The Crime of Illegal Entry and Access to Official Information Systems and the Approach of Jordanian and Emirati Legislators to Confront it

Authors

  • Majed Al-Sarhan Department of Law, criminal law, Zarqa University, Jordan-Alzarqa’a

DOI:

https://doi.org/10.63931/ijchr.v7i1.492

Keywords:

crime, illegal entry, illegal access

Abstract

The study outlines the elements of the crime of illegal entry and access to official information systems, whether they pertain to ministries, government agencies, public institutions, security, financial, or banking sectors, or companies owned or partially owned by any of these entities, or critical infrastructure.

It explained the approach of Jordanian and Emirati legislators in confronting this crime, whether the entry or access was solely for the purpose of viewing or for attacking the integrity of data and information on the information network, information technology, information system, or website belonging to those entities.

The study concluded that Jordanian and Emirati legislators did not limit themselves to criminalizing illegal entry or access but considered even authorized and legal entry or access to be criminal if the limits of authorization were exceeded or violated.

References

[1] Abdelqawi, A.-S. (2012). The digital court and cybercrime. Library of Law and Economics, Riyadh.

[2] Ahmed, R. A. (2025). Legal developments in the field of human rights in Jordan: An analytical study of national and analytical mechanisms. Al-Biruni Journal of Humanities and Social Sciences, 4, 11 June 2025. https://al-biruni-journal.jo/details_paper/24

[3] Al-Hudaifi, A. A. (2012). The crime of unauthorized access to websites in the Saudi system. International Law Research Journal, 10.

[4] Al-Jbour, M. (2012). The comprehensive guide to criminal law, general part. Dar Wail for Publishing, Amman.

[5] Al-Khais, A. J. (2011). Illegal use of computer systems from a penal law perspective. Damascus University Journal of Economic and Legal Sciences, 27(1).

[6] Al-Mansour, H. F. K. (2016). The crime of unlawful access to the information system and violation of its contents.

[7] Al-Marsafawi, H. S. (1972). Rules of criminal responsibility in Arab legislations. Institute of Research and Arab Studies, Cairo.

[8] Al-Meraghi, A. A. (2017). Cybercrime and the role of criminal law in limiting it. National Center for Legal Publications, Cairo.

[9] Al-Ojji, M. (2006). Criminal law. Al-Halabi Legal Publications, Beirut.

[10] Al-Qahouji, A. A. Q. (2004). Criminal protection mechanisms for automated reconciliation. Journal of Shari’a and Law, 2.

[11] Al-Rawashdeh, S., & Al-Hiyajneh, A. (2009). Combating cybercrime through criminalization and punishment: The English law model. Jordanian Journal of Law and Political Science, 1(3).

[12] Al-Sarraj, A. (n.d.). Explanation of the penal code.

[13] Al-Shawa, M. S. (1998). Information revolution and its impact on criminal law (2nd ed.). Dar Al-Nahda Al-Arabiya, Cairo.

[14] Al-Shennawi, M. (2008). Emerging fraud crimes. Dar Al-Kutub Al-Qanuniya, Cairo.

[15] Al-Shibli, M. (2019). The foundation of the theory of criminal participation in cybercrimes according to the approach of the Jordanian legislator. Jordanian Journal of Applied Sciences, 21(1).

[16] Ananzeh, M. A. (2017). Criminal intent in cybercrimes (1st ed.). Dar Al-Ayyam for Publishing and Distribution, Amman.

[17] Azzam, Y. Q. (2025, June). The role of social media in shaping the social identity of Jordanian youth. Al-Biruni Journal of Humanities and Social Sciences, 4, 11 June 2025. https://al-biruni-journal.jo/details_paper/27

[18] Bakkar, H. H. M. (1988). The authority of the criminal judge in determining penalties and precautionary measures. Al-Dar Al-Jamahiriya (1st ed.).

[19] Batihi, N. (2019). The crime of unauthorized access or stay in an information system. Journal of Legal and Political Jurisprudence, 1(1).

[20] Bou Zeidi, E. (2022). The changing features of the legal element in business crimes. The Professor Researcher Journal for Legal and Political Studies, 7(2).

[21] Fikri, A. A. (2007). Information systems crimes. Dar Al-Jamiaa Al-Jadida, Alexandria.

[22] Hamoudi, N. (2015). Criminal protection of e-commerce [Master’s thesis, University of Algiers].

[23] Hassanein, S. A. (2023). The provisions of criminal responsibility for cybercrimes. Journal of Legal and Economic Studies, 9(3).

[24] Hossni, M. N. (1989). Explanation of criminal law, general part. Dar Al-Nahda Al-Arabiya, Cairo.

[25] Hussien, A. A. (2025, June). International commercial arbitration in Jordan: Legal framework and practical challenges. Al-Biruni Journal of Humanities and Social Sciences, 4, 11 June 2025. https://al-biruni-journal.jo/details_paper/25

[26] Ibitissem, M. (2011, September). Les infractions portant atteinte à la sécurité du système informatique d’une entreprise [Master’s thesis, University of Montreal].

[27] Jafar, R. M. M. (2017). Criminal intent in Internet and information-related crimes. Arab Studies Center for Publishing and Distribution, Egypt.

[28] Mohammad, L. J. (2016). Cybercrimes (1st ed.). Dar Khaled for Publishing and Distribution, Amman.

[29] Murtatha, A. (2025, June). Legislative transformations in the Jordanian penal code and their impact on criminal justice. Al-Biruni Journal of Humanities and Social Sciences, 4, 11 June 2025. https://al-biruni-journal.jo/details_paper/26

[30] Nawaiseh, A. I. (2016). The crime of unauthorized access in Arab cybercrime legislations. The Legal and Judicial Journal, 1. Ministry of Justice, Qatar.

[31] Pradel, J. (1990). Les infractions relatives à l’informatique. Revue Internationale de Droit Comparé, 42(42). DOI: https://doi.org/10.3406/ridc.1990.1994

[32] Qatari, M. N. (2015). Legal issues in protecting information security. Sharjah Police Thought Journal, 24(93).

[33] Qoura, N. A. M. F. (2005). Cybercrimes in economics. Al-Halabi Legal Publications, Beirut.

[34] Ramadan, M. (2001). Criminal protection of e-commerce. Dar Al-Nahda Al-Arabiya, Cairo.

[35] Skicker, M. A. (n.d.). Cybercrime and how to combat it (1st ed.). Dar Al-Jumhuria, Egypt.

[36] Sufian, T. (2025, June). The role of the Great Arab Revolt in shaping Jordanian national identity. Al-Biruni Journal of Humanities and Social Sciences, 4, 11 June 2025. https://al-biruni-journal.jo/details_paper/31

[37] Yahia, J. M., & Al-Mana’a, O. A. (2010). Crimes of electronic information technology. Dar Al-Thaqafa, Amman.

[38] Za’tar, H. A. (2023). The legal issues of cross-border cybercrimes and ways to address them. Journal of Legal and Economic Research, 84.

Laws and Case References

[39] Appeal No. 230/2001, Dubai Court of Cassation, Dubai Public Prosecution, Scientific Seminar.

[40] Cass. crim., 3 October 2007, Pourvoi No. 07-81045.

[41] Cour d’Appel de Paris, 5 April 1994.

[42] Egyptian Information Technology Crimes Law.

[43] Jordanian Cybercrime Law.

[44] Jordanian Penal Code, Law No. 16 of 1960 (and amendments).

[45] UAE Cybercrime and Anti-Rumors Law.

[46] UAE Penal Code, Law No. 31 of 2021.

Downloads

Published

2025-10-10

How to Cite

Al-Sarhan, M. (2025). The Crime of Illegal Entry and Access to Official Information Systems and the Approach of Jordanian and Emirati Legislators to Confront it. International Journal on Culture, History, and Religion, 7(1), 498–511. https://doi.org/10.63931/ijchr.v7i1.492