Skip to main content

Cyberspace and Criminal Protection of Privacy in the Jordanian Legislation Under the Corona Pandemic: A Comparative Study

  • Conference paper
  • First Online:
Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics 2022 (AISI 2022)

Abstract

The importance of the study is to demonstrate the criminal protection of personal data for individuals in general and patients in particular, and it aimed to demonstrate the adequacy of Jordanian legislation and comparing to provide legal protection of the individuals’ personal data, especially patients, in light of the Corona pandemic. The study also aims to illustrate the balance between two rights; the right of privacy for individuals’ data, especially patients infected with the Corona virus and the right of authorized parties to access this data in order to limit the spread of this virus. In order to achieve the study objectives, it discussed the nature of the concepts of privacy and personal data, and indicated the legislative treatments of the patients’ data, whether it was through the general criminal law, or through laws related to informatics, through medical charters, or even through the legislation related to the pandemic and to explain how these concepts contributed to the criminal protection of patients’ data. The study combined the analytical and comparative approach, and it concluded that the current legislation is not sufficient to protect a right worthy of legal protection, which is the right of privacy in personal data. The privacy of personal data has been exposed to many violations in the light of cyberspace, which requires legislators to hurry to issue special laws that surround personal data with a fence of criminal protection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Qayed, A.: Criminal Protection of Private Life and Information Banks “A Comparative Study”, p. 6. Arab Renaissance House, Egypt (1994)

    Google Scholar 

  2. Miqrish, A.: The effects of using the Internet on the sanctity of private life, p. 14. Master’s thesis, Halab University, Syria (2018)

    Google Scholar 

  3. Nayel, E.: Criminal Protection of the Sanctity of Private Life in the Light of the French Penal Code, p. 125. Arab Renaissance House, Egypt (2020)

    Google Scholar 

  4. Mughabghab, N.: The Dangers of Information and the Internet, p. 100. Zain Human Rights Publications, Beirut, Lebanon (1998)

    Google Scholar 

  5. Al, M.N.: Information Crimes, 2nd edn., p. 164. Culture House for Publishing and Distribution, Amman, Jordan (2010)

    Google Scholar 

  6. Hussein, J.: Inspection of Information Crimes, p. 69. Legal Books House, Egypt (2011)

    Google Scholar 

  7. Surat Al-Nur Verse 27

    Google Scholar 

  8. Al-Bukhari, S.: Book of Obligations, Chapter on Teaching Obligations. Hadith No. 6724, vol. 8, p. 148

    Google Scholar 

  9. Article (12) of the Universal Declaration of Human Rights adopted by the United Nations General Assembly in 1948

    Google Scholar 

  10. Article (8) of the European Convention on Human Rights, which was adopted in 1950

    Google Scholar 

  11. Bahar, M.: Protection of Private Life in Criminal Law, p. 98. Arab Renaissance House, Cairo (2010)

    Google Scholar 

  12. Ayoub, J.: Legal Protection of Personal Life in the Field of Informatics, p. 219. Al-Halabi Human Rights Publications, Beirut, Lebanon (2009)

    Google Scholar 

  13. Article (7) of the Jordanian constitution

    Google Scholar 

  14. Article (56) of the Jordanian Telecommunications Law No. 13 of 1995 and its amendments

    Google Scholar 

  15. Article (348) bis of the Jordanian Penal Code No. 16 of 1960 and its amendments

    Google Scholar 

  16. Al Manaseh, O., Al Zoubi, J.: Electronic Information Systems Technology Crimes, 3rd edn., p. 241. Culture House for Publishing and Distribution. Amman, Jordan (2017)

    Google Scholar 

  17. Al, H.A.: Computer and Internet Crimes, p. 78. Al-Yazuri Scientific Publishing and Distribution House, Amman, Jordan (2009)

    Google Scholar 

  18. Miqrish, A.: The effects of using the Internet, previous reference (2018)

    Google Scholar 

  19. Access Now: Lessons from the European Union’s Personal Data Protection Law (2018). https://www.accessnow.org/cms/assets/uploads/2019/01/Updated-version-BOOKlet.pdf

  20. Al Manaseh, O., Al Zoubi: Previous reference, J. 244

    Google Scholar 

  21. Seidani, N.: Mechanisms of research and investigation of information crime in criminal law. Master’s thesis. Al Haj Khader University, Algeria 2013. 24. Al Momani: Information Crimes, previous reference, pp. 174–178 (2010)

    Google Scholar 

  22. Taha, M.-A.: Legislative Confrontation of Computer and Internet Crimes, a Comparative Study, p. 9. Dar Al-Faker & Law. Egypt (2017)

    Google Scholar 

  23. Al Abbadi, M.: New Crimes in the Light of Globalization, 1 edn., p. 333. Amman (2015)

    Google Scholar 

  24. Sassi, T., Abubakar, S.: Criminal protection of private life online, p. 6. Master’s thesis. Abdulrahman Mira University, Bejaia, Algeria (2013)

    Google Scholar 

  25. Al Malt, A.: Information Crimes, a Comparative Study, p. 178. Arab Thoughts House. Cairo, Egypt (2005)

    Google Scholar 

  26. Al-Jubouri, S.: Legal Protection of Internet Information, p. 381. Al-Halabi Human Rights Publications (2011)

    Google Scholar 

  27. Al Fatlawi, A.: Cyber attacks, their concept and the international responsibility arising from them in contemporary international organization. Research published in Al-Mohaqiq Al-Halabi J. Legal Polit. Sci. 8, 4, 610, 687 (2016)

    Google Scholar 

  28. Ayoub, J.: Previous reference, p. 219 (2009)

    Google Scholar 

  29. Hijazi, A.: Criminal Evidence in Computer and Internet Crimes, p. 45. Legal Books House, Cairo Egypt (2007)

    Google Scholar 

  30. Fikri, A.: Information Crimes, a Comparative Study in Arab and Foreign Legislation, 1st edn., p. 851. Law and Economics Library, Al Riyadh (2014)

    Google Scholar 

  31. Al Manaseh, O., Al Zoubi, J.: Previous reference, p. 24

    Google Scholar 

  32. Access Now: Lessons from the European Union’s Personal Data Protection Law (2018). https://www.accessnow.org/cms/assets/uploads/2019/01/Updated-version-BOOKlet.pdf

  33. Al Mashaykhi, N.: Constitutional Regulation of the Right to Privacy and Its Judicial Guarantees, 1st edn., p. 96 Arab Center for Publishing and Distribution (2020)

    Google Scholar 

  34. Abdullah, A.: Information and Internet Crimes and Cyber Crimes, a Comparative Study in the Legal System to Combat Information and Internet Crimes with Reference to the Efforts to Combat Internationally and Locally, 3rd edn., p. 60. Al-Halabi Human Rights Publications, Beirut, Lebanon (2007)

    Google Scholar 

  35. Khairallah, K.: Organizing the electronic medical file and protecting its data within the framework of developing the health sector and health services, research published on the Internet on March 19th 2020, p. 33 (2020)

    Google Scholar 

  36. Zahran, M.: Hospital and Healthcare Management, p. 266. Zahran House for Publishing and Distribution, Amman, Jordan (2008)

    Google Scholar 

  37. Othman, T.: Criminal protection of private life via the Internet. Master’s thesis. Mohamed Lakhdar University, Algeria, p. 23 (2007)

    Google Scholar 

  38. Al Shahawi, M.: Criminal Protection for the Sanctity of Private Life in the Face of the Press. Dar Al-Nahda Al-Arabiya. Cairo, Egypt, p. 25 (2010)

    Google Scholar 

  39. See: Article (348) Bis of the Jordanian Penal Code No. (16) of 1960 and its amendments

    Google Scholar 

  40. See: Article (355) of the Jordanian Penal Code No. (16) of 1960 and its amendments

    Google Scholar 

  41. Al Manaseh, O., Al Zoubi, J.: Previous reference, p. 252

    Google Scholar 

  42. Al Momani, N.: Previous reference, p. 182

    Google Scholar 

  43. AL Srour, T.: Publishing and Media Crimes, 1st edn., p. 609. Arab Renaissance House, Cairo (2004)

    Google Scholar 

  44. Khatir, S.: Protection of the right of information privacy, Analytical study of the right to access personal data in France. J. Legal Econ. Res. 57, 119 (2015)

    Google Scholar 

  45. Al Srour, T.: Criminal Protection of Individual Secrets in the Face of Publishing, p. 205. Dar Al-Nahda Al-Arabiya, Egypt (1991)

    Google Scholar 

  46. The Islamic World Educational, Scientific and Cultural Organization, Developments of Artificial Intelligence and the Requirements for the Protection of Fundamental Rights and Freedoms. http://www.icesco.org/wp-content/uploads/2019/12/Ai-developements.pdf

  47. Article (3) of the Jordanian Cybercrime Law No. (27) of 2015 AD

    Google Scholar 

  48. Hijazi, A.: Combating Computer and Internet Crimes in the Arab Model Law, an In-Depth Study in Information Law, 1st edn., pp. 357–360. University Thought House, Alexandria (2006)

    Google Scholar 

  49. Al, H.M.: Computer Crimes, an Analytical Study, 1st edn., p. 189. Curriculum House for Publishing and Distribution, Jordan (2006)

    Google Scholar 

  50. Al Okoum, W.: The concept and phenomenon of information crime, law, computers and the Internet, p. 35. United Arab Emirates University (2004)

    Google Scholar 

  51. Dawood, H.: Information Systems Crimes, 1st edn., p. 239. Naif Arab Academy for Security Sciences. Saudi Arabia (2000)

    Google Scholar 

  52. Al Okoum, W.: Previous reference, p. 38

    Google Scholar 

  53. Al Manaseh, O., Al Zoubi, J.: Previous reference, p. 24

    Google Scholar 

  54. Ahmad, B.: The evolution of the concept of protecting the right to privacy. J. Law Soc. 8(1), 449, 488 (2020)

    Google Scholar 

  55. Hijazi A (2009) Computer and Internet Crimes in Arab Legislation, p. 118. Dar Al-Nahda Al-Arabiya, Egypt (2009)

    Google Scholar 

  56. Jbour, M.: Personal Data and Arab Laws, Security Concerns and the Rights of Individuals, 1st edn., p. 84. The Arab Center for Legal and Judicial Research. Beirut, Lebanon (2018)

    Google Scholar 

  57. Al Zghayyar, H.: New global issues in the field of intellectual property, p. 15. The League of Arab States, Cairo (2005). https://www.wipo.int/edocs/mdocs/arab/ar/wipo_las_ip_journ_cai_05/wipo_las_ip_journ_cai_05_2.pdf

  58. The website of the Jordanian Health Institutions Accreditation Council (HCAC). https://hcac.jo/ar-jo/

  59. Health Coalition for Patient’s Protection. The Jordanian National Charter for Patient Rights, p. 38

    Google Scholar 

  60. HIPAA-Health Information Privacy. https://www.ilo.org/wcmsp5/groups/public/---ed_dialogue/---sector/documents/instructionalmaterial/wcms_618847.pdf

  61. The website of the Saudi Ministry of Health. https://www.moh.gov.sa/Pages/Default.aspx

  62. A report by the National Center for Human Rights published on Joe24 on May 5th 2021

    Google Scholar 

  63. Al Ghafri, H.: Criminal policy in the face of cybercrime (a comparative study), p. 11. Ph.D. thesis, Ain Shams University (2009)

    Google Scholar 

  64. Resolution No. 2020/272

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amal A. Abuanzeh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abuanzeh, A.A., Alshurideh, M. (2023). Cyberspace and Criminal Protection of Privacy in the Jordanian Legislation Under the Corona Pandemic: A Comparative Study. In: Hassanien, A.E., Snášel, V., Tang, M., Sung, TW., Chang, KC. (eds) Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics 2022. AISI 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 152. Springer, Cham. https://doi.org/10.1007/978-3-031-20601-6_45

Download citation

Publish with us

Policies and ethics