Al-Tabib Al-Baraka. (2019): The Problem of Evidence in Cybercrime. Afaq Magazine, Volume 11. Number 1
Decree-by-Federal Law No. 3 of 2012 establishing the National Electronic Security Authority
Federal Law No. (12) of 2016 regarding combating information technology crimes
Federal Law No. (2) of 2006 regarding combating information crimes
Federal Law No. (5) of 2012 regarding combating cybercrime
Kamel Matar, Electronic Crime
Miftah Al-Matradi (2012). Electronic crime and overcoming its challenges. A working paper presented to the Third Conference of Presidents of Supreme Courts in the Arab Countries of the Republic of Sudan
Mohamed Hegazy: Computer and Internet Crimes (Information Crimes). The Egyptian Center for Intellectual Property
Mustafa Abdel Baqi (2018). Cybercrime investigation and Evidence. Journal of Sharia and Law Sciences. Volume 45 Issue 4.
Mustafa Al-Zuhaili Means of Evidence of Authentic Electronic Document, Al-Adl Magazine, Issue (32)
Rashid Ibrahim, Criminal Investigation of Information Technology Crimes, an applied study on the city of Abu Dhabi. Crisis Center for Studies and Research, Issue 131.
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.








