Interception of Electronic Communications in the Czech Republic and Slovakia Cover Image

Interception of Electronic Communications in the Czech Republic and Slovakia
Interception of Electronic Communications in the Czech Republic and Slovakia

Author(s): Jakub Míšek, Radim Polčák, Václav Stupka, Pavel Loutocký, Tomáš Abelovský
Subject(s): Politics / Political Sciences, Politics, Social Sciences, Economy, Law, Constitution, Jurisprudence, Criminal Law, Political Sciences, Sociology, Government/Political systems, Security and defense, Comparative politics, Evaluation research, ICT Information and Communications Technologies
Published by: Masarykova univerzita nakladatelství
Keywords: Security architecture; interception of telecommunication; powers for accessing telecommunication data; data traffic;
Summary/Abstract: One of the most important forming factors of the distribution of public powers in the Czech Republic is its totalitarian history. There is a strong sense of distrust towards official institutions in the general public. It is probably due to this fact, that the procedures and powers of public bodies and agencies are set very rigidly. The principle of legality is set in Art. 2 para. 3 of the Czech Constitution (Act No. 1/1993 Sb. Constitution of the Czech Republic), which states that “State authority is to serve all citizens and may be asserted only in cases, within the bounds, and in the manner provided forby law” and in Art. 2 para. 2 of the Charter of Fundamental Rights and Freedoms (the Resolution of the Presidium of the Czech National Council of 16 December 1992 on the declaration of the Charter of Fundamental Rights and Freedoms as a part of the constitutional order of the Czech Republic No. 2/1993 Sb.), which states that “State authority may be asserted only in cases and within the bounds provided for by law and only in the manner prescribed by law”. Since all the public authorities authorized to intercept telecommunication fall within the scope of these articles, they are permitted to act only within the framework of what is expressly allowed for them by law.

  • E-ISBN-13: 978-80-210-8684-5
  • Page Count: 244
  • Publication Year: 2016
  • Language: English
Security Architecture and the Interception of Telecommunication

Security Architecture and the Interception of Telecommunication
(Security Architecture and the Interception of Telecommunication)

Constitutional and Statutory Safeguards of Telecommunications

Constitutional and Statutory Safeguards of Telecommunications
(Constitutional and Statutory Safeguards of Telecommunications)

Powers for Accessing Telecommunication Data

Powers for Accessing Telecommunication Data
(Powers for Accessing Telecommunication Data)

Interception of Content Data

Interception of Content Data
(Interception of Content Data)

Collection and Use of Traffic and Subscriber Data

Collection and Use of Traffic and Subscriber Data
(Collection and Use of Traffic and Subscriber Data)

Access to (Temporarily) Stored Communication Data

Access to (Temporarily) Stored Communication Data
(Access to (Temporarily) Stored Communication Data)

Use of Electronic Communication Data in Judicial Proceedings

Use of Electronic Communication Data in Judicial Proceedings
(Use of Electronic Communication Data in Judicial Proceedings)

Differential Comparative Note: Slovakia

Differential Comparative Note: Slovakia
(Differential Comparative Note: Slovakia)

Bibliography

Bibliography
(Bibliography)

Appendix: Collection of Relevant Legal Provisions

Appendix: Collection of Relevant Legal Provisions
(Appendix: Collection of Relevant Legal Provisions)