Interception of electronic communications in the Czech Republic and Slovakia /:
Gespeichert in:
1. Verfasser: | |
---|---|
Körperschaft: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Brno :
Masaryk University,
2016.
|
Ausgabe: | First edition. |
Schriftenreihe: | Publications of the Masaryk University ;
file number 573 = Acta Universitatis Brunensis Iuridica ; vol. 573. Theoretical series. Scientia |
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Na obálce nad názvem: Masaryk University, Faculty of Law. |
Beschreibung: | 1 online resource (241 stran) |
Bibliographie: | Obsahuje bibliografii a bibliografické odkazy. |
ISBN: | 9788021086845 802108684X |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1006381082 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 171016s2016 xr ob 000 0 eng d | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d N$T |d OCLCF |d YDX |d SNK |d DKU |d BTN |d IGB |d EBLCP |d D6H |d OCLCA |d VTS |d AGLDB |d G3B |d S8J |d S9I |d STF |d M8D |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 1007921984 | ||
020 | |a 9788021086845 |q (electronic bk.) | ||
020 | |a 802108684X |q (electronic bk.) | ||
020 | |z 9788021084230 | ||
020 | |z 8021084235 | ||
035 | |a (OCoLC)1006381082 |z (OCoLC)1007921984 | ||
043 | |a e-xr--- |a e-xo--- | ||
050 | 4 | |a KJP5407.8.C65 | |
072 | 7 | |a LAW |x 068000 |2 bisacsh | |
080 | |a 316.772:004.738.5 | ||
080 | |a 351.817 | ||
080 | |a (437.3) | ||
080 | |a (437.6) | ||
080 | |a (048.8:082) | ||
082 | 7 | |a 343.09944 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Polčák, Radim, |d 1978- |1 https://id.oclc.org/worldcat/entity/E39PBJfmthMByybWRDBmWdXDbd |0 http://id.loc.gov/authorities/names/no2011025954 | |
245 | 1 | 0 | |a Interception of electronic communications in the Czech Republic and Slovakia / |c Radim Polčák et al. |
250 | |a First edition. | ||
264 | 1 | |a Brno : |b Masaryk University, |c 2016. | |
300 | |a 1 online resource (241 stran) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Publications of the Masaryk University ; |v file number 573 = Acta Universitatis Brunensis Iuridica ; vol. 573. Theoretical series. Scientia | |
500 | |a Na obálce nad názvem: Masaryk University, Faculty of Law. | ||
504 | |a Obsahuje bibliografii a bibliografické odkazy. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Intro -- Table of Contents -- 1 Security Architecture and the Interceptionof Telecommunication -- 1.1 National Security Architecture -- Two Frameworks of Interception -- 1.2 Powers for interception of telecommunication -- Legislative grounds -- 1.2.1 The law of criminal procedure -- 1.2.2 Law of intelligence agencies -- 1.2.3 Financial and Customs Investigation Service -- 1.3 Responsibility for the technical performance of interception measures -- a general overview -- 1.4 Legitimacy of data transfers between different security services -- 1.5 Statistics on Telecommunication Interception | |
505 | 8 | |a 2 Constitutional and Statutory Safeguards of Telecommunications -- 2.1 Areas of constitutional protection -- 2.2 Proportionality of access to data -- 2.2.1 Secrecy of telecommunications -- 2.2.2 Secrecy of retained traffic data -- 2.2.3 Secrecy of information systems -- 2.3 Statutory consequences of constitutional protection -- 2.3.1 Protection of the secrecy of telecommunications -- 2.3.2 Protection of the confidentiality and integrity of information systems -- 2.3.3 Protection of the core area of privacy -- 2.3.4 Criminal liability for the unlawful infringement of the telecommunication secrecy | |
505 | 8 | |a 2.3.5 Protection of professional secrets in criminal procedural law -- 2.3.6 The principle of the "purpose limitation of personal data" -- 3 Powers for Accessing Telecommunication Data -- 3.1 Overview -- 3.2 Requirement of (reasonable) clarity for powers in the law of criminal procedure -- 3.3 Differentiation and classification of powers in the law of criminal procedure -- 4 Interception of Content Data -- 4.1 Object of interception -- 4.2 Special protection of confidential communication content -- 4.3 Execution of telecommunication interception | |
505 | 8 | |a 4.4 Duties of telecommunication service providers to cooperate -- 4.5 Formal prerequisites of interception orders -- 4.6 Substantive prerequisites of interception orders -- 4.7 Consent by a communication participant to the measure -- 4.8 Duties to record, report, and destroy -- 4.9 Notification duties and remedies -- 4.10 Confidentiality requirements -- 5 Collection and Use of Traffic and Subscriber Data -- 5.1 Collection of traffic data -- 5.2 Collection of subscriber data -- 5.3 "Data retention" -- 6 Access to (Temporarily) Stored Communication Data | |
505 | 8 | |a 6.1 Online searches with the help of remote forensic software -- 6.2 Search and seizure of stored communication data -- 6.3 Duties to cooperate: production and decryption orders -- 7 Use of Electronic Communicati on Data in Judicial Proceedings -- 7.1 Use of electronic communication data in the law of criminal procedure -- 7.2 Inadmissibility of evidence as a consequence of inappropriate collection -- 7.3 Use of data outside the main proceedings -- 7.3.1 Data from other criminal investigations -- 7.3.2 Data from preventive investigations -- 7.3.3 Data from foreign jurisdictions | |
650 | 0 | |a Computer networks |x Access control |z Czech Republic. | |
650 | 0 | |a Computer networks |x Access control |z Slovakia. | |
650 | 0 | |a Data protection |z Czech Republic. | |
650 | 0 | |a Data protection |z Slovakia. | |
650 | 6 | |a Protection de l'information (Informatique) |z République tchèque. | |
650 | 6 | |a Protection de l'information (Informatique) |z Slovaquie. | |
650 | 7 | |a LAW |x Military. |2 bisacsh | |
650 | 0 | 7 | |a elektronická komunikace |z Česko. |2 czenas |
650 | 0 | 7 | |a elektronická komunikace |z Slovensko. |2 czenas |
650 | 0 | 7 | |a elektronická komunikace |x právní aspekty. |2 czenas |
650 | 0 | 7 | |a electronic communication |z Czechia. |2 czenas |
650 | 0 | 7 | |a electronic communication |z Slovakia. |2 czenas |
650 | 0 | 7 | |a electronic communication |x legal aspects. |2 czenas |
650 | 7 | |a Computer networks |x Access control |2 fast | |
650 | 7 | |a Data protection |2 fast | |
651 | 7 | |a Czech Republic |2 fast |1 https://id.oclc.org/worldcat/entity/E39QbtfRpXBb3PtYpdKGBBHGQY | |
651 | 7 | |a Slovakia |2 fast |1 https://id.oclc.org/worldcat/entity/E39PBJkXtrVWwTxQXgBkqKGvHC | |
655 | 7 | |a Kolektivní monografie. |2 czenas | |
655 | 7 | |a Collective monographs. |2 czenas | |
710 | 2 | |a Masarykova univerzita. |b Právnická fakulta. | |
758 | |i has work: |a Interception of electronic communications in the Czech Republic and Slovakia (Text) |1 https://id.oclc.org/worldcat/entity/E39PCG6txQMC94R4JvrcwXqJDq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Polčák, Radim, 1978- |t Interception of electronic communications in the Czech Republic and Slovakia. |b First edition. |d Brno : Masaryk University, 2016 |z 9788021084230 |w (OCoLC)990162746 |
810 | 2 | |a Masarykova univerzita. |b Právnická fakulta. |t Spisy. |p Řada teoretická. |p Scientia. | |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1606027 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1606027 |3 Volltext | |
938 | |a ProQuest Ebook Central |b EBLB |n EBL6421710 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL5320684 | ||
938 | |a EBSCOhost |b EBSC |n 1606027 | ||
938 | |a YBP Library Services |b YANK |n 14932791 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1006381082 |
---|---|
_version_ | 1813903772834856960 |
adam_text | |
any_adam_object | |
author | Polčák, Radim, 1978- |
author_GND | http://id.loc.gov/authorities/names/no2011025954 |
author_corporate | Masarykova univerzita. Právnická fakulta |
author_corporate_role | |
author_facet | Polčák, Radim, 1978- Masarykova univerzita. Právnická fakulta |
author_role | |
author_sort | Polčák, Radim, 1978- |
author_variant | r p rp |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | K - Law |
callnumber-label | KJP5407 |
callnumber-raw | KJP5407.8.C65 |
callnumber-search | KJP5407.8.C65 |
callnumber-sort | KJP 45407.8 C65 |
collection | ZDB-4-EBA |
contents | Intro -- Table of Contents -- 1 Security Architecture and the Interceptionof Telecommunication -- 1.1 National Security Architecture -- Two Frameworks of Interception -- 1.2 Powers for interception of telecommunication -- Legislative grounds -- 1.2.1 The law of criminal procedure -- 1.2.2 Law of intelligence agencies -- 1.2.3 Financial and Customs Investigation Service -- 1.3 Responsibility for the technical performance of interception measures -- a general overview -- 1.4 Legitimacy of data transfers between different security services -- 1.5 Statistics on Telecommunication Interception 2 Constitutional and Statutory Safeguards of Telecommunications -- 2.1 Areas of constitutional protection -- 2.2 Proportionality of access to data -- 2.2.1 Secrecy of telecommunications -- 2.2.2 Secrecy of retained traffic data -- 2.2.3 Secrecy of information systems -- 2.3 Statutory consequences of constitutional protection -- 2.3.1 Protection of the secrecy of telecommunications -- 2.3.2 Protection of the confidentiality and integrity of information systems -- 2.3.3 Protection of the core area of privacy -- 2.3.4 Criminal liability for the unlawful infringement of the telecommunication secrecy 2.3.5 Protection of professional secrets in criminal procedural law -- 2.3.6 The principle of the "purpose limitation of personal data" -- 3 Powers for Accessing Telecommunication Data -- 3.1 Overview -- 3.2 Requirement of (reasonable) clarity for powers in the law of criminal procedure -- 3.3 Differentiation and classification of powers in the law of criminal procedure -- 4 Interception of Content Data -- 4.1 Object of interception -- 4.2 Special protection of confidential communication content -- 4.3 Execution of telecommunication interception 4.4 Duties of telecommunication service providers to cooperate -- 4.5 Formal prerequisites of interception orders -- 4.6 Substantive prerequisites of interception orders -- 4.7 Consent by a communication participant to the measure -- 4.8 Duties to record, report, and destroy -- 4.9 Notification duties and remedies -- 4.10 Confidentiality requirements -- 5 Collection and Use of Traffic and Subscriber Data -- 5.1 Collection of traffic data -- 5.2 Collection of subscriber data -- 5.3 "Data retention" -- 6 Access to (Temporarily) Stored Communication Data 6.1 Online searches with the help of remote forensic software -- 6.2 Search and seizure of stored communication data -- 6.3 Duties to cooperate: production and decryption orders -- 7 Use of Electronic Communicati on Data in Judicial Proceedings -- 7.1 Use of electronic communication data in the law of criminal procedure -- 7.2 Inadmissibility of evidence as a consequence of inappropriate collection -- 7.3 Use of data outside the main proceedings -- 7.3.1 Data from other criminal investigations -- 7.3.2 Data from preventive investigations -- 7.3.3 Data from foreign jurisdictions |
ctrlnum | (OCoLC)1006381082 |
dewey-full | 343.09944 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 343 - Military, tax, trade & industrial law |
dewey-raw | 343.09944 |
dewey-search | 343.09944 |
dewey-sort | 3343.09944 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06860cam a2200853 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1006381082</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">171016s2016 xr ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCF</subfield><subfield code="d">YDX</subfield><subfield code="d">SNK</subfield><subfield code="d">DKU</subfield><subfield code="d">BTN</subfield><subfield code="d">IGB</subfield><subfield code="d">EBLCP</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCA</subfield><subfield code="d">VTS</subfield><subfield code="d">AGLDB</subfield><subfield code="d">G3B</subfield><subfield code="d">S8J</subfield><subfield code="d">S9I</subfield><subfield code="d">STF</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1007921984</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9788021086845</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">802108684X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9788021084230</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">8021084235</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1006381082</subfield><subfield code="z">(OCoLC)1007921984</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">e-xr---</subfield><subfield code="a">e-xo---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">KJP5407.8.C65</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">LAW</subfield><subfield code="x">068000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="080" ind1=" " ind2=" "><subfield code="a">316.772:004.738.5</subfield></datafield><datafield tag="080" ind1=" " ind2=" "><subfield code="a">351.817</subfield></datafield><datafield tag="080" ind1=" " ind2=" "><subfield code="a">(437.3)</subfield></datafield><datafield tag="080" ind1=" " ind2=" "><subfield code="a">(437.6)</subfield></datafield><datafield tag="080" ind1=" " ind2=" "><subfield code="a">(048.8:082)</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">343.09944</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Polčák, Radim,</subfield><subfield code="d">1978-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJfmthMByybWRDBmWdXDbd</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2011025954</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Interception of electronic communications in the Czech Republic and Slovakia /</subfield><subfield code="c">Radim Polčák et al.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Brno :</subfield><subfield code="b">Masaryk University,</subfield><subfield code="c">2016.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (241 stran)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Publications of the Masaryk University ;</subfield><subfield code="v">file number 573 = Acta Universitatis Brunensis Iuridica ; vol. 573. Theoretical series. Scientia</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Na obálce nad názvem: Masaryk University, Faculty of Law.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Obsahuje bibliografii a bibliografické odkazy.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Table of Contents -- 1 Security Architecture and the Interceptionof Telecommunication -- 1.1 National Security Architecture -- Two Frameworks of Interception -- 1.2 Powers for interception of telecommunication -- Legislative grounds -- 1.2.1 The law of criminal procedure -- 1.2.2 Law of intelligence agencies -- 1.2.3 Financial and Customs Investigation Service -- 1.3 Responsibility for the technical performance of interception measures -- a general overview -- 1.4 Legitimacy of data transfers between different security services -- 1.5 Statistics on Telecommunication Interception</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2 Constitutional and Statutory Safeguards of Telecommunications -- 2.1 Areas of constitutional protection -- 2.2 Proportionality of access to data -- 2.2.1 Secrecy of telecommunications -- 2.2.2 Secrecy of retained traffic data -- 2.2.3 Secrecy of information systems -- 2.3 Statutory consequences of constitutional protection -- 2.3.1 Protection of the secrecy of telecommunications -- 2.3.2 Protection of the confidentiality and integrity of information systems -- 2.3.3 Protection of the core area of privacy -- 2.3.4 Criminal liability for the unlawful infringement of the telecommunication secrecy</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.3.5 Protection of professional secrets in criminal procedural law -- 2.3.6 The principle of the "purpose limitation of personal data" -- 3 Powers for Accessing Telecommunication Data -- 3.1 Overview -- 3.2 Requirement of (reasonable) clarity for powers in the law of criminal procedure -- 3.3 Differentiation and classification of powers in the law of criminal procedure -- 4 Interception of Content Data -- 4.1 Object of interception -- 4.2 Special protection of confidential communication content -- 4.3 Execution of telecommunication interception</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.4 Duties of telecommunication service providers to cooperate -- 4.5 Formal prerequisites of interception orders -- 4.6 Substantive prerequisites of interception orders -- 4.7 Consent by a communication participant to the measure -- 4.8 Duties to record, report, and destroy -- 4.9 Notification duties and remedies -- 4.10 Confidentiality requirements -- 5 Collection and Use of Traffic and Subscriber Data -- 5.1 Collection of traffic data -- 5.2 Collection of subscriber data -- 5.3 "Data retention" -- 6 Access to (Temporarily) Stored Communication Data</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">6.1 Online searches with the help of remote forensic software -- 6.2 Search and seizure of stored communication data -- 6.3 Duties to cooperate: production and decryption orders -- 7 Use of Electronic Communicati on Data in Judicial Proceedings -- 7.1 Use of electronic communication data in the law of criminal procedure -- 7.2 Inadmissibility of evidence as a consequence of inappropriate collection -- 7.3 Use of data outside the main proceedings -- 7.3.1 Data from other criminal investigations -- 7.3.2 Data from preventive investigations -- 7.3.3 Data from foreign jurisdictions</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield><subfield code="z">Czech Republic.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield><subfield code="z">Slovakia.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield><subfield code="z">Czech Republic.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield><subfield code="z">Slovakia.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield><subfield code="z">République tchèque.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield><subfield code="z">Slovaquie.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW</subfield><subfield code="x">Military.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">elektronická komunikace</subfield><subfield code="z">Česko.</subfield><subfield code="2">czenas</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">elektronická komunikace</subfield><subfield code="z">Slovensko.</subfield><subfield code="2">czenas</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">elektronická komunikace</subfield><subfield code="x">právní aspekty.</subfield><subfield code="2">czenas</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">electronic communication</subfield><subfield code="z">Czechia.</subfield><subfield code="2">czenas</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">electronic communication</subfield><subfield code="z">Slovakia.</subfield><subfield code="2">czenas</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">electronic communication</subfield><subfield code="x">legal aspects.</subfield><subfield code="2">czenas</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Czech Republic</subfield><subfield code="2">fast</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39QbtfRpXBb3PtYpdKGBBHGQY</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Slovakia</subfield><subfield code="2">fast</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJkXtrVWwTxQXgBkqKGvHC</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Kolektivní monografie.</subfield><subfield code="2">czenas</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Collective monographs.</subfield><subfield code="2">czenas</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Masarykova univerzita.</subfield><subfield code="b">Právnická fakulta.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Interception of electronic communications in the Czech Republic and Slovakia (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCG6txQMC94R4JvrcwXqJDq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Polčák, Radim, 1978-</subfield><subfield code="t">Interception of electronic communications in the Czech Republic and Slovakia.</subfield><subfield code="b">First edition.</subfield><subfield code="d">Brno : Masaryk University, 2016</subfield><subfield code="z">9788021084230</subfield><subfield code="w">(OCoLC)990162746</subfield></datafield><datafield tag="810" ind1="2" ind2=" "><subfield code="a">Masarykova univerzita.</subfield><subfield code="b">Právnická fakulta.</subfield><subfield code="t">Spisy.</subfield><subfield code="p">Řada teoretická.</subfield><subfield code="p">Scientia.</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1606027</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1606027</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6421710</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL5320684</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1606027</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">14932791</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield></record></collection> |
genre | Kolektivní monografie. czenas Collective monographs. czenas |
genre_facet | Kolektivní monografie. Collective monographs. |
geographic | Czech Republic fast https://id.oclc.org/worldcat/entity/E39QbtfRpXBb3PtYpdKGBBHGQY Slovakia fast https://id.oclc.org/worldcat/entity/E39PBJkXtrVWwTxQXgBkqKGvHC |
geographic_facet | Czech Republic Slovakia |
id | ZDB-4-EBA-on1006381082 |
illustrated | Not Illustrated |
indexdate | 2024-10-25T16:24:00Z |
institution | BVB |
isbn | 9788021086845 802108684X |
language | English |
oclc_num | 1006381082 |
open_access_boolean | |
owner | MAIN |
owner_facet | MAIN |
physical | 1 online resource (241 stran) |
psigel | ZDB-4-EBA |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Masaryk University, |
record_format | marc |
series2 | Publications of the Masaryk University ; |
spelling | Polčák, Radim, 1978- https://id.oclc.org/worldcat/entity/E39PBJfmthMByybWRDBmWdXDbd http://id.loc.gov/authorities/names/no2011025954 Interception of electronic communications in the Czech Republic and Slovakia / Radim Polčák et al. First edition. Brno : Masaryk University, 2016. 1 online resource (241 stran) text txt rdacontent computer c rdamedia online resource cr rdacarrier Publications of the Masaryk University ; file number 573 = Acta Universitatis Brunensis Iuridica ; vol. 573. Theoretical series. Scientia Na obálce nad názvem: Masaryk University, Faculty of Law. Obsahuje bibliografii a bibliografické odkazy. Print version record. Intro -- Table of Contents -- 1 Security Architecture and the Interceptionof Telecommunication -- 1.1 National Security Architecture -- Two Frameworks of Interception -- 1.2 Powers for interception of telecommunication -- Legislative grounds -- 1.2.1 The law of criminal procedure -- 1.2.2 Law of intelligence agencies -- 1.2.3 Financial and Customs Investigation Service -- 1.3 Responsibility for the technical performance of interception measures -- a general overview -- 1.4 Legitimacy of data transfers between different security services -- 1.5 Statistics on Telecommunication Interception 2 Constitutional and Statutory Safeguards of Telecommunications -- 2.1 Areas of constitutional protection -- 2.2 Proportionality of access to data -- 2.2.1 Secrecy of telecommunications -- 2.2.2 Secrecy of retained traffic data -- 2.2.3 Secrecy of information systems -- 2.3 Statutory consequences of constitutional protection -- 2.3.1 Protection of the secrecy of telecommunications -- 2.3.2 Protection of the confidentiality and integrity of information systems -- 2.3.3 Protection of the core area of privacy -- 2.3.4 Criminal liability for the unlawful infringement of the telecommunication secrecy 2.3.5 Protection of professional secrets in criminal procedural law -- 2.3.6 The principle of the "purpose limitation of personal data" -- 3 Powers for Accessing Telecommunication Data -- 3.1 Overview -- 3.2 Requirement of (reasonable) clarity for powers in the law of criminal procedure -- 3.3 Differentiation and classification of powers in the law of criminal procedure -- 4 Interception of Content Data -- 4.1 Object of interception -- 4.2 Special protection of confidential communication content -- 4.3 Execution of telecommunication interception 4.4 Duties of telecommunication service providers to cooperate -- 4.5 Formal prerequisites of interception orders -- 4.6 Substantive prerequisites of interception orders -- 4.7 Consent by a communication participant to the measure -- 4.8 Duties to record, report, and destroy -- 4.9 Notification duties and remedies -- 4.10 Confidentiality requirements -- 5 Collection and Use of Traffic and Subscriber Data -- 5.1 Collection of traffic data -- 5.2 Collection of subscriber data -- 5.3 "Data retention" -- 6 Access to (Temporarily) Stored Communication Data 6.1 Online searches with the help of remote forensic software -- 6.2 Search and seizure of stored communication data -- 6.3 Duties to cooperate: production and decryption orders -- 7 Use of Electronic Communicati on Data in Judicial Proceedings -- 7.1 Use of electronic communication data in the law of criminal procedure -- 7.2 Inadmissibility of evidence as a consequence of inappropriate collection -- 7.3 Use of data outside the main proceedings -- 7.3.1 Data from other criminal investigations -- 7.3.2 Data from preventive investigations -- 7.3.3 Data from foreign jurisdictions Computer networks Access control Czech Republic. Computer networks Access control Slovakia. Data protection Czech Republic. Data protection Slovakia. Protection de l'information (Informatique) République tchèque. Protection de l'information (Informatique) Slovaquie. LAW Military. bisacsh elektronická komunikace Česko. czenas elektronická komunikace Slovensko. czenas elektronická komunikace právní aspekty. czenas electronic communication Czechia. czenas electronic communication Slovakia. czenas electronic communication legal aspects. czenas Computer networks Access control fast Data protection fast Czech Republic fast https://id.oclc.org/worldcat/entity/E39QbtfRpXBb3PtYpdKGBBHGQY Slovakia fast https://id.oclc.org/worldcat/entity/E39PBJkXtrVWwTxQXgBkqKGvHC Kolektivní monografie. czenas Collective monographs. czenas Masarykova univerzita. Právnická fakulta. has work: Interception of electronic communications in the Czech Republic and Slovakia (Text) https://id.oclc.org/worldcat/entity/E39PCG6txQMC94R4JvrcwXqJDq https://id.oclc.org/worldcat/ontology/hasWork Print version: Polčák, Radim, 1978- Interception of electronic communications in the Czech Republic and Slovakia. First edition. Brno : Masaryk University, 2016 9788021084230 (OCoLC)990162746 Masarykova univerzita. Právnická fakulta. Spisy. Řada teoretická. Scientia. FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1606027 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1606027 Volltext |
spellingShingle | Polčák, Radim, 1978- Interception of electronic communications in the Czech Republic and Slovakia / Intro -- Table of Contents -- 1 Security Architecture and the Interceptionof Telecommunication -- 1.1 National Security Architecture -- Two Frameworks of Interception -- 1.2 Powers for interception of telecommunication -- Legislative grounds -- 1.2.1 The law of criminal procedure -- 1.2.2 Law of intelligence agencies -- 1.2.3 Financial and Customs Investigation Service -- 1.3 Responsibility for the technical performance of interception measures -- a general overview -- 1.4 Legitimacy of data transfers between different security services -- 1.5 Statistics on Telecommunication Interception 2 Constitutional and Statutory Safeguards of Telecommunications -- 2.1 Areas of constitutional protection -- 2.2 Proportionality of access to data -- 2.2.1 Secrecy of telecommunications -- 2.2.2 Secrecy of retained traffic data -- 2.2.3 Secrecy of information systems -- 2.3 Statutory consequences of constitutional protection -- 2.3.1 Protection of the secrecy of telecommunications -- 2.3.2 Protection of the confidentiality and integrity of information systems -- 2.3.3 Protection of the core area of privacy -- 2.3.4 Criminal liability for the unlawful infringement of the telecommunication secrecy 2.3.5 Protection of professional secrets in criminal procedural law -- 2.3.6 The principle of the "purpose limitation of personal data" -- 3 Powers for Accessing Telecommunication Data -- 3.1 Overview -- 3.2 Requirement of (reasonable) clarity for powers in the law of criminal procedure -- 3.3 Differentiation and classification of powers in the law of criminal procedure -- 4 Interception of Content Data -- 4.1 Object of interception -- 4.2 Special protection of confidential communication content -- 4.3 Execution of telecommunication interception 4.4 Duties of telecommunication service providers to cooperate -- 4.5 Formal prerequisites of interception orders -- 4.6 Substantive prerequisites of interception orders -- 4.7 Consent by a communication participant to the measure -- 4.8 Duties to record, report, and destroy -- 4.9 Notification duties and remedies -- 4.10 Confidentiality requirements -- 5 Collection and Use of Traffic and Subscriber Data -- 5.1 Collection of traffic data -- 5.2 Collection of subscriber data -- 5.3 "Data retention" -- 6 Access to (Temporarily) Stored Communication Data 6.1 Online searches with the help of remote forensic software -- 6.2 Search and seizure of stored communication data -- 6.3 Duties to cooperate: production and decryption orders -- 7 Use of Electronic Communicati on Data in Judicial Proceedings -- 7.1 Use of electronic communication data in the law of criminal procedure -- 7.2 Inadmissibility of evidence as a consequence of inappropriate collection -- 7.3 Use of data outside the main proceedings -- 7.3.1 Data from other criminal investigations -- 7.3.2 Data from preventive investigations -- 7.3.3 Data from foreign jurisdictions Computer networks Access control Czech Republic. Computer networks Access control Slovakia. Data protection Czech Republic. Data protection Slovakia. Protection de l'information (Informatique) République tchèque. Protection de l'information (Informatique) Slovaquie. LAW Military. bisacsh elektronická komunikace Česko. czenas elektronická komunikace Slovensko. czenas elektronická komunikace právní aspekty. czenas electronic communication Czechia. czenas electronic communication Slovakia. czenas electronic communication legal aspects. czenas Computer networks Access control fast Data protection fast |
title | Interception of electronic communications in the Czech Republic and Slovakia / |
title_auth | Interception of electronic communications in the Czech Republic and Slovakia / |
title_exact_search | Interception of electronic communications in the Czech Republic and Slovakia / |
title_full | Interception of electronic communications in the Czech Republic and Slovakia / Radim Polčák et al. |
title_fullStr | Interception of electronic communications in the Czech Republic and Slovakia / Radim Polčák et al. |
title_full_unstemmed | Interception of electronic communications in the Czech Republic and Slovakia / Radim Polčák et al. |
title_short | Interception of electronic communications in the Czech Republic and Slovakia / |
title_sort | interception of electronic communications in the czech republic and slovakia |
topic | Computer networks Access control Czech Republic. Computer networks Access control Slovakia. Data protection Czech Republic. Data protection Slovakia. Protection de l'information (Informatique) République tchèque. Protection de l'information (Informatique) Slovaquie. LAW Military. bisacsh elektronická komunikace Česko. czenas elektronická komunikace Slovensko. czenas elektronická komunikace právní aspekty. czenas electronic communication Czechia. czenas electronic communication Slovakia. czenas electronic communication legal aspects. czenas Computer networks Access control fast Data protection fast |
topic_facet | Computer networks Access control Czech Republic. Computer networks Access control Slovakia. Data protection Czech Republic. Data protection Slovakia. Protection de l'information (Informatique) République tchèque. Protection de l'information (Informatique) Slovaquie. LAW Military. elektronická komunikace Česko. elektronická komunikace Slovensko. elektronická komunikace právní aspekty. electronic communication Czechia. electronic communication Slovakia. electronic communication legal aspects. Computer networks Access control Data protection Czech Republic Slovakia Kolektivní monografie. Collective monographs. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1606027 |
work_keys_str_mv | AT polcakradim interceptionofelectroniccommunicationsintheczechrepublicandslovakia AT masarykovauniverzitapravnickafakulta interceptionofelectroniccommunicationsintheczechrepublicandslovakia |