Information technology law mainly covers the rules to be applied for legal remedies connected to the results produced by using technology and information systems together. In parallel with the developments in technology and informatics, "information law" has entered our legal system. IT law is generally subject to a differentiation in terms of criminal law and general law, and it is a developing branch of law..
He is working on crimes organized under the title of Crimes in the field of IT in the TCK. These crimes are:
Informatics crimes are not limited to those mentioned above, but they may also arise as a result of some crimes being processed through information systems. Thus, the work done by the IT lawyer on all cyber crimes can be taken into consideration..
*Bank or Credit Card Abuse Crime The crime of abuse of bank or credit cards is regulated in TCK 245. Accordingly, anyone who seizes or holds a bank or credit card belonging to someone else will use the card without permission and if he benefits from it, he will be punished legally. However, if this offense is committed to the detriment of the following persons, the relevant relative will not be punished with the sentence: spouse, superso or subspecies or one of such beech relatives, one of the siblings who live in the same dwelling, who has a foster relationship between them..
*Credit Card Fraud Crimes Credit card fraud crimes are the crimes frequently encountered by informatics lawyers in practice. Credit or debit card fraud has been regulated as abuse of credit or debit cards in TCK 245. This crime goes into crimes in the field of informatics. The crime of credit or debit card fraud, theft of the card, copy of card information, fake card production, etc. emerges in ways. Failure to send the purchased product or to send a different product than the purchased will be the credit card fraud crime. However, copying your card information and shopping with this information without your approval can also be an example of the fraud committed through information systems..
*Removal of Content from the Internet with IT Lawyer Removal of content from the internet refers to the removal of publications made on the internet environment, which violate the privacy principle of a person or violate someone's personal rights. Examples of content that can be removed are slander or insulting posts, and images containing obscenity. It is in the field of IT lawyers to ensure that content that damages personal rights is permanently deleted and deleted from Google search results..
*Closing of Fake Social Media Accounts with IT Law Attorney The fake social media account closure process is possible with IT lawyer. Although it is reported to social media sites where these accounts are located, it is obvious that most of the reports do not have positive results. In this case, it will be possible to close the fake, fake social media accounts opened on your behalf with the IT lawyer..
Asile Betül Yayla Law Office © Copyright 2019 | All Rights Reserved. Disclaimer: This site is subject to Turkey Bar Association of Professional Rules and Regulations on Prohibition of Advertising. The site itself, its logo and content cannot be used for advertising business development and similar purposes. Creating a link to this website is prohibited. The information on our website is not legal advice or advice.