Abstract
The importance of the study is to demonstrate the criminal protection of personal data for individuals in general and patients in particular, and it aimed to demonstrate the adequacy of Jordanian legislation and comparing to provide legal protection of the individuals’ personal data, especially patients, in light of the Corona pandemic. The study also aims to illustrate the balance between two rights; the right of privacy for individuals’ data, especially patients infected with the Corona virus and the right of authorized parties to access this data in order to limit the spread of this virus. In order to achieve the study objectives, it discussed the nature of the concepts of privacy and personal data, and indicated the legislative treatments of the patients’ data, whether it was through the general criminal law, or through laws related to informatics, through medical charters, or even through the legislation related to the pandemic and to explain how these concepts contributed to the criminal protection of patients’ data. The study combined the analytical and comparative approach, and it concluded that the current legislation is not sufficient to protect a right worthy of legal protection, which is the right of privacy in personal data. The privacy of personal data has been exposed to many violations in the light of cyberspace, which requires legislators to hurry to issue special laws that surround personal data with a fence of criminal protection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Qayed, A.: Criminal Protection of Private Life and Information Banks “A Comparative Study”, p. 6. Arab Renaissance House, Egypt (1994)
Miqrish, A.: The effects of using the Internet on the sanctity of private life, p. 14. Master’s thesis, Halab University, Syria (2018)
Nayel, E.: Criminal Protection of the Sanctity of Private Life in the Light of the French Penal Code, p. 125. Arab Renaissance House, Egypt (2020)
Mughabghab, N.: The Dangers of Information and the Internet, p. 100. Zain Human Rights Publications, Beirut, Lebanon (1998)
Al, M.N.: Information Crimes, 2nd edn., p. 164. Culture House for Publishing and Distribution, Amman, Jordan (2010)
Hussein, J.: Inspection of Information Crimes, p. 69. Legal Books House, Egypt (2011)
Surat Al-Nur Verse 27
Al-Bukhari, S.: Book of Obligations, Chapter on Teaching Obligations. Hadith No. 6724, vol. 8, p. 148
Article (12) of the Universal Declaration of Human Rights adopted by the United Nations General Assembly in 1948
Article (8) of the European Convention on Human Rights, which was adopted in 1950
Bahar, M.: Protection of Private Life in Criminal Law, p. 98. Arab Renaissance House, Cairo (2010)
Ayoub, J.: Legal Protection of Personal Life in the Field of Informatics, p. 219. Al-Halabi Human Rights Publications, Beirut, Lebanon (2009)
Article (7) of the Jordanian constitution
Article (56) of the Jordanian Telecommunications Law No. 13 of 1995 and its amendments
Article (348) bis of the Jordanian Penal Code No. 16 of 1960 and its amendments
Al Manaseh, O., Al Zoubi, J.: Electronic Information Systems Technology Crimes, 3rd edn., p. 241. Culture House for Publishing and Distribution. Amman, Jordan (2017)
Al, H.A.: Computer and Internet Crimes, p. 78. Al-Yazuri Scientific Publishing and Distribution House, Amman, Jordan (2009)
Miqrish, A.: The effects of using the Internet, previous reference (2018)
Access Now: Lessons from the European Union’s Personal Data Protection Law (2018). https://www.accessnow.org/cms/assets/uploads/2019/01/Updated-version-BOOKlet.pdf
Al Manaseh, O., Al Zoubi: Previous reference, J. 244
Seidani, N.: Mechanisms of research and investigation of information crime in criminal law. Master’s thesis. Al Haj Khader University, Algeria 2013. 24. Al Momani: Information Crimes, previous reference, pp. 174–178 (2010)
Taha, M.-A.: Legislative Confrontation of Computer and Internet Crimes, a Comparative Study, p. 9. Dar Al-Faker & Law. Egypt (2017)
Al Abbadi, M.: New Crimes in the Light of Globalization, 1 edn., p. 333. Amman (2015)
Sassi, T., Abubakar, S.: Criminal protection of private life online, p. 6. Master’s thesis. Abdulrahman Mira University, Bejaia, Algeria (2013)
Al Malt, A.: Information Crimes, a Comparative Study, p. 178. Arab Thoughts House. Cairo, Egypt (2005)
Al-Jubouri, S.: Legal Protection of Internet Information, p. 381. Al-Halabi Human Rights Publications (2011)
Al Fatlawi, A.: Cyber attacks, their concept and the international responsibility arising from them in contemporary international organization. Research published in Al-Mohaqiq Al-Halabi J. Legal Polit. Sci. 8, 4, 610, 687 (2016)
Ayoub, J.: Previous reference, p. 219 (2009)
Hijazi, A.: Criminal Evidence in Computer and Internet Crimes, p. 45. Legal Books House, Cairo Egypt (2007)
Fikri, A.: Information Crimes, a Comparative Study in Arab and Foreign Legislation, 1st edn., p. 851. Law and Economics Library, Al Riyadh (2014)
Al Manaseh, O., Al Zoubi, J.: Previous reference, p. 24
Access Now: Lessons from the European Union’s Personal Data Protection Law (2018). https://www.accessnow.org/cms/assets/uploads/2019/01/Updated-version-BOOKlet.pdf
Al Mashaykhi, N.: Constitutional Regulation of the Right to Privacy and Its Judicial Guarantees, 1st edn., p. 96 Arab Center for Publishing and Distribution (2020)
Abdullah, A.: Information and Internet Crimes and Cyber Crimes, a Comparative Study in the Legal System to Combat Information and Internet Crimes with Reference to the Efforts to Combat Internationally and Locally, 3rd edn., p. 60. Al-Halabi Human Rights Publications, Beirut, Lebanon (2007)
Khairallah, K.: Organizing the electronic medical file and protecting its data within the framework of developing the health sector and health services, research published on the Internet on March 19th 2020, p. 33 (2020)
Zahran, M.: Hospital and Healthcare Management, p. 266. Zahran House for Publishing and Distribution, Amman, Jordan (2008)
Othman, T.: Criminal protection of private life via the Internet. Master’s thesis. Mohamed Lakhdar University, Algeria, p. 23 (2007)
Al Shahawi, M.: Criminal Protection for the Sanctity of Private Life in the Face of the Press. Dar Al-Nahda Al-Arabiya. Cairo, Egypt, p. 25 (2010)
See: Article (348) Bis of the Jordanian Penal Code No. (16) of 1960 and its amendments
See: Article (355) of the Jordanian Penal Code No. (16) of 1960 and its amendments
Al Manaseh, O., Al Zoubi, J.: Previous reference, p. 252
Al Momani, N.: Previous reference, p. 182
AL Srour, T.: Publishing and Media Crimes, 1st edn., p. 609. Arab Renaissance House, Cairo (2004)
Khatir, S.: Protection of the right of information privacy, Analytical study of the right to access personal data in France. J. Legal Econ. Res. 57, 119 (2015)
Al Srour, T.: Criminal Protection of Individual Secrets in the Face of Publishing, p. 205. Dar Al-Nahda Al-Arabiya, Egypt (1991)
The Islamic World Educational, Scientific and Cultural Organization, Developments of Artificial Intelligence and the Requirements for the Protection of Fundamental Rights and Freedoms. http://www.icesco.org/wp-content/uploads/2019/12/Ai-developements.pdf
Article (3) of the Jordanian Cybercrime Law No. (27) of 2015 AD
Hijazi, A.: Combating Computer and Internet Crimes in the Arab Model Law, an In-Depth Study in Information Law, 1st edn., pp. 357–360. University Thought House, Alexandria (2006)
Al, H.M.: Computer Crimes, an Analytical Study, 1st edn., p. 189. Curriculum House for Publishing and Distribution, Jordan (2006)
Al Okoum, W.: The concept and phenomenon of information crime, law, computers and the Internet, p. 35. United Arab Emirates University (2004)
Dawood, H.: Information Systems Crimes, 1st edn., p. 239. Naif Arab Academy for Security Sciences. Saudi Arabia (2000)
Al Okoum, W.: Previous reference, p. 38
Al Manaseh, O., Al Zoubi, J.: Previous reference, p. 24
Ahmad, B.: The evolution of the concept of protecting the right to privacy. J. Law Soc. 8(1), 449, 488 (2020)
Hijazi A (2009) Computer and Internet Crimes in Arab Legislation, p. 118. Dar Al-Nahda Al-Arabiya, Egypt (2009)
Jbour, M.: Personal Data and Arab Laws, Security Concerns and the Rights of Individuals, 1st edn., p. 84. The Arab Center for Legal and Judicial Research. Beirut, Lebanon (2018)
Al Zghayyar, H.: New global issues in the field of intellectual property, p. 15. The League of Arab States, Cairo (2005). https://www.wipo.int/edocs/mdocs/arab/ar/wipo_las_ip_journ_cai_05/wipo_las_ip_journ_cai_05_2.pdf
The website of the Jordanian Health Institutions Accreditation Council (HCAC). https://hcac.jo/ar-jo/
Health Coalition for Patient’s Protection. The Jordanian National Charter for Patient Rights, p. 38
HIPAA-Health Information Privacy. https://www.ilo.org/wcmsp5/groups/public/---ed_dialogue/---sector/documents/instructionalmaterial/wcms_618847.pdf
The website of the Saudi Ministry of Health. https://www.moh.gov.sa/Pages/Default.aspx
A report by the National Center for Human Rights published on Joe24 on May 5th 2021
Al Ghafri, H.: Criminal policy in the face of cybercrime (a comparative study), p. 11. Ph.D. thesis, Ain Shams University (2009)
Resolution No. 2020/272
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Abuanzeh, A.A., Alshurideh, M. (2023). Cyberspace and Criminal Protection of Privacy in the Jordanian Legislation Under the Corona Pandemic: A Comparative Study. In: Hassanien, A.E., Snášel, V., Tang, M., Sung, TW., Chang, KC. (eds) Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics 2022. AISI 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 152. Springer, Cham. https://doi.org/10.1007/978-3-031-20601-6_45
Download citation
DOI: https://doi.org/10.1007/978-3-031-20601-6_45
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-20600-9
Online ISBN: 978-3-031-20601-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)