The Specificity of the Provisions of Punishment in Cybercrime of State Security in UAE Legislation
DOI:
https://doi.org/10.35246/jyg58r44Keywords:
State Information Security Crimes, Original Penalties, Ancillary and Complementary Penalties, Criminal Measures, Aggravating and Mitigating Circumstances and Exemption from Punishment.Abstract
The research dealt with the specificity of the provisions of punishment in state security information crimes in the UAE legislation, highlighting the most prominent penalties stipulated by the UAE legislator in Federal Decree-Law No. (34) Of 2021 regarding rumors and cybercrimes, where the problem of the study revolves around the adequacy of the penalties stipulated by the UAE legislator in reducing state security information crimes.
The importance of the research from a scientific point of view is that it is specialized research to study the privacy feature in state security information crimes, especially since the UAE legislator stipulated many provisions for punishment for these crimes, and the UAE legislator has a special policy for punitive individualization of these crimes, different from punitive individualization in the Federal Crimes and Penal Code, meaning that the research specializes in these penalties without delving into the general context of the provisions of penalties in state security crimes, and the research is considered one of the first Legal research on showing, clarifying and identifying the elements of privacy in the provisions of punishment for state security information crimes, as it benefits a group of jurists, lawyers and law students
Due to the seriousness of state security cybercrimes, the UAE legislator has singled them out with special rules for punishment, especially in Federal Decree-Law No. (34) of 2021 on combating rumors and cybercrime, and therefore the UAE legislator did not make the rules of punishment for these crimes uniform in terms of aggravating circumstances and mitigating circumstances, nor did it provide special provisions for exemption with regard to information state security crimes, and therefore the research problem revolves around the following question: How adequate, are the punishment provisions for state security cybercrimes sufficient to achieve privacy to punish these crimes?
One of the most prominent results of the study is that the penalties and measures mentioned by the UAE legislator in its legislative policy in combating state information security crimes are sufficient in themselves to reduce these crimes, and one of the recommendations of the study is the need for the UAE legislator to tighten some penalties for these crimes.
Downloads
References
First: General Books
I. Ihab Abdel Muttalib: The Modern Criminal Encyclopedia in Explanation of the Penal Code, Part Two, National Center for Legal Publications, 2007.
II. Hamid Zahran, "Psychological Security is a Basic Pillar of Arab and Global National Security", a paper submitted to National Security, organized by the Union of Arab Educators, (Baghdad, 1988).
III. Hosni Al-Jadi: The Sanctity of Private Life in Islam, Dar Al-Nahda Al-Arabiya 1413 AH 1993 No. 10, p. 35 and beyond.
IV. Hassanein Ibrahim Saleh Obaid: The General Theory of Extenuating Circumstances, A Comparative Study, PhD Thesis, Faculty of Law, Cairo University, Dar Al-Nahda Al-Arabiya, 1970, No. 86, p. 155;
V. Ramses Behnam: The General Theory of Crazy Law, Knowledge Foundation in Alexandria, 1997, No. 149, p. 824 Ali Fadel Hassan: The Theory of Confiscation in Comparative Djinn Law, Dar Al-Nahda Al-Arabiya (1997), p. 67
VI. Sayed Salama Al-Khamisi, Social Control in Arab Society from an Educational Perspective, Riyadh, Al-Rushd Library, 2005.
VII. Awad Muhammad Awad: Penal Code, General Section, University Press House, 1996, No. 444, p. 574
VIII. Fahd bin Fahd Al-Sultan, "Security Education and its Role in Achieving National Security", a paper presented to Security is the responsibility of all, organized by Public Security, (Riyadh, 1429 AH), p. 2.
IX. Muhammad Mahmoud Saeed: Crimes of terrorism: their substantive rulings and procedures for prosecution, Dar Al-Fikr Al-Arabi, 1995.
X. Mahmoud Ibrahim Ismail Explanation of the general provisions in the Penal Code, second edition, Dar Al-Fikr Al-Arabi, 1959, No. 451, p. 282
Second: Specialized Books
I. Khaled Ali Iraqi: Law on Combating Cybercrime and Rumors According to Federal Decree-Law No. 34 of 2021 regarding combating cybercrime and rumors in the United Arab Emirates Publishing and Distribution - Sharjah First Edition Year: 1443 AH - 2022 AD, p. 313
II. Saeed Ibrahim Al-Adhami, Crimes against Internal State Security, Dar Al-Amood Al-Akhdam Baghdad 1989, pp. 9-10.
III. Abdul Razzaq Al-Muwafi Abdul Latif: Explanation of the Anti-Cyber and Information Technology Crimes Law of the United Arab Emirates ((Federal Decree Law No. 5 of 2012)), Book One, Dubai Judicial Institute, 2014, p. 9
IV. Abdul Ghani Qasim Muthanna Al-Shuaibi, Explanation of the Crimes and Penal Code of the United Arab Emirates promulgated by Federal Decree-Law No. (31) of 2021, General Section, General Theory of Crime and General Theory of Criminal Punishment, Dar Al-Hafez, 1443 AH, 2022 AD, p. 398
V. Hala Ahmed Al-Rashidi: Cyber Terrorism - Dar Al-Nahda Al-Arabiya - Cairo - Egypt - First Edition - 2021 AD - p 121
VI. Wasim Hussam Al-Din Al-Ahmad: Explanation of the Anti-Rumors and Electronic Crimes Law of the United Arab Emirates Federal Decree-Law No. 34 of 2021, Media Regulatory Bureau Ministry of Culture and Youth United Arab Emirates Publisher: Dar Al-Hafiz Library, United Arab Emirates, 2023, p. 11
Third: Articles, Research and Theses
Fakhri Abdul Razzaq Salbi: Mitigating Legal Excuses, A Comparative Study Thesis, PhD, Introduction to the College of Law and Politics, University of Baghdad, 1978, p. 117.
Fourth: Laws
I. United Arab Emirates - Federal Decree-Law - No. 34 of 2021 issued on 2021-09-20 Published on 2021-09-26 Effective from 2022-01-02 on combating rumors and cybercrime. Official Gazette 712 Supplement - Fifty-first Year
Fourth: Electronic References
II. https://www.albayan.ae/across-the-uae/news-and-reports/2018-08-14-1.3335315 .
Fifth: Foreign References:
I. Akeurst Michae : Amodem interoduction to international law 4ed london .1982-p253.
II. CLIve W aalker : The prevention terrorism in British law Second edition Manchester U niver sity.press .P.7-8.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright and Licensing:
For all articles published in Journal of Legal Sciences, copyright is retained by the authors. Articles are licensed under an open access Creative Commons CC BY 4.0 license, meaning that anyone may download and read the paper for free. In addition, the article may be reused and quoted provided that the original published version is cited. These conditions allow for maximum use and exposure of the work.
Reproducing Published Material from other Publishers: It is absolutely essential that authors obtain permission to reproduce any published material (figures, schemes, tables or any extract of a text) which does not fall into the public domain, or for which they do not hold the copyright. Permission should be requested by the authors from the copyrightholder (usually the Publisher, please refer to the imprint of the individual publications to identify the copyrightholder).
Permission is required for: Your own works published by other Publishers and for which you did not retain copyright.
Substantial extracts from anyones' works or a series of works.
Use of Tables, Graphs, Charts, Schemes and Artworks if they are unaltered or slightly modified.
Photographs for which you do not hold copyright.
Permission is not required for: Reconstruction of your own table with data already published elsewhere. Please notice that in this case you must cite the source of the data in the form of either "Data from..." or "Adapted from...".
Reasonably short quotes are considered fair use and therefore do not require permission.
Graphs, Charts, Schemes and Artworks that are completely redrawn by the authors and significantly changed beyond recognition do not require permission.
Obtaining Permission
In order to avoid unnecessary delays in the publication process, you should start obtaining permissions as early as possible. If in any doubt about the copyright, apply for permission. Journal of Legal Sciences cannot publish material from other publications without permission.
The copyright holder may give you instructions on the form of acknowledgement to be followed; otherwise follow the style: "Reproduced with permission from [author], [book/journal title]; published by [publisher], [year].' at the end of the caption of the Table, Figure or Scheme.






