Repository of colleges and higher education institutions

Show document
A+ | A- | Help | SLO | ENG

Title:Nadzor elektronskih komunikacij in zasebnost : magistrsko delo
Authors:ID Zepič, Urban (Author)
ID Letnar Černič, Jernej (Mentor) More about this mentor... New window
Files:.pdf RAZ_Zepic_Urban_i2016.pdf (1,19 MB)
MD5: D23E39837670AD189D212EFF48EEB913
 
Language:Slovenian
Work type:Master's thesis/paper
Typology:2.09 - Master's Thesis
Organization:FDŠ - Nova Univerza - The Graduate School of Government and European Studies
Abstract:Magistrsko delo obravnava aktualni problem policije, s katerim se preiskovalci soočajo pri izvajanju prikritega policijskega ukrepa, nadzor elektronskih komunikacij, ko osumljenci za komunikacijo začnejo uporabljati spletne aplikacije, ki omogočajo šifrirano komunikacijo. V delu posebej poudarjamo korelacijo izvajanja nadzora elektronskih komunikacij s prisluškovanjem in snemanjem ter zavarovanje dokazov v vseh oblikah komuniciranja, ki se prenašajo v elektronskem komunikacijskem omrežju iz 1. točke I. odstavka 150. člena ZKP z ustavno zagotovljeno človekovo pravico do zasebnosti. Poseben poudarek dajemo nadgradnji klasičnega nadzora elektronskih komunikacij, ki je bila predlagana v Zakonu o spremembah Zakona o kazenskem postopku (predlog ZKP-M) in vključuje dodatno možnost uporabe programske opreme za nadzor šifrirane komunikacije pri viru komunikacije. Skozi celotno nalogo poudarjamo posebnosti izvajanja obeh načinov nadzora elektronskih komunikacij, pravne dvome, ki se pri tem pojavljajo, obravnavamo relevantno sodno prakso, ki se nanaša na poseganje v zasebnost, govorili pa bomo tudi o specifiki zasega digitalnih podatkov. Predlagana uporaba programske opreme za nadzor šifrirane komunikacije pri viru komunikacije je bila medijsko zelo odmevna. Sprožila je zelo veliko dejanskih dvomov iz vsakdanjega življenja in tudi obilo pravnih dilem. V vsakem primeru smo mnenja, da je trenutna slovenska zakonodaja smiselna in jasna, vendar smo istočasno tudi prepričani, da ne sledi dovolj hitro tehnološkim spremembam, ki so jim pri izvajanju prikritih preiskovalnih ukrepov priča preiskovalci. Z nekaj dodatnimi pooblastili bi lahko zakonodajo na tem področju naredili boljšo, bolj fleksibilno, predvsem pa učinkovitejšo v boju proti mednarodnim kriminalnim združbam in terorističnim organizacijam.
Place of publishing:Kranj
Place of performance:Kranj
Publisher:[U. Zepič]
Year of publishing:2016
Year of performance:2016
Number of pages:VII, 117, [5] str.
PID:20.500.12556/ReVIS-5014 New window
COBISS.SI-ID:2053206966 New window
UDC:342.721:621.39(043.2)
Note:Mag. delo 2. stopnje bolonjskega študija;
Publication date in ReVIS:22.08.2018
Views:2424
Downloads:175
Metadata:XML DC-XML DC-RDF
:
Copy citation
  
Share:Bookmark and Share


Hover the mouse pointer over a document title to show the abstract or click on the title to get all document metadata.

Secondary language

Language:Slovenian
Abstract:This master thesis discusses the relevant police issue that the investigators face when executing covert police measures of electronic communication surveillance, when the suspects start using web application for communicating, which enables encrypted communication.In the thesis we focus on the correlation of carrying out surveillance of the electronic communication with wiretapping and recording and preserving the evidence of all means of communication, which transfer in the electronic communication network from the point 1, paragraph 1, article 150 of the Criminal Procedure Act with the constitutionally ensured human right of privacy. We especially emphasize the upgrade of classic surveillance of electronic communication, which was put forward in the Act Amending the Criminal Procedure (legislative proposal ZKP-M) and includes additional possibility to use software for the surveillance of encrypted communication at the communication source. Throughout the whole thesis we emphasize the specifics of executing both surveillance options of the electronic communication as well legal dilemmas, which occur in this process. Furthermore, the relevant case law, which applies to invasion of privacy, is dealt with. In addition, the specifics of seizing digital data are discussed. The proposed use of software for the surveillance of encrypted communication at the communication source had wide media coverage. It triggered many actual dilemmas from everyday life as well as legal dilemmas. Nevertheless we believe that the current Slovenian legislation is reasonable and clear, but at the same time, we are sure that it does not follow the technological changes fast enough, which investigators face when executing covert measures. With some additional powers we could improve the legislation in this field, make it more flexible, and above all, more efficient when it comes to dealing with international criminal organizations and terrorist organizations.
Keywords:Zasebnost


Back