Support for Information Systems in Iraqi and UAE Law

Author:
Hasanain Jasim Kadhim Al-Khafaji
Level:
Master
Field of study:
Law
Language:
Arabic
Faculty:
Faculty of Law
Year:
2022
Publisher:
URD Press
Supervisor(s):
Seyed Alireza Tabatabaei

Information is something that is obtained from or exchanged between individuals or groups. That information is subject to personal property rights, especially if that information relates to individuals. Electronic information is very important due to the role it plays in the field of management, and administrative affairs are on the path to success and mastery of time. The government seeks to have rights over information systems, especially in the administration of public rights; Because they put this information on people in the community. Iraq has also made laws in this regard, but so far it has not reached the ideal support. The UAE has also adopted modern laws on data protection. Information systems are an effective tool for performing successful administrative activities through software as well as its development. Legal protection of information systems in Iraqi and UAE law includes a series of legal texts enacted by the Iraqi and UAE legislators to support these systems. Objective and executive support in Iraqi law and Marat is specified.  In this research, we have used the method of comparative analytical research in the laws of Iraq and the UAE and the research has achieved several results, including: Government support for information systems through government authority in adopting appropriate administrative orders to protect this information. And that intelligence crimes are new in Iraq. Our suggestion is that any incitement to attack information systems be criminalized. We also suggest that information crimes be defined in the context of criminal protection as follows: Any action that is not punishable by law or custom but is detrimental to persons and property and is against the advanced technology of information systems. And we call on the Iraqi legislature to emulate its Emirati counterpart and set specific rules for new IT crimes.