ILLEGAL ACCESS TO INFORMATION (ARTICLE 272 OF THE CRIMINAL CODE): CRIMINAL LAW CHARACTERISTICS AND SOME FEATURES OF THE INVESTIGATION
( Pp. 139-142)

More about authors
Kovtun Yuriy A. kandidat yuridicheskih nauk
Federal State Autonomous Educational Institution of Higher Education «Belgorod State National Research University» Rudov Denis Nikolaevich Cand.Sci.(Law), Associate Professor, Deputy Head of the Department of Criminal Procedure
Belgorod Law Institute of the Ministry of Internal Affairs of Russia named after I. D. Putilin
Belgorod, Russia Shevtsov R. M. kand. yurid. nauk, docent
Federal State Public Educational Establishment of Higher Training «Belgorod. Law Institute of Ministry of the Internal of the Russian Federation named after I.D. Putilin»
For read the full article, please, register or log in
Abstract:
The article gives the criminal legal description of the crime provided by article 272 of the criminal code (illegal access to information) and explores some of the features of its investigation.
How to Cite:
Kovtun Y.A., Rudov D.N., Shevtsov R.M., (2015), ILLEGAL ACCESS TO INFORMATION (ARTICLE 272 OF THE CRIMINAL CODE): CRIMINAL LAW CHARACTERISTICS AND SOME FEATURES OF THE INVESTIGATION. Business in Law, 2 => 139-142.
Reference list:
Dvoretskiy M.YU. Problemy tolkovaniya terminov pri kvalifikatsii prestupleniy po st. 272 ugolovnogo kodeksa RF. Vestnik Tambovskogo universiteta. Seriya: Gumanitarnye nauki. 2013. № 12.
Lyapunov YU.I. Otvetstvennost za komp yuternye prestupleniya. Zakonnost . - 1997. - № 1.
Rodivilin I.P. Problemy kvalifikatsii prestupleniy v sfere komp yuternoy informatsii, sovershaemykh s ispol zovaniem distantsionnogo upravleniya bankovskim schetom i ikh preduprezhdenie. Prolog. 2014. № 2.
Stepanov-Egiyants V. G. Sub ektivnaya storona komp yuternykh prestupleniy. Biznes v zakone. 2013. № 2.
Keywords:
The investigator, investigation, Bank Deposit, unauthorized access, computer information, subscriber number, theft.


Related Articles

7. Criminal procedure Pages: 190-194 Issue №4982
SEIZURE OF POSTAL AND TELEGRAPH ADMINISTRATION: ESSENCE, THE FOUNDATION, THE PROCEDURE AND THE PROBLEMATIC ASPECTS OF ITS PRODUCTION
the investigator investigation correspondence mystery correspondence
Show more
8. Forensics; Forensic expertise; Operational and search activities Pages: 220-224 Issue №3132
Admitted in the misinformation and investigation of crimes
misinformation mode of action tactic disclosure investigation
Show more
9. Criminal procedure Pages: 187-188 Issue №9149
Typical mistakes made by investigators during the investigative experiment
the investigator investigative errors investigative experiment criminal case
Show more
7. Criminal law, Criminal enforcement law, Criminology Pages: 186-189 Issue №4088
POWERS OF THE PUBLIC PROSECUTOR AT THE STAGE OF INSTITUTION OF THE CRIMINAL PROCEEDINGS
powers of attorney the message about the crime a criminal case the decree of the Prosecutor the Prosecutor
Show more
8. Forensics; Forensic expertise; Operational and search activities Pages: 174-177 Issue №4285
To a question about the kinds of subjects and combating crimes investigation
the opposition investigation proof trial
Show more
5. Criminal; Criminal enforcement law Pages: 178-181 Issue №3370
The history of Russian criminal law revolutionary period of liability for theft group
robbery theft fraud robbery complicity
Show more
10. FORENSICS; FORENSIC EXPERTISE; OPERATIONAL AND SEARCH ACTIVITIES (12.00.12) Pages: 250-256 Issue №18617
To the question of specificity of economic crimes in the railway construction
economic crimes in the construction industry documenting of economic crimes investigation operatively-search activity
Show more
11. Forensics; Forensic expertise; Operational and search activities Pages: 218-221 Issue №15895
ABOUT SOME MISTAKES MADE IN THE COURSE OF ESTABLISHING THE CIRCUMSTANCES OF THE UNKNOWN DISAPPEARANCE OF MINORS
missing person minor investigation investigator forensic investigator
Show more
5. Criminal; Criminal enforcement law Pages: 209-211 Issue №5584
The general characteristic of the crimes in the sphere of computer information
computer information computer crimes the object of the crime the objective side the subject of the crime
Show more
12. FORENSICS; FORENSIC EXPERTISE; OPERATIONAL AND SEARCH ACTIVITIES 12.00.12 Pages: 258-261 Issue №18348
On the need to improve the methodology for investigating fraud in the healthcare sector
health protection health care fraud investigation victim
Show more