Document Type : Research/Original/Regular Article

Author

Associate Professor of Law, Payame Noor University of Tehran, Tehran, Iran

Abstract

Overseas criminal investigations in Cloud Computing and its data users face limitations stemming from the principle of territorial sovereignty and the principle of non-interference in foreign state affairs. But the United States is trying to pass these restrictions on domestic law by passing and enforcing CLOUD Act after failing in the Microsoft case. This is an experience that its achievements are facing other countries to avoid its negative dimensions. So investigating the legal aspects of the CLOUD Act, from function to its achievements and defections in overseas criminal investigations into cloud of technology companies, is the subject and purpose of this paper, which has been dealt with in a descriptive-analytical and critical approach. The main research question is, "what are the function and achievements of the CLOUD Act in the criminal justice system of the United States and other states in conducting overseas criminal investigations in Cloud Computing and its defections?" Research findings indicate that the CLOUD Act nevertheless directs the United States to its primary goal of accessing the stored data of the Cloud user in data center overseas. But access to data of Cloud Computing user in these circumstances is also affected by the disregard of the restrictions arising from the principle of territorial sovereignty and the principle of non-interference in foreign state affairs, which this time was justified in the domestic law stature but not permitted and accepted due to a violation of Cloud Computing user privacy restrictions.

Keywords

Main Subjects

  • فارسی

    • دلخون‌اصل، رامین؛ ایرج گلدوزیان و کیومرث کلانتری (1398)، «نقش پلیس در جمع‌آوری ادله الکترونیکی در فضای مجازی در نظام حقوقی ایران، فرانسه و کنوانسیون جرایم سایبری»، فصلنامه پژوهش‌های اطلاعاتی و جنایی، دوره 14، شماره 54.
    • جلالی، محمود و سعیده توسلی اردکانی (1398)، «ضرورت ایجاد نظام هماهنگ حقوقی بین‌‏المللی در مقابله با جرایم در فضای مجازی»، فصلنامه مطالعات حقوق عمومی، دوره 49، شماره 4.
    • شریعت‌باقری، محمدجواد (1393)، «تصویب موافقت‌نامه‌های همکاری‌های قضایی بین‌المللی؛ مشکلات و راه‌حل‌ها»، دوره 19، شماره 66.
    • صالحی، جواد (1398)، «دسترسی به اطلاعات دیتاسنتر دولت خارجی در تقابل با اصول صلاحیت کیفری سرزمینی و اعمال حاکمیت در حقوق بین‌الملل»، مجله حقوقی بین‌المللی، دوره 36، شماره 60.
    • طهماسبی، جواد و خیراله شاهمرادی (1397)، «چالش‌ها و خلأهای موجود در فرایند رسیدگی به جرایم سایبری»، مجله حقوقی دادگستری، سال 82، شماره 104.
    • فتحی، یونس و خیراله شاهمرادی (1396)، «گستره و قلمرو حریم خصوصی در فضای مجازی»، مجله حقوقی دادگستری، سال 81، شماره 99.
    • قناد، فاطمه و مسعود اکبری (1396)، «امنیت‌گرایی سیاست جنایی»، فصلنامه پژوهش حقوق کیفری، دوره 5، شماره 18.
    • محمدنسل، غلامرضا (1395)، حقوق جزای اختصاصی؛ جرایم رایانه‌ای در ایران، چاپ دوم، تهران: نشر میزان.

    انگلیسی

    • Brenner, W. Susan (2010), Cybercrime: Criminal Threats from Cyberspace, Praeger Publishing.
    • Chander, Anupam and Uyen P. Le (2015), “Data Nationalism”, Emory Law Journal, Vol. 64(3).
    • Kerr, S. Orin (2010), “Fourth Amendment Seizures of Computer Data”, Yale Law Journal, Vol. 119.
    • Mulligan, P. Stephen (2018), Cross-Border Data Sharing Under the CLOUD Act, Congressional Research Service, No. 7-5700.
    • S. 2383, 115th Cong. (2018).
    • Schwartz, M. Paul (2013), “Information Privacy in the Cloud”, University of Pennsylvania Law Review, Vol. 161.
    • Schwartz, M. Paul (2018), “Legal Access to the Global Cloud”, Columbia Law Review, Vol. 118.
    • Schwartz, M. Paul and Karl-Nikolaus Peifer (2017), “Transatlantic Data Privacy Law”, Georgetown Law Journal, Vol. 106.
    • Schultheis, Ned (2015), “Warrants in the Clouds: How Extraterritorial Application of the Stored Communications Act Threatens the United States Cloud Storage Industry”, Brooklyn Journal of Corporate, Financial & Commercial Law, Vol. 9.
    • Swire, Peter and DeBrae Kennedy-Mayo (2017), “How Both the EU and the U.S. Are “Stricter” than Each Other for the Privacy of Government Requests for Information”, Emory Law Journal, Vol. 66.
    • Swire, Peter; Justin Hemmings and Suzanne Vergnolle (2016), “A Mutual Legal Assistance Case Study: The United States and France”, Wisconsin International Law Journal, Vol. 34.
    • United States (2017), Proposed Legislation to Permit Secure and Privacy-Protected Access to Cross-border Electronic Data for Law Enforcement to Combat Serious Crime and Terrorism.
    • United States (1986), Stored Communications Act.
    • United States (2018), Clarifying Lawful Overseas Use of Data (CLOUD Act).
    • United States (2018), Consolidated Appropriations Act.
    • United States (2018), Electronic Communications Privacy Act.
    • United States v. Google (2017), 232 F. Supp. 3d.
    • United States v. Microsoft Corp. (2017), 138 S. Ct.
    • United States v. Microsoft Corp. (2018), 138 S. Ct.
    • United States v. Microsoft Corp. (2018), No. 17-2.
    • United States v. Verdugo-Urquidez (1990), 494 U.S.
    • United States v. Warshak (2010), 631 F.3d.
    • White House (2013), Liberty and Security in a Changing World the President's Review Group on Intelligence and Communications Technologies, Liberty and Security in a Changing World, Report and Recommendations of the President's Review Group on Intelligence and Communications Technologies, Available at:

    https://obamawhitehouse.archives.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf  (last visited on 5/5/2020).