[go: up one dir, main page]

0% found this document useful (0 votes)
78 views258 pages

Dr سعيداني نعيم

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views258 pages

Dr سعيداني نعيم

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 258

 

 
 
 
 
 

 

 
 

 
 
 
    
   
   
    
       
       
       
       
       
 


 20132012

PDF created with pdfFactory Pro trial version www.pdffactory.com


‫ﺍﻹﻫــﺪﺍﺀ‬

‫ﺇﱃ ﻣﻦ ﺃﻭﺻﺎﱐ ‪‬ﻤﺎ ﺭﰊ ﺑﺮﺍ ﻭﺇﺣﺴﺎﻧﺎ ﻭﺍﻟﺪﻱ ﺃﻣـﻲ ﻭﺃﺑـﻲ‬


‫ﺇﱃ ﺭﻓﻴﻘﺔ ﺩﺭﰊ ﺯﻭﺟــﱵ ﺍﻟﻌﺰﻳﺰﺓ‬
‫ﺇﱃ ﺭﳛﺎﻧﱵ ﻗﻠﱯ ﺑﻨﺘﺎﻱ ﺍﻟﻌﺰﻳﺰﺗﲔ ﳌـﻴﺲ ﻭﺭﻳــﻢ‬
‫ﺃﻫﺪﻱ ﻫﺬﺍ ﺍﻟﻌﻤﻞ ﺍﳌﺘﻮﺍﺿـﻊ‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺷﻜـﺮ ﻭﺗﻘـﺪﻳﺮ‬

‫ﻳﺸﺮﻓﲏ ﺃﻥ ﺃﺗﻘﺪﻡ ﺑﺄﲰﻰ ﺁﻳﺎﺕ ﺍﻟﺸﻜﺮ ﻭﺍﻟﻌﺮﻓﺎﻥ‬


‫ﺇﱃ ﺃﺳﺘﺎﺫﰐ ﺍﻟﻔﺎﺿﻠﺔ ﺍﻷﺳﺘﺎﺫﺓ ﺍﻟﺪﻛﺘﻮﺭﺓ ﺯﺭﺍﺭﺓ ﺻﺎﳊﻲ ﺍﻟﻮﺍﺳـﻌﺔ‬
‫ﺍﻟﱵ ﺗﻮﻟﺖ ﻣﻬﻤﺔ ﺍﻹﺷﺮﺍﻑ ﻋﻠﻰ ﻫﺬﺍ ﺍﻟﺒﺤﺚ‪ ،‬ﻛﻤﺎ ﻻ ﻳﻔﻮﺗﲏ ﺃﻥ ﺃﺧﻠﺺ‬
‫ﺑﺎﻟﺸﻜﺮ ﺇﱃ ﻛﻞ ﻣﻦ ﺳﺎﻋﺪﱐ ﻭﻟﻮ ﺑﺎﻟﻜﻠﻤﺔ ﺍﻟﻄﻴﺒﺔ‪.‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﻣﻘﺪﻣــــــــــﺔ‬

PDF created with pdfFactory Pro trial version www.pdffactory.com


‫ﻣـﻘـﺪﻣﺔ‪:‬‬

‫ﺇﻥ ﺍﻟﺘﻄﻮﺭ ﺍﳍﺎﺋﻞ ﺍﻟﺬﻱ ﺷﻬﺪﻩ ﻛﻞ ﻣﻦ ﳎﺎﻝ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﳎﺎﻝ ﺍﻹﺗﺼﺎﻻﺗﻮﺍﻹﻧﺪﻣﺎﺝ ﺍﳌﺬﻫﻞ‬
‫ﺍﻟﺬﻱ ﺣﺪﺙ ﺑﻴﻨﻬﻤﺎ ﻓﻴﻤﺎ ﺑﻌﺪ‪ ،‬ﻛﺎﻥ ﺍﶈﻮﺭ ﺍﻷﺳﺎﺳﻲ ﺍﻟﺬﻱ ﻗﺎﻣﺖ ﻋﻠﻴﻪ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﺇﺫ ﺃﺻﺒﺤﺖ‬
‫ﲨﻴﻊ ﺍﻟﻘﻄﺎﻋﺎﺕ ﺍﳌﺨﺘﻠﻔﺔ ﺗﻌﺘﻤﺪ ﰲ ﺃﺩﺍﺀ ﻋﻤﻠﻬﺎ ﺑﺸﻜﻞ ﺃﺳﺎﺳﻲ ﻋﻠﻰ ﺍﺳﺘﺨﺪﺍﻡ ﺍﻷﻧﻈﻤﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﳌﺎ‬
‫ﺗﺘﻤﻴﺰ ﺑﻪ ﻣﻦ ﻋﻨﺼﺮﻱ ﺍﻟﺴﺮﻋﺔ ﻭﺍﻟﺪﻗﺔ ﰲ ﲡﻤﻴﻊ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﲣﺰﻳﻨﻬﺎ ﻭﻣﻌﺎﳉﺘﻬﺎ‪ ،‬ﻭﻣﻦ ﰒ ﻧﻘﻠﻬﺎ ﻭﺗﺒﺎﺩﳍﺎ‬
‫ﺑﲔ ﺍﻷﻓﺮﺍﺩ ﻭﺍﻟﺸﺮﻛﺎﺕ ﻭﺍﳌﺆﺳﺴﺎﺕ ﺍﳌﺨﺘﻠﻔﺔ ﺩﺍﺧﻞ ﺍﻟﺪﻭﻟﺔ ﺍﻟﻮﺍﺣﺪﺓ ﺃﻭ ﺑﲔ ﻋﺪﺓ ﺩﻭﻝ‪،‬ﻓﺒﺎﺕ ﻳﻄﻠﻖ‬
‫ﻋﻠﻰ ﻫﺬﺍ ﺍﻟﻌﺼﺮ ﻋﺼﺮ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﻓﻤﻨﺬ ﻭﻗﺖ ﻟﻴﺲ ﺑﺒﻌﻴﺪ ﻛﺎﻥ ﻛﻢ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺘﻮﻟﺪﺓ ﻋﻦ ﺍﻟﺘﻔﺎﻋﻼﺕ‬
‫ﺍﻟﺒﺸﺮﻳﺔ ﳏﺪﻭﺩ‪‬ﺍ ﺇﱃ ﺣﺪ ﻛﺒﲑ ﻭﱂ ﻳﺸﻜﻞ ﺣﺠﻤﻬﺎ ﺃﻱ ﻣﺸﻜﻠﺔ ﺃﻣﺎﻡ ﻋﻤﻠﻴﺎﺕ ﲡﻤﻴﻌﻬﺎ ﻭﲣﺰﻳﻨﻬﺎ ﻭﺇﻋﺎﺩﺓ‬
‫ﺍﺳﺘﺮﺟﺎﻋﻬﺎ ‪ ،‬ﺇﻻ ﺃﻧﻪ ﻭﻣﻊ ﺗﻘﺪﻡ ﺍﻟﺒﺸﺮﻳﺔ ﻭﺗﺰﺍﻳﺪ ﻣﻌﺎﺭﻑ ﺍﻹﻧﺴﺎﻥ ﻭﻋﻠﻮﻣﻪ ﺑﺪﺃ ﻛﻢ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻳﺘﺰﺍﻳﺪ‬
‫ﻭﻳﺘﻜﺎﺛﺮ ﻭﺻﺎﺭﺕ ﺍﻟﻄﺮﻕ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻟﺘﺠﻤﻴﻊ ﻭﺗﻨﻈﻴﻢ ﻫﺬﻩ ﺍﳌﻌﻠﻮﻣﺎﺗﻌﺎﺟﺰﺓ ﻋﻦ ﺗﻠﺒﻴﺔ ﺍﺣﺘﻴﺎﺟﺎﺕ‬
‫ﺍﳌﺴﺘﻔﻴﺪﻳﻦ ﻣﻨﻬﺎ ﺑﻜﻔﺎﺀﺓ ﻭﻓﻌﺎﻟﻴﺔ‪ ،‬ﻭﺃﺻﺒﺢ ﻣﻦ ﺍﻟﻀﺮﻭﺭﻱ ﺍﻟﻠﺠﻮﺀ ﺇﱃ ﺍﺳﺘﺨﺪﺍﻡ ﺃﺳﺎﻟﻴﺐ ﻋﻠﻤﻴﺔ ﻭﺗﻘﻨﻴﺔ‬
‫ﻣﺘﻄﻮﺭﺓ ﳌﻮﺍﺟﻬﺔ ﻫﺬﻩ ﺍﻟﻄﻔﺮﺓ ‪ ،‬ﻓﻜﺎﻥ ﺃﻥ ﻇﻬﺮﺕ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ‪ ،‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﻇﻬﻮﺭ‬
‫ﻣﺴﺘﺤﺪﺛﺎﺕ ﺗﻘﻨﻴﺔ ﻛﺄﻗﺮﺍﺹ ﺍﻟﻔﻴﺪﻳﻮ ﺍﻟﺮﻗﻤﻴﺔ ﻭﺃﻗﺮﺍﺹ ﺍﻟﻠﻴﺰﺭ ‪ ،‬ﻭﻭﺳﺎﺋﻂ ﺍﻹﺗﺼﺎﻝ‪ ...‬ﻭﺫﻟﻚ ﻣﻦ ﺃﺟﻞ‬
‫ﺗﺴﻬﻴﻞ ﺍﻟﺘﺤﻜﻢ ﰲ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﻣﻌﺎﳉﺘﻬﺎ ﻭﺍﺳﺘﺮﺟﺎﻋﻬﺎ‪ ،‬ﻭﻫﻮ ﻣﺎﺩﻋﺎ ﺑﺎﻟﻜﺜﲑ ﻣﻦ ﺭﺟﺎﻝ‬
‫ﺍﻹﻗﺘﺼﺎﺩﻭﺍﻹﺟﺘﻤﺎﻉ ﺇﱃ ﻭﺻﻒ ﺍﻟﺜﻮﺭﺓ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﺎﻟﺜﻮﺭﺓ ﺍﻟﺼﻨﺎﻋﻴﺔ ﺍﻟﺜﺎﻧﻴﺔ ﺑﺎﳌﻘﺎﺭﻧﺔ ﻣﻊ ﺍﻟﺜﻮﺭﺓ ﺍﻟﺼﻨﺎﻋﻴﺔ‬
‫ﺍﻷﻭﱃ ﺍﻟﱵ ﲢﻘﻘﺖ ﰲ ﺍﻟﻘﺮﻧﲔ ﺍﻟﺘﺎﺳﻊ ﻋﺸﺮ ﻭﺍﻟﻌﺸﺮﻳﻦ‪ ،‬ﻓﻔﻲ ﺣﲔ ﻛﺎﻥ ﻫﺪﻑ ﺍﻟﺜﻮﺭﺓ ﺍﻷﻭﱃ ﺇﺣﻼﻝ‬
‫ﺍﻵﻟﺔ ﳏﻞ ﺍﳉﻬﺪ ﺍﻟﺒﺪﱐ ﻟﻺﻧﺴﺎﻥ ‪ ،‬ﻓﺈﻥ ﻫﺪﻑ ﺍﻟﺜﻮﺭﺓ ﺍﻟﺜﺎﻧﻴﺔ ﻫﻮ ﺇﺣﻼﻝ ﺍﻵﻟﺔ ﳏﻞ ﺍﻟﻨﺸﺎﻁ ﺍﻟﺬﻫﲏ‬
‫ﻟﻺﻧﺴﺎﻥ‪.‬‬
‫ﻭﰲ ﻣﺮﺣﻠﺔ ﻻﺣﻘﺔ ﻣﻦ ﻣﺴﺎﺭ ﻋﺼﺮ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﰎ ﺍﻟﺘﻮﺻﻞ ﺇﱃ ﻓﻜﺮﺓ ﺍﻟﺮﺑﻂ ﺑﲔ ﺃﺟﻬﺰﺓ‬
‫ﺍﻹﻋﻼﻡ ﺍﻵﱄ‪ ،‬ﻭﻭﺳﺎﺋﻞ ﺍﻹﺗﺼﺎﻝ‪ ،‬ﺍﻷﻣﺮ ﺍﻟﺬﻱ ﺃﲦﺮ ﻋﻠﻰ ﻇﻬﻮﺭ ﺷﺒﻜﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﻭﻟﻌﻞ ﺃﳘﻬﺎ ﻋﻠﻰ‬
‫ﺍﻹﻃﻼﻕ ﺷﺒﻜﺔ ﺍﻻﻧﺘﺮﻧﺖ )ﺷﺒﻜﺔ ﺍﻟﺸﺒﻜﺎﺕ(‪.‬‬

‫‪-2-‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﻣـﻘـﺪﻣﺔ‪:‬‬

‫ﰒ ﺍﺳﺘﺘﺒﻊ ﺍﺗﺴﺎﻉ ﻭﳕﺎﺀ ﻛﻞ ﻣﻦ ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﻹﺗﺼﺎﻻﺕ ﻭﺍﳊﺎﺳﺒﺎﺕ ﻣﻦ ﺟﻬﺔ‪ ،‬ﻭﺍﻟﱪﳎﻴﺔ ﲟﺎ‬


‫ﺗﻀﻤﻨﺘﻪ ﻣﻦ ﻫﻨﺪﺳﺔ ﺍﻟﱪﳎﻴﺎﺕ ﻭﺻﻨﺎﻋﺘﻬﺎ ﻣﻦ ﺟﻬﺔ ﺃﺧﺮﻯ‪،‬ﻭﺍﻹﻧﺪﻣﺎﺝ ﺍﳌﺬﻫﻞ ﺍﻟﺬﻱ ﺣﺪﺙ ﺑﻴﻨﻬﻤﺎ ﺇﱃ‬
‫ﺍﻟﻮﺻﻮﻝ ﺇﱃ ﺍﺳﺘﺤﺪﺍﺙ ﺗﻘﻨﻴﺔ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ‪.‬‬
‫ﻭﻣﻦ ﺩﻭﻥ ﺷﻚ ﺗﻀﺎﻋﻔﺖ ﺃﳘﻴﺔ ﻫﺬﻩ ﺍﻟﺘﻘﻨﻴﺔ ﻭﺍﺯﺩﺍﺩ ﺍﻹﻋﺘﻤﺎﺩ ﻋﻠﻴﻬﺎ ﰲ ﻧﻘﻞ ﻭﺗﺒﺎﺩﻝ ﺍﳌﻌﻠﻮﻣﺎﺕ‬
‫ﺑﺎﻟﺼﻮﺕ ﻭﺍﻟﺼﻮﺭﺓ ﻋﱪ ﺃﳓﺎﺀ ﺍﻟﻌﺎﱂ‪ ،‬ﻧﻈﺮﺍ ﳌﺎ ﺗﺘﻤﻴﺰ ﺑﻪ ﻣﻦ ﴰﻮﻝ ﻭﺳﻌﺔ ﳏﺘﻮﺍﻫﺎ ﻭﻣﺎﺗﻮﻓﺮﻩ ﻣﻦ ﻣﺎﻝ‬
‫ﻭﺟﻬﺪ ﻭﻭﻗﺖ‪،‬ﻭﺃﺻﺒﺤﺖ ﺑﺬﻟﻚ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ﺑﺴﺒﺐ ﺍﻟﺘﻘﻨﻴﺎﺕ ﺍﻟﱵ ﺗﻘﻮﻡ ﻋﻠﻴﻬﺎ‬
‫ﻭﺍﳌﺘﻤﺜﻠﺔ ﰲ ﺍﳊﻮﺍﺳﻴﺐ ﻭﺍﻟﺸﺒﻜﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻛﺜﺮ ﺍﻧﺘﺸﺎﺭﺍ ﰲ ﻛﻞ ﺍﻟﻘﻄﺎﻋﺎﺕ ﻭﺍ‪‬ﺎﻻﺕ )ﻛﺎﻟﺼﻨﺎﻋﺔ‬
‫ﻭﺍﻟﺘﺠﺎﺭﺓ ‪ ،‬ﺍﻟﻨﻘﻞ ‪ ،‬ﺍﻟﺼﺤﺔ ‪ ،‬ﺍﻟﺘﻌﻠﻴﻢ ‪ ،‬ﺍﻟﺪﻓﺎﻉ ﻭﺍﻟﺒﺤﻮﺙ ‪ (....‬ﻭﺑﺪﺍ ﻣﻦ ﺍﻟﺼﻌﺐ ﺃﻥ ﺗﻘﻮﻡ ﻫﺬﻩ‬
‫ﺍﻟﻘﻄﺎﻋﺎﺕ ﺑﺄﺩﺍﺀ ﺃﻋﻤﺎﳍﺎ ﺩﻭﻥ ﺍﻹﻋﺘﻤﺎﺩ ﺑﺸﻜﻞ ﺃﺳﺎﺳﻲ ﻋﻠﻰ ﻫﺬﻩ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳊﺪﻳﺜﺔ ‪ ،‬ﻓﻘﺪ ﺃﺻﺒﺤﺖ ﻣﻦ‬
‫ﻟﻮﺍﺯﻡ ﺍﳊﻴﺎﺓ ﺍﳌﺘﻄﻮﺭﺓ ﺳﻮﺍﺀ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻟﻌﺎﻡ ﺃﻡ ﺍﳋﺎﺹ‪ ،‬ﺣﻴﺚ ﺗﻌﺘﻤﺪ ﺍﳌﺆﺳﺴﺎﺕ ﺍﳊﻜﻮﻣﻴﺔ‬
‫ﻭﺍﳋﺎﺻﺔ ﻋﻠﻰ ﺣﺪ ﺳﻮﺍﺀ ﰲ ﺗﺴﻴﲑ ﺃﻋﻤﺎﳍﺎ ﺑﺸﻜﻞ ﺃﺳﺎﺳﻲ ﻋﻠﻰ ﺍﺳﺘﺨﺪﺍﻡ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ‪.‬‬
‫ﻟﻜﻦ ﻭﻋﻠﻰ ﺍﻟﺮﻏﻢ ﻣﻦ ﺍﳌﺰﺍﻳﺎ ﺍﳍﺎﺋﻠﺔ ﺍﻟﱵ ﲢﻘﻘﺖ ﻭﺗﺘﺤﻘﻖ ﻛﻞ ﻳﻮﻡ ﺑﻔﻀﻞ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻋﻠﻰ‬
‫ﲨﻴﻊ ﺍﻷﺻﻌﺪﺓ ﻭﰲ ﺷﱴ ﻣﻴﺎﺩﻳﻦ ﺍﳊﻴﺎﺓ ﺍﳌﻌﺎﺻﺮﺓ ‪ ،‬ﻓﺈﻥ ﻫﺬﻩ ﺍﻟﺜﻮﺭﺓ ﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺔ ﺍﳌﺘﻨﺎﻣﻴﺔ ﺻﺎﺣﺒﺘﻬﺎ ﰲ‬
‫ﺍﳌﻘﺎﺑﻞ ﲨﻠﺔ ﻣﻦ ﺍﻹﻧﻌﻜﺎﺳﺎﺕ ﺍﻟﺴﻠﺒﻴﺔ ﻭﺍﳋﻄﲑﺓ ﺟﺮﺍﺀ ﺳﻮﺀ ﺍﺳﺘﺨﺪﺍﻡ ﻫﺬﻩ ﺍﻟﺘﻘﻨﻴﺔ‪ ،‬ﺫﻟﻚ ﺃﻥ ﺍﻵﺛﺎﺭ‬
‫ﺍﻹﳚﺎﺑﻴﺔ ﺍﳌﺸﺮﻗﺔ ﻟﻌﺼﺮ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻻ ﺗﻨﻒ ﺍﻹﻧﻌﻜﺎﺳﺎﺕ ﺍﻟﺴﻠﺒﻴﺔ ﺍﻟﱵ ﺃﻓﺮﺯ‪‬ﺎ ﻫﺬﻩ ﺍﻟﺘﻘﻨﻴﺔ ‪ ،‬ﻧﺘﻴﺠﺔ‬
‫ﺇﺳﺎﺀﺓ ﺍﺳﺘﺨﺪﺍﻡ ﺍﻷﻧﻈﻤﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺍﺳﺘﻐﻼﳍﺎ ﻋﻠﻰ ﳓﻮ ﻏﲑ ﻣﺸﺮﻭﻉ ﻭﺑﻄﺮﻕ ﻣﻦ ﺷﺄ‪‬ﺎ ﺃﻥ ﺗﻠﺤﻖ‬
‫ﺍﻟﻀﺮﺭ ﲟﺼﺎﱀ ﺍﻷﻓﺮﺍﺩ ﻭﺍﳉﻤﺎﻋﺎﺕ‪ ،‬ﺍﻟﺸﻲﺀ ﺍﻟﺬﻱ ﺍﺳﺘﺘﺒﻌﻪ ﻇﻬﻮﺭ ﺃﳕﺎﻁ ﺟﺪﻳﺪﺓ ﻣﻦ ﺍﻹﻋﺘﺪﺍﺀﺍﺕ ﻋﻠﻰ‬
‫ﺗﻠﻚ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺨﺰﻧﺔ ﰲ ﺑﻴﺌﺔ ﺍﻓﺘﺮﺍﺿﻴﺔ‪ ،‬ﻟﻴﺲ ﻫﺬﺍ ﻓﺤﺴﺐ ﺑﻞ ﺳﻬﻠﺖ ﻫﺬﻩ ﺍﻟﺘﻘﻨﻴﺔ ﺍﺭﺗﻜﺎﺏ ﺑﻌﺾ‬
‫ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ‪ ،‬ﻓﺎﺯﺩﺍﺩﺕ ﻫﺬﻩ ﺍﳌﺨﺎﻃﺮ ﺗﻔﺎﻗﻤﺎ ﰲ ﻇﻞ ﺍﻟﺒﻴﺌﺔ ﺍﻹﻓﺘﺮﺍﺿﻴﺔ ﺍﻟﱵ ﲤﺜﻠﻬﺎ ﺷﺒﻜﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﳑﺎ ﺃﻓﺮﺯ ﻧﻮﻋﺎ ﺟﺪﻳﺪﺍ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‪ ،‬ﱂ ﻳﻜﻦ ﻣﻌﻬﻮﺩﺍ ﻣﻦ ﻗﺒﻞ ﻋﺮﻓﺖ ﺑﺎﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪،‬‬
‫ﺃﻭ ﺟﺮﺍﺋﻢ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ‪.‬‬

‫‪-3-‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﻣـﻘـﺪﻣﺔ‪:‬‬

‫ﻭﺍﳋﻄﻮﺭﺓ ﺍﻟﱵ ﺗﺘﻤﻴﺰ ‪‬ﺎ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺴﺘﺤﺪﺛﺔ ﻫﻲ ﺃ‪‬ﺎ ﺳﻬﻠﺔ ﺍﻹﺭﺗﻜﺎﺏ ﻧﺘﻴﺠﺔ ﻟﻺﺳﺘﺨﺪﺍﻡ‬
‫ﺍﻟﺴﻠﱯ ﻟﻠﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﲟﺎ ﺗﻮﻓﺮﻩ ﻣﻦ ﺗﺴﻬﻴﻼﺕ‪ ،‬ﻭﺃﻥ ﺁﺛﺎﺭﻫﺎ ﻟﻴﺴﺖ ﳏﺼﻮﺭﺓ ﰲ ﺍﻟﻨﻄﺎﻕ ﺍﻹﻗﻠﻴﻤﻲ‬
‫ﻟﺪﻭﻟﺔ ﺑﻌﻴﻨﻬﺎ‪ ،‬ﻓﻀﻼ ﻋﻠﻰ ﺃﻥ ﻣﺮﺗﻜﺒﻴﻬﺎ ﻳﺘﺴﻤﻮﻥ ﺑﺎﻟﺬﻛﺎﺀ ﻭﺍﻟﺪﺭﺍﻳﺔ ﰲ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻊ ﳎﺎﻝ ﺍﳌﻌﺎﳉﺔ ﺍﻹﻟﻴﺔ‬
‫ﻟﻠﻤﻌﻄﻴﺎﺕ ﻭﺍﻹﳌﺎﻡ ﺑﺎﳌﻬﺎﺭﺍﺕ ﻭﺍﳌﻌﺎﺭﻑ ﺍﻟﺘﻘﻨﻴﺔ‪ ،‬ﻟﻴﺲ ﻫﺬﺍ ﻓﺤﺴﺐ ﺑﻞ ﺇ‪‬ﺎ ﺗﺴﺘﻬﺪﻑ ﳏﻼ ﻣﻦ ﻃﺒﻴﻌﺔ‬
‫ﺧﺎﺻﺔ ﻭﻧﻌﲏ ﺑﺬﻟﻚ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﱵ ﳛﺘﻮﻱ ﻋﻠﻴﻬﺎ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ‪ ،‬ﻭﺍﻟﺬﻱ ﻫﻮ ﻋﺒﺎﺭﺓ ﻋﻦ ﺇﺷﺎﺭﺍﺕ‬
‫ﻭﻧﺒﻀﺎﺕ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ ﺗﻨﺴﺎﺏ ﻋﱪ ﺃﺟﺰﺍﺀ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻭﺷﺒﻜﺎﺕ ﺍﻹﺗﺼﺎﻝ ﺍﻟﻌﺎﳌﻴﺔ ﺑﺼﻮﺭﺓ ﺁﻟﻴﺔ‪،‬‬
‫ﺍﻷﻣﺮ ﺍﻟﺬﻱ ﺑﺎﺕ ﻳﺜﲑ ﺑﻌﺾ ﺍﻟﺘﺤﺪﻳﺎﺕ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻭﺍﻟﻌﻤﻠﻴﺔ ﺃﻣﺎﻡ ﺍﻷﺟﻬﺰﺓ ﺍﳌﻌﻨﻴﺔ ﲟﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ‬
‫)ﺃﺟﻬﺰﺓ ﺍﻟﻌﺪﺍﻟﺔ ﺍﳉﻨﺎﺋﻴﺔ ﲜﻤﻴﻊ ﻣﺴﺘﻮﻳﺎ‪‬ﺎ ﻭﻋﻠﻰ ﺍﺧﺘﻼﻑ ﺃﺩﻭﺍﺭﻫﺎ (ﻭﺑﺎﻟﺬﺍﺕ ﻓﻴﻤﺎ ﳜﺺ ﺇﺛﺒﺎﺕ ﻫﺬﻩ‬
‫ﺍﳉﺮﺍﺋﻢ ﻭﺁﻟﻴﺔ ﻣﺒﺎﺷﺮﺓ ﺇﺟﺮﺍﺀﺍﺕ ﺍﻹﺳﺘﺪﻻﻝ ﻭﺍﻟﺘﺤﻘﻴﻖ ﻋﱪ ﺍﻟﺒﻴﺌﺔ ﺍﻹﻓﺘﺮﺍﺿﻴﺔ ﻟﺘﻌﻘﺐ ﺍ‪‬ﺮﻣﲔ ﻭﺗﻘﺪﳝﻬﻢ‬
‫ﻟﻠﻌﺪﺍﻟﺔ ‪.‬‬
‫ﻓﺈﺫﺍ ﻛﺎﻧﺖ ﺍﳉﻬﺎﺕ ﺍﳌﻜﻠﻔﺔ ﺑﺎﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﳝﺔ ﻭﺍ‪‬ﺮﻣﲔ ﻣﺘﻌﻮﺩﺓ ﻋﻠﻰ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻊ‬
‫ﺍﳉﺮﳝﺔ ﺑﺼﻮﺭ‪‬ﺎ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ‪ ،‬ﻭﺍﻟﱵ ﳝﻜﻦ ﺇﺩﺭﺍﻛﻬﺎ ﺑﺎﳊﻮﺍﺱ ﳌﺎ ﳝﻜﻦ ﺃﻥ ﳜﻠﻔﻪ ﻣﺮﺗﻜﺒﻮﻫﺎ ﻣﻦ ﺁﺛﺎﺭ ﻣﺎﺩﻳﺔ‬
‫ﰲ ﻣﺴﺮﺡ ﺍﳉﺮﳝﺔ ﻣﻦ ﺑﺼﻤﺎﺕ ﺃﻭ ﺁﺛﺎﺭ ﺃﻗﺪﺍﻡ ﺃﻭ ﺑﻘﻊ ﺩﻡ ﺃﻭ ﳏﺮﺭﺍﺕ ﻣﺰﻭﺭﺓ ‪ ، .....‬ﻓﺈﻥ ﺍﳌﺸﻜﻼﺕ‬
‫ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﻟﱵ ﺳﺘﻮﺍﺟﻪ ﻫﺬﻩ ﺍﳉﻬﺎﺕ ﻋﻨﺪ ﺗﻌﺎﻣﻠﻬﺎ ﻣﻊ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺗﺒﺪﺃ ﻣﻦ ﻃﺒﻴﻌﺔ ﺍﻟﺒﻴﺌﺔ‬
‫ﺍﻹﻓﺘﺮﺍﺿﻴﺔﺍﻟﺘﻘﻨﻴﺔ ﺍﻟﱵ ﺗﺮﺗﻜﺐ ﻓﻴﻬﺎ‪ ،‬ﻓﻬﻲ ﻻ ﲣﻠﻔﺄﻱ ﺁﺛﺎﺭ ﻣﺎﺩﻳﺔ ﳏﺴﻮﺳﺔ‪ ،‬ﻛﻤﺎ ﺃﻥ ﻫﺬﻩ ﺍﳉﺮﳝﺔ ﺗﺘﻢ ﰲ‬
‫ﺍﳋﻔﺎﺀ‪ ،‬ﻓﻜﺜﲑﺍ ﻣﺎ ﻳﻌﻤﺪ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺇﱃ ﺇﺧﻔﺎﺀ ﻧﺸﺎﻃﻪ ﺍﳉﺮﻣﻲ ﻋﻦ ﻃﺮﻳﻖ ﺗﻼﻋﺒﻬﺒﺎﻟﺒﻴﺎﻧﺎﺕ ﻭﺍﻟﺬﻱ‬
‫ﻏﺎﻟﺒﺎ ﻣﺎ ﻳﺘﺤﻘﻖ ﰲ ﻏﻔﻠﺔ ﻣﻦ ﺍ‪‬ﲏ ﻋﻠﻴﻪ‪ ،‬ﻓﻀﻼ ﻋﻦ ﺳﻬﻮﻟﺔ ﺗﺪﻣﲑ ﺍﻟﺪﻟﻴﻞ ﻭﳏﻮﻩ ﻣﻦ ﻣﺴﺮﺡ ﺍﳉﺮﳝﺔ ﳑﺎ‬
‫ﻳﻌﻘﺪ ﺃﻣﺮ ﻛﺸﻔﻬﺎ ﻭﲢﺪﻳﺪ ﻣﺮﺗﻜﺒﻬﺎ‪.‬‬
‫ﻭﻋﻠﻰ ﺿﻮﺀ ﺫﻟﻚ ﻓﺈﻥ ﻫﺬﻩ ﺍﻟﻈﺎﻫﺮﺓ ﺍﻹﺟﺮﺍﻣﻴﺔ ﺍﻟﺘﻘﻨﻴﺔ ﺃﺛﺎﺭﺕ ﺍﻟﻌﺪﻳﺪ ﻣﻦ ﺍﳌﺸﻜﻼﺕ ﰲ ﻧﻄﺎﻕ‬
‫ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺍﻟﺬﻱ ﻭﺿﻌﺖ ﻧﺼﻮﺻﻪ ﻟﺘﺤﻜﻢ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳌﺘﻌﻠﻘﺔ ﲜﺮﺍﺋﻢ ﺗﻘﻠﻴﺪﻳﺔ ﻻ ﺗﻮﺟﺪ‬
‫ﺻﻌﻮﺑﺎﺕ ﻛﺒﲑﺓ ﰲ ﺇﺛﺒﺎ‪‬ﺎ ﺃﻭ ﺍﻟﺘﺤﻘﻴﻖ ﻓﻴﻬﺎ ﻭﲨﻊ ﺍﻷﺩﻟﺔ ﺍﳌﺘﻌﻠﻘﺔ ‪‬ﺎ‪ ،‬ﻣﻊ ﺧﻀﻮﻋﻬﺎ ﳌﺒﺪﺃ ﺍﻻﻗﺘﻨﺎﻉ‬
‫ﺍﻟﺸﺨﺼﻲ ﻟﻠﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ‪.‬‬

‫‪-4-‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﻣـﻘـﺪﻣﺔ‪:‬‬

‫ﻭﻫﻮ ﺍﻷﻣﺮ ﺍﻟﺬﻱ ﻛﺎﻥ ﻋﺎﻣﻼ ﺣﺎﲰﺎ ﻟﺘﺪﺧﻞ ﺍﳌﺸﺮﻉ ﺑﻨﺼﻮﺹ ﻗﺎﻧﻮﻧﻴﺔ ﺇﺟﺮﺍﺋﻴﺔ ﲢﻤﻞ ﻣﻌﻬﺎ ﻃﺮﻗﺎ‬
‫ﺇﺟﺮﺍﺋﻴﺔ ﻣﺪﻋﻤﺔ ﻣﻦ ﻗﺒﻞ ﺍﻟﺘﻘﻨﻴﺔ ﺫﺍ‪‬ﺎ‪ ،‬ﻟﻴﻤﻜﻦ ﻣﻦ ﺧﻼﳍﺎ ﺍﺳﺘﻨﺒﺎﻁ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺬﻱ ﻳﺘﻮﺍﻓﻖ ﻣﻊ ﺍﻟﻄﺒﻴﻌﺔ‬
‫ﺍﻟﺘﻘﻨﻴﺔ ﳍﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻭﻭﺳﺎﺋﻞ ﺍﺭﺗﻜﺎ‪‬ﺎ‪ ،‬ﳑﺎ ﺃﺩﻯ ﺇﱃ ﻇﻬﻮﺭ ﻧﻮﻉ ﺟﺪﻳﺪ ﻣﻦ ﺍﻷﺩﻟﺔ ﳝﻜﻦ ﺍﻹﻋﺘﻤﺎﺩ ﻋﻠﻴﻪ‬
‫ﰲ ﺇﺛﺒﺎﺕ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻣﻦ ﺫﺍﺕ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﺘﻘﻨﻴﺔ ﺍﻟﱵ ﺗﺘﻤﻴﺰ ‪‬ﺎ ﺍﻟﺒﻴﺌﺔ ﳏﻞ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫ﻭﻗﺪ ﻛﺎﻥ ﺫﻟﻚ ﺑﺄﻥ ﻗﺎﻡ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﺑﺘﻌﺪﻳﻞ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﲟﻮﺟﺐ ﺍﻟﻘﺎﻧﻮﻥ‬
‫‪22/06‬ﺍﳌﺆﺭﺥ ﰲ ‪20‬ﺩﻳﺴﻤﱪ ‪ ،2006‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺇﺻﺪﺍﺭﻩ ﻟﻠﻘﺎﻧﻮﻥ ‪ 04/09‬ﺍﳌﺘﻀﻤﻦ ﻟﻠﻘﻮﺍﻋﺪ ﺍﳋﺎﺻﺔ‬
‫ﻟﻠﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺎﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭﺍﻻﺗﺼﺎﻝ ‪ ،‬ﻭﻣﻦ ﺧﻼﳍﻤﺎ ﺃﻭﺟﺪ ﺍﳌﺸﺮﻉ ﻃﺮﻗﺎ‬
‫ﺇﺟﺮﺍﺋﻴﺔ ﺗﺘﻔﻖ ﻭﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﺘﻘﻨﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﺃﳘﻴﺔ ﺍﻟـﺒﺤﺚ‪:‬‬
‫ﻭﻳﻌﺪ ﻣﻮﺿﻮﻉ ﺍﻟﺒﺤﺚ ﻣﻦ ﺍﳌﻮﺿﻮﻋﺎﺕ ﺍﳉﺪﻳﺪﺓ ﻭﺍﳌﻬﻤﺔ ﰲ ﺇﻃﺎﺭ ﺍﻟﻘﺴﻢ ﺍﻹﺟﺮﺍﺋﻲ ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ‬
‫ﺍﳉﺰﺍﺋﻲ ﻭﻫﻮ ﻣﻦ ﺍﳌﻮﺿﻮﻋﺎﺕ ﺍﻟﱵ ﻻ ﺗﺰﺍﻝ ﺑﹺﻜﺮﺍ ﻭﱂ ﺗﻨﻞ ﺣﻈﻬﺎ ﻣﻦ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﻤﺤﻴﺺ ﻋﻠﻰ ﻣﺴﺘﻮﻯ‬
‫ﺍﻟﻔﻘﻪ ﺍﳉﺰﺍﺋﻲ‪ ،‬ﺇﺫ ﺃﻥ ﺃﻏﻠﺐ ﺍﻟﺪﺭﺍﺳﺎﺕ ﺍﳌﻨﺸﻮﺭﺓ ﰲ ﳎﺎﻝ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺍﻗﺘﺼﺮﺕ ﻋﻠﻰ ﺍﻟﺒﺤﺚ ﰲ‬
‫ﺍﳉﻮﺍﻧﺐ ﺍﳌﻮﺿﻮﻋﻴﺔ ﳍﺎ ﺩﻭﻥ ﳏﺎﻭﻟﺔ ﺍﻟﻐﻮﺹ ﰲ ﻣﺴﺄﻟﺔ ﺇﺛﺒﺎ‪‬ﺎ ﻭﻣﺪﻯ ﺗﺄﺛﲑ ﺧﺼﺎﺋﺼﻬﺎ ﻋﻠﻰ ﺍﻹﺟﺮﺍﺀﺍﺕ‬
‫ﺍﳌﻨﺎﺳﺒﺔ ﰲ ﺫﻟﻚ‪.‬‬
‫ﻭﺇﺫﺍ ﻛﺎﻧﺖ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﻌﺪ ﻣﻦ ﺍﻷﳕﺎﻁ ﺍﻹﺟﺮﺍﻣﻴﺔ ﺍﻟﱵ ﻓﺠﺮ‪‬ﺎ ﺣﺪﻳﺜﺎ ﺛﻮﺭﺓ ﺗﻘﻨﻴﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﻹﺗﺼﺎﻻﺕ ﻋﻦ ﺑﻌﺪ‪ ،‬ﺣﻴﺚ ﺗﻌﺘﱪ ﻣﻦ ﺍﳌﺴﺘﺠﺪﺍﺕ ﺍﻟﱵ ﱂ ﺗﻜﻦ ﻣﻌﺮﻭﻓﺔ ﻟﻠﻘﺎﻧﻮﻥ ﺍﳉﺰﺍﺋﻲ‬
‫ﺳﻮﺍﺀ ﺍﳌﻮﺿﻮﻋﻲ ﺃﻭ ﺍﻹﺟﺮﺍﺋﻲ‪ ،‬ﻓﻤﻦ ﺩﻭﻥ ﺷﻚ ﺃﻥ ﺃﻱ ﳏﺎﻭﻟﺔ ﻟﻠﺘﻌﺎﻣﻞ ﺇﺟﺮﺍﺋﻴﺎ ﻣﻊ ﻫﺬﺍ ﺍﻟﻨﻤﻂ‬
‫ﺍﻹﺟﺮﺍﻣﻲ ﰲ ﺇﻃﺎﺭ ﻋﻤﻠﻴﺔ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺠﺮﻳﺐ ﺳﻮﻑ ﳜﻠﻖ ﺇﺷﻜﺎﻻﺕ ﺇﺟﺮﺍﺋﻴﺔ ﻟﻸﺟﻬﺰﺓ ﺍﳌﻜﻠﻔﺔ ‪‬ﺬﻩ‬
‫ﺍﻟﻌﻤﻠﻴﺔ‪ ،‬ﻳﻨﺒﻐﻲ ﺃﻥ ﺗﺄﰐ ﺍﻟﺪﺭﺍﺳﺎﺕ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻋﻠﻴﻬﺎ ﺑﺎﻟﺸﺮﺡ ﻭﺍﻟﺘﺤﻠﻴﻞ‪.‬‬
‫ﻭﻣﻦ ﻫﻨﺎ ﺗﺄﰐ ﺃﳘﻴﺔ ﻣﻮﺿﻮﻉ ﺍﻟﺒﺤﺚ ﺍﻟﺬﻱ ﺣﺎﻭﻟﺖ ﻣﻦ ﺧﻼﻟﻪ ﻣﻨﺎﻗﺸﺔ ﺍﳌﻔﺎﻫﻴﻢ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ‬
‫ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﺭﺑﻄﻬﺎ ﺑﺎﳌﻔﺎﻫﻴﻢ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺈﺟﺮﺍﺀﺍﺕ ﲢﺼﻴﻞ ﻭﺍﺳﺘﻘﺼﺎﺀ ﺍﻟﺪﻟﻴﻞ‬

‫‪-5-‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﻣـﻘـﺪﻣﺔ‪:‬‬

‫ﰲ ﺇﺛﺒﺎﺕ ﺍﳉﺮﳝﺔ ‪ ،‬ﻭﻭﺿﻊ ﺍﻟﺘﺼﻮﺭﺍﺕ ﻭﺍﻟﺮﺅﻯ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﳉﻮﺍﻧﺐ ﺍﻹﺟﺮﺍﺋﻴﺔﰲ ﺇﻃﺎﺭ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻊ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﻇﻞ ﺍﻟﻨﺼﻮﺹ ﺍﻟﺘﺸﺮﻳﻌﻴﺔ ﺍﳊﺎﻟﻴﺔ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﺰﺍﺋﺮﻱ‪.‬‬

‫‪-6-‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﻣـﻘـﺪﻣﺔ‪:‬‬

‫ﺃﺳﺒﺎﺏ ﺇﺧﺘﻴﺎﺭ ﺍﻟﺒﺤﺚ‪:‬‬


‫ﻻ ﳜﻔﻰ ﺳﺒﺐ ﺍﺧﺘﻴﺎﺭﻱ ﳍﺬﺍ ﺍﻟﺒﺤﺚ‪ ،‬ﻭﻫﻮ ﺭﻏﺒﱵ ﰲ ﺍﻟﻮﻗﻮﻑ ﻋﻠﻰ ﺣﻘﻴﻘﺔ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻊ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﺍﻟﻨﺎﺣﻴﺔ ﺍﻹﺟﺮﺍﺋﻴﺔ ﻓﺎﻟﻜﺜﲑ ﻣﻦ ﺍﻟﺪﺭﺍﺳﺎﺕ ﺍﻟﱵ ﻋ‪‬ﻨﻴﺖ ‪‬ﺬﻩ ﺍﳉﺮﺍﺋﻢ ﺑﺎﺗﺖ ﺗﺮﻛﺰ ﻋﻠﻰ‬
‫ﺍﳉﺎﻧﺐ ﺍﳌﻮﺿﻮﻋﻲ ﻓﻘﻂ‪ ،‬ﻓﻮﺟﺪﺕ ﻗﻠﺔ ﻧﺎﺩﺭﺓ ﻣﻦ ﺍﳌﺆﻟﻔﺎﺕ ﻣﺎ ﻳﺘﻌﺮﺽ ﻟﻠﺠﺎﻧﺐ ﺍﻹﺟﺮﺍﺋﻲ ﻟﺬﻟﻚ‬
‫ﺣﺎﻭﻟﺖ ﻣﻦ ﺧﻼﻝ ﲝﺜﻲ ﻫﺬﺍ ﺇﺛﺮﺍﺀ ﺍﻟﻨﻘﺎﺵ ﺍﻟﻘﺎﻧﻮﱐ ﺣﻮﻝ ﻫﺬﺍ ﺍﳌﻮﺿﻮﻉ ﺍﳍﺎﻡ‪.‬‬
‫ﺃﻫﺪﺍﻑ ﺍﻟﺪﺭﺍﺳﺔ‪:‬‬
‫ﻳﻨﺒﻊ ﺍﳍﺪﻑ ﻣﻦ ﻫﺬﻩ ﺍﻟﺪﺭﺍﺳﺔ ﻣﻦ ﳏﺎﻭﻟﺔ ﺍﳌﺴﺎﳘﺔ ﰲ ﻭﺿﻊ ﺍﳋﻄﻮﻁ ﺍﻟﻌﺮﻳﻀﺔ ﻟﻠﺘﻌﺮﻑ ﻋﻠﻰ‬
‫ﻃﺮﻕ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‪ ،‬ﺫﻟﻚ ﺃﻥ ﺟﺪﺓ ﻭﺣﺪﺍﺛﺔ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻣﺎ ﺗﺘﺴﻢ ﺑﻪ ﻣﻦ‬
‫ﺧﺼﺎﺋﺺ ﺳﻮﻑ ﳚﺪ ﻣﻌﻪ ﺍﶈﻘﻖ ﻧﻔﺴﻪ ﰲ ﺣﲑﺓ ﺃﻣﺎﻣﻬﺎ ﻭﻛﻴﻔﻴﺔ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻌﻬﺎ ﻭﺃﺳﻠﻮﺏ ﺍﻟﺘﺤﻘﻴﻖ ﻓﻴﻬﺎ‪،‬‬
‫ﺇﺫ ﻻﺷﻚ ﺃﻥ ﺇﺟﺮﺍﺀﺍﺕ ﺍﻟﺘﺤﻘﻴﻖ ﻭﲨﻊ ﺍﻷﺩﻟﺔ ﲞﺼﻮﺹ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﳜﺘﻠﻒ ﻋﻤﺎ ﻫﻮ ﺍﳊﺎﻝ ﻋﻠﻴﻪ ﰲ‬
‫ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ‪.‬‬
‫ﺇﺷﻜﺎﻟﻴﺔ ﺍﻟﺒـﺤﺚ‪:‬‬
‫ﺇﺫﺍ ﻛﺎﻧﺖ ﻇﺎﻫﺮﺓ ﺍﻹﺟﺮﺍﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻗﺪ ﺃﺛﺎﺭﺕ ﺑﻌﺾ ﺍﳌﺸﻜﻼﺕ ﻓﻴﻤﺎ ﻳﺘﻌﻠﻖ ﺑﺎﻟﻘﺎﻧﻮﻥ ﺍﳉﻨﺎﺋﻲ‬
‫ﺍﳌﻮﺿﻮﻋﻲ ﲝﺜﺎ ﻋﻦ ﺇﻣﻜﺎﻧﻴﺔ ﺗﻄﺒﻴﻖ ﻧﺼﻮﺻﻪ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻋﻠﻰ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﻭﺍﺣﺘﺮﺍﻡ ﻣﺒﺪﺃ‬
‫ﺍﻟﺸﺮﻋﻴﺔ ﻭﺍﻟﺘﻔﺴﲑ ﺍﻟﻀﻴﻖ ﻟﻠﻨﺼﻮﺹ ﺍﳉﻨﺎﺋﻴﺔ‪ ،‬ﻓﻘﺪ ﺃﺛﺎﺭﺕ ﰲ ﻧﻔﺲ ﺍﻟﻮﻗﺖ ﺍﻟﻌﺪﻳﺪ ﻣﻦ ﺍﳌﺸﻜﻼﺕ ﰲ‬
‫ﻧﻄﺎﻕ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﺰﺍﺋﻲ ﺍﻹﺟﺮﺍﺋﻲ‪ ،‬ﻭﺗﺒﺪﺃ ﺍﳌﺸﻜﻼﺕ ﺍﻹﺟﺮﺍﺋﻴﺔ ﰲ ﳎﺎﻝ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﺘﻌﻠﻘﻬﺎ ﰲ‬
‫ﻛﺜﲑ ﻣﻦ ﺍﻷﺣﻴﺎﻥ ﺑﺒﻴﺎﻧﺎﺕ ﺍﳌﻌﺎﳉﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﻛﻴﺎﻧﺎﺕ ﻣﻨﻄﻘﻴﺔ ﻏﲑ ﻣﺎﺩﻳﺔ‪ ،‬ﻭﻣﻦ ﰒ ﻳﺼﻌﺐ ﺍﻟﻜﺸﻒ‬
‫ﻋﻦ ﺗﻠﻚ ﺍﳉﺮﺍﺋﻢ ﻭﺇﺛﺒﺎ‪‬ﺎ ﻧﻈﺮﺍ ﻟﻠﺴﺮﻋﺔ ﻭﺍﻟﺪﻗﺔ ﺍﻟﻌﺎﻟﻴﺔ ﰲ ﺗﻨﻔﻴﺬﻫﺎ ﻭﻛﺬﺍ ﺇﻣﻜﺎﻧﻴﺔ ﳏﻮﻫﺎ ﻭﲤﻮﻳﻪ ﺁﺛﺎﺭﻫﺎ‬
‫ﻭﺇﺧﻔﺎﺀ ﺍﻷﺩﻟﺔ ﺍﳌﺘﺤﺼﻠﺔ ﻣﻨﻬﺎ ﻋﻘﺪ ﺗﻨﻔﻴﺬﻫﺎ‪.‬‬
‫ﻭﻟﺬﻟﻚ ﻓﻘﺪ ﺍﻣﺘﺪ ﺗﺄﺛﲑ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺇﻟىﺎﳉﺎﻧﺐ ﺍﻹﺟﺮﺍﺋﻲ ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﺰﺍﺋﻲ‪ ،‬ﺫﻟﻚ ﺃﻥ‬
‫ﻧﺼﻮﺹ ﻫﺬﺍ ﺍﻟﻘﺎﻧﻮﻥ ﺇﳕﺎ ﺻﻴﻐﺖ ﻟﺘﺤﻜﻢ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳌﺘﻌﻠﻘﺔ ﲜﺮﺍﺋﻢ ﺗﻘﻠﻴﺪﻳﺔ‪ ،‬ﺗﺮﺗﻜﺐ ﰲ ﻋﺎﱂ ﻣﺎﺩﻱ‬
‫ﻭﻣﻠﻤﻮﺱ ﻳﻠﻌﺐ ﻓﻴﻪ ﺍﻟﺴﻠﻮﻙ ﺍﳌﺎﺩﻱ ﺍﻟﺪﻭﺭ ﺍﻷﻛﱪ ﻭﺍﻷﻫﻢ ﻋﻠﻰ ﺧﻼﻑ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﱵ ﺗﺮﺗﻜﺐ‬

‫‪-7-‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﻣـﻘـﺪﻣﺔ‪:‬‬

‫ﰲ ﻣﺴﺮﺡ ﺇﻟﻜﺘﺮﻭﱐ ﻏﲑ ﻣﺎﺩﻱ ﳜﺘﻠﻒ ﻛﻠﻴﺎ ﻋﻦ ﺍﳌﺴﺮﺡ ﺍﻟﺘﻘﻠﻴﺪﻱ‪ .‬ﻭﻫﻨﺎ ﻳﻜﻮﻥ ﺍﻟﺘﺴﺎﺅﻝ ﺣﻮﻝ ﻣﺪﻯ‬
‫ﺻﻼﺣﻴﺔ ﻫﺬﻩ ﺍﻹﺟﺮﺍﺀﺍﺕ ﻟﻀﺒﻂ ﻭﺇﺛﺒﺎﺕ ﺟﺮﳝﺔ ﺍﺭﺗﻜﺒﺖ ﰲ ﻋﺎﱂ ﺍﻓﺘﺮﺍﺿﻲ ﻏﲑ ﻣﻠﻤﻮﺱ‪ .‬ﻭﻫﻞ ﻫﺬﺍ‬
‫ﺍﻷﻣﺮ ﺳﻮﻑ ﳚﻌﻞ ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﻗﺎﺻﺮﺍ ﻋﻦ ﺍﻟﻮﻓﺎﺀ ﲟﺘﻄﻠﺒﺎﺕ ﺍﻟﺸﺮﻋﻴﺔ ﺍﻹﺟﺮﺍﺋﻴﺔ ﰲ‬
‫ﻣﻮﺍﺟﻬﺔ ﻫﺬﺍ ﺍﻟﻨﻤﻂ ﺍﻹﺟﺮﺍﻣﻲ‪ ،‬ﻭﺇﺫﺍ ﻛﺎﻥ ﺍﳊﺎﻝ ﻛﺬﻟﻚ ﻓﺈﻥ ﺍﻟﻮﺿﻊ ﻳﻘﺘﻀﻲ ﺗﺪﺧﻞ ﺍﳌﺸﺮﻉ ﻟﺘﻌﺪﻳﻞ‬
‫ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺃﻭ ﺍﺳﺘﺤﺪﺍﺙ ﻗﺎﻧﻮﻥ ﺧﺎﺹ ﻳﻀﻤﻦ ﺗﻮﻓﲑ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﻟﱵ ﳝﻜﻦ ﻣﻦ‬
‫ﺧﻼﳍﺎ ﳉﻬﺎﺕ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﺍﻟﻮﺻﻮﻝ ﺇﱃ ﺍﻟﺪﻟﻴﻞ ﺍﳌﻨﺎﺳﺐ ﻹﺛﺒﺎﺕ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫ﻓﻬﻞ ﺍﺳﺘﺠﺎﺏ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﳍﺬﻩ ﺍﳌﱪﺭﺍﺕ ﻭﺍﺳﺘﺤﺪﺙ ﰲ ﺳﺒﻴﻞ ﺫﻟﻚ ﺗﺸﺮﻳﻌﺎﺕ ﺟﺪﻳﺪﺓ‬
‫ﳌﻌﺎﳉﺔ ﺁﺛﺎﺭ ﻭﺍﻧﻌﻜﺎﺳﺎﺕ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﺇﺟﺮﺍﺀﺍﺕ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ‪ ،‬ﻭﺇﱃ ﺃﻱ ﻣﺪﻯ ﻭﻓﻖ‬
‫ﺍﳌﺸﺮﻉ ﰲ ﺍﺳﺘﺤﺪﺍﺙ ﻃﺮﻕ ﺇﺟﺮﺍﺋﻴﺔ ﰲ ﺳﺒﻴﻞ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﳝﺔ ﻭﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‪.‬‬
‫ﻭﺇﺫ ﳓﻦ ﺑﺼﺪﺩ ﺍﻟﺒﺤﺚ ﰲ ﻫﺬﻩ ﺍﻹﺷﻜﺎﻟﻴﺔ ﺍﳉﻮﻫﺮﻳﺔ ﺗﺼﺎﺩﻓﻨﺎ ﺗﺴﺎﺅﻻﺕ ﻳﻌﺘﱪ ﺍﻟﺒﺤﺚ ﻓﻴﻬﺎ ﺃﻣﺮﺍ‬
‫ﺿﺮﻭﺭﻳﺎ ﻟﻺﺟﺎﺑﺔ ﻋﻦ ﺟﻮﻫﺮ ﻣﻮﺿﻮﻉ ﺍﻟﺪﺭﺍﺳﺔ ﻭﺍﻟﱵ ﻣﻨﻬﺎ‪:‬‬

‫• ﻣﺎﻫﻲ ﺧﺼﺎﺋﺺ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻛﺬﺍ ﺧﺼﺎﺋﺺ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‪ ،‬ﻭﻣﺎ ﻣﺪﻯ ﺗﺄﺛﲑﻫﺎ ﻋﻠﻰ‬
‫ﺇﺛﺒﺎﺕ ﺍﳉﺮﳝﺔ ﻭﺇﺳﻨﺎﺩﻫﺎ ﻟﻠﻤﺘﻬﻢ؟‬
‫• ﻣﺎﻫﻲ ﻃﺒﻴﻌﺔ ﺍﻟﺪﻟﻴﻞ ﺍﳌﻨﺎﺳﺐ ﻹﺛﺒﺎﺕ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻣﺎﻫﻲ ﺧﺼﺎﺋﺼﻪ؟‬
‫• ﻛﻴﻒ ﳝﻜﻦ ﺇﺳﺘﺨﻼﺹ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻣﻦ ﺍﻟﺒﻴﺌﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺍﻟﱵ ﻳﺘﻮﺍﺟﺪ ‪‬ﺎ؟‬
‫• ﻣﺎﻫﻲ ﺍﻟﺼﻌﻮﺑﺎﺕ ﻭﺍﳌﻌﻮﻗﺎﺕ ﺍﻟﱵ ﺗﻮﺍﺟﻪ ﺟﻬﺎﺕ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﰲ ﺍﺳﺘﺨﻼﺹ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ؟‬
‫• ﻛﻴﻒ ﺗﻌﺎﻣﻞ ﺍﳌﺸﺮﻉ ﻣﻊ ﻫﺬﺍﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﰲ ﳎﺎﻝ ﺍﻹﺛﺒﺎﺕ ﺍﳉﺰﺍﺋﻲ ﻣﻦ ﺣﻴﺚ ﻛﻮﻧﻪ ﺩﻟﻴﻼ ﻋﻠﻤﻴﺎ‬
‫ﻭﺃﺛﺮ ﻫﺬﻩ ﺍﳋﺎﺻﻴﺔ ﻋﻠﻰ ﻣﺒﺪﺃ ﺍﻻﻗﺘﻨﺎﻉ ﺍﻟﺸﺨﺼﻲ ﻟﻠﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ؟‬
‫• ﻣﺎﻣﺪﻯ ﺣﺠﻴﺔ ﺍﳌﺨﺮﺟﺎﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﰲ ﺍﻹﺛﺒﺎﺕ ﻧﻈﺮﺍ ﻟﻄﺒﻴﻌﺘﻬﺎ ﺍﳋﺎﺻﺔ ﺑﺎﳌﻘﺎﺭﻧﺔ ﺑﻮﺳﺎﺋﻞ‬
‫ﺍﻹﺛﺒﺎﺕ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ؟‬

‫‪-8-‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﻣـﻘـﺪﻣﺔ‪:‬‬

‫ﻣـﻨﺎﻫـﺞ ﺍﻟﺒﺤﺚ‪:‬‬
‫ﻭﻗﺪ ﺗﻄﻠﺐ ﻣﻨﺎ ﻫﺬﺍ ﺍﻟﺒﺤﺚ ﺇﻋﺘﻤﺎﺩﺍﳌﻨﻬﺞ ﺍﻟﻮﺻﻔﻲ ﻛﺄﺻﻞ‪ ،‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﻣﻨﺎﻫﺞ ﺃﺧﺮﻯ‬
‫ﺗﻜﻤﻴﻠﻴﺔ ﻭﻫﻲ ﺍﳌﻨﻬﺞ ﺍﻟﺘﺤﻠﻴﻠﻲ ‪،‬ﺍﳌﻘﺎﺭﻥ ‪ ،‬ﺍﻟﺘﺄﺻﻴﻠﻲ‪ ،‬ﻧﻠﺠﺄ ﺇﻟﻴﻬﺎ ﻛﻠﻤﺎ ﺍﺳﺘﻮﺟﺐ ﻣﻨﺎ ﺍﻟﺒﺤﺚ ﺫﻟﻚ‪.‬‬
‫ﻓﺎﳌﻨﻬﺞ ﺍﻟﻮﺻﻔﻲ ﻳﻈﻬﺮ ﻣﻦ ﺧﻼﻝ ﻗﻴﺎﻣﻨﺎ ﺑﻮﺻﻒ ﻇﺎﻫﺮﺓ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﲢﺪﻳﺪ ﺑﻌﺾ‬
‫ﺍﳌﻔﺎﻫﻴﻢ ﺍﻟﱵ ﺗﻘﻮﻡ ﻋﻠﻴﻬﺎ‪ ،‬ﻭﻛﺬﺍ ﻗﻴﺎﻣﻨﺎ ﺑﻮﺻﻒ ﺍﳌﻔﺎﻫﻴﻢ ﺍﳋﺎﺻﺔ ﺑﺎﻹﺟﺮﺍﺀﺍﺕ ﺍﳌﺴﺘﻌﻤﻠﺔ ﰲ ﺍﺳﺘﺨﻼﺹ‬
‫ﺍﻟﺪﻟﻴﻞ ﻭﺍﻟﺼﻌﻮﺑﺎﺕ ﺍﻟﱵ ﺗﻮﺍﺟﻬﻬﺎ‪.‬‬
‫ﺍﳌﻨﻬﺞ ﺍﻟﺘﺤﻠﻴﻠﻲ ﺣﺎﻭﻟﻨﺎ ﰲ ﻫﺬﺍ ﺍﻟﺒﺤﺚ ﲢﻠﻴﻞ‪ ،‬ﺑﻌﺾ ﺍﳌﻔﺎﻫﻴﻢ ﻭﺍﻟﻐﻮﺹ ﰲ ﺟﺰﺋﻴﺎ‪‬ﺎ ﻭﻃﺮﺣﻬﺎ‬
‫ﺑﺸﻜﻞ ﻣﻦ ﺍﻟﺘﻔﺼﻴﻞ ﻭﺍﻟﺘﺸﺮﻳﺢ ﳌﺎ ﺑﺪﺍ ﻟﻨﺎ ﻣﻦ ﺃﳘﻴﺘﻬﺎ‪ ،‬ﻣﺜﻠﻤﺎ ﻛﺎﻥ ﺍﳊﺎﻝ ﻹﺟﺮﺍﺀ ﺗﻔﺘﻴﺶ ﺍﳌﻨﻈﻮﻣﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫ﺍﳌﻨﻬﺞ ﺍﳌﻘﺎﺭﻥ ﻧﻈﺮﺍ ﻟﻠﻄﺒﻴﻌﺔ ﺍﻟﻌﺎﳌﻴﺔ ﺍﻟﱵ ﺗﺘﻤﻴﺰ ‪‬ﺎ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻓﺈﻧﻪ ﻭﻣﻦ ﺩﻭﻥ ﺷﻚ ﻗﺪ‬
‫ﻧﺎﻟﺖ ﺣﻈﻬﺎ ﻣﻦ ﺍﳌﻌﺎﳉﺔ ﺍﻟﺘﺸﺮﻳﻌﻴﺔ ﺳﻮﺍﺀ ﺍﳌﻮﺿﻮﻋﻴﺔ ﺃﻭ ﺍﻹﺟﺮﺍﺋﻴﺔ ﻋﻠﻰ ﻣﺴﺘﻮﻯ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﳌﻘﺎﺭﻧﺔ‬
‫ﻟﺬﻟﻚ ﻓﻘﺪ ﺣﺎﻭﻟﺖ ﰲ ﲝﺜﻲ ﻫﺬﺍ ﻣﻘﺎﺭﻧﺔ ﺑﻌﺾ ﺍﳌﻔﺎﻫﻴﻢ ﺍﻟﱵ ﺃﻋﺘﻤﺪﻫﺎ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻣﻊ ﺑﻌﺾ‬
‫ﺍﻟﺘﺸﺮﻳﻌﺎﺗﺎﻷﺧﺮﻯ ﻛﻠﻤﺎ ﻛﺎﻥ ﺫﻟﻚ ﺳﺎﳓﺎ‪.‬‬
‫ﺍﳌﻨﻬﺞ ﺍﻟﺘﺄﺻﻴﻠﻲ ﻛﺎﻥ ﻣﻦ ﺍﻟﻼﺯﻡ ﰲ ﻛﺜﲑ ﻣﻦ ﺍﻷﺣﻴﺎﻥ ﺃﻥ ﻧﺆﺻﻞ ﺍﻷﻣﻮﺭ ﻭﻧﺮﺩﻫﺎ ﺇﱃ ﻣﺼﺪﺭﻫﺎ‬
‫ﺭﻏﻢ ﻣﺎ ﻳﻜﻮﻥ ﺑﺸﺄ‪‬ﺎ ﻣﻦ ﺧﻼﻑ ﻓﻘﻬﻲ ﻛﻤﺎ ﻫﻮ ﺍﳊﺎﻝ ﻣﺜﻼ ﺑﺎﻟﻨﺴﺒﺔ ﻟﻠﻤﺮﺍﺳﻼﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﺍﳌﺮﺍﻗﺒﺔ‬
‫ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪.‬‬
‫ﺧﻄﺔ ﺍﻟﺪﺭﺍﺳﺔ‪:‬‬
‫ﻟﻘﺪ ﺣﺎﻭﻟﺖ ﺃﻥ ﺃﺣﺼﺮ ﻧﻄﺎﻕ ﻫﺬﻩ ﺍﻟﺪﺭﺍﺳﺔ ﺿﻤﻦ ﺧﻄﺔ ﺗﺘﻜﻮﻥ ﻣﻦ ﻓﺼﻠﲔ‪:‬‬
‫ﻗﻮﺍﻡ ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ﲢﻠﻴﻞ ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫ﻭﺃﻣﺎ ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﱐ ﻓﺘﻨﺎﻭﻟﺖ ﻓﻴﻪ ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫‪-9-‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫اﻟﻔﺼﻞ اﻷول‬

PDF created with pdfFactory Pro trial version www.pdffactory.com


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧـﻮﻧﻴﺔ ﻟﻠﺠـﺮﳝﺔ ﺍﳌﻌﻠﻮﻣـﺎﺗﻴﺔ‬


‫ﺑﺎﻟﺮﻏﻢ ﻣﻦ ﺍﳌﺰﺍﻳﺎ ﺍﳍﺎﺋﻠﺔ ﺍﻟﱵ ﲢﻘﻘﺖ ﻭﺗﺘﺤﻘﻖ ﻛﻞ ﻳﻮﻡ ﺑﻔﻀﻞ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻋﻠﻰ ﲨﻴﻊ‬
‫ﺍﻟﺼﻌﺪ ﻭﰲ ﺷﱴ ﻣﻴﺎﺩﻳﻦ ﺍﳊﻴﺎﺓ ﺍﳌﻌﺎﺻﺮﺓ‪ ،‬ﻓﺈﻥ ﻫﺬﻩ ﺍﻟﺜﻮﺭﺓ ﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺔ ﺍﳌﺘﻨﺎﻣﻴﺔ ﺻﺎﺣﺒﺘﻬﺎ ﰲ ﺍﳌﻘﺎﺑﻞ‬
‫ﲨﻠﺔ ﻣﻦ ﺍﻹﻧﻌﻜﺎﺳﺎﺕ ﺍﻟﺴﻠﺒﻴﺔ ﺍﳋﻄﲑﺓ ﺟﺮﺍﺀ ﺳﻮﺀ ﺍﺳﺘﺨﺪﺍﻡ ﻫﺬﻩ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳌﺘﻄﻮﺭﺓ ﻭ ﺍﻹﳓـﺮﺍﻑ ﻋﻦ‬
‫ﺍﻷﻏﺮﺍﺽ ﺍﳌﺘﻮﺧﺎﺓ ﻣﻨﻬﺎ‪ ،‬ﺗﺒﺪﺕ ﰲ ﺗﻔﺸﻲ ﻃﺎﺋﻔﺔ ﻣﻦ ﺍﻟﻈﻮﺍﻫﺮ ﺍﻹﺟﺮﺍﻣﻴﺔ ﺍﳌﺴﺘﺤﺪﺛﺔ‪ ،‬ﺃﻻ ﻭﻫﻲ ﻇﺎﻫﺮﺓ‬
‫ﺍﳉﺮﺍﺋـﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ .‬ﻟﻴﺲ ﻫﺬﺍ ﻓﺤﺴﺐ ﺑﻞ ﺳﻬﻠﺖ ﻫﺬﻩ ﺍﻟﺘﻘﻨﻴﺔ ﺇﺭﺗﻜﺎﺏ ﺑﻌﺾ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴـﺪﻳﺔ‬
‫ﻭﺷﻜـﻠﺖ ﺃﺭﺿﺎ ﺧﺼﺒﺔ ﻟﻜﺜﲑ ﻣﻦ ﺍﻷﻧﺸﻄـﺔ ﻏﲑ ﺍﳌﺸﺮﻭﻋﺔ ﺍﳌﺮﺗﺒﻄﺔ ﺑﺎﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴـﺔ‪ ،‬ﻫـﺬﻩ‬
‫ﺍﳊﺎﺳﺒﺎﺕ ﺍﻟﱵ ﺃﺻﺒﺤﺖ ﺗﻮﻓـﺮ ﻟﻠﺠﻨﺎﺓ ﻭﺳﻴﻠﺔ ﻫﺎﻣﺔ ﻻﺭﺗﻜﺎﺏ ﺍﻟﻌﺪﻳﺪ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺮﺗﺒﻄﺔ‬
‫ﺑﺎﳌﻌﻠـﻮﻣﺎﺗﻴﺔ ﻣﺎ ﻛﺎﻧﺖ ﻟﺘﻈﻬﺮ ﻟﻮﻻ ﻭﺟﻮﺩ ﻫﺬﻩ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ ﻭ ﺍﺭﺗﺒﺎﻃﻬﺎ ﺑﺎﻟﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫ﻭﳌﺎ ﻛﺎﻧﺖ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻇﺎﻫﺮﺓ ﺇﺟﺮﺍﻣﻴﺔ ﺣﺪﻳﺜﺔ ﻧﻈﺮﺍ ﻻﺭﺗﺒﺎﻃﻬﺎ ﺑﺎﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳊﺪﻳﺜﺔ‪ ،‬ﻓﻘﺪ ﺗﺮﺗﺐ‬
‫ﻋﻠﻰ ﺫﻟﻚ ﺇﺣﺎﻃﺔ ﻫﺬﻩ ﺍﻟﻈﺎﻫﺮﺓ ﺑﻜﺜﲑ ﻣﻦ ﺍﻟﻐﻤﻮﺽ‪ ،‬ﻷﺟﻞ ﺫﻟﻚ ﻓﻘـﺪ ﺑﺪﺍ ﱄ ﺃﻧﻪ ﻭﻗﺒﻞ ﺍﳋﻮﺽ ﰲ‬
‫ﺍﳌﺴﺎﺋﻞ ﺍﻟﺸﻜﻠﻴﺔ ﻭ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﻟﱵ ﺗﻨﻄﺒﻖ ﻋﻠﻰ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻥ ﺃﻧﻮﻩ ﻋﻠﻰ ﺟﺎﻧﺐ ﻣﻦ ﺍﻟﻘﻮﺍﻋـﺪ‬
‫ﺍﳌﻮﺿﻮﻋﻴﺔ ﳍـﺬﻩ ﺍﻟﻈﺎﻫﺮﺓ ﺍﻹﺟﺮﺍﻣﻴﺔ‪ ،‬ﺇﺫ ﳚﺐ ﺍﻹﳌﺎﻡ ﲟﺎﻫﻴﺔ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻃﺒﻴﻌﺘﻬﺎ ﻭﺇﻇﻬـﺎﺭ‬
‫ﻣﻮﺿﻮﻋﻬﺎ ﻭ ﺧﺼﺎﺋﺼﻬﺎ ﻭﳐﺎﻃﺮﻫﺎ ﻭﺣﺠﻢ ﺍﳋﺴﺎﺋﺮ ﺍﻟﻨﺎﲨﺔ ﻋﻨﻬﺎ ﻭﺩﻭﺍﻓﻊ ﻣﺮﺗﻜﺒﻴﻬﺎ‪ ،‬ﻭﻫﺬﺍ ﺣﺘﻤﺎ ﰲ‬
‫ﻣﻨﻈﻮﺭﻧﺎ ﻳﺘﺨﺬ ﺃﳘﻴﺔ ﺇﺳﺘﺜﻨﺎﺋﻴﺔ ﻟﺴﻼﻣﺔ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻊ ﻫﺬﻩ ﺍﻟﻈﺎﻫﺮﺓ ﻣﻦ ﻃﺮﻑ ﺍﻟﻘﺎﺋﻤﲔ ﻋﻠﻰ ﻣﻜﺎﻓﺤﺘﻬﺎ‪.‬‬
‫ﻭﻋﻠﻰ ﺿﻮﺀ ﺫﻟﻚ ﺳﺄﺗﻨﺎﻭﻝ ﰲ ﻫﺬﺍ ﺍﻟﻔﺼﻞ ﲢﺪﻳﺪ ﻣﻔﻬﻮﻡ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭ ﺃﻭﺟﻪ ﺍﳊﻤﺎﻳﺔ ﺍﳉﺰﺍﺋﻴﺔ‬
‫ﺍﳌﻮﺿﻮﻋﻴﺔ ﻟﻠﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫‪- 10 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﳌﺒﺤﺚ ﺍﻷﻭﻝ‪:‬‬

‫ﻣﺎﻫﻴـﺔ ﺍﳉﺮﳝـﺔ ﺍﳌﻌﻠﻮﻣـﺎﺗﻴﺔ ‪:‬‬

‫ﺇﻧﻪ ﻣﻨﺬ ﺷﻴﻮﻉ ﺍﺳﺘﺨﺪﺍﻡ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﺃﻭ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﰲ ﺍﻟﺴﺘﻴﻨﺎﺕ ﰒ ﺍﻟﺴﺒﻌﻴﻨﺎﺕ ﺑﺪﺃ ﺍﳊﺪﻳﺚ‬
‫ﻋﻦ ﺑﻌﺾ ﺍﻷﻓﻌﺎﻝ ﻭﺍﻟﺴﻠﻮﻛﺎﺕ ﺍﳌﺮﺗﺒﻄﺔ ﺑﺎﻹﺳﺘﺨﺪﺍﻡ ﻏﲑ ﺍﳌﺸﺮﻭﻉ ﻟﻠﺒﻴﺎﻧﺎﺕ ﺍﳌﺨﺰﻧﺔ ﰲ ﺃﻧﻈﻤﺔ‬
‫ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﻭﺍﻟﺘﻼﻋﺐ ‪‬ﺬﻩ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﺗﺪﻣﲑﻫﺎ‪ ،‬ﻭﻗﺪ ﺭﺍﻓﻖ ﺫﻟﻚ ﻧﻘﺎﺷﺎﺕ ﻭﺗﺴﺎﺅﻻﺕ ﺣﻮﻝ ﻣﺎ ﺇﺫﺍ‬
‫ﻛﺎﻧﺖ ﻫﺬﻩ ﺍﻟﺴﻠﻮﻛﺎﺕ ﳎﺮﺩ ﺷﻲﺀ ﻋﺎﺑﺮ ﺃﻡ ﺃ‪‬ﺎ ﻇﺎﻫﺮﺓ ﺟﺮﻣﻴﺔ ﻣﺴﺘﺠﺪﺓ‪.‬‬

‫ﻭﻟﻘﺪ ﺷﻬﺪ ﺍﻟﻌﺎﱂ ﰲ ﺍﻟﻔﺘﺮﺓ ﺍﻟﺮﺍﻫﻨﺔ ﺇﺯﺩﻳﺎﺩ‪‬ﺍ ﻣﻄﺮﺩﺍ ﰲ ﻧﻄﺎﻕ ﺍﺳﺘﺨﺪﺍﻡ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺗﻄﻮﺭ‪‬ﺍ‬
‫ﺑﺎﻟﻐﺎ ﰲ ﺍﻹﻋﺘﻤﺎﺩ ﻋﻠﻴﻬﺎ ﰲ ﺗﺴﻴﲑ ﺷﺆﻭﻧﻪ‪ ،‬ﻭﻫﻮ ﺍﻷﻣﺮ ﺍﻟﺬﻱ ﺻﺎﺣﺒﻪ ﰲ ﺍﳌﻘﺎﺑﻞ ﺍﺯﺩﻳﺎﺩ‪ ‬ﻣﻮﺍﺯﹴ ﻟﻺﺟﺮﺍﻡ‬
‫ﺍﳌﻌﻠﻮﻣﺎﰐ‪.‬‬

‫ﻭﺗﻌﺪ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﺍﻟﻈﻮﺍﻫﺮ ﺍﻹﺟﺮﺍﻣﻴﺔ ﺍﳊﺪﻳﺜﺔ‪ ،‬ﻭﲢﺪﻳﺪ ﻣﻔﻬﻮﻣﻬﺎ ﻳﻌﺪ ﺍﳋﻄﻮﺓ ﺍﻷﻭﱃ‬
‫ﻟﻠﺘﻌﺮﻑ ﻋﻠﻰ ﻫﺬﻩ ﺍﻟﻈﺎﻫﺮﺓ ﺍﳉﺮﻣﻴﺔ ﻣﻦ ﲨﻴﻊ ﺟﻮﺍﻧﺒﻬﺎ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ‪ ،‬ﺧﺎﺻﺔ ﺇﺫﺍ ﻋﻠﻤﻨﺎ ﺃﻧﻪ ﻻ ﻳﻮﺟﺪ‬
‫ﻣﺼﻄﻠﺢ ﻗﺎﻧﻮﱐ ﻣﻮﺣﺪ ﻟﻠﺪﻻﻟﺔ ﻋﻠﻰ ﻫﺬﻩ ﺍﻟﻈﺎﻫﺮﺓ ﺍﻹﺟﺮﺍﻣﻴﺔ ﺍﻟﻨﺎﺷﺌﺔ ﰲ ﺑﻴﺌﺔ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﺑﺴﺒﺐ ﺫﺍﺗﻴﺘﻬﺎ‬
‫ﻭﲤﻴﺰﻫﺎ ﻋﻦ ﻏﲑﻫﺎ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ‪ ،‬ﺳﻮﺍﺀً ﰲ ﳏﻠﻬﺎ ﺃﻭ ﺧﺼﺎﺋﺼﻬﺎ‪ ،‬ﻭﳑﺎ ﻻﺷﻚ ﻓﻴﻪ ﻓﺈﻥ ﺃﻱ‬
‫ﳏﺎﻭﻟﺔ ﻣﻦ ﺃﺟﻞ ﺍﺧﺘﻴﺎﺭ ﻭﲢﺪﻳﺪ ﺍﳌﺼﻄﻠﺢ ﺍﳌﻼﺋﻢ ﳍﺬﻩ ﺍﻟﻈﺎﻫﺮﺓ ﻳﻨﺒﻐﻲ ﺃﻥ ﻳﻜﻮﻥ ﻣﺒﻨﻴﺎﹰ ﻭﻣﺆﺳﺴﺎﹰ ﻋﻠﻰ‬
‫ﻋﺪﺓ ﺿﻮﺍﺑﻂ ﺗﻘﻨﻴﺔ ﻭﻗﺎﻧﻮﻧﻴﺔ‪ ،‬ﺃﻭﳍﺎ ﺇﺩﻣﺎﺝ ﺍﻟﺒﻌﺪﻳﻦ ﺍﻟﺘﻘﲏ ﻭﺍﻟﻘﺎﻧﻮﱐ‪ ،‬ﺫﻟﻚ ﺃﻥ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﰲ‬
‫ﺃﺻﻠﻬﺎ ﻫﻲ ﻧﺘﺎﺝ ﺍﻧﺪﻣﺎﺝ ﺍﳊﻮﺳﺒﺔ ﻭﺍﻹﺗﺼﺎﻝ‪ ،‬ﻓﺄﻣﺎ ﺍﳊﻮﺳﺒﺔ ﻓﺘﻘﻮﻡ ﻋﻠﻰ ﺍﺳﺘﺨﺪﺍﻡ ﻭﺳﺎﺋﻞ ﺍﻟﺘﻘﻨﻴﺔ ﻹﺩﺍﺭﺓ‬
‫ﻭﺗﻨﻈﻴﻢ ﻭﻣﻌﺎﳉﺔ ﺍﳌﻌﻄﻴﺎﺕ ﰲ ﺇﻃﺎﺭ ﺗﻨﻔﻴﺬ ﻣﻬﺎﻡ ﳏﺪﺩﺓ ﺗﺘﺼﻞ ﺑﻌﻠﻤﻲ ﺍﳊﺴﺎﺏ ﻭﺍﳌﻨﻄﻖ‪ ،‬ﻭﺃﻣﺎ ﺍﻻﺗﺼﺎﻝ‬
‫ﻓﻬﻮ ﻗﺎﺋﻢ ﻋﻠﻰ ﻭﺳﺎﺋﻞ ﺗﻘﻨﻴﺔ ﻟﻨﻘﻞ ﺍﳌﻌﻠﻮﻣﺎﺕ‪،‬ﻭﺍﻟﻀﺎﺑﻂ ﺍﻟﺜﺎﱐ ﻳﻘﻮﻡ ﻋﻠﻰ ﺃﺳﺎﺱ ﺍﻟﺒﺤﺚ ﺑﺸﺄﻥ ﺍﳊﺪﻭﺩ‬
‫ﺍﻟﱵ ﻳﻨﺘﻬﻲ ﻋﻨﺪﻫﺎ ﺍﻟﻌﺒﺚ ﻭﺗﻠﻚ ﺍﻟﱵ ﺗﺒﺪﺃ ﻋﻨﺪﻫﺎ ﺍﳌﺴﺆﻭﻟﻴﺔ ﻋﻦ ﺃﻓﻌﺎﻝ ﺗﻌﺪ ﳎﺮﻣﺔ‪ .‬ﻭﺍﻟﻀﺎﺑﻂ ﺍﻟﺜﺎﻟﺚ ﺃﻥ‬
‫ﻳﻜﻮﻥ ﺍﺧﺘﻴﺎﺭ ﺍﳌﺼﻄﻠﺢ ﺷﺎﻣﻼ ﳌﺎ ﻳﻌﱪ ﻋﻨﻪ ﻣﻠﻤﺎ ﲝﺪﻭﺩ ﳏﻠﻪ‪ ،‬ﻓﻼ ﻳﻨﺒﻐﻲ ﺃﻥ ﻳﻘﺘﺼﺮ ﻋﻠﻰ ﺍﳉﺰﺀ ﻟﻴﻌﲏ‪‬‬
‫ﺍﻟﻜﻞ ﻭﻻ ﻳﻨﺼﺮﻑ ﺇﱃ ﻣﺎ ﻻ ﳚﺐ ﺃﻥ ﻳﻨﻄﻮﻱ ﲢﺖ ﻧﻄﺎﻗﻪ‪.‬‬

‫ﻟﺬﻟﻚ ﻓﻠﻘﺪ ﺑﺬﻝ ﺍﳌﻬﺘﻤﻮﻥ ﺑﺪﺭﺍﺳﺔ ﻫﺬﺍ ﺍﻟﻨﻤﻂ ﺍﳉﺪﻳﺪ ﻣﻦ ﺍﻹﺟﺮﺍﻡ ﺟﻬﺪ‪‬ﺍ ﻛﺒﲑﺍ ﻣﻦ ﺃﺟﻞ‬
‫ﺍﻟﻮﺻﻮﻝ ﺇﱃ ﺗﻌﺮﻳﻒ ﻣﻨﺎﺳﺐ ﻳﺘﻼﺀﻡ ﻣﻊ ﻃﺒﻴﻌﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺫﻟﻚ ﺃﻥ ﻋﺪﻡ ﺍﻹﺗﻔﺎﻕ ﻋﻠﻰ ﺗﻌﺮﻳﻒ‬

‫‪- 11 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻫﺬﻩ ﺍﻟﻈﺎﻫﺮﺓ ﺍﻹﺟﺮﺍﻣﻴﺔ ﺇﳕﺎ ﻳﺆﺩﻱ ﺇﱃ ﺇﺛﺎﺭﺓ ﻋﺪﺩ ﻣﻦ ﺍﳌﺸﻜﻼﺕ ﺍﻟﻌﻤﻠﻴﺔ ﻳﺘﻤﺜﻞ ﺃﳘﻬﺎ ﰲ ﺻﻌﻮﺑﺔ ﺗﻘﺪﻳﺮ‬
‫ﺣﺠﻢ ﻫﺬﻩ ﺍﻟﻈﺎﻫﺮﺓ ﻭﺗﻌﺬﺭ ﺇﳚﺎﺩ ﺍﳊﻠﻮﻝ ﺍﻟﻼﺯﻣﺔ ﳌﻮﺍﺟﻬﺘﻬﺎ‪ ،‬ﻭﻛﺬﺍ ﺻﻌﻮﺑﺔ ﲢﻘﻴﻖ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﺪﻭﱄ‬
‫) ‪(1‬‬
‫ﳌﻜﺎﻓﺤﺘﻬﺎ‪.‬‬
‫ﺇﻻ ﺃﻥ ﺍﳌﺘﻔﻖ ﻋﻠﻴﻪ ﺃﻥ ﻓﻜﺮﺓ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻫﻲ ﺍﻟﻔﻜﺮﺓ ﺍﳉﻮﻫﺮﻳﺔ ﻭﺍﳌﺮﻛﺰﻳﺔ ﰲ ﺩﺭﺍﺳﺔ ﻫﺬﻩ ﺍﻟﻈﺎﻫﺮﺓ‬
‫ﺍﻹﺟﺮﺍﻣﻴﺔ‪،‬ﺫﻟﻚ ﺃﻥ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻫﻲ ﺷﺮﻁ ﻣﻔﺘﺮﺽ ﻟﻘﻴﺎﻡ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‪.‬‬

‫ﺍﳌﻄﻠﺐ ﺍﻷﻭﻝ‪ :‬ﻣــﻔﻬﻮﻡ ﺍﳌﻌﻠـﻮﻣﺎﺗﻴﺔ‪:‬‬

‫ﺇﻥ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻭ ﻣﺎ ﻳﺴﻤﻰ ﺃﻳﻀﺎ ﺑﻌﻠﻢ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﻫﻮ ﺫﻟﻚ ﺍﻟﻌﻠﻢ ﺍﻟﺬﻱ ﻳﻬﺘﻢ ﺑﺎﳌﻮﺿﻮﻋﺎﺕ‬
‫ﻭﺍﳌﻌﺎﺭﻑ ﺍﳌﺘﺼﻠﺔ ﺑﺄﺻﻞ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﲡﻤﻴﻌﻬﺎ ﻭﺗﻨﻈﻴﻤﻬﺎ ﻭﲣﺰﻳﻨﻬﺎ ﻭﺍﺳﺘﺮﺟﺎﻋﻬﺎ ﻭﺗﻐﻴﲑﻫﺎ ﻭﻛﺬﺍ ﲢﻮﻳﻠﻬﺎ‬
‫ﻭﺍﺳﺘﺨﺪﺍﻣﻬﺎ‪ (2).‬ﻛﻤﺎ ﻳﻬﺘﻢ ﻫﺬﺍ ﺍﻟﻌﻠﻢ ﺑﺪﺭﺍﺳﺔ ﺃﺳﺎﻟﻴﺐ ﻣﻌﺎﳉﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻛﺎﻷﻧﻈﻤﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻧﻈﻢ‬
‫ﺍﻟﱪﳎﺔ‪ ،‬ﻭ‪‬ﺬﺍ ﺍﳌﻔﻬﻮﻡ ﺗﻌﺘﱪ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻤﺎ ﻣﺘﺼﻼ ﺑﺎﻟﻌﺪﻳﺪ ﻣﻦ ﺍﻟﻌﻠﻮﻡ ﺍﻷﺧﺮﻯ‪.‬‬

‫ﻭﻗﺪ ﺻﺎﻏﺖ ﺍﻷﻛﺎﺩﳝﻴﺔ ﺍﻟﻔﺮﻧﺴﻴﺔ ﺗﻌﺮﻳﻔﺎ ﻟﻠﻤﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﺄ‪‬ﺎ ﻋﻠﻢ ﺍﻟﺘﻌﺎﻣﻞ ﺍﻟﻌﻘﻼﱐ ﺑﻮﺍﺳﻄﺔ ﺁﻻﺕ‬
‫ﺃﻭﺗﻮﻣﺎﺗﻴﻜﻴﺔ ﻣﻊ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﺎﻋﺘﺒﺎﺭﻫﺎ ﺩﻋﺎﻣﺔ ﻟﻠﻤﻌﺎﺭﻑ ﺍﻹﻧﺴﺎﻧﻴﺔ ﻭﻋﻤﺎﺩﺍﹰ ﻟﻼﺗﺼﺎﻻﺕ ﰲ ﻣﻴﺎﺩﻳﻦ ﺍﻟﺘﻘﻨﻴﺔ‬
‫) ‪(3‬‬
‫ﻭﺍﻻﻗﺘﺼﺎﺩ ﻭﺍﻻﺟﺘﻤﺎﻉ‪.‬‬

‫ﻛﻤﺎ ﺃﻥ ﻣﻨﻈﻤﺔ ﺍﻟﻴﻮﻧﻴﺴﻜﻮ ﺫﻫﺒﺖ ﺇﱃ ﺍﻹﺩﺭﺍﺝ ﰲ ﻣﻔﻬﻮﻡ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﻔﺮﻭﻉ ﺍﻟﻌﻠﻤﻴﺔ ﻭﺍﻟﺘﻘﻨﻴﺔ‬
‫ﻭﺍﳍﻨﺪﺳﻴﺔ ﻭﺃﺳﺎﻟﻴﺐ ﺍﻹﺩﺍﺭﺓ ﺍﻟﻔﻨﻴﺔ ﺍﳌﺴﺘﺨﺪﻣﺔ ﰲ ﺗﺪﺍﻭﻝ ﻣﻌﺎﳉﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺗﻄﺒﻴﻘﺎ‪‬ﺎ‪ .‬ﻭﻗﺪ ﻋﺮﻓﺖ‬
‫ﺍﻟﺘﻮﺻﻴﺔ ﺍﻟﺼﺎﺩﺭﺓ ﻋﻦ ﻣﻨﻈﻤﺔ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻻﻗﺘﺼﺎﺩﻱ ﻭﺍﻟﺘﻨﻤﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﺄ‪‬ﺎ ﺗﺸﻤﻞ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ‬
‫ﻭﻭﺳﺎﺋﻞ ﺍﻹﺗﺼﺎﻻﺕ ﻭﺷﺒﻜﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﱵ ﳝﻜﻦ ﲣﺰﻳﻨﻬﺎ ﻭﻣﻌﺎﳉﺘﻬﺎ‬
‫ﻭﺍﺳﺘﺮﺟﺎﻋﻬﺎ ﻭﻧﻘﻠﻬﺎ ﺑﻮﺍﺳﻄﺔ ﻫﺬﻩ ﺍﳊﺎﺳﺒﺎﺕ ﺃﻭ ﺷﺒﻜﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺕ‪.‬‬

‫ﻟﺬﻟﻚ ﻓﺈﻧﻪ ﻭﺍﺳﺘﺮﺷﺎﺩ‪‬ﺍ ﲟﺎ ﺳﺒﻖ ﺫﻛﺮﻩ ﻣﻦ ﺍﻟﺘﻌﺮﻳﻔﺎﺕ ﺍﻟﱵ ﺻﻴﻐﺖ ﻟﺘﺤﺪﻳﺪ ﻣﻔﻬﻮﻡ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻓﺈﻧﻪ‬
‫ﳝﻜﻦ ﺍﻟﻘﻮﻝ ﺑﺄﻥ ﻣﻔﻬﻮﻣﻬﺎ ﻳﻘﻮﻡ ﺃﺳﺎﺳﺎ ﻋﻠﻰ ﺍﻟﻌﻼﻗﺔ ﺑﲔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺑﲔ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳊﺪﻳﺜﺔ ﺍﻟﱵ ﺗﺴﺘﺨﺪﻡ‬

‫)‪ (1‬ﻧﺎﺋﻠﺔ ﻋﺎﺩﻝ ﳏﻤﺪ ﻓﺮﻳﺪ ﻗﻮﺭﺓ‪ .‬ﺟﺮﺍﺋﻢ ﺍﳊﺎﺳﺐ ﺍﻻﱄ ﺍﻻﻗﺘﺼﺎﺩﻳﺔ ‪.‬ﻣﻨﺸﻮﺭﺍﺕ ﺍﳊﻠﱯ ﺍﻟﻄﺒﻌﺔ ﺍﻻﻭﱃ ‪ 2005‬ﺹ ‪.28‬‬
‫)‪ (2‬ﺃﲪﺪ ﺧﻠﻴﻔﺔ ﺍﳌﻠﻂ‪ .‬ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ .‬ﺩﺍﺭ ﺍﻟﻔﻜﺮ ﺍﳉﺎﻣﻌﻲ ﺍﻻﺳﻜﻨﺪﺭﻳﺔ‪ .‬ﺍﻟﻄﺒﻌﺔ ﺍﻟﺜﺎﻧﻴﺔ ‪ ،2006‬ﺹ ‪.87‬‬
‫)‪ (3‬ﻋﻘﺪﺕ ﻫﺬﻩ ﺍﳉﻠﺴﺔ ﻟﻸﻛﺎﺩﳝﻴﺔ ﺑﺘﺎﺭﻳﺦ ‪.1967/04/6‬‬

‫‪- 12 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﰲ ﻣﻌﺎﳉﺔ ﻫﺬﻩ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ( 1) ،‬ﺃﻭ ﺑﻌﺒﺎﺭﺓ ﺃﺧﺮﻯ ﻓﺎﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻫﻲ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﱪﳎﺔ ﺁﻟﻴﺎ ﻭﺍﻟﱵ‬
‫ﺗﺴﺘﺨﺪﻣﺎﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ ﻭﺑﺮﺍﳎﻬﺎ ﰲ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻌﻬﺎﻟﺬﻟﻚ ﻓﺈﻧﻪ ﻭﻟﻠﻮﻗﻮﻑ ﻋﻠﻰ ﲢﺪﻳﺪ ﻣﻔﻬﻮﻡ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﻳﺘﻄﻠﺐ ﻣﻨﺎ ﺍﻷﻣﺮ ﺃﻥ ﻧﺴﺘﻌﺮﺽ ﺗﻌﺮﻳﻒ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﱵ ﺗﺪﺧﻞ ﰲ ﻧﻄﺎﻕ ﺍﳊﻤﺎﻳﺔ ﺍﳉﺰﺍﺋﻴﺔ ﰲ ﺇﻃﺎﺭ‬
‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ) ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ ( ﻭﲢﺪﻳﺪ ﺧﺼﺎﺋﺼﻬﺎ ﻭﻃﺒﻴﻌﺘﻬﺎ )ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ( ‪.‬‬

‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺗﻌـﺮﻳﻒ ﺍﳌﻌﻠﻮﻣـﺎﺕ‬

‫ﺗﻜﻤﻦ ﺃﳘﻴﺔ ﲢﺪﻳﺪ ﺍﳌﻘﺼﻮﺩ ﺑﺎﳌﻌﻠﻮﻣﺎﺕ ﻭﻛﺬﺍ ﻃﺒﻴﻌﺘﻬﺎ ﰲ ﻛﻮ‪‬ﺎ ﺍﶈﻞ ﺍﻟﺬﻱ ﻳﻘﻊ ﻋﻠﻴﻪ ﺍﻹﻋﺘﺪﺍﺀ‬
‫ﰲ ﺟﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻫﻮ ﺍﻷﻣﺮ ﺍﻟﺬﻱ ﻳﻘﺘﻀﻲ ﺗﻮﺿﻴﺤﺎ ﺩﻗﻴﻘﺎ ﻭﻓﻬﻤﺎ ﻋﻤﻴﻘﺎ ﻣﻦ ﺃﺟﻞ ﺇﺻﺒﺎﻍ ﺍﳊﻤﺎﻳﺔ‬
‫ﻋﻠﻴﻬﺎ ﻋﻠﻰ ﳓﻮ ﺻﺤﻴﺢ‪.‬‬

‫ﻭﻟﻘﺪ ﺍﻛﺘﺴﺒﺖ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﻈﻬﻮﺭ ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳊﻮﺍﺳﻴﺐ ﺑﻌﺪ‪‬ﺍ ﺟﺪﻳﺪﺍ ﺃﺿﻔﻰ ﻋﻠﻴﻬﺎ ﺃﳘﻴﺔ ﺗﻔﻮﻕ‬
‫ﻣﺎ ﻛﺎﻧﺖ ﻋﻠﻴﻬﺎ ﻣﻦ ﻗﺒﻞ‪ ،‬ﺇﺫ ﺃﻥ ﺍﳌﻌﻠﻮﻣﺎﺕ ﰲ ﺍﻟﻮﻗﺖ ﺍﻟﺮﺍﻫﻦ ﱂ ﺗﻌﺪ ﳎﺮﺩ ﻧﻮﻉ ﻣﻦ ﺍﻟﺘﺮﻑ ﺗﺘﺒﺎﻫﻰ ‪‬ﺎ‬
‫ﺍ‪‬ﺘﻤﻌﺎﺕ ﺃﻭ ﺍﳌﻨﻈﻤﺎﺕ ﻭﺇﳕﺎ ﺃﺻﺒﺤﺖ ﺭﻛﻴﺰﺓ ﺃﺳﺎﺳﻴﺔ ﰲ ﺗﻄﻮﺭ ﺍ‪‬ﺘﻤﻊ‪ ،‬ﺳﻴﻤﺎ ﺑﻌﺪ ﺃﻥ ﺩﺧﻠﺖ‬
‫ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﻹﺗﺼﺎﻻﺕ ﲨﻴﻊ ﺍﳌﻴﺎﺩﻳﻦ ﺍﻟﻌﻠﻤﻴﺔ ﺍﻻﺟﺘﻤﺎﻋﻴﺔ ﻭﺍﻹﻧﺴﺎﻧﻴﺔ‪.‬ﻓﻌﺼﺮﻧﺎ ﺍﳊﺎﱄ‬
‫ﻭﺍﳌﺴﺘﻘﺒﻠﻲ ﺗﺮﻛﺰ ﺍ‪‬ﺘﻤﻌﺎﺕ ﻓﻴﻪ ﻋﻠﻰ ﺗﻌﻈﻴﻢ ﺷﺄﻥ ﺍﻟﻔﻜﺮ ﻭﺍﻟﻌﻘﻞ ﺍﻹﻧﺴﺎﱐ ﺑﻌﺪ ﺃﻥ ﺃﺻﺒﺤﺖ ﺍﳌﻌﻠﻮﻣﺎﺕ‬
‫ﻓﻴﻪ ﻣﺼﺪﺭ ﻗﻮﺓ ﺍﻗﺘﺼﺎﺩﻳﺔ ﻭﺳﻴﺎﺳﻴﺔ ﻭﻋﺴﻜﺮﻳﺔ ﻻﺭﺗﺒﺎﻃﻬﺎ ﲟﺨﺘﻠﻒ ﳎﺎﻻﺕ ﺍﻟﻨﺸﺎﻁ ﺍﻹﻧﺴﺎﱐ ﻭﺗﺪﺍﺧﻠﻬﺎ‬
‫ﰲ ﻛﺎﻓﺔ ﺟﻮﺍﻧﺐ ﺍﳊﻴﺎﺓ ﺍﻟﻌﺼﺮﻳﺔ‪ ،‬ﻭﺑﺎﺕ ﺍﻟﻮﻋﻲ ﺑﺄﳘﻴﺘﻬﺎ ﻣﻈﻬﺮ‪‬ﺍ ﻟﺘﻘﺪﻡ ﺍﻟﺸﻌﻮﺏ ﻭﺍﻷﻣﻢ‪.‬‬

‫ﻭﺗﻌﺮﻑ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﺼﻔﺔ ﻋﺎﻣﺔ ﺑﺄ‪‬ﺎ "ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻟﺮﻣﻮﺯ ﺃﻭ ﺍﳊﻘﺎﺋﻖ ﺃﻭ ﺍﳌﻔﺎﻫﻴﻢ ﺃﻭ ﺍﻟﺘﻌﻠﻴﻤﺎﺕ‬
‫ﺍﻟﱵ ﺗﺼﻠﺢ ﻷﻥ ﺗﻜﻮﻥ ﳏﻼ ﻟﻠﺘﺒﺎﺩﻝ ﻭﺍﻻﺗﺼﺎﻝ ﺃﻭ ﻟﻠﺘﻔﺴﲑ ﻭﺍﻟﺘﺄﻭﻳﻞ ﺃﻭ ﻟﻠﻤﻌﺎﳉﺔ ﺳﻮﺍﺀ ﺑﻮﺍﺳﻄﺔ ﺍﻷﻓﺮﺍﺩ‬
‫ﺃﻭ ﺍﻷﻧﻈﻤﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﻭﻫﻲ ﺗﺘﻤﻴﺰ ﺑﺎﳌﺮﻭﻧﺔ ﲝﻴﺚ ﳝﻜﻦ ﺗﻐﻴﲑﻫﺎ ﻭﲡﺰﺋﺘﻬﺎ ﻭﲨﻌﻬﺎ ﺃﻭ ﻧﻘﻠﻬﺎ ﺑﻮﺳﺎﺋﻞ‬
‫) ‪(2‬‬
‫ﻭﺃﺷﻜﺎﻝ ﳐﺘﻠﻔﺔ‪.‬‬

‫)‪(1‬ﻧﺎﺋﻠﺔ ﻋﺎﺩﻝ ﳏﻤﺪ ﻓﺮﻳﺪ ﻓﻮﺭﺓ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪.‬ﺹ‪97‬‬


‫)‪ (2‬ﻣﺸﺎﺭ ﺇﻟﻴﻪ ﻟﺪﻯ ﺩ‪ .‬ﻧﺎﺋﻠﺔ ﳏﻤﺪ ﻓﺮﻳﺪ ﻓﻮﺭﺓ‪ .‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ ‪. 97‬‬

‫‪- 13 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻭﻟﻘﺪ ﺫﻫﺐ ﺍﻟﺒﻌﺾ ﺇﱃ ﺍﻟﻘﻮﻝ ﺃﻧﻪ ﻣﻦ ﺍﻟﺼﻌﺐ ﺃﻭ ﻣﻦ ﺍﳌﺴﺘﺤﻴﻞ ﻭﺻﻒ ﺍﳌﻌﻠﻮﻣﺔ ﺑﺪﻗﺔ ﻭﻣﺎ ﳝﻜﻦ‬
‫ﻓﻘﻂ ﻫﻮ ﺇﺩﺭﺍﻙ ﺃﺛﺮﻫﺎ‪(1).‬ﻟﺬﻟﻚ ﻓﻘﺪ ﺍﺟﺘﻬﺪ ﺍﻟﺒﺎﺣﺜﻮﻥ ﻣﻦ ﲣﺼﺼﺎﺕ ﻭﺛﻘﺎﻓﺎﺕ ﳐﺘﻠﻔﺔ ﰲ ﻭﺿﻊ‬
‫ﺗﻌﺎﺭﻳﻒ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﻣﻨﻬﺎ ﻣﺎ ﺃﻭﺭﺩﻩ ﺍﻷﺳﺘﺎﺫ » ‪ « Catala‬ﻣﻦ ﺗﻌﺮﻳﻒ ﺣﲔ ﺍﻋﺘﱪﻫﺎ ﺃ‪‬ﺎ "ﺭﺳﺎﻟﺔ ﻣﺎ‬
‫ﻣﻌﱪ ﻋﻨﻬﺎ ﰲ ﺷﻜﻞﹴ ﳚﻌﻠﻬﺎ ﻗﺎﺑﻠﺔ ﻟﻠﻨﻘﻞ ﺃﻭ ﺍﻹﺑﻼﻍ ﻟﻠﻐﲑ‪(2)".‬ﻛﻤﺎ ﻋﺮﻓﺖ ﺃﻳﻀﺎ ﺑﺄ‪‬ﺎ "ﺍﻟﻨﻘﻞ ﺍ‪‬ﺮﺩ‬
‫ﻟﻮﻗﺎﺋﻊ ﻣﻌﻴﻨﺔ ﰎ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻬﺎ ﻣﻦ ﻣﺼﺎﺩﺭ ﻣﺘﻌﺪﺩﺓ")‪.(3‬‬

‫ﻭﺭﻏﻢ ﺍﶈﺎﻭﻻﺕ ﺍﳌﺘﻌﺪﺩﺓ ﳓﻮ ﻭﺿﻊ ﻧﺺ ﻗﺎﻧﻮﱐ ﻳﺘﻜﻔﻞ ﺑﻮﺿﻊ ﺗﻌﺮﻳﻒ ﳏﺪﺩ ﻟﻠﻤﻌﻠﻮﻣﺔ ﻓﺈﻧﻪ ﳊﺪ‬
‫ﺍﻵﻥ ﻻ ﻳﻮﺟﺪ ﺗﻌﺮﻳﻒ ﻣﺎﻧﻊ ﺑﻨﺺ ﻗﺎﻧﻮﱐ‪.‬‬

‫‪1982/07/26‬‬ ‫ﻭﻣﻊ ﺫﻟﻚ ﻓﻘﺪ ﺃﺷﺎﺭ ﺍﳌﺸﺮﻉ ﺍﻟﻔﺮﻧﺴﻲ ﻭﻓﻘﺎ ﻟﻠﻘﺎﻧﻮﻥ ﺭﻗﻢ ‪ 652/82‬ﺍﻟﺼﺎﺩﺭ ﰲ‬
‫ﺍﳋﺎﺹ ﺑﺎﻻﺗﺼﺎﻻﺕ ﺍﻟﺴﻤﻌﻴﺔ ﻭﺍﻟﺒﺼﺮﻳﺔ ﺇﱃ ﺍﳌﻌﻠﻮﻣﺔ ﻋﻠﻰ ﺃ‪‬ﺎ "ﺻﻮﺭ ﺍﻟﻮﺛﺎﺋﻖ ﻭﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﺍﻟﺮﺳﺎﺋﻞ ﻣﻦ‬
‫ﺃﻱ ﻧﻮﻉ"‬

‫ﻭﰲ ﻫﺬﺍ ﺍﻹﻃﺎﺭ ﻋﺮﻑ ﺍﳌﺸﺮﻉ ﺍﻷﻣﺮﻳﻜﻲ ﺍﳌﻌﻠﻮﻣﺎﺕ ﰲ ﻗﺎﻧﻮﻥ ﺍﳌﻌﺎﻣﻼﺕ ﺍﻟﺘﺠﺎﺭﻳﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‬
‫ﻟﺴﻨﺔ ‪ 1999‬ﺑﺎﳌﺎﺩﺓ ﺍﻟﺜﺎﻧﻴﺔ ﺍﻟﻔﻘﺮﺓ ﺍﻟﻌﺎﺷﺮﺓ ﻣﻨﻪ ﺑﺄ‪‬ﺎ "ﺗﺸﻤﻞ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﺍﻟﻜﻠﻤﺎﺕ ﻭﺍﻟﺼﻮﺭ ﻭﺍﻷﺻﻮﺍﺕ‬
‫ﻭﺍﻟﺮﺳﺎﺋﻞ ﻭﺑﺮﺍﻣﺞ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﻭﺍﻟﱪﺍﻣﺞ ﺍﳌﻮﺿﻮﻋﺔ ﰲ ﺍﻷﻗﺮﺍﺹ ﺍﳌﺮﻧﺔ ﻭﻗﻮﺍﻋﺪ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺃﻭ ﻣﺎ ﺷﺎﺑﻪ‬
‫ﺫﻟﻚ"‪.‬‬

‫ﻛﻤﺎ ﻋﺮﻓﻬﺎ ﺍﻟﻘﺮﺍﺭ ﺍﻟﺼﺎﺩﺭ ﺑﺘﺎﺭﻳﺦ ‪ 22‬ﺩﻳﺴﻤﱪ ‪ 1981‬ﺍﳌﺘﻌﻠﻖ ﺑﺈﺛﺮﺍﺀ ﺍﳌﺼﻄﻠﺤﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ‬
‫ﻓﺮﻧﺴﺎ ﺑﺄ‪‬ﺎ "ﺗﻌﺒﲑ ﻳﺴﺘﻬﺪﻑ ﺟﻌﻞ ﺭﺳﺎﻟﺔ ﻗﺎﺑﻠﺔ ﻟﻠﺘﻮﺻﻴﻞ ﺇﱃ ﺍﻟﻐﲑ ﺑﻔﻀﻞ ﻋﻼﻣﺔ ﺃﻭ ﺇﺷﺎﺭﺓ ﻣﻦ ﺷﺄ‪‬ﺎ‬
‫ﺃﻥ ﺗﻮﺻﻞ ﺍﳌﻌﻠﻮﻣﺔ ﳍﺬﺍ ﺍﻟﻐﲑ"‪.‬‬
‫ﻭﻣﻦ ﺍﻟﻘﻮﺍﻧﲔ ﺍﻟﻌﺮﺑﻴﺔ ﺍﻟﱵ ﻋﺮﻓﺖ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻻﲢﺎﺩﻱ ﻟﺪﻭﻟﺔ ﺍﻹﻣﺎﺭﺍﺕ ﺍﻟﻌﺮﺑﻴﺔ ﺍﳌﺘﺤﺪﺓ‬
‫ﺭﻗﻢ )‪ (1‬ﻟﺴﻨﺔ ‪ 2006‬ﺍﳌﺘﻌﻠﻖ ﺑﺎﳌﻌﺎﻣﻼﺕ ﺍﻟﺘﺠﺎﺭﻳﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﰲ ﻣﺎﺩﺗﻪ ﺍﻷﻭﱃ ﺑﻨﺼﻪ ﻋﻠﻰ ﺃ‪‬ﺎ ﺑﻴﺎﻧﺎﺕ‬
‫ﻭﻣﻌﻠﻮﻣﺎﺕ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ ﰲ ﺷﻜﻞ ﻧﺼﻮﺹ ﺃﻭ ﺭﻣﻮﺯ ﺃﻭ ﺃﺻﻮﺍﺕ ﺃﻭ ﺭﺳﻮﻡ ﺃﻭ ﺻﻮﺭ ﺃﻭ ﺑﺮﺍﻣﺞ ﺍﳊﺎﺳﺐ‬
‫ﺍﻵﱄ ﺃﻭ ﻏﲑﻫﺎ"‪.‬‬

‫)‪ (1‬ﺃﲪﺪ ﺃﻧﻮﺭ ﺑﺪﺭ ‪.‬ﺍﻹﺗﺼﺎﻝ ﺍﻟﻌﻠﻤﻲ‪ ،‬ﺩﺍﺭ ﺍﻟﺜﻘﺎﻓﺔ ﺍﻟﻌﻠﻤﻴﺔ‪ ،‬ﺍﻟﻘﺎﻫﺮﺓ‪ ،‬ﺩ‪.‬ﺕ ﺹ ‪. 17‬‬
‫)‪ (2‬ﺭﺷﻴﺪﺓ ﺑﻮﻛﺮ‪.‬ﺟﺮﺍﺋﻢ ﺍﻹﻋﺘﺪﺍﺀ ﻋﻠﻰ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ ﻭ ﺍﳌﻘﺎﺭﻥ‪.‬ﻣﻨﺸﻮﺭﺍﺕ ﺍﳊﻠﱯ ﺍﳊﻘﻮﻗﻴﺔ ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪ 2012‬ﺹ‪65.‬‬
‫)‪ (3‬ﺧﺎﻟﺪ ﳑﺪﻭﺡ ﺍﺑﺮﺍﻫﻴﻢ ﺃﻣﻦ ﺍﳉﺮﳝﺔ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﺍﻟﺪﺍﺭ ﺍﳉﺎﻣﻌﻴﺔ ‪ 2008‬ﺹ ‪.27‬‬

‫‪- 14 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻛﻤﺎ ﻋﺮﻓﻬﺎ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ﺭﻗﻢ )‪ (2‬ﻟﺴﻨﺔ ‪ 2006‬ﰲ ﺷﺄﻥ ﻣﻜﺎﻓﺤﺔ ﺟﺮﺍﺋﻢ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﺄ‪‬ﺎ ﻛﻞ‬
‫ﻣﺎ ﳝﻜﻦ ﲣﺰﻳﻨﻪ ﻭﻣﻌﺎﳉﺘﻪ ﻭﺗﻮﻟﻴﺪﻩ ﻭﻧﻘﻠﻪ ﺑﻮﺳﺎﺋﻞ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺑﻮﺟﻪ ﺧﺎﺹ ﺍﻟﻜﺘﺎﺑﺔ ﻭﺍﻟﺼﻮﺭ‬
‫ﻭﺍﻟﺼﻮﺕ ﻭﺍﻷﺭﻗﺎﻡ ﻭﺍﳊﺮﻭﻑ ﻭﺍﻟﺮﻣﻮﺯ ﻭﺍﻹﺷﺎﺭﺍﺕ ﻭﻏﲑﻫﺎ‪".‬‬

‫ﻭﻗﺪ ﻋﺮﻑ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻷﺭﺩﱐ ﻟﻠﻤﻌﺎﻣﻼﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺭﻗﻢ ‪ 85‬ﻟﺴﻨﺔ ‪ 2001‬ﰲ ﺍﳌﺎﺩﺓ ﺍﻟﺜﺎﻧﻴﺔ ﻣﻨﻪ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﺄ‪‬ﺎ "ﺍﻟﺒﻴﺎﻧﺎﺕ ﺃﻭ ﺍﻟﻨﺼﻮﺹ ﺃﻭ ﺍﻟﺼﻮﺭ ﺃﻭ ﺍﻷﺷﻜﺎﻝ ﺃﻭ ﺍﻷﺻﻮﺍﺕ ﺃﻭ ﺍﻟﺮﻣﻮﺯ ﺃﻭ ﺑﺮﺍﻣﺞ‬
‫ﺍﳊﺎﺳﻮﺏ ﺃﻭ ﻗﻮﺍﻋﺪ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﱵ ﺃﻧﺸﺌﺖ ﺃﻭ ﺃﺭﺳﻠﺖ ﺃﻭ ﺍﺳﺘﻠﻤﺖ ﺃﻭ ﺧﺰﻧﺖ ﺑﻮﺳﺎﺋﻞ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ"‪.‬‬

‫ﻭﻋﺮﻑ ﻗﺎﻧﻮﻥ ﺍﻟﺒﺤﺮﻳﻦ ﺭﻗﻢ ‪ 83‬ﻟﺴﻨﺔ ‪ 2002‬ﺍﳌﺘﻌﻠﻖ ﺑﺎﳌﻌﺎﻣﻼﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﺄ‪‬ﺎ‬
‫"ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﺍﻟﺼﻮﺭ ﻭﺍﻟﻨﺼﻮﺹ ﻭﺍﻷﺻﻮﺍﺕ ﻭﺍﻟﺮﻣﻮﺯ ﻭﺑﺮﺍﻣﺞ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻟﱪﳎﻴﺎﺕ ﻭﳝﻜﻦ ﺃﻥ ﺗﻜﻮﻥ‬
‫ﻗﻮﺍﻋﺪﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﺍﻟﻜﻼﻡ"‪.‬‬

‫ﻭﻳﺘﺒﲔ ﻣﻦ ﺍﻟﺘﻌﺮﻳﻔﺎﺕ ﺍﻟﺴﺎﺑﻘﺔ ﺃ‪‬ﺎ ﺃﻋﻄﺖ ﻣﻔﻬﻮﻣﺎ ﻣﻮﺳﻌﺎﹰ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﻣﻦ ﺧﻼﻝ ﺇﺿﺎﻓﺘﻬﺎ‬
‫ﻟﻌﺒﺎﺭﺓ "ﻣﻦ ﺃﻱ ﻧﻮﻉ" ﻛﻤﺎ ﰲ ﺗﻌﺮﻳﻒ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﻔﺮﻧﺴﻲ ﺃﻭ ﺑﻌﺒﺎﺭﺓ ﻣﺎ ﺷﺎﺑﻪ ﺫﻟﻚ ﻛﻤﺎ ﰲ ﺗﻌﺮﻳﻒ‬
‫ﺍﻟﻘﺎﻧﻮﻥ ﺍﻷﻣﺮﻳﻜﻲ‪ ،‬ﻭﻫﺬﺍ ﺭﲟﺎ ﲢﺴﺒﺎﹰ ﳌﺎ ﻗﺪ ﻳﻈﻬﺮ ﻣﻦ ﺃﺷﻜﺎﻝ ﺟﺪﻳﺪﺓ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﻭﺫﻟﻚ ﻻﺭﺗﺒﺎﻃﻬﺎ‬
‫ﺑﺘﻘﻨﻴﺔ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻟﺘﻄﻮﺭ ﺍﻟﺘﻜﻨﻮﻟﻮﺟﻲ ﺍﻟﺬﻱ ﻗﺪ ﺗﻈﻬﺮ ﻣﻌﻪ ﻭﺳﺎﺋﻞ ﺃﺧﺮﻯ ﺗﻨﻘﻞ ﺑﻮﺍﺳﻄﺘﻬﺎ ﺍﳌﻌﻠﻮﻣﺔ‪.‬‬

‫ﺃﻭﻻ‪ :‬ﺍﻟﻔـﺮﻕ ﺑﲔ ﺍﳌﻌﻠـﻮﻣﺎﺕ ﻭﺍﳌﻌـﻄﻴﺎﺕ‪:‬ﳝﻴﺰ ﺍﻟﻜﺜﲑ ﻣﻦ ﺍﻟﺪﺍﺭﺳﲔ ﻭﺍﻟﺒﺎﺣﺜﲔ ﰲ ﻫﺬﺍ‬


‫ﺍ‪‬ﺎﻝ ﻋﻨﺪ ﺗﻌﺮﻳﻒ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﻴﻨﻬﺎ ﻭﺑﲔ ﺍﳌﻌﻄﻴﺎﺕ‪ (1)،‬ﻓﻬﺬﻩ ﺍﻷﺧﲑﺓ ﺗﻌﱪ ﻋﻦ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻷﺭﻗﺎﻡ‬
‫ﻭﺍﻟﻜﻠﻤﺎﺕ ﻭﺍﻟﺮﻣﻮﺯ ﺃﻭ ﺍﳊﻘﺎﺋﻖ ﺃﻭ ﺍﻹﺣﺼﺎﺀﺍﺕ ﺍﳋﺎﻡ ﺍﻟﱵ ﻻﻋﻼﻗﺔ ﺑﲔ ﺑﻌﻀﻬﺎ ﺍﻟﺒﻌﺾ ﻭﱂ ﲣﻀﻊ ﺑﻌﺪ‬
‫) ‪(2‬‬
‫ﻟﻠﺘﻔﺴﲑ ﺃﻭ ﺍﻟﺘﺠﻬﻴﺰ ﻟﻺﺳﺘﺨﺪﺍﻡ‪ ،‬ﺃﻣﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻓﻬﻲ ﺍﳌﻌﲎ ﺍﻟﺬﻱ ﻳﺴﺘﺨﻠﺺ ﻣﻦ ﻫﺬﻩ ﺍﳌﻌﻄﻴﺎﺕ‪.‬‬

‫ﻭﻗﺪ ﻋﺮﻓﺖ ﺍﻟﻮﻛﺎﻟﺔ ﺍﻟﻔﺮﻧﺴﻴﺔ ﻟﻠﺘﻘﻴﻴﺲ)‪(Afnor‬ﺍﳌﻌﻄﻴﺎﺕ )‪ (Les donnés‬ﺑﺄ‪‬ﺎ ﻛﻞ ﺣﺎﺩﺙ‬


‫ﻣﻔﻬﻮﻡ ﺃﻭ ﺗﻌﻠﻴﻤﺔ ﺗﻘﺪﻡ ﰲ ﺷﻜﻞ ﻣﺘﻔﻖ ﻋﻠﻴﻪ ﻗﺎﺑﻠﺔ ﻟﻠﺘﺒﺎﺩﻝ ﻋﻦ ﻃﺮﻳﻖ ﺍﻟﺒﺸﺮ ﺃﻭ ﺑﻮﺍﺳﻄﺔ ﺍﳊﺎﺳﻮﺏ ﺃﻭ‬

‫)‪ (1‬ﺍﳌﻌﻄﻴﺎﺕ ﰲ ﺍﻟﻠﻐﺔ ﺗﻌﲏ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻟﺬﻟﻚ ﳒﺪ ﺍﻟﻜﺜﲑ ﻣﻦ ﺍﻟﻜﺘﺐ ﻳﺴﺘﻌﻤﻞ ﻓﻴﻬﺎ ﻫﺬﺍ ﺍﳌﺼﻄﻠﺢ ﺑﺪﻝ ﻣﺼﻄﻠﺢ ﺍﳌﻌﻄﻴﺎﺕ‪ .‬ﻭﻳﻘﺎﺑﻠﻬﺎ ﰲ ﺍﻟﻔﻘﻪ ﺍﻟﻼﺗﻴﲏ ﻛﻠﻤﺔ‬
‫)‪ (Dattum‬ﻭﺗﻌﲏ ﺷﻲﺀ ﻣﻌﻄﻰ ﺃﻭ ﻣﺴﻠﻢ ﺑﻪ ﺃﻭ ﺷﻲﺀ ﻣﺎ ﻣﻌﺮﻭﻑ ﺃﻭ ﻣﺴﻠﻢ ﺑﺼﺤﺘﻪ ‪,‬ﺑﻴﻨﻤﺎ ﺗﺴﺘﺨﺪﻡ ﰲ ﺍﻟﻠﻐﺔ ﺍﻟﻔﺮﻧﺴﻴﺔ ﻣﻘﺎﺑﻼ ﳍﺎ ﻛﻠﻤﺔ‬
‫)‪.(Données‬‬
‫)‪ (2‬ﻫﺸﺎﻡ ﳏﻤﺪ ﻓﺮﻳﺪ ﺭﺳﺘﻢ‪ .‬ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﻭﳐﺎﻃﺮ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ‪.‬ﻣﻜﺘﺒﺔ ﺍﻵﻻﺕ ﺍﳊﺪﻳﺜﺔ ‪ ،1992‬ﺹ ‪.26‬‬

‫‪- 15 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻳﻨﺘﺠﻬﺎ ﺍﳊﺎﺳﻮﺏ‪(1).‬ﻭﻟﻘﺪ ﺍﻋﺘﻤﺪﺕ ﺇﺗﻔﺎﻗﻴﺔ ﺑﻮﺩﺍﺑﺴﺖ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺗﻌﺮﻳﻒ ﺍﳌﻌﻄﻴﺎﺕ ﺫﺍﺕ‬
‫ﺍﻟﺘﻌﺮﻳﻒ ﺍﻟﺬﻱ ﺫﻫﺒﺖ ﺇﻟﻴﻪ ﻫﻴﺄﺓ ﺍﻟﺘﻮﺻﻴﻒ ﺍﻟﻌﺎﳌﻴﺔ ﺍﻹﻳﺰﻭ‪ ،‬ﺣﻴﺚ ﻧﺼﺖ ﰲ ﻣﺎﺩ‪‬ﺎ ﺍﻷﻭﱃ ﻋﻠﻰ ﺃﻥ‬
‫"ﺍﳌﻌﻄﻴﺎﺕ ﻫﻲ ﻛﻞ ﲤﺜﻴﻞ ﻟﻠﻮﻗﺎﺋﻊ ﺃﻭ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﺃﻭ ﺍﳌﻔﺎﻫﻴﻢ ﲢﺖ ﺃﻱ ﺷﻜﻞ ﻭﺗﻜﻮﻥ ﻣﻬﻴﺄﺓ ﻟﻠﻤﻌﺎﳉﺔ‬
‫ﲟﺎ ﰲ ﺫﻟﻚ ﺑﺮﻧﺎﻣﺞ ﻣﻌﺪ ﻣﻦ ﺫﺍﺕ ﺍﻟﻄﺒﻴﻌﺔ ﻭﳚﻌﻞ ﺍﳊﺎﺳﺐ ﻳﺆﺩﻱ ﺍﳌﻬﻤﺔ"‪ .‬ﻭﻗﺪ ﺃﺧﺬﺕ ﺍﻟﺘﻮﺻﻴﺔ‬
‫ﺍﻟﺼﺎﺩﺭﺓ ﻋﻦ ﻣﻨﻈﻤﺔ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻹﻗﺘﺼﺎﺩﻱ ﻭﺍﻟﺘﻨﻤﻴﺔ ﰲ ‪ 1992/11/26‬ﺍﳋﺎﺻﺔ ﲝﻤﺎﻳﺔ ﺃﻧﻈﻤﺔ ﺍﳊﺎﺳﺒﺎﺕ‬
‫ﺍﻵﻟﻴﺔ ﻭﺷﺒﻜﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﺎﻟﺘﻔﺮﻗﺔ ﺍﻟﺴﺎﺑﻘﺔ‪ ،‬ﺣﻴﺚ ﻋﺮﻓﺖ ﺍﳌﻌﻄﻴﺎﺕ ﺑﺄ‪‬ﺎ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﳊﻘﺎﺋﻖ ﺃﻭ‬
‫ﺍﳌﻔﺎﻫﻴﻢ ﺃﻭ ﺍﻟﺘﻌﻠﻴﻤﺎﺕ ﺗﺘﺨﺬ ﺷﻜﻼ ﳏﺪﺩ‪‬ﺍ ﳚﻌﻠﻬﺎ ﻗﺎﺑﻠﺔ ﻟﻠﺘﺒﺎﺩﻝ ﻭﺍﻟﺘﻐﻴﲑ ﺃﻭ ﻟﻠﻤﻌﺎﳉﺔ ﺑﻮﺍﺳﻄﺔ ﺍﻷﻓﺮﺍﺩ ﺃﻭ‬
‫ﺑﻮﺳﺎﺋﻞ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﺃﻣﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻓﻬﻲ ﺍﳌﻌﲎ ﺍﳌﺴﺘﺨﻠﺺ ﻣﻦ ﻫﺬﻩ ﺍﳌﻌﻄﻴﺎﺕ‪.‬‬

‫ﻭﺗﺄﺳﻴﺴﺎﹰ ﻋﻠﻰ ﻫﺬﺍ ﺍﳌﻌﲎ ﻓﺈﻥ ﺍﳌﻌﻄﻴﺎﺕ ﺗﻌﺘﱪ ﺍﳌﻮﺍﺩ ﺍﳋﺎﻡ ﺍﻟﱵ ﺗﺴﺘﺨﺮﺝ ﻣﻨﻬﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ‬
‫ﺑﺎﺳﺘﺨﺪﺍﻡ)‪ (2‬ﻣﻌﺎﳉﺔ ﺁﻟﻴﺔ ﰲ ﻋﻤﻠﻴﺔ ﺍﻹﺳﺘﺨﺮﺍﺝ‪ ،‬ﺇﺫ ﻳﺘﻢ ﲡﻤﻴﻊ ﻭﺗﺸﻐﻴﻞ ﺍﳌﻌﻄﻴﺎﺕ ﻟﻠﺤﺼﻮﻝ ﻋﻠﻰ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ ﰒ ﺗﺴﺘﺨﺪﻡ ﻫﺬﻩ ﺍﳌﻌﻠﻮﻣﺎﺕ ﰲ ﺇﺻﺪﺍﺭ ﻗﺮﺍﺭﺍﺕ ﺗﺆﺩﻱ ﺑﺪﻭﺭﻫﺎ ﺇﱃ ﳎﻤﻮﻋﺔ ﺇﺿﺎﻓﻴﺔ ﻣﻦ‬
‫ﺍﳌﻌﻄﻴﺎﺕ ﻭﺍﻟﱵ ﳛﺼﻞ ﲡﻤﻴﻌﻬﺎ ﻭﻣﻌﺎﳉﺘﻬﺎ ﻣﺮﺓ ﺃﺧﺮﻯ ﻟﻠﺤﺼﻮﻝ ﻋﻠﻰ ﻣﻌﻠﻮﻣﺎﺕ ﺇﺿﺎﻓﻴﺔ‪ (3)،‬ﻭﻫﻲ ﻣﻴﺰﺓ‬
‫ﺗﺘﻤﻴﺰ ‪‬ﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻣﻦ ﺧﻼﻝ ﻗﺎﺑﻠﻴﺘﻬﺎ ﻟﻠﺪﻣﺞ‪ ،‬ﻓﻘﺪ ﺗﻀﺎﻑ ﻣﻌﻠﻮﻣﺔﹲ ﺇﱃ ﻣﻌﻠﻮﻣﺔ‪ ‬ﺃﺧﺮﻯ ﻟﻴﻜﻮﻧﺎ ﻣﻌﺎﹰ‬
‫ﻣﻌﻠﻮﻣﺔ ﺟﺪﻳﺪﺓ ﲣﺘﻠﻒ ﰲ ﻗﻴﻤﺘﻬﺎ ﻭﺃﳘﻴﺘﻬﺎ‪ ،‬ﻭﺑﺎﻟﺘﺎﱄ ﰲ ﻣﻘﺪﺍﺭ ﺍﳊﻤﺎﻳﺔ ﺍﻟﻼﺯﻣﺔ ﳍﺎ‪(4).‬ﻭﻫﻮ ﻣﺎ ﻳﻄﻠﻖ‬
‫ﻋﻠﻴﻪ ﺍﻟﻨﻈﺮﻳﺔ ﺍﻟﺘﻜﺎﻣﻠﻴﺔ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ‪ ،‬ﻭﻣﻦ ﻫﺬﺍ ﺍﳌﻨﻄﻠﻖ ﻳﺘﻀﺢ ﺟﻠﻴﺎﹰ ﺃﻥ ﺍﳌﻌﻄﻴﺎﺕ ﻫﻲ ﺍﳌﻌﻠﻮﻣﺎﺕ ﰲ‬
‫ﺣﺎﻟﺔ ﺳﻜﻮﻥ ﻭﺃﻥ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻫﻲ ﺍﳌﻌﻄﻴﺎﺕ ﰲ ﺣﺎﻟﺔ ﻣﻌﺎﳉﺔ‪ .‬ﻭ‪‬ﺬﺍ ﺍﻟﺘﺼﻮﺭ ﺗﻜﻮﻥ ﺍﳌﻌﻄﻴﺎﺕ ﻋﺒﺎﺭﺓ ﻋﻦ‬
‫ﺣﻘﺎﺋﻖ ﺭﻗﻤﻴﺔ ﺃﻭ ﻏﲑ ﺭﻗﻤﻴﺔ ﺗﺘﻢ ﺑﻄﺮﻳﻘﺔ ﻣﻨﻬﺠﻴﺔ ﳝﻜﻦ ﻓﻬﻢ ﺩﻻﻟﺘﻬﺎ ﻣﺒﺎﺷﺮﺓ ﺩﻭﻥ ﺍﻟﺪﺧﻮﻝ ﰲ ﻋﻤﻠﻴﺎﺕ‬
‫ﺇﺳﺘﻨﺘﺎﺟﻴﺔﺇﺳﺘﻘﺮﺍﺋﻴﺔ ﻟﺪﻻﻟﺘﻬﺎ ﺍﳌﻌﻘﺪﺓ ﻣﻦ ﺧﻼﻝ ﺍﻟﺮﺑﻂ ﺑﲔ ﺃﻛﺜﺮ ﻣﻦ ﺑﻴﺎﻥ ﻣﻨﻬﺎ‪ (5)،‬ﻷﻥ ﺫﻟﻚ ﻳﻌﲏ‬

‫)‪ (1‬ﻣﻔﺘﺎﺡ ﳏﻤﺪ ﺩﺑﺎﺏ‪ ،‬ﻣﻌﺠﻢ ﺍﳌﺼﻄﻠﺤﺎﺕ ﻭﺗﻜﻨﻮﻟﻮﳉﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﻻﺗﺼﺎﻻﺕ‪ .‬ﺍﻟﺪﺍﺭ ﺍﻟﺪﻭﻟﻴﺔ ﻟﻠﻨﺸﺮ ‪.‬ﺍﻟﻘﺎﻫﺮﺓ ‪ 1995‬ﺹ ‪.42‬‬
‫)‪ (2‬ﻳﺪﻟﻞ ﺍﻟﺒﻌﺾ ﻋﻠﻰ ﻫﺬﻩ ﺍﻟﺘﻔﺮﻗﺔ ﺑﺎﳌﺜﺎﻝ ﺍﻟﺘﺎﱄ‪ :‬ﺇﻥ ﻋﺒﺎﺭﺓ » ‪ « Le soleil brille‬ﺑﺎﻟﻠﻐﺔ ﺍﻟﻔﺮﻧﺴﻴﺔ ﺗﻌﲏ ﺃﻥ ﺍﻟﺸﻤﺲ ﻣﺸﺮﻗﺔ ﻭﻫﻲ ﻻ ﺗﻌﺪﻭ ﺃﻥ‬
‫ﺗﻜﻮﻥ ﺑﻴﺎﻧﺎ ﳊﺎﻟﺔ ﺍﻟﺸﻤﺲ ﻭﻻ ﳝﻜﻦ ﺃﻥ ﺗﺘﺤﻮﻝ ﺇﱃ ﻣﻌﻠﻮﻣﺔ ﻟﺪﻯ ﺍﻷﺷﺨﺎﺹ ﺇﻻ ﺇﺫﺍ ﺗﻮﺍﻓﺮ ﺷﺮﻃﺎﻥ‪ :‬ﺍﻷﻭﻝ ﺃﻥ ﻳﻄﻠﻊ ﻋﻠﻴﻬﺎ ﺑﺎﻟﻔﻌﻞ‪ ،‬ﻭﺍﻟﺜﺎﱐ ﺃﻥ ﻳﻜﻮﻧﻮﺍ‬
‫ﻋﻠﻰ ﻋﻠﻢ ﺑﺎﻟﻠﻐﺔ ﺍﻟﻔﺮﻧﺴﻴﺔ ﺣﱴ ﻳﺘﻤﻜﻨﻮﺍ ﻣﻦ ﻓﻬﻤﻬﺎ ﻭﺣﱴ ﻳﺘﺤﻘﻖ ﻫﺬﺍﻥ ﺍﻟﺸﺮﻃﺎﻥ ﺗﻀﻞ ﺍﳌﻌﻄﻴﺎﺕ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﳊﺮﻭﻑ ﻭﻻ ﳝﻜﻦ ﺃﻥ ﺗﺘﺤﻮﻝ ﺇﱃ ﻣﻌﻠﻮﻣﺔ‬
‫ﺇﻻ ﺑﺘﻮﺍﻓﺮﳘﺎ‪.‬‬
‫)‪ (3‬ﺍﻧﺘﺼﺎﺭ ﻏﺮﻳﺐ ﺃﻣﻦ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﻭﺍﻟﻘﺎﻧﻮﻥ‪ .‬ﺩﺍﺭ ﺍﻟﺮﺍﺗﺐ ﺍﳉﺎﻣﻌﻴﺔ ﺑﲑﻭﺕ ‪.‬ﺹ ‪. 81‬‬
‫)‪ (4‬ﻋﻠﻰ ﺳﺒﻴﻞ ﺍﳌﺜﺎﻝ ﺭﻗﻢ ﺣﺴﺎﺏ ﻋﻤﻴﻞ ﰲ ﺍﻟﺒﻨﻚ ﻣﻌﻠﻮﻣﺔ ﻋﻠﻰ ﻗﺪﺭ ﻣﻦ ﺍﻷﳘﻴﺔ ﻭﲢﺘﺎﺝ ﺇﱃ ﲪﺎﻳﺘﻬﺎ ﺇﻻ ﺃﻧﻪ ﺇﺫﺍ ﺃﺿﻔﻨﺎ ﺇﱃ ﻫﺬﻩ ﺍﳌﻌﻠﻮﻣﺔ ﻣﻌﻠﻮﻣﺔ ﺃﺧﺮﻯ‬
‫ﻛﺈﺳﻢ ﺍﻟﻌﻤﻴﻞ ﻭﺇﺳﻢ ﺍﻟﺒﻨﻚ ﻭﺣﺠﻢ ﺍﻟﺮﺻﻴﺪ ﻓﺈﻥ ﻗﻴﻤﺔ ﺍﳌﻌﻠﻮﻣﺔ ﻭﺃﳘﻴﺘﻬﺎ ﰲ ﻫﺬﻩ ﺍﳊﺎﻟﺔ ﺗﺘﻀﺎﻋﻒ ﻭﺗﺘﻄﻠﺐ ﻗﺪﺭﺍ ﺃﻛﱪ ﻣﻦ ﺍﳊﻤﺎﻳﺔ‪.‬‬
‫)‪ (5‬ﺭﺷﻴﺪﺓ ﺑﻮﻛﺮ ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ ‪.67‬‬

‫‪- 16 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﻟﺘﺤﻮﻝ ﻣﻦ ﻛﻮﻥ ﺍﻷﻣﺮ ﳎﺮﺩ ﻣﻌﻄﻴﺎﺕ ﺇﱃ ﻣﻌﻠﻮﻣﺎﺕ‪ ،‬ﻓﺎﳌﻌﻠﻮﻣﺎﺕ ﻭﻓﻘﺎ ﻟﺬﻟﻚ ﻫﻲ ﺍﻟﻨﺘﻴﺠﺔ ﺍﳌﺒﺪﺋﻴﺔ ﺃﻭ‬
‫ﺍﻟﻨﻬﺎﺋﻴﺔ ﺍﳌﺘﺮﺗﺒﺔ ﻋﻠﻰ ﺗﺸﻐﻴﻞ ﺍﳌﻌﻄﻴﺎﺕ ﻭﺗﻌﻠﻴﻠﻬﺎ ﺃﻭ ﺍﺳﺘﻘﺮﺍﺀ ﺩﻻﻟﺘﻬﺎ ﻭﺍﺳﺘﻨﺘﺎﺝ ﻣﺎ ﳝﻜﻦ ﺍﺳﺘﻨﺘﺎﺟﻪ ﻣﻨﻬﺎ‬
‫ﻭﺣﺪﻫﺎ ﺃﻭ ﻣﺘﺮﺍﻓﻘﺔ ﻣﻊ ﻏﲑﻫﺎ ﺃﻭ ﺗﻔﺴﲑﻫﺎ ﻋﻠﻰ ﳓﻮ ﻳﺜﺮﻱ ﻣﻌﺮﻓﺔ ﻣﺴﺘﺨﺪﻣﻲ ﺍﻟﻘﺮﺍﺭ ﻭﻳﺴﺎﻋﺪﻫﻢ ﰲ‬
‫) ‪(2 )(1‬‬
‫ﺍﳊﻜﻢ ﺍﻟﺴﺪﻳﺪ ﻋﻠﻰ ﺍﻟﻈﻮﺍﻫﺮ ﻭﺍﳌﺸﺎﻫﺪﺍﺕ ﺃﻭ ﻳﺴﻬﻢ ﰲ ﺗﻄﻮﻳﺮ ﺍﳌﻌﺎﺭﻑ ﺍﻟﻨﻈﺮﻳﺔ ﺃﻭ ﺍﻟﺘﻄﺒﻴﻘﻴﺔ‪.‬‬

‫ﻭﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻋﻠﻰ ﻏﲑ ﺍﻟﻌﺎﺩﺓ ﻋﻤﺪ ﺇﱃ ﻭﺿﻊ ﺗﻌﺮﻳﻒ ﻟﻠﻤﻌﻄﻴﺎﺕ ﲟﻮﺟﺐ ﺍﳌﺎﺩﺓ ﺍﻟﺜﺎﻧﻴﺔ ﻣﻦ‬
‫ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﺍﳌﺘﻀﻤﻦ ﺍﻟﻘﻮﺍﻋﺪ ﺍﳋﺎﺻﺔ ﻟﻠﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ‬
‫ﻭﺍﻹﺗﺼﺎﻝ ﻭﻣﻜﺎﻓﺤﺘﻬﺎ ﺑﻨﺼﻪ ﰲ ﺍﻟﻔﻘﺮﺓ ﺝ ﻣﻦ ﻫﺬﻩ ﺍﳌﺎﺩﺓ ﻋﻠﻰ ﺃﻥ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻫﻲ ﺃﻱ ﻋﻤﻠﻴﺔ‬
‫ﻋﺮﺽ ﻟﻠﻮﻗﺎﺋﻊ ﺃﻭ ﺍﳌﻔﺎﻫﻴﻢ ﰲ ﺷﻜﻞ ﺟﺎﻫﺰ ﻟﻠﻤﻌﺎﳉﺔ ﺩﺍﺧﻞ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﲟﺎ ﰲ ﺫﻟﻚ ﺍﻟﱪﺍﻣﺞ‬
‫ﺍﳌﻨﺎﺳﺒﺔ ﺍﻟﱵ ﻣﻦ ﺷﺄ‪‬ﺎ ﺟﻌﻞ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﺆﺩﻱ ﻭﻇﻴﻔﺘﻬﺎ‪.‬‬

‫ﺛﺎﻧﻴﺎ‪ :‬ﺍﻟﻔـﺮﻕ ﺑﲔ ﺍﳌﻌﻠـﻮﻣﺎﺕ ﻭﺍﻟﱪﺍﻣــﺞ ‪:‬ﻳﻌﺘﱪ ﺍﻟﱪﻧﺎﻣﺞ ﻣﻦ ﺍﻟﻌﻨﺎﺻﺮ ﺍﻟﺮﺋﻴﺴﻴﺔ ﻟﻠﻜﻴﺎﻥ‬


‫ﺍﳌﻨﻄﻘﻲ ﻷﻱ ﺣﺎﺳﻮﺏ‪ ،‬ﻭﻣﻦ ﺩﻭﻧﻪ ﻳﺼﺒﺢ ﻫﺬﺍ ﺍﻷﺧﲑ )ﺍﳊﺎﺳﻮﺏ( ﳎﺮﺩ ﳎﻤﻮﻋﺔ ﻣﻦ ﻣﻌﺪﺍﺕ ﻭﺁﻻﺕ‬
‫ﺻﻤﺎﺀ‪ (3).‬ﻭﻗﺪ ﻧﺎﻝ ﺑﺮﻧﺎﻣﺞ ﺍﳊﺎﺳﻮﺏ ﺣﻈﻪ ﻣﻦ ﺍﻟﺘﻌﺮﻳﻔﺎﺕ ﺍﻟﻌﻠﻤﻴﺔ ﻭﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻓﺘﻌﺪﺩﺕ ﻭﺗﺒﺎﻳﻨﺖ ﺑﲔ‬
‫ﻣﻀﻴﻖ ﳌﺪﻟﻮﻟﻪ ﻭﻣﻮﺳﻊ ﻟﻪ‪ ،‬ﻭﻣﻦ ﻫﺬﻩ ﺍﻟﺘﻌﺮﻳﻔﺎﺕ ﺍﻟﻌﻠﻤﻴﺔ ﻟﻠﱪﻧﺎﻣﺞ ﺃﻧﻪ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻷﻭﺍﻣﺮ‬
‫ﻭﺍﻹﺭﺷﺎﺩﺍﺕ ﻭﺍﻹﻳﻌﺎﺯﺍﺕ ﺍﻟﱵ ﲢﺪﺩ ﳉﻬﺎﺯ ﺍﳊﺎﺳﻮﺏ ﺍﻟﻌﻤﻠﻴﺎﺕ ﺍﻟﱵ ﻳﻘﻮﻡ ﺑﺘﻨﻔﻴﺬﻫﺎ ﺑﺘﺴﻠﺴﻞ ﻭﺧﻄﻮﺍﺕ‬
‫ﳏﺪﺩﺓ‪ ،‬ﻭﺗ‪‬ﺤﻤﻞ ﻫﺬﻩ ﺍﻟﻌﻤﻠﻴﺎﺕ ﻋﻠﻰ ﻭﺳﻴﻂ ﻣﻌﲔ ﳝﻜﻦ ﻗﺮﺍﺀﺗﻪ ﻋﻦ ﻃﺮﻳﻖ ﺍﻵﻟﺔ‪ ،‬ﻭﺑﻌﺪ ﺫﻟﻚ ﳝﻜﻦ‬
‫ﻟﻠﱪﻧﺎﻣﺞ ﻋﻦ ﻃﺮﻳﻖ ﻣﻌﺎﳉﺔ ﺍﳌﻌﻄﻴﺎﺕ ﺃﻥ ﻳﺆﺩﻱ ﻭﻇﺎﺋﻒ ﻣﻌﻴﻨﺔ ﻭﳛﻘﻖ ﺍﻟﻨﺘﺎﺋﺞ ﺍﳌﻄﻠﻮﺑﺔ)‪.(4‬‬

‫ﻛﻤﺎ ﻋ‪‬ﺮﻑ ﺃﻳﻀﺎ ﺃﻧﻪ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻟﺘﻌﻠﻴﻤﺎﺕ ﺍﳌﺘﺘﺎﺑﻌﺔ ﺑﺼﻔﺔ ﻣﻨﻄﻘﻴﺔ ﺗﻮﺟﻪ ﺇﱃ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﻷﺩﺍﺀ‬
‫ﺍﻟﻌﻤﻠﻴﺎﺕ ﺍﳌﻨﻄﻘﻴﺔ ﺍﳌﻄﻠﻮﺑﺔ)‪.(5‬‬

‫)‪ (1‬ﳏﻤﺪ ﳏﻤﺪ ﺷﺘﺎ‪ .‬ﻓﻜﺮﺓ ﺍﳊﻤﺎﻳﺔ ﺍﳉﻨﺎﺋﻴﺔ ﻟﱪﻧﺎﻣﺞ ﺍﳊﺎﺳﺐ ﺍﻵﱄ‪ ،‬ﺩﺍﺭ ﺍﳉﺎﻣﻌﺔ ﺍﳉﺪﻳﺪﺓ ﻟﻠﻨﺸﺮ ‪ ،2002‬ﺹ ‪.61‬‬
‫)‪ (2‬ﻭﳚﺪ ﺍﳌﺼﻄﻠﺤﺎﻥ ﺍﳌﻌﻄﻴﺎﺕ ﻭﳌﻌﻠﻮﻣﺎﺕ ﻓﺮﻗﺎ ﻓﻨﺒﺎ ﺑﻴﻨﻬﻤﺎ ﻓﺎﳌﻌﻄﻴﺎﺕ )‪ (Data‬ﻫﻲ ﺍﳌﺪﺧﻼﺕ ‪ in Put‬ﺇﱃ ﺟﻬﺎﺯ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ‪‬ﺪﻑ ﺗﺸﻐﻴﻠﻬﺎ‬
‫ﻭﻣﻌﺎﳉﺘﻬﺎ ﺩﺍﺧﻞ ﺍﳉﻬﺎﺯ‪ ،‬ﻭﺍﳌﻌﻠﻮﻣﺎﺕ ﻫﻲ ﺍﳌﺨﺮﺟﺎﺕ » ‪ « Out put‬ﺑﻌﺪ ﻋﻤﻠﻴﺔ ﺍﳌﻌﺎﳉﺔ‪.‬‬
‫)‪ (3‬ﻋﻔﻴﻔﻲ ﻛﺎﻣﻞ ﻋﻔﻴﻔﻲ‪ .‬ﺟﺮﺍﺋﻢ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﻭﺣﻘﻮﻕ ﺍﳌﺆﻟﻒ ﻭﺍﳌﺼﻨﻔﺎﺕ ﺍﻟﻔﻨﻴﺔ ﻭﺩﻭﺭ ﺍﻟﺸﺮﻃﺔ ﻭﺍﻟﻘﺎﻧﻮﻥ‪ ،‬ﺩﺭﺍﺳﺔ ﻣﻘﺎﺭﻧﺔ‪ -‬ﻣﻨﺸﻮﺭﺍﺕ ﺍﳊﻠﱯ ﺍﻟﻄﺒﻌﺔ‪،02‬‬
‫‪ ،2007‬ﺹ ‪.25‬‬
‫)‪ (4‬ﳏﻤﺪ ﺑﻼﻝ ﺍﻟﺰﻋﱯ‪ .‬ﺃﺩ ﺃﲪﺪ ﺍﻟﺸﺮﺍﻳﻌﺔ ﻣﻨﻴﺐ ﻗﻄﻴﺸﺎﺕ‪ ،‬ﻣﻬﺎﺭﺍﺕ ﺍﳊﺎﺳﻮﺏ ﺍﻟﱪﳎﻴﺎﺕ‪ .‬ﺩﺍﺭ ﻭﺍﺋﻞ ﻟﻠﻨﺸﺮ ﺍﻟﻄﺒﻌﺔ ﺍﳋﺎﻣﺴﺔ ﻋﻤﺎﻥ ﺹ ‪.36‬‬
‫)‪ (5‬ﺍﻧﻈﺮ ﰲ ﻫﺬﺍ ﺍﳌﻌﲎ ﳏﻤﺪ ﳏﻤﺪ ﺍﳍﺎﺩﻱ‪ ،‬ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺗﻄﺒﻴﻘﺎ‪‬ﺎ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ﺩﺍﺭ ﺍﻟﺸﺮﻭﻕ‪ ،‬ﺍﻟﻘﺎﻫﺮﺓ ‪ 1989‬ﺹ ‪.110‬‬

‫‪- 17 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻭﻭﻓﻘﺎ ﻟﻠﻤﻔﻬﻮﻡ ﺍﻟﻌﻠﻤﻲ ﻟﻠﱪﺍﻣﺞ ﻓﺈ‪‬ﺎ ﺗﺼﻨﻒ ﺇﱃ ﻗﺴﻤﲔ‪ :‬ﺑﺮﺍﻣﺞ ﺍﻟﻨﻈﺎﻡ ﻭﺑﺮﺍﻣﺞ ﺍﻟﺘﻄﺒﻴﻘﺎﺕ‪،‬‬
‫ﻓﺄﻣﺎ ﺍﻷﻭﱃ ﻓﺈ‪‬ﺎ ﺗﻘﻮﻡ ﺑﻮﻇﻴﻔﺔ ﺇﺟﺮﺍﺋﻴﺔ ﺣﻴﺚ ﺗﺴﻴﻄﺮ ﻋﻠﻰ ﺍﻟﻌﻤﻠﻴﺎﺕ ﺍﻷﺳﺎﺳﻴﺔ ﺍﻷﻭﱃ ﺩﺍﺧﻞ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ‬
‫ﻭﺃﻣﺎ ﺍﻟﺜﺎﻧﻴﺔ ﻓﻬﻲ ﺑﺮﺍﻣﺞ ﻣﺼﻤﻤﺔ ﻣﻦ ﺃﺟﻞ ﺃﺩﺍﺀ ﻭﻇﺎﺋﻒ ﻣﻌﻴﻨﺔ ﺗﺴﺘﺠﻴﺐ ﻻﺣﺘﻴﺎﺟﺎﺕ ﺍﻟﻌﻤﻼﺀ‬
‫ﻭﻣﺘﻄﻠﺒﺎ‪‬ﻢ)‪.(1‬‬

‫ﻭﻣﻦ ﺍﻟﺘﻌﺮﻳﻔﺎﺕ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﱪﻧﺎﻣﺞ ﺃﻧﻪ‪" :‬ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻟﺘﻌﻠﻴﻤﺎﺕ ﺍﳌﻮﺟﻬﺔ ﻣﻦ ﺍﻹﻧﺴﺎﻥ ﺇﱃ ﺍﻵﻟﺔ‬
‫ﻭﺍﻟﱵ ﺗﺴﻤﺢ ﺑﺘﻨﻔﻴﺬ ﻣﻬﻤﺔ ﻣﻌﻴﻨﺔ"‪ (2).‬ﻭﻗﺪ ﻋﺮﻓﺖ ﺍﳌﻨﻈﻤﺔ ﺍﻟﻌﺎﳌﻴﺔ ﻟﻠﻤﻠﻜﻴﺔ ﺍﻟﻔﻜﺮﻳﺔ ﺍﳌﻌﺮﻭﻓﺔ ﺑﺎﺳﻢ‬
‫"ﺍﻟﺮﻳﺒﻮ" ﺍﻟﱪﻧﺎﻣﺞ ﺑﺄﻧﻪ "ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻟﺘﻌﻠﻴﻤﺎﺕ ﺍﻟﱵ ﺗﺴﻤﺢ ﺑﻌﺪ ﻧﻘﻠﻬﺎ ﻋﻠﻰ ﺩﻋﺎﻣﺔ ﻣﻘﺮﻭﺀﺓ ﻣﻦ ﻗﺒﻞ‬
‫ﺍﻵﻟﺔ ﺑﻴﺎﻥ ﺃﺩﺍﺀ ﺃﻭ ﺇﳒﺎﺯ ﻭﻇﻴﻔﺔ ﺃﻭ ﻣﻬﻤﺔ ﺃﻭ ﻧﺘﻴﺠﺔ ﻣﻌﻴﻨﺔ ﻋﻦ ﻃﺮﻳﻖ ﺁﻟﺔ ﻗﺎﺩﺭﺓ ﻋﻠﻰ ﻣﻌﺎﳉﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ‪.‬‬

‫ﻭﻋﻠﻰ ﻧﻔﺲ ﺍﳌﻔﻬﻮﻡ ﺩﺭ‪‬ﺝ ﺍﳌﺸﺮﻉ ﺍﻷﻣﺮﻳﻜﻲ ﻣﻦ ﺧﻼﻝ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﺼﺎﺩﺭ ﺳﻨﺔ ‪ 1980‬ﺍﳋﺎﺹ‬
‫ﲝﻤﺎﻳﺔ ﺣﻖ ﺍﳌﺆﻟﻒ ﺇﱃ ﺗﻌﺮﻳﻒ ﺍﻟﱪﻧﺎﻣﺞ )‪ (Software‬ﺑﺄﻧﻪ ﳎﻤﻮﻋﺔ ﺗﻮﺟﻴﻬﺎﺕ ﺃﻭ ﺗﻌﻠﻴﻤﺎﺕ ﳝﻜﻦ‬
‫ﻟﻠﻨﻈﺎﻡ ﺍﺳﺘﺨﺪﺍﻣﻬﺎ ﺑﺸﻜﻞ ﻣﺒﺎﺷﺮ ﺃﻭ ﻏﲑ ﻣﺒﺎﺷﺮ ﻟﻠﻮﺻﻮﻝ ﺇﱃ ﻧﺘﻴﺠﺔ ﻣﻌﻴﻨﺔ‪ .‬ﺃﻣﺎ ﺍﳊﺎﻝ ﰲ ﻓﺮﻧﺴﺎ ﻓﺈﻥ‬
‫ﺍﳌﺸﺮﻉ ﺍﻟﻔﺮﻧﺴﻲ ﱂ ﻳﺘﺠﻪ ﺇﱃ ﻭﺿﻊ ﺗﻌﺮﻳﻒ ﻟﻠﱪﻧﺎﻣﺞ ﺳﻮﺍﺀ ﻣﻦ ﺧﻼﻝ ﺍﻟﻨﺼﻮﺹ ﺍﳉﺰﺍﺋﻴﺔ ﺍﻟﱵ ﺗﻨﻈﻢ‬
‫ﺍﳉﺮﺍﺋﻢ ﳏﻞ ﺍﻟﺪﺭﺍﺳﺔ ﺃﻭ ﰲ ﺇﻃﺎﺭ ﺍﻟﻘﺎﻧﻮﻥ ﺭﻗﻢ ‪ 85/690‬ﺍﳌﺆﺭﺥ ﰲ ‪ 1985/07/3‬ﺍﳌﺘﻌﻠﻖ ﲝﻘﻮﻕ‬
‫ﺍﳌﺆﻟﻒ‪ ،‬ﺇﻻ ﺃﻥ ﺍﻟﻘﺮﺍﺭ ﺍﻟﻮﺯﺍﺭﻱ ﺍﻟﺼﺎﺩﺭ ﻋﻦ ﻭﺯﻳﺮ ﺍﻟﺼﻨﺎﻋﺔ ﻭﺍﻟﺘﻌﻠﻴﻢ ﺍﻟﻮﻃﲏ ﰲ ‪1982/11/22‬‬
‫ﲞﺼﻮﺹ ﺇﺛﺮﺍﺀ ﺍﻟﻠﻐﺔ ﺍﻟﻔﺮﻧﺴﻴﺔ‪ ،‬ﻓﻘﺪ ﻋﺮﻑ ﺍﻟﱪﻧﺎﻣﺞ ﻋﻠﻰ ﺃﻧﻪ ﳎﻤﻮﻋﺔ ﺍﳋﻄﻮﺍﺕ ﻭﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﻟﱵ‬
‫‪‬ﺪﻑ ﺇﱃ ﺗﺸﻐﻴﻞ ﻧﻈﺎﻡ ﻣﺘﻜﺎﻣﻞ ﻷﻧﻈﻤﺔ ﺍﳌﻌﺎﳉﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺗﻮﻇﻴﻔﻬﺎ ﻭﻓﻘﺎ ﳍﺬﺍ ﺍﻟﻐﺮﺽ ﺍﻟﺬﻱ ﻣﻦ‬
‫ﺃﺟﻠﻪ ﰎ ﻭﺿﻊ ﻫﺬﺍ ﺍﻟﱪﻧﺎﻣﺞ‪.‬‬

‫ﻭﻣﻦ ﺍﻟﻮﺍﺿﺢ ﺃﻥ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻗﺪ ﻭﺍﻛﺐ ﺍﻹﲡﺎﻩ ﺍﻟﺬﻱ ﺳﻠﻜﺘﻪ ﺃﻏﻠﺐ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﰲ ﻣﻌﻈﻢ‬
‫ﺍﻟﺪﻭﻝ ﺣﻴﻨﻤﺎ ﺃﺩﻣﺞ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ‪05/03‬ﺍﳌﺘﻌﻠﻖ ﲝﻘﻮﻕ ﺍﳌﺆﻟﻒ ﻭﺍﳊﻘﻮﻕ ﺍ‪‬ﺎﻭﺭﺓ ﺍﳌﺼﻨﻔﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﺿﻤﻦ ﻗﺎﺋﻤﺔ ﺍﳌﺼﻨﻔﺎﺕ ﺍﻷﺻﻠﻴﺔ ﺍﶈﻤﻴﺔ ﻭﺍﻟﱵ ﻋﱪ ﻋﻨﻬﺎ ﲟﺼﻨﻔﺎﺕ ﻗﻮﺍﻋﺪ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﺑﺮﺍﻣﺞ ﺍﻹﻋﻼﻡ ﺍﻵﱄ‬
‫ﺣﻴﺚ ﻧﺼﺖ ﺍﳌﺎﺩﺓ ﺍﻟﺮﺍﺑﻌﺔ ﺍﻟﻔﻘﺮﺓ ﺃﻋﻠﻰ ﺃﻧﻪ "ﺗﻌﺘﱪ ﻋﻠﻰ ﺍﳋﺼﻮﺹ ﻛﻤﺼﻨﻔﺎﺕ ﺃﺩﺑﻴﺔ ﺃﻭ ﻓﻨﻴﺔ ﳏﻤﻴﺔ‪:‬‬

‫)‪ (1‬ﺭﺷﻴﺪﺓ ﺑﻮﻛﺮ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ ‪.69‬‬


‫)‪ (2‬ﻋﻤﺎﺩ ﳏﻤﺪ ﺳﻼﻣﺔ‪ ،‬ﺍﳊﻤﺎﻳﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﱪﻧﺎﻣﺞ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻭﻣﺸﻜﻠﺔ ﻗﺮﺻﻨﺔ ﺍﻟﱪﻧﺎﻣﺞ ﺍﻷﻭﻝ‪ ،‬ﺩﺍﺭ ﻭﺍﺋﻞ ﻟﻠﻨﺸﺮ‪ ،‬ﻋﻤﺎﻥ ‪ ،2005‬ﺹ ‪.48‬‬

‫‪- 18 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺃ‪ -‬ﺍﳌﺼﻨﻔﺎﺕ ﺍﻷﺩﺑﻴﺔ ﺍﳌﻜﺘﻮﺑﺔ ﻣﺜﻞ‪....‬ﺑﺮﺍﻣﺞ ﺍﳊﺎﺳﻮﺏ‪ "....‬ﻛﻤﺎ ﺗﻀﻤﻨﺖ ﺍﻟﻔﻘﺮﺓ ﺍﻟﺜﺎﻧﻴﺔ ﻣﻦ‬
‫ﺍﳌﺎﺩﺓ ‪ 05‬ﻗﻮﺍﻋﺪ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺑﻨﺼﻬﺎ‪" :‬ﺗﻌﺘﱪ ﺃﻳﻀﺎ ﻣﺼﻨﻔﺎﺕ ﳏﻤﻴﺔ ﺍﻷﻋﻤﺎﻝ ﺍﻵﺗﻴﺔ‪:‬‬
‫‪ -‬ﺍ‪‬ﻤﻮﻋﺎﺕ ﻭﺍﳌﺨﺘﺎﺭﺍﺕ ﻣﻦ ﺍﳌﺼﻨﻔﺎﺕ‪ ....‬ﻭﻗﻮﺍﻋﺪ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺳﻮﺍﺀ ﻛﺎﻧﺖ ﻣﺴﺘﻨﺴﺨﺔ ﻋﻠﻰ‬
‫ﺩﻋﺎﻣﺔ ﻗﺎﺑﻠﺔ ﻟﻼﺳﺘﻐﻼﻝ ﺑﻮﺍﺳﻄﺔ ﺁﻟﺔ ﺃﻭ ﺑﺄﻱ ﺷﻜﻞ ﻣﻦ ﺍﻷﺷﻜﺎﻝ ﺍﻷﺧﺮﻯ"‪.‬‬

‫ﻭﺍﳌﻼﺣﻆ ﺃﻥ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻗﺪ ﺍﻛﺘﻔﻰ ﻓﻘﻂ ﺑﺈﺩﻣﺎﺝ ﺑﺮﺍﻣﺞ ﺍﳊﺎﺳﻮﺏ ﺿﻤﻦ ﺍﳌﺼﻨﻔﺎﺕ‬
‫ﺍﻷﺻﻠﻴﺔ ﺍﶈﻤﻴﺔ ﺩﻭﻥ ﺍﳋﻮﺽ ﰲ ﲢﺪﻳﺪ ﻣﻔﻬﻮﻡ ﺍﻟﱪﻧﺎﻣﺞ‪ ،‬ﻭﻫﺬﺍ ﺭﺍﺟﻊ ﺭﲟﺎ ﻟﺘﻌﻘﺪ ﻓﻜﺮﺓ ﺍﻟﱪﺍﻣﺞ ﺫﺍ‪‬ﺎ‬
‫ﺑﺴﺒﺐ ﺍﺭﺗﺒﺎﻃﻬﺎ ﺑﺘﻄﻮﺭ ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﻧﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺍﺳﺘﺨﺪﺍﻣﺎ‪‬ﺎ ﳑﺎ ﻳﺼﻌﺐ ﺣﺼﺮﻫﺎ ﰲ ﻧﻄﺎﻕ ﳏﺪﺩ‪.‬‬

‫ﻫﺬﺍ ﻭﺇﻥ ﻛﺎﻥ ﺑﻌﺾ‪ ‬ﻣﻦ ﺍﻟﻔﻘﻪ ﻳﺮﻯ ﺟﺪﻭﻯ ﻣﻦ ﺍﻟﺘﻤﻴﻴﺰ ﻭﺍﻟﺘﻔﺮﻗﺔ ﺑﲔ ﺍﳌﻌﻄﻴﺎﺕ ﻭﺍﳌﻌﻠﻮﻣﺎﺕ‬
‫ﻭﺍﻟﱪﺍﻣﺞ ﺇﻻ ﺃﻧﻪ ﻭﰲ ﺍﻹﲡﺎﻩ ﺍﳌﻌﺎﻛﺲ ﻳﺮﻯ ﺟﺎﻧﺐ ﺁﺧﺮ ﻣﻦ ﺍﻟﻔﻘﻪ ﻋﺪﻡ ﻭﺟﻮﺩ ﺃﳘﻴﺔ ﰲ ﺍﻟﺘﻤﻴﻴﺰ‬
‫ﺑﻴﻨﻬﺎ‪ (1)،‬ﻃﺎﳌﺎ ﺃﻥ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻫﻲ ﺍﳌﻌﲎ ﺍﳌﺴﺘﺨﻠﺺ ﻣﻦ ﺍﳌﻌﻄﻴﺎﺕ ﺑﻌﺪ ﻣﻌﺎﳉﺘﻬﺎ ﻭﺃﻥ ﺍﻟﱪﻧﺎﻣﺞ ﻫﻮ‬
‫ﺍﳌﺴﺘﻮﺩﻉ ﺍﻟﺬﻱ ﻳﺘﻢ ﻓﻴﻪ ﻣﻌﺎﳉﺔ ﻫﺬﻩ ﺍﳌﻌﻄﻴﺎﺕ‪ ،‬ﻓﺎﻟﻌﻼﻗﺔ ﺑﻴﻨﻬﺎ ﺇﺫﻥ ﻫﻲ ﻋﻼﻗﺔ ﺍﳉﺰﺀ ﺑﺎﻟﻜﻞ‪.‬ﻭﳌﺎ ﻛﺎﻧﺖ‬
‫ﺍﻟﻐﺎﻳﺔ ﰲ ﺍﳌﻘﺎﻡ ﺍﻷﻭﻝ ﻫﻲ ﲪﺎﻳﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻓﺎﻟﻜﻞ ﻳﺘﻤﺘﻊ ﺑﻨﻔﺲ ﺍﳊﻤﺎﻳﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﰲ ﺇﻃﺎﺭ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻃﺎﳌﺎ ﺃﻥ ﻫﺬﻩ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻣﻮﺟﻮﺩﺓ ﺩﺍﺧﻞ ﺑﻴﺌﺘﻬﺎ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ)‪.(2‬‬

‫ﻭﻟﻘﺪ ﳓﺎ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻫﺬﺍ ﺍﳌﻨﺤﻰ ﺣﻴﻨﻤﺎ ﺃﺩﺭﺝ ﺑﺮﺍﻣﺞ ﺍﳊﺎﺳﻮﺏ ﺿﻤﻦ ﻣﻔﻬﻮﻡ ﺍﳌﻌﻄﻴﺎﺕ‬
‫ﻭﱂ ﻳﺄﺑﻪ ﳍﺬﺍ ﺍﳉﺪﻝ ﺍﻟﻔﻘﻬﻲ ﻣﻦ ﺣﻴﺚ ﺍﻟﺘﻤﻴﻴﺰ ﺑﻴﻨﻬﺎ‪ ،‬ﺣﻴﺚ ﻧﺼﺖ ﺍﳌﺎﺩﺓ ﺍﻟﺜﺎﻧﻴﺔ ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪04/09‬‬
‫ﺍﳌﺘﻀﻤﻦ ﺍﻟﻘﻮﺍﻋﺪ ﺍﳋﺎﺻﺔ ﻟﻠﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭ ﺍﻹﺗﺼﺎﻝ ﰲ ﺗﻌﺮﻳﻔﻬﺎ‬
‫ﻟﻠﻤﻌﻄﻴﺎﺕ ﺃﻥ ﻫﺬﻩ ﺍﻷﺧﲑﺓ ﻫﻲ "ﺃﻱ ﻋﻤﻠﻴﺔ ﻋﺮﺽ ﻟﻠﻮﻗﺎﺋﻊ ﺃﻭ ﺍﳌﻌﻠﻮﻣﺎﺕ‪.‬ﲟﺎ ﰲ ﺫﻟﻚ ﺍﻟﱪﺍﻣﺞ ﺍﳌﻨﺎﺳﺒﺔ‬
‫ﺍﻟﱵ ﻣﻦ ﺷﺎ‪‬ﺎ ﺃﻥ ﲡﻌﻞ ﺍﳌﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﺆﺩﻱ ﻭﻇﻴﻔﺘﻬﺎ"‪.‬‬

‫)‪ (1‬ﻧﺎﺋﻠﺔ ﳏﻤﺪ ﻓﺮﻳﺪ ﻓﻮﺭﺓ‪ .‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ ‪.98‬‬


‫)‪ (2‬ﻳﺘﺤﺪﺩ ﻧﻄﺎﻕ ﺍﳊﻤﺎﻳﺔ ﺍﳉﺰﺍﺋﻴﺔ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﺃﻥ ﺗﻜﻮﻥ ﰲ ﺷﻜﻠﻬﺎ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻓﺤﺴﺐ ﻟﻴﺨﺮﺝ ﺑﺬﻟﻚ ﻣﻦ ﻧﻄﺎﻗﻬﺎ ﺍﳌﻌﻄﻴﺎﺕ ﺍﻟﱵ ﱂ ﺗﻌﺎﰿ ﺑﻌﺪ ﻭﱂ‬
‫ﺗﺪﺧﻞ ﰲ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ‪ ،‬ﻭﻛﺬﻟﻚ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﱵ ﰎ ﻣﻌﺎﳉﺘﻬﺎ ﰒ ﺍﻧﻔﺼﻠﺖ ﻋﻦ ﺑﻴﺌـﺘﻬﺎ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﺳﺠﻠﺖ ﻋﻠﻰ ﺷﻲﺀ ﻣﺎﺩﻱ ﻭﺃﺻﺒﺤﺖ ﺧﺎﺭﺝ ﺍﻟﻨﻈﺎﻡ‪.‬‬
‫ﻭﻫﺬﺍ ﻣﺎ ﺃﺷﺎﺭﺕ ﺍﻟﻴﻪ ﺍﳌﺬﻛﺮﺓ ﺍﻟﺘﻔﺴﲑﻳﺔ ﻻﺗﻔﺎﻗﻴﺔ ﺑﻮﺩﺍﺑﺴﺖ ﰲ ﺇﻃﺎﺭ ﺗﻮﺿﻴﺤﻬﺎ ﳌﻌﲎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻋﻨﺪﻣﺎ ﺃﺷﺎﺭﺕ ﺇﱃ ﺃﻧﻪ ﳚﺐ ﻓﻬﻤﻬﺎ ﻋﻠﻰ ﺃ‪‬ﺎ ﻣﻌﻠﻮﻣﺎﺕ‬
‫ﺗﺄﺧﺬ ﺷﻜﻼ ﺇﻟﻜﺘﺮﻭﻧﻴﺎ ﺃﻭ ﺃﻱ ﺷﻜﻞ ﺁﺧﺮ ﻳﺴﻤﺢ ﳌﻌﺎﳉﺘﻬﺎ ﻣﺒﺎﺷﺮﺓ‪.‬‬

‫‪- 19 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻭﻟﻌﻞ ﺍﻟﺴﺆﺍﻝ ﺍﻟﺬﻱ ﻳﻄﺮﺡ ﻧﻔﺴﻪ ﰲ ﻫﺬﺍ ﺍﻟﺼﺪﺩ ﻫﻞ ﻛﻞ ﻣﺎ ﳛﺘﻮﻳﻪ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻣﻦ‬
‫ﻣﻌﻠﻮﻣﺎﺕ ﺗﺼﻠﺢ ﻷﻥ ﺗﻜﻮﻥ ﳏﻼ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻣﻦ ﰒ ﺇﺻﺒﺎﻍ ﺍﳊﻤﺎﻳﺔ ﺍﳉﺰﺍﺋﻴﺔ ﻣﻦ ﺍﻻﻋﺘﺪﺍﺀ‬
‫ﻋﻠﻴﻬﺎ؟‬

‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺧﺼـﺎﺋﺺ ﻭﺷـﺮﻭﻁ ﺍﳌﻌـﻠﻮﻣﺔ‬

‫ﺇﻧﻪ ﺑﺎﻟﻨﻈﺮ ﺇﱃ ﺍﳌﻌﻠﻮﻣﺔ ﻛﻨﺘﺎﺝ ﻟﻠﻨﺸﺎﻁ ﺍﻟﻔﻜﺮﻱ ﺍﻹﻧﺴﺎﱐ ﻓﻘﺪ ﺫﻫﺐ ﺍﻟﻔﻘﻪ ﺍﻟﻘﺎﻧﻮﱐ ﺇﱃ ﺗﻘﺴﻴﻢ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ)‪ (1‬ﺇﱃ ﺛﻼﺙ ﻃﻮﺍﺋﻒ‪:‬‬

‫ﺍﻟﻄﺎﺋﻔﺔ ﺍﻷﻭﱃ‪ :‬ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻹﲰﻴﺔ ﻭﻫﻲ ﺑﺪﻭﺭﻫﺎ ﺗﻨﻘﺴﻢ ﺇﱃ ﳎﻤﻮﻋﺘﲔ ﻭﻫﻲ ﺍﳌﻌﻠﻮﻣﺎﺕ‬
‫ﺍﻟﺸﺨﺼﻴﺔ)‪ (2‬ﻭﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﻮﺿﻮﻋﻴﺔ‪ ،‬ﻓﺄﻣﺎ ﺍﻟﺸﺨﺼﻴﺔ ﻓﺎﳌﻘﺼﻮﺩ ‪‬ﺎ ﺗﻠﻚ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺮﺗﺒﻄﺔ ﺑﺎﻟﺸﺨﺺ‬
‫ﺍﳌﺨﺎﻃﺐ ‪‬ﺎ ﻛﺈﲰﻪ ﻭﺣﺎﻟﺘﻪ ﺍﻻﺟﺘﻤﺎﻋﻴﺔ ﻭﻣﻮﻃﻨﻪ ﻭﻛﻞ ﻣﺎ ﻳﻜﻮﻥ ﻣﺮﺗﺒﻄﺎ ﺑﺸﺨﺼﻪ‪.‬ﻭﻣﻦ ﺍﻟﻄﺒﻴﻌﻲ ﺃﻥ‬
‫ﺗﺮﺩ ﻫﺬﻩ ﺍﳌﻌﻠﻮﻣﺎﺕ ﰲ ﻏﲑ ﺣﺎﻟﺔ ﺍﻷﺷﺨﺎﺹ ﺍﻟﻄﺒﻴﻌﻴﲔ ﻋﻠﻰ ﳑﺜﻠﻲ ﺍﻟﺸﺨﺺ ﺍﳌﻌﻨﻮﻱ‪ (3)،‬ﻭﻻ ﳚﻮﺯ‬
‫ﻟﻠﻐﲑ ﺍﻹﻃﻼﻉ ﻋﻠﻴﻬﺎ ﺇﻻ ﲟﻮﺍﻓﻘﺘﻪ ﺍﻟﺸﺨﺼﻴﺔ ﺃﻭ ﺑﺄﻣﺮ ﺃﻭ ﺇﺫﻥ ﻣﻦ ﺍﻟﺴﻠﻄﺎﺕ ﺍﳌﺨﺘﺼﺔ‪.‬‬

‫)‪ (1‬ﻋﺒﺪ ﺍﷲ ﻋﻠﻲ ﳏﻤﻮﺩ‪ .‬ﺳﺮﻗﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺨﺰﻧﺔ ﰲ ﺍﳊﺎﺳﺐ ﺍﻵﱄ‪ .‬ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ‪ ،‬ﺹ ‪.159‬‬
‫)‪ (2‬ﻟﻘﺪ ﻟﻘﻴﺖ ﻣﺴﺄﻟﺔ ﲪﺎﻳﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﺸﺨﺼﻴﺔ ﰲ ﺟﻌﻞ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺇﻫﺘﻤﺎﻣﺎ ﻭﺍﺳﻌﺎ ﻋﻠﻰ ﻣﺴﺘﻮﻯ ﺍﻟﺘﻨﻈﻴﻢ ﺍﻟﺪﻭﱄ ﻭﻛﺬﺍ ﻋﻠﻰ ﻣﺴﺘﻮﻯ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ‬
‫ﺍﻟﻮﻃﻨﻴﺔ‪ ،‬ﻓﻔﻲ ﻋﺎﻡ ‪ 1968‬ﺷﻬﺪ ﻣﺆﲤﺮ ﺍﻷﻣﻢ ﺍﳌﺘﺤﺪﺓ ﳊﻘﻮﻕ ﺍﻹﻧﺴﺎﻥ ﻃﺮﺡ ﻣﻮﺿﻮﻉ ﳐﺎﻃﺮ ﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎ ﻋﻠﻰ ﺍﳊﻖ ﰲ ﺍﳋﺼﻮﺻﻴﺔ‪.‬ﻛﻤﺎ ﺃﻧﻪ ﻭﻋﻠﻰ‬
‫ﻣﺴﺘﻮﻯ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳌﻘﺎﺭﻥ ﻓﻘﺪ ﺣﺮﺹ ﺍﳌﺸﺮﻉ ﺍﻟﻔﺮﻧﺴﻲ ﻋﻠﻰ ﲪﺎﻳﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﺸﺨﺼﻴﺔ ﻭﺫﻟﻚ ﲟﻮﺟﺐ ﺍﻟﻘﺎﻧﻮﻥ ‪ 17/78‬ﺍﳌﺆﺭﺥ ﰲ ‪1978/01/06‬‬
‫ﻭﺍﳋﺎﺹ ﺑﺎﳌﻌﺎﳉﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﺍﻹﲰﻴﺔ ﻭﺇﻋﻤﺎﻻ ﻣﻨﻪ ﳍﺬﺍ ﺍﳌﺒﺪﺃ ﻭﻧﻈﺮﺍ ﳋﻄﻮﺭﺓ ﻣﺎ ﻳﺘﺮﺗﺐ ﻋﻠﻰ ﻣﻌﺎﳉﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻻﲰﻴﺔ ﻣﻦ ‪‬ﺪﻳﺪ ﳋﺼﻮﺻﻴﺎﺕ‬
‫ﺍﻷﻓﺮﺍﺩ‪ ،‬ﻓﻘﺪ ﺃﺣﺎﻟﺖ ﺍﳌﻮﺍﺩ )‪ (44-41‬ﻭﺍﳌﺎﺩﺓ ‪ 46‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪ 17/78‬ﺍﳌﺬﻛﻮﺭ ﺃﻋﻼﻩ ﺍﳌﻌﺪﻟﺔ ﺑﺎﻟﻘﺎﻧﻮﻥ ‪ 1994/1336‬ﺍﳌﺆﺭﺥ ﰲ‬
‫‪ 1992/12/16‬ﺇﱃ ﺍﳌﻮﺍﺩ ‪ 16-226‬ﺇﱃ ‪ 24-226‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﺑﺸﺄﻥ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﺗﻘﻊ ﲟﺨﺎﻟﻔﺔ ﺃﺣﻜﺎﻡ ﺍﻟﻘﺎﻧﻮﻥ ‪ 17/28‬ﺍﳌﺘﻌﻠﻖ ﲝﻤﺎﻳﺔ‬
‫ﺍﻷﻓﺮﺍﺩ ﻣﻦ ﳐﺎﻃﺮ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﺍﻻﲰﻴﺔ‪.‬‬
‫ﻭﻗﺪ ﺃﺷﺎﺭﺕ ﺍﻟﺪﺭﺍﺳﺔ ﺍﻟﺼﺎﺩﺭﺓ ﻋﻦ ﳎﻠﺲ ﺍﻟﺪﻭﻟﺔ ﺍﻟﻔﺮﻧﺴﻲ ﺣﻮﻝ ﺍﻹﻧﺘﺮﻧﺖ ﻭﺍﻟﺸﺒﻜﺎﺕ ﺍﻟﺮﻗﻤﻴﺔ ﰲ ‪ 1998/07/02‬ﺇﱃ ﺍﳌﻮﺿﻮﻋﺎﺕ ﺍﳍﺎﻣﺔ ﺍﻟﻮﺍﺟﺒﺔ‬
‫ﺍﳊﻤﺎﻳﺔ ﻭﻗﺪ ﻛﺎﻥ ﰲ ﻣﻘﺪﻣﺘﻬﺎ ﺿﺮﻭﺭﺓ ﲪﺎﻳﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﺸﺨﺼﻴﺔ ﻭﺍﳊﻴﺎﺓ ﺍﳋﺎﺻﺔ ﻋﻠﻰ ﺍﻟﺸﺒﻜﺎﺕ ﻭﺍﻟﱵ ﺗﻌﺪ ﺇﺣﺪﻯ ﺍﳌﺴﺎﺋﻞ ﺍﻷﻛﺜﺮ ﺣﺴﺎﺳﻴﺔ ﰲ ﻧﻈﺮ‬
‫ﺍﳌﺴﺘﺨﺪﻣﲔ‪ ،‬ﻭﻗﺪ ﺧﻠﺼﺖ ﺍﻟﺪﺭﺍﺳﺔ ﰲ ﺗﻮﺻﻴﺎ‪‬ﺎ ﺇﱃ ﺃﻥ ﲪﺎﻳﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﺸﺨﺼﻴﺔ ﺃﺻﺒﺤﺖ ﻣﻬﺪﺩﺓ ﺇﺯﺍﺀ ﳐﺎﻃﺮ ﺟﺪﻳﺪﺓ ﰲ ﺑﻨﻴﺔ ﺍﻟﺸﺒﻜﺎﺕ ﺍﻟﺮﻗﻤﻴﺔ‪.‬‬
‫)‪ ( 3‬ﺍﻟﺸﺤﺎﺕ ﺍﺑﺮﺍﻫﻴﻢ ﻣﻨﺼﻮﺭ‪ ،‬ﺍﳉﺮﺍﺋﻢ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﺩﺍﺭ ﺍﻟﻔﻜﺮ ﺍﳉﺎﻣﻌﻲ ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ‪ ،‬ﺹ ‪.25‬‬

‫‪- 20 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻭﺃﻣﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﻮﺿﻮﻋﻴﺔ ﻓﻬﻲ ﺗﻠﻚ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﻨﺴﻮﺑﺔ ﻟﺸﺨﺺ ﺁﺧﺮ ﻭﺗﻜﻮﻥ ﻣﻮﺟﻬﺔ ﻟﻠﻐﲑ‬
‫ﻭﻻ ﺗﺘﻌﻠﻖ ﺑﺸﺨﺺ ﺻﺎﺣﺒﻬﺎ ﻭﳝﻜﻦ ﺇﺩﻻﺀ ﺍﻟﻐﲑ ﺑﺮﺃﻳﻪ ﺍﻟﺸﺨﺼﻲ ﻓﻴﻬﺎ‪ .‬ﻭﻣﺜﺎﳍﺎ ﺍﳌﻘﺎﻻﺕ ﺍﻟﺼﺤﻔﻴﺔ‬
‫ﻭﺍﳌﻠﻔﺎﺕ ﺍﻹﺩﺍﺭﻳﺔ)‪.(1‬‬

‫ﺍﻟﻄﺎﺋﻔﺔ ﺍﻟﺜﺎﻧﻴﺔ‪ :‬ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳋﺎﺻﺔ ﺑﺎﳌﺼﻨﻔﺎﺕ ﺍﻟﻔﻜﺮﻳﺔ‪ :‬ﻭﻫﻲ ﻋﺒﺎﺭﺓ ﻋﻦ ﻣﻌﻠﻮﻣﺎﺕ ﺗﻜﻮﻥ‬
‫ﻏﺎﻟﺒﺎ ﳏﻤﻴﺔ ﺑﺘﺸﺮﻳﻌﺎﺕ ﺍﳌﻠﻜﻴﺔ ﺍﻟﻔﻜﺮﻳﺔ‪ ،‬ﻭﻳﺘﻤﺘﻊ ﺃﺻﺤﺎ‪‬ﺎ ﲝﻖ ﺍﻹﺳﺘﺌﺜﺎﺭ ‪‬ﺎ ﻭﲝﻘﻮﻕ ﻣﺎﻟﻴﺔ ﻭﺃﺩﺑﻴﺔ‬
‫ﻋﻠﻴﻬﺎ‪.‬‬

‫ﺍﻟﻄﺎﺋﻔﺔ ﺍﻟﺜﺎﻟﺜﺔ‪ :‬ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺒﺎﺣﺔ‪ :‬ﻭﻳﻘﺼﺪ ‪‬ﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﱵ ﻳﺒﺎﺡ ﻟﻠﺠﻤﻴﻊ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻬﺎ‬
‫ﺩﻭﻥ ﺇﺫﻥ‪ ،‬ﻷ‪‬ﺎ ﺑﺪﻭﻥ ﻣﺎﻟﻚ)‪ (2‬ﻭﻣﺜﺎﳍﺎ ﺗﻘﺎﺭﻳﺮ ﺍﻟﺒﻮﺭﺻﺔ ﺃﻭ ﺍﻟﻨﺸﺮﺍﺕ ﺍﳉﻮﻳﺔ‪ ،‬ﻭﺗﻨﻌﻘﺪ ﻣﻠﻜﻴﺔ ﻫﺬﻩ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ ﺇﱃ ﻣﻦ ﻗﺎﻡ ﲜﻤﻌﻬﺎ ﻭﺻﻴﺎﻏﺘﻬﺎ‪.‬‬

‫ﻭﺇﺫﺍ ﻛﺎﻥ ﺍﻟﻐﺮﺽ ﻣﻦ ﺍﻹﻋﺘﺪﺍﺀ ﻋﻠﻰ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻫﻮ ﺍﳌﻌﻠﻮﻣﺔ ﻓﻬﻞ ﻳﻨﺒﻐﻲ ﺃﻥ ﺗﻈﻬﺮ ﰲ ﺇﻃﺎﺭ‬
‫ﻣﻌﲔ ﻭﺗﺘﻤﻴﺰ ﲞﺼﺎﺋﺺ ﻣﻌﻴﻨﺔ ﺗﻜﻮﻥ ﺟﺪﻳﺮﺓ ﺑﺎﳊﻤﺎﻳﺔ؟‪.‬‬

‫ﺃﻭﻻ‪ :‬ﺍﳋﺼـﺎﺋﺺ ﺍﳌﻤـﻴﺰﺓ ﻟﻠﻤﻌـﻠﻮﻣﺎﺕ‪ :‬ﺗﺘﻤﻴﺰ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﺼﻔﺔ ﻋﺎﻣﺔ ﲟﺠﻤﻮﻋﺔ ﻣﻦ‬
‫ﺍﳋﺼﺎﺋﺺ ﺍﻟﱵ ﺗﺴﺎﻋﺪ ﻋﻠﻰ ﺍﻟﺘﻌﺮﻑ ﻋﻠﻰ ﻃﺒﻴﻌﺘﻬﺎ ﻭﺃﳘﻴﺘﻬﺎ ﻭﻋﻠﻰ ﻣﻘﺪﺍﺭ ﺍﳊﻤﺎﻳﺔ ﺍﻟﻼﺯﻣﺔ ﳍﺎ‪،‬‬
‫ﻭﺗﻨﻘﺴﻤﻬﺬﻩ ﺍﳋﺼﺎﺋﺺ ﺇﱃ ﻃﺎﺋﻔﺘﲔ‪ ،‬ﺍﻷﻭﱃ ﻭﻫﻲ ﺍﳋﺼﺎﺋﺺ ﺍﻷﺳﺎﺳﻴﺔ ﻭﺍﻟﺜﺎﻧﻴﺔ ﻫﻲ ﺍﳋﺼﺎﺋﺺ‬
‫ﺍﻟﺘﻜﻤﻴﻠﻴﺔ‪.‬‬

‫‪/1‬ﺍﳋﺼﺎﺋﺺ ﺍﻷﺳﺎﺳﻴﺔ ﺃﻭ ﺍﻷﻭﻟﻴﺔ ﻟﻠﻤﻌﻠﻮﻣـﺔ‪ :‬ﺗﺴﺘﻨﺪ ﺍﳌﻌﻠﻮﻣﺔ ﰲ ﺃﺻﻠﻬﺎ ﻋﻠﻰ ﺃﺭﺑﻊ ﺃﺭﻛﺎﻥ‬
‫ﺭﺋﻴﺴﻴﺔ ﻭﻫﻲ ﻧﻮﻉ ﺍﳌﻌﻠﻮﻣﺔ‪ ،‬ﺍﻟﺼﻮﺭﺓ ﺍﻟﱵ ﺗﻮﺟﺪ ﻋﻠﻴﻬﺎ ﺍﳌﻌﻠﻮﻣﺔ‪ ،‬ﺷﻜﻞ ﺍﳌﻌﻠﻮﻣﺔ‪ ،‬ﻭﺍﻟﻮﺳﻴﻂ ﺍﻟﺬﻱ‬
‫ﺗﻮﺟﺪ ﻋﻠﻴﻪ ﺍﳌﻌﻠﻮﻣﺔ‪.‬‬

‫ﻓﺎﳌﻌﻠﻮﻣﺎﺕ ﲣﺘﻠﻒ ﻓﻴﻤﺎ ﺑﻴﻨﻬﺎ ﻣﻦ ﺣﻴﺚ ﺍﻟﻨﻮﻉ‪ ،‬ﻭﺗﺒﻌﺎ ﻟﺬﻟﻚ ﲣﺘﻠﻒ ﺃﳘﻴﺘﻬﺎ‪ ،‬ﻓﻘﺪ ﺗﻜﻮﻥ ﺍﳌﻌﻠﻮﻣﺔ ﻧﻮﻋﺎ‬
‫) ‪(1‬‬
‫ﻣﻦ ﺍﳌﻌﺮﻓﺔ‪ ،‬ﻭﻗﺪ ﺗﻜﻮﻥ ﰲ ﺷﻜﻞ ﺭﺳﻢ ﻫﻨﺪﺳﻲ ﻭﻗﺪ ﺗﺘﺨﺬ ﺷﻜﻞ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻷﻭﺍﻣﺮ ﻭﺍﻟﺘﻌﻠﻴﻤﺎﺕ‪،‬‬

‫)‪ (1‬ﺃﲪﺪ ﺣﺴﺎﻡ ﻃﻪ ﲤﺎﻡ‪ ،‬ﺍﳉﺮﺍﺋﻢ ﺍﻟﻨﺎﺷﺌﺔ ﻋﻦ ﺍﺳﺘﺨﺪﺍﻡ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﺩﺭﺍﺳﺔ ﻣﻘﺎﺭﻧﺔ ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ‪ ،‬ﺹ ‪ 202‬ﻭﻣﺎ ﺑﻌﺪﻫﺎ‬
‫)‪ (2‬ﺧﺎﻟﺪ ﳑﺪﻭﺡ ﺍﺑﺮﺍﻫﻴﻢ‪ .‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ ‪.‬ﺹ ‪.30‬‬

‫‪- 21 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻭﻗﺪ ﺗﺘﻌﻠﻖ ﺑﺄﻣﻮﺭ ﻣﺎﻟﻴﺔ ﺃﻭ ﺑﺄﻣﻮﺭ ﺫﺍﺕ ﻃﺒﻴﻌﺔ ﻓﻨﻴﺔ ﺃﻭ ﻏﲑ ﺫﻟﻚ ﻣﻦ ﺍﻷﺷﻜﺎﻝ ﺍﻟﱵ ﻗﺪ ﺗﻮﺟﺪ ﺍﳌﻌﻠﻮﻣﺔ‬
‫ﻋﻠﻴﻬﺎ‪.‬‬

‫ﻭﻻ ﻳﻘﺘﺼﺮ ﺍﻹﺧﺘﻼﻑ ﻋﻠﻰ ﻧﻮﻉ ﺍﳌﻌﻠﻮﻣﺔ ﻓﻘﻂ ﻭﺇﳕﺎ ﳝﺘﺪ ﺃﻳﻀﺎ ﺇﱃ ﺍﻟﺼﻮﺭﺓ ﺍﻟﱵ ﺗﻮﺟﺪ ﻋﻠﻴﻬﺎ‪ ،‬ﻓﻼ‬
‫ﺗﻈﻬﺮ ﺍﳌﻌﻠﻮﻣﺎﺕ ﰲ ﺻﻮﺭﺓ ﻭﺍﺣﺪﺓ ﺑﻞ ﺗﺘﻌﺪﺩ ﺻﻮﺭﻫﺎ‪ ،‬ﻓﻘﺪ ﺗﻜﻮﻥ ﺩﺍﺧﻞ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﺃﻭ ﰲ‬
‫ﺣﺎﻟﺔ ﺣﺮﻛﺔ ﻣﻦ ﻧﻈﺎﻡ ﺇﱃ ﺁﺧﺮ‪ ،‬ﻛﻤﺎ ﺃ‪‬ﺎ ﻗﺪ ﺗﻜﻮﻥ ﻣﻘﺮﻭﺀﺓ ﺃﻭ ﻣﺴﻤﻮﻋﺔ‪ .‬ﻭﺗﺘﻮﻗﻒ ﻗﻴﻤﺔ ﺍﳌﻌﻠﻮﻣﺔ‬
‫ﻭﺍﳊﻤﺎﻳﺔ ﺍﻟﻼﺯﻣﺔ ﳍﺎ ﰲ ﻛﺜﲑ ﻣﻦ ﺍﻷﺣﻴﺎﻥ ﻋﻠﻰ ﺍﻟﺼﻮﺭﺓ ﺍﻟﱵ ﺗﻜﻮﻥ ﻋﻠﻴﻬﺎ‪.‬‬

‫ﻟﺬﻟﻚ ﺗﻘﺘﻀﻲ ﲪﺎﻳﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳊﻔﺎﻅ ﻋﻠﻴﻬﺎ ﰲ ﻛﻞ ﺻﻮﺭﺓ ﺗﻮﺟﺪ ﻋﻠﻴﻬﺎ‪ ،‬ﻭﻛﺬﺍ ﲪﺎﻳﺔ ﺍﻟﱪﺍﻣﺞ‬
‫ﺍﳌﺴﺆﻭﻟﺔ ﻋﻠﻰ ﲢﻮﻳﻞ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻣﻦ ﺻﻮﺭﺓ ﺇﱃ ﺃﺧﺮﻯ ﻛﻠﻤﺎ ﺍﻗﺘﻀﻰ ﺍﻷﻣﺮ‪ .‬ﺧﺎﺻﺔ ﺇﺫﺍ ﻛﺎﻧﺖ ﺍﳌﻌﻠﻮﻣﺔ‬
‫ﻣﺘﺤﺮﻛﺔ ﻭﺗﻨﺘﻘﻞ ﻋﱪ ﺷﺒﻜﺎﺕ ﺍﻹﺗﺼﺎﻝ‪ ،‬ﻓﻔﻲ ﺭﺣﻠﺘﻬﺎ ﻋﱪ ﺍﻟﺸﺒﻜﺎﺕ ﺗﻜﻮﻥ ﻋﺮﺿﺔ ﻟﻠﻜﺜﲑ ﻣﻦ‬
‫ﺍﳌﺨﺎﻃﺮ‪ (2)،‬ﻓﻘﺪ ﺗﺘﻐﲑ ﺍﻟﺼﻮﺭﺓ ﺍﻟﱵ ﺗﻮﺟﺪ ﻋﻠﻴﻬﺎ ﺍﳌﻌﻠﻮﻣﺔ ﺑﺴﺒﺐ ﺍﻟﺘﻼﻋﺐ ‪‬ﺎ‪ ،‬ﻓﺈﺩﺧﺎﻝ ﺃﺣﺪ ﺍﻟﱪﺍﻣﺞ‬
‫ﺍﳋﺒﻴﺜﺔ ﺇﱃ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻣﻦ ﺷﺄﻧﻪ ﺃﻥ ﻳﻐﲑ ﻣﻦ ﺻﻮﺭﺓ ﺍﳌﻌﻠﻮﻣﺔ ﻋﻠﻰ ﳓﻮ ﺳﻠﱯ ﻗﺪ ﻳﺆﺩﻱ ﺇﱃ ﲢﻮﻳﻞ‬
‫ﺍﳌﻌﻠﻮﻣﺔ ﻋﻠﻰ ﺍﻟﺸﺎﺷﺔ ﺇﱃ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﳊﺮﻭﻑ ﺍﳌﺒﻌﺜﺮﺓ‪ .‬ﻛﻤﺎ ﻗﺪ ﻳﻘﻮﻡ ﻫﺬﺍ ﺍﻟﱪﻧﺎﻣﺞ ﺍﳋﺒﻴﺚ‬
‫)ﺍﻟﻔﲑﻭﺱ( ﺑﺘﻐﻴﲑ ﺻﻮﺭﺓ ﺍﳌﻌﻠﻮﻣﺎﺕ ﰲ ﺫﺍﻛﺮﺓ ﺍﳊﺎﺳﻮﺏ ﺇﱃ ﺧﻠﻴﻂ ﻣﻦ ﺍﳊﺮﻭﻑ)‪.(3‬‬

‫‪ -‬ﺃﻣﺎ ﻋﻦ ﺷﻜﻞ ﺍﳌﻌﻠﻮﻣﺔ ﻓﻴﻘﺼﺪ ﺑﻪ ﰲ ﳎﺎﻝ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﻄﺮﻳﻘﺔ ﺍﻟﱵ ﺗﻜﺘﺴﺐ ‪‬ﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻣﻦ‬
‫ﺧﻼﻝ ﺍﳊﺎﺳﺐ ﺍﻵﱄ‪ ،‬ﻛﺄﺳﻠﻮﺏ ﻛﺘﺎﺑﺔ ﺍﻟﱪﻧﺎﻣﺞ ﻭﺍﻟﻘﻮﺍﻋﺪ ﻭﺍﻟﺮﻣﻮﺯ ﻭﺍﻟﻜﻠﻤﺎﺕ ﺍﳌﺴﺘﺨﺪﻣﺔ ﰲ ﻛﺘﺎﺑﺘﻪ‬
‫ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻟﻠﻐﻮﻳﺔ ﺍﻟﱵ ﺗﺘﻌﻠﻖ ﺑﺘﺮﺗﻴﺐ ﺍﻟﻜﻠﻤﺎﺕ ﻭﺍﻟﻌﻨﺎﺻﺮ ﺍﳌﻜﻮﻧﺔ ﻟﻠﺘﻌﻠﻴﻤﺎﺕ ﰲ ﻟﻐﺔ ﺍﻟﱪﳎﺔ‬

‫)‪ (1‬ﻳﻜﺘﺴﺐ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺃﳘﻴﺔ ﻭﻗﻴﻤﺔ ﻧﻈﺮﺍ ﻻﺳﺘﺨﺪﺍﻣﻬﺎ ﰲ ﳎﺎﻻﺕ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ ﻓﺎﳌﻌﻠﻮﻣﺔ ﰲ ﻫﺬﻩ ﺍﳊﺎﻟﺔ ﺗﺘﺨﺬ ﺷﻜﻞ ﺑﺮﺍﻣﺞ ﺍﳊﺎﺳﺐ‬
‫ﺍﻵﱄ )‪ (Software‬ﺗﻌﻄﻲ ﺍﻟﺘﻌﻠﻴﻤﺎﺕ ﺍﻟﻼﺯﻣﺔ ﻟﺘﺸﻐﻴﻞ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻭﻗﻴﺎﻣﻪ ﺑﺎﻟﻌﻤﻠﻴﺎﺕ ﺍﳌﻄﻠﻮﺑﺔ ﻣﻨﻪ‪ .‬ﻭﻣﻦ ﰒ ﻛﺎﻧﺖ ﻫﺬﻩ ﺍﻟﱪﺍﻣﺞ ﻭﺳﻴﻠﺔ ﻻﺭﺗﻜﺎﺏ‬
‫ﻛﺜﲑ ﻣﻦ ﺟﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﻻ ﳜﺘﻠﻒ ﺍﻷﻣﺮ ﺳﻮﺍﺀ ﻛﺎﻧﺖ ﻫﺬﻩ ﺍﻟﱪﺍﻣﺞ ﻣﺼﺪﺭﻳﺔ ﺃﻡ ﺑﺮﺍﻣﺞ ﻫﺪﻑ‪ .‬ﻭﳘﺎ ﻧﻮﻋﺎﻥ ﻣﻦ ﺍﻟﱪﺍﻣﺞ ﺗﺴﺘﺨﺪﻡ ﻟﺘﺸﻐﻴﻞ ﺍﳊﺎﺳﺐ‬
‫ﺍﻵﱄ‪ .‬ﻓﱪﻧﺎﻣﺞ ﺍﳌﺼﺪﺭ ﻳﻌﺘﱪ ﲟﺜﺎﺑﺔ ﻣﻌﻠﻮﻣﺎﺕ ﻣﻘﺮﻭﺀﺓ ﳌﺴﺘﻌﻤﻞ ﺍﳊﺎﺳﺐ ﺑﻴﻨﻤﺎ ﺑﺮﻧﺎﻣﺞ ﺍﳍﺪﻑ ﻳﻌﺘﱪ ﲟﺜﺎﺑﺔ ﻣﻌﻠﻮﻣﺎﺕ ﻣﻘﺮﻭﺀﺓ ﻟﻠﺤﺎﺳﺐ ﻧﻔﺴﻪ ﲤﻜﻨﻪ ﻣﻦ‬
‫ﺇﳒﺎﺯ ﺍﻟﺘﻌﻠﻴﻤﺎﺕ ﺍﳌﻮﻛﻮﻟﺔ ﻟﻪ ﻭﺫﻟﻚ ﻣﻦ ﺧﻼﻝ ﻗﻴﺎﻡ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﺑﺘﺮﲨﺔ ﺑﺮﻧﺎﻣﺞ ﺍﳌﺼﺪﺭ ﺇﱃ ﺍﻟﻠﻐﺔ ﺍﻟﱵ ﻳﻔﻬﻤﻬﺎ ﻋﻦ ﻃﺮﻳﻖ ﺍﳍﺪﻑ‪ .‬ﻭﰲ ﻛﻠﺘﺎ ﺍﳊﺎﻟﺘﲔ‬
‫ﳝﻜﻦ ﺍﻟﺘﻼﻋﺐ ﺑﺎﻟﱪﻧﺎﻣﺞ ﻭﺗﻐﻴﲑﻩ ﻭﺇﻥ ﻛﺎﻧﺖ ﻻ ﺗﻮﺟﺪ ﺻﻌﻮﺑﺔ ﻛﺒﲑﺓ ﰲ ﺍﻛﺘﺸﺎﻑ ﺍﻟﺘﻼﻋﺐ ﺍﻟﺬﻱ ﻗﺪ ﻳﻠﺤﻖ ﺑﱪﺍﻣﺞ ﺍﳌﺼﺪﺭ ﻓﻌﻠﻰ ﺍﻟﻌﻜﺲ ﻣﻦ ﺫﻟﻚ‪ ،‬ﻓﻴﻤﺎ‬
‫ﳜﺺ ﺑﺮﺍﻣﺞ ﺍﳍﺪﻑ ﺇﺫ ﻳﺼﻌﺐ ﺍﻛﺘﺸﺎﻑ ﺍﻟﺘﻼﻋﺐ ﺍﻟﺬﻱ ﻗﺪ ﻳﻠﺤﻖ ‪‬ﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﻟﱪﺍﻣﺞ ﺩﻭﻥ ﻣﻘﺎﺭﻧﺔ ﺩﻗﻴﻘﺔ ﻣﻊ ﻧﺴﺨﺔ ﺃﺧﺮﻯ ﻣﻦ ﻧﻔﺲ ﺍﻟﱪﻧﺎﻣﺞ‪.‬‬
‫)‪ (2‬ﺣﺴﻦ ﻃﺎﻫﺮ ﺩﺍﻭﻭﺩ‪ .‬ﺟﺮﺍﺋﻢ ﻧﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ .‬ﺃﻛﺎﺩﳝﻴﺔ ﻧﺎﻳﻒ ﺍﻟﻌﺮﺑﻴﺔ ﻟﻠﻌﻠﻮﻡ ﺍﻷﻣﻨﻴﺔ ﺍﻟﺮﻳﺎﺿﺎﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪ ،2000‬ﺹ ‪.174‬‬
‫)‪ (3‬ﻧﺎﺋﻠﺔ ﳏﻤﺪ ﻓﺮﻳﺪ ﻓﻮﺭﺓ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ ‪.102‬‬

‫‪- 22 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻭﻗﻮﺍﻋﺪ ﺍﻟﺘﺸﻔﲑ ﺍﻟﱵ ﲢﺪﺩ ﻃﺮﻳﻘﺔ ﲤﺜﻴﻞ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﺎﻟﺸﻔﺮﺓ ﲝﻴﺚ ﳝﻜﻦ ﻓﻚ ﻫﺬﻩ ﺍﻟﺸﻔﺮﺓ ﻓﻴﻤﺎ ﺑﻌﺪ‬
‫ﻟﻘﺮﺍﺀﺓ ﳏﺘﻮﻯ ﻫﺬﻩ ﺍﳌﻌﻠﻮﻣﺎﺕ‪.‬‬

‫ﻭﻻﺑﺪ ﺃﻥ ﳝﺘﺪ ﻧﻄﺎﻕ ﲪﺎﻳﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺇﱃ ﺍﻟﻘﻮﺍﻋﺪ ﺍﳌﺘﺼﻠﺔ ﺑﺸﻜﻠﻬﺎ ﻣﻦ ﺃﺟﻞ ﻣﻨﻊ ﺍﻟﺘﻼﻋﺐ ﺑﺎﳌﻌﻠﻮﻣﺎﺕ‬
‫ﻋﻦ ﻃﺮﻳﻖ ﺍﳌﺴﺎﺱ ‪‬ﺬﻩ ﺍﻟﻘﻮﺍﻋﺪ‪ .‬ﺫﻟﻚ ﺃﻥ ﺃﻱ ﺗﻐﻴﲑ ﳝﻜﻦ ﺃﻥ ﻳﻄﺮﺃ ﻋﻠﻰ ﺷﻜﻞ ﺍﳌﻌﻠﻮﻣﺔ ﻗﺪ ﻳﺘﺮﺗﺐ‬
‫ﻋﻠﻴﻪ ﺗﻐﲑ ﰲ ﻣﻌﻨﺎﻫﺎ ﺃﻭ ﻓﻘﺪﺍ‪‬ﺎ ﲤﺎﻣﺎ‪ .‬ﻛﺄﻥ ﻳﻘﻮﻡ ﺃﺣﺪ ﺍﻷﺷﺨﺎﺹ ﺑﺘﺸﻔﲑ ﲨﻴﻊ ﺍﻟﻨﺴﺦ ﺍﳌﺘﻌﻠﻘﺔ ﲟﻠﻒ‬
‫ﻣﻌﲔ ﰒ ﻳﻘﻮﻡ ﺑﺘﻐﻴﲑ ﻗﻮﺍﻋﺪ ﺍﻟﺘﺸﻔﲑ ﺍﳌﺴﺆﻭﻟﺔ ﻋﻦ ﻓﻚ ﺍﻟﺸﻔﺮﺓ ﻓﺘﺼﺒﺢ ﺍﳌﻌﻠﻮﻣﺔ ‪‬ﺬﺍ ﺍﻟﺸﻜﻞ ﻋﺪﳝﺔ‬
‫ﺍﻟﻘﻴﻤﺔ)‪.(1‬‬

‫)‪ (1‬ﻧﺎﺋﻠﺔ ﳏﻤﺪ ﻓﺮﻳﺪ ﻗﻮﺭﺓ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ ‪.107‬‬

‫‪- 23 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻭﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﻄﺒﻴﻌﺘﻬﺎ ﺗﺘﻄﻠﺐ ﻭﺟﻮﺩ ﻭﺳﺎﺋﻂ ﲣﺰﻥ ﻓﻴﻬﺎ ﰲ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ‪ ،‬ﻭﻻﺷﻚ ﺃﻥ ﺍﻟﺘﻼﻋﺐ‬
‫ﺍﻟﺬﻱ ﻗﺪ ﻳﻘﻊ ﻋﻠﻰ ﻫﺬﺍ ﺍﻟﻮﺳﻴﻂ ﻣﻦ ﺷﺄﻧﻪ ﺗﻌﺮﻳﺾ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻟﻠﺨﻄﺮ‪.‬‬
‫‪/2‬ﺍﳋﺼـﺎﺋـﺺ ﺍﻟﺘﻜﻤﻴﻠـﻴﺔ ﻟﻠﻤﻌﻠـﻮﻣﺎﺕ‪:‬ﺇﻧﻪ ﻟﻠﻮﻗﻮﻑ ﻋﻠﻰ ﻃﺒﻴﻌﺔ ﺍﳌﻌﻠﻮﻣﺔ ﻭﺑﺎﻟﺘﺎﱄ ﺍﻟﺘﻌﺮﻑ‬
‫ﻋﻠﻰ ﻧﻮﻉ ﺍﳊﻤﺎﻳﺔ ﺍﻟﻼﺯﻣﺔ ﳍﺎ ﻗﺪ ﻳﺘﻢ ﺍﻹﺳﺘﻌﺎﻧﺔ ﺑﺒﻌﺾ ﺍﳋﺼﺎﺋﺺ ﺍﻟﺘﻜﻤﻴﻠﻴﺔ ﻭﺍﻟﱵ ﺗﺘﻤﺜﻞ ﺃﺳﺎﺳﺎ ﰲ‬
‫ﻣﺪﻯ ﺇﺗﺎﺣﺔ ﺍﳌﻌﻠﻮﻣﺔ‪ ،‬ﻣﺪﻯ ﺃﳘﻴﺔ ﺍﳌﻌﻠﻮﻣﺔ‪ ،‬ﻣﻘﺪﺍﺭ ﻣﺎ ﺗﻌﻄﻴﻪ ﻣﻦ ﻓﺎﺋﺪﺓ‪ ،‬ﻣﻘﺪﺍﺭ ﻣﺎ ﺗﺘﻤﺘﻊ ﺑﻪ ﺍﳌﻌﻠﻮﻣﺔ ﻣﻦ‬
‫ﺻﺤﺔ ﻭﻣﺼﺪﺍﻗﻴﺔ‪ ،‬ﻣﻌﺮﻓﺔ ﻭﲢﺪﻳﺪ ﻣﺎﻟﻚ ﺍﳌﻌﻠﻮﻣﺔ ﺃﻭ ﻣﻦ ﻳﺴﻴﻄﺮ ﻋﻠﻴﻬﺎ ﻭﻛﺬﺍ ﲢﺪﻳﺪ ﺍﳌﻜﺎﻥ ﺍﻟﺬﻱ ﺗﻮﺟﺪ‬
‫ﺑﻪ ﺍﳌﻌﻠﻮﻣﺔ ﻭﻗﻴﻤﺘﻬﺎ ﻣﻦ ﺣﻴﺚ ﺍﻟﺰﻣﺎﻥ‪ ،‬ﻭﺫﻟﻚ ﻣﻦ ﺧﻼﻝ ﺍﻟﻮﻗﻮﻑ ﻋﻠﻰ ﻣﺎ ﺇﺫﺍ ﻛﺎﻥ ﻟﻠﻤﻌﻠﻮﻣﺔ ﻗﻴﻤﺔ ﰲ‬
‫ﻭﻗﺖ ﻣﻌﲔ ﺃﻡ ﺗﺘﻨﺎﻗﺺ ﻭﺗﻨﺘﻬﻲ ﺑﺎﻧﺘﻬﺎﺀ ﻫﺬﺍ ﺍﻟﺰﻣﻦ ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﻣﻌﺮﻓﺔ ﻣﻮﺿﻮﻉ ﺍﳌﻌﻠﻮﻣﺔ ﻭﺍﻷﺛﺮ ﺍﻟﺬﻱ‬
‫ﲢﺪﺛﻪ ﻋﻨﺪ ﻣﻌﺮﻓﺘﻬﺎ‪.‬‬

‫ﻭﰲ ﺍﻷﺧﲑ ﻓﺈﻥ ﻛﻞ ﻫﺬﻩ ﺍﳋﺼﺎﺋﺺ ﻭﺍﻟﺴﻤﺎﺕ ﺍﻟﱵ ﺗﺘﻤﺘﻊ ‪‬ﺎ ﺍﳌﻌﻠﻮﻣﺔ ﺳﻮﺍﺀ ﺍﻷﺳﺎﺳﻴﺔ ﺃﻭ‬
‫ﺍﻟﺘﻜﻤﻴﻠﻴﺔ ﺗﺴﺎﻋﺪ ﰲ ﺍﻟﺘﻌﺮﻑ ﻋﻠﻰ ﻃﺒﻴﻌﺔ ﺍﳌﻌﻠﻮﻣﺔ ﻭﻣﻦ ﰒ ﺗﻘﺪﻳﺮ ﻗﻴﻤﺘﻬﺎ ﺑﻐﻴﺔ ﺍﻟﻮﻗﻮﻑ ﻋﻠﻰ ﺩﺭﺟﺔ‬
‫ﺍﳊﻤﺎﻳﺔ ﺍﻟﻼﺯﻣﺔ ﳍﺎ‪.‬‬

‫ﺛﺎﻧﻴﺎ‪ :‬ﺍﻟﺸـﺮﻭﻁ ﺍﻟﻮﺍﺟﺐ ﺗﻮﺍﻓﺮﻫﺎ ﰲ ﺍﳌﻌﻠـﻮﻣﺔ‪ :‬ﻟﻜﻲ ﺗﻜﺘﺴﺐ ﺍﳌﻌﻠﻮﻣﺔ ﻗﻴﻤﺔ ﲡﻌﻠﻬﺎ ﺟﺪﻳﺮﺓ ﺑﺘﻮﻓﲑ‬
‫ﺍﳊﻤﺎﻳﺔ ﳍﺎ ﻻﺑﺪ ﺃﻥ ﺗﺴﺘﻮﰲ ﺷﺮﻭﻃﺎﹰ ﳓﺎﻭﻝ ﺃﻥ ﻧﺪﺭﺳﻬﺎ ﺑﺸﻲﺀ ﻣﻦ ﺍﻟﺘﻔﺼﻴﻞ ﻓﻴﻤﺎﻳﻠﻲ‪:‬‬

‫‪(1‬ﺇﻥ ﻳﺘﻮﺍﻓﺮ ﰲ ﺍﳌﻌﻠﻮﻣﺔ ﺍﻟﺘﺤﺪﻳﺪ ﻭﺍﻹﺑﺘﻜﺎﺭ‪ :‬ﺇﺫﺍ ﻛﺎﻧﺖ ﺍﳌﻌﻠﻮﻣﺔ ﻫﻲ ﺗﻌﺒﲑ ﻭﺻﻴﺎﻏﺔ ﳏﺪﺩﺓ‬
‫ﲡﻌﻞ ﺭﺳﺎﻟﺔ ﻣﺎ ﻗﺎﺑﻠﺔ ﻟﻠﺘﺒﻠﻴﻎ ﻭﺍﻟﺘﺒﺎﺩﻝ ﻋﻦ ﻃﺮﻳﻖ ﻋﻼﻣﺎﺕ ﺃﻭ ﺇﺷﺎﺭﺍﺕ ﳐﺘﺎﺭﺓ‪ ،‬ﻓﻴﻨﺒﻐﻲ ﺃﻥ ﺗﻜﻮﻥ ﳏﺪﺩﺓ‬
‫ﻣﻦ ﺧﻼﻝ ﺣﺼﺮﻫﺎ ﰲ ﺩﺍﺋﺮﺓ ﺧﺎﺻﺔ ‪‬ﺎ ﻭﲢﺪﻳﺪ ﺟﻮﺍﻧﺒﻬﺎ‪ ،‬ﺫﻟﻚ ﺃﻥ ﺍﳌﻌﻠﻮﻣﺔ ﺍﻟﱵ ﺗﻔﺘﻘﺮ ﻟﺼﻔﺔ ﺍﻟﺘﺤﺪﻳﺪ‬
‫ﻻ ﳝﻜﻦ ﺃﻥ ﺗﻜﻮﳕﻌﻠﻮﻣﺔ ﺣﻘﻴﻘﻴﺔ‪ ،‬ﻷﻥ ﺍﻻﻋﺘﺪﺍﺀ ﳚﺐ ﺃﻥ ﻳﻨﺼﺐ ﻋﻠﻰ ﺷﻴﺊ ﳏﺪﺩ ﻭﺃﻥ ﻳﻜﻮﻥ ﻫﺬﺍ‬
‫ﺍﻟﺸﻲﺀﳏﻼ ﳊﻖ ﳏﺪﺩ ‪.‬ﺃﻣﺎ ﺷﺮﻁ ﺍﻹﺑﺘﻜﺎﺭ ﻓﻬﻮ ﺻﻔﺔ ﺃﺳﺎﺳﻴﺔ ﰲ ﺍﳌﻌﻠﻮﻣﺔ ﺗﻨﺼﺐ ﻋﻠﻰ ﺍﻟﺮﺳﺎﻟﺔ ﺍﻟﱵ‬
‫ﲢﻤﻠﻬﺎ ﺍﳌﻌﻠﻮﻣﺔ‪ ،‬ﻓﺎﳌﻌﻠﻮﻣﺔ ﻏﲑ ﺍﳌﺒﺘﻜﺮﺓ ﻫﻲ ﻣﻌﻠﻮﻣﺔ ﻋﺎﻣﺔ ﻭﻣﺘﺎﺣﺔ ﻟﻠﺠﻤﻴﻊ ﻭﻻ ﳝﻜﻦ ﻧﺴﺒﺘﻬﺎ ﻟﺸﺨﺺ‬
‫ﳏﺪﺩ‬
‫‪(2‬ﺃﻥ ﻳﺘﻮﺍﻓﺮ ﰲ ﺍﳌﻌﻠﻮﻣﺔ ﺍﻟﺴﺮﻳﺔ ﻭﺍﻹﺳﺘﺌﺜـﺎﺭ‪ :‬ﺇﻥ ﺻﻔﺔ ﺍﻟﺴﺮﻳﺔ ﲡﻌﻞ ﻣﻦ ﺍ‪‬ﺎﻝ ﺍﻟﺬﻱ‬
‫ﺗﺘﺤﺮﻙ ﻓﻴﻪ ﺍﳌﻌﻠﻮﻣﺔ ﳏﺼﻮﺭ‪‬ﺍ ﻭﳏﺪﺩﺍ ﲟﺠﻤﻮﻋﺔ ﻣﻌﻴﻨﺔ ﻣﻦ ﺍﻷﺷﺨﺎﺹ‪ .‬ﻭﺇﺫﺍ ﺍﻧﻌﺪﻡ ﻫﺬﺍ ﺍﳊﺼﺮ ﺃﺻﺒﺤﺖ‬
‫‪- 24 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﳌﻌﻠﻮﻣﺔ ﻏﲑ ﺳﺮﻳﺔ ﻭﻗﺎﺑﻠﺔ ﺍﻟﺘﺪﺍﻭﻝ ﻭﻫﻲ ﺑﺬﻟﻚ ﲟﻨﺄﻯ ﻋﻦ ﺃﻱ ﺣﻴﺎﺯﺓ‪ ،‬ﻛﺎﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﲝﺪﺙ ﻣﻌﲔ‬
‫ﺃﻭ ﲝﻘﻴﻘﺔ ﻣﻌﻴﻨﺔ ﻓﻬﻲ ﻣﻌﻠﻮﻣﺎﺕ ﺗﻔﺘﻘﺮ ﺇﱃ ﺍﻟﺴﺮﻳﺔ ﻭﻻ ﳝﻜﻦ ﺃﻥ ﺗﻜﻮﻥ ﳏﻼ ﻳﻌﺘﺪﻯ ﻋﻠﻴﻪ‪.‬‬

‫ﻭﺗﻜﺘﺴﺐ ﺍﳌﻌﻠﻮﻣﺔ ﺳﺮﻳﺘﻬﺎ ﺑﺎﻟﻨﻈﺮ ﺇﱃ ﻃﺒﻴﻌﺘﻬﺎ ﺃﻭ ﺑﺎﻟﻨﻈﺮ ﺇﱃ ﺭﻏﺒﺔ ﺻﺎﺣﺒﻬﺎ ﺃﻭ ﻟﻸﻣﺮﻳﻦ ﻣﻌﺎ‬
‫ﻭﻻﺷﻚ ﺃﻥ ﺍﻟﻘﻴﻤﺔ ﺍﻻﻗﺘﺼﺎﺩﻳﺔ ﺗﺮﺗﺒﻂ ﺑﺎﻟﺴﺮﻳﺔ ﻷﻥ ﻗﻴﻤﺘﻬﺎ ﺗﻨﺨﻔﺾ ﻛﻠﻤﺎ ﺯﺍﺩ ﻋﺪﺩ ﺍﻟﻌﺎﺭﻓﲔ ‪‬ﺎ‪ ،‬ﻛﻤﺎ‬
‫ﺗﺮﺗﺒﻂ ﲟﺪﻯ ﺳﻬﻮﻟﺔ ﺃﻭ ﺻﻌﻮﺑﺔ ﺣﺼﻮﻝ ﺍﻟﻐﲑ ﻋﻠﻴﻬﺎ ﺑﻮﺳﺎﺋﻠﻪ ﺍﳋﺎﺻﺔ‪ ،‬ﻭﺍﻟﻄﺎﺑﻊ ﺍﻟﺴﺮﻱ ﻟﻠﻤﻌﻠﻮﻣﺔ ﳛﺪﺩ‬
‫ﻧﻄﺎﻕ ﺍﺳﺘﻌﻤﺎﳍﺎ ﰲ ﺩﺍﺋﺮﺓ ﳏﺪﺩﺓ ﻭﻳﻘﻠﻞ ﻣﻦ ﺍﺳﺘﺨﺪﺍﻡ ﺍﳌﻌﻠﻮﻣﺔ ﻭﻳﻘﺼﺮﻫﺎ ﻓﻘﻂ ﻋﻠﻰ ﺩﺍﺋﺮﺓ ﺍﳌﺆﲤﻨﲔ‬
‫ﻋﻠﻴﻬﺎ ﺍﻟﺬﻳﻦ ﳚﺪﻭﻥ ﺃﻧﻔﺴﻬﻢ ﻣﻨﺘﻔﻌﲔ ﲝﻖ ﺍﻹﺳﺘﺌﺜﺎﺭ ﻋﻠﻴﻬﺎ)‪.(1‬‬

‫ﻭﻳﺘﻮﺍﻓﺮ ﻟﻠﻤﻌﻠﻮﻣﺔ ﺻﻔﺔ ﺍﻹﺳﺘﺌﺜﺎﺭ ﺇﺫﺍ ﻛﺎﻥ ﺍﻟﻮﺻﻮﻝ ﺇﻟﻴﻬﺎ ﻏﲑ ﻣﺼﺮﺡ ﺑﻪ ﺇﻻ ﻷﺷﺨﺎﺹ ﳏﺪﺩﻳﻦ‬
‫ﻏﺎﻟﺒﺎ ﻣﺎ ﺗﻜﻮﻥ ﳌﻦ ﻟﻪ ﺳﻠﻄﺔ ﻋﻠﻰ ﺍﳌﻌﻠﻮﻣﺔ ﻭﺣﻖ ﺍﻟﺘﺼﺮﻑ ﻓﻴﻬﺎ‪ ،‬ﻭﺫﻟﻚ ﻧﺘﻴﺠﺔ ﻭﺟﻮﺩ ﻧﻮﻉ ﻣﻦ ﺍﻟﺮﺍﺑﻄﺔ‬
‫ﺗﺘﺤﻘﻖ ﻋﻨﺪﻣﺎ ﻳﻜﻮﻥ ﻣﻮﺿﻮﻉ ﻫﺬﻩ ﺍﳌﻌﻠﻮﻣﺔ ﻓﻜﺮﺓ ﺃﻭ ﻋﻤﻼ ﺫﻫﻨﻴﺎ ﻓﺘﻨﺸﺄ ﺭﺍﺑﻄﺔ ﺑﲔ ﺍﳌﻌﻠﻮﻣﺔ ﻭﻣﺆﻟﻔﻬﺎ‬
‫ﺑﺎﻋﺘﺒﺎﺭﻫﺎ ﻣﻠﻜﺎ ﺧﺎﺻﺎ ﺑﻪ‪ .‬ﻭﻗﺪ ﺗﺘﺤﻘﻖ ﺃﻳﻀﺎ ﻫﺬﻩ ﺍﻟﺮﺍﺑﻄﺔ ﺣﱴ ﻭﻟﻮ ﺍﻧﺼﺐ ﻣﻮﺿﻮﻉ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻋﻠﻰ‬
‫ﺑﻴﺎﻥ ﺣﻘﻴﻘﺔ ﺃﻭ ﻭﺍﻗﻌﺔ ﻣﺎ‪ ،‬ﻓﻬﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻫﻮ ﰲ ﺍﻷﺻﻞ ﻏﲑ ﺳﺮﻱ ﻭﻣﺘﺎﺡ ﻟﻠﺠﻤﻴﻊ‪ ،‬ﻭﻟﻜﻦ‬
‫ﺇﺫﺍ ﻗﺎﻡ ﺷﺨﺺ ﺑﺘﺠﻤﻴﻊ ﻭﺣﻔﻆ ﻫﺬﻩ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺫﺍ‪‬ﺎ ﻓﻬﻮ ﻳﻨﺸﺊ ﻋﻦ ﻃﺮﻳﻖ ﻫﺬﺍ ﺍﻟﺘﺠﻤﻴﻊ ﻭﺍﳊﻔﻆ‬
‫ﻣﻌﻠﻮﻣﺔ ﺟﺪﻳﺪﺓ ﻟﻪ ﺃﻥ ﻳﺴﺘﺄﺛﺮ ﺑﺎﻟﺘﺼﺮﻑ ﻓﻴﻬﺎ‪.‬‬
‫ﺍﳌﻄﻠﺒﺎﻟﺜﺎﱐ‪ :‬ﺗﻌﺮﻳﻒ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﺇﻥ ﺍﳉﺮﺍﺋﻢ ﺍﻟﻨﺎﺷﺌﺔ ﰲ ﺍﻟﺒﻴﺌﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺟﺮﺍﺋﻢ ﺣﺪﻳﺜﺔ‪ ،‬ﺍﺭﺗﺒﻂ ﻣﻔﻬﻮﻣﻬﺎ ﻭﻻ ﻳﺰﺍﻝ ﻳﺮﺗﺒﻂ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎ‬
‫ﺍﳊﺎﺳﺒﺎﺕ ﻭﺗﻄﻮﺭﺍ‪‬ﺎ ﺍﳌﺴﺘﺨﺪﻣﺔ ﰲ ﺗﺸﻐﻴﻞ ﻭﲣﺰﻳﻦ ﻭﻧﻘﻞ ﺍﳌﻌﻠﻮﻣﺎﺕ ﰲ ﺷﻜﻞ ﺇﻟﻜﺘﺮﻭﱐ‪ ،‬ﻭﻛﺬﺍ‬
‫ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﻭﺳﺎﺋﻞ ﺍﻹﺗﺼﺎﻝ ﻭﺷﺒﻜﺎﺕ ﺍﻟﺮﺑﻂ‪ ،‬ﻟﺬﻟﻚ ﻓﺈﻧﻪ ﻣﻦ ﺍﻟﻀﺮﻭﺭﻱ ﺃﻥ ﻳﻜﻮﻥ ﺃﻱ ﺗﻌﺮﻳﻒ‬
‫ﳍﺬﺍ ﺍﻟﻨﻤﻂ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﻣﺘﺴﻤﺎﹰ ﺑﺎﳌﺮﻭﻧﺔ ﲟﺎ ﻳﺴﻤﺢ ﺑﺎﺳﺘﻴﻌﺎﺑﻪ ﻭﺗﻮﺍﻛﺒﻪ ﻣﻊ ﺳﺎﺋﺮ ﺍﻟﺘﻘﻨﻴﺎﺕ ﺍﳌﺒﺘﻜﺮﺓ ﺍﻟﺮﺍﻫﻨﺔ‬
‫ﻭﺍﳌﺴﺘﻘﺒﻠﻴﺔ ﰲ ﳎﺎﻝ ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻊ ﺍﳌﻌﻠﻮﻣﺎﺕ‪.‬‬

‫ﻟﻜﻦ ﺍﻟﺘﻄﻮﺭ ﺍﳌﺴﺘﻤﺮ ﻭﺍﻟﻼﻣﺘﻨﺎﻫﻲ ﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﻻﺗﺼﺎﻻﺕ ﺣﺎﻝ ﺩﻭﻥ ﻭﺿﻊ ﺗﻌﺮﻳﻒ ﻓﻘﻬﻲ‬
‫ﺟﺎﻣﻊ ﻭﺷﺎﻣﻞ ﳌﻔﻬﻮﻡ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ)‪ (2‬ﺧﺸﻴﺔﹰ ﻣﻦ ﺣﺼﺮ ﻧﻄﺎﻗﻬﺎ ﺩﺍﺧﻞ ﺇﻃﺎﺭ ﲡﺮﳝﻲ ﳏﺪﺩ ﻗﺪ ﻳﻀﺮ‬

‫)‪ (1‬ﺧﺎﻟﺪ ﳑﺪﻭﺡ ﺍﺑﺮﺍﻫﻴﻢ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ ﺹ ‪.31‬‬


‫)‪ (2‬ﺧﺎﻟﺪ ﳑﺪﻭﺡ ﺍﺑﺮﺍﻫﻴﻢ‪ ،‬ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﺪﺍﺭ ﺍﳉﺎﻣﻌﻴﺔ‪ ،‬ﺹ ‪73‬‬

‫‪- 25 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫‪‬ﺎ ﺧﺎﺻﺔ ﰲ ﻇﻞ ﺍﻟﺘﻄﻮﺭ ﺍﳌﺴﺘﻤﺮ ﻟﻠﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻓﻤﺎ ﻳﺘﻢ ﲡﺮﳝﻪ ﺍﻟﻴﻮﻡ ﻗﺪ ﻳﺼﺒﺢ ﻏﲑ ﺫﻱ ﺃﳘﻴﺔ‬
‫ﺑﺎﻟﻨﺴﺒﺔ ﻟﺼﻮﺭ ﻣﺴﺘﺤﺪﺛﺔ ﺃﺧﺮﻯ ﺗﻈﻬﺮ ﻧﺘﻴﺠﺔ ﺍﺳﺘﺨﺪﺍﻡ ﺗﻘﻨﻴﺎﺕ ﺟﺪﻳﺪﺓ‪.‬‬

‫ﻭﺇﺫﺍ ﻛﺎﻥ ﺍﻟﺘﻄﻮﺭ ﺍﳌﺘﺠﺪﺩ ﻭﺍﳌﺴﺘﻤﺮ ﻟﻠﻤﻌﻠﻮﻣﺎﺗﻴﺔ ﳝﻨﻊ ﺻﻮﺭ ﺍﻟﺘﺠﺮﱘ ﺍﳊﺎﻟﻴﺔ ﻋﻦ ﻣﻮﺍﻛﺒﺔ ﻣﺎ ﻳﻄﺮﺃ‬
‫ﻣﻦ ﺻﻮﺭ ﺇﺟﺮﺍﻣﻴﺔ ﻣﺴﺘﺤﺪﺛﺔ ﰲ ﳎﺎﻝ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺇﻻ ﺃﻥ ﻭﺿﻊ ﻗﻮﺍﻋﺪ ﻗﺎﻧﻮﻧﻴﺔ ﺗﻨﻈﻢ ﺃﻭﺟﻪ ﺍﳊﻤﺎﻳﺔ‬
‫ﺍﳉﻨﺎﺋﻴﺔ ﺃﻓﻀﻞ ﺑﻜﺜﲑ ﻣﻦ ﺗﺮﻙ ﻣﺎ ﻳﺴﺘﺠﺪ ﻋﻠﻰ ﺍﻟﺴﺎﺣﺔ ﺍﳉﻨﺎﺋﻴﺔ ﺩﻭﻥ ﲪﺎﻳﺔ‪ ،‬ﻭﻫﺬﺍ ﻣﺎ ﻳﻘﻊ ﻋﻠﻰ ﻋﺎﺗﻖ‬
‫ﺍﻟﻔﻘﻪ ﺑﺪﺍﻳﺔ ﺑﻮﺿﻊ ﺗﻌﺮﻳﻒ ﳍﺬﻩ ﺍﻟﻈﺎﻫﺮﺓ ﺍﻹﺟﺮﺍﻣﻴﺔ‪،‬ﻭ ﺍﻟﺬﻱ ﻗﺪ ﻳﺴﻬﻢ ﰲ ﺻﻴﺎﻏﺔ ﺍﳌﺸﺮﻉ ﻟﻠﻨﺼﻮﺹ‬
‫ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻭﻳﺴﺎﻋﺪ ﺍﻟﻘﻀﺎﺀ ﰲ ﺗﻔﺴﲑ ﻫﺬﻩ ﺍﻟﻨﺼﻮﺹ ﻭﺗﻜﻴﻴﻒ ﺍﻟﻮﻗﺎﺋﻊ‪.‬‬

‫ﻭﻟﻘﺪ ﺫﻫﺐ ﺍﻟﻔﻘﻬﺎﺀ ﰲ ﺗﻌﺮﻳﻒ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﺬﺍﻫﺐ ﺷﱴ ﻭﻭﺻﻔﻮﺍ ﺗﻌﺮﻳﻔﺎﺕ ﳐﺘﻠﻔﺔ ﺗﺘﻤﺎﻳﺰ‬
‫ﻭﺗﺘﺒﺎﻳﻦ ﺗﺒﻌﺎ ﳌﻮﺿﻮﻉ ﺍﻟﻌﻠﻢ ﺍﳌﻨﺘﻤﻴﺔ ﺇﻟﻴﻪ ﻭﺗﺒﻌﺎ ﳌﻌﻴﺎﺭ ﺍﻟﺘﻌﺮﻳﻒ ﺫﺍﺗﻪ‪ .‬ﻓﺎﺧﺘﻠﻔﺖ ﺑﲔ ﺃﻭﻟﺌﻚ ﺍﻟﺒﺎﺣﺜﲔ ﰲ‬
‫ﺍﻟﻈﺎﻫﺮﺓ ﺍﻹﺟﺮﺍﻣﻴﺔ ﺍﻟﻨﺎﺷﺌﺔ ﻋﻦ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﺍﻟﻮﺟﻬﺔ ﺍﻟﺘﻘﻨﻴﺔ‪ ،‬ﻭﺃﻭﻟﺌﻚ ﺍﻟﺒﺎﺣﺜﲔ ﰲ ﺫﺍﺕ ﺍﻟﻈﺎﻫﺮﺓ‬
‫ﻣﻦ ﺍﻟﻮﺟﻬﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ‪ .‬ﻭﺣﱴ ﻣﻦ ﺍﻟﻮﺟﻬﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺗﻌﺪﺩﺕ ﺍﻟﺘﻌﺮﻳﻔﺎﺕ ﻭﺍﺧﺘﻠﻔﺖ ﲝﺴﺐ ﺍﻟﺪﺭﺍﺳﺔ‬
‫ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﱵ ﺗﺘﻨﺎﻭﳍﺎ‪.(2)1‬‬

‫ﻭﰲ ﺳﺒﻴﻞ ﺫﻟﻚ ﻓﺈﻥ ﺍﻟﻔﻘﻪ ﺍﳉﻨﺎﺋﻲ ﻗﺪ ﺑﺬﻝ ﳏﺎﻭﻻﺕ ﻋﺪﻳﺪﺓ ﻟﺘﻌﺮﻳﻒ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪،‬ﻭﻟﻌﻞ‬
‫ﲨﻴﻊ ﺍﶈﺎﻭﻻﺕ ﺍﻟﱵ ﺑﺬﻟﺖ ﻣﻦ ﺃﺟﻞ ﺗﻌﺮﻳﻒ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻻ ﲣﺮﺝ ﻋﻦ ﺃﺣﺪ ﺍﻹﲡﺎﻫﲔ ﺃﻭﳍﺎ‬
‫ﻳﻀﻴﻖ ﻣﻦ ﻣﻔﻬﻮﻣﻬﺎ ﻭﺍﻟﺜﺎﱐ ﻳﻮﺳﻌﻪ‪.‬‬

‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺍﻹﲡﺎﻩ ﺍﻟﺬﻱ ﻳﻀﻴﻖ ﻣﻔﻬﻮﻡ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬‬

‫ﻳﺬﻫﺐ ﺃﻧﺼﺎﺭ ﻫﺬﺍ ﺍﻻﲡﺎﻩ ﺇﱃ ﺣﺼﺮ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺍﳊﺎﻻﺕ ﺍﻟﱵ ﺗﺘﻄﻠﺐ ﻗﺪﺭﺍ ﻛﺒﲑﺍ ﻣﻦ‬
‫ﺍﳌﻌﺮﻓﺔ ﺍﻟﺘﻘﻨﻴﺔ ﰲ ﺍﺭﺗﻜﺎ‪‬ﺎ‪ ،‬ﻭﺃﻥ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﺗﻔﺘﻘﺮ ﺇﱃ ﻫﺬﻩ ﺍﻟﺪﺭﺟﺔ ﻣﻦ ﺍﳌﻌﺮﻓﺔ ﺗﻌﺪ ﺟﺮﺍﺋﻢ ﻋﺎﺩﻳﺔ‬

‫)‪(2‬ﺫﻟﻚ ﺃﻥ ﺍﳉﺮﳝﺔ ﺍﳌﺮﺗﻜﺒﺔ ﺑﻮﺍﺳﻄﺔ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺗﺪﺧﻞ ﰲ ﻧﻄﺎﻕ ﺩﺭﺍﺳﺎﺕ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﻨﺎﺋﻲ ﺍﻟﻮﻃﲏ ﻭﺍﻟﱵ ﺗﻘﻊ ﰲ ﺻﻤﻴﻢ ﺍﻟﻘﺴﻢ ﺍﳋﺎﺹ ﻟﻘﺎﻧﻮﻥ‬
‫ﺍﻟﻌﻘﻮﺑﺎﺕ‪ ،‬ﻭﺃ‪‬ﺎ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﺗﺘﺨﻄﻰ ﺣﺪﻭﺩ ﺍﻟﺪﻭﻟﺔ ﺍﻟﻮﺍﺣﺪﺓ ﻓﻬﻲ ﺗﺪﺧﻞ ﺃﻳﻀﺎ ﰲ ﻧﻄﺎﻕ ﺩﺭﺍﺳﺎﺕ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﻨﺎﺋﻲ ﺍﻟﺪﻭﱄ‪ ،‬ﻭﻧﻈﺮﺍ ﻟﻨﻤﻮ ﻭﺗﺰﺍﻳﺪ‬
‫ﺍﻟﺘﺠﺎﺭﺓ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻣﻦ ﺧﻼﻝ ﺍﳌﺒﺎﺩﻻﺕ ﻭﺍﳌﺮﺍﺳﻼﺕ ﺍﻟﺘﺠﺎﺭﻳﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻓﺈﻥ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺮﺗﻜﺒﺔ ﺑﻮﺍﺳﻄﺔ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻟﺼﻴﻘﺔ ﺍﻟﺼﻠﺔ ﺑﺎﻟﻘﺎﻧﻮﻥ‬
‫ﺍﻟﺘﺠﺎﺭﻱ ﻭﲝﺮﻛﺔ ﺍﻟﺘﺠﺎﺭﺓ ﺍﻟﻌﺎﳌﻴﺔ ﺍﳊﺪﻳﺜﺔ‪،‬ﻛﻤﺎ ﺃﻥ ﺍﻹﺳﺘﻌﻤﺎﻝ ﺍﻟﻮﺍﺳﻊ ﻟﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﰲ ﺍ‪‬ﺘﻤﻊ ﻣﻜﻨﺖ ﻣﻦ ﲣﺰﻳﻦ ﻭ ﺍﺳﺘﺮﺟﺎﻉ ﻭﲢﻠﻴﻞ ﻛﻤﻴﺎﺕ ﻫﺎﺋﻠﺔ‬
‫ﻣﻦ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻟﺸﺨﺼﻴﺔ ﻓﺨﻠﻘﺖ ﺑﺬﻟﻚ ﺳﻠﺴﻠﺔ ﻣﻦ ﺍﻟﺘﺤﺪﻳﺎﺕ ﺍﳉﺪﻳﺪﺓ ﻭ ﺍﻟﺘﻬﺪﻳﺪﺍﺕ ﺍﳋﺎﺻﺔ ﺑﺎﳊﻴﺎﺓ ﺍﻟﺸﺨﺼﻴﺔ ﻭﺃﺩﻯ ﺫﻟﻚ ﺇﱃ ﺗﺰﺍﻳﺪ ﺍﻧﺘﻬﺎﻙ ﺍﳊﻘﻮﻕ‬
‫ﺍﻷﺳﺎﺳﻴﺔ ﻭ ﺍﳊﺮﻳﺎﺕ ﺍﻟﻔﺮﺩﻳﺔ ﺍﻟﱵ ﻛﻔﻠﺘﻬﺎ ﺍﻟﻘﻮﺍﻧﲔ ﺍﻟﺪﺳﺘﻮﺭﻳﺔ ﳑﺎ ﻳﺪﻝ ﻋﻠﻰ ﺍﺭﺗﺒﺎﻁ ﺍﳌﻮﺿﻮﻉ ﺃﻳﻀﺎ ﺑﺎﻟﻘﺎﻧﻮﻥ ﺍﻟﺪﺳﺘﻮﺭﻱ ﻭﺍﺭﺗﺒﺎﻃﻪ ﰲ ﻧﻔﺲ ﺍﻟﻮﻗﺖ‬
‫ﺑﺎﻟﻘﺎﻧﻮﻥ ﺍﻹﺩﺍﺭﻱ ﺧﺎﺻﺔ ﰲ ﻇﻞ ﻇﻬﻮﺭ ﻭﺑﺮﻭﺯ ﺍﳊﻜﻮﻣﺎﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‬

‫‪- 26 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺗﺘﻜﻔﻞ ‪‬ﺎ ﺍﻟﻨﺼﻮﺹ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻟﻠﻘﻮﺍﻧﲔ ﺍﻟﻌﻘﺎﺑﻴﺔ‪ ،‬ﻭﺫﻟﻚ ﻋﻠﻰ ﺧﻼﻑ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﻳﺘﻮﺍﻓﺮ ﳍﺎ ﻫﺬﻩ‬
‫ﺍﳌﻌﺮﻓﺔ ﻓﻬﻲ ﻓﻘﻂ ﺍﻟﱵ ﺗﻜﻮﻥ ﲝﺎﺟﺔ ﺇﱃ ﻧﺼﻮﺹ ﺧﺎﺻﺔ ﺗﺘﻼﺀﻡ ﻣﻊ ﻃﺒﻴﻌﺘﻬﺎ ﺍﻟﱵ ﲣﺘﻠﻒ ﻋﻦ ﻏﲑﻫﺎ ﻣﻦ‬
‫)‪(1‬‬
‫ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ‪.‬‬

‫ﻭﻣﻦ ﺍﻟﺘﻌﺮﻳﻔﺎﺕ ﺍﻟﱵ ﻭﺿﻌﻬﺎ ﺃﻧﺼﺎﺭ ﻫﺬﺍ ﺍﻹﲡﺎﻩ ﺃﻥ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻫﻲ ﻛﻞ ﻓﻌﻞ ﻏﲑ‬
‫ﻣﺸﺮﻭﻉ ﻳﻜﻮﻥ ﺍﻟﻌﻠﻢ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ ﺑﻘﺪﺭ ﻛﺒﲑ ﻻﺯﻣﺎ ﻻﺭﺗﻜﺎﺑﻪ ﻣﻦ ﻧﺎﺣﻴﺔ ﻭﳌﻼﺣﻘﺘﻪ‬
‫ﻭﲢﻘﻴﻘﻪ ﻣﻦ ﻧﺎﺣﻴﺔ ﺃﺧﺮﻯ‪(2)،‬ﻭﰲ ﻫﺬﺍ ﺍﻹﲡﺎﻩ ﺃﻳﻀﺎ ﻋﺮﻓﻬﺎ ﺍﻟﻔﻘﻴﻪ ‪)David Thomson‬ﺩﺍﻓﻴﺪﺗﻮﻣﺴﻮﻥ(‬
‫)‪.(3‬ﺃ‪‬ﺎ ﺃﻳﺔ ﺟﺮﳝﺔ ﻳﻜﻮﻥ ﻣﺘﻄﻠﺒﺎ ﻻﻗﺘﺮﺍﻓﻬﺎ ﺃﻥ ﺗﺘﻮﺍﻓﺮ ﻟﺪﻯ ﻓﺎﻋﻠﻬﺎ ﻣﻌﺮﻓﺔ ﺑﺘﻘﻨﻴﺔ ﺍﳊﺎﺳﺐ‪.‬‬

‫ﻭﺣﺴﺐ ﻫﺬﺍ ﺍﻟﺘﻌﺮﻳﻒ ﻓﺈﻧﻪ ﻳﺸﺘﺮﻁ ﺃﻥ ﻳﻜﻮﻥ ﻣﺮﺗﻜﺐ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﺩﺭﺟﺔ ﻛﺒﲑﺓ ﻣﻦ‬
‫ﺍﻟﻌﻠﻢ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳊﺎﺳﺒﺎﺕ‪ ،‬ﻭﻫﺬﺍ ﺍﳌﻔﻬﻮﻡ ﻗﺪ ﺃﺧﺬﺕ ‪‬ﺎ ﻭﺯﺍﺭﺓ ﺍﻟﻌﺪﻝ ﺍﻷﻣﺮﻳﻜﻴﺔ ﰲ ﺗﻘﺮﻳﺮﻫﺎ ﺍﻟﺼﺎﺩﺭ‬
‫ﻋﺎﻡ ‪ 1989‬ﺑﻌﺪ ﺗﺒﻨﻴﻬﺎ ﻟﺪﺭﺍﺳﺔ ﻭﺿﻌﻬﺎ ﻣﻌﻬﺪ ﺳﺘﺎﻧﻔﻮﺭﺩ ﺍﻟﺪﻭﱄ ﻟﻸﲝﺎﺛﺤﻴﻨﻤﺎ ﻋﺮﻑ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﺑﺄ‪‬ﺎ ﺃﻳﺔ ﺟﺮﳝﺔ ﻟﻔﺎﻋﻠﻬﺎ ﻣﻌﺮﻓﺔ ﻓﻨﻴﺔ ﺑﺎﳊﺎﺳﺒﺎﺕ ﲤﻜﻨﻪ ﻣﻦ ﺍﺭﺗﻜﺎ‪‬ﺎ‪.‬‬

‫ﻭﰲ ﻫﺬﺍ ﺍﻹﲡﺎﻩ ﺃﻳﻀﺎ ﻋﺮﻓﻬﺎ ﺟﺎﻧﺐ ﻣﻦ ﺍﻟﻔﻘﻪ ﺑﺎﻟﻨﻈﺮ ﺇﱃ ﻣﻌﻴﺎﺭ ﻧﺘﻴﺠﺔ ﺍﻹﻋﺘﺪﺍﺀ‪ ،‬ﺇﺫ ﻳﺮﻯ ﺍﻷﺳﺘﺎﺫ‬
‫‪ MASS‬ﺃﻥ ﺍﳌﻘﺼﻮﺩ ﺑﺎﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻫﻲ ﺗﻠﻚ ﺍﻹﻋﺘﺪﺍﺀﺍﺕ ﺍﻟﱵ ﺗﺮﺗﻜﺐ ﺑﻮﺍﺳﻄﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﻐﺮﺽ‬
‫ﲢﻘﻴﻖ ﺭﺑﺢ ‪.‬ﻛﻤﺎ ﻋﺮﻑ ﺍﻷﺳﺘﺎﺫ ‪ PARKER‬ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﺄ‪‬ﺎ ﻛﻞ ﻓﻌﻞ ﺇﺟﺮﺍﻣﻲ ﻣﺘﻌﻤﺪ ﺃﻳﺎ‬
‫ﻛﺎﻧﺖ ﺻﻠﺘﻪ ﺑﺎﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻳﻨﺸﺄ ﻋﻨﻬﺎ ﺧﺴﺎﺭﺓ ﺗﻠﺤﻖ ﺑﺎ‪‬ﲏ ﻋﻠﻴﻪ ﺃﻭ ﻛﺴﺐ ﳛﻘﻘﻪ ﺍﻟﻔﺎﻋﻞ‪.‬‬

‫ﻭﻫﻨﺎﻙ ﺟﺎﻧﺐ ﺁﺧﺮ ﺃﺧﺬ ﰲ ﺗﻌﺮﻳﻔﻪ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﲟﻌﻴﺎﺭ ﻣﻮﺿﻮﻉ ﺍﳉﺮﳝﺔ ﻭﺫﻟﻚ ﻛﻤﺎ‬
‫ﺫﻫﺐ ﺇﻟﻴﻪ ﺍﻟﻔﻘﻴﻪ )‪ (4) (Rosenblatt‬ﻋﻠﻰ ﺃ‪‬ﺎ "ﻧﺸﺎﻁ ﻏﲑ ﻣﺸﺮﻭﻉ ﻣﻮﺟﻪ ﻟﻨﺴﺦ ﺃﻭ ﺍﻟﻮﺻﻮﻝ ﺇﱃ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺨﺰﻧﺔ ﺩﺍﺧﻞ ﺍﳊﺎﺳﻮﺏ ﺃﻭ ﺗﻐﲑﻫﺎ ﺃﻭ ﺣﺬﻓﻬﺎ"‪.‬‬

‫ﻭﺍﳌﻼﺣﻆ ﺃﻥ ﺍﻟﺘﻌﺮﻳﻔﺎﺕ ﺍﳌﺘﻘﺪﻣﺔ ﺗﻀﻴﻖ ﻋﻠﻰ ﳓﻮ ﻛﺒﲑ ﻣﻦ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺣﱴ ﺃﻥ ﺍﻟﺒﻌﺾ‬
‫ﻳﺮﻯ ﺃﻥ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﻇﻞ ﻫﺬﺍ ﺍﻻﲡﺎﻩ ﺳﻮﻑ ﺗﺼﺒﺢ ﺃﺷﺒﻪ ﺑﺎﳋﺮﺍﻓﺔ ﻓﺤﺼﺮﻫﺎ ﻣﺜﻼ ﰲ ﺍﳊﺎﻻﺕ‬

‫)‪ (1‬ﻧﺎﺋﻠﺔ ﳏﻤﺪ ﻓﺮﻳﺪ ﻗﻮﺭﺓ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ ‪.30‬‬


‫)‪ (2‬ﻧﺎﺋﻠﺔ ﳏﻤﺪ ﻓﺮﻳﺪ ﻗﻮﺭﺓ‪ .‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ ‪ .‬ﺹ ‪.28‬‬
‫)‪ (3‬ﺭﺷﻴﺪﺓ ﺑﻮﻛﺮ‪ .‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ ‪.‬ﺹ ‪.40‬‬
‫)‪ (4‬ﻼ ﻋﺒﺪ ﺍﻟﻘﺎﺩﺭ ﺍﳌﻮﻣﲏ‪ .‬ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ .‬ﺍﻟﻄﺒﻌﺔ ﺍﻟﺜﺎﻧﻴﺔ ‪. 2010‬ﺩﺍﺭ ﺍﻟﺜﻘﺎﻓﺔ ﻟﻠﻨﺸﺮ ﻭ ﺍﻟﺘﻮﺯﻳﻊ ﺹ ‪.48‬‬

‫‪- 27 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﻟﱵ ﺗﺘﻄﻠﺐ ﺃﻥ ﻳﻜﻮﻥ ﻣﻘﺘﺮﻑ ﻫﺬﻩ ﺍﳉﺮﳝﺔ ﻣﺘﻤﺘﻌﺎ ﺑﻘﺪﺭ ﻛﺒﲑ ﻣﻦ ﺍﳌﻌﺮﻓﺔ ﺍﻟﺘﻘﻨﻴﺔ ﻻﺭﺗﻜﺎ‪‬ﺎ ﻭﻫﻮ ﺇﻥ‬
‫ﲢﻘﻖ ﰲ ﺑﻌﺾ ﺍﻷﺣﻮﺍﻝ ﻓﻘﺪ ﻻ ﻳﺘﻮﻓﺮ ﰲ ﻛﺜﲑ ﻣﻨﻬﺎ‪ ،‬ﺇﺫ ﻗﺪ ﻳﺮﺗﻜﺐ ﺍﻟﻔﻌﻞ ﻏﲑ ﺍﳌﺸﺮﻭﻉ ﰲ ﺍﻟﺒﻴﺌﺔ‬
‫ﺍﻟﺮﻗﻤﻴﺔ ﺩﻭﻥ ﺃﻥ ﻳﻜﻮﻥ ﻓﺎﻋﻠﻪ ﲝﺎﺟﺔ ﺇﱃ ﻫﺬﺍ ﺍﻟﻘﺪﺭ ﻣﻦ ﺍﳌﻌﺮﻓﺔ‪ ،‬ﻭﺭﻏﻢ ﺫﻟﻚ ﻓﺈﻧﻪ ﻻ ﳝﻜﻦ ﺇﻧﻜﺎﺭ ﺃﻥ‬
‫ﻫﺬﻩ ﺍﻷﻓﻌﺎﻝ ﺗﺪﺧﻞ ﰲ ﻋﺪﺍﺩ ﺟﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ .‬ﻓﺎﻟﻘﻴﺎﻡ ﻣﺜﻼ ﺑﺈﺗﻼﻑ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﳌﺨﺰﻧﺔ ﺩﺍﺧﻞ ﻧﻈﺎﻡ‬
‫ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﻻ ﻳﺘﻄﻠﺐ ﻣﻦ ﻓﺎﻋﻠﻪ ﻗﺪﺭ‪‬ﺍ ﻛﺒﲑﺍ ﻣﻦ ﺍﻟﻌﻠﻢ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ‪ ،‬ﻭﻋﻠﻰ ﺍﻟﺮﻏﻢ ﻣﻦ‬
‫ﺫﻟﻚ ﻓﻘﺪ ﺟﺮﻣﺘﻪ ﺍﻟﻜﺜﲑ ﻣﻦ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻟﻌﻘﺎﺑﻴﺔ‪.‬‬

‫ﻟﺬﻟﻚ ﻓﺎﻧﻪ ﻳﺆﺧﺬ ﻋﻠﻰ ﻫﺬﻩ ﺍﻟﺘﻌﺮﻳﻔﺎﺕ ﺍﻟﺴﺎﺑﻘﺔ ﺃ‪‬ﺎ ﺟﺎﺀﺕ ﻗﺎﺻﺮﺓ ﻋﻦ ﺍﻹﺣﺎﻃﺔ ﺑﺄﻭﺟﻪ ﻇﺎﻫﺮﺓ‬
‫ﺍﻹﺟﺮﺍﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‪ ،‬ﻓﺎﻟﺒﻌﺾ ﻣﻦ ﻓﻘﻬﺎﺀ ﻫﺬﺍ ﺍﻹﲡﺎﻩ ﺭﻛﺰ ﻋﻠﻰ ﻣﻌﻴﺎﺭ ﻣﻮﺿﻮﻉ ﺍﳉﺮﳝﺔ ﻭ ﺍﻟﺒﻌﺾ ﺍﻵﺧﺮ‬
‫ﺭﻛﺰ ﻋﻠﻰ ﻭﺳﻴﻠﺔ ﺍﺭﺗﻜﺎ‪‬ﺎ ﻭ ﺍﻟﺒﻌﺾ ﺍﻵﺧﺮ ﺭﻛﺰ ﻋﻠﻰ ﻣﻌﻴﺎﺭ ﺍﻟﻨﺘﻴﺠﺔ ‪.‬‬

‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺍﻹﲡـﺎﻩ ﺍﳌﻮﺳﻊ ﳌﻔﻬﻮﻡ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬

‫ﺇﺯﺍﺀ ﺍﻹﻧﺘﻘﺎﺩﺍﺕ ﺍﻟﱵ ﻭﺟﻬﺖ ﻟﻺﲡﺎﻩ ﺍﻷﻭﻝ ﺣﺎﻭﻝ ﺑﻌﺾ ﺍﻟﻔﻘﻪ ﺗﻌﺮﻳﻒ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ‬
‫ﳓﻮ ﻭﺍﺳﻊ ﻟﺘﻔﺎﺩﻱ ﺃﻭﺟﻪ ﺍﻟﻘﺼﻮﺭ ﺍﻟﱵ ﺷﺎﺑﺖ ﺗﻌﺮﻳﻔﺎﺕ ﺍﻹﲡﺎﻩ ﺍﳌﻀﻴﻖ ﰲ ﺍﻟﺘﺼﺪﻱ ﻟﻈﺎﻫﺮﺓ ﺍﻹﺟﺮﺍﻡ‬
‫ﺍﳌﻌﻠﻮﻣﺎﰐ‪.‬‬

‫ﻓﻌﻠﻰ ﻋﻜﺲﹴ ﻣﻦ ﺍﻹﲡﺎﻩ ﺍﻟﺴﺎﺑﻖ ﻓﺈﻥ ﺃﻧﺼﺎﺭ ﻫﺬﺍ ﺍﻹﲡﺎﻩ ﻳﺬﻫﺒﻮﻥ ﺇﱃ ﺍﻟﺘﻮﺳﻴﻊ ﻣﻦ ﻣﻔﻬﻮﻡ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﺎﻋﺘﺒﺎﺭ ﺃﻥ ﳎﺮﺩ ﻣﺸﺎﺭﻛﺔ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﰲ ﺍﻟﻨﺸﺎﻁ ﺍﻹﺟﺮﺍﻣﻲ ﻳﺼﺒﻎ ﻋﻠﻴﻪ ﻭﺻﻒ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ .‬ﻭﻗﺪ ﺗﺒﺎﻳﻨﺖ ﻣﻮﺍﻗﻒ ﺃﻧﺼﺎﺭ ﻫﺬﺍ ﺍﻹﲡﺎﻩ ﰲ ﺗﻌﺮﻳﻒ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﲝﺴﺐ ﺍﳌﻌﺎﻳﲑ ﺍﻟﱵ‬
‫ﺍﻋﺘﻤﺪ ﻋﻠﻴﻬﺎ ﻛﻞ ﻓﺮﻳﻖ ﰲ ﺗﻌﺮﻳﻒ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﺗﺘﺒﺎﻳﻦ ﻣﻮﺍﻗﻒ ﺍﻟﻔﻘﻬﺎﺀ ﺃﻧﺼﺎﺭ ﻫﺬﺍ ﺍﻻﲡﺎﻩ‬
‫ﺣﺴﺐ ﻧﻈﺮ‪‬ﻢ ﺇﱃ ﺍﻟﺪﺭﺟﺔ ﺍﻟﱵ ﳝﻜﻦ ﺃﻥ ﲤﺘﺪ ﺇﻟﻴﻬﺎ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪،‬ﻓﻴﺬﻫﺐ ﻓﺮﻳﻖ ﻣﻦ ﺍﻟﻔﻘﻬﺎﺀ ﺇﱃ‬
‫ﺗﻌﺮﻳﻔﺎﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﺄ‪‬ﺎ ﻛﻞ ﺳﻠﻮﻙ ﺇﺟﺮﺍﻣﻲ ﻳﺘﻢ ﲟﺴﺎﻋﺪﺓ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻭﻓﺮﻳﻖ ﺁﺧﺮ ﻳﻌﺘﱪﻫﺎ ﺃ‪‬ﺎ‬
‫ﻛﻞ ﺟﺮﳝﺔ ﺗﺘﻢ ﰲ ﳏﻴﻂ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ‪ ،‬ﻭﻣﻦ ﻫﺬﻩ ﺍﻟﺘﻌﺮﻳﻔﺎﺕ ﻣﺎ ﺟﺎﺀ ﺑﻪ ﺍﻟﻔﻘﻴﻪ )‪ (MERWE‬ﺍﻟﺬﻱ‬
‫ﻳﺮﻯ ﺃﻥ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﺘﻤﺜﻞ ﰲ ﺍﻟﻔﻌﻞ ﻏﲑ ﺍﳌﺸﺮﻭﻉ ﺍﻟﺬﻱ ﻳﺘﻮﺭﻁ ﰲ ﺍﺭﺗﻜﺎﺑﻪ ﺍﳊﺎﺳﺐ ﺍﻵﱄ)‪.(1‬‬

‫)‪ (1‬ﳏﻤﺪ ﺃﻣﲔ ﺍﻟﺸﻮﺍﺑﻜﺔ‪ .‬ﺟﺮﺍﺋﻢ ﺍﳊﺎﺳﻮﺏ ﻭ ﺍﻷﻧﺘﺮﻧﺎﺕ )ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ( ﺩﺍﺭ ﺍﻟﺜﻘﺎﻓﺔ ﻟﻠﻨﺸﺮ ﻭ ﺍﻟﺘﻮﺯﻳﻊ ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪ 2009‬ﺹ ‪.8‬‬

‫‪- 28 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻛﻤﺎ ﺫﻫﺐ ﺍﻟﺒﻌﺾ ﺇﱃ ﺍﻟﻘﻮﻝ ﺑﺄﻥ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻫﻲ ﻛﻞ ﻋﻤﻞ ﺃﻭ ﺍﻣﺘﻨﺎﻉ ﻳﺄﺗﻴﻪ ﺍﻹﻧﺴﺎﻥ‬
‫ﺇﺿﺮﺍﺭﺍ ﲟﻜﻮﻧﺎﺕ ﺍﳊﺎﺳﺐ ﺍﳌﺎﺩﻳﺔ ﻭﺍﳌﻌﻨﻮﻳﺔ ﻭﺷﺒﻜﺎﺕ ﺍﻹﺗﺼﺎﻝ ﺍﳋﺎﺻﺔ ﺑﻪ ﺑﺎﻋﺘﺒﺎﺭﻫﺎ ﻣﻦ ﺍﳌﺼﺎﱀ ﻭﺍﻟﻘﻴﻢ‬
‫ﺍﳌﺘﻄﻮﺭﺓ ﺍﻟﱵ ﲤﺘﺪ ﻣﻈﻠﺔ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﳊﻤﺎﻳﺘﻬﺎ‪.‬‬

‫‪Michel‬ﺃﻥ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﺴﻬﻞ ﺍﺳﺘﺨﺪﺍﻡ‬ ‫‪et credo‬‬ ‫ﻭﰲ ﺫﺍﺕ ﺍﻹﲡﺎﻩ ﻳﺮﻯ ﻛﻞ ﻣﻦ‬
‫ﺍﳊﺎﺳﺐ ﻛﺄﺩﺍﺓ ﻻﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺍﳊﺎﻻﺕ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﻟﻮﻟﻮﺝ ﻏﲑ ﺍﳌﺼﺮﺡ ﺑﻪ ﳊﺎﺳﻮﺏ‬
‫ﺍ‪‬ﲏ ﻋﻠﻴﻪ ﺃﻭ ﺑﻴﺎﻧﺎﺗﻪ‪ ،‬ﻛﻤﺎ ﲤﺘﺪ ﻟﺘﺸﻤﻞ ﺍﻹﻋﺘﺪﺍﺀﺍﺕ ﺍﳌﺎﺩﻳﺔ ﺳﻮﺍﺀ ﻋﻠﻰ ﺟﻬﺎﺯ ﺍﳊﺎﺳﺐ ﺫﺍﺗﻪ ﺃﻭ ﺍﳌﻌﺪﺍﺕ‬
‫ﺍﳌﺘﺼﻠﺔ ﺑﻪ)‪.(1‬‬

‫ﻭﰲ ﻫﺬﺍ ﺍﻻﲡﺎﻩ ﺃﻳﻀﺎ ﻋﺮﻓﻬﺎ ﻣﻜﺘﺐ ﺗﻘﻴﻴﻢ ﺍﻟﻘﻨﻴﺔ ﺑﺎﻟﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ ﺍﻷﻣﺮﻳﻜﻴﺔ ﺑﺄ‪‬ﺎ ﺍﳉﺮﳝﺔ ﺍﻟﱵ‬
‫ﺗﻠﻌﺐ ﻓﻴﻬﺎ ﺑﻴﺎﻧﺎﺕ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﻭﺍﻟﱪﺍﻣﺞ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺩﻭﺭﺍ ﺭﺋﻴﺴﻴﺎ)‪.(2‬‬

‫ﻭﻫﻨﺎﻙ ﺍﲡﺎﻩ ﻓﻘﻬﻲ ﺁﺧﺮ ﻋﺮﻓﻬﺎ ﺑﺎﻟﻘﻮﻝ ﺃﻥ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻛﻞ ﺳﻠﻮﻙ ﻏﲑ ﻣﺸﺮﻭﻉ ﻭﻏﲑ‬
‫ﺃﺧﻼﻗﻲ ﺃﻭ ﻏﲑ ﻣﺼﺮﺡ ﺑﻪ ﻳﺘﻌﻠﻖ ﺑﺎﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﺒﻴﺎﻧﺎﺕ ﺃﻭ ﻧﻘﻠﻬﺎ)‪.(3‬‬

‫ﻛﻤﺎ ﻋﺮﻓﻬﺎ ﺍﻟﻔﻘﻴﻬﲔ)‪ (Richardtotty‬ﻭ )‪(Anthony Hardcastle‬ﻋﻠﻰ ﺃ‪‬ﺎ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﻳﻜﻮﻥ‬
‫ﻟﻠﺤﺎﺳﺐ ﻓﻴﻬﺎ ﺩﻭﺭﺍ ﺇﳚﺎﺑﻴﺎ ﺃﻛﺜﺮ ﻣﻨﻪ ﺳﻠﺒﻴﺎ)‪.(4‬‬

‫ﻭﻻﺷﻚ ﺃﻥ ﺍﻻﲡﺎﻩ ﺍﳌﺘﻘﺪﻡ ﻳﻨﻄﻮﻱ ﻋﻠﻰ ﺗﻮﺳﻴﻊ ﻛﺒﲑ ﳌﻔﻬﻮﻡ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺇﺫ ﻳﺆﺧﺬ ﻋﻠﻴﻪ‬
‫ﻫﺬﺍ ﺍﻟﺘﻮﺳﻊ ﺍﻟﺬﻱ ﻣﻦ ﺷﺄﻧﻪ ﺃﻥ ﻳﺼﺒﻎ ﻭﺻﻒ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﺃﻓﻌﺎﻝ ﻗﺪ ﻻ ﺗﻜﻮﻥ ﻛﺬﻟﻚ‬
‫‪‬ﺮﺩ ﻣﺸﺎﺭﻛﺔ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﰲ ﺍﻟﻨﺸﺎﻁ ﺍﻹﺟﺮﺍﻣﻲ‪ ،‬ﻭﻻ ﳝﻜﻦ ﺍﻟﻘﺒﻮﻝ ‪‬ﺬﺍ ﺍﻟﺘﻮﺟﻪ ﻓﻘﺪ ﻻ ﻳﻌﺪﻭ ﺃﻥ‬
‫ﻳﻜﻮﻥ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﳏﻼ ﺗﻘﻠﻴﺪﻳﺎ ﰲ ﺑﻌﺾ ﺍﳉﺮﺍﺋﻢ ﻛﺴﺮﻗﺔ ﺍﳊﺎﺳﺐ ﺫﺍﺗﻪ ﺃﻭ ﺍﻷﻗﺮﺍﺹ ﺃﻭ‬

‫)‪ (1‬ﻫﻼﱄ ﻋﺒﺪ ﺍﻹﻟﻪ ﺃﲪﺪ‪ ،‬ﺇﻟﺘﺰﺍﻡ ﺍﻟﺸﺎﻫﺪ ﺑﺎﻹﻋﻼﻡ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ )ﺩﺭﺍﺳﺔ ﻣﻘﺎﺭﻧﺔ( ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ‪ ،‬ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ‪ ،2000 ،‬ﺹ ‪.14‬‬
‫)‪(2‬ﺧﺎﻟﺪ ﻋﺒﺎﺩ ﺍﳊﻠﱯ‪ .‬ﺇﺟﺮﺍﺀﺍﺕ ﺍﻟﺘﺤﺮﻱ ﻭﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺟﺮﺍﺋﻢ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻷﻧﺘﺮﻧﺎﺕ ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ‪ ،‬ﺩﺍﺭ ﺍﻟﺜﻘﺎﻓﺔ ‪ ،2001‬ﺹ ‪.30‬‬
‫)‪ (3‬ﻭﺿﻊ ﻫﺬﺍ ﺍﻟﺘﻌﺮﻳﻒ ﻣﻦ ﻃﺮﻑ ﳎﻤﻮﻋﺔ ﻣﻦ ﺧﱪﺍﺀ ﻣﻨﻈﻤﺔ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻻﻗﺘﺼﺎﺩﻱ ﻭﺍﻟﺘﻨﻤﻴﺔ ﰲ ﺍﺟﺘﻤﺎﻋﻬﺎ ﺍﳌﻨﻌﻘﺪ ﰲ ﺑﺎﺭﻳﺲ ﻋﺎﻡ ‪ 1983‬ﺿﻤﻦ ﺣﻠﻘﺔ‬
‫ﺍﻹﺟﺮﺍﻡ ﺍﳌﺮﺗﺒﻂ ﺑﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ‪.‬‬
‫)‪ (4‬ﳏﻤﺪ ﺳﺎﻣﻲ ﺍﻟﺸﻮﺍ‪ ،‬ﺛﻮﺭﺓ ﺍﳌﻌﻠﻮﻣﺖ ﻭﺍﻧﻌﻜﺎﺳﺎ‪‬ﺎ ﻋﻠﻰ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ‪ .‬ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ ‪ ،1994‬ﺹ‪.6‬‬

‫‪- 29 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﻷﺳﻄﻮﺍﻧﺎﺕ ﺍﳌﻐﻨﻄﺔ ﻣﺜﻼ‪ ،‬ﻓﻼ ﳝﻜﻦ ﺇﻋﻄﺎﺀ ﻭﺻﻒ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﺳﻠﻮﻙ ﺍﻟﻔﺎﻋﻞ ‪‬ﺮﺩ ﺃﻥ‬
‫ﺍﳊﺎﺳﺐ ﺃﻭ ﺇﺣﺪﻯ ﻣﻜﻮﻧﺎﺗﻪ ﺍﳌﺎﺩﻳﺔ ﻛﺎﻧﺖ ﳏﻼ ﻟﻔﻌﻞ ﺍﻻﺧﺘﻼﺱ)‪.(1‬‬

‫ﻭﱂ ﻳﺴﻠﻢ ﻫﺬﺍ ﺍﻻﲡﺎﻩ ﻣﻦ ﺳﻬﺎﻡ ﺍﻟﻨﻘﺪ ﺃﻳﻀﺎ ﺣﲔ ﻭﺳﻊ ﻣﻦ ﻧﻄﺎﻕ ﻫﺬﻩ ﺍﳉﺮﳝﺔ ﺇﱃ ﺩﺭﺟﺔ‬
‫ﺍﻟﺘﺴﻮﻳﺔ ﺑﲔ ﺍﻟﺴﻠﻮﻙ ﻏﲑ ﺍﳌﺸﺮﻭﻉ ﻗﺎﻧﻮﻧﺎ ﻭﺍﻟﺴﻠﻮﻙ ﺍﻟﺬﻱ ﻳﺴﺘﺤﻖ ﺍﻟﻠﻮﻡ ﺃﺧﻼﻗﻴﺎ ﻭﺍﺳﺘﻬﺠﺎﻥ ﺍﻟﻜﺎﻓﺔ ﻟﻪ‪،‬‬
‫ﺫﻟﻚ ﺃﻧﻪ ﻟﻴﺲ‬ ‫‪،OECD‬‬ ‫ﻛﻤﺎ ﰲ ﺍﻟﺘﻌﺮﻳﻒ ﺍﻟﺬﻱ ﺃﻭﺭﺩﻩ ﺧﱪﺍﺀ ﻣﻨﻈﻤﺔ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻻﻗﺘﺼﺎﺩﻱ ﻭﺍﻟﺘﻨﻤﻴﺔ‬
‫ﺑﺎﻟﻀﺮﻭﺭﺓ ﺃﻥ ﻳﻜﻮﻥ ﺍﻹﳓﺮﺍﻑ ﻋﻦ ﺍﻷﺧﻼﻕ ﻭﺍﻟﺴﻠﻮﻙ ﺍﳌﺆﰒ ﻣﻌﺎﻗﺐ ﻋﻠﻴﻪ ﻗﺎﻧﻮﻧﺎ)‪.(2‬‬

‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﻟﺚ‪ :‬ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﳋﺎﺻﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬

‫ﺗﻌﺪ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺇﻓﺮﺍﺯ‪‬ﺍ ﻭﻧﺘﺎﺟﺎ ﻟﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ (3)،‬ﻓﻬﻲ ﺗﺮﺗﺒﻂ ﻭﺗﻘﻮﻡ ﻋﻠﻴﻬﺎ‪ .‬ﻭﻫﺬﺍ ﻣﺎ‬
‫ﺃﻛﺴﺒﻬﺎ ﻟﻮﻧﺎ ﻭﻃﺎﺑﻌﺎ ﻗﺎﻧﻮﻧﻴﺎ ﺧﺎﺻﺎ ﳝﻴﺰﻫﺎ ﻋﻦ ﻏﲑﻫﺎ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ‪.‬‬

‫ﻭﺍﻟﺴﻴﺎﺳﻴﺔ ﺍﳉﻨﺎﺋﻴﺔ ﺍﳊﺪﻳﺜﺔ ﺗﺴﺘﺪﻋﻲ ﻣﻨﺎ ﳏﺎﻭﻟﺔ ﺣﺼﺮ ﺍﳋﺼﺎﺋﺺ ﺍﳌﻤﻴﺰﺓ ﻟﻠﺠﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻦ‬
‫ﻏﲑﻫﺎ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‪ ،‬ﻭﺫﻟﻚ ﻣﻦ ﺃﺟﻞ ﳏﺎﻭﻟﺔ ﻭﺿﻊ ﺍﻟﻨﺼﻮﺻﺎﳌﻼﺋﻤﺔ ﳌﻜﺎﻓﺤﺔ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﳌﺴﺘﺤﺪﺛﺔ ﻭﺍﻟﱵ ﺭﺍﻓﻘﺖ ﺍﻟﺘﻄﻮﺭ ﺍﻟﺘﻘﲏ ﻭﺍﳌﻌﺮﰲ ﺍﻟﺬﻱ ﳝﺮ ﺑﻪ ﻋﺎﳌﻨﺎ‪.‬‬

‫ﻓﺈﺫﺍ ﻛﺎﻧﺖ ﺍﳉﺮﳝﺔ ﺑﺼﻔﺔ ﻋﺎﻣﺔ ﳏﻞ ﺗﻄﺒﻴﻖ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﻨﺎﺋﻲ‪ ،‬ﻓﺈﻧﻪ ﻭﺑﺎﻟﻨﻈﺮ ﺇﱃ ﺍﻟﻄﺒﻴﻌﺔ ﺍﳌﺘﻤﻴﺰﺓ‬
‫) ‪(4‬‬
‫ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻓﺈ‪‬ﺎ ﺗﺘﻌﻠﻖ ﻏﺎﻟﺒﺎ ﲟﺎ ﻳﺴﻤﻰ ﺑﺎﻟﻘﺎﻧﻮﻥ ﺍﳉﻨﺎﺋﻲ ﺍﳌﻌﻠﻮﻣﺎﰐ‪.‬‬

‫ﻭﻗﺪ ﺃﺿﻔﺖ ﻫﺬﻩ ﺍﳊﻘﻴﻘﺔ ﻋﻠﻰ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﻃﺒﻴﻌﺔ ﻗﺎﻧﻮﻧﻴﺔ ﺧﺎﺻﺔ‪ ،‬ﺳﻮﺍﺀ ﺗﻌﻠﻘﺖ‬
‫ﺑﺬﺍﺗﻴﺔ ﻫﺬﻩ ﺍﳉﺮﳝﺔ ﺃﻭ ﺗﻌﻠﻘﺖ ﲞﺼﻮﺻﻴﺔ ﺍﶈﻞ ﺍﻟﺬﻱ ﻳﻘﻊ ﻋﻠﻴﻪ ﺍﻹﻋﺘﺪﺍﺀ ﰲ ﺍﺭﺗﻜﺎﺏ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ‪.‬‬

‫)‪ (1‬ﻧﺎﺋﻠﺔ ﳏﻤﺪ ﻓﺮﻳﺪ ﻗﻮﺭﺓ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ ‪.31‬‬


‫)‪(2‬ﻋﺎﺩﻝ ﻳﻮﺳﻒ ﻋﺒﺪ ﺍﻟﻨﱯ ﺍﻟﺸﻜﺮﻱ‪ .‬ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺃﺯﻣﺔ ﺍﻟﺸﺮﻋﻴﺔ‪ ،‬ﺩﺭﺍﺳﺎﺕ ﺍﻟﻜﻮﻓﺔ ﺍﻟﻌﺪﺩ ﺍﻟﺴﺎﺑﻊ‪ ،‬ﺹ ‪.112‬‬
‫)‪ (3‬ﴰﺲ ﺍﻟﺪﻳﻦ ﺍﺑﺮﺍﻫﻴﻢ ﺃﲪﺪ‪ ،‬ﻭﺳﺎﺋﻞ ﻣﻮﺍﺟﻬﺔ ﺍﻹﻋﺘﺪﺍﺕ ﻋﻠﻰ ﺍﳊﻴﺎﺓ ﺍﻟﺸﺨﺼﻴﺔ ﰲ ﳎﺎﻝ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﺴﻮﺩﺍﱐ ﻭﺍﳌﺼﺮﻱ‪-‬ﺩﺭﺍﺳﺔ‬
‫ﻣﻘﺎﺭﻧﺔ‪ -‬ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ ﺍﻟﻄﺒﻌﺔ ﺍﻻﻭﱃ ﺍﻟﻘﺎﻫﺮﺓ ‪ 2005‬ﺹ ‪.100‬‬
‫)‪ (4‬ﺃﻧﻈﺮ ﰲ ﻫﺬﺍ ﺍﳌﻌﲎ ﳏﻤﺪ ﻋﻠﻲ ﺍﻟﻌﺮﻳﺎﻥ –ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ -‬ﺩﺍﺭ ﺍﳉﺎﻣﻌﺔ ﺍﳉﺪﻳﺪﺓ ﻟﻠﻨﺸﺮ‪ .‬ﺹ ‪.47‬‬

‫‪- 30 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺧﺼﺎﺋﺺ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬

‫ﺇﻥ ﻣﺎ ﻧﻘﺼﺪ ﺑﻪ ﻣﻦ ﺫﺍﺗﻴﺔ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻫﻮ ﺍﺳﺘﻘﻼﻟﻴﺘﻬﺎ ﻭﲤﻴﺰﻫﺎ ﻋﻦ ﻏﲑﻫﺎ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‬


‫ﺳﻴﻤﺎ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻣﻨﻬﺎ‪ ،‬ﻭﺫﻟﻚ ﲟﺠﻤﻮﻋﺔ ﻣﻦ ﺍﳋﺼﺎﺋﺺ ﺃﺛﺮﺕ ﺑﺸﻜﻞ ﻣﺒﺎﺷﺮ ﻋﻠﻰ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻟﻌﻘﺎﺑﻴﺔ‬
‫ﻭﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﺍﻟﻘﺎﺋﻤﺔ‪ ،‬ﻭﺳﻮﻑ ﳓﺎﻭﻝ ﺃﻥ ﻧﱪﺯ ﺃﻫﻢ ﻫﺬﻩ ﺍﳋﺼﺎﺋﺺ ﻓﻴﻤﺎ ﻳﻠﻲ‪:‬‬

‫ﺃﻭﻻ‪ :‬ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﺘﻌﺪﻳﺔ ﻟﻠﺤﺪﻭﺩ )ﻋﺎﺑﺮﺓ ﻟﻠﻮﻃﻨﻴﺔ(‪ :‬ﺇﻧﻪ ﻭﺑﻌﺪ ﻇﻬﻮﺭ ﺷﺒﻜﺎﺕ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ ﱂ ﻳﻌﺪ ﻫﻨﺎﻙ ﺣﺪﻭﺩ ﻣﺮﺋﻴﺔ ﺃﻭ ﻣﻠﻤﻮﺳﺔ ﺗﻘﻒ ﺃﻣﺎﻡ ﻧﻘﻞ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻋﱪ ﺍﻟﺪﻭﻝ ﺍﳌﺨﺘﻠﻔﺔ‪،‬‬
‫ﻓﺎﻟﻘﺪﺭﺓ ﺍﻟﱵ ﺗﺘﻤﺘﻊ ‪‬ﺎ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ ﰲ ﻧﻘﻞ ﻭﺗﺒﺎﺩﻝ ﻛﻤﻴﺎﺕ ﻛﺒﲑﺓ ﻣﻦ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﲔ ﺃﻧﻈﻤﺔ‬
‫ﻳﻔﺼﻞ ﺑﻴﻨﻬﺎ ﺁﻻﻑ ﺍﻷﻣﻴﺎﻝ ﺃﺳﻔﺮ ﻫﺬﺍ ﺍﻷﻣﺮ ﺇﱃ ﻧﺘﻴﺠﺔ ﻣﺆﺩﺍﻫﺎ ﺃﻥ ﺃﻣﺎﻛﻦ ﻣﺘﻌﺪﺩﺓ ﰲ ﺩﻭﻝ ﳐﺘﻠﻔﺔ ﻗﺪ‬
‫ﺗﺘﺄﺛﺮ ﺑﺎﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﻮﺍﺣﺪﺓ ﰲ ﺁﻥ ﻭﺍﺣﺪ‪ ،‬ﺣﻴﺚ ﳝﻜﻦ ﺃﻥ ﺗﺮﺗﻜﺐ ﺍﳉﺮﳝﺔ ﻣﻦ ﳎﺮﻡ ﰲ ﺩﻭﻟﺔ ﻋﻠﻰ‬
‫ﳎﲏ ﻋﻠﻴﻪ ﰲ ﺩﻭﻟﺔ ﺃﺧﺮﻯ ﰲ ﻭﻗﺖ ﻳﺴﲑ ﺟﺪ‪‬ﺍ‪.‬‬

‫ﻓﺎﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪‬ﺬﺍ ﺍﻟﺸﻜﻞ ﻻ ﺗﻌﺘﺮﻑ ﺑﺎﳊﺪﻭﺩ ﺑﲔ ﺍﻟﺪﻭﻝ ﻭﻫﻲ ﺑﺬﻟﻚ ﺷﻜﻞ ﺟﺪﻳﺪ ﻣﻦ‬
‫ﺃﺷﻜﺎﻝ ﺍﳉﺮﺍﺋﻢ ﺍﻟﻌﺎﺑﺮﺓ ﻟﻠﺤﺪﻭﺩ ﺍﻹﻗﻠﻴﻤﻴﺔ ﺑﲔ ﺩﻭﻝ ﺍﻟﻌﺎﱂ ﻛﺎﻓﺔ‪ (1)،‬ﺫﻟﻚ ﺃﻥ ﻗﺪﺭﺓ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ‬
‫ﻋﻠﻰ ﺇﺧﺘﺼﺎﺭ ﺍﳌﺴﺎﻓﺎﺕ ﻭﺗﻌﺰﻳﺰ ﺍﻟﺼﻠﺔ ﺑﲔ ﳐﺘﻠﻒ ﺃﳓﺎﺀ ﺍﻟﻌﺎﱂ ﺍﻧﻌﻜﺴﺖ ﻋﻠﻰ ﻃﺒﻴﻌﺔ ﺍﻷﻋﻤﺎﻝ‬
‫ﺍﻹﺟﺮﺍﻣﻴﺔ ﺍﻟﱵ ﻳﻌﻤﺪ ﻓﻴﻬﺎ ﺍ‪‬ﺮﻣﻮﻥ ﺇﱃ ﺍﺳﺘﺨﺪﺍﻡ ﻫﺬﻩ ﺍﻟﺘﻘﻨﻴﺎﺕ ﰲ ﺧﺮﻗﻬﻢ ﻟﻠﻘﺎﻧﻮﻥ‪ ،‬ﻭﻫﻮ ﻣﺎ ﻳﻌﲏ ﺃﻥ‬
‫ﻣﺴﺮﺡ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﱂ ﻳﻌﺪ ﳏﻠﻴﺎ ﺑﻞ ﺃﺻﺒﺢ ﻋﺎﳌﻴﺎ‪ ،‬ﺇﺫ ﺃﻥ ﺍﻟﻔﺎﻋﻞ ﻻ ﻳﺘﻮﺍﺟﺪ ﻋﻠﻰ ﻣﺴﺮﺡ ﺍﳉﺮﳝﺔ‬
‫ﺑﻞ ﻳﺮﺗﻜﺐ ﺟﺮﳝﺘﻪ ﻋﻦ ﺑﻌﺪ‪ ،‬ﻭﻫﻮ ﻣﺎ ﻳﻌﲏ ﻋﺪﻡ ﺍﻟﺘﻮﺍﺟﺪ ﺍﳌﺎﺩﻱ ﻟﻠﻤﺠﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﰲ ﻣﻜﺎﻥ ﺍﳉﺮﳝﺔ‬
‫ﻭﻣﻦ ﰒ ﺗﺘﺒﺎﻋﺪ ﺍﳌﺴﺎﻓﺎﺕ ﺑﲔ ﺍﻟﻔﻌﻞ ﺍﻟﺬﻱ ﻳﺘﻢ ﻣﻦ ﺧﻼﻝ ﺟﻬﺎﺯ ﻛﻤﺒﻴﻮﺗﺮ ﺍﻟﻔﺎﻋﻞ ﻭﺑﲔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﳏﻞ‬
‫ﺍﻻﻋﺘﺪﺍﺀ‪ ،‬ﻓﻘﺪ ﻳﻮﺟﺪ ﺍﳉﺎﱐ ﰲ ﺑﻠﺪ ﻣﺎ ﻭﻳﺴﺘﻄﻴﻊ ﺍﻟﺪﺧﻮﻝ ﺇﱃ ﺫﺍﻛﺮﺓ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﺍﳌﻮﺟﻮﺩ ﰲ ﺑﻠﺪ‬
‫ﺁﺧﺮ‪ ،‬ﻭﻫﻮ ‪‬ﺬﺍ ﺍﻟﺴﻠﻮﻙ ﻗﺪ ﻳﻀﺮ ﺷﺨﺼﺎ ﺁﺧﺮ ﻣﻮﺟﻮﺩ ﰲ ﺑﻠﺪ ﺛﺎﻟﺚ‪ (2)،‬ﺃﻭ ﺍﻟﻘﻴﺎﻡ ﺑﺈﻋﺪﺍﺩ ﺃﺣﺪ ﺍﻟﱪﺍﻣﺞ‬
‫ﺍﳋﺒﻴﺜﺔ )‪ (Vérus‬ﰲ ﺑﻠﺪ ﻣﺎ ﰒ ﻳﺘﻢ ﻧﺴﺦ ﻫﺬﺍ ﺍﻟﱪﻧﺎﻣﺞ ﻭﻳﺮﺳﻞ ﺇﱃ ﺩﻭﻝ ﳐﺘﻠﻔﺔ ﻣﻦ ﺍﻟﻌﺎﱂ‪ (3).‬ﻭﺗﻈﻬﺮ‬

‫)‪ (1‬ﺧﺎﻟﺪ ﳑﺪﻭﺡ ﺍﺑﺮﺍﻫﻴﻢ‪ .‬ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ، ،‬ﺩﺍﺭ ﺍﻟﻔﻜﺮ ﺍﳉﺎﻣﻌﻲ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪.2009‬ﺹ ‪.88‬‬
‫)‪(2‬ﺍﺋﻠﺔﳏﻤﺪ ﻓﺮﻳﺪ ﻗﻮﺭﺓ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ ﺹ ‪52‬‬
‫)‪ (3‬ﻭﻣﻦ ﺍﻷﻣﺜﻠﺔ ﻋﻦ ﺍﻟﻘﻀﺎﻳﺎ ﺍﻟﱵ ﻟﻔﺘﺖ ﺍﻟﻨﻈﺮ ﺇﱃ ﺍﻟﺒﻌﺪ ﺍﻟﺪﻭﱄ ﻟﻠﺠﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻗﻀﻴﺔ ﻋﺮﻓﺖ ﺑﺎﺳﻢ ﻣﺮﺽ ﻧﻘﺺ ﺍﳌﻨﺎﻋﺔ ﺍﳌﻜﺘﺴﺒﺔ )ﺍﻻﻳﺪﺯ(‪ .‬ﻭﺗﺘﻠﺨﺺ‬
‫ﻭﻗﺎﺋﻌﻬﺎ ﺃﻧﻪ ﰲ ﻋﺎﻡ ‪ 1989‬ﻗﺎﻡ ﺃﺣﺪ ﺍﻷﺷﺨﺎﺹ ﺑﺘﻮﺯﻳﻊ ﻋﺪﺩ ﻛﺒﲑ ﻣﻦ ﺍﻟﻨﺴﺦ ﺍﳋﺎﺻﺔ ﺑﺄﺣﺪ ﺍﻟﱪﺍﻣﺞ ﺍﻟﺬﻱ ﻳﻬﺪﻑ ﰲ ﻇﺎﻫﺮﻩ ﺇﱃ ﺇﻋﻄﺎﺀ ﺑﻌﺾ ﺍﻟﻨﺼﺎﺋﺢ‬
‫ﺍﳋﺎﺻﺔ ﲟﺮﺽ ﻧﻘﺺ ﺍﳌﻨﺎﻋﺔ ﺍﳌﻜﺘﺴﺒﺔ‪ .‬ﺇﻻ ﺃﻥ ﻫﺬﺍ ﺍﻟﱪﻧﺎﻣﺞ ﰲ ﺣﻘﻴﻘﺘﻪ ﻛﺎﻥ ﳛﺘﻮﻱ ﻋﻠﻰ ﻓﲑﻭﺱ )‪ (Vérus‬ﻳﺘﺮﺗﺐ ﻋﻠﻰ ﳎﺮﺩ ﺗﺸﻐﻴﻠﻪ ﺗﻌﻄﻴﻞ ﺟﻬﺎﺯ‬

‫‪- 31 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻫﺬﻩ ﺍﳌﺸﻜﻠﺔ ﺑﺼﻔﺔ ﺧﺎﺻﺔ ﰲ ﺍﻟﺘﻌﺎﻣﻼﺕ ﺍﻟﺒﻨﻜﻴﺔ ﻋﱪ ﺷﺒﻜﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﺪﻭﻟﻴﺔ‪ ،‬ﺣﻴﺚ ﺃﺩﻯ ﺍﻟﺘﻮﺳﻊ‬
‫ﺍﻟﻜﺒﲑ ﻹﺟﺮﺍﺀ ﺍﻟﺘﻌﺎﻣﻼﺕ ﺍﻟﺒﻨﻜﻴﺔ ﻋﱪ ﺷﺒﻜﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﺪﻭﻟﻴﺔ ﺇﱃ ﺇﻋﻄﺎﺀ ﺑﻌﺪ ﺩﻭﱄ ﳍﺬﻩ ﺍﳉﺮﺍﺋﻢ‬
‫ﺫﻟﻚ ﺃﻥ ﺭﺑﻂ ﻭﺳﺎﺋﻞ ﺍﻹﺗﺼﺎﻻﺕ ﺑﺎﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ ﺿﺎﻋﻒ ﻣﻦ ﺍﳌﻌﺎﻣﻼﺕ ﺍﳌﺎﻟﻴﺔ ﺍﻟﺪﻭﻟﻴﺔ ﻭﺍﻟﱵ‬
‫ﺃﺻﺒﺤﺖ ﺗﺘﻢ ﺑﻮﺍﺳﻄﺔ ﻭﺳﺎﺋﻞ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﻭﺑﺼﻔﺔ ﺧﺎﺻﺔ ﻣﻦ ﺧﻼﻝ ﺍﻟﺘﺤﻮﻳﻞ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻟﻸﻣﻮﺍﻝ‬
‫ﻭﺍﻟﺘﺒﺎﺩﻝ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ‪.‬‬

‫ﻭﻣﻔﺎﺩ ﻣﺎ ﺳﺒﻖ ﺫﻛﺮﻩ ﺃﻥ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﺘﻤﻴﺰ ﺑﺎﻟﺘﺒﺎﻋﺪ ﺍﳉﻐﺮﺍﰲ ﺑﲔ ﺍﻟﻔﺎﻋﻞ ﻭﺍ‪‬ﲏ ﻋﻠﻴﻪ‬
‫ﻭﻣﻦ ﺍﻟﻮﺟﻬﺔ ﺍﻟﺘﻘﻨﻴﺔ ﺍﻟﺘﺒﺎﻋﺪ ﺑﲔ ﺃﺩﺍﺓ ﺍﳉﺮﳝﺔ ﻭﳏﻠﻬﺎ‪ ،‬ﻭﻫﺬﺍ ﺍﻟﺘﺒﺎﻋﺪ ﻗﺪ ﻳﻜﻮﻥ ﺿﻤﻦ ﺩﺍﺋﺮﺓ ﺍﳊﺪﻭﺩ‬
‫ﺍﻟﻮﻃﻨﻴﺔ ﻟﻠﺪﻭﻟﺔ ﺃﻭﺧﺎﺭﺟﻬﺎ ﻟﻴﻄﺎﻝ ﺩﻭﻟﺔ ﺃﺧﺮﻯ ﻳﺘﻮﺍﺟﺪ ﻓﻴﻬﺎ ﻧﻈﺎﻡ ﺍﳊﺎﺳﻮﺏ ﺍﳌﺨﺰﻧﺔ ﻓﻴﻪ ﺍﳌﻌﻠﻮﻣﺎﺕ ﳏﻞ‬
‫ﺍﻹﻋﺘﺪﺍﺀ‪.‬‬

‫ﻭﻟﻘﺪ ﺃﺛﺎﺭﺕ ﻫﺬﻩ ﺍﳋﺎﺻﻴﺔ ﺍﻟﺪﻭﻟﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﺪﺓ ﺇﺷﻜﺎﻻﺕ ﻗﺎﻧﻮﻧﻴﺔ ﺗﺘﻌﻠﻖ ﺃﺳﺎﺳﺎ‬
‫ﺑﺘﺤﺪﻳﺪ ﺍﻟﺪﻭﻟﺔ ﺻﺎﺣﺒﺔ ﺍﻻﺧﺘﺼﺎﺹ ﺍﻟﻘﻀﺎﺋﻲ)‪ (1‬ﰲ ﳏﺎﻛﻤﺔ ﻣﺮﺗﻜﺐ ﻫﺬﻩ ﺍﳉﺮﳝﺔ‪ ،‬ﻓﻬﻞ ﻫﻲ ﺍﻟﺪﻭﻟﺔ‬
‫ﺍﻟﱵ ﻭﻗﻊ ﻓﻴﻬﺎ ﺍﻟﻨﺸﺎﻁ ﺍﻹﺟﺮﺍﻣﻲ ﺃﻡ ﺍﻟﱵ ﺃﺿﲑﺕ ﻣﺼﺎﳊﻬﺎ ﻧﺘﻴﺠﺔ ﻫﺬﺍ ﺍﻟﺘﻼﻋﺐ‪ ،‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺇﺷﻜﺎﻟﻴﺔ‬
‫ﻣﺪﻯ ﻓﻌﺎﻟﻴﺔ ﺍﻟﻘﻮﺍﻧﲔ ﺍﻟﻘﺎﺋﻤﺔ ﰲ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻊ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﺑﺼﻔﺔ ﺧﺎﺻﺔ ﻣﺴﺄﻟﺔ ﲨﻊ ﺍﻷﺩﻟﺔ‬
‫ﻭﻗﺒﻮﳍﺎ‪ ،‬ﺇﺫ ﺗﺘﺒﺎﻳﻦ ﻣﻮﺍﻗﻒ ﺍﻟﺪﻭﻝ ﻓﻴﻤﺎ ﻳﺘﻌﻠﻖ ﺑﻘﺒﻮﻝ ﺍﻷﺩﻟﺔ ﺍﳌﺴﺘﺨﻠﺼﺔ ﻣﻦ ﺃﻧﻈﻤﺔ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ‪.‬‬
‫ﻭﻏﲑﻫﺎ ﻣﻦ ﺍﳌﺸﺎﻛﻞ ﺍﻟﱵ ﳝﻜﻦ ﺃﻥ ﺗﺜﲑﻫﺎ ﺍﳉﺮﺍﺋﻢ ﺍﻟﻌﺎﺑﺮﺓ ﻟﻠﻮﻃﻨﻴﺔ ﺑﺸﻜﻞ ﻋﺎﻡ‪.‬‬

‫ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻋﻦ ﺍﻟﻌﻤﻞ ﰒ ﺗﻈﻬﺮ ﺑﻌﺪ ﺫﻟﻚ ﻋﺒﺎﺭﺓ ﻋﻠﻰ ﺍﻟﺸﺎﺷﺔ ﻳﻘﻮﻡ ﺍﻟﻔﺎﻋﻞ ﻣﻦ ﺧﻼﳍﺎ ﺑﻄﻠﺐ ﻣﺒﻠﻎ ﻣﺎﱄ ﻳﺮﺳﻞ ﻋﻠﻰ ﻋﻨﻮﺍﻥ ﺇﻟﻜﺘﺮﻭﱐ ﻟﻴﺘﻤﻜﻦ ﺍ‪‬ﲏ‬
‫ﻋﻠﻴﻪ ﻣﻦ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﻣﻀﺎﺩ ﻟﻠﻔﲑﻭﺱ )‪ (Antvérus‬ﻭﻗﺪ ﰎ ﺍﻟﺘﻤﻜﻦ ﰲ ‪ 1990/02/03‬ﻣﻦ ﺇﻟﻘﺎﺀ ﺍﻟﻘﺒﺾ ﻋﻠﻰ ﺟﻮﺯﻳﻒ ﺑﻮﺏ ﰲ ﺍﻟﻮﻻﻳﺎﺕ‬
‫ﺍﳌﺘﺤﺪﺓ ﺍﻷﻣﺮﻳﻜﻴﺔ ﺑﻮﻻﻳﺔ ﺃﻭﻫﺎﻳﻮ ﻭﺗﻘﺪﻣﺖ ﺍﳌﻤﻠﻜﺔ ﺍﳌﺘﺤﺪﺓ ﺍﻟﱪﻳﻄﺎﻧﻴﺔ ﺑﻄﻠﺐ ﺗﺴﻠﻴﻤﻪ ﻟﻠﻤﺤﺎﻛﻤﺔ ﺃﻣﺎﻡ ﺍﻟﻘﻀﺎﺀ ﺍﻻﳒﻠﻴﺰﻱ ﺫﻟﻚ ﺍﻥ ﺇﺭﺳﺎﻝ ﻫﺬﺍ ﺍﻟﱪﻧﺎﻣﺞ ﰎ‬
‫ﻣﻦ ﺩﺍﺧﻞ ﺍﳌﻤﻠﻜﺔ ﺍﳌﺘﺤﺪﺓ ﻭﺑﺎﻟﻔﻌﻞ ﻭﺍﻓﻖ ﺍﻟﻘﻀﺎﺀ ﺍﻻﻣﺮﻳﻜﻲ ﻋﻠﻰ ﺗﺴﻠﻴﻢ ﺍﳌﺘﻬﻢ ﻭﻭﺟﻬﺖ ﻟﻪ ﺍﺣﺪﻯ ﻋﺸﺮ ‪‬ﻤﺔ ﻭﻗﻌﺖ ﻣﻌﻈﻤﻬﺎ ﰲ ﺩﻭﻝ ﳐﺘﻠﻔﺔ‪ .‬ﻭﻛﺎﻧﺖ‬
‫ﳍﺬﻩ ﺍﻟﻘﻀﻴﺔ ﺃﳘﻴﺘﻬﺎ ﻣﻦ ﺣﻴﺚ ﺃﻧﻪ ﻷﻭﻝ ﻣﺮﺓ ﻳﺘﻢ ﻓﻴﻬﺎ ﺗﺴﻠﻴﻢ ﻣﺘﻬﻢ ﰲ ﺟﺮﳝﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺃ‪‬ﺎ ﺍﳌﺮﺓ ﺍﻷﻭﱃ ﺃﻳﻀﺎ ﺍﻟﱵ ﻳﻘﺪﻡ ﻓﻴﻬﺎ ﺷﺨﺺ ﻟﻠﻤﺤﺎﻛﻤﺔ ﺑﺘﻬﻤﺔ‬
‫ﺇﻋﺪﺍﺩ ﺑﺮﺍﻣﺞ ﺧﺒﻴﺜﺔ )‪.(Vérus‬ﻣﺸﺎﺭ ﺇﱃ ﻫﺬﻩ ﺍﻟﻘﻀﻴﺔ ﻟﺪﻯ ‪‬ﻼ ﻋﺒﺪ ﺍﻟﻘﺎﺩﺭ ﺍﳌﻮﻣﲏ‪،‬ﻣﺮﺟﻊ ﺳﺎﺑﻖ‪ ،‬ﺹ ‪.51‬‬
‫)‪ (1‬ﲡﺪﺭ ﺍﻹﺷﺎﺭﺓ ﰲ ﻫﺬﺍ ﺍ‪‬ﺎﻝ ﺇﱃ ﻗﻀﻴﺔ )‪ (R.V Thompso‬ﻭﺍﻟﱵ ﺗﺘﻠﺨﺺ ﻭﻗﺎﺋﻌﻬﺎ ﰲ ﻗﻴﺎﻡ ﻣﱪﻣﺞ ﺇﳒﻠﻴﺰﻱ ﻳﻌﻤﻞ ﺑﺄﺣﺪ ﺍﻟﺒﻨﻮﻙ ﰲ ﺩﻭﻟﺔ ﺍﻟﻜﻮﻳﺖ‬
‫ﺑﺎﻟﺘﻼﻋﺐ ﺑﻨﻈﺎﻡ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﺍﳋﺎﺹ ﺑﺎﻟﺒﻨﻚ ﻟﻴﻘﻮﻡ ﺑﺈﺟﺮﺍﺀ ﺧﺼﻮﻣﺎﺕ ﻣﻦ ﺃﺭﺻﺪﺓ ﺍﻟﻌﻤﻼﺀ ﰒ ﻳﻘﻮﻡ ﺑﺈﻳﺪﺍﻋﻬﺎ ﰲ ﺍﳊﺴﺎﺏ ﺍﳋﺎﺹ ﺑﻪ ﻭﺑﻌﺪ ﺃﻥ ﺭﺟﻊ‬
‫ﺍﳌﺘﻬﻢ ﺇﱃ ﺍﳒﻠﺘﺮﺍ ﻗﺎﻡ ﺑﺎﻟﻜﺘﺎﺑﺔ ﺇﱃ ﺍﻟﺒﻨﻚ ﻃﺎﻟﺒﺎ ﻣﻨﻪ ﺃﻥ ﻳﻘﻮﻡ ﺑﺘﺤﻮﻳﻞ ﺍﳊﺴﺎﺏ ﺍﳋﺎﺹ ﺑﻪ ﺇﱃ ﻋﺪﺓ ﺣﺴﺎﺑﺎﺕ ﺑﻨﻜﻴﺔ ﰲ ﺇﳒﻠﺘﺮﺍ ﻭﻫﻮ ﻣﺎ ﻗﺎﻡ ﺑﻪ ﺍﻟﺒﻨﻚ ﻓﻌﻼ‪.‬‬
‫ﻭﻗﺪﻡ ﻟﻠﻤﺤﺎﻛﻤﺔ ﺃﻣﺎﻡ ﺍﻟﻘﻀﺎﺀ ﺍﻻﳎﻠﻴﺰﻱ ﺇﻻ ﺃﻧﻪ ﻃﻌﻦ ﰲ ﺍﳊﻜﻢ ﺍﺳﺘﻨﺎﺩﺍ ﺇﱃ ﻋﺪﻡ ﺍﺧﺘﺼﺎﺹ ﺍﻟﻘﻀﺎﺀ ﺍﻻﳒﻠﻴﺰﻱ ﲟﺎ ﺃﻥ ﻓﻌﻠﻲ ﺍﻟﺴﺤﺐ ﻭﺍﻻﻳﺪﺍﻉ ﻛﺎﻧﺎ ﰲ‬
‫ﺍﻟﻜﻮﻳﺖ ﻭﻟﻴﺲ ﺑﺎﳒﻠﺘﺮﺍ‪.‬ﻣﺸﺎﺭ ﺇﱃ ﻫﺬﻩ ﺍﻟﻘﻀﻴﺔ ﻟﺪﻯ ﻧﺎﺋﻠﺔ ﻋﺎﺩﻝ ﳏﻤﺪ ﻓﺮﻳﺪ ﻗﻮﺭﺓ ‪ ،‬ﻣﺮﺟﻊ ﺳﺎﺑﻖ‪ ،‬ﺹ ‪.54‬‬

‫‪- 32 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻟﺬﻟﻚ ﻓﻘﺪ ﻟﻔﺘﺖ ﻫﺬﻩ ﺍﳌﺸﻜﻼﺕ ﺍﻟﻨﻈﺮ ﺇﱃ ﺿﺮﻭﺭﺓ ﺇﳚﺎﺩ ﺍﻟﻮﺳﺎﺋﻞ ﺍﳌﻨﺎﺳﺒﺔ ﻟﺘﺸﺠﻴﻊ ﺍﻟﺘﻌﺎﻭﻥ‬
‫ﺍﻟﺪﻭﱄ ﳌﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺍﻟﻌﻤﻞ ﻋﻠﻰ ﺍﻟﺘﻮﻓﻴﻖ ﺑﲔ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﳋﺎﺻﺔ ﺍﻟﱵ ﺗﺘﻨﺎﻭﻝ ﻫﺬﻩ‬
‫ﺍﳉﺮﺍﺋﻢ ﳌﺨﺘﻠﻒ ﺍﻟﺪﻭﻝ‪.‬‬

‫ﻭﻣﻦ ﺃﺟﻞ ﺫﻟﻚ ﻓﻘﺪ ﺗﻌﺎﻟﺖ ﺍﻷﺻﻮﺍﺕ ﺍﻟﺪﺍﻋﻴﺔ ﺇﱃ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﺪﻭﱄ ﺍﳌﻜﺜﻒ ﻣﻦ ﺃﺟﻞ ﺍﻟﺘﺼﺪﻱ‬
‫ﳍﺎ ﲝﺰﻡ‪ (1)،‬ﻭﺃﻥ ﻳﺸﻤﻞ ﻫﺬﺍ ﺍﻟﺘﻌﺎﻭﻥ ﺗﺒﺎﺩﻝ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺗﺴﻠﻴﻢ ﺍ‪‬ﺮﻣﲔ ﻭﺿﻤﺎﻥ ﺃﻥ ﺍﻷﺩﻟﺔ ﺍﻟﱵ ﻳﺘﻢ‬
‫ﲨﻌﻬﺎ ﰲ ﺩﻭﻟﺔ ﺗﻘﺒﻞ ﰲ ﳏﺎﻛﻢ ﺩﻭﻟﺔ ﺃﺧﺮﻯ‪ .‬ﻭﻟﻜﻦ ﻭﻣﻊ ﺿﺮﻭﺭﺓ ﻫﺬﺍ ﺍﻟﺘﻌﺎﻭﻥ ﻭﺍﳌﻨﺎﺩﺍﺓ ﺑﻪ ﺇﻻ ﺃﻧﻪ ﺗﻘﻒ‬
‫ﺃﻣﺎﻡ ﻫﺬﺍ ﺍﳌﺒﺪﺃ ﻋﻘﺒﺎﺕ ﻭﻣﻌﻮﻗﺎﺕ ﲢﻮﻝ ﺩﻭﻥ ﲢﻘﻘﻪ ﻭﲡﻌﻠﻪ ﺻﻌﺐ ﺍﳌﻨﺎﻝ‪ ،‬ﻣﻦ ﺃﳘﻬﺎ ﺍﻧﻌﺪﺍﻡ ﳕﻮﺫﺝ‬
‫ﻣﻮﺣﺪ ﻟﻠﻨﺸﺎﻁ ﺍﻹﺟﺮﺍﻣﻲ ﺍﳌﻜﻮﻥ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﺃﻥ ﻛﺜﲑﺍ ﻣﻦ ﺍﻟﻘﻮﺍﻧﲔ ﱂ ﻳﺘﻢ ﺗﻌﺪﻳﻠﻬﺎ ﲝﻴﺚ‬
‫ﺗﺘﻮﺍﺀﻡ ﻣﻊ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﺣﱴ ﻳﺘﺴﲎ ﺇﺩﺭﺍﺟﻬﺎ ﺿﻤﻦ ﺍﻹﺗﻔﺎﻗﻴﺎﺕ ﺍﻟﺪﻭﻟﻴﺔ ﺍﳋﺎﺻﺔ ﺑﺘﺒﺎﺩﻝ ﺍﳌﺴﺎﻋﺪﺓ‬
‫ﺍﳉﻨﺎﺋﻴﺔ ﰲ ﳎﺎﻝ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺗﻨﻮﻉ ﻭﺍﺧﺘﻼﻑ ﺍﻟﻨﻈﻢ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻭﺍﻹﺟﺮﺍﺋﻴﺔ‪.‬‬

‫ﺛﺎﻧﻴﺎ‪ :‬ﺻﻌﻮﺑﺔ ﺍﻛﺘﺸﺎﻑ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺇﺛﺒﺎ‪‬ﺎ‪ :‬ﺗﻘﻊ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺑﻴﺌﺔ ﺍﻓﺘﺮﺍﺿﻴﺔ‬
‫ﺗﻘﻨﻴﺔ ﻻ ﺗﺘﺮﻙ ﺃﻳﺔ ﺁﺛﺎﺭ ﳏﺴﻮﺳﺔ‪ ،‬ﺇﺫ ﻳﻐﻠﺐ ﻋﻠﻴﻬﺎ ﺃ‪‬ﺎ ﺗﺘﻢ ﰲ ﺍﳋﻔﺎﺀ ﻷﻥ ﺍﳉﻨﺎﺓ ﻳﻌﻤﺪﻭﻥ ﰲ ﻛﺜﲑ ﻣﻦ‬
‫ﺍﻷﺣﻴﺎﻥ ﺇﱃ ﺇﺧﻔﺎﺀ ﻧﺸﺎﻃﻬﻢ ﺍﳉﺮﻣﻲ ﻋﻦ ﻃﺮﻳﻖ ﺗﻼﻋﺒﻬﻢ ﺑﺎﻟﺒﻴﺎﻧﺎﺕ‪ ،‬ﻭﺍﻟﺬﻱ ﻳﺘﺤﻘﻖ ﺃﺣﻴﺎﻧﺎ ﺇﻥ ﱂ ﻧﻘﻞ‬
‫ﰲ ﺍﻟﻐﺎﻟﺐ ﰲ ﻏﻔﻠﺔ ﻣﻦ ﺍ‪‬ﲏ ﻋﻠﻴﻬﻢ‪ .‬ﻛﻤﺎ ﺃﻧﻪ ﻣﻦ ﺍﻟﺴﻬﻞ ﻋﻠﻴﻬﻢ ﺗﺪﻣﲑ ﺍﻷﺩﻟﺔ ﻭﳏﻮﻫﺎ ﳑﺎ ﻳﻌﻘﺪ ﺃﻣﺮ‬
‫ﻛﺸﻒ ﺍﳉﺮﳝﺔ ﻭﺇﺛﺒﺎ‪‬ﺎ‪ ،‬ﻭﺇﺫﺍ ﻣﺎ ﻗﻮﺭﻧﺖ ﺣﺎﻻﺕ ﺍﻛﺘﺸﺎﻑ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﺿﻮﺀ ﻣﺎ ﻳﺘﻢ‬
‫ﺍﻛﺘﺸﺎﻓﻪ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻓﺈﻥ ﻋﺪﺩﻫﺎ ﻗﻠﻴﻞ‪ ،‬ﻓﻤﻌﻈﻢ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰎ ﺍﻛﺘﺸﺎﻓﻬﺎ ﺑﺎﳌﺼﺎﺩﻓﺔ‬
‫ﻭﺑﻌﺪ ﻭﻗﺖ ﻃﻮﻳﻞ ﻣﻦ ﺍﺭﺗﻜﺎﺑﻪ‪ ،‬ﺫﻟﻚ ﺃﻥ ﻫﺬﺍ ﺍﻟﻨﻤﻂ ﺍﻹﺟﺮﺍﻣﻲ ﻻ ﳛﺘﺎﺝ ﺇﱃ ﻋﻨﻒ ﺃﻭ ﺟﺜﺚ ﺃﻭ‬
‫ﺍﻗﺘﺤﺎﻡ ﻭﺇﳕﺎ ﻫﻲ ﻣﻌﻠﻮﻣﺎﺕ ﻭﺑﻴﺎﻧﺎﺕ ﺗﻐﲑ ﺃﻭ ﺗﻌﺪﻝ ﺃﻭ ﲤﺤﻰ ﻛﻠﻴﺎ ﺃﻭ ﺟﺰﺋﻴﺎ ﻣﻦ ﺍﻟﺴﺠﻼﺕ ﺍﳌﺨﺰﻭﻧﺔ‬
‫ﰲ ﺫﺍﻛﺮﺓ ﺍﳊﺎﺳﺐ ﺍﻵﱄ)‪ (2‬ﻓﻼ ﺗﺘﺮﻙ ﺃﺛﺮﺍ ﺧﺎﺭﺟﻴﺎ ﻣﺮﺋﻴﺎ ﺃﻭ ﻣﻠﻤﻮﺳﺎ ﻓﻬﻲ ﻛﻤﺎ ﻭﺻﻔﻬﺎ ﺑﻌﺾ ﺍﻟﻔﻘﻬﺎﺀ‬
‫ﺑﺄ‪‬ﺎ ﺟﺮﳝﺔ ﻫﺎﺩﺋﺔ ﺑﻄﺒﻴﻌﺘﻬﺎ ﻻ ﺗﺘﻄﻠﺐ ﺳﻮﻯ ﻋﺪﺩ ﻣﻦ ﺍﻟﻠﻤﺴﺎﺕ ﺍﳋﺎﻃﻔﺔ ﻋﻠﻰ ﻟﻮﺣﺔ ﺍﳌﻔﺎﺗﻴﺢ ﺣﱴ‬
‫ﺗﺆﺩﻱ ﺇﱃ ﺍﺧﺘﺮﺍﻕ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺨﺰﻧﺔ ﰲ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻭﻫﺘﻚ ﺳﺮﻳﺘﻬﺎ ﻭﳏﻮﻫﺎ ﺃﻭ ﺗﺸﻮﻳﻬﻬﺎ ﺃﻭ ﺗﻌﻄﻴﻞ‬
‫ﺍﻷﻧﻈﻤﺔ ﺍﻟﱵ ﲢﺘﻮﻳﻬﺎ‪ (3) .‬ﻓﺎﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺴﺘﺤﺪﺛﺔ ﺍﻟﱵ ﻻ ﺗﺘﺮﻙ ﺷﻬﻮﺩﺍ ﳝﻜﻦ‬

‫)‪ (1‬ﺍﻧﻈﺮ ﰲ ﻫﺬﺍ ﺍ‪‬ﺎﻝ ﻣﺆﲤﺮ ﺍﻷﻣﻢ ﺍﳌﺘﺤﺪﺓ ﺍﻟﺜﺎﻣﻦ ﳌﻨﻊ ﺍﳉﺮﳝﺔ ﻭﻣﻌﺎﻗﺒﺔ ﺍ‪‬ﺮﻣﲔ ﺍﳌﻨﻌﻘﺪ ﰲ ﻫﺎﻓﺎﻧﺎ ﻋﺎﻡ ‪.1990‬‬
‫)‪ (2‬ﻋﺎﺩﻝ ﻳﻮﺳﻒ ﻋﺒﺪ ﺍﻟﻨﱯ ﺍﻟﺸﻜﺮﻱ‪ -‬ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺃﺯﻣﺔ ﺍﻟﺸﺮﻋﻴﺔ ﺍﻹﺟﺮﺍﺋﻴﺔ‪ -‬ﺟﺎﻣﻌﺔ ﺍﻟﻜﻮﻓﺔ ﻛﻠﻴﺔ ﺍﻟﻘﺎﻧﻮﻥ‪ ،‬ﺹ ‪.116‬‬
‫)‪ (3‬ﳏﻤﺪ ﲪﺎﺩ ﻣﺮﻫﺞ ﺍﻟﺒﻬﻴﱵ‪ ،‬ﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳊﺪﻳﺜﺔ ﻭﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﻨﺎﺋﻲ‪ .‬ﺩﺍﺭ ﺍﻟﺜﻘﺎﻓﺔ ﻟﻠﻨﺸﺮ ﻭﺍﻟﺘﻮﺯﻳﻊ ﻋﻤﺎﻥ ‪ ،2004‬ﺹ ‪.165‬‬

‫‪- 33 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﻹﺳﺘﺪﻻﻝ ﺑﺄﻗﻮﺍﳍﻢ ﻭﻻ ﺃﺩﻟﺔ ﻣﺎﺩﻳﺔ ﳝﻜﻦ ﻓﺤﺼﻬﺎ ﻭﺇﳕﺎ ﺗﻘﻊ ﰲ ﺑﻴﺌﺔ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ ﻳﺘﻢ ﻓﻴﻬﺎﻧﻘﻞ ﺍﳌﻌﻠﻮﻣﺎﺕ‬
‫ﻭﺗﺪﺍﻭﳍﺎ ﺑﻮﺍﺳﻄﺔ ﻧﺒﻀﺎﺕ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ ﻏﲑ ﻣﺮﺋﻴﺔ‪.‬‬

‫ﻛﻤﺎ ﺫﻫﺐ ﺍﻟﺒﻌﺾ ﻟﻠﻘﻮﻝ ﺑﺄﻥ ﺻﻌﻮﺑﺔ ﺍﻛﺘﺸﺎﻑ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻛﺬﺍ ﺻﻌﻮﺑﺔ ﺇﺛﺒﺎ‪‬ﺎ ﺭﺍﺟﻊ‬
‫ﺃﻳﻀﺎ ﺇﱃ ﻋﺪﺓ ﺃﺳﺒﺎﺏ‪ ،‬ﻣﻦ ﺑﻴﻨﻬﺎ ﻭﺳﻴﻠﺔ ﺗﻨﻔﻴﺬﻫﺎ ﻭﺍﻟﱵ ﺗﺘﺴﻢ ﰲ ﺃﻏﻠﺐ ﺍﳊﺎﻻﺕ ﺑﺎﻟﻄﺎﺑﻊ ﺍﻟﺘﻘﲏ ﺍﻟﺬﻱ‬
‫ﻳﻀﻔﻲ ﻋﻠﻴﻬﺎ ﺍﻟﻜﺜﲑ ﻣﻦ ﺍﻟﺘﻌﻘﻴﺪ ﻭﻣﻦ ﰒ ﻓﺈ‪‬ﺎ ﲢﺘﺎﺝ ﺇﱃ ﺧﱪﺓ ﻓﻨﻴﺔ ﻳﺼﻌﺐ ﻋﻠﻰ ﺍﶈﻘﻖ ﺍﻟﺘﻘﻠﻴﺪﻱ‬
‫ﺍﻟﺘﻌﺎﻣﻞ ﻣﻌﻬﺎ‪ ،‬ﺇﺫ ﺃ‪‬ﺎ ﺗﺘﻄﻠﺐ ﺇﳌﺎﻣﺎ ﺧﺎﺻﺎ ﺑﺘﻘﻨﻴﺎﺕ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﻭﻧﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺫﻟﻚ ﺳﻮﺍﺀ ﻻﺭﺗﻜﺎ‪‬ﺎ‬
‫ﺃﻭ ﺍﻟﺘﺤﻘﻴﻖ ﻓﻴﻬﺎ ﺃﻭ ﳌﻼﺣﻘﺔ ﻣﺮﺗﻜﺒﻴﻬﺎ‪ .‬ﻓﺄﺣﻴﺎﻧﺎ ﳒﺪ ﺭﺟﺎﻝ ﺍﻟﻀﺒﻄﻴﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻏﲑ ﻗﺎﺩﺭﻳﻦ ﻋﻠﻰ ﺍﻟﺘﻌﺎﻣﻞ‬
‫ﺑﺎﻟﻮﺳﺎﺋﻞ ﺍﻹﺳﺘﺪﻻﻟﻴﺔﻭﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻣﻊ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‪ .‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺻﻌﻮﺑﺔ‬
‫ﺍﻹﺣﺘﻔﺎﻅ ﺍﻟﻔﲏ ﺑﺪﻟﻴﻞ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺇﺫ ﻟﻠﻤﺠﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺍﻟﻘﺪﺭﺓ ﻋﻠﻰ ﺗﺪﻣﲑ ﺍﻟﺪﻟﻴﻞ ﰲ ﺃﻗﻞ ﻣﻦ‬
‫ﺛﺎﻧﻴﺔ)‪.(1‬‬

‫ﻭﳝﻜﻦ ﺍﻋﺘﺒﺎﺭ ﺃﻧﻪ ﻣﻦ ﺑﲔ ﺍﻷﺳﺒﺎﺏ ﺃﻳﻀﺎ ﺍﻟﱵ ﺗﻘﻒ ﻭﺭﺍﺀ ﺻﻌﻮﺑﺔ ﺍﻛﺘﺸﺎﻑ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﻭﺇﺛﺒﺎ‪‬ﺎ ﺍ‪‬ﲏ ﻋﻠﻴﻬﻢ ﺃﻧﻔﺴ‪‬ﻬﻢ‪ ,‬ﺫﻟﻚ ﺃﻥ ﻫﺆﻻﺀ ﻗﺪ ﻳﻠﻌﺒﻮﻥ ﺩﻭﺭﺍ ﺭﺋﻴﺴﻴﺎ ﰲ ﺫﻟﻚ ﻣﻦ ﺧﻼﻝ ﺍﻹﺣﺠﺎﻡ‬
‫ﻋﻦ ﺍﻹﺑﻼﻍ ﻋﻨﻬﺎ ﰲ ﺣﺎﻟﺔ ﺍﻛﺘﺸﺎﻓﻬﺎ‪ ،‬ﺣﻴﺚ ﲢﺮﺹ ﺃﻛﺜﺮ ﺍﳉﻬﺎﺕ ﺍﻟﱵ ﺗﺘﻌﺮﺽ ﺃﻧﻈﻤﺘﻬﺎ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﻟﻺﻧﺘﻬﺎﻙ ﺃﻭ ﲤﲎ ﲞﺴﺎﺋﺮ ﻓﺎﺩﺣﺔ ﻣﻦ ﺟﺮﺍﺀ ﺫﻟﻚ ﻋﻦ ﻋﺪﻡ ﺍﻟﻜﺸﻒ ﺣﱴ ﺑﲔ ﻣﻮﻇﻔﻴﻬﺎ ﻋﻤﺎ ﺗﻌﺮﺿﺖ ﻟﻪ‬
‫ﻭﺗﻜﺘﻔﻲ ﺑﺎﲣﺎﺫ ﺇﺟﺮﺍﺀﺍﺕ ﺇﺩﺍﺭﻳﺔ ﺩﺍﺧﻠﻴﺔ ﺩﻭﻥ ﺍﻹﺑﻼﻍ ﻋﻨﻬﺎ ﻟﻠﺴﻠﻄﺎﺕ ﺍﳌﺨﺘﺼﺔ ﲡﻨﺒﺎ ﻟﻺﺿﺮﺍﺭ‬
‫ﺑﺴﻤﻌﺘﻬﺎ ﻭﻣﻜﺎﻧﺘﻬﺎ ﻭﻫﺰﺍ ﻟﻠﺜﻘﺔ ﰲ ﻛﻔﺎﺀ‪‬ﺎ‪ (2).‬ﻭﻳﺒﺪﻭ ﺫﻟﻚ ﺃﻛﺜﺮ ﻭﺿﻮﺣﺎ ﰲ ﺍﳌﺆﺳﺴﺎﺕ ﺍﳌﺎﻟﻴﺔ ﻣﺜﻞ‬
‫ﺍﻟﺒﻨﻮﻙ ﻭﺍﳌﺆﺳﺴﺎﺕ ﺍﻹﺩﺧﺎﺭﻳﺔ ﻭﻣﺆﺳﺴﺎﺕ ﺍﻹﻗﺮﺍﺽ ‪.‬ﺣﻴﺚ ﲣﺸﻰ ﳎﺎﻟﺲ ﺇﺩﺍﺭ‪‬ﺎ ﻣﻦ ﺃﻥ ﺗﺆﺩﻱ‬
‫ﺍﻟﺪﻋﺎﻳﺔ ﺍﻟﺴﻠﺒﻴﺔ ﺍﻟﱵ ﻗﺪ ﺗﻨﺠﻢ ﻋﻦ ﻛﺸﻒ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﺃﻭ ﺍﲣﺎﺫ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺣﻴﺎﳍﺎ ﺇﱃ‬
‫ﺗﻀﺎﺅﻝ ﺍﻟﺜﻘﺔ ﻓﻴﻬﺎ ﻣﻦ ﺟﺎﻧﺐ ﺍﳌﺘﻌﺎﻣﻠﲔ ﻣﻌﻬﺎ‪ ،‬ﺣﻴﺚ ﺃﻥ ﺍﳉﺎﻧﺐ ﺍﻷﻛﱪ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻻ ﻳﺘﻢ‬
‫) ‪.(3‬‬
‫ﺍﻟﻜﺸﻒ ﺃﻭ ﺍﻟﺘﺒﻠﻴﻎ ﻋﻨﻪ‪ ،‬ﻭﻫﻮ ﻣﺎ ﻳﺆﺛﺮ ﺳﻠﺒﺎ ﻋﻠﻰ ﺍﻟﺴﻴﺎﺳﺔ ﺍﻟﱵ ﳝﻜﻦ ﺃﻥ ﺗﻮﺿﻊ ﳌﻜﺎﻓﺤﺘﻬﺎ‪.‬‬

‫)‪ (1‬ﻫﺸﺎﻡ ﳏﻤﺪ ﻓﺮﻳﺪ ﺭﺳﺘﻢ ﺍﳉﻮﺍﻧﺐ ﺍﻹﺟﺮﺍﺋﻴﺔ ﻟﻠﺠﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻣﻜﺘﺒﺔ ﺍﻵﻻﺕ ﺍﳊﺪﻳﺜﺔ ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪ ،1994‬ﺹ ‪.16‬‬
‫)‪(2‬ﺃﺷﺎﺭﺕ ﺑﻌﺾ ﺍﻟﺘﻘﺪﻳﺮﺍﺕ ﰲ ﺍﻟﻮ‪.‬ﻡ‪.‬ﺃ ﺃﻥ ﻣﺎ ﻳﺘﺮﺍﻭﺡ ﺑﲔ ‪ 20‬ﻭ‪ %25‬ﻣﻦ ﺟﺮﺍﺋﻢ ﺍﳊﺎﺳﺒﺎﺕ ﻻ ﻳﺘﻢ ﺍﻹﺑﻼﻍ ﻋﻨﻬﺎ ﺧﺸﻴﺔ ﺍﻹﺳﺎﺀﺓ ﺇﱃ ﺍﻟﺴﻤﻌﺔ ﻭﰲ‬
‫ﺩﺭﺍﺳﺔ ﺃﺟﺮﻳﺖ ﻋﻠﻰ ﺃﻟﻒ ﺷﺮﻛﺔ ﻣﻦ ﺍﻟﺸﺮﻛﺎﺕ ﺍﳌﻨﺘﺠﺔ ﳉﻬﺎﺯ )‪ (Fortune 500‬ﺃﻇﻬﺮﺕ ﻧﺘﺎﺋﺠﻬﺎ ﺃﻥ ‪ %2‬ﻓﻘﻂ ﻣﻦ ﻛﻞ ﺟﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﱵ ﻳﺘﻢ‬
‫ﺍﻟﺘﺒﻠﻴﻎ ﻋﻨﻬﺎ ﻟﻠﺸﺮﻃﺔ ﺃﻭ ﳌﻜﺘﺐ ﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﺍﻟﻔﺪﺭﺍﱄ‪ .‬ﻣﺸﺎﺭ ﺇﻟﻴﻪ ﻟﺪﻯ ﺭﺷﻴﺪﺓ ﺑﻮﻛﺮ‪ ،‬ﻣﺮﺟﻊ ﺳﺎﺑﻖ‪،‬ﺹ‪.472‬‬
‫)‪ (3‬ﻼ ﻋﺒﺪ ﺍﻟﻘﺎﺩﺭ ﺍﳌﻮﻣﲏ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ ‪.55‬‬

‫‪- 34 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻭﻗﺪ ﰎ ﻃﺮﺡ ﻋﺪﺓ ﺍﻗﺘﺮﺍﺣﺎﺕ ﺗﻜﻔﻞ ﺗﻌﺎﻭﻥ ﺍ‪‬ﲏ ﻋﻠﻴﻪ ﰲ ﻛﺸﻒ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻭﺑﺎﻟﺘﺎﱄ ﺇﻧﻘﺎﺹ‬
‫ﺣﺠﻢ ﺍﻹﺟﺮﺍﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺍﳋﻔﻲ‪ ،‬ﻭﻣﻦ ﻫﺬﻩ ﺍﻻﻗﺘﺮﺍﺣﺎﺕ ﺍﻟﱵ ﻃﺮﺣﺖ ﳊﻤﻞ ﺍ‪‬ﲏ ﻋﻠﻴﻪ ﻋﻠﻰ ﺍﻟﺘﻌﺎﻭﻥ‬
‫ﻣﻊ ﺍﻟﺴﻠﻄﺎﺕ ﰲ ﺍﻟﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ ﺍﻷﻣﺮﻳﻜﻴﺔ ﻣﻄﺎﻟﺒﺔ ﺍﻟﺒﻌﺾ ﺑﺄﻥ ﺗﻔﺮﺽ ﺍﻟﻨﺼﻮﺹ ﺍﳌﺘﻌﻠﻘﺔ ﲜﺮﺍﺋﻢ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﻋﺎﺗﻖ ﻣﻮﻇﻔﻲ ﺍﳉﻬﺔ ﺍ‪‬ﲏ ﻋﻠﻴﻬﺎ ﺑﺎﻹﺑﻼﻍ ﻋﻤﺎ ﻳﺼﻞ ﻋﻠﻤﻬﻢ ﺑﻪ ﻣﻦ ﺟﺮﺍﺋﻢ ﰲ ﻫﺬﺍ‬
‫ﺍ‪‬ﺎﻝ ﻣﻊ ﺗﻘﺮﻳﺮ ﺟﺰﺍﺀ ﻋﻠﻰ ﺍﻹﺧﻼﻝ ‪‬ﺬﺍ ﺍﻹﻟﺘﺰﺍﻡ‪.‬ﻭﻋﺮﺽ ﺫﺍﺕ ﺍﻹﻗﺘﺮﺍﺡ ﻋﻠﻰ ﳉﻨﺔ ﺧﱪﺍﺀ ﳎﻠﺲ‬
‫ﺃﻭﺭﻭﺑﺎ ﻭﻻﻗﺖ ﺍﻟﻔﻜﺮﺓ ﺭﻓﻀﺎ ﺑﺎﻋﺘﺒﺎﺭ ﺃﻧﻪ ﻟﻴﺲ ﻣﻘﺒﻮﻻ ﲢﻮﻳﻞ ﺍ‪‬ﲏ ﻋﻠﻴﻪ ﺇﱃ ﻣﺮﺗﻜﺐ ﺍﳉﺮﳝﺔ‪.‬‬

‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﳏـﻞ ﺍﳉﺮﳝـﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬

‫ﺇﻥ ﻣﻦ ﲨﻠﺔ ﺍﻹﻧﻌﻜﺎﺳﺎﺕ ﺍﻟﺴﻠﺒﻴﺔ ﻭﺍﳋﻄﲑﺓ ﺟﺮﺍﺀ ﺳﻮﺀ ﺍﺳﺘﺨﺪﺍﻡ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﻹﳓﺮﺍﻑ‬
‫ﻋﻦ ﺍﻷﻏﺮﺍﺽ ﺍﳌﺘﻮﺧﺎﺕ ﻣﻨﻬﺎ‪ ،‬ﺗﻔﺸﻲ ﻃﺎﺋﻔﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺴﺘﺤﺪﺛﺔ ﻭﺍﻟﱵ ﻛﻤﺎ ﺳﺒﻖ ﺫﻛﺮﻩ ﺃﻃﻠﻖ ﻋﻠﻴﻬﺎ‬
‫ﻋﺪﺓ ﺗﺴﻤﻴﺎﺕ ﻭﺍﺳﺘﻌﻤﻞ ﰲ ﺍﻟﺪﻻﻟﺔ ﻋﻨﻬﺎ ﳐﺘﻠﻒ ﺍﳌﺼﻄﻠﺤﺎﺕ‪ .‬ﻭﻋﻠﻰ ﺍﻟﻌﻤﻮﻡ ﻓﻘﺪ ﺻﻨﻔﺖ ﻫﺬﻩ‬
‫ﺍﳉﺮﺍﺋﻢ ﺇﱃ ﻃﺎﺋﻔﺘﲔ‪ ،‬ﻃﺎﺋﻔﺔ ﻛﺎﻧﺖ ﻓﻴﻬﺎ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺳﻴﻠﺔ ﻻﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﻭﻃﺎﺋﻔﺔ ﻛﺎﻧﺖ ﺗﻘﻨﻴﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ ﳏﻼ ﳍﺎ‪.‬‬

‫ﻭﻣﻦ ﺍﶈﺘﻢ ﻋﻠﻤﻪ ﺃﻥ ﻣﻔﻬﻮﻡ ﺟﺮﺍﺋﻢ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻗﺪ ﻧﺸﺄ ﻭﺗﻄﻮﺭ ﻭﻻ ﻳﺰﺍﻝ ﻳﺘﻄﻮﺭ ﺗﺒﻌﺎ ﻟﺘﻄﻮﺭ‬
‫ﺍﻟﺘﻘﻨﻴﺔ ﻭﺍﺳﺘﺨﺪﺍﻣﺎ‪‬ﺎ‪ ،‬ﻭﺃﻥ ﻭﺟﻮﺩ ﻫﺬﻩ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺟﺮﳝﺔ ﻣﺎ ﻟﻴﺲ ﺩﻟﻴﻼ ﻋﻠﻰ ﻃﺒﻴﻌﺘﻬﺎ ﺍﻟﺘﻘﻨﻴﺔ‪،‬‬
‫ﻓﻬﻨﺎﻙ ﺍﻟﻜﺜﲑ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﻳﻜﻮﻥ ﳏﻠﻬﺎ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻭﻣﻊ ﺫﻟﻚ ﻓﺈ‪‬ﺎ ﺗﺴﺘﺒﻌﺪ ﻣﻦ ﻃﺎﺋﻔﺔ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺫﻟﻚ ﺃﻧﻪ ﺑﺎﻟﻨﻈﺮ ﺇﱃ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﰲ ﺫﺍﺗﻪ ﻟﻮﺟﺪﻧﺎﻩ ﻟﻴﺲ ﻣﻦ ﻃﺒﻴﻌﺔ ﻭﺍﺣﺪﺓ‪ .‬ﻓﻬﻮ‬
‫ﻳﺘﻜﻮﻥ)‪ (1‬ﻣﻦ ﻋﻨﺎﺻﺮ ﻣﺎﺩﻳﺔ ﻭﺃﺧﺮﻯ ﻏﲑ ﻣﺎﺩﻳﺔ ﲟﺎ ﻳﺴﻤﺢ ﻣﻦ ﺇﻣﻜﺎﻧﻴﺔ ﺃﻥ ﻳﻜﻮﻥ ﳏﻼ ﺫﻭ ﻃﺒﻴﻌﺘﲔ‬

‫)‪ (1‬ﻧﻌﲏ ﺑﻨﻈﺎﻡ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻛﻞ ﻣﻜﻮﻧﺎﺗﻪ ﺍﳌﺎﺩﻳﺔ ﻭﺍﳌﻌﻨﻮﻳﺔ‪ .‬ﻭﻳﺸﻤﻞ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻋﻠﻰ ﻋﻨﺼﺮﻳﻦ ﺃﺳﺎﺳﻴﲔ‪:‬‬
‫‪-‬ﺍﳌﻜﻮﻧﺎﺕ ﺍﳌﺎﺩﻳﺔ‪ (Hardware) :‬ﻭ ﺗﺸﺘﻤﻞ ﻋﻠﻰ ﳐﺘﻠﻒ ﺃﻧﻮﺍﻉ ﺍﳌﻜﻮﻧﺎﺕ ﻭﺍﻟﻮﺳﺎﺋﻂ ﺍﳌﺎﺩﻳﺔ ﺍﳌﺴﺘﺨﺪﻣﺔ ﰲ ﺍﻟﻌﻤﻠﻴﺎﺕ ﺍﻟﱵ ﲤﺮ ‪‬ﺎ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﺍﳌﻌﻠﻮﻣﺎﺕ‬
‫ﻛﻮﺣﺪﺍﺕ ﺍﻻﺩﺧﺎﻝ‪ in put‬ﻭﺍﻹﺧﺮﺍﺝ ‪ out put‬ﻭﻭﺣﺪﺓ ﺍﻟﺘﺸﻐﻴﻞ ﺍﳌﺮﻛﺰﻳﺔ‪.‬ﻭ ﺍﳌﻜﻮﻧﺎﺕ ﺍﳌﺎﺩﻳﺔ ﻻ ﺗﺸﺘﻤﻞ ﻋﻠﻰ ﺍﳊﻮﺍﺳﻴﺐ ﻭﺑﻘﻴﺔ ﺍﻷﺟﻬﺰﺓ ﺑﻞ ﺃﻳﻀﺎ‬
‫ﻛﻞ ﺍﻟﻮﺳﺎﺋﻂ )‪ (Media‬ﻭﺍﻷﺷﻴﺎﺀ ﺍﳌﺎﺩﻳﺔ ﺍﻟﱵ ﺗﺴﺠﻞ ﻋﻠﻴﻬﺎ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﻣﻦ ﺃﻫﻢ ﻣﻜﻮﻧﺎﺕ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺍﳌﺎﺩﻳﺔ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﻭﺍﳌﻜﻮﻧﺎﺕ ﺍﻟﺮﺋﻴﺴﻴﺔ‬
‫ﻭﺍﺳﺘﺨﺪﺍﻣﺎﺕ ﺍﻟﻨﻈﺎﻡ ﻭﺍﻟﺘﺨﺰﻳﻦ ﺍﳋﺎﺭﺟﻲ ﻭﺍﻻﺟﻬﺰﺓ ﺍﳌﻠﺤﻘﺔ‪ .‬ﻭﺍﳌﻜﻮﻧﺎﺕ ﺍﻟﺮﺋﻴﺴﻴﺔ ﻷﻱ ﻧﻈﺎﻡ ﻣﻌﻠﻮﻣﺎﰐ ﺗﻨﻘﺴﻢ ﺇﱃ ﺛﻼﺙ ﺃﺟﺰﺍﺀ ﺭﺋﻴﺴﻴﺔ ﻫﻲ‪ :‬ﻭﺣﺪﺍﺕ‬
‫ﺍﻹﺩﺧﺎﻝ )‪ (in put‬ﻭﺍﳉﺰﺀ ﺍﻟﺜﺎﱐ ﻭﺣﺪﺓ ﺍﻟﺘﺸﻐﻴﻞ ﺍﳌﺮﻛﺰﻳﺔ ﻭﻣﻦ ﺃﻫﻢ ﻣﻜﻮﻧﺎ‪‬ﺎ ﺍﻟﺬﺍﻛﺮﺓ ﻭﺣﺪﺓ ﺍﳊﺴﺎﺑﺎﺕ ﻭﺍﳌﻨﻄﻖ ﻭﻭﺣﺪﺓ ﺍﻟﺘﺤﻜﻢ ﻭﺍﳉﺰﺀ ﺍﻟﺜﺎﻟﺚ‬
‫ﻭﺣﺪﺍﺕ ﺍﻹﺧﺮﺍﺝ )‪(out put units‬‬

‫‪- 35 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﳐﺘﻠﻔﺘﲔ ﺃﺣﺪﳘﺎ ﻳﺘﻤﺜﻞ ﰲ ﺍﳉﺎﻧﺐ ﺍﳌﺎﺩﻱ ﻭﺍﻵﺧﺮ ﻏﲑ ﺍﳌﺎﺩﻱ ﳑﺎ ﺃﺩﻯ ﺇﱃ ﺍﻹﺧﻔﺎﻕ ﰲ ﲢﺪﻳﺪ ﺍﳌﻔﻬﻮﻡ‬
‫ﺍﻟﺪﻗﻴﻖ ﶈﻞ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﻫﻮ ﺍﻷﻣﺮ ﺍﻟﺬﻱ ﻳﻄﺮﺡ ﺍﻟﺘﺴﺎﺅﻝ ﻋﻦ ﻣﺎ ﻫﻮ ﺑﺎﻟﻀﺒﻂ ﳏﻞ ﺍﳉﺮﳝﺔ‬
‫ﺍﻟﻌﻠﻮﻣﺎﺗﻴﺔ ﰒ ﻣﺎﻫﻲ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻪ‪.‬‬

‫ﺃﻭﻻ‪ :‬ﲢﺪﻳﺪ ﳏﻞ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ :‬ﺇﻧﻪ ﺑﺎﻟﻨﻈﺮ ﺇﱃ ﺍﻷﳘﻴﺔ ﺍﻟﱵ ﻳﻨﺒﻐﻲ ﺃﻥ ﻳﻮﺻﻒ ‪‬ﺎ ﺍﻟﺪﻭﺭ ﺍﻟﺬﻱ‬
‫ﻳﺆﺩﻳﻪ ﻧﻈﺎﻡ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻹﲤﺎﻡ ﺍﻟﻨﺸﺎﻁ ﺍﻹﺟﺮﺍﻣﻲ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻓﺈﻥ ﺫﻟﻚ ﻳﺆﺩﻱ ﺇﱃ‬
‫ﺍﺧﺘﻼﻑ ﳏﻞ ﺍﳉﺮﳝﺔ ﲝﺴﺐ ﺍﻟﺰﺍﻭﻳﺔ ﺍﻟﱵ ﻳﻨﻈﺮ ﺇﻟﻴﻬﺎ ﻭﺍﻟﺪﻭﺭ ﺍﻟﺬﻱ ﻳﻠﻌﺒﻪ ﻫﺬﺍ ﺍﳊﺎﺳﺐ ﺫﺍﺗﻪ‪ .‬ﻭﺍﻟﺬﻱ ﻻ‬
‫ﻳﻌﺪﻭﺃﻥ ﻳﻘﻮﻡ ﺑﺄﺣﺪ ﺍﻷﺩﻭﺍﺭ ﺍﻟﺘﺎﻟﻴﺔ‪ :‬ﺩﻭﺭ ﺍﻟﻀﺤﻴﺔ ﰲ ﺍﳉﺮﳝﺔ‪ ،‬ﺩﻭﺭ ﺍﶈﻴﻂ ﺃﻭ ﺍﻟﺒﻴﺌﺔ ﺍﻟﱵ ﺗﺮﺗﻜﺐ ﻓﻴﻬﺎ‬
‫ﺍﳉﺮﳝﺔ ﺃﻭ ﺩﻭﺭ ﺍﻟﻮﺳﻴﻠﺔ ﺍﻟﱵ ﺗﺮﺗﻜﺐ ﺑﻮﺍﺳﻄﺘﻬﺎ ﺍﳉﺮﳝﺔ‪ (1)،‬ﻭﻋﻠﻰ ﻫﺬﺍ ﺍﻷﺳﺎﺱ ﻓﻘﺪ ﻳﻜﻮﻥ ﺍﳊﺎﺳﺐ‬
‫ﺍﻵﱄ ﻧﻔﺴﻪ ﺃﻭ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺨﺰﻧﺔ ﻓﻴﻪ ﳏﻼ ﻟﻠﺠﺮﳝﺔ ﻭﻗﺪ ﻳﺴﺘﺨﺪﻡ ﺍﳊﺎﺳﺐ ﺫﺍﺗﻪ ﻛﺄﺩﺍﺓ ﻻﺭﺗﻜﺎﺏ‬
‫ﺍﳉﺮﳝﺔ‪ .‬ﻭﺑﺎﻟﺘﺎﱄ ﻧﻔﺮﻕ ﻫﻨﺎ ﺑﲔ ﺛﻼﺙ ﺣﺎﻻﺕ‪:‬‬

‫ﺍﳊﺎﻟﺔ ﺍﻷﻭﱃ‪ :‬ﻭﻗﻮﻉ ﺍﳉﺮﳝﺔ ﻋﻠﻰ ﺍﳌﻜﻮﻧﺎﺕ ﺍﳌﺎﺩﻳﺔ ﻟﻠﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‪:‬ﺇﻥ ﺍﻹﻋﺘﺪﺍﺀ ﻋﻠﻰ ﺍﳌﻜﻮﻧﺎﺕ‬
‫ﺍﳌﺎﺩﻳﺔ ﻟﻠﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻳﺘﺤﻘﻖ ﺇﺫﺍ ﻛﺎﻥ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻷﺟﻬﺰﺓ ﺍﳌﻠﺤﻘﺔ ﺑﻪ ﻣﻦ ﻣﻌﺪﺍﺕ‪ ،‬ﻭﻛﺎﺑﻼﺕ‪،‬‬
‫ﻭﺷﺒﻜﺎﺕ ﺍﻟﺮﺑﻂ ﻭﺁﻻﺕ ﻃﺒﺎﻋﺔ ﳏﻼ ﻟﻼﻋﺘﺪﺍﺀ‪ ،‬ﻭﺗﻘﻮﻡ ﺍﳉﺮﳝﺔ ﰲ ﻫﺬﻩ ﺍﳊﺎﻟﺔ ﺑﺈﺗﻴﺎﻥ ﺃﻱ ﻓﻌﻞ ﻣﺎﺩﻱ ﻣﻦ‬
‫ﺷﺄﻧﻪ ﺇﺧﺮﺍﺝ ﺍﳊﺎﺳﻮﺏ ﻣﻦ ﺣﻴﺎﺯﺓ ﻣﺎﻟﻜﺔ ﻭﺇﺩﺧﺎﻟﻪ ﰲ ﺣﻴﺎﺯﺓ ﺷﺨﺺ ﺁﺧﺮ‪ ،‬ﺃﻭ ﺇﺗﻼﻑ ﺍﳉﻬﺎﺯ ﻭﺗﺪﻣﲑﻩ‬
‫ﻭﻏﲑ ﺫﻟﻚ ﻣﻦ ﺍﻷﻓﻌﺎﻝ ﺍ‪‬ﺮﻣﺔ‪.‬‬

‫ﻭﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻫﻲ ﺟﺮﺍﺋﻢ ﺗﻘﻠﻴﺪﻳﺔ ﺑﺎﻋﺘﺒﺎﺭ ﺃﻥ ﻫﺬﻩ ﺍﳌﻜﻮﻧﺎﺕ ﺍﳌﺎﺩﻳﺔ ﳏﻞ ﺍﻻﻋﺘﺪﺍﺀ ﺗﺘﻤﺘﻊ ﺑﺎﳊﻤﺎﻳﺔ‬
‫ﺍﳉﺰﺍﺋﻴﺔ ﻭﻓﻖ ﺍﻟﻨﺼﻮﺹ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ‪ ،‬ﺑﺎﻋﺘﺒﺎﺭﻫﺎ ﻣﻦ ﺍﻷﻣﻮﺍﻝ ﺍﳌﺎﺩﻳﺔ ﺍﳌﻨﻘﻮﻟﺔ ﻭﺍﻟﱵ ﲣﻀﻊ ﺳﺮﻗﺘﻬﺎ ﺃﻭ ﺇﺗﻼﻓﻬﺎ‬
‫ﻟﻠﻨﺼﻮﺹ ﺍﳉﺰﺍﺋﻴﺔ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﺍﻟﻘﺎﺋﻤﺔ ﻭﻳﺴﺄﻝ ﻣﺮﺗﻜﺒﻮﻫﺎ ﲟﻮﺟﺐ ﺍﻟﻨﺼﻮﺹ ﺍﻟﻌﻘﺎﺑﻴﺔ ﺍﻟﻘﺎﺋﻤﺔ ﰲ ﻗﺎﻧﻮﻥ‬

‫‪ -‬ﺍﳌﻜﻮﻧﺎﺕ ﺍﳌﻌﻨﻮﻳﺔ )ﺍﳌﻨﻄﻘﻴﺔ( )‪ :(Software‬ﻭﻫﻲ ﳎﻤﻮﻋﺔ ﺍﻟﺘﻌﻠﻴﻤﺎﺕ ﳝﻜﻦ ﻟﻠﻨﻈﺎﻡ ﺍﺳﺘﺨﺪﺍﻣﻬﺎ ﺑﺸﻜﻞ ﻣﺒﺎﺷﺮ ﻭﻏﲑ ﻣﺒﺎﺷﺮ ﻟﻠﻮﺻﻮﻝ ﺇﱃ ﻧﺘﻴﺠﺔ‬
‫ﻣﻌﻴﻨﺔ ﻭﺗﻨﻘﺴﻢ ﻫﺬﻩ ﺍﳌﻜﻮﻧﺎﺕ ﺇﱃ ﻧﻮﻋﲔ ﺑﺮﺍﻣﺞ ﺍﻟﻨﻈﺎﻡ ﺃﻭ ﺍﻟﻜﻴﺎﻧﺎﺕ ﺍﳌﻨﻄﻘﻴﺔ ﺍﻷﺳﺎﺳﻴﺔ ﻭﺍﻟﺜﺎﱐ ﺍﻟﻜﻴﺎﻧﺎﺕ ﺍﳌﻨﻄﻘﻴﺔ ﺍﻟﺘﻄﺒﻴﻘﻴﺔ ﻭﺗﺘﻤﺜﻞ ﻋﻠﻰ ﻛﺎﻓﺔ ﺃﻧﻮﺍﻉ‬
‫ﺍﻟﺘﻮﺟﻴﻬﺎﺕ ﻭﺍﻟﺘﻌﻠﻴﻤﺎﺕ ﺍﳌﻄﻠﻮﺑﺔ ﰲ ﻣﻌﺎﳉﺔ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﻳﻠﺰﻡ ﳍﺬﻩ ﺍﳌﻜﻮﻧﺎﺕ ﻣﺼﻄﻠﺢ ﺁﺧﺮ ﻳﺴﻤﻰ ﺷﺒﻜﺔ ﺍﺗﺼﺎﻝ )‪ (Net Works‬ﻭﻫﻲ ﺳﻠﻜﻴﺔ ﻭﻻ‬
‫ﺳﻠﻜﻴﺔ ﺗﻘﻮﻡ ﺑﻌﻤﻠﻴﺔ ﺍﻟﺮﺑﻂ ﺑﲔ ﺍﻷﺟﻬﺰﺓ ﻭﺍﻷﻧﻈﻤﺔ ﺍﳌﺨﺘﻠﻔﺔ ﻭﻫﻨﺎﻙ ﻋﻨﺼﺮ ﺛﺎﻟﺚ ﻣﻜﻤﻞ ﳍﺬﻳﻦ ﺍﻟﻌﻨﺼﺮﻳﻦ ﻳﺘﻤﺜﻞ ﰲ ﺍﻟﻌﻨﺼﺮ ﺍﻟﺒﺸﺮﻱ ﻭﺍﻟﺬﻱ ﳝﻜﻦ ﺗﺴﻤﻴﺘﻪ‬
‫‪ Humanware‬ﻭﻫﻮ ﺍﻟﺬﻱ ﻳﻘﻮﻡ ﺑﺘﺸﻐﻴﻞ ﻣﻜﻮﻧﺎﺕ ﺍﻟﻨﻈﺎﻡ ‪.‬ﰲ ﻫﺬﺍ ﺍﻻﻃﺎﺭ ﺃﻧﻈﺮ ﺩ‪ .‬ﺃﲪﺪ ﺧﻠﻴﻔﺔ ﺍﳌﻠﻂ ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪.‬ﺹ ‪.28‬‬
‫) ‪ (1‬ﻣﻔﺘﺎﺡ ﺑﻮﺑﻜﺮ ﺍﳌﻄﺮﺩﻱ ﻭﺭﻗﺔ ﻣﻘﺪﻣﺔ ﺇﱃ ﺍﳌﺆﲤﺮ ﺍﻟﺜﺎﻟﺚ ﻟﺮﺅﺳﺎﺀ ﺍﶈﺎﻛﻢ ﺍﻟﻌﻠﻴﺎ ﰲ ﺍﻟﺪﻭﻝ ﺍﻟﻌﺮﺑﻴﺔ ﲜﻤﻬﻮﺭﻳﺔ ﺍﻟﺴﻮﺩﺍﻥ ﺍﳌﻨﻌﻘﺪﺓ ﰲ ‪-23‬‬
‫‪ 2012/09/25‬ﺹ ‪.12‬‬

‫‪- 36 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﻟﻌﻘﻮﺑﺎﺕ‪ ،‬ﻭﻋﻠﻰ ﻫﺬﺍ ﺍﻷﺳﺎﺱ ﻓﺈﻥ ﺍﳌﻜﻮﻧﺎﺕ ﺍﳌﺎﺩﻳﺔ ﻟﻠﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﲣﺮﺝ ﻣﻦ ﻧﻄﺎﻕ ﺍﶈﻞ ﺍﻟﺬﻱ‬
‫ﻳﻨﺼﺐ ﻋﻠﻴﻪ ﺍﻟﺴﻠﻮﻙ ﺍﻹﺟﺮﺍﻣﻲ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫ﺍﳊﺎﻟﺔ ﺍﻟﺜﺎﻧﻴﺔ‪ :‬ﻭﻗﻮﻉ ﺍﳉﺮﳝﺔ ﺑﺎﺳﺘﻌﻤﺎﻝ ﺃﻧﻈﻤﺔ ﺍﳊﺎﺳﺐ ﺍﻵﱄ‪:‬ﰲ ﻫﺬﻩ ﺍﳊﺎﻟﺔ ﻻ ﻳﻜﻮﻥ ﺍﳊﺎﺳﺐ ﺍﻵﱄ‬
‫ﳏﻼ ﺃﻭ ﻣﻮﺿﻮﻋﺎ ﻟﻠﺠﺮﳝﺔ ﻭﺇﳕﺎ ﻳﺴﺘﺨﺪﻡ ﺍﳉﺎﱐ ﺍﳊﺎﺳﺐ ﰲ ﺍﺭﺗﻜﺎﺏ ﺍﳉﺮﺍﺋﻢ‪ ،‬ﻓﻤﺎ ﻫﻮ ﺇﺫﻥ ﺇﻻ ﻭﺳﻴﻠﺔ‬
‫ﻻﺭﺗﻜﺎ‪‬ﺎ‪ ،‬ﻭﳏﻞ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﳜﺘﻠﻒ ﲝﺴﺐ ﺍﻟﺸﻲﺀ ﺍﻟﺬﻱ ﻳﻨﺼﺐ ﻋﻠﻴﻪ ﺳﻠﻮﻙ ﺍﻟﻔﺎﻋﻞ ﻭﺍﻟﺬﻱ ﻳﺸﻜﻞ‬
‫ﳏﻼ ﻟﻠﺤﻖ ﺃﻭ ﺍﳌﺼﻠﺤﺔ ﺍﶈﻤﻴﺔ‪.‬ﻭﰲ ﻫﺬﻩ ﺍﳊﺎﻟﺔ ﻧﻜﻮﻥ ﺑﺼﺪﺩ ﺟﺮﺍﺋﻢ ﺗﻘﻠﻴﺪﻳﺔ ﲝﺘﺔ ﻭﺇﳕﺎ ﺍﺳﺘﻌﻤﻠﺖ ﰲ‬
‫ﺍﺭﺗﻜﺎ‪‬ﺎ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻓﻬﻲ ﺑﺬﻟﻚ ﻟﻴﺴﺖ ﲝﺎﺟﺔ ﻟﻨﺼﻮﺹ ﻏﲑ ﻧﺼﻮﺹ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ‬
‫ﻟﺘﻨﻄﺒﻖ ﻋﻠﻴﻬﺎ‪.‬‬

‫ﺍﳊﺎﻟﺔ ﺍﻟﺜﺎﻟﺜﺔ‪ :‬ﻭﻗﻮﻉ ﺍﳉﺮﳝﺔ ﻋﻠﻰ ﺍﳌﻜﻮﻧﺎﺕ ﺍﳌﻌﻨﻮﻳﺔ ﻟﻠﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‪ :‬ﻭﺗﺘﺤﻘﻖ ﻫﺬﻩ ﺍﳊﺎﻟﺔ ﻋﻨﺪﻣﺎ‬
‫ﺗﻜﻮﻥ ﻣﻜﻮﻧﺎﺕ ﺍﳊﺎﺳﺐ ﻏﲑ ﺍﳌﺎﺩﻳﺔ ﺍﳌﺘﻤﺜﻠﺔ ﰲ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﻜﻞ ﺻﻮﺭﻫﺎ ﻣﻦ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﺍﻟﱪﺍﻣﺞ ﺍﳌﺨﺰﻧﺔ‬
‫ﰲ ﺫﺍﻛﺮﺓ ﺍﳊﺎﺳﺐ ﳏﻼ ﻟﻺﻋﺘﺪﺍﺀ‪ ،‬ﻛﺄﻥ ﻳﺘﻢ ﺳﺮﻗﺘﻬﺎ ﺃﻭ ﺇﺗﻼﻓﻬﺎ ﺃﻭ ﺗﺰﻭﻳﺮﻫﺎ ﻭﺍﻟﻌﺒﺚ ‪‬ﺎ ﻭﻏﲑ ﺫﻟﻚ ﻣﻦ‬
‫ﺍﻷﻓﻌﺎﻝ ﻏﲑ ﺍﳌﺸﺮﻭﻋﺔ‪ .‬ﻭﻫﻲ ﺍﳊﺎﻟﺔ ﺍﻟﱵ ﺗﻘﻒ ﺍﻟﻨﺼﻮﺹ ﺍﻟﻌﻘﺎﺑﻴﺔ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻗﺎﺻﺮﺓ ﻋﻠﻰ ﲢﻘﻴﻖ ﺍﳊﻤﺎﻳﺔ‬
‫ﺍﻟﻜﺎﻓﻴﺔ ﻭﺍﳌﺘﻜﺎﻣﻠﺔ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ‪.‬‬

‫ﻭﺗﺮﺗﻴﺒﺎﹰ ﻋﻠﻴﻪ ﻓﺈﻧﻪ ﻳﺒﻘﻰ ﰲ ﺍﻟﻨﻬﺎﻳﺔ ﺃﻥ ﺗﻜﻮﻥ ﺍﳌﻌﻠﻮﻣﺔ ﲟﻔﻬﻮﻣﻬﺎ ﺍﻟﻮﺍﺳﻊ)‪ (1‬ﻫﻲ ﻭﺣﺪﻫﺎ ﳏﻼ‬
‫ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﳏﻞ ﺍﻟﺪﺭﺍﺳﺔ‪ ،‬ﻭﻣﻦ ﰒ ﻓﻘﺪ ﺍﻋﺘ‪‬ﱪﺕ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﻃﺎﺋﻔﺔ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ‬
‫ﺗﻨﺼﺐ ﻋﻠﻰ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﻜﻞ ﺃﻧﻮﺍﻋﻬﺎ‪ ،‬ﺳﻮﺍﺀ ﺍﳌﺪﺧﻠﺔ ﺃﻭ ﺍﳌﻌﺎﳉﺔ ﺃﻭ ﺍﳌﺨﺰﻧﺔ ﺩﺍﺧﻞ ﺍﳉﻬﺎﺯ ﻭﺗﺴﺘﻬﺪﻑ‬
‫ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﺍﳊﻖ ﰲ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﳝﺘﺪ ﺗﻌﺒﲑ ﺍﳊﻖ ﰲ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻟﻴﺸﻤﻞ ﺍﳊﻖ ﰲ ﺍﻧﺴﻴﺎ‪‬ﺎ ﻭﺗﺪﻓﻘﻬﺎ)‪.(2‬‬

‫ﻭﺣﱴ ﳒﺰﻡ ﲞﻀﻮﻉ ﻓﻌﻞ ﺍﻹﻋﺘﺪﺍﺀ ﻋﻠﻰ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻟﻨﺼﻮﺹ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﺍﻟﺘﻘﻠﻴﺪﻱ ﺃﻡ ﺃ‪‬ﺎ‬
‫ﺗﺘﻄﻠﺐ ﻣﻌﺎﳉﺔ ﻗﺎﻧﻮﻧﻴﺔ ﺫﺍﺕ ﻃﺒﻴﻌﺔ ﺧﺎﺻﺔ ﻻﺑﺪ ﻣﻦ ﻣﻌﺮﻓﺔ ﺃﻭﻻ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ‪.‬‬

‫)‪ (1‬ﻭﺗﺸﻤﻞ ﺍﳌﻌﻠﻮﻣﺎﺕ ﲟﻔﻬﻮﻣﻬﺎ ﺍﻟﻮﺍﺳﻊ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﺍﳌﻜﻮﻧﺎﺕ ﺍﳌﻨﻄﻘﻴﺔ ﻛﺎﻟﱪﺍﻣﺞ ﺍﻟﺘﻄﺒﻴﻘﻴﺔ ﻭﺑﺮﺍﻣﺞ ﺍﻟﺘﺸﻐﻴﻞ‪.‬‬
‫)‪ (2‬ﺧﺎﻟﺪ ﳑﺪﻭﺡ ﺍﺑﺮﺍﻫﻴﻢ ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ ﺹ ‪.92‬‬

‫‪- 37 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺛﺎﻧﻴﺎ‪ :‬ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﶈﻞ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ :‬ﻟﻘﺪ ﺃﺻﺒﺤﺖ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻣﺼﺪﺭ ﻗﻮﺓ ﻭﻣﺼﺪﺭ ﺳﻠﻄﺔ‬
‫ﺣﱴ ﻗﻴﻞ ﺃﻥ ﺍﳌﻌﺮﻓﺔ ﻫﻲ ﺳﻠﻄﺔ ﻭﺃﻥ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﳌﻌﺮﻓﺔ ﻭﺣﺴﻦ ﺍﺳﺘﺨﺪﺍﻣﻬﺎ ﻋﺎﻣﻼﻥ ﺃﺳﺎﺳﻴﺎﻥ ﻣﻦ‬
‫ﻋﻮﺍﻣﻞ ﺍﻟﺘﻘﺪﻡ‪ ،‬ﻭﻟﺬﻟﻚ ﻓﺈﻥ ﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳊﺪﻳﺜﺔ ﺗﺘﻌﻠﻖ ﺑﺎﳌﻌﺮﻓﺔ ﰒ ﺍﻟﺴﻠﻄﺔ)‪.(1‬‬

‫ﻭﻧﻈﺮﺍ ﳌﺎ ﺗﺸﻐﻠﻪ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻣﻦ ﻗﻴﻤﺔ ﺍﻗﺘﺼﺎﺩﻳﺔ ﻛﺒﲑﺓ ﻛﺎﻥ ﻫﻨﺎﻙ ‪‬ﺎﻓﺖ ﻣﻦ ﻗﺒﻞ ﺍﻷﻓﺮﺍﺩ‬
‫ﻭﺍﳌﺆﺳﺴﺎﺕ ﺍﳌﺨﺘﻠﻔﺔ ﻭﻛﺬﺍ ﺍﻟﺪﻭﻝ ﻟﻠﺤﺼﻮﻝ ﻋﻠﻴﻬﺎ ﻣﻦ ﺃﺟﻞ ﺗﺴﺮﻳﻊ ﻋﻤﻠﻴﺔ ﺍﻟﺘﻘﺪﻡ ﰲ ﻛﻞ‬
‫ﺍ‪‬ﺎﻻﺕ‪ (2)،‬ﳑﺎ ﺃﺩﻯ ﺇﱃ ﺃﻥ ﺃﺻﺒﺤﺖ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺗﺘﻤﺘﻊ ﺑﻘﻴﻤﺔ ﺍﻗﺘﺼﺎﺩﻳﺔ ﻋﺎﻟﻴﺔ ﻗﺪ ﺗﻔﻮﻕ ﻗﻴﻤﺔ ﺍﻷﻣﻮﺍﻝ‬
‫ﺍﳌﺎﺩﻳﺔ‪ ،‬ﻭﺃﺻﺒﺤﺖ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﺄﺷﻜﺎﳍﺎ ﺍﳌﺘﺒﺎﻳﻨﺔ ﰲ ﺍﻟﺒﻴﺌﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺍﳍﺪﻑ ﺍﻟﺮﺋﻴﺴﻲ ﳌﺮﺗﻜﱯ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫ﺇﻻ ﺃﻥ ﻃﺒﻴﻌﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﰲ ﺣﺎﻟﺘﻬﺎ ﺍ‪‬ﺮﺩﺓ ﻣﻦ ﺍﻟﻮﺳﺎﺋﻂ ﺍﳌﺎﺩﻳﺔ ﺗﺜﲑ ﻋﺪﺓ ﻣﺸﺎﻛﻞ ﰲ ﲢﺪﻳﺪ‬
‫ﻃﺒﻴﻌﺔ ﳏﻞ ﺍﳉﺮﳝﺔ ﺑﺎﻋﺘﺒﺎﺭﻫﺎ ﳎﺮﺩ ﺇﺷﺎﺭﺍﺕ ﺃﻭ ﻧﺒﻀﺎﺕ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ ﻏﲑ ﻣﺮﺋﻴﺔ ﺗﻨﺴﺎﺏ ﻋﱪ ﺃﺟﺰﺍﺀ ﺍﻟﻨﻈﺎﻡ‬
‫ﺍﳌﻌﻠﻮﻣﺎﰐ ﻭﺷﺒﻜﺎﺕ ﺍﻹﺗﺼﺎﻝ ﺍﻟﻌﺎﳌﻴﺔ ﻭﻟﻴﺴﺖ ﺫﺍﺕ ﻛﻴﺎﻥ ﻣﺎﺩﻱ‪ .‬ﺍﻷﻣﺮ ﺍﻟﺬﻱ ﺃﺩﻯ ﺇﱃ ﺧﻠﻖ ﻣﻮﺍﻗﻒ‬
‫ﻓﻘﻬﻴﺔ ﻣﺘﺒﺎﻳﻨﺔ ﻣﻦ ﺃﺟﻞ ﲢﺪﻳﺪ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﳍﺎ‪ ،‬ﺃﻱ ﻓﻴﻤﺎ ﺇﺫﺍ ﻛﺎﻧﺖ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺗﻌﺪ ﻣﻦ ﺍﻟﻘﻴﻢ ﺍﳌﺎﻟﻴﺔ‬
‫ﺍﻟﱵ ﳝﻜﻦ ﺍﻻﻋﺘﺪﺍﺀ ﻋﻠﻴﻬﺎ‪.‬‬

‫ﻭﻗﺪ ﺍﻧﻘﺴﻢ ﺍﻟﻔﻘﻪ ﻋﻨﺪ ﺍﻹﺟﺎﺑﺔ ﻋﻠﻰ ﻫﺬﺍ ﺍﻟﺘﺴﺎﺅﻝ ﺇﱃ ﺍﲡﺎﻫﲔ‪:‬‬

‫ﺍﻻﲡﺎﻩ ﺍﻷﻭﻝ‪ :‬ﻳﺮﻓﺾ ﺃﻧﺼﺎﺭ ﻫﺬﺍ ﺍﻹﲡﺎﻫﺎﻋﺘﺒﺎﺭ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺿﻤﻦ ﺍﻟﻘﻴﻢ ﺍﳌﺎﻟﻴﺔ ﺍﻟﱵ ﳝﻜﻦ‬
‫ﺍﻹﻋﺘﺪﺍﺀ ﻋﻠﻴﻬﺎ‪ ،‬ﺫﻟﻚ ﺃﻧﻪ ﻣﻦ ﺧﺼﺎﺋﺺ ﺍﻟﻘﻴﻢ ﺍﳌﺎﻟﻴﺔ ﺃﻥ ﺗﻜﻮﻥ ﻗﺎﺑﻠﺔ ﻟﻠﺘﻤﻠﻚ‪ ،‬ﻭﻳﺘﺮﺗﺐ ﻋﻠﻰ ﺫﻟﻚ ﺃﻥ‬
‫ﺍﻷﺷﻴﺎﺀ ﺍﻟﱵ ﳝﻜﻦ ﺍﻹﺳﺘﺌﺜﺎﺭ ‪‬ﺎ ﻫﻲ ﻭﺣﺪﻫﺎ ﺍﻟﱵ ﺗﺪﺧﻞ ﰲ ﻋﺪﺍﺩ ﺍﻟﻘﻴﻢ ﺍﳌﺎﻟﻴﺔ‪ .‬ﺃﻣﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﳌﺎ ﳍﺎ ﻣﻦ‬
‫ﻃﺒﻴﻌﺔ ﻣﻌﻨﻮﻳﺔ ﻓﺈﻧﻪ ﻻ ﳝﻜﻦ ﺍﻹﺳﺘﺌﺜﺎﺭ ‪‬ﺎ ﻭﻣﻦ ﰒ ﻓﻼ ﳝﻜﻦ ﺇﺩﺭﺍﺟﻬﺎ ﰲ ﳎﻤﻮﻋﺔ ﺍﻟﻘﻴﻢ ﺍﳌﺎﻟﻴﺔ ﺍﻟﱵ ﲢﻀﻰ‬
‫ﺑﺎﳊﻤﺎﻳﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺇﻻ ﺇﺫﺍ ﰎ ﺍﻟﺘﻤﻜﻦ ﻣﻦ ﺍﻹﺳﺘﺌﺜﺎﺭ ‪‬ﺎ ﻋﻦ ﻃﺮﻳﻖ ﺣﻘﻮﻕ ﺍﳌﻠﻜﻴﺔ ﺍﻷﺩﺑﻴﺔ ﺃﻭ ﺍﻟﻔﻨﻴﺔ ﺃﻭ‬
‫ﺍﻟﺼﻨﺎﻋﻴﺔ‪ .‬ﻭﻟﻜﻦ ﻭﻧﻈﺮﺍ ﻟﻠﻘﻴﻤﺔ ﺍﻻﻗﺘﺼﺎﺩﻳﺔ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﺍﻟﱵ ﱂ ﻳﻜﻦ ﻷﻧﺼﺎﺭ ﻫﺬﺍ ﺍﻹﲡﺎﻩ ﺇﻧﻜﺎﺭﻫﺎ‪،‬‬
‫ﺃﺩﻯ ﺑﺎﻟﺒﻌﺾ ﺇﱃ ﺇﺩﺧﺎﻝ ﺍﳌﻌﻠﻮﻣﺎﺕ ﰲ ﻃﺎﺋﻔﺔ ﺍﳌﻨﺎﻓﻊ )ﺍﳋﺪﻣﺎﺕ ‪ ،(Les services‬ﻓﻠﻠﻤﻌﻠﻮﻣﺎﺕ ﰲ‬
‫ﺭﺃﻱ ﺃﻧﺼﺎﺭ ﻫﺬﺍ ﺍﻹﲡﺎﻩ ﻋﻼﻗﺔ ﻣﺒﺎﺷﺮﺓ ﺑﻔﻜﺮﺓ ﺍﳌﻨﻔﻌﺔ ﺃﻭ ﺍﳋﺪﻣﺔ‪ ،‬ﺫﻟﻚ ﺃﻥ ﻧﺸﺄﺓ ﺍﳌﻌﻠﻮﻣﺔ ﻏﺎﻟﺒﺎ ﻣﺎ‬

‫)‪ (1‬ﺣﺴﺐ ﻋﻤﺮﻭ‪ .‬ﲪﺎﻳﺔ ﺍﳊﺮﻳﺎﺕ ﰲ ﻣﻮﺍﺟﻬﺔ ﻧﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ﺍﻟﻘﺎﻫﺮﺓ ‪ 2000‬ﺹ ‪.30‬‬
‫)‪ (2‬ﻼ ﻋﺒﺪ ﺍﻟﻘﺎﺩﺭ ﺍﳌﻮﻣﲏ ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ ‪.99‬‬

‫‪- 38 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺗﻜﻮﻥ ﺍﺳﺘﻨﺎﺩ‪‬ﺍ ﺇﱃ ﻋﻤﻞ ﺳﺎﺑﻖ ﻋﻠﻴﻬﺎ‪ ،‬ﻭﻣﻦ ﺟﻬﺔ ﺃﺧﺮﻯ ﻓﺈﻥ ﺍﻹﳌﺎﻡ ﺑﺎﳌﻌﻠﻮﻣﺔ ﻳﺴﺎﻋﺪ ﺑﺼﻔﺔ ﻋﺎﻣﺔ ﻋﻠﻰ‬
‫ﺍﻟﻘﻴﺎﻡ ﺑﻌﻤﻞ ﺑﺼﻮﺭﺓ ﺃﻳﺴﺮ ﻭﺃﺳﺮﻉ‪ ،‬ﻟﺬﺍ ﳝﻜﻦ ﰲ ﻫﺬﻩ ﺍﳊﺎﻟﺔ ﺍﻋﺘﺒﺎﺭ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻛﺨﺪﻣﺔ ﺗﻘﻮﻡ ﺑﺎﳌﺎﻝ‪.‬‬

‫ﻭﻣﻊ ﺫﻟﻚ ﻓﺈﻥ ﺍﻟﻔﻘﻪ ﻭﺣﱴ ﺍﻟﻘﻀﺎﺀ ﺍﻟﻔﺮﻧﺴﻲ ﻣﻦ ﺃﺟﻞ ﺇﳚﺎﺩ ﲪﺎﻳﺔ ﻗﺎﻧﻮﻧﻴﺔ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﻣﻦ‬
‫ﺍﻟﻨﺎﺣﻴﺔ ﺍﳌﺪﻧﻴﺔ ﰲ ﺣﺎﻝ ﺍﻹﺳﺘﻼﺀ ﻏﲑ ﺍﳌﺸﺮﻭﻉ ﻋﻠﻴﻬﺎ ﺣﺎﻭﻝ ﺍﻹﺳﺘﻌﺎﻧﺔ ﺑﺪﻋﻮﻯ ﺍﳌﻨﺎﻓﺴﺔ ﻏﲑ‬
‫ﺍﳌﺸﺮﻭﻋﺔ‪،‬ﰒ ﺗﺄﺳﻴﺲ ﺍﳋﻄﺄ ﻋﻠﻰ ﻧﻈﺮﻳﺔ ﺍﻟﺘﺼﺮﻓﺎﺕ ﺍﻟﻄﻔﻴﻠﻴﺔ ﰒ ﻋﻠﻰ ﻧﻈﺮﻳﺔ ﺍﻹﺛﺮﺍﺀ ﺑﻼ ﺳﺒﺐ ﻭﺃﺧﲑﺍ‬
‫ﻋﻠﻰ ﻓﻜﺮﺓ ﺍﳌﺴﺆﻭﻟﻴﺔ ﺍﻟﺘﻘﺼﲑﻳﺔ)‪.(1‬‬

‫ﺍﻹﲡﺎﻩ ﺍﻟﺜﺎﱐ‪ :‬ﻳﺮﻯ ﺃﻧﺼﺎﺭ ﻫﺬﺍ ﺍﻹﲡﺎﻩ ﺃﻥ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺗﻌﺪ ﺃﻣﻮﺍﻻ ﻣﻨﻘﻮﻟﺔ‪ ،‬ﻭﺃﻧﻪ ﳝﻜﻦ ﺗﻘﻮﳝﻬﺎ‬
‫ﺑﺎﳌﺎﻝ ﺇﻧﻄﻼﻗﺎ ﻣﻦ ﺍﻟﻘﻴﻤﺔ ﺍﻹﻗﺘﺼﺎﺩﻳﺔ ﳍﺎ‪ (2)،‬ﻭﺑﺎﻟﺘﺎﱄ ﺗﺼﺢ ﺃﻥ ﺗﻜﻮﻥ ﳏﻼ ﻟﻠﺤﻘﻮﻕ ﺍﳌﺎﻟﻴﺔ ﻭﻋﻠﻰ‬
‫ﺍﻷﺧﺺ ﺣﻖ ﺍﳌﻠﻜﻴﺔ ﻋﻠﻰ ﺃﺳﺎﺱ ﺇﻣﻜﺎﻧﻴﺔ ﺍﺳﺘﻐﻼﳍﺎ ﰲ ﲢﻘﻴﻖ ﻓﻮﺍﺋﺪ ﻣﺎﺩﻳﺔ ﻭﳚﻮﺯ ﺑﺬﻟﻚ ﺃﻥ ﺗﺮﺩ ﻋﻠﻴﻬﺎ‬
‫ﲨﻴﻊ ﺃﻧﻮﺍﻉ ﺍﻟﺘﻌﺎﻣﻼﺕ ﻭﺗﻜﻮﻥ ﳏﻼ ﻟﻠﺤﻤﺎﻳﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﳌﺪﻧﻴﺔ ﻭﺍﳉﺰﺍﺋﻴﺔ ﺑﺎﻋﺘﺒﺎﺭﻫﺎ ﻣﺎﻻ‪ ،‬ﻭﻳﺴﺘﻮﻱ ﰲ‬
‫ﺫﻟﻚ ﺃﻥ ﺗﻜﻮﻥ ﻣﺒﺘﻜﺮﺓ ﺃﻡ ﻏﲑ ﻣﺒﺘﻜﺮﺓ‪ ،‬ﻓﺈﺫﺍ ﻛﺎﻧﺖ ﻣﺒﺘﻜﺮﺓ ﻓﻬﻲ ﳏﻤﻴﺔ ﲟﻮﺟﺐ ﻗﺎﻧﻮﻥ ﲪﺎﻳﺔ ﺍﳌﻠﻜﻴﺔ‬
‫ﺍﻟﻔﻜﺮﻳﺔ ﻭﺇﺫﺍ ﱂ ﺗﻜﻦ ﻛﺬﻟﻚ ﻓﺘﻜﻮﻥ ﳏﻤﻴﺔ ﻃﺒﻘﺎ ﻟﻠﻘﻮﺍﻋﺪ ﺍﻟﻌﺎﻣﺔ‪.‬‬

‫)‪ (1‬ﻓﻘﺪ ﰎ ﺍﻟﻠﺠﻮﺀ ﺃﻭﻻ ﺇﱃ ﺇﺩﺭﺍﺝ ﺍﳋﻄﺄ ﺍﻟﻨﺎﺟﻢ ﻋﻦ ﺍﻻﺳﺘﻴﻼﺀ ﻏﲑ ﻣﺸﺮﻭﻉ ﻋﻠﻰ ﺍﳌﻌﻠﻮﻣﺎﺕ ﰲ ﺇﻃﺎﺭ ﺩﻋﻮﻯ ﺍﳌﻨﺎﻓﺴﺔ ﻏﲑ ﻣﺸﺮﻭﻋﺔ‪،‬ﻓﺎﳋﻄﺄ ﰲ ﺇﻃﺎﺭ ﻫﺬﻩ‬
‫ﺍﻟﺪﻋﻮﻯ ﳚﺪ ﺃﺳﺎﺳﻪ ﰲ ﺍﻟﻈﺮﻭﻑ ﺍﶈﻴﻄﺔ ﺑﺎﻻﺳﺘﻴﻼﺀ ﻋﻠﻰ ﺍﳌﻌﻠﻮﻣﺔ ﻭﻟﻴﺲ ﰲ ﺍﻻﺳﺘﻴﻼﺀ ﺫﺍﺗﻪ‪ .‬ﻭﻟﺬﻟﻚ ﻣﻦ ﺃﺟﻞ ﺗﻔﺎﺩﻱ ﺍﻻﻋﺘﺮﺍﻑ ﲝﻖ ﺍﻹﺳﺘﺌﺜﺎﺭ ﻋﻠﻰ‬
‫ﺍﳌﻌﻠﻮﻣﺔ‪ .‬ﻷﻥ ﺍﻹﻋﺘﺮﺍﻑ ﺑﺎﳋﻄﺄ ﰲ ﺫﺍﺗﻪ ﻳﻌﲏ ﻗﺎﺑﻠﻴﺔ ﺍﳌﻌﻠﻮﻣﺔ ﻟﻼﺳﺘﺌﺜﺎﺭ ‪‬ﺎ ﻭﻫﻮ ﻣﺎ ﻳﺮﻓﻀﻪ ﺃﻧﺼﺎﺭ ﻫﺬﺍ ﺍﻹﲡﺎﻩ ﻭﻗﺪ ﺍﺳﺘﻨﺪ ﻫﺬﺍ ﺍﻟﺮﺃﻱ ﺇﱃ ﺍﳌﺒﺪﺃ ﺍﻟﺬﻱ ﺃﻗﺮﺗﻪ‬
‫ﳏﻜﻤﺔ ﺍﻟﻨﻘﺾ ﺍﻟﻔﺮﻧﺴﻴﺔ ﰲ ﺣﻜﻤﻬﺎ ﺍﻟﺼﺎﺩﺭ ﰲ ‪ 1978/10/03‬ﰲ ﺷﺄﻥ ﺍﻟﻘﻀﻴﺔ ﺍﻟﱵ ﺗﺘﻠﺨﺺ ﻭﻗﺎﺋﻌﻬﺎ ﺃﻧﻪ ﲤﻜﻨﺖ ﺃﺣﺪ ﺍﳌﺆﺳﺴﺎﺕ ﺃﺛﻨﺎﺀ ﺇﺟﺮﺍﺀ‬
‫ﻣﻔﺎﻭﺿﺎﺕ ﻣﻊ ﺃﺣﺪ ﺍﻷﺷﺨﺎﺹ ﻣﻦ ﺍﻟﺘﻌﺮﻑ ﻋﻠﻰ ﺑﻌﺾ ﺍﻷﻓﻜﺎﺭ ﺍﻟﺘﻘﻨﻴﺔ ﺍﻟﱵ ﺗﻮﺻﻞ ﺇﻟﻴﻬﺎ ﻭﱂ ﻳﻘﻢ ﺑﺘﺴﺠﻴﻠﻬﺎ ﺑﻌﺪ‪ ،‬ﻭﳌﺎ ﻛﺎﻧﺖ ﺍﳌﻔﺎﻭﺿﺎﺕ ﱂ ﺗﻨﺘﻪ ﺑﻌﺪ ﺇﱃ‬
‫ﺇﺑﺮﺍﻡ ﺍﻟﻌﻘﺪ ﺑﻴﻨﻬﺎ ﻓﻘﺪ ﻗﺎﻣﺖ ﺍﳌﺆﺳﺴﺔ ﺑﺎﻻﺳﺘﻌﺎﻧﺔ ‪‬ﺬﻩ ﺍﻷﻓﻜﺎﺭ ﰲ ﻋﻤﻠﻬﺎ‪ .‬ﻓﺄﺻﺪﺭﺕ ﺍﶈﻜﻤﺔ ﺿﺪ ﺍﳌﺆﺳﺴﺔ ﻣﻌﺘﱪﺓ ﺃﻥ ﺍﻟﻐﺎﻳﺔ ﻣﻦ ﺩﻋﻮﻯ ﺍﳌﻨﺎﻓﺴﺔ ﻏﲑ‬
‫ﻣﺸﺮﻭﻋﺔ ﻫﻲ ﺗﺄﻣﲔ ﺍﳊﻤﺎﻳﺔ ﻟﻜﻞ ﻣﻦ ﻻ ﻳﺴﺘﻄﻴﻊ ﺃﻥ ﻳﻨﺘﻔﻊ ﲝﻖ ﺍﺳﺘﺌﺜﺎﺭﻱ ﻭﰲ ﺣﻜﻢ ﺁﺧﺮ ﺻﺎﺩﺭ ﻋﻦ ﳏﻜﻤﺔ ﺍﻟﻨﻘﺾ ﺍﻟﻔﺮﻧﺴﻴﺔ ﺃﻗﺮﺕ ﺍﶈﻜﻤﺔ ﺑﻮﺟﻮﺩ ﺧﻄﺄ‬
‫ﰲ ﻭﺍﻗﻌﺔ ﺍﻹﺳﺘﺨﺪﺍﻡ ﻏﲑ ﺍﳌﺸﺮﻭﻉ ﳌﻌﻠﻮﻣﺔ ﲣﺺ ﺍﻟﻐﲑ ﻭﺑﺪﻭﻥ ﺍﻹﺣﺎﻟﺔ ﻋﻠﻰ ﺩﻋﻮﻯ ﺍﳌﻨﺎﻓﺴﺔ ﻏﲑ ﺍﳌﺸﺮﻭﻋﺔ ﻭﺍﻟﱵ ﱂ ﺗﺘﻮﺍﻓﺮ ﺷﺮﻭﻃﻬﺎ‪ ،‬ﻭﺗﺘﻠﺨﺺ ﻭﻗﺎﺋﻊ ﻫﺬﻩ‬
‫ﺍﻟﻘﻀﻴﺔ ﰲ ﺗﻘﺪﻡ ﺇﺣﺪﻯ ﺍﳌﺆﺳﺴﺎﺕ ﺑﻄﻠﺐ ﺇﱃ ﺇﺣﺪﻯ ﺍﳌﺆﺳﺴﺎﺕ ﺍﳌﺘﺨﺼﺼﺔ ﺑﺈﺟﺮﺍﺀ ﺩﺭﺍﺳﺔ ﺧﺎﺻﺔ ﳌﺨﻔﻀﻠﻠﺴﺮﻋﺔ ﻳﺮﺍﻋﻰ ﻓﻴﻪ ﺑﻌﺾ ﺍﻟﻀﻮﺍﺑﻂ ﺍﻟﺘﻘﻨﻴﺔ ﺇﻻ‬
‫ﺃﻥ ﺍﳌﺆﺳﺴﺔ ﺍﻷﻭﱃ ﻗﺎﻣﺖ ﺑﺪﻭﻫﺎ ﺇﱃ ﺗﺴﻠﻴﻢ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺼﺎﻣﻴﻢ ﺇﱃ ﻣﺆﺳﺴﺔ ﺛﺎﻟﺜﺔ‪ ،‬ﻭﻗﺪ ﺗﻌﺪﺩﺕ ﺍﶈﺎﻭﻻﺕ ﻣﻦ ﺟﺎﻧﺐ ﺍﻟﻔﻘﻪ ﻟﺘﺤﺪﻳﺪ ﺍﳌﻌﻴﺎﺭ ﺍﻟﺬﻱ ﺍﻋﺘﻤﺪﺗﻪ‬
‫ﺍﶈﻜﻤﺔ ﰲ ﺣﻜﻤﻬﺎ ﺍﻟﺴﺎﺑﻖ ﻟﺘﱪﻳﺮ ﺍﳋﻄﺄ ﻓﺒﻴﻨﻤﺎ ﺫﻫﺐ ﺍﻟﺒﻌﺾ ﺇﱃ ﺗﱪﻳﺮ ﻫﺬﺍ ﺍﳋﻄﺄ ﻋﻠﻰ ﺃﺳﺎﺱ ﺍﻟﺘﻄﺒﻴﻖ ﺍﳌﻮﺳﻊ ﻟﻨﻈﺮﻳﺔ ﺍﻟﺘﺼﺮﻓﺎﺕ ﺍﻟﻄﻔﻴﻠﻴﺔ‪.‬‬
‫ﺇﻻ ﺃﻥ ﻫﺬﺍ ﺍﻟﺮﺃﻱ ﻗﻮﺑﻞ ﺑﺎﻟﺮﻓﺾ ﻣﻦ ﺍﻟﺒﻌﺾ ﺍﻵﺧﺮ ﺣﻴﺚ ﺃﻥ ﻭﺟﻮﺩ ﺍﳋﻄﺄ ﺍﺳﺘﻨﺎﺩﺍ ﺇﱃ ﻫﺬﻩ ﺍﻟﻨﻈﺮﻳﺔ ﻳﻌﲏ ﺍﻻﻋﺘﺮﺍﻑ ﲝﻖ ﺍﻻﺳﺘﺌﺜﺎﺭ ﻋﻠﻰ ﺍﳌﻌﻠﻮﻣﺔ‪ .‬ﻭﻫﻮ‬
‫ﻣﺎﻻ ﻳﻘﺮﻩ ﺟﺎﻧﺐ ﻛﺒﲑ ﻣﻦ ﺍﻟﻔﻘﻪ‪ .‬ﻭﻫﻮ ﻣﺎ ﺃﺩﻯ ﺍﻟﺒﻌﺾ ﺇﱃ ﺗﺄﺳﻴﺲ ﻫﺬﺍ ﺍﳋﻄﺄ ﻋﻠﻰ ﻧﻈﺮﻳﺔ ﺍﻹﺛﺮﺍﺀ ﺑﻼ ﺳﺒﺐ ﺑﻮﺻﻔﻪ ﺗﻄﺒﻴﻖ ﺧﺎﺹ ﳍﺎ ﺇﻻ ﺍﻥ ﺍﳊﻜﻢ ﱂ‬
‫ﻳﺸﺮ ﺇﻃﻼﻗﺎ ﺇﱃ ﺗﻄﺒﻴﻖ ﻫﺬﻩ ﺍﻟﻨﻈﺮﻳﺔ ﻭﳍﺬﺍ ﺍﻟﺴﺒﺐ ﺫﻫﺐ ﺍﻷﺳﺘﺎﺫ » ‪ « Debois‬ﺇﱃ ﺍﻟﻘﻮﻝ ﺑﺄﻥ ﺍﳋﻄﺄ ﰲ ﻫﺬﻩ ﺍﳊﺎﻟﺔ ﻳﻜﻮﻥ ﻋﻠﻰ ﺃﺳﺎﺱ ﺍﳌﺴﺆﻭﻟﻴﺔ‬
‫ﺍﳌﺪﻧﻴﺔ ﻭﻫﻮ ﻣﺎ ﻳﺮﺍﻩ ﺍﻟﺒﻌﺾ ﺍﻷﺳﺎﺱ ﺍﻟﺬﻱ ﺍﺭﺗﻜﺰ ﻋﻠﻴﻪ ﺍﳊﻜﻢ ﺍﳌﺘﻘﺪﻡ ﶈﻜﻤﺔ ﺍﻟﻨﻘﺾ ﺍﻟﻔﺮﻧﺴﻴﺔ ﺣﻴﺚ ﺃﺳﺲ ﺍﳋﻄﺄ ﻋﻠﻰ ﻓﻜﺮﺓ ﺍﳌﺴﺆﻭﻟﻴﺔ ﺍﻟﺘﻘﺼﲑﻳﺔ‪.‬‬
‫)‪(2‬ﺃﺷﲑ ﺇﻟﻴﻪ ﻟﺪﻯ‪ :‬ﳏﻤﺪ ﺣﺴﺎﻡ ﻟﻄﻔﻲ‪ ،‬ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﺗﻘﻊ ﻋﻠﻰ ﺍﳊﺎﺳﺒﺎﺕ ﺃﻭ ﺑﻮﺍﺳﻄﺘﻬﺎ‪.‬ﲝﻴﺚ ﻣﻘﺪﻡ ﺇﱃ ﺍﳌﺆﲤﺮ ﺍﻟﺴﺎﺩﺱ ﻟﻠﺠﻤﻌﻴﺔ ﺍﳌﺼﺮﻳﺔ ﻟﻠﻘﺎﻧﻮﻥ‬
‫ﺍﳉﻨﺎﺋﻲ‪ .‬ﺍﻟﻘﺎﻫﺮﺓ ﺧﻼﻝ ﺍﻟﻔﺘﺮﺓ ‪.1993/10/28-25‬‬

‫‪- 39 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻭﺃﻥ ﻣﺎ ﺩﻓﻊ ﺑﺎﻟﻔﻘﻪ ﺍﳊﺪﻳﺚ ﺇﱃ ﺍﻟﺒﺤﺚ ﻋﻦ ﻣﻌﻴﺎﺭ ﺁﺧﺮ ﻏﲑ ﻣﻌﻴﺎﺭ ﻣﺎﺩﻳﺔ ﺍﳌﺎﻝ ﻫﻮ ﺍﻟﺘﻄﻮﺭﺍﺕ‬
‫ﺍﻟﺴﺮﻳﻌﺔ ﺍﻟﱵ ﺣﺪﺛﺖ ﰲ ﳎﺎﻝ ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﻟﱵ ﻻ ﺗﺰﺍﻝ ﻣﺴﺘﻤﺮﺓ ﺣﱴ ﺍﻵﻥ ﻭﺍﻟﱵ ﺟﻌﻠﺖ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ ﺗﻨﺘﺸﺮ ﺑﺼﻮﺭﺓ ﻛﺒﲑﺓ ﰲ ﳎﺎﻝ ﺍﳌﻌﺎﻣﻼﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺍﳌﺨﺘﻠﻔﺔ‪ ،‬ﳑﺎ ﺃﺩﻯ ﰲ ﺑﻌﺾ ﺍﻷﺣﻴﺎﻥ‬
‫ﺇﱃ ﺍﺭﺗﻔﺎﻉ ﻗﻴﻤﺘﻬﺎ ﻋﻦ ﺍﻷﻣﻮﺍﻝ ﺍﳌﺎﺩﻳﺔ‪ ،‬ﻟﺬﻟﻚ ﻓﻘﺪ ﰎ ﺍﻟﻠﺠﻮﺀ ﺇﱃ ﻣﻌﻴﺎﺭ ﺍﻟﻘﻴﻤﺔ ﺍﻹﻗﺘﺼﺎﺩﻳﺔ ﻟﻠﺸﻲﺀ‬
‫ﺣﻴﺚ ﻳﻌﺘﱪ ﺍﻟﺸﻲﺀ ﻣﺎﻻ ﻟﻴﺲ ﺑﺎﻟﻨﻈﺮ ﺇﱃ ﻛﻴﺎﻧﻪ ﺍﳌﺎﺩﻱ ﺍﳌﻠﻤﻮﺱ‪ ،‬ﻭﺇﳕﺎ ﺑﺎﻟﻨﻈﺮ ﺇﱃ ﺍﻟﻘﻴﻢ ﺍﻻﻗﺘﺼﺎﺩﻳﺔ‬
‫ﻟﻪ)‪.(1‬‬

‫ﻭﺣﺴﺐ ﻣﺎ ﺗﻘﺪﻡ ﻓﺈﻧﻪ ﻣﻦ ﺍﻟﻮﺍﺿﺢ ﺃﻥ ﺍﻵﺭﺍﺀ ﻗﺪ ﺗﻀﺎﺭﺑﺖ ﺣﻮﻝ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ‪.‬‬
‫ﻓﺎﻹﲡﺎﻩ ﺍﻟﻘﺪﱘ ﺭﺑﻂ ﻭﺻﻒ ﺍﳌﺎﻝ ﺑﻌﻨﺼﺮﻳﻦ ﻫﺎﻣﲔ ﻳﻜﻮﻥ ﰲ ﺍﺟﺘﻤﺎﻋﻬﻤﺎ ﺗﺒﻠﻮﺭ ﺍﳌﻔﻬﻮﻡ ﺍﻟﺘﻘﻠﻴﺪﻱ ﻟﻠﻤﺎﻝ‬
‫ﻭﳘﺎ ﻋﻨﺼﺮ ﺍﳌﺎﺩﻳﺔ ﻭﻋﻨﺼﺮ ﺍﻟﻘﻴﻤﺔ‪ ،‬ﻓﺈﺫﺍ ﺗﻮﺍﻓﺮ ﺃﺣﺪﳘﺎ ﺩﻭﻥ ﺍﻵﺧﺮ ﻻ ﻳﺘﺤﻘﻖ ﰲ ﺍﻟﺸﻲﺀ ﻭﺻﻒ ﺍﳌﺎﻝ‬
‫ﻃﺒﻘﺎ ﻟﻠﻤﻔﻬﻮﻡ ﺍﻟﺘﻘﻠﻴﺪﻱ‪ .‬ﻭﺇﻥ ﻛﺎﻧﺖ ﺍﻟﻨﻈﺮﺓ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﺗﻐﻠﺐ ﺍﳌﻨﻈﻮﺭ ﺍﳌﺎﺩﻱ ﻋﻠﻰ ﺍﳌﻨﻈﻮﺭ ﺍﻟﻘﻴﻤﻲ‬
‫ﻟﻸﺷﻴﺎﺀ ﻓﺈﻥ ﺍﻻﲡﺎﻩ ﺍﳊﺪﻳﺚ ﰲ ﺍﻟﻔﻘﻪ ﻳﺬﻫﺐ ﺇﱃ ﺍﻷﺧﺬ ﺑﺎﳌﻔﻬﻮﻡ ﺍﳌﻮﺳﻊ ﻟﻠﻤﺎﻝ ﻟﻴﺸﻤﻞ ﺇﱃ ﺟﺎﻧﺐ‬
‫ﺍﻷﺷﻴﺎﺀ ﺍﳌﺎﺩﻳﺔ‪ ،‬ﺗﻠﻚ ﺍﻷﺷﻴﺎﺀ ﻏﲑ ﺍﳌﺎﺩﻳﺔ ﺃﺧﺬﹰﺍ ﰲ ﺍﻹﻋﺘﺒﺎﺭ ﻗﻴﻤﺘﻬﺎ ﺍﻹﻗﺘﺼﺎﺩﻳﺔ ﻭﻫﻮ ‪‬ﺬﺍ ﺍﻻﲡﺎﻩ ﻳﻮﺍﻛﺐ‬
‫) ‪(2‬‬
‫ﺍﻟﻘﻴﻢ ﺍﻟﱵ ﺃﻓﺮﺯ‪‬ﺎ ﺍﻟﺜﻮﺭﺓ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫ﻭﻫﻜﺬﺍ ﻧﺮﻯ ﺃﻥ ﺍﻟﻨﻈﻢ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﻘﺎﺋﻤﺔ ﺍﻟﱵ ﺗﺘﻨﺎﻭﻝ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﺍﻟﱵ ﺗﻘﻊ ﻋﻠﻰ ﺍﻷﻣﻮﺍﻝ‬
‫ﻭﺿﻌﺖ ﰲ ﻇﺮﻭﻑ ﲣﺘﻠﻒ ﻋﻦ ﺍﻟﻈﺮﻭﻑ ﺍﳊﺎﻟﻴﺔ ﺍﻟﱵ ﺧﻠﻔﺘﻬﺎ ﺛﻮﺭﺓ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ‪،‬ﻭﺍﻟﱵ ﺃﻓﺮﺯﺕ‬

‫)‪ (1‬ﻗﺎﻝ ﻓﻘﻴﻪ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳌﺪﱐ ﺍﻟﻔﺮﻧﺴﻲ ‪ Carbonnier‬ﺃﻥ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﺬﻱ ﻳﺮﻓﺾ ﺇﺳﺒﺎﻍ ﺻﻔﺔ ﺍﳌﺎﻝ ﻋﻠﻰ ﺷﻲﺀ ﻟﻪ ﻗﻴﻤﺔ ﺍﻗﺘﺼﺎﺩﻳﺔ ﻗﺎﻧﻮﻥ ﻳﻨﻔﺼﻞ ﲤﺎﻣﺎ ﻋﻦ‬
‫ﺍﻟﻮﺍﻗﻊ‪ .‬ﺃﻧﻈﺮ ﰲ ﺫﻟﻚ‪ :‬ﺍﻟﺴﻴﺪ ﻋﺘﻴﻖ‪ ،‬ﺟﺮﺍﺋﻢ ﺍﻻﻧﺘﺮﻧﺖ‪ ،‬ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔﺍﻟﻘﺎﻫﺮﺓ ‪.2000.‬ﺹ ‪.91‬ﻛﻤﺎ ﻳﺮﻯ ﺍﻟﺴﻨﻬﻮﺭﻱ ﺍﻧﻪ ﺇﺫﺍ ﻛﺎﻥ ﺍﻟﺘﻄﻮﺭ ﻗﺪ ﺯﺍﺩ‬
‫ﻣﻦ ﻋﺪﺩ ﺍﻷﺷﻴﺎﺀ ﺍﳌﻌﻨﻮﻳﺔ ﲝﻴﺚ ﺗﻔﻮﻕ ﺑﻌﻀﻬﺎ ﻗﻴﻤﺔ ﺍﻷﺷﻴﺎﺀ ﺍﳌﺎﺩﻳﺔ‪ ،‬ﻓﺈﻥ ﺍﻷﻣﺮ ﻳﺴﺘﺪﻋﻲ ﺇﻋﺎﺩﺓ ﺍﻟﻨﻈﺮ ﰲ ﺣﺼﺮ ﺍﻷﻣﻮﺍﻝ ﻋﻠﻰ ﺍﻷﺷﻴﺎﺀ ﺍﳌﺎﺩﻳﺔ ﻭﺣﺪﻫﺎ‬
‫ﻭﺍﻟﺒﺤﺚ ﻋﻦ ﻣﻌﻴﺎﺭ ﺁﺧﺮ ﻏﲑ ﻃﺒﻴﻌﺔ ﺍﻟﺸﻲﺀ ﺍﻟﺬﻱ ﻳﺮﺩ ﻋﻠﻴﻪ ﺍﳊﻖ ﺍﳌﺎﱄ ﺣﱴ ﳝﻜﻦ ﺇﺻﺒﺎﻍ ﺻﻔﺔ ﺍﳌﺎﻝ ﻋﻠﻰ ﺍﻟﺸﻲﺀ ﺍﳌﻌﻨﻮﻱ ﺍﻧﻈﺮ ﺩ‪ .‬ﺍﻟﺴﻨﻬﻮﺭﻱ ﺍﻟﻮﺳﻴﻂ‬
‫ﺍﳉﺰﺀ ﺍﻟﺜﺎﻣﻦ‪ ،‬ﺹ ‪72‬‬
‫ﻭﻳﺬﻫﺐ ﺍﻷﺳﺘﺎﺫ ‪ Catala‬ﺇﱃ ﺃﻥ ﺍﳌﻌﻠﻮﻣﺎﺕ ﰲ ﺫﺍ‪‬ﺎ ﺗﻌﺪ ﻗﻴﻤﺔ ﻣﺎﻟﻴﺔ ﺃﺷﺒﻪ ﺑﺎﻟﺴﻠﻌﺔ ﻓﻬﻲ ﻧﺘﺎﺝ ﻟﻌﻤﻞ ﺑﺸﺮﻱ ﺗﻨﺘﻤﻲ ﲝﺴﺐ ﺍﻷﺻﻞ ﺇﱃ ﻣﻦ ﳛﻮﺯ ﺍﻟﻌﻨﺎﺻﺮ‬
‫ﺍﳌﻜﻮﻧﺔ ﳍﺎ ﺑﻄﺮﻳﻘﺔ ﻣﺸﺮﻭﻋﺔ ﰒ ﺑﻀﻌﻬﺎ ﰲ ﺷﻜﻞ ﻣﺎ ﺗﻜﻮﻥ ﺻﺎﳊﺔ ﻟﻺﻃﻼﻉ ﻋﻠﻴﻬﺎ‪ .‬ﻭﺗﺒﻠﻴﻐﻬﺎ ﺑﺸﻜﻞ ﻣﻔﻬﻮﻡ ﻭﺑﺘﺤﻘﻖ ﻫﺬﻳﻦ ﺍﻟﺸﺮﻃﲔ ﻓﺈﻥ ﺍﳌﻌﻠﻮﻣﺎﺕ‬
‫ﺗﺼﺒﺢ ﻗﻴﻤﺔ ﻗﺎﺑﻠﺔ ﻟﻠﺘﻤﻠﻚ ﰲ ﺫﺍ‪‬ﺎ ﺑﻐﺾ ﺍﻟﻨﻈﺮ ﻋﻦ ﺍﻟﻮﺳﻴﻂ ﺍﳌﺎﺩﻱ ﺍﻟﺬﻱ ﳝﻜﻦ ﺃﻥ ﻳﺘﻀﻤﻨﻬﺎ‪ .‬ﻭﻗﺪ ﺍﺳﺘﻨﺪ ﻫﺬﺍ ﺍﻟﻔﻘﻴﻪ ﺇﱃ ﺣﺠﺘﲔ ﺃﺳﺎﺳﻴﺘﲔ ﻹﺿﻔﺎﺀ‬
‫ﻭﺻﻒ ﺍﻟﻘﻴﻤﺔ ﻋﻠﻰ ﺍﳌﻌﻠﻮﻣﺔ ﲝﻴﺚ ﳝﻜﻦ ﲤﻠﻜﻬﺎ‪ .‬ﺍﻷﻭﱃ‪ :‬ﻫﻲ ﺍﻟﻘﻴﻤﺔ ﺍﻹﻗﺘﺼﺎﺩﻳﺔ ﺍﻟﱵ ﺗﺘﻤﺘﻊ ‪‬ﺎ ﺍﳌﻌﻠﻮﻣﺔ‪ .‬ﻭﺍﻟﺜﺎﻧﻴﺔ‪ :‬ﻋﻼﻗﺔ ﻟﻠﺘﺒﻌﻴﺔ ﺍﻟﱵ ﺗﺮﺑﻂ ﺍﳌﻌﻠﻮﻣﺔ ﲟﺆﻟﻔﻬﺎ‬
‫ﻭﻫﻲ ﺍﻟﻌﻼﻗﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﱵ ﺗﺮﺑﻂ ﺍﳌﺎﻟﻚ ﺑﺎﻟﺸﻲﺀ ﺍﳌﻤﻠﻮﻙ ﻭﻣﻦ ﰒ ﻛﺎﻥ ﻟﺼﺎﺣﺐ ﺍﳌﻌﻠﻮﻣﺔ ﺍﳊﻖ ﰲ ﺿﻤﺎﻥ ﺳﺮﻳﺔ ﺍﳌﻌﻠﻮﻣﺔ ﻭﻛﺬﺍ ﺍﳊﻖ ﰲ ﻃﻠﺐ ﺍﻟﺘﻌﻮﻳﺾ‬
‫ﻋﻦ ﺍﻷﺿﺮﺍﺭ ﺍﻟﱵ ﺗﺘﺮﺗﺐ ﻋﻠﻰ ﺃﻱ ﻋﻤﻞ ﻏﲑ ﻣﺸﺮﻭﻉ ﻳﺘﻌﻠﻖ ‪‬ﺎ‪.‬‬
‫)‪ (2‬ﺭﺷﻴﺪﺓ ﺑﻮﻛﺮ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ ‪.92‬‬

‫‪- 40 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺟﺮﺍﺋﻢ ﻣﺘﻤﻴﺰﺓ ﻣﻦ ﺣﻴﺚ ﳑﺒﻨﺎﻫﺎ ﻭﻃﺒﻴﻌﺔ ﳏﻠﻬﺎ‪ .‬ﻓﻤﺎ ﻫﻮ ﻣﻮﻗﻒ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫ﺍﳌﻄﻠﺐ ﺍﻟﺮﺍﺑﻊ‪ :‬ﻣﻮﻗﻒ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻣﻦ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬‬

‫ﱂ ﳚﺪ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﺑﺪ‪‬ﺍ ﻣﻦ ﺗﻌﺪﻳﻞ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﻟﺴﺪ ﻣﺎ ﻛﺎﻥ ﻣﻦ ﻓﺮﺍﻍ ﻗﺎﻧﻮﱐ ﰲ ﻫﺬﺍ ﺍ‪‬ﺎﻝ‪،‬‬
‫ﻭﻛﺎﻥ ﺫﻟﻚ ﲟﻮﺟﺐ ﺍﻟﻘﺎﻧﻮﻥ ﺭﻗﻢ ‪ 15/04‬ﺍﳌﺆﺭﺥ ﰲ ‪ 2004/11/10‬ﺍﳌﺘﻤﻢ ﻭﺍﳌﻌﺪﻝ ﻟﻸﻣﺮ ‪156/66‬‬
‫ﺍﳌﺘﻀﻤﻦ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﻭﺍﻟﺬﻱ ﺃﻗﺮ ﻟﻪ ﺍﻟﻘﺴﻢ ﺍﻟﺴﺎﺑﻊ ﻣﻜﺮﺭ ﻣﻨﻪ ﲢﺖ ﻋﻨﻮﺍﻥ‪ :‬ﺍﳌﺴﺎﺱ ﺑﺄﻧﻈﻤﺔ‬
‫ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ‪ ،‬ﻭﻟﻘﺪ ﺟﺎﺀ ﰲ ﻋﺮﺽ ﺃﺳﺒﺎﺏ ﻫﺬﺍ ﺍﻟﺘﻌﺪﻳﻞ ﺃﻥ ﺍﻟﺘﻘﺪﻡ ﺍﻟﺘﻜﻨﻮﻟﻮﺟﻲ ﻭﺍﻧﺘﺸﺎﺭ‬
‫ﻭﺳﺎﺋﻞ ﺍﻹﺗﺼﺎﻝ ﺍﳊﺪﻳﺜﺔ ﺃﺩﻯ ﺇﱃ ﺑﺮﻭﺯ ﺃﺷﻜﺎﻝ ﺟﺪﻳﺪﺓ ﻟﻺﺟﺮﺍﻡ‪ ،‬ﳑﺎ ﺩﻓﻊ ﺑﺎﻟﻜﺜﲑ ﻣﻦ ﺍﻟﺪﻭﻝ ﺇﱃ ﺍﻟﻨﺺ‬
‫ﻋﻠﻰ ﻣﻌﺎﻗﺒﺘﻬﺎ‪.‬ﻭﺃﻥ ﺍﳉﺰﺍﺋﺮ ﻋﻠﻰ ﻏﺮﺍﺭ ﻫﺬﻩ ﺍﻟﺪﻭﻝ ﺗﺴﻌﻰ ﻣﻦ ﺧﻼﻝ ﻫﺬﺍ ﺍﳌﺸﺮﻭﻉ ﺇﱃ ﺗﻮﻓﲑ ﲪﺎﻳﺔ‬
‫ﺟﺰﺍﺋﻴﺔ ﻟﻸﻧﻈﻤﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺃﺳﺎﻟﻴﺐ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ‪ ،‬ﻭﺃﻥ ﻫﺬﻩ ﺍﻟﺘﻌﺪﻳﻼﺕ ﻣﻦ ﺷﺄ‪‬ﺎ ﺳﺪ‬
‫ﺍﻟﻔﺮﺍﻍ ﺍﻟﻘﺎﻧﻮﱐ‪.‬‬

‫ﻭﻗﺪ ﻗﺪﺭ ﺍﳌﺸﺮﻉ ﰲ ﺗﺪﺧﻠﻪ ﻫﺬﺍ ﺃﻥ ﺟﻮﻫﺮ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻫﻮ ﺍﳌﻌﻄﻴﺎﺕ ﺍﻟﱵ ﺗﺪﺧﻞ ﺇﱃ ﺍﳊﺎﺳﺐ‬
‫ﺍﻵﱄ ﻓﺘ‪‬ﺤﻮﻝ ﺇﱃ ﻣﻌﻠﻮﻣﺎﺕ ﺑﻌﺪ ﻣﻌﺎﳉﺘﻬﺎ ﻭﲣﺰﻳﻨﻬﺎ‪ ،‬ﻓﻘﺎﻡ ﲝﻤﺎﻳﺔ ﻫﺬﻩ ﺍﳌﻌﻄﻴﺎﺕ ﻣﻦ ﺃﻭﺟﻪ ﻋﺪﺓ‪ .‬ﻟﺬﻟﻚ‬
‫ﻓﻘﺪ ﺁﺛﺮ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﺍﺳﺘﺨﺪﺍﻣﻪ ﳌﺼﻄﻠﺢ ﺍﳌﺴﺎﺱ ﺑﻨﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ‪ ،‬ﻭﻳﻨﺼﺮﻑ ﻫﺬﺍ‬
‫ﺍﳌﺼﻄﻠﺢ ﻭﻓﻘﺎ ﻟﺪﻻﻟﺔ ﺍﻟﻜﻠﻤﺔ ﺇﱃ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﻟﻨﻈﺎﻡ ﺍﻟﺬﻱ ﳛﺘﻮﻱ ﻋﻠﻴﻬﺎ ﲟﺎ ﰲ ﺫﻟﻚ ﺷﺒﻜﺎﺕ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﻟﻴﺨﺮﺝ ﺑﺬﻟﻚ ﻣﻦ ﻧﻄﺎﻕ ﺍﻟﺘﺠﺮﱘ ﺗﻠﻚ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﻳﻜﻮﻥ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻭﺳﻴﻠﺔ‬
‫ﻻﺭﺗﻜﺎ‪‬ﺎ‪ ،‬ﻭﺣﺼﺮﻫﺎ ﻓﻘﻂ ﰲ ﺻﻮﺭ ﺍﻷﻓﻌﺎﻝ ﺍﻟﱵ ﺗﺸﻜﻞ ﺇﻋﺘﺪﺍﺀ ﻋﻠﻰ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‪،‬ﺃﻱ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ‬
‫ﻳﻜﻮﻥ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﳏﻼ ﳍﺎ) ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ( ‪.‬ﰒ ﰲ ﻣﺮﺣﻠﺔ ﻻﺣﻘﺔ ﺍﺧﺘﺎﺭ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻟﻠﺘﻌﺒﲑ‬
‫ﻋﻦ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﺼﻄﻠﺢ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭﺍﻹﺗﺼﺎﻝ ﲟﻮﺟﺐ ﺍﻟﻘﺎﻧﻮﻥ ﺭﻗﻢ‬
‫‪ 04/09‬ﺍﳌﺘﻀﻤﻦ ﺍﻟﻮﻗﺎﻳﺔ ﻣﻦ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻭﻣﻜﺎﻓﺤﺘﻬﺎ)ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ(‪.‬‬

‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﻣﻔﻬﻮﻡ ﻧﻈـﺎﻡ ﺍﳌﻌﺎﳉـﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌـﻄﻴﺎﺕ‬

‫ﺗﺒﲎ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻟﻠﺪﻻﻟﺔ ﻋﻠﻰ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﺼﻄﻠﺢ ﺍﳌﺴﺎﺱ ﺑﺄﻧﻈﻤﺔ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ‬
‫ﻟﻠﻤﻌﻄﻴﺎﺕ ﻣﻌﺘﱪ‪‬ﺍ ﺃﻥ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﰲ ﺣﺪ ﺫﺍﺗﻪ ﺃﻱ ﺍﶈﺘﻮﻯ )‪ (Le contenant‬ﻭﻣﺎ ﳛﺘﻮﻳﻪ ﻣﻦ‬

‫‪- 41 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻣﻜﻮﻧﺎﺕ ﻏﲑ ﻣﺎﺩﻳﺔ )‪(Le contenu‬ﳏﻼ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﳝﺜﻞ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ‬
‫ﺍﳌﺴﺄﻟﺔ ﺍﻷﻭﻟﻴﺔ ﺃﻭ ﺍﻟﺸﺮﻁ ﺍﻷﻭﱄ ﺍﻟﺬﻱ ﻳﻠﺰﻡ ﲢﻘﻘﻪ ﺣﱴ ﳝﻜﻦ ﺍﻟﺒﺤﺚ ﰲ ﺗﻮﺍﻓﺮ ﺃﻭ ﻋﺪﻡ ﺗﻮﺍﻓﺮ ﺃﺭﻛﺎﻥ‬
‫ﺃﻱ ﺟﺮﳝﺔ ﻣﻦ ﺟﺮﺍﺋﻢ ﺍﻻﻋﺘﺪﺍﺀ ﻋﻠﻰ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ‪ .‬ﻓﺈﻥ ﺛﺒﺖ ﲣﻠﻒ ﻫﺬﺍ ﺍﻟﺸﺮﻁ ﺍﻷﻭﱄ‪ ،‬ﻓﻼ ﻳﻜﻮﻥ ﻫﻨﺎﻙ‬
‫ﳎﺎﻝ ﳍﺬﺍ ﺍﻟﺒﺤﺚ ﺇﺫ ﺃﻥ ﻫﺬﺍ ﺍﻟﺸﺮﻁ ﻳﻌﺘﱪ ﻋﻨﺼﺮﺍ ﻻﺯﻣﺎ ﻟﻜﻞ ﻣﻨﻬﺎ‪.‬‬

‫ﻭﳌﺎ ﻛﺎﻧﺖ ﻣﻜﻮﻧﺎﺕ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻏﲑ ﺍﳌﺎﺩﻳﺔ ﻻ ﺗﻈﻬﺮ ﻋﻠﻰ ﺣﺎﻟﺔ ﻭﺍﺣﺪﺓ ﺇﺫ ﻗﺪ ﺗﻜﻮﻥ‬
‫ﳐﺰﻧﺔ ﺑﻪ ﺃﻭ ﻣﻨﻘﻮﻟﺔ ﻣﻨﻪ ﺃﻭ ﻋﻠﻴﻪ‪ ،‬ﻓﺈﻥ ﺍﻷﻣﺮ ﻳﺘﻮﺟﺐ ﺍﻟﺘﻄﺮﻕ ﻟﺪﺭﺍﺳﺔ ﺍﳌﻘﺼﻮﺩ ﺑﻨﻈﺎﻣﺎﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ‬
‫ﻟﻠﻤﻌﻄﻴﺎﺕ‪.‬‬

‫ﺃﻭﻻ‪ :‬ﺍﳌﻘﺼﻮﺩ ﺑﻨﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ‪:‬ﺇﻥ ﻋﻤﻠﻴﺔ ﻣﻌﺎﳉﺔ ﺍﳌﻌﻄﻴﺎﺕ ﲢﺘﺎﺝ ﺇﱃ ﺁﻟﻴﺔ‬
‫ﻣﻨﻈﻤﺔ ﺗﺘﻮﱃ ﻋﻤﻠﻴﺎﺕ ﲨﻊ ﻭﺗﻮﻓﲑ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﻼﺯﻣﺔ ﻭﻣﻌﺎﳉﺘﻬﺎ‪ ،‬ﻭﻫﻮ ﺍﻷﻣﺮ ﺍﻟﺬﻱ ﻭﻟﺪ ﺍﳊﺎﺟﺔ ﺇﱃ‬
‫ﺇﺟﺮﺍﺀﺍﺕ ﻭﻭﺳﺎﺋﻞ ﺗﺴﺎﻋﺪ ﻋﻠﻰ ﺍﻟﻘﻴﺎﻡ ﺑﺬﻟﻚ ﻓﻈﻬﺮ ﺑﺎﻟﻨﺘﻴﺠﺔ ﻣﺼﻄﻠﺢ ﻧﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺒﻨﻴﺔ ﻋﻠﻰ‬
‫ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ‪ ،‬ﺃﻭ ﻣﺎ ﻳﺴﻤﻰ ﺑﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﶈﻮﺳﺒﺔ‪ ،‬ﻭﻫﻮ ﻧﻈﺎﻡ ﻳﻌﺘﻤﺪ ﻋﻠﻰ ﺍﳌﻜﻮﻧﺎﺕ ﻭﺍﻷﺟﻬﺰﺓ‬
‫ﺍﻟﱪﳎﻴﺔ ﻟﻠﺤﺎﺳﻮﺏ ﰲ ﻣﻌﺎﳉﺔ ﺍﳌﻌﻄﻴﺎﺕ ﻭﺍﺳﺘﺮﺟﺎﻉ ﺍﳌﻌﻠﻮﻣﺎﺕ‪.‬‬

‫ﻓﺎﻟﺘﻄﻮﺭ ﺍﻟﺘﻘﲏ ﺍﳊﺎﺻﻞ ﰲ ﻋﺎﱂ ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﻣﺎ ﻳﺘﻄﻠﺒﻪ ﻣﻦ ﺿﺮﻭﺭﺓ ﺍﻟﻘﻴﺎﻡ ﲟﻬﺎﻡ‬
‫ﺗﻮﻓﲑ ﻭﲨﻊ ﻭﻣﻌﺎﳉﺔ ﻭﺗﺒﺎﺩﻝ ﺍﳌﻌﻠﻮﻣﺎﺕ ﰲ ﻧﻔﺲ ﺍﻟﻮﻗﺖ ﺃﺩﻯ ﺇﱃ ﺍﺑﺘﻜﺎﺭ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ‪ ،‬ﻭﺍﻟﺬﻱ‬
‫ﻧﺸﺄ ﰲ ﺍﳊﻘﻴﻘﺔ ‪‬ﺪﻑ ﻭﺻﻒ ﺍﳊﺎﻟﺔ ﺍﻟﱵ ﺍﻧﺒﺜﻘﺖ ﻋﻦ ﺍﻧﺪﻣﺎﺝ ﺗﻘﻨﻴﺔ ﻧﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺗﻘﻨﻴﺔ ﺍﻹﺗﺼﺎﻻﺕ‬
‫ﻋﻦ ﺑﻌﺪ‪ .‬ﻭﻗﺪ ﰎ ﺗﻌﺮﻳﻔﻪ ﻋﻠﻰ ﺃﻧﻪ ﻋﺒﺎﺭﺓ ﻋﻦ ﺁﻟﻴﺔ ﻭﺇﺟﺮﺍﺀﺍﺕ ﻣﻨﻈﻤﺔ ﺗﺴﻤﺢ ﺑﺘﺠﻤﻴﻊ ﻭﺗﺼﻨﻴﻒ ﻭﻓﺮﺯ‬
‫ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﻣﻌﺎﳉﺘﻬﺎ ﻭﻣﻦ ﰒ ﲢﻮﻳﻠﻬﺎ ﺇﱃ ﻣﻌﻠﻮﻣﺎﺕ ﻳﺴﺘﺮﺟﻌﻬﺎ ﺍﻹﻧﺴﺎﻥ ﻋﻨﺪ ﺍﳊﺎﺟﺔ ﻟﻴﺘﻤﻜﻦ ﻣﻦ ﺇﳒﺎﺯ‬
‫ﻋﻤﻞ ﺃﻭ ﺍﲣﺎﺫ ﻗﺮﺍﺭ ﺃﻭ ﺍﻟﻘﻴﺎﻡ ﺑﺄﻱ ﻭﻇﻴﻔﺔ ﻋﻦ ﻃﺮﻳﻖ ﺍﳌﻌﺮﻓﺔ ﺍﻟﱵ ﳛﺼﻞ ﻋﻠﻴﻬﺎ ﻣﻦ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺴﺘﺮﺟﻌﺔ‬
‫ﻣﻦ ﺍﻟﻨﻈﺎﻡ‪.‬‬

‫ﻭﺍﻟﻈﺎﻫﺮ ﺃﻥ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻋﻨﺪ ﺗﻌﺪﻳﻠﻪ ﻟﻘﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﻭﺇﺿﺎﻓﺘﻪ ﻟﻠﻘﺴﻢ ﺍﻟﺴﺎﺑﻊ ﻣﻜﺮﺭ‬
‫ﺑﻌﻨﻮﺍﻥ ﺍﳌﺴﺎﺱ ﺑﺄﻧﻈﻤﺔ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ﻋﺎﺭﺿﺎﹰ ﻣﻦ ﺧﻼﻟﻪ ﺻﻮﺭ ﻫﺬﻩ ﺍﻹﻋﺘﺪﺍﺀﺍﺕ ﱂ ﻳﻌﺮﻑ‬
‫ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ‪ ،‬ﻭﺃﻭﻛﻞ ﺑﺬﻟﻚ ﻣﻬﻤﺔ ﺗﻌﺮﻳﻔﻪ ﻟﻠﻔﻘﻪ ﻭﻗﺪ ﺣﺬﺍ ﰲ ﺫﻟﻚ ﻣﻮﻗﻒ ﺍﳌﺸﺮﻉ‬

‫‪- 42 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﻟﻔﺮﻧﺴﻲ ﻋﻨﺪﻣﺎ ﱂ ﲢﺘﻔﻆ ﺍﳉﻤﻌﻴﺔ ﺍﻟﻮﻃﻨﻴﺔ ﺍﻟﻔﺮﻧﺴﻴﺔ ﺑﺎﻟﺘﻌﺮﻳﻒ ﺍﻟﺬﻱ ﺗﻘﺪﻡ ﺑﻪ ﳎﻠﺲ ﺍﻟﺸﻴﻮﺥ ﺍﻟﻔﺮﻧﺴﻲ‬
‫ﻟﻨﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﲟﻨﺎﺳﺒﺔ ﺗﻌﺪﻳﻞ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ)‪ (1‬ﻭﺣﺬﻑ ﻣﻦ ﺍﻟﻨﺺ ﺍﻟﻨﻬﺎﺋﻲ‪.‬‬

‫ﻭﺇﺫﺍ ﻛﺎﻥ ﺗﻌﺮﻳﻒ ﳎﻠﺲ ﺍﻟﺸﻴﻮﺥ ﺍﻟﻔﺮﻧﺴﻲ ﻟﻨﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﻏﲑ ﻣﻠﺰﻡ ﺇﻻ ﺍﻧﻪ‬
‫ﻳﻌﺘﱪ ﻣﻦ ﺍﻷﻋﻤﺎﻝ ﺍﻟﺘﺤﻀﲑﻳﺔ ﺍﻟﱵ ﳝﻜﻦ ﺍﻹﺳﺘﻌﺎﻧﺔ ‪‬ﺎ ﰲ ﺗﻔﺴﲑ ﻏﻤﻮﺽ ﺍﻟﻨﺺ‪ .‬ﻛﻤﺎ ﳝﻜﻦ ﻟﻠﻘﻀﺎﺀ ﺃﻥ‬
‫ﻳﺴﺘﻬﺪﻱ‪ ‬ﺑﻪ ﻓﻴﻤﺎ ﻳﻌﺮﺽ ﻋﻠﻴﻪ ﻣﻦ ﻣﻨﺎﺯﻋﺎﺕ ﰲ ﻫﺬﺍ ﺍﳋﺼﻮﺹ)‪.(2‬‬

‫ﻭﻧﺮﻯ ﺃﻥ ﺍﳌﺸﺮﻉ ﺣﺴﻨﺎ ﻓﻌﻞ ﺣﻴﻨﻤﺎ ﲡﻨﺐ ﺍﻟﺘﻘﻴﺪ ﺑﺘﻌﺮﻳﻒ ﳏﺪﺩ ﻟﻨﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ‬
‫ﻟﻠﻤﻌﻄﻴﺎﺕ‪ ،‬ﺫﻟﻚ ﺃﻥ ﺍﻟﻌﻨﺎﺻﺮ ﺍﻟﱵ ﻳﺘﻜﻮﻥ ﻣﻨﻬﺎ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ ﰲ ﺣﺎﻟﺔ ﺗﻄﻮﺭ ﺗﻜﻨﻮﻟﻮﺟﻲ ﻣﺴﺘﻤﺮ ﳜﻀﻊ‬
‫ﻟﻠﺘﻄﻮﺭﺍﺕ ﺍﻟﺴﺮﻳﻌﺔ ﻭﺍﳌﺘﻼﺣﻘﺔ ﺍﻟﱵ ﺗﻄﺮﺃ ﻋﻠﻰ ﺍﻟﺒﻴﺌﺔ ﺍﻟﺘﻘﻨﻴﺔ ﺍﻟﱵ ﳝﺜﻠﻬﺎ ﻭﺍﻟﱵ ﺗﺘﺴﻊ ﻹﻣﻜﺎﻧﻴﺔ ﴰﻮﻝ‬
‫ﻭﺳﺎﺋﻞ ﺗﻘﻨﻴﺔ ﺟﺪﻳﺪﺓ‪ ،‬ﻻﺳﻴﻤﺎ ﻭﺃﻥ ﺍﻟﻌﺎﱂ ﺍﻹﻓﺘﺮﺍﺿﻲ ﻻ ﻳﺰﺍﻝ ﰲ ﺑﺪﺍﻳﺘﻪ ﻭﻟﻦ ﻳﻜﻮﻥ ﻣﻦ ﺍﻟﺴﻬﻮﻟﺔ‬
‫ﺍﺣﺘﻮﺍﺅﻩ‪ .‬ﻭﻣﻦ ﺟﻬﺔ ﺃﺧﺮﻯ ﻓﺈﻥ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ﻳﻌﺪ ﺗﻌﺒﲑﺍ ﻓﻨﻴﺎﹰ ﻳﺼﻌﺐ ﻋﻠﻰ ﺍﳌﺸﺘﻐﻞ‬
‫ﺑﺎﻟﻘﺎﻧﻮﻥ ﺇﺩﺭﺍﻙ ﻃﺒﻴﻌﺘﻪ‪.‬‬

‫ﻭ ﺑﺎﻟﺮﻏﻢ ﻣﻦ ﺫﻟﻚ ﻓﻘﺪ ﺫﻫﺒﺖ ﺑﻌﺾ ﺍﻟﺪﻭﻝ ﺇﱃ ﻭﺿﻊ ﺗﻌﺮﻳﻒ ﻟﻠﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﰲ ﻗﻮﺍﻧﻴﻨﻬﺎ‬
‫ﺍﻟﺪﺍﺧﻠﻴﺔ ﺫﺍﺕ ﺍﻟﺼﻠﺔ‪،‬ﻛﺎﻟﻘﺎﻧﻮﻥ ﺍﻷﻣﺮﻳﻜﻲ ﺍﳌﻮﺣﺪ ﻟﻠﻤﻌﺎﻣﻼﺕ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ ﻟﺴﻨﺔ ‪ ،1999‬ﻗﺎﻧﻮﻥ‬
‫ﻣﻜﺎﻓﺤﺔ ﺟﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﺴﻌﻮﺩﻱ ﺍﻟﺼﺎﺩﺭ ﺑﺘﺎﺭﻳﺦ ‪ (3)2007/03/26‬ﻗﺎﻧﻮﻥ ﺳﻠﻄﻨﺔ ﻋ‪‬ﻤﺎﻥ ﺭﻗﻢ‬
‫‪ 2008/69‬ﺍﳋﺎﺹ ﺑﺎﳌﻌﺎﻣﻼﺕ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ ﺍﻟﺼﺎﺩﺭ ﺑﺘﺎﺭﻳﺦ ‪ .(4)2008/05/17‬ﺍﻟﻘﺎﻧﻮﻥ ﺍﻹﲢﺎﺩﻱ ﻟﺪﻭﻟﺔ‬
‫ﺍﻹﻣﺎﺭﺍﺕ ﺭﻗﻢ ‪ 02‬ﻟﺴﻨﺔ ‪ 2006‬ﺍﳌﺘﻌﻠﻖ ﲟﻜﺎﻓﺤﺔ ﺟﺮﺍﺋﻢ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ)‪ .(5‬ﻗﺎﻧﻮﻥ ﳑﻠﻜﺔ ﺍﻟﺒﺤﺮﻳﻦ ﺭﻗﻢ‬

‫)‪ (1‬ﺍﻟﺘﻌﺮﻳﻒ ﺍﳌﻘﺘﺮﺡ ﻣﻦ ﳎﻠﺲ ﺍﻟﺸﻴﻮﺥ ﺍﻟﻔﺮﻧﺴﻲ ﺍﻋﺘﱪ ﺃﻥ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻫﻮ ‪" :‬ﻛﻞ ﻣﺮﻛﺐ ﻳﺘﻜﻮﻥ ﻣﻦ ﻭﺣﺪﺓ ﺃﻭ ﳎﻤﻮﻋﺔ ﻭﺣﺪﺍﺕ ﻣﻌﺎﳉﺔ ﻭﺍﻟﱵ‬
‫ﺗﺘﻜﻮﻥ ﻛﻞ ﻣﻨﻬﺎ ﻣﻦ ﺍﻟﺬﺍﻛﺮﺓ ﻭﺍﻟﱪﺍﻣﺞ ﻭﺍﳌﻌﻄﻴﺎﺕ ﻭﺃﺟﻬﺰﺓ ﺍﻹﺩﺧﺎﻝ ﻭﺍﻹﺧﺮﺍﺝ ﻭﺃﺟﻬﺰﺓ ﺍﻟﺮﺑﻂ ﻭﺍﻟﱵ ﺗﺮﺑﻂ ﺑﻴﻨﻬﺎ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻟﻌﻼﻗﺎﺕ ﺍﻟﱵ ﻋﻦ ﻃﺮﻳﻘﻬﺎ‬
‫ﻳﺘﻢ ﲢﻘﻴﻖ ﻧﺘﻴﺠﺔ ﻣﻌﻴﻨﺔ ﻭﻫﻲ ﻣﻌﺎﳉﺔ ﺍﳌﻌﻄﻴﺎﺕ ﻋﻠﻰ ﺃﻥ ﻳﻜﻮﻥ ﻫﺬﺍ ﺍﳌﺮﻛﺐ ﺧﺎﺿﻌﺎ ﻟﻠﺤﻤﺎﻳﺔ ﺍﻟﻔﻨﻴﺔ"‬
‫)‪ (2‬ﻭﻫﻮ ﻣﺎ ﻳﺴﺘﻔﺎﺩ ﻓﻌﻼ ﻣﻦ ﺃﺣﻜﺎﻡ ﺍﻟﻘﻀﺎﺀ ﺍﻟﻔﺮﻧﺴﻲ ﺣﻴﻨﻤﺎ ﺃﺧﺬ ﺑﺎﳌﻔﻬﻮﻡ ﺍﳌﻮﺳﻊ ﻟﻠﻨﻈﺎﻡ ﺣﻴﺚ ﻗﻀﻰ ﰲ ﺑﻌﺾ ﺃﺣﻜﺎﻣﻪ ﺑﺎﻋﺘﺒﺎﺭ ﺷﺒﻜﺔ ﺍﻻﺗﺼﺎﻝ ‪Le‬‬
‫‪ réseau Télecom‬ﻣﻦ ﺍﻟﻨﻈﺎﻡ‪.‬‬
‫)‪ (3‬ﻋﺮﻑ ﻧﻈﺎﻡ ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻟﻠﻤﻤﻠﻜﺔ ﺍﻟﻌﺮﺑﻴﺔ ﺍﻟﺴﻌﻮﺩﻳﺔ ﺍﻟﺼﺎﺩﺭ ﰲ ‪ 2007/03/26‬ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ " ﺑﺄﻧﻪ ﳎﻤﻮﻋﺔ ﺑﺮﺍﻣﺞ ﻭﺃﺩﻭﺍﺕ‬
‫ﻣﻌﺪﺓ ﳌﻌﺎﳉﺔ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﺇﺩﺍﺭ‪‬ﺎ ﻭﺗﺸﻤﻞ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ"‪.‬‬
‫)‪ (4‬ﺍﳌﺎﺩﺓ ﺍﻷﻭﱃ ﻣﻦ ﻫﺬﺍ ﺍﻟﻘﺎﻧﻮﻥ ﻋﺮﻓﺖ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺑﺄﻧﻪ ﻧﻈﺎﻡ ﺇﻟﻜﺘﺮﻭﱐ ﻟﻠﺘﻌﺎﻣﻞ ﻣﻊ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﻟﺒﻴﺎﻧﺎﺕ ﺑﺈﺟﺮﺍﺀ ﻣﻌﺎﳉﺔ ﺗﻠﻘﺎﺋﻴﺔ ﳍﺎ ﻹﻧﺸﺎﺀ ﺃﻭ‬
‫ﺇﺭﺳﺎﻝ ﺃﻭ ﺗﺴﻠﻴﻢ ﺃﻭ ﲣﺰﻳﻦ ﺃﻭ ﻋﺮﺽ ﺃﻭ ﺑﺮﳎﺔ ﺃﻭ ﲢﻠﻴﻞ ﺗﻠﻚ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﻟﺒﻴﺎﻧﺎﺕ‪.‬‬
‫)‪ (5‬ﻭﻋﺮﻑ ﻫﺬﺍ ﺍﻟﻘﺎﻧﻮﻥ ﻧﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﺄﻧﻪ ﳎﻤﻮﻋﺔ ﺑﺮﺍﻣﺞ ﻭﺃﺩﻭﺍﺕ ﻣﻌﺪﺓ ﳌﻌﺎﳉﺔ ﻭﺇﺩﺍﺭﺓ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺃﻭ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺃﻭ ﺍﻟﺮﺳﺎﺋﻞ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ ﺃﻭ ﻏﲑ‬
‫ﺫﻟﻚ‪.‬‬

‫‪- 43 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫‪ 83‬ﻟﺴﻨﺔ ‪ 2002‬ﺍﳋﺎﺹ ﺑﺎﳌﻌﺎﻣﻼﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪ (1).‬ﺍﻟﻘﺎﻧﻮﻥ ﺍﻷﺭﺩﱐ ﺭﻗﻢ ‪ /85‬ﻟﺴﻨﺔ ‪ 2001‬ﺍﳋﺎﺹ‬


‫ﺑﺎﳌﻌﺎﻣﻼﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪ (2).‬ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﻟﺪﻭﻟﺔ ﻗﻄﺮ ﺭﻗﻢ‪ 11‬ﻟﺴﻨﺔ ‪.(3)2004‬‬

‫ﺃﻣﺎ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻟﺪﻭﱄ ﻓﺈﻥ ﺍﻹﺗﻔﺎﻗﻴﺔ ﺍﻟﺪﻭﻟﻴﺔ ﻹﺟﺮﺍﻡ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﻗﻔﺖ ﻋﻨﺪ ﺣﺪ ﻫﺬﺍ‬
‫ﺍﳌﻔﻬﻮﻡ ﻋﻨﺪﻣﺎ ﻋﺮﻓﺖ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ﲟﻮﺟﺐ ﺍﻟﻔﻘﺮﺓ ﺃ ﻣﻦ ﺍﳌﺎﺩﺓ ﺍﻷﻭﱃ ﻣﻦ ﺍﻟﻔﺼﻞ‬
‫ﺍﻷﻭﻝ ﺑﻌﻨﻮﺍﻥ ﺍﳌﺼﻄﻠﺤﺎﺕ ﻋﻠﻰ "ﺃﻧﻪ ﻛﻞ ﺁﻟﺔ ﲟﻔﺮﺩﻫﺎ ﺃﻭ ﻣﻊ ﻏﲑﻫﺎ ﻣﻦ ﺍﻵﻻﺕ ﺍﳌﺘﺼﻠﺔ ﺃﻭ ﺍﳌﺮﺗﺒﻄﺔ ﻭ‬
‫ﺍﻟﱵ ﳝﻜﻦ ﺃﻥ ﺗﻘﻮﻡ ﺳﻮﺍﺀ ﲟﻔﺮﺩﻫﺎ ﺃﻭ ﻣﻊ ﳎﻤﻮﻋﺔ ﻋﻨﺎﺻﺮ ﺃﺧﺮﻯ ﺗﻨﻔﻴﺬﺍ ﻟﱪﻧﺎﻣﺞ ﻣﻌﲔ ﺑﺄﺩﺍﺀ ﻣﻌﺎﳉﺔ ﺁﻟﻴﺔ‬
‫ﻟﻠﺒﻴﺎﻧﺎﺕ‪.‬‬

‫ﻛﻤﺎ ﺃﻭﺭﺩ ﻗﺎﻧﻮﻥ ﺍﻷﻭﻧﻴﺴﺘﺮﺍﻝ ﺍﻟﻨﻤﻮﺫﺟﻲ ﺑﺸﺄﻥ ﺍﻟﺘﺠﺎﺭﺓ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﰲ ﻣﺎﺩﺗﻪ ﺍﻟﺜﺎﻧﻴﺔ ﺗﻌﺮﻳﻔﺎ‬
‫ﻟﻠﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺑﺎﻋﺘﺒﺎﺭﻩ ﺍﻟﻨﻈﺎﻡ ﺍﻟﺬﻱ ﻳﺴﺘﺨﺪﻡ ﻹﻧﺸﺎﺀ ﺭﺳﺎﺋﻞ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﺇﺭﺳﺎﳍﺎ ﻭﺍﺳﺘﻼﻣﻬﺎ ﺃﻭ‬
‫ﲣﺰﻳﻨﻬﺎ ﺃﻭ ﻟﺘﺠﻬﻴﺰﻫﺎ ﻋﻠﻰ ﺃﻱ ﻭﺟﻪ ﺁﺧﺮ)‪.(4‬‬

‫ﻛﻤﺎ ﻋﺮﻓﺘﻪ ﺍﻹﺗﻔﺎﻗﻴﺔﺍﻷﺭﻭﺑﻴﺔ ﺍﳌﱪﻣﺔﰲ ﺑﻮﺩﺍﺳﺒﺖ)‪ (5‬ﺑﺸﺄﻥ ﻣﻜﺎﻓﺤﺔ ﺟﺮﺍﺋﻢ ﺍﻟﻔﻀﺎﺀ ﺍﳌﻌﻠﻮﻣﺎﰐ‬
‫ﺑﺄﻧﻪ "ﻛﻞ ﺟﻬﺎﺯ ﲟﻔﺮﺩﻩ ﺃﻭ ﻣﻊ ﻏﲑﻩ ﻣﻦ ﺍﻷﺟﻬﺰﺓ ﺍﳌﺘﻮﺍﺻﻠﺔ ﺑﻴﻨﻴﺎ ﺃﻭ ﺍﳌﺘﺼﻠﺔ ﻭﺍﻟﱵ ﳝﻜﻦ ﺃﻥ ﻳﻘﻮﻡ ﻭﺍﺣﺪ‬
‫ﻣﻨﻬﺎ ﺃﻭ ﺃﻛﺜﺮ ﺗﻨﻔﻴﺬﺍ ﻟﱪﻧﺎﻣﺞ ﻣﻌﲔ ﺑﺄﺩﺍﺀ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﺒﻴﺎﻧﺎﺕ‪".‬‬

‫ﻛﻤﺎ ﺃﻓﺮﺩﺕ ﺇﺗﻔﺎﻗﻴﺔ ﺍ‪‬ﻠﺲ ﺍﻷﻭﺭﻭﰊ ﺍﳋﺎﺻﺔ ﲝﻤﺎﻳﺔ ﺍﻷﻓﺮﺍﺩ ﻣﻦ ﻣﻌﺎﳉﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳋﺎﺻﺔ ‪‬ﻢ‬
‫ﺍﳌﻮﻗﻌﺔ ﰲ ‪ .1981/01/28‬ﰲ ﻣﺎﺩ‪‬ﺎ ﺍﻟﺜﺎﻧﻴﺔ ﺗﻌﺮﻳﻔﺎ ﻟﻨﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻋﻠﻰ ﺃﻧﻪ ﻛﻞ ﲣﺰﻳﻦ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ‬
‫ﰲ ﺍﳊﺎﺳﻮﺏ ﻭﻧﻘﻞ ﻭﺗﺒﺎﺩﻝ ﺍﻟﱪﺍﻣﺞ ﺃﻭ ﺗﻐﻴﲑ ﺍﳌﻌﻠﻮﻣﺔ ﺃﻭ ﻣﺴﺤﻬﺎ‪.‬‬

‫ﻭﰲ ﻣﺸﺮﻭﻉ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﻌﺮﰊ ﺍﻟﻨﻤﻮﺫﺟﻲ ﺍﳌﻮﺣﺪ ﳌﻜﺎﻓﺤﺔ ﺳﻮﺀ ﺇﺳﺘﺨﺪﺍﻡ ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ‬
‫ﻭﺍﻹﺗﺼﺎﻻﺕ ﰲ ﺻﻴﻐﺘﻪ ﺍﳌﻌﺪﻟﺔ ﳒﺪ ﰲ ﻣﺎﺩﺗﻪ ﺍﻷﻭﱃ ﺗﻌﺮﻳﻔﺎ ﻟﻨﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ﻋﻠﻰ ﺃﻧﻪ‬

‫)‪ (1‬ﻋﺮﻑ ﻫﺬﺍ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺑﺄﻧﻪ ﺍﻟﻨﻈﺎﻡ ﺍﻻﻟﻜﺘﺮﻭﱐ ﻻﺳﺘﺤﺪﺍﺙ ﻭﺍﺳﺘﺨﺮﺍﺝ ﻭﺗﻮﺻﻴﻞ ﻭﺇﺭﺳﺎﻝ ﻭﺍﺳﺘﻘﺒﺎﻝ ﻭﲣﺰﻳﻦ ﺃﻭ ﺑﺚ ﺃﻭ ﺗﻘﺪﱘ ﻣﻌﻠﻮﻣﺎﺕ‬
‫)‪ (2‬ﺍﻟﻘﺎﻧﻮﻥ ﺍﻷﺭﺩﱐ ﻋﺮﻑ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺑﺄﻧﻪ ﺍﻟﻨﻈﺎﻡ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﳌﺴﺘﺨﺪﻡ ﻹﻧﺸﺎﺀ ﺭﺳﺎﺋﻞ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺃﻭ ﺇﺭﺳﺎﳍﺎ ﺃﻭ ﺗﺴﻠﻴﻤﻬﺎ ﺃﻭ ﻣﻌﺎﳉﺘﻬﺎ ﺃﻭ ﲣﺰﻳﻨﻬﺎ‬
‫ﻟﺘﺠﻬﻴﺰﻫﺎ ﻋﻠﻰ ﺃﻱ ﻭﺟﻪ ﺁﺧﺮ‬
‫)‪ (3‬ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﻘﻄﺮﻱ ﺣﺪﺩ ﺍﳌﻘﺼﻮﺩ ﺑﻨﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﺒﻴﺎﻧﺎﺕ ﺑﺄﻧﻪ ﻛﻞ ﳎﻤﻮﻋﺔ ﻣﻦ ﻭﺍﺣﺪﺓ ﺃﻭ ﺃﻛﺜﺮ ﻣﻦ ﻭﺣﺪﺍﺕ ﺍﳌﻌﺎﳉﺔ ﺳﻮﺍﺀ ﲤﺜﻠﺖ ﰲ ﺫﺍﻛﺮﺓ‬
‫ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﺃﻭ ﺑﺮﺍﳎﻪ ﺃﻭ ﻭﺣﺪﺍﺕ ﺍﻹﺩﺧﺎﻝ ﺃﻭ ﺍﻹﺧﺮﺍﺝ ﺃﻭ ﺍﻻﺗﺼﺎﻝ ﺍﻟﱵ ﺗﺴﺎﻫﻢ ﰲ ﲢﻘﻴﻖ ﻧﺘﻴﺠﺔ ﻣﻌﻴﻨﺔ‪.‬‬
‫)‪ (4‬ﻗﺎﻧﻮﻥ ﺍﻻﻭﻧﻴﺴﺮﺍﻝ ﻛﺎﻥ ﲟﻮﺟﺐ ﺍﻟﻘﺮﺍﺭ ﺍﻟﺬﻱ ﺍﲣﺬﺗﻪ ﺍﳉﻤﻌﻴﺔ ﺍﻟﻌﺎﻣﺔ ﻟﻸﻣﻢ ﺍﳌﺘﺤﺪﺓ ﺑﻨﺎﺀ ﻋﻠﻰ ﺗﻘﺮﻳﺮ ﺍﻟﻠﺠﻨﺔ ﺍﻟﺴﺎﺩﺳﺔ )‪(A/51/628‬‬
‫)‪ (5‬ﺍﻹﺗﻔﺎﻗﻴﺔ ﺍﻷﻭﺭﻭﺑﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﻹﻓﺘﺮﺍﺿﻴﺔ ﺍﳌﻮﻗﻌﺔ ﰲ ﺑﻮﺩﺍﺑﺴﺖ ﰲ ‪.2001/11/23‬‬

‫‪- 44 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻛﻞ ﳎﻤﻮﻋﺔ ﻣﺮﻛﺒﺔ ﻣﻦ ﻭﺣﺪﺓ ﺃﻭ ﻋﺪﺓ ﻭﺣﺪﺍﺕ ﻟﻠﻤﻌﺎﳉﺔ ﺳﻮﺍﺀ ﻛﺎﻧﺖ ﻣﺘﻤﺜﻠﺔ ﰲ ﺫﺍﻛﺮﺓ ﺍﳊﺎﺳﻮﺏ‬
‫ﻭﺑﺮﺍﳎﻪ ﺃﻭ ﻭﺣﺪﺍﺕ ﺍﻹﺩﺧﺎﻝ ﻭﺍﻹﺧﺮﺍﺝ ﻭﺍﻻﺗﺼﺎﻝ ﺍﻟﱵ ﺗﺴﺎﻫﻢ ﰲ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﻧﺘﻴﺠﺔ ﻣﻌﻴﻨﺔ‪".‬‬

‫ﻭﻣﻦ ﺧﻼﻝ ﺍﻟﺘﻌﺮﻳﻔﺎﺕ ﺍﻟﱵ ﰎ ﺫﻛﺮﻫﺎ ﻓﺈﻧﻨﺎ ﻧﺴﺘﻨﺘﺞ ﺃﻥ ﻣﺼﻄﻠﺢ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻳﺴﺘﺨﺪﻡ ﰲ ﺍﳊﻘﻞ‬
‫ﺍﻟﻘﺎﻧﻮﱐ ﻟﻠﺪﻻﻟﺔ ﻋﻠﻰ ﺍﳌﻌﲎ ﺍﳌﻘﺼﻮﺩ ﻧﻔﺴﻪ ‪‬ﺬﺍ ﺍﻻﺻﻄﻼﺡ ﻭﻓﻘﺎ ﳌﻔﻬﻮﻣﻪ ﺍﻟﻌﻠﻤﻲ‪ ،‬ﻓﻬﻮ ﺇﺫﻥ ﻣﺼﻄﻠﺢ‬
‫ﻳﻨﻄﺒﻖ ﻋﻠﻰ ﺃﻱ ﻧﻈﺎﻡ ﻣﻬﻤﺎ ﻛﺎﻥ ﻣﺴﻤﺎﻩ ﻳﺘﻮﺍﻓﺮ ﻟﻪ ﻋﺪﺓ ﻋﻨﺎﺻﺮ ﻣﺮﺗﺒﻄﺔ ﻳﺒﻌﻀﻬﺎ ﺑﻌﺪﺩ ﻣﻌﲔ ﻣﻦ‬
‫ﺍﻟﺮﻭﺍﺑﻂ ﻟﺘﺤﻘﻴﻖ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﻣﻦ ﲡﻤﻴﻌﻬﺎ ﻭﲣﺰﻳﻨﻬﺎ ﻭﻣﻌﺎﳉﺘﻬﺎ ﻭﻧﻘﻠﻬﺎ ﻭﺗﺒﺎﺩﳍﺎ ﻭﺫﻟﻚ ﻣﻦ‬
‫ﺧﻼﻝ ﺑﺮﻧﺎﻣﺞ ﻣﻌﻠﻮﻣﺎﰐ‪.‬‬

‫ﻭﺗﺒﻌﺎ ﻟﺬﻟﻚ ﻓﺈﻥ ﺣﺪﻭﺩ ﻓﻜﺮﺓ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ﺗﻘﻮﻡ ﻋﻠﻰ ﺃﺳﺎﺱ ﺍﻟﺮﻭﺍﺑﻂ ﺑﲔ‬
‫ﳐﺘﻠﻒ ﺃﺟﺰﺍﺀ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ ﻭﺍﻟﻮﺟﻮﺩ ﺍﳌﺘﺰﺍﻣﻦ ﻟﻸﺟﻬﺰﺓ ﻭﺍﻟﱪﺍﻣﺞ‪ (1).‬ﻓﺎﻟﺪﺧﻮﻝ ﺇﱃ ﺑﺮﻧﺎﻣﺞ ﻣﻦ ﺃﺟﻞ‬
‫ﺗﻌﺪﻳﻠﻪ ﺃﻭ ﲢﻮﻳﻠﻪ ﺇﱃ ﺍﺳﺘﻌﻤﺎﻝ ﻏﲑ ﺍﻹﺳﺘﻌﻤﺎﻝ ﺍﳌﺨﺼﺺ ﻟﻪ ﻻ ﻳﺸﻜﻞ ﺟﺮﳝﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﺇﻻ ﺇﺫﺍ ﻛﺎﻥ‬
‫ﻫﺬﺍ ﺍﻟﱪﻧﺎﻣﺞ ﻳﺸﺎﺭﻙ ﰲ ﺗﻄﺒﻴﻖ ﻓﻌﻠﻲ ﺩﺍﺧﻞ ﻧﻈﺎﻡ ﻛﺎﻣﻞ‪ ،‬ﺫﻟﻚ ﺃﻥ ﺍﻟﱪﻧﺎﻣﺞ ﺍﳌﻌﺰﻭﻝ ﻻ ﻳﺄﺧﺬ ﺗﻜﻴﻴﻒ‬
‫ﺍﻟﻨﻈﺎﻡ‪ .‬ﻭﻛﺬﻟﻚ ﺍﻟﺸﺄﻥ ﺑﺎﻟﻨﺴﺒﺔ ﻷﻱ ﻣﻦ ﺍﳌﻜﻮﻧﺎﺕ ﺍﻟﱵ ﻻ ﺗﺸﻜﻞ ﺟﺰﺀﺍ ﻣﻦ ﺍﻟﻨﻈﺎﻡ ﻛﻤﺎ ﻟﻮ ﻭﻗﻊ‬
‫ﺍﻹﻋﺘﺪﺍﺀ ﻋﻠﻰ ﺑﺮﺍﻣﺞ ﻣﻌﺮﻭﺿﺔ ﻟﻠﺒﻴﻊ‪ ،‬ﻭﻻ ﻳﺪﺧﻞ ﺃﻳﻀﺎ ﰲ ﻣﻔﻬﻮﻡ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ‬
‫ﺍﳌﺨﺰﻧﺔ ﻭﺍﻟﱵ ﻻ ﺗﻮﺟﺪ ﺑﺎﳌﻌﺎﳉﺔ‪ ،‬ﺃﻱ ﺍﻟﱵ ﺗﻌﺘﱪ ﻛﺎﻷﺭﺷﻴﻒ ﻓﺎﻟﺪﺧﻮﻝ ﻋﻠﻴﻬﺎ ﻻ ﳝﺜﻞ ﺩﺧﻮﻻ ﺇﱃ ﻧﻈﺎﻡ‬
‫ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ‪ ،‬ﺫﻟﻚ ﺃﻥ ﺍﻷﻣﻮﺍﻝ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﳌﻌﺰﻭﻟﺔ ﻻ ﺗﻄﺒﻖ ﻋﻠﻴﻬﺎ ﻋﻤﻮﻣﺎ ﺇﻻ ﺍﻟﻘﻮﺍﻋﺪ‬
‫ﺍﻟﺘﻘﻠﻴﺪﻳﺔ‪.‬‬

‫ﺛﺎﻧﻴﺎ‪ :‬ﻣﺪﻯ ﺍﺷﺘﺮﺍﻁ ﺍﳊﻤﺎﻳﺔ ﺍﻟﺘﻘﻨﻴﺔ ﻟﻠﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‪:‬ﻟﻘﺪ ﻃﺮﺣﺎﻟﻔﻘﻪ ﺍﻟﻘﺎﻧﻮﱐ ﻣﺴﺄﻟﺔ ﻫﺎﻣﺔ ﰲ‬
‫ﺷﺄﻥ ﺟﺮﺍﺋﻢ ﺍﻟﺘﻌﺪﻱ ﻋﻠﻰ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ‪ ،‬ﺗﺘﻌﻠﻖ ﲟﺪﻯ ﺍﺷﺘﺮﺍﻁ ﺃﻥ ﻳﻜﻮﻥ ﺍﻟﻨﻈﺎﻡ‬
‫ﺍﳌﻌﻠﻮﻣﺎﰐ ﻣﺘﻮﻓﺮﺍ ﻋﻠﻰ ﺍﳊﻤﺎﻳﺔ ﺍﻟﺘﻘﻨﻴﺔ ﺣﱴ ﳛﻈﻰ ﺑﺎﳊﻤﺎﻳﺔ ﺍﳉﺰﺍﺋﻴﺔ‪.‬‬

‫ﻓﻘﺪ ﺫﻫﺐ ﺍﻟﺮﺃﻱ ﺍﻟﻐﺎﻟﺐ ﰲ ﺍﻟﻔﻘﻪ ﺍﻟﻔﺮﻧﺴﻲ ﺇﱃ ﻋﺪﻡ ﺍﺷﺘﺮﺍﻁ ﺍﳊﻤﺎﻳﺔ ﺍﻟﺘﻘﻨﻴﺔ ﻟﻠﻨﻈﺎﻡ ﺣﱴ ﺗﻘﻮﻡ‬
‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ (2)،‬ﻓﺒﺤﺴﺐ ﻫﺬﺍ ﺍﻟﺮﺃﻱ ﻓﺈﻥ ﻧﻈﺎﻡ ﺍﻷﻣﻦ ﻭﺍﳊﻤﺎﻳﺔ ﺍﻟﺘﻘﻨﻴﺔ ﻻ ﻳﻜﻮﻥ ﺳﻮﻯ ﺩﻭﺭ‬

‫)‪ (1‬ﺍﻧﻈﺮ ﰲ ﻫﺬﺍ ﺍﳌﻌﲎ ﻋﻠﻲ ﻋﺒﺪ ﺍﻟﻘﺎﺩﺭ ﺍﻟﻘﻬﻮﺟﻲ‪ ،‬ﺍﳊﻤﺎﻳﺔ ﺍﳉﻨﺎﺋﻴﺔ ﻟﱪﺍﻣﺞ ﺍﳊﺎﺳﺐ ﺍﻵﱄ‪ ،‬ﺍﻟﺪﺍﺭ ﺍﳉﺎﻣﻌﻴﺔ ﻟﻠﻨﺸﺮ ﻭﺍﻟﺘﻮﺯﻳﻊ‪ ،‬ﺍﻹﺳﻜﻨﺪﺭﻳﺔ ‪ ،1999‬ﺹ‬
‫‪ 21‬ﻭﻣﺎ ﺑﻌﺪﻫﺎ‪.‬‬
‫)‪ (2‬ﻋﺒﺪ ﺍﻟﻔﺘﺎﺡ ﺑﻴﻮﻣﻲ ﺣﺠﺎﺯﻱ ‪.‬ﺍﳉﺮﳝﺔ ﰲ ﻋﺼﺮ ﺍﻟﻌﻮﳌﺔ ﺩﺭﺍﺳﺔ ﰲ ﺍﻟﻈﺎﻫﺮﺓ ﺍﻹﺟﺮﺍﻣﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ .‬ﺩﺍﺭ ﺍﻟﻔﻜﺮ ﺍﳉﺎﻣﻌﻲ‪ .‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ﺹ ‪.76‬‬

‫‪- 45 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺇﳚﺎﰊ ﻭﺇﺛﺒﺎﺕ ﺳﻮﺀ ﻧﻴﺔ ﻣﻦ ﻗﺎﻡ ﺑﺎﻧﺘﻬﺎﻙ ﺍﻟﻨﻈﺎﻡ ﻭﺍﻟﺪﺧﻮﻝ ﺇﻟﻴﻪ ﺑﻄﺮﻳﻘﺔ ﻏﲑ ﺷﺮﻋﻴﺔ‪ ،‬ﻭﻳﺪﺧﻞ ﰲ ﻋﺪﺍﺩ‬
‫ﺇﺛﺒﺎﺕ ﺍﻟﻘﺼﺪ ﺍﳉﻨﺎﺋﻲ ﻭﻫﺬﻩ ﻣﺴﺄﻟﺔ ﺃﺧﺮﻯ‪(1).‬ﰲ ﺣﲔ ﺫﻫﺐ ﺍﻟﺮﺃﻱ ﺍﻟﺜﺎﱐ ﰲ ﺍﳌﺴﺄﻟﺔ ﺇﱃ ﺍﻟﻘﻮﻝ‬
‫ﺑﻀﺮﻭﺭﺓ ﻭﺟﻮﺩ ﻧﻈﺎﻡ ﺃﻣﲏ ﳊﻤﺎﻳﺔ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺣﱴ ﻳﻌﺘﺮﻑ ﺑﺘﺠﺮﱘ ﺍﻻﻋﺘﺪﺍﺀ ﻋﻠﻰ ﻧﻈﻢ ﻣﻌﺎﳉﺔ‬
‫ﺍﻟﺒﻴﺎﻧﺎﺕ‪ ،‬ﻭﻳﺴﺘﻨﺪ ﺃﻧﺼﺎﺭ ﻫﺬﺍ ﺍﻟﺮﺃﻱ ﺇﱃ ﻋﺪﺓ ﺣﺠﺞ ﻣﻨﻬﺎ ﺃﻥ ﺍﻻﻋﺘﺪﺍﺀ ﻋﻠﻰ ﺍﻟﻨﻈﺎﻡ ﺍﻷﻣﲏ ﺷﺮﻁ‬
‫ﻣﻔﺘﺮﺽ ﻟﻘﻴﺎﻡ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﺃﻥ ﺍﻟﻘﻀﺎﺀ ﻳﻘﻀﻲ ﺑﻌﺪﻡ ﺍﻟﻌﻘﺎﺏ ﻋﻠﻰ ﻓﻌــــﻞ ﻳﻌﺪ ﺍﻋﺘﺪﺍﺀ‬
‫ﻋﻠﻰ ﺣـــــﻖ ﱂ ﻳﺘﺤﻮﻁ ﻟـــــــﻪ ﺻﺎﺣﺒﻪ‪ ،‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺃﻥ ﺗﻐﻴﺐ ﻫﺬﺍ ﺍﻟﺸﺮﻁ‬
‫ﻳﻌﺪ ﺗﻮﺳﻌﺎ ﰲ ﺍﻟﺘﺠﺮﱘ ﻓﻜﻞ ﺩﺧﻮﻝﹴ ﺇﺫﻥ ﻏﲑ ﻣﺸﺮﻭﻉ ﻳﻌﺪ ﺟﺮﳝﺔ ﻭﻫﻮ ﺃﻣﺮ ﻏﲑ ﻣﻨﻄﻘﻲ)‪.(2‬‬

‫ﺇﻻﺃﻥ ﻫﺬﺍ ﺍﻟﺸﺮﻁ ﺃﺻﺒﺢ ﰲ ﺍﻟﻮﻗﺖ ﺍﻟﺮﺍﻫﻦ ﺑﺪﻭﻥ ﻣﻮﺿﻮﻉ‪ ،‬ﺫﻟﻚ ﺃﻥ ﻏﺎﻟﺒﻴﺔ ﺍﻟﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﺗﺘﻤﺘﻊ ﲝﻤﺎﻳﺔ ﻓﻨﻴﺔ ﻋﻠﻰ ﺩﺭﺟﺔ ﻋﺎﻟﻴﺔ ﻣﻦ ﺍﻟﻜﻔﺎﺀﺓ‪ ،‬ﺑﻞ ﺇﻥ ﻫﻨﺎﻙ ﺷﺮﻛﺎﺕ ﻣﺘﺨﺼﺼﺔ ﻟﺘﻘﺪﱘ ﻫﺬﻩ ﺍﳋﺪﻣﺔ‬
‫ﰲ ﻇﻞ ﺗﻘﺪﻡ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﺃﻥ ﺍﳊﻤﺎﻳﺔ ﺍﻟﻔﻨﻴﺔ ﻭﺇﻥ ﻛﺎﻧﺖ ﻫﺎﻣﺔ ﻭﻻﺯﻣﺔ ﻓﻬﻲ ﻏﲑ ﻛﺎﻓﻴﺔ ﻟﻠﺤﺪ ﻣﻦ‬
‫ﺍﳉﺮﺍﺋﻢ ﺍﳌﺎﺳﺔ ﺑﻨﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ﻓﻴﻠﺰﻡ ﺃﻥ ﺗﻜﻔﻠﻬﺎ ﲪﺎﻳﺔ ﺟﺰﺍﺋﻴﺔ‪.‬‬

‫ﻭﺍﳌﻨﺎﻗﺸﺎﺕ ﺍﻟﱪﳌﺎﻧﻴﺔ ﰲ ﻓﺮﻧﺴﺎ ﺗﺆﻛﺪ ﺃ‪‬ﺎ ﻛﺎﻧﺖ ﺿﺪ ﺍﺷﺘﺮﺍﻁ ﺍﳊﻤﺎﻳﺔ ﺍﻟﻔﻨﻴﺔ ﺑﻌﺪ ﺭﻓﺾ ﻭﺿﻊ‬
‫ﺗﻌﺮﻳﻒ ﻟﻨﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ﻭﺍﻟﺬﻱ ﺍﻗﺘﺮﺣﻪ ﳎﻠﺲ ﺍﻟﺸﻴﻮﺥ ﺍﻟﻔﺮﻧﺴﻲ ﻣﺸﲑﺍ ﻓﻴﻪ ﺇﱃ ﺃﻥ‬
‫ﺍﻟﻨﻈﺎﻡ ﻻﺑﺪ ﺃﻥ ﻳﻜﻮﻥ ﳏﻤﻴﺎ ﲜﻬﺎﺯ ﻟﻸﻣﺎﻥ ﻭﺃﻥ ﺍﻷﻧﻈﻤﺔ ﺍﶈﻤﻴﺔ ﺗﻘﻨﻴﺎ ﻫﻲ ﻭﺣﺪﻫﺎ ﺍﻟﱵ ﲢﻀﻰ ﺑﺎﳊﻤﺎﻳﺔ‬
‫ﺍﳉﻨﺎﺋﻴﺔ)‪.(3‬‬

‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺍﳌﻘﺼﻮﺩ ﺑﺎﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭﺍﻹﺗﺼﺎﻝ‪:‬‬

‫ﺇﻧﻪ ﻭﻗﺒﻞ ﺻﺪﻭﺭ ﺍﻟﻘﺎﻧﻮﻥ ﺭﻗﻢ ‪ 04/09‬ﺍﳌﺆﺭﺥ ﰲ ‪ 2009/08/05‬ﺍﳌﺘﻀﻤﻦ ﺍﻟﻘﻮﺍﻋﺪ ﺍﳋﺎﺻﺔ‬


‫ﻟﻠﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭ ﺍﻹﺗﺼﺎﻝ ﻭﻣﻜﺎﻓﺤﺘﻬﺎ ﻛﺎﻧﺖ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﰲ ﺍﻟﻨﻈﺎﻡ ﺍﻟﻌﻘﺎﰊ ﺍﳉﺰﺍﺋﺮﻱ ﺗﻘﺘﺼﺮ ﻓﻘﻂ ﻋﻠﻰ ﺗﻠﻚ ﺍﻷﻓﻌﺎﻝ ﺍﳌﺎﺳﺔ ﺑﺄﻧﻈﻤﺔ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ‬

‫)‪ (1‬ﺃﲪﺪ ﺣﺴﺎﻡ ﻃﻪ ﲤﺎﻡ‪،‬ﺍﳉﺮﺍﺋﻢ ﺍﻟﻨﺎﺷﺌﺔ ﻋﻦ ﺍﺳﺘﺨﺪﺍﻡ ﺍﳊﺎﺳﺐ ﺍﻵﱄ )ﺍﳊﻤﺎﻳﺔ ﺍﳉﻨﺎﺋﻴﺔ ﻟﻠﺤﺎﺳﺐ ﺍﻵﱄ(ﺩﺭﺍﺳﺔ ﻣﻘﺎﺭﻧﺔ‪ .‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪.‬ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ‬
‫ﺍﻟﻌﺮﺑﻴﺔ ﺍﻟﻘﺎﻫﺮﺓ‪ .‬ﺹ ‪.264‬‬
‫)‪ (2‬ﻋﻠﻲ ﻋﺒﺪ ﺍﻟﻘﺎﺩﺭ ﺍﻟﻘﻬﻮﺟﻲ‪ ،‬ﺍﳊﻤﺎﻳﺔ ﺍﳉﻨﺎﺋﻴﺔ ﻟﱪﺍﻣﺞ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ‪.‬ﺍﻟﺪﺍﺭ ﺍﳉﺎﻣﻌﻴﺔ ﻟﻠﻨﺸﺮ ﻭ ﺍﻟﺘﻮﺯﻳﻊ ‪ .‬ﺍﺍﻻﺳﻜﻨﺪﺭﻳﺔ‪ 1999.‬ﺹ ‪.265‬‬
‫)‪ (3‬ﳏﻤﺪ ﺧﻠﻴﻔﺔ‪ ،‬ﺍﳊﻤﺎﻳﺔ ﺍﳉﻨﺎﺋﻴﺔ ﳌﻌﻄﻴﺎﺕ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﺰﺍﺋﺮﻱ ﻭ ﺍﳌﻘﺎﺭﻥ ‪.‬ﺩﺍﺭ ﺍﳉﺎﻣﻌﺔ ﺍﳉﺪﻳﺪﺓ‪ ،2007‬ﺹ ‪.28‬‬

‫‪- 46 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻭﻫﻲ ﻭﻓﻘﺎ ﻟﺪﻻﻟﺔ ﺍﻟﻜﻠﻤﺔ ﺗﻨﺼﺮﻑ ﺇﱃ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭ ﺍﻟﻨﻈﺎﻡ ﺍﻟﺬﻱ ﳛﺘﻮﻱ ﻋﻠﻴﻬﺎ ﲟﺎ ﰲ ﺫﻟﻚ ﺷﺒﻜﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﻫﺬﻩ ﺍﻷﻓﻌﺎﻝ ﰲ ﺍﳊﻘﻴﻘﺔ ﻣﺎ ﻫﻲ ﺇﻻ ﺟﺰﺀ ﻣﻦ ﺍﻟﻈﺎﻫﺮﺓ ﺍﻹﺟﺮﺍﻣﻴﺔ ‪.‬‬

‫ﻷﺟﻞ ﻫﺬﺍ ﻓﻘﺪ ﺗﺒﲎ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﺣﺪﻳﺜﺎ ﲟﻮﺟﺐ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﺗﻌﺮﻳﻔﺎ ﻣﻮﺳﻌﺎ ﻟﻠﺠﺮﺍﺋﻢ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺍﻋﺘﱪ ﺃ‪‬ﺎ ﺗﺸﻤﻞ ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺟﺮﺍﺋﻢ ﺍﳌﺴﺎﺱ ﺑﺄﻧﻈﻤﺔ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ﺍﶈﺪﺩﺓ ﰲ‬
‫ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﻣﻦ ﺍﳌﺎﺩﺓ ‪ 394‬ﻣﻜﺮﺭ ﺇﱃ ﺍﳌﺎﺩﺓ ‪ 394‬ﻣﻜﺮﺭ ‪ 07‬ﺃﻱ ﺟﺮﳝﺔ ﺃﺧﺮﻯ ﺗﺮﺗﻜﺐ ﺃﻭ ﻳﺴﻬﻞ‬
‫ﺍﺭﺗﻜﺎ‪‬ﺎ ﺑﻮﺍﺳﻄﺔ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻭ ﻧﻈﺎﻡ ﻟﻺﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﺑﺬﻟﻚ ﱂ ﻳﻌﺪ ﻣﻔﻬﻮﻡ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ ﻳﻘﺘﺼﺮ ﻋﻠﻰ ﺍﻷﻓﻌﺎﻝ ﺍﻟﱵ ﺗﻜﻮﻥ ﻓﻴﻬﺎ ﺍﳌﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﳏﻼ‬
‫ﻟﻺﻋﺘﺪﺍﺀ ﺑﻞ ﺗﻮﺳﻊ ﻧﻄﺎﻗﻬﺎ ﻟﺘﺸﻤﻞ ﺇﺿﺎﻓﺔ ﺇﱃ ﺫﻟﻚ ﺗﻠﻚ ﺍﻷﻓﻌﺎﻝ ﺍﻟﱵ ﺗﻜﻮﻥ ﺍﳌﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺳﻴﻠﺔ‬
‫ﻻﺭﺗﻜﺎ‪‬ﺎ‪.‬‬

‫ﻭﻳﺬﻫﺐ ﺑﻌﺾ ﺍﻟﻔﻘﻪ ﺍﳉﻨﺎﺋﻲ)‪(1‬ﺇﱃ ﺍﻟﻘﻮﻝ ﺑﺄﻥ ﻫﺬﻩ ﺍﻟﻄﺎﺋﻔﺔ ﺍﻷﺧﲑﺓ ﺗﺸﻜﻞ ﺃﻫﻢ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﺗﺘﺼﻞ‬
‫ﺑﺎﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺃﻛﺜﺮﻫﺎ ﺇﺛﺎﺭﺓ ﻟﻠﻤﺸﻜﻼﺕ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ‪ ،‬ﻓﻬﻲ ﺗﺘﻜﻮﻥ ﺑﺼﻔﺔ ﻋﺎﻣﺔ ﻣﻦ ﺑﻌﺾ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ‬
‫ﺍﻟﱵ ﻳﺘﻢ ﺍﺭﺗﻜﺎ‪‬ﺎ ﺑﻮﺍﺳﻄﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻓﺘﻜﺘﺴﺐ ﺩﺍﺧﻞ ﻫﺬﺍ ﺍﻹﻃﺎﺭ ﺧﺼﺎﺋﺺ ﺟﺪﻳﺪﺓ ﻻﺭﺗﺒﺎﻃﻬﺎ‬
‫ﺑﺎﳊﺎﺳﺐ ﺍﻵﱄ ﻭ ﺍﻟﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﺘﻤﻴﺰ ﻋﻦ ﺍﻟﺼﻮﺭﺓ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﳍﺎ ﻭﺗﺆﺩﻱ ﺑﺎﻟﺘﺎﱄ ﺇﱃ ﺻﻌﻮﺑﺔ ﺗﻄﺒﻴﻖ‬
‫ﺍﻟﻨﺼﻮﺹ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻋﻠﻴﻬﺎ ﻭﻫﻲ ﰲ ﺛﻮ‪‬ﺎ ﺍﳉﺪﻳﺪ‪ .‬ﻭﻣﻦ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻋﻠﻰ ﺳﺒﻴﻞ ﺍﳌﺜﺎﻝ ﳝﻜﻦ ﺃﻥ ﻧﺘﺼﻮﺭ‬
‫ﺍﺭﺗﻜﺎﺏ ﺟﺮﺍﺋﻢ ﺇﺭﻫﺎﺑﻴﺔ ‪ ،‬ﺟﺮﺍﺋﻢ ﺍﻟﺘﺰﻭﻳﺮ ﺃﻭ ﺟﺮﺍﺋﻢ ﺃﺧﻼﻗﻴﺔ ‪...‬ﺑﻮﺍﺳﻄﺔ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫ﻟﺬﻟﻚ ﻓﺎﻟﺴﺆﺍﻝ ﺍﳌﻄﺮﻭﺡ ﰲ ﻫﺬﺍ ﺍﻟﺼﺪﺩ ﻫﻮ ﻣﺪﻯ ﻗﺎﺑﻠﻴﺔ ﻭﻛﻔﺎﻳﺔ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻟﻌﻘﺎﺑﻴﺔ ﺍﻟﻘﺎﺋﻤﺔ ﻭﺍﳌﻨﻈﻤﺔ‬
‫ﻟﻠﺠﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻟﻺﻧﻄﺒﺎﻕ ﻋﻠﻰ ﻫﺬﻩ ﺍﻷﳕﺎﻁ ﺍﳉﺪﻳﺪﺓ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‪.‬‬

‫ﺇﻥ ﺍﻟﺪﺭﺍﺳﺔ ﺍﻟﺘﺤﻠﻴﻠﻴﺔ ﳌﺨﺘﻠﻒ ﺍﻹﲡﺎﻫﺎﺕ ﺍﻟﻔﻘﻬﻴﺔ ﻭﺍﻟﻘﻀﺎﺋﻴﺔ ﺃﻇﻬﺮﺕ ﻗﺼﻮﺭ ﻧﺼﻮﺹ ﺍﻟﺘﺠﺮﱘ‬
‫ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﺍﻟﺴﺎﺋﺪﺓ ﻭﻋﺠﺰﻫﺎ ﻋﻦ ﺍﻹﺣﺎﻃﺔ ‪‬ﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻭﻣﺮﺩ ﺫﻟﻚ ﺇﱃ ﺣﻘﻴﻘﺘﲔ ﻗﺎﻧﻮﻧﻴﺘﲔ ﺃﺳﺎﺳﻴﺘﲔ‪:‬‬

‫ﺍﻷﻭﱃ ﺗﺘﻌﻠﻖ ﲟﺒﺪﺀ ﺍﻟﺸﺮﻋﻴﺔ ﺍﻟﺬﻱ ﳝﻨﻊ ﺍﳌﺴﺎﺀﻟﺔ ﺍﳉﺰﺍﺋﻴﺔ ﻣﺎ ﱂ ﻳﺘﻮﻓﺮ ﺍﻟﻨﺺ ﺍﻟﻘﺎﻧﻮﱐ‪ ،‬ﻓﻼ ﺟﺮﳝﺔ‬
‫ﻭﻻ ﻋﻘﻮﺑﺔ ﺇﻻ ﺑﻨﺺ ﻭﻣﱴ ﺍﻧﺘﻔﻰ ﺍﻟﻨﺺ ﻋﻠﻰ ﲡﺮﱘ ﻣﺜﻞ ﻫﺬﻩ ﺍﻷﻓﻌﺎﻝ ﺍﻟﱵ ﻻ ﺗﻄﺎﳍﺎ ﺍﻟﻨﺼﻮﺹ ﺍﻟﻘﺎﺋﻤﺔ‬
‫ﺍﻣﺘﻨﻌﺖ ﺍﳌﺴﺆﻭﻟﻴﺔ ﻭﲢﻘﻖ ﺍﻟﻘﺼﻮﺭ ﰲ ﻣﻜﺎﻓﺤﺔ ﻫﻜﺬﺍ ﺟﺮﺍﺋﻢ‪.‬‬

‫)‪ (1‬ﻧﺎﺋﻠﺔ ﳏﻤﺪ ﻓﺮﻳﺪ ﻗﻮﺭﺓ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ ‪.265‬‬

‫‪- 47 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻭﺍﻟﺜﺎﻧﻴﺔ ﺗﺘﻌﻠﻖ ﲟﺴﺄﻟﺔ ﺍﻟﻘﻴﺎﺱ ﰲ ﺍﻟﻨﺼﻮﺹ ﺍﳉﺰﺍﺋﻴﺔ ﺍﳌﻮﺿﻮﻋﻴﺔ ﺃﻳﻦ ﻳﻜﻮﻥ ﳏﻀﻮﺭﺍ ﻭﻏﲑ ﺟﺎﺋﺰ‬
‫ﻭﻳﻜﺎﺩ ﻳﻨﺤﺼﺮ ﰲ ﺍﳊﻘﻞ ﺍﳉﺰﺍﺋﻲ ﻋﻠﻰ ﺍﻟﻨﺼﻮﺹ ﺍﻹﺟﺮﺍﺋﻴﺔ ﻛﻠﻤﺎ ﻛﺎﻧﺖ ﺃﺻﻠﺢ ﻟﻠﻤﺘﻬﻢ ﻭﻣﺆﺩﻯ ﺫﻟﻚ‬
‫ﺍﻣﺘﻨﺎﻉ ﻗﻴﺎﺱ ﺃﳕﺎﻁ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺮﺗﻜﺒﺔ ﺑﻮﺍﺳﻄﺔ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻭ ﻋﻦ ﻃﺮﻳﻖ ﻭﺳﻴﻠﺔ ﺍﺗﺼﺎﻝ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ‬
‫ﻋﻠﻰ ﺃﳕﺎﻁ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﰲ ﺻﻮﺭ‪‬ﺎ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ‪.‬‬

‫ﻟﺬﻟﻚ ﻓﺎﻟﻄﺒﻴﻌﺔ ﺍﳋﺎﺻﺔ ﺍﻟﱵ ﺗﺘﻤﻴﺰ ‪‬ﺎ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺟﻌﻠﺘﻬﺎ ﲣﻠﻖ ﻣﺎ ﻳﺴﻤﻰ ﺑﺄﺯﻣﺔ ﺍﻟﻘﺎﻧﻮﻥ‬
‫ﺍﳉﺰﺍﺋﻲ‪،‬ﺣﻴﺚ ﺗﻀﺨﻢ ﺍﻟﻔﺎﺭﻕ ﺑﲔ ﻣﺎ ﻳﻨﺘﺞ ﻣﻦ ﺗﻘﻨﻴﺎﺕ ﻭﺑﲔ ﻣﺎﻳﺮﺗﻜﺐ ﺑﺼﺪﺩﻫﺎ ﻣﻦ ﺟﺮﺍﺋﻢ ﻭﺑﲔ ﻣﺎ‬
‫ﻳﺮﺻﺪ ﳍﺎ ﻣﻦ ﻧﺼﻮﺹ ﺗﺸﺮﻳﻌﻴﺔ ﳌﻮﺍﺟﻬﺔ ﻫﺬﻩ ﺍﻟﻈﺎﻫﺮﺓ ﺧﺎﺻﺔ ﻭ ﺃﻥ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﺰﺍﺋﻲ ﻻ ﻳﺘﻄﻮﺭ ﺑﻨﻔﺲ‬
‫ﺍﻟﺴﺮﻋﺔ ﺍﻟﱵ ﺗﺘﻄﻮﺭ ‪‬ﺎ ﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎ ﺃﻭ ﻣﻬﺎﺭﺓ ﺍﻟﺬﻫﻦ ﺍﻟﺒﺸﺮﻱ ﻭﺗﺴﺨﲑ ﻫﺬﻩ ﺍﳌﺒﻜﺮﺍﺕ ﻟﻺﺳﺘﺨﺪﺍﻡ‬
‫ﺍﻟﺴﻲﺀ‪ .‬ﻭﻫﻮ ﺍﻷﻣﺮ ﺍﻟﺬﻱ ﻻ ﳜﻠﻮ ﻣﻦ ﺍﳊﺎﺟﺔ ﺇﱃ ﺍﻟﻘﻮﺍﻧﲔ ﺍﻟﱵ ﺗﺴﻌﻰ ﺇﱃ ﺍﺳﺘﺨﺪﺍﻡ ﺗﺸﺮﻳﻌﺎﺕ ﺟﺰﺍﺋﻴﺔ‬
‫ﻗﺎﺑﻠﺔ ﻟﻠﺘﻄﺒﻴﻖ ﻋﻠﻰ ﻫﺬﻩ ﺍﻟﻄﺎﺋﻔﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‪ .‬ﻭﻫﻮ ﻣﺎﺳﻌﺖ ﺇﱃ ﲡﺴﻴﺪﻩ ﺑﻌﺾ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻟﻌﻘﺎﺑﻴﺔ‬
‫ﺍﳌﻘﺎﺭﻧﺔ ﻧﺬﻛﺮ ﻣﻨﻬﺎ ﻋﻠﻰ ﺳﺒﻴﻞ ﺍﳌﺜﺎﻝ‪:‬‬
‫‪ -‬ﺍﻟﺘﺸﺮﻳﻊ ﺍﻷﻣﺮﻳﻜﻲ ﺍﻟﺬﻱ ﻭﺿﻊ ﻗﺎﻧﻮﻥ ﺁﺩﺍﺏ ﺍﻹﺗﺼﺎﻻﺕ ﻋﺎﻡ ‪ ،1996‬ﻭﺍﻟﺬﻱ ﺟﺮﻡ ﻣﻦ ﺧﻼﻟﻪ ﻧﻘﻞ‬
‫ﺍﳌﻮﺍﺩ ﺍﻟﻔﺎﺣﺸﺔ ﻟﻸﻃﻔﺎﻝ ﰲ ﺃﻱ ﻣﻜﺎﻥ ﻋﻠﻰ ﺍﻷﻧﺘﺮﻧﺎﺕ‪ (1)،‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻷﻣﺮﻳﻜﻲ ﳉﺮﺍﺋﻢ‬
‫ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﻭﺍﻷﻧﺘﺮﻧﺎﺕ ﻋﺎﻡ ‪ 1998‬ﻭﺍﻟﺬﻱ ﺟﺮﻡ ﻣﻦ ﺧﻼﻟﻪ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻷﻓﻌﺎﻝ ﻧﺬﻛﺮ ﻣﻨﻬﺎ ﺍﻟﺘﺤﺮﻳﺾ‬
‫ﻋﻠﻰ ﺍﻹﻧﺘﺤﺎﺭ ﻋﱪ ﺍﻷﺗﺮﻧﺎﺕ‪ ،‬ﲢﺮﻳﺾ ﺍﻟﻘﺼﺮ ﻋﻠﻰ ﺍﻷﻧﺸﻄﺔ ﺍﳉﻨﺴﻴﺔ ﻋﱪ ﺍﻟﻮﺳﺎﺋﻞ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﺟﺮﺍﺋﻢ‬
‫ﺍﻟﺘﺰﻭﻳﺮ ﺍﻹﻟﻜﺘﺮﻭﱐ‪ ،‬ﺟﺮﺍﺋﻢ ‪‬ﺪﻳﺪ ﺍﻟﺴﻼﻣﺔ ﺍﻟﻌﺎﻣﺔ ﻭ ﺍﻹﺭﻫﺎﺏ ﺍﻹﻛﺘﺮﻭﱐ)‪.(2‬‬
‫‪ -‬ﺍﻟﺘﺸﺮﻳﻊ ﺍﳌﻐﺮﰊ ﺍﻟﺬﻱ ﺃﺻﺪﺭ ﺍﻟﻘﺎﻧﻮﻥ ‪ 03/03‬ﺍﳌﻌﺪﻝ ﻭ ﺍﳌﺘﻤﻢ ﻟﻠﻘﺎﻧﻮﻥ ﺍﳉﻨﺎﺋﻲ ﺍﳌﻐﺮﰊ)‪(3‬ﺃﻳﻦ‬
‫ﺟﺮﻡ ﰲ ﺍﳌﺎﺩﺓ ‪2-218‬ﻣﻨﻪ ﺇﺳﺘﻌﻤﺎﻝ ﻭﺳﺎﺋﻞ ﺍﻹﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﰲ ﺍﻹﺷﺎﺩﺓ ﺑﺎﻷﻓﻌﺎﻝ ﺍﻹﺭﻫﺎﺑﻴﺔ‪.‬‬
‫ﺃﻣﺎ ﻋﻠﻰ ﻣﺴﺘﻮﻯ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ ﻓﺈﻥ ﻧﺺ ﺍﳌﺎﺩﺓ ‪(4)02‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﺍﳌﺘﻀﻤﻦ ﺍﻟﻘﻮﺍﻋﺪ‬
‫ﺍﳋﺎﺻﺔ ﻟﻠﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭﺍﻹﺗﺼﺎﻝ ﻏﲑ ﻛﺎﻑ ﻭﺣﺪﻩ ﻟﺘﺠﺮﱘ ﺍﻷﻓﻌﺎﻝ‬

‫)‪(1‬ﺍﳌﺎﺩﺓ ‪18USC 2251 etcseq‬ﺟﺮﻣﺖ ﺍﻟﺘﻘﺎﻁ ﺍﻟﺼﻮﺭ ﺍﻹﺑﺎﺣﻴﺔ ﻟﻸﻃﻔﺎﻝ ﻭﺍﻹﻋﻼﻥ ﻋﻨﻬﺎ ﻋﱪ ﺍﻹﻧﺘﺮﻧﺖ‪.‬‬
‫)‪ (2‬ﻟﻠﺘﻔﺼﻴﻞ ﺃﻛﺜﺮ ﺃﻧﻈﺮ ﰲ ﻫﺬﺍ ﺍﳌﻌﲎ ﺍﻷﺳﺘﺎﺫ ﳏﺮﻭﺱ ﻧﺼﺎﺭ ﻏﺎﻳﺐ‪ ،‬ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﲝﺚ ﻣﻘﺪﻡ ﻟﻠﻤﻌﻬﺪ ﺍﻟﺘﻘﲏ ﳉﺎﻣﻌﺔ ﺍﻷﻧﺒﺎﺭ ﻣﻨﺸﻮﺭ ﺑﺘﺎﺭﻳﺦ‬
‫‪ .2011/5/3‬ﺑﺪﻭﻥ ﺗﺮﻗﻴﻢ‬
‫)‪ (3‬ﺃﺻﺒﺢ ﻫﺬﺍ ﺍﻟﻘﺎﻧﻮﻥ ﻳﺸﻜﻞ ﺍﻟﺒﺎﺏ ﺍﻷﻭﻝ‪ ،‬ﻣﻜﺮﺭ ﻣﻦ ﺍﳉﺰﺀ ﺍﻷﻭﻝ ﻣﻦ ﺍﻟﻜﺘﺎﺏ ﺍﻟﺜﺎﻟﺚ ﻣﻦ ﳎﻤﻮﻋﺔ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﻨﺎﺋﻲ ﺍﳌﻐﺮﰊ ﲢﺖ ﻋﻨﻮﺍﻥ ﺍﻹﺭﻫﺎﺏ‪.‬‬
‫)‪ (4‬ﺗﻨﺺ ﺍﳌﺎﺩﺓ ﺍﻟﺜﺎﻧﻴﺔ ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﻳﻘﺼﺪ ﰲ ﻣﻔﻬﻮﻡ ﻫﺬﺍ ﺍﻟﻘﺎﻧﻮﻥ ﻣﺎ ﻳﺄﰐ‪" :‬ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺔ ﺍﻹﻋﻼﻡ ﻭﺍﻹﺗﺼﺎﻝ‪ :‬ﺟﺮﺍﺋﻢ ﺍﳌﺴﺎﺱ‬
‫ﺑﺄﻧﻈﻤﺔ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ﺍﶈﺪﺩﺓ ﰲ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﻭﺃﻱ ﺟﺮﳝﺔ ﺃﺧﺮﻯ ﺗﺮﺗﻜﺐ ﺃﻭ ﻳﺴﻬﻞ ﺍﺭﺗﻜﺎ‪‬ﺎ ﻋﻦ ﻃﺮﻳﻖ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻭ ﻧﻈﺎﻡ‬
‫ﺍﺗﺼﺎﻻﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﺔ"‪.‬‬

‫‪- 48 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﻟﱵ ﺗﺮﺗﻜﺐ ﺑﻮﺍﺳﻄﺔ ﺍﳌﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻭ ﻳﺴﻬﻞ ﺍﺭﺗﻜﺎ‪‬ﺎ ﻋﻦ ﻃﺮﻳﻖ ﻫﺬﻩ ﺍﳌﻨﻈﻮﻣﺔ ﻃﺎﳌﺎ ﺃﻧﻪ ﻻ‬
‫ﺗﻮﺟﺪ ﻧﺼﻮﺹ ﻗﺎﻧﻮﻧﻴﺔ ﻣﻮﺿﻮﻋﻴﺔ ﲡﺮﻡ ﻛﻞ ﻓﻌﻞ ﺑﻌﻴﻨﻪ ﻭﲢﺪﺩ ﺃﺭﻛﺎﻧﻪ ﻭﺍﻟﻌﻘﻮﺑﺔ ﺍﳌﻘﺮﺭﺓ ﻟﻪ‪ ،‬ﻭﻫﻮ ﺍﻷﻣﺮ‬
‫ﺍﻟﺬﻱ ﳜﺎﻟﻒ ﻣﺒﺪﺍ ﺷﺮﻋﻴﺔ ﺍﻟﺘﺠﺮﱘ ﻭ ﺍﻟﻌﻘﺎﺏ‪ (1)،‬ﻓﻌﺒﺎﺭﺓ "ﺃﻱ ﺟﺮﳝﺔ ﺃﺧﺮﻯ"ﺍﻟﱵ ﺍﺳﺘﻌﻤﻠﻬﺎ ﺍﳌﺸﺮﻉ ﰲ‬
‫ﺍﳌﺎﺩﺓ ﺍﻟﺜﺎﻧﻴﺔ ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪04/09‬ﻧﻌﺘﻘﺪ ﺃﻧﻪ ﻻ ﳝﻜﻦ ﺍﻟﻘﻴﺎﺱ ﻋﻠﻴﻬﺎ ﳌﺘﺎﺑﻌﺔ ﺃﻱ ﺷﺨﺺ ﺟﺰﺍﺋﻴﺎ ﺣﱴ ﻭﻟﻮ‬
‫ﺍﺭﺗﻜﺐ ﺟﺮﳝﺔ ﺗﻘﻠﻴﺪﻳﺔ ﺑﻮﺍﺳﻄﺔ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﻇﻞ ﻏﻴﺎﺏ ﺍﻟﻨﺺ ﺍﳉﺰﺍﺋﻲ ﺍﻟﺬﻱ ﳚﺮﻡ ﻫﺬﺍ ﺍﻟﻔﻌﻞ‬
‫ﺇﺫﺍ ﺍﺭﺗﻜﺐ ﺑﻮﺍﺳﻄﺔ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﺻﺮﺍﺣﺔ‪.‬‬
‫ﻟﺬﻟﻚ ﻧﺪﻋﻮ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻟﺘﻌﺪﻳﻞ ﺍﻟﻨﺼﻮﺹ ﺍﻟﻘﺎﺋﻤﺔ ﻟﺘﺴﺘﻮﻋﺐ ﺍﻟﺼﻮﺭ ﺍﳌﺘﻄﻮﺭﺓ ﻟﻠﺠﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ‬
‫) ‪(2‬‬
‫ﻭﺍﻟﱵ ﳝﻜﻦ ﺣﺴﺐ ﻃﺒﻴﻌﺘﻬﺎ ﺃﻥ ﺗﺮﺗﻜﺐ ﺑﻮﺍﺳﻄﺔ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫)‪ (1‬ﺟﺎﺀ ﻋﻠﻰ ﻟﺴﺎﻥ ﺍﻟﻘﺎﺿﻲ ‪ Krever‬ﻗﺎﺿﻲ ﳏﻜﻤﺔ ﺍﻹﺳﺘﺌﻨﺎﻑ ﺍﻟﻜﻨﺪﻳﺔ ﰲ ﻣﻌﺮﺽ ﺗﺴﺒﻴﺒﻪ ﻋﻦ ﺃﺣﻜﺎﻣﻪ ﺑﱪﺍﺀﺓ ﻣﺘﻬﻢ ﰲ ﺟﺮﳝﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ‪ :‬ﺇﻥ ﻫﺬﺍ‬
‫ﺍﳊﻜﻢ ﻭﺇﻥ ﻛﺎﻥ ﻳﺒﺪﻭ ﻏﲑ ﻣﻨﺎﺳﺐ ﻟﻠﻮﻓﺎﺀ ﳊﺎﺟﺎﺕ ﺍ‪‬ﺘﻤﻊ ﺍﳊﺪﻳﺚ ﺧﺎﺻﺔ ﺑﻌﺪ ﺃﻥ ﺩﺧﻞ ﻫﺬﺍ ﺍ‪‬ﺘﻤﻊ ﻋﺼﺮ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺇﻻ ﺃﻥ ﺍﳊﻞ ﺍﻟﻮﺣﻴﺪ ﰲ ﻳﺪ‬
‫ﺍﳌﺸﺮﻉ ﺍﻟﺬﻱ ﻋﻠﻴﻪ ﺗﻐﻴﲑ ﺍﻟﻘﺎﻧﻮﻥ ﻷﻥ ﺍﶈﻜﻤﺔ ﻟﻴﺲ ﳍﺎ ﳏﺎﻭﻟﺔ ﻣﻂ ﺍﻟﻘﻮﺍﻧﲔ ﺍﻟﻘﺪﳝﺔ ﻛﻲ ﺗﻌﺎﰿ ﻣﺸﻜﻼﺕ ﺗﻘﻊ ﺧﺎﺭﺝ ﺗﺼﻮﺭ ﻫﺬﻩ ﺍﻟﻘﻮﺍﻧﲔ‪.‬‬
‫)‪ (2‬ﺟﺮﻡ ﻣﺸﺮﻭﻉ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﻌﺮﰊ ﺍﻟﻨﻤﻮﺫﺟﻲ ﺍﳌﻮﺣﺪ ﳌﻜﺎﻓﺤﺔ ﺳﻮﺀ ﺇﺳﺘﺨﺪﺍﻡ ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﻹﺗﺼﺎﻝ ﺑﻌﺾ ﺍﻷﻓﻌﺎﻝ ﻛﻤﺎ ﻳﻠﻲ‪:‬‬
‫‪ -‬ﺍﳌﺎﺩﺓ ﺍﻟﺴﺎﺑﻌﺔ‪":‬ﻛﻠﻤﻦ ﺯﻭﺭ ﺍﳌﺴﺘﻨﺪﺍﺕ ﺍﳌﻌﺎﳉﺔ ﺁﻟﻴﺎ‪.‬‬
‫‪ -‬ﺍﳌﺎﺩﺓﺍﻟﺜﺎﻣﻨﺔ‪":‬ﻛﻞ ﻣﻦ ﺍﺳﺘﺨﺪﻡ ﺍﳌﺴﺘﻨﺪﺍﺕ ﺍﳌﻌﺎﳉﺔ ﺁﻟﻴﺎ ﻣﻊ ﻋﻠﻤﻪ ﺑﺘﺰﻭﻳﺮﻫﺎ‪.‬‬
‫‪ -‬ﺍﳌﺎﺩﺓ ﺍﻟﺘﺎﺳﻌﺔ‪ :‬ﻛﻞ ﻣﻦ ﻗﺎﻡ ﺑﺘﺤﻮﻳﻞ ﺍﻷﻣﻮﺍﻝ ﻏﲑ ﺍﳌﺸﺮﻭﻋﺔ ﺃﻭ ﻗﺎﻡ ﺑﻨﻘﻠﻬﺎ ﺃﻭ ﺑﺘﻤﻮﻳﻪ ﺍﳌﺼﺎﺩﺭ ﻏﲑ ﺍﳌﺸﺮﻭﻋﺔ ﳍﺎ ﻭﺇﺧﻔﺎﺋﻬﺎ ﺃﻭ ﻗﺎﻡ ﺑﺎﺳﺘﺨﺪﺍﻡ‬
‫ﺍﻷﻣﻮﺍﻝ ﺃﻭ ﺍﻛﺘﺴﺎ‪‬ﺎ ‪ ...‬ﻭﺫﻟﻚ ﻋﻦ ﻃﺮﻳﻖ ﺍﺳﺘﺨﺪﺍﻡ ﻧﻈﺎﻡ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻭﺷﺒﻜﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﺪﻭﻟﻴﺔ‪.‬‬
‫‪ -‬ﺍﳌﺎﺩﺓ ﺍﻟﻌﺎﺷﺮﺓ‪ :‬ﻛﻞ ﻣﻦ ﺗﺴﺒﺐ ﻋﻤﺪﺍ ﰲ ﺍﻹﻋﺘﺪﺍﺀﻋﻠﻰ ﺍﻟﻘﻴﻢ ﺍﻟﺪﻳﻨﻴﺔ ﺃﻭ ﺣﺮﻣﺔ ﺍﳊﻴﺎﺓ ﺍﳋﺎﺻﺔ ﺃﻭ ﺧﺪﺵ ﺍﻵﺩﺍﺏ ﺍﻟﻌﺎﻣﺔ ﻭﻓﻘﺎ ﻟﻠﺘﺸﺮﻳﻊ ﺍﻟﺪﺍﺧﻠﻲ‬
‫ﻟﻜﻞ ﺩﻭﻟﺔ ﺑﺎﺳﺘﺨﺪﺍﻡ ﺍﻷﻧﻈﻤﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻭ ﺍﻹﻧﺘﺮﻧﺖ‪.‬‬

‫‪- 49 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﳌﺒﺤﺚ ﺍﻟﺜﺎﱐ‪:‬‬
‫ﺃﻃـﺮﺍﻑ ﺍﳉـﺮﳝﺔ ﺍﳌﻌﻠﻮﻣـﺎﺗﻴﺔ‬
‫ﻟﻘﺪ ﺃﺿﺎﻓﺖ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﻜﺜﲑ ﻣﻦ ﺍﳉﻮﺍﻧﺐ ﺍﻹﳚﺎﺑﻴﺔ ﺇﱃ ﺣﻴﺎﺗﻨﺎ‪ ،‬ﺇﻻ ﺃ‪‬ﺎ ﰲ ﺍﳌﻘﺎﺑﻞ ﺟﻠﺒﺖ ﻣﻌﻬﺎ‬
‫ﺷﻜﻼ ﺟﺪﻳﺪ‪‬ﺍ ﻣﻦ ﺍ‪‬ﺮﻣﲔ ﺍﺻﻄﻠﺢ ﻋﻠﻰ ﺗﺴﻤﻴﺘﻬﻢ ﲟﺠﺮﻣﻲ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻓﻠﻢ ﻳﻜﻦ ﻻﺭﺗﺒﺎﻁ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﺎﳊﺎﺳﺐ ﺍﻵﱄ ﺃﺛﺮﻩ ﻋﻠﻰ ﲤﻴﻴﺰ ﻫﺬﻩ ﺍﳉﺮﳝﺔ ﻋﻦ ﻏﲑﻫﺎ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻓﺤﺴﺐ‪ ،‬ﺑﻞ‬
‫ﻛﺎﻥ ﻟﻪ ﺃﺛﺮﻩ ﺃﻳﻀﺎ ﻋﻠﻰ ﲤﻴﺰ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻋﻦ ﻏﲑﻩ ﻣﻦ ﺍ‪‬ﺮﻣﲔ ﺍﻟﺘﻘﻠﻴﺪﻳﲔ‪.‬‬
‫ﻛﻤﺎ ﺗﺮﺗﺐ ﻋﻠﻰ ﺫﻳﻮﻉ ﺍﳌﻌﺎﺭﻑ ﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺔ ﻧﺘﻴﺠﺔ ﺛﻮﺭﺓ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻧﺘﺸﺎﺭ ﺍﻟﻮﺳﺎﺋﻞ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﲨﻴﻊ ﺍﻷﻧﺸﻄﺔ ﺍﻟﱵ ﺗﺰﺍﻭﻝ ﰲ ﺍ‪‬ﺘﻤﻌﺎﺕ ﺍﳊﺪﻳﺜﺔ‪ ،‬ﻭﺑﺎﻟﻨﺘﻴﺠﺔ ﺃﺩﻯ ﺫﻟﻚ ﺇﱃ ﺗﻮﺳﻊ ﺩﺍﺋﺮﺓ‬
‫ﺍﳌﺘﻀﺮﺭﻳﻦ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫ﺍﳌﻄﻠﺐ ﺍﻷﻭﻝ‪ :‬ﺍ‪‬ــﺮﻡ ﺍﳌﻌـﻠﻮﻣﺎﰐ‬

‫ﺇﻥ ﻣﻈﺎﻫﺮ ﺍﳋﻄﻮﺭﺓ ﺍﻟﱵ ﺗﺘﺠﻠﻰ ‪‬ﺎ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻥ ﻣﺮﺗﻜﺒﻴﻬﺎ ﻳﺘﺴﻤﻮﻥ ﺑﺎﻟﺬﻛﺎﺀ ﻭﺍﻟﺪﺭﺍﻳﺔ‬
‫ﰲ ﺍﻟﺘﻌﺎﻣﻞ ﰲ ﳎﺎﻝ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ﻭﺍﻹﳌﺎﻡ ﺑﺎﳌﻬﺎﺭﺍﺕ ﻭﺍﳌﻌﺎﺭﻑ ﺍﻟﺘﻘﻨﻴﺔ‪ ،‬ﻭﺇﺫﺍ ﻛﺎﻥ ﺍﻟﺸﺨﺺ‬
‫ﺍﻟﺬﻱ ﻳﺮﺗﻜﺐ ﺍﻟﻔﻌﻞ ﻏﲑ ﺍﳌﺸﺮﻭﻉ ﻭﻳﻌﺘﺪﻱ ﻓﻴﻪ ﻋﻠﻰ ﺣﻖ ﻣﻦ ﺣﻘﻮﻕ ﺍﻟﻐﲑ ﺑﺎﳌﻌﲎ ﺍﻟﻮﺍﺳﻊ ﻳﻌﺪ ﰲ ﻧﻈﻢ‬
‫ﺍﻟﻘﺎﻧﻮﻥ ﳎﺮﻣﺎ ﻭﻳﺘﻌﺮﺽ ﻟﻠﻌﻘﺎﺏ‪ ،‬ﻭﻛﻤﺎ ﻫﻮ ﻣﻌﺮﻭﻑ ﻓﺈﻧﻪ ﻻ ﳝﻜﻦ ﻟﻠﻌﻘﻮﺑﺔ ﺃﻥ ﲢﻘﻖ ﻫﺪﻓﻬﺎ ﻣﺎ ﱂ ﺗﻀﻊ‬
‫ﰲ ﺍﻹﻋﺘﺒﺎﺭ ﺷﺨﺼﻴﺔ ﺍ‪‬ﺮﻡ‪ .‬ﻭﺇﺫﺍ ﻛﻨﺎ ﰲ ﳎﺎﻝ ﺍﻹﺟﺮﺍﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻓﻴﺠﺐ ﺃﻥ ﻧﻨﻈﺮ ﺇﱃ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‬
‫ﻣﻦ ﺣﻴﺚ ﺻﻔﺎﺗﻪ ﻭﲰﺎﺗﻪ ﻭﻛﺬﺍ ﻣﻦ ﺣﻴﺚ ﺃﺻﻨﺎﻓﻪ ﻭﺃﳕﺎﻃﻪ‪.‬‬

‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺧﺼـﺎﺋﺺ ﺍ‪‬ـﺮﻡ ﺍﳌﻌﻠـﻮﻣﺎﰐ‬

‫ﻳﺘﻤﻴﺰ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻋﻦ ﻏﲑﻩ ﻣﻦ ﺍ‪‬ﺮﻣﲔ ﺑﺼﻔﺎﺕ ﻭﲰﺎﺕ ﻣﻌﻴﻨﺔ ﺟﻌﻠﺖ ﻣﻨﻪ ﳏﻞ ﺍﻟﻌﺪﻳﺪ ﻣﻦ‬
‫ﺍﻷﲝﺎﺙ ﻭﺍﻟﺪﺭﺍﺳﺎﺕ‪ ،‬ﻭﺍﺧﺘﻠﻒ ﺍﻟﺒﺎﺣﺜﻮﻥ ﰲ ﲢﺪﻳﺪ ﻫﺬﻩ ﺍﳋﺼﺎﺋﺺ ﻛﻤﺎ ﺍﺧﺘﻠﻔﻮﺍ ﰲ ﻣﺪﻯ ﺍﻧﻄﺒﺎﻕ‬
‫ﻭﺻﻒ ﺟﺮﺍﺋﻢ ﺫﻭﻱ ﺍﻟﺒﺎﻗﺎﺕ ﺍﻟﺒﻴﻀﺎﺀ)‪ (1‬ﻋﻠﻰ ﳎﺮﻣﻲ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺫﻟﻚ ﺃﻥ ﻛﻼ ﻣﻦ ﻫﺆﻻﺀ ﺍ‪‬ﺮﻣﲔ ﻗﺪ‬
‫ﻳﻜﻮﻥ ﻣﻦ ﺫﻭﻱ ﺍﻟﻜﻔﺎﺀﺍﺕ‪ ،‬ﻭﳍﻢ ﺍﻟﻘﺪﺭﺓ ﻋﻠﻰ ﺍﻟﺘﻜﻴﻒ ﺍﻹﺟﺘﻤﺎﻋﻲ‪.‬‬

‫)‪ (1‬ﻣﺼﻄﻠﺢ ﺍ‪‬ﺮﻣﲔ ﺫﻭﻱ ﺍﻟﻴﺎﻗﺎﺕ ﺍﻟﺒﻴﻀﺎﺀ ﻣﺼﻄﻠﺢ ﺣﺪﻳﺚ ﻧﺴﺒﻴﺎ ﻭﺃﻭﻝ ﻣﻦ ﺃﻃﻠﻘﻪ ﻫﻮ ﻋﺎﱂ ﺍﻹﺟﺘﻤﺎﻉ‪Sutherlanc‬ﺃﻳﻦ ﻭﺿﺢ ﺃﻥ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ‬
‫ﺗﺮﺗﻜﺐ ﻣﻦ ﻗﺒﻞ ﺍﻟﻄﺒﻘﺔ ﺍﻟﺮﺍﻗﻴﺔ ﰲ ﺍ‪‬ﺘﻤﻊ ﻭﺫﻭﻱ ﺍﳌﻨﺎﺻﺐ ﺍﻹﺩﺍﺭﻳﺔ ﺍﻟﻜﺒﲑﺓ ﻭﺗﺸﻤﻞ ﺃﻧﻮﺍﻋﺎ ﳐﺘﻠﻔﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﻛﻐﺴﻴﻞ ﺍﻷﻣﻮﺍﻝ‪ ،‬ﻭﻏﲑ ﺫﻟﻚ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﻟﱵ ﻳﻘﻮﻣﻮﻥ ﺑﺎﺭﺗﻜﺎ‪‬ﺎ ﻭﻫﻢ ﺟﺎﻟﺴﻮﻥ ﰲ ﻣﻜﺎﺗﺒﻬﻢ‪.‬‬

‫‪- 50 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻭﻣﻊ ﺫﻟﻚ ﳝﻜﻦ ﺃﻥ ﻧﺴﺘﺨﻠﺺ ﻣﻦ ﻫﺬﻩ ﺍﻷﲝﺎﺙ)‪ (1‬ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻟﺴﻤﺎﺕ ﺍﻟﱵ ﻳﺘﻤﻴﺰ ‪‬ﺎ ﺍ‪‬ﺮﻡ‬
‫ﺍﳌﻌﻠﻮﻣﺎﰐ ﻭﺍﻟﱵ ﻳﺴﺎﻋﺪ ﺍﻟﺘﻌﺮﻑ ﻋﻠﻴﻬﺎ ﰲ ﻣﻮﺍﺟﻬﺔ ﻫﺬﺍ ﺍﻟﻨﻤﻂ ﺍﳉﺪﻳﺪ ﻣﻦ ﺍ‪‬ﺮﻣﲔ ﻭﻣﻦ ﺃﻫﻢ ﻫﺬﻩ‬
‫ﺍﻟﺼﻔﺎﺕ‪:‬‬
‫‪ /.1‬ﺍﻟﺬﻛـﺎﺀ‪ :‬ﻳﻌﺘﱪ ﺍﻟﺬﻛﺎﺀ ﻣﻦ ﺃﻫﻢ ﺻﻔﺎﺕ ﻣﺮﺗﻜﺐ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻷﻥ ﺫﻟﻚ ﻳﺘﻄﻠﺐ‬
‫ﻣﻨﻪ ﺍﳌﻌﺮﻓﺔ ﺍﻟﺘﻘﻨﻴﺔ ﻟﻜﻴﻔﻴﺔ ﺍﻟﺪﺧﻮﻝ ﺇﱃ ﺃﻧﻈﻤﺔ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻭﺍﻟﻘﺪﺭﺓ ﻋﻠﻰ ﺍﻟﺘﻌﺪﻳﻞ ﻭﺍﻟﺘﻐﻴﲑ ﰲ ﺍﻟﱪﺍﻣﺞ‬
‫ﻟﺬﻟﻚ ﻋﺎﺩﺓ ﻣﺎ ﻳﺬﻛﺮ ﺃﻥ ﺍﻹﺟﺮﺍﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻫﻮ ﺇﺟﺮﺍﻡ ﺍﻷﺫﻛﻴﺎﺀ ﻭﺫﻟﻚ ﺑﺎﳌﻘﺎﺭﻧﺔ ﺑﺎﻹﺟﺮﺍﻡ ﺍﻟﺘﻘﻠﻴﺪﻱ‬
‫ﺍﻟﺬﻱ ﳝﻴﻞ ﺇﱃ ﺍﻟﻌﻨﻒ‪ (2)،‬ﻓﻬﺬﺍ ﺍ‪‬ﺮﻡ ﻻ ﳝﻜﻦ ﺃﻥ ﻳﻨﺘﻤﻲ‪ ‬ﺇﱃ ﻃﺎﺋﻔﺔ ﺍ‪‬ﺮﻣﲔ ﺍﻷﻏﺒﻴﺎﺀ‪ ،‬ﻓﻤﻦ ﻳﺴﺘﻌﲔ‬
‫ﲜﻬﺎﺯ ﺍﳊﺎﺳﻮﺏ ﻟﻺﺳﺘﻼﺀ ﻋﻠﻰ ﺃﺳﺮﺍﺭ ﺑﻨﻚ ﺃﻭ ﺷﺮﻛﺔ ﳐﺰﻧﺔ ﺑﻪ ﻻﺑﺪ ﺃﻥ ﻳﺘﻤﻴﺰ ﺑﺎﳌﺴﺘﻮﻯ ﺍﻟﺮﻓﻴﻊ ﻣﻦ‬
‫ﺍﻟﺬﻛﺎﺀ ﺣﱴ ﳝﻜﻨﻪ ﺃﻥ ﻳﺘﻐﻠﺐ ﻋﻠﻰ ﻛﺜﲑ ﻣﻦ ﺍﻟﻌﻘﺒﺎﺕ ﺍﻟﱵ ﺗﻮﺍﺟﻬﻪ ﰲ ﺍﺭﺗﻜﺎﺏ ﺟﺮﳝﺘﻪ‪.‬‬
‫ﻭﺗﺘﺠﻠﻰ ﺃﳘﻴﺔ ﺻﻔﺔ ﺍﻟﺬﻛﺎﺀ ﺑﺎﻟﻨﺴﺒﺔ ﳌﺮﺗﻜﺐ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﻋﺪﻡ ﺍﺳﺘﺨﺪﺍﻣﻪ ﻟﻠﻌﻨﻒ ﰲ ﺍﺭﺗﻜﺎﺑﻪ‬
‫ﻟﻠﺠﺮﳝﺔ‪ ،‬ﻓﺎﻟﺴﻠﻮﻙ ﺍﻹﺟﺮﺍﻣﻲ ﻳﻨﺸﺄ ﻣﻦ ﺗﻘﻨﻴﺎﺕ ﺍﻟﺘﺪﻣﲑ ﺍﻟﻨﺎﻋﻤﺔ )‪.(Sabotage soft‬‬
‫ﻓﻴﻜﻔﻲ ﺃﻥ ﻳﻘﻮﻡ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺑﺎﻟﺘﻼﻋﺐ ﺑﺒﻴﺎﻧﺎﺕ ﻭﺑﺮﺍﻣﺞ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻟﻜﻲ ﳝﺤﻮ ﺃﻭ ﻳﺪﻣﺮ ﻫﺬﻩ‬
‫ﺍﻟﺒﻴﺎﻧﺎﺕ ﺃﻭ ﻳﻌﻄﻞ ﺍﺳﺘﺨﺪﺍﻡ ﻫﺬﻩ ﺍﻟﱪﺍﻣﺞ‪.‬‬
‫‪/.2‬ﺍﳌﻬـﺎﺭﺓ‪ :‬ﺗﻌﺪ ﺍﳌﻬﺎﺭﺓ ﺍﳌﺘﻄﻠﺒﺔ ﻟﺘﻨﻔﻴﺬ ﺍﻟﻨﺸﺎﻁ ﺍﻹﺟﺮﺍﻣﻲ ﺃﺑﺮﺯ ﺧﺼﺎﺋﺺ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‬
‫ﻭﺍﻟﱵ ﻗﺪ ﻳﻜﺘﺴﺒﻬﺎ ﻋﻦ ﻃﺮﻳﻖ ﺍﻟﺪﺭﺍﺳﺔ ﺍﳌﺘﺨﺼﺼﺔ ﰲ ﻫﺬﺍ ﺍ‪‬ﺎﻝ ﺃﻭ ﻋﻦ ﻃﺮﻳﻖ ﺍﳋﱪﺓ ﺍﳌﻜﺘﺴﺒﺔ ﰲ ﳎﺎﻝ‬
‫ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺃﻭ ﲟﺠﺮﺩ ﺍﻟﺘﻔﺎﻋﻞ ﺍﻻﺟﺘﻤﺎﻋﻲ ﻣﻊ ﺍﻵﺧﺮﻳﻦ‪ .‬ﻭﻣﺴﺘﻮﻯ ﺍﳌﻬﺎﺭﺓ ﺍﻟﱵ ﻳﻜﻮﻥ ﻋﻠﻴﻬﺎ‬
‫ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻫﻲ ﺍﻟﱵ ﲢﺪﺩ ﺍﻷﺳﻠﻮﺏ ﺍﻟﺬﻱ ﻳﺮﺗﻜﺐ ﺑﻪ ﺍﳉﺮﺍﺋﻢ‪ ،‬ﲝﻴﺚ ﺇﺫﺍ ﻛﺎﻥ ﺍﻟﺸﺨﺺ ﻣﺮﺗﻜﺐ‬
‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﻗﺪﺭ ﺿﺌﻴﻞ ﻣﻦ ﻣﺴﺘﻮﻯ ﺍﳌﻬﺎﺭﺓ ﳒﺪ ﺃﻥ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﻗﺪ ﻳﺮﺗﻜﺒﻬﺎ ﻻ ﺗﺘﻌﺪ‬
‫ﺍﻹﺗﻼﻑ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺃﻭ ﻧﺴﺦ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﺍﻟﱪﺍﻣﺞ‪ (3)،‬ﺃﻣﺎ ﺇﺫﺍ ﻛﺎﻥ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻋﻠﻰ ﺩﺭﺟﺔ ﺃﻋﻠﻰ ﰲ‬
‫ﺍﳌﺴﺘﻮﻯ ﺍﳌﻬﺎﺭﻱ ﻓﺈﻥ ﺃﺳﻠﻮﺏ ﺍﺭﺗﻜﺎﺑﻪ ﻟﻠﺠﺮﺍﺋﻢ ﳜﺘﻠﻒ‪ ،‬ﺇﺫ ﳝﻜﻨﻪ ﻋﻦ ﻃﺮﻳﻖ ﺍﺳﺘﺨﺪﺍﻡ ﺍﻟﺸﺒﻜﺎﺕ‬

‫)‪ (1‬ﻳﻌﺪ ﺍﻷﺳﺘﺎﺫ ‪ Parker‬ﻭﺍﺣﺪﺍ ﻣﻦ ﺃﻫﻢ ﺍﻟﺒﺎﺣﺜﲔ ﺍﻟﺬﻳﻦ ﻋﻨﻮﺍ ﺑﺎﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﺼﻔﺔ ﻋﺎﻣﺔ ﻭﺑﺎ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺑﺼﻔﺔ ﺧﺎﺻﺔ ﻭﻳﺮﻯ ﺍﻷﺳﺘﺎﺫ‬
‫‪ Parker‬ﺑﺪﺍﺀﺓ ﺃﻥ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‪ ،‬ﻭﺇﻥ ﻛﺎﻥ ﻳﺘﻤﻴﺰ ﺑﺒﻌﺾ ﺍﻟﺴﻤﺎﺕ ﺍﳋﺎﺻﺔ ﺑﻪ ﺇﻻ ﺃﻧﻪ ﻻ ﳜﺮﺝ ﰲ ﺍﻟﻨﻬﺎﻳﺔ ﻋﻦ ﻛﻮﻧﻪ ﻣﺮﺗﻜﺒﺎ ﻟﻔﻌﻞ ﺇﺟﺮﺍﻣﻲ ﻳﺴﺘﻮﺟﺐ‬
‫ﺗﻮﻗﻴﻊ ﺍﻟﻌﻘﺎﺏ ﻋﻠﻴﻪ‪ .‬ﻭﻳﺮﻣﺰ ﺍﻷﺳﺘﺎﺫ ﺑﺎﺭﻛﺮ ﳍﺬﻩ ﺍﻟﺼﻔﺎﺕ ﺑﻜﻠﻤﺔ ‪ SKRAM‬ﻭﻫﻲ ﺗﻌﲏ ﺍﳌﻬﺎﺭﺓ )‪ ،(SKILLS‬ﺍﳌﻌﺮﻓﺔ )‪ (Knowledg‬ﺍﻟﻮﺳﻴﻠﺔ‬
‫)‪ ،(Resources‬ﺍﻟﺴﻠﻄﺔ )‪ (Autority‬ﻭﺃﺧﲑﺍ ﺍﻟﺒﺎﻋﺚ )‪.(Motives‬‬
‫)‪ (2‬ﻏﻨﺎﻡ ﳏﻤﺪ ﻏﻨﺎﻡ‪ ،‬ﺍﳊﻤﺎﻳﺔ ﺍﳉﻨﺎﺋﻴﺔ ﻟﺒﻄﺎﻗﺎﺕ ﺍﻹﺋﺘﻤﺎﻧﺎﳌﻤﻐﻨﻄﺔ ‪.‬ﻣﺆﲤﺮ ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻭ ﺍﻷﻣﻨﻴﺔ ﻟﻠﻌﻤﻠﻴﺎﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ‪.‬ﺩﰊ ‪2003‬ﺹ ‪.05‬‬
‫)‪ (3‬ﺧﺎﻟﺪ ﳏﻤﻮﺩ ﺍﺑﺮﺍﻫﻴﻢ‪ ،‬ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ .‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ ‪. 135‬‬

‫‪- 51 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺑﺎﻟﺪﺧﻮﻝ ﺇﱃ ﺃﻧﻈﻤﺔ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻟﺴﺮﻗﺔ ﺍﻷﻣﻮﺍﻝ ﻭﺍﺭﺗﻜﺎﺏ ﺟﺮﺍﺋﻢ ﲡﺴﺲ ﻭﺯﺭﻉ ﺍﻟﻔﲑﻭﺳﺎﺕ‬
‫ﻭﻏﲑﻫﺎ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﺗﺘﻄﻠﺐ ﻣﻬﺎﺭﺓ ﻋﺎﻟﻴﺔ ﰲ ﺍﺭﺗﻜﺎ‪‬ﺎ‪.‬‬
‫ﻛﻤﺎ ﺃﻥ ﺍﳌﻬﺎﺭﺓ ﺍﻟﱵ ﻳﺘﻤﻴﺰ ‪‬ﺎ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﲤﻜﻨﻪ ﻣﻦ ﺗﻜﻮﻳﻦ ﺗﺼﻮﺭ ﻛﺎﻣﻞ ﳉﺮﳝﺘﻪ‪ ،‬ﺇﺫ‬
‫ﻳﺴﺘﻄﻴﻊ ﺃﻥ ﻳﻄﺒﻖ ﺟﺮﳝﺘﻪ ﻋﻠﻰ ﺃﻧﻈﻤﺔ ﳑﺎﺛﻠﺔ ﻛﺘﻠﻚ ﺍﻟﱵ ﻳﺴﺘﻬﺪﻓﻬﺎ ﻭﺫﻟﻚ ﻗﺒﻞ ﺗﻨﻔﻴﺬ ﺟﺮﳝﺘﻪ‪ ،‬ﺣﱴ ﻻ‬
‫ﻳﺘﻔﺎﺟﺄ ﺑﺄﻣﻮﺭ ﻏﲑ ﻣﺘﻮﻗﻌﺔ ﻣﻦ ﺷﺄ‪‬ﺎ ﺇﻓﺸﺎﻝ ﳐﻄﻄﺎﺗﻪ ﺃﻭ ﺍﻟﻜﺸﻒ ﻋﻨﻬﺎ‪ ،‬ﻓﻌﺎﺩﺓ ﻣﺎ ﻳﻠﺠﺄ ﺍ‪‬ﺮﻡ‬
‫ﺍﳌﻌﻠﻮﻣﺎﰐ ﺇﱃ ﺍﻟﺘﻤﻬﻴﺪ ﻻﺭﺗﻜﺎﺏ ﺟﺮﳝﺘﻪ ﺑﺎﻟﺘﻌﺮﻑ ﻋﻠﻰ ﺍﶈﻴﻂ ﺍﻟﺬﻱ ﺗﺪﻭﺭ ﻓﻴﻪ‪ ،‬ﻭﻛﺬﺍ ﺍﻟﻈﺮﻭﻑ ﺍﻟﱵ‬
‫ﲢﻴﻂ ﺑﺎﳉﺮﳝﺔ ﺍﳌﺮﺍﺩ ﺗﻨﻔﻴﺬﻫﺎ ﻭﺇﻣﻜﺎﻧﻴﺎﺕ ﳒﺎﺣﻬﺎ ﻭﺍﺣﺘﻤﺎﻻﺕ ﻓﺸﻠﻬﺎ‪ ،‬ﻭﻳﺴﺎﻋﺪﻩ ﰲ ﺫﻟﻚ ﺩﺭﺟﺔ ﺍﳌﻬﺎﺭﺓ‬
‫) ‪(1‬‬
‫ﺍﻟﱵ ﻳﺘﻤﺘﻊ ‪‬ﺎ‪.‬‬
‫‪ /.3‬ﺍﻟﺘﻨﻈﻴﻢ ﻭﺍﻟﺘﺨﻄﻴﻂ‪ :‬ﺗﺘﻤﻴﺰ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﺎﺩﺓ ﺑﻮﺟﻮﺩ ﺃﻛﺜﺮ ﻣﻦ ﻓﺎﻋﻞ ﻟﻠﻨﺸﺎﻁ‬
‫ﺍﻹﺟﺮﺍﻣﻲ ﺍﻟﻮﺍﺣﺪ‪ ،‬ﺇﺫ ﺗﺮﺗﻜﺐ ﺃﻏﻠﺐ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﻋﺪﺓ ﺃﺷﺨﺎﺹ ﳛﺪﺩ ﻟﻜﻞ ﺷﺨﺺ ﻣﻨﻬﻢ‬
‫ﺩﻭﺭ ﻣﻌﲔ‪ ،‬ﻭﻳﺘﻢ ﺍﻟﻌﻤﻞ ﺑﻴﻨﻬﻢ ﻭﻓﻘﺎ ﻟﺘﺨﻄﻴﻂ‪ ‬ﻭﺗﻨﻈﻴﻢﹴ ﺳﺎﺑﻖ ﻋﻠﻰ ﺍﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ‪ ،‬ﻓﻘﺪ ﲢﺘﺎﺝ ﺟﺮﳝﺔ‬
‫ﻧﺴﺦ ﺑﺮﺍﻣﺞ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻣﺜﻼ ﺇﱃ ﻣﻦ ﻳﻘﻮﻡ ﺑﻨﺴﺦ ﺗﻠﻚ ﺍﻟﱪﺍﻣﺞ ﻭﺇﱃ ﻣﻦ ﻳﻘﻮﻡ ﺑﻌﻤﻠﻴﺔ ﺑﻴﻌﻬﺎ‪ .‬ﻛﻤﺎ‬
‫ﺃﻧﻪ ﻣﻦ ﺍﳌﻼﺣﻆ ﺃﻥ ﺍﻷﺷﺨﺎﺹ ﺍﻟﺬﻳﻦ ﻳﻘﻮﻣﻮﻥ ﲞﻠﻖ ﺃﻭ ﺗﻌﺪﻳﻞ ﺍﻟﱪﺍﻣﺞ ﻷﻏﺮﺍﺽ ﻏﲑ ﻣﺸﺮﻭﻋﺔ ﻟﻴﺴﻮﺍ‬
‫ﺩﺍﺋﻤﺎ ﺍﳌﺴﺘﻔﻴﺪﻳﻦ ﺑﻄﺮﻳﻘﺔ ﻣﺒﺎﺷﺮﺓ ﻣﻦ ﺍﻟﻨﺸﺎﻁ ﺍﻹﺟﺮﺍﻣﻲ‪ .‬ﻓﺠﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﺘﻄﻠﺐ ﻋﺎﺩﺓ ﺷﺨﺼﲔ‬
‫ﻋﻠﻰ ﺍﻷﻗﻞ ﺃﺣﺪﳘﺎ ﻣﺘﺨﺼﺺ ﰲ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ ﻳﻘﻮﻡ ﺑﺎﳉﺎﻧﺐ ﺍﻟﻔﲏ ﻣﻦ ﺍﳌﺸﺮﻭﻉ ﺍﻹﺟﺮﺍﻣﻲ‬
‫ﻭﺷﺨﺺ ﺁﺧﺮ ﻣﻦ ﺍﶈﻴﻂ ﺫﺍﺗﻪ ﺃﻭ ﻣﻦ ﺧﺎﺭﺝ ﺍﳌﺆﺳﺴﺔ ﺍ‪‬ﲏ ﻋﻠﻴﻬﺎ ﻟﺘﻐﻄﻴﺔ ﻋﻤﻠﻴﺔ ﺍﻟﺘﻼﻋﺐ ﻭﲢﻮﻳﻞ‬
‫ﺍﳌﻜﺎﺳﺐ‪ (2)،‬ﻭﺃﺣﻴﺎﻧﺎ ﺃﺧﺮﻯ ﳝﻜﻦ ﲡﻨﻴﺪ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺍﻟﻘﺎﺩﺭ ﻋﻠﻰ ﺍﺧﺘﺮﺍﻕ ﻧﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺿﻤﻦ‬
‫ﻋﺼﺎﺑﺎﺕ ﺍﳉﺮﳝﺔ ﺍﳌﻨﻈﻤﺔ ﻋﻦ ﻃﺮﻳﻖ ﺷﺒﻜﺔ ﺍﻹﻧﺘﺮﻧﺖ‪ ،‬ﻭﳝﻜﻦ ﻣﻦ ﺧﻼﻝ ﻫﺬﻩ ﺍﻟﺸﺒﻜﺔ ﺗﺒﺎﺩﻝ ﺃﻓﻜﺎﺭ‬
‫ﻭﻣﻌﻠﻮﻣﺎﺕ ﺍﻟﺘﻄﺮﻑ ﻭﺍﻹﺭﻫﺎﺏ‪ ،‬ﻛﻤﺎ ﳝﻜﻦ ﺍﻹﺗﻔﺎﻕ ﻣﻌﻪ ﻋﻠﻰ ﺍﺭﺗﻜﺎﺏ ﺇﺣﺪﻯ ﺍﳉﺮﺍﺋﻢ ﺍﻷﺧﻼﻗﻴﺔ ﺃﻭ‬
‫ﺍﻟﺘﻼﻋﺐ ﰲ ﺍﳊﺴﺎﺑﺎﺕ ﺃﻭ ﺑﻄﺎﻗﺎﺕ ﺍﻹﺋﺘﻤﺎﻥ‪.(3) ...‬‬
‫‪/.4‬ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻳﺒـﺮﺭ ﺇﺭﻛﺎﺏ ﺟﺮﳝﺘﻪ‪ :‬ﺃﺛﺒﺘﺖ ﺑﻌﺾ ﺍﻟﺪﺭﺍﺳﺎﺕ ﺃﻧﻪ ﻻ ﻳﻮﺟﺪ ﺷﻌﻮﺭ ﻟﺪﻯ‬
‫ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺑﻌﺪﻡ ﺃﺧﻼﻗﻴﺔ ﻣﺎ ﻳﻘﻮﻡ ﺑﻪ ﺃﻭ ﲟﺴﺎﺳﻪ ﲟﺼﺎﱀ ﺃﻭ ﻗﻴﻢ ﳛﺮﺹ ﺍ‪‬ﺘﻤﻊ ﻋﻠﻰ ﲪﺎﻳﺘﻬﺎ ﺑﻞ ﻻ‬
‫ﻳﻌﺘﱪ ﺃﻥ ﻣﺎ ﻳﻘﻮﻡ ﺑﻪ ﻳﺪﺧﻞ ﰲ ﻋﺪﺍﺩ ﺍﳉﺮﺍﺋﻢ‪ ،‬ﺧﺎﺻﺔ ﰲ ﺍﳊﺎﻻﺕ ﺍﻟﱵ ﻳﻘﻒ ﻓﻴﻬﺎ ﺍﻟﺴﻠﻮﻙ ﻋﻨﺪ ﺣﺪ‬

‫)‪(1‬ﻧﺎﺋﻠﺔ ﳏﻤﺪ ﻓﺮﻳﺪ ﻓﻮﺭﺓ ‪.‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ ‪.58‬‬


‫)‪(2‬ﻧﺎﺋﻠﺔ ﳏﻤﺪ ﻓﺮﻳﺪ ﻗﻮﺭﺓ ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ ‪.‬ﺹ ‪.61‬‬
‫)‪ (3‬ﻋﺒﺪ ﺍﻟﻔﺘﺎﺡ ﺑﻴﻮﻣﻲ ﺣﺠﺎﺯﻱ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪.‬ﺹ ‪.105‬‬

‫‪- 52 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻗﻬﺮ ﻧﻈﺎﻡ ﺍﳊﺎﺳﻮﺏ ﻭﲣﻄﻲ ﺍﳊﻤﺎﻳﺔ ﺍﳌﻔﺮﻭﺿﺔ ﺣﻮﻟﻪ‪ ،‬ﻟﺬﻟﻚ ﻓﺈﻥ ﻛﺜﲑﺍ ﻣﻦ ﺍﻟﻌﺎﻣﻠﲔ ﰲ ﳎﺎﻝ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻻ ﳚﺪﻭﻥ ﺃﻱ ﺧﻄﺄ ﰲ ﺍﺳﺘﻌﻤﺎﻝ ﺍﻟﺸﻔﺮﺍﺕ ﺍﻟﺴﺮﻳﺔ ﺍﳋﺎﺻﺔ ﺑﺎﻟﺪﺧﻮﻝ ﺇﱃ ﺃﻧﻈﻤﺔ ﺍﳊﺎﺳﺒﺎﺕ‬
‫ﺍﻵﻟﻴﺔ ﺑﻄﺮﻳﻘﺔ ﻏﲑ ﻣﺸﺮﻭﻋﺔ‪ ،‬ﺃﻭ ﰲ ﻧﺴﺦ ﺍﻟﱪﺍﻣﺞ ﺑﺪﻻ ﻣﻦ ﺷﺮﺍﺋﻬﺎ ﻭﺍﺳﺘﻌﻤﺎﻝ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ‬
‫ﻟﻠﻤﺆﺳﺴﺎﺕ ﺍﻟﺘﺎﺑﻌﲔ ﳍﺎ ﻷﻏﺮﺍﺽ ﺷﺨﺼﻴﺔ‪.‬ﻭﻣﺎ ﺳﺎﻋﺪ ﻋﻠﻰ ﳕﺎﺀ ﻫﺬﺍ ﺍﻟﺸﻌﻮﺭ ﻫﻮ ﻋﺪﻡ ﻭﺟﻮﺩ ﺍﺣﺘﻜﺎﻙ‬
‫ﻣﺒﺎﺷﺮ ﺑﲔ ﺍﳉﺎﱐ ﻭﺍ‪‬ﲏ ﻋﻠﻴﻪ‪ ،‬ﻓﺎﻟﺘﺒﺎﻋﺪ ﰲ ﺍﻟﻌﻼﻗﺔ ﺍﻟﺜﻨﺎﺋﻴﺔ ﻫﺬﻩ ﻳﺴﻬﻞ ﺍﳌﺮﻭﺭ ﺇﱃ ﺍﻟﻔﻌﻞ ﻏﲑ ﺍﳌﺸﺮﻭﻉ‬
‫ﻭﻳﺴﺎﻋﺪ ﻋﻠﻰ ﺇﳚﺎﺩ ﻧﻮﻉ ﻣﻦ ﺍﻹﻗﺮﺍﺭ ﺍﻟﺸﺮﻋﻲ ﺍﻟﺬﺍﰐ ﲟﺸﺮﻭﻋﻴﺔ ﻫﺬﺍ ﺍﻟﻔﻌﻞ)‪.(1‬‬
‫ﺇﻻ ﺃﻥ ﺍﻟﺸﻌﻮﺭ ﺑﻌﺪﻡ ﺃﺧﻼﻗﻴﺔ ﻫﺬﻩ ﺍﻷﻓﻌﺎﻝ ﺍﻹﺟﺮﺍﻣﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻟﺪﻯ ﻓﺌﺔ ﻣﻦ ﺍ‪‬ﺮﻣﲔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﲔ ﻻ ﻳﻨﻔﻲ ﻭﺟﻮﺩ ﳎﺮﻣﲔ ﻳﺮﺗﻜﺒﻮﻥ ﺍﻹﺟﺮﺍﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻭﻫﻢ ﻋﻠﻰ ﻋﻠﻢ ﻭﺩﺭﺍﻳﺔ ﻭﺇﺩﺭﺍﻙ ﺑﻌﺪﻡ‬
‫ﻣﺸﺮﻭﻋﻴﺔ ﻭﻻ ﺃﺧﻼﻗﻴﺔ ﻫﺬﺍ ﺍﻟﻔﻌﻞ‪.‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪:‬ﺃﺻﻨـﺎﻑ ﺍﳌـﺠﺮﻡ ﺍﳌﻌﻠـﻮﻣﺎﰐ‬
‫ﺇﻥ ﺍﻟﺘﺴﺎﺭﻉ ﺍﻟﺮﻫﻴﺐ ﰲ ﳎﺎﻝ ﺍﻟﺘﻘﻨﻴﺎﺕ ﺍﻟﺮﻗﻤﻴﺔ ﺍﳊﺪﻳﺜﺔ ﺳﺎﻫﻢ ﺑﺪﻭﺭﻩ ﰲ ﺍﻟﺘﻄﻮﺭ ﺍﻟﺴﺮﻳﻊ ﻷﳕﺎﻁ‬
‫ﺟﺮﳝﺔ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﺼﻔﺔ ﻋﺎﻣﺔ ﳑﺎ ﺃﺻﺒﺢ ﻋﺎﺋﻘﺎ ﺃﻣﺎﻡ ﺩﺭﺍﺳﺎﺕ ﻋﻠﻢ ﺍﻹﺟﺮﺍﻡ ﺍﳊﺪﻳﺜﺔ ﺍﻟﱵ ﺗﺴﻌﻰ ﺇﱃ‬
‫ﻭﺿﻊ ﺗﺼﻨﻴﻒ ﺛﺎﺑﺖ ‪‬ﺮﻣﻲ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫ﺇﻻ ﺃﻧﻪ ﻭﻣﻦ ﺧﻼﻝ ﺗﻠﻚ ﺍﳌﻼﻣﺢ ﺍﻟﺴﺎﺑﻖ ﺫﻛﺮﻫﺎ ﰲ ﺧﺼﺎﺋﺺ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﳝﻜﻦ ﺗﺼﻨﻴﻒ‬
‫ﻣﺮﺗﻜﱯ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺇﱃ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻟﻄﻮﺍﺋﻒ‪ ،‬ﻭﻻ ﻳﻌﲏ ﺑﻄﺒﻴﻌﺔ ﺍﳊﺎﻝ ﺃﻥ ﻛﻞ ﳎﺮﻡ ﻳﻨﺪﺭﺝ‬
‫ﺿﻤﻦ ﻃﺎﺋﻔﺔ ﳏﺪﺩﺓ ﺩﻭﻥ ﻏﲑﻫﺎ‪ ،‬ﺑﻞ ﳝﻜﻦ ﺃﻥ ﻳﻜﻮﻥ ﺍ‪‬ﺮﻡ ﺍﻟﻮﺍﺣﺪ ﻣﺰﳚﺎ ﻣﻦ ﺃﻛﺜﺮ ﻣﻦ ﻃﺎﺋﻔﺔ ﺃﻭ ﻓﺌﺔ‪.‬‬
‫ﻭﺳﻮﻑ ﻧﺘﻨﺎﻭﳍﻢ ﺑﺸﻲﺀ ﻣﻦ ﺍﻟﺘﻔﺼﻴﻞ ﻛﻤﺎ ﻳﻠﻲ‪:‬‬
‫‪ /1‬ﻓﺌﺔ ﺻﻐﺎﺭ ﳎﺮﻣﻲ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ :‬ﺃﻭ ﻛﻤﺎ ﻳﺴﻤﻴﻬﻢ ﺍﻟﺒﻌﺾ ﺻﻐﺎﺭ ﻧﻮﺍﺑﻎ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫)‪ (Pranksters‬ﻭﺗﻈﻢ ﻫﺬﻩ ﺍﻟﻄﺎﺋﻔﺔ ﺍﻷﺷﺨﺎﺹ ﺍﻟﺬﻳﻦ ﻳﺮﺗﻜﺒﻮﻥ ﺟﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﻐﺮﺽ ﺍﻟﺘﺴﻠﻴﺔ‬
‫ﻭﺍﳌﺰﺍﺡ ﺩﻭﻥ ﺃﻥ ﺗﻜﻮﻥ ﻟﺪﻳﻬﻢ ﻧﻴﺔ ﺇﺣﺪﺍﺙ ﺃﻱ ﺿﺮﺭ ﺑﺎ‪‬ﲏ ﻋﻠﻴﻬﻢ‪ ،‬ﻭﺫﻟﻚ ﻋﻦ ﻃﺮﻳﻖ ﺇﺳﺘﺨﺪﺍﻡ‬
‫ﺣﺎﺳﺒﺎﺕ ﺁﻟﻴﺔ ﳏﻤﻮﻟﺔ ﺧﺎﺻﺔ ‪‬ﻢ ﺃﻭ ﺣﺎﺳﺒﺎﺕ ﺁﻟﻴﺔ ﺧﺎﺻﺔ ﲟﺪﺍﺭﺳﻬﻢ‪ ،‬ﻭﻣﻦ ﺑﻴﻨﻬﻢ ﻓﺌﺔ ﱂ ﺗﺒﻠﻎ ﺑﻌﺪ ﺳﻦ‬
‫ﺍﻷﻫﻠﻴﺔ ﻣﻔﺘﻮﻧﲔ ﻛﺜﲑﺍ ﺑﺎﻟﺘﻘﻨﻴﺎﺕ ﺍﻟﺮﻗﻤﻴﺔ‪ .‬ﻭﻫﻢ ﻏﺎﻟﺒﺎ ﻣﺎ ﻳﻜﻮﻧﻮﻥ ﰲ ﻣﺮﺣﻠﺔ ﺍﳌﺮﺍﻫﻘﺔ‪ ،‬ﻭﻋﻠﻰ ﺍﻟﺮﻏﻢ ﻣﻦ‬
‫ﺻﻐﺮ ﺳﻨﻬﻢ ﺇﻻ ﺃ‪‬ﻢ ﻗﺎﺩﺭﻭﻥ ﻋﻠﻰ ﺍﻗﺘﺤﺎﻡ ﻛﺎﻓﺔ ﺃﻧﻮﺍﻉ ﺍﻷﻧﻈﻤﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﻗﺪ ﺃﺛﺎﺭﺕ ﻫﺬﻩ ﺍﻟﻔﺌﺔ‬

‫)‪ (1‬ﺳﺎﻣﻲ ﺍﻟﺸﻮﺍ‪ ،‬ﺍﻟﻐﺶ ﳌﻌﻠﻮﻣﺎﰐ ﻇﺎﻫﺮﺓ ﺇﺟﺮﺍﻣﻴﺔ ﻣﺴﺘﺤﺪﺛﺔ‪ ،‬ﻭﺭﻗﺔ ﻋﻤﻞ ﻣﻘﺪﻣﺔ ﻟﻠﻤﺆﲤﺮ ﺍﻟﺴﺎﺩﺱ ﻟﻠﺠﻤﻌﻴﺔ ﺍﳌﺼﺮﻳﺔ ﻟﻠﻘﺎﻧﻮﻥ ﺍﳉﻨﺎﺋﻲ‪ .‬ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ‬
‫ﺍﻟﻘﺎﻫﺮﺓ ‪ ،1993‬ﺹ ‪.525‬‬

‫‪- 53 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺟﺪﻻ ﻭﺍﺳﻌﺎ ﰲ ﺍﻟﻮﺳﻂ ﺍﻟﻔﻘﻬﻲ‪ ،‬ﻓﻔﻲ ﺣﲔ ﻛﺜﺮ ﺍﳊﺪﻳﺚ ﻋﻦ ﳐﺎﻃﺮ ﻫﺬﻩ ﺍﻟﻔﺌﺔ)‪ (1‬ﺍﻟﱵ ﳝﻜﻦ ﺃﻥ‬
‫ﺗﺘﺤﻮﻝ ﺇﱃ ﻓﺌﺔ ﺍﻟﻘﺮﺍﺻﻨﺔ ﻋﻨﺪﻣﺎ ﻳﺼﺒﺤﻮﻥ ﻋﻠﻰ ﺩﺭﺟﺔ ﻋﺎﻟﻴﺔ ﻣﻦ ﺍﳋﱪﺓ ﻭﺍﳌﻬﺎﺭﺓ ﻓﻴﺘﻢ ﺍﺳﺘﺌﺠﺎﺭﻫﻢ‬
‫ﻭﺍﺳﺘﻐﻼﳍﻢ ﰲ ﺃﻋﻤﺎﻝ ﺫﺍﺕ ﺃﻫﺪﺍﻑ ﺇﺟﺮﺍﻣﻴﺔ‪ ،‬ﺫﻫﺐ ﺟﺎﻧﺐ ﻣﻦ ﺍﻟﻔﻘﻪ ﺃﻧﻪ ﻣﻦ ﺍﻷﺣﺴﻦ ﻋﺪﻡ ﺗﺼﻨﻴﻒ‬
‫ﻫﺆﻻﺀ ﺿﻤﻦ ﺩﺍﺋﺮﺓ ﺍﻹﺟﺮﺍﻡ ﳌﺎ ﻟﺪﻳﻬﻢ ﻣﻦ ﻣﻴﻞ ﻟﻠﻤﻐﺎﻣﺮﺓ ﻭﺍﻟﺮﻏﺒﺔ ﰲ ﺍﻟﺒﺤﺚ ﻭﺍﻹﺳﺘﻜﺸﺎﻑ‪.‬‬
‫‪ /2‬ﻓﺌﺔ ﺍﻟﻘﺮﺍﺻﻨﺔ ﺃﻭ ﺍﳌﺨﺘﺮﻗﻮﻥ‪ :‬ﻭﳝﻜﻦ ﺗﺼﻨﻴﻔﻬﻢ ﺇﱃ ﺻﻨﻔﲔ‪:‬‬
‫‪ :( 2) (Les‬ﻭﻫﻢ ﺍﳌﺘﻄﻔﻠﻮﻥ ﺍﻟﺬﻳﻦ ﻳﺘﺤﺪﻭﻥ ﺃﻣﻦ ﺍﻟﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫‪ -‬ﺍﳍﺎﻛﺎﺭ)‪Hakers‬‬
‫ﻭﺍﻟﺸﺒﻜﺎﺕ ﻣﻦ ﺧﻼﻝ ﺍﻟﺪﺧﻮﻝ ﺇﱃ ﺃﻧﻈﻤﺔ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ ﻏﲑ ﺍﳌﺼﺮﺡ ﳍﻢ ﺑﺎﻟﺪﺧﻮﻝ ﺇﻟﻴﻬﺎ ﻭﻛﺴﺮ‬
‫ﺍﳊﻮﺍﺟﺰ ﺍﻷﻣﻨﻴﺔ ﺍﳌﻮﺿﻮﻋﺔ ﳍﺬﺍ ﺍﻟﻐﺮﺽ‪ ،‬ﻭﰲ ﺍﻟﻐﺎﻟﺐ ﻻ ﺗﻜﻮﻥ ﻟﺪﻳﻬﻢ ﺩﻭﺍﻓﻊ ﺣﺎﻗﺪﺓ ﺃﻭ ﲣﺮﻳﺒﻴﺔ ﻭﺇﳕﺎ‬
‫) ‪(3‬‬
‫ﻳﻨﻄﻠﻘﻮﻥ ﻣﻦ ﻫﺪﻑ ﺍﻛﺘﺴﺎﺏ ﺍﳋﱪﺓ ﺃﻭ ﺑﺪﺍﻓﻊ ﺍﻟﻔﻀﻮﻝ ﺃﻭ ‪‬ﺮﺩ ﺍﻟﺘﺤﺪﻱ ﻭﺇﺛﺒﺎﺕ ﺍﻟﺬﺍﺕ‪.‬‬
‫‪ :(Les‬ﻫﻢ ﺃﺷﺨﺎﺹ ﻳﻘﻮﻣﻮﻥ ﺑﺎﻟﺘﺴﻠﻞ ﺇﱃ ﺃﻧﻈﻤﺔ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ‬ ‫)‪crakers‬‬ ‫‪ -‬ﺍﻟﻜﺮﺍﻛﺮ‬
‫ﻟﻺﻃﻼﻉ ﻋﻠﻰ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺨﺰﻧﺔ ‪‬ﺎ ﻹﳊﺎﻕ ﺍﻟﻀﺮﺭ ﺃﻭ ﺍﻟﻌﺒﺚ ‪‬ﺎ ﺃﻭ ﺳﺮﻗﺘﻬﺎ ﻭﺫﻟﻚ ‪‬ﺪﻑ ﺍﻟﺘﺤﺪﻱ‬
‫ﺍﻹﺑﺪﺍﻋﻲ‪ (4)،‬ﻭﺗﺘﻤﻴﺰ ﻫﺬﻩ ﺍﻟﻔﺌﺔ ﺑﺴﻌﺔ ﺍﳋﱪﺓ ﻭﺍﻹﺩﺭﺍﻙ ﺍﻟﻮﺍﺳﻊ ﻟﻠﻤﻬﺎﺭﺍﺕ ﺍﻟﺘﻘﻨﻴﺔ‪ ،‬ﻟﺬﻟﻚ ﻓﻘﺪ ﺃﺛﺒﺖ‬
‫ﺍﻟﻮﺍﻗﻊ ﺍﻟﻌﻤﻠﻲ ﺃﻥ ﺍﳍﺎﻛﺮ ﻳﺴﺘﻌﲔ ﺑﺎﻟﻜﺮﺍﻛﺮ ﺇﺫﺍ ﻣﺎ ﺻﺎﺩﻓﻪ ﺃﻱ ﻧﻮﻉ ﻣﻦ ﺃﻧﻮﺍﻉ ﺍﳊﻤﺎﻳﺔ‪،‬ﻭﻏﺎﻟﺒﺎ ﻣﺎ ﻳﻜﻮﻥ‬
‫ﻫﺪﻑ ﻫﺬﻩ ﺍﻟﻔﺌﺔ ﻫﻮ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﳌﺎﻝ ﺃﻭ ﺑﻐﺮﺽ ﺍﻟﺸﻬﺮﺓ‪.‬‬

‫)‪ (1‬ﻣﻦ ﺃﺷﻬﺮ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﺍﺭﺗﻜﺒﺖ ﰲ ﺍﻟﻮ ﻡ ﺃ ﺟﺮﳝﺔ ﻣﺮﺍﻫﻖ ﱂ ﻳﺘﺠﺎﻭﺯ ﺳﻨﺔ ‪ 17‬ﻋﺎﻣﺎ ﻳﺪﻋﻰ "ﺩﻳﻨﻴﺴﻤﻮﺭﺍﻥ" ﻭﺍﻟﺬﻱ ﺍﺧﺘﺎﺭ ﻟﻨﻔﺴﻪ ﺍﺳﻢ "ﻛﻮﻟﻴﻮ"‪ :‬ﺣﻴﺚ‬
‫ﻗﺎﻡ ﻛﻮﻟﻴﻮ ﺑﺸﻦ ﺳﻠﺴﻠﺔ ﻣﻦ ﺍﳍﺠﻤﺎﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻋﻠﻰ ﻣﻮﺍﻗﻊ ﻣﻬﻤﺔ ﺃﻧﺸﺄ‪‬ﺎ ﺍﳊﻜﻮﻣﺔ ﺍﻷﻣﺮﻳﻜﻴﺔ ﻋﻠﻰ ﺷﺒﻜﺔ ﺍﻹﻧﺘﺮﻧﺖ‪ ،‬ﻭﻣﻨﺬ ‪‬ﺎﻳﺔ ‪ 1999‬ﻭﺑﺪﺍﻳﺔ‬
‫‪ 2000‬ﺍﺳﺘﻄﺎﻉ ﻛﻮﻟﻴﻮ ﺃﻥ ﳛﻮﻝ ﺣﻴﺎﺓ ﺍﳌﺴﺆﻭﻟﲔ ﻋﻦ ﻫﺬﻩ ﺍﳌﻮﺍﻗﻊ ﺇﱃ ﺟﺤﻴﻢ ﺣﻴﺚ ﺩﺃﺏ ﻋﻠﻰ ﻣﻬﺎﲨﺔ ﻣﻮﻗﻊ )‪ (DARE.ORG‬ﺍﳌﺴﺆﻭﻝ ﻋﻦ‬
‫ﻣﻮﺍﺟﻬﺔ ﳐﺎﻃﺮ ﺍﻹﺩﻣﺎﻥ ﻭﻧﻔﺬ ﻋﻤﻠﻴﺎﺕ ﲣﺮﻳﺒﻴﺔ ﻋﻠﻴﻪ‪ .‬ﻭﻛﺬﻟﻚ ﻗﻀﻴﺔ ﺗﻼﻣﻴﺬ ﺍﳌﺪﺭﺳﺔ ﺍﻟﺜﺎﻧﻮﻳﺔ ﰲ ﻭﻻﻳﺔ ﻣﺎ‪‬ﺎﺗﻦ ﺍﻟﺬﻳﻦ ﺍﺳﺘﺨﺪﻣﻮﺍ ﻃﺮﻓﻴﺎﺕ ﻏﺮﻑ ﺍﻟﺪﺭﺱ‬
‫ﻟﻠﺪﺧﻮﻝ ﺇﱃ ﺷﺒﻜﺔ ﺍﺗﺼﺎﻻﺕ ﻭﺩﻣﺮﻭﺍ ﻣﻠﻔﺎﺕ ﺯﺑﺎﺋﻦ ﺍﻟﺸﺮﻛﺔ ﰲ ﻫﺬﻩ ﺍﻟﻌﻤﻠﻴﺔ‪ .‬ﻭﺃﻳﻀﺎ ﳒﺤﺖ ﳎﻤﻮﻋﺔ ﻣﻦ ﻃﻠﺒﺔ ﺍﳌﺪﺍﺭﺱ ﺍﻟﻌﻠﻴﺎ ﺑﺎﻟﻮ ﻡ ﺃ ﺗﺘﺮﺍﻭﺡ ﺃﻋﻤﺎﺭﻫﻢ‬
‫ﺑﲔ ‪ 15‬ﻭ‪ 25‬ﺳﻨﺔ ﻳﻄﻠﻘﻮﻥ ﻋﻠﻰ ﺃﻧﻔﺴﻬﻢ ﺃﺳﺮﺓ ﺍ‪‬ﻤﻮﻋﺔ )‪ (414‬ﰲ ﺍﺧﺘﺮﺍﻕ ﺃﻧﻈﻤﺔ ﳓﻮ )‪ (60‬ﺣﺎﺳﺒﺎ ﻭﺫﻟﻚ ﻋﺎﻡ ‪ 1983‬ﻭﻣﻦ ﺑﻴﻨﻬﺎ ﺣﺎﺳﺒﺎﺕ ﻭﺑﻨﻮﻙ‬
‫ﻣﻌﻠﻮﻣﺎﺕ ﳐﺘﱪ ﰲ ﻟﻮﺱ ﺃﳒﻠﺲ ﻭﻛﺬﻟﻚ ﰲ ﻣﺮﻛﺰ ‪ Salan Kottering‬ﻟﻌﻼﺝ ﺍﻷﻭﺭﺍﻡ ﰲ ﻧﻴﻮﻳﻮﺭﻙ ﻭﻣﻌﻬﺪ ﻣﺎﺳﺎ ﺷﻮﺳﻴﱵ ﻟﻠﺘﻘﻨﻴﺔ ﻭﻗﺎﻋﺪﺓ ﻣﺎﻙ‬
‫ﻛﻴﻼﻥ ﻟﻠﻘﻮﺍﺕ ﺍﳉﻮﻳﺔ‪.‬‬
‫)‪ (2‬ﻋﺮﻓﺖ ﺇﺗﻔﺎﻗﻴﺔﺍﻷﻣﻢ ﺍﳌﺘﺤﺪﺓ ﳌﻜﺎﻓﺤﺔ ﺇﺳﺎﺀﺓ ﺍﺳﺘﻌﻤﺎﻝ ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻷﻏﺮﺍﺽ ﺇﺟﺮﺍﻣﻴﺔ ﺭﻗﻢ )‪ (55/63‬ﺍﳌﺆﺭﺧﺔ ﰲ ‪ 2000/04/12‬ﺍﳍﺎﻛﺮ‬
‫)ﺍﳌﺨﺘﺮﻕ( ﺑﺄﻧﻪ ﺍﳌﱪﻣﺞ ﺍﳌﺘﻔﻮﻕ ﺟﺪﺍ ﻭﻟﻜﻨﻪ ﻳﺴﺘﺨﺪﻡ ﺟﻞ ﻃﺎﻗﺘﻪ ﰲ ﺍﻻﲡﺎﻩ ﻏﲑ ﺷﺮﻋﻲ ﶈﺎﻭﻟﺔ ﺍﺧﺘﺮﺍﻕ ﺃﻧﻈﻤﺔ ﺣﺎﺳﻮﺑﻴﺔ ‪‬ﺪﻑ ﺇﺛﺒﺎﺕ ﻗﺪﺭﺗﻪ ﺃﻭ ﺍﻟﺘﺒﺎﻫﻲ ‪‬ﺎ‬
‫ﻭﺃﺣﻴﺎﻧﺎ ﻷﻫﺪﺍﻑ ﺇﺟﺮﺍﻣﻴﺔ‪.‬‬
‫)‪ (3‬ﻣﺼﻄﻔﻰ ﳏﻤﺪ ﻣﻮﺳﻰ‪ ،‬ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ‪ .‬ﻣﻄﺎﺑﻊ ﺍﻟﺸﺮﻃﺔ‪ ،‬ﻁ‪ ،1‬ﺹ ‪.15‬‬
‫)‪ (4‬ﰲ ﺳﻨﺔ ‪ 1995‬ﰎ ﺇﻟﻘﺎﺀ ﺍﻟﻘﺒﺾ ﻋﻠﻰ ﺃﻛﱪ ﻫﺎﻛﺮ ﻭﻳﺪﻋﻰ "ﻛﻴﻔﲔ ﻣﺘﻨﻴﻚ" ﺣﻴﺚ ﻗﺎﻡ ﻋﻠﻰ ﻣﺪﺍﺭ ‪ 20‬ﺳﻨﺔ ﺑﺎﺭﺗﻜﺎﺏ ﻋﺪﺩ ﻛﺒﲑ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ ﺇﺫ ﻛﺎﻥ ﺑﺈﻣﻜﺎﻧﻪ ﺍﻟﺪﺧﻮﻝ ﺇﱃ ﺃﻱ ﻧﻈﺎﻡ ﻣﻌﻠﻮﻣﺎﰐ ﻣﺮﺗﺒﻂ ﺑﺄﺟﻬﺰﺓ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﻭﺗﻌﻠﻢ ﻛﺴﺮ ﻛﻠﻤﺔ ﺍﳌﺮﻭﺭ ﺑﺴﻼﺳﺔ ﻓﺎﺋﻘﺔ‪.‬‬

‫‪- 54 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫‪ /3‬ﻓﺌﺔ ﺍﶈﺘﺮﻓﲔ‪ :‬ﻭﺗﻌﺪ ﻫﺬﻩ ﺍﻟﻔﺌﺔ ﻫﻲ ﺍﻷﺧﻄﺮ ﻣﻦ ﺑﲔ ﳎﺮﻣﻲ ﺍﻟﺘﻘﻨﻴﺔ ﲝﻴﺚ ‪‬ﺪﻑ ﺍﻋﺘﺪﺍﺀﺍ‪‬ﻢ‬
‫ﺑﺎﻷﺳﺎﺱ ﺇﱃ ﲢﻘﻴﻖ ﺍﻟﻜﺴﺐ ﺍﳌﺎﺩﻱ ﺳﻮﺍﺀ ﳍﻢ ﺃﻭ ﻟﻠﺠﻬﺎﺕ ﺍﻟﱵ ﺳﺨﺮ‪‬ﻢ ﻻﺭﺗﻜﺎﺏ ﺟﺮﺍﺋﻢ ﺗﻘﻨﻴﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﻓﻀﻼ ﻋﻦ ﲢﻘﻴﻖ ﺃﻏﺮﺍﺽ ﺳﻴﺎﺳﻴﺔ ﺃﻭ ﺍﻟﺘﻌﺒﲑ ﻋﻦ ﻣﻮﻗﻒ ﻓﻜﺮﻱ ﺃﻭ ﻓﻠﺴﻔﻲ‪ .‬ﻭﻳﻼﺣﻆ ﺃﻥ‬
‫ﺍﻷﺿﺮﺍﺭ ﺍﻟﱵ ﺗﺘﺮﺗﺐ ﻋﻦ ﻫﺬﻩ ﺍﻷﻓﻌﺎﻝ ﺗﻜﻮﻥ ﺑﺎﻟﻐﺔ ﺍﻟﻀﺮﺭ ﺑﻌﻜﺲ ﺍﻟﻔﺌﺎﺕ ﺍﻷﺧﺮﻯ‪ .‬ﻛﻤﺎ ﺃﻥ‬
‫ﻣﻮﺍﺟﻬﺘﻬﻢ ﺗﺘﺴﻢ ﺑﺎﻟﺼﻌﻮﺑﺔ ﲟﺎ ﻳﺘﻤﺘﻌﻮﻥ ﺑﻪ ﻣﻦ ﻛﻔﺎﺀﺍﺕ ﻋﺎﻟﻴﺔ ﰲ ﳎﺎﻝ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻣﻮﺍﻛﺒﺘﻬﻢ ﻟﻠﺘﻘﻨﻴﺔ‬
‫ﺫﺍ‪‬ﺎ‪ .‬ﻭﻳﻌﻤﻞ ﺍﳌﻨﺘﻤﻮﻥ ﺇﱃ ﻫﺬﻩ ﺍﻟﻄﺎﺋﻔﺔ ﰲ ﺃﻏﻠﺐ ﺍﻷﺣﻮﺍﻝ ﺑﻄﺮﻳﻘﺔ ﻣﻨﻈﻤﺔ ﲝﻴﺚ ﻳﻨﻄﺒﻖ ﻋﻠﻰ ﺃﻓﻌﺎﳍﻢ‬
‫ﻭﺻﻒ ﺍﳉﺮﳝﺔ ﺍﳌﻨﻈﻤﺔ ﺃﻭ ﻋﻠﻰ ﺍﻷﻗﻞ ﻳﺸﺘﺮﻙ ﰲ ﺗﻨﻔﻴﺬ ﺍﻟﻨﺸﺎﻁ ﺍﻹﺟﺮﺍﻣﻲ ﺃﻛﺜﺮ ﻣﻦ ﻓﺎﻋﻞ‪.‬‬
‫‪ /4‬ﻓﺌﺔ ﺍﳊﺎﻗﺪﻳﻦ‪ :‬ﻭﻫﻢ ﻓﺌﺔ ﻻ ﻳﺴﻌﻮﻥ ﺇﱃ ﺍﻹﺷﺎﺩﺓ ﺑﺎﻟﺘﻔﻮﻕ ﺍﻟﻌﻠﻤﻲ ﻣﺜﻞ ﺻﻐﺎﺭ ﻧﻮﺍﺑﻎ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﻭﻻ ﺇﱃ ﲢﻘﻴﻖ ﻣﻜﺎﺳﺐ ﻣﺎﺩﻳﺔ ﻛﻔﺌﺔ ﺍﶈﺘﺮﻓﲔ‪ ،‬ﻭﺇﳕﺎ ﻫﺪﻓﻬﻢ ﻫﻮ ﺍﻻﻧﺘﻘﺎﻡ ﻛﺄﺛﺮ ﻟﺘﺼﺮﻑ ﺻﺎﺣﺐ ﺍﻟﻌﻤﻞ‬
‫ﻣﻌﻬﻢ ﺃﻭ ﺗﻌﺒﲑﺍ ﻣﻨﻬﻢ ﻋﻠﻰ ﻏﻀﺒﻬﻢ ﻣﻦ ﻫﻴﺄﺓ ﻣﻌﻴﻨﺔ ‪.‬‬
‫‪/5‬ﻭﺃﺧﲑﺍ ﺗﺄﰐ ﺍﻟﻄﺎﺋﻔﺔ ﺃﻭ ﺍﻟﻔﺌﺔ ﺍﻟﱵ ﺗﻀﻢ ﻭﺍﺣﺪﺓ ﻣﻦ ﺃﻫﻢ ﺍﳌﺸﻜﻼﺕ ﺍﻟﱵ ﺗﺘﺼﻞ ﺑﺈﺳﺎﺀﺓ‬
‫ﺍﺳﺘﺨﺪﺍﻡ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ ﺃﻻ ﻭﻫﻲ ﺍﻹﳘﺎﻝ‪ .‬ﻓﻼﺷﻚ ﺃﻥ ﺍﻹﳘﺎﻝ ﰲ ﳎﺎﻝ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ ﳝﻜﻦ ﺃﻥ‬
‫ﻳﺘﺮﺗﺐ ﻋﻠﻴﻪ ﰲ ﻛﺜﲑ ﻣﻦ ﺍﻷﺣﻴﺎﻥ ﻧﺘﺎﺋﺞ ﺧﻄﲑﺓ‪ .‬ﻓﻔﻲ ﻧﻴﻮﺯﻳﻼﻧﺪﺍ ﻣﺜﻼ ﻗﺎﻡ ﺍﺛﻨﺎﻥ ﻣﻦ ﻣﱪﳎﻲ ﺍﳊﺎﺳﺒﺎﺕ‬
‫ﺍﻵﻟﻴﺔ ﺑﺘﻐﻴﲑ ﰲ ﺃﺣﺪ ﺍﻟﱪﺍﻣﺞ ﺍﻟﱵ ﲢﺪﺩ ﺧﻂ ﺳﲑ ﺇﺣﺪﻯ ﺍﻟﻄﺎﺋﺮﺍﺕ ﻭﱂ ﻳﺘﻤﻜﻨﻮﺍ ﻣﻦ ﺇﺑﻼﻍ ﻗﺎﺋﺪ‬
‫ﺍﻟﻄﺎﺋﺮﺓ ‪‬ﺬﺍ ﺍﻟﺘﻐﻴﲑ ﳑﺎ ﺗﺮﺗﺐ ﻋﻠﻴﻪ ﲢﻄﻢ ﺍﻟﻄﺎﺋﺮﺓ ﻻﺻﻄﺪﺍﻣﻬﺎ ﺑﺄﺣﺪ ﺍﳉﺒﺎﻝ ﻭﻗﺘﻞ ‪ 60‬ﺭﺍﻛﺒﺎ ﻛﺎﻧﻮﺍ ﻋﻠﻰ‬
‫) ‪(1‬‬
‫ﻣﺘﻨﻬﺎ ﻭﲤﺖ ﳏﺎﻛﻤﺘﻬﻢ ﺣﻴﻨﻬﺎ ﺑﺘﻬﻤﺔ ﺍﻟﻘﺘﻞ ﺍﳋﻄﺄ‪.‬‬

‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﱐ‪ :‬ﺃﺳﺎﻟﻴﺐ ﻭﺩﻭﺍﻓﻊ ﺇﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬

‫ﺇﻧﻪ ﻭﻋﻠﻰ ﺧﻼﻑ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﺍﻟﱵ ﺗﺘﻄﻠﺐ ﺑﻄﺒﻴﻌﺘﻬﺎ ﻧﻮﻋﺎ ﻣﻦ ﺍ‪‬ﻬﻮﺩ ﺍﻟﻌﻀﻠﻲ ﺍﻟﺬﻱ ﻗﺪ‬
‫ﻳﺘﺨﺬ ﺷﻜﻞ ﺍﻟﻌﻨﻒ ﻭﺍﻹﻳﺬﺍﺀ ﻛﻤﺎ ﻫﻮ ﺍﳊﺎﻝ ﰲ ﺟﺮﳝﺔ ﺍﻟﻘﺘﻞ ﻣﺜﻼ‪ ،‬ﻓﺎﻥ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﻌﺪ‬
‫ﺑﻄﺒﻴﻌﺘﻬﺎ ﺟﺮﺍﺋﻢ ﻫﺎﺩﺋﺔ ﻻ ﺗﺘﻄﻠﺐ ﺳﻮﻯ ﻋﺪﺩ ﻣﻦ ﺍﻟﻠﻤﺴﺎﺕ ﺍﳋﺎﻃﻔﺔ ﻋﻠﻰ ﺃﺟﻬﺰﺓ ﺍﳊﺎﺳﻮﺏ ﺣﱴ‬
‫ﺗﺆﺩﻱ ﺇﱃ ﺍﺧﺘﺮﺍﻕ ﺃﻛﱪ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻭﻫﺘﻚ ﺳﺮﻳﺘﻬﺎ ﺃﻭ ﳏﻮ ﻣﺎ ﲢﺘﻮﻳﻪ ﻣﻦ ﻣﻌﻠﻮﻣﺎﺕ ﺃﻭ ﺗﻌﻄﻴﻞ‬
‫ﺑﺮﺍﳎﻬﺎ‪ ،‬ﻋﻠﻰ ﺍﻋﺘﺒﺎﺭ ﺃﻥ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺇﳕﺎ ﺗﺘﻢ ﰲ ﺻﻮﺭﺓ ﺃﻭﺍﻣﺮ ﺗﺼﺪﺭ ﺇﱃ ﺟﻬﺎﺯ ﺍﳊﺎﺳﻮﺏ ﻭﻻ‬

‫)‪ (1‬ﻧﺎﺋﻠﺔ ﳏﻤﺪ ﻓﺮﻳﺪﻗﻮﺭﺓ‪ .‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ ‪.63‬‬

‫‪- 55 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﳛﺘﺎﺝ ﻣﺮﺗﻜﺒﻮﻫﺎ ﺇﱃ ﺍﻟﻘﺪﺭﺓ ﻭﺍﻟﺪﺭﺍﻳﺔ ﰲ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻊ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻭﺍﻹﳌﺎﻡ ﺑﺎﳌﻬﺎﺭﺍﺕ ﻭﺍﳌﻌﺎﺭﻑ‬
‫ﺍﻟﺘﻘﻨﻴﺔ‪ .‬ﻓﺎ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻳﺴﺘﻬﺪﻑ ﳏﻼ ﺫﺍ ﻃﺒﻴﻌﺔ ﻣﺘﻤﻴﺰﺓ ﻭﻧﻌﲏ ﺑﺬﻟﻚ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﱵ ﲢﺘﻮﻳﻬﺎ ﻫﺬﻩ‬
‫ﺍﻟﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺃﻱ ﺗﻠﻚ ﺍﻹﺷﺎﺭﺍﺕ ﺃﻭ ﺍﻟﻨﺒﻀﺎﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻏﲑ ﺍﳌﺮﺋﻴﺔ ﺍﻟﱵ ﺗﻨﺴﺎﺏ ﻋﱪ ﺃﺟﺰﺍﺀ‬
‫ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻭﺷﺒﻜﺎﺕ ﺍﻹﺗﺼﺎﻝ ﺍﻟﻌﺎﳌﻴﺔ‪ .‬ﻭﺗﺒﻌﺎ ﻟﺬﻟﻚ ﻓﺈﻧﻪ ﻛﻠﻤﺎ ﻛﺎﻥ ﻟﻠﻤﺠﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺧﱪﺓ‬
‫ﻭﻣﻬﺎﺭﺓ ﻋﺎﻟﻴﺔ ﰲ ﳎﺎﻝ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺍﺳﺘﺨﺪﺍﻡ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻛﻠﻤﺎ ﺯﺍﺩﺕ ﺧﻄﻮﺭﺗﻪ ﺍﻹﺟﺮﺍﻣﻴﺔ‬
‫ﻭﺗﻌﺎﻇﻤﺖ ﻟﺪﻳﻪ ﺍﻟﺪﻭﺍﻓﻊ ﻭﺍﻷﻫﺪﺍﻑ ﰲ ﺍﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺃﺳﺎﻟﻴﺐ ﻭ ﺗﻘﻨﻴﺎﺗﺈﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬

‫ﺗﺘﺸﺎﺑﻪ ﺟﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻊ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻣﻦ ﺣﻴﺚ ﺍﺳﺘﺨﺪﺍﻡ ﺍ‪‬ﺮﻡ ﻟﻮﺳﺎﺋﻞ ﻭﺃﺳﺎﻟﻴﺐ ﻏﲑ‬
‫ﻣﺸﺮﻭﻋﺔ ﰲ ﺳﺒﻴﻞ ﺍﺭﺗﻜﺎﺑﻪ ﳉﺮﳝﺘﻪ‪ ،‬ﻭﻣﻊ ﺫﻟﻚ ﻓﺈﻥ ﺟﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﺘﻤﻴﺰ ﺑﺎﺭﺗﻜﺎ‪‬ﺎ ﻣﻦ ﻃﺮﻑ‬
‫ﳎﺮﻣﲔ ﻳﺴﺘﻌﻤﻠﻮﻥ ﻛﻞ ﻣﺎ ﻣﻦ ﺷﺄﻧﻪ ﺧﺪﺍﻉ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻭﺍﻟﺘﺤﺎﻳﻞ ﻋﻠﻰ ﺃﻧﻈﻤﺘﻪ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﺗﺘﻨﻮﻉ‬
‫ﺃﺳﺎﻟﻴﺐ ﺍﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﱵ ﻳﺴﺘﻌﻤﻞ ﻣﻦ ﺧﻼﳍﺎ ﺍ‪‬ﺮﻣﻮﻥ ﺗﻘﻨﻴﺎﺕ ﳐﺘﻠﻔﺔ ﻟﺘﻨﻔﻴﺬ ﺟﺮﺍﺋﻤﻬﻢ‬
‫ﻭﺣﱴ ﻭﺇﻥ ﺃﻣﻜﻦ ﺣﺼﺮﻫﺎ ﰲ ﺍﻟﻮﺿﻊ ﺍﻟﺮﺍﻫﻦ ﺇﻻ ﺍﻧﻪ ﻻ ﳝﻜﻦ ﺍﻟﺘﻨﺒﺆ ﺑﺎﻟﻮﺳﺎﺋﻞ ﺍﻟﻔﻨﻴﺔ ﻭﺍﻟﺘﻘﻨﻴﺔ ﺍﻟﱵ ﻗﺪ‬
‫ﺗﺴﺘﺤﺪﺙ ﰲ ﳎﺎﻝ ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ (1)،‬ﻭﻟﻌﻞ ﻣﻦ ﺃﻫﻢ ﻫﺬﻩ ﺍﻟﺘﻘﻨﻴﺎﺕ ﻫﻲ ﺍﻻﺧﺘﺮﺍﻕ ﻭﺍﺳﺘﻌﻤﺎﻝ‬
‫ﺍﻟﱪﺍﻣﺞ ﺍﳋﺒﻴﺜﺔ )‪ (2) (Vérus‬ﻭﺳﻮﻑ ﳓﺎﻭﻝ ﺷﺮﺡ ﺫﻟﻚ ﻓﻴﻤﺎ ﻳﻠﻲ‪:‬‬

‫ﺃﻭﻻ‪ :‬ﺍﻹﺧﺘﺮﺍﻕ‪ :« Haking » :‬ﺗﻘﻮﻡ ﻣﻌﻈﻢ ﺟﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﺗﻘﻨﻴﺔ ﺍﻹﺧﺘﺮﺍﻕ ﻭﺫﻟﻚ‬
‫ﺑﻐﺮﺽ ﺍﻟﺪﺧﻮﻝ ﻏﲑ ﺍﳌﺸﺮﻭﻉ ﻷﻧﻈﻤﺔ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ‪ ،‬ﻭﺍﻹﺧﺘﺮﺍﻕ ﺑﺸﻜﻞ ﻋﺎﻡ ﻫﻮ ﺍﻟﻘﺪﺭﺓ‬
‫ﻋﻠﻰ ﺍﻟﻮﺻﻮﻝ ﳍﺪﻑ ﻣﻌﲔ ﺑﻄﺮﻳﻘﺔ ﻏﲑ ﻣﺸﺮﻭﻋﺔ ﻋﻦ ﻃﺮﻳﻖ ﺛﻐﺮﺍﺕ ﰲ ﻧﻈﺎﻡ ﺍﳊﻤﺎﻳﺔ ﺍﳋﺎﺹ ﺑﺎﳍﺪﻑ‬
‫ﺃﻭ ﺍﻟﻮﺻﻮﻝ ﺇﱃ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﳌﻮﺟﻮﺩﺓ ﻋﻠﻰ ﺍﻷﺟﻬﺰﺓ ﺍﻟﺸﺨﺼﻴﺔ ﺑﻮﺳﺎﺋﻞ ﻏﲑ ﻣﺸﺮﻭﻋﺔ)‪. (3‬‬

‫)‪ (1‬ﻼ ﺍﳌﻮﻣﲏ ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ ‪.125‬‬


‫)‪ (2‬ﳏﻤﺪ ﺧﻠﻴﻔﺔ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ ‪.40‬‬
‫)‪ (3‬ﻃﺒﻘﺎ ﳌﺆﲤﺮ ﺳﺎﻡ ﻟﻼﺧﺘﺮﺍﻕ ﻓﺈﻥ ﻟﻼﺧﺘﺮﺍﻕ ‪ 06‬ﻣﺴﺘﻮﻳﺎﺕ ﲝﺴﺐ ﺩﺭﺟﺔ ﺍﳋﻄﻮﺭﺓ‪:‬‬
‫‪ -‬ﺍﳌﺴﺘﻮﻯ ﺍﻷﻭﻝ‪ :‬ﻳﻌﺮﻑ ‪‬ﺠﻮﻡ ﻗﻨﺒﻠﺔ ﺻﻨﺪﻭﻕ ﺍﻟﱪﻳﺪ ﻭﻳﺆﺩﻱ ﺇﱃ ﺇﻋﺎﻗﺔ ﺍﻟﻨﻈﺎﻡ ﻋﻦ ﺗﻘﺪﱘ ﺍﳋﺪﻣﺔ‪.‬‬
‫‪ -‬ﺍﳌﺴﺘﻮﻯ ﺍﻟﺜﺎﱐ‪ :‬ﺍﻟﺪﺧﻮﻝ ﻏﲑ ﻣﺮﺧﺺ ﺑﻪ ﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﳊﺴﺎﺑﺎﺕ ﲟﺎ ﻳﺘﻴﺢ ﻗﺮﺍﺀﺓ ﺍﳌﻠﻔﺎﺕ ﺃﻭ ﻧﺴﺨﻬﺎ ﻟﻠﻤﺨﺘﺮﻕ ﻏﲑ ﻣﺮﺧﺺ ﻟﻪ‪.‬‬
‫‪ -‬ﺍﳌﺴﺘﻮﻯ ﺍﻟﺜﺎﻟﺚ‪ :‬ﻳﺘﻤﻜﻦ ﺍﳌﺨﺘﺮﻕ ﻓﻴﻪ ﻣﻦ ﺍﻟﺪﺧﻮﻝ ﺇﱃ ﻣﻮﺍﻗﻊ ﻏﲑ ﻣﺮﺧﺺ ﻟﻪ ﺑﺎﻟﺪﺧﻮﻝ ﺇﻟﻴﻬﺎ‪.‬‬
‫‪ -‬ﺍﳌﺴﺘﻮﻯ ﺍﻟﺮﺍﺑﻊ‪ :‬ﻳﺘﻤﻜﻦ ﺍﳌﺨﺘﺮﻕ ﻓﻴﻪ ﻣﻦ ﻗﺮﺍﺀﺓ ﻣﻠﻔﺎﺕ ﺳﺮﻳﺔ‪.‬‬
‫‪ -‬ﺍﳌﺴﺘﻮﻯ ﺍﳋﺎﻣﺲ‪ :‬ﻳﺘﻤﻜﻦ ﺍﳌﺨﺘﺮﻕ ﻣﻦ ﻧﻘﻞ ﻭﻧﺴﺦ ﺍﳌﻠﻔﺎﺕ ﺍﻟﺴﺮﻳﺔ‪.‬‬

‫‪- 56 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻭﳛﺘﺎﺝ ﺍﻟﺘﺴﻠﻞ ﺇﱃ ﺟﻬﺎﺯ ﺍﻟﻀﺤﻴﺔ ﺩﻭﻥ ﻋﻠﻤﻪ ﺇﱃ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻷﺩﻭﺍﺕ ﻭﺍﻟﻮﺳﺎﺋﻞ‪ ،‬ﻓﻘﺪ ﻳﺘﻢ‬
‫ﺍﻹﺧﺘﺮﺍﻕ ﻋﻦ ﻃﺮﻳﻖ ﺍﺳﺘﻌﻤﺎﻝ ﻧﻈﻢ ﺍﻟﺘﺸﻐﻴﻞ ﻟﻜﻮ‪‬ﺎ ﻣﻠﻴﺌﺔ ﺑﺎﻟﺜﻐﺮﺍﺕ ﻣﻦ ﺧﻼﻝ ﺍﻟﱪﻭﺗﻮﻛﻮﻻﺕ ﺍﻟﱵ‬
‫ﻳﺴﺘﺨﺪﻣﻬﺎ ﻧﻈﺎﻡ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻊ ﺷﺒﻜﺔ ﺍﻹﻧﺘﺮﻧﺎﺕ‪ ،‬ﻓﻴﻘﻮﻡ ﺍﳌﺨﺘﺮﻕ ﺑﺎﻟﺒﺤﺚ ﻋﻦ ﺿﺤﻴﺔ ﻣﻦ ﺧﻼﻝ ﻣﻌﺮﻓﺔ‬
‫ﺭﻗﻢ )‪ (1) (IP‬ﺍﳋﺎﺹ ﺑﻪ‪ .‬ﻭﻳﺘﻢ ﺍﻟﺒﺤﺚ ﻋﻦ ﻫﺬﺍ ﺍﻟﺮﻗﻢ ﲟﺠﻤﻮﻋﺔ ﻣﻦ ﺍﳋﻄﻮﺍﺕ ﻳﻘﻮﻡ ‪‬ﺎ ﺍﳌﺨﺘﺮﻕ ﻋﻠﻰ‬
‫ﺟﻬﺎﺯﻩ ﺍﻟﺬﻱ ﻳﺸﺘﺮﻁ ﺃﻥ ﻳﻜﻮﻥ ﻣﺘﺼﻼ ﲜﻬﺎﺯ ﺍﻟﻀﺤﻴﺔ ﻋﱪ ﺷﺒﻜﺔ ﺍﻷﻧﺘﺮﻧﺖ ﻭﰲ ﻧﻔﺲ ﺍﻟﻠﺤﻈﺔ‪ ،‬ﻷﻥ‬
‫ﻫﺬﺍ ﺍﻟﺮﻗﻢ ﻳﺘﻐﲑ ﻣﻊ ﻛﻞ ﺍﺗﺼﺎﻝ ﺟﺪﻳﺪ‪.‬‬

‫ﻭﻗﺪ ﻳﺘﻢ ﺍﻻﺧﺘﺮﺍﻕ ﺑﺎﺳﺘﺨﺪﺍﻡ ﺍﻟﱪﺍﻣﺞ‪ (2)،‬ﻭﻳﺸﺘﺮﻁ ﰲ ﻫﺬﻩ ﺍﻟﻄﺮﻳﻘﺔ ﻭﺟﻮﺩ ﺑﺮﻧﺎﳎﲔ ﺃﺣﺪﳘﺎ‬
‫ﲜﻬﺎﺯ ﺍﻟﻀﺤﻴﺔ ﻭﻳﺴﻤﻰ ﺑﺎﻟﱪﻧﺎﻣﺞ ﺍﳋﺎﺩﻡ ﻷﻧﻪ ﻳﺄﲤﺮ ﺑﺄﻭﺍﻣﺮ ﺍﳌﺨﺘﺮﻕ ﻭﻳﻨﻔﺬ ﺍﳌﻬﺎﻡ ﺍﳌﻮﻛﻠﺔ ﺇﻟﻴﻪ ﺩﺍﺧﻞ‬
‫ﺟﻬﺎﺯ ﺍﻟﻀﺤﻴﺔ ﻭﺑﺮﻧﺎﻣﺞ ﺁﺧﺮ ﻳﻮﺟﺪ ﲜﻬﺎﺯ ﺍﳌﺨﺘﺮﻕ ﻭﻳﺴﻤﻰ ﺑﺎﻟﱪﻧﺎﻣﺞ ﺍﳌﺴﺘﻔﻴﺪ‪ ،‬ﻭﺃﺧﻄﺮ ﻫﺬﻩ ﺍﻟﱪﺍﻣﺞ‬
‫ﺑﺮﻧﺎﻣﺞ "ﺣﺼﺎﻥ ﻃﺮﻭﺍﺩﺓ"‪ (3)،‬ﻭﺗﺘﺠﻠﻰ ﺧﻄﻮﺭﺗﻪ ﻟﺘﻤﻴﺰﻩ ﺑﺎﻟﻘﺪﺭﺓ ﻋﻠﻰ ﺍﻹﺧﺘﺮﺍﻕ ﺩﻭﻥ ﺇﻣﻜﺎﻧﻴﺔ ﻛﺸﻔﻪ‬
‫ﻭﺗﺘﺒﻌﻪ ﻭﺍﻟﻘﻀﺎﺀ ﻋﻠﻴﻪ ﻭﺍﺣﺘﻼﻝ ﻫﺬﺍ ﺍﻟﱪﻧﺎﻣﺞ ﻣﻜﺎﻧﺎ ﺩﺍﺧﻞ ﺍﻟﻨﻈﺎﻡ ﺍﳌﺨﺘﺮﻕ ﺣﱴ ﻭﻟﻮ ﻗﺎﻡ ﺍﻟﻀﺤﻴﺔ ﲝﺬﻓﻪ‬
‫ﻓﻼ ﻓﺎﺋﺪﺓ ﻣﻦ ﺫﻟﻚ‪ ،‬ﻛﻤﺎ ﺃﻧﻪ ﻳﻜﻔﻲ ﺃﻥ ﻳﻌﻤﻞ ﺍﻟﱪﻧﺎﻣﺞ ﻫﺬﺍ ﳌﺮﺓ ﻭﺍﺣﺪﺓ ﻓﻘﻂ ﺣﱴ ﻳﻘﻮﻡ ﲟﻬﺎﻣﻪ‪.‬‬
‫ﻭﳝﻜﻦ ﺇﺭﺳﺎﻟﻪ ﻟﻠﻀﺤﻴﺔ ﻋﻦ ﻃﺮﻳﻖ ﺭﺳﺎﺋﻞ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ ﺃﻭ ﻋﻦ ﻃﺮﻳﻘﺎﺳﺘﺨﺪﺍﻡ ﺑﺮﺍﻣﺞ ﺍﻟﺪﺭﺩﺷﺔ‪.‬‬

‫ﻛﻤﺎ ﻗﺪ ﻳﺘﻢ ﺍﻟﻠﺠﻮﺀ ﰲ ﻋﻤﻠﻴﺔ ﺍﻹﺧﺘﺮﺍﻕ ﺇﱃ ﺃﺳﻠﻮﺏ ﺍﻟﺘﻔﺘﻴﺶ ﰲ ﳐﻠﻔﺎﺕ ﺍﻟﺘﻘﻨﻴﺔ ﻭﺫﻟﻚ ﺑﺎﻟﺒﺤﺚ‬
‫ﰲ ﳐﻠﻔﺎﺕ ﺍﳊﻮﺍﺳﻴﺐ ﻣﻦ ﺍﻟﻘﻤﺎﻣﺎﺕ ﻭﺍﳌﻮﺍﺩ ﺍﳌﺘﺮﻭﻛﺔ ﻋﻠﻰ ﻣﺴﺘﻮﻯ ﺍﳉﻬﺎﺯ ﻋﻦ ﺃﻱ ﺷﻲﺀ ﻳﺴﺎﻋﺪ ﻋﻠﻰ‬
‫ﺍﺧﺘﺮﺍﻕ ﺍﻟﻨﻈﺎﻡ‪ ،‬ﻛﺎﻟﱪﺍﻣﺞ ﺍﳌﺪﻭﻥ ﻋﻠﻴﻬﺎ ﻛﻠﻤﺔ ﺍﻟﺴﺮ ﺃﻭ ﳐﺮﺟﺎﺕ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﺍﻟﱵ ﻗﺪ ﺗﺘﻀﻤﻦ ﻣﻌﻠﻮﻣﺎﺕ‬

‫‪ -‬ﺍﳌﺴﺘﻮﻯ ﺍﻟﺴﺎﺩﺱ‪ :‬ﻳﺘﻤﻜﻦ ﺍﳌﺨﺘﺮﻕ ﻣﻦ ﺇﳚﺎﺩ ﻗﻨﺎﺓ ﻣﻔﺘﻮﺣﺔ ﻟﻠﺪﺧﻮﻝ ﺇﱃ ﺳﺎﺋﺮ ﺃﺭﺟﺎﺀ ﺍﻟﻨﻈﺎﻡ ﻭﺍﻟﻌﺒﺚ ﲟﺤﺘﻮﻳﺎﺗﻪ‪.‬‬
‫)‪ Address IP (1‬ﻳﺘﻄﻠﺐ ﺗﺸﻐﻴﻞ ﻧﻈﻢ ﺍﻹﺗﺼﺎﻻﺗﺎﻟﻜﻮﻣﺒﻴﻮﺗﺮﻳﺔ ﺃﻥ ﺗﻜﻮﻥ ﻫﻨﺎﻙ ﺁﻟﻴﺔ ﻣﻦ ﺃﺟﻞ ﻋﻨﻮﻧﺔ ﺍﻷﺟﻬﺰﺓ ﺳﻮﺍﺀ ﺍﳌﺮﺳﻠﺔ ﺃﻭ ﺍﳌﺴﺘﻘﺒﻠﺔ‪ ،‬ﻛﻤﺎ‬
‫ﺗﺘﻄﻠﺐ ﺃﻳﻀﺎ ﺃﻥ ﺗﻜﻮﻥ ﻫﻨﺎﻙ ﺁﻟﻴﺔ ﻟﻀﻤﺎﻥ ﻭﺻﻮﻝ ﺃﻭ ﺍﻟﺘﺤﻘﻖ ﻣﻦ ﻭﺻﻮﻝ ﺍﻹﺗﺼﺎﻝ ﺃﻭ ﺍﻟﺮﺳﺎﻟﺔ ﻟﻠﺠﻬﺔ ﺍﳌﻘﺼﻮﺩﺓ ﻭﺍﻟﺘﺤﻘﻖ ﻣﻦ ﺟﻬﺔ ﺍﻹﺭﺳﺎﻝ‪.‬‬
‫ﻭﻳﺴﺘﺨﺪﻡ ﰲ ﲢﻘﻴﻖ ﻫﺬﻩ ﺍﻟﻐﺎﻳﺔ ﺑﺮﻭﺗﻮﻛﻮﻝ ﺍﻷﻧﺘﺮﻧﺎﺕ)‪Internet protocol (IP‬‬
‫)‪ (2‬ﻣﻌﻈﻢ ﺑﺮﺍﻣﺞ ﺍﻹﺧﺘﺮﺍﻕ ﺗﺴﺘﺨﺪﻡ ﻧﻮﻋﲔ ﻣﻦ ﺍﳌﻠﻔﺎﺕ ﺍﻷﻭﻝ ﻳﺴﻤﻰ ‪ Client.exe‬ﻭﺍﻟﺜﺎﱐ ‪ SERVER.EXE‬ﻭﻛﻼﳘﺎ ﻳﻨﺪﺭﺟﺎﻥ ﲢﺖ ﺍﺳﻢ‬
‫‪ TROJAN‬ﺣﻴﺚ ﻳﻌﻤﻞ ﻣﻠﻒ ‪ SERVER‬ﻋﻠﻰ ﻓﺘﺢ ﺛﻐﺮﺓ ﰲ ﺍﳊﺎﺳﺐ ﺍﳌﺴﺘﻬﺪﻑ ﻟﻴﻤﻜﻦ ﻣﻠﻒ ‪ Client‬ﻣﻦ ﺍﻟﺪﺧﻮﻝ ﺇﱃ ﺍﳊﺎﺳﺐ ﻣﻦ ﺧﻼﻝ‬
‫ﻫﺬﻩ ﺍﻟﺜﻐﺮﺓ‪ .‬ﻭﺍﳌﻘﺼﻮﺩ ﺑﺎﻟﺜﻐﺮﺓ ‪ PORT‬ﻛﻞ ﺑﺮﻧﺎﻣﺞ ﺍﺧﺘﺮﺍﻕ ﻳﻌﺘﻤﺪ ﻋﻠﻰ ﺭﻗﻢ ﻣﻨﻔﺬ ﺧﺎﺹ ﺑﻪ ﳝﻜﻦ ﺍﳌﺨﺘﺮﻕ ﻣﻦ ﺇﺩﺧﺎﻝ ﻋﻨﻮﺍﻥ ﺍﳊﺎﺳﺐ ﺍﳌﺴﺘﻬﺪﻑ‬
‫"‪ "L’addressr IP‬ﻭﻳﺮﺳﻞ ﻣﻠﻒ ﺍﻻﺧﺘﺮﺍﻕ ﺇﱃ ﺍﳊﺎﺳﺐ ﺍﳌﺴﺘﻬﺪﻑ ﺑﻮﺍﺳﻄﺔ ﺍﻟﻄﺮﻕ ﺍﻟﺘﺎﻟﻴﺔ‪:‬‬
‫‪ -‬ﺭﺳﺎﺋﻞ ﺍﻟﱪﻳﺪ ﺍﻻﻟﻜﺘﺮﻭﱐ ‪ - E-MAIL‬ﺑﺮﺍﻣﺞ ﺍﻟﺪﺭﺩﺷﺔ )‪ - (ICQ‬ﺇﻧﺰﺍﻝ ﺍﻟﱪﺍﻣﺞ ﻣﻦ ﺍﳌﻮﻗﻊ ﻏﲑ ﺍﳌﻮﺛﻮﻕ ﺑﻪ‪.‬‬
‫)‪ (3‬ﺻﻤﻢ ﺑﺮﻧﺎﻣﺞ ﺣﺼﺎﻥ ﻃﺮﻭﺍﺩﺓ ﰲ ﺍﻟﺒﺪﺍﻳﺔ ﻟﻐﺮﺽ ﺣﺴﻦ ﻭﻣﻔﻴﺪ ﻭﻫﻮ ﻣﻌﺮﻓﺔ ﻣﺎ ﻳﻘﻮﻡ ﺑﻪ ﺍﻷﺑﻨﺎﺀ ﻋﻠﻰ ﺟﻬﺎﺯ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﰲ ﻏﻴﺎﺏ ﺍﻟﻮﺍﻟﺪﻳﻦ ﺃﻭ ﻣﻌﺮﻓﺔ ﻣﺎ‬
‫ﻳﻘﻮﻡ ﺑﻪ ﺍﳌﻮﻇﻔﻮﻥ ﻋﻠﻰ ﺟﻬﺎﺯ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﰲ ﻏﻴﺎﺏ ﺍﳌﺪﺭﺍﺀ ﺇﻻ ﺃﻧﻪ ﺗﻄﻮﺭ ﻫﺬﺍ ﺍﻟﱪﻧﺎﻣﺞ ﲝﻴﺚ ﺃﺻﺒﺢ ﳝﻜﻦ ﺍﳌﺨﺘﺮﻕ ﻣﻦ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﻛﻠﻤﺔ ﺍﻟﺴﺮ ﺍﳋﺎﺻﺔ‬
‫ﺑﺎﻟﺪﺧﻮﻝ ﺇﱃ ﺍﳉﻬﺎﺯ ﻭﺍﻟﱵ ﻳﺴﺘﺨﺪﻣﻬﺎ ﺻﺎﺣﺐ ﺍﳉﻬﺎﺯ ﻧﻔﺴﻪ ﻓﻼ ﳝﻜﻦ ﻟﺼﺎﺣﺐ ﺍﳉﻬﺎﺯ ﻣﻼﺣﻈﺔ ﻭﺟﻮﺩ ﺩﺧﻴﻞ‪.‬‬

‫‪- 57 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻣﻔﻴﺪﺓ‪ (1)،‬ﻭﻣﻦ ﺧﻼﻝ ﺍﻷﺳﺎﻟﻴﺐ ﺃﻳﻀﺎ ﰲ ﻋﻤﻠﻴﺔ ﺍﻹﺧﺘﺮﺍﻕ ﺃﺳﻠﻮﺏ ﺍﶈﺎﻛﺎﺕ ﻭﺫﻟﻚ ﻋﻦ ﻃﺮﻳﻖ‬
‫ﺍﻟﺘﺨﻔﻲ ﺑﺎﻧﺘﺤﺎﻝ ﺷﺨﺼﻴﺔ ﻭﺻﻼﺣﻴﺎﺕ ﺷﺨﺺ ﻣﻔﻮﺽ ﻭﻣﺴﻤﻮﺡ ﻟﻪ ﺑﺎﻟﺪﺧﻮﻝ ﺇﱃ ﻧﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﻋﻦ ﻃﺮﻳﻖ ﺇﺳﺘﺨﺪﺍﻡ ﻭﺳﺎﺋﻞ ﺍﻟﺘﻌﺮﻳﻒ ﺍﳋﺎﺻﺔ ﺑﻪ‪ ،‬ﻭﻓﻴﻬﺎ ﻳﺘﻢ ﺇﻋﻄﺎﺀ ﺣﺰﻡ ﻋﻨﺎﻭﻳﻦ )‪ (IP‬ﺷﻜﻼ ﻣﻌﻴﻨﺎ‬
‫ﻟﺘﺒﺪﻭ ﻭﺃ‪‬ﺎ ﺻﺎﺩﺭﺓ ﻣﻦ ﺟﻬﺎﺯ ﺣﺎﺳﻮﺏ ﻣﺴﻤﻮﺡ ﻟﻪ ﺑﺎﻟﺪﺧﻮﻝ ﺇﱃ ﺗﻠﻚ ﺍﻷﺟﻬﺰﺓ‪.‬‬

‫ﻛﻤﺎ ﻳﻮﺟﺪ ﺃﺳﻠﻮﺏ ﺁﺧﺮ ﻟﻺﺧﺘﺮﺍﻕ ﻭﻫﻮ ﺍﻧﺘﺤﺎﻝ ﺷﺨﺼﻴﺔ ﺍﳌﻮﻗﻊ‪ ،‬ﻭﻳﻌﺘﱪ ﻫﺬﺍ ﺍﻷﺳﻠﻮﺏ ﺣﺪﻳﺜﺎ‬
‫ﻧﺴﺒﻴﺎ ﰲ ﳎﺎﻝ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪،‬ﻭﻳﻘﻮﻡ ﻫﺬﺍ ﺍﻷﺳﻠﻮﺏ ﻋﻠﻰ ﻗﻴﺎﻣﺎﳌﺨﺘﺮﻕ ﺑﻮﺿﻊ ﻧﻔﺴﻪ ﰲ ﻣﻮﻗﻊ‬
‫ﺑﻴـﲏ ﺑﲔ ﺍﻟﱪﻧﺎﻣﺞ ﺍﳌﺴﺘﻌﺮﺽ ﻟﻠﺤﺎﺳﺐ ﺍﳋﺎﺹ ﺑﺄﺣﺪ ﻣﺴﺘﺨﺪﻣﻲ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻭﺑﲔ ﺍﳌﻮﻗﻊ )‪(WEB‬‬
‫ﻭﻣﻦ ﻫﺬﺍ ﺍﳌﻮﻗﻊ ﺍﻟﺒﻴﲏ ﻳﺴﺘﻄﻴﻊ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻣﻦ ﺧﻼﻝ ﺟﻬﺎﺯ ﺣﺎﺳﻮﺑﻪ ﻣﺮﺍﻗﺒﺔ ﺃﻱ ﻣﻌﻠﻮﻣﺔ ﻣﺘﺒﺎﺩﻟﺔ‬
‫ﺑﲔ ﺍﻟﻀﺤﻴﺔ ﺍﻟﺬﻱ ﻳﺰﻭﺭ ﺍﳌﻮﻗﻊ ﻭﺑﲔ ﺍﳌﻮﻗﻊ ﻧﻔﺴﻪ‪ ،‬ﻛﻤﺎ ﻟﻪ ﺃﻥ ﻳﻘﻮﻡ ﺑﺴﺮﻗﺔ ﻫﺬﻩ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺃﻭ ﺗﻐﻴﲑﻫﺎ‪.‬‬
‫ﻭﻛﻞ ﻣﺎ ﳛﺘﺎﺟﻪ ﻣﻦ ﻳﻘﻮﻡ ‪‬ﺬﻩ ﺍﻟﻌﻤﻠﻴﺔ ﻫﻮ ﺍﻟﺴﻴﻄﺮﺓ ﻋﻠﻰ ﺃﺣﺪ ﺍﳌﻮﺍﻗﻊ ﺍﻟﱵ ﺗﺘﻢ ﺯﻳﺎﺭ‪‬ﺎ ﺑﻜﺜﺮﺓ ﻭﲢﻮﻳﻠﻪ‬
‫ﻟﻴﻌﻤﻞ ﻛﻤﻮﻗﻊ ﺑﻴﲏ ﰒ ﻳﻘﻮﻡ ﺍﳌﺨﺘﺮﻕ ﺑﺘﺮﻛﻴﺐ ﺍﻟﱪﻧﺎﻣﺞ ﺍﳋﺎﺹ ﺑﻪ ﻫﻨﺎﻙ‪ ،‬ﻭﲟﺠﺮﺩ ﺃﻥ ﻳﻜﺘﺐ ﻣﺴﺘﺨﺪﻡ‬
‫ﺍﻹﻧﺘﺮﻧﺎﺗﺈﺳﻢ ﻫﺬﺍ ﺍﳌﻮﻗﻊ ﻓﺈﻧﻪ ﻳﺪﺧﻞ ﰲ ﺍﳌﻮﻗﻊ ﺍﳌﺸﺒﻮﻩ ﺍﻟﺬﻱ ﺃﻋﺪﻩ ﺍﳌﺨﺘﺮﻕ‪.‬‬

‫ﺛﺎﻧﻴﺎ‪ :‬ﺍﻟﱪﺍﻣﺞ ﺍﳋﺒﻴﺜﺔ )‪ :(Les Vérus‬ﺗﻌﺪ ﺍﻟﻔﲑﻭﺳﺎﺕ ﲟﺜﺎﺑﺔ ﺍﳌﺮﺽ ﺍﳌﻌﺪﻱ ﺍﻟﺬﻱ ﻳﺼﻴﺐ‬
‫ﺍﳌﻌﻄﻴﺎﺕ ﻓﻴﻘﻀﻲ ﻋﻠﻴﻬﺎ ﺃﻭ ﻳﺸﻮﻫﻬﺎ ﻓﺘﺬﻫﺐ ﰲ ﻛﻠﺘﺎ ﺍﳊﺎﻟﺘﲔ ﺑﻔﺎﺋﺪ‪‬ﺎ‪ ،‬ﻭﻓﲑﻭﺱ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻳﺸﺒﻪ‬
‫ﺇﱃ ﺣﺪ ﻛﺒﲑ ﺍﻟﻔﲑﻭﺱ ﺍﻟﺬﻱ ﻳﺼﻴﺐ ﺍﻹﻧﺴﺎﻥ ﻟﻘﺪﺭﺗﻪ ﻋﻠﻰ ﺍﻹﻧﺘﻘﺎﻝ ﻣﻦ ﺣﺎﺳﺐ ﺇﱃ ﺁﺧﺮ)‪.(2‬ﻭﺍﻟﻔﲑﻭﺱ‬
‫ﰲ ﳎﺎﻝ ﺍﳌﻌﻮﻣﺎﺗﻴﺔﻫﻮ ﺑﺮﻧﺎﻣﺞ ﻣﺜﻞ ﺃﻱ ﺑﺮﻧﺎﻣﺞ ﺁﺧﺮ ﻣﻮﺟﻮﺩ ﻋﻠﻰ ﺟﻬﺎﺯ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻳﺼﻤﻢ ﺑﺸﻜﻞ‬
‫ﳚﻌﻞ ﻣﻨﻪ ﻗﺎﺩﺭﺍ ﻋﻠﻰ ﺍﻟﺘﻜﺎﺛﺮ ﻭﻧﺴﺦ ﻧﻔﺴﻪ ﺇﱃ ﻧﺴﺦ ﻛﺜﲑﺓ ﻭﺍﻹﻧﺘﺸﺎﺭ ﻣﻦ ﻧﻈﺎﻡ ﻵﺧﺮ ﻋﱪ ﺷﺒﻜﺎﺕ‬
‫ﺍﻹﺗﺼﺎﻝ ﻭﺍﻟﻘﺪﺭﺓ ﻋﻠﻰ ﺍﻹﺧﺘﻔﺎﺀ ﺩﺍﺧﻞ ﺑﺮﻧﺎﻣﺞ ﺳﻠﻴﻢ ﲝﻴﺚ ﻳﺼﻌﺐ ﺍﻛﺘﺸﺎﻓﻪ‪ ،‬ﻛﻤﺎ ﺃﻧﻪ ﻗﺪ ﻳﻜﻮﻥ‬
‫ﻣﺼﻤﻤﺎ ﻟﺘﺪﻣﲑ ﺑﺮﺍﻣﺞ ﺃﺧﺮﻯ ﺃﻭ ﺗﻐﻴﲑ ﻣﻌﻠﻮﻣﺎﺕ ﰒ ﻳﻘﻮﻡ ﺑﺘﺪﻣﲑ ﻧﻔﺴﻪ ﺫﺍﺗﻴﺎ ﺩﻭﻥ ﺃﻥ ﻳﺘﺮﻙ ﺃﻱ ﺃﺛﺮ ﻳﺪﻝ‬
‫ﻋﻠﻴﻪ‪.‬‬

‫)‪ (1‬ﻣﻨﲑ ﳏﻤﺪ ﺍﳉﻨﺒﻴﻬﻲ‪،‬ﳑﺪﻭﺡ ﳏﻤﺪ ﺍﳉﻨﺒﻴﻬﻲ ﺟﺮﺍﺋﻢ ﺍﻻﻧﺘﺮﻧﺎﺕ ﻭﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻭﻭﺳﺎﺋﻞ ﻣﻜﺎﻓﺤﺘﻬﺎ‪ .‬ﺩﺍﺭ ﺍﻟﻔﻜﺮ ﺍﳉﺎﻣﻌﻲ ﺍﻹﺳﻜﻨﺪﺭﻳﺔ ﺹ ‪.21‬‬
‫)‪ (2‬ﳏﻤﺪ ﺧﻠﻴﻔﺔ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ ‪.50‬‬

‫‪- 58 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻭﳝﻜﻦ ﺃﻥ ﻳﺼﺎﺏ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﺑﺎﻟﻔﲑﻭﺱ ﻋﻨﺪ ﺗﺸﻐﻴﻞ ﺍﳉﻬﺎﺯ ﺑﻮﺍﺳﻄﺔ ﺃﺳﻄﻮﺍﻧﺔ ﻣﺮﻧﺔ ﻣﺼﺎﺑﺔ‬
‫ﻭﻛﺬﺍ ﻋﻨﺪ ﻧﺴﺦ ﺑﺮﻧﺎﻣﺞ ﺃﻭ ﲢﻤﻴﻞ ﻣﻠﻔﺎﺕ ﺃﻭ ﺑﺮﺍﻣﺞ ﻣﻦ ﺍﻹﻧﺘﺮﻧﺎﺕ‪ ،‬ﻭﻛﺬﻟﻚ ﻋﻨﺪ ﺗﺒﺎﺩﻝ ﺍﻟﱪﻳﺪ‬
‫ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﶈﺘﻮﻱ ﻋﻠﻰ ﺍﻟﻔﲑﻭﺳﺎﺕ‪.‬‬

‫ﻭﺗﺘﻤﺘﻊ ﺍﻟﻔﲑﻭﺳﺎﺕ ﺑﻘﺪﺭﺓ ﻓﺎﺋﻘﺔ ﻋﻠﻰ ﻣﻬﺎﲨﺔ ﺃﺟﻬﺰﺓ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻟﺸﺒﻜﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺗﻌﻄﻴﻞ‬
‫ﺍﻹﺗﺼﺎﻻﺕ ﻭﺗﺸﻮﻳﻪ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﺃﺣﻴﺎﻧﺎ ﺗﻀﻠﻞ ﺍﳌﺴﺘﺨﺪﻡ ﺑﺒﻴﺎﻧﺎﺕ ﺧﺎﻃﺌﺔ‪ .‬ﻭﻳﺴﺘﺨﺪﻡ ﺍﻟﻔﲑﻭﺱ ﺑﺸﻜﻞ‬
‫ﻋﺎﻡ ﻟﺘﺤﻘﻴﻖ ﺃﺣﺪ ﺍﻟﻐﺮﺿﲔ‪:‬‬

‫‪ -‬ﺍﻟﻐﺮﺽ ﺍﳊﻤﺎﺋﻲ‪ :‬ﻭﻳﻜﻮﻥ ﺫﻟﻚ ﳊﻤﺎﻳﺔ ﺍﻟﻨﺴﺨﺔ ﺍﻷﺻﻠﻴﺔ ﻣﻦ ﺧﻄﺮ ﺍﻟﻨﺴﺦ ﻏﲑ ﺍﳌﺮﺧﺺ ﺑﻪ‬
‫ﻓﻴﻨﺸﻂ ﺍﻟﻔﲑﻭﺱ ﲟﺠﺮﺩ ﺍﻟﻨﺴﺦ ﻭﻳﺪﻣﺮ ﻧﻈﺎﻡ ﺍﳊﺎﺳﻮﺏ ﺍﻟﺬﻱ ﻳﻌﻤﻞ ﻋﻠﻴﻪ ﻭﻳﻌﺪ ﺫﻟﻚ ﲟﺜﺎﺑﺔ ﻋﻘﻮﺑﺔ‬
‫ﺗﻠﺤﻖ ﺑﺎﻟﻨﺎﺳﺦ‪.‬‬
‫‪ -‬ﺍﻟﻐﺮﺽ ﺍﻟﺘﺨﺮﻳﱯ‪ :‬ﻭﻳﺘﻢ ﺇﻋﺪﺍﺩ ﻫﺬﻩ ﺍﻟﻔﲑﻭﺳﺎﺕ ﻣﻦ ﻃﺮﻑ ﺧﱪﺍﺀ ﺍﻟﱪﺍﻣﺞ ‪‬ﺪﻑ ﺍﻟﺘﺨﺮﻳﺐ‬
‫) ‪(1‬‬
‫ﲝﺪ ﺫﺍﺗﻪ ﺃﻭ ﺇﱃ ﺍﻟﺘﺨﺮﻳﺐ ‪‬ﺪﻑ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﻣﻨﺎﻓﻊ ﺷﺨﺼﻲ‪.‬‬

‫ﻭﻣﻦ ﺍﻵﺛﺎﺭ ﺍﻟﱵ ﳜﻠﻔﻬﺎ ﺍﻟﻔﲑﻭﺱ ﻭﺍﻟﱵ ﲣﺘﻠﻒ ﲝﺴﺐ ﻧﻮﻋﻪ‪:‬‬

‫‪ -‬ﺍﻟﺒﻂﺀ ﺍﻟﺸﺪﻳﺪ ﰲ ﺍﳊﺎﺳﺐ ﲟﺎ ﳚﻌﻞ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻌﻪ ﻣﺴﺘﺤﻴﻼ‪.‬‬


‫‪ -‬ﻋﺪﻡ ﺍﻟﻘﺪﺭﺓ ﻋﻠﻰ ﺗﺸﻐﻴﻞ ﻣﻌﻈﻢ ﺍﻟﺘﻄﺒﻴﻘﺎﺕ ﻭﻇﻬﻮﺭ ﺭﺳﺎﻟﺔ ﺧﻄﺄ ﻛﻠﻤﺎ ﲤﺖ ﳏﺎﻭﻟﺔ ﺗﺸﻐﻴﻠﻬﺎ‪.‬‬
‫‪ -‬ﻣﺴﺢ ﺍﳌﻠﻔﺎﺕ ﺍﻟﺘﻨﻔﻴﺬﻳﺔ ﻭﻛﺬﺍ ﺣﺬﻑ ﲨﻴﻊ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﻮﺟﻮﺩﺓ ﺩﺍﺧﻞ ﺍﻟﻘﺮﺹ ﺍﻟﺼﻠﺐ‪.‬‬

‫ﺃﻣﺎ ﻋﻦ ﺃﻧﻮﺍﻉ ﺍﻟﻔﲑﻭﺳﺎﺕ ﻓﻬﻲ ﻛﺜﲑﺓ ﺟﺪﺍ ﻭﻻ ﳝﻜﻦ ﺣﺼﺮﻫﺎ‪ ،‬ﺇﺫ ﺃ‪‬ﺎ ﺁﺧﺬﺓ ﰲ ﺍﻟﺘﺰﺍﻳﺪ ﺑﺸﻜﻞ‬
‫ﻣﺘﺴﺎﺭﻉ ﻭﺃﳘﻬﺎ‪ :‬ﺍﻟﻔﲑﻭﺳﺎﺕ ﺍﳌﻘﻴﻤﺔ‪ ،‬ﺍﻟﻔﲑﻭﺳﺎﺕ ﺍﻟﻨﺎﺋﻤﺔ‪ ،‬ﺍﻟﻔﲑﻭﺳﺎﺕ ﺍﻻﺳﺘﻌﺮﺍﺿﻴﺔ‪ ،‬ﻓﲑﻭﺳﺎﺕ‬
‫ﺍﻟﺜﻐﺮﺍﺕ‪...‬‬

‫)‪(1‬ﺳﺎﻣﻲ ﺍﻟﺸﻮﺍ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ ‪.190‬‬

‫‪- 59 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪:‬ﺩﻭﺍﻓـﻌﺎﺭﺗﻜﺎﺏ ﺍﳉــﺮﳝﺔ ﺍﳌﻌﻠـﻮﻣﺎﺗﻴﺔ‬

‫ﺇﻥ ﺍﻟﺒﺎﻋﺚ ﺃﻭ ﺍﻟﺪﺍﻓﻊ ﻫﻮ ﺍﻟﻌﺎﻣﻞ ﺍﶈﺮﻙ ﻟﻺﺭﺍﺩﺓ ﺍﻟﱵ ﺗﻮﺟﻪ ﺍﻟﺴﻠﻮﻙ ﺍﻹﺟﺮﺍﻣﻲ‪ ،‬ﻭﻏﺎﻟﺒﺎ ﻣﺎ ﺗﺘﺠﻪ‬
‫ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻟﻌﻘﺎﺑﻴﺔ ﺇﱃ ﻋﺪﻡ ﺍﻋﺘﺒﺎﺭ ﺍﻟﺪﺍﻓﻊ )ﺍﻟﺒﺎﻋﺚ( ﻋﻨﺼﺮﺍ ﻣﻦ ﻋﻨﺎﺻﺮ ﺍﻟﺘﺠﺮﱘ ﺇﻻ ﰲ ﺍﻷﺣﻮﺍﻝ ﺍﻟﱵ‬
‫ﳛﺪﺩﻫﺎ ﺍﻟﻘﺎﻧﻮﻥ ﺻﺮﺍﺣﺔ‪ ،‬ﻓﺎﳉﺮﳝﺔ ﺗﻘﻮﻡ ﺑﺘﺤﻘﻴﻖ ﻋﻨﺎﺻﺮﻫﺎ ﻭﺃﺭﻛﺎ‪‬ﺎ ﺃﻳﺎﹰ ﻛﺎﻥ ﺍﻟﺒﺎﻋﺚ ﻣﻦ ﻭﺭﺍﺀ‬
‫ﺍﺭﺗﻜﺎ‪‬ﺎ‪.‬‬

‫ﻭﺍﳊﻘﻴﻘﺔ ﺃﻧﻪ ﻣﻬﻤﺎ ﻛﺎﻧﺖ ﺩﺭﺟﺔ ﺍﻟﺪﻗﺔ ﰲ ﺭﺳﻢ ﺣﺪﻭﺩ ﻛﻞ ﻃﺎﺋﻔﺔ ﻣﻦ ﺍﻟﻄﻮﺍﺋﻒ ﺍﻟﱵ ﻳﻨﺘﻤﻲ‬
‫ﺇﻟﻴﻬﺎ ﳎﺮﻣﻮ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻓﺈﻥ ﺍﻟﺪﻭﺍﻓﻊ ﺍﻟﺮﺋﻴﺴﻴﺔ ﻋﻠﻰ ﺍﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﺘﻨﻮﻉ ﻭﺗﺘﺒﺎﻳﻦ ﺗﺒﻌﺎ‬
‫ﻟﻄﺒﻴﻌﺔ ﻭﺩﺭﺟﺔ ﺧﱪﺗﻪ ﰲ ﳎﺎﻝ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﻻ ﲣﺮﺝ ﺑﺄﻱ ﺣﺎﻝ ﻣﻦ ﺍﻷﺣﻮﺍﻝ ﻋﻦ ﺛﻼﺙ ﺑﻮﺍﻋﺚ ﲢﺮﻙ‬
‫ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‪ ،‬ﺃﻣﺎ ﺍﻟﺒﺎﻋﺚ ﺍﻷﻭﻝ ﻓﺘﺸﺘﺮﻙ ﻓﻴﻪ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻊ ﻏﲑﻫﺎ ﻣﻦ ﺟﺮﺍﺋﻢ ﺍﻹﻋﺘﺪﺍﺀ ﻋﻠﻰ‬
‫ﺍﻷﻣﻮﺍﻟﺒﺼﻮﺭ‪‬ﺎ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻭﻫﻮ ﺍﻟﺮﻏﺒﺔ ﰲ ﲢﻘﻴﻖ ﺍﻟﺮﺑﺢ ﻭﻛﺴﺐ ﺍﳌﺎﻝ‪ ،‬ﻭﺃﻣﺎ ﺍﻟﺒﺎﻋﺜﺎﻥ ﺍﻵﺧﺮﺍﻥ ﺍﻟﻠﺬﺍﻥ‬
‫ﳝﻴﺰﺍﻥ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻦ ﻏﲑﻫﺎ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﻓﻴﺘﻤﺜﻞ ﺍﻷﻭﻝ ﰲ ﺍﻟﺮﻏﺒﺔ ﰲ ﺍﻟﺪﺧﻮﻝ ﺇﱃ ﺍﻷﻧﻈﻤﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻟﻠﺤﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ ﻭﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﱵ ﲢﺘﻮﻳﻬﺎ ﺑﺪﺍﻓﻊ ﺍﳌﺘﻌﺔ ﻭﺍﻟﺘﺴﻠﻴﺔ‪ ،‬ﻭﻛﺬﺍ ﺍﻟﺮﻏﺒﺔ ﰲ ﺇﺛﺒﺎﺕ‬
‫ﺍﳋﱪﺓ ﺍﻟﺘﻘﻨﻴﺔ ﺍﻟﱵ ﻳﺘﻤﺘﻊ ‪‬ﺎ ﺍﻟﻔﺎﻋﻞ ﺃﻭ ﻏﲑ ﺫﻟﻚ ﻣﻦ ﺍﻷﻏﺮﺍﺽ ﺍﻟﱵ ﻻ ﻳﻜﻮﻥ ﺍﻟﺴﻌﻲ ﻓﻴﻬﺎ ﺇﱃ ﲢﻘﻴﻖ‬
‫ﺭﺑﺢ ﻣﺎﺩﻱ ﺃﻭ ﺍﻹﺿﺮﺍﺭ ‪‬ﺬﻩ ﺍﻷﻧﻈﻤﺔ‪ ،‬ﻭﻳﺘﻤﺜﻞ ﺍﻟﺜﺎﱐ ﰲ ﺍﻟﺮﻏﺒﺔ ﰲ ﺍﻹﺿﺮﺍﺭ ‪‬ﺬﻩ ﺍﻷﻧﻈﻤﺔ ﻭﰲ ﻛﻞ‬
‫ﺍﻷﺣﻮﺍﻝ ﻓﻘﺪ ﺫﻫﺐ ﺍﻟﻔﻘﻪ ﺍﻟﻘﺎﻧﻮﱐ ﺇﱃ ﺇﺭﺟﺎﻉ ﻣﺼﺪﺭ ﻫﺬﻩ ﺍﻟﺪﻭﺍﻓﻊ ﺇﱃ ﻧﻮﻋﲔ ﺩﻭﺍﻓﻊ ﺷﺨﺼﻴﺔ‬
‫ﻭﺃﺧﺮﻯ ﺧﺎﺭﺟﻴﺔ‪.‬‬

‫ﺃﻭﻻ‪ :‬ﺍﻟﺪﻭﺍﻓـﻊ ﺍﻟﺸﺨﺼﻴﺔ‪ :‬ﻭﳝﻜﻦ ﺭﺩ ﺍﻟﺪﻭﺍﻓﻊ ﺍﻟﺸﺨﺼﻴﺔ ﻟﺪﻯ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺇﱃ ﺩﻭﺍﻓﻊ‬
‫ﻣﺎﺩﻳﺔ ﻭﺃﺧﺮﻯ ﺫﻫﻨﻴﺔ‪.‬‬

‫‪ /1‬ﺍﻟﺪﻭﺍﻓﻊ ﺍﳌﺎﺩﻳﺔ )ﲢﻘﻴﻖ ﺍﻟﺮﺑﺢ ﻭﻛﺴﺐ ﺍﳌﺎﻝ(‪ :‬ﻳﻌﺪ ﺍﻟﺪﺍﻓﻊ ﺍﳌﺎﺩﻱ ﻣﻦ ﺃﻛﺜﺮ ﺍﻟﺪﻭﺍﻓﻊ ﺍﻟﱵ‬
‫ﲢﺮﻙ ﺍﳉﺎﱐ ﻹﻗﺘﺮﺍﻑ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﺫﻟﻚ ﺃﻥ ﺍﻟﺮﺑﺢ ﺍﻟﻜﺒﲑ ﻭﺍﳌﻤﻜﻦ ﲢﻘﻴﻘﻪ ﻣﻦ ﺧﻼﳍﺎ ﻳﺪﻓﻊ‬
‫ﺑﺎ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺇﱃ ﺗﻄﻮﻳﺮ ﻧﻔﺴﻪ ﺣﱴ ﻳﻮﺍﻛﺐ ﻛﻞ ﺣﺪﻳﺚ ﻳﻄﺮﺃ ﻋﻠﻰ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻳﻘﺘﻨﺺ‬
‫) ‪(1‬‬
‫ﺍﻟﻔﺮﺹ ﻭﻳﺴﻌﻰ ﺇﱃ ﺍﻹﺣﺘﺮﺍﻑ ﺣﱴ ﳛﻘﻖ ﺃﻋﻠﻰ ﺍﳌﻜﺎﺳﺐ ﻭﺑﺄﻗﻞ ﺟﻬﺪ ﺩﻭﻥ ﺃﻥ ﻳﺘﺮﻙ ﺃﺛﺮﺍ ﻭﺭﺍﺀﻩ‪،‬‬

‫)‪ (1‬ﻭﺿﺎﺡ ﳏﻤﻮﺩ ﺍﳊﻤﻮﺩ ﻭﻧﺸﺄﺕ ﻣﻔﻀﻲ ﺍ‪‬ﺎﱄ‪ .‬ﺟﺮﺍﺋﻢ ﺍﻻﻧﺘﺮﻧﺎﺕ‪،‬ﺩﺍﺭ ﺍﳌﻨﺎﺭ ﻟﻠﻨﺸﺮ‪ .‬ﻋﻤﺎﻥ ‪ ،2005‬ﺹ ‪.30‬‬

‫‪- 60 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻓﻴﻌﻤﺪ ﺍﳉﺎﱐ ﺭﻏﺒﺔ ﻣﻨﻪ ﰲ ﲢﻘﻴﻖ ﺍﻟﺜﺮﺍﺀ ﻭﺍﻟﻜﺴﺐ ﺍﳌﺎﺩﻱ ﺇﱃ ﺍﻟﺘﻼﻋﺐ ﺑﺄﻧﻈﻤﺔ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﺒﻨﻮﻙ‬
‫ﻭﺍﳌﺆﺳﺴﺎﺕ ﺍﳌﺎﻟﻴﺔ ﺇﻥ ﻛﺎﻥ ﺃﺣﺪ ﻣﻮﻇﻔﻴﻬﺎ‪ ،‬ﺃﻭ ﺍﺧﺘﺮﺍﻕ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﳍﺎ ﻣﻦ ﺧﻼﻝ ﺍﻛﺘﺸﺎﻓﻪ‬
‫ﻟﻔﺠﻮﺍ‪‬ﺎ ﺍﻷﻣﻨﻴﺔ‪ ،‬ﻓﻴﻌﻤﻞ ﻋﻠﻰ ﺍﺳﺘﻐﻼﳍﺎ ﻭﺑﺮﳎﺘﻬﺎ ﻟﺘﺤﻮﻳﻞ ﻣﺒﺎﻟﻎ ﻣﺎﻟﻴﺔ ﳊﺴﺎﺑﻪ ﺃﻭ ﳊﺴﺎﺏ ﺷﺮﻛﺎﺋﻪ ﺃﻭ‬
‫ﳊﺴﺎﺏ ﻣﻦ ﻳﻌﻤﻞ ﳊﺴﺎ‪‬ﻢ ﺇﻥ ﻛﺎﻥ ﻣﻦ ﺧﺎﺭﺝ ﺍﳌﺆﺳﺴﺔ‪ ،‬ﻛﻤﺎ ﳝﻜﻦ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﳌﻜﺎﺳﺐ ﺍﳌﺎﺩﻳﺔ‬
‫ﻣﻦ ﺧﻼﻝ ﺍﳌﺴﺎﻭﻣﺔ ﻋﻠﻰ ﺍﻟﱪﺍﻣﺞ ﺃﻭ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺘﺤﺼﻞ ﻋﻠﻴﻬﺎ ﺑﻄﺮﻳﻖ ﺍﻹﺧﺘﻼﺱ ﻣﻦ ﺟﻬﺎﺯ‬
‫ﺍﳊﺎﺳﻮﺏ‪ ،‬ﻭﻟﻘﺪ ﺃﺷﺎﺭﺕ ﰲ ﻫﺬﺍ ﺍﻹﻃﺎﺭ ﳎﻠﺔ )‪ (Securite informatique‬ﻭﻫﻲ ﳎﻠﺔ ﻣﺘﺨﺼﺼﺔ ﰲ‬
‫ﺍﻷﻣﻦ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺃﻥ‪ %43‬ﻣﻦ ﺣﺎﻻﺕ ﺍﻟﻐﺶ ﺍﳌﻌﻠﻦ ﻋﻨﻬﺎ ﻗﺪ ﲤﺖ ﻣﻦ ﺃﺟﻞ ﺇﺧﺘﻼﺱ ﺃﻣﻮﺍﻝ‪،‬ﻭ‪ %23‬ﻣﻦ‬
‫ﺃﺟﻞ ﺳﺮﻗﺔ ﻣﻌﻠﻮﻣﺎﺕ ﻭ‪ %19‬ﺃﻓﻌﺎﻝ ﺇﺗﻼﻑ ﻭ ‪%15‬ﺍﻹﺳﺘﻌﻤﺎﻝ ﻏﲑ ﺍﳌﺸﺮﻭﻉ ﻟﻠﺤﺎﺳﻮﺏ ﻷﺟﻞ ﲢﻘﻴﻖ‬
‫) ‪(1‬‬
‫ﻣﻨﺎﻓﻊ ﺷﺨﺼﻴﺔ‬

‫ﻭﰲ ﺣﻘﻴﻘﺔ ﺍﻷﻣﺮ ﺃﻧﻪ ﰲ ﺣﺎﻝ ﳒﺎﺡ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﰲ ﺍﺭﺗﻜﺎﺏ ﺟﺮﳝﺘﻪ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻓﺈﻥ ﺫﻟﻚ‬
‫ﻳﺪﺭ ﻋﻠﻴﻪ ﺃﺭﺑﺎﺣﺎ ﻛﺒﲑﺓ ﰲ ﺯﻣﻦ ﻗﻴﺎﺳﻲ‪ ،‬ﻭﳝﻜﻦ ﺃﻥ ﻧﻮﺿﺢ ﻣﺪﻯ ﺍﻷﺭﺑﺎﺡ ﺍﳌﺎﺩﻳﺔ ﺍﻟﱵ ﳛﻘﻘﻬﺎ ﺍ‪‬ﺮﻡ‬
‫ﻧﺘﻴﺠﺔ ﺍﻗﺘﺮﺍﻓﻪ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﻣﻦ ﺧﻼﻝ ﺃﺣﺪﺙ ﺧﻼﺻﺔ ﻹﺣﺪﻯ ﺍﻟﺪﺭﺍﺳﺎﺕ ﺍﻟﻮﺍﺭﺩﺓ ﺑﺎﻟﺘﻘﺮﻳﺮ‬
‫ﺍﻟﺴﺎﺩﺱ ﳌﻌﻬﺪ ﺃﻣﻦ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺣﻮﻝ ﺟﺮﺍﺋﻢ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ‪ ،‬ﺃﻳﻦ ﺃﺟﺮﻳﺖ ﻫﺬﻩ ﺍﻟﺪﺭﺍﺳﺔ ﲟﺸﺎﺭﻛﺔ ‪538‬‬
‫ﻣﺆﺳﺴﺔ ﺃﻣﺮﻳﻜﻴﺔ ﺗﻀﻢ ﻭﻛﺎﻻﺕ ﺣﻜﻮﻣﻴﺔ ﻭﺑﻨﻮﻙ ﻭﻣﺆﺳﺴﺎﺕ ﻣﺎﻟﻴﺔ ﻭﻣﺆﺳﺴﺎﺕ ﺻﺤﻴﺔ ﻭﺟﺎﻣﻌﺎﺕ‬
‫ﻭﺍﻟﱵ ﺃﻇﻬﺮﺕ ﺣﺠﻢ ﺍﳋﺴﺎﺋﺮ ﺍﻟﻨﺎﲨﺔ ﻋﻦ ﺟﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻓﻘﺪ ﺗﺒﲔ ﺃﻥ ‪ %85‬ﻣﻦ ﺍﳌﺸﺎﺭﻛﲔ ﰲ‬
‫ﺍﻟﺪﺭﺍﺳﺔ ﺗﻌﺮﺿﻮﺍ ﻻﺧﺘﺮﺍﻗﺎﺕ ﻟﻸﻧﻈﻤﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺃﻥ ‪ %64‬ﳊﻘﺖ ‪‬ﻢ ﺧﺴﺎﺋﺮ ﻣﺎﺩﻳﺔ ﺟﺮﺍﺀ ﻫﺬﻩ‬
‫ﺍﻻﻋﺘﺪﺍﺀﺍﺕ)‪.(2‬‬

‫‪ /2‬ﺍﻟﺪﻭﺍﻓــﻊ ﺍﻟﺬﻫـﻨﻴﺔ )ﺍﳌﺘﻌﺔ ﻭﺍﻟﺘﺤﺪﻱ ﻭﺍﻟﺮﻏﺒﺔ ﰲ ﻓﻬﻢ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻭﺇﺛﺒﺎﺕ‬


‫ﺍﻟﺬﺍﺕ(‪ :‬ﻗﺪ ﺗﻜﻮﻥ ﺍﻟﺪﻭﺍﻓﻊ ﻻﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﳎﺮﺩ ﺍﻟﺸﻐﻒ ﺑﺎﻹﻟﻜﺘﺮﻭﻧﻴﺎﺕ ﻭﺍﻟﺮﻏﺒﺔ ﰲ‬
‫ﲢﺪﻱ ﻭﻗﻬﺮ ﺍﻟﻨﻈﺎﻡ ﻭﺍﻟﺘﻔﻮﻕ ﻋﻠﻰ ﺗﻌﻘﻴﺪ ﻭﺳﺎﺋﻞ ﺍﻟﺘﻘﻨﻴﺔ‪ ،‬ﻓﺎﺧﺘﺮﺍﻕ ﺍﻷﻧﻈﻤﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﻛﺴﺮ‬
‫ﺍﳊﻮﺍﺟﺰ ﺍﻷﻣﻨﻴﺔ ﺍﶈﻴﻄﺔ ‪‬ﺬﻩ ﺍﻷﻧﻈﻤﺔ ﻗﺪ ﻳﺸﻜﻞ ﻣﺘﻌﺔ ﻛﺒﲑﺓ ﳌﺮﺗﻜﺒﻴﻬﺎ ﻭﺗﺴﻠﻴﺔ ﺗﻐﻄﻲ ﺃﻭﻗﺎﺕ ﻓﺮﺍﻏﻪ‪.‬‬

‫)‪ (1‬ﻼ ﻋﺒﺪ ﺍﻟﻘﺎﺩﺭ ﺍﳌﻮﻣﲏ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ ‪.90‬‬


‫)‪ (2‬ﻭﺿﺎﺡ ﳏﻤﻮﺩ ﺍﳊﻤﻮﺩ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ ﺹ ‪.31‬‬

‫‪- 61 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻭﻋﻠﻰ ﺻﻌﻴﺪ ﺁﺧﺮ ﻗﺪ ﻳﻜﻮﻥ ﺇﻗﺪﺍﻡ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻋﻠﻰ ﺍﺭﺗﻜﺎﺏ ﺟﺮﳝﺘﻪ ﺑﺪﺍﻓﻊ ﺍﻟﺮﻏﺒﺔ ﰲ ﻗﻬﺮ‬
‫ﺍﻷﻧﻈﻤﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﺍﻟﺘﻐﻠﺐ ﻋﻠﻴﻬﺎ‪ ،‬ﺇﺫ ﳝﻴﻞ ﺍ‪‬ﺮﻡ ﻫﻨﺎ ﺇﱃ ﺇﻇﻬﺎﺭ ﺗﻔﻮﻗﻪ ﻋﻠﻰ ﻭﺳﺎﺋﻞ ﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎ‬
‫ﺍﳊﺪﻳﺜﺔ ﻭﰲ ﺍﻟﻐﺎﻟﺐ ﻻ ﺗﻜﻮﻥ ﻟﺪﻳﻬﻢ ﺩﻭﺍﻓﻊ ﺣﺎﻗﺪﺓ ﺃﻭ ﲣﺮﻳﺒﻴﺔ ﻭﺇﳕﺎ ﻳﻨﻄﻠﻖ ﻣﻦ ﺩﺍﻓﻊ ﺍﻟﺘﺤﺪﻱ ﻭﺇﺛﺒﺎﺕ‬
‫) ‪(1‬‬
‫ﺍﳌﻘﺪﺭﺓ‪.‬‬

‫ﺛﺎﻧﻴﺎ‪ :‬ﺍﻟﺪﻭﺍﻓﻊ ﺍﳋﺎﺭﺟﻴﺔ‪ :‬ﻗﺪ ﻳﺘﺄﺛﺮ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺑﺒﻌﺾ ﺍﳌﻮﺍﻗﻒ ﻗﺪ ﺗﻜﻮﻥ ﺩﺍﻓﻌﺔ ﻟﻪ ﻋﻠﻰ‬
‫ﺍﻗﺘﺮﺍﻑ ﺍﻹﺟﺮﺍﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻭﻻ ﻳﺴﻌﻰ ﰲ ﺫﻟﻚ ﺣﻴﻨﻬﺎ ﻻ ﻟﻠﻤﺘﻌﺔ ﻭﺍﻟﺘﺴﻠﻴﺔ ﻭﻻ ﻟﻜﺴﺐ ﺍﳌﺎﻝ‪ ،‬ﻭﳝﻜﻦ‬
‫ﺃﺑﺮﺍﺯ ﺃﻫﻢ ﻫﺬﻩ ﺍﻟﺪﻭﺍﻓﻊ ﻓﻴﻤﺎ ﻳﻠﻲ‪:‬‬

‫‪ /1‬ﺩﺍﻓﻊ ﺍﻹﻧﺘﻘﺎﻡ‪ :‬ﻳﻌﺪ ﻫﺬﺍ ﺍﻟﺪﺍﻓﻊ ﻣﻦ ﺃﺧﻄﺮ ﺍﻟﺪﻭﺍﻓﻊ ﺍﻟﱵ ﳝﻜﻦ ﺃﻥ ﺗﺪﻓﻊ ﺍﻟﺸﺨﺺ ﺇﱃ‬
‫ﺍﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ‪ ،‬ﺫﻟﻚ ﺃﻧﻪ ﻏﺎﻟﺒﺎ ﻣﺎ ﻳﺼﺪﺭ ﻋﻦ ﺷﺨﺺ ﳝﻠﻚ ﻣﻌﻠﻮﻣﺎﺕ ﻛﺒﲑﺓ ﻋﻦ ﺍﳌﺆﺳﺴﺔ ﺃﻭ‬
‫ﺍﻟﺸﺮﻛﺔ ﺍﻟﱵ ﻳﻌﻤﻞ ‪‬ﺎ ﻭﻏﺎﻟﺒﺎ ﻣﺎ ﻳﻜﻮﻥ ﻫﺬﺍ ﺍﻟﺪﺍﻓﻊ ﻷﺳﺒﺎﺏ ﺗﺘﻌﻠﻖ ﺑﺎﳊﻴﺎﺓ ﺍﳌﻬﻨﻴﺔ‪ ،‬ﻭﻣﻦ ﺫﻟﻚ ﺍﻟﺸﻌﻮﺭ‬
‫ﺑﺎﳊﺮﻣﺎﻥ ﻣﻦ ﺑﻌﺾ ﺍﳊﻘﻮﻕ ﺍﳌﻬﻨﻴﺔ ﺃﻭ ﺍﻟﻄﺮﺩ ﻣﻦ ﺍﻟﻮﻇﻴﻔﺔ‪ ،‬ﻓﻴﺘﻮﻟﺪ ﻟﺪﻯ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺍﻟﺮﻏﺒﺔ ﰲ‬
‫ﺍﻹﻧﺘﻘﺎﻡ ﻣﻦ ﺭﺏ ﺍﻟﻌﻤﻞ‪ ،‬ﻭﻣﺜﺎﻝ ﺫﻟﻚ ﻓﻘﺪ ﺩﻓﻊ ﺍﻹﻧﺘﻘﺎﻡ ﲟﺤﺎﺳﺐ ﺇﱃ ﺍﻟﺘﻼﻋﺐ ﺑﺎﻟﱪﺍﻣﺞ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﲝﻴﺚ ﺟﻌﻞ ﻫﺬﻩ ﺍﻟﱪﺍﻣﺞ ﺗﻌﻤﻞ ﻋﻠﻰ ﺇﺧﻔﺎﺀ ﻛﻞ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﳊﺴﺎﺑﻴﺔ ﺍﳋﺎﺻﺔ ﺑﺪﻳﻮﻥ ﺍﻟﺸﺮﻛﺔ ﺍﻟﱵ ﻳﻌﻤﻞ‬
‫) ‪(2‬‬
‫ﻓﻴﻬﺎ ﺑﻌﺪ ﺭﺣﻴﻠﻪ ﺑـ ‪ 06‬ﺃﺷﻬﺮ ﻭﻗﺪ ﲢﻘﻖ ﻫﺬﺍ ﺍﻷﻣﺮ ﰲ ﺍﻟﺘﺎﺭﻳﺦ ﺍﶈﺪﺩ ﻣﻦ ﻃﺮﻓﻪ‪.‬‬

‫‪ /2‬ﺩﺍﻓﻊ ﺍﻟﺘﻌﺎﻭﻥ ﻭﺍﻟﺘﻮﺍﻃﺆ‪ :‬ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻛﺜﲑ ﺍﻟﺘﻜﺮﺍﺭ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻏﺎﻟﺒﺎ ﻣﺎ ﳛﺪﺙ‬
‫ﻣﻦ ﻣﺘﺨﺼﺺ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻳﻦ ﻳﻘﻮﻡ ﺑﺎﳉﺎﻧﺐ ﺍﻟﻔﲏ ﻣﻦ ﺍﳌﺸﺮﻭﻉ ﺍﻹﺟﺮﺍﻣﻲ ﻭﺁﺧﺮ ﻣﻦ‬
‫ﺍﶈﻴﻂ ﺃﻭ ﺧﺎﺭﺝ ﺍﳌﺆﺳﺴﺔ ﺍ‪‬ﲏ ﻋﻠﻴﻬﺎ ﻳﻘﻮﻡ ﺑﺘﻐﻄﻴﺔ ﻋﻤﻠﻴﺎﺕ ﺍﻟﺘﻼﻋﺐ ﻭﲢﻮﻳﻞ ﺍﳌﻜﺎﺳﺐ ﺍﳌﺎﺩﻳﺔ ﻭﻋﺎﺩﺓ‬
‫) ‪(3‬‬
‫ﻣﺎ ﳝﺎﺭﺳﻮﻥ ﺍﻟﺘﻠﺼﺺ ﻋﻠﻰ ﺍﻷﻧﻈﻤﺔ ﻭﺗﺒﺎﺩﻝ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﺼﻔﺔ ﻣﻨﺘﻈﻤﺔ ﺣﻮﻝ ﺃﻧﺸﻄﺘﻬﻢ‪.‬‬

‫)‪ (1‬ﻭﻣﻦ ﺃﺷﻬﺮ ﺍﻟﻘﻀﺎﻳﺎ ﺍﻟﱵ ﻭﻗﻌﺖ ﰲ ﻣﺜﻞ ﻫﺬﻩ ﺍﳊﺎﻟﺔ ﻗﻀﻴﺔ ﻛﺎﻥ ﻗﺪ ﺗﻌﺎﻣﻞ ﻣﻌﻬﺎ ﻣﻜﺘﺐ ﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﺍﻟﻔﺪﺭﺍﱄ ﺃﻃﻠﻖ ﻋﻠﻴﻬﺎ ﺍﺳﻢ ﳎﻤﻮﻋﺔ ﺍﳉﺤﻴﻢ ﺍﻟﻌﺎﳌﻲ‬
‫)‪ (Global Hell‬ﺗﺘﻠﺨﺺ ﰲ ﲤﻜﻦ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻷﺷﺨﺎﺹ ﻣﻦ ﺍﺧﺘﺮﺍﻕ ﻣﻮﺍﻗﻊ ﺍﻟﺒﻴﺖ ﺍﻷﺑﻴﺾ ﻭﺍﻟﺸﺮﻃﺔ ﺍﻟﻔﺪﺭﺍﻟﻴﺔ ﺍﻷﻣﺮﻳﻜﻴﺔ ﻭﺍﳉﻴﺶ ﺍﻷﻣﺮﻳﻜﻲ‬
‫ﻭﻭﺯﺍﺭﺓ ﺍﻟﺪﺍﺧﻠﻴﺔ ﺍﻷﻣﺮﻳﻜﻴﺔ ﻭﻗﺪ ﻇﻬﺮ ﻣﻦ ﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﺃﻥ ﻫﺬﻩ ﺍ‪‬ﻤﻮﻋﺔ ‪‬ﺪﻑ ﺇﱃ ﳎﺮﺩ ﺍﻻﺧﺘﺮﺍﻕ ﺃﻛﺜﺮ ﻣﻦ ﺍﻟﺘﺪﻣﲑ ﺃﻭ ﺍﻟﺘﻘﺎﻁ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳊﺴﺎﺳﺔ‪ .‬ﻣﺸﺎﺭ‬
‫ﺇﱃ ﻫﺬﻩ ﺍﻟﻘﻀﻴﺔ ﻟﺪﻯ ﺭﺷﻴﺪﺓ ﺑﻮﻛﺮ ‪/‬ﻣﺮﺟﻊ ﺳﺎﺑﻖ‪،‬ﺹ‪95‬‬
‫)‪ (2‬ﺳﺎﻣﻲ ﺍﻟﺸﻮﺍ‪ .‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ ‪52‬‬
‫)‪ (3‬ﺃﲪﺪ ﺧﻠﻴﻔﺔ ﺍﻟﻠﻂ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ ‪.90‬‬

‫‪- 62 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻭﺇﺫﺍ ﻛﺎﻧﺖ ﻫﺬﻩ ﺃﺑﺮﺯ ﺍﻟﺪﻭﺍﻓﻊ ﻻﺭﺗﻜﺎﺏ ﺃﻧﺸﻄﺔ ﺍﻹﻋﺘﺪﺍﺀ ﻋﻠﻰ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ‪ ،‬ﻭﻣﻊ ﺫﻟﻚ‬
‫ﻓﻬﻲ ﻟﻴﺴﺖ ﺛﺎﺑﺘﺔ ﻭﻣﻌﺘﻤﺪﺓ ﻟﺪﻯ ﺍﻟﻔﻘﻬﺎﺀ ﻭﺍﻟﺒﺎﺣﺜﲔ ﻷﻥ ﺍﻟﺴﻠﻮﻙ ﺍﻹﺟﺮﺍﻣﻲ ﻭﺍﻟﺪﻭﺍﻓﻊ ﻻﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ‬
‫ﻗﺪ ﺗﺘﻐﲑ ﻭﺗﺘﺤﻮﻝ ﺑﺴﺮﻋﺔ ﻣﻦ ﺣﺎﻟﺔ ﺍﻟﻌﺒﺚ ﻭﳏﺎﻭﻟﺔ ﺍﻟﺘﺤﺪﻱ ﻭﺍﻟﺘﻐﻠﺐ ﻋﻠﻰ ﺍﻷﻧﻈﻤﺔ ﺇﱃ ﺗﺪﻣﲑﻫﺎ ﺃﻭ‬
‫ﻋﻠﻰ ﺍﻷﻗﻞ ﺣﻴﺎﺯ‪‬ﺎ ﻟﻠﻘﻴﺎﻡ ﺑﻌﻤﻠﻴﺔ ﺍﻹﺑﺘﺰﺍﺯ ﻭﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻷﻣﻮﺍﻝ ﻟﺬﻟﻚ ﻓﺈﻥ ﺍﻟﺪﻭﺍﻓﻊ ﰲ ﺍﺭﺗﻜﺎﺏ‬
‫ﺟﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻗﺪ ﻻ ﻳﺘﻮﻗﻒ ﻋﻨﺪ ﻫﺬﺍ ﺍﳊﺪ‪ ،‬ﺇﺫ ﳒﺪ ﰲ ﻛﻞ ﺟﺮﳝﺔ ﺟﺪﻳﺪﺓ ﺩﻭﺍﻓﻊ ﺟﺪﻳﺪﺓﺑﻞ ﻛﺜﲑﺍ‬
‫ﻣﺎ ﳒﺪ ﺍﳉﺮﳝﺔ ﺍﻟﻮﺍﺣﺪﺓ ﳍﺎ ﺩﻭﺍﻓﻊ ﻣﺘﻌﺪﺩﺓ ﺧﺎﺻﺔ ﻣﺎ ﺇﺫﺍ ﺍﺷﺘﺮﻙ ﻓﻴﻬﺎ ﺃﻛﺜﺮ ﻣﻦ ﺷﺨﺺ ﺃﻭ ﺃﻛﺜﺮ ﻣﻦ‬
‫ﺟﻬﺔ ﲝﻴﺚ ﻳﺴﻌﻰ ﻛﻞ ﻣﻨﻬﻢ ﻟﺘﺤﻘﻴﻖ ﻣﺂﺭﺑﻪ ﺍﳋﺎﺻﺔ)‪.(1‬‬

‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﻟﺚ‪ :‬ﺍ‪‬ـﲏ ﻋﻠﻴﻪ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬

‫ﺇﻥ ﻣﻦ ﻧﺘﺎﺋﺞ ﺛﻮﺭﺓ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻧﺘﺸﺎﺭ ﺍﻟﻮﺳﺎﺋﻞ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﲨﻴﻊ ﺍﻷﻧﺸﻄﺔ ﺍﻟﱵ ﺗﺰﺍﻭﻝ ﰲ‬
‫ﺍ‪‬ﺘﻤﻌﺎﺕ ﺍﳊﺪﻳﺜﺔ‪(2) ،‬ﺇﺫ ﺃﺻﺒﺤﺖ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﻟﻮﺍﺯﻡ ﺍﳊﻴﺎﺓ ﺍﳌﺘﻄﻮﺭﺓ ﺗﻌﺘﻤﺪ ﻋﻠﻴﻬﺎ ﺍﳌﺆﺳﺴﺎﺕ‬
‫ﺍﳊﻜﻮﻣﻴﺔ ﺃﻭ ﺍﳋﺎﺻﺔ ﰲ ﺗﺴﻴﲑ ﺃﻋﻤﺎﳍﺎ ﺑﺸﻜﻞ ﺃﺳﺎﺳﻲ ﻭﺃﺻﺒﺤﺖ ﻧﺘﻴﺠﺔ ﻟﺬﻟﻚ ﻣﺴﺘﻮﺩﻋﺎﹰ ﻷﺳﺮﺍﺭﻫﺎ‪،‬‬
‫ﻭﳌﺎ ﻛﺎﻧﺖ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﻘﻮﻡ ﺃﺳﺎﺳﺎ ﻧﺘﻴﺠﺔ ﺍﻻﻋﺘﺪﺍﺀ ﻋﻠﻰ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻓﺈﻥ ﺫﻟﻚ ﺃﺩﻯ ﺇﱃ ﺗﻨﻮﻉ‬
‫ﻭﺗﻌﺪﺩ ﻓﺌﺎﺕ ﺍﳌﺘﻀﺮﺭﻳﻦ ﻣﻦ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﺟﻬﺔ ﻭﺍﺯﺩﻳﺎﺩ ﺣﺠﻢ ﺍﻷﺿﺮﺍﺭ ﺍﳌﺎﻟﻴﺔ ﺍﻟﱵ‬
‫ﲣﻠﻔﻬﺎ)‪(3‬ﻣﻦ ﺟﻬﺔ ﺃﺧﺮﻯ‪.‬‬

‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺍﻟﻀﺤﻴﺔ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬‬

‫ﻟﻘﺪ ﺣﺪﺩﺍﻹﻋﻼﻥ ﺍﻟﻌﺎﳌﻲ ﺍﳋﺎﺻﺒﺎﳌﺒﺎﺩﺉ ﺍﻷﺳﺎﺳﻴﺔ ﻟﺘﻮﻓﲑ ﺍﻟﻌﺪﺍﻟﺔ ﻟﻀﺤﺎﻳﺎ ﺍﳉﺮﳝﺔ ﻭﺇﺳﺎﺀﺓ‬
‫ﺍﺳﺘﻌﻤﺎﻝ ﺍﻟﺴﻠﻄﺔ ﺍﻟﺬﻱ ﺍﻋﺘﻤﺪﺗﻪ ﺍﳉﻤﻌﻴﺔ ﺍﻟﻌﺎﻣﺔ ﻟﻸﻣﻢ ﺍﳌﺘﺤﺪﺓ ﺑﻘﺮﺍﺭﻫﺎ ﺭﻗﻢ ‪ 401434‬ﺍﻟﺼﺎﺩﺭ ﺑﺘﺎﺭﻳﺦ‬
‫‪ 85/11/29‬ﻣﺼﻄﻠﺢ ﺍﻟﻀﺤﻴﺔ ﻭﺍﻟﺬﻱ ﺟﺎﺀ ﺷﺎﻣﻼ ﻟﻜﻞ ﻣﻦ ﺍ‪‬ﲏ ﻋﻠﻴﻪ ﻭﺍﳌﺘﻀﺮﺭ ﻣﻦ ﺍﳉﺮﳝﺔ‪.‬‬

‫)‪ (1‬ﺭﺷﻴﺪﺓ ﺑﻮﻛﺮ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ ‪.96‬‬


‫)‪ (2‬ﳏﻤﺪ ﻋﻠﻲ ﺍﻟﻌﺮﻳﺎﻥ‪،‬ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ .‬ﺩﺍﺭ ﺍﳉﺎﻣﻌﺔ ﺍﳉﺪﻳﺪﺓ ﻟﻠﻨﺸﺮ‪.2004‬ﺹ ‪.67‬‬
‫)‪ (3‬ﰲ ﻣﻨﺎﺳﺒﺔ ﻣﻨﺎﻗﺸﺔ ﳎﻠﺲ ﺍﻟﻨﻮﺍﺏ ﺍﻷﻣﺮﻳﻜﻲ ﻋﻠﻰ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﺬﻱ ﻳﺴﻤﺢ ﺑﺘﻄﺒﻴﻖ ﺍﻟﺴﺠﻦ ﻣﺪﻯ ﺍﳊﻴﺎﺓ ﳌﺮﺗﻜﱯ ﺟﺮﺍﺋﻢ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﺸﺮﻳﺮﺓ ﺃﺩﱃ‬
‫ﺭﺋﻴﺲ ﺍﻟﻠﺠﻨﺔ ﺍﻟﻔﺮﻋﻴﺔ ﺍﳌﺴﺆﻭﻟﺔ ﻋﻦ ﺍﳉﺮﳝﺔ ﰲ ﺍﻟﻜﻮﻧﻐﺮﺱ ﺍﻷﻣﺮﻳﻜﻲ ﻻﻣﺎﺭﲰﻴﺖ ﺑﺘﺼﺮﻳﺢ ﻟﻠﺘﺪﻟﻴﻞ ﻋﻠﻰ ﺍﳋﺴﺎﺋﺮ ﺍﻻﻗﺘﺼﺎﺩﻳﺔ ﺍﻟﱵ ﺗﻠﺤﻖ ﺍﻟﻮ ﻡ ﺃ ﻣﻦ ﺟﺮﺍﺀ‬
‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻗﺎﺋﻼ‪ " :‬ﻣﺎﱂ ﻧﺴﺘﻄﻊ ﺗﺄﻣﲔ ﺑﻨﻴﺘﻨﺎ ﺍﻟﺘﺤﺘﻴﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻓﺈﻥ ﻛﻞ ﻣﺎ ﳛﺘﺎﺟﻪ ﺍ‪‬ﺮﻡ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻟﺘﻌﻄﻴﻞ ﺍﻗﺘﺼﺎﺩﻧﺎ‪ .‬ﻫﻮ ﻧﻘﺮﺓ ﺑﺴﻴﻄﺔ ﻋﻠﻰ‬
‫ﺍﳉﻬﺎﺯ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻹﺗﺼﺎﻝ ﻋﻦ ﻃﺮﻳﻖ ﺍﻹﻧﺘﺮﻧﺖ"‪.‬‬

‫‪- 63 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻓﻮﻓﻘﺎ ﳍﺬﺍ ﺍﻹﻋﻼﻥ ﺍﳌﺸﺎﺭ ﺇﻟﻴﻪ ﻳﻘﺼﺪ ﺑﺎﻟﻀﺤﻴﺔ ﺍﻷﺷﺨﺎﺹ ﺍﻟﺬﻳﻦ ﺃﺻﻴﺒﻮﺍ ﺑﻀﺮﺭ ﻓﺮﺩﻱ ﺃﻭ‬
‫ﲨﺎﻋﻲ ﲟﺎ ﰲ ﺫﻟﻚ ﺍﻟﻀﺮﺭ ﺍﻟﺒﺪﱐ ﺃﻭ ﺍﻟﻌﻘﻠﻲ ﺃﻭ ﺍﳌﻌﺎﻧﺎﺓ ﺍﻟﻨﻔﺴﻴﺔ ﺃﻭ ﺍﳋﺴﺎﺭﺓ ﺍﻻﻗﺘﺼﺎﺩﻳﺔ ﺃﻭ ﺍﳊﺮﻣﺎﻥ‬
‫ﺑﺪﺭﺟﺔ ﻛﺒﲑﺓ ﻣﻦ ﺍﻟﺘﻤﺘﻊ ﲝﻘﻮﻗﻬﻢ ﺍﻷﺳﺎﺳﻴﺔ‪ ،‬ﻋﻦ ﻃﺮﻳﻖ ﺃﻓﻌﺎﻝ ﺃﻭ ﺣﺎﻻﺕ ﺇﳘﺎﻝ ﺗﺸﻜﻞ ﺍﻧﺘﻬﺎﻛﺎ‬
‫ﻟﻠﻘﻮﺍﻧﲔ ﺍﳉﻨﺎﺋﻴﺔ ﺍﻟﻨﺎﻓﺬﺓ ﰲ ﺍﻟﺪﻭﻝ ﲟﺎ ﻓﻴﻬﺎ ﺍﻟﻘﻮﺍﻧﲔ ﺍﻟﱵ ﲢﺮﻡ ﺍﻹﺳﺎﺀﺓ ﻻﺳﺘﻌﻤﺎﻝ ﺍﻟﺴﻠﻄﺔ‪ ،‬ﻛﻤﺎ ﻳﺸﻤﻞ‬
‫ﺍﳌﺼﻄﻠﺢ ﺃﻳﻀﺎ ﺣﺴﺐ ﺍﻹﻗﺘﻀﺎﺀ ﺍﻟﻌﺎﺋﻠﺔ ﺍﳌﺒﺎﺷﺮﺓ ﻟﻠﻀﺤﻴﺔ ﺍﻷﺻﻠﻴﺔ ﺃﻭ ﻓﺎﻋﻠﻴﻬﺎ ﺍﳌﺒﺎﺷﺮﻳﻦ ﻭﺍﻷﺷﺨﺎﺹ‬
‫ﺍﻟﺬﻳﻦ ﺃﺻﻴﺒﻮﺍ ﺑﻀﺮﺭ ﻣﻦ ﺟﺮﺍﺀ ﺍﻟﺘﺪﺧﻞ ﳌﺴﺎﻋﺪﺓ ﺍﻟﻀﺤﺎﻳﺎ ﰲ ﳏﻨﺘﻬﻢ ﺃﻭ ﳌﻨﻊ ﺍﻹﻳﺬﺍﺀ"‬

‫ﻳ‪‬ﺒﲎ ﻋﻠﻰ ﺫﻟﻚ ﺃﻥ ﺍﻟﻀﺤﻴﺔ ﰲ ﺍﳉﺮﳝﺔ ﺑﺼﻔﺔ ﻋﺎﻣﺔ ﻛﻞ ﺷﺨﺺ ﻃﺒﻴﻌﻲ ﺃﻭ ﻣﻌﻨﻮﻱ ﺃﺻﻴﺐ‬
‫ﲞﺴﺎﺭﺓ ﺃﻭ ﺿﺮﺭ ﺃﻭ ﺑﻌﺪﻭﺍﻥ ﻧﺘﻴﺠﺔ ﺍﺭﺗﻜﺎﺏ ﺟﺮﳝﺔ ﺳﻮﺍﺀ ﺑﻔﻌﻞ ﺃﻭ ﺑﺎﻻﻣﺘﻨﺎﻉ ﻋﻦ ﻓﻌﻞ‪.‬ﺃﻣﺎ ﺍﳌﻘﺼﻮﺩ‬
‫ﺑﺎﻟﻀﺤﻴﺔ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻫﻮ ﻛﻞ ﺷﺨﺺ ﺃﺻﺎﺑﻪ ﺿﺮﺭ ﻣﺎﺩﻱ ﺃﻭ ﻣﻌﻨﻮﻱ ﻧﺘﻴﺠﺔ ﺍﻹﺳﺘﺨﺪﺍﻡ ﻏﲑ‬
‫ﺍﳌﺸﺮﻭﻉ ﻟﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﻭﻗﺪ ﻳﻜﻮﻥ ﺷﺨﺼﺎ ﻋﺎﻣﺎ ﳑﺜﻼ ﰲ ﻣﺆﺳﺴﺎﺕ ﺍﻟﺪﻭﻟﺔ ﻭﻫﻴﺂ‪‬ﺎ ﻭﻗﺪ ﻳﻜﻮﻥ‬
‫ﺧﺎﺻﺎ ﳑﺜﻼ ﰲ ﺍﻷﺷﺨﺎﺹ ﺍﻟﻄﺒﻴﻌﻴﺔ ﺃﻭ ﺍﳌﻌﻨﻮﻳﺔ‪ ،‬ﻭﲝﺴﺐ ﺫﻟﻚ ﻓﺈﻥ ﺍﻟﻀﺤﺎﻳﺎ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﳜﺘﻠﻔﻮﻥ ﻋﻦ ﺍﻟﻀﺤﺎﻳﺎ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻣﻦ ﳎﺮﺩ ﻛﻮ‪‬ﻢ ﺃﺷﺨﺎﺻﺎ ﻋﺎﺩﻳﺔ ﺇﱃ ﻣﺆﺳﺴﺎﺕ ﻣﺎﻟﻴﺔ ﺃﻭ‬
‫ﻋﺴﻜﺮﻳﺔ ﺃﻭ ﻗﻄﺎﻋﺎﺕ ﺣﻜﻮﻣﻴﺔ ﻛﺎﻥ ﺍ‪‬ﺮﻡ ﺍﻟﺘﻘﻠﻴﺪﻱ ﻻ ﻳﺴﺘﻄﻴﻊ ﺍﺭﺗﻜﺎﺏ ﺃﻱ ﺟﺮﺍﺋﻢ ﻓﻴﻬﺎ ﺃﻭ ﰲ‬
‫ﻣﻮﺍﺟﻬﺘﻬﺎ‪.‬‬

‫ﻓﻨﻈﺮﺍ ﻟﻄﺒﻴﻌﺔ ﺍﺳﺘﺨﺪﺍﻡ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﰲ ﲨﻴﻊ ﺍﳌﻌﺎﻣﻼﺕ ﺍﻹﻗﺘﺼﺎﺩﻳﺔ ﻭﺍﳌﺎﻟﻴﺔ ﺍﻟﻮﻃﻨﻴﺔ ﻭﺍﻟﺪﻭﻟﻴﺔ‬
‫ﻭﺍﻹﻋﺘﻤﺎﺩ ﻋﻠﻴﻬﺎ ﰲ ﺗﺴﻴﲑ ﺷﺆﻭﻥ ﺍﳊﻴﺎﺓ ﺍﻟﻴﻮﻣﻴﺔ ﺑﺎﻟﻨﺴﺒﺔ ﻟﻸﻓﺮﺍﺩ ﻭﺍﻟﺸﺆﻭﻥ ﺍﻟﻌﺎﻣﺔ ﺑﺎﻟﻨﺴﺒﺔ ﻟﻠﺤﻜﻮﻣﺎﺕ‬
‫ﻛﺎﻥ ﻣﻦ ﺷﺄﻥ ﺫﻟﻚ ﺃﻥ ﻳﻀﻔﻲ ﺃﺑﻌﺎﺩﺍ ﻏﲑ ﻣﺴﺒﻮﻗﺔ ﰲ ﺗﻮﺳﻊ ﺩﺍﺋﺮﺓ ﺍﳌﺘﻀﺮﺭﻳﻦ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﻭﺗﻌﺪﺩ ﻓﺌﺎ‪‬ﻢ‪.‬‬

‫ﻭﻳﻼﺣﻆ ﺃﻧﻪ ﻣﻦ ﺍﻟﺼﻌﻮﺑﺔ ﲟﺎ ﻛﺎﻥ ﺗﻘﺪﻳﺮ ﺣﺠﻢ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﺘﺤﺪﻳﺪ ﺿﺤﺎﻳﺎ ﻫﺬﻩ ﺍﳉﺮﳝﺔ‬
‫ﻋﻠﻰ ﻭﺟﻪ ﺍﻟﺪﻗﺔ‪ ،‬ﻭﺭﲟﺎ ﻳﺮﺟﻊ ﺫﻟﻚ ﺇﱃ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻟﻌﻮﺍﻣﻞ ﻣﻨﻬﺎ ﻣﺎ ﻳﺘﻌﻠﻖ ﺑﺎﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺫﺍ‪‬ﺎ‬
‫ﻭﻣﻨﻬﺎ ﻣﺎ ﻳﺘﻌﻠﻖ ﺑﺎﻟﻀﺤﺎﻳﺎ ﺃﻧﻔﺴﻬﻢ‪ ،‬ﻓﺄﻣﺎ ﺍﻟﻌﻮﺍﻣﻞ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻓﺈﻥ ﺃﳘﻬﺎ ﻫﻮ ﻋﺪﻡ ﻭﺟﻮﺩ‬
‫ﺗﻌﺮﻳﻒ ﳛﻈﻰ ﺑﻘﺒﻮﻝ ﻋﺎﻡ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻫﻮ ﻣﺎ ﻳﻘﻒ ﻋﺎﺋﻘﺎ ﺃﻣﺎﻡ ﺍﻟﺪﺭﺍﺳﺎﺕ ﺍﻹﺣﺼﺎﺋﻴﺔ ﺍﻟﱵ‬
‫‪‬ﺪﻑ ﺇﱃ ﺑﻴﺎﻥ ﺣﺠﻢ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺫﻟﻚ ﺃﻥ ﲢﺪﻳﺪ ﻣﺎ ﻳﻌﺪ ﺟﺮﳝﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﳜﺘﻠﻒ ﻣﻦ ﺩﻭﻟﺔ ﺇﱃ‬
‫ﺃﺧﺮﻯ ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺃﻥ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﺘﻘﻨﻴﺔ ﺍﻟﱵ ﺗﺘﻤﻴﺰ ‪‬ﺎ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺍﻟﱵ ﻳﻮﻓﺮﻫﺎ ﳍﺎ ﺍﳊﺎﺳﺐ ﺍﻵﱄ‬
‫‪- 64 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﲟﺎ ﻳﺘﻤﺘﻊ ﺑﻪ ﻣﻦ ﺳﺮﻋﺔ ﻓﺎﺋﻘﺔ ﻭﻗﺪﺭﺓ ﻋﺎﻟﻴﺔ ﻋﻠﻰ ﺍﻟﺘﺨﺰﻳﻦ ﳚﻌﻞ ﻣﻦ ﺍﻛﺘﺸﺎﻓﻬﺎ ﺃﻣﺮﺍ ﰲ ﻏﺎﻳﺔ ﺍﻟﺼﻌﻮﺑﺔ‬
‫ﻓﻜﺜﲑﺍ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻗﺪ ﰎ ﺍﻛﺘﺸﺎﻓﻬﺎ ﻋﻦ ﻃﺮﻳﻖ ﺍﻟﺼﺪﻓﺔ)‪.(1‬‬

‫ﻭﺃﻣﺎ ﺍﻟﻌﻮﺍﻣﻞ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﻟﻀﺤﺎﻳﺎ ﻓﻴﺘﻤﺜﻞ ﺃﳘﻬﺎ ﰲ ﺇﺣﺠﺎﻡ ﺍ‪‬ﲏ ﻋﻠﻴﻪ ﻋﻦ ﺍﻹﺑﻼﻍ ﻋﻠﻰ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺧﻮﻓﺎ ﻣﻦ ﺍﻟﻔﻀﻴﺤﺔ‪ ،‬ﻭﺍﻟﺴﺒﺐ ﰲ ﺫﻟﻚ ﻫﻮ ﺃﻥ ﺃﻛﺜﺮ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﻘﻊ ﺩﺍﺧﻞ‬
‫ﺍﳌﺆﺳﺴﺎﺕ ﺍﳌﺎﻟﻴﺔ ﻭﺃﻛﺜﺮ ﻣﺎ ﳛﺮﺹ ﻋﻠﻴﻪ ﺍﻟﻘﺎﺋﻤﻮﻥ ﻋﻠﻰ ﻫﺬﻩ ﺍﳌﺆﺳﺴﺎﺕ ﻫﻮ ﺍﻟﺴﻤﻌﺔ ﺍﳌﺎﻟﻴﺔ ﻟﻠﻤﺆﺳﺴﺔ‬
‫ﻭﻟﺬﻟﻚ ﻓﻬﻢ ﻳﻔﻀﻠﻮﻥ ﲢﻤﻞ ﺍﳋﺴﺎﺋﺮ ﺍﻟﱵ ﻗﺪ ﺗﻠﺤﻖ ‪‬ﻢ ﺑﺴﺒﺐ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻋﻠﻰ ﺃﻻ ﻳﻌﺮﻑ ﺍﳌﺘﻌﺎﻣﻠﻮﻥ‬
‫ﻣﻌﻬﻢ ﺑﺄﻥ ﺍﻟﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺍﳌﺆﺳﺴﺔ ﻗﺪ ﰎ ﺍﻟﺘﻼﻋﺐ ‪‬ﺎ ﻧﺘﻴﺠﺔ ﻟﻘﺼﻮﺭ ﻣﺎ‪.‬‬

‫ﻭﻋﻠﻰ ﺍﻟﺮﻏﻢ ﻣﻦ ﻋﺪﻡ ﺩﻗﺔ ﺍﻹﺣﺼﺎﺋﻴﺎﺕ ﺍﻟﱵ ﺗﺘﻌﻠﻖ ﺑﺘﺤﺪﻳﺪ ﺣﺠﻢ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺇﻻ ﺃ‪‬ﺎ‬
‫ﺗﺴﺎﻋﺪ ﰲ ﺇﻋﻄﺎﺀ ﻣﺆﺷﺮ ﻭﺍﺿﺢ ﻋﻦ ﻣﺪﻯ ﺍﺗﺴﺎﻋﺪﺍﺋﺮﺓ ﺍﳌﺘﻀﺮﺭﻳﻦ ﻣﻨﻬﺎ ﻭﺳﻮﻑ ﻧﻘﻮﻡ ﺑﻌﺮﺽ ﺃﻫﻢ‬
‫ﻓﺌﺎﺕ ﺍ‪‬ﲏ ﻋﻠﻴﻬﻢ ﰲ ﳎﺎﻝ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫ﺃﻭﻻ‪ :‬ﺍﳌﺆﺳﺴﺎﺕ ﺍﳌﺎﻟﻴﺔ ﻭﺍﳉﻬﺎﺕ ﺍﳊﻜﻮﻣﻴﺔ‪ :‬ﻳﻨﺠﺬﺏ ﻣﺮﺗﻜﺒﻮﺍ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺇﱃ‬
‫ﺍﻟﻘﻄﺎﻋﺎﺕ ﺍﳌﺎﻟﻴﺔ ﻣﺜﻞ ﺍﻟﺒﻨﻮﻙ ﻭﺍﳌﺆﺳﺴﺎﺕ ﺍﳌﺎﻟﻴﺔ ﻟﺘﻨﻔﻴﺬ ﺃﻓﻌﺎﳍﻢ ﺍﻹﺟﺮﺍﻣﻴﺔ‪ ،‬ﻓﻬﻲ ﻣﻦ ﺃﻛﺜﺮ ﺍﻷﻣﺎﻛﻦ‬
‫ﺍﺳﺘﻬﺪﺍﻓﺎ ﻧﻈﺮﺍ ﳌﺎ ﳍﺎ ﻣﻦ ﺃﻣﻮﺍﻝ‪ ،‬ﻭﻣﻦ ﺃﻫﻢ ﻫﺬﻩ ﺍﳌﺆﺳﺴﺎﺕ ﺍﳌﺎﻟﻴﺔ ﺍﻟﺒﻮﺭﺻﺔ ‪ .‬ﻭﺫﻟﻚ ﺃﻥ ﺃﻱ ﺗﻌﻄﻴﻞ ﰲ‬
‫ﺣﺮﻛﺔ ﺍﻟﺒﻮﺭﺻﺔ ﻳﺆﺛﺮ ﺑﺪﺭﺟﺔ ﻛﺒﲑﺓ ﻋﻠﻰ ﺣﺠﻢ ﺍﻟﺘﻌﺎﻣﻼﺕ ﺍﳌﺎﻟﻴﺔ ﻟﻴﺲ ﻓﻘﻂ ﺑﲔ ﺍﻷﺷﺨﺎﺹ ﺍﻟﻌﺎﺩﻳﲔ‬
‫ﺑﻞ ﻗﺪ ﻳﺼﻞ ﺍﻷﻣﺮ ﺇﱃ ﺍﻟﺘﻌﺎﻣﻼﺕ ﺍﳌﺎﻟﻴﺔ ﺑﲔ ﺍﻟﺪﻭﻝ)‪.(2‬‬

‫ﻭﻗﺪ ﺗﻌﺪﺕ ﺣﺪﻭﺩ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﻘﻄﺎﻋﺎﺕ ﺍﳌﺪﻧﻴﺔ ﺇﱃ ﺍﳌﺴﺎﺱ ﺑﺼﻮﺭﺓ ﺃﻛﱪ ﺇﱃ ﺍﻟﻘﻄﺎﻋﺎﺕ‬
‫ﺍﳋﺎﺻﺔ ﺑﺎﻟﻘﻮﺍﺕ ﺍﳌﺴﻠﺤﺔ ﻧﻈﺮﺍ ﻟﻄﺒﻴﻌﺔ ﻭﺃﳘﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﱵ ﲢﺘﻮﻳﻬﺎ ﺗﻠﻚ ﺍﻟﻘﻄﺎﻋﺎﺕ ﻭﻫﻮ ﻣﺎ ﻳﱪﺯﻩ‬
‫ﺍﻹﻫﺘﻤﺎﻡ ﺍﳌﻨﺼﺐ ﻋﻠﻰ ﺍﳉﺎﺳﻮﺳﻴﺔ ﺍﻟﻌﺴﻜﺮﻳﺔ ﻭﻣﺎ ﺍﺳﺘﺘﺒﻌﻪ ﻣﻦ ﻇﻬﻮﺭ ﺣﺮﺏ ﻣﻦ ﻧﻮﻉ ﺟﺪﻳﺪﺓ ﻭﻫﻲ‬
‫ﺍﳊﺮﺏ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺗﻌﺘﻤﺪ ﺁﻟﻴﺎ‪‬ﺎ ﻋﻠﻰ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﰲ ﻧﻘﻞ ﺍﳌﻌﻮﻣﺎﺕ ﻓﺘﻌﺎﻇﻢ ﺩﻭﺭ ﺍﻟﻨﻈﻢ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﻫﺬﺍ ﺍ‪‬ﺎﻝ ﻧﻈﺮﺍ ﳊﺘﻤﻴﺔ ﻭﺃﳘﻴﺔ ﲣﺰﻳﻦ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﺳﺮﻋﺔ ﻣﻌﺎﳉﺘﻬﺎ ﻭﻋﺮﺿﻬﺎ ﺑﺼﻮﺭﺓ ﻣﻨﺎﺳﺒﺔ‬

‫)‪ (1‬ﻧﺎﺋﻠﺔ ﳏﻤﺪ ﻓﺮﻳﺪ ﻗﻮﺭﺓ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪.‬ﺹ ‪.80‬‬


‫)‪ (2‬ﺧﺎﻟﺪ ﳑﺪﻭﺡ ﺍﺑﺮﺍﻫﻴﻢ‪ .‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ ‪.150‬‬

‫‪- 65 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺃﻣﺎﻡ ﺍﻟﻘﺎﺩﺓ ﻻﲣﺎﺫ ﺍﻟﻘﺮﺍﺭ ﺍﳌﻨﺎﺳﺐ ﻋﻠﻰ ﺃﺳﺎﺱ ﺃﳘﻴﺔ ﺗﻠﻚ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﳑﺎ ﺟﻌﻞ ﺍﻟﺪﻭﻝ ﺗﺒﺎﺩﺭ ﺇﱃ ﺍﻟﻘﻴﺎﻡ‬
‫ﺑﺎﻟﺘﺠﺴﺲ ﻋﻠﻰ ﺍﻟﺪﻭﻝ ﺍﻷﺧﺮﻯ ﻟﻠﺤﺼﻮﻝ ﻣﻨﻬﺎ ﻋﻠﻰ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﱵ ﲡﻌﻠﻬﺎ ﻗﺎﺩﺭﺓ ﻋﻠﻰ ﻣﻮﺍﺟﻬﺘﻬﺎ‪.‬‬

‫ﺛﺎﻧﻴﺎ‪ :‬ﺍﻷﺷﺨﺎﺹ ﺍﻟﻄﺒﻴﻌﻴﻮﻥ‪:‬ﻻ ﻳﻘﺘﺼﺮ ﺗﺼﻨﻴﻒ ﺿﺤﺎﻳﺎ ﺟﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﺍﻟﻘﻄﺎﻋﺎﺕ ﺍﳌﺎﻟﻴﺔ‬
‫ﻭﺍﳍﻴﺌﺎﺕ ﺍﳊﻜﻮﻣﻴﺔ ﻭﺍﳌﺆﺳﺴﺎﺕ ﺍﻟﻌﺴﻜﺮﻳﺔ ﻓﻘﻂ‪ ،‬ﺑﻞ ﻳﺘﻌﺪﻯ ﻛﺬﻟﻚ ﺇﱃ ﺍﻷﺷﺨﺎﺹ ﺍﻟﻄﺒﻴﻌﻴﲔ‪.‬‬
‫ﻓﻜﺜﲑﺍ ﻣﺎ ﺗﻌﺪ ﺷﺒﻜﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ ﺍ‪‬ﺎﻝ ﺍﳋﺼﺐ ﻻﺭﺗﻜﺎﺏ ﺗﻠﻚ ﺍﳉﺮﺍﺋﻢ ﺿﺪﻫﻢ ﺳﻴﻤﺎ ﻣﺎ ﻳﺘﻌﻠﻖ‬
‫ﺑﺎﳌﺴﺎﺱ ﲝﻖ ﺍﳋﺼﻮﺻﻴﺔ ﻭﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻟﺸﺨﺼﻴﺔ ﻟﻸﻓﺮﺍﺩ‪،‬ﻛﻤﺎ ﺗﻌﺘﱪ ﺟﺮﺍﺋﻢ ﺍﻹﺗﻼﻑ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻋﻦ ﻃﺮﻳﻖ‬
‫ﺍﻟﻔﲑﻭﺳﺎﺕ ﻣﻦ ﺃﻛﺜﺮ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﻳﺘﻌﺮﺽ ﳍﺎ ﺍﻷﺷﺨﺎﺹ ﺍﻟﻄﺒﻴﻌﻴﻮﻥ ﻋﱪ ﺑﺮﻳﺪﻫﻢ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻭﺍﻟﺬﻱ‬
‫ﻳﻌﺘﱪ ﻣﻦ ﺃﻫﻢ ﺍﻟﺒﻮﺍﺑﺎﺕ ﺍﻟﱵ ﻳﻘﻔﺰ ﻣﻨﻬﺎ ﺍﻟﻘﺮﺍﺻﻨﺔ ﺇﱃ ﺃﺟﻬﺰﺓ ﺍﳊﻮﺍﺳﻴﺐ ﺍﳋﺎﺻﺔ ﺑﺎﻷﺷﺨﺎﺹ)‪.(1‬‬

‫ﺛﺎﻟﺜﺎ‪ :‬ﻣﻘﺪﻣﻲ ﺍﳋﺪﻣﺎﺕ ﺍﻟﻮﺳﻴﻄﺔ ﰲ ﻧﻄﺎﻕ ﺷﺒﻜﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ‪:‬ﻭﻫﻢ ﺍﻷﺷﺨﺎﺹ ﺍﻟﺬﻳﻦ ﻳﺴﺎﻋﺪﻭﻥ‬
‫ﻋﻠﻰ ﺍﻟﻮﺻﻮﻝ ﺇﱃ ﺷﺒﻜﺔ ﺍﻹﻧﺘﺮﻧﺖ‪ ،‬ﻓﻘﺪ ﳝﻜﻦ ﺃﻥ ﻳﻜﻮﻥ ﺍﻷﺷﺨﺎﺹ ﺍﻟﻮﺳﻄﺎﺀ ﻣﺎ ﺑﲔ ﺍﻟﺰﺑﻮﻥ)ﺍﻟﻌﻤﻴﻞ(‪،‬‬
‫ﻭﻣﺎ ﺑﲔ ﺷﺒﻜﺔ ﺍﻻﻧﺘﺮﻧﺖ ﺿﺤﺎﻳﺎ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻫﺆﻻﺀ ﺍﻷﺷﺨﺎﺹ ﻫﻢ‪:‬‬

‫‪ /1‬ﻣﺘﻌﻬﺪ ﺍﻟﻮﺻﻮﻝ‪ :‬ﻭﻫﻮ ﺃﻱ ﺷﺨﺺ ﻃﺒﻴﻌﻲ ﺃﻭ ﻣﻌﻨﻮﻱ ﻳﻘﻮﻡ ﺑﺪﻭﺭ ﻓﲏ ﻟﺘﻮﺻﻴﻞ ﺍﳉﻤﻬﻮﺭ‬
‫ﺍﳌﺴﺘﺨﺪﻡ ﺇﱃ ﺷﺒﻜﺔ ﺍﻹﻧﺘﺮﻧﺖ ﻭﺫﻟﻚ ﻋﻦ ﻃﺮﻳﻖ ﻋﻘﻮﺩ ﺍﺷﺘﺮﺍﻙ ﺗﻮﺻﻴﻞ ﺍﻟﺰﺑﻮﻥ ﺑﺎﳌﻮﺍﻗﻊ ﺍﻟﱵ‬
‫ﻳﺮﻳﺪﻫﺎ)‪ (2‬ﻭﻫﻮ ﺑﺬﻟﻚ ﻳﻘﻮﻡ ﺑﺪﻭﺭ ﻓﲏ ﲝﺖ ﻭﻻ ﻋﻼﻗﺔ ﻟﻪ ﺑﺎﳌﺎﺩﺓ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﱵ ﺗﺼﻞ ﺇﱃ ﺍﻟﺰﺑﻮﻥ‪.‬‬

‫‪/2‬ﻣﺘﻌﻬﺪ ﺍﻹﻳﻮﺍﺀ ‪ l’hébergeur‬ﻭﻫﻮ ﺃﻱ ﺷﺨﺺ ﻃﺒﻴﻌﻲ ﺃﻭ ﻣﻌﻨﻮﻱ ﻳﻌﺮﺽ ﺇﻳﻮﺍﺀ ﺻﻔﺤﺎﺕ‬


‫ﺍﻟﻮﺍﺏ ﻋﻠﻰ ﺣﺴﺎﺑﺎﺗﻪ ﺍﳋﺎﺩﻣﺔ ﺍﻟﻌﻤﻼﻗﺔ ﻭﺫﻟﻚ ﻣﻘﺎﺑﻞ ﺃﺟﺮ‪ ،‬ﻓﻬﻮ ﲟﺜﺎﺑﺔ ﻣﺆﺟﺮ ﳌﻜﺎﻥ ﻋﻠﻰ ﺍﻟﺸﺒﻜﺔ‬
‫ﻟﻠﺰﺑﻮﻥ ﺍﻟﺬﻱ ﻳﻨﺸﺮ ﻣﺎ ﻳﺮﻳﺪ ﻣﻦ ﻧﺼﻮﺹ ﺃﻭ ﺻﻮﺭ ﺃﻭ ﺗﻨﻈﻴﻢ ﻣﺆﲤﺮﺍﺕ ﺃﻭ ﻳﻨﺸﺊ ﺭﻭﺍﺑﻂ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﻣﻊ ﺍﳌﻮﺍﻗﻊ ﺍﻷﺧﺮﻯ‪.‬‬

‫‪/3‬ﻣﺘﻌﻬﺪ ﺍﳋﺪﻣﺎﺕ‪ :‬ﻭﻫﻮ ﻧﺎﺷﺮ ﺍﳌﻮﻗﻊ ﻭﺍﳌﺴﺆﻭﻝ ﻋﻦ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﱵ ﺗﻌﱪ ﻋﻠﻰ ﻣﻮﻗﻌﻪ ﺇﱃ‬
‫ﺍﻟﺸﺒﻜﺔ ﻭﻫﻮ ﺑﺬﻟﻚ ﺻﺎﺣﺐ ﺍﻟﺴﻠﻄﺔ ﺍﳊﻘﻴﻘﻴﺔ ﰲ ﻣﺮﺍﻗﺒﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﱵ ﻳﺘﻢ ﺑﺜﻬﺎ ﻭﻫﻮ ﰲ ﺍﻟﻘﺎﻧﻮﻥ‬

‫)‪ (1‬ﺍﺳﺘﻐﻞ ﺑﻌﺾ ﺍﻷﺷﺨﺎﺹ ﺍﳊﺎﺩﺙ ﺍﻹﺭﻫﺎﰊ ﺍﻟﺬﻱ ﺣﺪﺙ ﰲ ﺍﻟﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ ﺍﻷﻣﺮﻳﻜﻴﺔ ﰲ ‪ 2001/09/11‬ﺑﺈﻧﺸﺎﺀ ﻋﺪﺓ ﻣﻮﺍﻗﻊ ﻋﻠﻰ ﺷﺒﻜﺔ‬
‫ﺍﻷﻧﺘﺮﻧﺎﺕ ﺑﻐﺮﺽ ﲨﻊ ﺍﻟﺘﱪﻋﺎﺕ‪ .‬ﻓﺄﺩﻯ ﺫﻟﻚ ﺇﱃ ﻭﻗﻮﻉ ﺍﻟﻜﺜﲑ ﻣﻦ ﺍﻟﺸﻌﺐ ﺍﻷﻣﺮﻳﻜﻲ ﺿﺤﻴﺔ ﻧﺼﺐ‪.‬‬
‫)‪ (2‬ﻣﺪﺣﺖ ﺭﻣﻀﺎﻥ‪ ،‬ﺟﺮﺍﺋﻢ ﺍﻻﻋﺘﺪﺍﺀ ﻋﻠﻰ ﺍﻷﺷﺨﺎﺹ ﻭﺍﻹﻧﺘﺮﻧﺖ‪ ،‬ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ‪ ،‬ﺍﻟﻘﺎﻫﺮﺓ‪ ،2001 ،‬ﺹ ‪.100‬‬

‫‪- 66 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﻟﺴﻤﻌﻲ ﺍﻟﺒﺼﺮﻱ ﺍﻟﻔﺮﻧﺴﻲ ﻣﻠﺰﻡ ﺑﺈﺧﻄﺎﺭ ﺍﻟﻨﻴﺎﺑﺔ ﺍﻟﻌﺎﻣﺔ ﻭﻣﻠﺰﻡ ﺑﺎﻹﻳﺪﺍﻉ ﺍﻟﻘﺎﻧﻮﱐ‪ ،‬ﻭﻳﻘﻮﻡ ﻣﺘﻌﻬﺪ‬
‫ﺍﳋﺪﻣﺎﺕ ﺑﺄﺩﻭﺍﺭ ﻋﺪﻳﺪﺓ ﻓﻬﻮ ﳑﻮﻝ ﻟﻠﺨﺪﻣﺎﺕ ﻭﻣﺎﻟﻚ ﻟﻠﺤﺎﺳﺐ ﺍﳋﺎﺩﻡ ﻓﻀﻼ ﻋﻦ ﺩﻭﺭﻩ ﰲ ﺑﺚ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ)‪.(1‬‬

‫‪/4‬ﻧﺎﻗﻞ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ :‬ﻭﻫﻮ ﺍﻟﻌﺎﻣﻞ ﺍﻟﻔﲏ ﺍﻟﺬﻱ ﻳﺘﻮﱃ ﺍﻟﺮﺑﻂ ﺑﲔ ﺍﻟﺸﺒﻜﺎﺕ ﺑﻨﺎﺀ ﻋﻠﻰ ﻋﻘﺪ‬
‫ﻣﻦ ﻋﻘﻮﺩ ﻧﻘﻞ ﺍﳌﻌﻠﻮﻣﺎﺕ ﰲ ﻫﻴﺌﺔ ﺣﺰﻡ ﻣﻦ ﺟﻬﺎﺯ ﺍﳌﺴﺘﺨﺪﻡ ﺇﱃ ﺟﻬﺎﺯ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﺍﻟﺮﺋﻴﺴﻲ‬
‫ﳌﺘﻌﻬﺪ ﺍﻟﻮﺻﻮﻝ ﰒ ﻧﻘﻠﻬﺎ ﻣﻦ ﺍﳊﺎﺳﺐ ﺍﻷﺧﲑ ﺇﱃ ﺍﳊﺎﺳﺒﺎﺕ ﺍﳌﺮﺗﺒﻄﺔ ﳌﻮﺍﻗﻊ ﺍﻹﻧﺘﺮﻧﺖ ﺃﻭ‬
‫ﲟﺴﺘﺨﺪﻣﻲ ﺍﻟﺸﺒﻜﺔ ﻭﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﻔﺮﻧﺴﻲ ﻋﺮﻑ ﺍﻟﻌﺎﻣﻞ ﺍﻟﻔﲏ ﲟﻮﺟﺐ ﺍﳌﺎﺩﺓ ﺍﻷﻭﱃ ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ‪96‬‬
‫‪ 659/‬ﺍﻟﺼﺎﺩﺭ ﺳﻨﺔ ‪ 1996‬ﺍﳌﺘﻌﻠﻖ ﺑﺎﻹﺗﺼﺎﻝ ﺍﻟﺴﻤﻌﻲ ﺍﻟﺒﺼﺮﻱ ﻋﻠﻰ ﺃﻧﻪ ﻛﻞ ﺷﺨﺺ ﻃﺒﻴﻌﻲ ﺃﻭ‬
‫ﻣﻌﻨﻮﻱ ﻳﺴﺘﻐﻠﺸﺒﻜﺔ ﺍﻹﺗﺼﺎﻻﺕ ﻋﻦ ﺑﻌﺪ ﻭﺍﳌﻔﺘﻮﺣﺔ ﻟﻠﺠﻤﻬﻮﺭ ﻭﻳﻮﺭﺩ ﺇﱃ ﻫﺬﻩ ﺍﻷﺟﻬﺰﺓ ﺧﺪﻣﺔ‬
‫ﺍﻻﺗﺼﺎﻻﺕ ﻋﻦ ﺑﻌﺪ‪.‬‬

‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﳐـﺎﻃﺮ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬‬

‫ﻟﻘﺪ ﺷﻬﺪ ﺍﻟﻌﺎﱂ ﰲ ﺍﻟﺴﻨﻮﺍﺕ ﺍﻷﺧﲑﺓ ﺗﻄﻮﺭﺍ ﻏﲑ ﻣﺴﺒﻮﻕ ﰲ ﳎﺎﻻﺕ ﺍﻹﻋﻼﻡ ﻭﺍﻹﺗﺼﺎﻝ ﻧﻈﺮﺍ‬
‫ﺇﱃ ﺗﻮﻏﻞ ﻭﺍﻧﺘﺸﺎﺭ ﻭﺳﺎﺋﻞ ﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎ ﻭﺍﻹﺑﺘﻜﺎﺭﺍﺕ ﺍﳌﺴﺘﺤﺪﺛﺔ ﰲ ﺍﻷﻧﺸﻄﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺩﺧﻮﳍﺎ ﰲ‬
‫ﲨﻴﻊ ﻧﻮﺍﺣﻲ ﺍﳊﻴﺎﺓ ﻭﻫﻮ ﻣﺎ ﻗﺪ ﻳﺘﺮﺗﺐ ﻋﻠﻴﻪ ﺍﳋﻄﺮ ﺍﻟﻜﺒﲑ ﻋﻠﻰ ﺍﻟﺒﻨﻴﺎﺕ ﺍﳌﺨﺘﻠﻔﺔ ﺟﺮﺍﺀ ﺍﻹﺳﺘﺨﺪﺍﻡ ﻏﲑ‬
‫ﺍﳌﺸﺮﻭﻉ ﳍﺬﻩ ﺍﻟﺘﻘﻨﻴﺎﺕ‪ .‬ﻭﺍﳋﻄﺮ ﺍﻷﻛﱪ ﻫﻮ ﺃﻥ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻗﺪ ﺗﺴﺘﻬﺪﻑ ﺍﻷﻣﻦ ﺍﻟﻘﻮﻣﻲ‬
‫ﺑﺎﺭﺗﻜﺎﺏ ﺟﺮﺍﺋﻢ ﲤﺲ ﺟﻬﺎﺕ ﺣﻜﻮﻣﻴﺔ ﻭﺃﻣﻨﻴﺔ‪ ،‬ﻟﻴﺲ ﻫﺬﺍ ﻓﺤﺴﺐ ﺑﻞ ﺣﱴ ﺍﻹﺿﺮﺍﺭ ﺑﺎﻻﻗﺘﺼﺎﺩ ﻛﻮﻧﻪ‬
‫ﺃﺻﺒﺢ ﻳﻌﺘﻤﺪ ﺑﺼﻮﺭﺓ ﻣﺘﺰﺍﻳﺪﺓ ﻋﻠﻰ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ )ﺍﻻﻗﺘﺼﺎﺩ ﺍﻟﺮﻗﻤﻲ( ﳑﺎ ﻗﺪ ﻳﺆﺛﺮ )ﻫﺬﺍ ﺍﻹﺟﺮﺍﻡ‬
‫ﺍﻟﺘﻘﲏ( ﺗﺄﺛﲑﺍ ﻛﺒﲑﺍ ﻋﻠﻰ ﺇﻗﺘﺼﺎﺩ ﺃﻱ ﺩﻭﻟﺔ ﻳﻠﺤﻖ ‪‬ﺎ ﺧﺴﺎﺋﺮ ﻣﺎﻟﻴﺔ ﺿﺨﻤﺔ‪.‬‬

‫ﺃﻭﻻ‪:‬ﺑﻌﺾ ﺍﻟﺘﻘﺪﻳﺮﺍﺕ ﳊﺠﻢ ﺍﳋﺴﺎﺋﺮ ﺍﳌﺎﻟﻴﺔ ﺍﻟﻨﺎﲨﺔ ﻋﻦ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ :‬ﺗﱪﺯ ﺍﳌﺆﺷﺮﺍﺕ ﻭ‬
‫ﺍﻟﺪﺭﺍﺳﺎﺕ ﺍﺯﺩﻳﺎﺩ ﺣﺠﻢ ﺍﳋﺴﺎﺋﺮ ﻭﺍﻷﺿﺮﺍﺭ ﺍﻟﻨﺎﲨﺔ ﻋﻦ ﺍﻹﺟﺮﺍﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺧﺎﺻﺔ ﰲ ﺍﻟﺪﻭﻝ ﺍﻟﱵ‬
‫ﺗﻌﺘﻤﺪ ﺑﺸﻜﻞ ﻛﺒﲑ ﻋﻠﻰ ﻧﻈﻤﺎﻟﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺍﻷﻣﺮ ﺍﻟﺬﻱ ﻳﺸﻜﻞ ﲢﺪﻳﺎ ﻛﺒﲑﺍ ﰲ ﻣﻮﺍﺟﻬﺔ ﻫﺬﻩ‬
‫ﺍﳉﺮﺍﺋﻢ ﻭﻣﻜﺎﻓﺤﺘﻬﺎ‪ ،‬ﻭﺍﳋﺴﺎﺋﺮ ﺍﻹﻗﺘﺼﺎﺩﻳﺔ ﺍﻟﻨﺎﲨﺔ ﻋﻦ ﺍﺭﺗﻜﺎﺏ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﺰﺩﺍﺩ ﻭﺗﺘﻀﺎﻋﻒ‬

‫)‪ (1‬ﲨﻴﻞ ﻋﺒﺪ ﺍﻟﺒﺎﻗﻲ ﺍﻟﺼﻐﲑ‪ ،‬ﺍﻷﻧﺘﺮﻧﺎﺕ ﻭ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﻨﺎﺋﻲ‪ .‬ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ‪.‬ﺍﻟﻘﺎﻫﺮﺓ ‪.2002‬ﺹ ‪.164‬‬

‫‪- 67 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻋﻨﺪﻣﺎ ﺗﺮﺗﺒﻂ ﺑﺎﳉﺮﳝﺔ ﺍﳌﻨﻈﻤﺔ‪ ،‬ﻓﺎﳌﻨﻈﻤﺎﺕ ﺍﻹﺟﺮﺍﻣﻴﺔ ﻟﺪﻳﻬﺎ ﻣﻬﺎﺭﺓ ﻛﺒﲑﺓ ﰲ ﺍﻛﺘﺸﺎﻑ ﻓﺮﺹ ﺍﻟﻘﻴﺎﻡ‬
‫ﺑﺄﻋﻤﺎﻝ ﻭﻣﺸﺎﺭﻳﻊ ﺟﺪﻳﺪﺓ ﻏﲑ ﻣﺸﺮﻭﻋﺔ ﻭﺍﺳﺘﻐﻼﳍﺎ‪.‬ﻭﺃﻥ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺍﻟﻨﻤﻮ ﺍﳌﺘﻮﺍﺻﻞ ﻟﻠﺘﺠﺎﺭﺓ‬
‫ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﻛﺬﺍ ﺗﻮﺟﻪ ﺍﻟﻜﺜﲑ ﻣﻦ ﺍﻟﺪﻭﻝ ﳓﻮ ﺍﳊﻜﻮﻣﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ)‪ (1‬ﲪﻞ ﻣﻌﻪ ﳎﺎﻻﺕ ﻫﺎﺋﻠﺔ‬
‫ﻟﺘﺤﻘﻴﻖ ﺃﺭﺑﺎﺡ ﻏﲑ ﻣﺸﺮﻭﻋﺔ)‪.(2‬‬

‫ﻭﻫﻨﺎﻙ ﻣﻦ ﺍﻷﻣﺜﻠﺔ ﺍﻟﻌﺪﻳﺪﺓ ﻭﺍﳌﺨﺘﻠﻔﺔ ﻣﺎ ﻣﻦ ﺷﺄ‪‬ﺎ ﺃﻥ ﺗﻀﻊ ﺃﻣﺎﻡ ﺃﻋﻴﻨﻨﺎ ﺣﺠﻢ ﺍﻷﺿﺮﺍﺭ ﺍﳌﺎﻟﻴﺔ‬
‫ﺍﻟﱵ ﺗﺴﺒﺒﻬﺎ ﺟﺮﺍﺋﻢ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ‪.‬ﻓﺎﻟﺘﻘﺮﻳﺮ ﺍﻟﺬﻱ ﻧﺸﺮﺗﻪ ﺍﳉﻤﻌﻴﺔ ﺍﻟﻔﺮﻧﺴﻴﺔ ﻷﻣﻦ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻋﺎﻡ‬
‫‪ 1991‬ﺗﻀﻤﻦ ﺃﻥ ﺍﳋﺴﺎﺋﺮ ﻭﺻﻠﺖ ﺇﱃ ‪ 10.4‬ﻣﻠﻴﺎﺭ ﻓﺮﻧﻚ ﻓﺮﻧﺴﻲ ‪ %57‬ﻣﻨﻬﺎ ﻳﺮﺟﻊ ﺇﱃ ﺃﻓﻌﺎﻝ‬
‫ﺇﺟﺮﺍﻣﻴﺔ‪ .‬ﻭﰲ ﻋﺎﻡ ‪1996‬ﺍﻧﺘﻬﻰ ﺍﻟﺘﻘﺮﻳﺮ ﺍﻟﺼﺎﺩﺭ ﻋﻦ ﻧﻔﺲ ﺍﳉﻤﻌﻴﺔ ﺇﱃ ﺃﻥ ﺇﲨﺎﱄ ﺍﳋﺴﺎﺋﺮ ﺍﻟﻨﺎﲡﺔ ﻋﻦ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻗﺪﺭ ﲝﻮﺍﱄ ‪ 12.72‬ﻣﻠﻴﺎﺭ ﻓﺮﻧﻚ ﻓﺮﻧﺴﻲ‪.‬‬

‫ﻭﻣﻦ ﺟﻬﺔ ﺃﺧﺮﻯ ﺗﻮﺻﻠﺖ ﺍﻹﺩﺍﺭﺓ ﺍﻟﻌﺎﻣﺔ ﻟﻠﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺑﺎﻋﺘﺒﺎﺭﻫﺎ ﺇﺣﺪﻯ ﺍﳉﻬﺎﺕ ﺍﻟﱵ ﻳﺼﻞ‬
‫ﺇﱃ ﻋﻠﻤﻬﺎ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺨﺘﻠﻔﺔ ﲟﺎ ﻓﻴﻬﺎ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺇﱃ ﺃﻥ ﺃﻛﺜﺮ ﻣﻦ ﻳﺘﻌﺮﺽ ﳍﺬﺍ ﺍﻟﻨﻤﻂ ﻣﻦ‬
‫ﰒ ﺍﳌﺸﺮﻭﻋﺎﺕ‬ ‫‪%21‬‬ ‫ﺍﻹﺟﺮﺍﻡ ﺍﳌﺸﺮﻭﻋﺎﺕ ﺍﻟﱵ ﺗﺘﻌﻠﻖ ﺑﺎﳌﻌﻠﻮﻣﺎﺕ ﺑﻨﺴﺒﺔ ‪ %25‬ﻳﻠﻴﻬﺎ ﺍﻟﺒﻨﻮﻙ ﺑﻨﺴﺒﺔ‬
‫ﺍﻟﺘﺠﺎﺭﻳﺔ ﺍﳌﺨﺘﻠﻔﺔ ﺑﻨﺴﺒﺔ ‪ %18‬ﻭﺃﺧﲑﺍ ﺍﳉﻬﺎﺕ ﺍﳊﻜﻮﻣﻴﺔ ﺑﻨﺴﺒﺔ ‪.%17‬‬

‫ﺃﻣﺎ ﰲ ﺍﻟﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ ﺍﻷﻣﺮﻳﻜﻴﺔ ﻓﺈﻥ ﺇﺣﺼﺎﺋﻴﺎﺕ ﻣﻜﺘﺐ ﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﺍﻟﻔﺪﺭﺍﱄ ﺗﻮﺿﺢ ﺃﻥ‬
‫ﻣﺘﻮﺳﻂ ﺍﳋﺴﺎﺭﺓ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﻮﺍﺣﺪﺓ ﺣﻮﺍﱄ ‪500‬ﺃﻟﻒ ﺩﻭﻻﺭ ﺑﻴﻨﻤﺎ ﰲ ﺟﺮﳝﺔ ﺳﺮﻗﺔ ﻋﺎﺩﻳﺔ‬
‫ﻓﻤﺘﻮﺳﻂ ﺍﳋﺴﺎﺭﺓ ‪ 2500‬ﺩﻭﻻﺭ‪ ،‬ﺃﻱ ﺃﻥ ﻣﺘﻮﺳﻂ ﺍﳋﺴﺎﺭﺓ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻋﻠﻰ ﺑـ ‪ 150‬ﻣﺮﺓ‬
‫ﻋﻨﻪ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﻟﻌﺎﺩﻳﺔ‪ ،‬ﻛﻤﺎ ﺃﺻﺪﺭ ﺍﳌﺮﻛﺰ ﺍﻟﻘﻮﻣﻲ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﺍﳋﺎﺻﺔ ﲜﺮﺍﺋﻢ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﰲ‬
‫ﺍﻟﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ ﺍﻷﻣﺮﻳﻜﻴﺔ ﺩﺭﺍﺳﺔ ﻣﻌﺘﻤﺪﺍ ﻓﻴﻬﺎ ﻋﻠﻰ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﱵ ﺗﻮﺻﻞ ﺇﻟﻴﻬﺎ ﻣﻌﻬﺪ ﺳﺘﺎﻧﻔﻮﺭﺩ‬

‫)‪ (1‬ﳌﺎ ﻇﻬﺮﺕ ﺷﺒﻜﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ ﲞﺪﻣﺎ‪‬ﺎ ﺍﳌﺘﻌﺪﺩﺓ ﻋﻤﺪﺕ ﺍﻟﺪﻭﻝ ﺇﱃ ﺍﺳﺘﺜﻤﺎﺭﻫﺎ ﰲ ﺗﻨﻔﻴﺬ ﺍﻟﺘﻌﺎﻣﻼﺕ ﺍﳊﻜﻮﻣﻴﺔ ﺑﺸﻜﻞ ﺇﻟﻜﺘﺮﻭﱐ ﳌﺎ ﰲ ﺫﻟﻚ ﻣﻦ ﺗﺴﻴﲑ‬
‫ﺗﻘﺪﱘ ﺍﳋﺪﻣﺎﺕ ﻭﺍﻻﺭﺗﻘﺎﺀ ﲟﺴﺘﻮﻯ ﺍﳌﻮﺍﻃﻦ ﻭﲢﻘﻴﻖ ﺍﻟﻌﺐﺀ ﻋﻠﻰ ﺍﳌﺆﺳﺴﺎﺕ ﺍﳊﻜﻮﻣﻴﺔ ﺍﳌﺨﺘﻠﻔﺔ ﳑﺎ ﻳﺆﺩﻱ ﺇﱃ ﺯﻳﺎﺩﺓ ﻛﻔﺎﺀ‪‬ﺎ‪ .‬ﻭﻗﺪ ﻋﺮﻓﺖ ﺍﻷﻣﻢ ﺍﳌﺘﺤﺪﺓ‬
‫ﺍﳊﻜﻮﻣﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻋﻠﻰ ﺃ‪‬ﺎ ﺍﺳﺘﺨﺪﺍﻡ ﺍﻻﻧﺘﺮﻧﺎﺕ ﻭﺍﻟﺸﺒﻜﺎﺕ ﺍﻟﻌﺎﳌﻴﺔ ﺍﻟﻌﺮﻳﻀﺔ ﻟﺘﻘﺪﱘ ﻣﻌﻠﻮﻣﺎﺕ ﻭﺧﺪﻣﺎﺕ ﺍﳊﻜﻮﻣﺔ ﻟﻠﻤﻮﺍﻃﻨﲔ ﻛﻤﺎ ﻋﺮﻓﺘﻬﺎ ﻣﻨﻈﻤﺔ‬
‫ﺍﻟﺘﻌﺎﻭﻥ ﺍﻻﻗﺘﺼﺎﺩﻱ ﻭﺍﻟﺘﻨﻤﻴﺔ ﻋﺎﻡ ‪ 2001‬ﻋﻠﻰ ﺃ‪‬ﺎ ﺍﺳﺘﺨﺪﺍﻡ ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﻻﺗﺼﺎﻻﺕ ﻭﺧﺼﻮﺻﺎ ﺍﻻﻧﺘﺮﻧﺎﺕ ﻟﻠﻮﺻﻮﻝ ﺇﱃ ﺣﻜﻮﻣﺎﺕ ﺃﻓﻀﻞ‪.‬‬
‫ﻭﻳﺒﲎ ﻋﻠﻰ ﺫﻟﻚ ﺃﻥ ﻓﻜﺮﺓ ﺍﳊﻜﻮﻣﺔ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ ﺗﻘﻮﻡ ﺃﺳﺎﺳﺎ ﻋﻠﻰ ﲡﻤﻴﻊ ﺍﻷﻧﺸﻄﺔ ﻭﺍﳋﺪﻣﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﻣﻮﻗﻊ ﺍﳊﻜﻮﻣﺔ ﺍﻟﺮﲰﻲ ﻋﻠﻰ ﺷﺒﻜﺔ ﺍﻻﻧﺘﺮﻧﺎﺕ‬
‫ﰲ ﻧﺸﺎﻁ ﺃﺷﺒﻪ ﻣﺎ ﻳﻜﻮﻥ ﺑﻔﻜﺮﺓ ﳎﻤﻌﺎﺕ ﺍﻟﺪﻭﺍﺋﺮ ﺍﳊﻜﻮﻣﻴﺔ ﻭﲢﻘﻴﻖ ﺣﺎﻟﺔ ﺇﺗﺼﺎﻝ ﺩﺍﺋﻢ ﺑﺎﳉﻤﻬﻮﺭ ﻣﻊ ﺍﻟﻘﺪﺭﺓ ﻋﻠﻰ ﺗﺎﻣﲔ ﺍﻻﺣﺘﻴﺎﺟﺎﺕ ﺍﻻﺳﺘﻌﻼﻣﻴﺔ‬
‫ﻭﺍﳋﺪﻣﻴﺔ ﻟﻠﻤﻮﺍﻃﻦ‪.‬‬
‫)‪ (2‬ﻧﺎﺋﻠﺔ ﳏﻤﺪ ﻓﺮﻳﺪ ﻗﻮﺭﺓ‪.‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ ‪.70‬‬

‫‪- 68 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﻟﺪﻭﱄ ﻟﻸﲝﺎﺙ ﺃﺳﻔﺮﺕ ﻋﻦ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻟﻨﺘﺎﺋﺞ ﺃﳘﻬﺎ ﺃﻥ ﺍﳋﺴﺎﺋﺮ ﺍﻟﻨﺎﲨﺔ ﻋﻦ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﺗﻘﺪﺭ ﻣﻦ ‪ 03‬ﺇﱃ ‪ 05‬ﻣﻠﻴﺎﺭ ﺩﻭﻻﺭ ﻭﺃﻥ ﺍﳌﺸﺮﻭﻋﺎﺕ ﺍﻟﺘﺠﺎﺭﻳﺔ ﻫﻲ ﺍﻷﻛﺜﺮ ﻋﺮﺿﺔ ﳍﺬﻩ ﺍﳉﺮﺍﺋﻢ ﰒ ﻳﺄﰐ‬
‫ﺑﻌﺪ ﺫﻟﻚ ﺍﻟﺒﻨﻮﻙ ﻭﺍﳌﺆﺳﺴﺎﺕ ﺍﳊﻜﻮﻣﻴﺔ)‪.(1‬‬

‫ﻛﻤﺎ ﺑﻴﻨﺖ ﺩﺭﺍﺳﺔ ﺃﺧﺮﻯ ﺃﺟﺮﻳﺖ ﻣﻦ ﻗﺒﻞ ﻣﻨﻈﻤﺔ‪ The conputersecurityinstitute‬ﺃﻥ‬


‫ﺧﺴﺎﺋﺮ ‪ 163‬ﺷﺮﻛﺔ ﺃﻣﺮﻳﻜﻴﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻗﺪ ﺑﻠﻐﺖ ﺃﻛﺜﺮ ﻣﻦ ‪ 125‬ﻣﻠﻴﻮﻥ‬
‫ﺩﻭﻻﺭ‪ ،‬ﻛﻤﺎ ﺃﻇﻬﺮ ﺍﳌﺴﺢ ﺍﻟﺬﻱ ﺃﺟﺮﻱ ﻋﺎﻡ ‪2000‬ﺍﺭﺗﻔﺎﻉ ﻋﺪﺩ ﺗﻠﻚ ﺍﻟﺸﺮﻛﺎﺕ ﺍﳌﺘﻀﺮﺭﺓ ﻣﻦ ﺗﻠﻚ‬
‫ﺍﳉﺮﺍﺋﻢ ﺣﻴﺚ ﻭﺻﻞ ﺇﱃ ‪ 273‬ﺷﺮﻛﺔ ﺑﻠﻎ ﳎﻤﻮﻉ ﺧﺴﺎﺋﺮﻫﺎ ﺃﻛﺜﺮ ﻣﻦ ‪ 256‬ﻣﻠﻴﻮﻥ ﺩﻭﻻﺭ‪.‬‬

‫ﻛﻤﺎ ﻭﺭﺩ ﰲ ﺍﻟﺘﻘﺮﻳﺮ ﺍﻟﺴﻨﻮﻱ ﺍﻟﺜﺎﻣﻦ ﳌﻜﺘﺐ ﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﺍﻟﻔﺪﺭﺍﱄ ﺍﻷﻣﺮﻳﻜﻲ ﺍﻟﺼﺎﺩﺭ ﻋﺎﻡ‬
‫‪ 2003‬ﺑﻌﻨﻮﺍﻥ ﺟﺮﺍﺋﻢ ﺍﳊﺎﺳﺐ ﺑﺄﻥ ﺃﻛﺜﺮ ﺧﺴﺎﺋﺮ ﺍﳌﺆﺳﺴﺎﺕ ﺑﺎﻟﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ ﺍﻷﻣﺮﻳﻜﻴﺔ ﺃﺗﻰ ﻣﻦ‬
‫ﺍﻻﺳﺘﻴﻼﺀ ﻋﻠﻰ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﻟﱵ ﻛﺒﺪ‪‬ﺎ ﺧﻼﻝ ﻫﺬﺍ ﺍﻟﻌﺎﻡ ﺧﺴﺎﺋﺮ ﺗﺘﻌﺪﻯ ‪ 70‬ﻣﻠﻴﻮﻥ ﺩﻭﻻﺭ ﺃﻣﺮﻳﻜﻲ‬
‫ﻭﻳﺄﰐ ﰲ ﺍﳌﺮﻛﺰ ﺍﻟﺜﺎﱐ ﻧﺸﺎﻁ ﺗﻌﻄﻴﻞ ﻧﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺕ ﳏﻘﻘﺎ ﺧﺴﺎﺋﺮ ﺗﺘﺠﺎﻭﺯ ‪ 65.5‬ﻣﻠﻴﻮﻥ ﺩﻭﻻﺭ‪.‬‬

‫ﺛﺎﻧﻴﺎ‪ :‬ﳐﺎﻃﺮ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺍﳉﺰﺍﺋﺮ‪:‬ﺃﻣﺎ ﰲ ﺍﳉﺰﺍﺋﺮ ﻓﺈﻥ ﺍﶈﻴﻂ ﺍﻟﻜﻤﻲ ﻟﻺﺟﺮﺍﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‬
‫ﻏﲑ ﻭﺍﺿﺢ ﻟﻌﺪﻡ ﻭﺟﻮﺩ ﺩﺭﺍﺳﺎﺕ ﻭﲝﻮﺙ ﻣﻦ ﺷﺄ‪‬ﺎ ﻛﺸﻒ ﺍﻟﻠﺜﺎﻡ ﻋﻦ ﺃﺭﻗﺎﻡ ﻭﻣﺆﺷﺮﺍﺕ ﻟﻠﺨﺴﺎﺋﺮ ﰲ‬
‫ﺑﻼﺩﻧﺎ ﺟﺮﺍﺀ ﻫﺬﺍ ﺍﻟﻨﻤﻂ ﺍﻹﺟﺮﺍﻣﻲ )‪ .(2‬ﻭﺇﻥ ﻛﺎﻧﺖ ﺍﳉﺰﺍﺋﺮ ﻟﻴﺴﺖ ﲟﻨﺄﻯ ﻋﻦ ﺧﻄﻮﺭﺓ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻃﺎﳌﺎ ﺃ‪‬ﺎ ﲢﺘﻞ ﺟﺰﺀﺍ ﻣﻦ ﺍﻟﻔﻀﺎﺀ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺧﺎﺻﺔ ﻓﻴﻤﺎ ﻳﺘﻌﻠﻖ ﺑﺎﳊﻮﺳﺒﺎﺕ ﺍﳌﺎﻟﻴﺔ ﻭﺑﻌﺾ‬
‫ﺍﳍﻴﺂﺕ ﺍﳊﻜﻮﻣﻴﺔ ﺍﻟﱵ ﻳﻌﺘﱪ ﺍﺧﺘﺮﺍﻕ ﻣﻮﺍﻗﻌﻬﺎ ﺿﻤﻦ ﺣﺠﻢ ﺍﻷﺿﺮﺍﺭ ﺍﻟﻨﺎﲡﺔ ﻋﻦ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫ﻭﳔﻠﺺ ﻟﻠﻘﻮﻝ ﺑﻨﺎﺀﺍ ﻋﻠﻰ ﻣﺎ ﺗﻘﺪﻡ ﺃﻥ ﻣﻌﺪﻝ ﺍﳋﺴﺎﺋﺮ ﺍﳌﺎﻟﻴﺔ ﻧﺘﻴﺠﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻳﻔﻮﻕ ﰲ‬
‫ﻛﺜﲑ ﻣﻦ ﺍﻷﺣﻮﺍﻝ ﻧﻔﺲ ﺍﳌﻌﺪﻝ ﰲ ﺍﳉﺮﳝﺔ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ‪ ،‬ﻭﻳﺮﺟﻊ ﺍﻟﺴﺒﺐ ﰲ ﺫﻟﻚ ﺇﱃ ﺍﻟﻜﻢ ﺍﻟﻜﺒﲑ ﻣﻦ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ )ﺫﺍﺕ ﺍﻟﻘﻴﻤﺔ ﺍﳌﺎﻟﻴﺔ ﺍﻟﻌﺎﻟﻴﺔ( ﺍﻟﱵ ﻳﺘﻢ ﺑﺮﳎﺘﻬﺎ ﺁﻟﻴﺎ ﻭﺍﻟﱵ ﳝﻜﻦ ﺍﻟﺘﻼﻋﺐ ‪‬ﺎ ﰲ ﺛﻮﺍﻥ‬
‫ﻣﻌﺪﻭﺩﺍﺕ ﻭﲢﻮﻳﻠﻬﺎ ﻣﻦ ﺷﺨﺺ ﻵﺧﺮ‪.‬‬

‫)‪ (1‬ﻧﺎﺋﻠﺔ ﳏﻤﺪ ﻓﺮﻳﺪﻓﻮﺭﺓ‪،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ ﺹ ‪.84‬‬


‫)‪ (2‬ﻏﻴﺎﺏ ﺇﺣﺼﺎﺀﺍﺕ ﳍﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﻟﻘﻀﺎﻳﺎ ﺭﺍﺟﻊ ﻟﻌﺪﻡ ﻭﻋﻲ ﺍ‪‬ﺘﻤﻊ ﺍﶈﻠﻲ ﲟﺨﺎﻃﺮﻫﺎ‪ ،‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺣﺪﺍﺛﺔ ﺍﻟﺜﻮﺭﺓ ﺍﻟﺘﻘﻨﻴﺔ ﺑﺎﳉﺰﺍﺋﺮ ﻭﻗﺼﻮﺭ ﺍﻟﺒﻨﻴﺔ‬
‫ﺍﻟﺘﺤﺘﻴﺔ ﺍﻟﻼﺯﻣﺔ ﻟﺪﺧﻮﻝ ﺍﳌﺆﺳﺴﺎﺕ ﺍﻟﻮﻃﻨﻴﺔ ﺑﻘﻮﺓ ﰲ ﺃﻋﻤﺎﻝ ﺍﻟﺘﺠﺎﺭﺓ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪.‬‬

‫‪- 69 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ :‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‬

- 70 -

PDF created with pdfFactory Pro trial version www.pdffactory.com


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﳌﻄﻠﺐ ﺍﻟﺮﺍﺑﻊ‪ :‬ﺍﳊﻤﺎﻳﺔ ﺍﻟﻔﻨﻴﺔ ﻟﻠﻤﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬

‫ﺇﻥ ﺍﳌﻨﻊ ﺍﳉﻨﺎﺋﻲ ﻭﲢﺪﻳﺪ ﻋﻘﻮﺑﺎﺕ ﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﺼﻔﺔ ﻣﺴﺒﻘﺔ ﲟﺎ ﻳﺘﻤﺎﺷﻰ ﻣﻊ ﻣﺒﺪﺃ ﺍﻟﺸﺮﻋﻴﺔ ﻭﺇﻥ‬
‫ﻛﺎﻥ ﻳﻮﻓﺮ ﲪﺎﻳﺔ ﺃﺳﺎﺳﻴﺔ ﻟﻠﻨﻈﺎﻡ ﻭﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﺿﺪ ﺍﳌﺨﺎﻃﺮ ﻭﺍﻷﺿﺮﺍﺭ ﺍﻟﻨﺎﲨﺔ ﻋﻦ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻣﻦ‬
‫ﺇﺗﻼﻑ ﻭﺗﺪﻣﲑ ﺑﺎﻫﻆ ﺍﻟﺘﻜﻠﻔﺔ ﰲ ﺣﺎﻟﺔ ﺍﻟﻮﺻﻮﻝ ﺇﱃ ﻣﻌﻠﻮﻣﺎﺕ ﺳﺮﻳﺔ‪ ،‬ﺇﻻ ﺃﻧﻪ ﻏﲑ ﻛﺎﻑ ﻟﻮﺣﺪﻩ‪ ،‬ﻓﺤﱴ‬
‫ﺗﻜﻮﻥ ﻫﻨﺎﻙ ﺍﻟﻔﻌﺎﻟﻴﺔ ﰲ ﺍﳊﺮﻛﺔ ﻭﺍﻷﺩﺍﺀ ﻻﺑﺪ ﺃﻥ ﺗﻌﺰﺯﻫﺎ ﲪﺎﻳﺔ ﻓﻨﻴﺔ ﺗﻌﻤﻞ ﻋﻠﻰ ﺍﳊﻴﻠﻮﻟﺔ ﺩﻭﻥ ﻭﻗﻮﻉ‬
‫ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﺃﻭ ﺍﻟﺘﺨﻔﻴﻒ ﻣﻦ ﺁﺛﺎﺭﻫﺎ ﺇﺫﺍ ﻭﻗﻌﺖ)‪.(1‬‬

‫ﻭﻳﻘﺼﺪ ﺑﺎﳊﻤﺎﻳﺔ ﺍﻟﻔﻨﻴﺔ ﺃﻭ ﺃﻣﻦ ﺍﳌﻌﻠﻮﻣﺎﺕ)‪ (2‬ﺩﺭﺍﺳﺎﺕ ﻭﺗﺪﺍﺑﲑ ﲪﺎﻳﺔ ﺳﺮﻳﺔ ﻭﺳﻼﻣﺔ ﳏﺘﻮﻯ‬
‫ﻭﺗﻮﻓﺮ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﻣﻜﺎﻓﺤﺔ ﺃﻧﺸﻄﺔ ﺍﻻﻋﺘﺪﺍﺀ ﻋﻠﻴﻬﺎ‪ ،‬ﺃﻭ ﺍﺳﺘﻐﻼﻝ ﻧﻈﻤﻬﺎ ﰲ ﺍﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﺑﺎﻋﺘﺒﺎﺭﻫﺎ‬
‫ﺇﺟﺮﺍﺀﺍﺕ ﻭﻗﺎﺋﻴﺔ ﻟﺘﺠﻨﺐ ﺍﺧﺘﺮﺍﻕ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‪.‬‬

‫ﻭﻳﺸﺘﺮﻁ ﻟﻀﻤﺎﻥ ﺗﻮﻓﺮ ﺍﳊﻤﺎﻳﺔ ﺍﻟﻔﻨﻴﺔ ﺍﻟﻜﺎﻓﻴﺔ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺍﻟﺴﺮﻳﺔ ﺃﻭ ﺍﳌﻮﺛﻮﻗﻴﺔ‬
‫ﺍﻟﺘﻜﺎﻣﻠﻴﺔ‪ ,‬ﺳﻼﻣﺔ ﺍﶈﺘﻮﻯ‪ ،‬ﺍﺳﺘﻤﺮﺍﺭﻳﺔ ﺗﻮﻓﺮ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺃﺧﲑﺍ ﻋﺪﻡ ﺍﻹﻧﻜﺎﺭ‪.‬ﻓﻤﺎﻫﻲ ﺍﻟﻮﺳﺎﺋﻞ ﺍﻟﻔﻨﻴﺔ‬
‫ﺍﻟﻼﺯﻣﺔ ﻟﺘﺄﻣﲔ ﲪﺎﻳﺔ ﻫﺬﻩ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻏﲑ ﺍﻟﻌﻘﺎﺏ ﺍﳉﻨﺎﺋﻲ‪.‬‬

‫ﺗﺘﻌﺪﺩ ﻭﺳﺎﺋﻞ ﺍﻷﻣﻦ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳌﺘﻌﲔ ﺍﺳﺘﺨﺪﺍﻣﻬﺎ ﰲ ﺑﻴﺌﺔ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﺤﺎﻓﻈﺔ ﻋﻠﻰ ﺍﳌﻌﻠﻮﻣﺎﺕ‬
‫ﺑﺸﻜﻞ ﺁﻣﻦ ﻛﻤﺎ ﺗﺘﻌﺪﺩ ﺃﻏﺮﺍﺿﻬﺎ ﻭﻧﻄﺎﻗﺎﺕ ﺍﺳﺘﺨﺪﺍﻣﻬﺎ‪.‬‬

‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺍﳊﻤﺎﻳﺔ ﺍﻟﻔﻨﻴﺔ ﻋﻦ ﻃﺮﻳﻖ ﺍﻟﱪﺍﻣﺞ‪:‬‬

‫ﻭﳝﻜﻦ ﺗﺼﻨﻴﻒ ﻫﺬﻩ ﺍﻟﻮﺳﺎﺋﻞ ﰲ ﺿﻮﺀ ﻏﺮﺽ ﺍﳊﻤﺎﻳﺔ ﺇﱃ ﺍﻟﻮﺳﺎﺋﻞ ﺍﻟﺘﺎﻟﻴﺔ‪:‬‬

‫‪ .1‬ﺍﻟﻮﺳﺎﺋﻞ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﻟﺘﻌﺮﻳﻒ ﺑﺸﺨﺺ ﺍﳌﺴﺘﺨﺪﻡ ﻭﻣﻮﺛﻮﻗﻴﺔ ﺍﻻﺳﺘﺨﺪﺍﻡ ﻭﻣﺸﺮﻭﻋﻴﺘﻪ‪ :‬ﻭﻫﻲ‬


‫ﺍﻟﻮﺳﺎﺋﻞ ﺍﻟﱵ ‪‬ﺪﻑ ﺇﱃ ﺿﻤﺎﻥ ﺍﺳﺘﺨﺪﺍﻡ ﺍﻟﻨﻈﺎﻡ ﺃﻭ ﺍﻟﺸﺒﻜﺔ ﻣﻦ ﻗﺒﻞ ﺍﻟﺸﺨﺺ ﺍﳌﺨﻮﻝ ‪‬ﺬﺍ ﺍﻻﺳﺘﺨﺪﺍﻡ‬
‫ﻭﺗﻀﻢ ﻫﺬﻩ ﺍﻟﻄﺎﺋﻔﺔ ﻛﻠﻤﺎﺕ ﺍﻟﺴﺮ ﺑﺄﻧﻮﺍﻋﻬﺎ‪ ،‬ﺍﻟﺒﻄﺎﻗﺎﺕ ﺍﻟﺬﻛﻴﺔ ﺍﳌﺴﺘﻌﻤﻠﺔ ﻟﻠﺘﻌﺮﻳﻒ‪ ،‬ﻭﺳﺎﺋﻞ ﺍﻟﺘﻌﺮﻳﻒ‬

‫)‪ (1‬ﻭﻫﺬﺍ ﻣﺎ ﺃﻛﺪﺕ ﻋﻠﻴﻪ ﺍﳌﺬﻛﺮﺓ ﺍﻟﺘﻔﺴﲑﻳﺔ ﻻﺗﻔﺎﻗﻴﺔ ﺑﻮﺩﺍﺑﺴﺖ ﺣﻴﻨﻤﺎ ﺫﻫﺒﺖ ﺇﱃ ﺍﻟﻘﻮﻝ ﻣﻦ ﺃﻥ ﺍﻟﻮﺳﻴﻠﺔ ﺍﻷﻛﺜﺮ ﻓﻌﺎﻟﻴﺔ ﳌﻨﻊ ﺍﻟﻮﻟﻮﺝ ﻏﲑ ﺍﳌﺼﺮﺡ ﺑﻪ ﺗﺘﻤﺜﻞ‬
‫ﺑﻄﺒﻴﻌﺔ ﺍﳊﺎﻝ ﰲ ﺍﻟﺘﻬﺪﻳﺪ ﺑﻘﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ‪ ،‬ﻭﻣﻊ ﺫﻟﻚ ﻓﺈﻥ ﻫﺬﺍ ﺍﻟﻌﺮﺽ ﻻ ﻳﻜﻮﻥ ﻣﻜﺘﻤﻼ ﺩﻭﻥ ﺗﺒﲏ ﻭﻭﺿﻊ ﺇﺟﺮﺍﺀﺍﺕ ﺃﻣﻨﻴﺔ ﻓﻌﺎﻟﺔ‪ .‬ﺃﻧﻈﺮ ﰲ ﺫﻟﻚ‬
‫ﺩ‪.‬ﻫﻼﱄ ﻋﺒﺪ ﺍﷲ ﺃﲪﺪ‪ .‬ﺍﳉﻮﺍﻧﺐ ﺍﻹﺟﺮﺍﺋﻴﺔ ﻭ ﺍﳌﻮﺿﻮﻋﻴﺔ ﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﺿﻮﺀ ﺍﺗﻔﺎﻗﻴﺔ ﺑﻮﺩﺍﺑﺴﺖ‪ .‬ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ ‪.‬ﺍﻟﻘﺎﻫﺮﺓ‪ 2003‬ﺹ ‪.71‬‬
‫)‪ (2‬ﺧﺎﻟﺪ ﳑﺪﻭﺡ ﺍﺑﺮﺍﻫﻴﻢ‪ ،‬ﺃﻣﻦ ﺍﳌﻌﻠﻮﻣﺎﺕ‪،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ ‪.38‬‬

‫‪- 71 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﻟﺒﻴﻮﻟﻮﺟﻴﺔ ﺍﻟﱵ ﺗﻌﺘﻤﺪ ﻋﻠﻰ ﲰﺎﺕ ﻣﻌﻴﻨﺔ ﰲ ﺷﺨﺺ ﺍﳌﺴﺘﺨﺪﻡ ﻣﺘﺼﻠﺔ ﺑﺒﻨﺎﺋﻪ ﺍﻟﺒﻴﻮﻟﻮﺟﻲ ﻛﻤﺎ ﺗﻈﻢ ﺃﻳﻀﺎ‬
‫ﻣﺎ ﻳﻌﺮﻑ ﺑﺎﻷﻗﻔﺎﻝ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺍﻟﱵ ﲢﺪﺩ ﻣﻨﺎﻃﻖ ﺍﻟﻨﻔﺎﺫ‪.‬‬
‫‪ .2‬ﺍﻟﻮﺳﺎﺋﻞ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﻟﺘﺤﻜﻢ ﰲ ﺍﻟﺪﺧﻮﻝ ﻭﺍﻟﻨﻔﺎﺫ ﺇﱃ ﺍﻟﺸﺒﻜﺔ‪ :‬ﻭﻫﻲ ﺍﻟﻮﺳﺎﺋﻞ ﺍﻟﱵ ﺗﺴﺎﻋﺪ ﻋﻠﻰ‬
‫ﺍﻟﺘﺄﻛﺪ ﻣﻦ ﺃﻥ ﺍﻟﺸﺒﻜﺔ ﻗﺪ ﺍﺳﺘﺨﺪﻣﺖ ﺑﻄﺮﻳﻘﺔ ﻣﺸﺮﻭﻋﺔ ﻭﻣﻦ ﺃﻫﻢ ﺍﻟﻮﺳﺎﺋﻞ ﺍﻟﻔﻨﻴﺔ ﺍﳌﻌﺘﻤﺪ ﻋﻠﻴﻬﺎ ﻣﺎ‬
‫ﻳﻌﺮﻑ ﺑﺎﳉﺪﺭﺍﻥ ﺍﻟﻨﺎﺭﻳﺔ ﻭﺍﻟﱵ ﻫﻲ ﻋﺒﺎﺭﺓ ﻋﻦ ﺑﺮﺍﻣﺞ ﺗﺜﺒﺖ ﺩﺍﺧﻞ ﺍﻟﻨﻈﺎﻡ ﺑﻐﺮﺽ ﻣﺮﺍﻗﺒﺔ ﺍﳌﻨﺎﻓﺬ ﺍﻟﱵ ﻳﺘﻢ‬
‫ﻣﻦ ﺧﻼﳍﺎ ﻧﻘﻞ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻣﻦ ﻭﺇﻟىﺎﳉﻬﺎﺯ ﺃﺛﻨﺎﺀ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻊ ﺷﺒﻜﺔ ﺍﻹﻧﺘﺮﻧﺎﺕ‪ ،‬ﻓﻴﺘﻢ ﺇﺟﺒﺎﺭ ﲨﻴﻊ‬
‫ﻋﻤﻠﻴﺎﺕ ﺍﻟﺪﺧﻮﻝ ﺇﱃ ﺍﻟﺸﺒﻜﺔ ﺃﻭ ﺍﳋﺮﻭﺝ ﻣﻨﻬﺎ ﺑﺄﻥ ﲤﺮ ﻣﻦ ﺧﻼﻝ ﻫﺬﺍ ﺍﳉﺪﺍﺭ ﺍﻟﻨﺎﺭﻱ ﻭﺍﻟﺬﻱ ﳝﻨﻊ ﺃﻱ‬
‫ﳐﺘﺮﻕ ﺃﻭ ﻣﺘﻄﻔﻞ ﻣﻦ ﺍﻟﻮﺻﻮﻝ ﺇﱃ ﺍﻟﺸﺒﻜﺔ‪ .‬ﻭﺫﻟﻚ ﻋﻦ ﻃﺮﻳﻖ ﻣﺮﺍﻗﺒﺔ ﺍﳊﺰﻡ ﺍﻟﺬﻱ ﻳﺘﻢ ﺇﺭﺳﺎﳍﺎ‬
‫ﻭﺍﺳﺘﻘﺒﺎﳍﺎ ﻣﻦ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﺍﳋﺎﺹ ﺑﺎﳌﺴﺘﺨﺪﻡ‪ .‬ﻭﻋﻨﺪ ﻣﺮﺍﻗﺒﺔ ﺍﳉﺪﺍﺭ ﺍﻟﻨﺎﺭﻱ ﳍﺬﻩ ﺍﳊﺰﻡ ﻭﺍﳌﻨﺎﻓﺬ ﺍﻟﱵ‬
‫ﺗﺮﺳﻞ ﻭﺗﺴﺘﻘﺒﻞ ﻣﻦ ﺧﻼﳍﺎ ﻓﺈﻥ ﻋﻠﻴﻪ ﺍﻟﺴﻤﺎﺡ ﺃﻭ ﺍﻻﻋﺘﺮﺍﺽ ﻋﻠﻰ ﺩﺧﻮﻝ ﻫﺬﻩ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺃﻭ ﺧﺮﻭﺟﻬﺎ‪.‬‬
‫ﻭﺗﻨﺒﻪ ﺍﳌﺴﺘﺨﺪﻡ ﻟﺬﻟﻚ‪.‬‬
‫‪ .3‬ﺍﻟﻮﺳﺎﺋﻞ ﺍﻟﱵ ‪‬ﺪﻑ ﺇﱃ ﻣﻨﻊ ﺇﻓﺸﺎﺀ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻟﻐﲑ ﺍﳌﺨﻮﻟﲔ ﺃﻭ ﺍﳌﺼﺮﺡ ﳍﻢ ﺑﺬﻟﻚ‪ :‬ﻭ‪‬ﺪﻑ‬
‫ﻫﺬﻩ ﺍﻟﻮﺳﺎﺋﻞ ﺇﱃ ﺿﻤﺎﻥ ﺳﺮﻳﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺗﺸﻤﻞ ﺗﻘﻨﻴﺎﺕ ﺗﺸﻔﲑ ﺍﳌﻌﻄﻴﺎﺕ ﻭﺍﳌﻠﻔﺎﺕ‪ ،‬ﺇﺟﺮﺍﺀﺍﺕ ﲪﺎﻳﺔ‬
‫ﻧﺴﺦ ﺍﳊﻔﻆ ﺍﻻﺣﺘﻴﺎﻃﻴﺔ‪ ،‬ﺑﺮﺍﻣﺞ ﺍﻟﻔﻠﺘﺮﺍﺕ)‪ (Filtration‬ﻭﺍﳌﻮﺟﻬﺎﺕ‪.‬‬
‫‪ .4‬ﺍﻟﻮﺳﺎﺋﻞ ﺍﻟﱵ ‪‬ﺪﻑ ﺇﱃ ﲪﺎﻳﺔ ﺍﻟﺘﻜﺎﻣﻠﻴﺔ ﻭﺳﻼﻣﺔ ﺍﶈﺘﻮﻯ ﻭﻫﻲ ﺍﻟﻮﺳﺎﺋﻞ ﺍﳌﻨﺎﻁ ‪‬ﺎ ﺿﻤﺎﻥ‬
‫ﻋﺪﻡ ﺗﻌﺪﻳﻞ ﳏﺘﻮﻯ ﺍﳌﻌﻄﻴﺎﺕ ﻣﻦ ﻗﺒﻞ ﺟﻬﺔ ﻏﲑ ﳐﻮﻟﺔ ﳍﺎ ﺫﻟﻚ‪ ،‬ﻭﻣﻦ ﺃﳘﻬﺎ ﺑﺮﺍﻣﺞ ﲢﺮﻱ ﺍﻟﻔﲑﻭﺳﺎﺕ‬
‫)ﻭﻣﻀﺎﺩﺍﺕ ﺍﻟﻔﲑﻭﺳﺎﺕ( ‪.Antivirus‬‬
‫‪ .5‬ﺍﻟﻮﺳﺎﺋﻞ ﺍﳌﺘﻌﻠﻘﺔ ﲟﻨﻊ ﺍﻹﻧﻜﺎﺭ‪ :‬ﻭ‪‬ﺪﻑ ﻫﺬﻩ ﺍﻟﻮﺳﺎﺋﻞ ﺇﱃ ﺿﻤﺎﻥ ﻋﺪﻡ ﻗﺪﺭﺓ ﺍﻟﺸﺨﺺ‬
‫ﺍﳌﺴﺘﺨﺪﻡ ﻋﻠﻰ ﺇﻧﻜﺎﺭ ﺃﻧﻪ ﻫﻮ ﺍﻟﺬﻱ ﻗﺎﻡ ﺑﺎﻟﺘﺼﺮﻑ‪ ،‬ﻭﺗﺮﺗﻜﺰ ﻫﺬﻩ ﺍﻟﻮﺳﺎﺋﻞ ﺑﺼﻔﺔ ﺃﺳﺎﺳﻴﺔ ﻋﻠﻰ ﺗﻘﻨﻴﺎﺕ‬
‫ﺍﻟﺘﻮﻗﻴﻊ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻭﺷﻬﺎﺩﺍﺕ ﺍﻟﺘﻮﺛﻴﻖ ﺍﻟﺼﺎﺩﺭﺓ ﻣﻦ ﻃﺮﻑ ﺛﺎﻟﺚ‪.‬‬
‫‪ .6‬ﻭﺳﺎﺋﻞ ﻣﺮﺍﻗﺒﺔ ﺍﻹﺳﺘﺨﺪﺍﻡ ﻭﺗﺘﺒﻊ ﺳﺠﻼﺕ ﺍﻟﻨﻔﺎﺫ ﻭﺍﻷﺩﺍﺀ ﻭﻫﻲ ﺍﻟﺘﻘﻨﻴﺎﺕ ﺍﻟﱵ ﺗﺴﺘﺨﺪﻡ ﳌﺮﺍﻗﺒﺔ‬
‫ﻣﺴﺘﺨﺪﻣﻲ ﺍﻟﻨﻈﺎﻡ ﻭﲢﺪﻳﺪ ﺍﻟﺸﺨﺺ ﺍﻟﺬﻱ ﻗﺎﻡ ﺑﺎﻟﻌﻤﻞ ﺍﳌﻌﲔ ﰲ ﺍﻟﻮﻗﺖ ﺍﳌﻌﲔ ﻭﺗﺸﻤﻞ ﻛﺎﻓﺔ ﺃﻧﻮﺍﻉ‬
‫ﺍﻟﱪﳎﻴﺎﺕ ﻭﺍﻟﺴﺠﻼﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺍﻟﱵ ﲢﺪﺩ ﺍﻹﺳﺘﺨﺪﺍﻡ‪.‬‬

‫ﻭﻫﺬﻩ ﺍﻟﻮﺳﻴﻠﺔ ﻗﺪ ﺃﺷﺎﺭ ﺇﻟﻴﻬﺎ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ‪) 04/09‬ﺍﻟﺘﺰﺍﻣﺎﺕ ﻣﺰﻭﺩﻱ ﺍﳋﺪﻣﺔ (‬
‫ﰲ ﺍﳌﺎﺩﺓ ‪ 10‬ﻣﻨﻪ‪ ،‬ﺣﻴﻨﻤﺎ ﺃﻟﺰﻡ ﻣﻘﺪﻣﻲ ﺍﳋﺪﻣﺎﺕ ﺍﻟﻌﻤﻞ ﻋﻠﻰ ﺣﻔﻆ ﺍﳌﻌﻄﻴﺎﺕ ﺍﻟﱵ ﺗﺴﻤﺢ ﺑﺎﻟﺘﻌﺮﻑ‬
‫‪- 72 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻋﻠﻰ ﻣﺴﺘﻌﻤﻠﻲ ﺍﳋﺪﻣﺔ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺘﺎﺭﻳﺦ ﻭﻭﻗﺖ ﻭﻣﺪﺓ ﻛﻞ ﺍﺗﺼﺎﻝ ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺣﻔﻆ ﺍﳌﻌﻄﻴﺎﺕ ﺍﻟﱵ‬
‫ﺗﺴﻤﺢ ﺑﺎﻟﺘﻌﺮﻑ ﻋﻠﻰ ﺍﳌﺮﺳ‪‬ﻞ ﺇﻟﻴﻪ ﺍﻻﺗﺼﺎﻝ ﻭﻋﻨﻮﺍﻥ ﺍﳌﻮﻗﻊ ﺍﳌﻄﻠﻊ ﻋﻠﻴﻪ‪.‬‬

‫ﻭﲡﺪﺭ ﺍﻹﺷﺎﺭﺓ ﺃﻥ ﻛﻞ ﻣﺆﺳﺴﺔ ﺃﻭ ﻫﻴﺄﺓ ﳍﺎ ﻃﺮﻳﻘﺘﻬﺎ ﺍﳋﺎﺻﺔ ﰲ ﺗﻮﻓﲑ ﺍﻷﻣﻦ ﺍﻟﻔﲏ ﰲ ﺣﺪﻭﺩ‬
‫ﻣﺘﻄﻠﺒﺎﺕ ﲪﺎﻳﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﻓﻼ ﺗﻜﻮﻥ ﺇﺟﺮﺍﺀﺍﺕ ﺍﻷﻣﻦ ﺍﻟﻔﲏ‪ ،‬ﺭﺧﻮﺓ ﺿﻌﻴﻔﺔ ﻻ ﺗﻜﻔﻞ ﺍﳊﻤﺎﻳﺔ‬
‫ﻭﺑﺎﳌﻘﺎﺑﻞ ﻻ ﺗﻜﻮﻥ ﻣﺒﺎﻟﻐﺎﹰ ﻓﻴﻬﺎ ﺇﱃ ﺣﺪ ﻳﺆﺛﺮ ﻋﻠﻰ ﻋﻨﺼﺮ ﺍﻷﺩﺍﺀ ﰲ ﺍﻟﻨﻈﺎﻡ ﳏﻞ ﺍﳊﻤﺎﻳﺔ‪ ،‬ﻓﺘﻌﻘﻴﺪ ﺍﳊﻤﺎﻳﺔ‬
‫ﻋﻠﻰ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻟﺪﺭﺟﺔ ﻳﺼﻌﺐ ﻓﻴﻬﺎ ﺣﱴ ﻋﻠﻰ ﺍﳌﺨﻮﻟﲔ ﺍﻟﻮﺻﻮﻝ ﺇﻟﻴﻬﺎ ﻗﺪ ﻳﺪﻓﻊ ﻻﺣﻘﺎ ﺇﱃ ﺇﳘﺎﻝ ﻛﻞ‬
‫ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﻷﻣﻨﻴﺔ‪ ،‬ﳑﺎ ﳚﻌﻞ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻋﺮﺿﺔ ﻟﻠﺨﺮﻕ ﻭﻫﺬﺍ ﻣﺎ ﻳﺴﻤﻰ ﻟﺪﻯ ﺍﳋﱪﺍﺀ ﺍﻟﺘﻘﻨﻴﲔ ﰲ ﳎﺎﻝ‬
‫ﺃﻣﻦ ﺍﳌﻌﻠﻮﻣﺎﺕ "ﺍﻟﺘﺄﺛﲑ ﻋﻠﻰ ﺻﺤﺔ ﺍﻷﺩﺍﺀ ﻭﻓﻌﺎﻟﻴﺘﻪ"‪.‬‬

‫ﻭﰲ ﺍﳊﻘﻴﻘﺔ ﻓﺈﻥ ﲨﻴﻊ ﻫﺬﻩ ﺍﻟﻮﺳﺎﺋﻞ ﺍﻟﻐﺮﺽ ﻣﻨﻬﺎ ﻫﻮ ﲢﻘﻴﻖ ﺃﻣﻦ ﻣﻌﻠﻮﻣﺎﰐ ﺃﻓﻀﻞ ﺿﻤﻦ ﻓﻀﺎﺀ‬
‫ﺍﻓﺘﺮﺍﺿﻲ ﻳﺘﻢ ﻓﻴﻪ ﺗﺒﺎﺩﻝ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﺮﻗﻤﻴﺔ ﻭﲡﺮﻱ ﻋﱪﻩ ﻛﺎﻓﺔ ﺃﻧﻮﺍﻉ ﺍﳌﻌﺎﻣﻼﺕ ﻭﺍﳋﺪﻣﺎﺕ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ‬
‫ﺑﻮﺍﺳﻄﺔ ﺗﻘﻨﻴﺎﺕ ﻭﺑﺮﳎﻴﺎﺕ ﻭﺑﺮﻭﺗﻮﻛﺎﻻﺕ ﺗﺘﺠﺪﺩ ﻭﺗﺘﻄﻮﺭ ﺑﺸﻜﻞ ﻣﺘﺴﺎﺭﻉ‪ ،‬ﻟﺬﻟﻚ ﻓﺈﻥ ﺍﻷﻣﺮ ﻳﻘﺘﻀﻲ‬
‫ﺇﺟﺮﺍﺀ ﻋﻤﻠﻴﺎﺕ ﺗﻘﻴﻴﻢ ﻟﻶﺛﺎﺭ ﺍﻟﻨﺎﲨﺔ ﻋﻦ ﻫﺬﻩ ﺍﻟﻮﺳﺎﺋﻞ ﻣﻦ ﺃﺟﻞ ﺍﻟﻮﻗﻮﻑ ﻋﻠﻰ ﻣﺪﻯ ﳒﺎﻋﺘﻬﺎ ﰲ ﲢﻘﻴﻖ‬
‫ﺍﻟﻨﺘﺎﺋﺞ ﺍﳌﺮﺟﻮﺓ ﻣﻨﻬﺎ‪.‬‬

‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺍﳊﻤﺎﻳﺔ ﺍﻟﻔﻨﻴﺔ ﻋﻦ ﻃﺮﻳﻖ ﻧﻈﺎﻡ ﺍﻟﺮﻗﺎﺑﺔ ﺍﻟﻮﻗﺎﺋﻴﺔ ﻋﱪ ﺍﻟﻮﺳﺎﺋﻞ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ‬

‫ﻣﻦ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻟﻔﻨﻴﺔ ﺍﻟﻮﻗﺎﺋﻴﺔ ﺍﻟﱵ ﺗﺴﻤﺢ ﺑﺎﻟﺮﺻﺪ ﺍﳌﺒﻜﺮ ﻟﻺﻋﺘﺪﺍﺀﺍﺕ ﺍﶈﺘﻤﻠﺔ ﻋﻠﻰ ﺍﻟﻨﻈﺎﻡ ﻭﺍﻟﺘﺪﺧﻞ‬
‫ﺍﻟﺴﺮﻳﻊ ﻟﺘﺤﺪﻳﺪ ﻣﺼﺪﺭﻫﺎ ﻭﺍﻟﺘﻌﺮﻑ ﻋﻠﻰ ﻣﺮﺗﻜﺒﻴﻬﺎ ﻧﻈﺎﻡ ﺍﳌﺮﺍﻗﺒﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﺇﺫ ﻳﻌﺪ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ ﻣﻦ‬
‫ﺑﲔ ﺃﻫﻢ ﺁﻟﻴﺎﺕ ﺍﻟﻮﻗﺎﻳﺔ ﻣﻦ ﺟﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫ﻭﻳﻘﺼﺪ ﲟﺮﺍﻗﺒﺔ ﺍﻹﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﺍﻟﻌﻤﻞ ﺍﻟﺬﻱ ﻳﻘﻮﻡ ﺑﻪ ﺍﳌﺮﺍﻗﺐ ﺑﺎﺳﺘﺨﺪﺍﻡ ﺍﻟﺘﻘﻨﻴﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‬
‫ﳉﻤﻊ ﻣﻌﻄﻴﺎﺕ ﻭﻣﻌﻠﻮﻣﺎﺕ ﻋﻦ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﺳﻮﺍﺀ ﺃﻛﺎﻥ ﺷﺨﺼﺎ ﺃﻭ ﻣﻜﺎﻧﺎ ﺃﻭ ﺷﻴﺌﺎ ﺣﺴﺐ ﻃﺒﻴﻌﺘﻪ‬
‫ﻣﺮﺗﺒﻄﺎ ﺑﺎﻟﺰﻣﻦ ﻟﺘﺤﻘﻴﻖ ﻏﺮﺽ ﺃﻣﲏ)‪.(1‬‬

‫)‪ (1‬ﺭﺷﻴﺪﺓ ﺑﻮﻛﺮ‪،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ ‪.370‬‬

‫‪- 73 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻭﱂ ﻳﺘﻄﺮﻕ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﺷﺄﻧﻪ ﺷﺄﻥ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﳌﻘﺎﺭﻧﺔ ﺇﱃ ﲢﺪﻳﺪ ﺍﳌﻘﺼﻮﺩ ﲟﺮﺍﻗﺒﺔ‬
‫ﺍﻹﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﻣﻜﺘﻒ ﻓﻘﻂ ﺑﺘﺤﺪﻳﺪ ﻣﻔﻬﻮﻡ ﺍﻹﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ)‪ (1‬ﺭﻏﻢ ﺃﺧﺬﻩ ‪‬ﺬﺍ‬
‫ﺍﻟﻨﻈﺎﻡ ﲟﻮﺟﺐ ﺍﳌﺎﺩﺓ ‪ 03‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﺍﳌﺘﻌﻠﻖ ﺑﺎﻟﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ‬
‫ﺍﻹﻋﻼﻡ ﻭﺍﻹﺗﺼﺎﻝ‪ ،‬ﻭﺍﻟﱵ ﺗﻨﺺ ﻋﻠﻰ ﺇﻣﻜﺎﻧﻴﺔ ﻭﺿﻊ ﺍﻟﺘﺮﺗﻴﺒﺎﺕ ﺍﻟﺘﻘﻨﻴﺔ ﳌﺮﺍﻗﺒﺔ ﺍﻹﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‬
‫ﻭﲡﻤﻴﻊ ﻭﺗﺴﺠﻴﻞ ﳏﺘﻮﺍﻫﺎ ﰲ ﺣﻴﻨﻬﺎ‪ ،‬ﺇﺫﺍ ﺗﻄﻠﺒﺖ ﺫﻟﻚ ﲪﺎﻳﺔ ﺍﻟﻨﻈﺎﻡ ﺍﻟﻌﺎﻡ ﺃﻭ ﻣﺴﺘﻠﺰﻣﺎﺕ ﺍﻟﺘﺤﺮﻳﺎﺕ ﺃﻭ‬
‫ﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳉﺎﺭﻳﺔ‪ .‬ﻭﺫﻟﻚ ﻣﻊ ﻣﺮﺍﻋﺎﺓ ﺍﻷﺣﻜﺎﻡ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﱵ ﺗﺘﻀﻤﻦ ﺳﺮﻳﺔ ﺍﳌﺮﺍﺳﻼﺕ‬
‫) ‪(2‬‬
‫ﻭﺍﻹﺗﺼﺎﻻﺕ‪.‬‬

‫ﻭﰲ ﻫﺬﺍ ﺍﻹﻃﺎﺭ ﳒﺪ ﺃﻥ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻗﺪ ﻣﻴﺰ ﺑﲔ ﻧﻮﻋﲔ ﻣﻦ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﳏﻞ‬
‫ﺍﳌﺮﺍﻗﺒﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﻭﳘﺎ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﲝﺮﻛﺔ ﺍﻟﺴﲑ )ﻣﻌﻄﻴﺎﺕ ﺍﳌﺮﻭﺭ( ﻭﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ‬
‫ﲟﺤﺘﻮﻯ ﺍﻹﺗﺼﺎﻝ‪ ،‬ﻓﺒﺎﻟﻨﺴﺒﺔ ﻟﻠﻨﻮﻉ ﺍﻷﻭﻝ ﻓﻘﺪ ﻋﺮﻓﻬﺎ ﺍﳌﺸﺮﻉ ﲟﻮﺟﺐ ﺍﳌﺎﺩﺓ ‪ 02‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪04/09‬‬
‫ﺑﺄ‪‬ﺎ "ﺃﻱ ﻣﻌﻄﻴﺎﺕ ﻣﺘﻌﻠﻘﺔ ﺑﺎﻹﺗﺼﺎﻝ ﻋﻦ ﻃﺮﻳﻖ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﻨﺘﺠﻬﺎ ﻫﺬﻩ ﺍﻷﺧﲑﺓ ﺑﺎﻋﺘﺒﺎﺭﻫﺎ‬
‫ﺟﺰﺀﺍ ﰲ ﺣﻠﻘﺔ ﺍﺗﺼﺎﻻﺕ ﺗﻮﺿﺢ ﻣﺼﺪﺭ ﺍﻹﺗﺼﺎﻝ‪ ،‬ﻭﺍﻟﻮﺟﻬﺔ ﺍﳌﺮﺳﻠﺔ ﺇﻟﻴﻬﺎ ﻭﺍﻟﻄﺮﻳﻖ ﺍﻟﺬﻱ ﻳﺴﻠﻜﻪ‬
‫ﻭﻭﻗﺖ ﻭﺗﺎﺭﻳﺦ ﻭﺣﺠﻢ ﻭﻣﺪﺓ ﺍﻹﺗﺼﺎﻝ ﻭﻧﻮﻉ ﺍﳋﺪﻣﺔ‪ (3)،‬ﺃﻣﺎ ﺍﻟﻨﻮﻉ ﺍﻟﺜﺎﱐ ﻭﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﶈﺘﻮﻯ ﻓﻠﻢ ﻳﺄﺕ‬
‫ﻋﻠﻰ ﺗﻌﺮﻳﻔﻬﺎ‪ ،‬ﻭﺇﻥ ﻛﺎﻧﺖ ﺗﺘﻌﻠﻖ ﲟﻀﻤﻮﻥ ﺍﻹﺗﺼﺎﻝ ﺃﻭ ﺍﻟﺮﺳﺎﻟﺔ ﺃﻭ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﻨﻘﻮﻟﺔ ﻋﻦ ﻃﺮﻳﻖ‬
‫ﺍﻹﺗﺼﺎﻝ ﻓﻴﻤﺎ ﻋﺪﺍ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﳌﺮﻭﺭ‪ ،‬ﻭﺍﻋﺘﱪ ﺍﳌﺸﺮﻉ ﺃﻥ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﺍﻷﺧﲑ ﻣﻦ ﺍﳌﻌﻄﻴﺎﺕ ﻫﻮ‬
‫ﻣﺎ ﻳﻜﻮﻥ ﳏﻼ ﻟﻠﻤﺮﺍﻗﺒﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻋﻨﺪﻣﺎ ﺃﺩﺭﺟﻬﺎ ﰲ ﺍﳌﺎﺩﺓ ‪ 04‬ﲢﺖ ﻣﺴﻤﻰ ﻣﺮﺍﻗﺒﺔ ﺍﻹﺗﺼﺎﻻﺕ‬

‫)‪ (1‬ﺍﳌﺎﺩﺓ ‪ 02‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﻋﺮﻓﺖ ﺍﻻﺗﺼﺎﻻﺕ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ ﺑﺄ‪‬ﺎ "ﺃﻱ ﺗﺮﺍﺳﻞ ﺃﻭ ﺇﺭﺳﺎﻝ ﺃﻭ ﺍﺳﺘﻘﺒﺎﻝ ﻋﻼﻣﺎﺕ ﺃﻭ ﺇﺷﺎﺭﺍﺕ ﺃﻭ ﻛﺘﺎﺑﺎﺕ ﺃﻭ ﺻﻮﺭ‬
‫ﺃﻭ ﺃﺻﻮﺍﺕ ﺃﻭ ﻣﻌﻠﻮﻣﺎﺕ ﳐﺘﻠﻔﺔ ﺑﻮﺍﺳﻄﺔ ﺃﻱ ﻭﺳﻴﻠﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﺔ"‪.‬‬
‫)‪ (2‬ﻧﺼﺖ ﺍﳌﺎﺩﺓ ‪ 21‬ﻣﻦ ﺍﻹﺗﻔﺎﻗﻴﺔ ﺍﻷﻭﺭﻭﺑﻴﺔ ﳌﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﻮﺩﺍﺑﺴﺖ ﲢﺖ ﻋﻨﻮﺍﻥ ﺇﻋﺘﺮﺍﺽ ﻣﻌﻄﻴﺎﺕ ﺍﶈﺘﻮﻯ ﻋﻠﻰ ﺃﻧﻪ‪" :‬ﳚﺐ ﻋﻠﻰ ﻛﻞ‬
‫ﻃﺮﻑ ﺃﻥ ﻳﺘﺒﲎ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﻟﺘﺸﺮﻳﻌﻴﺔ ﻭﺃﻳﺔ ﺇﺟﺮﺍﺀﺍﺕ ﺃﺧﺮﻯ ﻳﺮﻯ ﺃ‪‬ﺎ ﺿﺮﻭﺭﻳﺔ ﻣﻦ ﺃﺟﻞ ﲢﻮﻳﻞ ﺍﻟﺴﻠﻄﺎﺕ ﺍﳌﺨﺘﺼﺔ ﻓﻴﻤﺎ ﻳﺘﻌﻠﻖ ﺑﺎﳉﺮﺍﺋﻢ ﺍﳋﻄﲑﺓ ﺍﻟﱵ‬
‫ﳛﺪﺩﻫﺎ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﺪﺍﺧﻠﻲ ﺍﳌﻜﻨﺎﺕ ﺍﻟﺘﺎﻟﻴﺔ‪:‬‬
‫‪ -‬ﲨﻊ ﺃﻭ ﺗﺴﺠﻴﻞ ﻋﻦ ﻃﺮﻳﻖ ﺗﻄﺒﻴﻖ ﺍﻟﻮﺳﺎﺋﻞ ﺍﻟﻔﻨﻴﺔ ﺍﳌﺘﻮﺍﺟﺪﺓ ﻋﻠﻰ ﺃﺭﺿﻪ‪.‬‬
‫‪ -‬ﺇﻟﺰﺍﻡ ﻣﻘﺪﻡ ﺍﳋﺪﻣﺔ ﰲ ﻧﻄﺎﻕ ﻗﺪﺭﺍﺗﻪ ﺍﻟﻔﻨﻴﺔ ﺍﳌﺘﻮﺍﻓﺮﺓ ﻋﻠﻰ ﺃﻥ ﳝﻨﺢ ﺍﻟﺴﻠﻄﺎﺕ ﺍﳌﺨﺘﺼﺔ ﻋﻮﻥ ﻭﻣﺴﺎﻋﺪﺗﻪ ﻣﻦ ﺃﺟﻞ ﲡﻤﻴﻊ ﺃﻭ ﺗﺴﺠﻴﻞ ﰲ ﺍﻟﻮﻗﺖ ﺍﻟﻔﻌﻠﻲ‬
‫ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﲟﺤﺘﻮﻯ ﺇﺗﺼﺎﻻﺕ ﻣﻌﻴﻨﺔ‪.‬‬
‫)‪ (3‬ﻧﺼﺖ ﺍﳌﺎﺩﺓ ﺍﻷﻭﱃ ﻣﻦ ﺍﺗﻔﺎﻗﻴﺔ ﺑﻮﺍﺩﺍﺑﺴﺖ ﻋﻠﻰ ﺗﻌﺮﻳﻒ ﳌﻌﻄﻴﺎﺕ ﺍﳌﺮﻭﺭ ﻛﻤﺎ ﻳﻠﻲ‪" :‬ﺃ‪‬ﺎ ﻛﻞ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻟﱵ ﺗﻌﺎﰿ ﺍﻹﺗﺼﺎﻻﺕ ﺍﻟﱵ ﲤﺮ ﻋﻦ ﻃﺮﻳﻖ ﻧﻈﺎﻡ‬
‫ﻣﻌﻠﻮﻣﺎﰐ ﻭﺍﻟﱵ ﺗﺘﻢ ﺇﻧﺘﺎﺟﻬﺎ ﺑﻮﺍﺳﻄﺔ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺑﻮﺻﻔﻪ ﻋﻨﺼﺮﺍ ﰲ ﺳﻠﺴﻠﺔ ﺍﻻﺗﺼﺎﻝ ﻣﻊ ﺗﻌﻴﲔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﺘﺎﻟﻴﺔ‪ :‬ﺃﺻﻞ ﺍﻹﺗﺼﺎﻝ ﻣﻘﺼﺪ ﺍﻹﺗﺼﺎﻝ‬
‫ﺍﳉﻬﺔ ﺍﳌﻘﺼﻮﺩﺓ ﺑﺎﻻﺗﺼﺎﻝ‪ ،‬ﺧﻂ ﺍﻟﺴﲑ‪ ،‬ﺳﺎﻋﺔ ﻭﺗﺎﺭﻳﺦ ﺍﻻﺗﺼﺎﻝ‪ ،‬ﺣﺠﻢ ﻭﻓﺘﺮﺓ ﺍﻻﺗﺼﺎﻝ‪ ،‬ﺃﻭ ﻧﻮﻉ ﺍﳋﺪﻣﺔ"‪.‬‬

‫‪- 74 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﺃﻣﺎ ﺍﻟﻨﻮﻉ ﺍﻷﻭﻝ ﻓﻘﺪ ﺧﺼﻬﺎ ﺑﺈﺟﺮﺍﺀ ﺁﺧﺮ ﲢﺖ ﻣﺴﻤﻰ ﺣﻔﻆ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﲝﺮﻛﺔ‬
‫ﺍﻟﺴﲑ ﰲ ﺍﳌﺎﺩﺓ ‪.11‬‬

‫ﻭﻗﺪ ﺃﻛﺪﺕ ﺇﺗﻔﺎﻗﻴﺔﺑﻮﺩﺍﺳﺒﺖ ﻫﺬﺍ ﺍﻟﺘﻤﻴﻴﺰ‪ ،‬ﺣﻴﺚ ﺃﺩﺭﺟﺖ ﻛﻞ ﺇﺟﺮﺍﺀ ﻋﻠﻰ ﺣﺪﻯ ﲢﺖ ﻋﻨﻮﺍﻥ‬
‫ﺧﺎﺹ‪ ،‬ﻓﺨﺼﺖ ﺣﺮﻛﺔ ﺍﳌﻌﻄﻴﺎﺕ ﺑﻌﻨﻮﺍﻥ ﺍﻟﺘﺠﻤﻴﻊ ﰲ ﺍﻟﻮﻗﺖ ﺍﻟﻔﻌﻠﻲ ﳌﻌﻄﻴﺎﺕ ﺍﳌﺮﻭﺭ )ﺍﳌﺎﺩﺓ ‪ (20‬ﺃﻣﺎ‬
‫ﳏﺘﻮﻯ ﺍﳌﻌﻄﻴﺎﺕ ﻓﺠﺎﺀ ﲢﺖ ﻋﻨﻮﺍﻥ ﺇﻋﺘﺮﺍﺽ ﻣﻌﻄﻴﺎﺕ ﺍﶈﺘﻮﻯ"‪.‬‬

‫ﻭﺍﳌﻼﺣﻆ ﺃﻧﻪ ﻭﺇﻥ ﻛﺎﻥ ﻣﻦ ﺍﳌﻘﺒﻮﻝ ﺃﻥ ﻛﻼ ﻣﻦ ﺍﻟﻨﻮﻋﲔ ﻣﻦ ﺍﳌﻌﻄﻴﺎﺕ ﳝﻜﻦ ﺃﻥ ﲤﺲ ﻣﺼﺎﱀ‬


‫ﺫﺍﺕ ﻃﺒﻴﻌﺔ ﺧﺎﺻﺔ‪ ،‬ﺇﻻ ﺃﻧﻪ ﻭﺑﺎﻟﻨﺴﺒﺔ ﳌﻌﻄﻴﺎﺕ ﺍﶈﺘﻮﻯ ﻓﺈﻥ ﺍﳌﺼﺎﱀ ﺍﻟﻔﺮﺩﻳﺔ ﺗﻜﻮﻥ ﺃﻋﻠﻰ ﻧﻈﺮﺍ ﻟﻄﺒﻴﻌﺔ‬
‫ﳏﺘﻮﻯ ﺍﳌﻌﻄﻴﺎﺕ‪ ،‬ﻭﻣﻦ ﻫﺬﺍ ﺍﳌﻨﻈﻮﺭ ﳝﻜﻦ ﻓﺮﺽ ﻗﻴﻮﺩ ﻋﻠﻰ ﳏﺘﻮﻯ ﺍﳌﻌﻄﻴﺎﺕ ﺑﺸﻜﻞ ﺃﺷﺪ ﻣﻦ ﺗﻠﻚ‬
‫ﺍﳋﺎﺻﺔ ﲟﻌﻄﻴﺎﺕ ﺍﳌﺮﻭﺭ‪.‬‬

‫ﻭﳑﺎ ﻻﺷﻚ ﻓﻴﻪ ﺃﻥ ﻫﺬﻩ ﺍﳌﺮﺍﻗﺒﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﶈﺘﻮﻯ ﺍﻹﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻣﻦ ﺷﺄ‪‬ﺎ ﺍﳌﺴﺎﺱ‬
‫ﺑﺎﳊﻖ ﰲ ﺍﳋﺼﻮﺻﻴﺔ‪ ،‬ﻟﺬﻟﻚ ﻓﺈﻧﻪ ﻳﻨﺒﻐﻲ ﺇﺣﺎﻃﺘﻬﺎ ﲜﻤﻠﺔ ﻣﻦ ﺍﻟﻀﻤﺎﻧﺎﺕ ﺑﻐﺮﺽ ﲢﻘﻴﻖ ﺍﻟﺘﻮﺍﺯﻥ ﺑﲔ ﺣﻖ‬
‫ﺍﻹﻧﺴﺎﻥ ﰲ ﺍﳋﺼﻮﺻﻴﺔ ﻭﲪﺎﻳﺔ ﺳﺮﻳﺔ ﺇﺗﺼﺎﻻ‪‬ﻮ ﺣﻖ ﺍ‪‬ﺘﻤﻊ ﰲ ﻣﻘﺎﻭﻣﺔ ﺍﳉﺮﳝﺔ‪ .‬ﻭﻟﻌﻞ ﺃﳘﻬﺎ ﺃﻥ ﻳﺘﻢ‬
‫ﺗﻨﻔﻴﺬ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﺑﺈﺫﻥ ﻣﻦ ﺍﻟﻘﻀﺎﺀ‪ .‬ﻭﺃﻥ ﺗﻜﻮﻥ ﲦﺔ ﺿﺮﻭﺭﺓ ﺗﺪﻋﻮ ﺇﻟﻴﻪ ﻭﰲ ﻧﻄﺎﻕ ﺿﻴﻖ ﻣﻦ ﺃﺟﻞ‬
‫ﺍﻟﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﲤﺲ ﺣﻘﻮﻗﺎ ﺫﺍﺕ ﺃﳘﻴﺔ ﻻﻋﺘﺒﺎﺭﺍﺕ ﻳﻘﺪﺭﻫﺎ ﺍﳌﺸﺮﻉ‪ .‬ﻭﻫﻮ ﻣﺎ ﺳﻨﺄﰐ ﻋﻠﻰ ﺑﻴﺎﻧﻪ‬
‫ﰲ ﺣﻴﻨﻪ‪.‬‬

‫‪- 75 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ :‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‬

- 76 -

PDF created with pdfFactory Pro trial version www.pdffactory.com


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﳌﺒﺤﺚ ﺍﻟﺜﺎﻟﺚ‬

‫ﺍﳌﻮﺍﺟﻬﺔ ﺍﻟﺘﺸﺮﻳﻌﻴﺔ ﺍﳌﻮﺿﻮﻋﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬

‫ﺇﻥ ﻟﻠﻄﺒﻴﻌﺔ ﺍﳋﺎﺻﺔ ﻟﻠﺠﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﺛﺮ ﻋﻠﻰ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻟﻌﻘﺎﺑﻴﺔ ﺍﻟﻘﺎﺋﻤﺔ‪ ،‬ﻓﺎﻟﻘﺼﻮﺭ ﺍﻟﺬﻱ‬
‫ﻳﻌﺘﺮﻱ ﻫﺬﻩ ﺍﻷﺧﲑﺓ ﰲ ﻣﻮﺍﺟﻬﺘﻬﺎ ﻟﻠﺠﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻗﺪ ﻳﺘﺮﺗﺐ ﻋﻠﻴﻪ ﺁﺛﺎﺭ ﺧﻄﲑﺓ ﺗﺘﻤﺜﻞ ﰲ ﺇﻣﻜﺎﻧﻴﺔ‬
‫ﺇﻓﻼﺕ ﺍﳉﻨﺎﺓ ﻣﻦ ﺍﻟﻌﻘﺎﺏ ﺑﺴﺒﺐ ﻋﺪﻡ ﺗﻘﻨﻴﻨﻬﺎ ﰲ ﺻﻮﺭﺓ ﺟﺮﺍﺋﻢ ﻳﻨﺺ ﻋﻠﻴﻬﺎ ﺍﳌﺸﺮﻉ‪ ،‬ﻭﻣﺎ ﻗﺪ ﻳﻨﺠﺮ‬
‫ﻋﻠﻴﻪ ﻣﻦ ﺗﻮﺳﻊ ﺍﻟﻘﻀﺎﺀ ﰲ ﺗﻔﺴﲑ ﺍﻟﻨﺼﻮﺹ ﺍﻟﻌﻘﺎﺑﻴﺔ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻓﻴﺘﻢ ﺍﻟﻌﺼﻒ ﲟﺒﺪﺃ ﺍﻟﺸﺮﻋﻴﺔ‪.‬‬

‫ﻭﻗﺪ ﺗﺒﺎﻳﻨﺖ ﺇﲡﺎﻫﺎﺕ ﺍﻟﺪﻭﻝ ﺍﳌﺨﺘﻠﻔﺔ ﰲ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻊ ﻇﺎﻫﺮﺓ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻳﺮﺟﻊ ﺫﻟﻚ‬
‫ﺑﺼﻔﺔ ﺃﺳﺎﺳﻴﺔ ﺇﱃ ﺍﺧﺘﻼﻑ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﳍﺬﻩ ﺍﻟﺪﻭﻝ ﻣﻦ ﻧﺎﺣﻴﺔ‪ ،‬ﻭﺇﱃ ﺍﺧﺘﻼﻑ ﲡﺮﺑﺔ ﻛﻞ ﻣﻨﻬﺎ‬
‫ﻣﻊ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﻧﺎﺣﻴﺔ ﺃﺧﺮﻯ‪ ،‬ﻭﺇﱃ ﺍﻟﻨﺘﺎﺋﺞ ﺍﻻﻗﺘﺼﺎﺩﻳﺔ ﺍﳌﺘﺮﺗﺒﺔ ﻋﻦ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺍﻟﱵ‬
‫ﲣﺘﻠﻒ ﻣﻦ ﺩﻭﻟﺔ ﺇﱃ ﺃﺧﺮﻯ ﻣﻦ ﻧﺎﺣﻴﺔ ﺛﺎﻟﺜﺔ‪ .‬ﻭﻫﻮ ﻣﺎ ﻳﻨﻌﻜﺲ ﻋﻠﻰ ﺃﺷﻜﺎﻝ ﺍﻟﺴﻠﻮﻛﺎﺕ ﺍﻟﱵ ﺗﻠﻘﻰ‬
‫ﺍﻫﺘﻤﺎﻣﺎ ﻣﻦ ﻗﺒﻞ ﺍﳌﺸﺮﻋﲔ‪.‬‬

‫ﻭﺇﻥ ﻛﺎﻧﺖ ﲨﻴﻊ ﺍﻟﺪﻭﻝ ﺗﺘﺠﻪ ﺇﱃ ﺿﺮﻭﺭﺓ ﺍﻟﺘﺪﺧﻞ ﺍﻟﺘﺸﺮﻳﻌﻲ ﳌﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻓﺈ‪‬ﺎ‬
‫ﲣﺘﻠﻒ ﻣﻦ ﺣﻴﺚ ﺍﻷﺳﺎﺱ ﺍﻟﺬﻱ ﻳﺮﺗﻜﺰ ﻋﻠﻴﻪ ﻫﺬﺍ ﺍﻟﺘﺪﺧﻞ ﺍﻟﺘﺸﺮﻳﻌﻲ‪ (1)،‬ﻭﺫﻟﻚ ﺑﺎﺧﺘﻼﻑ ﺍﳌﻔﺎﻫﻴﻢ‬
‫ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﱵ ﺗﺆﺛﺮ ﰲ ﺍﻟﻨﻈﺎﻡ ﺍﻟﻘﺎﻧﻮﱐ ﺑﺸﻜﻞ ﻋﺎﻡ‪ ،‬ﻭﳝﻜﻦ ﺍﻟﺘﻤﻴﻴﺰ ﰲ ﻫﺬﺍ ﺍﻟﺼﺪﺩ ﺑﲔ ﺛﻼﺙ ﻣﻮﺍﻗﻒ‬
‫ﺗﺸﺮﻳﻌﻴﺔ ﻳﺘﺄﺛﺮ ﻣﻀﻤﻮﻥ ﺍﳊﻤﺎﻳﺔ ﺍﳉﻨﺎﺋﻴﺔ ﻟﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﲝﺴﺐ ﺍﳌﺼﻠﺤﺔ ﺍﶈﻤﻴﺔ ﻓﻤﺎ ﲪﺎﻩ ﺍﻟﺒﻌﺾ ﱂ‬
‫ﳛﻤﻪ ﺍﻟﺒﻌﺾ ﺍﻵﺧﺮ‪.‬‬

‫ﺍﻹﲡﺎﻩ ﺍﻷﻭﻝ‪ :‬ﺍﳍﺪﻑ ﻓﻴﻪ ﻣﻦ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻫﻮ ﲪﺎﻳﺔ ﺍﳌﻠﻜﻴﺔ ﺍﻟﻔﻜﺮﻳﺔ‪ ،‬ﻭ ﻳﺮﻯ ﻫﺬﺍ ﺍﻻﲡﺎﻩ‬
‫ﺃﻥ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺨﺰﻧﺔ ﺑﺎﳊﺎﺳﺐ ﺍﻵﱄ ﻭﺍﻟﱪﺍﻣﺞ ﺍﳋﺎﺻﺔ ﺑﻪ ﻻ ﲣﺘﻠﻒ ﻋﻦ ﺍﻷﺷﻴﺎﺀ ﺍﻟﱵ ﺗﻜﻮﻥ ﳏﻼ ﳊﻖ‬
‫ﺍﳌﻠﻜﻴﺔ‪ ،‬ﻟﺬﻟﻚ ﺗﻘﻮﻡ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻟﱵ ﺗﺄﺧﺬ ‪‬ﺬﺍ ﺍﻹﲡﺎﻩ ﺑﺒﺴﻂ ﲪﺎﻳﺘﻬﺎ ﻋﻠﻰ ﺍﻟﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺇﻃﺎﺭ‬
‫ﲪﺎﻳﺔ ﺍﳌﻠﻜﻴﺔ ﺍﻟﻔﻜﺮﻳﺔ‪.‬‬

‫)‪(1‬ﺩ‪ .‬ﻧﺎﺋﻠﺔ ﳏﻤﺪ ﻓﺮﻳﺪ ﻗﻮﺭﺓ‪.‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،.‬ﺹ ‪.306‬‬

‫‪- 77 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﻹﲡﺎﻩ ﺍﻟﺜﺎﱐ‪ :‬ﻳﺮﻛﺰ ﻫﺬﺍ ﺍﻹﲡﺎﻩ ﻋﻠﻰ ﲪﺎﻳﺔ ﻣﺼﻠﺤﺔ ﺳﻼﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻣﻬﻤﺎ ﻛﺎﻧﺖ ﻃﺒﻴﻌﺔ ﺍﻟﻨﺸﺎﻁ‬
‫ﺍﻹﺟﺮﺍﻣﻲ ﺍﻟﺬﻱ ﺗﺘﻌﺮﺽ ﻟﻪ‪.‬‬

‫ﺍﻹﲡﺎﻩ ﺍﻟﺜﺎﻟﺚ‪ :‬ﻳﻬﺘﻢ ﻫﺬﺍ ﺍﻹﲡﺎﻩ ﺑﺎﳌﻌﻠﻮﻣﺎﺕ ﰲ ﺣﺪ ﺫﺍ‪‬ﺎ‪ ،‬ﻓﺎﳍﺪﻑ ﰲ ﻫﺬﺍ ﺍﻻﲡﺎﻩ ﻫﻮ ﲪﺎﻳﺔ ﺳﺮﻳﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﻓﻴﻤﻨﻊ ﺍﻹﻃﻼﻉ ﻋﻠﻴﻬﺎ ﺳﻮﺍﺀ ﻛﺎﻧﺖ ﻫﺬﻩ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻣﺘﻌﻠﻘﺔ ﺑﺎﻷﺷﺨﺎﺹ ﺃﻭ ﻛﺎﻧﺖ ﻣﺘﻌﻠﻘﺔ‬
‫ﺑﺄﺷﻴﺎﺀ ﳍﺎ ﻗﻴﻤﺔ ﺍﻗﺘﺼﺎﺩﻳﺔ‪ ،‬ﺃﻭ ﻛﻞ ﻣﻌﻠﻮﻣﺔ ﳜﺸﻰ ﻣﻦ ﺍﻹﻃﻼﻉ ﻋﻠﻴﻬﺎ‪.‬‬

‫ﻭﱂ ﻳﻘﻒ ﺍﻹﺧﺘﻼﻑ ﺑﲔ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﰲ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻊ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻨﺪ ﻫﺬﺍ ﺍﳊﺪ ﺑﻞ ﻳﻈﻬﺮ‬
‫ﺃﻳﻀﺎ ﺑﻮﺿﻮﺡ ﰲ ﺷﻜﻞ ﻫﺬﺍ ﺍﻟﺘﺪﺧﻞ ﺍﻟﺬﻱ ﻗﺪ ﻳﺄﺧﺬ ﻋﺪﺓ ﺃﳕﺎﻁ ﺗﺘﻤﺜﻞ ﺇﻣﺎ ﰲ ﺧﻠﻖ ﻧﺼﻮﺹ ﻗﺎﻧﻮﻧﻴﺔ‬
‫ﺟﺪﻳﺪﺓ ﻳﻀﺎﻑ ﺇﻟﻴﻬﺎ ﺍﻟﺒﻌﺪ ﺍﳋﺎﺹ ﺑﺎﻟﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻭ ﺗﻌﺪﻳﻞ ﺑﻌﺾ ﺍﻟﻨﺼﻮﺹ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﻘﺎﺋﻤﺔ ﲝﻴﺚ‬
‫ﺗﺘﻮﺍﺀﻡ ﻣﻊ ﻫﺬﺍ ﺍﻟﺸﻜﻞ ﺍﳉﺪﻳﺪ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‪.‬‬

‫ﻭﱂ ﻳﻘﻒ ﺍﻷﻣﺮ ﻋﻨﺪ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻟﺪﺍﺧﻠﻴﺔ ﰲ ﻣﻮﺍﺟﻬﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻓﺨﻄﻮﺭﺓ ﻫﺬﻩ ﺍﳉﺮﳝﺔ‬
‫ﻭﻃﺒﻴﻌﺘﻬﺎ ﺍﻟﺪﻭﻟﻴﺔ ﻭﻋﺠﺰ ﺍﻟﺪﻭﻝ ﻓﺮﺍﺩﻯ ﻋﻦ ﺍﻟﺘﺼﺪﻱ ﳍﺎ ﺟﻌﻞ ﻣﻨﻬﺎ ﺷﺄﻧﺎ ﺩﻭﻟﻴﺎ ﺩﻓﻊ ﺑﺎ‪‬ﺘﻤﻊ ﺍﻟﺪﻭﱄ‬
‫ﺇﱃ ﺗﻮﺣﻴﺪ ﺟﻬﻮﺩﻩ ﻭﺣﺸﺪ ﻗﻮﺍﻩ ﳌﻜﺎﻓﺤﺔ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ‪ ،‬ﻓﻌﻘﺪ ﺍﳌﺆﲤﺮﺍﺕ ﻭﺳﻨﺎﻹﺗﻔﺎﻗﻴﺎﺕ ﻭﻫﻮ ﻣﺎ ﺳﻮﻑ‬
‫ﻧﻌﺮﺝ ﻋﻠﻴﻪ ﻓﻴﻤﺎ ﻳﻠﻲ‪:‬‬

‫ﺍﳌﻄﻠﺐ ﺍﻷﻭﻝ‪ :‬ﲪﺎﻳﺔ ﺍﻟﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﻣﺴﺘﻮﻯ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻟﻮﻃﻨﻴﺔ‬

‫ﻟﻘﺪ ﺃﻟﻘﺖ ﺍﻟﺜﻮﺭﺓ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﻀﻼﳍﺎ ﻋﻠﻰ ﻗﻮﺍﻧﲔ ﺍﻟﻌﻘﻮﺑﺎﺕ ﳌﺨﺘﻠﻒ ﺍﻟﺪﻭﻝ ﺑﺎﻟﺘﺼﺪﻱ ﻟﻠﺠﺎﻧﺐ‬
‫ﺍﻟﺴﻠﱯ ﻣﻨﻬﺎ ﻣﻊ ﺿﺮﻭﺭﺓ ﻣﺮﺍﻋﺎﺓ ﲢﻘﻴﻖ ﻫﺪﻓﲔ ﺃﺳﺎﺳﻴﲔ ﳘﺎ‪ :‬ﻋﺪﻡ ﺗﻔﻮﻳﺖ ﺍﻟﻔﺮﺻﺔ ﰲ ﺍﻹﺳﺘﻔﺎﺩﺓ ﻣﻦ‬
‫ﺗﻄﻮﺭ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻣﻦ ﻧﺎﺣﻴﺔ ﺃﺧﺮﻯ ﺿﺮﻭﺭﺓ ﲪﺎﻳﺔ ﺍﻹﻗﺘﺼﺎﺩ ﻭﺍﻷﻣﻦ ﺍﻟﻮﻃﲏ ﻭﺣﻘﻮﻕ ﻭﺣﺮﻳﺎﺕ‬
‫ﺍﻷﻓﺮﺍﺩ ﻣﻦ ﺟﺮﺍﺀ ﺍﻟﻠﺠﻮﺀ ﺇﱃ ﺍﻻﺳﺘﺨﺪﺍﻡ ﻏﲑ ﺍﻟﺸﺮﻋﻲ ﳍﺬﻩ ﺍﻟﺘﻘﻨﻴﺔ‪.‬‬

‫ﻭﺍﳌﻼﺣﻆ ﰲ ﻫﺬﺍ ﺍﻟﺼﺪﺩ ﺃﻧﻪ ﻛﻠﻤﺎ ﻛﺎﻥ ﺍﻻﻋﺘﻤﺎﺩ ﺃﻛﱪ ﻋﻠﻰ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻛﻠﻤﺎ ﻛﺎﻧﺖ‬
‫ﺍﳊﺎﺟﺔ ﺃﻛﺜﺮ ﺇﳊﺎﺣﺎ ﻟﻮﺿﻊ ﻧﺼﻮﺹ ﻗﺎﻧﻮﻧﻴﺔ ﳊﻤﺎﻳﺔ ﻫﺬﻩ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ (1).‬ﻭﺳﻮﻑ ﻧﺘﻨﺎﻭﻝ ﻓﻴﻤﺎ ﻳﻠﻲ‬
‫ﲡﺮﺑﺔ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﰒ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳌﻘﺎﺭﻥ ﰲ ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫)‪ (1‬ﳏﻤﺪ ﺧﻠﻴﻔﺔ ‪.‬ﺍﳌﺮﺟﻌﺎﻟﺴﺎﺑﻖ‪.‬ﺹ ‪.61‬‬

‫‪- 78 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﻟﻔﺮﻋﺎﻷﻭﻝ‪ :‬ﻣﻮﺍﺟﻬﺔ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬‬

‫ﻧﺘﻴﺠﺔ ﻟﺘﺄﺛﺮ ﺍﳉﺰﺍﺋﺮ ﲟﺎ ﺃﻓﺮﺯﺗﻪ ﺛﻮﺭﺓ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻣﻦ ﺃﺷﻜﺎﻝ ﺟﺪﻳﺪﺓ ﻟﻠﺠﺮﺍﺋﻢ ﻃﺎﻟﺖ ﻣﺼﺎﱀ‬
‫ﺟﺪﻳﺪﺓ ﻏﲑ ﺗﻠﻚ ﺍﻟﱵ ﳛﻤﻴﻬﺎ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ‪ ،‬ﻓﻘﺪ ﺗﻄﺮﻕ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﺇﱃ ﲡﺮﱘ ﺃﻓﻌﺎﻝ ﺍﳌﺴﺎﺱ‬
‫ﺑﺄﻧﻈﻤﺔ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ﻣﻦ ﺧﻼﻝ ﺗﻌﺪﻳﻞ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﲟﻮﺟﺐ ﺍﻟﻘﺎﻧﻮﻥ ﺭﻗﻢ‬
‫‪15/04‬ﻭﺍﻟﺬﻱ ﺗﻀﻤﻦ ﲦﺎﻧﻴﺔ ﻣﻮﺍﺩﻋﻤﺪ ﺍﳌﺸﺮﻉ ﻣﻦ ﺧﻼﳍﺎ ﺇﱃ ﲪﺎﻳﺔ ﺳﺮﻳﺔ ﻭﺳﻼﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﻧﻈﻢ‬
‫ﻣﻌﺎﳉﺘﻬﺎ ﻭﺫﻟﻚ ﻣﻦ ﺍﳌﻮﺍﺩ ‪ 394‬ﻣﻜﺮﺭ ﺇﱃ ‪ 394‬ﻣﻜﺮﺭ ‪،07‬ﺃﻳﻦ ﺟﺮﻡ ﺍﻟﺪﺧﻮﻝ ﻭﺍﻟﺒﻘﺎﺀ ﻏﲑ ﺍﳌﺸﺮﻭﻉ ﰲ‬
‫ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ﺃﻭ ﰲ ﺟﺰﺀ ﻣﻨﻪ ﺍﳌﺎﺩﺓ )‪ 394‬ﻣﻜﺮﺭ(‪.‬‬

‫‪ -‬ﺍﻹﺩﺧﺎﻝ ﺑﻄﺮﻳﻖ ﺍﻟﻐﺶ ﻣﻌﻄﻴﺎﺕ ﰲ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﺃﻭ ﺍﻹﺯﺍﻟﺔ ﺑﻄﺮﻳﻖ ﺍﻟﻐﺶ ﳌﻌﻄﻴﺎﺕ‬
‫ﻳﺘﻀﻤﻨﻬﺎ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ )‪ 394‬ﻣﻜﺮﺭ‪(1‬‬
‫‪ -‬ﺍﻹﲡﺎﺭ ﰲ ﻣﻌﻄﻴﺎﺕ ﳐﺰﻧﺔ ﻭﻣﻌﺎﳉﺔ ﺃﻭ ﻣﺮﺳﻠﺔ ﻋﻦ ﻃﺮﻳﻖ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫‪ -‬ﺣﻴﺎﺯﺓ ﺃﻭ ﺇﻧﺸﺎﺀ ﺃﻭ ﻧﺸﺮ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﺘﺤﺼﻞ ﻋﻠﻴﻬﺎ ﺑﺎﺭﺗﻜﺎﺏ ﺇﺣﺪﻯ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻨﺼﻮﺹ ﻋﻠﻴﻬﺎ‬
‫ﰲ ﻫﺬﺍ ﺍ‪‬ﺎﻝ‪.‬‬

‫ﻭﺍﳌﻼﺣﻆ ﺃﻥ ﲣﺼﻴﺺ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﳍﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻗﺴﻤﺎ ﺧﺎﺻﺎ ﰲ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﺩﻻﻟﺔ‬
‫ﻋﻠﻰ ﺇﻗﺮﺍﺭﻩ ﺑﺄ‪‬ﺎ ﻇﺎﻫﺮﺓ ﻣﺴﺘﺠﺪﺓ ﻭﻣﺘﻤﻴﺰﺓ ﻋﻦ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﺍﻷﺧﺮﻯ ﻣﻦ ﺣﻴﺚ ﺍﳌﺼﺎﱀ ﺍﻟﱵ‬
‫ﺗﻄﺎﳍﺎ ﻭﻛﺬﺍ ﻣﻦ ﺣﻴﺚ ﻣﺒﻨﺎﻫﺎ ﻭﻃﺒﻴﻌﺘﻬﺎ ﻭﳏﻠﻬﺎ‪ ،‬ﻭﻣﻦ ﰒ ﻻ ﳝﻜﻦ ﺇﺩﺭﺍﺟﻬﺎ ﲢﺖ ﺃﻱ ﻧﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‬
‫) ‪(1‬‬
‫ﺍﻟﺘﻘﻠﻴﺪﻳﺔ‪.‬‬

‫ﻛﻤﺎ ﺃﻧﻪ ﱂ ﳝﻴﺰ ﰲ ﻭﺿﻌﻪ ﳍﺬﻩ ﺍﻟﻨﺼﻮﺹ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻧﻮﻋﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﱵ ﺗﻄﺎﳍﺎ ﺍﳉﺮﳝﺔ ﻓﻴﻤﺎ ﺇﺫﺍ‬
‫ﻛﺎﻧﺖ ﻣﻌﻠﻮﻣﺎﺕ ﺗﺘﺼﻞ ﲟﺼﺎﱀ ﺍﻗﺘﺼﺎﺩﻳﺔ ﺃﻭ ﻣﺎﻟﻴﺔ ﺃﻭ ﻣﺴﺎﺋﻞ ﺃﻣﻨﻴﺔ‪ ،‬ﻭﺫﻟﻚ ﺳﻌﻴﺎﹰ ﻣﻦ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ‬
‫ﺇﱃ ﺗﻌﻤﻴﻢ ﺍﳊﻤﺎﻳﺔ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﺑﻜﺎﻓﺔ ﺃﻧﻮﺍﻋﻬﺎ ﻣﺎ ﻋﺪﻯ ﺗﺸﺪﻳﺪ ﺍﻟﻌﻘﻮﺑﺔ ﺇﺫﺍ ﻛﺎﻧﺖ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺴﺘﻬﺪﻓﺔ‬
‫ﻣﺘﻌﻠﻘﺔ ﺑﺎﻟﺪﻓﺎﻉ ﺍﻟﻮﻃﲏ ﺃﻭ ﺍﳍﻴﺌﺎﺕ ﻭﺍﳌﺆﺳﺴﺎﺕ ﺍﳋﺎﺿﻌﺔ ﻟﻠﻘﺎﻧﻮﻥ ﺍﻟﻌﺎﻡ‪.‬‬

‫ﻭﰲ ﺍﳊﻘﻴﻘﺔ ﻓﺈﻧﻪ ﻗﺒﻞ ﻫﺬﺍ ﺍﻟﻘﺎﻧﻮﻥ ﳒﺪ ﺃﻥ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻗﺪ ﺣﺎﻭﻝ ﻣﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﺧﻼﻝ ﻗﺎﻧﻮﻥ ﺍﳌﻠﻜﻴﺔ ﺍﻷﺩﺑﻴﺔ ﻭﺍﻟﻔﻨﻴﺔ ﻭﻫﻮ ﺍﻷﻣﺮ ‪ 14/73‬ﺍﳌﺆﺭﺥ ﰲ ‪ 1973/04/03‬ﺍﳌﻌﺪﻝ‬

‫)‪ (1‬ﺭﺷﻴﺪﺓ ﺑﻮﻛﺮ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪.‬ﺹ ‪.127‬‬

‫‪- 79 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻭﺍﳌﺘﻤﻢ ﲟﻘﺘﻀﻰ ﺍﻷﻣﺮ ‪ 10/97‬ﺍﳌﺆﺭﺥ ﰲ ‪ 1997/03/06‬ﻭﺍﳌﻌﺪﻝ ﻭﺍﳌﺘﻤﻢ ﺑﺎﻷﻣﺮ ‪ 05/03‬ﺍﳌﺆﺭﺥ ﰲ‬


‫‪ .2003/07/19‬ﻭﺍﳌﺘﻌﻠﻖ ﲝﻖ ﺍﳌﺆﻟﻒ ﻭﺍﳊﻘﻮﻕ ﺍ‪‬ﺎﻭﺭﺓ‪ ،‬ﺣﻴﻨﻤﺎ ﺃﺩﻣﺞ ﲟﻮﺟﺐ ﻫﺬﻳﻦ ﺍﻷﻣﺮﻳﻦ ﺍﻷﺧﲑﻳﻦ‬
‫ﺑﺮﺍﻣﺞ ﺍﻹﻋﻼﻡ ﺍﻵﱄ ﺿﻤﻦ ﺍﳌﺼﻨﻔﺎﺕ ﺍﻷﺻﻠﻴﺔ ﺍﻟﱵ ﺗﺸﻤﻠﻬﺎ ﺍﳊﻤﺎﻳﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ)‪ (1‬ﻭﻗﺮﺭ ﻟﻺﻋﺘﺪﺍﺀ ﻋﻠﻴﻬﺎ‬
‫ﻋﻘﻮﺑﺔ ﺍﳊﺒﺲ ﻭﺍﻟﻐﺮﺍﻣﺔ‪.‬‬

‫ﻭﲡﺪﺭ ﺍﻹﺷﺎﺭﺓ ﺇﱃ ﺃﻥ ﻫﺬﻩ ﺍﳌﺴﺘﺠﺪﺍﺕ ﺍﻟﱵ ﺍﻋﺘﻤﺪﻫﺎ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻣﻦ ﺧﻼﻝ ﺍﻷﻣﺮﻳﻦ‬
‫‪ 10/97‬ﻭ ‪ 05/03‬ﺗﻌﻮﺩ ﻷﺳﺒﺎﺏ ﺃﳘﻬﺎ ﺃﻧﻪ ﻣﻦ ﺷﺮﻭﻁ ﺍﻹﻧﻀﻤﺎﻡ ﺇﱃ ﺍﳌﻨﻈﻤﺔ ﺍﻟﻌﺎﳌﻴﺔ ﻟﻠﺘﺠﺎﺭﺓ ﻫﻮ‬
‫ﺍﳌﺼﺎﺩﻗﺔ ﻋﻠﻰ ﺇﺗﻔﺎﻗﻴﺔ "ﺑﲑﻥ" ﻭﻫﻮ ﻣﺎ ﻓﻌﻠﺘﻪ ﺍﳉﺰﺍﺋﺮ ﲟﻮﺟﺐ ﺍﳌﺮﺳﻮﻡ ﺍﻟﺮﺋﺎﺳﻲ )‪ (341/97‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ‬
‫ﺗﺒﲏ ﺃﺣﻜﺎﻡ ﺇﺗﻔﺎﻕ ﺟﻮﺍﻧﺐ ﺍﳌﻠﻜﻴﺔ ﺍﻟﻔﻜﺮﻳﺔ ﺍﳌﺘﻌﻠﻖ ﺑﺎﻟﺘﺠﺎﺭﺓ‪ ،‬ﻭﺍﻟﺬﻱ ﻭﺭﺩ ﰲ ﻧﺺ ﺍﳌﺎﺩﺓ ‪ 10‬ﻣﻨﻪ ﺃﻥ‬
‫ﺑﺮﺍﻣﺞ ﺍﻹﻋﻼﻡ ﺍﻵﱄ ﺳﻮﺍﺀ ﻛﺎﻧﺖ ﰲ ﺻﻮﺭﺓ ﺑﺮﻧﺎﻣﺞ ﻣﺼﺪﺭ ﺃﻭ ﺻﻮﺭﺓ ﻣﻨﻘﻮﺷﺔ ﻓﻬﻲ ﳏﻤﻴﺔ ﻋﻠﻰ ﺃﺳﺎﺱ‬
‫ﺃ‪‬ﺎ ﻣﺼﻨﻔﺎﺕ ﺃﺩﺑﻴﺔ‪ ،‬ﻛﻤﺎ ﺃﻥ ﺍﻹﺗﻔﺎﻗﻴﺔ ﺍﻟﺪﻭﻟﻴﺔ ﺣﻮﻝ ﺍﻹﺟﺮﺍﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻧﺼﺖ ﻋﻠﻰ ﲡﺮﱘ ﺍﻹﻋﺘﺪﺍﺀﺍﺕ‬
‫ﻋﻠﻰ ﺣﻖ ﺍﳌﺆﻟﻒ ﻭﺍﳊﻘﻮﻕ ﺍ‪‬ﺎﻭﺭﺓ ﺇﺫﺍ ﺍﺭﺗﻜﺒﺖ ﻫﺬﻩ ﺍﻹﻋﺘﺪﺍﺀﺍﺕ ﻋﻦ ﻃﺮﻳﻖ ﻧﻈﺎﻡ ﻣﻌﻠﻮﻣﺎﰐ ﰲ ﻧﻄﺎﻕ‬
‫ﲡﺎﺭﻱ)‪.(2‬‬

‫ﺍﻟﻔﺮﻋﺎﻟﺜﺎﱐ‪ :‬ﻣﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳌﻘﺎﺭﻥ‬

‫ﻟﻘﺪ ﺍﺳﺘﺪﺭﻛﺖ ﺃﻏﻠﺐ ﺍﻟﺪﻭﻝ ﲟﺨﺘﻠﻒ ﺃﻧﻈﻤﺘﻬﺎ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﻔﺸﻞ ﰲ ﻣﻼﺀﻣﺔ ﺍﻟﻘﻮﺍﻧﲔ ﺍﻟﻨﺎﻓﺬﺓ‬
‫ﺍﻹﺳﺘﺠﺎﺑﺔﻟﻺﻋﺘﺪﺍﺀﺍﺕ ﺍﳊﺎﺻﻠﺔ ﻋﻠﻰ ﺍﻟﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ .‬ﻭﺳﻮﻑ ﻧﺄﺧﺬ ﰲ ﻫﺬﺍ ﺍﻟﺼﺪﺩ ﲡﺮﺑﺔ ﺍﳌﺸﺮﻉ‬
‫ﺍﻟﻔﺮﻧﺴﻲ ﻛﻨﻤﻮﺫﺝ ﻗﺮﻳﺐ ﻣﻦ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻭﺍﳌﺸﺮﻉ ﺍﻷﻣﺮﻳﻜﻲ ﳑﺜﻼ ﻟﻠﻨﻈﺎﻡ ﺍﻹﻧﻜﻠﻮﺳﻜﺴﻮﱐ‪.‬‬

‫ﺃﻭﻻ‪ :‬ﺍﻟﺘﺸﺮﻳﻊ ﺍﻟﻔﺮﻧﺴﻲ‪ :‬ﻛﺎﻧﺖ ﺃﻭﱃ ﺍﶈﺎﻭﻻﺕ ﳌﺪ ﺳﻠﻄﺎﻥ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﳊﻤﺎﻳﺔ ﺍﳌﺎﻝ‬
‫ﺍﳌﻌﻠﻮﻣﺎﰐ ﺑﻔﺮﻧﺴﺎ ﻣﻦ ﻃﺮﻑ ﻭﺯﻳﺮﻫﺎ ﻟﻠﻌﺪﻝ ﻋﺎﻡ ‪ 1985‬ﻋﻨﺪﻣﺎ ﺗﻘﺪﻡ ﲟﺸﺮﻭﻉ ﻗﺎﻧﻮﻥ ﻋﻘﻮﺑﺎﺕ ﺟﺪﻳﺪ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ" ‪Infractions‬‬ ‫ﺃﺿﺎﻑ ﲟﻮﺟﺒﻪ ﺑﺎﺑﺎ ﺭﺍﺑﻌﺎ ﻟﻠﻜﺘﺎﺏ ﺍﻟﺜﺎﻟﺚ ﻣﻨﻪ ﺑﻌﻨﻮﺍﻥ "ﺍﳉﺮﺍﺋﻢ ﰲ ﺍﳌﺎﺩﺓ‬
‫‪ ،enmatiére informatique‬ﺗﻨﺎﻭﻝ ﺑﺎﻟﺘﺠﺮﱘ ﺍﳌﻮﺿﻮﻋﺎﺕ ﺍﻟﺘﺎﻟﻴﺔ‪:‬‬

‫‪ -‬ﺍﻹﻟﺘﻘﺎﻁ ﺍﻟﻌﻤﺪﻱ ﻟﻠﱪﺍﻣﺞ ﺃﻭ ﺃﻱ ﻋﻨﺼﺮ ﺁﺧﺮ ﻣﻦ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‪.‬‬

‫)‪(1‬ﻧﺺ ﺍﳌﺎﺩﺓ ‪ 04‬ﻣﻦ ﺍﻷﻣﺮ ‪" :10/97‬ﺗﻌﺘﱪ ﻋﻠﻰ ﺍﳋﺼﻮﺹ ﻣﺆﻟﻔﺎﺕ ﺃﺩﺑﻴﺔ ﺃﻭ ﻓﻨﻴﺔ ﳏﻤﻴﺔ ﻣﺎ ﻳﺄﰐ‪ :‬ﺍﳌﺼﻨﻔﺎﺕ ﺍﻷﺩﺑﻴﺔ ﺍﳌﻜﺘﻮﺑﺔ ﻣﺜﻞ‪....‬ﻭﻣﺼﻨﻔﺎﺕ‬
‫ﻭﻗﻮﺍﻋﺪ ﺍﻟﺒﻴﺎﻧﺎﺕ"‬
‫)‪ (2‬ﻋﻄﺎ ﺍﷲ ﻓﺸﺎﺭ‪ .‬ﲝﺚ ﺣﻮﻝ ﻣﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ ﻛﻠﻴﺔ ﺍﳊﻘﻮﻕ ﻭﺍﻟﻌﻠﻮﻡ ﺍﻟﺴﻴﺎﺳﻴﺔ ﲜﺎﻣﻌﺔ ﺍﳉﻠﻔﺔ‪ .‬ﺑﺪﻭﻥ ﺗﺮﻗﻴﻢ‬

‫‪- 80 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫‪ -‬ﺇﺳﺘﺨﺪﺍﻡ ﺑﺮﻧﺎﻣﺞ ﺃﻭ ﻣﻌﻄﻴﺎﺕ ﺃﻭ ﺃﻱ ﻋﻨﺼﺮ ﻣﻦ ﻋﻨﺎﺻﺮ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺩﻭﻥ ﻣﻮﺍﻓﻘﺔ ﻣﻦ‬
‫ﳍﻢ ﺍﳊﻖ ﻓﻴﻪ‪.‬‬
‫‪ -‬ﲣﺮﻳﺐ ﺃﻭ ﻋﺮﻗﻠﺔ ﺃﺩﺍﺀ ﻛﻞ ﺃﻭ ﺟﺰﺀ ﻣﻦ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ‪.‬‬

‫‪Jacques‬‬ ‫ﻟﻜﻦ ﻫﺬﺍ ﺍﳌﺸﺮﻭﻉ ﱂ ﻳﻜﺘﺐ ﻟﻪ ﺍﻟﻨﺠﺎﺡ‪ ،‬ﻭﱂ ﳚﺪ ﺳﺒﻴﻠﻪ ﻟﻠﺘﻄﺒﻴﻖ ﺇﱃ ﺃﻥ ﺗﻘﺪﻡ ﺍﻟﻨﺎﺋﺐ‬
‫‪codfrain‬ﰲ ‪ 1986/08/05‬ﻭﻧﻮﺍﺏ ﺁﺧﺮﻭﻥ ﰲ ﺍﳉﻤﻌﻴﺔ ﺍﻟﻮﻃﻨﻴﺔ ﺑﺎﻗﺘﺮﺍﺡ ﻣﺸﺮﻭﻉ ﻗﺎﻧﻮﻥ ﻋﻦ ﺍﻟﻐﺶ‬
‫ﺍﳌﻌﻠﻮﻣﺎﰐ ‪La fraude informatique‬ﺣﺎﻭﻝ ﻣﻦ ﺧﻼﻟﻪ ﺗﻄﻮﻳﻊ ﺑﻌﺾ ﺍﻟﻨﺼﻮﺹ ﺍﻟﻘﺎﺋﻤﺔ ﰲ ﻗﺎﻧﻮﻥ‬
‫ﺍﻟﻌﻘﻮﺑﺎﺕ ﻭﺍﻟﱵ ﺗﺘﻨﺎﻭﻝ ﺟﺮﺍﺋﻢ ﺗﻘﻠﻴﺪﻳﺔ ﻛﺎﻟﺴﺮﻗﺔ ﻭﺧﻴﺎﻧﺔ ﺍﻷﻣﺎﻧﺔ ﻭﺍﻟﺘﺰﻭﻳﺮ ﻭﺍﻹﺗﻼﻑ‪ ...‬ﻭﺫﻟﻚ ﻟﺘﺸﻤﻞ‬
‫ﺍﻟﻌﺪﻭﺍﻥ ﻋﻠﻰ ﺍﳌﺎﻝ ﺍﳌﻌﻠﻮﻣﺎﰐ‪ .‬ﻭﺑﻌﺪ ﺍﳌﻨﺎﻗﺸﺎﺕ ﰲ ﺍﻟﱪﳌﺎﻥ ﺃﺳﻔﺮﺕ ﻋﻦ ﻗﺎﻧﻮﻥ ﺍﺧﺘﻠﻒ ﲤﺎﻣﺎ ﻋﻦ ﺫﻟﻚ‬
‫ﺍﳌﺸﺮﻭﻉ ﺍﻟﺬﻱ ﻗﺪﻡ ﻷﻭﻝ ﻣﺮﺓ ﺑﻞ ﺗﺸﺎﺑﻪ ﺇﱃ ﺣﺪ ﻛﺒﲑ ﻣﻊ ﺍﳌﺸﺮﻭﻉ ﺍﻷﻭﻝ ﺍﻟﺬﻱ ﺗﻘﺪﻡ ﺑﻪ ﻭﺯﻳﺮ ﺍﻟﻌﺪﻝ‬
‫ﺳﻨﺔ ‪،1985‬ﻓﺼﺪﺭ ﺑﺬﻟﻚ ﺍﻟﻘﺎﻧﻮﻥ ﺭﻗﻢ ‪ 19‬ﻟﺴﻨﺔ ‪ 1988‬ﺍﳌﺘﻌﻠﻖ ﲝﻤﺎﻳﺔ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﺒﻴﺎﻧﺎﺕ ﰒ‬
‫ﰎ ﺇﺩﺭﺍﺟﻪ ﰲ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﻟﻌﺎﻡ ‪ 1992‬ﻭﻃﺒﻖ ﺑﻌﺪﻫﺎ ﰲ ‪،1994/03/01‬ﻭﻗﺪ ﺗﻀﻤﻦ ﺍﻟﻨﺺ ﻋﻠﻰ‬
‫ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﰲ ﺍﳌﻮﺍﺩ ﻣﻦ ‪ 2/462‬ﺇﱃ ‪ 9/462‬ﻭﻫﻲ‪:‬‬

‫‪ -‬ﺍﻟﺪﺧﻮﻝ ﺃﻭ ﺍﻟﺒﻘﺎﺀ ﻏﲑ ﺍﳌﺸﺮﻭﻉ ﰲ ﻧﻈﺎﻡ ﻣﻌﺎﳉﺔ ﺁﻟﻴﺔ ﺍﳌﻌﻄﻴﺎﺕ ﺃﻭ ﰲ ﺟﺰﺀ ﻣﻨﻪ‪.‬‬


‫‪ -‬ﳏﻮ ﺃﻭ ﺗﻌﺪﻳﻞ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﻮﺟﻮﺩﺓ ﺩﺍﺧﻞ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‪.‬‬
‫‪ -‬ﻛﻞ ﻓﻌﻞ ﻋﻤﺪﻱ ﻣﻦ ﺷﺄﻧﻪ ﺃﻥ ﻳﻌﺮﻗﻞ ﺃﻭ ﻳﻔﺴﺪ ﺃﺩﺍﺀ ﺍﻟﻨﻈﺎﻡ ﻟﻮﻇﻴﻔﺘﻪ‪.‬‬
‫‪ -‬ﺗﺰﻭﻳﺮ ﺍﳌﺴﺘﻨﺪﺍﺕ ﺍﳌﻌﺎﳉﺔ ﺁﻟﻴﺎ ﺃﻳﺎ ﻛﺎﻥ ﺷﻜﻠﻬﺎ ﻭﺍﺳﺘﻌﻤﺎﻝ ﻫﺬﻩ ﺍﳌﺴﺘﻨﺪﺍﺕ‪.‬‬

‫ﺃﻣﺎ ﺍﶈﻄﺔ ﺍﻟﺘﺎﻟﻴﺔ ﻣﻦ ﳏﻄﺎﺕ ﺍﻟﺘﺠﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﰐ ﰲ ﻓﺮﻧﺴﺎ ﻓﻜﺎﻧﺖ ﻋﺎﻡ ‪ 2004‬ﻋﻨﺪﻣﺎ)‪ (1‬ﺃﺿﺎﻑ ﺍﳌﺸﺮﻉ‬
‫ﺍﻟﻔﺮﻧﺴﻲ ﲟﻮﺟﺒﻪ ﺟﺮﳝﺔ ﺃﺧﺮﻯ ﻫﻲ ﺟﺮﳝﺔ ﺍﻟﺘﻌﺎﻣﻞ ﰲ ﺍﻟﻮﺳﺎﺋﻞ ﺍﻟﱵ ﺗﺼﻠﺢ ﺃﻥ ﺗﺮﺗﻜﺐ ‪‬ﺎ ﺟﺮﳝﺔ‬
‫ﺍﻟﺪﺧﻮﻝ ﺃﻭ ﺍﻟﺒﻘﺎﺀ ﻏﲑ ﺍﳌﺼﺮﺡ ‪‬ﺎ ﺃﻭ ﺟﺮﳝﺔ ﺍﻟﺘﻼﻋﺐ ﺑﺎﳌﻌﻄﻴﺎﺕ ﺃﻭ ﺟﺮﳝﺔ ﺇﻋﺎﻗﺔ ﻭﺇﻓﺴﺎﺩ ﺃﻧﻈﻤﺔ‬
‫ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ)‪.(2‬‬

‫)‪ (1‬ﰲ ﻋﺎﻡ ‪ 1994‬ﰎ ﺗﻌﺪﻳﻞ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﺍﻟﻔﺮﻧﺴﻲ ﻭﺍﻟﺬﻱ ﻣﺲ ﻧﺺ ﺍﳌﺎﺩﺓ ‪ 1/441‬ﻓﻄﻮﺭ ﻣﻦ ﺟﺮﳝﺔ ﺍﻟﺘﺰﻭﻳﺮ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻟﺘﺼﺒﺢ ﺟﺮﳝﺔ ﺗﺰﻭﻳﺮ‬
‫ﺍﳌﺴﺘﻨﺪﺍﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺍﺳﺘﻌﻤﺎﳍﺎ ﺑﻌﺪﻣﺎ ﻛﺎﻧﺖ ﺟﺮﳝﺔ ﺗﺰﻭﻳﺮ ﺍﳌﺴﺘﻨﺪﺍﺕ ﺍﳌﻌﺎﳉﺔ ﺁﻟﻴﺎ ﻓﺤﺴﺐ‪.‬‬
‫)‪ (2‬ﺍﻟﻘﺎﻧﻮﻥ ﺭﻗﻢ ‪ 575‬ﻟﺴﻨﺔ ‪ 2004‬ﰲ ‪ 2004/06/21‬ﺍﳌﺘﻌﻠﻖ ﺑﺎﻟﺜﻘﺔ ﰲ ﺍﻻﻗﺘﺼﺎﺩ ﺍﻟﺮﻗﻤﻲ‪.‬‬

‫‪- 81 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺛﺎﻧﻴﺎ‪ :‬ﺍﻟﺘﺸﺮﻳﻊ ﰲ ﺍﻟﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ ﺍﻷﻣﺮﻳﻜﻴﺔ‪:‬ﻳﻌﺪ ﻗﺎﻧﻮﻥ ﻓﻠﻮﺭﻳﺪﺍ ﳉﺮﺍﺋﻢ ﺍﳊﺎﺳﻮﺏ ﺍﻟﺼﺎﺩﺭ ﻋﺎﻡ‬
‫‪ 1978‬ﺃﻭﻝ ﻗﺎﻧﻮﻥ ﰲ ﺍﻟﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ ﺍﻷﻣﺮﻳﻜﻴﺔ ﳜﺎﻃﺐ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺣﻴﺚ ﻳﻌﺘﱪ ﻫﺬﺍ‬
‫ﺍﻟﻘﺎﻧﻮﻥ ﺃﻥ ﻛﻞ ﺩﺧﻮﻝ ﺇﱃ ﺍﳊﺎﺳﻮﺏ ﻏﲑ ﻣﺼﺮﺡ ﺑﻪ ﻫﻮ ﲟﺜﺎﺑﺔ ﺟﺮﳝﺔ‪ ،‬ﺣﱴ ﻭﻟﻮ ﱂ ﺗﻜﻦ ﻫﻨﺎﻙ ﻧﻴﺔ‬
‫ﻋﺪﺍﺋﻴﺔ ﻣﻦ ﻫﺬﺍ ﺍﻟﺪﺧﻮﻝ‪ (1)،‬ﺃﻣﺎ ﻋﻠﻰ ﺍﻟﺼﻌﻴﺪ ﺍﻟﻔﺪﺭﺍﱄ ﻓﻘﺪ ﺻﺪﺭ ﻋﺎﻡ ‪ 1984‬ﻗﺎﻧﻮﻥ ﺍﻹﺣﺘﻴﺎﻝ ﻭﺳﻮﺀ‬
‫ﺍﺳﺘﺨﺪﺍﻡ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ‪ComputerFraudand AbuseACT‬ﻭﻗﺪ ﰎ ﺗﻌﺪﻳﻠﻪ ﻣﺆﺧﺮﺍ ﻋﺎﻡ ‪ 2001‬ﲟﻘﺘﻀﻰ‬
‫ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﻮﻃﲏ ﺍﳌﺆﺭﺥ ﰲ ‪ 2001/10/26‬ﻭﰎ ﺇﺩﺭﺍﺟﻪ ﰲ ﺍﻟﻘﺴﻢ ‪1030‬ﻣﻦ ﺍﻟﺒﺎﺏ ‪ 18‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ‬
‫ﺍﻟﻔﺪﺭﺍﱄ ﻟﻠﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ ﺍﻷﻣﺮﻳﻜﻴﺔ ‪ .‬ﻭﻗﺪ ﻋﺎﻗﺒﺖ ﺍﳌﺎﺩﺓ ‪ 1030‬ﻣﻦ ﻫﺬﺍ ﺍﻟﻘﺎﻧﻮﻥ ﻛﻞ ﻣﻦ ﻳﻘﻮﻡ‬
‫ﺑﺎﻟﺪﺧﻮﻝ ﻋﻤﺪ‪‬ﺍ ﺇﱃ ﺣﺎﺳﻮﺏ ﻣﺸﻤﻮﻝ ﺑﺎﳊﻤﺎﻳﺔ ﺩﻭﻥ ﺃﻥ ﻳﻜﻮﻥ ﻣﺼﺮﺣﺎ ﻟﻪ ﺑﺬﻟﻚ ﺃﻭ ﻳﺘﺠﺎﻭﺯ ﺍﻟﺘﺼﺮﻳﺢ‬
‫ﺍﳌﻤﻨﻮﺡ ﻟﻪ ﺇﺫﺍ ﻛﺎﻥ ﺍﻟﻐﺮﺽ ﻣﻦ ﻫﺬﺍ ﺍﻟﺪﺧﻮﻝ ﻫﻮ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺷﻲﺀ ﺫﻱ ﻗﻴﻤﺔ ﻋﻦ ﻃﺮﻳﻖ ﺍﻹﺣﺘﻴﺎﻝ‪.‬‬

‫ﻭﻣﺎ ﳝﻜﻦ ﺍﻹﺷﺎﺭﺓ ﺇﻟﻴﻪ ﺃﻥ ﺍﻟﺘﺸﺮﻳﻊ ﺍﻟﻔﺪﺭﺍﱄ ﺍﻷﻣﺮﻳﻜﻲ ﻗﺒﻞ ﻋﺎﻡ ‪ 1986‬ﱂ ﻳﻜﻦ ﳛﺘﻮﻱ ﻋﻠﻰ‬
‫ﲡﺮﱘ ﺇﺗﻼﻑ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭ ﺍﻟﱪﺍﻣﺞ ﻭﺇﳕﺎ ﺍﻗﺘﺼﺮ ﺍﻟﺘﺠﺮﱘ ﻋﻠﻰ ﺇﻋﺎﻗﺔ ﺃﻧﻈﻤﺔ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ ‪ .‬ﻓﻘﺪ‬
‫ﺟﺮﻣﺖ ﺍﻟﻔﻘﺮﺓ ﺍﻟﺜﺎﻟﺜﺔ ﻣﻦ ﺍﳌﺎﺩﺓ ‪ 1030‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﻔﺪﺭﺍﱄ ﳉﺮﺍﺋﻢ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ ﺍﻟﺼﺎﺩﺭ ﻋﺎﻡ‬
‫‪ 1984‬ﺇﺗﻼﻑ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﺬﻱ ﻳﺘﺮﺗﺐ ﻋﻠﻴﻪ ﺇﻋﺎﻗﺔ ﺍﳊﻜﻮﻣﺔ ﻋﻦ ﺍﺳﺘﻌﻤﺎﻝ ﺃﻧﻈﻤﺔ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ‬
‫ﻭﰲ ﻋﺎﻡ ‪ 1986‬ﻭﻧﺘﻴﺠﺔ ﻟﻜﺜﲑ ﻣﻦ ﺍﻹﻧﺘﻘﺎﺩﺍﺕ ﺍﻟﱵ ﻭﺟﻬﺖ ﳍﺬﺍ ﺍﻟﻘﺎﻧﻮﻥ ﻓﻘﺪ ﰎ ﺗﻌﺪﻳﻠﻪ ﻭﺃﺻﺒﺤﺖ‬
‫ﺍﻟﻔﻘﺮﺓ ﺍﻟﺜﺎﻟﺜﺔ ﻣﻦ ﺍﳌﺎﺩﺓ ‪ 1030‬ﺗﺘﻨﺎﻭﻝ ﻓﻘﻂ ﺍﻟﺪﺧﻮﻝ ﻏﲑ ﺍﳌﺼﺮﺡ ﺑﻪ ﺇﱃ ﺣﺎﺳﺐ ﺁﱄ ﺗﺴﺘﻌﻤﻠﻪ‬
‫ﺍﳊﻜﻮﻣﺔ ﻣﱴ ﺃﻋﺎﻕ ﺍﻟﺪﺧﻮﻝ ﻫﺬﺍ ﺍﻹﺳﺘﻌﻤﺎﻝ‪ .‬ﻭﺃﺿﻴﻔﺖ ﻓﻘﺮﺓ ﺧﺎﻣﺴﺔ ﻟﻠﻤﺎﺩﺓ ‪ 1030‬ﺗﺘﻨﺎﻭﻝ ﺟﺮﳝﺔ‬
‫ﺍﻹﺗﻼﻑ ﺍﻟﻌﻤﺪﻱ ﻭﻏﲑ ﺍﳌﺼﺮﺡ ﺑﻪ ﳌﻌﻠﻮﻣﺎﺕ ﳛﺘﻮﻱ ﻋﻠﻴﻬﺎ ﺣﺎﺳﺐ ﺁﱄ ﺗﺎﺑﻊ ﻟﻠﺤﻜﻮﻣﺔ ﻭﺇﺩﺍﺭ‪‬ﺎ ﺃﻭ‬
‫ﺣﺎﺳﺐ ﺁﱄ ﻏﲑ ﺗﺎﺑﻊ ﻟﻠﺤﻜﻮﻣﺔ ﺇﻻ ﺃﻧﻪ ﻳﺘﻢ ﺍﺳﺘﺨﺪﺍﻣﻪ ﻣﻦ ﻃﺮﻓﻬﺎ ﺃﻭ ﻟﺼﺎﳊﻬﺎ‪ ،‬ﺃﻭ ﺇﻋﺎﻗﺔ ﻫﺬﺍ ﺍﳊﺎﺳﺐ‬
‫ﻋﻦ ﺃﺩﺍﺀ ﺍﳌﻬﺎﻡ ﺍﳌﺨﺘﻠﻔﺔ ﺍﻟﱵ ﺗﺒﺎﺷﺮﻫﺎ ﺍﳊﻜﻮﻣﺔ ﺑﻮﺍﺳﻄﺘﻪ‪ ،‬ﻭﺑﺼﺪﻭﺭ ﻗﺎﻧﻮﻥ ﲪﺎﻳﺔ ﺑﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ‬
‫ﺍﻟﻘﻮﻣﻴﺔ ﻟﻌﺎﻡ ‪ 1996‬ﰎ ﺗﻌﺪﻳﻞ ﺍﳌﺎﺩﺓ ﺍﻟﺴﺎﺑﻘﺔ ﺑﺸﻜﻞ ﺟﻮﻫﺮﻱ‪ ،‬ﻭﻗﺪ ﴰﻞ ﻫﺬﺍ ﺍﻟﺘﻌﺪﻳﻞ ﺍﻟﺘﻮﺳﻊ ﰲ ﻧﻄﺎﻕ‬
‫ﲪﺎﻳﺔ ﺃﻧﻈﻤﺔ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ‪ .‬ﻓﻮﻓﻘﺎ ﻟﻠﻔﻘﺮﺓ ﺍﻟﺜﺎﻧﻴﺔ ﻣﻦ ﺍﳌﺎﺩﺓ ‪ 1030‬ﱂ ﺗﻌﺪ ﺍﳊﻤﺎﻳﺔ ﻣﻘﺼﻮﺭﺓ ﻋﻠﻰ‬
‫ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ ﺍﻟﺘﺎﺑﻌﺔ ﻟﻠﺤﻜﻮﻣﺔ ﻭ ﺇﺩﺍﺭ‪‬ﺎ ﺃﻭ ﺍﻟﱵ ﻳﺘﻢ ﺍﺳﺘﺨﺪﺍﻣﻬﺎ ﻣﻦ ﻗﺒﻠﻬﺎ‪ ،‬ﻭ ﺇﳕﺎ ﺍﺗﺴﻌﺖ ﺍﳊﻤﺎﻳﺔ‬

‫)‪ (1‬ﳏﻤﺪ ﻃﺎﺭﻕ ﻋﺒﺪ ﺍﻟﺮﺅﻭﻑ ﺍﳊﻦ‪ ،‬ﺟﺮﳝﺔ ﺍﻹﺣﺘﻴﺎﻝ ﻋﱪ ﺍﻷﻧﺘﺮﻧﺎﺕ )ﺍﻷﺣﻜﺎﻡ ﺍﳌﻮﺿﻮﻋﻴﺔ ﻭ ﺍﻷﺣﻜﺎﻡ ﺍﻹﺟﺮﺍﺋﻴﺔ (ﻣﻨﺸﻮﺭﺍﺕ ﺍﳊﻠﱯ ﺍﳊﻘﻮﻗﻴﺔ ﺍﻟﻄﺒﻌﺔ‬
‫ﺍﻷﻭﱃ ‪2011‬ﺹ ‪.104‬‬

‫‪- 82 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻟﺘﺸﻤﻞ ﲨﻴﻊ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻟﱵ ﻳﺘﻢ ﺍﺳﺘﺨﺪﺍﻣﻬﺎ ﻣﻦ ﻗﺒﻞ ﺍﳌﺆﺳﺴﺎﺕ ﺍﻹﻗﺘﺼﺎﺩﻳﺔ ﺃﻭ ﺍﻟﱵ ﺗﺴﺘﺨﺪﻡ ﰲ‬
‫ﺍﻟﺘﺠﺎﺭﺓ ﻭ ﺍﻹﺗﺼﺎﻻﺕ ﻭﻫﻮ ﻣﺎ ﺃﻃﻠﻖ ﻋﻠﻴﻪ ﺑﺎﳊﺎﺳﺒﺎﺕ ﺍﻟﱵ ﺗﺘﻤﺘﻊ ﺑﺎﳊﻤﺎﻳﺔ‪.‬‬

‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﱐ‪ :‬ﻣﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻟﺪﻭﱄ‬

‫ﺇﻥ ﺍﻻﻧﺘﺸﺎﺭ ﺍﻟﻮﺍﺳﻊ ﻟﻠﺤﻮﺍﺳﻴﺐ ﺍﻵﻟﻴﺔ ﻭﺷﺒﻜﺎﺕ ﺍﻹﺗﺼﺎﻝ ﺍﳋﺎﺻﺔ ‪‬ﺎ ﻭﺳﻊ ﻛﺜﲑﺍ ﻣﻦ ﺍ‪‬ﺎﻝ‬
‫ﺍﻟﺬﻱ ﳝﻜﻦ ﻟﻠﺠﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻥ ﲢﺪﺙ ﺃﺛﺮﻫﺎ ﻓﻴﻪ‪ .‬ﻓﺄﺻﺒﺢ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﺍﳌﺴﺘﺤﺪﺙ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﻳﻌﱪ‬
‫ﺍﳊﺪﻭﺩ ﻟﻴﻠﺤﻖ ﺍﻟﻀﺮﺭ ﺑﻌﺪﺓ ﺩﻭﻝ ﻭﳎﺘﻤﻌﺎﺕ‪ ،‬ﻭﱂ ﻳﻌﺪ ﻳﺘﻤﺮﻛﺰ ﰲ ﺩﻭﻟﺔ ﻣﻌﻴﻨﺔ ﻭﻻ ﻳﻮﺟﻪ ‪‬ﺘﻤﻊ ﺑﻌﻴﻨﻪ‬
‫ﻧﺘﻴﺠﺔ ﺍﻟﺘﻄﻮﺭ ﺍﻟﻜﺒﲑ ﻟﻠﻮﺳﺎﺋﻞ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳊﺪﻳﺜﺔ ﰲ ﺍﻹﺗﺼﺎﻻﺕ ﻭﺩﺧﻮﻝ ﲨﻴﻊ ﻓﺌﺎﺕ ﺍ‪‬ﺘﻤﻊ ﺇﱃ ﻗﺎﺋﻤﺔ‬
‫ﻣﺴﺘﺨﺪﻣﻴﻬﺎ ﻓﻠﻢ ﻳﺘﺮﺩﺩ ﺍﳌﻨﺤﺮﻓﻮﻥ ﻣﻨﻬﻢ ﰲ ﺍﺳﺘﻐﻼﳍﺎ ﻷﻏﺮﺍﺽ ﺩﻧﻴﺌﺔ‪ ،‬ﻭﺇﺯﺍﺀ ﺫﻟﻚ ﻛﺎﻥ ﻣﻦ ﺍﻟﻀﺮﻭﺭﻱ‬
‫ﺃﻥ ﺗﻠﻢ ﺍﻟﺪﻭﻝ ﴰﻠﻬﺎ ﻭﺗﻮﺣﺪ ﺟﻬﻮﺩﻫﺎ ﰲ ﻣﻮﺍﺟﻬﺔ ﻫﺬﺍ ﺍﻹﺟﺮﺍﻡ‪ ،‬ﻭﺫﻟﻚ ﻣﻦ ﺧﻼﻻﻟﺴﻌﻲ ﺇﱃ ﺗﻜﻮﻳﻦ‬
‫ﺃﺭﺿﻴﺔ ﻗﺎﻧﻮﻧﻴﺔ ﺗﻌﻤﻞ ﻋﻠﻰ ﺩﻋﻢ ﺍﻟﻜﻔﺎﺡ ﺍﻟﺪﻭﱄ ﺍﳌﺸﺘﺮﻙ ﺿﺪ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻃﺮﺡ ﺍﳌﺸﺎﻛﻞ‬
‫ﻭﺍﳊﻠﻮﻝ ﻭﺇﻋﺪﺍﺩ ﻣﺸﺮﻭﻋﺎﺕ ﺍﻟﻘﻮﺍﻧﲔ ﺗﺴﲑ ﻋﻠﻰ ﻫﺪﻳﻬﺎ ﺍﻟﺪﻭﻝ ﺍﳌﺸﺘﺮﻛﺔ‪ ،‬ﻭﻫﻮ ﺩﻭﺭ ﺍﳌﻨﻈﻤﺎﺕ ﺍﻟﺪﻭﻟﻴﺔ‬
‫ﻭﺍﻹﻗﻠﻴﻤﻴﺔ ﻹﺑﺮﺍﻡ ﺍﻹﺗﻔﺎﻗﻴﺎﺕ ‪‬ﺬﺍ ﺍﳋﺼﻮﺹ‪ .‬ﻭﺳﻮﻑ ﻧﻌﺮﺽ ﻓﻴﻤﺎ ﻳﻠﻲ ﺟﻬﻮﺩ ﺍﻷﻣﻢ ﺍﳌﺘﺤﺪﺓ ﰲ‬
‫ﻣﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰒ ﺍﳉﻬﻮﺩ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻹﻗﻠﻴﻤﻲ ﻣﻦ ﺧﻼﻝ ﺍﻻﲢﺎﺩ ﺍﻷﻭﺭﻭﰊ ﻭﳎﻠﺲ‬
‫ﻭﺯﺭﺍﺀ ﺍﻟﻌﺪﻝ ﺍﻟﻌﺮﺏ ﰲ ﻫﺬﺍ ﺍ‪‬ﺎﻝ‪.‬‬

‫ﺍﻟﻔﺮﻋﺎﻷﻭﻝ‪ :‬ﺟﻬﻮﺩ ﺃﻭ ﺩﻭﺭ ﺍﻷﻣﻢ ﺍﳌﺘﺤﺪﺓ ﰲ ﻣﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬

‫ﺗﺒﺬﻝ ﺍﻷﻣﻢ ﺍﳌﺘﺤﺪﺓ ﺟﻬﻮﺩ‪‬ﺍ ﻻ ﻳﺴﺘﻬﺎﻥ ‪‬ﺎ ﰲ ﳎﺎﻝ ﳏﺎﻭﻟﺔ ﺍﻟﺘﺼﺪﻱ ﻟﻠﺠﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﺗﺆﻛﺪ‬
‫ﻋﻠﻰ ﻭﺟﻮﺏ ﺗﻌﺰﻳﺰ ﺍﻟﻌﻤﻞ ﺍﳌﺸﺘﺮﻙ ﺑﲔ ﺃﻋﻀﺎﺀ ﺍﳌﻨﻈﻤﺔ ﻣﻦ ﺃﺟﻞ ﺍﻟﺘﻌﺎﻭﻥ ﻋﻠﻰ ﺍﳊﺪ ﻣﻦ ﺍﻧﺘﺸﺎﺭﻫﺎ‬
‫ﻭﺗﻌﺎﻇﻢ ﺁﺛﺎﺭﻫﺎ‪(1)،‬ﻭﺫﻟﻚ ﻣﻦ ﺧﻼﻝ ﻣﺘﺎﺑﻌﺘﻬﺎ ﻭﺇﺷﺮﺍﻓﻬﺎ ﻋﻠﻰ ﻋﻘﺪ ﺍﳌﺆﲤﺮﺍﺕ ﺍﻟﺪﻭﻟﻴﺔ ﺍﳋﺎﺻﺔ ﲟﻨﻊ‬
‫ﺍﳉﺮﳝﺔ ﻭﻣﻌﺎﻣﻠﺔ ﺍ‪‬ﺮﻣﲔ ﺃﻭ ﻣﻦ ﺧﻼﻝ ﺍﻟﻮﻛﺎﻻﺕ ﻭﺍﳌﻨﻈﻤﺎﺕ ﺍﻟﻌﺎﻣﻠﺔ ﲢﺖ ﻟﻮﺍﺋﻬﺎ‪.‬‬

‫‪1985‬‬ ‫ﻓﻔﻴﻤﺎ ﳜﺺ ﻣﺆﲤﺮﺍﺕ ﺍﻷﻣﻢ ﺍﳌﺘﺤﺪﺓ ﰲ ﻫﺬﺍ ﺍ‪‬ﺎﻝ ﳒﺪ ﺍﳌﺆﲤﺮ ﺍﻟﺴﺎﺑﻊ ﺍﳌﻨﻌﻘﺪ ﲟﻴﻼﻧﻮ ﻋﺎﻡ‬
‫ﺍﻟﺬﻱ ﻛﻠﻒ ﳉﻨﺔ ﺍﳋﱪﺍﺀ ﺍﻟﻌﺸﺮﻳﻦ ﺑﺪﺭﺍﺳﺔ ﻣﻮﺿﻮﻉ ﲪﺎﻳﺔ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻭﺍﻹﻋﺘﺪﺍﺀ ﻋﻠﻰ ﺍﳊﺎﺳﺐ‬
‫ﺍﻵﱄ ﻭﺇﻋﺪﺍﺩ ﺗﻘﺮﻳﺮ ﻳﻌﺮﺿﻪ ﻋﻠﻰ ﺍﳌﺆﲤﺮ ﺍﻟﺜﺎﻣﻦ‪ ،‬ﻭﻗﺪ ﻋﻘﺪ ﻫﺬﺍ ﺍﻷﺧﲑ ﰲ ﻫﺎﻓﺎﻧﺎ ﻋﺎﻡ ‪1990‬ﻭﻗﺪ ﺧﺮﺝ‬

‫)‪ (1‬ﳏﻤﻮﺩ ﺃﲪﺪ ﻋﺒﺎﻧﻪ‪ .‬ﺟﺮﺍﺋﻢ ﺍﳊﺎﺳﻮﺏ ﻭ ﺃﺑﻌﺎﺩﻫﺎ ﺍﻟﺪﻭﻟﻴﺔ ﺩﺍﺭ ﺍﻟﺜﻘﺎﻓﺔ ﻟﻠﻨﺸﺮ ﻭ ﺍﻟﺘﻮﺯﻳﻊ ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪2009‬ﺹ ‪.155‬‬

‫‪- 83 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺑﺎﻟﻌﺪﻳﺪ ﻣﻦ ﺍﻟﺘﻮﺻﻴﺎﺕ)‪ (1‬ﺃﳘﻬﺎ ﺍﻟﺘﺄﻛﻴﺪ ﻋﻠﻰ ﺿﺮﻭﺭﺓ ﺍﻹﺳﺘﻔﺎﺩﺓ ﻣﻦ ﺍﻟﺘﻄﻮﺭﺍﺕ ﺍﻟﻌﻠﻤﻴﺔ ﻭﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺔ‬
‫ﰲ ﻣﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﺃﺷﺎﺭ ﺇﱃ ﻣﺴﺎﻟﺔ ﺍﳋﺼﻮﺻﻴﺔ ﻭﺍﺧﺘﺮﺍﻗﻬﺎ ﺑﺎﻹﻃﻼﻉ ﻋﻠﻰ ﺍﻟﺒﻴﺎﻧﺎﺕ‬
‫ﺍﻟﺸﺨﺼﻴﺔ ﺍﳌﺨﺰﻧﺔ ﺩﺍﺧﻞ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‪ ،‬ﻛﻤﺎ ﺃﻛﺪ ﻋﻠﻰ ﺿﺮﻭﺭﺓ ﲢﺪﻳﺚ ﺍﻟﻘﻮﺍﻧﲔ ﺍﻟﱵ ﺗﺘﻨﺎﻭﻝ ﻫﺬﻩ‬
‫ﺍﳉﺮﺍﺋﻢ ﻭﲢﺴﲔ ﺗﺪﺍﺑﲑ ﺍﻷﻣﻦ ﻭﺍﻟﻮﻗﺎﻳﺔ ﺍﳌﺘﻌﻠﻘﺔ ‪‬ﺎ‪ ،‬ﻭﺗﺪﺭﻳﺐ ﺍﻟﻘﻀﺎﺓ ﻭﺍﳌﺴﺆﻭﻟﲔ ﻋﻠﻰ ﻛﻴﻔﻴﺔ ﺍﻟﺘﺤﻘﻴﻖ‬
‫ﻭﺍﶈﺎﻛﻤﺔ ﻓﻴﻬﺎ‪ ،‬ﻭﻛﺬﺍ ﺍﻟﺘﻌﺎﻭﻥ ﻣﻊ ﺍﳌﻨﻈﻤﺎﺕ ﺍﳌﻬﺘﻤﺔ ‪‬ﺬﺍ ﺍﳌﻮﺿﻮﻉ‪.‬‬

‫ﻛﻤﺎ ﻋﻘﺪ ﻣﺆﲤﺮ ﺍﻷﻣﻢ ﺍﳌﺘﺤﺪﺓ ﳌﻨﻊ ﺍﳉﺮﳝﺔ ﻭﻣﻌﺎﻣﻠﺔ ﺍ‪‬ﺮﻣﲔ ﰲ ﺍﻟﻘﺎﻫﺮﺓ ﻋﺎﻡ ‪ 1995‬ﻭﺍﻟﺬﻱ‬
‫ﺃﻭﺻﻰ ﺑﻮﺟﻮﺏ ﲪﺎﻳﺔ ﺍﻹﻧﺴﺎﻥ ﰲ ﺣﻴﺎﺗﻪ ﺍﳋﺎﺻﺔ ﻭﻣﻠﻜﻴﺘﻪ ﺍﻟﻔﻜﺮﻳﺔ ﻣﻦ ﺗﺰﺍﻳﺪ ﳐﺎﻃﺮ ﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎ‬
‫ﻭﻭﺟﻮﺏ ﺍﻟﺘﻨﺴﻴﻖ ﻭﺍﻟﺘﻌﺎﻭﻥ ﺑﲔ ﺃﻓﺮﺍﺩ ﺍ‪‬ﺘﻤﻊ ﺍﻟﺪﻭﱄ ﻻﲣﺎﺫ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳌﻨﺎﺳﺒﺔ‪ ،‬ﻛﻤﺎ ﺃﻭﺻﻰ ﻛﺬﻟﻚ‬
‫ﺍﳌﺆﲤﺮ ﺍﻟﻌﺎﺷﺮ ﺍﳌﻨﻌﻘﺪ ﰲ ﺑﻮﺩﺍﺑﺴﺖ ﻋﺎﻡ ‪ 2000‬ﺑﻮﺟﻮﺏ ﺍﻟﻌﻤﻞ ﺍﳉﺎﺩ ﻣﻦ ﺃﺟﻞ ﺍﳊﺪ ﻣﻦ ﺟﺮﺍﺋﻢ ﺗﻘﻨﻴﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺘﺰﺍﻳﺪﺓ ﻭﺍﻟﱵ ﺍﻋﺘﱪﺕ ﳕﻄﺎ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺴﺘﺤﺪﺛﺔ ﻭﺍﻟﻌﻤﻞ ﻋﻠﻰ ﺍﲣﺎﺫ ﺗﺪﺍﺑﲑ ﻣﻨﺎﺳﺒﺔ ﻟﻠﺤﺪ‬
‫ﻣﻦ ﺃﻋﻤﺎﻝ ﺍﻟﻘﺮﺻﻨﺔ)‪.(2‬‬

‫ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﻣﺆﲤﺮﺍﺕ ﺍﻷﻣﻢ ﺍﳌﺘﺤﺪﺓ ﻧﺬﻛﺮ ﰲ ﻫﺬﺍ ﺍ‪‬ﺎﻝ ﺍﳌﺆﲤﺮ ﺍﳋﺎﻣﺲ ﻋﺸﺮ ﻟﻠﺠﻤﻌﻴﺔ ﺍﻟﺪﻭﻟﻴﺔ‬
‫ﻟﻘﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﺍﻟﺬﻱ ﻋﻘﺪ ﰲ ﺭﻳﻮﺩﻱ ﺟﺎﻧﲑﻭ ﻋﺎﻡ ‪ 1994‬ﻭﻗﺪ ﺧﺮﺝ ﺑﺎﻟﻌﺪﻳﺪ ﻣﻦ ﺍﻟﺘﻮﺻﻴﺎﺕ ﻣﻨﻬﺎ‬
‫ﻣﺎ ﻳﺘﻌﻠﻖ ﺑﻮﺿﻊ ﻗﺎﺋﻤﺔ ﺑﺎﳊﺪ ﺍﻷﺩﱏ ﻟﻸﻓﻌﺎﻝ ﺍﳌﺘﻌﲔ ﲡﺮﳝﻬﺎ ﻭﺍﻋﺘﺒﺎﺭﻫﺎ ﻣﻦ ﻗﺒﻴﻞ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﻭﻭﺟﻮﺏ ﲢﺪﻳﺪ ﺍﳉﻬﺎﺕ ﺍﻟﱵ ﺗﻘﻮﻡ ﺑﺈﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﻭﺍﻟﻀﺒﻂ‪ ،‬ﻭﺿﺮﻭﺭﺓ ﻭﺿﻊ ﺍﻟﻘﻮﺍﻋﺪ ﺍﳌﺘﻌﻠﻘﺔ‬
‫ﺑﺎﻹﺛﺒﺎﺕ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻭﻣﺼﺪﺍﻗﻴﺔ ﺍﻷﺩﻟﺔ)‪.(3‬‬

‫ﺯﻳﺎﺩﺓ ﻋﻠﻰ ﺟﻬﻮﺩ ﺍﻷﻣﻢ ﺍﳌﺘﺤﺪﺓ ﻣﻦ ﺧﻼﻝ ﻣﺆﲤﺮﺍ‪‬ﺎ ﺍﻟﱵ ﺗﻌﲎ ﳝﻨﻊ ﺍﳉﺮﳝﺔ ﻭﻣﻌﺎﻣﻠﺔ ﺍ‪‬ﺮﻣﲔ ﻭ‬
‫ﺍﻟﱵ ﻳﻘﻊ ﻋﻠﻰ ﻋﺎﺗﻘﻬﺎ ﻣﻬﻤﺔ ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ ﻭﺗﻘﺪﱘ ﺍﳌﺸﻮﺭﺓ ﻟﻸﻣﲔ ﺍﻟﻌﺎﻡ ﻭﺇﳚﺎﺩ ﺍﻟﱪﺍﻣﺞ ﻭﻭﺿﻊ‬
‫ﺍﳋﻄﻂ ﻭﺭﺳﻢ ﺳﻴﺎﺳﺎﺕ ﻟﺘﺪﺍﺑﲑ ﺩﻭﻟﻴﺔ ﰲ ﳎﺎﻝ ﻣﻨﻊ ﺍﳉﺮﳝﺔ‪ ،‬ﺗﻠﻌﺐ ﺍﻟﻮﻛﺎﻻﺕ ﻭﺍﳌﻨﻈﻤﺎﺕ ﺍﻟﻌﺎﳌﻴﺔ‬
‫ﺍﻟﻌﺎﻣﻠﺔ ﲢﺖ ﻟﻮﺍﺀ ﺍﻷﻣﻢ ﺍﳌﺘﺤﺪﺓ ﺩﻭﺭ‪‬ﺍ ﰲ ﻫﺬﺍ ﺍ‪‬ﺎﻝ ﻭﻣﻦ ﺫﻟﻚ ﺍﳌﻨﻈﻤﺔ ﺍﻟﻌﺎﳌﻴﺔ ﻟﻠﻤﻠﻜﻴﺔ ﺍﻟﻔﻜﺮﻳﺔ‬

‫)‪ (1‬ﳏﻤﺪ ﻃﺎﺭﻕ ﻋﺒﺪ ﺍﻟﺮﺅﻭﻑ ﺍﳊﻦ‪ .‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ ‪.118‬‬
‫)‪ (2‬ﳏﻤﻮﺩ ﺃﲪﺪ ﻋﻴﺎﻧﺔ‪ .‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ ‪.159‬‬
‫)‪ (3‬ﻣﺸﺎﺭ ﺍﻟﻴﻪ ﻟﺪﻯ ﳏﻤﺪ ﻃﺎﺭﻕ ﻋﺒﺪ ﺍﻟﺮﺅﻭﻑ ﺍﳊﻦ‪.‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ ‪.188‬‬

‫‪- 84 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫)‪ .(1) (WIPO‬ﻫﺬﻫﺎﻷﺧﲑﺓ ﺷﻜﻠﺖ ﳎﻤﻮﻋﺔ ﻋﻤﻞ ﺗﻀﻢ ﻋﺪﺩﺍ ﻛﺒﲑﺍ ﻣﻦ ﺍﳋﱪﺍﺀ ‪‬ﺪﻑ ﺩﺭﺍﺳﺔ‬
‫ﺍﻷﺳﺎﻟﻴﺐ ﺍﳌﻨﺎﺳﺒﺔ ﳊﻤﺎﻳﺔ ﺑﺮﺍﻣﺞ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻣﻦ ﺧﻼﻝ ﺇﺧﻀﺎﻋﻬﺎ ﻟﻘﻮﺍﻧﲔ ﲪﺎﻳﺔ ﺣﻖ ﺍﳌﺆﻟﻒ‪.‬‬

‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺍﳉﻬﻮﺩ ﺍﻹﻗﻠﻴﻤﻴﺔ ﰲ ﻣﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬

‫ﺍﺧﺘﺮﻧﺎ ﻟﻠﺘﺪﻟﻴﻞ ﻋﻠﻰ ﻫﺬﻩ ﺍﳉﻬﻮﺩ ﺍﻟﺪﻭﺭ ﺍﻟﺬﻱ ﻟﻌﺒﻪ ﻛﻞ ﻣﻦ ﺍ‪‬ﻠﺲ ﺍﻷﻭﺭﻭﰊ ﻭﺍﳉﺎﻣﻌﺔ ﺍﻟﻌﺮﺑﻴﺔ ﰲ‬
‫ﺇﻃﺎﺭ ﺍﳌﻜﺎﻓﺤﺔ ﺍﻟﺘﺸﺮﻳﻌﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻹﻗﻠﻴﻤﻲ‪.‬‬

‫ﺃﻭﻻ‪ :‬ﺩﻭﺭ ﺍ‪‬ﻠﺲ ﺍﻷﻭﺭﻭﰊ‪ :‬ﻟﻌﺐ ﺍ‪‬ﻠﺲ ﺍﻷﻭﺭﻭﰊ ﺩﻭﺭﺍ ﻣﻬﻤﺎ ﰲ ﳏﺎﻭﻟﺔ ﺍﳊﺪ ﻣﻨﺎﳉﺮﺍﺋﻢ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻣﻦ ﺧﻼﻝ ﺇﻗﺮﺍﺭﻩ ﺍﻟﻌﺪﻳﺪ ﻣﻦ ﺍﻟﺘﻮﺻﻴﺎﺕ ﺍﳋﺎﺻﺔ ﲝﻤﺎﻳﺔ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺫﺍﺕ ﺍﻟﺼﺒﻐﺔ ﺍﻟﺸﺨﺼﻴﺔ‬
‫ﻣﻦ ﺳﻮﺀ ﺍﻹﺳﺘﺨﺪﺍﻡ ﻭﲪﺎﻳﺔ ﺗﺪﻓﻖ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﻭﰲ ‪ 1981/01/28‬ﰎ ﺗﻮﻗﻴﻊ ﺇﺗﻔﺎﻗﻴﺔ ﲢﺖ ﻣﻀﻠﺔ ﺍ‪‬ﻠﺲ‬
‫ﺍﻷﻭﺭﻭﰊ ﺗﺘﻌﻠﻖ ﲝﻤﺎﻳﺔ ﺍﻷﺷﺨﺎﺹ ﰲ ﻣﻮﺍﺟﻬﺔ ﺍﳌﻌﺎﳉﺔ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ ﻟﻠﺒﻴﺎﻧﺎﺕ ﺫﺍﺕ ﺍﻟﺼﺒﻐﺔ ﺍﻟﺸﺨﺼﻴﺔ‪.‬‬

‫ﻭﰲ ﻋﺎﻡ ‪ 1989‬ﻧﺸﺮ ﺍ‪‬ﻠﺲ ﺍﻷﻭﺭﻭﰊ ﺩﺭﺍﺳﺔ ﺗﻀﻤﻨﺖ ﺗﻮﺻﻴﺎﺕ ﺗﻔﻌﻴﻞ ﺩﻭﺭ ﺍﻟﻘﺎﻧﻮﻥ ﳌﻮﺍﺟﻬﺔ‬
‫ﺍﻷﻓﻌﺎﻝ ﻏﲑ ﺍﳌﺸﺮﻭﻋﺔ ﻋﱪ ﺍﳊﺎﺳﺐ ﻭﻫﻲ ﺍﻟﺘﻮﺻﻴﺔ ﺍﻟﱵ ﳊﻘﺘﻬﺎ ﺩﺭﺍﺳﺔ ﺃﺧﺮﻯ ﰲ ﻋﺎﻡ ‪ 1995‬ﺣﻮﻝ‬
‫ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﻨﺎﺋﻴﺔ ﰲ ﳎﺎﻝ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ .‬ﻭﻋﻠﻰ ﺃﺳﺎﺱ ﺍﳌﺒﺎﺩﺉ ﺍﻟﱵ ﺗﻀﻤﻨﺘﻬﺎ ﺍﻟﺘﻮﺻﻴﺎﺕ ﻗﺎﻡ‬
‫ﺍ‪‬ﻠﺲ ﺍﻷﻭﺭﻭﰊ ﰲ ﻋﺎﻡ ‪ 1997‬ﺑﺘﺸﻜﻴﻞ ﳉﻨﺔ ﺧﱪﺍﺀ ﺍﳉﺮﳝﺔ ﻋﱪ ﺍﻟﻌﺎﱂ ﺍﻻﻓﺘﺮﺍﺿﻲ ﻭﺫﻟﻚ ﺑﻘﺼﺪ ﺇﻋﺪﺍﺩ‬
‫) ‪(2‬‬
‫ﺇﺗﻔﺎﻗﻴﺔ ﰲ ﻫﺬﺍ ﺍﻹﻃﺎﺭ‬

‫ﻭﻟﻌﻞ ﺃﻫﻢ ﻣﺎ ﻗﺎﻡ ﺑﻪ ﺍ‪‬ﻠﺲ ﰲ ﻫﺬﺍ ﺍ‪‬ﺎﻝ ﻫﻮ ﺇﺷﺮﺍﻓﻪ ﻋﻠﻰ ﺍﺗﻔﺎﻗﻴﺔ ﺑﻮﺩﺍﺑﺴﺖ ﺍﳌﻮﻗﻌﺔ ﰲ‬
‫‪ . (3)2001/11/23‬ﻭﺭﻏﻢ ﺃﻥ ﻫﺬﻩ ﺍﻻﺗﻔﺎﻗﻴﺔ ﻫﻲ ﰲ ﺍﻷﺻﻞ ﺃﻭﺭﻭﺑﻴﺔ ﺍﳌﻴﻼﺩ ﺇﻻ ﺃ‪‬ﺎ ﺩﻭﻟﻴﺔ ﺍﻟﻄﺎﺑﻊ‪ ،‬ﳌﺎ‬
‫ﺗﻈﻬﺮﻩ ﻣﻦ ﺑﻌﺪ ﺣﻘﻴﻘﻲ ﻋﻦ ﺍﻹﻫﺘﻤﺎﻡ ﺍﻟﺪﻭﱄ ‪‬ﺬﻩ ﺍﻟﻨﻮﻋﻴﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‪.‬ﻭﻗﺪ ﺗﻀﻤﻨﺖ ﻫﺬﻩ ﺍﻻﺗﻔﺎﻗﻴﺔ ‪48‬‬
‫ﻣﺎﺩﺓ ﻏﻄﺖ ﰲ ﻣﻀﻤﻮ‪‬ﺎ ﺛﻼﺙ ﺃﻗﺴﺎﻡ ﻛﱪﻯ‪:‬‬

‫)‪World international propretyorganization. (1‬‬


‫)‪ (2‬ﻭﺿﺎﺡ ﳏﻤﻮﺩ ﺍﳊﻤﻮﺩ ﻭﻧﺸﺎﺕ ﻣﻔﻀﻲ ﺍ‪‬ﺎﱄ ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ ‪.200‬‬
‫)‪ (3‬ﺑﺘﺎﺭﻳﺦ ‪ 2001/11/23‬ﻗﺎﻣﺖ ‪ 26‬ﺩﻭﻟﺔ ﺃﻭﺭﻭﺑﻴﺔ ﺑﺎﻟﺘﻮﻗﻴﻊ ﻋﻠﻰ ﺃﻭﻝ ﺍﺗﻔﺎﻗﻴﺔ ﺗﻜﺎﻓﺢ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻛﻤﺎ ﺷﺎﺭﻛﺖ ﺃﺭﺑﻊ ﺩﻭﻝ ﻣﻦ ﻏﲑ ﺍﻷﻋﻀﺎﺀ‬
‫ﰲ ﺍ‪‬ﻠﺲ ﺍﻷﻭﺭﻭﰊ ﺑﺎﳌﺸﺎﺭﻛﺔ ﰲ ﺇﻋﺪﺍﺩ ﻫﺬﻩ ﺍﻻﺗﻔﺎﻗﻴﺔ ﻭﺍﻟﺘﻮﻗﻴﻊ ﻋﻠﻴﻬﺎ ﺃﻳﻀﺎ ﻭﻫﻲ ﻛﻨﺪﺍ ﺍﻟﻴﺎﺑﺎﻥ ﻭﺟﻨﻮﺏ ﺇﻓﺮﻳﻘﻴﺎ ﻭﺍﻟﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ ﺍﻷﻣﺮﻳﻜﻴﺔ‪ .‬ﻭﻗﺪ‬
‫ﺍﺳﺘﻐﺮﻗﺖ ﺍﳌﻔﺎﻭﺿﺎﺕ ﺑﲔ ﺍﻟﺪﻭﻝ ﺃﺭﺑﻌﺔ ﺃﻋﻮﺍﻡ ﺣﱴ ﰎ ﺍﻟﺘﻮﺻﻞ ﺇﱃ ﺍﻟﺼﻴﻐﺔ ﺍﻟﻨﻬﺎﺋﻴﺔ‪.‬‬

‫‪- 85 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫) ‪(1‬‬
‫‪ -‬ﺍﻟﻘﺴﻢ ﺍﻷﻭﻝ ﺗﻨﺎﻭﻝ ﳎﻤﻮﻋﺔ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﳝﻜﻦ ﺃﻥ ﺗﺘﻌﺮﺽ ﳍﺎ ﺍﻟﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫‪ -‬ﺍﻟﻘﺴﻢ ﺍﻟﺜﺎﱐ‪ :‬ﺗﻨﺎﻭﻝ ﳎﻤﻮﻋﺔ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﻨﺎﺋﻴﺔ ﺍﻟﱵ ﳝﻜﻦ ﺃﻥ ﺗﺘﺨﺬ ﰲ ﻣﻮﺍﺟﻬﺔ ﻫﺬﺍ‬
‫ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺧﺼﻮﺻﺎ ﺗﻔﺘﻴﺶ ﻭﺿﺒﻂ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﳌﺨﺰﻧﺔ ﰲ ﺍﳊﺎﺳﻮﺏ‪.‬‬
‫‪ -‬ﺍﻟﻘﺴﻢ ﺍﻟﺜﺎﻟﺚ‪ :‬ﺗﻨﺎﻭﻝ ﻣﻮﺿﻮﻉ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﺪﻭﱄ ﺑﲔ ﺍﻟﺪﻭﻝ ﺍﻷﻋﻀﺎﺀ ﺍﳌﻮﻗﻌﺔ ﻋﻠﻰ ﺍﻹﺗﻔﺎﻗﻴﺔ‪.‬‬

‫ﺛﺎﻧﻴﺎ‪ :‬ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﻌﺮﰊ ﺍﻹﺳﺘﺮﺷﺎﺩﻱ‪) 2‬ﺍﻟﻨﻤﻮﺫﺟﻲ( ﳌﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬ﺇﻋﺘﻤﺪﺕ‬


‫ﺟﺎﻣﻌﺔ ﺍﻟﺪﻭﻝ ﺍﻟﻌﺮﺑﻴﺔ ﻋﱪ ﺍﻷﻣﺎﻧﺔ ﺍﻟﻌﺎﻣﺔ ‪‬ﻠﺲ ﻭﺯﺭﺍﺀ ﺍﻟﻌﺪﻝ ﺍﻟﻌﺮﺏ ﻣﺎ ﲰﻲ ﺑﺎﻟﻘﺎﻧﻮﻥ ﺍﻟﻌﺮﰊ‬
‫ﺍﻹﺳﺘﺮﺷﺎﺩﻱ ﳌﻜﺎﻓﺤﺔ ﺟﺮﺍﺋﻢ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﻣﺎ ﰲ ﺣﻜﻤﻬﺎ‪ ،‬ﺃﻳﻦ ﰎ ﺍﻋﺘﻤﺎﺩﻩ ﻣﻦ ﻗﺒﻞ ﳎﻠﺲ ﻭﺯﺭﺍﺀ‬
‫ﺍﻟﻌﺪﻝ ﺍﻟﻌﺮﺏ ﰲ ﺩﻭﺭﺗﻪ ﺍﻟﺘﺎﺳﻌﺔ ﻋﺸﺮ ﺑﺎﻟﻘﺮﺍﺭ ﺭﻗﻢ )‪-495‬ﺩ ‪ (2003/10/08-19‬ﻭﻳﻌﺪ ﻫﺬﺍ ﺍﻟﻘﺎﻧﻮﻥ‬
‫ﺃﺑﺮﺯ ﺍﳉﻬﻮﺩ ﺍﻟﻌﺮﺑﻴﺔ ﺍﳌﺒﺬﻭﻟﺔ ﰲ ﳎﺎﻝ ﺍﳊﻤﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﺍﻟﻨﺎﺣﻴﺔ ﺍﻟﺘﺸﺮﻳﻌﻴﺔ‪ .‬ﻭﻗﺪ ﺗﻀﻤﻦ‬
‫ﻫﺬﺍ ﺍﻟﻘﺎﻧﻮﻥ ‪ 27‬ﻣﺎﺩﺓ ﻣﻮﺯﻋﺔ ﻋﻠﻰ ﺃﺭﺑﻌﺔ ﺃﺑﻮﺍﺏ ﻳﻌﺎﰿ ﺍﻟﺒﺎﺏ ﺍﻷﻭﻝ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫ﻭﺍﻟﱵ ﰎ ﺍﻟﻨﺺ ﻋﻠﻴﻬﺎ ﰲ ﺍﳌﻮﺍﺩ ﻣﻦ ‪ 3‬ﺇﱃ ‪ 22‬ﻭﻣﻦ ﺃﳘﻬﺎ‪:‬‬

‫‪ -‬ﺟﺮﳝﺔ ﺍﻟﺪﺧﻮﻝ ﺑﻐﲑ ﺣﻖ ﺇﱃ ﻣﻮﻗﻊ ﺃﻭ ﻧﻈﺎﻡ ﻣﻌﻠﻮﻣﺎﰐ‪ ،‬ﻣﻊ ﺗﺸﺪﻳﺪ ﺍﻟﻌﻘﻮﺑﺔ ﺇﺫﺍ ﻛﺎﻥ ﺑﻐﺮﺽ‬
‫ﺇﻟﻐﺎﺀ ﺃﻭ ﺇﺗﻼﻑ ﺃﻭ ﺇﻋﺎﺩﺓ ﻧﺸﺮ ﺑﻴﺎﻧﺎﺕ ﺃﻭ ﻣﻌﻠﻮﻣﺎﺕ ﺷﺨﺼﻴﺔ‪.‬‬
‫‪ -‬ﺟﺮﳝﺔ ﺗﺰﻭﻳﺮ ﺍﳌﺴﺘﻨﺪﺍﺕ ﺍﳌﻌﺎﳉﺔ ﰲ ﻧﻈﺎﻡ ﻣﻌﻠﻮﻣﺎﰐ ﻭﺍﺳﺘﻌﻤﺎﻟﻪ‪.‬‬
‫‪ -‬ﺟﺮﳝﺔ ﺍﻹﺩﺧﺎﻝ ﺍﻟﺬﻱ ﻣﻦ ﺷﺄﻧﻪ ﺇﻳﻘﺎﻑ ﺍﻟﺸﺒﻜﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻦ ﺍﻟﻌﻤﻞ‪ ،‬ﺃﻭ ﺇﺗﻼﻑ ﺍﻟﱪﺍﻣﺞ‬
‫ﺃﻭ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻓﻴﻬﺎ‪.‬‬
‫‪ -‬ﺟﺮﳝﺔ ﺍﻟﺘﻨﺼﺖ ﺩﻭﻥ ﻭﺟﻪ ﺣﻖ ﻋﻠﻰ ﻣﺎ ﻫﻮ ﻣﺮﺳﻞ ﻋﻦ ﻃﺮﻳﻖ ﺍﻟﺸﺒﻜﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫)‪ (1‬ﺗﻀﻤﻨﺖ ﺍﻹﺗﻔﺎﻗﻴﺔ ﺃﺭﺑﻊ ﻃﻮﺍﺋﻒ ﺭﺋﻴﺴﻴﺔ ﻟﻠﺠﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻫﺬﻩ ﺍﻟﻄﺮﺍﺋﻖ ﻫﻲ‪:‬‬
‫‪ -‬ﺍﻟﻄﺎﺋﻔﺔ ﺍﻷﻭﻝ‪ :‬ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﺗﺴﺘﻬﺪﻑ ﻋﻨﺎﺻﺮ ﺃﻣﻦ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﻫﻲ ﺍﳉﺮﺍﺋﻢ ﺿﺪ ﺍﻟﺴﺮﻳﺔ ﻭﺍﻟﺴﻼﻣﺔ ﻭﻭﺟﻮﺩ ﺑﻴﺎﻧﺎﺕ ﺍﳊﺎﺳﻮﺏ ﻭﺗﺸﻤﻞ ﺟﺮﳝﺔ‬
‫ﺍﻟﺪﺧﻮﻝ ﻏﲑ ﺍﳌﺸﺮﻭﻉ‪ -‬ﺟﺮﳝﺔ ﺍﳌﺮﺍﻗﺒﺔ ﺃﻭ ﺍﻻﻋﺘﺮﺍﺽ ﻏﲑ ﺍﳌﺸﺮﻭﻉ‪ -‬ﺟﺮﳝﺔ ﺍﻟﺘﺸﻮﻳﺶ ﻋﻠﻰ ﺍﻟﺒﻴﺎﻧﺎﺕ‪ -‬ﺟﺮﳝﺔ ﺇﺗﻼﻑ ﻧﻈﺎﻡ ﺍﳊﺎﺳﻮﺏ‪.‬‬
‫‪ -‬ﺍﻟﻄﺎﺋﻔﺔ ﺍﻟﺜﺎﻧﻴﺔ‪ :‬ﻭﺗﺸﻤﻞ ﺍﻟﺘﺰﻭﻳﺮ ﺍﳌﺮﺗﺒﻂ ﺑﺎﳊﺎﺳﻮﺏ ﻭﺍﻹﺣﺘﻴﺎﻝ ﺍﳌﺮﺗﺒﻂ ﺑﺎﳊﺎﺳﻮﺏ‪.‬‬
‫‪ -‬ﺍﻟﻄﺎﺋﻔﺔ ﺍﻟﺜﺎﻟﺜﺔ‪ :‬ﺍﳉﺮﺍﺋﻢ ﺍﳌﺮﺗﺒﻄﺔ ﺑﺎﶈﺘﻮﻱ ﻭﻫﻲ ﺟﺮﳝﺔ ﺩﻋﺎﺭﺓ ﺍﻷﻃﻔﺎﻝ‪.‬‬
‫‪ -‬ﺍﻟﻄﺎﺋﻔﺔ ﺍﻟﺮﺍﺑﻌﺔ‪ :‬ﻭﺗﺸﻤﻞ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﺗﻌﺪ ﺍﻋﺘﺪﺍﺀ ﻋﻠﻰ ﺍﳌﺼﻨﻔﺎﺕ ﺍﶈﻤﻴﺔ‪.‬‬
‫)‪ (2‬ﰎ إﻋﺪاد ﻫﺬا اﻟﻘﺎﻧﻮن ﻣﻦ ﻗﺒﻞ ﳉﻨﺔ ﻣﺸﱰﻛﺔ ﺑﲔ اﳌﻜﺘﺐ اﻟﺘﻨﻔﯿﺬي ﳌﺆﲤﺮ‬
‫وزراء اﻟﻌﺪل اﻟﻌﺮب و اﳌﻜﺘﺐ اﻟﺘﻨﻔﯿﺬي ﳌﺆﲤﺮ وزراء اﻟﺪاﺧﻠﯿﺔ اﻟﻌﺮب‬
‫ﺣﯿﺚ ﺟﺮى إﻗﺮاره ﺑﻮﺻﻔﻪ ﻣﻨﻬﺠﺎ اﺳﱰﺷﺎدﯾﺎ ﻟﻠﻤﺸﺮع اﻟﻮﻃﲏ ﻋﻨﺪ إﻋﺪاد‬
‫ﺗﺸﺮﯾﻊ ﯾﺘﻌﻠﻖ ﺑﺎﳉﺮاﺋﻢ اﳌﻌﻠﻮﻣﺎﺗﯿﺔ‪.‬‬
‫‪- 86 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫‪ -‬ﺍﳉﺮﺍﺋﻢ ﺍﳌﺨﻠﺔ ﺑﺎﻵﺩﺍﺏ ﺍﻟﻌﺎﻣﺔ ﻋﱪ ﺍﻟﺸﺒﻜﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫ﻭﺗﻨﺎﻭﻝ ﺍﻟﺒﺎﺏ ﺍﻟﺜﺎﱐ ﺍﻟﺘﺠﺎﺭﺓ ﻭﺍﳌﻌﺎﻣﻼﺕ ﺍﻹﻛﺘﺮﻭﻧﻴﺔ‪ ،‬ﺃﻣﺎ ﺍﻟﺒﺎﺏ ﺍﻟﺜﺎﻟﺚ ﻓﻘﺪ ﺗﻨﺎﻭﻝ ﲪﺎﻳﺔ ﺣﻘﻮﻕ‬
‫ﺍﳌﺆﻟﻒ ﻋﱪ ﺍﻟﻮﺳﺎﺋﻂ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﰲ ﺣﲔ ﻋﺎﰿ ﺍﻟﺒﺎﺏ ﺍﻟﺮﺍﺑﻊ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫ﻭﺇﻥ ﻛﺎﻥ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﻌﺮﰊ ﺍﻹﺳﺘﺮﺷﺎﺩﻱ ﳌﻜﺎﻓﺤﺔ ﺟﺮﺍﺋﻢ ﺗﻘﻨﻴﺔ ﺃﻧﻈﻤﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﻣﺎ ﰲ ﺣﻜﻤﻬﺎ‬
‫ﺟﺎﺀ ﻣﻮﻓﻘﺎ ﺇﱃ ﺣﺪ ﻣﺎ ﰲ ﺃﺣﻜﺎﻣﻪ ﺍﳌﻮﺿﻮﻋﻴﺔ ﺣﻴﺚ ﴰﻠﺖ ﺑﻴﺎﻧﺎ ﻷﻫﻢ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﳝﻜﻦ ﺃﻥ ﺗﺮﺗﻜﺐ‬
‫ﰲ ﳎﺎﻝ ﺍﻷﻧﻈﻤﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺇﻻ ﺃﻧﻪ ﻳﺆﺧﺬ ﻋﻠﻴﻪ ﺧﻠﻮﻩ ﻣﻦ ﺍﻷﺣﻜﺎﻡ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﻟﻀﺮﻭﺭﻳﺔ ﳌﻼﺣﻘﺔ ﻫﺬﻩ‬
‫ﺍﳉﺮﺍﺋﻢ‪ ،‬ﻓﻠﻢ ﻳﺘﻌﺮﺽ ﳌﺴﺄﻟﺔ ﺍﻹﺧﺘﺼﺎﺹ ﺍﻟﻘﻀﺎﺋﻲ ﺑﺸﻜﻞ ﻭﺍﺿﺢ ﻭﱂ ﻳﺸﺮ ﺇﱃ ﺇﺧﻀﺎﻉ ﺍﻟﺒﻴﺎﻧﺎﺕ‬
‫ﻭﺍﳌﻌﻠﻮﻣﺎﺕ ﻹﺟﺮﺍﺀﺍﺕ ﺍﻟﺘﻔﺘﻴﺶ ﻭﺍﻟﻀﺒﻂ‪ ،‬ﻭﱂ ﻳﺘﻌﺮﺽ ﻛﺬﻟﻚ ﳌﻔﻬﻮﻡ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺘﻘﲏ ﻭﺷﺮﻭﻃﻪ‬
‫ﻭﺣﺠﻴﺘﻪ‪.‬‬

‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﻟﺚ‪ :‬ﺍﻟﺘﻌـﺎﻭﻥ ﺍﻟـﺪﻭﱄ ﰲ ﳎﺎﻝ ﻣﻜﺎﻓﺤـﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠـﻮﻣﺎﺗﻴﺔ‬

‫ﰲ ﺍﻟﻌﺎﱂ ﺍﻹﻓﺘﺮﺍﺿﻲ ﺍﻟﺮﺣﺐ ﳝﻜﻦ ﺃﻥ ﻳﻘﻮﻡ ﺷﺨﺺ ﺑﺎﺭﺗﻜﺎﺏ ﺟﺮﺍﺋﻢ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺃﺛﻨﺎﺀ ﻭﺟﻮﺩﻩ ﰲ‬
‫ﺑﻠﺪ ﻣﻌﲔ ﺿﺪ ﺿﺤﺎﻳﺎ ﻗﺎﻃﻨﲔ ﰲ ﺑﻠﺪ ﺁﺧﺮ ﳐﺘﻠﻒ‪ ،‬ﻛﻤﺎ ﳝﻜﻦ ﺃﻥ ﻳﺘﻢ ﺍﺭﺗﻜﺎﺏ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﰲ ﻋﺪﺩ‬
‫ﻣﻦ ﺍﻟﺒﻠﺪﺍﻥ ﰲ ﻧﻔﺲ ﺍﻟﻮﻗﺖ ﻭﻣﻦ ﺫﺍﺕ ﺍﳌﻨﻄﻠﻖ‪ ،‬ﻛﻤﺎ ﳝﻜﻦ ﻟﻸﺷﺨﺎﺹ ﺍﻟﻘﺎﺋﻤﲔ ﻋﻠﻰ ﺗﻮﺟﻴﻪ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻥ ﻳﻘﻮﻣﻮﺍ ﺑﺘﺤﺮﻳﻚ ﻣﻮﻗﻊ ﺍﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﻣﻦ ﺑﻠﺪ ﺇﱃ ﺁﺧﺮ ﺣﱴ ﺗﺴﺘﻌﺼﻲ ﺍﳉﺮﳝﺔ ﻋﻠﻰ‬
‫ﺍﻟﻜﺸﻒ ﻭﻳﺼﻌﺐ ﺗﺘﺒﻊ ﺍﳉﻨﺎﺓ‪ ،‬ﻭﻣﻦ ﲦﺔ ﻓﺈﻥ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﺩﺕ ﺇﱃ ﻧﺘﻴﺠﺔ ﻣﺆﺩﺍﻫﺎ ﺃﻥ ﺃﻣﺎﻛﻦ‬
‫ﻣﺘﻌﺪﺩﺓ ﰲ ﺩﻭﻝ ﳐﺘﻠﻔﺔ ﻗﺪ ﺗﺘﺄﺛﺮ ﲜﺮﳝﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺍﺣﺪﺓ ﰲ ﺁﻥ ﻭﺍﺣﺪ‪.‬‬

‫ﻓﺎﻟﺒﻌﺪ ﺍﻟﺪﻭﱄ)‪ (1‬ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺇﺫﻥ ﻳﻔﺮﺽ ﻋﻠﻰ ﺍ‪‬ﺘﻤﻊ ﺍﻟﺪﻭﱄ ﺍﻟﺒﺤﺚ ﻋﻦ ﻭﺳﺎﺋﻞ ﺃﻛﺜﺮ‬
‫ﻣﻼﺋﻤﺔ ﻟﻄﺒﻴﻌﺔ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻟﺘﻀﻴﻴﻖ ﺍﻟﺜﻐﺮﺍﺕ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﱵ ﺑﺮﻉ ﻣﺮﺗﻜﺒﻮﻫﺎ ﰲ ﺍﺳﺘﻐﻼﳍﺎ ﻟﻠﺘﻬﺮﺏ ﻣﻦ‬
‫ﺍﻟﻌﻘﺎﺏ ﻭﻟﻨﺸﺮ ﻧﺸﺎﻃﻬﻢ ﺍﻹﺟﺮﺍﻣﻲ ﰲ ﻣﻨﺎﻃﻖ ﳐﺘﻠﻔﺔ ﻣﻦ ﺃﳓﺎﺀ ﺍﻟﻌﺎﱂ‪.‬‬

‫)‪(1‬ﻟﻘﺪ ﺍﻋﺘﱪﺕ ﺇﺗﻔﺎﻗﻴﺔ ﺍﻷﻣﻢ ﺍﳌﺘﺤﺪﺓ ﳌﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻨﻈﻤﺔ ﻋﱪ ﺍﻟﻮﻃﻨﻴﺔﺍﳌﻌﺘﻤﺪﺓ ﻣﻦ ﻃﺮﻑ ﺍﳉﻤﻌﻴﺔ ﺍﻟﻌﺎﻣﺔ ﻟﻸﻣﻢ ﺍﳌﺘﺤﺪﺓ ﰲ ‪2000/11/15‬ﰲ‬
‫ﺍﻟﺒﺎﺏ ﺍﻟﺜﺎﻟﺚ ﻣﻨﻬﺎ ﺃﻥ ﺃﻱ ﺟﺮﳝﺔ ﺗﻌﺪ ﺟﺮﳝﺔ ﺫﺍﺕ ﻃﺎﺑﻊ ﺩﻭﱄ ﺇﺫﺍ‪:‬‬

‫‪ -‬ﰎ ﺍﺭﺗﻜﺎ‪‬ﺎ ﰲ ﺃﻛﺜﺮ ﻣﻦ ﺩﻭﻟﺔ‪.‬‬


‫‪ -‬ﰎ ﺍﺭﺗﻜﺎ‪‬ﺎ ﰲ ﺩﻭﻟﺔ ﻣﺎ ﻭﻟﻜﻦ ﺟﺎﻧﺐ ﻛﺒﲑ ﻣﻦ ﻋﻤﻠﻴﺎﺕ ﺍﻹﻋﺘﺪﺍﺀ ﺃﻭ ﺍﻟﺘﺨﻄﻴﻂ ﺃﻭ ﺍﻟﺘﻮﺟﻴﻪ ﺃﻭ ﺍﻹﺷﺮﺍﻑ ﻋﻠﻴﻬﺎ ﻳﺘﻢ ﰲ ﺩﻭﻟﺔ ﺃﺧﺮﻯ‪.‬‬

‫‪- 87 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻭﺇﺯﺍﺀ ﺫﻟﻚ ﻛﺎﻥ ﻻﺑﺪ ﻣﻦ ﺗﻜﺎﺗﻒ ﺍﻟﺪﻭﻝ ﻣﻦ ﺃﺟﻞ ﻣﻜﺎﻓﺤﺔ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﺍﳌﺴﺘﺤﺪﺙ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﻟﱵ ﱂ ﺗﻌﺪ ﺗﺘﻤﺮﻛﺰ ﰲ ﺩﻭﻟﺔ ﻣﻌﻴﻨﺔ ﻭﻻ ﺗﻮﺟﻪ ‪‬ﺘﻤﻊ ﺑﻌﻴﻨﻪ‪ ،‬ﺑﻞ ﺃﺻﺒﺤﺖ ﺗﻌﱪ ﺍﳊﺪﻭﺩ ﻟﺘﻠﺤﻖ ﺍﻟﻀﺮﺭ‬
‫ﺑﻌﺪﺓ ﺩﻭﻝ ﻭﳎﺘﻤﻌﺎﺕ ﻣﺴﺘﻐﻠﺔ ﺍﻟﺘﻄﻮﺭ ﺍﻟﻜﺒﲑ ﻟﻠﻮﺳﺎﺋﻞ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳊﺪﻳﺜﺔ ﰲ ﺍﻹﺗﺼﺎﻻﺕ ﻭﺗﻌﺰﻳﺰ ﺍﻟﺘﻌﺎﻭﻥ‬
‫ﺑﻴﻨﻬﺎ ﻭﺍﲣﺎﺫ ﺍﻟﺘﺪﺍﺑﲑ ﺍﻟﻔﻌﺎﻟﺔ ﻟﻠﺤﺪ ﻣﻨﻬﺎ ﻭﺍﻟﻘﻀﺎﺀ ﻋﻠﻴﻬﺎ ﻭﻣﻌﺎﻗﺒﺔ ﻣﺮﺗﻜﺒﻴﻬﺎ)‪.(1‬‬

‫ﻭﺭﻏﻢ ﺍﳌﻨﺎﺩﺍﺓ ﺑﻀﺮﻭﺭﺓ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﺪﻭﱄ‪ ،‬ﺇﻻ ﺃﻥ ﻫﺬﺍ ﺍﻷﻣﺮ ﻗﺪ ﻻﻕ ﻣﻦ ﺍﻟﺼﻌﻮﺑﺎﺕ ﻣﺎ ﻣﻦ ﺷﺄﻧﻪ‬
‫ﺍﳊﺪ ﻣﻦ ﻓﻌﺎﻟﻴﺘﻪ ﺑﺈﻋﺎﻗﺔ ﺍﻷﺳﺲ ﺍﻟﻌﻠﻤﻴﺔ ﻟﻠﺘﻌﺎﻭﻥ ﺍﻟﺪﻭﱄ ﺍﻟﻼﺯﻡ ﻭﺍﳌﻼﺋﻢ ﳌﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫ﻭﻋﻠﻰ ﻫﺪﻱ ﻣﺎ ﺗﻘﺪﻡ ﺳﻮﻑ ﻧﺘﻨﺎﻭﻝ ﺑﺎﻟﺪﺭﺍﺳﺔ ﻣﻈﺎﻫﺮ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﺪﻭﱄ ﰒ ﺑﻴﺎﻥ ﺍﻟﺼﻌﻮﺑﺎﺕ ﺍﻟﱵ‬
‫ﺗﻮﺍﺟﻬﻪ‪.‬‬

‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﻣﻈﺎﻫﺮ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﺪﻭﱄ ﰲ ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬‬

‫ﻟﻘﺪ ﺃﺛﺒﺖ ﺍﻟﻮﺍﻗﻊ ﺍﻟﻌﻤﻠﻲ ﺃﻥ ﺃﻱ ﺩﻭﻟﺔ ﻻ ﺗﺴﺘﻄﻴﻊ ﲜﻬﻮﺩﻫﺎ ﺍﳌﻨﻔﺮﺩﺓ ﺍﻟﻘﻀﺎﺀ ﻋﻠﻰ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺧﺎﺻﺔ ﻣﻊ ﺍﻟﺘﻄﻮﺭ ﺍﳌﻠﻤﻮﺱ ﻭﺍﳌﺬﻫﻞ ﰲ ﺍﻹﺗﺼﺎﻻﺕ ﻭﺗﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺕ‪.‬‬

‫ﻓﺈﻥ ﻛﺎﻥ ﻣﻦ ﺍﻟﻀﺮﻭﺭﻱ ﺃﻥ ﲤﺘﻠﻚ ﺍﻟﺪﻭﻝ ﺍﻹﻣﻜﺎﻧﺎﺕ ﺍﻟﺘﺸﺮﻳﻌﻴﺔ ﻭﺍﻟﻘﻀﺎﺋﻴﺔ ﻭﺍﻟﻔﻨﻴﺔ ﳌﻜﺎﻓﺤﺔ‬
‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻓﺎﻥ ﺍﻷﻫﻢ ﻣﻦ ﺫﻟﻚ ﺃﻥ ﺗﻜﻮﻥ ﺗﻠﻚ ﺍﻟﻘﻮﺍﻧﲔ ﻣﺘﻮﺍﺋﻤﺔ ﻭ ﻣﺘﺠﺎﻧﺴﺔ ﺑﲔ ﳐﺘﻠﻒ‬
‫ﺍﻟﺪﻭﻝ‪ ،‬ﺇﺫ ﻫﻲ ﲢﻤﻲ ﻣﺼﻠﺤﺔ ﻣﺸﺘﺮﻛﺔ‪.‬‬

‫ﻭﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﺪﻭﱄ ﰲ ﳎﺎﻝ ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻗﺪ ﻳﺄﺧﺬ ﻣﻈﻬﺮﺍﻥ‪ ،‬ﺍﻷﻭﻝ ﻳﺘﻌﻠﻖ ﺑﺎﻟﺴﻌﻲ‬
‫ﺇﱃ ﺍﲣﺎﺫ ﺍﻹﺟﺮﺍﺀﺍﺕ ﻭﺍﻵﻟﻴﺎﺕ ﺫﺍﺕ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﺘﻘﻨﻴﺔ ﺍﻟﻔﻨﻴﺔ ﺍﻟﱵ ﺗﻜﻔﻞ ﻣﻨﻊ ﺍﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﰲ ﻣﺮﺣﻠﺔ‬
‫ﺍﻟﺘﻨﻔﻴﺬ‪ .‬ﻭﺍﻟﺜﺎﱐ ﻳﺘﻌﻠﻖ ﺑﻀﺮﻭﺭﺓ ﺍﻟﺘﻌﺎﻭﻥ ﰲ ﺇﻧﻔﺎﺫ ﺍﻟﻘﺎﻧﻮﻥ ﳌﻼﺣﻘﺔ ﻭﻣﺘﺎﺑﻌﺔ ﻭﻣﻌﺎﻗﺒﺔ ﺍ‪‬ﺮﻣﲔ ﺑﻌﺪ‬
‫ﺍﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﻭﺍﻟﱵ ﺗﻌﱪ ﺇﺧﺘﺼﺎﺻﺎﺕ ﻗﻀﺎﺋﻴﺔ ﻣﺘﻌﺪﺩﺓ ﺫﺍﺕ ﻧﻈﻢ ﻗﺎﻧﻮﻧﻴﺔ ﳐﺘﻠﻔﺔ‪ ،‬ﻭﻳﺘﻤﺜﻞ ﰲ ﺍﻟﺘﻌﺎﻭﻥ‬
‫ﺍﻟﻘﻀﺎﺋﻲ‪.‬‬

‫ﰎ ﺍﺭﺗﻜﺎ‪‬ﺎ ﰲ ﺩﻭﻟﺔ ﻣﺎ ﻭﻟﻜﻦ ﻛﺎﻥ ﳍﺎ ﺁﺛﺎﺭ ﺷﺪﻳﺪﺓ ﻋﻠﻰ ﺩﻭﻟﺔ ﺃﺧﺮﻯ‬


‫)‪(1‬ﺣﺴﲔ ﺑﻦ ﺳﻌﻴﺪ ﺑﻦ ﺳﻴﻒ ﺍﻟﻐﺎﻓﺮﻱ‪ .‬ﺍﳉﻬﻮﺩ ﺍﻟﺪﻭﻟﻴﺔ ﰲ ﻣﻮﺍﺟﻬﺔ ﺟﺮﺍﺋﻢ ﺍﻹﻧﺘﺮﺍﻧﺖ ﻭﺭﻗﺔ ﻣﻘﺪﻣﺔ ﻟﻼﲢﺎﺩ ﺍﻟﻌﺮﰊ ﻟﻠﺘﺤﻜﻴﻢ ﺍﻻﻟﻜﺘﺮﻭﱐ ‪ ،2007‬ﺹ‬
‫‪.02‬‬

‫‪- 88 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺃﻭﻻ‪ :‬ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﻘﻀﺎﺋﻲ ﺍﻟﺪﻭﱄ ﰲ ﻣﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬ﺇﻥ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﻘﻀﺎﺋﻲ ﺍﻟﺪﻭﱄ‬
‫ﻳﻌﺪ ﺍﻵﻟﻴﺔ ﺍﻟﺮﺋﻴﺴﻴﺔ ﻟﻠﻜﻔﺎﺡ ﺿﺪ ﺍﳉﺮﳝﺔ ﺍﻟﻌﺎﺑﺮﺓ ﻟﻠﻮﻃﻨﻴﺔ ﺑﺄﺑﻌﺎﺩﻫﺎ ﺍﳌﺨﺘﻠﻔﺔ‪ (1).‬ﻭﻓﻴﻤﺎ ﻳﺘﻌﻠﻖ ﺑﺎﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻓﺈﻥ ﻓﻌﺎﻟﻴﺔ ﺍﻟﺘﺤﻘﻴﻖ ﻭﺍﳌﻼﺣﻘﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻏﺎﻟﺒﺎ ﻣﺎ ﺗﻘﺘﻀﻲ ﺍﳊﺎﺟﺔ ﺇﱃ ﻣﺴﺎﻋﺪﺓ ﻣﻦ ﺍﻟﺴﻠﻄﺎﺕ‬
‫ﰲ ﺍﻟﺒﻠﺪ ﺍﻟﺬﻱ ﻛﺎﻥ ﻣﻨﺸﺄﹰ ﻟﻠﺠﺮﳝﺔ‪ ،‬ﺃﻭ ﻣﻦ ﺍﻟﺴﻠﻄﺎﺕ ﰲ ﺍﻟﺒﻠﺪ ﺍﻟﺬﻱ ﻋﱪ ﻣﻦ ﺧﻼﻟﻪ ﺍﻟﻨﺸﺎﻁ ﺍ‪‬ﺮﻡ ﻭﻫﻮ‬
‫ﰲ ﻃﺮﻳﻘﻪ ﺇﱃ ﺍﳍﺪﻑ‪ ،‬ﺃﻭ ﺣﻴﺚ ﻗﺪ ﺗﻮﺟﺪ ﺃﺩﻟﺔ ﺍﳉﺮﳝﺔ‪ ،‬ﻓﻘﺪ ﻳﻜﻮﻥ ﻣﺮﺗﻜﺐ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ‬
‫ﺟﻨﺴﻴﺔ ﺩﻭﻟﺔ ﻣﺎ ﻣﺴﺘﻌﻤﻼ ﰲ ﺟﺮﳝﺘﻪ ﺣﻮﺍﺳﻴﺐ ﻣﻮﺟﻮﺩﺓ ﰲ ﺩﻭﻟﺔ ﺃﺧﺮﻯ ﻭﺗﻘﻊ ﺁﺛﺎﺭ ﺟﺮﳝﺘﻪ ﰲ ﺩﻭﻟﺔ‬
‫ﺛﺎﻟﺜﺔ‪ .‬ﻓﻤﻦ ﺍﻟﺒﺪﻳﻬﻲ ﺃﻥ ﻳﻘﻒ ﻣﺒﺪﺃ ﺍﻟﺴﻴﺎﺩﺓ ﻭﻣﺸﺎﻛﻞ ﺍﳊﺪﻭﺩ ﻭﺍﻟﻮﻻﻳﺎﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻋﻘﺒﺔ ﺃﻣﺎﻡ ﺍﻛﺘﺸﺎﻑ‬
‫ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻭﻣﻌﺎﻗﺒﺔ ﻣﺮﺗﻜﺒﻴﻬﺎ‪ ،‬ﻟﺬﺍ ﻓﺈﻥ ﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻣﺘﺎﺑﻌﺔ ﻣﺮﺗﻜﺒﻴﻬﺎ ﻗﻀﺎﺋﻴﺎ‬
‫ﺗﺆﻛﺪ ﻋﻠﻰ ﺃﳘﻴﺔ ﺍﳌﺴﺎﻋﺪﺓ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﺘﺒﺎﺩﻟﺔ ﺑﲔ ﺍﻟﺪﻭﻝ‪.‬‬

‫ﻭﺗﻌﺮﻑ ﺍﳌﺴﺎﻋﺪﺓ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﻟﺪﻭﻟﻴﺔ ﺑﺄ‪‬ﺎ ﻛﻞ ﺇﺟﺮﺍﺀ ﻗﻀﺎﺋﻲ ﺗﻘﻮﻡ ﺑﻪ ﺩﻭﻟﺔ ﻣﻦ ﺷﺄﻧﻪ ﺗﺴﻬﻴﻞ‬
‫ﻣﻬﻤﺔ ﺍﶈﺎﻛﻤﺔ ﰲ ﺩﻭﻟﺔ ﺃﺧﺮﻯ ﺑﺼﺪﺩ ﺟﺮﳝﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ)‪.(2‬‬

‫ﻭﻟﻘﺪ ﻧﺺ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﻋﻠﻰ ﻣﺒﺪﺃ ﺍﳌﺴﺎﻋﺪﺓ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﻟﺪﻭﻟﻴﺔ ﺍﳌﺘﺒﺎﺩﻟﺔ‬
‫ﰲ ﺍﳌﺎﺩﺓ ‪ 16‬ﻣﻨﻪ‪ ،‬ﻣﻌﺘﱪﺍ ﺃﻧﻪ ﰲ ﺇﻃﺎﺭ ﺍﻟﺘﺤﺮﻳﺎﺕ ﻭﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳉﺎﺭﻳﺔ ﳌﻌﺎﻳﻨﺔ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﳝﻜﻦ ﻟﻠﺴﻠﻄﺎﺕ ﺍﳌﺨﺘﺼﺔ ﺗﺒﺎﺩﻝ ﺍﳌﺴﺎﻋﺪﺓ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﻟﺪﻭﻟﻴﺔ ﳉﻤﻊ ﺍﻷﺩﻟﺔ ﺍﳋﺎﺻﺔ ﺑﺎﳉﺮﳝﺔ ﰲ‬
‫ﺍﻟﺸﻜﻞ ﺍﻹﻟﻜﺘﺮﻭﱐ‪.‬ﻭﺗﺘﺨﺬ ﺍﳌﺴﺎﻋﺪﺓ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﻟﺪﻭﻟﻴﺔ ﻋﺪﺓ ﺻﻮﺭ ﺃﳘﻬﺎ‪:‬‬

‫‪.1‬ﺗﺒﺎﺩﻝ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ :‬ﻳﻮﱄ ﺍ‪‬ﺘﻤﻊ ﺍﻟﺪﻭﱄ ﻟﺘﺒﺎﺩﻝ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺃﳘﻴﺔ ﻗﺼﻮﻯ ﺑﻮﺻﻔﻪ ﻭﺳﻴﻠﺔ‬
‫ﳌﻜﺎﻓﺤﺔ ﺍﻹﺟﺮﺍﻡ ﻋﻤﻮﻣﺎ ﻭﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺧﺼﻮﺻﺎ ﳌﺎ ﺗﻮﻓﺮﻩ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﺼﺤﻴﺤﺔ ﻭﺍﳌﻮﺛﻮﻗﺔ ﻣﻦ‬
‫ﻣﺴﺎﻧﺪﺓ ﻷﺟﻬﺰﺓ ﺗﻨﻔﻴﺬ ﺍﻟﻘﺎﻧﻮﻥ‪ .‬ﻭﻳﺸﻤﻞ ﻣﺒﺪﺃ ﺗﺒﺎﺩﻝ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺗﻘﺪﱘ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﺍﻟﻮﺛﺎﺋﻖ ﻭﺍﳌﻮﺍﺩ‬
‫ﺍﻹﺳﺘﺪﻻﻟﻴﺔ ﺍﻟﱵ ﺗﻄﻠﺒﻬﺎ ﺳﻠﻄﺔ ﺃﺟﻨﺒﻴﺔ ﻭﻫﻲ ﺑﺼﺪﺩ ﺍﻟﻨﻈﺮ ﰲ ﺟﺮﳝﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﺎ‪.‬‬

‫)‪ (1‬ﺃﺑﻮ ﺍﳌﻌﺎﱄ ﳏﻤﺪ ﻋﻴﺴﻰ‪ ،‬ﺍﳊﺎﺟﺔ ﺇﱃ ﲢﺪﻳﺚ ﺁﻟﻴﺎﺕ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﺪﻭﱄ ﰲ ﳎﺎﻝ ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﺍﺋﻢ ﻭﺭﻗﺔ ﻣﻘﺪﻣﺔ ﰲ ﺍﳌﺆﲤﺮ ﺍﳌﻐﺎﺭﰊ ﺍﻷﻭﻝ‪ ،‬ﺟﺎﻣﻌﺔ ﺍﻟﺴﺎﺑﻊ‬
‫ﻣﻦ ﺃﻓﺮﻳﻞ ﻟﻴﺒﻴﺎ‪ .‬ﺹ ‪.02‬‬
‫)‪ (2‬ﺳﺎﱂ ﳏﻤﺪ ﺳﻠﻴﻤﺎﻥ ﺍﻷﻭﺟﻠﻲ‪ ،‬ﺃﺣﻜﺎﻡ ﺍﳌﺴﺆﻭﻟﻴﺔ ﺍﳉﻨﺎﺋﻴﺔ ﻋﻦ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺪﻭﻟﻴﺔ ﰲ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻟﻮﺿﻌﻴﺔ ‪.‬ﺩﻛﺘﻮﺭﺍﻩ ﺍﳊﻘﻮﻕ‪ .‬ﺟﺎﻣﻌﺔ ﻋﲔ ﴰﺲ‪،‬‬
‫‪ ،1997‬ﺹ ‪.425‬‬

‫‪- 89 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻓﺘﻤﻴﺰ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﺎﻟﻌﺎﳌﻴﺔ ﻭﺑﻜﻮ‪‬ﺎ ﻋﺎﺑﺮﺓ ﻟﻠﺤﺪﻭﺩ‪ ،‬ﻓﺈﻥ ﻣﻜﺎﻓﺤﺘﻬﺎ ﻻ ﺗﺘﺤﻘﻖ ﺇﻻ ﺑﻮﺟﻮﺩ ﺗﻌﺎﻭﻥ‬
‫ﺩﻭﱄ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻹﺟﺮﺍﺋﻲ ﺍﳉﻨﺎﺋﻲ‪ ،‬ﲝﻴﺚ ﻳﺴﻤﺢ ﺑﺎﻹﺗﺼﺎﻝ ﺍﳌﺒﺎﺷﺮ ﺑﲔ ﺍﻷﺟﻬﺰﺓ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻭﺍﻷﻣﻨﻴﺔ‬
‫ﰲ ﺍﻟﺪﻭﻝ ﺍﳌﺨﺘﻠﻔﺔ ﻣﻦ ﺃﺟﻞ ﺗﺒﺎﺩﻝ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﳉﺮﳝﺔ ﻭﺍ‪‬ﺮﻣﲔ‪ .‬ﻭﳍﺬﻩ ﺍﻟﺼﻮﺭﺓ ﻣﻦ ﺻﻮﺭ‬
‫ﺍﳌﺴﺎﻋﺪﺓ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺻﺪﻯ ﻛﺒﲑ ﰲ ﻛﺜﲑ ﻣﻦ ﺍﻹﺗﻔﺎﻗﻴﺎﺕ‪ ،‬ﺃﳘﻬﺎ ﻣﺎ ﻭﺭﺩ ﰲ ﺍﻟﻔﻘﺮﺓ ﺍﻟﺜﺎﻧﻴﺔ ﻣﻦ ﺍﳌﺎﺩﺓ‬
‫ﺍﻷﻭﱃ ﳌﻌﺎﻫﺪﺓ ﺍﻷﻣﻢ ﺍﳌﺘﺤﺪﺓ ﺍﻟﻨﻤﻮﺫﺟﻴﺔ ﻟﺘﺒﺎﺩﻝ ﺍﳌﺴﺎﻋﺪﺓ ﰲ ﺍﳌﺴﺎﺋﻞ ﺍﳉﻨﺎﺋﻴﺔ)‪ (1‬ﻭﻛﺬﺍ ﻣﺎ ﻭﺭﺩ ﰲ ﺍﻟﺒﻨﺪ‬
‫ﺍﻟﺜﺎﻟﺚ ﻭﺍﻟﺮﺍﺑﻊ ﻭﺍﳋﺎﻣﺲ ﻣﻦ ﺍﳌﺎﺩﺓ ﺍﻟﺜﺎﻣﻨﺔ ﻻﺗﻔﺎﻗﻴﺔ ﺍﻷﻣﻢ ﺍﳌﺘﺤﺪﺓ ﳌﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻨﻈﻤﺔ ﺍﻟﻌﺎﺑﺮﺓ‬
‫ﺍﻟﻮﻃﻨﻴﺔ‪ ،‬ﺇﺫ ﺃﻭﺟﺒﺖ ﻋﻠﻰ ﺍﻟﺪﻭﻝ ﺍﻷﻃﺮﺍﻑ ﺗﻴﺴﲑ ﺗﺒﺎﺩﻝ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﺑﻜﺎﻓﺔ ﺟﻮﺍﻧﺐ ﺍﻟﻨﺸﺎﻁ‬
‫ﺍﻹﺟﺮﺍﻣﻲ‪.‬‬

‫ﻭﻳﺼﺪﻕ ﺍﻷﻣﺮ ﺃﻳﻀﺎ ﻋﻠﻰ ﻣﺎ ﻗﻀﺖ ﺑﻪ ﺍﳌﺎﺩﺓ ﺍﻷﻭﱃ ﻣﻦ ﺍﺗﻔﺎﻗﻴﺔ ﺍﻟﺮﻳﺎﺽ ﻟﻠﺘﻌﺎﻭﻥ ﺍﻟﻘﻀﺎﺋﻲ ﺍﻟﻌﺮﰊ‬
‫ﺑﺸﺄﻥ ﺿﺮﻭﺭﺓ ﺗﺒﺎﺩﻝ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﲔ ﺍﻟﺪﻭﻝ ﺍﻷﻃﺮﺍﻑ ﻭﺍﻟﺘﻨﺴﻴﻖ ﺑﲔ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ‪.‬ﻭﰲ ﻫﺬﺍ ﺍﻹﻃﺎﺭ‬
‫ﺃﻳﻀﺎ ﺻﺎﻍ ﺇﺗﻔﺎﻗﺸﻨﻐﺎﻧﻠﻺﲢﺎﺩ ﺍﻷﻭﺭﻭﰊ ﻧﻈﺎﻣﺎ ﻣﺘﻜﺎﻣﻼ ﻟﺘﺒﺎﺩﻝ ﺍﳌﻌﻠﻮﻣﺎﺕ)‪.(2‬‬

‫ﻭﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻟﺘﺸﺮﻳﻌﻲ ﺍﻟﻮﻃﲏ ﻓﻘﺪ ﻧﺼﺖ ﺍﳌﺎﺩﺓ ‪ 17‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﻋﻠﻰ ﺃﻥ ﺍﻟﺪﻭﻟﺔ‬
‫ﺍﳉﺰﺍﺋﺮﻳﺔ ﺗﺴﺘﺠﻴﺐ ﻟﻄﻠﺒﺎﺕ ﺍﳌﺴﺎﻋﺪﺓ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﻟﺪﻭﻟﻴﺔ ﺍﻟﺮﺍﻣﻴﺔ ﻟﺘﺒﺎﺩﻝ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺫﻟﻚ ﰲ ﺇﻃﺎﺭ‬
‫ﺍﻹﺗﻔﺎﻗﻴﺎﺕ ﺍﻟﺪﻭﻟﻴﺔ ﺫﺍﺕ ﺍﻟﺼﻠﺔ ﻭﻣﺒﺪﺃ ﺍﳌﻌﺎﻣﻠﺔ ﺑﺎﳌﺜﻞ‪.‬‬

‫‪ -2‬ﻧﻘﻞ ﺍﻹﺟﺮﺍﺀﺍﺕ‪ :‬ﻭﻳﻘﺼﺪ ‪‬ﺬﻩ ﺍﻟﺼﻮﺭﺓ ﻗﻴﺎﻡ ﺩﻭﻟﺔ ﻣﺎ ﲟﻘﺘﻀﻰ ﺇﺗﻔﺎﻗﻴﺔﺃﻭﻣﻌﺎﻫﺪﺓ ﺑﺎﲣﺎﺫ‬
‫ﺇﺟﺮﺍﺀﺍﺕ ﺟﻨﺎﺋﻴﺔ ﻭﻫﻲ ﺑﺼﺪﺩ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺟﺮﳝﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﺭﺗﻜﺒﺖ ﰲ ﺇﻗﻠﻴﻢ ﺩﻭﻟﺔ ﺃﺧﺮﻯ ﻭﳌﺼﻠﺤﺔ‬
‫ﻫﺬﻩ ﺍﻟﺪﻭﻟﺔ ﻣﱴ ﺗﻮﻓﺮﺕ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻟﺸﺮﻭﻁ‪ ،‬ﺃﳘﻬﺎ ﺍﻟﺘﺠﺮﱘ ﺍﳌﺰﺩﻭﺝ ﻭﺍﻟﺬﻱ ﻳﻘﺼﺪ ﺑﻪ ﺃﻥ ﻳﻜﻮﻥ‬
‫ﺍﻟﻔﻌﻞ ﺍﳌﻨﺴﻮﺏ ﺇﱃ ﺍﻟﺸﺨﺺ ﻳﺸﻜﻞ ﺟﺮﳝﺔ ﰲ ﺍﻟﺪﻭﻟﺔ ﺍﻟﻄﺎﻟﺒﺔ ﻭﺍﻟﺪﻭﻟﺔ ﺍﳌﻄﻠﻮﺏ ﻧﻘﻞ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺇﻟﻴﻬﺎ‬
‫ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺷﺮﻋﻴﺔ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳌﻄﻠﻮﺏ ﺇﲣﺎﺫﻫﺎ‪ .‬ﲟﻌﲎ ﺃﻥ ﺗﻜﻮﻥ ﻣﻘﺮﺭﺓ ﰲ ﻗﺎﻧﻮﻥ ﺍﻟﺪﻭﻟﺔ ﺍﳌﻄﻠﻮﺏ‬
‫ﺇﻟﻴﻬﺎ ﻋﻦ ﺫﺍﺕ ﺍﳉﺮﳝﺔ ﻭﺃﻥ ﺗﻜﻮﻥ ﻫﺬﻩ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺫﺍﺕ ﺃﳘﻴﺔ ﻣﻦ ﺷﺎ‪‬ﺎ ﺃﻥ ﺗﺆﺩﻱ ﺩﻭﺭﺍ ﻣﻬﻤﺎ ﰲ‬
‫ﺍﻟﻮﺻﻮﻝ ﺇﱃ ﺍﳊﻘﻴﻘﺔ‪.‬‬

‫)‪ (1‬ﺻﺪﺭﺕ ﻫﺬﻩ ﺍﳌﻌﺎﻫﺪﺓ ﰲ ‪ 1990/12/14‬ﰲ ﺍﳉﻠﺴﺔ ﺍﻟﻌﺎﻣﺔ ‪ 68‬ﻟﻠﺠﻤﻌﻴﺔ ﺍﻟﻌﺎﻣﺔ ﻟﻸﻣﻢ ﺍﳌﺘﺤﺪﺓ ﻭﺗﻘﻀﻲ ﺑﺎﺗﻔﺎﻕ ﺃﻃﺮﺍﻓﻬﺎ ﻋﻠﻰ ﺃﻥ ﻳﻘﺪﻡ ﻛﻞ ﻣﻨﻬﻢ‬
‫ﻟﻶﺧﺮ ﺃﻛﱪ ﻗﺪﺭ ﳑﻜﻦ ﻣﻦ ﺍﳌﺴﺎﻋﺪﺓ ﺍﳌﺘﺒﺎﺩﻟﺔ ﰲ ﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﺃﻭ ﺇﺟﺮﺍﺀﺍﺕ ﺍﶈﺎﻛﻤﺔ ﺍﳌﺘﻌﻠﻘﺔ ﲜﺮﺍﺋﻢ ﻳﻜﻮﻥ ﺍﻟﻌﻘﺎﺏ ﻋﻠﻴﻬﺎ ﻭﻗﺖ ﻃﻠﺐ ﺍﳌﺴﺎﻋﺪﺓ ﺩﺍﺧﻼ ﰲ‬
‫ﺍﺧﺘﺼﺎﺹ ﺍﻟﺴﻠﻄﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻟﻠﺪﻭﻟﺔ ﻃﺎﻟﺒﺔ ﺍﳌﺴﺎﻋﺪﺓ‪.‬‬
‫‪( )Michel quellie : stratigies en France par la police la criminaliteorganisee 1996 p 199‬‬
‫‪2‬‬

‫‪- 90 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻭﻟﻘﺪ ﺃﻗﺮﺕ ﺍﻟﻌﺪﻳﺪ ﻣﻦ ﺍﻹﺗﻔﺎﻗﻴﺎﺕ ﺍﻟﺪﻭﻟﻴﺔ ﻣﻨﻬﺎ ﻭﺍﻹﻗﻠﻴﻤﻴﺔ ﻫﺬﻩ ﺍﻟﺼﻮﺭﺓ ﻛﺈﺣﺪﻯ ﺻﻮﺭﺍﳌﺴﺎﻋﺪﺓ‬
‫) ‪(1‬‬
‫ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﻟﺪﻭﻟﻴﺔ‪ ،‬ﻛﻤﻌﺎﻫﺪﺓ ﺍﻷﻣﻢ ﺍﳌﺘﺤﺪﺓ ﺍﻟﻨﻤﻮﺫﺟﻴﺔ ﺑﺸﺄﻥ ﻧﻘﻞ ﺍﻹﺟﺮﺍﺀﺍﺕ ﰲ ﺍﳌﺴﺎﺋﻞ ﺍﳉﻨﺎﺋﻴﺔ‬
‫ﻭﻛﺬﺍ ﺇﺗﻔﺎﻗﻴﺔ ﺍﻷﻣﻢ ﺍﳌﺘﺤﺪﺓ ﳌﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻨﻈﻤﺔ ﺍﻟﻌﺎﺑﺮﺓ ﻟﻠﻮﻃﻨﻴﺔ‪.‬‬

‫‪ -3‬ﺍﻹﻧﺎﺑﺎﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﻟﺪﻭﻟﻴﺔ‪ :‬ﻳﻘﺼﺪ ‪‬ﺬﻩ ﺍﻟﺼﻮﺭﺓ ﻃﻠﺐ ﺇﲣﺎﺫ ﺇﺟﺮﺍﺀ ﻗﻀﺎﺋﻲ ﻣﻦ ﺇﺟﺮﺍﺀﺍﺕ‬
‫ﺍﻟﺪﻋﻮﻯ ﺍﻟﻌﻤﻮﻣﻴﺔ ﺗﺘﻘﺪﻡ ﺑﻪ ﺍﻟﺪﻭﻟﺔ ﺍﻟﻄﺎﻟﺒﺔ ﺇﱃ ﺍﻟﺪﻭﻟﺔ ﺍﳌﻄﻠﻮﺏ ﺇﻟﻴﻬﺎ‪ ،‬ﻟﻀﺮﻭﺭﺓ ﺫﻟﻚ ﻋﻨﺪ ﺍﻟﻔﺼﻞ ﰲ‬
‫) ‪(2‬‬
‫ﻣﺴﺄﻟﺔ ﻣﻌﺮﻭﺿﺔ ﻟﺪﻯ ﺍﻟﺴﻠﻄﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﰲ ﺍﻟﺪﻭﻟﺔ ﺍﻟﻄﺎﻟﺒﺔ ﻟﺘﻌﺬﺭ ﻗﻴﺎﻣﻬﺎ ‪‬ﺬﺍ ﺍﻹﺟﺮﺍﺀ ﺑﻨﻔﺴﻬﺎ‪.‬‬
‫ﻭ‪‬ﺪﻑ ﻫﺬﻩ ﺍﻟﺼﻮﺭﺓ ﺇﱃ ﺗﺴﻬﻴﻞ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺑﲔ ﺍﻟﺪﻭﻝ ﲟﺎ ﻳﻜﻔﻞ ﺇﺟﺮﺍﺀ ﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﺍﻟﻼﺯﻣﺔ‬
‫ﻟﺘﻘﺪﱘ ﺍﳌﺘﻬﻤﲔ ﻟﻠﻤﺤﺎﻛﻤﺔ ﻭﺍﻟﺘﻐﻠﺐ ﻋﻠﻰ ﻋﻘﺒﺔ ﺍﻟﺴﻴﺎﺩﺓ ﺍﻹﻗﻠﻴﻤﻴﺔ‪ ،‬ﺍﻟﱵ ﲤﻨﻊ ﺍﻟﺪﻭﻟﺔ ﺍﻷﺟﻨﺒﻴﺔ ﻣﻦ ﳑﺎﺭﺳﺔ‬
‫ﺑﻌﺾ ﺍﻷﻋﻤﺎﻝ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺩﺍﺧﻞ ﺃﻗﺎﻟﻴﻢ ﺍﻟﺪﻭﻝ ﺍﻷﺧﺮﻯ ﻟﺴﻤﺎﻉ ﺷﻬﻮﺩ ﺃﻭ ﺇﺟﺮﺍﺀ ﺗﻔﺘﻴﺶ ﺃﻭ ﻏﲑﻫﺎ‪.‬‬

‫ﻭﳛﺪﺙ ﺑﺪﺭﺟﺔ ﻣﺘﺰﺍﻳﺪﺓ ﺃﻥ ﺗﺸﺘﺮﻁ ﺍﳌﻌﺎﻫﺪﺍﺕ ﻭﺍﻹﺗﻔﺎﻗﻴﺎﺕ ﺍﳋﺎﺻﺔ ﺑﺘﺒﺎﺩﻝ ﺍﳌﺴﺎﻋﺪﺓ ﺍﻟﻘﻀﺎﺋﻴﺔ‬
‫ﺍﻟﺪﻭﻟﻴﺔ ﻋﻠﻰ ﺍﻟﺪﻭﻝ ﺍﻷﻃﺮﺍﻑ ﺃﻥ ﺗﻌﲔ ﺳﻠﻄﺔ ﻣﺮﻛﺰﻳﺔ ﻋﺎﺩﺓ ﻣﺎ ﺗﻜﻮﻥ ﻭﺯﺍﺭﺓ ﺍﻟﻌﺪﻝ ﺗﺮﺳﻞ ﺇﻟﻴﻬﺎ‬
‫ﺍﻟﻄﻠﺒﺎﺕ ﻣﺒﺎﺷﺮﺓ ﺑﺪﻻ ﻣﻦ ﺍﳌﺮﻭﺭ ﻋﱪ ﺍﻟﻘﻨﻮﺍﺕ ﺍﻟﺪﺑﻠﻮﻣﺎﺳﻴﺔ‪ ،‬ﻭﺫﻟﻚ ﺑﻐﺮﺽ ﺍﻟﺘﺴﺮﻳﻊ ﰲ ﺍﻹﺟﺮﺍﺀﺍﺕ‬
‫ﻭﺳﻮﻑ ﻧﺘﻄﺮﻕ ﳍﺬﻩ ﺍﻟﺼﻮﺭﺓ ﻻﺣﻘﺎ ﺑﺸﻲﺀ ﻣﻦ ﺍﻟﺘﻔﺼﻴﻞ‪.‬‬

‫‪ -4‬ﺗﺴﻠﻴﻢ ﺍ‪‬ﺮﻣﲔ‪ :‬ﺍﺳﺘﻘﺮ ﺍﻟﻔﻘﻪ ﺍﻟﻘﺎﻧﻮﱐ ﻋﻠﻰ ﺍﻋﺘﺒﺎﺭ ﺃﻥ ﺗﺴﻠﻴﻢ ﺍ‪‬ﺮﻣﲔ ﺷﻜﻞ ﻣﻦ ﺃﺷﻜﺎﻝ‬
‫ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﺪﻭﱄ ﰲ ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ‪ ،‬ﻭﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﺪﻭﱄ ﻫﻮ ﻧﺘﻴﺠﺔ ﻃﺒﻴﻌﻴﺔ ﻟﻠﺘﻄﻮﺭﺍﺕ ﺍﻟﱵ‬
‫ﺣﺪﺛﺖ ﰲ ﻛﺎﻓﺔ ﺍ‪‬ﺎﻻﺕ ﻭﻣﻨﻬﺎ ﳎﺎﻝ ﺍﻹﺗﺼﺎﻻﺕ ﻭﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﺣﻴﺚ ﱂ ﺗﻌﺪ ﺍﳊﺪﻭﺩ ﺍﻟﻘﺎﺋﻤﺔ ﺑﲔ‬
‫ﺍﻟﺪﻭﻝ ﺗﺸﻜﻞ ﺣﺎﺟﺰﺍ ﺃﻣﺎﻡ ﻣﺮﺗﻜﱯ ﺍﳉﺮﺍﺋﻢ‪ ،‬ﻛﻤﺎ ﺃﻥ ﻧﺸﺎﻃﻬﻢ ﺍﻹﺟﺮﺍﻣﻲ ﱂ ﻳﻌﺪ ﻗﺎﺻﺮﺍ ﻋﻠﻰ ﺇﻗﻠﻴﻢ‬
‫ﻣﻌﲔ ﺑﻞ ﺍﻣﺘﺪ ﺇﱃ ﺃﻛﺜﺮ ﻣﻦ ﺇﻗﻠﻴﻢ‪ ،‬ﺣﻴﺚ ﺑﺎﺕ ﺍ‪‬ﺮﻡ ﻣﻨﻬﻢ ﻳﺸﺮﻉ ﰲ ﺍﻟﺘﺤﻀﲑ ﻻﺭﺗﻜﺎﺏ ﺟﺮﳝﺘﻪ ﰲ‬
‫ﺩﻭﻟﺔ ﻣﻌﻴﻨﺔ ﻭﻳ‪‬ﻘﺒﻞ ﻋﻠﻰ ﺗﻨﻔﻴﺬﻫﺎ ﰲ ﺑﻠﺪ ﺁﺧﺮ‪ ،‬ﻭﻗﺪ ﻳﻔﺮ ﺇﱃ ﺑﻠﺪ ﺛﺎﻟﺚ ﻟﻺﺑﺘﻌﺎﺩ ﻋﻦ ﺃﻳﺪﻱ ﺃﺟﻬﺰﺓ‬
‫ﺍﻟﻌﺪﺍﻟﺔ‪ ،‬ﻓﺎ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺃﺻﺒﺢ ﺑﺎﻟﺘﺒﻌﻴﺔ ﳎﺮﻣﺎ ﺩﻭﻟﻴﺎ‪ .‬ﻭﻟﻜﻮﻥ ﺃﻧﻪ ﻻ ﳝﻜﻦ ﻷﻱ ﺩﻭﻟﺔ ﺃﻥ ﲡﺎﻭﺯ‬
‫ﺣﺪﻭﺩﻫﺎ ﺍﻹﻗﻠﻴﻤﻴﺔ ﳌﻤﺎﺭﺳﺔ ﺃﻋﻤﺎﳍﺎ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻋﻠﻰ ﺍ‪‬ﺮﻣﲔ ﺍﻟﻔﺎﺭﻳﻦ‪ ،‬ﻛﺎﻥ ﻻﺑﺪ ﻣﻦ ﺇﳚﺎﺩ ﺁﻟﻴﺔ ﻣﻌﻴﻨﺔ‬
‫ﻟﻠﺘﻌﺎﻭﻥ ﻣﻊ ﺍﻟﺪﻭﻟﺔ ﺍﻟﱵ ﻳﻨﺒﻐﻲ ﺍﲣﺎﺫ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻓﻮﻕ ﺇﻗﻠﻴﻤﻬﺎ‪ ،‬ﺗﺘﻤﺜﻞ ﰲ ﺗﺴﻠﻴﻢ ﺍ‪‬ﺮﻣﲔ‬

‫)‪ (1‬ﺍﻋﺘﻤﺪﺕ ﻫﺬﻩ ﺍﳌﻌﺎﻫﺪﺓ ﲟﻮﺟﺐ ﻗﺮﺍﺭ ﺍﳉﻤﻌﻴﺔ ﺍﻟﻌﺎﻣﺔ ﻟﻸﻣﻢ ﺍﳌﺘﺤﺪﺓ ‪ 45/118‬ﺑﺘﺎﺭﻳﺦ ‪.1990/12/14‬‬
‫)‪ (2‬ﲨﻴﻞ ﻋﺒﺪ ﺍﻟﺒﺎﻗﻲ ﺍﻟﺼﻐﲑ‪ ،‬ﺍﳉﻮﺍﻧﺐ ﺍﻹﺟﺮﺍﺋﻴﺔ ﻟﻠﺠﺮﺍﺋﻢ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﻻﻧﺘﺮﻧﺎﺕ‪ ,‬ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ ﻟﻠﻘﺎﻫﺮﺓ ﺹ ‪.83‬‬

‫‪- 91 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﻟﻔﺎﺭﻳﻦ ﳍﺎ‪ .‬ﻭﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﻳﻘﻮﻡ ﺃﺳﺎﺳﺎ ﻋﻠﻰ ﺃﻥ ﺍﻟﺪﻭﻟﺔ ﺍﻟﱵ ﻳﺘﻮﺍﺟﺪ ﻋﻠﻰ ﺇﻗﻠﻴﻤﻬﺎ ﺍﳌﺘﻬﻢ ﺑﺎﺭﺗﻜﺎﺏ‬
‫ﺟﺮﳝﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻴﻬﺎ ﺃﻥ ﺗﻘﻮﻡ ﲟﺤﺎﻛﻤﺘﻪ ﺇﺫﺍ ﻛﺎﻥ ﺗﺸﺮﻳﻌﻬﺎ ﻳﺴﻤﺢ ﺑﺬﻟﻚ‪ ،‬ﻭﺇﻻ ﻛﺎﻥ ﻋﻠﻴﻬﺎ ﺃﻥ ﺗﻘﻮﻡ‬
‫ﺑﺘﺴﻠﻴﻤﻪ ﶈﺎﻛﻤﺘﻪ ﲟﻌﺮﻓﺔ ﺩﻭﻟﺔ ﺃﺧﺮﻯ ﳐﺘﺼﺔ‪ .‬ﻓﻬﻮ ﳛﻘﻖ ﺑﺬﻟﻚ ﻣﺼﻠﺤﺔ ﺍﻟﺪﻭﻟﺘﲔ ﺍﻷﻃﺮﺍﻑ ﰲ ﻋﻤﻠﻴﺔ‬
‫ﺍﻟﺘﺴﻠﻴﻢ‪ ،‬ﺇﺫ ﳛﻘﻖ ﻣﺼﻠﺤﺔ ﺍﻟﺪﻭﻟﺔ ﺍﻷﻭﱃ ﰲ ﻛﻮﻧﻪ ﻳﻀﻤﻦ ﻣﻌﺎﻗﺒﺔ ﺍﻟﻔﺮﺩ ﺍﻟﺬﻱ ﺃﺧﻞ ﺑﻘﻮﺍﻧﻴﻨﻬﺎ ﻭﰲ ﺫﺍﺕ‬
‫ﺍﻟﻮﻗﺖ ﳛﻘﻖ ﻣﺼﻠﺤﺔ ﺍﻟﺪﻭﻟﺔ ﺍﻟﺜﺎﻧﻴﺔ ﺍﳌﻄﻠﻮﺏ ﺇﻟﻴﻬﺎ ﺍﻟﺘﺴﻠﻴﻢ ﻛﻮﻧﻪ ﻳﺴﺎﻋﺪﻫﺎ ﻋﻠﻰ ﺗﻄﻬﲑ ﺇﻗﻠﻴﻤﻬﺎ ﻣﻦ‬
‫ﻓﺮﺩ ﺧﺎﺭﺝ ﻋﻦ ﺍﻟﻘﺎﻧﻮﻥ‪ .‬ﻭﻟﺬﻟﻚ ﻓﻘﺪ ﺣﺮﺻﺖ ﻣﻌﻈﻢ ﺍﻟﺪﻭﻝ ﻋﻠﻰ ﺳﻦ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﳋﺎﺻﺔ ﺑﺘﺴﻠﻴﻢ‬
‫ﺍ‪‬ﺮﻣﲔ ﻭﻣﻨﻬﺎ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﺍﻟﺬﻱ ﺃﺧﺬ ‪‬ﺬﺍ ﺍﻹﺟﺮﺍﺀ ﻛﻤﻈﻬﺮ ﻣﻦ ﻣﻈﺎﻫﺮ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﺪﻭﱄ ﺑﲔ‬
‫ﺍﻟﺴﻠﻄﺎﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﻷﺟﻨﺒﻴﺔ ﰲ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﰲ ﺍﳌﻮﺍﺩ ‪ 694‬ﻭﻣﺎ ﻳﻠﻴﻬﺎ‪.‬‬

‫ﺛﺎﻧﻴﺎ‪ :‬ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﻔﲏ ﺍﻟﺪﻭﱄ ﰲ ﻣﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬ﻻ ﻳﻘﺘﺼﺮ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﺪﻭﱄ ﰲ ﳎﺎﻝ‬
‫ﻣﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﺍﳌﺴﺎﻋﺪﺓ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﺘﺒﺎﺩﻟﺔ ﻓﺤﺴﺐ‪ ،‬ﻭﺇﳕﺎ ﻳﺸﻤﻞ ﻛﺬﻟﻚ ﺍﳌﺴﺎﻋﺪﺓ‬
‫ﺍﻟﺘﻘﻨﻴﺔ ﻭﺗﺒﺎﺩﻝ ﺍﳋﱪﺍﺕ ﺑﲔ ﺍﻟﺪﻭﻝ‪ ،‬ﺫﻟﻚ ﺃﻥ ﺍﻟﻌﻨﺼﺮ ﺍﻟﺒﺸﺮﻱ ﺳﻮﺍﺀ ﻋﻠﻰ ﻣﺴﺘﻮﻯ ﺍﻷﺟﻬﺰﺓ ﺍﻟﻘﻀﺎﺋﻴﺔ‬
‫ﺃﻭ ﺍﻷﺟﻬﺰﺓ ﺍﻷﻣﻨﻴﺔ ﻟﻴﺲ ﺑﺬﺍﺕ ﺍﳉﺎﻫﺰﻳﺔ ﻭﺍﳌﺴﺘﻮﻯ ﳌﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﺇﳕﺎ ﳜﺘﻠﻒ ﻣﻦ ﺩﻭﻟﺔ‬
‫ﺇﱃ ﺃﺧﺮﻯ ﲝﺴﺐ ﺗﻘﺪﻡ ﺗﻠﻚ ﺍﻟﺪﻭﻟﺔ ﻭﺭﻗﻴﻬﺎ‪.‬‬

‫ﻭﳒﺪ ﺃﻥ ﲨﻴﻊ ﺍﻻﺗﻔﺎﻗﻴﺎﺕ ﺍﻟﺪﻭﻟﻴﺔ ﺃﻭ ﺍﻹﻗﻠﻴﻤﻴﺔ ﺫﺍﺕ ﺍﻟﺼﻠﺔ ﻗﺪ ﺩﻋﺖ ﺻﺮﺍﺣﺔ ﺇﱃ ﺿﺮﻭﺭﺓ‬
‫ﻭﺟﻮﺩ ﺗﻌﺎﻭﻥ ﺩﻭﱄ ﰲ ﳎﺎﻝ ﺍﻟﺘﺪﺭﻳﺐ ﻭﻧﻘﻞ ﺍﳋﱪﺍﺕ ﻓﻴﻤﺎ ﺑﻴﻨﻬﺎ‪ (1)،‬ﺫﻟﻚ ﺃﻥ ﺍﻟﺘﻘﺪﻡ ﺍﳌﺘﻮﺍﺻﻞ ﰲ‬
‫ﺗﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻳﻔﺮﺽ ﻋﻠﻰ ﺍﳉﻬﺎﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻭﺍﻷﻣﻨﻴﺔ ﺃﻥ ﺗﺴﲑ ﰲ ﺧﻄﻮﺍﺕ ﻣﺘﻨﺎﺳﻘﺔ ﻣﻊ‬
‫ﺍﻟﺘﻄﻮﺭﺍﺕ ﺍﻟﺴﺮﻳﻌﺔ ﺍﻟﱵ ﺗﺸﻬﺪﻫﺎ ﻫﺬﻩ ﺍﻟﺘﻘﻨﻴﺎﺕ ﻭﺍﻹﳌﺎﻡ ‪‬ﺎ ﺣﱴ ﳝﻜﻦ ﺍﻟﺘﺼﺪﻱ ﻟﻸﻓﻌﺎﻝ ﺍﻹﺟﺮﺍﻣﻴﺔ ﺍﻟﱵ‬
‫ﺻﺎﺣﺒﺖ ﻫﺬﻩ ﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎ ﻭﻣﻦ ﻧﺎﺣﻴﺔ ﺃﺧﺮﻯ ﻓﺈﻥ ﺇﻋﻤﺎﻝ ﺍﻟﻘﺎﻧﻮﻥ ﰲ ﻣﻮﺍﺟﻬﺔ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﻳﺴﺘﻠﺰﻡ ﺍﲣﺎﺫ ﺇﺟﺮﺍﺀﺍﺕ ﻗﺪ ﺗﺘﺠﺎﻭﺯ ﺍﳌﻔﺎﻫﻴﻢ ﻭﺍﳌﺒﺎﺩﺉ ﺍﳌﺴﺘﻘﺮﺓ ﰲ ﺍﳌﺪﻭﻧﺔ ﺍﻟﻌﻘﺎﺑﻴﺔ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﳌﺎ ﺗﺘﺴﻢ ﺑﻪ‬
‫ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻣﻦ ﺣﺪﺍﺛﺔ ﰲ ﺍﻷﺳﻠﻮﺏ ﻭﺳﺮﻋﺔ ﰲ ﺍﻟﺘﻨﻔﻴﺬ ﻭﺳﻬﻮﻟﺔ ﰲ ﺇﺧﻔﺎﺋﻬﺎ ﻭﳏﻮ ﺁﺛﺎﺭﻫﺎ‪ ،‬ﻭﺑﺎﻟﺘﺎﱄ‬
‫ﻓﺈﻥ ﻇﻬﻮﺭ ﻫﺬﻩ ﺍﻷﳕﺎﻁ ﺍﳉﺪﻳﺪﺓ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺃﺻﺒﺢ ﻳﺸﻜﻞ ﻋﺒﺌﺎ ﺛﻘﻴﻼ ﻋﻠﻰ ﻋﺎﺗﻖ ﺍﻷﺟﻬﺰﺓ ﺍﻟﻘﻀﺎﺋﻴﺔ‬
‫ﺍﳌﺨﺘﺼﺔ ﻣﻦ ﻗﻀﺎﺓ ﲢﻘﻴﻖ ﻭﻗﻀﺎﺓ ﺣﻜﻢ‪ .‬ﻭﻛﺬﺍ ﺭﺟﺎﻝ ﺍﻟﻀﺒﻄﻴﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ‪،‬ﻷﺟﻞ ﺫﻟﻚ ﻛﺎﻥ ﻻﺑﺪ ﺃﻥ‬
‫ﺗﻜﻮﻥ ﺗﻠﻚ ﺍﻷﺟﻬﺰﺓ ﻋﻠﻰ ﳐﺘﻠﻒ ﺃﻧﻮﺍﻋﻬﺎ ﻋﻠﻰ ﺩﺭﺟﺔ ﻛﺒﲑﺓ ﻣﻦ ﺍﻟﻜﻔﺎﺀﺓ ﻭﺍﳌﻌﺮﻓﺔ ﻭﺍﻟﻘﺪﺭﺓ ﰲ ﺍﻟﺘﻌﺎﻣﻞ‬
‫)‪ (1‬ﺍﻧﻈﺮ ﺍﳌﺎﺩﺓ ‪ 29‬ﻣﻦ ﺍﺗﻔﺎﻗﻴﺔ ﺍﻷﻣﻢ ﺍﳌﺘﺤﺪﺓ ﳌﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻨﻈﻤﺔ ﻋﱪ ﺍﻟﻮﻃﻨﻴﺔ ﻭﺍﳌﺎﺩﺓ ‪ 09‬ﻣﻦ ﻣﺸﺮﻭﻉ ﺍﻻﺗﻔﺎﻗﻴﺔ ﺍﻟﻌﺮﺑﻴﺔ ﳌﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻨﻈﻤﺔ ﻋﱪ‬
‫ﺍﳊﺪﻭﺩ‪.‬‬

‫‪- 92 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻣﻊ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‪ .‬ﻭﻣﻦ ﻫﺬﺍ ﺍﳌﻨﻄﻠﻖ ﻛﺎﻧﺖ ﺍﻟﺪﻋﻮﻯ ﺇﱃ ﺿﺮﻭﺭﺓ ﻭﺟﻮﺩ ﺗﻌﺎﻭﻥ‬
‫ﺩﻭﱄ ﰲ ﳎﺎﻝ ﺗﺪﺭﻳﺐ ﺭﺟﺎﻝ ﺍﻟﻘﻀﺎﺀ ﻭﺍﻟﻀﺒﻄﻴﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻟﻼﺳﺘﻔﺎﺩﺓ ﻣﻦ ﻣﻬﺎﺭﺍﺕ ﻭﲡﺎﺭﺏ ﺍﻵﺧﺮﻳﻦ‬
‫ﻣﻦ ﺧﻼﻝ ﺃﺷﺨﺎﺹ ﺃﻛﻔﺎﺀ ﻭﻣﺆﻫﻠﲔ ﻭﻗﺎﺩﺭﻳﻦ ﻋﻠﻰ ﻧﻘﻞ ﻫﺬﻩ ﺍﻟﺘﺠﺎﺭﺏ ﻭﺗﻠﻚ ﺍﳌﻬﺎﺭﺍﺕ ﺑﻮﺳﺎﺋﻞ ﺳﻬﻠﺔ‬
‫ﻣﻴﺴﺮﺓ‪.‬‬

‫ﻭ ﺍﻟﺘﺪﺭﻳﺐ ﺍﳌﻘﺼﻮﺩ ﻫﻨﺎ ﻟﻴﺲ ﺍﻟﺘﺪﺭﻳﺐ ﺍﻟﺘﻘﻠﻴﺪﻱ ﻓﺤﺴﺐ‪ ،‬ﻓﻼ ﻳﻜﻒ ﺃﻥ ﺗﺘﻮﺍﻓﺮ ﻟﺪﻯ ﺭﺟﺎﻝ‬
‫ﺍﻟﻘﻀﺎﺀ ﺍﳋﻠﻔﻴﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ‪ ،‬ﻭﻟﺪﻯ ﺍﻟﻀﺒﻄﻴﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺧﺼﺎﺋﺺ ﻋﻤﻞ ﺍﻟﺸ‪‬ﺮﻃﻴﻮﺇﳕﺎ ﻻﺑﺪ ﻣﻦ ﺇﻛﺴﺎ‪‬ﻢ‬
‫ﺧﱪﺓ ﻓﻨﻴﺔ ﰲ ﳎﺎﻝ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ .‬ﻭﻫﺬﻩ ﺍﻷﺧﲑﺓ ﻻ ﺗﺘﺄﺕ ﺩﻭﻥ ﺗﺪﺭﻳﺐ ﲣﺼﺼﻲ ﻳﺮﺍﻋﻰ ﻓﻴﻪ‬
‫ﺍﻟﻌﻨﺎﺻﺮ ﺍﻟﺸﺨﺼﻴﺔ ﻟﻠﻤﺘﺪﺭﺏ ﻣﻦ ﺣﻴﺚ ﺗﻮﺍﻓﺮ ﺍﻟﺼﻼﺣﻴﺔ ﺍﻟﻌﻠﻤﻴﺔ ﻭﺍﻟﻘﺪﺭﺍﺕ ﺍﻟﺬﻫﻨﻴﺔ ﻭﺍﻟﻨﻔﺴﻴﺔ ﻟﺘﻠﻘﻲ‬
‫ﺍﻟﺘﺪﺭﻳﺐ‪.‬‬

‫ﺃﻣﺎ ﺑﺎﻟﻨﺴﺒﺔ ﻟﻠﻤﻨﻬﺞ ﺍﻟﺘﺪﺭﻳﱯ ﻓﻴﺠﺐ ﺃﻥ ﻳﺸﻤﻞ ﻋﻠﻰ ﺑﻴﺎﻥ ﺑﺎﳌﺨﺎﻃﺮ ﻭﺍﻟﺘﻬﺪﻳﺪﺍﺕ ﻭﻧﻘﺎﻁ ﺍﻟﻀﻌﻒ‬
‫ﻭﺃﻣﺎﻛﻦ ﺍﻹﺧﺘﺮﺍﻗﺎﺕ ﻟﺸﺒﻜﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺃﺟﻬﺰﺓ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻭﲢﺪﻳﺪ ﺃﳕﺎﻁ ﻭﻧﻮﻋﻴﺔ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﺑﻴﺎﻧﺎ ﻷﻫﻢ ﺍﻟﺼﻔﺎﺕ ﺍﻟﱵ ﻳﺘﻤﻴﺰ ‪‬ﺎ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻭﺍﻟﺪﻭﺍﻓﻊ ﻭﺭﺍﺀ ﺍﺭﺗﻜﺎﺑﻪ ﻟﻠﺠﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ .‬ﻭﻓﻴﻤﺎ ﻳﺘﻌﻠﻖ ﲟﻨﻬﺞ ﺍﻟﺘﺪﺭﻳﺐ ﻋﻠﻰ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻓﺈﻧﻪ ﻻﺑﺪ ﺃﻥ ﻳﺸﺘﻤﻞ ﻋﻠﻰ‬
‫ﺇﺟﺮﺍﺀﺍﺕ ﺍﻟﺘﺤﻘﻴﻖ‪ ،‬ﺍﻟﺘﺨﻄﻴﻂ ﻟﻠﺘﺤﻘﻴﻖ‪ ،‬ﲡﻤﻴﻊ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﲢﻠﻴﻠﻬﺎ‪ ،‬ﺃﺳﺎﻟﻴﺐ ﺍﳌﻮﺍﺟﻬﺔ ﻭﺍﻻﺳﺘﺠﻮﺍﺏ‪،‬‬
‫ﻃﺮﻕ ﻣﺮﺍﺟﻌﺔ ﺍﻟﻨﻈﻢ ﺍﻟﻔﻨﻴﺔ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﻭﺃﺳﺎﻟﻴﺐ ﺍﳌﻌﻤﻞ ﺍﳉﻨﺎﺋﻲ‪ .‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﻣﺎ ﻳﺘﻌﻠﻖ ﺑﺎﻟﺘﻔﺘﻴﺶ‬
‫ﻭﺍﻟﻀﺒﻂ ﻭﻛﻴﻔﻴﺔ ﺍﺳﺘﺨﺪﺍﻡ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻛﺄﺩﺍﺓ ﻟﻠﻤﺮﺍﺟﻌﺔ ﻭﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻷﺩﻟﺔ)‪.(1‬‬

‫ﻭﺻﻔﻮﺓ ﺍﻟﻘﻮﻝ ﻭﺧﻼﺻﺘﻪ ﺃﻧﻪ ﻣﺎ ﻣﻦ ﺩﻭﻟﺔ ﳝﻜﻨﻬﺎ ﳎﺎ‪‬ﺔ ﻫﺬﺍ ﺍﻟﺘﺤﺪﻱ ﰲ ﻣﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﲟﻔﺮﺩﻫﺎ‪ ،‬ﻓﻼ ﻣﻔﺮ ﺇﺫﻥ ﻣﻦ ﻣﻮﺍﺻﻠﺔ ﺗﻄﻮﻳﺮ ﺍﻟﻘﺪﺭﺓ ﻋﻠﻰ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﺪﻭﱄ ﰲ ﺍ‪‬ﺎﻝ ﺍﻟﺘﺪﺭﻳﱯ‬
‫ﻭﺍﻟﺘﺒﺎﺩﻝ ﺍﻟﺘﻘﲏ ﻣﻦ ﺧﻼﻝ ﻗﻴﺎﻡ ﺍﻟﺪﻭﻝ ﺍﳌﺘﻘﺪﻣﺔ ﺗﻘﻨﻴﺎ ﻭﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﻭﳍﺎ ﺻﻴﺖ ﻛﺒﲑ ﰲ ﻣﻮﺍﺟﻬﺔ ﺍﳉﺮﺍﺋﻢ‬

‫)‪ (1‬ﻫﺸﺎﻡ ﳏﻤﺪ ﻓﺮﻳﺪ ﺭﺳﺘﻢ‪ .‬ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ .‬ﺃﺻﻮﻝ ﺍﻟﺘﺤﻘﻴﻖ ﺍﳉﻨﺎﺋﻲ ﺍﻟﻔﲏ‪ .‬ﲝﺚ ﻣﻘﺪﻡ ﳌﺆﲤﺮ ﺍﻟﻘﺎﻧﻮﻥ ﻭﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﻭﺍﻻﻧﺘﺮﻧﺎﺕ‪ -‬ﻛﻠﻴﺔ ﺍﻟﺸﺮﻳﻌﺔ‬
‫ﻭﺍﻟﻘﺎﻧﻮﻥ ﲜﺎﻣﻌﺔ ﺍﻹﻣﺎﺭﺍﺕ ﺍﻟﻌﺮﺑﻴﺔ ﺍﳌﺘﺤﺪﺓ ﰲ ﺍﻟﻔﺘﺮﺓ ‪ 2005/03/01‬ﺍﻟﻄﺒﻌﺔ ﺍﻟﺜﺎﱐ ‪ 2004‬ﺹ ‪.496‬‬

‫‪- 93 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﲟﺴﺎﻋﺪﺓ ﺍﻟﺪﻭﻝ ﺍﻟﻨﺎﻣﻴﺔ ﻟﺘﻌﺰﻳﺰ ﻣﺆﺳﺴﺎ‪‬ﺎ ﺍﳌﺘﺨﺼﺼﺔ ﺑﺎﻟﺘﺤﺮﻱ ﻭﺍﻟﺘﺤﻘﻴﻖ ﻭﺍﶈﺎﻛﻤﺔ ﺑﺘﻮﻓﲑ‬
‫ﺳﺎﺋﺮ ﺃﻧﻮﺍﻉ ﺍﳌﻌﻮﻧﺔ ﺍﻟﺘﻘﻨﻴﺔ)‪.(1‬‬

‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺍﻟﺼﻌﻮﺑﺎﺕ ﺍﻟﱵ ﺗﻮﺍﺟﻪ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﺪﻭﱄ ﰲ ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬‬

‫ﺭﻏﻢ ﺍﳌﻨﺎﺩﺍﺓ ﺑﻀﺮﻭﺭﺓ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﺪﻭﱄ ﰲ ﳎﺎﻝ ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺍﻟﺬﻱ ﺑﺎﺕ ﻣﻄﻠﺒﺎ‬
‫ﺗﺴﻌﻰ ﺇﱃ ﲢﻘﻴﻘﻪ ﺃﻏﻠﺐ ﺍﻟﺪﻭﻝ‪ ،‬ﺇﻻ ﺃﻧﻪ ﲦﺔ ﺻﻌﻮﺑﺎﺕ ﻭﻣﻌﻮﻗﺎﺕ ﲡﻌﻞ ﻫﺬﺍ ﺍﻟﺘﻌﺎﻭﻥ ﻟﻴﺲ ﺑﺎﻷﻣﺮ ﺍﻟﻴﺴﲑ‬
‫ﻭﺫﻟﻚ ﻛﻤﺎ ﻳﻠﻲ‪:‬‬

‫‪ /1‬ﻋﺪﻡ ﻭﺟﻮﺩ ﳕﻮﺫﺝ ﻣﻮﺣﺪ ﻟﻠﻨﺸﺎﻁ ﺍﻹﺟﺮﺍﻣﻲ‪ :‬ﺇﺫ ﱂ ﺗﺘﻔﻖ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﰲ ﺑﻠﺪﺍﻥ ﺍﻟﻌﺎﱂ‬
‫ﻋﻠىﺼﻮﺭﺓ ﳏﺪﺩﺓ ﻭﳕﺎﺫﺝ ﻣﻌﻴﻨﺔ ﻳﺘﻢ ﺍﻻﺗﻔﺎﻕ ﺍﳌﺸﺘﺮﻙ ﺑﲔ ﺍﻟﺪﻭﻝ ﺣﻮﳍﺎ ﺗﻨﺪﺭﺝ ﰲ ﺇﻃﺎﺭ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ (2)،‬ﻓﻤﺎ ﻳﻜﻮﻥ ﳎﺮﻣﺎ ﰲ ﺑﻌﺾ ﺍﻷﻧﻈﻤﺔ ﻗﺪ ﻻ ﻳﻜﻮﻥ ﻛﺬﻟﻚ ﰲ ﺃﺧﺮﻯ‪.‬‬

‫ﻭﻟﻌﻞ ﻋﺪﻡ ﺍﻻﺗﻔﺎﻕ ﺑﲔ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﳌﺨﺘﻠﻔﺔ ﻋﻠﻰ ﺻﻮﺭ ﻣﻮﺣﺪﺓ ﻟﻠﺴﻠﻮﻙ ﺍﻹﺟﺮﺍﻣﻲ ﰲ‬
‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻳﻐﺮﻱ ﻗﺮﺍﺻﻨﺔ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻋﻠﻰ ﺍﺭﺗﻜﺎﺏ ﺟﺮﺍﺋﻤﻬﻢ ﺩﻭﻥ ﺗﻘﻴﺪ ﺑﺎﳊﺪﻭﺩ‬
‫ﺍﳉﻐﺮﺍﻓﻴﺔ)‪.(3‬‬

‫‪ /2‬ﺍﺧﺘﻼﻑ ﺍﻟﻨﻈﻢ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻹﺟﺮﺍﺋﻴﺔ ‪:‬ﺇﺫ ﺑﺴﺒﺐ ﻫﺬﺍ ﺍﻻﺧﺘﻼﻑ ﻗﺪ ﺗﻜﻮﻥ ﻫﻨﺎﻙ ﻃﺮﻕ‬
‫ﻟﻠﺘﺤﺮﻱ ﻭﺍﻟﺘﺤﻘﻴﻖ ﻭﺍﶈﺎﻛﻤﺔ ﺍﻟﱵ ﺗﺜﺒﺖ ﻓﻌﺎﻟﻴﺘﻬﺎ ﰲ ﺩﻭﻟﺔ ﻣﺎ‪ ،‬ﻗﺪ ﺗﻜﻮﻥ ﻋﺪﳝﺔ ﺍﻟﻔﺎﺋﺪﺓ ﰲ ﺩﻭﻟﺔ ﺃﺧﺮﻯ‬
‫ﺃﻭ ﻗﺪ ﻻ ﻳﺴﻤﺢ ﺑﺈﺟﺮﺍﺋﻬﺎ ﻛﻤﺎ ﻫﻮ ﺍﳊﺎﻝ ﻣﺜﻼ ﺑﺎﻟﻨﺴﺒﺔ ﻟﻠﻤﺮﺍﻗﺒﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﻓﺈﺫﺍ ﻣﺎ ﺍﻋﺘﱪﺕ ﺃﻥ‬
‫ﻃﺮﻳﻘﺔ ﻣﺎ ﻣﻦ ﻃﺮﻕ ﲨﻊ ﺍﻹﺳﺘﺪﻻﻻﺕ ﺃﻭ ﺍﻟﺘﺤﻘﻴﻖ ﺃ‪‬ﺎ ﻗﺎﻧﻮﻧﻴﺔ ﰲ ﺩﻭﻟﺔ ﻣﻌﻴﻨﺔ‪ ،‬ﻗﺪ ﺗﻜﻮﻥ ﺫﺍﺕ ﺍﻟﻄﺮﻳﻘﺔ‬
‫ﻏﲑ ﻣﺸﺮﻭﻋﺔ ﰲ ﺩﻭﻟﺔ ﺃﺧﺮﻯ‪ .‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺃﻧﻪ ﻗﺪ ﻻ ﺗﺴﻤﺢ ﺩﻭﻟﺔ ﻣﺎ ﺑﺎﺳﺘﺨﺪﺍﻡ ﺩﻟﻴﻞ ﺇﺛﺒﺎﺕ ﺟﺮﻯ‬
‫ﲨﻌﻪ ﺑﻄﺮﻕ ﺗﺮﻯ ﻫﺬﻩ ﺍﻟﺪﻭﻝ ﺃ‪‬ﺎ ﻃﺮﻕ ﻏﲑ ﻣﺸﺮﻭﻋﺔ‪.‬‬

‫)‪ (1‬ﻳﻌﻤﻞ ﻣﻜﺘﺐ ﺍﳌﺴﺎﻋﺪﺓ ﻭﺍﻟﺘﺪﺭﻳﺐ ﻋﻠﻰ ﺍﻟﺘﺤﻘﻴﻖ ﺍﳉﺰﺍﺋﻲ )‪ (ICITAP‬ﺍﻟﺘﺎﺑﻊ ﻟﻮﺯﺍﺭﺓ ﺍﻟﻌﺪﻝ ﺍﻷﻣﺮﻳﻜﻴﺔ ﻋﻠﻰ ﺗﻄﻮﻳﺮ ﺃﺟﻬﺰﺓ ﺍﻹﺩﻋﺎﺀ ﺍﻟﻌﺎﻡ ﰲ ﺍﳋﺎﺭﺝ‬
‫ﻭﻋﻠﻰ ﺗﻮﻓﲑ ﻣﺴﺎﻋﺪﺍﺕ ﻷﺟﻬﺰﺓ ﺍﻟﺸﺮﻃﺔ ﰲ ﺍﻟﺒﻠﺪﺍﻥ ﺍﻟﻨﺎﻣﻴﺔ‪.‬‬
‫)‪ (2‬ﻋﺒﺪ ﺍﻟﻔﺘﺎﺡ ﺑﻴﻮﻣﻲ ﺣﺠﺎﺯﻱ ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ ﰲ ﺟﺮﺍﺋﻢ ﺍﻟﻜﻮﺑﻴﻮﺗﺮ ﻭﺍﻻﻧﺘﺮﻧﺎﺕ‪.‬ﺩﺍﺭ ﺍﻟﻜﺘﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ‪ .‬ﻣﺼﺮ ‪.2007‬ﺹ ‪188‬‬
‫)‪ (3‬ﻣﺜﺎﻝ ﺫﻟﻚ ﻗﻀﻴﺔ ﻓﲑﻭﺱ )‪ (Love Bug‬ﺍﻟﺬﻱ ﺑﻌﺪ ﺗﺘﺒﻌﻪ ﻣﻦ ﻃﺮﻑ ﻣﻜﺘﺐ ﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﺍﻟﻔﺪﺭﺍﱄ ﺗﺒﲔ ﻣﺼﺪﺭﻩ ﺍﻟﻔﻠﺒﲔ ﻭﺃﻥ ﻫﻮﻳﺔ ﺍﳌﻌﺘﺪﻱ ﻫﻮ‬
‫ﺃﻭﻧﻴﻞ ﺩﻱ ﺟﻮﺯﻣﺎﻥ ﺍﻟﺬﻱ ﻗﺎﻡ ﺑﺎﺑﺘﻜﺎﺭ ﻫﺬﺍ ﺍﻟﻔﲑﻭﺱ ﻭﲢﻤﻴﻠﻪ ﻋﻠﻰ ﺷﺒﻜﺔ ﺍﻻﻧﺘﺮﻧﺎﺕ ﻭﻧﺸﺮﻩ ﰲ ﲨﻴﻊ ﺃﳓﺎﺀ ﺍﻟﻌﺎﱂ ﻭﺭﻏﻢ ﺃﻥ ﻫﻨﺎﻙ ﺃﺩﻟﺔ ﻛﺎﻓﻴﺔ ﺿﺪ‬
‫ﺃﻭﻧﻴﻠﺠﻮﺯﻣﺎﻥ ﻓﻘﺪ ﻭﺍﺟﻪ ﻣﻜﺘﺐ ﺍﻹﺩﻋﺎﺀ ﺍﻟﻌﺎﻡ ﺑﺎﻟﻔﻠﺒﲔ ﻋﻘﺒﺎﺕ ﻛﺒﲑﺓ ﰲ ﺗﻮﺟﻴﻬﺎ ﻻ‪‬ﺎﻡ ﻟﻌﺪﻡ ﻭﺟﻮﺩ ﻗﺎﻧﻮﻥ ﰲ ﺍﻟﻔﻠﺒﲔ ﳌﻜﺎﻓﺤﺔ ﺍﻟﻘﺮﺻﻨﺔ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ‪ .‬ﻭﱂ‬
‫ﻳﻜﻦ ﺑﺎﻹﻣﻜﺎﻥ ﳏﺎﻛﻤﺘﻪ ﰲ ﺑﻠﺪ ﺁﺧﺮ ﻋﻠﻰ ﺃﺳﺎﺱ ﻣﻌﺎﻫﺪﺓ ﺗﺴﻠﻴﻢ ﺍ‪‬ﺮﻣﲔ ﻣﻊ ﺍﻟﻔﻠﺒﲔ ﻷﻥ ﺷﺮﻁ ﺍﻟﺘﺠﺮﱘ ﺍﳌﺰﺩﻭﺝ ﻏﲑ ﻣﺘﻮﻓﺮ‪.‬‬

‫‪- 94 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫‪/3‬ﺍﻟﺘﺠﺮﱘ ﺍﳌﺰﺩﻭﺝ‪ :‬ﻳﻌﺘﱪ ﺍﻟﺘﺠﺮﱘ ﺍﳌﺰﺩﻭﺝ ﻣﻦ ﺃﻫﻢ ﺷﺮﻭﻁ ﺗﺴﻠﻴﻢ ﺍ‪‬ﺮﻣﲔ‪ ،‬ﻭﻗﺪ ﻳﻜﻮﻥ ﻫﺬﺍ‬
‫ﺍﻟﺸﺮﻁ ﻋﻘﺒﺔ ﺃﻣﺎﻡ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﺪﻭﱄ ﰲ ﳎﺎﻝ ﺗﺴﻠﻴﻢ ﺍ‪‬ﺮﻣﲔ ﺑﺎﻟﻨﺴﺒﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺳﻴﻤﺎ ﻭﺃﻥ‬
‫ﻣﻌﻈﻢ ﺍﻟﺪﻭﻝ ﻣﺎ ﺯﺍﻟﺖ ﻧﺼﻮﺻﻬﺎ ﺍﻟﻌﻘﺎﺑﻴﺔ ﺧﺎﻟﻴﺔ ﻣﻦ ﻫﺬﺍ ﺍﻟﻨﻤﻂ ﺍﻹﺟﺮﺍﻣﻲ‪.‬‬

‫ﻭﰲ ﺍﳊﻘﻴﻘﺔ ﻓﺈﻥ ﺍﳌﺼﻠﺤﺔ ﺍﳌﺸﺘﺮﻛﺔ ﻟﻠﺪﻭﻝ ﺗﻘﺘﻀﻲ ﺍﻟﺒﺤﺚ ﻋﻦ ﺍﻟﻮﺳﺎﺋﻞ ﺍﻟﱵ ﺗﺴﺎﻋﺪ ﰲ ﺍﻟﺘﻐﻠﺐ‬
‫ﻋﻠﻰ ﻫﺬﻩ ﺍﻟﺼﻌﻮﺑﺎﺕ ﻭﺇﳚﺎﺩ ﺗﻌﺎﻭﻥ ﺩﻭﱄ ﺣﻘﻴﻘﻲ ﻳﺘﻔﻖ ﻣﻊ ﻃﺒﻴﻌﺔ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﺍﳌﺴﺘﺤﺪﺙ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‬
‫ﻟﻠﺘﺨﻔﻴﻒ ﻣﻦ ﺧﻠﻮ ﺍﻟﻔﻮﺍﺭﻕ ﺑﲔ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﻌﻘﺎﺑﻴﺔ ﺍﻟﺪﺍﺧﻠﻴﺔ‪.‬‬

‫‪- 95 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﳌﻄﻠﺒﺎﻟﺮﺍﺑﻊ‪ :‬ﻗﻮﺍﻋﺪ ﺍﻻﺧﺘﺼﺎﺹ ﺍﻟﻘﻀﺎﺋﻲ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬

‫ﺇﻥ ﺍﳌﻘﺼﻮﺩ ﺑﺎﻹﺧﺘﺼﺎﺹ ﺍﻟﻘﻀﺎﺋﻲ ﻫﻮ ﺍﻟﺴﻠﻄﺔ ﺍﻟﺴﻴﺎﺩﻳﺔ ﻟﻠﺪﻭﻟﺔ ﺍﻟﱵ ﲤﻜﻨﻬﺎ ﻣﻦ ﺗﻄﺒﻴﻖ ﻗﻮﺍﻧﻴﻨﻬﺎ‬
‫ﺍﻟﻮﻃﻨﻴﺔ ﺩﺍﺧﻞ ﺇﻗﻠﻴﻤﻬﺎ‪.‬‬

‫ﻭﺗﻌﺪ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﺃﻛﺜﺮ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﺗﻄﺮﺡ ﻣﺴﺄﻟﺔ ﺍﻹﺧﺘﺼﺎﺹ ﺍﻟﻘﻀﺎﺋﻲ‪ ،‬ﺫﻟﻚ ﺃﻥ‬
‫ﺍﻟﺴﻠﻮﻙ ﺃﻭ ﺍﻟﻨﺸﺎﻁ ﺍﻹﺟﺮﺍﻣﻲ ﻓﻴﻬﺎ ﻻ ﻳﻌﺘﺮﻑ ﺑﺎﳊﺪﻭﺩ‪ ،‬ﻓﺎﻟﻌﺎﱂ ﻛﻠﻪ ﻣﺮﻫﻮﻥ ﲟﺠﺮﺩ ﻧﻘﺮﺓ ﺑﺴﻴﻄﺔ ﻋﻠﻰ‬
‫ﻟﻮﺣﺔ ﻣﻔﺎﺗﻴﺢ ﺟﻬﺎﺯ ﺍﳊﺎﺳﻮﺏ‪ ،‬ﺇﺫ ﺃﻥ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﺘﻘﻨﻴﺔ ﺍﻟﻌﺎﻟﻴﺔ ﻟﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﳌﺮﺗﺒﻄﺔ ﺑﺸﺒﻜﺎﺕ‬
‫ﺍﻹﺗﺼﺎﻝ ﺍﻟﻌﺎﳌﻴﺔ ﳝﻜﻦ ﺃﻥ ﺗﺆﺩﻱ ﺇﱃ ﺃﻥ ﻳﺼﺒﺢ ﺇﻗﻠﻴﻢ ﺃﻛﺜﺮ ﻣﻦ ﺩﻭﻟﺔ ﻣﺴﺮﺣﺎ ﳉﺮﳝﺔ ﻭﺍﺣﺪﺓ‪ (1)،‬ﺍﻷﻣﺮ‬
‫ﺍﻟﺬﻱ ﻗﺪ ﻳﻨﺠﻢ ﻋﻨﻪ ﺗﻨﺎﺯﻉ ﰲ ﺍﻹﺧﺘﺼﺎﺹ ﺑﲔ ﻫﺬﻩ ﺍﻟﺪﻭﻝ‪ .‬ﻓﻘﺪ ﳛﺪﺙ ﺃﻥ ﺗﺮﺗﻜﺐ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﰲ ﺇﻗﻠﻴﻢ ﺩﻭﻟﺔ ﻣﻌﻴﻨﺔ ﻭﺗﺘﺤﻘﻖ ﺍﻟﻨﺘﻴﺠﺔ ﺍﳉﺮﻣﻴﺔ ﰲ ﺩﻭﻟﺔ ﺃﺧﺮﻯ‪ ،‬ﻭﻣﻦ ﰒ ﺗﺘﻌﺪﺩ ﺍﻟﻘﻮﺍﻧﲔ ﺍﻟﱵ ﳝﻜﻦ ﺃﻥ‬
‫ﲢﻜﻢ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﺑﺘﻌﺪﺩ ﺍﻟﺪﻭﻝ ﺍﳌﺮﺗﺒﻄﺔ ‪‬ﺎ‪.‬‬

‫ﻭﺇﺫﺍ ﻛﺎﻥ ﺍﻹﺧﺘﺼﺎﺹ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻟﺪﺍﺧﻠﻲ )ﺍﻟﻮﻃﲏ( ﻻ ﻳﺜﲑ ﺃﻱ ﺇﺷﻜﺎﻝ‪ ،‬ﺇﺫ ﻳﺘﻢ ﺍﻟﺮﺟﻮﻉ‬
‫ﰲ ﲢﺪﻳﺪﻩ ﺇﱃ ﺍﳌﻌﺎﻳﲑ ﺍﶈﺪﺩﺓ ﺳﻠﻔﺎ ﰲ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ)‪ .(2‬ﻓﺈﻥ ﺍﳌﺸﻜﻠﺔ ﺗﺜﺎﺭ ﺑﺎﻟﻨﺴﺒﺔ‬
‫ﻟﻺﺧﺘﺼﺎﺹ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻟﺪﻭﱄ ﺑﲔ ﺍﻟﺪﻭﻝ‪ ،‬ﺣﻴﺚ ﺍﺧﺘﻼﻑ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﻭﺍﻟﻨﻈﻢ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ‪.‬‬
‫ﻭﺍﳌﻌﺮﻭﻑ ﺃﻥ ﲢﺪﻳﺪ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﻮﺍﺟﺐ ﺍﻟﺘﻄﺒﻴﻖ ﻳﺘﺮﺗﺐ ﻋﻠﻴﻪ ﲢﺪﻳﺪ ﺍﶈﻜﻤﺔ ﺍﳌﺨﺘﺼﺔ ﻟﺬﻟﻚ ﻓﺈﻥ ﺍﳌﺴﺄﻟﺔ‬
‫ﺗﻘﺘﻀﻲ ﻣﻨﺎ ﻣﻌﺮﻓﺔ ﺍﳌﺒﺎﺩﺉ ﺃﻭ ﺍﳌﻌﺎﻳﲑ ﺍﻟﱵ ﻳ‪‬ﻌﺘﻤﺪ ﻋﻠﻴﻬﺎ ﰲ ﲢﺪﻳﺪ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﻮﺍﺟﺐ ﺍﻟﺘﻄﺒﻴﻖ ﻋﻠﻰ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﳌﺮﺗﻜﺒﺔ‪ ،‬ﻭﺑﺎﻟﺘﺒﻌﻴﺔ ﲢﺪﻳﺪ ﺍﻟﻮﻻﻳﺔ ﺃﻭ ﺍﻻﺧﺘﺼﺎﺹ ﺍﻟﻘﻀﺎﺋﻲ ﰒ ﳓﺎﻭﻝ ﺇﺑﺮﺍﺯ ﺃﺛﺮ ﺫﺍﺗﻴﺔ ﺃﻭ ﺧﺼﻮﺻﻴﺔ‬
‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﲢﺪﻳﺪ ﺍﻹﺧﺘﺼﺎﺹ ﺍﻟﻘﻀﺎﺋﻲ‪.‬‬

‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﻗﻮﺍﻋﺪ ﲢﺪﻳﺪ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﻮﺍﺟﺐ ﺍﻟﺘﻄﺒﻴﻖ‬

‫ﺇﻥ ﻗﻮﺍﻋﺪ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﻨﺎﺋﻲ )ﺑﺸﻘﻴﻪ ﺍﳌﻮﺿﻮﻋﻲ ﻭﺍﻹﺟﺮﺍﺋﻲ( ﺗﻌﺪ ﻣﻈﻬﺮﺍ ﻣﻦ ﻣﻈﺎﻫﺮ ﺳﻴﺎﺩﺓ ﺍﻟﺪﻭﻟﺔ‬
‫ﻟﺬﻟﻚ ﻓﺈﻥ ﺗﻄﺒﻴﻘﻬﺎ ﻣﻦ ﺣﻴﺚ ﺍﳌﻜﺎﻥ ﳜﻀﻊ ﳌﺒﺪﺃ ﻣﺴﺘﻘﺮ ﺃﻻ ﻭﻫﻮ ﻣﺒﺪﺃ ﺍﻹﻗﻠﻴﻤﻴﺔ‪ ،‬ﻭﺍﻟﺬﻱ ﻳﻌﲏ ﺧﻀﻮﻉ‬

‫)‪ (1‬ﻋﺎﺩﻝ ﻋﺰﺍﻡ ﺳﻘﻒ ﺍﳊﻴﻂ‪ .‬ﺟﺮﺍﺋﻢ ﺍﻟﺬﻡ ﻭﺍﻟﻘﺪﺡ ﻭﺍﻟﺘﺤﻘﲑ ﺍﳌﺮﺗﻜﺒﺔ ﻋﱪ ﺍﻟﻮﺳﺎﺋﻂ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔﺩﺍﺭ ﺍﻟﺜﻘﺎﻓﺔ ﻟﻠﻨﺸﺮ ﻭﺍﻟﺘﻮﺯﻳﻊ ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ‪ 2011 ،‬ﻋﻤﺎﻥ‬
‫ﺹ ‪.349‬‬
‫)‪ (2‬ﻣﻜﺎﻥ ﻭﻗﻮﻉ ﺍﳉﺮﳝﺔ‪ ،‬ﻣﻜﺎﻥ ﳏﻞ ﺇﻗﺎﻣﺔ ﺍﳌﺘﻬﻢ‪،‬ﻣﻜﺎﻥ ﺇﻟﻘﺎﺀ ﺍﻟﻘﺒﺾ ﻋﻠﻰ ﺍﳌﺘﻬﻢ‪.‬‬

‫‪- 96 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﺗﻘﻊ ﰲ ﺇﻗﻠﻴﻢ ﺩﻭﻟﺔ ﻣﻌﻴﻨﺔ ﻟﻘﺎﻧﻮ‪‬ﺎ ﺍﳉﻨﺎﺋﻲ ﺍﻟﻨﺎﻓﺬ‪ ،‬ﲝﻴﺚ ﺗﺼﺒﺢ ﳏﺎﻛﻤﻬﺎ ﻫﻲ ﺻﺎﺣﺒﺔ‬
‫ﺍﻟﻮﻻﻳﺔ ﺑﻨﻈﺮ ﺍﻟﺪﻋﻮﻯ ﺍﻟﻨﺎﺷﺌﺔ ﻋﻨﻬﺎ ﻭﻻ ﲣﻀﻊ ﻟﺴﻠﻄﺎﻥ ﺃﻱ ﻗﺎﻧﻮﻥ ﺃﺟﻨﱯ‪ ،‬ﻭﰲ ﺍﳌﻘﺎﺑﻞ ﻓﻼ ﳎﺎﻝ ﻷﻥ‬
‫ﳝﺘﺪ ﺳﺮﻳﺎﻥ ﻗﺎﻧﻮﻥ ﺍﻟﺪﻭﻟﺔ ﺍﳉﻨﺎﺋﻲ ﺧﺎﺭﺝ ﻧﻄﺎﻗﻬﺎ ﺍﻹﻗﻠﻴﻤﻲ ﻭﻓﻘﺎ ﳊﺪﻭﺩﻫﺎ ﺍﳌﻌﺘﺮﻑ ‪‬ﺎ‪ ،‬ﺣﻴﺚ ﻳﺼﻄﺪﻡ‬
‫ﺑﺴﻴﺎﺩﺓ ﻏﲑﻫﺎ ﻣﻦ ﺍﻟﺪﻭﻝ‪ ،‬ﺇﻻ ﰲ ﺃﺣﻮﺍﻝ ﺇﺳﺘﺜﻨﺎﺋﻴﺔﺗﻘﺘﻀﻴﻬﺎ ﲪﺎﻳﺔ ﺍﳌﺼﺎﱀ ﺍﳉﻮﻫﺮﻳﺔ ﻟﻠﺪﻭﻟﺔ ﺃﻭ ﻣﺘﻄﻠﺒﺎﺕ‬
‫ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﺪﻭﱄ ﰲ ﻣﻜﺎﻓﺤﺔ ﺍﻹﺟﺮﺍﻡ)‪.(1‬‬

‫ﻭﺍﻷﺻﻞ ﺃﻥ ﻋﻨﺎﺻﺮ ﺍﻟﺮﻛﻦ ﺍﳌﺎﺩﻱ ﻟﻠﺠﺮﳝﺔ ﺗﻜﺘﻤﻞ ﰲ ﻧﻄﺎﻕ ﺇﻗﻠﻴﻢ ﺩﻭﻟﺔ ﻭﺍﺣﺪﺓ‪ ،‬ﺣﻴﺚ ﻳﻘﻊ‬
‫ﺍﻟﺴﻠﻮﻙ ﺍﻹﺟﺮﺍﻣﻲ ﻭﺗﺘﺮﺗﺐ ﻋﻠﻴﻪ ﺁﺛﺎﺭﻩ ﰲ ﺇﻗﻠﻴﻢ ﺩﻭﻟﺔ ﻭﺍﺣﺪﺓ‪ ،‬ﺑﻴﺪ ﺃﻥ ﺑﻌﺾ ﺍﳉﺮﺍﺋﻢ ﻳﺘﺠﺎﻭﺯ ﻣﺪﺍﻫﺎ‬
‫ﺃﺣﻴﺎﻧﺎ ﺣﺪﻭﺩ ﺍﻟﺪﻭﻟﺔ‪ ،‬ﺣﻴﻨﻤﺎ ﻳﺘﺠﺰﺃ ﺭﻛﻨﻬﺎ ﺍﳌﺎﺩﻱ ﺃﻭ ﻳﺘﻮﺯﻉ ﻋﻠﻰ ﺃﻛﺜﺮ ﻣﻦ ﻣﻜﺎﻥ‪ ،‬ﲝﻴﺚ ﳝﻜﻦ ﻭﻗﻮﻉ‬
‫ﺍﻟﺴﻠﻮﻙ ﰲ ﺇﻗﻠﻴﻢ ﺩﻭﻟﺔ ﺑﻴﻨﻤﺎ ﺗﺘﺤﻘﻖ ﺍﻟﻨﺘﻴﺠﺔ ﻟﻠﺠﺮﳝﺔ ﰲ ﺇﻗﻠﻴﻢ ﺩﻭﻟﺔ ﺃﺧﺮﻯ‪ ،‬ﻭﻳﺘﺠﻠﻰ ﺫﻟﻚ ﰲ ﻋﺪﺩ ﻣﻦ‬
‫ﺍﳉﺮﺍﺋﻢ ﺫﺍﺕ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﻌﺎﺑﺮﺓ ﻟﻠﺤﺪﻭﺩ ﺍﻟﻮﻃﻨﻴﺔ‪.‬‬

‫ﻭﻫﺬﺍ ﻣﺎ ﻳﻘﻮﺩ ﺇﱃ ﺍﻟﺘﺴﺎﺅﻝ ﻋﻦ ﻣﻜﺎﻥ ﻭﻗﻮﻉ ﺍﳉﺮﳝﺔ ﰲ ﻫﺬﻩ ﺍﳊﺎﻟﺔ ﻣﻦ ﺃﺟﻞ ﲢﺪﻳﺪ ﺍﻟﻘﺎﻧﻮﻥ‬
‫ﺍﻟﻮﺍﺟﺐ ﺍﻟﺘﻄﺒﻴﻖ‪ .‬ﻓﻬﻞ ﻫﻮ ﻣﻜﺎﻥ ﺍﻟﺴﻠﻮﻙ ﺍﻹﺟﺮﺍﻣﻲ ﺃﻡ ﺍﳌﻜﺎﻥ ﺍﻟﺬﻱ ﲢﻘﻘﺖ ﻓﻴﻪ ﺍﻟﻨﺘﻴﺠﺔ؟‬

‫ﺇﻧﻘﺴﻢ ﺍﻟﺮﺃﻱ ﲞﺼﻮﺹ ﻫﺬﻩ ﺍﳌﺴﺄﻟﺔ ﺇﱃ ﺛﻼﺙ ﺍﲡﺎﻫﺎﺕ‪ ،‬ﻓﺬﻫﺐ ﺍﻻﲡﺎﻩ ﺍﻷﻭﻝ ﺇﱃ ﺃﻥ ﺍﻟﻌﱪﺓ ﰲ‬
‫ﲢﺪﻳﺪ ﻣﻜﺎﻥ ﻭﻗﻮﻉ ﺍﳉﺮﳝﺔ ﺑﺎﳌﻜﺎﻥ ﺍﻟﺬﻱ ﻭﻗﻊ ﻓﻴﻪ ﺍﻟﺴﻠﻮﻙ ﺍﻹﺟﺮﺍﻣﻲ ﺑﻐﺾ ﺍﻟﻨﻈﺮ ﻋﻦ ﺍﳌﻜﺎﻥ ﺍﻟﺬﻱ‬
‫ﲢﻘﻘﺖ ﻓﻴﻪ ﻧﺘﻴﺠﺘﻪ ﺃﻭ ﻣﻦ ﺍﳌﻔﺘﺮﺽ ﲢﻘﻘﻬﺎ ﻓﻴﻪ‪ (2)،‬ﻭﰲ ﺍﳌﻘﺎﺑﻞ ﺫﻫﺐ ﺍﲡﺎﻩ ﺁﺧﺮ ﺇﱃ ﺃﻥ)‪ (3‬ﻣﻜﺎﻥ ﻭﻗﻮﻉ‬
‫ﺍﳉﺮﳝﺔ ﻳﺘﺤﺪﺩ ﺑﺎﳌﻜﺎﻥ ﺍﻟﺬﻱ ﲢﻘﻘﺖ ﻓﻴﻪ ﺍﻟﻨﺘﻴﺠﺔ ﺃﻭ ﻛﺎﻥ ﻣﻦ ﺍﳌﻔﺘﺮﺽ ﲢﻘﻘﻬﺎ ﻓﻴﻪ‪ ،‬ﻭﺑﲔ ﻫﺬﺍ ﻭﺫﻟﻚ‬
‫ﺍﻧﱪﻯ ﺍﲡﺎﻩ ﺛﺎﻟﺚ ﺇﱃ ﺃﻥ ﺍﻟﻌﱪﺓ ﺗﻜﻮﻥ ﲟﻜﺎﻥ ﺣﺼﻮﻝ ﺃﻱ ﻣﻨﻬﻤﺎ)‪.(4‬‬

‫)‪ (1‬ﻋﺪﻧﺎﻥ ﺍﳋﻄﻴﺐ‪ .‬ﻣﻮﺟﺰ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﺰﺍﺋﻲ‪ .‬ﺍﻟﻜﺘﺎﺏ ﺍﻷﻭﻝ‪ .‬ﺍﳌﺒﺎﺩﺉ ﺍﻟﻌﺎﻣﺔ ﰲ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ‪ .‬ﻣﻄﺒﻌﺔ ﺟﺎﻣﻌﺔ ﺩﻣﺸﻖ‪ ،1963 ،‬ﺹ ‪.79‬‬
‫)‪ (2‬ﺣﻈﻲ ﻫﺬﺍ ﺍﻻﲡﺎﻩ ﺑﺘﺄﻳﻴﺪ ﺟﺎﻧﺐ ﻛﺒﲑ ﻣﻦ ﺍﻟﻔﻘﻪ ﻭﻗﺪ ﺃﺧﺬ ﺑﻪ ﺍﳌﺸﺮﻉ ﺍﻟﻔﺮﻧﺴﻲ ﻭ ﺍﳌﺼﺮﻱ‪.‬‬
‫)‪(3‬ﰎ ﺗﺒﲏ ﻫﺬﺍ ﺍﻻﲡﺎﻩ ﻣﻦ ﻃﺮﻑ ﺍﳌﺸﺮﻉ ﺍﻷﳌﺎﱐ ﺍﻟﺼﺎﺩﺭ ﰲ ‪ ،1975/12/05‬ﻭ ﺍﳌﺸﺮﻉ ﺍﻟﺘﺮﻛﻲ ﰲ ﺳﻨﺔ ‪1982‬‬
‫)‪(4‬ﺃﻗﺮ ﻫﺬﺍ ﺍﻻﲡﺎﻩ‪ ،‬ﺍﳌﺸﺮﻉ ﺍﻟﻨﺮﻭﳚﻲ‪ ،‬ﺍﳌﺸﺮﻋﺎﻹﻳﻄﺎﱄ‪ .‬ﺍﳌﺸﺮﻉ ﺍﻟﺪﺍﳕﺎﺭﻛﻲ‪ ،‬ﻭﳒﺪ ﺃﻥ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻗﺪ ﻧﺺ ﰲ ﺍﳌﺎﺩﺓ ﺍﻟﺜﺎﻧﻴﺔ ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﺃﻧﻪ‬
‫ﻳﻄﺒﻖ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﺍﳉﺰﺍﺋﺮﻱ ﻋﻠﻰ ﻛﺎﻓﺔ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﺗﺮﺗﻜﺐ ﰲ ﺃﺭﺍﺽ ﺍﳉﻤﻬﻮﺭﻳﺔ ﻛﻤﺎ ﻧﺼﺖ ﺍﳌﺎﺩﺓ ‪ 586‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺃﻧﻪ ﺗﻌﺪ‬
‫ﻣﺮﺗﻜﺒﺔ ﰲ ﺍﻹﻗﻠﻴﻢ ﺍﳉﺰﺍﺋﺮﻱ ﻛﻞ ﺟﺮﳝﺔ ﻳﻜﻮﻥ ﻋﻤﻞ ﻣﻦ ﺍﻷﻋﻤﺎﻝ ﺍﳌﻤﻴﺰﺓ ﻷﺣﺪ ﺃﺭﻛﺎ‪‬ﺎ ﳍﺎ ﻗﺪ ﰎ ﰲ ﺍﳉﺰﺍﺋﺮ‪.‬‬

‫‪- 97 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻭ ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﻣﺒﺪﺃ ﺍﻹﻗﻠﻴﻤﻴﺔ ﻓﺈﻥ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﻮﺍﺟﺐ ﺍﻟﺘﻄﺒﻴﻖ ﳝﻜﻦ ﺃﻥ ﻳﺘﺤﺪﺩ ﺃﻳﻀﺎ ﻭﻓﻘﺎ ﳌﻌﺎﻳﲑ‬
‫ﺃﻭ ﻣﺒﺎﺩﺉ ﺃﺧﺮﻯ‪،‬ﻛﻤﺒﺪﺃ ﺍﻟﺸﺨﺼﻴﺔ ﺃﻭﻣﺒﺪﺃ ﺍﻟﻌﻴﻨﻴﺔ ﺃﻭ ﻣﺒﺪﺃ ﺍﻟﻌﺎﳌﻴﺔ ﻭﻏﺎﻟﺒﺎ ﻣﺎ ﺗﺄﺧﺬ ‪‬ﺎ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ‬
‫ﺍﳉﻨﺎﺋﻴﺔ ﻛﻤﺒﺎﺩﺉ ﺍﺣﺘﻴﺎﻃﻴﺔ ﺃﻭ ﻣﻜﻤﻠﺔ ﳌﺒﺪﺃ ﺍﻹﻗﻠﻴﻤﻴﺔ‪.‬‬

‫ﻭﺍﳌﻘﺼﻮﺩ ﲟﺒﺪﺃ ﺍﻟﺸﺨﺼﻴﺔ ﻫﻮ ﺗﻄﺒﻴﻖ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﺰﺍﺋﻲ ﻋﻠﻰ ﻣﺮﺗﻜﺐ ﺍﳉﺮﳝﺔ ﺍﻟﺬﻱ ﳛﻤﻞ ﺟﻨﺴﻴﺔ‬
‫ﺍﻟﺪﻭﻟﺔ ﻭﻟﻮ ﺍﺭﺗﻜﺐ ﺍﳉﺮﳝﺔ ﺧﺎﺭﺝ ﺇﻗﻠﻴﻤﻬﺎ‪ ،‬ﻓﻴﺨﻀﻊ ﺣﺴﺐ ﻫﺬﺍ ﺍﳌﺒﺪﺃ ﺍﳌﻮﺍﻃﻦ ﻟﻘﺎﻧﻮﻥ ﺑﻼﺩﻩ ﺃﻳﻨﻤﺎ‬
‫ﻭﺟﺪ‪ .‬ﻭﺃﻣﺎ ﻣﺒﺪﺃ ﺍﻟﻌﻴﻨﻴﺔ ﻓﻴﻘﺼﺪ ﺑﻪ ﺗﻄﺒﻴﻖ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﺰﺍﺋﻲ ﻋﻠﻰ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﲤﺲ ﺍﳌﺼﺎﱀ ﺍﻷﺳﺎﺳﻴﺔ‬
‫ﻟﻠﺪﻭﻟﺔ ﻭﺍﳌﺮﺗﻜﺒﺔ ﺧﺎﺭﺝ ﺇﻗﻠﻴﻤﻬﺎ ﺃﻳﺎ ﻛﺎﻧﺖ ﺟﻨﺴﻴﺔ ﻣﺮﺗﻜﺒﻬﺎ‪.‬‬

‫ﻭﻣﺒﺪﺃ ﺍﻟﻌﺎﳌﻴﺔ ﻓﻬﻮ ﺃﻥ ﲣﺘﺺ ﺍﻟﺪﻭﻟﺔ ﺑﺘﻄﺒﻴﻖ ﻗﺎﻧﻮ‪‬ﺎ ﺍﳉﺰﺍﺋﻲ ﻋﻠﻰ ﺃﺟﻨﱯ ﺍﺭﺗﻜﺐ ﺟﺮﳝﺔ ﰲ‬
‫ﺍﳋﺎﺭﺝ ﻭﰎ ﺗﻮﻗﻴﻔﻪ ﺃﻭ ﺇﻟﻘﺎﺀ ﺍﻟﻘﺒﺾ ﻋﻠﻴﻪ ﺑﺄﺭﺍﺿﻴﻬﺎ‪.‬‬

‫ﻭﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻗﺪ ﺃﺧﺬ ‪‬ﺬﻩ ﺍﳌﺒﺎﺩﺉ ﺣﻴﻨﻤﺎ ﻧﺼﺖ ﺍﳌﺎﺩﺓ ﺍﻟﺜﺎﻟﺜﺔ ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﻋﻠﻰ‬
‫ﺃﻧﻪ ﻳﻄﺒﻖ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﻋﻠﻰ ﻛﺎﻓﺔ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﺗﺮﺗﻜﺐ ﰲ ﺃﺭﺍﺽ ﺍﳉﻤﻬﻮﺭﻳﺔ ﻭﻫﻮ ﻣﺒﺪﺃ ﺍﻹﻗﻠﻴﻤﻴﺔ‬
‫ﻣﻮﺿﺤﺎ ﻣﻜﺎﻥ ﺍﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﺧﻼﻝ ﻧﺺ ‪ 586‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‪ .‬ﺇﺫ ﺗﻌﺪ ﻣﺮﺗﻜﺒﺔ ﰲ‬
‫ﺍﻹﻗﻠﻴﻢ ﺍﳉﺰﺍﺋﺮﻱ ﻛﻞ ﺟﺮﳝﺔ ﻳﻜﻮﻥ ﻋﻤﻞ ﻣﻦ ﺍﻷﻋﻤﺎﻝ ﺍﳌﻤﻴﺰﺓ ﻷﺣﺪ ﺃﺭﻛﺎ‪‬ﺎ ﺍﳌﻜﻮﻧﺔ ﳍﺎ ﻗﺪ ﰎ ﰲ‬
‫ﺍﳉﺰﺍﺋﺮ‪.‬‬

‫ﻛﻤﺎ ﺃﺧﺬ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﲟﺒﺪﺃ ﺍﻟﻌﻴﻨﻴﺔ ﰲ ﻧﺺ ﺍﳌﺎﺩﺓ ‪ 588‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‬
‫ﻭﺍﻟﱵ ﺗﻨﺺ ﻋﻠﻰ ﺃﻥ ﻛﻞ ﺃﺟﻨﱯ ﺍﺭﺗﻜﺐ ﺧﺎﺭﺝ ﺍﻹﻗﻠﻴﻢ ﺍﳉﺰﺍﺋﺮﻱ ﺑﺼﻔﺘﻪ ﻓﺎﻋﻞ ﺃﺻﻠﻲ ﺃﻭ ﺷﺮﻳﻚ‬
‫ﺟﻨﺎﻳﺔ ﺃﻭ ﺟﻨﺤﺔ ﺿﺪ ﺳﻼﻣﺔ ﺍﻟﺪﻭﻟﺔ ﺍﳉﺰﺍﺋﺮﻳﺔ‪ ...‬ﲡﻮﺯ ﻣﺘﺎﺑﻌﺘﻪ ﻭﳏﺎﻛﻤﺘﻪ ﻭﻓﻘﺎ ﻟﻠﻘﺎﻧﻮﻥ ﺍﳉﺰﺍﺋﺮﻱ ﺇﺫﺍ‬
‫ﺃﻟﻘﻲ ﻋﻠﻴﻪ ﺍﻟﻘﺒﺾ ﰲ ﺍﳉﺰﺍﺋﺮ ﺃﻭ ﺣﺼﻠﺖ ﺍﻟﺪﻭﻟﺔ ﻋﻠﻰ ﺗﺴﻠﻴﻤﻪ ﳍﺎ‪.‬‬

‫ﻭﺃﺧﺬ ﺍﳌﺸﺮﻉ ﺃﻳﻀﺎ ﲟﺒﺪﺃ ﺍﻟﺸﺨﺼﻴﺔ ﻣﻦ ﺧﻼﻝ ﻧﺺ ﺍﳌﺎﺩﺓ ‪ 582‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‬
‫ﺍﻟﱵ ﻧﺼﺖ ﻋﻠﻰ ﺃﻥ ﻛﻞ ﻭﺍﻗﻌﺔ ﻣﻮﺻﻮﻓﺔ ﺑﺄ‪‬ﺎ ﺟﻨﺎﻳﺔ ﻣﻌﺎﻗﺐ ﻋﻠﻴﻬﺎ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﺰﺍﺋﺮﻱ ﺍﺭﺗﻜﺒﻬﺎ‬
‫ﺟﺰﺍﺋﺮﻱ ﺧﺎﺭﺝ ﺇﻗﻠﻴﻢ ﺍﳉﻤﻬﻮﺭﻳﺔ ﳚﻮﺯ ﺃﻥ ﻳﺘﺎﺑﻊ ﻭﳛﺎﻛﻢ ﰲ ﺍﳉﺰﺍﺋﺮ‪.‬‬

‫‪- 98 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺃﻣﺎ ﻣﺒﺪﺃ ﺍﻟﻌﺎﳌﻴﺔ ﻓﺈﻥ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻗﺪ ﺍﺗﺒﻊ ﺧﻄﺔ ﻣﻌﻈﻢ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻟﻌﻘﺎﺑﻴﺔ ﻭﱂ ﻳﺄﺧﺬ ﺑﻪ‬
‫ﻣﻘﺘﺼﺮﺍ ﻋﻠﻰ ﺍﳌﺒﺎﺩﺉ ﺍﻟﺴﺎﻟﻔﺔ ﺍﻟﺬﻛﺮ)‪.(1‬‬

‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺃﺛﺮ ﺧﺼﻮﺻﻴﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﻣﺴﺄﻟﺔ ﺍﻹﺧﺘﺼﺎﺹ ﺍﻟﻘﻀﺎﺋﻲ‪:‬‬

‫ﺇﻥ ﻣﺎ ﺗﺘﻤﻴﺰ ﺑﻪ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﻃﺎﺑﻌﻬﺎ ﺍﳌﺘﺨﻄﻲ ﳊﺪﻭﺩ ﺍﻟﺪﻭﻟﺔ ﺍﻟﻮﺍﺣﺪﺓ ﻭﺍﺗﺴﺎﻣﻬﺎ ﺑﺎﻟﺒﻌﺪ‬
‫ﺍﻟﺪﻭﱄ ﻭﻛﺬﺍ ﻳﺘﺠﺮﺩ ﺍﻟﺴﻠﻮﻙ ﺍﻹﺟﺮﺍﻣﻲ ﻓﻴﻬﺎ ﻣﻦ ﻧﺎﺣﻴﺔ ﺧﺎﺻﻴﺘﻪ ﺍﳌﺎﺩﻳﺔ ﻛﺎﻥ ﻟﻪ ﺍﻷﺛﺮ ﺍﻟﻈﺎﻫﺮ ﰲ ﻭﺟﻮﺩ‬
‫ﺻﻌﻮﺑﺔ ﻋﻨﺪ ﲢﺪﻳﺪ ﺍﻻﺧﺘﺼﺎﺹ‪ ،‬ﺑﻞ ﻓﺮﺽ ﻏﻤﻮﺿﺎ ﰲ ﲢﺪﻳﺪ ﻣﻌﻴﺎﺭﻩ‪.‬‬

‫ﻓﻘﺪ ﳛﺪﺙ ﺃﻥ ﺗﺮﺗﻜﺐ ﺟﺮﳝﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺇﻗﻠﻴﻢ ﺩﻭﻟﺔ ﻣﻌﻴﻨﺔ ﻣﻦ ﻃﺮﻑ ﺃﺟﻨﱯ‪،‬‬
‫ﻓﺘﻜﻮﻥ ﺍﳉﺮﳝﺔ ﻫﻨﺎ ﺧﺎﺿﻌﺔ ﻟﻺﺧﺘﺼﺎﺹ ﺍﳉﻨﺎﺋﻲ ﻟﻠﺪﻭﻟﺔ ﺍﻟﱵ ﺍﺭﺗﻜﺒﺖ ﺍﳉﺮﳝﺔ ﰲ ﺇﻗﻠﻴﻤﻬﺎ ﺍﺳﺘﻨﺎﺩﺍ ﺇﱃ‬
‫ﻣﺒﺪﺃ ﺍﻹﻗﻠﻴﻤﻴﺔ‪ ،‬ﻭﻛﺬﺍ ﻻﺧﺘﺼﺎﺹ ﺍﻟﺪﻭﻟﺔ ﺍﻟﱵ ﻳﻨﺘﻤﻲ ﺇﻟﻴﻬﺎ ﺍﳉﻨﺎﺋﻲ ﺍﻧﻄﻼﻗﺎ ﻣﻦ ﻣﺒﺪﺃ ﺍﻟﺸﺨﺼﻴﺔ‪ ،‬ﻭﻗﺪ‬
‫ﺗ‪‬ﻠﺤﻖ ﻫﺬﻩ ﺍﳉﺮﳝﺔ ‪‬ﺪﻳﺪﺍ ﻷﻣﻦ ﻭﺳﻼﻣﺔ ﺩﻭﻟﺔ ﺃﺧﺮﻯ‪ ،‬ﻓﺘﺪﺧﻞ ﺃﻳﻀﺎ ﰲ ﺍﺧﺘﺼﺎﺻﻬﺎ ﺍﺳﺘﻨﺎﺩﺍ ﺇﱃ ﻣﺒﺪﺃ‬
‫ﺍﻟﻌﻴﻨﻴﺔ‪ ،‬ﻭﻫﻮ ﺍﻷﻣﺮ ﺍﻟﺬﻱ ﻗﺪ ﻳﺘﺮﺗﺐ ﻋﻠﻴﻪ ﺗﻨﺎﺯﻉ ﰲ ﺍﻻﺧﺘﺼﺎﺹ ﺑﲔ ﻫﺬﻩ ﺍﻟﺪﻭﻝ)‪.(2‬‬

‫ﻟﻠﺘﻐﻠﺐ ﻋﻠﻰ ﺍﻟﺘﻨﺎﺯﻉ ﺍﻹﳚﺎﰊ ﻟﻼﺧﺘﺼﺎﺻﺬﻫﺐ ﺍﻟﻔﻘﻪ ﺍﳉﻨﺎﺋﻲ ﺇﱃ ﺇﳚﺎﺩ ﺣﻞ ﻳﺘﻤﺜﻞ ﰲ ﳏﺎﻭﻟﺔ‬
‫ﺇﻋﻄﺎﺀ ﺍﻷﻭﻟﻮﻳﺔ ﻷﻱ ﻣﻦ ﺍﻟﺪﻭﻝ ﺍﳌﺘﻨﺎﺯﻋﺔ ﻭﻓﻘﺎ ﻷﺣﺪ ﻣﻌﺎﻳﲑ ﺍﻹﺧﺘﺼﺎﺹ ﺍﻟﺬﻱ ﻳﻜﻮﻥ ﺍﻷﻛﺜﺮ ﺟﺪﻭﻯ‬
‫ﻭﻓﻌﺎﻟﻴﺔ ﻟﻀﻤﺎﻥ ﺳﺮﻋﺔ ﻣﻼﺣﻘﺔ ﺍﳉﺮﳝﺔ‪ ،‬ﻭﻗﺪ ﻳﻜﻮﻥ ﻣﺒﺪﺃ ﺍﻹﻗﻠﻴﻤﻴﺔ ﺍﻷﻛﺜﺮ ﻗﺒﻮﻻ‪ ،‬ﻭﺫﻟﻚ ﺃﻥ ﺍﻟﺪﻭﻟﺔ ﺍﻟﱵ‬
‫ﺗﻘﻊ ﰲ ﺇﻗﻠﻴﻤﻬﺎ ﺍﳉﺮﳝﺔ ﻛﻠﻬﺎ ﺃﻭ ﺍﳉﺰﺀ ﺍﻷﻛﱪ ﻣﻦ ﺍﻟﻨﺸﺎﻁ ﺍﳌﻜﻮﻥ ﻟﺮﻛﻨﻬﺎ ﺍﳌﺎﺩﻱ ﻫﻲ ﺃﺭﺟﺢ ﺍﻟﺪﻭﻝ‬
‫ﺍﺧﺘﺼﺎﺻﺎ ﲟﻼﺣﻘﺔ ﺍﳉﺮﳝﺔ ﻭﳏﺎﻛﻤﺔ ﻓﺎﻋﻠﻬﺎ‪.‬ﻭﻻ ﳚﺪ ﻫﺬﺍ ﺍﳊﻞ ﻣﱪﺭﺍ ﰲ ﺍﻋﺘﺒﺎﺭﺍﺕ ﺍﻟﺴﻴﺎﺩﺓ ﺍﻟﻮﻃﻨﻴﺔ‬
‫ﺍﻟﻠﺼﻴﻘﺔ ﲟﺒﺪﺃ ﺍﻹﻗﻠﻴﻤﻴﺔ ﻭﺇﳕﺎ ﳚﺪ ﻣﱪﺭﻩ ﰲ ﺟﺪﻭﺍﻩ ﺍﻟﻌﻤﻠﻴﺔ‪ ،‬ﻭﺃﻧﻪ ﺣﻴﺚ ﺗﻘﻊ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﺼﺒﺢ‬
‫ﺃﺩﻟﺔ ﺍﻹﺛﺒﺎﺕ ﻣﺘﻮﺍﻓﺮﺓ ﻭﻳﻐﺪﻭ ﻣﻦ ﺍﻟﻴﺴﲑ ﺇﺟﺮﺍﺀ ﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﺍﻟﻜﻔﻴﻠﺔ ﻹﻇﻬﺎﺭ ﺍﳊﻘﻴﻘﺔ‪.‬‬

‫)‪ (1‬ﻋﻠﻲ ﻋﺒﺪ ﺍﷲ ﺳﻠﻴﻤﺎﻥ‪ .‬ﺷﺮﺡ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﺍﳉﺰﺍﺋﺮﻱ‪ -‬ﺩﻳﻮﺍﻥ ﺍﳌﻄﺒﻮﻋﺎﺕ ﺍﳉﺎﻣﻌﻴﺔ ‪.‬ﺹ ‪.115‬‬
‫)‪ (2‬ﲨﻴﻞ ﻋﺒﺪ ﺍﻟﺒﺎﻗﻲ ﺍﻟﺼﻐﲑ‪ ،‬ﺍﳉﻮﺍﻧﺐ ﺍﻹﺟﺮﺍﺋﻴﺔ ﻟﻠﺠﺮﺍﺋﻢ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﻷﻧﺘﺮﻧﺖ‪ .‬ﺩﺍﺭ ﺍﻟﻔﻜﺮ ﺍﻟﻌﺮﰊ‪.‬ﺍﻟﻘﺎﻫﺮﺓ ‪ ،2001‬ﺹ ‪.73‬‬

‫‪- 99 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻭﻟﻘﺪ ﺷﻬﺪ ﻣﻔﻬﻮﻡ ﺍﻹﻗﻠﻴﻤﻴﺔ ﺗﻄﻮﺭﺍ ﻣﻠﺤﻮﻇﺎ ﻓﻴﻤﺎ ﻳﺘﻌﻠﻖ ﺑﺘﺤﺪﻳﺪ ﻣﻜﺎﻥ ﻭﻗﻮﻉ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﻓﻠﻢ ﻳﻌﺪ ﻳﻼﺯﻡ ﻭﻗﻮﻉ ﻓﻌﻞ ﻣﺎﺩﻱ ﺃﻭ ﺣﱴ ﺃﺣﺪ ﺍﻟﻌﻨﺎﺻﺮ ﺍﳌﻜﻮﻧﺔ ﳍﺬﺍ ﺍﻟﻔﻌﻞ‪ ،‬ﺑﻞ ﺑﻠﻎ ﺍﻷﻣﺮ ﺣﺪ ﻧﺰﻉ‬
‫ﺍﻟﺼﻔﺔ ﺍﳌﺎﺩﻳﺔ ﻛﻠﻴﺔ ﻋﻦ ﻫﺬﺍ ﺍﻟﻔﻌﻞ)‪.(1‬‬

‫ﻭﺗﻄﺒﻴﻘﺎ ﻟﺬﻟﻚ ﻓﻘﺪ ﺫﻫﺐ ﺍﻟﻘﻀﺎﺀ ﺍﻟﻔﺮﻧﺴﻲ ﺇﱃ ﺍﻟﻘﻮﻝ ﺑﺘﻄﺒﻴﻖ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﻔﺮﻧﺴﻲ ﻭﺑﺎﻟﺘﺎﱄ‬
‫ﺍﺧﺘﺼﺎﺹ ﺍﶈﺎﻛﻢ ﺍﻟﻔﺮﻧﺴﻴﺔ ﺇﺫﺍ ﻛﺎﻥ ﻣﺮﻛﺰ ﺍﻟﺒﺚ ﺃﻭ ﺍﳉﻬﺎﺯ ﺍﳋﺎﺩﻡ ﻣﻮﺟﻮﺩﺍ ﺧﺎﺭﺝ ﺍﻹﻗﻠﻴﻢ ﺍﻟﻔﺮﻧﺴﻲ‬
‫ﺑﻴﻨﻤﺎ ﺗﻈﻬﺮ ﺍﻟﺮﺳﺎﺋﻞ ﺍﻟﱵ ﻳﻘﻮﻡ ﺑﺒﺜﻬﺎ ﻫﺬﺍ ﺍﳉﻬﺎﺯ ﰲ ﻓﺮﻧﺴﺎ‪ ،‬ﻭﺍﻋﺘﱪ ﺃﻥ ﺍﳉﺮﳝﺔ ﻣﺮﺗﻜﺒﺔ ﰲ ﻛﻞ ﻣﻜﺎﻥ‬
‫ﺗﻈﻬﺮ ﻓﻴﻪ ﻫﺬﻩ ﺍﻟﺮﺳﺎﺋﻞ ﺍﳌﺆﲦﺔ ﳏﻞ ﺍﻟﺒﺚ)‪ .(2‬ﻭﻭﻓﻘﺎ ﳍﺬﺍ ﺍﻹﲡﺎﻩ ﺍﳌﻮﺳﻊ ﳌﻔﻬﻮﻡ ﻣﺒﺪﺃ ﺍﻹﻗﻠﻴﻤﻴﺔ ﻓﺈﻥ‬
‫ﻫﻨﺎﻙ ﻣﻦ ﺍﻋﺘﱪ ﺃﻥ ﺍﻻﺧﺘﺼﺎﺹ ﺍﻟﻘﻀﺎﺋﻲ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻳﺆﻭﻝ ﻟﻠﺪﻭﻟﺔ ﺍﻟﱵ ﻳﻮﺟﺪ ﺑﲔ ﺇﻗﻠﻴﻤﻬﺎ‬
‫ﻭﺍﳉﺮﳝﺔ ﻋﻼﻗﺔ ﻓﻌﻠﻴﺔ ﻭﺟﻮﻫﺮﻳﺔ)‪.(3‬‬

‫ﻭﻣﻦ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﳌﻘﺎﺭﻧﺔ ﺍﻟﱵ ﺗﺘﺠﻪ ﺇﱃ ﺍﻟﺘﻮﺳﻊ ﰲ ﻣﻔﻬﻮﻡ ﺍﻹﻗﻠﻴﻤﻴﺔ ﺍﻟﺘﺸﺮﻳﻊ ﺍﻷﻣﺮﻳﻜﻲ ﺍﻟﺬﻱ‬
‫ﻳﻌﻄﻲ ﺍﻹﺧﺘﺼﺎﺹ ﶈﺎﻛﻤﻪ ﺍﳉﻨﺎﺋﻴﺔ ﲟﺠﺮﺩ ﺣﺪﻭﺙ ﺁﺛﺎﺭ ﺍﳉﺮﳝﺔ ﻋﻠﻰ ﺇﻗﻠﻴﻤﻬﺎ‪ .‬ﻓﻘﺪ ﻗﻀﻲ ﰲ ﺃﻣﺮﻳﻜﺎ‬
‫ﺑﺄﻧﻪ ﺇﺫﺍ ﰎ ﺇﺩﺧﺎﻝ ﺑﻴﺎﻧﺎﺕ ﻣﻦ ﻣﻜﺎﻥ ﻣﻌﲔ ﻭﻛﺎﻧﺖ ﺗﺘﻀﻤﻦ ﻣﺎ ﻳﺸﻜﻞ ﺟﺮﳝﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﻛﺎﻧﺖ ﻫﺬﻩ‬
‫ﺍﻟﺒﻴﺎﻧﺎﺕ ﻣﻘﺮﻭﺀﺓ ﰲ ﻣﻜﺎﻥ ﺁﺧﺮ‪) ،‬ﺩﻭﻟﺔ ﺃﺧﺮﻯ( ﻓﺈﻥ ﺍﻹﺧﺘﺼﺎﺹ ﻳﻨﻌﻘﺪ ﶈﺎﻛﻢ ﺍﻟﺪﻭﻟﺔ ﺍﻟﱵ ﳝﻜﻦ‬
‫ﺍﻹﻃﻼﻉ ﻋﻠﻰ ﺗﻠﻚ ﺍﻟﺒﻴﺎﻧﺎﺕ ﰲ ﺇﻗﻠﻴﻤﻬﺎ‪ ،‬ﻓﺈﺫﺍ ﻛﺎﻥ ﺍﳉﺎﱐ ﻗﺪ ﻭﺿﻊ ﺻﻮﺭﺍ ﻣﺆﲦﺔ ﻋﻠﻰ ﺟﻬﺎﺯ ﺍﳋﺎﺩﻡ‬
‫ﺍﳌﺘﻮﺍﺟﺪ ﰲ ﺇﻳﻄﺎﻟﻴﺎ ﻭﻛﺎﻧﺖ ﻫﺬﻩ ﺍﻟﺼﻮﺭ ﻣﺘﺎﺡ ﺍﻹﻃﻼﻉ ﻋﻠﻴﻬﺎ ﰲ ﺍﻟﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ ﺍﻷﻣﺮﻳﻜﻴﺔ ﻓﺈﻥ‬
‫ﺍﻟﻘﻀﺎﺀ ﺍﻷﻣﺮﻳﻜﻲ ﳛﻜﻢ ﺇﺧﺘﺼﺎﺻﻪ‪.‬‬

‫ﻭﻋﻠﻰ ﺍﻟﺮﻏﻢ ﻣﻦ ﺍﺧﺘﻼﻑ ﺍﻟﻘﻮﺍﻧﲔ ﺍﳌﻘﺎﺭﻧﺔ ﰲ ﲢﺪﻳﺪ ﺍﶈﻜﻤﺔ ﺍﳌﺨﺘﺼﺔ ﻋﻨﺪﻣﺎ ﲤﺮ ﺍﻟﺮﺳﺎﻟﺔ‬
‫ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺍﳌﻌﺎﻗﺐ ﻋﻠﻴﻬﺎ ﰲ ﺇﻗﻠﻴﻢ ﺃﻛﺜﺮ ﻣﻦ ﺩﻭﻟﺔ‪ ،‬ﻭﻛﺎﻥ ﺍﻟﻘﺎﻧﻮﻥ ﻳﻌﺎﻗﺐ ﻋﻠﻴﻬﺎ ﰲ ﲨﻴﻊ ﺗﻠﻚ‬
‫ﺍﻟﺪﻭﻝ‪ ،‬ﻓﺈﻥ ﺍﳊﻞ ﺍﻷﻧﺴﺐ ﻋﻨﺪ ﺑﻌﺾ ﺍﻟﻔﻘﻪ ﺍﳉﻨﺎﺋﻲ)‪ (4‬ﻫﻮ ﺃﻥ ﻳﺆﻭﻝ ﺍﻹﺧﺘﺼﺎﺹ ﳉﻤﻴﻊ ﻫﺬﻩ ﺍﻟﺪﻭﻝ‪،‬‬
‫ﻭﺫﻟﻚ ﻣﺎ ﺩﺍﻣﺖ ﺍﻟﻨﺘﻴﺠﺔ ﺗﺘﺤﻘﻖ ﰲ ﺑﻠﺪ ﺁﺧﺮ ﻏﲑ ﺑﻠﺪ ﲢﻤﻴﻞ ﺍﻟﺮﺳﺎﻟﺔ ﻭﺇﺩﺧﺎﳍﺎ ﻋﻠﻰ ﺍﻟﺸﺒﻜﺔ‬

‫)‪ (1‬ﻣﻔﺘﺎﺡ ﺑﻮﺑﻜﺮ ﺍﳌﻄﺮﺩﻱ‪ .‬ﻭﺭﻗﺔ ﻣﻘﺪﻣﺔ ﺇﱃ ﺍﳌﺆﲤﺮ ﺍﻟﺜﺎﻟﺚ ﻟﺮﺅﺳﺎﺀ ﺍﶈﺎﻛﻢ ﺍﻟﻌﻠﻴﺎ ﰲ ﺍﻟﺪﻭﻝ ﺍﻟﻌﺮﺑﻴﺔ ﲜﻤﻬﻮﺭﻳﺔ ﺍﻟﺴﻮﺩﺍﻥ ﰲ ‪-23‬‬
‫‪.2012/09/25‬ﺑﺪﻭﻥ ﺗﺮﻗﻴﻢ‪.‬‬
‫‪2‬‬
‫‪TGI paris 13. Nov.1998- lionelthoumyve. Hébergement à l’étranger voie sans ssue.op.cit.p2.‬‬
‫)‪ (3‬ﺍﻟﻘﻀﺎﺀ ﺍﻟﻜﻨﺪﻱ‪Affaire libman contre la reine:‬‬
‫)‪(4‬ﺷﻴﻤﺎﺀ ﻋﺒﺪ ﺍﻟﻐﲏ ﳏﻤﺪ ﻋﻄﺎ ﺍﷲ ‪ .‬ﺍﳊﻤﺎﻳﺔ ﺍﳉﻨﺎﺋﻴﺔ ﻟﻠﺘﻌﻠﻤﻼﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ‪ .‬ﺩﺍﺭ ﺍﳉﺎﻣﻌﺔ ﺍﳉﺪﻳﺪﺓ‪ .‬ﻣﺼﺮ ‪ ،2007‬ﺹ ‪.376‬‬

‫‪- 100 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻣﻦ ﺫﻟﻚ ﺃﻥ ﻳﺮﺳﻞ ﺍﳌﺘﻬﻢ ﺑﺮﻧﺎﳎﺎ ﻣﻦ ﺑﺮﺍﻣﺞ ﺍﻟﻔﲑﻭﺳﺎﺕ ﻣﻦ ﺟﻬﺎﺯ ﻳﻘﻊ ﰲ ﺩﻭﻟﺔ ﻣﻌﻴﻨﺔ ﺇﱃ‬
‫ﺟﻬﺎﺯ ﺁﺧﺮ ﻳﻘﻊ ﰲ ﺩﻭﻟﺔ ﺛﺎﻧﻴﺔ ﻣﺮﻭﺭﺍ ﲜﻬﺎﺯ ﺛﺎﻟﺚ ﻭﺭﺍﺑﻊ ﰲ ﺩﻭﻝ ﺃﺧﺮﻯ ﻭﺑﺎﻟﺘﺎﱄ ﲣﺘﺺ ﳏﺎﻛﻢ ﺍﻟﺪﻭﻟﺔ‬
‫ﺍﻟﱵ ﺣﺪﺙ ﻣﻨﻬﺎ ﺍﻟﺒﺚ ﻭﺍﻟﺪﻭﻟﺔ ﺍﻟﱵ ﺍﻧﺘﻬﻰ ﺇﻟﻴﻬﺎ ﺍﻟﻔﲑﻭﺱ ﻭﺍﻟﺪﻭﻝ ﺍﻟﱵ ﻣﺮ ‪‬ﺎ ﻫﺬﺍ ﺍﻟﻔﲑﻭﺱ ﲜﻬﺎﺯ ﻓﻴﻬﺎ‪.‬‬

‫ﻭﺣﱴ ﻻ ﻳ‪‬ﺘﺮﻙ ﺃﻣﺮ ﻣﺴﺄﻟﺔ ﺍﻹﺧﺘﺼﺎﺹ ﶈﺾ ﺍﺟﺘﻬﺎﺩﺍﺕ ﺍﻟﻔﻘﻪ ﻭﺍﻟﻘﻀﺎﺀ ﻛﺎﻥ ﻣﻦ ﺍﻟﻼﺯﻡ ﲢﺪﻳﺪ‬
‫ﺍﳌﻮﻗﻒ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﺪﻭﱄ ﻣﻨﻬﺎ ﻣﻦ ﺧﻼﻝ ﺍﻹﺗﻔﺎﻗﻴﺎﺕ ﺍﻟﺪﻭﻟﻴﺔ ﻭﺍﻹﻗﻠﻴﻤﻴﺔ‪ .‬ﻓﻔﻲ ﻫﺬﺍ ﺍﻹﻃﺎﺭ ﳝﻜﻦ‬
‫ﺍﺳﺘﺨﺪﺍﻡ ﺇﺗﻔﺎﻗﻴﺔ ﺍﻷﻣﻢ ﺍﳌﺘﺤﺪﺓ ﳌﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻨﻈﻤﺔ ﺍﻟﻌﺎﺑﺮﺓ ﻟﻠﻮﻃﻨﻴﺔ ﻟﺘﻜﻮﻥ ﺃﺳﺎﺳﺎ ﻻﲣﺎﺫ ﺍﻟﺘﺪﺑﲑ‬
‫ﺍﻟﻼﺯﻣﺔ ﻟﻠﺤﺼﻮﻝ ﻋﻠﻰ ﺍﻟﻮﻻﻳﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻋﻠﻰ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻓﻘﺪ ﺣﺪﺩﺕ ﺍﳌﺎﺩﺓ ‪ 15‬ﻣﻦ ﻫﺬﻩ‬
‫ﺍﻹﺗﻔﺎﻗﻴﺔ ﺍﳌﻌﺎﻳﲑ ﺍﻟﱵ ﲟﻮﺟﺒﻬﺎ ﳝﻜﻦ ﻟﻸﻃﺮﺍﻑ ﺍﳌﺘﻌﺎﻗﺪﺓ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﻮﻻﻳﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻋﻠﻰ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﻟﱵ ﺗﺸﻤﻠﻬﺎ ﺃﺣﻜﺎﻡ ﻫﺬﻩ ﺍﻹﺗﻔﺎﻗﻴﺔ‪ .‬ﻭﻣﻦ ﺫﻟﻚ ﻧﺼﺖ ﻫﺬﻩ ﺍﳌﺎﺩﺓ ﻋﻠﻰ ﺃﻧﻪ ﻳﺘﻌﲔ ﻋﻠﻰ ﻛﻞ ﺩﻭﻟﺔ ﻃﺮﻑ‬
‫ﺃﻥ ﺗﻌﺘﻤﺪ ﻣﺎ ﻗﺪ ﻳﻠﺰﻡ ﻣﻦ ﺗﺪﺍﺑﲑ ﻟﺘﺄﻛﻴﺪ ﺳﺮﻳﺎﻥ ﻭﻻﻳﺘﻬﺎ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻋﻠﻰ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻘﺮﺭﺓ ﰲ ﺍﳊﺎﻻﺕ‬
‫ﺍﻵﺗﻴﺔ‪:‬‬

‫‪ -‬ﻋﻨﺪﻣﺎ ﻳﺮﺗﻜﺐ ﺍﳉﺮﻡ ﰲ ﺇﻗﻠﻴﻢ ﺗﻠﻚ ﺍﻟﺪﻭﻟﺔ‪.‬‬


‫‪ -‬ﻋﻨﺪﻣﺎ ﻳﺮﺗﻜﺐ ﺍﳉﺮﻡ ﺿﺪ ﺃﺣﺪ ﻣﻮﺍﻃﲏ ﺗﻠﻚ ﺍﻟﺪﻭﻟﺔ‪.‬‬
‫‪ -‬ﻋﻨﺪﻣﺎ ﻳﺮﺗﻜﺐ ﺍﳉﺮﻡ ﺃﺣﺪ ﻣﻮﺍﻃﲏ ﺗﻠﻚ ﺍﻟﺪﻭﻟﺔ ﺃﻭ ﺷﺨﺺ ﻋﺪﱘ ﺍﳉﻨﺴﻴﺔ ﻣﻜﺎﻥ ﺇﻗﺎﻣﺘﻪ ﺍﳌﻌﺘﺎﺩ‬
‫ﰲ ﺇﻗﻠﻴﻤﻬﺎ‪.‬‬

‫ﻛﻤﺎ ﻧﺼﺖ ﺃﻳﻀﺎ ﺃﻧﻪ ﺇﺫﺍ ﺃﺑﻠﻐﺖ ﺍﻟﺪﻭﻟﺔ ﺍﻟﱵ ﲤﺎﺭﺱ ﻭﻻﻳﺘﻬﺎ ﺍﻟﻘﻀﺎﺋﻴﺔ ﲟﻘﺘﻀﻰ ﺍﳌﻌﺎﻳﲑ ﺍﻟﺴﺎﺑﻘﺔ ﺃﻭ‬
‫ﻋﻠﻤﺖ ﺑﻄﺮﻳﻘﺔ ﺃﺧﺮﻯ ﺃﻥ ﺩﻭﻟﺔ ﻭﺍﺣﺪﺓ ﺃﻭ ﺃﻛﺜﺮ ﲡﺮﻱ ﲢﻘﻴﻘﺎ ﺃﻭ ﺗﻘﻮﻡ ﲟﻼﺣﻘﺔ ﻗﻀﺎﺋﻴﺔ ﺑﺸﺄﻥ ﺍﻟﺴﻠﻮﻙ‬
‫ﺫﺍﺗﻪ ﻓﻌﻠﻰ ﺍﻟﺴﻠﻄﺎﺕ ﺍﳌﺨﺘﺼﺔ ﰲ ﻫﺬﻩ ﺍﻟﺪﻭﻝ ﺃﻥ ﺗﺘﺸﺎﻭﺭ ﰲ ﻣﺎ ﺑﻴﻨﻬﺎ ﳍﺪﻑ ﺗﻨﺴﻴﻖ ﻣﺎ ﺗﺘﺨﺬﻩ ﻣﻦ‬
‫ﺗﺪﺍﺑﲑ‪.‬‬

‫ﻭﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻷﺭﻭﰊ ﻓﺜﻤﺔ ﺇﺗﻔﺎﻗﻴﺔ ﳎﻠﺲ ﺃﻭﺭﻭﺑﺎ ﳌﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﱵ ﺃﻭﺭﺩﺕ ﰲ‬
‫ﺍﳌﺎﺩﺓ ‪ 22‬ﻣﻦ ﺍﻟﺒﺎﺏ ﺍﻟﺜﺎﻟﺚ ﻣﻦ ﻫﺬﻩ ﺍﻻﺗﻔﺎﻗﻴﺔ ﻣﺴﺄﻟﺔ ﺍﻹﺧﺘﺼﺎﺹ ﺑﻨﺼﻬﺎ ﻋﻠﻰ ﺃﻧﻪ ﻳﻌﺘﻤﺪ ﻛﻞ ﻃﺮﻑ‬
‫ﻣﺎ ﻗﺪ ﻳﻠﺰﻡ ﻣﻦ ﺗﺪﺍﺑﲑ ﺗﺸﺮﻳﻌﻴﺔ‪ ،‬ﻭﺫﻟﻚ ﻹﻗﺮﺍﺭ ﺍﻹﺧﺘﺼﺎﺹ ﺑﺸﺄﻥ ﺃﻱ ﺟﺮﳝﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺫﻟﻚ ﻋﻨﺪﻣﺎ‬
‫ﺗﺮﺗﻜﺐ ﺍﳉﺮﳝﺔ‪:‬‬

‫‪- 101 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫‪ -‬ﰲ ﺇﻗﻠﻴﻤﻪ‪.‬‬
‫‪ -‬ﻣﻦ ﺟﺎﻧﺐ ﺃﺣﺪ ﻣﻮﺍﻃﻨﻴﻪ ﺇﺫﺍ ﻛﺎﻧﺖ ﺍﳉﺮﳝﺔ ﻣﻌﺎﻗﺒﺎ ﻋﻠﻴﻬﺎ ﲟﻮﺟﺐ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﻨﺎﺋﻲ ﲟﻜﺎﻥ‬
‫ﺍﺭﺗﻜﺎ‪‬ﺎ ﺃﻭ ﰲ ﺣﺎﻟﺔ ﺍﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﺧﺎﺭﺝ ﺍﻹﺧﺘﺼﺎﺹ ﺍﻟﻘﻀﺎﺋﻲ ﺍﻹﻗﻠﻴﻤﻲ ﻷﻱ ﺩﻭﻟﺔ‪.‬‬

‫ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺃﻥ ﻫﺬﻩ ﺍﻹﺗﻔﺎﻗﻴﺔ ﻻ ﺗﺴﺘﺒﻌﺪ ﺃﻱ ﺍﺧﺘﺼﺎﺹ ﺟﻨﺎﺋﻲ ﳝﺎﺭﺳﻪ ﺃﺣﺪ ﺍﻷﻃﺮﺍﻑ ﻭﻓﻘﺎ ﻟﻘﺎﻧﻮﻧﻪ‬
‫ﺍﻟﻮﻃﲏ‪ ،‬ﻭﰲ ﺣﺎﻟﺔ ﻣﻄﺎﻟﺒﺔ ﺃﻛﺜﺮ ﻣﻦ ﻃﺮﻑ ﻣﻦ ﺍﻷﻃﺮﺍﻑ ﺑﺎﻹﺧﺘﺼﺎﺹ ﺍﻟﻘﻀﺎﺋﻲ ﺑﺸﺄﻥ ﺃﻱ ﺟﺮﳝﺔ‬
‫ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﻘﺮﺭﻫﺎ ﻫﺬﻩ ﺍﻻﺗﻔﺎﻗﻴﺔ‪ ،‬ﻳﻘﻮﻡ ﺍﻷﻃﺮﺍﻑ ﻣﱴ ﻛﺎﻥ ﺫﻟﻚ ﻣﻼﺋﻤﺎ ﺑﺎﻟﺘﺸﺎﻭﺭ ﻟﻐﺮﺽ ﲢﺪﻳﺪ‬
‫ﺍﻹﺧﺘﺼﺎﺹ ﺍﻟﻘﻀﺎﺋﻲ ﺍﻷﻛﺜﺮ ﻣﻼﺋﻤﺔ ﻟﻠﻤﺤﺎﻛﻤﺔ‪.‬‬

‫ﻭﻋﻠﻰ ﻫﺪﻱ ﺫﻟﻚ ﻓﺈﻥ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﺗﺪﺧﻞ ﻓﻌﻼ ﲟﻮﺟﺐ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﰲ ﺍﳌﺎﺩﺓ ‪ 15‬ﻣﻨﻪ‬
‫ﺍﻟﻮﺍﺭﺩﺓ ﰲ ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺩﺱ ﺑﻌﻨﻮﺍﻥ ﺍﻟﺘﻌﺎﻭﻥ ﻭ ﺍﳌﺴﺎﻋﺪﺓ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﻟﺪﻭﻟﻴﺔ ﻭ ﺍﻻﺧﺘﺼﺎﺹ ﺍﻟﻘﻀﺎﺋﻲ‬
‫ﺣﻴﺚ ﺍﻋﺘﱪ ﺍﳌﺸﺮﻉ ﺃﻧﻪ ﻭ ﺑﺎﻻﺿﺎﻓﺔ ﺇﱃ ﻗﻮﺍﻋﺪ ﺍﻹﺧﺘﺼﺎﺹ ﺍﳌﻨﺼﻮﺹ ﻋﻠﻴﻬﺎ ﰲ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ‬
‫ﺍﳉﺰﺍﺋﻴﺔ ﻓﺈﻥ ﺍﶈﺎﻛﻢ ﺍﳉﺰﺍﺋﺮﻳﺔ ﺗﻜﻮﻥ ﳐﺘﺼﺔ ﺃﻳﻀﺎ ﺑﺎﻟﻨﻈﺮ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭ‬
‫ﺍﻹﺗﺼﺎﻝ ﺍﳌﺮﺗﻜﺒﺔ ﺧﺎﺭﺝ ﺍﻟﻮﻃﻦ ﻋﻨﺪﻣﺎ ﻳﻜﻮﻥ ﻣﺮﺗﻜﺒﻬﺎ ﺃﺟﻨﺒﻴﺎ ﻭﺗﺴﺘﻬﺪﻑ ﻣﺆﺳﺴﺎﺕ ﺍﻟﺪﻭﻟﺔ ﺍﳉﺰﺍﺋﺮﻳﺔ‬
‫ﺃﻭ ﺍﻟﺪﻓﺎﻉ ﺍﻟﻮﻃﲏ ﺃﻭ ﺍﳌﺼﺎﱀ ﺍﻹﺳﺘﺮﺍﺗﻴﺠﻴﺔﻟﻺﻗﺘﺼﺎﺩ ﺍﻟﻮﻃﲏ‪.‬‬

‫ﻏﲑ ﺃﻥ ﻫﺬﺍ ﺍﻟﻨﺺ ﻣﺎﻫﻮ ﺇﻻ ﺗﻜﺮﺍﺭ ﻟﻘﺎﻋﺪﺓ ﺍﻹﺧﺘﺼﺎﺹ ﺍﻟﻌﻴﲏ ﺍﳌﻨﺼﻮﺹ ﻋﻠﻴﻬﺎ ﺑﺎﳌﺎﺩﺓ ‪ 588‬ﻣﻦ‬
‫ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﻭ ﻟﻴﺲ ﺑﺎﻹﺿﺎﻓﺔ ﺍﳉﺪﻳﺪﺓ ﺇﱃ ﻗﻮﺍﻋﺪ ﺍﻹﺧﺘﺼﺎﺹ ﻣﺜﻠﻤﺎ ﺍﺳﺘﻬﻞ ﺑﻪ ﻧﺺ‬
‫ﺍﳌﺎﺩﺓ‪ 15‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪04/09‬‬

‫ﻭﺻﻔﻮﺓ ﺍﻟﻘﻮﻝ ﻓﺈﻥ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﻌﺎﺑﺮﺓ ﻟﻠﻮﻃﻨﻴﺔ ﺗﺴﺘﻌﺼﻲ ﰲ ﻛﺜﲑ ﻣﻦ ﺍﻷﺣﻴﺎﻥ ﻋﻠﻰ‬
‫ﺍﳋﻀﻮﻉ ﻟﻠﻘﻮﺍﻟﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﱵ ﲢﻜﻢ ﻣﺴﺄﻟﺔ ﺍﻹﺧﺘﺼﺎﺹ ﺍﳌﻜﺎﱐ ﻭﻣﻦ ﲦﺔ ﻓﺈﻥ ﺍﻟﻄﺒﻴﻌﺔ ﺍﳋﺎﺻﺔ ﳍﺬﺍ‬
‫ﺍﻟﺼﻨﻒ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺴﺘﺤﺪﺛﺔ ﺗﺘﻄﻠﺐ ﲡﺎﻭﺯ ﺍﻟﻘﻮﺍﻟﺐ ﻭﺍﳌﻌﺎﻳﲑ ﺍﻟﱵ ﻃﺮﺣﻬﺎ ﺍﻟﻔﻘﻪ ﺍﻟﺘﻘﻠﻴﺪﻱ ﲞﺼﻮﺹ‬
‫ﻣﺴﺄﻟﺔ ﺗﻨﺎﺯﻉ ﺍﻹﺧﺘﺼﺎﺹ ﻭﺍﻟﻌﻤﻞ ﻋﻠﻰ ﺗﺒﲏ ﺣﻠﻮﻝ ﺃﻛﺜﺮ ﻣﺮﻭﻧﺔ ﺗﺄﺧﺬ ﰲ ﺍﳊﺴﺒﺎﻥ ﺍﻟﻨﻄﺎﻕ ﺍﳉﻐﺮﺍﰲ‬
‫ﳍﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻭﺳﻬﻮﻟﺔ ﺍﺭﺗﻜﺎ‪‬ﺎ ﻭﺁﻟﻴﺔ ﺍﻗﺘﺮﺍﻓﻬﺎ ﻭﺍﻟﺘﺨﻠﺺ ﻣﻦ ﺁﺛﺎﺭﻫﺎ ﻭﻣﺎ ﺇﱃ ﺫﻟﻚ ﻣﻦ ﺍﻋﺘﺒﺎﺭﺍﺕ‬
‫ﻳﻔﺮﺿﻬﺎ ﺍﻟﻄﺎﺑﻊ ﺍﻟﺘﻘﲏ ﺍﳌﺘﻄﻮﺭ ﳍﺎ‪.‬‬

‫‪- 102 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬‬

‫ﻭﺗﺮﺗﻴﺒﺎ ﻋﻠﻰ ﻣﺎ ﺳﺒﻖ ﻓﺈﻥ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺟﺮﳝﺔ ﻣﺴﺘﺤﺪﺛﺔ ﺗﺴﺘﻬﺪﻑ ﺍﻹﻋﺘﺪﺍﺀ ﻋﻠﻰ ﺍﳌﻌﻄﻴﺎﺕ‬
‫ﺑﺪﻻﻟﺘﻬﺎ ﺍﻟﺘﻘﻨﻴﺔ ﺍﻟﻮﺍﺳﻌﺔ ﺃﻭ ﺍﻻﺳﺘﻌﺎﻧﺔ ‪‬ﺎ ﻹﺭﺗﻜﺎﺏ ﺟﺮﺍﺋﻢ ﲢﺎﻛﻲ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﰲ ﺍﻟﻌﺎﱂ‬
‫ﺍﻻﻓﺘﺮﺍﺿﻲ‪ ،‬ﻭﰲ ﻫﺬﺍ ﺍﻟﻔﺼﻞ ﰎ ﺗﻨﺎﻭﻝ ﺃﻫﻢ ﺍﻟﺘﻌﺮﻳﻔﺎﺕ ﺍﻟﱵ ﻭﺿﻌﻬﺎ ﺍﻟﻔﻘﻪ ﺍﳉﻨﺎﺋﻲ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﻭﺫﻟﻚ ﺣﺴﺐ ﺍﻹﲡﺎﻫﺎﺕ ﺍﻟﻔﻘﻬﻴﺔ ﺍﻟﱵ ﻋﻨﻴﺖ ﺑﺪﺭﺍﺳﺔ ﻫﺬﻩ ﺍﳉﺮﳝﺔ‪ ،‬ﰒ ﺑﻌﺪ ﺫﻟﻚ ﰎ ﲢﺪﻳﺪ ﺍﻟﻄﺒﻴﻌﺔ‬
‫ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﳍﺎ ﰒ ﺗﺒﻴﺎﻥ ﺧﺼﺎﺋﺼﻬﺎ ﻭﺧﺼﺎﺋﺺ ﻣﺮﺗﻜﺒﻴﻬﺎ‪ ،‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺃﺳﺎﻟﻴﺐ ﻭﺗﻘﻨﻴﺎﺕ ﺍﺭﺗﻜﺎ‪‬ﺎ‪ ،‬ﰒ ﰎ‬
‫ﺍﻟﺘﻌﺮﻳﺞ ﺑﻌﺪ ﺫﻟﻚ ﺇﱃ ﺍﺳﺘﻴﻀﺎﺡ ﻣﻮﻗﻒ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﻲ ﻣﻦ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﺧﻼﻝ ﺗﺴﻠﻴﻂ‬
‫ﺍﻟﻀﻮﺀ ﻋﻠﻰ ﻛﻴﻔﻴﺔ ﺍﳌﻮﺍﺟﻬﺔ ﺍﻟﺘﺸﺮﻳﻌﻴﺔ ﺍﳌﻮﺿﻮﻋﻴﺔ ﳍﺬﻩ ﺍﳉﺮﳝﺔ ﻭﺫﻟﻚ ﻋﻠﻰ ﻣﺴﺘﻮﻯ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ‬
‫ﺃﻭ ﺍﳌﻘﺎﺭﻥ‪ ،‬ﻭﻛﺬﺍ ﺍﳉﻬﻮﺩ ﺍﻟﺪﻭﻟﻴﺔ ﺍﳌﺒﺬﻭﻟﺔ ﰲ ﻫﺬﺍ ﺍﻹﻃﺎﺭ‪ ،‬ﻭﰲ ﺍﻷﺧﲑ ﰎ ﺇﺑﺮﺍﺯ ﺃﻫﻢ ﺍﳌﺸﻜﻼﺕ‬
‫ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﱵ ﺗﺜﲑﻫﺎ ﻫﺬﻩ ﺍﳉﺮﳝﺔ ﻭﻫﻲ ﻣﺸﻜﻠﺔ ﺍﻹﺧﺘﺼﺎﺹ ﺍﻟﻘﻀﺎﺋﻲ ﻭ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﻮﺍﺟﺐ ﺍﻟﺘﻄﺒﻴﻖ‬
‫ﺑﺎﻋﺘﺒﺎﺭﻫﺎ ﺟﺮﳝﺔ ﻋﺎﺑﺮﺓ ﻟﻠﻮﻃﻨﻴﺔ‪.‬‬

‫‪- 103 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫اﻟﻔﺼــﻞ اﻟﺜﺎﻧﻲ‬

PDF created with pdfFactory Pro trial version www.pdffactory.com


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬


‫ﺇﻥ ﻃﺒﻴﻌﺔ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﻌﻨﺎﺻﺮﻫﺎ ﻭﻭﺳﺎﺋﻞ ﺇﺭﺗﻜﺎ‪‬ﺎ ﻗﺪ ﺗﺪﻓﻊ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﻲ ﺇﺍﱃ ﺍﻥ ﻳﻌﻴﺪ‬
‫ﺍﻟﻨﻈﺮ ﰲ ﻛﺜﲑ ﻣﻦ ﺍﳌﺴﺎﺋﻞ ﺍﻹﺟﺮﺍﺋﻴﺔ‪ ،‬ﺧﺎﺻﺔ ﻳﺘﻌﻠﻖ ﻓﻴﻤﺎ ﻳﺘﻌﻠﻖ ﲟﺴﺄﻟﺔ ﺍﻹﺛﺒﺎﺕ ﺑﺎﻋﺘﺒﺎﺭﻫﺎ ﺃﻫﻢ‬
‫ﻣﻮﺿﻮﻋﺎﺕ ﻫﺬﺍ ﺍﻟﻘﺎﻧﻮﻥ‪ .‬ﺫﻟﻚ ﺃﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺬﻱ ﻗﺪ ﻳﻘﻮﻯ ﻋﻠﻰ ﺇﺛﺒﺎﺕ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﻻﺑﺪ ﺃﻥ‬
‫ﻳﻜﻮﻥ ﻣﻦ ﺫﺍﺕ ﻃﺒﻴﻌﺘﻬﺎ ﺍﻟﺘﻘﻨﻴﺔ‪ ،‬ﻭﻫﻮ ﺍﻷﻣﺮ ﺍﻟﺬﻱ ﻻ ﺗﻜﻮﻥ ﻓﻴﻪ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ‬
‫ﻹﺳﺘﺨﻼﺹ ﺍﻟﺪﻟﻴﻞ ﻗﺎﺩﺭﺓ ﻋﻠﻰ ﺍﻟﻘﻴﺎﻡ ﺑﻪ‪ .‬ﳑﺎ ﻳﺴﺘﻮﺟﺐ ﺗﺪﺧﻞ ﺍﳌﺸﺮﻉ ﻟﺘﻜﺮﻳﺲ ﻗﻮﺍﻋﺪ ﺇﺟﺮﺍﺋﻴﺔ ﳝﻜﻦ‬
‫ﻟﻠﺠﻬﺎﺕ ﺍﳌﻜﻠﻔﺔ ﺑﺎﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻹﻋﺘﻤﺎﺩ ﻋﻠﻴﻬﺎ ﰲ ﺍﻟﻮﺻﻮﻝ ﺇﱃ ﺍﻟﺪﻟﻴﻞ‬
‫ﺍﳌﻨﺎﺳﺐ ﰲ ﺇﺛﺒﺎﺕ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫ﻭﻻ ﺷﻚ ﺃﻥ ﻫﺬﺍ ﺍﻟﺪﻟﻴﻞ ﺳﻴﺘﻢ ﺍﺳﺘﺨﻼﺻﻪ ﻣﻦ ﺍﻟﺒﻴﺌﺔ ﺍﻟﺮﻗﻤﻴﺔ‪ ،‬ﻭﺍﻟﱵ ﺗﻌﺘﱪ ﻣﺴﺮﺡ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﳑﺎ ﳚﻌﻠﻪ ﻳﺘﻤﻴﺰ ﲞﺼﺎﺋﺼﻬﺎ )ﺧﺼﺎﺋﺺ ﺍﻟﺒﻴﺌﺔ ﺍﻟﺮﻗﻤﻴﺔ(‪.‬ﻭﻫﻮ ﺍﻷﻣﺮ ﺍﻟﺬﻱ ﻳﻘﻮﺩﻧﺎ ﺍﱃ ﺍﳊﺪﻳﺚ‬
‫ﻋﻦ ﻣﺴﺎﻟﺔ ﻗﺒﻮﻝ ﻫﺬﺍ ﺍﻟﺪﻟﻴﻞ ﺃﻣﺎﻡ ﺍﻟﻘﻀﺎﺀ ﻭ ﻣﺪﻯ ﺗﻌﺒﲑﻩ ﻋﻦ ﺍﳊﻘﻴﻘﺔ ﻧﻈﺮﺍ ﳌﺎ ﳝﻜﻦ ﺃﻥ ﳜﻀﻊ ﻟﻪ ﻣﻦ‬
‫ﺍﻟﺘﺰﻳﻴﻒ ﻭﺍﻟﺘﺤﺮﻳﻒ ﻭ ﺍﻷﺧﻄﺎﺀ‪ ،‬ﺑﻞ ﻭﺣﱴ ﻣﻊ ﺿﻤﺎﻥ ﻣﺼﺪﺍﻗﻴﺔ ﻫﺬﺍ ﺍﻟﺪﻟﻴﻞ ﻭﻛﺬﺍ ﻣﺸﺮﻭﻋﻴﺘﻪ ﻓﺈﻥ‬
‫ﺍﻷﻣﺮ ﻻ ﻳﺘﻮﻗﻒ ﻋﻨﺪ ﻫﺬﺍ ﺍﳊﺪ‪ ،‬ﺑﻞ ﻳﺘﺠﺎﻭﺯﻩ ﺇﱃ ﻣﺴﺄﻟﺔ ﺃﻛﱪ ﺃﳘﻴﺔ ﺗﺘﻌﻠﻖ ﲟﺪﻯ ﺧﻀﻮﻉ ﻫﺬﺍ ﺍﻟﺪﻟﻴﻞ‬
‫ﺫﻭ ﺍﻷﺻﺎﻟﺔ ﺍﻟﻌﻠﻤﻴﺔ ﻟﻠﺴﻠﻄﺔ ﺍﻟﺘﻘﺪﻳﺮﻳﺔ ﻟﻠﻘﺎﺿﻲ ﺇﻋﻤﺎﻻ ﳌﺒﺪﺃ ﺍﻹﻗﺘﻨﺎﻉ ﺍﻟﺸﺨﺼﻲ ﻟﻠﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﺍﻟﺬﻱ‬
‫ﻳﺸﻜﻞ ﺟﻮﻫﺮ ﺃﻱ ﺣﻜﻢ‪ .‬ﻭﺳﻮﻑ ﺃﺣﺎﻭﻝ ﺃﻥ ﺃﺗﻨﺎﻭﻝ ﻫﺬﻩ ﺍﳌﺴﺎﺋﻞ ﺑﻨﻮﻉ ﻣﻦ ﺍﻟﺘﻔﺼﻴﻞ‪.‬‬

‫‪- 101 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﳌﺒﺤﺜﺎﻷﻭﻝ‪ :‬ﺍﻟﺘﺤﻘﻴـﻖ ﰲ ﺍﳉـﺮﳝﺔ ﺍﳌﻌﻠـﻮﻣﺎﺗﻴﺔ‪:‬‬


‫ﺇﻥ ﺍﻟﺘﺤﻘﻴﻖ ﻫﻮ ﺇﺟﺮﺍﺀ ﻣﻦ ﺃﻫﻢ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﻟﱵ ُﺗﺘﺨﺬ ﺑﻌﺪ ﻭﻗﻮﻉ ﺍﳉﺮﳝﺔ‪ ،‬ﳌﺎ ﻟﻪ ﻣﻦ ﺃﳘﻴﺔ ﰲ‬
‫ﺍﻟﺘﺜﺒﺖ ﻣﻦ ﺣﻘﻴﻘﺔ ﻭﻗﻮﻋﻬﺎ ﻭﺇﻗﺎﻣﺔ ﺍﻹﺳﻨﺎﺩ ﺍﳌﺎﺩﻱ ﻋﻠﻰ ﻣﺮﺗﻜﺒﻬﺎ ﺑﺄﺩﻟﺔ ﺍﻹﺛﺒﺎﺕ ﻋﻠﻰ ﺍﺧﺘﻼﻑ ﺃﻧﻮﺍﻋﻬﺎ‪،‬‬
‫ﻭﻫﻮ ﻛﻤﺎ ﻳﺪﻝ ﺇﲰﻪ ﻋﻠﻴﻪ ﺇﺳﺘﺠﻼﺀ ﺍﳊﻘﻴﻘﺔ ﻟﻐﺮﺽ ﺍﻟﻮﺻﻮﻝ ﺇﱃ ﺇﺩﺍﻧﺔ ﺍﳌﺘﻬﻢ ﻣﻦ ﻋﺪﻣﻪ ﺑﻌﺪ ﲨﻊ ﺍﻷﺩﻟﺔ‬
‫ﺍﻟﻘﺎﺋﻤﺔ ﻋﻠﻰ ﺍﳉﺮﳝﺔ‪.‬‬
‫ﻭﺍﻟﺜﺎﺑﺖ ﺃﻥ ﺍﻟﺪﻋﻮﻯ ﺍﳉﺰﺍﺋﻴﺔ ﲤﺮ ﲟﺮﺣﻠﺘﲔ‪ ،‬ﻣﺮﺣﻠﺔ ﺍﻟﺘﺤﻘﻴﻖ ﻭﻣﺮﺣﻠﺔ ﺍﶈﺎﻛﻤﺔ‪ ،‬ﻭﲤﺮ ﻋﻤﻠﻴﺔ‬
‫ﺍﻟﺘﺤﻘﻴﻖ ﲟﺮﺣﻠﺘﲔ ﺃﻳﻀﺎ‪ ،‬ﻣﺮﺣﻠﺔ ﺍﻟﺘﺤﻘﻴﻖ ﺍﻷﻭﱄ ﻭﻣﺮﺣﻠﺔ ﺍﻟﺘﺤﻘﻴﻖ ﺍﻹﺑﺘﺪﺍﺋﻲ‪ .‬ﻓﺎﳌﺮﺣﻠﺔ ﺍﻷﻭﱃ ﻭﻫﻲ‬
‫ﻣﺮﺣﻠﺔ ﲨﻊ ﺍﻹﺳﺘﺪﻻﻻﺕ ﺍﻟﱵ ﻳﺒﺎﺷﺮﻫﺎ ﺃﻋﻀﺎﺀ ﺍﻟﻀﺒﻂ ﺍﻟﻘﻀﺎﺋﻲ)‪ ،(1‬ﻭﺍﳌﺮﺣﻠﺔ ﺍﻟﺜﺎﻧﻴﺔ ﺗﺪﺧﻞ ﰲ‬
‫ﺍﺧﺘﺼﺎﺹ ﻗﺎﺿﻲ ﺍﻟﺘﺤﻘﻴﻖ)‪ .(2‬ﻭﺇﻧﻨﺎ ﻧﺆﻳﺪ ﺍﻟﺮﺃﻱ ﺃﻭ ﺍﻻﲡﺎﻩ)‪(3‬ﺍﻟﺬﻱ ﻳﻘﺴﻢ ﺍﻟﺘﺤﻘﻴﻖ ﺇﱃ‪:‬‬
‫‪-‬ﲢﻘﻴﻖ ﺃﻭﱄ ﻭ ﺍﻟﺬﻱ ﻳﻨﺎﻁ ﺑﻪ ﺭﺟﺎﻝ ﺍﻟﻀﺒﻄﻴﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ‪.‬‬
‫‪ -‬ﲢﻘﻴﻖ ﻗﻀﺎﺋﻲ ﻭﻳﻨﺎﻁ ﺑﻪ ﺭﺟﺎﻝ ﺍﻟﻘﻀﺎﺀ‪ ،‬ﻭﻫﺬﺍ ﺍﻷﺧﲑ ﻳﻘﺴﻢ ﺇﱃ ﲢﻘﻴﻖ ﺍﺑﺘﺪﺍﺋﻲ ﻣﻦ ﺍﺧﺘﺼﺎﺹ‬
‫ﻗﺎﺿﻲ ﺍﻟﺘﺤﻘﻴﻖ ﻭﲢﻘﻴﻖ ‪‬ﺎﺋﻲ ﻭﻳﻜﻮﻥ ﰲ ﻣﺮﺣﻠﺔ ﺍﶈﺎﻛﻤﺔ ﻣﻦ ﻃﺮﻑ ﻗﻀﺎﺓ ﺍﳊﻜﻢ‪.‬‬
‫ﻭﰲ ﻛﻞ ﲨﻴﻊ ﺃﻧﻮﺍﻉ ﺍﻟﺘﺤﻘﻴﻖ ﻫﺬﻩ‪ ،‬ﻳﻜﻮﻥ ﻟﻠﻘﺎﺋﻤﲔ ﻋﻠﻴﻪ ﻣﻦ ﺿﺒﻄﻴﺔ ﻗﻀﺎﺋﻴﺔ ﻭﻗﻀﺎﺓ ﺻﻼﺣﻴﺔ‬
‫ﳑﺎﺭﺳﺔ ﺇﺟﺮﺍﺀﺍﺕ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﺍﶈﺪﺩﺓ ﻭﻓﻘﺎ ﻟﻘﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‪ .‬ﻭﻫﻮ ﺍﻷﻣﺮ ﺍﻟﺬﻱ ﻳﻔﻬﻢ‬
‫ﺻﺮﺍﺣﺔ ﻣﻦ ﺧﻼﻝ ﺍﺳﺘﻘﺮﺍﺀ ﻧﺺ ﺍﳌﺎﺩﺗﲔ ‪12‬ﻭ‪ 38‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺍﻟﻮﺍﺭﺩﺗﲔ ﰲ ﺍﻟﺒﺎﺏ‬
‫ﺍﻷﻭﻝ ﻣﻦ ﻫﺬﺍ ﺍﻟﻘﺎﻧﻮﻥ ﲢﺖ ﻋﻨﻮﺍﻥ" ﰲ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﺍﺋﻢ" ﺣﻴﺚ ﺗﻨﺺ ﺍﳌﺎﺩﺓ ‪ 12‬ﺍﻟﻔﻘﺮﺓ‬
‫ﺍﻟﺜﺎﻟﺜﺔ ﺃﻧﻪ "ﻳﻨﺎﻁ ﺑﺎﻟﻀﺒﻂ ﺍﻟﻘﻀﺎﺋﻲ ﻣﻬﻤﺔ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻘﺮﺭﺓ ﰲ ﻗﺎﻧﻮﻥ‬

‫)‪ (1‬ﺣﺴﺐ ﺍﳌﺎﺩﺓ ‪ 15‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ "ﻳﺘﻤﺘﻊ ﺑﺼﻔﺔ ﺿﺎﺑﻂ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ‪:‬‬
‫‪ -‬ﺭﺅﺳﺎﺀ ﺍﻟﺒﻠﺪﻳﺎﺕ‪ ،‬ﺿﺒﺎﻁ ﺍﻟﺪﺭﻙ ﺍﻟﻮﻃﲏ‪ ،‬ﳏﺎﻓﻈﻮﺍ ﺍﻟﺸﺮﻃﺔ‪ ،‬ﺿﺒﺎﻁ ﺍﻟﺸﺮﻃﺔ‪ ،‬ﺫﻭﻭ ﺍﻟﺮﺗﺐ ﰲ ﺍﻟﺪﺭﻙ ﺍﻟﻮﻃﲏ‪ ،‬ﻭﺭﺟﺎﻝ ﺍﻟﺪﺭﻙ ﺍﻟﺬﻳﻦ ﺃﻣﻀﻮﺍ ﰲ ﺳﻠﻚ‬
‫ﺍﻟﺪﺭﻙ ﺃﻛﺜﺮ ﻣﻦ ﺛﻼﺙ ﺳﻨﻮﺍﺕ ﻭﻳﺘﻢ ﺗﻌﻴﻴﻨﻬﻢ ﲟﻮﺟﺐ ﻗﺮﺍﺭ ﻣﺸﺘﺮﻙ ﺻﺎﺩﺭ ﻋﻦ ﻭﺯﻳﺮ ﺍﻟﻌﺪﻝ ﻭﻭﺯﻳﺮ ﺍﻟﺪﻓﺎﻉ‪ .‬ﻣﻔﺘﺸﻮ ﺍﻷﻣﻦ ﺍﻟﻮﻃﲏ ﺍﻟﺬﻳﻦ ﻗﻀﻮﺍ ﰲ ﺧﺪﻣﺘﻬﻢ‬
‫‪‬ﺬﻩ ﺍﻟﺼﻔﺔ ﺛﻼﺙ ﺳﻨﻮﺍﺕ ﻋﻠﻰ ﺍﻷﻗﻞ ﻭﻋﻴﻨﻮﺍ ﲟﻮﺟﺐ ﻗﺮﺍﺭ ﻣﺸﺘﺮﻙ ﺻﺎﺩﺭ ﻋﻦ ﻭﺯﻳﺮ ﺍﻟﻌﺪﻝ ﻭﻭﺯﻳﺮ ﺍﻟﺪﺍﺧﻠﻴﺔ ﻭﻛﺬﺍ ﺿﺒﺎﻁ ﺍﻟﺼﻒ ﺍﻟﺘﺎﺑﻌﲔ ﻟﻠﻤﺼﺎﻟﻊ‬
‫ﺍﻟﻌﺴﻜﺮﻳﺔ‪.‬‬
‫)‪(2‬ﻳﺒﺪﻭ ﻟﻨﺎ ﺃﻥ ﺍﳌﺸﺮﻉ ﻻ ﻳﻔﺮﻕ ﺑﲔ ﺍﻟﺘﺤﻘﻴﻖ ﺍﻷﻭﱄ ﻭﺍﻟﺘﺤﻘﻴﻖ ﺍﻻﺑﺘﺪﺍﺋﻲ ﻭﺫﻟﻚ ﻣﻦ ﺧﻼﻝ ﻧﺺ ﺍﳌﺎﺩﺓ ‪ 63‬ﻣﻦ ﻗﻠﻨﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺍﻟﱵ ﺗﻨﺺ ﻋﻠﻰ‬
‫ﺃﻥ ﺿﺒﺎﻁ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻳﻘﻮﻣﻮﻥ ﺑﺎﻟﺘﺤﻘﻴﻘﺎﺕ ﺍﻻﺑﺘﺪﺍﺋﻴﺔ ‪ "...‬ﻭﰲ ﻧﻔﺲ ﺍﻟﻮﻗﺖ ﺗﻨﺺ ﺍﳌﺎﺩﺓ ‪ 66‬ﺍﻟﻮﺍﺭﺩﺓ ﰲ ﺍﻟﺒﺎﺏ ﺍﳌﺘﻌﻠﻖ ﺑﺎﻷﺣﻜﺎﻡ ﺍﳋﺎﺻﺔ‬
‫ﺑﻘﺎﺿﻴﺎﻟﺘﺤﻘﻴﻖ ﻋﻠﻰ ﺃﻥ ﺍﻟﺘﺤﻘﻴﻖ ﺍﻻﺑﺘﺪﺍﺋﻲ ﰲ ﺍﳉﻨﻴﺎﺕ ﻭﺟﻮﰊ ﻭﻫﻮ ﺑﺬﻟﻚ ﻳﻌﺘﱪ ﺃﻥ ﺍﻟﺘﺤﻘﻴﻖ ﺍﻟﺬﻱ ﳝﺎﺭﺳﻪ ﺳﻮﺍﺀ ﺭﺟﺎﻝ ﺍﻟﻀﺒﻄﻴﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺃﻡ ﻗﻀﺎﺓ‬
‫ﺍﻟﺘﺤﻘﻴﻖ ﻳﻌﺪ ﲢﻘﻴﻘﺎ ﺍﺑﺘﺪﺍﺋﻴﺎ ﻋﻠﻰ ﺣﺪ ﺍﻟﺴﻮﺍﺀ‪.‬‬
‫)‪ (3‬ﺯﻫﲑ ﻛﺎﻇﻢ ﻋﺒﻮﺩ‪ ،‬ﲝﺚ ﻣﻘﺪﻡ ﻟﻸﻛﺎﺩﳝﻴﺔ ﺍﻟﻌﺮﺑﻴﺔ ﺍﳌﻔﺘﻮﺣﺔ ﰲ ﺍﻟﺪﳕﺎﺭﻙ‪ ،‬ﻛﻠﻴﺔ ﺍﻟﻘﺎﻧﻮﻥ ﻭﺍﻟﺴﻴﺎﺳﺔ ﻗﺴﻢ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﺪﺭﺍﺳﺎﺕ ﺍﻟﻌﻠﻴﺎ ‪ 2007‬ﺑﺪﻭﻥ‬
‫ﺗﺮﻗﻴﻢ‪.‬‬

‫‪- 102 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﻟﻌﻘﻮﺑﺎﺕ‪ "...‬ﻭﺗﻨﺺ ﰲ ﻧﻔﺲ ﺍﻟﻮﻗﺖ ﺍﳌﺎﺩﺓ‪ 38‬ﻣﻦ ﻧﻔﺲ ﺍﻟﻘﺎﻧﻮﻥ ﺃﻧﻪ "ﻳﻨﺎﻁ ﺑﻘﺎﺿﻲ ﺍﻟﺘﺤﻘﻴﻖ ﺇﺟﺮﺍﺀﺍﺕ‬
‫ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ‪"...‬‬
‫ﻭﻋﻠﻴﻪ ﻓﺈﻧﻪ ﳝﻜﻦ ﺍﻟﻘﻮﻝ ﺃﻥ ﺇﺟﺮﺍﺀﺍﺕ ﺍﻟﺒﺤﺚ ﻭ ﺍﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﺍﺋﻢ ﻫﻲ ﻣﻦ ﺻﻼﺣﻴﺎﺕ‬
‫ﺟﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﺳﻮﺍﺀ ﻛﺎﻥ ﺃﻭﻟﻴﺎ ﺃﻡ ﺍﺑﺘﺪﺍﺋﻴﺎ‪ ،‬ﻭ‪‬ﺬﺍ ﺍﳌﻔﻬﻮﻡ ﻓﺈﻥ ﺇﺟﺮﺍﺀﺍﺕ ﺍﻟﺒﺤﺚ ﻭ ﺍﻟﺘﺤﺮﻱ ﺍﻟﱵ‬
‫ﻳﺒﺎﺷﺮﻫﺎ ﺭﺟﺎﻝ ﺍﻟﻀﺒﻂ ﺍﻟﻘﻀﺎﺋﻲ ﺗﺼﺐ ﰲ ﺇﻃﺎﺭ ﺍﻟﺘﺤﻘﻴﻖ ﺍﻷﻭﱄ‪ ،‬ﺑﻴﻨﻤﺎ ﻫﺬﻩ ﺍﻻﺟﺮﺍﺀﺍﺕ ﻋﻨﺪﻣﺎ‬
‫ﻳﺒﺎﺷﺮﻫﺎ ﻗﺎﺿﻲ ﺍﻟﺘﺤﻘﻴﻖ ﺗﻌﺘﱪ ﲢﻘﻴﻘﺎ ﺇﺑﺘﺪﺍﺋﻴﺎ‪.‬‬
‫ﻭﺇﺫﺍ ﻛﺎﻥ ﺍﻟﺘﺤﻘﻴﻖ ﻋﻤﻮﻣﺎ ﻳﻌﺘﻤﺪ ﻋﻠﻰ ﺫﻛﺎﺀ ﺍﶈﻘﻖ ﻭﻓﻄﻨﺘﻪ ﻭﻗﻮﺓ ﻣﻼﺣﻈﺘﻪ ﻭﺳﺮﻋﺔ ﺍﻟﺒﺪﻳﻬﺔ‬
‫ﻟﺪﻳﻪ‪،‬ﻭﺃﻥ ﳛﺎﻭﻝ ﺑﻜﻞ ﺍﳉﻬﺪ ﺍﳌﻤﻜﻦ ﺃﻥ ﻳﻘﻮﻡ ﺑﺎﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﳝﺔ ﻭﻣﺘﺎﺑﻌﺘﻬﺎ ﻭﺍﻟﺒﺤﺚ ﻓﻴﻬﺎ ﻭﰲ ﺍﻷﺩﻟﺔ‬
‫ﻭﺍﻟﺘﻨﻘﻴﺐ ﻋﻨﻬﺎ ﻭﺻﻮﻻ ﻹﺿﻬﺎﺭ ﺍﳊﻘﻴﻘﺔ‪ ،‬ﻓﺈﻥ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺍﻟﺒﻴﺌﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻳﺴﺘﻮﺟﺐ ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ‬
‫ﻛﻞ ﻫﺬﺍ ﺗﻄﻮﻳﺮ‪‬ﺍ ﻷﺳﺎﻟﻴﺒﻪ ﻭﺗﻜﻠﻴﻒ ﺟﻬﺎﺕ ﳐﺘﺼﺔ ﳌﻤﺎﺭﺳﺘﻪ ﻣﻦ ﺃﺟﻞ ﻣﻮﺍﻛﺒﺔ ﺣﺮﻛﺔ ﺍﳉﺮﳝﺔ ﻭﺗﻄﻮﺭ‬
‫ﺃﺳﺎﻟﻴﺐ ﺍﺭﺗﻜﺎ‪‬ﺎ ﰲ ﻫﺬﻩ ﺍﻟﺒﻴﺌﺔ‪.‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻷﻭﻝ‪ :‬ﺍﻷﺟﻬﺰﺓ ﺍﳌﻜﻠﻔﺔ ﺑﺎﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬‬
‫ﻟﻘﺪ ﻛﺎﻥ ﻟﻠﺘﺰﺍﻳﺪ ﺍﳌﺴﺘﻤﺮ ﻟﻠﺠﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻷﺛﺮ ﺍﻟﺒﺎﻟﻎ ﰲ ﺿﺮﻭﺭﺓ ﺗﻄﻮﻳﺮ ﺃﺟﻬﺰﺓ ﺍﻟﻀﺒﻂ‬
‫ﺍﻟﻘﻀﺎﺋﻲ ﻟﺘﻮﺍﻛﺐ ﺍﻟﺘﻄﻮﺭ ﺍﳊﺎﺻﻞ ﰲ ﳎﺎﻝ ﺍﳉﺮﳝﺔ‪ ،‬ﻭﻧﺘﻴﺠﺔ ﳍﺬﺍ ﺍﻟﺘﺤﺪﻱ ﻗﺎﻣﺖ ﻣﻌﻈﻢ ﺍﻟﺪﻭﻝ‬
‫ﺑﺈﺣﺪﺍﺙ ﺃﺟﻬﺰﺓ ﻣﺘﺨﺼﺼﺔ ﲟﻜﺎﻓﺤﺔ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﻹﺟﺮﺍﻡ ﺍﳌﺴﺘﺤﺪﺛﺘﺘﻮﱃ ﻣﻬﻤﺔ ﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺟﺮﺍﺋﻢ‬
‫ﺍﻟﻌﺎﱂ ﺍﻻﻓﺘﺮﺍﺿﻲ ﻭﻛﺸﻒ ﺍﻟﻨﻘﺎﺏ ﻋﻨﻬﺎ‪ ،‬ﻭﻗﺪﲪﻠﺖ ﻫﺬﻩ ﺍﻻﺟﻬﺰﺓ ﺗﺴﻤﻴﺎﺕ ﳐﺘﻠﻔﺔ ﻣﻨﻬﺎ ﻣﺜﻼ ﺷﺮﻃﺔ‬
‫ﺍﻻﻧﺘﺮﻧﺖ ﺃﻭ ﻓﺮﻗﺔ ﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺟﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺇﱃ ﻏﲑ ﺫﻟﻚ ﻣﻦ ﺍﻟﺘﺴﻤﻴﺎﺕ‪.‬‬
‫ﻭﻻ ﻳﻘﺘﺼﺮ ﺩﻭﺭ ﻫﺬﻩ ﺍﻷﺟﻬﺰﺓ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻟﻮﻃﲏ ﻓﻘﻂ‪ ،‬ﺑﻞ ﻫﻨﺎﻙ ﺃﺟﻬﺰﺓ ﻣﺘﺨﺼﺼﺔ ﻋﻠﻰ‬
‫ﺍﳌﺴﺘﻮﻯ ﺍﻟﺪﻭﱄ ﺃﻳﻀﺎ‪.‬ﻭﺳﻮﻑ ﻧﺴﺘﻌﺮﺽ ﺃﻫﻢ ﻫﺬﻫﺎﻷﺟﻬﺰﺓ ﺳﻮﺍﺀ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻟﺪﺍﺧﻠﻲ ﺃﻭ ﺍﻟﺪﻭﱄ‬
‫ﻭﺫﻟﻚ ﻛﻤﺎ ﻳﻠﻲ‪:‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺍﻷﺟﻬﺰﺓ ﺍﳌﺨﺘﺼﺔ ﺑﺎﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ‬
‫ﺍﻟﺪﺍﺧﻠﻲ‪:‬‬
‫ﻟﻘﺪ ﻇﻬﺮﺕ ﺍﻟﻌﺪﻳﺪ ﻣﻦ ﺍﻷﺟﻬﺰﺓ ﻭﺍﳍﻴﺌﺎﺕ ﺍﳌﺨﺘﺼﺔ ﰲ ﳎﺎﻝ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺇﻃﺎﺭ‬
‫ﻣﻜﺎﻓﺤﺘﻬﺎ ﻭﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻨﻬﺎ ﻭﻋﻦ ﻣﺮﺗﻜﺒﻴﻬﺎ ﺳﻮﺍﺀ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻟﻮﻃﲏ ﺃﻡ ﻋﻠﻰ ﺻﻌﻴﺪ ﺍﻟﺪﻭﻝ‬
‫ﺍﻷﺟﻨﺒﻴﺔ‪.‬‬

‫‪- 103 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺇﻧﻪ ﺑﺎﻟﻨﻈﺮ ﺇﱃ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﺘﻘﻨﻴﺔ ﺍﻟﱵ ﺗﺘﻤﻴﺰ ‪‬ﺎ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺫﻫﺒﺖ ﺃﻏﻠﺐ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ‬
‫ﺍﻹﺟﺮﺍﺋﻴﺔ ﰲ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﳌﻘﺎﺭﻧﺔ ﺃﱃ ﺃﻥ ﺗﻌﻬﺪ ﲟﺴﺄﻟﺔ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‬
‫ﻷﺟﻬﺰﺓ ﻣﺘﺨﺼﺼﺔ‪ ،‬ﳍﺎ ﻣﻦ ﺍﻟﻜﻔﺎﺀﺓ ﻭﺍﻟﺘﺪﺭﻳﺐ ﻭﺍﻟﻮﺳﺎﺋﻞ ﺍﻟﺒﺸﺮﻳﺔ ﻭﺍﳌﺎﺩﻳﺔﻣﺎ ﻳﺆﻫﻠﻬﺎ ﻟﻠﺘﻌﺎﻣﻞ ﻣﻊ ﻫﺬﺍ‬
‫ﺍﻟﻨﻮﻉ ﺍﳌﺴﺘﺤﺪﺙ ﻣﻦ ﺍﻹﺟﺮﺍﻡ‪.‬ﻭﺳﻮﻑ ﳓﺎﻭﻝ ﺃﻥ ﻧﻠﻘﻲ ﺍﻟﻀﻮﺀ ﻋﻠﻰ ﻫﺬﻩ ﺍﻷﺟﻬﺰﺓ ﺍﳌﻮﺟﻮﺩﺓ ﰲ ﺑﻌﺾ‬
‫ﺍﻟﺪﻭﻝ ﰒ ﻧﻌﺮﺝ ﻋﻠﻰ ﺍﻟﻮﺿﻊ ﰲ ﺑﻼﺩﻧﺎ‪.‬‬
‫ﺃﻭﻻ‪ :‬ﺍﻷﺟﻬﺰﺓ ﺍﳌﺨﺘﺼﺔ ﰲ ﺍﻟﺪﻭﻝ ﺍﻷﺟﻨﺒﻴﺔ‪:‬ﻛﺎﻧﺖ ﺍﻟﺪﻭﻝ ﺍﳌﺘﻘﺪﻣﺔ ﺳﺒﺎﻗﺔ ﺑﺈﺣﺪﺍﺙ ﻫﺬﻩ‬
‫ﺍﻷﺟﻬﺰﺓ ﺇﺫ ﺃﻥ ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﺮﺗﺒﻂ ﲟﺪﻯ ﺗﻘﺪﻡ ﺍﻟﺪﻭﻝ ﻣﻦ ﺍﻟﻨﺎﺣﻴﺔ ﺍﻟﺘﻘﻨﻴﺔ ﻭﲟﺪﻯ ﺗﻮﻓﺮ‬
‫ﺍﻹﻣﻜﺎﻧﺎﺕ ﺍﳌﺎﺩﻳﺔ ﺍﻟﻼﺯﻣﺔ ﻹﻧﺸﺎﺀ ﻫﺬﻩ ﺍﻷﺟﻬﺰﺓ ﻭﻧﺬﻛﺮ ﻋﻠﻰ ﺳﺒﻴﻞ ﺍﳌﺜﺎﻝ ﰲ ﻫﺬﺍ ﺍﻟﺼﺪﺩ ﺍﻟﺪﻭﻝ‬
‫ﺍﻟﺘﺎﻟﻴﺔ‪:‬‬
‫‪/1‬ﺍﻟﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ ﺍﻷﻣﺮﻳﻜﻴﺔ‪ :‬ﻗﺎﻣﺖ ﺍﻟﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ ﺍﻷﻣﺮﻳﻜﻴﺔ ﺑﺈﻧﺸﺎﺀ ﻋﺪﺓ ﺃﺟﻬﺰﺓ‬
‫ﳌﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻣﻨﻬﺎ‪:‬‬
‫• ﺷﺮﻃﺔ ﺍﻟﻮﺍﺏ ‪ :webpolice‬ﻭﺗﻌﺘﱪ ﻧﻘﻄﺔ ﻣﺮﺍﻗﺒﺔ ﻋﻠﻰ ﺍﻷﻧﺘﺮﻧﺎﺕ ﺇﺿﺎﻓﺔ ﺇﱃ ﺃ‪‬ﺎ ﺗﺘﻠﻘﻰ‬
‫ﺍﻟﺸﻜﺎﻭﻯ ﻣﻦ ﻣﺴﺘﺤﺪﻣﻴﺎﻟﺸﺒﻜﺔ ﻭﻣﻼﺣﻘﺔ ﺍﳉﻨﺎﺓ ﻭﺍﻟﻘﺮﺍﺻﻨﺔ‪،‬ﻭﺍﻟﺒﺤﺚ ﻋﻦ ﺍﻷﺩﻟﺔ ﺿﺪﻫﻢ ﻭﺗﻘﺪﳝﻬﻢ ﺇﱃ‬
‫ﺍﶈﺎﻛﻤﺔ)‪.(1‬‬
‫• ﻣﺮﻛﺰ ﺗﻠﻘﻲ ﺷﻜﺎﻭﻯ ﺟﺮﺍﺋﻢ ﺍﻷﻧﺘﺮﻧﺎﺕ ‪(2)IC3‬ﻭﺍﻟﺬﻱ ﰎ ﺇﻧﺸﺎﺅﻩ ﻣﻦ ﻃﺮﻑ ﻣﻜﺘﺐ‬
‫ﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﺍﻟﻔﺪﺭﺍﱄ ‪FBI‬ﰲ ﺳﻨﺔ ‪. 2000‬ﰒ ﰲ ﻋﺎﻡ ‪ 2003‬ﰎ ﺩﻣﺞ ﻣﺮﻛﺰ ﺷﻜﺎﻭﻯ ﺍﻹﺣﺘﻴﺎﻝ ﻋﱪ‬
‫ﺍﻷﻧﺘﺮﻧﺎﺕ ﺍﳌﻌﺮﻭﻑ ﺑـ ‪ (3)IFCC‬ﻣﻊ ﻫﺬﺍ ﺍﳌﺮﻛﺰ‪ .‬ﻭﻳﻌﻤﻞ ﻣﺮﻛﺰ ‪IC3‬ﺑﺼﻮﺭﺓ ﺗﺸﺎﺭﻛﻴﺔ ﻣﻊ ﻣﻜﺘﺐ‬
‫ﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﺍﻟﻔﺪﺭﺍﱄ ﻭﺍﳌﺮﻛﺰ ﺍﻟﻮﻃﲏ ﳉﺮﺍﺋﻢ ﺍﻟﻴﺎﻗﺎﺕ ﺍﻟﺒﻴﻀﺎﺀ‪(4)،NWC‬ﻭﻳﻘﻮﻡ ﻫﺬﺍ ﺍﳌﺮﻛﺰ ﺑﺘﻠﻘﻲ‬
‫ﺍﻟﺸﻜﺎﻭﻱ ﻋﱪ ﻣﻮﻗﻌﻪ ﻋﻠﻰ ﺍﻷﻧﺘﺮﻧﺎﺕ ﺃﻳﻦ ﻳﻘﻮﻡ ﺍﻟﺸﺎﻛﻲ ﲟﻠﺊ ﺇﺳﺘﻤﺎﺭﺓ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ ﰒ ﻳﻘﻮﻡ ﺍﳌﺨﺘﺼﻮﻥ‬
‫ﰲ ﻫﺬﺍ ﺍﳌﺮﻛﺰ ﺑﺘﺤﻠﻴﻞ ﺍﻟﺸﻜﺎﻭﻱ ﻭﺭﺑﻄﻬﺎ ﺑﺎﻟﺸﻜﺎﻭﻱ ﺍﻷﺧﺮﻯ ﺍﳌﺴﺘﻠﻤﺔ ﻣﻦ ﻗﺒﻞ‪.‬‬

‫)‪ (1‬ﲨﻴﻞ ﻋﺒﺪ ﺍﻟﺒﺎﻗﻲ ﺍﻟﺼﻐﲑ ﺍﳉﻮﺍﻧﺐ ﺍﻹﺟﺮﺍﺋﻴﺔ ﻟﻠﺠﺮﺍﺋﻢ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﻷﻧﺘﺮﻧﺎﺕ‪،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ‪.77‬‬
‫)‪(2‬ﻭﻫﻮ ﺇﺧﺘﺼﺎﺭ ﻟـ‪Internet Crime complaint Center :‬‬
‫)‪(3‬ﻭﻫﻮ ﺇﺧﺘﺼﺎﺭ ﻟـ‪Internet Fraude complaint center:‬‬
‫)‪(4‬ﻭﻫﻮ ﺇﺧﺘﺼﺎﺭ ﻝ ‪National White coller center‬‬

‫‪- 104 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫• ﻗﺴﻢ ﺟﺮﺍﺋﻢ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻟﻌﺪﻭﺍﻥ ﻋﻠﻰ ﺣﻘﻮﻕ ﺍﳌﻠﻜﻴﺔ ﺍﻟﻔﻜﺮﻳﺔ‪ :‬ﻭﳜﺘﺺ ﻫﺬﺍ ﺍﻟﻘﺴﻢ‬
‫ﺑﺎﻟﺘﻌﺮﻳﻒ ‪‬ﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻭﺍﻟﻜﺸﻒ ﻋﻨﻬﺎ ﻭﻣﻼﺣﻘﺔ ﻣﺮﺗﻜﺒﻴﻬﺎ‪.‬‬
‫• ﻧﻴﺎﺑﺔ ﺟﺮﺍﺋﻢ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻹﺗﺼﺎﻻﺕ ‪ (1)CTC‬ﻭﺗﺘﺄﻟﻒ ﻣﻦ ﳎﻤﻮﻋﺔ ﻣﻦ ﻗﻀﺎﺓ ﺍﻟﻨﻴﺎﺑﺔ ﺍﻟﻌﺎﻣﺔ‬
‫ﳑﻦ ﺗﻠﻘﻮﺍ ﺗﺪﺭﻳﺒﺎﺕ ﻣﻜﺜﻔﺔ ﻋﻠﻰ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﺒﻴﺎﻧﺎﺕ ﻭﰎ ﻣﻨﺤﻬﻤﺼﻼﺣﻴﺎﺕ ﻭﺍﺳﻌﺔ ﰲ ﳎﺎﻝ‬
‫ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺍﻟﻌﺪﻭﺍﻥ ﻋﻠﻰ ﺣﻘﻮﻕ ﺍﳌﻠﻜﻴﺔ ﺍﻟﻔﻜﺮﻳﺔ‪.‬‬
‫• ﺍﳌﺮﻛﺰ ﺍﻟﻮﻃﲏ ﳊﻤﺎﻳﺔ ﺍﻟﺒﻨﻴﺔ ﺍﻟﺘﺤﺘﻴﺔ ﺍﻟﺘﺎﺑﻊ ﻟﻠﻤﺒﺎﺣﺚ ﺍﻟﻔﺪﺭﺍﻟﻴﺔ ﺍﻷﻣﺮﻳﻜﻴﺔ ﻭﻗﺪ ﺣﺪﺩ ﻫﺬﺍ‬
‫ﺍﳌﺮﻛﺰ ﺍﻟﺒﲎ ﺍﻟﺘﺤﺘﻴﺔ ﺍﻟﱵ ﺗﻌﺘﱪ ﻫﺪﻓﺎ ﻟﻠﻬﺠﻮﻣﺎﺕ ﻭﺍﻹﻋﺘﺪﺍﺀﺍﺕ ﻋﱪ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻭﻋﻠﻰ ﺭﺃﺳﻬﺎ ﺷﺒﻜﺎﺕ‬
‫ﺍﻹﺗﺼﺎﻻﺕ‪.‬‬
‫ﻭﺇﺿﺎﻓﺔ ﺇﱃ ﻫﺬﻩ ﺍﻷﺟﻬﺰﺓ ﻳﻮﺟﺪ ﺃﻳﻀﺎ ﰲ ﺍﻟﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ ﺍﻷﻣﺮﻳﻜﻴﺔ ﻭﺣﺪﺓ ﻣﺘﺨﺼﺼﺔ‬
‫ﲟﻜﺎﻓﺤﺔ ﺍﻹﺟﺮﺍﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺗﺎﺑﻌﺔ ﻟﻘﺴﻢ ﺍﻟﻌﺪﺍﻟﺔ ﺍﻷﻣﺮﻳﻜﻲ ﺗﺘﻜﻮﻥ ﻣﻦ ﺧﱪﺍﺀ ﰲ ﻧﻈﺎﻡ ﺍﳊﻮﺳﺒﺔ‬
‫ﻭﺍﻷﻧﺘﺮﻧﺎﺕ ﻭﻣﻦ ﻣﺴﺘﺸﺎﺭﻳﻦ ﻗﺎﻧﻮﻧﻴﲔ)‪.(2‬‬
‫‪/2‬ﰲ ﺑﺮﻳﻄﺎﻧﻴﺎ‪ :‬ﻗﺎﻣﺖ ﺍﻟﺴﻠﻄﺎﺕ ﺍﻟﱪﻳﻄﺎﻧﻴﺔ ﺑﺘﺨﺼﻴﺺ ﻭﺣﺪﺓ ﺗﻀﻢ ﳔﺒﺔ ﻣﻦ ﺭﺟﺎﻝ ﺍﻟﺸﺮﻃﺔ‬
‫ﺍﳌﺘﺨﺼﺼﲔ ﰲ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺗﻀﻢ ﻫﺬﻩ ﺍﻟﻮﺣﺪﺓ ﳓﻮ ﲦﺎﻧﲔ ﻋﻨﺼﺮﺍ ﻋﻠﻰ‬
‫ﺩﺭﺟﺔ ﻋﺎﻟﻴﺔ ﻣﻦ ﺍﻟﻜﻔﺎﺀﺓ ﰲ ﺍ‪‬ﺎﻝ ﺍﻟﺘﻘﲏ‪ ،‬ﻭﻗﺪ ﺑﺪﺃﺕ ﻫﺬﻩ ﺍﻟﻮﺣﺪﺓ ﻧﺸﺎﻃﻬﺎ ﻋﺎﻡ ‪.2001‬‬
‫‪/3‬ﰲ ﻓﺮﻧﺴﺎ‪ :‬ﻗﺎﻣﺖ ﺍﳊﻜﻮﻣﺔ ﺍﻟﻔﺮﻧﺴﻴﺔ ﺑﺈﻧﺸﺎﺀ ﻋﺪﺓ ﺃﺟﻬﺰﺓ ﳌﻜﺎﻓﺤﺔ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﻭﻧﺬﻛﺮﻣﻦ ﻫﺬﻩ ﺍﻷﺟﻬﺰﺓ‪:‬‬
‫• ﺍﻟﻘﺴﻢ ﺍﻟﻮﻃﲏ ﻟﻘﻤﻊ ﺟﺮﺍﺋﻢ ﺍﳌﺴﺎﺱ ﺑﺎﻷﻣﻮﺍﻝ ﻭﺍﻷﺷﺨﺎﺹ ﻭﻳﺘﻜﻮﻥ ﻫﺬﺍ ﺍﻟﻘﺴﻢ ﻣﻦ‬
‫ﳏﻘﻴﻘﲔ ﳐﺘﺼﲔ ﰲ ﺍﻟﺘﺤﻘﻴﻖ ﲜﺮﺍﺋﻢ ﺍﻟﻌﺎﱂ ﺍﻹﻓﺘﺮﺍﺿﻲ ﻭﻗﺪ ﺑﺪﺃ ﻫﺬﺍ ﺍﻟﻘﺴﻢ ﻣﻬﺎﻣﻪ ﻋﺎﻡ ‪.1997‬‬
‫• ﺍﳌﻜﺘﺐ ﺍﳌﺮﻛﺰﻱ ﳌﻜﺎﻓﺤﺔ ﺍﻹﺟﺮﺍﺋﻢ ﺍﳌﺮﺗﺒﻂ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﻹﺗﺼﺎﻻﺕ ﻭﻳﻌﺪ‬
‫ﻫﺬﺍ ﺍﳌﻜﺘﺒﺴﻼﺡ ﺍﻟﺪﻭﻟﺔ ﺍﻟﻔﺮﻧﺴﻴﺔ ﰲ ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﻗﺪ ﰎ ﺇﻧﺸﺎﺅﻩ ﰲ ‪.2000/05/15‬‬

‫)‪(1‬ﻭﻫﻮ ﺇﺧﺘﺼﺎﺭ ﻟـ‪and Télecommunication coordinattorComputer‬‬


‫)‪ (2‬ﻧﺒﻴﻠﺔ ﻫﺒﺔ ﳏﻤﺪ ﻫﺮﻭﺍﻝ‪ ،‬ﺍﳉﻮﺍﻧﺐ ﺍﻹﺟﺮﺍﺋﻴﺔ ﳉﺮﺍﺋﻢ ﺍﻷﻧﺘﺮﻧﺎﺕ ﰲ ﻣﺮﺣﻠﺔ ﲨﻊ ﺍﻹﺳﺘﺪﻻﻻﺕ ﻟﻠﻄﺒﻘﺔ ﺍﻷﻭﱃ‪ ،‬ﺩﺍﺭ ﺍﻟﻔﻜﺮ ﺍﳉﺎﻣﻌﻲ ﺍﻹﺳﻜﻨﺪﺭﻳﺔ‪،‬‬
‫‪ ،2007‬ﺹ‪.108‬‬

‫‪- 105 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪ /4‬ﰲ ﺍﻟﺼﲔ‪ :‬ﻗﺎﻣﺖ ﺍﻟﺴﻠﻄﺎﺕ ﰲ ﻫﺬﺍ ﺍﻟﺒﻠﺪ ﺑﺈﻧﺸﺎﺀ ﻭﺣﺪﺓ ﻣﺘﺨﺼﺼﺔ ﻋﻠﻰ ﻣﺴﺘﻮﻯ ﺟﻬﺎﺯ‬
‫ﺍﻟﺸﺮﻃﺔ ﺗﻌﺮﻑ ﺑﺈﺳﻢ" ﺍﻟﻘﻮﺓ ﺍﳌﻀﺎﺩﺓ ﻟﻠﻬﻜﺮﺓ" ﻭﻫﻲ ﲣﺘﺺ ﺑﺮﻗﺎﺑﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﱵ ﻳﺴﻤﺢ ﳌﻮﺍﻃﻨﻴﻬﺎ‬
‫) ‪(1‬‬
‫ﺍﻟﺪﺧﻮﻝ ﺇﻟﻴﻬﺎ ﻋﱪ ﺍﻷﻧﺘﺮﻧﺎﺕ‪.‬‬
‫ﻭﺃﻣﺎ ﻋﻠﻰ ﻣﺴﺘﻮﻯ ﺍﻟﺪﻭﻝ ﺍﻟﻌﺮﺑﻴﺔ ﻓﻨﺠﺪﻫﺎ ﱂ ﺗﻘﻒ ﻣﻜﺘﻮﻓﺔ ﺍﻷﻳﺪﻱ ﺃﻣﺎﻡ ﺧﻄﺮ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻓﻘﺪ ﻗﺎﻣﺖ ﺑﻌﺾ ﺍﻟﺪﻭﻝ ﻣﻨﻬﺎ ﺑﺈﻧﺸﺎﺀ ﺃﺟﻬﺰﺓ ﻣﺘﺨﺼﺼﺔ ﳌﻜﺎﻓﺤﺔ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻭﻧﺬﻛﺮ ﻋﻠﻰ‬
‫ﺳﺒﻴﻞ ﺍﳌﺜﺎﻝ‪:‬‬
‫‪ /1‬ﺍﻷﺟﻬﺰﺓ ﺍﳌﺘﺨﺼﺼﺔ ﰲ ﻣﺼﺮ‪ :‬ﻗﺎﻣﺖ ﻭﺯﺍﺭﺓ ﺍﻟﺪﺍﺧﻠﻴﺔ ﰲ ﻣﺼﺮ ﺑﺈﻧﺸﺎﺀ ﻋﺪﺓ ﺃﺟﻬﺰﺓ ﺃﻭﻛﻠﺖ‬
‫ﳍﺎ ﻣﻬﻤﺔ ﺿﺒﻂ ﻣﺎ ﻳﻘﻊ ﻣﻦ ﺟﺮﺍﺋﻢ ﻣﻦ ﺧﻼﻝ ﺍﻟﺸﺒﻜﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻧﻌﺮﺽ ﳍﺎ ﻋﻠﻰ ﺍﻟﻨﺤﻮ ﺍﻟﺘﺎﱄ‪:‬‬
‫• ﺇﺩﺍﺭﺓ ﻣﻜﺎﻓﺤﺔ ﺟﺮﺍﺋﻢ ﺍﳊﺴﺎﺑﺎﺕ ﻭﺷﺒﻜﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ :‬ﺃﻧﺸﺌﺖ ﻫﺬﻩ ﺍﻹﺩﺍﺭﺓ ﲟﻮﺟﺐ ﻗﺮﺍﺭ‬
‫ﻭﺯﺍﺭﻱ)‪ (2‬ﻭﻫﻲ ﺗﺎﺑﻌﺔ ﻟﻺﺩﺍﺭﺓ ﺍﻟﻌﺎﻣﺔ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﻭﺍﻟﺘﻮﺛﻴﻖ ﻭﲣﻀﻊ ﻟﻺﺷﺮﺍﻑ ﺍﳌﺒﺎﺷﺮ ﳌﺪﻳﺮ ﺍﻹﺩﺍﺭﺓ‬
‫ﺍﻟﻌﺎﻣﺔ ﻭﺗﺸﺮﻑ ﻋﻠﻴﻬﺎ ﻓﻨﻴﺎ ﻣﺼﻠﺤﺔ ﺍﻷﻣﻦ ﺍﻟﻌﺎﻡ ﺍﻟﺘﺎﺑﻌﺔ ﻟﻮﺯﺍﺭﺓ ﺍﻟﺪﺍﺧﻠﻴﺔ‪ ،‬ﻭﺗﻀﻢ ﺛﻼﺙ ﺃﻗﺴﺎﻡ ﺭﺋﻴﺴﻴﺔ‪:‬‬
‫ﻫﻲ ﻗﺴﻢ ﺍﻟﻌﻤﻠﻴﺎﺕ‪ ،‬ﻗﺴﻢ ﺍﻟﺘﺄﻣﲔ ﻭﻗﺴﻢ ﺍﻟﺒﺤﻮﺙ ﻭﺍﳌﺴﺎﻋﺪﺍﺕ ﺍﻟﻔﻨﻴﺔ‪.‬ﻭﺗﻌﺘﱪ ﻫﺬﻩ ﺍﻹﺩﺍﺭﺓ ﻣﻦ ﺃﻛﱪ‬
‫ﺍﻹﺩﺍﺭﺍﺕ ﺗﻌﺎﻣﻼ ﻣﻊ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪،‬ﻓﻬﻲ ﺗﺘﻜﻮﻥ ﻣﻦ ﺿﺒﺎﻁ ﻣﺘﺨﺼﺼﲔ ﰲ ﳎﺎﻝ ﺗﻜﻨﻮﻟﻮﺟﻴﺎ‬
‫) ‪.(3‬‬
‫ﺍﳊﺴﺎﺑﺎﺕ ﻭﺍﻟﺸﺒﻜﺎﺕ ﻭﲣﺘﺺ ﲟﻜﺎﻓﺤﺔ ﺟﺮﺍﺋﻢ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻋﻠﻰ ﳐﺘﻠﻒ ﺃﻧﻮﺍﻋﻬﺎ‪.‬‬
‫• ﻗﺴﻢ ﻣﻜﺎﻓﺤﺔ ﺟﺮﺍﺋﻢ ﺍﳊﺎﺳﺒﺎﺕ ﻭﺷﺒﻜﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﻗﺪ ﺃﻧﺸﺊ ﻫﺬﺍ ﺍﻟﻘﺴﻢ ﺑﺈﻻﺩﺍﺭﺓ‬
‫ﺍﻟﻌﺎﻣﺔ ﻟﻠﺒﺤﺚ ﺍﳉﻨﺎﺋﻲ ﲟﺪﻳﺮﻳﺔ ﺃﻣﻦ ﺍﻟﻘﺎﻫﺮﺓ‪ ،‬ﻭﻳﺘﺒﻊ ﺇﺩﺍﺭﺓ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻭﳜﻀﻊ ﻣﻦ ﺣﻴﺚ‬
‫ﺍﻹﺷﺮﺍﻑ ﺍﻟﻔﲏ ﻹﺩﺍﺭﺓ ﻣﻜﺎﻓﺤﺔ ﺟﺮﺍﺋﻢ ﺍﳊﺎﺳﺒﺎﺕ ﻭﺷﺒﻜﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﳜﺘﺺ ﺑﻌﻤﻠﻴﺎﺕ ﺗﺄﻣﲔ‬
‫ﻭﺭﻗﺎﺑﺔ ﻧﻈﻢ ﻭﺷﺒﻜﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺕ ﳌﻨﻊ ﻭﻗﻮﻉ ﺃﻳﺔ ﺟﺮﺍﺋﻢ ﻋﻠﻴﻬﺎ ﺑﺈﺳﺘﺨﺪﺍﻡ ﺍﻷﺳﺎﻟﻴﺐ ﻭﺍﻟﺘﻘﻨﻴﺎﺕ ﺍﻟﻌﻠﻤﻴﺔ‬
‫ﺍﳊﺪﻳﺜﺔ‪ ،‬ﻭﺭﺻﺪ ﻭﻣﻜﺎﻓﺤﺔ ﻭﺿﺒﻂ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﺗﻘﻊ ﺑﺈﺳﺘﺨﺪﺍﻡ ﺍﳊﺎﺳﺒﺎﺕ ﻋﻠﻰ ﻧﻈﻢ ﻭﺷﺒﻜﺎﺕ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﻗﻮﺍﻋﺪ ﺍﻟﺒﻴﺎﻧﺎﺕ‪.‬‬
‫ﺛﺎﻧﻴﺎ‪:‬ﺍﻷﺟﻬﺰﺓ ﺍﳌﺨﺘﺼﺔ ﺑﺎﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻟﻮﻃﲏ‪:‬ﺃﻣﺎ ﺍﻟﻮﺿﻊ‬
‫ﰲ ﺑﻼﺩﻧﺎﻓﺈﻧﻪ ﻭﺑﺎﻟﻨﻈﺮ ﺇﱃ ﺍﳋﺼﻮﺻﻴﺔ ﺍﻟﱵ ﺗﺘﻤﻴﺰ ‪‬ﺎ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻛﺎﻥ ﺍﻷﻣﺮ ﳏﺘﻤﺎ ﻟﺘﻮﻓﲑ ﻛﻮﺍﺩﺭ‬

‫)‪(1‬ﻋﻤﺮ ﳏﻤﺪ ﺍﺑﻮ ﺑﻜﺮ ﺑﻦ ﻳﻮﻧﺲ‪ ،‬ﺍﳉﺮﺍﺋﻢ ﺍﻟﻨﺎﺷﺌﺔ ﻋﻦ ﺍﺳﺘﺨﺪﱂ ﺍﻻﺇﻧﺘﺮﻧﺎﺕ‪.‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ‪.‬ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ‪.‬ﺍﻟﻘﺎﻫﺮﺓ‪ ،2004‬ﺹ‪.812‬‬
‫)‪(2‬ﻗﺮﺍﺭ ﻭﺯﻳﺮ ﺍﻟﺪﺍﺧﻠﻴﺔ ﺍﳌﺼﺮﻱ ﺭﻗﻢ ‪ 13507‬ﻟﺴﻨﺔ ‪ 2002‬ﺍﻟﺼﺎﺩﺭ ﺑﺘﺎﺭﻳﺦ ‪.2002/07/07‬‬
‫)‪(3‬ﻧﺒﻴﻠﺔ ﻫﺒﺔ ﻫﺮﻭﺍﻝ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.141‬‬

‫‪- 106 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﺃﺟﻬﺰﺓ ﻣﺘﺨﺼﺼﺔ ﺗ‪‬ﻌﲎ ﺑﻌﻤﻠﻴﺔ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻛﺎﻥ ﺫﻟﻜﺈﻣﺎ ﻋﻠﻰ ﻣﺴﺘﻮﻯ‬
‫ﺟﻬﺎﺯ ﺍﻟﺸﺮﻃﺔ ﺃﻭ ﺍﻟﺪﺭﻙ ﺍﻟﻮﻃﲏ‪.‬‬
‫ﻓﻌﻠﻰ ﻣﺴﺘﻮﻯ ﺟﻬﺎﺯ ﺍﻟﺸﺮﻃﺔ ﻓﻘﺪ ﺃﻧﺸﺎﺕ ﺍﳌﺪﻳﺮﻳﺔ ﺍﻟﻌﺎﻣﺔ ﻟﻸﻣﻦ ﺍﻟﻮﻃﲏ ﺍﳌﺨﱪ ﺍﳌﺮﻛﺰﻱ ﻟﻠﺸﺮﻃﺔ‬
‫ﺍﻟﻌﻠﻤﻴﺔ ﺑﺸﺎﻃﻮﻧﺎﻑ ﺑﺎﳉﺰﺍﺋﺮ ﺍﻟﻌﺎﺻﻤﺔ ﻭﳐﱪﻳﻦ ﺟﻬﻮﻳﲔ ﺑﻜﻞ ﻣﻦ ﻗﺴﻨﻄﻴﻨﺔ ﻭﻭﻫﺮﺍﻥ‪ ،‬ﲢﺘﻮﻱ ﻫﺬﻩ‬
‫ﺍﳌﺨﺎﺑﺮ ﻋﻠىﻔﺮﻭﻉ ﺗﻘﻨﻴﺔ ﻣﻦ ﺑﻴﻨﻬﺎ ﺧﻠﻴﺔ ﺍﻹﻋﻼﻡ ﺍﻵﱄ‪،‬ﺑﺎﻹﺿﺎﻓﺔﺇﱃ ﺃﻧﻪ ﻳﻮﺟﺪ ﻋﻠﻰ ﻣﺴﺘﻮﻯ ﻣﺮﺍﻛﺰ‬
‫ﺍﻷﻣﻦ ﺍﻟﻮﻻﺋﻲ ﻓﺮﻕ ﻣﺘﺨﺼﺼﺔ ﻣﻬﻤﺘﻬﺎ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﻌﻤﻞ ﺑﺎﻟﺘﻨﺴﻴﻖ ﻣﻊ ﻫﺬﻩ ﺍﳌﺨﺎﺑﺮ‪.‬‬
‫ﺃﻣﺎ ﻋﻠﻰ ﻣﺴﺘﻮﻯ ﺍﻟﺪﺭﻙ ﺍﻟﻮﻃﲏ ﻓﺈﻧﻪ ﻳﻮﺟﺪ ﺑﺎﳌﻌﻬﺪ ﺍﻟﻮﻃﲏ ﻟﻸﺩﻟﺔ ﺍﳉﻨﺎﺋﻴﺔ ﻭﻋﻠﻢ ﺍﻹﺟﺮﺍﻡ‬
‫ﺑﺒﻮﺷﺎﻭﻱ ﺍﻟﺘﺎﺑﻊ ﻟﻠﻘﻴﺎﺩﺓ ﺍﻟﻌﺎﻣﺔ ﻟﻠﺪﺭﻙ ﺍﻟﻮﻃﲏ ﻗﺴﻢ ﺍﻹﻋﻼﻡ ﻭﺍﻹﻟﻜﺘﺮﻭﻧﻴﻚ ﺍﻟﺬﻱ ﳜﺘﺺ ﺑﺎﻟﺘﺤﻘﻴﻖ ﰲ‬
‫ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ .‬ﺑﺎﻻﺿﺎﻓﺔ ﺇﱃ ﻣﺮﻛﺰ ﺍﻟﻮﻗﺎﻳﺔ ﻣﻦ ﺟﺮﺍﺋﻢ ﺍﻹﻋﻼﻡ ﺍﻵﱄ ﻭﺍﳉﺮﺍﺋﻢ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔﻭﻣﻜﺎﻓﺤﺘﻬﺎﺑﺒﺌﺮ ﻣﺮﺍﺩ ﺭﺍﻳﺲ ﻭﺍﻟﺘﺎﺑﻊ ﳌﺪﻳﺮﻳﺔ ﺍﻷﻣﻦ ﺍﻟﻌﻤﻮﻣﻲ ﻟﻠﺪﺭﻙ ﺍﻟﻮﻃﲏ ﻭﻫﻮ ﻗﻴﺪ ﺍﻻﻧﺸﺎﺀ‪.‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺍﻷﺟﻬﺰﺓ ﺍﳌﺨﺘﺼﺔ ﺑﺎﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ‬
‫ﺍﳌﺴﺘﻮىﺎﻟﺪﻭﱄ ﻭﺍﻹﻗﻠﻴﻤﻲ‪:‬‬
‫ﺳﺒﻖ ﻭﺃﻥ ﺃﺳﻠﻔﻨﺎ ﺍﻟﺬﻛﺮ ﺑﺄﻥ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﺘﻤﻴﺰ ﺑﺄ‪‬ﺎ ﻋﺎﺑﺮﺓ ﻟﻠﺤﺪﻭﺩ ﺍﻟﻮﻃﻨﻴﺔ ﳝﻜﻦ ﺃﻥ‬
‫ﻳﺘﻌﺪﻯ ﺃﺛﺮﻫﺎ ﻋﺪﺓ ﺩﻭﻝ‪ ،‬ﻟﺬﻟﻚ ﻛﺎﻥ ﻻﺑﺪ ﻣﻦ ﻭﺟﻮﺩ ﺗﻌﺎﻭﻥ ﺩﻭﱄ ﻣﻦ ﺃﺟﻞ ﻣﻜﺎﻓﺤﺔ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ‬
‫ﺍﻹﺟﺮﺍﻡ‪.‬ﻭﻣﻦ ﺃﺳﺎﻟﻴﺐ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﺪﻭﱄ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻷﻣﲏ ﺍﻟﺬﻱ ﳝﻜﻦ ﺃﻥ ﳛﻘﻖ ﺃﻫﺪﺍﻓﻪ ﻻ ﻗﺒﻞ ﻟﻠﺸﺮﻃﺔ‬
‫ﺍﻹﻗﻠﻴﻤﻴﺔ ﺑﺘﺤﻘﻴﻘﻬﺎ‪ ،‬ﻭﻣﻦ ﺃﺑﺮﺯ ﻫﺬﻩ ﺍﻷﺟﻬﺰﺓ ﰲ ﳎﺎﻝ ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﻫﺬﺍ ﺍﻟﺼﻌﻴﺪ‬
‫ﻧﺬﻛﺮ ﻣﺎ ﻳﻠﻲ‪:‬‬
‫ﺃﻭﻻ ‪:‬ﻋﻠﻰ ﺍﳌﺴﺘـﻮﻯ ﺍﻟـﺪﻭﱄﺗﻌﺪ ﺍﳌﻨﻈﻤﺔ ﺍﻟﺪﻭﻟﻴﺔ ﻟﻠﺸﺮﻃﺔ ﺍﳉﻨﺎﺋﻴﺔ )ﺍﻷﻧﺘﺮﺑﻮﻝ()‪ (1‬ﻣﻦ ﺃﻫﻢ‬
‫ﺍﻷﺟﻬﺰﺓ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻟﺪﻭﱄ ﳌﻜﺎﻓﺤﺔ ﺍﻹﺟﺮﺍﻡ ﺑﺼﻔﺔ ﻋﺎﻣﺔ ﻭﻣﻨﻬﺎ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭ‪‬ﺪﻑ ﻫﺬﻩ‬
‫ﺍﳌﻨﻈﻤﺔ ﺍﻟﺪﻭﻟﻴﺔ ﺇﱃ ﺗﺸﺠﻴﻊ ﺍﻟﺘﻌﺎﻭﻥ ﺑﲔ ﺃﺟﻬﺰﺓ ﺍﻟﺸﺮﻃﺔ ﰲ ﺍﻟﺪﻭﻝ ﺍﻷﻃﺮﺍﻑ ﻋﻠﻰ ﳓﻮ ﻓﻌﺎﻝ ﻣﻦ ﺃﺟﻞ‬
‫ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ ﺫﺍﺕ ﺍﻟﻄﺎﺑﻊ ﺍﻟﻌﺎﳌﻲ ﲟﺎ ﰲ ﺫﻟﻚ ﺍﻹﺟﺮﺍﻡ ﺍﳌﺮﺗﺒﻂ ﺑﺎﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬ﻭﺗﺴﺘﺨﺪﻡ ﻫﺬﻩ ﺍﳌﻨﻈﻤﺔ‬
‫ﻟﺘﺤﻘﻴﻖ ﺃﻫﺪﺍﻓﻬﺎ ﻭﺳﻴﻠﺘﲔ‪:‬‬

‫)‪(1‬ﺑﻌﺪ ﺇﻧﺘﻬﺎﺀ ﺍﳊﺮﺏ ﺍﻟﻌﺎﳌﻴﺔ ﺍﻟﺜﺎﻧﻴﺔ ﻋﻘﺪ ﰲ ﺑﺮﻭﺳﻜﻞ )ﺑﻠﺠﻴﻜﺎ( ﻣﺆﲤﺮ ﺩﻭﱄ ﰲ ﺍﻟﻔﺘﺮﺓ ﻣﻦ ‪ 6/9-9‬ﻋﺎﻡ ‪ 1946‬ﺇﻧﺘﻬﻰ ﺇﱃ ﺇﺣﻴﺎﺀ ﺍﻟﻠﺠﻨﺔ ﺍﻟﺪﻭﻟﻴﺔ‬
‫ﻟﻠﺸﺮﻃﺔ ﺍﳉﻨﺎﺋﻴﺔ )‪ (ICPO‬ﻭﻧﻘﻞ ﻣﻘﺮﻫﺎ ﺇﱃ ﺑﺎﺭﻳﺲ ﻭﻏﲑ ﺇﲰﻬﺎ ﻟﻴﺼﺒﺢ ﺍﳌﻨﻈﻤﺔ ﺍﻟﺪﻭﻟﻴﺔ ﻟﻠﺸﺮﻃﺔ ﺍﳉﻨﺎﺋﻴﺔ ﺍﻷﻧﺘﺮﺑﻮﻝ ﻭﻭﺿﻊ ﻣﻴﺜﺎﻕ ﻫﺬﻩ ﺍﳌﻨﻈﻤﺔ ﰲ ﺍﻟﻔﺘﺮﺓ‬
‫ﻣﻦ ‪ 1956/06/13-7‬ﻭﺇﻋﺘﱪﻧﺎﻓﺬﺍ ﺇﻋﺘﺒﺎﺭﺍ ﻣﻦ ‪.1956/06/13‬‬

‫‪- 107 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﻷﻭﱃ‪:‬ﲡﻤﻴﻊ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﳉﺮﳝﺔ ﻭﺍ‪‬ﺮﻡ ﻋﻦ ﻃﺮﻳﻖ ﺍﳌﻜﺎﺗﺐ ﺍﳌﺮﻛﺰﻳﺔ ﺍﻟﻮﻃﻨﻴﺔ‬
‫ﺍﳌﻮﺟﻮﺩﺓ ﰲ ﺃﻗﺎﻟﻴﻢ ﺍﻟﺪﻭﻝ ﺍﻷﻃﺮﺍﻑ‪.‬‬
‫ﺍﻟﺜﺎﻧﻴﺔ‪ :‬ﺍﻟﺘﻌﺎﻭﻥ ﰲ ﻣﻼﺣﻘﺔ ﺍ‪‬ﺮﻣﲔ ﺍﻟﻔﺎﺭﻳﻦ ﻭﺇﻟﻘﺎﺀ ﺍﻟﻘﺒﺾ ﻋﻠﻴﻬﻢ ﻭﺗﺴﻠﻴﻤﻬﻢ ﻟﻠﺪﻭﻝ ﺍﻟﱵ‬
‫ﺗﻄﺎﻟﺐ ﺑﺘﺴﻠﻴﻤﻬﻢ‪.‬‬
‫ﻭﺗﻌﻤﻞ ﺍﳌﻨﻈﻤﺔ ﺍﻟﺪﻭﻟﻴﺔ ﻟﻠﺸﺮﻃﺔ ﺍﳉﻨﺎﺋﻴﺔ ﰲ ﳎﺎﻝ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﻮﺿﻊ ﻗﺎﺋﻤﺔ ﺇﲰﻴﺔ ﻟﻀﺒﺎﻁ‬
‫ﻣﺘﺨﺼﲔ ﳝﻜﻦ ﺍﻹﺳﺘﻌﺎﻧﺔ ‪‬ﻢ ﰲ ﳎﺎﻝ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﰲ ﻗﻀﺎﻳﺎ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻛﻤﺎ ﺗﻮﻓﺮ‬
‫ﻫﺬﻩ ﺍﳌﻨﻈﻤﺔ ﻟﻠﺪﻭﻝ ﺍﻷﻃﺮﺍﻑ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﻼﺯﻣﺔ ﻋﻦ ﺍﻟﻄﺮﻕ ﺍﻟﻌﻤﻠﻴﺔ ﰲ ﳎﺎﻝ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ‬
‫ﺧﻼﻝ ﺧﻠﻖ ﻓﺮﻕ ﻋﻤﻞ ﻭﻭﺭﺷﺎﺕ ﺗﻜﻮﻳﻦ‪(1).‬ﻭﻟﻘﺪ ﺃﻧﺸﺄﺕ ﻫﺬﻩ ﺍﳌﻨﻈﻤﺔ ﻭﺣﺪﺓ ﻣﺘﺨﺼﺼﺔ ﰲ ﻣﻜﺎﻓﺤﺔ‬
‫ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﻘﻮﻡ ﺑﺘﺰﻭﻳﺪ ﺃﺟﻬﺰﺓ ﺍﻟﺸﺮﻃﺔ ﺍﻟﺘﺎﺑﻌﺔ ﻟﻠﺪﻭﻝ ﺍﻷﻋﻀﺎﺀ ﺑﺈﺭﺷﺎﺩﺍﺕ ﺣﻮﻝ ﺍﻟﺘﺤﻘﻴﻖ ﰲ‬
‫ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﻹﺟﺮﺍﻡ ﻭﻛﻴﻔﻴﺔ ﺍﻟﺘﺪﺭﻳﺐ ﻋﻠﻰ ﻣﻜﺎﻓﺤﺘﻪ‪.‬‬
‫ﺛﺎﻧﻴﺎ‪ :‬ﺍﻷﺟﻬـﺰﺓ ﻋﻠﻰ ﺍﳌﺴﺘـﻮﻯ ﺍﻹﻗﻠﻴﻤﻲ‪:‬‬
‫• ﺍﻟﺸﺮﻃﺔ ﺍﻷﻭﺭﻭﺑﻴﺔ ﺃﻭ ﺍﻷﻭﺭﻭﺑﻮﻝ‪ :‬ﻭﻫﻮ ﺟﻬﺎﺯ ﻋﻠﻰ ﻣﺴﺘﻮﻯ ﺍﻹﲢﺎﺩ ﺍﻷﻭﺭﻭﰊ ﰎ ﺇﻧﺸﺎﺅﻩ ﰲ‬
‫ﻟﻜﺴﻨﺒﻮﺭﻍ ﻋﺎﻡ ‪ 1992‬ﻭﻣﻘﺮﻩ ﰲ ﻣﺪﻳﻨﺔ ﻻﻫﺎﻱ ‪‬ﻠﻨﺪﺍ ﻟﻴﻜﻮﻥ ﺣﻠﻘﺔ ﻭﺻﻞ ﺑﲔ ﺃﺟﻬﺰﺓ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻮﻃﻨﻴﺔ‬
‫ﻟﻠﺪﻭﻝ ﺍﻷﻋﻀﺎﺀ ﰲ ﳎﺎﻝ ﺍﳉﺮﺍﺋﻢ ﺍﻹﺭﻫﺎﺑﻴﺔ ﻭﺍﳌﺨﺪﺭﺍﺕ ﻭﺍﳉﺮﳝﺔ ﺍﳌﻨﻈﻤﺔ ﻭﻛﺬﺍ‬
‫ﺍﻹﺟﺮﺍﻣﺎﳌﻌﻠﻮﻣﺎﰐ‪.‬ﻭﻳﻬﺪﻑ ﻫﺬﺍ ﺍﳉﻬﺎﺯ ﺇﱃ ﺗﺴﻬﻴﻞ ﺗﺒﺎﺩﻝ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﲔ ﺃﺟﻬﺰﺓ ﺍﻟﺸﺮﻃﺔ ﳌﺨﺘﻠﻒ‬
‫ﺍﻟﺪﻭﻝ ﺍﻷﻋﻀﺎﺀ‪ ،‬ﻭﻛﺬﺍ ﲡﻤﻴﻊ ﻭﲢﻠﻴﻞ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﻐﺮﺽ ﺍﳌﺴﺎﻋﺪﺓ ﰲ ﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﺍﳌﻔﺘﻮﺣﺔ ﰲ ﺃﻱ‬
‫ﺩﻭﻟﺔ ﻋﻀﻮ ﲞﺼﻮﺹ ﺟﺮﳝﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺬﻛﻮﺭﺓ ﻭﻣﻨﻬﺎ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫ﻭﲟﺒﺎﺩﺭﺓ ﻣﻦ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﻟﻔﺮﻧﺴﻴﺔ ﰎ ﺇﻧﺸﺎﺀ ﺟﻬﺎﺯ ﻋﻠﻰ ﻣﺴﺘﻮﻯ ﺍﻷﻭﺭﻭﺑﻮﻝ ﺃﻃﻠﻖ ﻋﻠﻴﻪ‬
‫ﺇﺳﻢ "‪ (Internet Crime Repporting online System) ICROS‬ﰲ ﺳﻨﺔ ‪ 2010‬ﺑﻐﺮﺽ ﺍﻟﺘﻨﺴﻴﻖ‬
‫ﺃﻛﺜﺮ ﰲ ﳎﺎﻝ ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﻣﺴﺘﻮﻯ ﺍﻟﺪﻭﻝ ﺍﻷﻋﻀﺎﺀ‪.‬‬
‫• ﺍﻷﻭﺭﻭﺟﺴﺖ‪ :Eurojust:‬ﻭﻫﻮ ﺟﻬﺎﺯ ﻳﻌﻤﻞ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻷﻭﺭﻭﰊ ﺇﱃ ﺟﺎﻧﺐ‬
‫ﺍﻷﻭﺭﻭﺑﻮﻝ ﰲ ﳎﺎﻝ ﻣﻜﺎﻓﺤﺔ ﲨﻴﻊ ﺃﻧﻮﺍﻉ ﺍﳉﺮﺍﺋﻢ‪ ،‬ﰎ ﺇﻧﺸﺎﺅﻩ ﻋﺎﻡ ‪ 2002‬ﻭﻳﻨﻌﻘﺪ ﺇﺧﺘﺼﺎﺻﻪ ﻋﻨﺪﻣﺎ‬
‫ﲤﺲ ﺍﳉﺮﳝﺔ ﺩﻭﻟﺘﲔ ﻋﻠﻰ ﺍﻷﻗﻞ ﻣﻦ ﺍﻟﺪﻭﻝ ﺍﻷﻋﻀﺎﺀ ﰲ ﺍﻹﲢﺎﺩ ﺍﻷﻭﺭﻭﰊ ﺃﻭ ﺩﻭﻟﺔ ﻋﻀﻮ ﻣﻊ ﺩﻭﻟﺔ‬

‫‪1‬‬
‫‪-Myriam QUEMENER.Cyebrcrininalité droit pénel appliqué. econonica Septembre‬‬
‫‪2010p208.‬‬

‫‪- 108 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺃﺧﺮﻯ ﻣﻦ ﻏﲑ ﺍﻹﲢﺎﺩ ﺍﻷﻭﺭﻭﰊ‪.‬ﻭﻳﻌﺪ ﺍﻷﺭﻭﺟﻴﺴﺖ ﻭﺣﺪﺓ ﻟﻠﺘﻌﺎﻭﻥ ﺍﻟﻘﻀﺎﺋﻲ‪ ،‬ﻣﻬﻤﺘﻬﺎ ﺍﻷﺳﺎﺳﻴﺔ ﻫﻲ‬
‫ﺍﻟﺘﻨﺴﻴﻖ ﺑﲔ ﺍﻟﺴﻠﻄﺎﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﻜﻠﻔﺔ ﺑﺎﻟﺘﺤﻘﻴﻘﺎﺕ ﻭﳍﺎ ﻣﻦ ﺍﻟﺼﻼﺣﻴﺎﺕ ﻣﺎ ﻳﺆﻫﻠﻬﺎ ﻟﻔﺘﺢ ﲢﻘﻴﻘﺎﺕ‬
‫) ‪(1‬‬
‫ﻭﻣﺒﺎﺷﺮﺓ ﻣﺘﺎﺑﻌﺎﺕ ﺟﺰﺍﺋﻴﺔ‪.‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﱐ‪:‬ﺧﺼﺎﺋﺺ ﺍﻟﺘﺤﻘﻴﻖ ﻭ ﺍﶈﻘﻖ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬‬
‫ﺗﻌﺪ ﻣﺮﺣﻠﺔ ﺍﻟﺘﺤﻘﻴﻖ ﺍﻹﺑﺘﺪﺍﺋﻲ ﺃﻭ ﻣﺎ ﻳﻄﻠﻖ ﻋﻠﻴﻬﺎ ﻣﺮﺣﻠﺔ ﲨﻊ ﺍﻹﺳﺘﺪﻻﻻﺕ‪ ،‬ﻣﺮﺣﻠﺔ ﻫﺎﻣﺔ ﰲ‬
‫ﺳﺒﻴﻞ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﺍﺋﻢ‪،‬ﻭﺗﺒﻠﻎ ﻫﺬﻩ ﺍﳌﺮﺣﻠﺔ ﺃﻋﻠﻰ ﻣﺴﺘﻮﻳﺎ‪‬ﺎ ﻋﻨﺪﻣﺎ ﻳﺘﻌﻠﻖ ﺍﻷﻣﺮ ﺑﺎﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻷ‪‬ﺎ ﺗﻌﺪ ﺣﺠﺮ ﺍﻟﺰﺍﻭﻳﺔ ﺍﻟﺬﻱ ﺳﻴﺘﻢ ﻋﻠﻰ ﺃﺳﺎﺳﻪ ﺑﻨﺎﺀ ﺍﻟﺪﻋﻮﻯ ﺑﺮﻣﺘﻬﺎ‪ .‬ﻓﻤﺎ ﻳﺘﻢ ﲨﻌﻪ ﻣﻦ‬
‫ﻣﻌﻠﻮﻣﺎﺕ ﻭﺃﺩﻟﺔ ﺭﻗﻤﻴﺔ ﰲ ﺍﳌﺮﺣﻠﺔ ﺍﻟﱵ ﺗﻌﻘﺐ ﺇﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﻣﺒﺎﺷﺮﺓ ﻗﺪ ﻻﻳﺒﻘﻰ ﻣﺘﺎﺣﺎ ﺑﻌﺪ ﻣﺮﻭﺭ‬
‫ﻭﻗﺖ ﻗﺼﲑ ﻋﻠﻰ ﺇﺭﺗﻜﺎ‪‬ﺎ ﻭﺍﻟﺴﺒﺐ ﰲ ﺫﻟﻚ ﻳﻌﻮﺩ ﺇﱃ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﺘﻘﻨﻴﺔ ﳍﺬﻩ ﺍﳉﺮﺍﺋﻢ‪.‬ﻓﻔﻲ ﻛﺜﲑ ﻣﻦ‬
‫ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﱂ ﻳﺘﺮﻙ ﺍﳉﺎﱐ ﻭﺭﺍﺅﻩ ﺳﻮﻯ ﺫﻟﻚ ﺍﻟﺘﻌﺒﲑ ﺍﻟﺬﻱ ﻳﻌﺘﺮﻱ ﻭﺟﻮﻩ ﺍﻟﻘﺎﺋﻤﲔ ﻋﻠﻰ ﺗﻌﻘﺒﻪ‬
‫) ‪(2‬‬
‫ﻭﺍﳌﻤﺰﻭﺟﺒﺎﻹﺣﺒﺎﻁ ﻭﺍﻹﻋﺤﺎﺏ ﻣﻌﺎ‪.‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺧﺼﺎﺋﺺ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬‬
‫ﺍﻟﺘﺤﻘﻴﻖ ﺍﳉﻨﺎﺋﻲ ﻋﻤﻮﻣﺎ ﻫﻮ ﻋﻠﻢ ﳜﻀﻊ ﳌﺎ ﳜﻀﻊ ﻟﻪ ﺳﺎﺋﺮ ﺃﻧﻮﺍﻉ ﺍﻟﻌﻠﻮﻡ ﺍﻷﺧﺮﻯ‪ ،‬ﻓﻠﻪ ﻗﻮﺍﻋﺪ‬
‫ﺛﺎﺑﺘﺔ ﻭ ﺭﺍﺳﺨﺔ ﺑﺪﻭ‪‬ﺎ ﻣﺎ ﻛﺎﻥ ﻟﻴﺘﻤﺘﻊ ﺍﻟﺘﺤﻘﻴﻖ ﺑﺘﻠﻚ ﺍﻟﺼﻔﺔ‪.‬‬
‫ﻭﻫﺬﻩ ﺍﻟﻘﻮﺍﻋﺪ ﺇﻣﺎ ﻗﺎﻧﻮﻧﻴﺔ ﻭ ﺇﻣﺎ ﻓﻨﻴﺔ‪ ،‬ﻓﺎﻷﻭﱃ ﳍﺎ ﺻﻔﺔ ﺍﻟﺜﺒﺎﺕ ﺍﻟﺘﺸﺮﻳﻌﻲ ﻻ ﳝﻠﻚ ﺍﶈﻘﻖ ﺇﺯﺍﺀﻫﺎ‬
‫ﺷﻴﺌﺎ ﺳﻮﻯ ﺍﳋﻀﻮﻉ ﻭﺍﻹﻣﺘﺜﺎﻝ‪ .‬ﺃﻣﺎ ﺍﻟﺜﺎﻧﻴﺔ ﻓﺘﺘﻤﻴﺰ ﺑﺎﳌﺮﻭﻧﺔ ﺍﻟﱵ ﻳﻀﻔﻲ ﻋﻠﻴﻬﺎ ﺍﶈﻘﻖ ﻣﻦ ﺧﱪﺗﻪ ﻭﻓﻄﻨﺘﻪ‬
‫) ‪(3‬‬
‫ﻭﻣﻬﺎﺭﺗﻪ ﺍﻟﻜﺜﲑ‬
‫ﺫﻟﻚ ﺃﻥ ﺍﻟﻔﻜﺮ ﺍﻟﺒﺸﺮﻱ ﺍﳌﺘﻌﻠﻖ ﺑﺎ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﳚﺐ ﺃﻥ ﻳﻘﺎﺑﻠﻪ ﻓﻜﺮ ﺑﺸﺮﻱ ﻣﻦ ﻗﺒﻞ ﺍﶈﻘﻖ‬
‫ﺍﳉﻨﺎﺋﻲ‪ ،‬ﻭﺑﺎﻟﺘﺎﱄ ﻓﺈﻥ ﺃﺳﻠﻮﺏ ﺍﻟﺘﺤﻘﻴﻖ ﻭﻓﻜﺮ ﺍﶈﻘﻖ ﺍﳉﻨﺎﺋﻲ ﳚﺐ ﺃﻥ ﻳﺘﻐﲑ ﻭﻳﺘﻄﻮﺭ ﺃﻳﻀﺎ‪ ،‬ﻭﺫﻟﻚ‬
‫ﻛﻨﺘﻴﺠﺔ ﻃﺒﻴﻌﻴﺔ ﳌﻮﺍﺟﻬﺔ ﻓﻜﺮ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‪.‬‬
‫ﺃﻭﻻ‪ :‬ﻣﻨﻬﺞ ﺃﻭ ﺃﺳﻠﻮﺏ ﺍﻟﺘﺤﻘﻴﻖ ﺍﻹﺑﺘﺪﺍﺋﻲ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬ﺍﻟﺘﺤﻘﻴﻖ ﻋﻤﻮﻣﺎ ﻫﻮ‬
‫ﳎﻤﻮﻋﺔ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﻟﱵ ﻳﻘﻮﻡ ‪‬ﺎ ﺍﶈﻘﻖ ﻭﺗﺆﺩﻱ ﺇﱃ ﺇﻛﺘﺸﺎﻑ ﺍﳉﺮﳝﺔ ﻭﻣﻌﺮﻓﺔ ﻣﺮﺗﻜﺒﻴﻬﺎ ﲤﻬﻴﺪﺍ‬

‫‪1‬‬
‫‪Myrian QUEMENER.YES CHOR PENAL Cybescviminalité Droit pénal appliqué p 209.‬‬
‫)‪ (2‬ﳏﻤﺪ ﻃﺎﺭﻕ ﻋﺒﺪ ﺍﻟﺮﻭﺅﻑ ﺍﳊﻦ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ ﺹ‪،230‬‬
‫)‪(3‬ﺧﺎﻟﺪ ﳑﺪﻭﺡ ﺇﺑﺮﺍﻫﻴﻢ‪ ،‬ﻓﻦ ﺍﻟﺘﺤﻘﻴﻖ ﺍﳉﻨﺎﺋﻲ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﺩﺍﺭ ﺍﻟﻔﻜﺮ ﺍﳉﺎﻣﻌﻲ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ‪.2009‬ﺹ‪.56‬‬

‫‪- 109 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻟﺘﻘﺪﳝﻬﻢ ﺇﱃ ﺍﶈﺎﻛﻤﺔ‪ ،‬ﻭﻗﺪ ﺗﻜﻮﻥ ﻫﺬﻩ ﺍﻹﺟﺮﺍﺀﺍﺕ ﻋﻤﻠﻴﺔ ﻛﺎﻟﺘﻔﺘﻴﺶ ﺃﻭ ﻓﻨﻴﺔ ﻛﻤﻈﺎﻫﺎﺕ ﺍﻟﺒﺼﻤﺎﺕ ﺃﻭ‬
‫ﺑﺮﳎﻴﺔ ﻛﺘﺤﺪﻳﺪ ﻛﻴﻔﻴﺔ ﺍﻟﺪﺧﻮﻝ ﺇﱃ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﺨﺰﻧﺔ ﰲ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‪.‬‬
‫ﻭﺍﳍﺪﻑ ﻣﻦ ﺍﻟﺘﺤﻘﻴﻖ ﺍﻹﺑﺘﺪﺍﺋﻲ ﻫﻮ ﺍﻟﺘﺄﻛﺪ ﺃﻭﻻ ﻣﻦ ﻭﻗﻮﻉ ﺟﺮﳝﺔ ﻳﻌﺎﻗﺐ ﻋﻠﻴﻬﺎ ﺍﻟﻘﺎﻧﻮﻥ‪ ،‬ﻭﻣﻦ‬
‫ﲦﺔ ﻣﻌﺮﻓﺔ ﻧﻮﻉ ﻫﺬﻩ ﺍﳉﺮﳝﺔ ﻭﻣﻦ ﻫﻮ ﺍﳉﺎﱐ ﻭﻣﻦ ﻫﻮ ﺍ‪‬ﲏ ﻋﻠﻴﻪ‪ ،‬ﻭﻛﺬﺍ ﻣﻌﺮﻓﺔ ﻭﻗﻮﻋﻬﺎ ﻭﻣﺎ ﻫﻲ‬
‫ﺍﻟﻮﺳﺎﺋﻞ ﺍﻟﱵ ﺇﺳﺘﻌﻤﻠﺖ ﰲ ﺇﺭﺗﻜﺎ‪‬ﺎ‪ .‬ﻭﻳﻜﻮﻥ ﺫﻟﻚ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻓﻘﺎ ﳌﻨﻬﺞ ﲢﻘﻴﻘﻲ ﳜﺘﻠﻒ‬
‫ﻋﻦ ﻏﲑﻩ ﺑﺎﻟﻨﺴﺒﺔ ﻟﻠﺠﺮﺍﺋﻢ ﺍﻷﺧﺮﻯ‪.‬‬
‫‪/1‬ﻭﺿﻊ ﺧﻄﺔ ﻋﻤﻞ ﺍﻟﺘﺤﻘﻴﻖ‪ :‬ﻳﺒﺪﺅﺍﶈﻘﻖ ﻋﻤﻠﻪ ﻋﻨﺪ ﲡﻤﻴﻊ ﺍﻹﺳﺘﺪﻻﻻﺕ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﻮﺿﻊ ﺧﻄﺔ ﺍﻟﻌﻤﻞ ﺍﻟﻼﺯﻣﺔ ﻋﻠﻰ ﺿﻮﺀ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺘﻮﺍﻓﺮﺓ ﻟﺪﻳﻪ‪ ،‬ﻭﲢﺪﻳﺪ ﺍﻟﻔﺮﻳﻖ ﺍﻟﻔﲏ‬
‫ﺍﻟﻼﺯﻡ ﻟﻠﻘﻴﺎﻡ ﲟﺴﺎﻋﺪﺗﻪ ﰲ ﺃﻋﻤﺎﻝ ﺍﻟﺘﺤﻘﻴﻖ ﻭﺫﻟﻚ ﻋﻠﻰ ﺍﻟﻨﺤﻮ ﺍﻵﰐ‪:‬‬
‫‪ -‬ﻭﺿﻊ ﺍﳋﻄﺔ ﺍﳌﻨﺎﺳﺒﺔ ﻭ ﺍﻟﱵ ﻻ ﺗﺒﺪﺀ ﺇﻻ ﺑﻌﺪ ﻣﻌﺎﻳﻨﺔ ﻣﺴﺮﺡ ﺍﳉﺮﳝﺔ ﻭﺍﻟﺘﻌﺮﻑ ﻋﻠﻰ ﺃﻧﻈﻤﺔ ﺍﳊﻤﺎﻳﺔ‬
‫ﻭﲢﺪﻳﺪ ﻣﺼﺪﺭ ﺍﳋﻄﺮ ﻭﻭﺿﻊ ﺍﻟﺘﺼﻮﺭﺍﺕ ﺍﻟﻜﻔﻴﻠﺔ ﻟﻠﺘﺼﺪﻱ ﻟﻠﺠﺮﳝﺔ‪.‬‬
‫‪ -‬ﺍﻟﺘﺨﻄﻴﻂ ﺍﻟﻔﲏ ﻟﻠﺘﺤﻘﻴﻖ ﻭﺫﻟﻚ ﻣﻦ ﺃﺟﻞ ﺍﻟﻮﺻﻮﻝ ﺇﱃ ﺃﻓﻀﻞ ﺍﻟﻄﺮﻕ ﻭﺍﻷﺳﺎﻟﻴﺐ ﻟﻠﺘﻌﺎﻣﻞ ﻣﻊ ﻫﺬﻩ‬
‫ﺍﳉﺮﺍﺋﻢ ﺑﺎﻟﺘﻔﺼﻴﻞ ﻭﺍﻟﻮﺿﻮﺡ‪.‬‬
‫‪ -‬ﻋﻤﻞ ﺩﺭﺍﺳﺔ ﻭﺍﻓﻴﺔ ﻭﺟﺎﺩﺓ ﻟﻜﺎﻓﺔ ﺇﺟﺮﺍﺀﺍﺕ ﺍﻟﺘﺤﻘﻴﻖ ﺿﻤﻦ ﺍﳋﻄﺔ ﺍﳌﺴﺒﻘﺔ ﺍﻟﱵ ﰎ ﻭﺿﻌﻬﺎ ﻭﻧﺎﻗﺸﻬﺎ‬
‫ﺍﻟﻌﺎﻣﻠﻮﻥ ﰲ ﻓﺮﻳﻖ ﺍﻟﺘﺤﻘﻴﻖ‪.‬‬
‫‪ -‬ﺗﻨﺴﻴﻖ ﺟﻬﻮﺩ ﺍﻟﻔﺮﻳﻖ ﺍﻟﻘﺎﺋﻢ ﺑﺎﻟﺘﺤﻘﻴﻖ ﻟﺘﺴﻬﻴﻞ ﻣﻬﻤﺘﻬﻢ ﻭﻋﻤﻠﻬﻢ ﻭﺗﻘﻠﻴﻞ ﺍﻵﺛﺎﺭ ﺍﻟﺴﻠﺒﻴﺔ ﻭﺍﻹﺳﺮﺍﻉ‬
‫ﰲ ﺇﳒﺎﺯ ﺍﻟﻌﻤﻞ ﻭﻫﻮ ﻣﺎ ﻳﺆﺩﻱ ﺇﱃ ﺿﻤﺎﻥ ﻣﺴﺘﻮﻯ ﺟﻴﺪ ﻣﻦ ﺍﻷﺩﺍﺀ‪.‬‬
‫‪ -‬ﲢﺪﻳﺪ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳌﺴﺒﻘﺔ ﻭﺍﻟﱵ ﻣﻦ ﺷﺄ‪‬ﺎ ﺍﻟﺘﻘﻠﻴﻞ ﻣﻦ ﺍﻷﺧﻄﺎﺀ ﺍﻟﻔﺮﺩﻳﺔ ﺍﻟﱵ ﻗﺪ ﺗﻨﺘﺞ ﻋﻦ ﻗﻠﺔ‬
‫ﺍﳋﱪﺓ ﺃﻭ ﻧﻘﺺ ﺍﳌﻌﺮﻓﺔ‪ ،‬ﻭﺑﺎﻟﺘﺎﱄ ﺗﺴﺎﻋﺪ ﻋﻠﻰ ﺇﳚﺎﺩ ﺩﺭﺟﺔ ﺟﻴﺪﺓ ﻣﻦ ﺍﻟﺘﻘﻴﺪ ﺑﺎﳌﺴﺘﻮﻯ ﺍﳌﻄﻠﻮﺏ ﻣﻊ‬
‫ﺿﻤﺎﻥ ﺃﻥ ﺍﳋﻄﻮﺍﺕ ﺍﻟﱵ ﻳﻘﻮﻡ ‪‬ﺎ ﺍﶈﻘﻖ ﺧﻼﻝ ﲨﻴﻊ ﻣﺮﺍﺣﻞ ﺍﻟﺘﺤﻘﻴﻖ ﺗﺴﻴﲑ ﺿﻤﻦ ﺍﻟﻀﻮﺍﺑﻂ‬
‫) ‪(1‬‬
‫ﺍﻟﺘﺸﺮﻳﻌﻴﺔ ﻭﺗﻘﻠﻞ ﻣﻦ ﺍﻷﺧﻄﺎﺀ ﺍﻟﱵ ﻗﺪ ﺗﻀﺮ ﺑﺎﻟﻘﻀﻴﺔ ﰲ ﻣﺮﺣﻠﺔ ﺍﶈﺎﻛﻤﺔ‪.‬‬
‫ﻭﳚﺐ ﺃﻥ ﺗﺮﺗﻜﺰ ﺧﻄﺔ ﺍﻟﻌﻤﻞ ﻋﻠﻰ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻟﺒﻨﻮﺩ ﺍﻷﺳﺎﺳﻴﺔ ﻳﺘﻢ ﺍﻹﺭﺗﻜﺎﺯ ﻋﻠﻴﻬﺎ ﺃﺛﻨﺎﺀ ﺗﻨﻔﻴﺬ‬
‫ﺍﳋﻄﺔ‪ ،‬ﻭﻫﻲ ﺃﻥ ﻳﺘﻢ ﺗﻌﻴﲔ ﺍﻷﺷﺨﺎﺹ ﺍﻟﺬﻳﻦ ﺳﻴﺘﻢ ﺍﻟﺘﺤﻘﻴﻖ ﻣﻌﻬﻢ ﻭﲢﺪﻳﺪ ﺍﻟﻨﻘﺎﻁ ﺍﻟﱵ ﳚﺐ‬

‫)‪(1‬ﳏﻤﺪ ﻧﺼﲑ ﺍﻟﺴﺮﺣﺎﱐ‪،‬ﻣﻬﺎﺭﺍﺕ ﺍﻟﺘﺤﻘﻴﻖ ﺍﳉﻨﺎﺋﻲ ﺍﻟﻔﲏ ﰲ ﺟﺮﺍﺋﻢ ﺍﳊﺎﺳﻮﺏ ﻭ ﺍﻻﻧﺘﺮﻧﺎﺕ‪،‬ﺭﺳﺎﻟﺔ ﻣﺎﺟﻴﺴﺘﺎﺭ‪ .‬ﺟﺎﻣﻌﺔ ﻧﺎﻳﻒ ﺍﻟﻌﺮﺑﻴﺔ ﻟﻠﻌﻠﻮﻡ ﺍﻻﻣﻨﻴﺔﺍﻟﺮﻳﺎﺽ‬
‫‪ 2004‬ﺹ‪.72‬‬

‫‪- 110 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺇﺳﺘﻀﺎﺣﻬﺎ ﻣﻌﻬﻢ ﻭﺗﻘﺪﻳﺮ ﻣﺪﻯ ﺍﳊﺎﺟﺔ ﻟﻺﺳﺘﻌﺎﻧﺔ ﺑﺒﻌﺾ ﺍﻟﻔﻨﻴﲔ ﺍﻟﻼﺯﻡ ﺗﻮﺍﻓﺮﻫﻢ ﻹﺳﺘﻜﻤﺎﻝ‬
‫ﺍﻟﺘﺤﻘﻴﻖ‪(1)،‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﻣﺮﺍﻋﺎﺓ ﺍﻟﻈﺮﻭﻑ ﻭﺍﳌﻼﺑﺴﺎﺕ ﺍﶈﻴﻄﺔ ﺑﺎﻟﻮﺍﻗﻌﺔ ﺫﻟﻚ ﺃﻥ ﻣﻦ ﻫﺬﻩ ﺍﻟﻈﺮﻭﻑ ﻣﺎ‬
‫ﻳﺸﻤﻞ ﻋﻮﺍﻣﻞ ﻣﻬﻤﺔ ﳚﺐ ﻣﺮﺍﻋﺎ‪‬ﺎ ﻋﻨﺪ ﻭﺿﻊ ﺧﻄﺔ ﺍﻟﻌﻤﻞ ﻭﻣﻨﻬﺎ‪:‬‬
‫‪ -‬ﻣﺪﻯ ﺃﳘﻴﺔ ﺍﻷﺟﻬﺰﺓ ﻭﺍﻟﺸﺒﻜﺎﺕ ﺍﳌﺘﻀﺮﺭﺓ ﻟﻌﻤﻞ ﺍﳌﻨﻈﻤﺔ‪.‬‬
‫‪ -‬ﻣﺪﻯ ﺣﺴﺎﺳﻴﺔ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻟﱵ ﳛﺘﻤﻞ ﺳﺮﻗﺘﻬﺎ ﺃﻭ ﺇﺗﻼﻓﻬﺎ‪.‬‬
‫‪ -‬ﻣﺴﺘﻮﻯ ﺍﻹﺧﺘﺮﺍﻕ ﺍﻷﻣﲏ ﺍﻟﺬﻱ ﺗﺴﺒﺐ ﻓﻴﻪ ﺍﳉﺎﱐ‪.‬‬
‫ﰒ ﺑﻌﺪ ﺫﻟﻚ ﻭﺿﻊ ﺍﻷﺳﻠﻮﺏ ﺍﻷﻣﺜﻞ ﻟﻌﻤﻠﻴﺔ ﺍﻟﺘﻔﺘﻴﺶ ﻭﺫﻟﻚ ﻣﻦ ﺧﻼﻝ ﲢﺪﻳﺪ ﻧﻮﻉ ﺍﻷﺩﻟﺔ ﺍﻟﱵ‬
‫ﻳﺮﻳﺪ ﻓﺮﻳﻖ ﺍﻟﺘﺤﻘﻴﻖ ﺍﻟﺒﺤﺚ ﻋﻨﻬﺎ‪.‬‬
‫‪/2‬ﺗﺸﻜﻴﻞ ﻓﺮﻳﻖ ﺍﻟﺘﺤﻘﻴﻖ‪ :‬ﺇﻥ ﺍﻟﺘﺤﻘﻴﻖ ﺍﻹﺑﺘﺪﺍﺋﻲ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻳﻜﻮﻥ ﻏﺎﻟﺒﺎ ﺃﻛﱪ ﻣﻦ‬
‫ﺃﻥ ﻳﺘﻮﻻﻩ ﺷﺨﺺ ﻭﺍﺣﺪ ﲟﻔﺮﺩﻩ‪ ،‬ﺣﱴ ﻭﻟﻮ ﻛﺎﻧﺖ ﺍﳌﻀﺒﻮﻃﺎﺕ ﻫﻲ ﳎﺮﺩ ﺣﺎﺳﺐ ﺷﺨﺼﻲ ﻭﺍﺣﺪ‪،‬‬
‫ﻭﻟﺬﻟﻚ ﻓﺈﻧﻪ ﻳﻔﻀﻞ ﺃﻥ ﻳﺘﻌﺎﻭﻥ ﻋﺪﺓ ﳏﻘﻘﲔ ﰲ ﺇﳒﺎﺯ ﻣﻬﻤﺔ ﺍﻟﺘﺤﻘﻴﻖ ﻭﺍﻟﻌﺜﻮﺭ ﻋﻠﻰ ﺍﻷﺩﻟﺔ‪.‬‬
‫ﻭﳚﺐ ﺃﻥ ﻳﺘﺸﻜﻞ ﻓﺮﻳﻖ ﺍﻟﺘﺤﻘﻴﻖ ﻣﻦ ﻓﻨﻴﲔ ﻭﺃﺧﺼﺎﺋﻴﲔ ﺫﻭﻱ ﺧﱪﺓ ﰲ ﳎﺎﻝ ﺍﳊﺎﺳﻮﺏ‬
‫ﻭﺍﻷﻧﺘﺮﻧﺎﺕ‪ ،‬ﻭﳝﺘﺎﺯﻭﻥ ﲟﻬﺎﺭﺍﺕ ﰲ ﺍﻟﺘﺤﻘﻴﻖ ﺍﳉﻨﺎﺋﻲ ﺑﺸﻜﻞ ﻋﺎﻡ ﻭﺍﻟﺘﺤﻘﻴﻖ ﺍﳉﻨﺎﺋﻲ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺑﺸﻜﻞ‬
‫ﺧﺎﺹ‪ .‬ﻭﳍﺆﻻﺀ ﺍﶈﻘﻘﲔ ﺃﻥ ﻳﺴﺘﻌﻴﻨﻮﺍ ﲞﱪﺍﺀ ﰲ ﳎﺎﻝ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻷﻧﺘﺮﻧﺎﺕ ﻟﻴﺘﻤﻜﻨﻮﺍ ﻣﻦ ﻓﻚ‬
‫) ‪(2‬‬
‫ﺍﻟﺘﻌﻘﻴﺪﺍﺕ ﺍﻟﱵ ﺗﻔﺮﺿﻬﺎ ﻇﺮﻭﻑ ﻭﻣﻼﺑﺴﺎﺕ ﻛﻞ ﺟﺮﳝﺔ‪.‬‬
‫ﻭﺇﻥ ﻛﺎﻥ ﺃﺳﻠﻮﺏ ﻋﻤﻞ ﺍﻟﻔﺮﻳﻖ ﻳﺴﺘﺨﺪﻡ ﰲ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﻛﺜﲑ ﻣﻦ ﺃﻧﻮﺍﻉ ﺍﳉﺮﺍﺋﻢ ﺇﻻ ﺃﻧﻪ ﻳﺄﺧﺬ‬
‫ﺃﳘﻴﺔ ﺧﺎﺻﺔ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﳌﺎ ﺗﺘﻄﻠﺒﻪ ﻣﻦ ﻣﻬﺎﺭﺍﺕ ﻓﻨﻴﺔ ﻭﺧﱪﺍﺕ ﻣﺘﻨﻮﻋﺔ ﻗﺪ ﻻ ﺗﺘﻮﺍﻓﺮ ﻟﺪﻯ‬
‫ﺍﶈﻘﻘﲔ‪ ،‬ﻭﺑﺬﻟﻚ ﻳﻜﻮﻥ ﺗﺸﻜﻴﻞ ﻓﺮﻳﻖ ﺧﺎﺹ ﺑﺎﻟﺘﺤﻘﻴﻖ ﰲ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺃﻣﺮﺍ ﺿﺮﻭﺭﻳﺎ‪.‬ﻭﻣﻦ‬
‫ﺍﻟﻨﺎﺣﻴﺔ ﺍﻟﻌﻤﻠﻴﺔ ﻏﺎﻟﺒﺎ ﻣﺎ ﻳﺘﻜﻮﻥ ﻓﺮﻳﻖ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ‪:‬‬
‫‪ -‬ﺍﶈﻘﻖ ﺍﻟﺮﺋﻴﺴﻲ ﻭﻳﻜﻮﻥ ﳑﻦ ﳍﻢ ﺧﱪﺓ ﰲ ﺍﻟﺘﺤﻘﻴﻖ ﺍﳉﻨﺎﺋﻲ‪.‬‬
‫‪ -‬ﺧﱪﺍﺀ ﺍﳊﺎﺳﻮﺏ ﻭﺷﺒﻜﺎﺕ ﺍﻷﻧﺘﺮﻧﺎﺕ ﺍﻟﺬﻳﻦ ﻳﻌﺮﻓﻮﻥ ﻇﺮﻭﻑ ﺍﳊﺎﺩﺙ ﻭﻛﻴﻔﻴﺔ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻊ‬
‫ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ‪.‬‬

‫)‪(1‬ﻫﺸﺎﻡ ﺭﺳﺘﻢ‪ ،‬ﺍﳉﻮﺍﻧﺐ ﺍﻹﺟﺮﺍﺋﻴﺔ ﻟﻠﺠﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻣﻜﺘﺒﺔ ﺍﻵﻻﺕ ﺍﳊﺪﻳﺜﺔ‪ ،‬ﺃﺳﻴﻮﻁ ‪ ،2000‬ﺹ‪.59‬‬
‫)‪(2‬ﻋﺒﺪ ﺍﷲ ﺣﺴﲔ ﳏﻤﻮﺩ‪ ،‬ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻷﺩﻟﺔ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪،‬ﻣﺆﲤﺮ ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻭﺍﻻﻣﻨﻴﺔ ﻟﻠﻌﻤﻠﻴﺎﺕ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ‪.‬ﺩﰊ ‪ 2003‬ﺹ‪.612‬‬

‫‪- 111 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪ -‬ﺧﱪﺍﺀ ﺿﺒﻂ ﻭﲢﺮﻳﺮ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺍﻟﻌﺎﺭﻓﲔ ﺑﺄﻣﻮﺭ ﺗﻔﺘﻴﺶ ﺍﳊﺎﺳﻮﺏ‪.‬‬


‫‪ -‬ﺧﱪﺍﺀ ﺃﻧﻈﻤﺔ ﺍﳊﺎﺳﻮﺏ ﺍﻟﺬﻳﻦ ﻳﺘﻌﺎﻣﻠﻮﻥ ﻣﻊ ﺍﻷﻧﻈﻤﺔ ﺍﻟﱪﳎﻴﺔ‪.‬‬
‫‪ -‬ﺧﱪﺍﺀ ﺍﻟﺘﺼﻮﻳﺮ ﻭﺍﻟﺒﺼﻤﺎﺕ ﻭﺍﻟﺮﺳﻢ ﺍﻟﺘﺨﻄﻴﻄﻲ)‪.(1‬‬
‫ﻭﰲ ﻫﺬﺍ ﺍﻹﻃﺎﺭ ﳒﺪ ﺃﻥ ﺍﻟﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻗﺪ ﺃﺷﺎﺭ ﺇﱃ ﻣﺴﺄﻟﺔ ﺇﻣﻜﺎﻧﻴﺔ ﺇﺳﺘﻌﺎﻧﺔ‬
‫ﺍﳉﻬﺎﺕ ﺍﳌﻜﻠﻔﺔ ﺑﺎﻟﺘﺤﻘﻴﻖ ﺑﺎﳋﱪﺍﺀ ﺍﳌﺘﺨﺼﺼﲔ ﰲ ﳎﺎﻝ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻟﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﻣﻦ ﺍﻟﺬﻳﻦ ﳍﻢ‬
‫ﺩﺭﺍﻳﺔ ﺑﻌﻤﻞ ﺍﳌﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻭ ﳑﻦ ﳍﻢ ﺩﺭﺍﻳﺔ ﺑﺎﻟﺘﺪﺍﺑﲑ ﺍﳌﺘﺨﺬﺓ ﳊﻤﺎﻳﺔ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﺫﻟﻚ‬
‫) ‪(2‬‬
‫ﺑﻐﺮﺽ ﻣﺴﺎﻋﺪﺓ ﺟﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺇﳒﺎﺯ ﻣﻬﻤﺘﻬﺎ ﻭﺗﺰﻭﻳﺪﻫﺎ ﺑﺎﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﻀﺮﻭﺭﻳﺔ ﻟﺬﻟﻚ‬
‫ﺛﺎﻧﻴﺎ‪ :‬ﺍﻟﻌﻨﺎﺻﺮ ﺍﻷﺳﺎﺳﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﺍﻹﺑﺘﺪﺍﺋﻲ ﰲ ﳎﺎﻝ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ :‬ﻭﻧﻘﺼﺪ ‪‬ﺎ ﺗﻠﻚ‬
‫ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﻟﱵ ﺗﺴﺘﻌﻤﻞ ﻣﻦ ﻃﺮﻑ ﺟﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﺃﺛﻨﺎﺀ ﺗﻨﻔﻴﺬ ﻃﺮﻕ ﺍﻟﺘﺤﻘﻴﻖ ﺍﻟﺜﺎﺑﺘﺔ ﻭﺍﶈﺪﺩﺓ ﺍﻟﱵ‬
‫ﺗﺜﺒﺖ ﻭﻗﻮﻉ ﺍﳉﺮﳝﺔ ﻭﲢﺪﺩ ﺷﺨﺼﻴﺔ ﻣﺮﺗﻜﺒﻬﺎ‪ ،‬ﻭﻫﻨﺎﻙ ﺇﺟﺮﺍﺀﺍﺕ ﻭﺇﺣﺘﻴﺎﻃﺎﺕ ﻳﺘﻌﲔ ﻋﻠﻰ ﺍﻟﻀﺒﻄﻴﺔ‬
‫ﺍﻟﻘﻀﺎﺋﻴﺔ ﻣﺮﺍﻋﺎ‪‬ﺎ ﻗﺒﻞ ﺍﻟﺒﺪﺀ ﰲ ﻋﻤﻠﻴﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﺍﻹﺑﺘﺪﺍﺋﻲ ﻭﺇﺟﺮﺍﺀﺍﺕ ﺃﺧﺮﻯ ﳚﺐ ﻋﻠﻰ ﺍﻟﻀﺒﻄﻴﺔ‬
‫ﺍﻟﻘﻀﺎﺋﻴﺔ ﻣﺮﺍﻋﺎ‪‬ﺎ ﺃﺛﻨﺎﺀ ﺍﻟﺘﺤﻘﻴﻖ ﺍﻹﺑﺘﺪﺍﺋﻲ)‪.(3‬‬
‫‪/1‬ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﻟﱵ ﳚﺐ ﻣﺮﺍﻋﺎ‪‬ﺎ ﻗﺒﻞ ﺍﻟﺒﺪﺀ ﰲ ﺍﻟﺘﺤﻘﻴﻖ‪ :‬ﻭﳝﻜﻦ ﺃﻥ ﻧﺴﺮﺩ ﺍﻷﻫﻢ ﻣﻨﻬﺎ ﻛﻤﺎ‬
‫ﻳﺄﰐ‪:‬‬
‫‪ -‬ﲢﺪﻳﺪ ﻧﻮﻉ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ﻓﻬﻞ ﻫﻮ ﻛﻮﻣﺒﻴﻮﺗﺮ ﻣﻌﺰﻭﻝ ﺃﻡ ﻣﺘﺼﻞ ﺑﺸﺒﻜﺔ ﻣﻌﻠﻮﻣﺎﺕ‪.‬‬
‫‪ -‬ﻭﺿﻊ ﳐﻄﻂ ﺗﻔﺼﻴﻠﻲ ﻟﻠﻤﻨﺸﺄﺓ ﺍﻟﱵ ﻭﻗﻌﺖ ‪‬ﺎ ﺍﳉﺮﳝﺔ ﻣﻊ ﻛﺸﻒ ﺗﻔﺼﻴﻠﻲ ﻋﻦ ﺍﳌﺴﺆﻭﻟﲔ ‪‬ﺎ ﻭﺩﻭﺭ‬
‫ﻛﻞ ﻣﻨﻬﻢ‪.‬‬
‫‪ -‬ﺇﺫﺍ ﻭﻗﻌﺖ ﺍﳉﺮﳝﺔ ﻋﻠﻰ ﺷﺒﻜﺔ ﻓﺈﻧﻪ ﳚﺐ ﺣﺼﺮ ﻃﺮﻓﻴﺎﺕ ﺍﻹﺗﺼﺎﻝ ‪‬ﺎ ﺃﻭ ﻣﻨﻬﺎ ﳌﻌﺮﻓﺔ ﺍﻟﻄﺮﻳﻘﺔ ﺍﻟﱵ‬
‫ﲤﺖ ‪‬ﺎ ﻋﻤﻠﻴﺔ ﺍﻹﺧﺘﺮﺍﻕ ﻣﻦ ﻋﺪﻣﻪ‪ ،‬ﻭﻫﻞ ﻫﻨﺎﻙ ﺣﻮﺍﺳﻴﺐ ﺁﻟﻴﺔ ﺧﺎﺭﺝ ﻫﺬﻩ ﺍﳌﺸﻜﻠﺔ ﻭﳍﺎ ﺇﻣﻜﺎﻧﻴﺔ‬
‫ﺍﻹﺗﺼﺎﻝ ‪‬ﺎ ﺃﻡ ﻻ؟‬
‫‪ -‬ﻣﺮﺍﻋﺎﺓ ﺻﻌﻮﺑﺔ ﺑﻘﺎﺀ ﺍﻟﺪﻟﻴﻞ ﻓﺘﺮﺓ ﻃﻮﻳﻠﺔ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫)‪(1‬ﻋﺒﺪ ﺍﷲ ﳏﻤﻮﺩ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.613‬‬


‫)‪(2‬ﺃﻧﻈﺮ ﺍﳌﺎﺩﺓ ‪ 05‬ﺍﻟﻔﻘﺮﺓ ﺍﻷﺧﲑﺓ ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﺍﳌﺘﻀﻤﻦ ﺍﻟﻘﻮﺍﻋﺪ ﺍﳋﺎﺻﺔ ﻟﻠﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭ ﺍﻹﺗﺼﺎﻝ ﻭ‬
‫ﻣﻜﺎﻓﺤﺘﻬﺎ‪.‬‬
‫)‪(3‬ﲨﻴﻞ ﻋﺒﺪ ﺍﻟﺒﺎﻗﻲ ﺍﻟﺼﻐﲑ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪ 119‬ﻭﺩ‪ .‬ﻋﺒﺪ ﺍﻟﻔﺘﺎﺡ ﺑﻴﻮﻣﻲ ﺣﺠﺎﺯﻱ‪ ،‬ﺍﻟﺪﻟﻴﻞ ﺍﳉﻨﺎﺋﻲ ﻭﺍﻟﺘﺰﻭﻳﺮ ﺍﳌﻌﻠﻮﻣﺎﰐ‪ ،‬ﺩﺍﺭ ﺍﻟﻜﺘﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍ‪‬ﻠﺔ‬
‫ﺍﻟﻜﱪﻯ‪ ،‬ﻁ‪ ،1‬ﺹ‪ 84‬ﻭﻛﺬﻟﻚ ﺩ‪.‬ﳏﻤﺪ ﺍﻷﻣﲔ ﺍﻟﺸﱪﻱ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.50‬‬

‫‪- 112 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪ -‬ﻣﺮﺍﻋﺎﺓ ﺃﻥ ﺍﳉﺎﱐ ﻗﺪ ﻳﺘﺪﺧﻞ ﻣﻦ ﺧﻼﻝ ﺍﻟﺸﺒﻜﺔ ﻹﺗﻼﻑ ﻛﻞ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺨﺰﻧﺔ‪.‬‬


‫‪ -‬ﳚﺐ ﻓﺼﻞ ﺍﻟﺘﻴﺎﺭ ﺍﻟﻜﻬﺮﺑﺎﺋﻲ ﻋﻦ ﻣﻮﻗﻊ ﺍﳌﻌﺎﻳﻨﺔ ﺃﻭ ﲨﻊ ﺍﻹﺳﺘﺪﻻﻻﺕ ﻟﺸﻞ ﻓﺎﻋﻠﻴﺔ ﺍﳉﺎﱐ ﰲ ﺃﻥ‬
‫ﻳﻘﻮﻡ ﺑﻄﺮﻳﻘﺔ ﻣﺎ ﲟﺤﻮ ﺁﺛﺎﺭ ﺟﺮﳝﺘﻪ‪.‬‬
‫‪ -‬ﻓﺼﻞ ﺧﻄﻮﻁ ﺍﳍﺎﺗﻒ ﺣﱴ ﻻ ﻳﺴﻲﺀ ﺍﳉﺎﱐ ﺇﺳﺘﺨﺪﺍﻣﻬﺎ‪ ،‬ﻭﺍﻟﺘﺤﻔﻆ ﻋﻠﻰ ﺍﳍﻮﺍﺗﻒ ﺍﶈﻤﻮﻟﺔ ﻣﻦ ﻗﺒﻞ‬
‫ﺍﻵﺧﺮﻳﻦ ﺍﻟﺬﻳﻦ ﻻ ﻋﻼﻗﺔ ﳍﻢ ﺑﻌﻤﻠﻴﺔ ﺍﻟﺘﺤﻘﻴﻖ ﻷ‪‬ﻢ ﻗﺪ ﻳﺴﻴﺌﻮﻥ ﺇﺳﺘﺨﺪﺍﻣﻬﺎ ﻟﻄﻤﺲ ﺍﻟﺒﻴﺎﻧﺎﺕ‪.‬‬
‫‪ -‬ﺍﻟﺘﺄﻛﺪ ﻣﻦ ﺃﻥ ﺧﻂ ﺍﳍﺎﺗﻒ ﳜﺺ ﺍﳊﺎﺳﻮﺏ ﳏﻞ ﺍﳉﺮﳝﺔ‪ ،‬ﺫﻟﻚ ﺃﻧﻪ ﻣﻦ ﺍﳋﺪﻉ ﺍﻟﱵ ﻳﺴﺘﻌﻤﻠﻬﺎ ﺍﳉﺎﱐ‬
‫ﻋﻨﺪ ﺍﻹﺧﺘﺮﺍﻕ ﺃﻥ ﻳﺘﻢ ﺫﻟﻚ ﲞﻂ ﻫﺎﺗﻔﻲ ﻣﺴﺮﻭﻕ ﻋﻦ ﻃﺮﻳﻖ ﺍﻟﺪﺧﻮﻝ ﺇﱃ ﺷﺒﻜﺔ ﺍﳍﺎﺗﻒ ﻭﺍﻟﺘﻼﻋﺐ‬
‫ﻓﻴﻬﺎ ﻭﺗﻀﻠﻴﻞ ﺃﺟﻬﺰﺓ ﺍﳌﺮﺍﻗﺒﺔ ﻭﺃﺟﻬﺰﺓ ﺍﻟﺘﺤﻘﻴﻖ ﺑﻌﺪ ﺫﻟﻚ‪.‬‬
‫‪ -‬ﺇﺑﻌﺎﺩ ﺍﳌﻮﻇﻔﲔ ﻋﻦ ﺃﺟﻬﺰﺓ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﺑﻌﺪ ﺍﳊﺼﻮﻝ ﻣﻨﻬﻢ ﻋﻠﻰ ﻛﻠﻤﺔ ﺍﻟﺴﺮ ﻭﻛﺬﺍ ﺍﻟﺸﻔﺮﺍﺕ ﰲ‬
‫ﺣﺎﻟﺔ ﻭﺟﻮﺩﻫﺎ‪.‬‬
‫‪ -‬ﺗﺼﻮﻳﺮ ﺍﻷﺟﻬﺰﺓ ﺍﳌﺴﺘﻬﺪﻓﺔ) ﺍﻟﱵ ﻭﻗﻌﺖ ‪‬ﺎ ﺃﻭ ﻋﻠﻴﻬﺎ ﺍﳉﺮﳝﺔ( ﻣﻦ ﺍﻷﻣﺎﻡ ﻭﺍﳋﻠﻒ ﻭﺫﻟﻚ ﻹﺛﺒﺎﺕ‬
‫ﺃ‪‬ﺎ ﻛﺎﻧﺖ ﺗﻌﻤﻞ ﻭﻛﺬﻟﻚ ﻟﻠﻤﺴﺎﻋﺪﺓ ﰲ ﺇﻋﺎﺩﺓ ﺗﺮﻛﻴﺒﻪ ﻣﻦ ﺃﺟﻞ ﺍﻟﺒﺪﺀ ﰲ ﺇﺟﺮﺍﺀﺍﺕ ﺍﻟﺘﺤﻘﻴﻖ‪.‬‬
‫‪/2‬ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﻟﱵ ﳚﺐ ﻣﺮﺍﻋﺎ‪‬ﺎ ﺃﺛﻨﺎﺀ ﺍﻟﺘﺤﻘﻴﻖ‪ :‬ﻋﻨﺪ ﺍﻟﺒﺪﺀ ﰲ ﻋﻤﻠﻴﺔ ﺍﻟﺘﺤﻘﻴﻖ ﺍﻹﺑﺘﺪﺍﺋﻲ‬
‫ﺳﻴﻤﺎ ﻋﻨﺪ ﺍﻟﻘﻴﺎﻡ ﺑﻌﻤﻠﻴﺔ ﺗﻔﺘﻴﺶ ﺟﻬﺎﺯ ﺍﳊﺎﺳﻮﺏ ﻓﺈﻧﻪ ﻋﻠﻰ ﺭﺟﺎﻝ ﺍﻟﻀﺒﻄﻴﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻭﺑﺮﻓﻘﺘﻬﻢ ﺍﳋﱪﺍﺀ‬
‫ﺍﻟﺬﻳﻦ ﻳﺴﺘﻌﻴﻨﻮﻥ ‪‬ﻢ ﻣﺮﺍﻋﺎﺓ ﻣﺎ ﻳﻠﻲ‪:‬‬
‫‪ -‬ﻋﻤﻞ ﻧﺴﺨﺔ ﺇﺣﺘﻴﺎﻃﻴﺔ ﻣﻦ ﺍﻷﻗﺮﺍﺹ ﺍﻟﺼﻠﺒﺔ ﺃﻭ ﺍﻷﺳﻄﻮﺍﻧﺔ ﺍﳌﺮﻧﺔ ﻗﺒﻞ ﺇﺳﺘﺨﺪﺍﻣﻬﺎ ﻭﺍﻟﺘﺄﻛﺪ ﻓﻨﻴﺎ ﻣﻦ‬
‫ﺩﻗﺔ ﺍﻟﻨﺴﺦ ﻋﻦ ﻃﺮﻳﻖ ﺍﻷﻣﺮ)‪.(disk comp‬‬
‫‪ -‬ﻧﺰﻉ ﻏﻄﺎﺀ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﺍﳌﺴﺘﻬﺪﻑ ﻭﺍﻟﺘﺄﻛﺪ ﻣﻦ ﻋﺪﻡ ﻭﺟﻮﺩ ﺃﻗﺮﺍﺹ ﺻﻠﺒﺔ ﺇﺿﺎﻓﻴﺔ‪.‬‬
‫‪ -‬ﺃﻥ ﻳﻜﻮﻥ ﺍﳍﺪﻑ ﻣﻦ ﻧﺴﺦ ﳏﺘﻮﻯ ﺍﻷﺳﻄﻮﺍﻧﺔ ﻭﺍﻷﻗﺮﺍﺹ ﲢﻠﻴﻞ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﻮﺟﻮﺩﺓ ‪‬ﺎ ﺑﻐﺮﺽ‬
‫ﺍﻟﺘﻮﺻﻞ ﺇﱃ ﻣﻌﺮﻓﺔ ﺍﳌﻠﻔﺎﺕ ﺍﳌﻤﺴﻮﺣﺔ‪ ،‬ﻭﳝﻜﻦ ﺇﺳﺘﻌﺎﺩ‪‬ﺎ ﻣﻦ ﺳﻠﺔ ﺍﳌﻬﻤﻼﺕ ﻣﻊ ﻣﻼﺣﻈﺔ ﺃﻥ ﻫﻨﺎﻙ‬
‫ﺑﻌﺾ ﺍﳌﻠﻔﺎﺕ ﺍﻟﱵ ﺇﻥ ﻣﺴﺤﺖ ﻭﺿﻐﻂ ﻋﻠﻰ ﺃﺯﺭﺍﺭ ﻣﻌﻴﻨﺔ ﻣﺜﻞ ‪Shift delete‬ﰲ ﻭﻗﺖ ﻭﺍﺣﺪ ﻻ ﳝﻜﻦ‬
‫ﺇﺳﺘﻌﺎﺩ‪‬ﺎ ﻭﻛﺬﺍ ﻣﻦ ﺃﺟﻞ ﻣﻌﺮﻓﺔ ﺍﳌﻠﻔﺎﺕ ﺍﳋﻔﻴﺔ ﺍﳌﺨﺰﻧﺔ ﰲ ﺫﺍﻛﺮﺓ ﺍﳊﺎﺳﻮﺏ‪.‬‬
‫‪ -‬ﺍﻟﻌﻤﻞ ﻋﻠﻰ ﻓﺤﺺ ﺍﻟﱪﺍﻣﺞ ﻭﺗﻄﺒﻴﻘﺎ‪‬ﺎ ﻣﺜﻞ ﺍﻟﱪﺍﻣﺞ ﺍﳊﺴﺎﺑﻴﺔ ﺍﻟﱵ ﺗﻜﻮﻥ ﻗﺪ ﺇﺳﺘﺨﺪﻣﺖ ﰲ ﺟﺮﳝﺔ‬
‫ﺇﺧﺘﻼﺱ ﻣﻌﻠﻮﻣﺎﰐ‪.‬‬

‫‪- 113 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪ -‬ﺍﻟﻌﻤﻞ ﻋﻠﻰ ﻓﺤﺺ ﺍﻟﻌﻼﻗﺔ ﺑﲔ ﺑﺮﺍﻣﺞ ﺍﻟﺘﻄﺒﻴﻘﺎﺕ ﻭﺍﳌﻠﻔﺎﺕ ﺧﺎﺻﺔ ﺗﻠﻚ ﺍﻟﱵ ﺗﺘﻌﻠﻖ ﺑﺪﺧﻮﻝ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺧﺮﻭﺟﻬﺎ‪.‬‬
‫‪ -‬ﺣﻔﻆ ﺍﳌﻌﺪﺍﺕ ﻭﺍﻷﺟﻬﺰﺓ ﺍﻟﱵ ﺗﻀﺒﻂ ﺑﻄﺮﻳﻘﺔ ﻓﻨﻴﺔ ﻭﺳﻠﻴﻤﺔ‪.‬‬

‫‪- 114 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺧﺼﺎﺋﺺ ﺍﶈﻘـﻖ ﺍﳌﻌﻠﻮﻣـﺎﰐ‪:‬‬

‫ﺃﻣﺎﻡ ﺍﻟﺘﻄﻮﺭ ﺍﻟﺘﻘﲏ ﻭﺍﻟﺘﻜﻨﻮﻟﻮﺟﻲ ﺍﻟﺬﻱ ﺻﺎﺣﺐ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻓﺈﻥ ﺍﳌﺨﺘﺼﺼﲔ ﺑﺎﻟﺘﺤﻘﻴﻖ‬
‫ﻓﻴﻬﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﻹﺟﺮﺍﻡ ﺍﳌﺴﺘﺤﺪﺙ ﳜﺘﻠﻔﻮﻥ ﻋﻦ ﺃﻭﻻﺋﻚ ﺍﳌﺨﺘﺼﲔ ﺑﻀﺒﻂ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻣﻦ‬
‫ﺣﻴﺚ ﺍﳋﺼﺎﺋﺺ ﻭﻃﺮﻳﻘﺔ ﺍﻟﺘﻜﻮﻳﻦ‪ ،‬ﺫﻟﻚ ﺃﻥ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻻ ﻳﻌﺘﻤﺪ ﻋﻠﻰ ﺍﻟﺘﺪﺭﻳﺒﺎﺕ‬
‫ﺍﳉﺴﺪﻳﺔ ﺍﻟﱵ ﻳﺘﻠﻘﺎﻫﺎ ﻋﺎﺩﺓ ﺭﺟﺎﻝ ﺍﻟﻀﺒﻄﻴﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻭﺇﳕﺎ ﻳﻌﺘﻤﺪ ﻋﻠﻰ ﺍﻟﺒﻨﺎﺀ ﺍﻟﻌﻠﻤﻲ ﻭﺍﻟﺘﻜﻨﻮﻟﻮﺟﻲ‬
‫ﻭﻫﻢ ﻳﺘﻮﻟﻮﻥ ﻣﻬﻤﺔ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻛﺸﻒ ﺍﻟﻨﻘﺎﺏ ﻋﻨﻬﺎ‪.‬‬
‫ﻭﺇﺫﺍ ﻛﺎﻥ ﻗﺪ ﺳﺒﻖ ﻭﺃﻥ ﻃﺮﺣﻨﺎ ﺧﺼﺎﺋﺺ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻛﺬﺍ ﺧﺼﺎﺋﺺ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‬
‫‪.‬ﻓﺈﻧﻪ ﰲ ﺇﻋﺘﻘﺎﺩﻧﺎ ﻳﻠﺰﻡ ﺍﻷﻣﺮ ﻣﻌﺮﻓﺔ ﺍﳋﺼﺎﺋﺺ ﺍﻟﱵ ﳚﺐ ﺃﻥ ﻳﺘﻮﻓﺮ ﻋﻠﻴﻬﺎ ﻣﻦ ﻳﺘﺼﺪﻯ ﳌﻬﻤﺔ ﺍﻟﺒﺤﺚ‬
‫ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﻭﺍ‪‬ﺮﻣﲔ‪.‬‬
‫ﺃﻭﻻ‪ :‬ﺍﳋﺼﺎﺋﺺ ﺍﻟﻔﻨﻴﺔ ﻟﻠﻤﺤﻘﻖ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬ﺗﻠﻌﺐ ﺍﻷﺟﻬﺰﺓ ﺍﻷﻣﻨﻴﺔ ﺩﻭﺭﺍ ﺃﺳﺎﺳﻴﺎ ﰲ‬
‫ﺻﻴﺎﻧﺔ ﺃﻣﻦ ﺍ‪‬ﺘﻤﻊ ﻭﺫﻟﻚ ﺇﻣﺎ ﺑﺎﻟﻘﻴﺎﻡ ﺑﺪﻭﺭ ﻭﻗﺎﺋﻲ ﻳﻬﺪﻑ ﺇﱃ ﻣﻨﻊ ﺇﺭﺗﻜﺎﺏ ﺍﳉﺮﺍﺋﻢ ﻭﺍﳊﻴﻠﻮﻟﺔ ﺩﻭﻥ‬
‫ﻭﻗﻮﻋﻬﺎ ﻭﺗﻘﻠﻴﻞ ﻓﺮﺹ ﺇﻗﺘﺮﺍﻓﻬﺎ‪ ،‬ﻭﺇﻣﺎ ﺍﻟﻘﻴﺎﻡ ﺑﺪﻭﺭ ﻗﻀﺎﺋﻲ ﰲ ﺿﺒﻂ ﺍﳉﺮﺍﺋﻢ ﻭﻣﺮﺗﻜﺒﻴﻬﺎ ﺑﻌﺪ ﺣﺪﻭﺛﻬﺎ‪.‬‬
‫ﻭﻟﻘﺪ ﺃﺿﺎﻑ ﻇﻬﻮﺭ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﻨﺎﺑﻌﺔ ﻣﻦ ﺍﻟﺘﻄﻮﺭ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺃﻋﺒﺎﺀ ﺟﺪﻳﺪﺓ ﻋﻠﻰ ﺃﺟﻬﺰﺓ‬
‫ﺍﻟﺘﺤﻘﻴﻖ ﳌﺎ ﻳﺘﻄﻠﺒﻪ ﺍﻟﺘﺼﺪﻱ ﳍﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻣﻦ ﻗﺪﺭﺍﺕ ﻓﻨﻴﺔ ﱂ ﻳﺄﻟﻔﻬﺎ ﺭﺟﺎﻝ ﺍﻟﻀﺒﻄﻴﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻭﱂ‬
‫ﻳﺘﻌﻮﺩﻭﺍ ﻋﻠﻴﻬﺎ‪ ،‬ﻣﺎ ﻳﺴﺘﻠﺰﻡ ﺿﺮﻭﺭﺓ ﺗﻮﻓﲑ ﺍﻹﻣﻜﺎﻧﺎﺕ ﻭﺍﳌﻬﺎﺭﺍﺕ ﺍﳌﻄﻠﻮﺑﺔ ﰲ ﻫﺬﺍ ﺍ‪‬ﺎﻝ‪.‬‬
‫ﻭﺍﳌﺸﻜﻠﺔ ﺍﻷﺳﺎﺳﻴﺔ ﺍﻟﱵ ﺗﻮﺍﺟﻪ ﺍﶈﻘﻘﲔ ﰲ ﺟﺮﺍﺋﻢ ﻧﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻫﻲ ﺧﻠﻔﻴﺔ ﺍﶈﻘﻖ ﻧﻔﺴﻪ‬
‫ﻓﻤﺘﺨﺼﺼﻮﺍ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻗﺪ ﺗﻜﻮﻥ ﻟﺪﻳﻬﻢ ﺍﳌﻌﺮﻓﺔ ﺍﻟﺘﻘﻨﻴﺔ ﺍﻟﻼﺯﻣﺔ ﻭﻟﻜﻨﻬﻢ ﻟﻴﺴﻮﺍ ﻣﺪﺭﺑﲔ ﻋﻠﻰ‬
‫ﺗﻔﻬﻢ ﺩﻭﺍﻓﻊ ﺍﳉﺮﳝﺔ ﻭﲨﻊ ﺍﻷﺩﻟﺔ ﻟﺘﻘﺪﱘ ﺍﳌﺘﻬﻢ ﻟﻠﻤﺤﺎﻛﻤﺔ‪.‬ﻭﰲ ﻛﺜﲑ ﻣﻦ ﺍﳊﺎﻻﺕ ﳒﺪ ﺃﻥ ﻣﺘﺨﺼﺺ‬
‫ﺍﳊﺎﺳﺐ ﻳﻌﺘﻘﺪ ﺃﻥ ﻟﺪﻳﻪ ﺍﻟﺪﻟﻴﻞ ﺍﳊﺎﺳﻢ ﺣﻮﻝ ﺟﺮﳝﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﺎ‪ ،‬ﻭﻟﻜﻦ ﻣﻦ ﺍﻟﻨﺎﺣﻴﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻳﺘﺒﲔ‬
‫ﻓﻴﻤﺎ ﺑﻌﺪ ﺃﻥ ﻫﺬﺍ ﺍﻟﺪﻟﻴﻞ ﻻ ﻳﺼﻠﺢ ﻹﻗﺎﻣﺔ ﺍﻟﺪﻋﻮﻯ‪.‬ﺑﻴﻨﻤﺎ ﺍﶈﻘﻘﻮﻥ ﺫﻭﻱ ﺍﳋﻠﻔﻴﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻗﺪ‬
‫ﺗﻜﻮﻧﻠﺪﻳﻬﻢ ﺧﱪﺓ ﻭﺍﺳﻌﺔ ﰲ ﺍﻟﺘﺤﻘﻴﻖ ﻭﻟﻜﻨﻬﻢ ﻳﻔﺘﻘﺪﻭﻥ ﺍﳌﻌﺮﻓﺔ ﺍﻟﻜﺎﻓﻴﺔ ﺑﺘﻘﻨﻴﺎﺕ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﺍﻟﱵ‬
‫ﻳﺴﺘﺨﺪﻣﻬﺎ ﺍ‪‬ﺮﻣﻮﻥ ﰲ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ)‪.(1‬‬

‫)‪(1‬ﰲ ﺣﺎﺩﺛﺔ ﻃﻠﺐ ﺃﺣﺪ ﺍﶈﻘﻘﲔ ﻣﻦ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﺃﻥ ﻳﺮﻳﻪ ﺍﳌﻠﻒ ﺍﻟﺬﻱ ﻗﺎﻡ ﺑﺘﺰﻭﻳﺮﻩ ﻭﺫﻟﻚ ﺇﻧﻄﻼﻗﺎ ﻣﻦ ﺍﳊﺎﺳﺐ ﺍﻟﺸﺨﺼﻲ ﻟﻪ ﻓﻤﺎ ﻛﺎﻥ ﻟﻠﻤﺸﺘﺒﻪ ﻓﻴﻪ ﺇﻻ ﺃﻥ‬
‫ﻗﺎﻡ ﻋﻤﺪﺍ ﲝﺬﻑ ﻫﺬﺍ ﺍﳌﻠﻒ ﻭﺑﺬﻟﻚ ﺃﺿﺎﻉ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﺋﻴﺴﻲ ﰲ ﺍﳉﺮﳝﺔ ﻭﰲ ﺣﺎﺩﺛﺔ ﺃﺧﺮﻯ ﰒ ﺍﻟﻘﺒﺾ ﻋﻠﻰ ﺑﻌﺾ ﺍﳌﺘﻬﻤﲔ ﻭﺿﺒﻂ ﺍﳊﺎﺳﻮﺏ ﰒ ﻗﺎﻣﺖ‬

‫‪- 115 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﺇﺫﺍ ﻛﺎﻧﺖ ﻣﻬﺎﺭﺍﺕ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻊ ﻣﺴﺮﺡ ﺍﳉﺮﳝﺔ ﻭﺍﻟﺘﺤﻔﻆ ﻋﻠﻰ ﺍﻷﺩﻟﺔ ﻭﻣﻨﺎﻗﺸﺔ ﺍﻟﺸﻬﻮﺩ ﻭﻏﲑﻫﺎ‬
‫ﺗﻌﺘﱪ ﻣﻦ ﺃﺳﺎﺳﻴﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﺍﻟﱵ ﻻ ﻳﺘﻮﻗﻊ ﺃﺣﺪ ﻋﺪﻡ ﺗﻮﺍﻓﺮﻫﺎ ﻟﺪﻯ ﺍﶈﻘﻖ‪ ،‬ﺇﻻ ﺃﻧﻪ ﻳﻠﺰﻣﻪ ﻋﻨﺪ ﻣﺒﺎﺷﺮﺗﻪ‬
‫ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻌﺮﻓﺔ ﺍﻟﻌﺪﻳﺪ ﻣﻦ ﺍﳉﻮﺍﻧﺐ ﺍﻟﻔﻨﻴﺔ ﻟﻴﻘﻮﻡ ﺑﻌﻤﻠﻪ ﻋﻠﻰ ﺃﺣﺴﻦ ﻭﺟﻪ ﻭﻧﺬﻛﺮ‬
‫ﻣﻨﻬﺎ‪:‬‬
‫‪-‬ﻣﻌﺮﻓﺔ ﺍﳉﻮﺍﻧﺐ ﺍﻟﻔﻨﻴﺔ ﻭﺍﻟﺘﻘﻨﻴﺔ ﻷﺟﻬﺰﺓ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻹﻧﺘﺮﻧﺎﺕ ﻭﺍﻟﱵ ﺗﺘﻌﻠﻖ ﺑﺎﳉﺮﳝﺔ ﺍﳌﺮﺗﻜﺒﺔ ﺫﻟﻚ‬
‫ﺃﻥ ﺇﻓﺘﻘﺎﺭ ﺿﺎﺑﻂ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻟﻠﺘﺄﻫﻴﻞ ﺍﻟﻜﺎﰲ ﰲ ﺍﳌﻴﺪﺍﻥ ﺍﻟﺘﻘﲏ ﻗﺪ ﻳﻔﻀﻲ ﺇﱃ ﺇﺗﻼﻑ ﻭﺗﺪﻣﲑ‬
‫ﺍﻟﺪﻟﻴﻞ‪ ،‬ﻋﻠﻰ ﺇﻋﺘﺒﺎﺭ ﺃﻥ ﺟﻬﻠﻪ ﺑﺄﺳﺎﻟﻴﺐ ﺇﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﳚﻌﻠﻪ ﻳﻘﻊ ﰲ ﻛﺜﲑ ﻣﻦ ﺍﻷﺣﻴﺎﻥ‬
‫ﰲ ﺃﺧﻄﺎﺀ ﻣﻦ ﺷﺄ‪‬ﺎ ﺃﻥ ﺗﺆﺩﻱ ﺇﱃ ﳏﻮ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺃﻭ ﺗﺪﻣﲑﻫﺎ ﻣﺜﻞ ﺇﺗﻼﻑ ﳏﺘﻮﻳﺎﺕ ﺍﻷﻗﺮﺍﺹ‬
‫ﺍﳌﻤﻐﻨﻄﺔ ﻭﺃﻭﻋﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﱵ ﲢﺰﻥ ‪‬ﺎ ﺍﻟﺒﻴﺎﻧﺎﺕ‪(1)،‬ﻭﺑﺎﻟﺘﺎﱄ ﻓﺈﻥ ﺍﻟﻜﺸﻒ ﻋﻦ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻳﻘﺘﻀﻲ‬
‫ﺃﻥ ﺗﻜﻮﻥ ﺍﻷﺟﻬﺰﺓ ﺍﳌﻌﻨﻴﺔ ﻋﻠﻰ ﺩﺭﺍﻳﺔ ﻛﺎﻓﻴﺔ ﺑﺄﺳﺎﺳﻴﺎﺕ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻊ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻭﻛﻴﻔﻴﺔ ﺗﻘﺼﻴﻬﺎ‬
‫ﻭﺿﺒﻄﻬﺎ ﻭﺻﻮﻻ ﺇﱃ ﻣﺮﺗﻜﺒﻴﻬﺎ‪.‬‬
‫‪ -‬ﺇﺗﺒﺎﻉ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﻟﺼﺤﻴﺤﺔ ﻭﺍﳌﺸﺮﻭﻋﺔ ﻣﻦ ﺃﺟﻞ ﺳﺮﻋﺔ ﺍﶈﺎﻓﻈﺔ ﻋﻠﻰ ﺍﻷﺩﻟﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺍﻟﱵ ﺗﺪﻝ‬
‫ﻋﻠﻰ ﻭﻗﻮﻉ ﺍﳉﺮﳝﺔ‪ ،‬ﻭﲣﺰﻳﻨﻬﺎ ﰲ ﺍﻷﻗﺮﺍﺹ ﺍﳌﻌﺪﺓ ﻟﺬﻟﻚ ﻭﻣﻨﻊ ﺣﺬﻓﻬﺎ ﻭﺍﳊﺮﺹ ﻋﻠﻰ ﻋﺪﻡ ﺗﻌﺮﻳﺾ‬
‫ﻭﺳﺎﺋﻂ ﺍﻟﺘﺨﺰﻳﻦ ﻛﺎﻷﻗﺮﺍﺹ ﺍﳌﺮﻧﺔ ﺃﻭ ﺍﳌﺪﳎﺔ ﻷﻳﺔ ﻣﺆﺛﺮﺍﺕ ﺧﺎﺭﺟﻴﺔ ﻛﺎﻟﻘﻮﻯ ﺍﻟﻜﻬﺮﻭﻣﻐﻨﺎﻃﻴﺴﻴﺔ ﺃﻭ‬
‫ﻣﻮﺟﺎﺕ ﺍﳌﻴﻜﺮﻭﻭﻳﻒ ﺣﱴ ﻻ ﺗﺘﻠﻒ ﳏﺘﻮﻳﺎ‪‬ﺎ‪.‬‬
‫‪ -‬ﻛﻤﺎ ﻳﺘﻮﺟﺐ ﻋﻠﻰ ﺍﶈﻘﻖ ﻣﻌﺮﻓﺔ ﺁﻟﻴﺔ ﻋﻤﻞ ﺗﺸﻜﻴﻼﺕ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻷﻧﺘﺮﻧﺎﺕ‪ ،‬ﻭﺗﱪﺯ ﺃﳘﻴﺔ ﻓﻬﻢ‬
‫ﺍﶈﻘﻖ ﳍﺬﻩ ﺍﳌﺒﺎﺩﺉ ﰲ ﻛﻮ‪‬ﺎ ﺿﺮﻭﺭﻳﺔ ﻟﺘﺼﻮﺭ ﻛﻴﻔﻴﺔ ﺇﺭﺗﻜﺎﺏ ﺍﻟﻔﻌﻞ ﺍﻹﺟﺮﺍﻣﻲ ﰲ ﺍﻟﻌﺎﱂ ﺍﻹﻓﺘﺮﺍﺿﻲ‬
‫ﻣﻦ ﺇﺧﺘﺮﺍﻕ ﻟﻠﺸﺒﻜﺎﺕ ﻭﺇﻋﺘﺮﺍﺽ ﺣﺰﻡ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺃﺛﻨﺎﺀ ﺇﻧﺘﻘﺎﳍﺎ ﻋﱪ ﺍﻟﺸﺒﻜﺔ ﻭﺍﻟﺘﺠﺴﺲ ﻋﻠﻴﻬﺎ ﻭﲢﻮﻳﻠﻬﺎ‬
‫ﻋﻦ ﻣﺴﺎﺭﻫﺎ‪ ،‬ﻛﻤﺎ ﺃ‪‬ﺎ ﺗﻌﻄﻲ ﻟﻠﻤﺤﻘﻖ ﺗﺼﻮﺭ‪‬ﺍ ﺟﻴﺪﺍ ﻋﻦ ﻣﺪﻯ ﺇﻣﻜﺎﻧﻴﺔ ﻣﺘﺎﺑﻌﺔ ﻣﺼﺪﺭ ﺍﻹﻋﺘﺪﺍﺀ ﻋﻠﻰ‬
‫) ‪(2‬‬
‫ﺍﻟﺸﺒﻜﺔ ﻭﺍﳌﻌﻮﻗﺎﺕ ﺍﻟﱵ ﲢﻮﻝ ﺩﻭﻥ ﺫﻟﻚ‪.‬‬

‫ﺟﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﺑﺘﻔﻜﻴﻚ ﺍﳊﺎﺳﻮﺏ ﺑﺈﻋﺘﺒﺎﺭﻩ ﺩﻟﻴﻞ ﺍﳉﺮﳝﺔ ﻭﻗﺎﻣﺖ ﺑﻨﻘﻠﻪ ﺇﱃ ﻣﺮﻛﺰ ﺍﻟﺸﺮﻃﺔ ﰒ ﺑﻌﺪﻫﺎ ﺗﺒﲔ ﺃﻥ ﺗﺸﻐﻴﻞ ﺍﳉﻬﺎﺯ ﻟﻔﺤﺺ ﻣﻜﻮﻧﺎﺗﻪ ﳛﺘﺎﺝ ﺇﱃ‬
‫ﺇﻋﺎﺩﺓ ﺗﻮﺻﻴﻞ ﺍﻟﻜﺎﺑﻼﺕ ﺍﻟﱵ ﰎ ﻧﻘﻠﻬﺎ ﺩﻭﻥ ﺃﻥ ﻳﺘﻢ ﺗﺮﻗﻴﻤﻬﺎ ﻭﻛﺎﻥ ﺍﻷﻣﺮ ﻳﺒﺪﻭ ﺷﺒﻪ ﻣﺴﺘﺤﻴﻞ ﻭﺿﺎﻉ ﺣﱴ ﺍﻟﺪﻟﻴﻞ ﺃﻳﻀﺎ‪.‬‬
‫)‪(1‬ﲨﻴﻞ ﻋﺒﺪ ﺍﻟﺒﺎﻗﻲ‪ ،‬ﺍﻟﺼﻐﲑ‪ .‬ﺃﺩﻟﺔ ﺍﻹﺛﻴﺎﺕ ﺍﳉﻨﺎﺋﻲ ﻭﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺔ ﺍﳊﺪﻳﺜﺔ‪،‬ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ ‪.‬ﺍﻟﻘﺎﻫﺮﺓ‪ 2002‬ﺹ‪.115‬‬
‫)‪(2‬ﺣﺴﲔ ﺍﻟﻐﺎﻓﺮﻱ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.02‬‬

‫‪- 116 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪ -‬ﻳﺘﻮﺟﺐ ﻋﻠﻰ ﺍﶈﻘﻖ ﺃﻥ ﻳﺴﺘﻄﻴﻊ ﺍﻟﺘﻤﻴﻴﺰ ﺑﲔ ﺍﻷﻧﻈﻤﺔ ﺍﳌﺨﺘﻠﻔﺔ ﻟﺘﺸﻐﻴﻞ ﺍﳊﺎﺳﻮﺏ ﻭﺃﻥ ﻳﻠﻢ‬
‫ﲜﻤﻴﻊ ﺍﻷﻧﻈﻤﺔ ﺍﻟﺘﺸﻐﻴﻠﻴﺔ ﻷﺟﻬﺰﺓ ﺍﳊﺎﺳﻮﺏ ﻭﻣﺎ ﺗﺘﺴﻢ ﺑﻪ ﻣﻦ ﺧﺼﺎﺋﺺ ﻭﳑﻴﺰﺍﺕ ﻛﻞ ﻧﻈﺎﻡ ﻋﻠﻰ ﺣﺪﺓ‬
‫ﻷﻧﻪ ﻣﻠﺰﻡ ﺑﺎﻟﺘﻌﺎﻣﻞ ﻣﻌﻬﺎ‪ ،‬ﻭﻛﺬﻟﻚ ﺃﻧﻈﻤﺔ ﺍﳌﻠﻔﺎﺕ ﺍﻟﱵ ﻳﻌﺘﻤﺪﻫﺎ ﻛﻞ ﻧﻈﺎﻡ ﺣﱴ ﻳﺘﻤﻜﻦ ﻣﻦ ﺇﺟﺮﺍﺀ‬
‫ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔﻭﰲ ﻛﺸﻒ ﺍ‪‬ﺮﻣﲔ ﻭﻣﻌﺎﻳﻨﺔ ﻣﺴﺮﺡ ﺍﳉﺮﳝﺔ‪.‬ﻭﺇﺫﺍ ﻛﺎﻥ ﺍﻟﺘﻌﺎﻣﻞ ﺍﳌﺒﺎﺷﺮ‬
‫ﻣﻊ ﻫﺬﻩ ﺍﻷﻧﻈﻤﺔ ﻭﺍﻟﻘﻴﺎﻡ ﺑﻔﺤﺼﻬﺎ ﻭﺭﻓﻊ ﺍﻷﺩﻟﺔ ﺍﳉﻨﺎﺋﻴﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺍﳌﻮﺟﻮﺩﺓ ﻓﻴﻬﺎ ﻳﻌﺘﱪ ﻣﻬﻤﺔ ﺍﳋﺒﲑ" ﺇﻻ‬
‫ﺃﻥ ﻣﻌﺮﻓﺔ ﺍﶈﻘﻖ ﺍﳉﻨﺎﺋﻲ ﺍﻷﻭﻟﻴﺔ ‪‬ﺬﻩ ﺍﻷﻧﻈﻤﺔ ﺿﺮﻭﺭﻳﺔ ﻟﻜﻲ ﻳﺸﺎﺭﻙ ﰲ ﻣﺘﺎﺑﻌﺔ ﻓﺤﺺ ﻭﺗﻔﺘﻴﺶ ﻣﺴﺮﺡ‬
‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫ﻛﻤﺎ ﻳﺘﻌﲔ ﻋﻠﻰ ﺍﶈﻘﻖ ﻛﺬﻟﻚ ﺍﻟﺘﻌﺮﻑ ﻋﻠﻰ ﻣﻌﻄﻴﺎﺕ ﺍﳊﺎﺳﻮﺏ ﺍﳌﺨﺘﻠﻔﺔ ﻟﻴﺼﺒﺢ ﻗﺎﺩﺭﺍ ﻋﻠﻰ‬ ‫‪-‬‬
‫ﻣﻌﺮﻓﺔ ﺻﻴﻎ ﺍﳌﻠﻔﺎﺕ ﻭﻣﺎ ﳝﻜﻦ ﺃﻥ ﲢﺘﻮﻳﻪ ﻣﻦ ﻣﻌﻄﻴﺎﺕ‪ ،‬ﻭﻣﻌﺮﻓﺘﻪ ﻷﻫﻢ ﺍﻟﺘﻄﺒﻴﻘﺎﺕ ﺍﻟﱵ ﳝﻜﻨﻪ ﻣﻦ‬
‫ﺧﻼﳍﺎ ﻗﺮﺍﺀﺓ ﺃﻭ ﻣﺸﺎﻫﺪﺓ ﳏﺘﻮﻯ ﻫﺬﻩ ﺍﳌﻠﻔﺎﺕ)‪ (1‬ﻭﺍﻟﺘﻴﺘﻌﺪ ﺃﻣﺮﺍ ﰲ ﻏﺎﻳﺔ ﺍﻷﳘﻴﺔ‪ ،‬ﻷ‪‬ﺎ ﺗﻌﺘﱪ ﺍﻟﻮﻋﺎﺀ‬
‫ﺍﳊﻘﻴﻘﻲ ﻷﺩﻟﺔ ﺍﻹﺩﺍﻧﺔ ﰲ ﻛﺜﲑ ﻣﻦ ﺍﻟﻘﻀﺎﻳﺎ ﺫﺍﺕ ﺍﻟﺼﻠﺔ ﺑﺎﳊﺎﺳﻮﺏ ﻭﺍﻷﻧﺘﺮﻧﺎﺕ ﲟﺎ ﲢﺘﻮﻳﻪ ﻣﻦ‬
‫ﻣﻌﻠﻮﻣﺎﺕ‪.‬‬
‫‪ -‬ﻭﻣﻦ ﺍﻷﻣﻮﺭ ﺍﻟﻔﻨﻴﺔ ﺍﻟﱵ ﻳﺘﻮﺟﺐ ﻋﻠﻰ ﺍﶈﻘﻖ ﻣﻌﺮﻓﺘﻬﺎ ﺃﻳﻀﺎ ﺃﻥ ﻳﻜﻮﻥ ﻣﻠﻤﺎ ﺑﺎﻷﺳﺎﻟﻴﺐ ﺍﳌﺴﺘﺨﺪﻣﺔ‬
‫ﰲ ﺇﺭﺗﻜﺎﺏ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺗﻘﻨﻴﺎﺕ ﺍﻷﻣﻦ ﺍﳌﻌﻠﻮﻣﺎﰐ‪ ،‬ﺫﻟﻚ ﺃﻥ ﻣﻌﺮﻓﺔ ﺭﺟﺎﻝ ﺍﻟﺘﺤﻘﻴﻖ ﳍﺬﻩ‬
‫ﺍﻷﺳﺎﻟﻴﺐ ﻳﻌﺪ ﻣﻦ ﺍﻷﻣﻮﺭ ﺍﳌﻬﻤﺔ ﺍﻟﱵ ﺗﺴﺎﻋﺪﻫﻢ ﰲ ﻣﻌﺮﻓﺔ ﺍﳉﻨﺎﺓ ﻭﻣﻮﺍﻗﻊ ﺇﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﻭﻣﻦ ﺃﻱ‬
‫ﻃﺮﻓﻴﺔ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ ﺻﺪﺭ ﺍﻟﺴﻠﻮﻙ ﺍﻹﺟﺮﺍﻣﻲ ﻭﻛﺬﻟﻚ ﰲ ﻣﻨﺎﻗﺸﺔ ﺍﻟﺸﻬﻮﺩ ﻭﲰﺎﻉ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻬﻢ‬
‫ﻭﳏﺎﺻﺮ‪‬ﻢ ﺑﺎﻷﺳﺌﻠﺔ ﺍﻟﱵ ﺗﺘﻌﻠﻖ ﺑﻜﻴﻔﻴﺔ ﺇﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﻭﻃﺮﻕ ﺗﻨﻔﻴﺬﻫﺎ‪.‬‬
‫ﻛﻤﺎ ﺃﻥ ﺍﻹﳌﺎﻡ ﺑﺘﻘﻨﻴﺎﺕ ﺍﻷﻣﻦ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺍﳊﺎﺳﻮﺑﻴﺔ ﻣﻦ ﺍﻷﻣﻮﺭ ﺍﳌﻬﻤﺔ ﻭﺍﻟﱵ ﻻﺑﺪ ﻟﻠﻤﺤﻘﻖ‬
‫ﺍﳌﻌﻠﻮﻣﺎﰐ ﻣﻦ ﻣﻌﺮﻓﺘﻬﺎ ﻭﺇﺳﺘﻌﺎ‪‬ﺎ‪ ،‬ﻷ‪‬ﺎ ﺗﺴﺎﻋﺪﻩ ﰲ ﻣﻌﺮﻓﺔ ﳎﺮﻳﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ‪ ،‬ﻓﺎﶈﻘﻖ ﻋﻨﺪﻣﺎ ﻳﺒﺎﺷﺮ‬
‫ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺟﺮﳝﺔ ﺇﺧﺘﺮﺍﻗﺸﺒﻜﺔ ﺍﳊﺎﺳﻮﺏ ﺍﻟﺘﺎﺑﻌﺔ ﳌﺆﺳﺴﺔ ﻣﺎ ﻳﺴﺄﻝ ﺍﻟﻘﺎﺋﻤﲔ ﻋﻠﻰ ﺍﻟﺸﺒﻜﺔ ﻋﻦ ﻧﻮﻉ‬
‫ﺑﺮﺍﻣﺞ ﺍﳊﻤﺎﻳﺔ ﺍﳌﺴﺘﺨﺪﻣﺔ ﻭﻛﻴﻔﻴﺔ ﺇﻋﺪﺍﺩﻫﺎ ﻭﺍﻟﻜﻴﻔﻴﺔ ﺍﻟﱵ ﺗﻔﺎﻋﻠﺖ ‪‬ﺎ ﻣﻊ ﺍﳊﺪﺙ ﳏﻞ ﺍﻟﺘﺤﻘﻴﻖ‪.‬ﻭﻫﻨﺎﻙ‬
‫ﺍﻟﻜﺜﲑ ﻣﻦ ﺍﻟﺘﻘﻨﻴﺎﺕ ﺍﻟﱵ ﺗﺴﺘﺨﺪﻡ ﰲ ﺃﻣﻦ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻟﺸﺒﻜﺎﺕ ﻭﺍﻟﱵ ﺗﻜﻮﻥ ﻭﺛﻴﻘﺔ ﺍﻟﺼﻠﺔ ﺑﺎﻟﺘﺤﻘﻴﻖ‬

‫)‪(1‬ﻳﺘﻢ ﺣﻔﻆ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻟﺮﻗﻤﻴﺔ ﺩﺍﺧﻞ ﺍﳊﺎﺳﻮﺏ ﻋﻠﻰ ﺷﻜﻞ ﳎﻤﻮﻋﺎﺕ ﺃﻭ ﻛﺘﻞ ﻣﻦ ﺍﻟﺒﻴﺎﻧﺎﺕ ﲤﺜﻞ ﻭﺣﺪﺓ ﻭﺍﺣﺪﺓ ﺗﺴﻤﻰ ﺍﳌﻠﻔﺎﺕ ﻭﻳﺘﻤﻴﺰ ﻛﻞ ﻣﻠﻒ ﺑﺒﻴﻨﺔ‬
‫ﻭﺻﻴﻐﺔ ﺧﺎﺻﺔ ﲤﻴﺰﻩ ﻋﻦ ﻏﲑﻩ‪ ،‬ﻭﻏﺎﻟﺒﺎ ﻣﺎ ﺗﺮﺗﺒﻂ ﺻﻴﻐﺔ ﺑﻨﻮﻉ ﳏﺪﺩ ﻣﻦ ﺍﶈﺘﻮﻯ ﻛﺄﻥ ﳛﺘﻮﻱ ﺍﳌﻠﻒ ﻋﻠﻰ ﺑﻴﺎﻧﺎﺕ ﲤﺜﻞ ﺻﻮﺭﺍ ﺃﻭ ﺃﺻﻮﺍﺗﺎ ﺃﻭ ﻣﺴﺘﻨﺪﺍ ﺧﻄﻴﺎ‬
‫ﻣﻨﺴﻖ ﺃﻭ ﻏﲑ ﻣﻨﺴﻖ‪.‬‬

‫‪- 117 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﻳﻜﻮﻥ ﻓﻬﻢ ﺍﶈﻘﻖ ﻟﻮﻇﺎﺋﻔﻬﺎ ﻭﺃﺳﻠﻮﺏ ﻋﻤﻠﻬﺎ ﻭﻃﺮﻕ ﺇﺳﺘﺨﺪﺍﻣﻬﺎ ﻋﺎﻣﻼ ﻣﺴﺎﻋﺪﺍ ﻟﻪ ﻋﻨﺪ ﻗﺮﺍﺀﺗﻪ‬
‫ﻟﻠﺘﻘﺎﺭﻳﺮ ﺍﳉﻨﺎﺋﻴﺔ ﺍﻟﱵ ﻳﻌﺪﻫﺎ ﺧﺒﲑ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻟﱵ ﺗﻌﺪ ﻣﻦ ﻣﻦ ﺃﻫﻢ ﺍﻟﻮﺛﺎﺋﻖ ﺍﻟﱵ ﻳﺮﺟﻊ ﺇﻟﻴﻬﺎ ﺍﶈﻘﻖ‬
‫ﻭﻳﻌﺘﻤﺪ ﻋﻠﻴﻬﺎ ﰲ ﲢﻘﻴﻘﻪ ﻭ ﺗﺮﻓﻖ ﺑﻌﺪ ﺫﻟﻚ ﲟﺤﺎﺿﺮ ﺍﻟﺘﺤﻘﻴﻖ ﻭﻳﺮﺗﻜﺰ ﻋﻠﻴﻬﺎ ﺗﻮﺟﻴﻪ ﺍﻹ‪‬ﺎﻡ ﻋﻨﺪ‬
‫ﺍﻟﻠﺰﻭﻡ‪.‬‬
‫ﺛﺎﻧﻴﺎ‪ :‬ﺗﺄﻫﻴﻞ ﻭﺗﺪﺭﻳﺐ ﺍﶈﻘـﻖ ﺍﳌﻌﻠﻮﻣﺎﰐ‪:‬ﰲ ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﺼﻔﺔ ﻋﺎﻣﺔ ﻻﺑﺪ ﻣﻦ‬
‫ﻭﺿﻊ ﺳﻴﺎﺳﺔ ﺟﻨﺎﺋﻴﺔ ﺭﺷﻴﺪﺓ ﺗﺴﺘﻨﺪ ﻋﻠﻰ ﺗﺪﺭﻳﺐ ﺃﺟﻬﺰﺓ ﺍﻟﻌﺪﺍﻟﺔ ﺍﳉﻨﺎﺋﻴﺔ ﳌﻜﺎﻓﺤﺔ ﻫﺬﻩ ﺍﳉﺮﳝﺔ‪ ،‬ﻭﳝﺘﺪ‬
‫ﻫﺬﺍ ﺍﻟﺘﺪﺭﻳﺐ ﻭﺍﻟﺘﺄﻫﻴﻞ ﺇﱃ ﺍﻟﻌﺎﻣﻠﲔ ﺑﺄﺟﻬﺰﺓ ﺍﻟﻀﺒﻄﻴﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ‪.‬‬
‫ﻭﻗﺪ ﺗﻨﺒﻬﺖ ﺍﻟﺪﻭﻝ ﺇﱃ ﻫﺬﺍ ﺍﻷﻣﺮ ﻭﻇﻬﺮ ﻫﺬﺍ ﺍﻹﻫﺘﻤﺎﻡ ﰲ ﺗﻮﺻﻴﺎﺕ ﺍﻟﻌﺪﻳﺪ ﻣﻦ ﺍﳌﺆﲤﺮﺍﺕ‬
‫ﺍﻟﺪﻭﻟﻴﺔ ﺍﳋﺎﺻﺔ ﲟﻨﻊ ﺍﳉﺮﳝﺔ ﻭﻣﻌﺎﻣﻠﺔ ﺍ‪‬ﺮﻣﲔ‪ ،‬ﻭﻣﻨﻬﺎ ﻣﺎ ﺟﺎﺀ ﰲ ﺍﻟﻘﺎﻋﺪﺓ ‪ 1/22‬ﻣﻦ ﻗﻮﺍﻋﺪ ﺑﻴﻜﲔ ﺍﻟﱵ‬
‫ﺃﻛﺪﺕ ﻋﻠﻰ ﺍﳊﺎﺟﺔ ﺇﱃ ﺍﻟﺘﺨﺼﺺ ﺍﳌﻬﲏ ﻭﺍﻟﺘﺪﺭﻳﺐ‪.‬‬
‫ﻭﳍﺬﺍ ﻓﺈﻧﻪ ﻣﻦ ﺍﻟﻀﺮﻭﺭﻱ ﺇﻋﺪﺍﺩ ﺍﶈﻘﻘﲔ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﺈﻋﺘﺒﺎﺭﻫﻢ ﻳﻮﺍﺟﻬﻮﻥ ﺃﻧﺸﻄﺔ‬
‫ﺇﺟﺮﺍﻣﻴﺔ ﻣﻌﻘﺪﺓ ﻭﺗﻨﻔﺬ ﺑﻄﺮﻕ ﺩﻗﻴﻘﺔ ﻭﺫﻛﻴﺔ‪ ،‬ﻭﻳﺘﺄﺗﻰ ﺫﻟﻚ ﻣﻦ ﺧﻼﻝ ﺍﻹﺳﺮﺍﻉ ﰲ ﺃﻥ ﻳﻄﻮﺭ ﺭﺟﺎﻝ‬
‫ﺍﻟﺒﺤﺚ ﺍﳉﻨﺎﺋﻲ ﻭﺳﺎﺋﻠﻬﻢ ﺍﻟﺒﺤﺜﻴﺔ ﻭﻗﺪﺭﺍ‪‬ﻢ ﺍﻟﻌﻠﻤﻴﺔ‪ .‬ﻭﻟﻴﺲ ﺑﺎﻟﻀﺮﻭﺭﺓ ﺃﻥ ﻳﻜﻮﻥ ﺍﶈﻘﻖ ﰲ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺧﺒﲑﺍ ﰲ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻟﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻟﻜﻦ ﻻﺑﺪ ﻣﻦ ﺍﻹﳌﺎﻡ ﺑﺒﻌﺺ ﺍﳌﺴﺎﺋﻞ ﺍﻷﻭﻟﻴﺔ ﺍﻟﱵ‬
‫ﲤﻜﻨﻪ ﻣﻦ ﺍﻟﺘﻔﺎﻫﻢ ﻣﻊ ﺧﱪﺍﺀ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻭﺣﺴﻦ ﺇﺳﺘﻐﻼﳍﻢ ﰲ ﻛﺸﻒ ﺍﳉﺮﺍﺋﻢ ﻭﲨﻊ ﺍﻷﺩﻟﺔ ﻛﻤﺎ‬
‫ﺃﻧﻪ ﻣﻦ ﺍﻟﻀﺮﻭﺭﻱ ﺃﻥ ﻳﻜﻮﻥ ﺍﶈﻘﻖ ﻣﻠﻤﺎ ﺑﺎﻹﺟﺮﺍﺀﺍﺕ ﺍﻹﺣﺘﻴﺎﻃﻴﺔ ﺍﻟﱵ ﻳﻨﺒﻐﻲ ﺇﲣﺎﺫﻫﺎ ﻋﻠﻰ ﻣﺴﺮﺡ‬
‫) ‪(1‬‬
‫ﺍﳉﺮﳝﺔ ﻭﺍﻟﺘﺪﺍﺑﲑ ﺍﻟﻼﺯﻣﺔ ﻟﺘﺄﻣﲔ ﺍﻷﺩﻟﺔ ﻭﻣﻌﻠﻮﻣﺎ‪‬ﺎ ﺍﳌﻤﻐﻨﻄﺔ ﺑﺼﻮﺭﺓ ﻋﻠﻤﻴﺔ ﻭﺳﻠﻴﻤﺔ‪.‬‬
‫ﻭﺇﺫﺍ ﻛﺎﻧﺖ ﺍﻟﺸﺮﻛﺎﺕ ﺍﳋﺎﺻﺔ ﺗﺴﺘﻌﲔ ﲟﺤﻘﻘﲔ ﻫﻢ ﺧﱪﺍﺀ ﰲ ﺍﳊﻮﺍﺳﻴﺐ‪ ،‬ﻓﺎﳉﻬﺎﺕ ﺍﳊﻜﻮﻣﻴﺔ‬
‫ﺃﻭﱃ ﺑﺈﻋﺪﺍﺩ ﻛﻮﺍﺩﺭﻫﺎ ﻟﻠﻀﺒﻂ ﻭﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻓﺎﻟﺘﻘﺪﻡ ﺍﳌﺘﻮﺍﺻﻞ ﰲ ﺗﻜﻨﻮﻟﻮﺟﻴﺎ‬
‫ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻭﺍﻷﻧﺘﺮﻧﺎﺕ ﻳﻔﺮﺽ ﻋﻠﻰ ﺟﻬﺎﺕ ﺗﻄﺒﻴﻖ ﺍﻟﻘﺎﻧﻮﻥ ﺃﻥ ﺗﺴﲑ ﰲ ﺧﻄﻮﺍﺕ ﻣﺘﻨﺎﺳﻘﺔ ﻣﻊ‬
‫ﺍﻟﺘﻄﻮﺭﺍﺕ ﺍﻟﺴﺮﻳﻌﺔ ﺍﻟﱵ ﺗﺸﻬﺪﻫﺎ ﻫﺬﻩ ﺍﻟﺘﻘﻨﻴﺎﺗﺄ ﻭﻫﺬﺍ ﺍﻷﻣﺮ ﻳﺘﻄﻠﺐ ﺍﻹﳌﺎﻡ ﺑﺎﻟﺘﻘﻨﻴﺎﺕ ﺍﳉﺪﻳﺪﺓ ﺣﱴ ﳝﻜﻦ‬
‫ﻣﻮﺍﺟﻬﺔ ﳎﺮﻣﻲ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫)‪(1‬ﳏﻤﺪ ﺍﻷﻣﲔ ﺍﻟﺒﺸﺮﻱ‪ .‬ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺟﺮﺍﺋﻢ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﲝﺚ ﻣﻘﺪﻡ ﺇﱃ ﻣﺆﲤﺮ ﺍﻟﻘﺎﻧﻮﻥ ﻭﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﻭﺍﻷﻧﺘﺮﻧﺎﺕ ﺑﻜﻠﻴﺔ ﺍﻟﺸﺮﻳﻌﺔ ﻭﺍﻟﻘﺎﻧﻮﻥ‪ ،‬ﺟﺎﻣﻌﺔ‬
‫ﺍﻹﻣﺎﺭﺍﺕ ﺍﻟﻌﺮﺑﻴﺔ ﺍﳌﺘﺤﺪﺓ ﺍﻟﻔﺘﺮﺓ ﻣﻦ ‪ 01‬ﺇﱃ ‪ 03‬ﻣﺎﻱ ‪.2000‬‬

‫‪- 118 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﻳﺮﻯ ﺍﻟﻔﻘﻪ ﺍﳉﻨﺎﺋﻲ ﺃﻧﻪ ﺣﺎﻝ ﺍﻟﺘﺪﺭﻳﺐ ﻋﻠﻰ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻳﺘﻌﲔ ﻣﺮﺍﻋﺎﺓ ﻋﻨﺎﺻﺮ‬
‫) ‪(1‬‬
‫ﺃﺳﺎﺳﻴﺔ ﺗﺘﻤﺜﻞ ﰲ ﺷﺨﺺ ﺍﳌﺘﺪﺭﺑﻮﻣﻨﻬﺞ ﺍﻟﺪﻭﺭﺓ ﺍﻟﺘﺪﺭﻳﺒﻴﺔ ﻭﺻﻔﺔ ﻭﺃﺳﻠﻮﺏ ﺍﻟﺘﺪﺭﻳﺐ‪.‬‬
‫ﻭﳚﺐ ﺃﻥ ﻳﺸﻤﻞ ﻣﻨﻬﺞ ﺍﻟﺘﺪﺭﻳﺐ ﺧﺼﻮﺻﺎ ﺗﺪﺭﻳﺲ ﺍﻷﺳﺎﻟﻴﺐ ﺍﻟﻔﻨﻴﺔ ﺍﳌﺴﺘﺨﺪﻣﺔ ﰲ ﺇﺭﺗﻜﺎﺏ‬
‫ﺍﳉﺮﳝﺔ ﺃﻭ ﺍﻷﺳﺎﻟﻴﺐ ﺍﻟﱵ ﺗﺘﻌﻠﻖ ﺑﺎﻟﻜﺸﻒ ﻋﻨﻬﺎ ﻭﻛﻴﻔﻴﺔ ﺇﺛﺒﺎ‪‬ﺎ ﻭﻣﻌﺎﻳﻨﺘﻬﺎ ﻭﺍﻟﺘﺤﻔﻆ ﻋﻠﻴﻬﺎ ﻭﻛﻴﻔﻴﺔ‬
‫ﻓﺤﺼﻬﺎ ﻓﻨﻴﺎ‪.‬‬
‫ﻭﻗﺪ ﻛﺎﻥ ﻫﻨﺎﻙ ﻣﻦ ﻳﺮﻯ ﺃﻧﺼﻌﻮﺑﺔ ﺍﻟﺘﺤﻘﻴﻖ ﺍﳉﻨﺎﺋﻲ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﺘﻄﻠﺐ ﺃﻥ ﻳﻌﻬﺪ ‪‬ﺬﺍ‬
‫ﺍﻟﺘﺤﻘﻴﻖ ﺇﱃ ﺑﻴﻮﺕ ﺧﱪﺓ ﻣﺘﺨﺼﺼﺔ ﰲ ﻫﺬﺍ ﺍ‪‬ﺎﻝ‪ ،‬ﻟﻜﻦ ﻫﺬﺍ ﺍﻷﻣﺮ ﻟﻪ ﺧﻄﻮﺭﺗﻪ ﺇﺫ ﻣﻦ ﺷﺄﻧﻪ ﺃﻥ‬
‫ﻳﻀﺤﻲ ﲟﺼﻠﺤﺔ ﺍﻟﻔﺮﺩ ﻭﺍ‪‬ﺘﻤﻊ ﻭﻳﻀﻌﻬﺎ ﲢﺖ ﺭﲪﺔ ﻫﺬﻩ ﺍﻟﺸﺮﻛﺎﺕ ﺍﻟﱵ ﻳﻜﻮﻥ ﳘﻬﺎ ﲢﻘﻴﻖ ﺍﻟﺮﺑﺢ‬
‫ﺍﳌﺎﺩﻱ ﻋﻠﻰ ﺣﺴﺎﺏ ﺇﻇﻬﺎﺭ ﺍﳊﻘﻴﻘﺔ‪ ،‬ﻓﻀﻼ ﻋﻦ ﺍﻹﺧﻼﻝ ﲟﺒﺪﺃ ﺳﺮﻳﺔ ﺍﻟﺘﺤﻘﻴﻖ ﺳﻴﻤﺎ ﻟﻮ ﺗﻌﻠﻖ ﺍﻟﺘﺤﻘﻴﻖ‬
‫) ‪(2‬‬
‫ﲜﺮﺍﺋﻢ ﻋﺮﺽ ﺍﻷﺷﺨﺎﺹ ﻭﺃﺳﺮﺍﺭﻫﻢ ﺍﻟﺸﺨﺼﻴﺔ ﺃﻭ ﺗﻌﻠﻖ ﺍﻷﻣﺮ ﺑﺄﻣﻦ ﺍﻟﺪﻭﻟﺔ‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﻟﺚ ‪:‬ﺍﻟﺪﻟﻴﻞ ﺍﳌﻨﺎﺳﺐ ﻹﺛﺒﺎﺕ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﰐ‬
‫ﳜﺘﻠﻒ ﺍﻟﻮﺳﻂ ﺍﻟﺬﻱ ﺗﺮﺗﻜﺐ ﻓﻴﻪ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﻭﺳﻂ ﻣﺎﺩﻱ ﺇﱃ ﻭﺳﻂ ﻣﻌﻨﻮﻱ ﺃﻭ ﻣﺎ‬
‫ﻳﻌﺮﻑ ﺑﺎﻟﻮﺳﻂ ﺍﻹﻓﺘﺮﺍﺿﻲ‪ ،‬ﻭﻋﻠﻰ ﺿﻮﺀ ﺫﻟﻚ ﻓﺎﻥ ﺍﻟﺒﺤﺚ ﰲ ﺃﺩﻟﺔ ﺍﻹﺛﺒﺎﺕ ﰲ ﺍﻃﺎﺭ ﻣﺪﻯ ﺍﺗﻔﺎﻗﻬﺎ ﻣﻊ‬
‫ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﺘﻘﻨﻴﺔ ﳍﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻭﻭﺳﺎﺋﻞ ﺇﺭﺗﻜﺎ‪‬ﺎ ﺃﺻﺒﺢ ﻏﲑ ﺫﻱ ﻣﻌﲎ ﺇﺫﺍ ﱂ ﻳﻜﻦ ﻣﺪﻋﻤﺎ ﺑﺘﻮﻓﻴﻖ ﻣﻦ ﻗﺒﻞ‬
‫ﺍﻟﺘﻘﻨﻴﺔ ﺫﺍ‪‬ﺎ‪ ،‬ﳑﺎ ﺃﺩﻯ ﺍﱃ ﻇﻬﻮﺭ ﻃﺎﺋﻔﺔ ﺧﺎﺻﺔ ﻣﻦ ﺍﻷﺩﻟﺔ ﺍﳉﺰﺍﺋﻴﺔ ﳝﻜﻦ ﺍﻹﻋﺘﻤﺎﺩ ﻋﻠﻴﻬﺎ ﰲ ﺇﺛﺒﺎﺕ ﻫﺬﻩ‬
‫ﺍﳉﺮﺍﺋﻢ ﻭﻣﻦ ﲦﺔ ﻧﺴﺒﺘﻬﺎ ﺇﱃ ﻓﺎﻋﻠﻬﺎ‪ ،‬ﲝﻴﺚ ﺗﻜﻮﻥ ﻣﻦ ﺫﺍﺕ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﺘﻘﻨﻴﺔ ﺍﻟﻨﺎﲨﺔ ﻋﻦ ﺍﻟﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﺍﻟﱵ ﺗﻨﺘﺞ ﻋﻨﻬﺎ ﰲ ﺣﺎﻟﺔ ﺍﻹﻋﺘﺪﺍﺀ ﻋﻠﻴﻬﺎ ﻭﺗﺘﻔﻖ ﻣﻊ ﻃﺒﻴﻌﺔ ﺍﻟﻮﺳﻂ ﺍﻟﺬﻱ ﺇﺭﺗﻜﺒﺖ ﻓﻴﻪ ﺍﳉﺮﳝﺔ ﻭﻫﻲ‬
‫ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔﺃﻭ ﺍﻷﺩﻟﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺣﺴﺐ ﻣﺎ ﻋﱪﺕ ﻋﻨﻬﺎ ﺍﻹﺗﻔﺎﻗﻴﺔ ﺍﻷﺭﻭﺑﻴﺔ ﳌﻜﺎﻓﺤﺔ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫ﻓﺎﻟﺪﻟﻴﻞ ﺃﺛﺮ ﻳﻮﻟﺪ ﺃﻭ ﺣﻘﻴﻘﺔ ﺗﻨﺒﻌﺚ ﻣﻦ ﺍﳉﺮﳝﺔ ﺍﳌﺮﺗﻜﺒﺔ‪ ،‬ﻭﻟﺬﻟﻚ ﻓﺈﻥ ﻃﺒﻴﻌﺔ ﺍﻟﺪﻟﻴﻞ ﺗﺘﺸﻜﻞ ﻣﻦ‬
‫ﻃﺒﻴﻌﺔ ﺍﳉﺮﳝﺔ ﺍﻟﱵ ﻳﻮﻟﺪ ﻣﻨﻬﺎ‪ .‬ﻓﺪﻟﻴﻞ ﺍﻟﺘﺰﻭﻳﺮ ﻳﺄﰐ ﻣﻦ ﺇﺛﺒﺎﺕ ﺗﻐﻴﲑ ﺍﳊﻘﻴﻘﺔ ﰲ ﺍﶈﺮﺭ ﺍﻟﺬﻱ ﻳﻘﻊ ﻋﻠﻴﻪ‪،‬‬
‫ﻭﺩﻟﻴﻞ ﺟﺮﳝﺔ ﺍﻟﻘﺘﻞ ﻗﺪ ﻳﻮﻟﺪ ﻣﻦ ﻓﺤﺺ ﺍﻷﺩﺍﺓ ﺍﻟﱵ ﺇﺳﺘﺨﺪﻣﺖ ﰲ ﺍﻟﻘﺘﻞ ﻭﻃﻠﻘﺎﺕ ﺍﻟﺬﺧﲑﺓ ﺍﻟﱵ‬

‫)‪(1‬ﻫﺸﺎﻡ ﳏﻤﺪ ﻓﺮﻳﺪ ﺭﺳﺘﻢ‪ ،‬ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﲝﺚ ﻣﻘﺪﻡ ﺇﱃ ﻣﺆﲤﺮ ﺍﻟﻘﺎﻧﻮﻥ ﻭﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﻭﺍﻷﻧﺘﺮﻧﺎﺕ‪ ،‬ﺹ‪.115‬‬
‫)‪(2‬ﳏﻤﺪ ﺍﻷﻣﲔ ﺍﻟﺒﺸﺮﻱ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.25‬‬

‫‪- 119 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺇﺳﺘﻌﻤﻠﺖ ﻓﻴﻬﺎ‪ .‬ﻭﺗﻄﺒﻴﻖ ﺫﻟﻚ ﻋﻠﻰ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻓﺎﻧﻪ ﳝﻜﻦ ﺃﻥ ﺗﺜﺒﺖ ﺑﺄﺩﻟﺔ ﺗﻘﻨﻴﺔ ﻧﺎﲡﺔ ﻋﻦ‬
‫) ‪(1‬‬
‫ﺍﻟﻮﺳﺎﺋﻞ ﺍﻟﺘﻘﻨﻴﺔ ﺍﻟﱵ ﺇﺭﺗﻜﺒﺖ ﺑﻮﺍﺳﻄﺘﻬﺎ ﺃﻭ ﻣﻦ ﺧﻼﳍﺎ‪.‬‬
‫ﻭﰲ ﳎﺎﻝ ﺗﻌﺎﻣﻞ ﺟﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﻣﻊ ﺍﻷﺩﻟﺔ ﺍﳉﻨﺎﺋﻴﺔ ﻓﺈﻥ ﻫﺬﻩ ﺍﻷﺧﲑﺓ ﻣﻘﺒﻠﺔ ﻋﻠﻰ ﺍﻹﻧﺘﻘﺎﻝ ﻣﻦ‬
‫ﻣﺮﺣﻠﺔ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻊ ﺍﻷﺩﻟﺔ ﺍﳌﺎﺩﻳﺔ ﺍﳌﻠﻤﻮﺳﺔ ﻣﻌﺮﻭﻓﺔ ﺍﳌﺼﺎﺩﺭ‪ ،‬ﺇﱃ ﻣﺮﺣﻠﺔ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻊ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ‬
‫ﺍﳌﻨﺘﺸﺮﺓ ﰲ ﺃﻣﺎﻛﻦ ﺇﻓﺘﺮﺍﺿﻴﺔ‪،‬ﻭﻫﻮ ﺃﻣﺮ ﻻ ﳏﺎﻝ ﻳﺜﲑ ﻣﺸﻜﻼﺕ ﻣﻬﻨﻴﺔ ﻭﺃﺧﺮﻯ ﻗﺎﻧﻮﻧﻴﺔ ﻳﻨﺒﻐﻲ ﲢﺪﻳﺪﻫﺎ‬
‫ﺑﻮﺿﻮﺡ ﺗﻮﻃﺌﺔ ﻟﻮﺿﻊ ﺍﳊﻠﻮﻝ ﺍﳌﻨﺎﺳﺒﺔ ﻟﻌﻼﺟﻬﺎ‪ ،‬ﺫﻟﻚ ﺃﻥ ﻣﻌﻄﻴﺎﺕ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﺿﺎﻓﺖ ﺇﱃ‬
‫ﻣﺸﻜﻠﺔ ﺍﳉﺮﳝﺔ ﺃﳕﺎﻃﺎ ﺇﺟﺮﺍﻣﻴﺔ ﻋﻠﻰ ﺩﺭﺟﺔ ﻋﺎﻟﻴﺔ ﻣﻦ ﺍﻟﺘﻌﻘﻴﺪ‪ ،‬ﳛﺘﺎﺝ ﺇﺛﺒﺎ‪‬ﺎ ﺇﱃ ﺃﺳﻠﺤﺔ ﻭﺃﺩﻭﺍﺕ ﻋﻠﻤﻴﺔ‬
‫ﻧﺎﺑﻌﺔ ﻣﻦ ﻃﺒﻴﻌﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬ﻭﺳﻮﻑ ﳓﺎﻭﻝ ﻋﺮﺽ ﻣﻔﻬﻮﻡ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﰒ ﻃﺒﻴﻌﺘﻪ ﻣﻦ ﺧﻼﻝ‬
‫ﻣﺎ ﻳﻠﻲ‪:‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﻣﻔﻬـﻮﻡ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗـﻤﻲ‪:‬‬
‫ﻛﻤﺎ ﺃﺛﺮﺕ ﺍﻟﺜﻮﺭﺓ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﻧﻮﻋﻴﺔ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﺻﺎﺣﺒﺘﻬﺎ ﻭﻇﻬﻮﺭ ﺃﳕﺎﻁ ﻣﺴﺘﺤﺪﺛﺔ ﻣﻦ‬
‫ﺍﳉﺮﺍﺋﻢ ﻋﺮﻓﺖ ﺑﺎﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻓﺈ‪‬ﺎ ﰲ ﺍﳌﻘﺎﺑﻞ ﺃﻳﻀﺎ ﺃﺛﺮﺕ ﻋﻠﻰ ﺇﺛﺒﺎ‪‬ﺎ ﻓﺄﺻﺒﺤﺖ ﺍﻷﺩﻟﺔ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ‬
‫ﺍﻟﱵ ﺟﺎﺀﺕ ‪‬ﺎ ﻧﺼﻮﺹ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﻏﲑ ﻗﺎﺩﺭﺓ ﻋﻠﻰ ﺇﺛﺒﺎﺕ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺬﻱ‬
‫ﳛﺘﺎﺝ ﺇﱃ ﻃﺮﻕ ﺗﻘﻨﻴﺔ ﺗﺘﻨﺎﺳﺐ ﻣﻊ ﻃﺒﻴﻌﺘﻪ‪ ،‬ﲝﻴﺚ ﳝﻜﻨﻬﺎ ﻓﻚ ﺭﻣﻮﺯﻩ ﻭﺗﺮﲨﺔ ﻧﺒﻀﺎﺗﻪ ﻭﺫﺑﺬﺑﺎﺗﻪ ﺇﱃ‬
‫ﻛﻠﻤﺎﺕ ﻭﺑﻴﺎﻧﺎﺕ ﳏﺴﻮﺳﺔ ﻭﻣﻘﺮﻭﺀﺓ ﺗﺼﻠﺢ ﻷﻥ ﺗﻜﻮﻥ ﺃﺩﻟﺔ ﺇﺛﺒﺎﺕ ﳍﺬﻩ ﺍﳉﺮﺍﺋﻢ ﺫﺍﺕ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﻔﻨﻴﺔ‬
‫ﻭﺍﻟﻌﻠﻤﻴﺔ ﺍﳋﺎﺻﺔ‪.‬‬
‫ﺃﻭﻻ‪ :‬ﺗﻌﺮﻳﻒ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪ :‬ﺇﻥ ﺗﻘﻴﻴﻢ ﺃﻱ ﻧﻈﺎﻡ ﻗﺎﻧﻮﱐ ﻻ ﳝﻜﻦ ﺃﻥ ﻳﺼﻞ ﺇﱃ ﻧﺘﺎﺋﺞ ﺻﺤﻴﺤﺔ‬
‫ﺇﻻ ﺇﺫﺍ ﺗﻮﺍﻓﺮ ﻟﺪﻯ ﺍﳌﻘﻮﻡ ﺗﺼﻮﺭﺍ ﻭﺍﺿﺤﺎ ﻟﺬﻟﻚ ﺍﻟﻨﻈﺎﻡ‪ ،‬ﻭﻋﻠﻴﻪ ﻓﺈﻧﻪ ﻣﻦ ﺍﻟﻮﺍﺟﺐ ﻟﻴﺘﺴﲎ ﻓﻬﻢ ﻣﺎﻫﻴﺔ‬
‫ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﻷﺩﻟﺔ ﻻﺑﺪ ﻣﻦ ﺗﻨﺎﻭﻝ ﺗﻌﺮﻳﻔﻪ‪.‬ﻭﻟﻘﺪ ﻗﺒﻞ ﺑﺸﺄﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺘﻘﲏ ﻋﺪﺓ ﺗﻌﺮﻳﻔﺎﺕ ﺃﳘﻬﺎ‪:‬‬
‫ﺃﻧﻪ ﺍﻟﺪﻟﻴﻞ ﺍﳌﺄﺧﻮﺫ ﻣﻦ ﺃﺟﻬﺰﺓ ﺍﳊﺎﺳﺐ ﺍﻵﱄ‪ ،‬ﻭﻳﻜﻮﻥ ﰲ ﺷﻜﻞ ﳎﺎﻻﺕ ﺃﻭ ﻧﺒﻀﺎﺕ ﻣﻐﻨﺎﻃﻴﺴﻴﺔ‬
‫ﺃﻭ ﻛﻬﺮﺑﺎﺋﻴﺔ ﳝﻜﻦ ﲡﻤﻴﻌﻬﺎ ﺃﻭ ﲢﻠﻴﻠﻬﺎ ﺑﺈﺳﺘﺨﺪﺍﻡ ﺑﺮﺍﻣﺞ ﻭﺗﻄﺒﻴﻘﺎﺕ ﺗﻜﻨﻮﻟﻮﺟﻴﺔ ﺧﺎﺻﺔ ﻭﻳﺘﻢ ﺗﻘﺪﳝﻬﺎ‬
‫ﰲ ﺷﻜﻞ ﺩﻟﻴﻞ ﳝﻜﻦ ﺇﻋﺘﻤﺎﺩﻩ ﺃﻣﺎﻡ ﺍﻟﻘﻀﺎﺀ)‪.(2‬‬

‫)‪(1‬ﺭﺷﻴﺪ ﺑﻮﻛﺮ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ‪،380‬‬


‫)‪(2‬ﳑﺪﻭﺡ ﻋﺒﺪ ﺍﳊﻤﻴﺪ ﻋﺒﺪ ﺍﳌﻄﻠﺐ‪ ،‬ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﻘﻴﻖ ﺍﳉﻨﺎﺋﻲ ﺍﻟﺮﻗﻤﻲ ﰲ ﺟﺮﺍﺋﻢ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻭﺍﻷﻧﺘﺮﻧﺎﺕ‪ ،‬ﺩﺍﺭ ﺍﻟﻔﻜﺮ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ‪.‬ﻣﺼﺮ ‪2006‬‬
‫ﺹ‪.88‬‬

‫‪- 120 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﻫﻨﺎﻙ ﻣﻦ ﻳﻌﺮﻓﻪ ﺑﺄﻧﻪ ﻣﻌﻠﻮﻣﺎﺕ ﻳﻘﺒﻠﻬﺎ ﺍﳌﻨﻄﻖ ﻭﺍﻟﻌﻘﻞ ﻭﻳﻌﺘﻤﺪﻫﺎ ﺍﻟﻌﻠﻢ‪ ،‬ﻳﺘﻢ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻬﺎ‬
‫ﺑﺈﺟﺮﺍﺀﺍﺕ ﻗﺎﻧﻮﻧﻴﺔ ﻭﻋﻠﻤﻴﺔ ﺑﺘﺮﲨﺔ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﳊﺴﺎﺑﻴﺔ ﺍﳌﺨﺰﻧﺔ ﰲ ﺃﺟﻬﺰﺓ ﺍﻟﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻣﻠﺤﻘﺎ‪‬ﺎ‬
‫ﻭﺷﺒﻜﺎﺕ ﺍﻹﺗﺼﺎﻝ‪ ،‬ﻭﳝﻜﻦ ﺇﺳﺘﺨﺪﺍﻣﻬﺎ ﰲ ﺃﻱ ﻣﺮﺣﻠﺔ ﻣﻦ ﻣﺮﺍﺣﻞ ﺍﻟﺘﺤﻘﻴﻖ ﺃﻭ ﺍﶈﺎﻛﻤﺔ ﻹﺛﺒﺎﺕ‬
‫ﺣﻘﻴﻘﺔ ﻓﻌﻞ ﺃﻭ ﺷﻲﺀ ﺃﻭ ﺷﺨﺺ ﻟﻪ ﻋﻼﻗﺔ ﲜﺮﳝﺔ‪ ،‬ﺃﻭ ﺟﺎﱐ ﺃﻭ ﳎﲏ ﻋﻠﻴﻪ‪(1).‬ﺃﻭ ﺃﻧﻪ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺬﻱ ﳚﺪ ﻟﻪ‬
‫ﺃﺳﺎﺳﺎ ﰲ ﺍﻟﻌﺎﱂ ﺍﻹﻓﺘﺮﺍﺿﻲ ﻭﻳﻘﻮﺩ ﺇﱃ ﺍﳉﺮﳝﺔ‪(2)،‬ﺃﻭ ﺃﻧﻪ ﺫﻟﻚ ﺍﻟﺪﻟﻴﻞ ﺍﳌﺸﺘﻖ ﻣﻦ ﺃﻭ ﺑﻮﺍﺳﻄﺔ ﺍﻟﻨﻈﻢ‬
‫ﺍﻟﱪﺍﳎﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﳊﺎﺳﻮﺑﻴﺔ ﻭﺃﺟﻬﺰﺓ ﻭﻣﻌﺪﺍﺕ ﻭﺃﺩﻭﺍﺕ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﺃﻭ ﺷﺒﻜﺎﺕ ﺍﻹﺗﺼﺎﻻﺕ ﻣﻦ‬
‫ﺧﻼﻝ ﺇﺟﺮﺍﺀﺍﺕ ﻗﺎﻧﻮﻧﻴﺔ ﻭﻓﻨﻴﺔ ﻟﺘﻘﺪﳝﻬﺎ ﻟﻠﻘﻀﺎﺀ ﺑﻌﺪ ﲢﻠﻴﻠﻬﺎ ﻋﻠﻤﻴﺎ ﺃﻭ ﺗﻔﺴﲑﻫﺎ ﰲ ﺷﻜﻞ ﻧﺼﻮﺹ‬
‫ﻣﻜﺘﻮﺑﺔ ﺃﻭ ﺭﺳﻮﻣﺎﺕ ﺃﻭ ﺻﻮﺭ ﺃﻭ ﺃﺷﻜﺎﻝ ﺃﻭ ﺃﺻﻮﺍﺕ ﻹﺛﺒﺎﺕ ﻭﻗﻮﻉ ﺍﳉﺮﳝﺔ ﻭﻟﺘﻘﺮﻳﺮ ﺍﻟﱪﺍﺀﺓ ﺃﻭ ﺍﻹﺩﺍﻧﺔ‬
‫) ‪(3‬‬
‫ﻓﻴﻬﺎ‪.‬‬
‫ﻛﻤﺎ ﻋﺮﻑ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺃﻳﻀﺎ ﺃﻧﻪ ﳎﻤﻮﻋﺔ ﺍ‪‬ﺎﻻﺕ ﺃﻭ ﺍﻟﻨﺒﻀﺎﺕ ﺍﳌﻐﻨﺎﻃﻴﺴﻴﺔ ﺃﻭ ﺍﻟﻜﻬﺮﺑﺎﺋﻴﺔ‬
‫ﺍﻟﱵ ﳝﻜﻦ ﲡﻤﻴﻌﻬﺎ ﻭﲢﻠﻴﻠﻬﺎ ﺑﺈﺳﺘﺨﺪﺍﻡ ﺑﺮﺍﻣﺞ ﻭﺗﻄﺒﻴﻘﺎﺕ ﺧﺎﺻﺔ ﻟﺘﻈﻬﺮ ﰲ ﺷﻜﻞ ﺻﻮﺭ ﺃﻭ ﺗﺴﺠﻴﻼﺕ‬
‫) ‪(4‬‬
‫ﺻﻮﺗﻴﺔ ﺃﻭ ﻣﺮﺋﻴﺔ‪.‬‬
‫‪the‬‬ ‫‪sientific‬‬ ‫ﻭﻗﺪ ﻋﺮﻓﺖ ﳎﻤﻮﻋﺔ ﺍﻟﻌﻤﻞ ﺍﻟﻌﻠﻤﻴﺔ ﻟﻸﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ‬
‫‪workingGrouponDigital evidence‬ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻋﺎﻡ ‪ 1999‬ﺑﺄﻧﻪ ﻣﻌﻠﻮﻣﺎﺕ ﺫﺍﺕ ﻗﻴﻤﺔ ﺇﺛﺒﺎﺗﻴﺔ‬
‫ﳐﺰﻧﺔ ﺃﻭ ﻣﻨﻘﻮﻟﺔ ﰲ ﺷﻜﻞ ﺛﻨﺎﺋﻲ‪.‬‬
‫ﻭﺍﻟﺘﻌﺮﻳﻒ ﺍﻟﺬﻱ ﺃﺧﺬ ﺑﻪ ﺍﻟﺘﻘﺮﻳﺮ ﺍﻷﻣﺮﻳﻜﻲ ﺍﳌﻘﺪﻡ ﻟﻨﺪﻭﺓ ﺍﻷﻧﺘﺮﺑﻮﻝ ﺍﻟﻌﻠﻤﻴﺔ ﺣﻮﻝ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‬
‫ﻋﺎﻡ ‪،2001‬ﺃﻋﺘﱪ ﺃﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻫﻮ ﻋﺒﺎﺭﺓ ﻋﻦ ﺑﻴﺎﻧﺎﺕ ﳝﻜﻦ ﺇﻋﺪﺍﺩﻫﺎ ﻭﺗﺮﺍﺳﻠﻬﺎ ﻭﲣﺰﻳﻨﻬﺎ ﺭﻗﻤﻴﺎ‪،‬‬
‫ﲝﻴﺚ ﳝﻜﻦ ﺍﳊﺎﺳﻮﺏ ﻣﻦ ﺗﺄﺩﻳﺔ ﻣﻬﺎﻡ ﻣﺎ‪.‬‬
‫ﻭﻳﺴﺘﺨﻠﺺ ﻣﻦ ﺍﻟﺘﻌﺮﻳﻔﺎﺕ ﺍﻟﺴﺎﺑﻘﺔ ﺃﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪ ،‬ﻫﻮ ﺃﻱ ﻣﻌﻠﻮﻣﺎﺕ ﺳﻮﺍﺀ ﻛﺎﻧﺖ ﻣﻦ ﺻﻨﻊ‬
‫ﺍﻹﻧﺴﺎﻥ ﺃﻭ ﰎ ﺇﺳﺘﺨﻼﺻﻬﺎ ﻣﻦ ﺍﳊﺎﺳﻮﺏ ﻳﻘﺒﻠﻬﺎ ﺍﳌﻨﻄﻖ ﻭﺍﻟﻌﻘﻞ ﻭﻳﻌﺘﻤﺪﻫﺎ ﺍﻟﻌﻠﻢ ﻭﻳﺘﻢ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻬﺎ‬

‫)‪(1‬ﳏﻤﺪ ﺍﻷﻣﲔ ﺍﻟﺒﺸﺮﻱ ﻣﺸﺎﺭ ﻟﻪ ﻟﺪﻯ ﺭﺷﻴﺪﺓ ﺑﻮﻛﺮ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ ‪.‬ﺹ‪.383‬‬
‫)‪(2‬ﻋﻤﺮ ﳏﻤﺪ ﺑﻦ ﻳﻮﻧﺲ ﻣﺬﻛﺮﺍﺕ ﰲ ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ ﻋﱪ ﺍﻷﻧﺘﺮﻧﺎﺕ‪ ،‬ﻧﺪﻭﺓ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﲜﺎﻣﻌﺔ ﺍﻟﺪﻭﻝ ﺍﻟﻌﺮﺑﻴﺔ ﰲ ﺍﻟﻔﺘﺮﺓ ﻣﻦ ‪ ،2006 5-8‬ﺹ‪.05‬‬
‫)‪ (3‬ﺍﳋﺒﲑ ﻋﺒﺪ ﺍﻟﻨﺎﺻﺮ ﳏﻤﺪ ﳏﻤﻮﺩﻓﺮﻏﻠﻲ ﻋﻠﻲ ﻭﺩ‪ .‬ﳏﻤﺪ ﻋﺒﻴﺪ ﺳﻴﻒ ﺳﻌﻴﺪ ﺍﳌﺴﻤﺎﺭﻱ ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ ﺑﺎﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﻣﻦ ﺍﻟﻨﺎﺣﻴﺘﲔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻭﺍﻟﻔﻨﻴﺔ‪،‬‬
‫ﺍﳌﺆﲤﺮ ﺍﻟﻌﺮﰊ ﺍﻷﻭﻝ ﻟﻌﻠﻮﻡ ﺍﻷﺩﻟﺔ ﺍﳉﻨﺎﺋﻴﺔ ﻭﺍﻟﻄﺐ ﺍﻟﺸﺮﻋﻲ ﺍﻟﺮﻳﺎﺽ ﰲ ﻟﻔﺘﺮﺓ ﻣﻦ ‪.2007/11/14-12‬‬
‫)‪(4‬ﻃﺎﺭﻕ ﳏﻤﺪ ﺍﳉﻤﻠﻲ‪ .‬ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﰲ ﳎﺎﻝ ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ ‪.‬ﻭﺭﻗﺔ ﻋﻤﻞ ﻣﻘﺪﻣﺔ ﺍﳌﺆﲤﺮ ﺍﳌﻐﺎﺭﰊ ﺍﻷﻭﻝ ﺩﻭﻝ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺍﻟﻘﺎﻧﻮﻥ ﺍﳌﻨﻌﻘﺪ ﰲ ﺍﻟﻔﺘﺮﺓ‬
‫ﻣﻦ ‪ 2009 10/29-28‬ﺗﻨﻈﻤﺔ ﺃﻛﺎﺩﳝﻴﺔ ﺍﻟﺪﺭﺍﺳﺎﺕ ﺍﻟﻌﻠﻴﺎ ﻃﺮﺍﺑﻠﺲ‪.‬ﺑﺪﻭﻥ ﺗﺮﻗﻴﻢ‪.‬‬

‫‪- 121 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺑﺈﺟﺮﺍﺀﺍﺕ ﻗﺎﻧﻮﻧﻴﺔ ﻭﻋﻠﻤﻴﺔ ﺑﺘﺮﲨﺔ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﳊﺴﺎﺑﻴﺔ ﺍﳌﺨﺰﻧﺔ ﰲ ﺃﺟﻬﺰﺓ ﺍﳊﺎﺳﻮﺏ ﻭﻣﻠﺤﻘﺎ‪‬ﺎ ﻭﺷﺒﻜﺎﺕ‬
‫ﺍﻹﺗﺼﺎﻝ‪ ،‬ﻭﳝﻜﻦ ﺇﺳﺘﺨﺪﺍﻣﻬﺎ ﰲ ﺃﻱ ﻣﺮﺣﻠﺔ ﻣﻦ ﻣﺮﺍﺣﻞ ﺍﻟﺘﺤﻘﻴﻖ ﺃﻭ ﺍﶈﻜﻤﺔ ﻹﺛﺒﺎﺕ ﺣﻘﻴﻘﺔ ﻓﻌﻞ ﺃﻭ‬
‫ﺷﻲﺀ ﺃﻭ ﺷﺨﺺ ﻟﻪ ﻋﻼﻗﺔ ﲜﺮﳝﺔ ﺃﻭ ﺟﺎﱐ ﺃﻭ ﳎﲏ ﻋﻠﻴﻪ‪.‬‬
‫ﻭﺑﺎﻟﻨﻈﺮ ﺇﱃ ﲨﻠﺔ ﺍﻟﺘﻌﺮﻳﻔﺎﺕ ﺍﻟﺴﺎﺑﻘﺔ‪ ،‬ﳝﻜﻦ ﺃﻥ ﻧﻼﺣﻆ ﺃﻥ ﻣﻨﻬﺎ ﻣﻦ ﺃﳊﻖ ﻣﻔﻬﻮﻡ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‬
‫ﲟﻔﻬﻮﻡ ﺍﻟﱪﻧﺎﻣﺞ ﻋﻠﻰ ﺍﻟﺮﻏﻢ ﻣﻦ ﺇﺧﺘﻼﻓﻬﻤﺎ‪ ،‬ﻓﺎﻟﻔﺮﻕ ﺑﻴﻨﻬﻤﺎ ﻳﻜﻤﻦ ﰲ ﺍﻟﻮﻇﻴﻔﺔ ﺍﻟﱵ ﻳﺆﺩﻳﻬﺎ ﻛﻞ ﻭﺍﺣﺪ‬
‫ﻣﻨﻬﻤﺎ‪ ،‬ﻓﱪﺍﻣﺞ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻟﻪ ﺩﻭﺭ ﰲ ﺍﻟﻘﻴﺎﻡ ﲟﺨﺘﻠﻒ ﺍﻟﻌﻤﻠﻴﺎﺕ ﺍﻟﱵ ﳛﺘﻮﻳﻬﺎ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ‬
‫ﻭﺍﻟﺬﻱ ﻻ ﻳﻘﻮﻡ ﺑﻌﻤﻠﻪ ﺇﻻ ﻋﻦ ﻃﺮﻳﻖ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻟﱪﺍﻣﺞ ﺗﺴﻤﺢ ﺑﺎﻟﻘﻴﺎﻡ ﲟﺨﺘﻠﻒ ﺍﻟﻌﻤﻠﻴﺎﺕ ﻋﻨﺪ ﺇﻋﻄﺎﺀ‬
‫ﺃﻭﺍﻣﺮ ﺑﺬﻟﻚ‪ ،‬ﺃﻣﺎ ﺍﻟﺪﻟﻴﻞ ﺍﳉﻨﺎﺋﻲ ﺍﻟﺮﻗﻤﻲ ﻓﻠﻪ ﺃﳘﻴﺔ ﻛﱪﻯ ﻭﺩﻭﺭ ﺃﺳﺎﺳﻲ ﰲ ﻣﻌﺮﻓﺔ ﻛﻴﻔﻴﺔ ﺣﺪﻭﺙ‬
‫ﺟﺮﺍﺋﻢ ﺍﻹﻋﺘﺪﺍﺀ ﻋﻠﻰ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ‪‬ﺪﻑ ﺇﺛﺒﺎ‪‬ﺎ ﻭﻧﺴﺒﺘﻬﺎ ﺇﱃ ﻣﺮﺗﻜﺒﻬﺎ‪.‬‬
‫ﻛﻤﺎ ﺣﺼﺮﺕ ﺑﻌﺾ ﺍﻟﺘﻌﺮﻳﻔﺎﺕ ﺍﻟﺴﺎﺑﻘﺔ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﰲ ﺗﻠﻚ ﺍﻷﺩﻟﺔ ﺍﻟﱵ ﻳﺘﻢ ﺇﺳﺘﺨﺮﺍﺟﻬﺎ ﻣﻦ‬
‫ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻭﻫﻮ ﻣﺎ ﻳﻌﺪ ﺗﻀﻴﻴﻘﺎ ﻟﺪﺍﺋﺮﺓ ﺍﻟﺘﻘﻨﻴﺔ‪ ،‬ﻓﻬﻲ ﻛﻤﺎ ﳝﻜﻦ ﺃﻥ ﺗﺴﺘﺨﻠﺺ ﻣﻦ ﺍﳊﺎﺳﺐ ﺍﻵﱄ‬
‫ﻓﻤﻦ ﺍﳌﻤﻜﻦ ﺃﻳﻀﺎ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻬﺎ ﻣﻦ ﺃﻱ ﻭﺳﻴﻠﺔ ﺗﻘﻨﻴﺔ ﺃﺧﺮﻯ ﻛﺎﳍﻮﺍﺗﻒ ﺍﻟﻨﻘﺎﻟﺔ ﺍﻟﺬﻛﻴﺔ‪.‬‬
‫ﻛﻤﺎ ﺫﻫﺒﺖ ﺑﻌﺾ ﺍﻟﺘﻌﺮﻳﻔﺎﺕ ﺇﱃ ﺇﺿﻔﺎﺀ ﺻﻔﺔ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻋﻠﻰ ﺗﻠﻚ ﺍﻷﺩﻟﺔ ﺍﳌﺴﺘﺨﻠﺼﺔ ﻣﻦ‬
‫ﺍﻟﻮﺳﻂ ﺍﻹﻓﺘﺮﺍﺿﻲ‪ ،‬ﻭﲟﻔﻬﻮﻡ ﺍﳌﺨﺎﻟﻔﺔ ﻓﺈﻥ ﺗﻠﻚ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﱵ ﻻﺯﺍﻟﺖ ﱂ ﻳﺘﻢ ﻓﺼﻠﻬﺎ ﻋﻦ ﺍﳊﺎﺳﻮﺏ‬
‫ﻭﻫﻲ ﰲ ﺷﻜﻞ ﳎﺎﻻﺕ ﺃﻭ ﻧﺒﻀﺎﺕ ﻣﻐﻨﺎﻃﻴﺴﻴﺔ ﺃﻭ ﻛﻬﺮﺑﺎﺋﻴﺔ ﻻ ﺗﺼﻠﺢ ﻷﻥ ﺗﻮﺻﻒ ﺑﺎﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‬
‫ﻭﻫﻮ ﻗﻮﻝ ﻏﲑ ﺩﻗﻴﻖ‪.(1).‬‬
‫ﻭﻳﺮﻯ ﺍﻟﺒﻌﺾ ﺃﻥ ﺍﻷﺩﻟﻴﺔ ﺍﳉﻨﺎﺋﻴﺔ ﺍﻟﺮﻗﻤﻴﺔ ﻣﺎ ﻫﻲ ﺇﻻ ﻣﺮﺣﻠﺔ ﻣﺘﻘﺪﻣﺔ ﻣﻦ ﺍﻷﺩﻟﺔ ﺍﳌﺎﺩﻳﺔ ﺍﳌﻠﻤﻮﺳﺔ‬
‫ﺍﻟﱵ ﳝﻜﻦ ﺇﺩﺭﺍﻛﻬﺎ ﺑﺈﺣﺪﻯ ﺍﳊﻮﺍﺱ ﺍﻟﻄﺒﻴﻌﻴﺔ ﻟﻺﻧﺴﺎﻥ‪ ،‬ﺇﱃ ﺍﻹﺳﺘﻌﺎﻧﺔ ﲜﻤﻴﻊ ﻣﺎ ﻳﺒﺘﻜﺮﻩ ﺍﻟﻌﻠﻢ ﻣﻦ‬
‫ﻭﺳﺎﺋﻞ ﺍﻟﺘﻘﻨﻴﺔ ﺍﻟﻌﺎﻟﻴﺔ ﻭﻣﻨﻬﺎ ﺍﳊﺎﺳﻮﺏ‪ .‬ﻭﻟﻜﻦ ﺍﳊﻘﻴﻘﺔ ﺃﻥ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﻫﻲ ﻧﻮﻉ ﻣﺘﻤﻴﺰ ﻣﻦ ﻭﺳﺎﺋﻞ‬
‫ﺍﻹﺛﺒﺎﺕ ﻭﳍﺎ ﻣﻦ ﺍﳋﺼﺎﺋﺺ ﺍﻟﻌﻠﻤﻴﺔ ﻭﺍﳌﻮﺍﺻﻔﺎﺕ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻣﺎ ﻳﺆﻫﻠﻬﺎ ﻟﺘﻘﻮﻡ ﻛﺈﺿﺎﻓﺔ ﺟﺪﻳﺪﺓ ﻷﻧﻮﺍﻉ‬
‫ﺍﻷﺩﻟﺔ ﺍﳉﻨﺎﺋﻴﺔ‪.‬‬
‫ﺛﺎﻧﻴﺎ‪ :‬ﺧﺼﺎﺋـﺺ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗـﻤﻲ‪:‬ﺗﻘﻮﻡ ﺧﺼﺎﺋﺺ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻋﻠﻰ ﻣﺪﻯ ﺇﺭﺗﺒﺎﻃﻪ ﺑﺎﻟﺒﻴﺌﺔ‬
‫ﺍﻟﱵ ﳛﻴﺎ ﻓﻴﻬﺎ‪ ،‬ﻭﻫﻲ ﺍﻟﺒﻴﺌﺔ ﺍﻹﻓﺘﺮﺍﺿﻴﺔ ﻭﺍﻟﺘﻴﺈﻧﻌﻜﺴﺖ ﻋﻠﻰ ﻃﺒﻴﻌﺔ ﻫﺬﺍ ﺍﻟﺪﻟﻴﻞ ﻓﺄﺻﺒﺢ ﻳﺘﺼﻒ ﺑﻌﺪﺓ‬
‫ﺧﺼﺎﺋﺺ ﺟﻌﻠﺘﻪ ﻳﺘﻤﻴﺰ ﻋﻦ ﺍﻟﺪﻟﻴﻞ ﺍﳉﻨﺎﺋﻲ ﺍﻟﺘﻘﻠﻴﺪﻱ‪.‬‬

‫)‪(1‬ﺭﺷﻴﺪﺓ ﺑﻮﻛﺮ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ‪.385‬‬

‫‪- 122 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪/1‬ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻫﻮ ﺩﻟﻴﻞ ﻋﻠﻤﻲ‪:‬ﺇﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﳛﺘﺎﺝ ﺇﱃ ﺑﻴﺌﺘﻪ ﺍﻟﺘﻘﻨﻴﺔ ﺍﻟﱵ ﻳﺘﻜﻮﻥ ﻓﻴﻬﺎ‪،‬‬
‫ﻟﻜﻮﻧﻪ ﻣﻦ ﻃﺒﻴﻌﺔ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺫﺍﺕ ﺍﳌﺒﲎ ﺍﻟﻌﻠﻤﻲ ﻭﻣﻦ ﲦﺔ ﻓﺈﻥ ﻣﺎ ﻳﻨﻄﺒﻖ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺍﻟﻌﻠﻤﻲ ﻳﻨﻄﺒﻖ‬
‫ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪ ،‬ﻓﺎﻟﺪﻟﻴﻞ ﺍﻟﻌﻠﻤﻲ ﳜﻀﻊ ﻟﻘﺎﻋﺪﺓ ﻟﺰﻭﻡ ﲡﺎﻭﺑﻪ ﻣﻊ ﺍﳊﻘﻴﻘﺔ ﻛﺎﻣﻠﺔ ﻭﻓﻘﺎ ﻟﻘﺎﻋﺪﺓ ﺃﻥ‬
‫ﺍﻟﻘﺎﻧﻮﻥ ﻣﺴﻌﺎﻩ ﺍﻟﻌﺪﺍﻟﺔ ﻭﺃﻣﺎ ﺍﻟﻌﻠﻢ ﻓﻤﺴﻌﺎﻩ ﺍﳊﻘﻴﻘﺔ‪، science seekstruthlaw seeks ،justice .:‬‬
‫ﻭﺇﺫﺍ ﻛﺎﻥ ﻟﻠﺪﻟﻴﻞ ﺍﻟﻌﻠﻤﻲ ﻣﻨﻄﻘﻪ ﺍﻟﺬﻱ ﳚﺐ ﺃﻻ ﳜﺮﺝ ﻋﻠﻴﻪ‪ ،‬ﺇﺫ ﻳﺴﺘﺒﻌﺪ ﺗﻌﺎﺭﺿﻪ ﻣﻊ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻟﻌﻠﻤﻴﺔ‬
‫ﺍﻟﺴﻠﻴﻤﺔ ﻓﺈﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻟﻪ ﺫﺍﺕ ﺍﻟﻄﺒﻴﻌﺔ ﻓﻼ ﳚﺐ ﺃﻥ ﳜﺮﺝ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﻷﺩﻟﺔ ﻋﻤﺎ ﺗﻮﺻﻞ ﺇﻟﻴﻪ‬
‫) ‪(1‬‬
‫ﺍﻟﻌﻠﻢ ﺍﻟﺮﻗﻤﻲ ﻭﺇﻻ ﻓﻘﺪ ﻣﻌﻨﺎﻩ‪.‬‬
‫‪/2‬ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻣﻦ ﻃﺒﻴﻌﺔ ﺗﻘﻨﻴﺔ‪:‬ﺍﻥ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﺘﻘﻨﻴﺔ ﻟﻠﺪﻟﻴﻞ ﺗﻘﺘﻀﻲ ﺃﻥ ﻳﻜﻮﻥ ﻫﻨﺎﻙ ﺗﻮﺍﻓﻖ ﺑﲔ‬
‫ﺍﻟﺪﻟﻴﻞ ﺍﳌﺮﺻﻮﺩ‪ ،‬ﻭﺑﲔ ﺍﻟﺒﻴﺌﺔ ﺍﻟﱵ ﻳﻌﻴﺶ ﻓﻴﻬﺎ ﻓﻼ ﺗﻨﺘﺞ ﺍﻟﺘﻘﻨﻴﺔ ﺳﻜﻴﻨﺎ ﻳﺘﻢ ﺑﻪ ﺇﻛﺘﺸﺎﻑ ﺍﻟﻘﺎﺗﻞ‪ ،‬ﺃﻭ‬
‫ﺇﻋﺘﺮﺍﻓﺎ ﻣﻜﺘﻮﺑﺎ ﺃﻭ ﻣﺎﻻ ﰲ ﺟﺮﳝﺔ ﺍﻟﺮﻭﺷﺔ‪ ،‬ﺃﻭ ﺑﺼﻤﺔ ﺃﺻﺒﻊ ﻭﺇﳕﺎ ﻣﺎ ﺗﻨﺘﺠﻪ ﺍﻟﺘﻘﻨﻴﺔ ﻫﻮ ﻧﺒﻀﺎﺕ ﺭﻗﻤﻴﺔ‬
‫ﺗﺸﻜﻞ ﻗﻴﻤﺘﻬﺎ ﰲ ﺇﻣﻜﺎﻧﻴﺔ ﺗﻌﺎﻣﻠﻬﺎ ﻣﻊ ﺍﻟﻘﻄﻊ ﺍﻟﺼﻠﺒﺔ ﺍﻟﱵ ﺗﺸﻜﻞ ﺍﳊﺎﺳﻮﺏ ﻋﻠﻰ ﺃﻳﺔ ﺷﺎﻛﻠﺔ ﻳﻜﻮﻥ‬
‫ﻋﻠﻴﻬﺎ‪ ،‬ﻭﻣﺜﻞ ﻫﺬﺍ ﺍﻷﻣﺮ ﳚﻌﻠﻨﺎ ﻧﻘﺮﺭ ﺃﻧﻪ ﻻ ﻭﺟﻮﺩ ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺧﺎﺭﺝ ﺑﻴﺘﻪ ﺍﻟﺘﻘﻨﻴﺔ ﻭﺃﻧﻪ ﻟﻜﻲ ﻳﻜﻮﻥ‬
‫ﻫﻨﺎﻙ ﺩﻟﻴﻞ ﺭﻗﻤﻲ ﳚﺐ ﺃﻥ ﻳﻜﻮﻥ ﻣﺴﺘﻮﺣﺎ ﺃﻭ ﻣﺴﺘﻨﺒﻄﺎ ﻣﻦ ﺍﻟﺒﻴﺌﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺃﻭ ﺍﻟﺘﻘﻨﻴﺔ)‪(2‬ﻭﻫﻲ ﰲ ﺇﻃﺎﺭ‬
‫ﺟﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﳑﺜﻠﺔ ﰲ ﺍﻟﻌﺎﱂ ﺍﻟﺮﻗﻤﻲ ﺃﻭ ﺍﻟﻌﺎﱂ ﺍﻹﻓﺘﺮﺍﺿﻴﻮ ﻫﻮ ﺍﻟﻌﺎﱂ ﺍﻟﻜﺎﻣﻦ ﰲ ﺍﳊﺎﺳﻮﺏ ﻭﺍﳋﻮﺍﺩﻡ‬
‫ﻭﺍﳌﻀﻴﻔﺎﺕ ﻭﺍﻟﺸﺒﻜﺎﺕ ﺍﻟﱵ ﻳﺘﻢ ﺗﺪﺍﻭﻝ ﺍﳊﺮﻛﺔ ﻓﻴﻪ ﻋﱪﻫﺎ‪.‬‬
‫ﻭﻧﺘﻴﺠﺔ ﻟﻠﻄﺒﻴﻌﺔ ﺍﻟﺘﻘﻨﻴﺔ ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻓﺈﻧﻪ ﺃﻛﺘﺴﺐ ﳑﻴﺰﺍﺕ ﻋﻦ ﺍﻟﺪﻟﻴﻞ ﺍﳌﺎﺩﻱ ﻣﻦ ﺣﻴﺚ ﻗﺎﺑﻠﻴﺘﻪ‬
‫ﻟﻠﻨﺴﺦ‪ ،‬ﲝﻴﺚ ﳝﻜﻦ ﺇﺳﺘﺨﺮﺍﺝ ﻧﺴﺦ ﻣﻦ ﺍﻷﺩﻟﺔ ﺍﳉﻨﺎﺋﻴﺔ ﺍﻟﺮﻗﻤﻴﺔ ﻣﻄﺎﺑﻘﺔ ﻟﻸﺻﻞ ﻭﳍﺎ ﻧﻔﺲ ﺍﻟﻘﻴﻤﺔ‬
‫ﺍﻟﻌﻠﻤﻴﺔ‪ ،‬ﻭﻫﺬﻩ ﺍﳋﺎﺻﻴﺔ ﻻ ﺗﺘﻮﺍﻓﺮ ﰲ ﺃﻧﻮﺍﻉ ﺍﻷﺩﻟﺔ ﺍﻷﺧﺮﻯ ﳑﺎ ﻳﺸﻜﻞ ﺿﻤﺎﻧﺔ ﺷﺪﻳﺪﺓ ﺍﻟﻔﻌﺎﻟﻴﺔ ﻟﻠﺤﻔﺎﻅ‬
‫ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺿﺪ ﺍﻟﻔﻘﺪ ﻭﺍﻟﺘﻠﻒ ﻭﺍﻟﺘﻐﻴﲑ‪(3)،‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺇﻣﻜﺎﻧﻴﺔ ﲢﺪﻳﺪ ﻣﺎ ﺇﺫﺍ ﻛﺎﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻗﺪ‬
‫ﰎ ﺍﻟﻌﺒﺚ ﺑﻪ ﺃﻭ ﺗﻌﺪﻳﻠﻪ ﻭﺫﻟﻚ ﻹﻣﻜﺎﻧﻴﺔ ﻣﻘﺎﺭﻧﺘﻪ ﺑﺎﻷﺻﻞ ﺑﺈﺳﺘﺨﺪﺍﻡ ﺍﻟﱪﺍﻣﺞ ﻭﺍﻟﺘﻄﺒﻴﻘﺎﺕ ﺍﻟﺼﺤﻴﺤﺔ‪.‬‬

‫)‪(1‬ﻋﻤﺮ ﳏﻤﺪ ﺃﺑﻮ ﺑﻜﺮ ﺑﻦ ﻳﻮﻧﺲ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.977‬‬


‫)‪(2‬ﺧﺎﻟﺪ ﳑﺪﻭﺡ ﺇﺑﺮﺍﻫﻴﻢ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.181‬‬
‫)‪(3‬ﻋﻤﺮ ﳏﻤﺪ ﺑﻦ ﻳﻮﻧﺲ‪ ،‬ﻣﺬﻛﺮﺍﺕ ﰲ ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ ﻋﱪ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻧﺪﻭﺓ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪ ،‬ﲟﻘﺮ ﺟﺎﻣﻌﺔ ﺍﻟﺪﻭﻝ ﺍﻟﻌﺮﺑﻴﺔ ﰲ ﺍﻟﻔﺘﺮﺓ ﻣﻦ ‪-5‬‬
‫‪ 2005/03/8‬ﺹ‪ .17‬ﻭﻗﺪ ﻗﺎﻡ ﺍﳌﺸﺮﻉ ﺍﻟﺒﻠﺠﻴﻜﻲ ﳝﻘﺘﻀﻰ ﺍﻟﻘﺎﻧﻮﻥ ‪ .2000/11/28‬ﺇﱃ ﺗﻌﺪﻳﻞ ﻗﺎﻧﻮﻥ ﺍﻟﺘﺤﻘﻴﻖ ﺍﳉﻨﺎﺋﻲ ‪code instruction‬‬
‫‪ criminel‬ﺑﺈﺿﺎﻓﺔ ﺍﳌﺎﺩﺓ ‪ 39‬ﻣﻜﺮﺭ ﺍﻟﱵ ﲰﺤﺖ ﺑﻀﺒﻂ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺑﻨﺴﺦ ﺍﳌﻮﺍﺩ ﺍﳌﺨﺰﻧﺔ ﰲ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ‪.‬‬

‫‪- 123 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪-3‬ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺩﻟﻴﻞ ﻣﺘﻨﻮﻉ ﻭﻣﺘﻄﻮﺭ‪ :‬ﻳﺸﻤﻞ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻛﺎﻓﺔ ﺃﺷﻜﺎﻝ ﻭﺃﻧﻮﺍﻉ‬
‫ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻟﺮﻗﻤﻴﺔ ﺍﳌﻤﻜﻦ ﺗﺪﺍﻭﳍﺎ ﺭﻗﻤﻴﺎ‪ ،‬ﲝﻴﺚ ﻳﻜﻮﻥ ﺑﻴﻨﻬﺎ ﻭﺑﲔ ﺍﳉﺮﳝﺔ ﺭﺍﺑﻄﺔ ﻣﻦ ﻧﻮﻉ ﺧﺎﺹ ﻭﺗﺘﺼﻞ‬
‫ﺑﺎﻟﻀﺤﻴﺔ ﻋﻠﻰ ﺍﻟﻨﺤﻮ ﺍﻟﺬﻱ ﳛﻘﻖ ﻫﺬﻩ ﺍﻟﺮﺍﺑﻄﺔ ﺑﻴﻨﻬﺎ ﻭﺑﲔ ﺍﳉﺎﱐ‪ .‬ﻭﺗﻌﲏ ﻫﺬﻩ ﺍﳋﺎﺻﻴﺔ ﺃﻧﻪ ﻋﻠﻰ ﺍﻟﺮﻏﻢ‬
‫ﻣﻦ ﺃﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﰲ ﺃﺳﺎﺳﻪ ﻣﺘﺤﺪ ﺍﻟﺘﻜﻮﻳﻦ ﺑﻠﻐﺔ ﺍﳊﻮﺳﺒﺔ ﻭﺍﻟﺮﻗﻤﻴﺔ ﺇﻻ ﺃﻧﻪ ﻣﻊ ﺫﻟﻚ ﻳﺘﺨﺬ ﺃﺷﻜﺎﻻ‬
‫ﳐﺘﻠﻔﺔ ﳝﻜﻦ ﺃﻥ ﻳﻈﻬﺮ ﻋﻠﻴﻬﺎ‪ ،‬ﻛﺄﻥ ﻳﻜﻮﻥ ﺑﻴﺎﻧﺎﺕ ﻏﲑ ﻣﻘﺮﻭﺀﺓ ﻣﻦ ﺧﻼﻝ ﺿﺒﻂ ﻣﺼﺪﺭ ﺍﻟﺪﻟﻴﻞ ﻛﻤﺎ‬
‫ﻫﻮ ﺍﻟﺸﺄﻥ ﺣﺎﻝ ﺍﳌﺮﺍﻗﺒﺔ ﻋﱪ ﺍﻟﺸﺒﻜﺎﺕ ﻭﺍﳌﻠﻘﻤﺎﺕ ﻭﺍﳋﻮﺍﺩﻡ‪ ،‬ﻭﻗﺪ ﻳﻜﻮﻥ ﺑﻴﺎﻧﺎﺕ ﻣﻔﻬﻮﻣﺔ ﻛﻤﺎ ﻟﻮ ﻛﺎﻥ‬
‫ﻭﺛﻴﻘﺔ )‪ (Document‬ﻣﻌﺪﺓ ﺑﻨﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ‪ ،‬ﻛﻤﺎ ﻣﻦ ﺍﳌﻤﻜﻦ ﺃﻥ ﻳﻜﻮﻥ ﺻﻮﺭﺓ ﺛﺎﺑﺘﺔ ﺃﻭ ﻣﺘﺤﺮﻛﺔ‬
‫)ﺃﻓﻼﻡ ﺭﻗﻤﻴﺔ( ﺃﻭ ﻣﻌﺪﺓ ﺑﻨﻈﺎﻡ ﺍﻟﺘﺴﺠﻴﻞ ﺍﻟﺴﻤﻌﻲ ﺍﻟﺒﺼﺮﻱ ﺃﻭ ﻳﻜﻮﻥ ﳐﺰﻧﺎ ﰲ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ‪ ،‬ﻭﻗﺪ‬
‫ﻳﻜﻮﻥ ﺃﻳﻀﺎ ﻣﺮﺗﺒﻄﺎ ﺑﺎﻟﺘﺸﻔﲑ‪ ،‬ﻭﻫﺬﺍ ﺍﻟﺘﻨﻮﻉ ﺇﳕﺎ ﻳﻌﺪ ﺗﻌﺒﲑﺍ ﻋﻦ ﺇﺗﺴﺎﻉ ﻗﺎﻋﺪﺓ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﲝﻴﺚ‬
‫ﳝﻜﻨﻪ ‪‬ﺬﻩ ﺍﻟﺼﻮﺭ ﺃﻥ ﻳﺸﻤﻞ ﺃﻧﻮﺍﻋﺎ ﻣﺘﻌﺪﺩﺓ ﻣﻦ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻟﺮﻗﻤﻴﺔ ﺍﻟﱵ ﺗﺼﻠﺢ ﻣﻨﻔﺮﺩﺓ ﺃﻭ ﳎﺘﻤﻌﺔ ﻻﻥ‬
‫ﺗﻜﻮﻥ ﺩﻟﻴﻼ ﺑﺎﻹﺩﺍﻧﺔ ﺃﻭ ﺍﻟﱪﺍﺀﺓ‪.‬‬
‫ﻭﺃﻣﺎ ﻋﻦ ﻛﻮﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺩﻟﻴﻼ ﻣﺘﻄﻮﺭﺍ ﻓﻬﻲ ﺧﺎﺻﻴﺔ ﺗﻜﺎﺩ ﺗﻜﻮﻥ ﺗﻠﻘﺎﺋﻴﺔ‪ ،‬ﻧﻈﺮﺍ ﻹﺭﺗﺒﺎﻃﻪ‬
‫ﺑﺎﻟﻄﺒﻴﻌﺔ ﺍﻟﱵ ﺗﺘﻤﺘﻊ ‪‬ﺎ ﺣﺮﻛﺔ ﺍﻹﺗﺼﺎﻝ ﻋﱪ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻭﺍﻟﻌﺎﱂ ﺍﻹﻓﺘﺮﺍﺿﻲ ﺍﻟﺬﺍﻥ ﻻ ﻳﺰﺍﻻﻥ ﰲ ﺑﺪﺍﻳﺎ‪‬ﻤﺎ‬
‫ﻭﱂ ﻳﺼﻼ ﺑﻌﺪ ﺇﱃ ﻣﻨﺘﻬﺎﳘﺎ ﻭﻟﻦ ﻳﻜﻮﻥ ﻣﻦ ﺍﻟﺴﻬﻞ ﺇﺣﺘﻮﺍﺅﳘﺎ‪.‬‬
‫‪-4‬ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺻﻌﺐ ﺍﻟﺘﺨﻠﺺ ﻣﻨﻪ‪ :‬ﺇﻥ ﺍﻟﻘﺎﻋﺪﺓ ﺍﻟﱵ ﺗﺴﺮﻱ ﻋﻠﻰ ﻛﺎﻓﺔ ﻣﺎ ﻳﺘﻌﻠﻖ ‪‬ﻴﻜﻠﺔ‬
‫ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﻫﻲ ﺃﻧﻪ ﻛﻠﻤﺎ ﺣﺪﺙ ﺇﺗﺼﺎﻝ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﰲ ﻣﻌﲎ ﺇﺩﺧﺎﻝ ﺑﻴﺎﻧﺎﺕ‬
‫ﺇﱃ ﺫﻟﻚ ﺍﻟﻌﺎﱂ )‪ (Input‬ﻓﺈﻧﻪ ﻣﻦ ﺍﻟﺼﻌﺐ ﺍﻟﺘﺨﻠﺺ ﻣﻨﻬﺎ ﻭﻟﻮ ﻛﺎﻥ ﺫﻟﻚ ﺑﺈﺳﺘﺨﺪﺍﻡ ﺃﻋﱴ ﺃﺩﻭﺍﺕ‬
‫ﺍﻹﻟﻐﺎﺀ‪ ،‬ﻓﻤﺤﺎﻭﻟﺔ ﺍﻟﺘﺨﻠﺺ ﻣﻦ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺑﺈﺳﺘﺨﺪﺍﻡ ﺧﺼﺎﺋﺺ ﺍﻟﺘﺨﻠﺺ ﻣﻦ ﺍﳌﻠﻔﺎﺕ ﰲ‬
‫ﺍﳊﺎﺳﻮﺏ ﻛﺨﺎﺻﻴﺔ )‪(...Erase. Remove.Delete‬ﻻ ﺗﻌﺪ ﻣﻦ ﺍﻟﻌﻮﺍﺋﻖ ﺍﻟﱵ ﲢﻮﻝ ﺩﻭﻥ ﺇﺳﺘﺮﺟﺎﻉ‬
‫ﺍﳌﻠﻔﺎﺕ ﺍﳌﺬﻛﻮﺭﺓ ﺇﺫ ﺗﺘﻮﺍﻓﺮ ﺑﺮﳎﻴﺎﺕ)‪(1‬ﺫﺍﺕ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﺮﻗﻤﻴﺔ ﳝﻜﻦ ﲟﻘﺘﻀﺎﻫﺎ ﺇﺳﺘﺮﺩﺍﺩ ﻛﺎﻓﺔ ﺍﳌﻠﻔﺎﺕ‬
‫ﺍﻟﱵ ﰎ ﺇﻟﻐﺎﺅﻫﺎ ﺃﻭ ﺇﺯﺍﻟﺘﻬﺎ ﻣﻦ ﺍﳊﺎﺳﻮﺏ‪.(2).‬‬

‫)‪(1‬ﻣﺜﻞ ‪ photorec/ recover jpeg/.foremost‬ﺗﺴﺘﺨﺪﻡ ﻹﺳﺘﺮﺟﺎﻉ ﺍﻟﺼﻮﺭ ﻭﺍﳌﻠﻔﺎﺕ ﺍﶈﺬﻭﻓﺔ ﻣﻦ ﺍﳍﺎﺭﺩﻭﺫﻭﺍﻛﺮ ‪USB‬‬
‫)‪(2‬ﻋﻤﺮ ﳏﻤﺪ ﺃﺑﻮ ﺑﻜﺮ ﺑﻦ ﻳﻮﻧﺲ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.982‬‬

‫‪- 124 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﳝﻜﻦ ﺍﻋﺘﺒﺎﺭ ﻫﺬﻩ ﺍﳋﺎﺻﻴﺔ ﻣﻴﺰﺓ ﻳﺘﻤﺘﻊ ‪‬ﺎ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻋﻦ ﻏﲑﻩ ﻣﻦ ﺍﻷﺩﻟﺔ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ‪ ،‬ﺇﺫ‬
‫ﳝﻜﻦ ﺍﻟﺘﺨﻠﺺ ﺑﺴﻬﻮﻟﺔ ﻣﻦ ﺍﻷﻭﺭﺍﻕ)‪(1‬ﻭﺍﻷﺷﺮﻃﺔ ﺍﳌﺴﺠﻠﺔ ﺇﺫﺍ ﲪﻠﺖ ﰲ ﻃﻴﺎ‪‬ﺎ ﺩﻟﻴﻞ ﺍﳉﺮﳝﺔ ﺑﺘﻤﺰﻳﻘﻬﺎ‬
‫ﺃﻭ ﺣﺮﻗﻬﺎ‪ ،‬ﻛﻤﺎ ﳝﻜﻦ ﺃﻳﻀﺎ ﺍﻟﺘﺨﻠﺺ ﻣﻦ ﺑﺼﻤﺎﺕ ﺍﻷﺻﺎﺑﻊ ﲟﺴﺤﻬﺎ ﻋﻦ ﻣﻮﺿﻌﻬﺎ‪ ،‬ﻛﻤﺎ ﳝﻜﻦ‬
‫ﺍﻟﺘﺨﻠﺺ ﻣﻦ ﺍﻟﺸﻬﻮﺩ ﺑﺘﻬﺪﻳﺪﻫﻢ ﺃﻭ ﻗﺘﻠﻬﻢ ﻛﻤﺎ ﳛﺪﺙ ﰲ ﺑﻌﺾ ﺍﻟﺪﻭﻝ ﺍﻟﻐﺮﺑﻴﺔ ﺃﻭ ﺇﺳﺘﺒﻌﺎﺩﻫﺎ ﺃﺻﻼ ﰲ‬
‫ﺍﻹﺛﺒﺎﺕ ﺇﺫﺍ ﻣﻀﻰ ﻋﻠﻴﻬﺎ ﻣﺪﺓ ﻃﻮﻳﻠﺔ ﻣﻦ ﺍﻟﺰﻣﻦ ﻗﺪ ﻻ ﻳﻜﻮﻥ ﺑﻌﺪﻫﺎ ﺍﻟﺸﺎﻫﺪ ﻗﺎﺩﺭﺍ ﻋﻠﻰ ﺍﻟﺘﺬﻛﺮ ﻭﻛﻞ‬
‫ﺫﻟﻚ ﳚﻌﻞ ﻋﻤﻠﻴﺔ ﺍﻟﺘﺨﻠﺺ ﻣﻦ ﻫﺬﻩ ﺍﻷﺩﻟﺔ ﺃﻣﺮﺍ ﺳﻬﻼ‪ ،‬ﻭﻣﻦ ﺇﻣﻜﺎﻧﻴﺔ ﺇﺳﺘﺮﺟﺎﻋﻬﺎ ﺃﻭ ﺇﺳﺘﺮﺩﺍﺩ ﺍﻟﺪﻟﻴﻞ‬
‫ﺍﳌﺴﺘﻤﺪ ﻣﻨﻬﺎ ﺃﻣﺮﺍ ﻣﺴﺘﺤﻴﻼ ﺑﻌﺪ ﺗﺪﻣﲑﻫﺎ‪ ،‬ﺃﻣﺎ ﺑﺎﻟﻨﺴﺒﺔ ﻟﻸﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﻓﺈﻥ ﺍﳊﺎﻝ ﻏﲑ ﺫﻟﻚ‪ ،‬ﺣﻴﺚ‬
‫ﳝﻜﻦ ﺇﺳﺘﺮﺟﺎﻋﻬﺎ ﺑﻌﺪ ﳏﻮﻫﺎ ﻭﺇﺻﻼﺣﻬﺎ ﺑﻌﺪ ﺇﺗﻼﻓﻬﺎ ﻭﺇﻇﻬﺎﺭﻫﺎ ﺑﻌﺪ ﺇﺣﻔﺎﺋﻬﺎ‪ ،‬ﳑﺎ ﻳﺆﺩﻱ ﺇﱃ ﺻﻌﻮﺑﺔ‬
‫ﺍﳋﻼﺹ ﻣﻨﻬﺎ‪ .‬ﻛﻤﺎ ﺃﻥ ﻧﺸﺎﻁ ﺍﳉﺎﱐ ﰲ ﻋﻤﻠﻴﺔ ﳏﻮ ﺍﻟﺪﻟﻴﻞ ﻳﺸﻜﻞ ﰲ ﺣﺪ ﺫﺍﺗﻪ ﺩﻟﻴﻼ ﺿﺪ ﺍﳉﺎﱐ ﻷﻥ‬
‫ﻫﺬﺍ ﺍﻟﻨﺸﺎﻁ)ﻓﻌﻞ ﺍﳉﺎﱐ ﶈﻮ ﺍﻟﺪﻟﻴﻞ( ﻳﺘﻢ ﺗﺴﺠﻴﻠﻪ ﰲ ﺍﳊﺎﺳﺐ ﺍﻵﱄ‪ ،‬ﻭﳝﻜﻦ ﺇﺳﺘﺨﻼﺻﻪ‬
‫ﻻﺣﻘﺎﻭﻳﺘﺮﺗﺐ ﻋﻠﻰ ﻫﺬﻩ ﺍﳋﺎﺻﻴﺔ ﻣﺴﺎﺋﻞ ﻗﺎﻧﻮﻧﻴﺔ ﻫﺎﻣﺔ ﺃﺑﺮﺯﻫﺎ ﻣﺴﺄﻟﺔ ﺍﻟﺘﺨﻠﺺ ﺃﻭ ﺇﺧﻔﺎﺀ ﺍﻟﺪﻟﻴﻞ‪ ،‬ﻭﻫﻮ‬
‫ﻳﻌﺪ ﻓﻌﻼ ﺁﺧﺮ ﻣﻮﺿﻮﻉ ﲡﺮﱘ ﲟﻘﺘﻀﻰ ﺍﻟﻘﺎﻧﻮﻥ‪ ،‬ﻓﺈﺫﺍ ﺛﺒﺖ ﺃﻥ ﻣﺮﺗﻜﺐ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻗﺪ ﺇﺳﺘﺨﺪﻡ‬
‫ﻣﻦ ﺍﻟﱪﳎﻴﺎﺕ ﻣﻦ ﺃﺟﻞ ﺍﻟﺘﺨﻠﺺ ﻣﻦ ﺍﻟﺪﻟﻴﻞ ﻓﺈﻧﻪ ﳝﻜﻦ ﻣﺘﺎﺑﻌﺘﻪ ﻭﺇﺩﺍﻧﺘﻪ ﺑﺎﻟﻨﺼﻮﺹ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﱵ ﲡﺮﻡ‬
‫ﻣﺜﻞ ﻫﺬﻩ ﺍﻷﻓﻌﺎﻝ‪.‬‬
‫‪-5‬ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺫﻭ ﻃﺒﻴﻌﺔ ﺭﻗﻤﻴﺔ ﺛﻨﺎﺋﻴﺔ)‪:(0-1‬ﺇﻥ ﺍﻵﺛﺎﺭ ﺍﻟﱵ ﻳﺘﺮﻛﻬﺎ ﻣﺴﺘﺨﺪﻡ ﺍﻟﻨﻈﺎﻡ‬
‫ﺍﳌﻌﻠﻮﻣﺎﰐ ﻭﺍﻟﱵ ﺗﺸﻤﻞ ﺍﻟﺮﺳﺎﺋﻞ ﺍﳌﺮﺳﻠﺔ ﻣﻨﻪ ﺃﻭ ﺍﻟﱵ ﺇﺳﺘﻘﺒﻠﻬﺎ ﻭﻛﺎﻓﺔ ﺍﻹﺗﺼﺎﻻﺕ ﺍﻟﱵ ﲤﺖ ﻣﻦ ﺧﻼﻝ‬
‫ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻭﺷﺒﻜﺔ ﺍﻹﺗﺼﺎﻻﺕ ﺗﻜﻮﻥ ﻋﻠﻰ ﺍﻟﺸﻜﻞ ﺍﻟﺮﻗﻤﻲ‪ ،‬ﻓﺎﻟﺒﻴﺎﻧﺎﺕ ﺍﳌﻮﺟﻮﺩﺓ ﺩﺍﺧﻞ ﺍﳊﺎﺳﺐ‬
‫ﺍﻵﱄ ﺳﻮﺍﺀ ﻛﺎﻧﺖ ﰲ ﺷﻜﻞ ﻧﺼﻮﺹ ﺃﻡ ﺣﺮﻭﻑ ﺃﻭ ﺃﺭﻗﺎﻡ ﺃﻡ ﺻﻮﺭ ﺃﻡ ﻓﻴﺪﻳﻮ ﺗﺘﺤﻮﻝ ﺇﱃ ﺻﻴﻐﺔ ﺭﻗﻤﻴﺔ‪،‬‬
‫ﺣﻴﺚ ﺗﺮﺗﻜﺰ ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﳊﺪﻳﺜﺔ ﻋﻠﻰ ﺗﻘﻨﻴﺔ ﺍﻟﺘﺮﻗﻴﻢ ﺍﻟﱵ ﺗﻌﲏ ﺗﺮﲨﺔ ﺃﻭ ﲢﻮﻳﻞ ﺃﻱ ﻣﺴﺘﻨﺪ‬
‫ﺇﱃ ﻧﻈﺎﻡ ﺛﻨﺎﺋﻲ ﰲ ﲤﺜﻴﻞ ﺍﻷﻋﺪﺍﺩ ﻳﻔﻬﻤﻪ ﺍﳊﺎﺳﺐ ﺍﻵﱄ‪ ،‬ﻗﻮﺍﻣﻪ ﺍﻟﺮﻗﻤﺎﻥ )‪(1).(0‬ﻓﺄﻱ ﺷﻲﺀ ﰲ ﺍﻟﻌﺎﱂ‬

‫)‪(1‬ﻭﻟﻘﺪ ﻛﺎﻧﺖ ﻗﻀﻴﺔ ﺍﻳﺮﺍﻥ ﻛﻮﻧﺘﺮﺍ)‪(Iran-contra‬ﺳﻨﺔ ‪ 1986‬ﻣﻦ ﺃﻭﱃ ﺍﻟﻘﻀﺎﻳﺎ ﺍﻟﱵ ﺃﺑﺮﺯﺕ ﻫﺬﻩ ﺍﻟﻄﺒﻌﺔ ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻭﻣﺎ ﳝﺘﻤﻊ ﺑﻪ ﻣﻦ ﺻﻼﺑﺔ‬
‫ﻓﻔﻲ ﻫﺬﻩ ﺍﻟﻘﻀﻴﺔ ﺃﺩﺭﻙ ﺍﳌﺴﺆﻭﻟﻮﻥ ﺍﻷﻣﺮﻳﻜﻴﻮﻥ ﻋﺪﻡ ﻭﺟﻮﺩ ﺇﺗﺰﺍﻥ ﰲ ﻣﻘﺎﺭﻧﺔ ﺍﻟﺪﻟﻴﻞ ﺍﻟﻮﺭﻗﻲ ﺑﺎﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻓﺎﻟﺪﻟﻴﻞ ﺍﻟﻮﺭﻗﻲ ﳝﻜﻦ ﺍﻟﺘﺨﻠﺺ ﻣﻨﻪ ﺑﺘﻤﺰﻳﻖ‬
‫ﺍﻟﻮﺭﻗﺔ ﺍﻟﱵ ﲢﻤﻠﻪ ﰲ ﺣﲔ ﺃﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﳝﻜﻦ ﺇﻋﺎﺩﺗﻪ ﺇﱃ ﺍﳊﻴﺎﺓ ﺣﱴ ﻭﺇﻥ ﻛﺎﻥ ﻗﺪ ﺗﻌﺮﺽ ﻟﻺﺯﺍﻟﺔ ﻓﻔﻲ ﻫﺬﻩ ﺍﻟﻘﻀﻴﺔ ﺃﺛﻨﺎﺀ ﺍﻟﺘﺤﻘﻴﻖ ﻣﻊ ﺍﻟﻜﻮﻟﻮﻧﻴﻞ"‬
‫ﺃﻭﻟﻴﻔﺮﻧﻮﺭﺩ" ﰎ ﺇﺳﺘﻌﺎﺩﺓ ﲨﻴﻊ ﺍﻟﺮﺳﺎﺋﻞ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﳉﺮﳝﺔ ﺑﻌﺪ ﺃﻥ ﻗﺎﻡ ﻫﺬﺍ ﺍﻟﻜﻮﻟﻮﻧﻴﻞ ﲝﺬﻓﻬﺎ ﻣﻦ ﺣﺎﺳﻮﺑﻪ ﺇﺫﺍ ﱂ ﻳﻜﻦ ﻳﻌﻠﻢ ﻫﺬﺍ ﺍﻷﺧﲑ ﺃﻥ ﻫﺬﻩ‬
‫ﺍﻟﺮﺳﺎﺋﻞ ﳝﻜﻦ ﺇﺳﺘﻌﺎﺩ‪‬ﺎ ﻋﻦ ﻃﺮﻳﻖ ﺍﻟﻨﺴﺦ ﺍﶈﻔﻮﻇﺔ ﰲ ﺍﻟﻨﻈﺎﻡ‪.‬‬

‫‪- 125 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﻟﺮﻗﻤﻲ ﻳﺘﻜﻮﻥ ﻣﻦ ﺍﻟﺼﻔﺮ ﻭﺍﻟﻮﺍﺣﺪ‪ (1) ،‬ﻓﺎﻟﻜﺘﺎﺑﺔ ﻣﺜﻼ ﰲ ﺍﻟﻌﺎﱂ ﺍﻟﺮﻗﻤﻲ ﻟﻴﺲ ﳍﺎ ﺍﻟﻮﺟﻮﺩ ﺍﳌﺎﺩﻱ ﺍﻟﺬﻱ‬
‫ﻧﻌﺮﻓﻪ ﻭﺇﳕﺎ ﻫﻲ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻷﺭﻗﺎﻡ ﺍﻟﱵ ﺗﺮﺟﻊ ﺇﱃ ﺃﺻﻞ ﻭﺍﺣﺪ ﻭﻫﻮ ﺍﻟﺮﻗﻢ ﺍﻟﺜﻨﺎﺋﻲ)‪ (1)(0‬ﻭﳘﺎ ﰲ‬
‫) ‪(2‬‬
‫ﺗﻜﻮﻳﻨﻬﻤﺎ ﺍﳊﻘﻴﻘﻲ ﻋﺒﺎﺭﺓ ﻋﻦ ﻧﺒﻀﺎﺕ ﻣﺘﻮﺍﺻﻠﺔ ﺍﻹﻳﻘﺎﻉ ﺗﺴﺘﻤﺪ ﺣﻴﻮﻳﺘﻬﺎ ﻭﺗﻔﺎﻋﻠﻬﺎ ﻣﻦ ﺍﻟﻄﺎﻗﺔ‪.‬‬
‫ﺇﻥ ﻫﺬﻩ ﺍﳋﺼﺎﺋﺺ ﺍﻟﺴﺎﻟﻒ ﺫﻛﺮﻫﺎ ﺃﻛﺴﺒﺖ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻃﺎﺑﻌﺎ ﻣﺘﻤﻴﺰﺍ ﺟﻌﻠﺖ ﻣﻨﻪ ﺍﻟﺪﻟﻴﻞ‬
‫ﺍﻷﻓﻀﻞ ﻹﺛﺒﺎﺕ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻷﻧﻪ ﻣﻦ ﻃﺒﻴﻌﺔ ﺍﻟﻮﺳﻂ ﺍﻟﺬﻱ ﺇﺭﺗﻜﺒﺖ ﻓﻴﻪ‪ ،‬ﺳﻮﺍﺀ ﻛﺎﻧﺖ ﻫﺬﻩ‬
‫ﺍﳉﺮﺍﺋﻢ ﻣﺮﺗﻜﻴﺔ ﺑﻮﺍﺳﻄﺔ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﺃﻭ ﻛﺎﻧﺖ ﺗﺸﻜﻞ ﺇﻋﺘﺪﺍﺀ ﻭﻣﺴﺎﺳﺎ ﻋﻠﻰ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ‬
‫ﺍﻵﻟﻴﺔ‪.‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺃﺷﻜﺎﻝ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻭﺃﻧﻮﺍﻋﻪ‪:‬‬
‫ﻳﻘﺴﻢ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺇﱃ ﺩﻟﻴﻠﲔ ﳘﺎ‪ :‬ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺍﻷﺻﻠﻲ ﻭﻫﻮ ﺍﻟﺒﻨﻮﺩ ﺍﻟﻌﻴﻨﻴﺔ ﺃﻭ ﺍﳊﺴﻴﺔ‬
‫ﻭﻛﺬﻟﻚ ﺍﳌﺴﺘﻤﺴﻜﺎﺕ ﺍﻟﺒﻴﺎﻧﻴﺔ ﺍﻟﱵ ﺗﺘﻌﻠﻖ ‪‬ﺬﻩ ﺍﻟﺒﻨﻮﺩ ﻋﻨﺪ ﺍﻹﻣﺴﺎﻙ ‪‬ﺎ ﻭﺣﺠﺰﻫﺎ‪ .‬ﻭﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‬
‫ﺍﳌﻜﺮﺭ ﻭﻫﻮ ﺇﺳﺘﻨﺴﺎﺥ ﺭﻗﻤﻲ ﺩﻗﻴﻖ ﳉﻤﻴﻊ ﺍﳌﺴﺘﻤﺴﻜﺎﺕ ﺍﻟﺒﻴﺎﻧﻴﺔ ﺍﻟﱵ ﻳﺘﺤﺘﻮﻳﻬﺎ ﺍﻟﺒﻨﺪ ﺍﻟﻌﻴﲏ ﺍﻷﺻﻠﻲ‪،‬‬
‫ﺃﻣﺎ ﺍﶈﺮﺭ ﺍﻟﺮﻗﻤﻲ ﻓﻬﻮ ﺑﻴﺎﻧﺎﺕ ﻳﺪﺧﻠﻬﺎ ﺍﳌﺰﻭﺩ ﻭﻳﺮﺳﻠﻬﺎ ﻋﻦ ﻃﺮﻳﻖ ﻭﺳﻴﻂ ﺇﻟﻜﺘﺮﻭﱐ ﻓﻴﺘﺮﲨﻬﺎ ﺍﻟﻮﺳﻴﻂ‬
‫ﻭﻓﻖ ﺑﺮﻧﺎﻣﺞ ﻣﻌﲔ ﻭﳝﺮﺭﻫﺎ ﺇﱃ ﺍﳌﺘﻠﻘﻲ ﺍﻟﺬﻱ ﳝﻜﻨﻪ ﺇﺳﺘﺨﺮﺍﺟﻬﺎ ﺑﺎﻹﺳﺘﻌﺎﻧﺔ ﺑﻮﺳﻴﻂ ﺇﻟﻜﺘﺮﻭﱐ ﺁﺧﺮ‬
‫ﻭﳝﻜﻨﻪ ﻗﺮﺍﺀ‪‬ﺎ ﺑﺬﺍﺕ ﺍﻟﱪﻧﺎﻣﺞ ﻭﺇﻇﻬﺎﺭﻫﺎ ﻋﻠﻰ ﺻﻮﺭﺓ ﺍﻹﺩﺧﺎﻝ‪ ،‬ﻭﺃﻣﺎ ﺍﻟﺼﻮﺭﺓ ﺍﳌﺄﺧﻮﺫﺓ ﻋﻦ ﺍﻟﺪﻟﻴﻞ‬
‫ﺍﻟﺮﻗﻤﻲ ﻓﻬﻲ ﺻﻮﺭﺓ ﺩﻗﻴﻘﺔ ﻭﻃﺒﻖ ﺍﻷﺻﻞ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﺍﻟﻮﺍﺭﺩﺓ ﰲ ﺍﻟﻮﺛﺎﺋﻖ ﺍﻟﺒﻴﺎﻧﻴﺔ ﻭﺍﳌﺴﺘﻘﻠﺔ ﻋﻦ ﺍﻟﺒﻨﻮﺩ‬
‫) ‪(3‬‬
‫ﺍﻟﻌﻴﻨﻴﺔ ﺍﻷﺻﻠﻴﺔ‬
‫ﻭﰲ ﻛﻼ ﺍﻟﺘﻘﺴﻴﻤﲔ ﺃﻱ ﺳﻮﺍﺀ ﻛﺎﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺃﺻﻠﻴﺎ ﺃﻡ ﻣﻜﺮﺭﺍ ﻓﻬﻮ ﻣﻦ ﺣﻴﺚ ﻫﻴﺄﺗﻪ ﻳﻮﺟﺪ‬
‫ﻋﻠﻰ ﻋﺪﺓ ﺃﺷﻜﺎﻝ ﻭﺻﻮﺭ‪:‬‬
‫ﺃﻭﻻ‪:‬ﺃﺷﻜﺎﻝ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪ :‬ﻟﻴﺲ ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺻﻮﺭﺓ ﻭﺍﺣﺪﺓ ﺑﻞ ﻳﻮﺟﺪ ﻟﻪ ﺍﻟﻌﺪﻳﺪ ﻣﻦ‬
‫ﺍﻟﺼﻮﺭ ﻭﺍﻷﺷﻜﺎﻝ‪:‬‬

‫)‪(1‬ﳑﺪﻭﺡ ﻋﺒﺪ ﺍﳊﻤﻴﺪ ﻋﺒﺪ ﺍﳌﻄﻠﺐ‪ ،‬ﺇﺳﺘﺨﺪﺍﻡ ﺑﺮﻭﺗﻮﻛﻮﻝ ‪ TCP/IP‬ﰲ ﲝﺚ ﻭﲢﻘﻴﻖ ﺍﳉﺮﺍﺋﻢ ﻋﻠﻰ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ‪،‬ﲝﺚ ﻣﻨﺸﻮﺭ ﻋﻠﻰ ﺍﳌﻮﻗﻊ ﺍﻹﻟﻜﺘﺮﻭﱐ‬
‫‪. www.arablaw.info.com‬ﺹ‪.08‬‬
‫)‪(2‬ﻋﻤﺮ ﳏﻤﺪ ﺃﺑﻮ ﺑﻜﺮ ﺑﻦ ﻳﻮﻧﺲ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.791‬‬
‫)‪(3‬ﻋﺎﺩﻝ ﻋﺰﺍﻡ ﺳﻘﻒ ﺍﳊﻴﻂ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.233‬‬

‫‪- 126 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪/1‬ﺍﻟﺼﻮﺭﺓ ﺍﻟﺮﻗﻤﻴﺔ‪ :‬ﻭﻫﻲ ﻋﺒﺎﺭﺓ ﻋﻦ ﲡﺴﻴﺪ ﺍﳊﻘﺎﺋﻖ ﺍﳌﺮﺋﻴﺔ ﺣﻮﻝ ﺍﳉﺮﳝﺔ‪ ،‬ﻭﰲ ﺍﻟﻌﺎﺩﺓ ﺗﻘﺪﻡ‬
‫ﺍﻟﺼﻮﺭﺓ ﰲ ﺷﻜﻞ ﻭﺭﻗﻲ ﺃﻭ ﰲ ﺷﻜﻞ ﻣﺮﺋﻲ ﺑﺈﺳﺘﺨﺪﺍﻡ ﺍﻟﺸﺎﺷﺔ ﺍﳌﺮﺋﻴﺔ‪ ،‬ﻭﺍﻟﺼﻮﺭﺓ ﺍﻟﺮﻗﻤﻴﺔ ﲤﺜﻞ‬
‫) ‪(1‬‬
‫ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺑﺪﻳﻠﺔ ﻟﻠﺼﻮﺭﺓ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ‪.‬‬

‫)‪(1‬ﳑﺪﻭﺡ ﻋﺒﺪ ﺍﳊﻤﻴﺪ ﻋﺒﺪ ﺍﳌﻄﻠﺐ‪ ،‬ﺃﺩﻟﺔ ﺍﻟﺼﻮﺭﺓ ﺍﻟﺮﻗﻤﻴﺔ ﰲ ﺍﳉﺮﺍﺋﻢ ﻋﱪ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ‪ .‬ﻣﺮﻛﺰ ﺷﺮﻃﺔ ﺩﰊ ‪ ،2005‬ﺹ‪.10‬‬

‫‪- 127 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪-2‬ﺍﻟﺘﺴﺠﻴﻼﺕ ﺍﻟﺼﻮﺗﻴﺔ‪ :‬ﻭﻫﻲ ﺍﻟﺘﺴﺠﻴﻼﺕ ﺍﻟﱵ ﻳﺘﻢ ﺿﺒﻄﻬﺎ ﻭﲣﺰﻳﻨﻬﺎ ﺑﻮﺍﺳﻄﺔ ﺍﻵﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ‪،‬‬
‫ﻭﺗﺸﻤﻞ ﺍﶈﺎﺩﺛﺎﺕ ﺍﻟﺼﻮﺗﻴﺔ ﻋﻠﻰ ﺍﻷﻧﺘﺮﻧﺎﺕ‪.‬‬
‫‪-3‬ﺍﻟﻨﺼﻮﺹ ﺍﳌﻜﺘﻮﺑﺔ‪ :‬ﻭﺗﺸﻤﻞ ﺍﻟﻨﺼﻮﺹ ﺍﻟﱵ ﻳﺘﻢ ﻛﺘﺎﺑﺘﻬﺎ ﺑﻮﺍﺳﻄﺔ ﺍﻵﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﻭﻣﻨﻬﺎ‬
‫ﺍﻟﺮﺳﺎﺋﻞ ﻋﱪ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻭﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﳌﺴﺠﻠﺔ ﺑﺄﺟﻬﺰﺓ ﺍﳊﺎﺳﺐ ﺍﻵﱄ‪.‬‬
‫ﻭﻭﻓﻘﺎ ﳌﺎ ﻗﺮﺭﺗﻪ ﻭﺯﺭﺍﺓ ﺍﻟﻌﺪﻝ ﺍﻷﻣﺮﻳﻜﻴﺔ ﺳﻨﺔ ‪ 2002‬ﻓﺈﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﳝﻜﻦ ﺃﻥ ﻳﺄﺧﺬ‬
‫) ‪(1‬‬
‫ﺍﻷﺷﻜﺎﻝ ﺍﻟﺘﺎﻟﻴﺔ‪:‬‬
‫‪ -‬ﺍﻟﺴﺠﻼﺕ ﺍﶈﻔﻮﻇﺔ ﰲ ﺍﳊﺎﺳﻮﺏ ﻭﻫﻲ ﺍﻟﻮﺛﺎﺋﻖ ﺍﳌﻜﺘﻮﺑﺔ ﻭﺍﶈﻔﻮﻇﺔ ﻣﺜﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ‬
‫ﻭﻣﻠﻔﺎﺕ ﺑﺮﺍﻣﺞ ﻣﻌﺎﳉﺔ ﺍﻟﻜﻠﻤﺎﺕ ﻭﺭﺳﺎﻝ ﻏﺮﻑ ﺍﶈﺎﺩﺛﺔ ﻋﻠﻰ ﺍﻷﻧﺘﺮﻧﺎﺕ‪.‬‬
‫‪ -‬ﺍﻟﺴﺠﻼﺕ ﺍﻟﱵ ﰎ ﺇﻧﺸﺎﺅﻫﺎ ﺑﻮﺍﺳﻄﺔ ﺍﳊﺎﺳﻮﺏ ﻭﺗﻌﺘﱪ ﳐﺮﺟﺎﺕ ﺑﺮﺍﻣﺞ ﺍﳊﺎﺳﻮﺏ ﻭﺑﺎﻟﺘﺎﱄ ﱂ‬
‫ﻳﻠﻤﺴﻬﺎ ﺍﻹﻧﺴﺎﻥ ﻣﺜﻞ"‪logfiles‬‬
‫‪ -‬ﺍﻟﺴﺠﻼﺕ ﺍﻟﱵ ﺟﺰﺀ ﻣﻨﻬﺎ ﰎ ﺣﻔﻈﻪ ﺑﺎﻹﺩﺧﺎﻝ‪ ،‬ﻭﺟﺰﺀ ﺁﺧﺮ ﰎ ﺇﻧﺸﺎﺅﻩ ﺑﻮﺍﺳﻄﺔ ﺍﳊﺎﺳﻮﺏ‬
‫ﺑﻌﺪ ﻣﻌﺎﳉﺘﻬﺎ ﻣﻦ ﺧﻼﻝ ﺑﺮﺍﻣﺞ ﻣﻌﻴﻨﺔ‪.‬‬
‫‪ -‬ﻛﻤﺎ ﺃﻥ ﻫﻨﺎﻙ )‪(2‬ﻣﻦ ﻳﻘﺴﻢ ﺃﺷﻜﺎﻝ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺗﻘﺴﻴﻤﺎ ﻳﺘﻄﺎﺑﻖ ﻣﻊ ﺗﻘﺴﻴﻢ ﺍﳉﺮﳝﺔ ﻋﱪ‬
‫ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻋﻠﻰ ﺍﻟﻨﺤﻮ ﺍﻟﺘﺎﱄ‪:‬‬
‫‪ -‬ﺃﺩﻟﺔ ﺭﻗﻤﻴﺔ ﺧﺎﺻﺔ ﺑﺄﺟﻬﺰﺓ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻭﺷﺒﻜﺎ‪‬ﺎ‪.‬‬
‫‪ -‬ﺃﺩﻟﺔ ﺭﻗﻤﻴﺔ ﺧﺎﺻﺔ ﺑﺎﻟﺸﺒﻜﺔ ﺍﻟﻌﺎﳌﻴﺔ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ‪.‬‬
‫‪ -‬ﺃﺩﻟﺔ ﺭﻗﻤﻴﺔ ﺧﺎﺻﺔ ﺑﱪﻭﺗﻮﻛﻮﻻﺕ ﺗﺒﺎﺩﻝ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﲔ ﺃﺟﻬﺰﺓ ﺍﻟﺸﺒﻜﺔ ﺍﻟﻌﺎﳌﻴﺔ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ‪.‬‬
‫ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﻫﺬﺍ ﺍﻟﺘﻘﺴﻴﻢ ﻓﺈﻧﻪ ﻳﻮﺟﺪ ﻣﻦ ﺍﻟﻔﻘﻪ ﻣﻦ ﺇﻋﺘﻤﺪ ﰲ ﲢﺪﻳﺪ ﺃﺷﻜﺎﻝ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻋﻠﻰ‬
‫ﺃﺷﻜﺎﻝ ﺍﳌﺨﺮﺟﺎﺕ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮﻳﺔ)‪(3‬ﺇﺫ ﻳﺄﺧﺬ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﲝﺴﺐ ﻫﺬﺍ ﺍﻟﺘﻘﺴﻴﻢ ﺛﻼﺙ ﺃﺷﻜﺎﻝ‪:‬‬
‫‪ -‬ﳐﺮﺟﺎﺕ ﺫﺍﺕ ﻃﺒﻴﻌﺔ ﻭﺭﻗﻴﺔ ﻳﺴﺠﻞ ﻓﻴﻬﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻋﻠﻰ ﺍﻟﻮﺭﻕ ﻭﻳﺴﺘﺨﺪﻡ ﰲ ﺫﻟﻚ ﺍﻟﻄﺎﺑﻌﺎﺕ‪.‬‬
‫‪ -‬ﳐﺮﺟﺎﺕ ﺫﺍﺕ ﻃﺒﻴﻌﺔ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ ﺗﺴﺘﺨﺪﻡ ﰲ ﲣﺰﻳﻦ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﺪﻝ ﺍﻟﻮﺛﺎﺋﻖ ﺍﻟﻮﺭﻗﻴﺔ ﻛﺎﻷﺷﺮﻃﺔ‬
‫ﺍﳌﻐﻨﺎﻃﻴﺴﻴﺔ ‪.‬‬

‫)‪(1‬ﺳﻠﻄﺎﻥ ﳏﻴﺎ ﺍﻟﺮﳛﺎﱐ‪ ،‬ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬ﲝﺚ ﻣﻨﺸﻮﺭ ﻋﻠﻰ ﺍﳌﻮﻗﻊ ﺍﻹﻟﻜﺘﺮﻭﱐ‪. http//.www.atslp.com .‬ﺑﺪﻭﻥ ﺗﺮﻗﻴﻢ‬
‫)‪(2‬ﳑﺪﻭﺡ ﻋﺒﺪ ﺍﳊﻤﻴﺪ ﻋﺒﺪ ﺍﳌﻄﻠﺐ‪ ،‬ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﻘﻴﻖ ﺍﳉﻨﺎﺋﻲ ﺍﻟﺮﻗﻤﻲ ﰲ ﺟﺮﺍﺋﻢ ﺍﳊﺎﺳﺐ ﺍﻵﱄ‪ .‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.88‬‬
‫)‪(3‬ﺗﻌﺘﱪ ﺍﳌﺨﺮﺟﺎﺕ ﺃﻭ ﻛﻤﺎ ﺗﺴﻤﻰ ﺃﻳﻀﺎ ﺍﻟﻮﺛﻴﻘﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ :‬ﺃ‪‬ﺎ ﻛﻞ ﺟﺴﻢ ﻣﻨﻔﺼﻞ ﺃﻭ ﳝﻜﻦ ﺍﻷﻧﺘﺮﻧﺖ ﻓﺼﻠﻪ ﻋﻦ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ﻭﻗﺪ‬
‫ﺳﺠﻠﺖ ﻋﻠﻴﻪ ﻣﻌﻠﻮﻣﺔ ﻣﻌﻴﻨﺔ ﺳﻮﺍﺀ ﺃﻛﺎﻥ ﻣﻌﺪﺍ ﻟﻺﺳﺘﺨﺪﺍﻡ ﺑﻮﺍﺳﻄﺔ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﺃﻡ ﻳﻜﻮﻥ ﻣﺸﺘﻘﺎ ﻣﻦ ﻫﺬﺍ ﺍﻟﻨﻮﻉ‪.‬‬

‫‪- 128 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪ -‬ﳐﺮﺟﺎﺕ ﻣﺮﺋﻴﺔ ﻣﻌﺮﻭﺿﺔ ﺑﻮﺍﺳﻄﺔ ﺷﺎﺷﺎﺕ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﺫﺍﺗﻪ ﻭﻳﺘﻤﺜﻞ ﻫﺬﺍ ﺍﻟﺸﻜﻞ ﰲ ﻋﺮﺽ‬
‫ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﳌﻌﺎﳉﺔ ﺁﻟﻴﺎ ﺑﻮﺍﺳﻄﺔ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻋﻠﻰ ﺍﻟﺸﺎﺷﺔ ﺍﳋﺎﺻﺔ ﺑﻪ‪.‬‬
‫ﺛﺎﻧﻴﺎ‪:‬ﺃﻧﻮﺍﻉ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪:‬ﻳﺄﺧﺬ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻧﻮﻋﲔ ﺭﺋﻴﺴﻴﲔ‪:‬‬
‫ﺃﺩﻟﺔ ﺃﻋﺪﺕ ﻟﺘﻜﻮﻥ ﻭﺳﻴﻠﺔ ﺇﺛﺒﺎﺕ ﻭﺃﺩﻟﺔ ﱂ ﺗﻌﺪ ﻟﺘﻜﻮﻥ ﻭﺳﻴﻠﺔ ﺇﺛﺒﺎﺕ‪ ،‬ﻓﺄﻣﺎ ﺍﻟﻨﻮﻉ ﺍﻷﻭﻝ ﻓﻴﻤﻜﻦ‬
‫ﺇﲨﺎﻟﻪ ﻓﻴﻤﺎ ﻳﻠﻲ‪:‬‬
‫ﺍﻟﺴﺠﻼﺕ ﺍﻟﱵ ﰎ ﺇﻧﺸﺎﺅﻫﺎ ﺑﻮﺍﺳﻄﺔ ﺍﳉﻬﺎﺯ ﺗﻠﻘﺎﺋﻴﺎ‪ ،‬ﻭﺗﻌﺘﱪ ﻫﺬﻩ ﺍﻟﺴﺠﻼﺕ ﻣﻦ ﳐﺮﺟﺎﺕ‬ ‫‪-1‬‬
‫ﺍﳉﻬﺎﺯ ﻭﱂ ﻳﺴﺎﻫﻢ ﺍﻹﻧﺴﺎﻥ ﰲ ﺇﻧﺸﺎﺋﻬﺎ‪.‬‬
‫‪ -2‬ﺍﻟﺴﺠﻼﺕ ﺍﻟﱵ ﺟﺰﺀ ﻣﻨﻬﺎ ﰎ ﺣﻔﻈﻪ ﺑﺎﻹﺩﺧﺎﻝ ﻭﺟﺰﺀ ﰎ ﺇﻧﺸﺎﺅﻩ ﺑﻮﺍﺳﻄﺔ ﺍﳉﻬﺎﺯ‪ ،‬ﻭﻣﻦ ﺃﻣﺜﻠﺔ‬
‫ﺫﻟﻚ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻟﱵ ﰎ ﺇﺩﺧﺎﳍﺎ ﺇﱃ ﺍﻷﺩﻟﺔ ﻭﺗﺘﻢ ﻣﻌﺎﳉﺘﻬﺎ ﻣﻦ ﺧﻼﻝ ﺑﺮﻧﺎﻣﺞ ﺧﺎﺹ‪ .‬ﻭﺃﻣﺎ ﺍﻟﻨﻮﻉ ﺍﻟﺜﺎﱐ‬
‫ﺃﻱ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺍﻟﱵ ﱂ ﺗﻌﺪ ﻟﺘﻜﻮﻥ ﻭﺳﻴﻠﺔ ﺇﺛﺒﺎﺕ ﻓﻬﻲ ﺗﻠﻚ ﺍﻷﺩﻟﺔ ﺍﻟﱵ ﺗﻨﺸﺄ ﺩﻭﻥ ﺇﺭﺍﺩﺓ ﺍﻟﺸﺨﺺ‬
‫ﲟﻌﲎ ﺃ‪‬ﺎ ﺃﻱ ﺃﺛﺮ ﻳﺘﺮﻛﻪ ﺩﻭﻥ ﺃﻥ ﻳﻜﻮﻥ ﺭﺍﻏﺒﺎ ﰲ ﻭﺟﻮﺩﻫﺎ‪ ،‬ﻭﻳﺴﻤﻰ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﻷﺩﻟﺔ ﺑﺎﻟﺒﺼﻤﺔ‬
‫ﺍﻟﺮﻗﻤﻴﺔ ﺃﻭ ﺍﻵﺛﺎﺭ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻟﻠﺮﻗﻤﻴﺔ)‪(1‬ﻭﻫﻲ ﺗﺘﺠﺴﺪ ﰲ ﺍﻵﺛﺎﺭ ﺍﻟﱵ ﻳﺘﺮﻛﻬﺎ ﻣﺴﺘﺨﺪﻡ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‬
‫ﺑﺴﺒﺐ ﺗﺴﺠﻴﻞ ﺍﻟﺮﺳﺎﺋﻞ ﺍﳌﺮﺳﻠﺔ ﻣﻨﻪ ﺃﻭ ﺍﻟﱵ ﻳﺴﺘﻘﺒﻠﻬﺎ ﻭﻛﺎﻓﺔ ﺍﻹﺗﺼﺎﻻﺕ ﺍﻟﱵ ﲤﺖ ﻣﻦ ﺧﻼﻝ ﺍﻟﻨﻈﺎﻡ‬
‫ﺍﳌﻌﻠﻮﻣﺎﰐ ﻭﺷﺒﻜﺔ ﺍﻹﺗﺼﺎﻻﺕ‪ ،‬ﻭﺍﻟﻮﺍﻗﻊ ﺃﻥ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﻷﺩﻟﺔ ﱂ ﻳﻌﺪ ﺃﺳﺎﺳﺎ ﻟﻠﺤﻔﻆ ﻣﻦ ﻃﺮﻑ ﻣﻦ‬
‫ﺻﺪﺭ ﻋﻨﻪ ﻏﲑ ﺃﻥ ﺍﻟﻮﺳﺎﺋﻞ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳋﺎﺻﺔ ﲤﻜﻦ ﻣﻦ ﺿﺒﻂ ﻫﺬﻩ ﺍﻷﺩﻟﺔ ﻭﻟﻮ ﺑﻌﺪ ﻓﺘﺮﺓ ﺯﻣﻨﻴﺔ ﻣﻦ ﻧﺸﻮﺋﻬﺎ‬
‫ﻓﺎﻹﺗﺼﺎﻻﺕ ﺍﻟﱵ ﻋﱪ ﺍﳌﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﳌﺮﺗﺒﻄﺔ ﺑﺸﺒﻜﺔ ﺍﻹﺗﺼﺎﻻﺕ ﻭﻛﺬﺍ ﺍﳌﺮﺍﺳﻼﺕ ﺍﻟﺼﺎﺩﺭ ﻋﻦ‬
‫) ‪(2‬‬
‫ﺍﻟﺸﺨﺺ ﺃﻭ ﺍﻟﱵ ﻳﺘﻠﻘﺎﻫﺎ ﳝﻜﻦ ﺿﺒﻄﻬﺎ ﺑﻮﺍﺳﻄﺔ ﺗﻘﻨﻴﺔ ﺧﺎﺻﺔ ﺑﺬﻟﻚ‬
‫ﻭﺗﺒﺪﻭ ﺃﳘﻴﺔ ﺍﻟﺘﻤﻴﻴﺰ ﺑﲔ ﻫﺬﻳﻦ ﺍﻟﻨﻮﻋﲔ ﰲ ﻛﻮﻥ ﺃﻥ ﺍﻟﻨﻮﻉ ﺍﻷﻭﻝ ﻣﻦ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﻗﺪ ﺃﻋﺪ‬
‫ﺳﻠﻔﺎ ﻛﻮﺳﻴﻠﺔ ﻹﺛﺒﺎﺕ ﺑﻌﺾ ﺍﻟﻮﻗﺎﺋﻊ ﺍﻟﱵ ﻳﺘﻀﻤﻨﻬﺎ‪،‬ﻟﺬﻟﻚ ﻓﺈﻥ ﻋﺎﺩﺓ ﻣﺎ ﻳﻌﻤﺪ ﺇﱃ ﺣﻔﻈﻪ ﻟﻺﺣﺘﺠﺎﺝ ﺑﻪ‬
‫ﻻﺣﻘﺎ ﻭﻫﻮ ﻣﺎ ﻳﻘﻠﻞ ﻣﻦ ﺇﻣﻜﺎﻧﻴﺔ ﻓﻘﺪﺍﻧﻪ ﻛﻤﺎ ﻳﻜﻮﻥ ﻣﻦ ﺍﻟﺴﻬﻞ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ‪ ،‬ﺑﻴﻨﻤﺎ ﺍﻟﻨﻮﻉ ﺍﻟﺜﺎﱐ ﻣﻦ‬
‫ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﻓﻠﻜﻮﻧﻪ ﱂ ﻳﻌﺪ ﺃﺻﻼ ﻟﻴﻜﻮﻥ ﺃﺛﺮﺍ ﳌﻦ ﺻﺪﺭ ﻋﻨﻪ ﻟﺬﺍ ﻓﻬﻮ ﰲ ﺍﻟﻐﺎﻟﺐ ﻣﺎ ﻳﺘﻀﻤﻦ‬

‫)‪(1‬ﳑﺪﻭﺡ ﻋﺒﺪ ﺍﳊﻤﻴﺪ ﻋﺒﺪ ﺍﳌﻄﻠﺐ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.38-22‬‬


‫‪ IP‬ﻭﺍﻟﺬﻱ ﳝﻜﻦ ﻣﻦ ﺧﻼﻟﻪ ﺿﺒﻂ ﲢﺮﻛﺎﺕ ﻣﺴﺘﺨﺪﻡ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻋﱪ ﺍﳉﻬﺎﺯ‬‫)‪(2‬ﻳﺘﻢ ﺍﻹﻋﺘﻤﺎﺩ ﰲ ﺿﺒﻂ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﻷﺩﻟﺔ ﻋﻠﻰ ﻣﺎ ﻳﻌﺮﻑ ﺑﱪﻭﺗﻮﻛﻮﻝﹼ ّ‬
‫ﺍﻟﺬﻱ ﻳﺴﺘﻌﻤﻠﻪ ﻣﻦ ﺧﻼﻝ ﺑﻴﺎﻧﺎﺕ ﻫﺬﺍ ﺍﳉﻬﺎﺯ ﻋﻨﺪ ﻣﺰﻭﺩ ﺍﳋﺪﻣﺔ ﻭﺇﻥ ﻛﺎﻥ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ ﻻ ﳛﺪﺩ ﺷﺨﺼﻴﺔ ﻣﺮﺗﻜﺐ ﺍﳉﺮﳝﺔ ﻓﺈﻧﻪ ﳛﺪﺩ ﺍﳉﻬﺎﺯ ﺍﻟﺬﻱ‬
‫ﺇﺳﺘﻌﻤﻠﺖ ﻣﻨﻪ‪ ،‬ﻭﻳﺮﻯ ﺍﻟﺒﻌﺾ ﺃﻥ ﺫﻟﻚ ﻳﺼﺢ ﻷﻥ ﻳﻜﻮﻥ ﻗﺮﻳﻨﺔ ﻋﻠﻰ ﺇﻋﺘﺒﺎﺭ ﺻﺎﺣﺐ ﺍﳉﻬﺎﺯ ﻫﻮ ﻣﺮﺗﻜﺐ ﺍﳉﺮﳝﺔ ﺇﱃ ﺃﻥ ﻳﺜﺒﺖ ﺍﻟﻌﻜﺲ‪.‬‬

‫‪- 129 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻣﻌﻠﻮﻣﺎﺕ ﺗﻔﻴﺪ ﰲ ﺍﻟﻜﺸﻒ ﻋﻦ ﺍﳉﺮﳝﺔ ﻭﻣﺮﺗﻜﺒﻬﺎ ﻭﻳﻜﻮﻥ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ ﺑﺈﺗﺒﺎﻉ ﺗﻘﻨﻴﺎﺕ ﺧﺎﺻﺔ ﻻ‬
‫ﲣﻠﻮ ﻣﻦ ﺍﻟﺼﻌﻮﺑﺔ ﻭﺍﻟﺘﻌﻘﻴﺪ‪ ،‬ﻭﻫﻮ ﻋﻠﻰ ﺍﻟﻌﻜﺲ ﻣﻦ ﺍﻟﻨﻮﻉ ﺍﻷﻭﻝ ﺇﺫ ﱂ ﻳﻌﺪ ﻟﻴﺤﻔﻆ ﳑﺎ ﳚﻌﻠﻪ ﻋﺮﺿﺔ‬
‫ﻟﻠﻔﻘﺪﺍﻥ ﺑﺴﻬﻮﻟﺔ)‪.(1‬‬
‫ﻭﻳﻼﺣﻆ ﺃﻥ ﻫﺬﺍ ﺍﻟﺘﻨﻮﻉ ﰲ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻳﻔﻴﺪ ﺑﺎﻟﻀﺮﻭﺭﺓ ﺃﻧﻪ ﻟﻴﺲ ﻫﻨﺎﻙ ﻭﺳﻴﻠﺔ ﻭﺍﺣﺪﺓ‬
‫ﻟﻠﺤﺼﻮﻝ ﻋﻠﻴﻪ ﻭﺇﳕﺎ ﺗﺘﻌﺪﺩ ﻫﺬﻩ ﺍﻟﻮﺳﺎﺋﻞ ﺃﻳﻀﺎ‪ ،‬ﻭﻳﻀﻞ ﰲ ﻛﻞ ﺍﻷﺣﻮﺍﻝ ﺍﻟﺪﻟﻴﻞ ﺍﳌﺴﺘﻤﺪ ﺑﻮﺍﺳﻄﺘﻬﺎ‬
‫ﺭﻗﻤﻴﺎ‪.‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺮﺍﺑﻊ‪ :‬ﻣﺼﺎﺩﺭ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪:‬‬
‫ﺇﻥ ﻣﺼﺎﺩﺭ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺗﻜﻤﻦ ﰲ ﺍﻟﺒﻴﺌﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺍﻟﱵ ﺇﺭﺗﻜﺒﺖ ﻓﻴﻬﺎ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﺗﺘﻤﺜﻞ ﰲ ﺃﺟﻬﺰﺓ ﺍﳊﻮﺍﺳﻴﺐ ﺍﳋﺎﺻﺔ ﺑﺎﳉﺎﱐ ﺃﻭ ﺍ‪‬ﲏ ﻋﻠﻴﻪ ﻭﻛﺬﺍ ﺃﺟﻬﺰﺓ ﻣﻘﺪﻡ ﺍﳋﺪﻣﺔ‪.‬‬
‫ﻭﻫﺬﻩ ﺍﳌﺼﺎﺩﺭ ﻗﺪ ﺗﻜﻮﻥ ﻋﻠﻰ ﺳﺒﻴﻞ ﺍﳌﺜﺎﻝ ﻻ ﺍﳊﺼﺮ ﺇﺫ ﺃﻥ ﺍﻟﺘﻄﻮﺭ ﺍﻟﻌﻠﻤﻲ ﻭﺍﻟﺘﻘﲏ ﻗﺪ ﻳﺴﻔﺮ ﻋﻦ‬
‫ﺃﻧﻮﺍﻉ ﺟﺪﻳﺪﺓ ﻣﻦ ﺍﳌﺼﺎﺩﺭ ﺍﻟﺘﻘﻨﻴﺔ ‪ ،‬ﺇﺫ ﺍﳌﻘﺼﻮﺩ ﻫﻨﺎ ﻣﻦ ﺃﻳﻦ ﳝﻜﻦ ﳉﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ‬
‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺇﺳﺘﺨﻼﺹ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪.‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﻓﺤﺺ ﺟﻬﺎﺯ ﺍﳊﺎﺳﻮﺏ ﺍﳋﺎﺹ ﺑﺎﳉﺎﱐ ﻭ ﺍ‪‬ﲏ ﻋﻠﻴﻪ‪:‬‬
‫ﺇﻥ ﻓﺤﺺ ﺟﻬﺎﺯ ﺍﳊﺎﺳﻮﺏ ﺍﳋﺎﺹ ﺑﺎﳉﺎﱐ ﳝﻜﻦ ﻣﻦ ﺍﻟﺘﺤﻘﻖ ﻭﺑﻴﺎﻥ ﺍﻟﻄﺮﻳﻘﺔ ﺍﻟﱵ ﻗﺎﻡ ‪‬ﺎ ﻫﺬﺍ‬
‫ﺍﻻﺧﲑ ﰲ ﺇﺭﺗﻜﺎﺏ ﺟﺮﺍﺋﻤﻪ‪ ،‬ﻭﳑﺎ ﻻ ﺷﻚ ﻓﻴﻪ ﺃﻥ ﺍ‪‬ﲏ ﻋﻠﻴﻪ ﻫﻮ ﺍﳌﺼﺪﺭ ﺍﻟﻜﺎﺷﻒ ﻭﺍﻟﻨﺘﻴﺠﺔ ﺍﻟﱵ‬
‫ﻳﺘﺮﺗﺐ ﻋﻠﻴﻬﺎ ﻣﺎ ﻗﺎﻡ ﺑﻪ ﺍﳉﺎﱐ ﻣﻦ ﺟﺮﺍﺋﻢ‪ ،‬ﻭﺑﺎﻟﺘﺎﱄ ﻓﺈﻥ ﻓﺤﺺ ﺟﻬﺎﺯ ﺍﳊﺎﺳﻮﺏ ﺍﳋﺎﺹ ﺑﻪ ﳝﻜﻦ‬
‫ﺍﶈﻘﻖ ﻣﻦ ﻣﻌﺮﻓﺔ ﺍﻟﺪﺧﻮﻝ ﻭﺗﺘﺒﻊ ﻣﺼﺪﺭﻩ‪.‬‬
‫ﻭﳝﻜﻦ ﺍﻟﻮﺻﻮﻝ ﺇﱃ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺍﳌﺘﻌﻠﻖ ﺑﺎﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﺧﻼﻝ ﺃﺟﻬﺰﺓ ﺍﳊﺎﺳﻮﺏ‬
‫ﺳﻮﺍﺀ ﺍﳋﺎﺻﺔ ﺑﺎﳉﺎﱐ ﺃﻭ ﺍ‪‬ﲏ ﻋﻠﻴﻪ ﻋﻦ ﻃﺮﻳﻖ ﺍﻟﺒﺤﺚ ﰲ ﺍﳌﺼﺪﺭﻳﻦ ﺍﻟﺘﺎﻟﻴﲔ‪:‬‬
‫ﺃﻭﻻ‪ :‬ﺃﻧﻈﻤﺔ ﺍﳊﺎﺳﻮﺏ ﻭﻣﻠﺤﻘﺎ‪‬ﺎ‪:‬ﺗﻌﺪ ﺍﳊﻮﺍﺳﻴﺐ ﻣﺼﺪﺭﺍ ﻏﻨﻴﺎ ﺑﺎﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺧﺎﺻﺔ ﺗﻠﻚ‬
‫ﺍﳊﻮﺍﺳﻴﺐ ﺍﻟﺸﺨﺼﻴﺔ ﺍﻟﱵ ﺗﻌﺪ ﲟﺎﺛﺒﺔ ﺃﺭﺷﻔﺔ ﺳﻠﻮﻛﻴﺔ ﻟﻸﻓﺮﺍﺩ‪ ،‬ﻓﻬﺬﻩ ﺍﳊﻮﺍﺳﻴﺐ ﲢﺘﻮﻱ ﻋﻠﻰ ﺍﻟﻜﺜﲑ ﻣﻦ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﺑﻨﺸﺎﻃﺎﺕ ﺍﻷﻓﺮﺍﺩ ﻭﺭﻏﺒﺎ‪‬ﻢ‪ ،‬ﻭﻋﻤﻠﻴﺔ ﺣﺠﺰ ﺍﳊﺎﺳﻮﺏ ﺑﻘﺼﺪ ﺗﻔﺤﺼﻪ ﺗﻌﺪ ﻧﻘﻄﺔ‬
‫ﺍﻟﺒﺪﺍﻳﺔ ﰲ ﺍﻟﻜﺸﻒ ﻋﻦ ﺧﻔﺎﻳﺎ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﺈﻋﺘﺒﺎﺭ ﺃﻥ ﻫﺬﺍ ﺍﳉﻬﺎﺯ ﻫﻮ ﻭﺳﻴﻠﺔ ﺗﻨﻔﻴﺬﻫﺎ‪.‬ﻭﺍﳊﺎﺳﺐ‬

‫)‪(1‬ﻃﺎﺭﻕ ﳏﻤﺪ ﺍﳉﻤﻠﻲ‪ ،‬ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﰲ ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ‪ ،‬ﻭﺭﻗﺔ ﻋﻤﻞ ﻣﻘﺪﻣﺔ ﻟﻠﻤﺆﲤﺮ ﺍﳌﻐﺎﺭﰊ ﺍﻷﻭﻝ ﺣﻮﻝ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺍﻟﻘﺎﻧﻮﻥ ﺍﳌﻨﻌﻘﺪ ﰲ ﺍﻟﻔﺘﺮﺓ ‪-28‬‬
‫‪.2009/10/29‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪.‬‬

‫‪- 130 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﻵﱄ ﰲ ﺫﺍﺗﻪ ﻳﻘﻮﻡ ﰲ ﺗﺮﻛﻴﺒﺘﻪ ﻋﻠﻰ ﺃﻣﺮﻳﻦ ﳘﺎ‪ :‬ﺍﻟﻘﻄﻊ ﺍﻟﺼﻠﺒﺔ)‪ (Hardware‬ﻭﺍﻟﻘﻄﻊ ﺍﳌﺮﻧﺔ ﺃﻭ‬
‫ﺍﻟﱪﳎﻴﺎﺕ)‪ (Soft Ware‬ﻭﻫﻨﺎﻙ ﻋﻨﺼﺮ ﺛﺎﻟﺚ ﻳﺘﻮﺯﻉ ﺑﲔ ﺍﻟﱪﳎﻴﺎﺕ ﻭﺍﻟﻘﻄﻊ ﺍﻟﺼﻠﺒﺔ ﻭﻫﻮ ﻋﻨﺼﺮ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪(1).‬ﻟﺬﻟﻚ ﻓﺈﻥ ﺍﻷﻣﺮ ﻳﺴﺘﻠﺰﻡ ﺃﻥ ﻳﻜﻮﻥ ﺍﻟﻔﺤﺺ ﻣﺎﺩﻳﺎ ﻭﻣﻌﻨﻮﻳﺎ ﻟﻺﺭﺗﺒﺎﻁ ﺍﻟﻘﺎﺋﻢ ﺑﺸﻜﻞ‬
‫ﻃﺒﻴﻌﻲ ﺑﲔ ﻣﻜﻮﻧﺎﺕ ﺍﳊﺎﺳﻮﺏ ﻛﻜﻞ‪.‬‬
‫ﻭﻗﺪ ﺗﻌﺘﻤﺪ ﻋﻤﻠﻴﺔ ﺍﻟﻔﺤﺺ ﻋﻠﻰ ﺍﳊﺎﺳﻮﺏ ﺫﺍﺗﻪ ﺃﻱ ﻣﺎ ﻳﺴﻤﻰ ﺑﺎﻟﻔﺤﺺ ﺍﻟﺬﺍﰐ ﻣﻦ ﺧﻼﻝ ﻗﻴﺎﻡ‬
‫ﺍﳊﺎﺳﻮﺏ ﺫﺍﺗﻪ ﺑﻔﺤﺺ ﻣﻜﻮﻧﺎﺗﻪ ﻭﺗﻘﺪﱘ ﺗﻘﺮﻳﺮ ﻛﺎﻣﻞ ﺑﺬﻟﻚ ﺇﱃ ﻃﺎﻟﺐ ﺍﻟﻔﺤﺺ‪ ،‬ﻭﻣﺜﻞ ﻫﺬﻩ ﺍﻟﻌﻤﻠﻴﺔ‬
‫ﺗﺘﻄﻠﺐ ﻣﻦ ﺍﻟﻘﺎﺋﻢ ‪‬ﺎ ﻣﻬﺎﺭﺓ ﻋﺎﻟﻴﺔ ﺃﻭ ﻗﺪ ﻳﺘﻢ ﺍﻟﻔﺤﺺ ﻋﻦ ﻃﺮﻳﻖ ﺍﻹﺳﺘﻌﺎﻧﺔ ﲜﻬﺎﺯ ﺁﺧﺮ ﺃﻭ ﺃﺟﻬﺰﺓ ﺗﻘﻨﻴﺔ‬
‫ﻟﻠﺒﺤﺚ ﰲ ﺟﺰﺋﻴﺎﺕ ﻋﱪ ﺟﻬﺎﺯ ﺍﳊﺎﺳﻮﺏ‪.‬ﻭﳚﺐ ﺃﻥ ﺗﺸﻤﻞ ﻋﻤﻠﻴﺔ ﺍﻟﻔﺤﺺ ﻋﻠﻰ ﻣﺎﻳﻠﻲ‪:‬‬
‫‪/1‬ﻓﺤﺺ ﺍﻟﻘﺮﺹ ﺍﻟﺼﻠﺐ‪ :‬ﳛﺘﻮﻱ ﺍﻟﻘﺮﺹ ﺍﻟﺼﻠﺐ ﺑﺪﺍﺧﻠﻪ ﻋﻠﻰ ﳎﻤﻮﻉ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻟﺮﻗﻤﻴﺔ ﺫﺍﺕ‬
‫ﺍﻟﻄﺎﺑﻊ ﺍﻟﺜﻨﺎﺋﻲ ﻭﺍﻟﱵ ﺗﺘﻤﻴﺰ ﺑﻌﺪﻡ ﺗﺸﺎ‪‬ﻬﺎ ﻓﻴﻤﺎ ﺑﻴﻨﻬﺎ ﻋﻠﻰ ﺍﻟﺮﻏﻢ ﻣﻦ ﻭﺣﺪﺓ ﺍﻟﺮﻗﻢ ﺍﻟﺜﻨﺎﺋﻲ )‪ ،(0.1‬ﻭﺗﺘﻢ‬
‫ﻋﻤﻠﻴﺔ ﻓﺤﺺ ﺍﻟﻘﺮﺹ ﺍﻟﺼﻠﺐ ﺃﻣﺎ ﻛﻠﻴﺎ ﺃﻭ ﺟﺰﺋﻴﺎ‪ ،‬ﻓﺎﻟﻔﺤﺺ ﺍﳉﺰﺋﻲ ﻳﺆﺩﻱ ﺇﱃ ﺍﻟﺘﻌﺮﻑ ﻋﻠﻰ ﳏﺘﻮﻯ‬
‫ﺍﻟﺒﻴﺎﻧﺎﺗﻮﺍﻟﱵ ﻳﺆﺩﻱ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻌﻬﺎ ﺇﱃ ﺍﻟﻜﺸﻒ ﻋﻦ ﺍﻟﻘﻴﻤﺔ ﺍﻹﺳﺘﺮﺩﺍﺩﻳﺔ ﻟﻠﺒﻴﺎﻧﺎﺕ ﺍﳌﺨﺰﻭﻧﺔ ﻓﻴﻪ ﺳﻮﺍﺀ‬
‫ﻛﺎﻧﺖ ﳏﺘﻮﻳﺎﺕ ﻣﻜﺘﻮﺑﺔ‪ ،‬ﺻﻮﺭ ﺃﻭ ﺃﺻﻮﺍﺕ‪......‬ﺇﱁ‪.‬‬
‫ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺇﻣﻜﺎﻧﻴﺔ ﻣﻌﺮﻓﺔ ﻣﺎ ﰎ ﺣﺬﻓﻪ ﻣﻦ ﺑﻴﺎﻧﺎﺕ ﻭﺑﺮﺍﻣﺞ ﺑﺎﻹﺳﺘﻌﺎﻧﺔ ﺑﱪﳎﻴﺎﺕ ﺧﺎﺻﺔ ﻟﻠﻘﻴﺎﻡ‬
‫ﺑﺬﻟﻚ‪(2)،‬ﻭﺍﳌﺜﺎﻝ ﺍﳌﺴﺘﺨﺪﻡ ﻫﻨﺎ ﻫﻮ ﺣﺎﻟﺔ ﺍﻟﺒﺤﺚ ﰲ ﻣﻠﻔﺎﺕ ﺍﻟﻨﺴﺦ ﻭﻫﺬﻩ ﺍﻷﺧﲑﺓ ﻫﻲ ﻋﺒﺎﺭﺓ ﻋﻦ‬
‫ﻣﻠﻔﺎﺕ ﺗﺄﺧﺬ ﻧﺴﺨﺔ ﺇﺣﺘﻴﺎﻃﻴﺔ ﻋﻦ ﻛﻞ ﺻﻔﺤﺔ ﻳﺘﻢ ﺍﻟﻮﻟﻮﺝ ﺇﻟﻴﻬﺎ ﻋﱪ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻛﻤﺎ ﺗﻮﺟﺪ ﻣﻠﻔﺎﺕ‬
‫ﺧﺎﺻﺔ ﺑﺎﻟﺘﻨـﺰﻳﻞ)‪ (Download file‬ﻣﻬﻤﺘﻬﺎ ﺇﺳﺘﻘﺒﺎﻝ ﺍﳌﻠﻔﺎﺕ ﺍﻟﱵ ﻳﺘﻢ ﲢﻤﻴﻠﻬﺎ ﻋﻠﻰ ﺟﻬﺎﺯ ﺍﳊﺎﺳﺐ‬
‫ﺍﻵﱄ ﻣﻦ ﺧﺎﺭﺟﻪ ﻭﻋﱪ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻓﻬﺬﻩ ﺍﳌﻠﻔﺎﺕ ﻣﺮﻛﺰﻫﺎ ﺍﻟﻘﺮﺹ ﺍﻟﺼﻠﺐ‪.‬‬
‫ﻭﻟﻠﺘﻌﺮﻑ ﻋﻠﻰ ﳏﺘﻮﻳﺎﺕ ﺍﻟﻘﺮﺹ ﺍﻟﺼﻠﺐ ﻓﺈﻥ ﺫﻟﻚ ﻳﺘﻮﻗﻒ ﻋﻠﻰ ﻣﺴﺎﺋﻞ ﻋﺪﻳﺪﺓ ﻣﻨﻬﺎ ﺍﻟﻜﻴﻔﻴﺔ‬
‫ﺍﻟﱵ ﻳﺘﻢ ‪‬ﺎ ﺿﺒﻂ ﺍﳊﺎﺳﻮﺏ ﻭﻣﻬﺎﺭﺓ ﺍﻟﺸﺨﺺ ﺍﻟﻘﺎﺋﻢ ﺑﺈﺳﺘﺨﻼﺹ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺩﻭﻥ ﺍﻟﻌﺒﺚ ﲟﺤﺘﻮﻳﺎ‪‬ﺎ‬
‫ﻟﺬﻟﻚ ﻓﺈﻧﻪ ﻋﻨﺪ ﺿﺒﻂ ﺟﻬﺎﺯ ﺍﳊﺎﺳﺐ ﺍﻵﱄ‪ ،‬ﻋﻠﻰ ﺍﶈﻘﻖ ﺃﻥ ﻳﻨﺘﺰﻉ ﺍﻟﻘﺮﺹ ﻣﻦ ﺍﳉﻬﺎﺯ ﺍﳋﺎﺹ ﺑﻪ‬
‫ﻭﳛﺎﻓﻆ ﻋﻠﻴﻪ ﻣﻦ ﺍﻹﺭﲡﺎﺝ ﺃﻭ ﺍﻹﺻﻄﺪﺍﻡ ﺑﺄﻱ ﺷﻲﺀ‪ ،‬ﻭﻋﺪﻡ ﳏﺎﻭﻟﺔ ﺗﻔﺮﻳﻎ ﺃﻱ ﺑﻴﺎﻧﺎﺕ ﻣﺘﻮﺍﺟﺪﺓ ﻋﻠﻴﻪ‬

‫)‪(1‬ﺣﺴﲔ ﺑﻦ ﺳﻌﻴﺪﺑﻦ ﺳﻴﻒ ﺍﻟﻔﺎﻏﺮﻱ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.425‬‬


‫)‪(2‬ﻋﻤﺮ ﺃﺑﻮ ﺑﻜﺮ ﺑﻦ ﻳﻮﻧﺲ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.11-10‬‬

‫‪- 131 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﺫﻟﻚ ﺗﻼﻓﻴﺎ ﻟﻔﻘﺪ ﺃﻱ ﺑﻴﺎﻧﺎﺕ‪ ،‬ﻭﺗﺴﻠﻴﻤﻪ ﺇﱃ ﺍﻟﻔﲏ ﺍﳋﺒﲑ ﺍﳌﺨﺘﺺ ﺍﻟﺬﻱ ﻳﻘﻮﻡ ﺑﺘﺤﻠﻴﻞ ﺍﻟﻨﺴﺦ ﺍﻟﱵ‬
‫ﺗﺼﺪﺭ ﻣﻦ ﺍﻟﻘﺮﺹ ﻭﺑﻌﺮﺽ ﻣﺎ ﺗﻮﺻﻞ ﺇﻟﻴﻪ ﻋﻠﻰ ﺍﶈﻘﻖ‪.‬‬
‫ﻭﻫﻨﺎ ﻻﺑﺪ ﻣﻦ ﻣﺮﺍﻋﺎﺓ ﺷﺮﻁ ﺳﻼﻣﺔ ﺟﻬﺎﺯ ﺍﳊﺎﺳﺐ ﺍﻵﱄ‪ ،‬ﺍﻟﺬﻱ ﻳﻌﲏ ﺻﺤﺔ ﺣﺮﻛﺔ ﺍﻟﻘﻄﻊ‬
‫ﺍﻟﺼﻠﺒﺔ ﻓﻴﻪ ﻭﺫﻟﻚ ﻟﺘﺠﻨﺐ ﺍﻟﻮﻗﻮﻉ ﰲ ﻣﺄﺯﻕ ﺭﻓﺾ ﺍﶈﻜﻤﺔ ﺍﻹﻋﺘﺪﺍﺩ ﺑﺎﻟﺪﻟﻴﻞ ﺍﳌﻨﺒﺜﻖ ﻋﻨﻪ‪ ،‬ﻓﺸﺮﻁ‬
‫ﺳﻼﻣﺔ ﺍﳊﺎﺳﻮﺏ ﻣﻄﻌﻦ ﺭﺋﻴﺴﻲ ﻋﻠﻰ ﻛﻞ ﺩﻟﻴﻞ ﰎ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ ﲝﻴﺚ ﳚﺐ ﺍﻟﻜﺸﻒ ﻋﻠﻰ ﺣﺮﻛﺔ‬
‫) ‪(1‬‬
‫ﺍﳊﺎﺳﻮﺏ ﺑﺪﺍﻳﺔ ﻭﺍﻹﻗﺮﺍﺭ ﺑﺴﻼﻣﺘﻪ‪.‬‬
‫ﻭﺇﻥ ﻣﻦ ﺍﻷﺷﻴﺎﺀ ﺍﻟﱵ ﺗﻈﻬﺮ ﺑﻌﺪ ﻋﻤﻠﻴﺔ ﻓﺤﺺ ﺃﻱ ﻗﺮﺹ ﺻﻠﺐ ﻷﻱ ﺟﻬﺎﺯ ﺗﻠﻚ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻟﱵ‬
‫ﻛﺎﻥ ﻳﺴﺘﺨﺪﻣﻬﺎ ﺍﳉﺎﱐ‪ ،‬ﻭﻛﺬﺍ ﺍﻟﺼﻮﺭ ﺍﳌﺨﺰﻧﺔ ﻓﻴﻪ ﻭﳐﺎﺑﺊ ﺻﻔﺤﺎﺕ ﺍﻷﻧﺘﺮﻧﺎﺕ‪ ،‬ﻭﻣﻦ ﺧﻼﳍﺎ ﳝﻜﻦ‬
‫ﺍﻟﺘﻮﺻﻞ ﻟﺼﻔﺤﺎﺕ ﻭﻋﻨﺎﻭﻳﻦ ﻣﻮﺍﻗﻊ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻭﻛﺬﺍ ﺭﺳﺎﺋﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺭﺅﻭﺱ‬
‫ﺍﻟﺼﻔﺤﺎﺕ ﺍﳌﺮﺳﻠﺔ ﻭﺍﳌﺘﻠﻘﺎﺓ ﻭﳎﻤﻮﻋﺔ ﺍﻟﱪﺍﻣﺞ ﺍﳉﺎﻫﺰﺓ ﺍﳌﺘﺨﺼﺼﺔ ﺍﻟﱵ ﺇﺳﺘﺨﺪﻣﻬﺎ )ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ( ﻭﻣﻨﻬﺎ‬
‫ﳝﻜﻦ ﲢﺪﻳﺪ ﺃﺻﺪﻗﺎﺀ )ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ( ﻭﻛﺬﺍ ﲢﺪﻳﺪ ﻣﺎ ﻳﺘﺤﺎﻭﺭﻭﻥ ﻓﻴﻪ‪.‬‬
‫‪/2‬ﻓﺤﺺ ﺍﻟﱪﳎﻴﺎﺕ‪ :‬ﻳﺘﻄﻠﺐ ﺍﻷﻣﺮ ﰲ ﻣﺜﻞ ﻫﺬﻩ ﺍﳊﺎﻟﺔ ﺃﻥ ﳕﻴﺰ ﺑﲔ ﺍﻟﻔﺤﺺ ﺍﻟﺪﺍﺧﻠﻲ ﻟﻠﱪﳎﻴﺎﺕ‬
‫ﻭﺍﻟﻔﺤﺺ ﺍﳋﺎﺭﺟﻲ ﳍﺎ‪ .‬ﻓﺎﻟﻔﺤﺺ ﺍﻟﺪﺍﺧﻠﻲ ﻳﺘﻢ ﻣﻦ ﺧﻼﻝ ﺍﻟﺒﺤﺚ ﰲ ﺍﻟﺒﻨﺎﺀ ﺍﳌﻨﻄﻘﻲ ﻟﻠﱪﳎﺔ ﲟﺎ ﻳﻮﺣﻲ‬
‫ﺑﺄﻥ ﻫﻨﺎﻙ ﳎﻬﻮﺩﺍ ﲡﺪﻳﺪﻳﺎ ﰲ ﺇﻋﺪﺍﺩﻩ ﻟﻠﻌﻤﻞ ﺣﲔ ﺇﻧﺰﺍﻟﻪ ﻋﻠﻰ ﺟﻬﺎﺯ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ‪Instalation‬ﻣﻦ‬
‫ﺧﻼﻝ ﺗﺘﺒﻊ ﺧﻄﻮﺍﺕ ﻣﻨﻄﻘﻴﺔ ﺗﻌﱪ ﻋﻦ ﻫﺬﺍ ﺍﳉﻬﺪ‪ ،‬ﻭﺃﻛﺜﺮ ﻣﺎ ﻳﺘﻢ ﺍﻟﺒﺤﺚ ﻋﻨﻪ ﰲ ﺇﻃﺎﺭ ﺍﻟﻔﺤﺺ‬
‫ﺍﻟﺪﺍﺧﻠﻲ ﻫﻮ ﺍﻟﺒﺤﺚ ﻋﻦ ﻣﺼﺪﺭ ﺍﳌﻠﻔﺎﺕ ﺍﳌﻮﺟﻮﺩﺓ ﰲ ﻫﺬﺍ ﺍﻹﻃﺎﺭ‪ ،‬ﺫﻟﻚ ﺃﻥ ﺍﻟﻨﺴﺦ ﻋﱪ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻻ‬
‫ﻳﺸﺒﻪ ﺍﻟﻨﺴﺦ ﺑﺈﺳﺘﺨﺪﺍﻡ ﺑﺮﳎﻴﺎﺕ ﺍﳌﻌﺎﳉﺔ ﻓﺎﻷﻭﻝ ﻧﺴﺦ ﻋﱪ ﺍﻟﻌﺎﱂ ﺍﻹﻓﺘﺮﺍﺿﻲ ﻭﺍﻟﺜﺎﱐ ﻳﺘﻢ ﺑﺈﺳﺘﺨﺪﺍﻡ‬
‫ﻣﺼﻨﻒ ﻣﺘﺪﺍﻭﻝ ﰲ ﺍﻟﻌﺎﱂ ﺍﳌﺎﺩﻱ‪.‬ﻭﺗﻔﻴﺪ ﻭﺳﻴﻠﺔ ﺍﻟﻨﺴﺦ ﰲ ﺗﺮﺗﻴﺐ ﻛﻴﻔﻴﺔ ﺣﺪﻭﺙ ﺍﳉﺮﳝﺔ‪.‬‬
‫ﺃﻣﺎ ﰲ ﺣﺎﻟﺔ ﺍﻟﻔﺤﺺ ﺍﳋﺎﺭﺟﻲ ﻭﺍﻟﺬﻱ ﻳﺘﻢ ﺍﻟﻠﺠﻮﺀ ﻓﻴﻪ ﺇﱃ ﺍﻟﻨﺴﺨﺔ ﺍﻷﺻﻠﻴﺔ ﻟﻠﻤﻘﺎﺭﻧﺔ ﺑﻴﻨﻬﺎ ﻭﺑﲔ‬
‫ﺍﻟﻨﺴﺨﺔ ﳏﻞ ﺍﻹﺷﺘﺒﺎﻩ ﻭﺫﻟﻚ ﻟﻠﺪﻻﻟﺔ ﻋﻠﻰ ﺛﺒﻮﺕ ﺇﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﺑﺪﺭﺟﺔ ﻣﻘﻨﻌﺔ‪.‬‬
‫ﻭﰲ ﻛﻠﺘﺎ ﺍﳊﺎﻟﺘﲔ ﻳﻨﺒﻐﻲ ﺍﻟﺘﻨﺒﻴﻪ ﺇﱃ ﺧﻄﻮﺭﺓ ﺍﻟﱪﳎﻴﺎﺕ ﺍﳌﻌﻴﺒﺔ ﺍﻟﱵ ﳝﻜﻦ ﺃﻥ ﺗﺆﺛﺮ ﰲ ﺍﳊﺎﺳﻮﺏ‬
‫ﻭﲡﻌﻠﻪ ﳏﻞ ﺷﻚ ‪‬ﺘﺰ ﻣﻌﻪ ﻗﻴﻤﺔ ﺍﻟﺪﻟﻴﻞ‪ ،‬ﻳﻜﻮﻥ ﳍﺬﺍ ﺍﻟﻘﺼﻮﺭ ﺃﺛﺮﻩ ﰲ ﻋﻤﻠﻴﺔ ﺗﻘﻴﻴﻢ ﺍﻟﺪﻟﻴﻞ ﺍﳌﺴﺘﻤﺪ ﻣﻦ‬
‫) ‪(2‬‬
‫ﺍﻟﱪﳎﻴﺎﺕ ﺫﺍ‪‬ﺎ‬

‫)‪(1‬ﺧﺎﻟﺪ ﳑﺪﻭﺡ ﺇﺑﺮﺍﻫﻴﻢ ‪.‬ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪.‬ﺹ‪.215‬‬


‫)‪(2‬ﺧﺎﻟﺪ ﳑﺪﻭﺡ ﺇﺑﺮﺍﻫﻴﻢ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.219‬‬

‫‪- 132 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪- 133 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪-3‬ﻓﺤﺺ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‪ :‬ﺇﻥ ﺍﳌﻬﻤﺔ ﺍﻷﺳﺎﺳﻴﺔ ﻟﻜﻞ ﻧﻈﺎﻡ ﻣﻌﻠﻮﻣﺎﰐ ﻫﻮ ﲢﻘﻴﻖ ﻓﺮﺿﻴﺔ ﺗﻨﻔﻴﺬ‬
‫ﺍﻷﻭﺍﻣﺮ ﺍﻟﱵ ﳝﻜﻦ ﺃﻥ ﻳﻘﻮﻡ ‪‬ﺎ ﻣﺴﺘﺨﺪﻡ ﺍﳊﺎﺳﻮﺏ‪ ،‬ﻭﺗﻌﲏ ﻋﻤﻠﻴﺔ ﻓﺤﺺ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺿﺒﻂ ﻛﺎﻓﺔ‬
‫ﻣﺎ ﳛﺘﻮﻳﻪ ﺟﻬﺎﺯ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻣﻦ ﻣﻌﻠﻮﻣﺎﺕ )‪(1‬ﳝﻜﻦ ﺇﺳﺘﺮﺟﺎﻋﻬﺎ ﻋﱪﻩ ﺗﻜﻮﻥ ﳐﺰﻧﺔ ﰲ ﻣﻠﻔﺎﺕ ﻋﻠﻰ‬
‫ﺃﻱ ﺷﺎﻛﻠﺔ ﳝﻜﻦ ﺃﻥ ﺗﻜﻮﻥ ﻋﻠﻴﻬﺎ ﺍﳊﺮﻛﺔ ﺍﻹﺳﺘﺮﺩﺍﺩﻳﺔ ﻣﺎ ﺩﺍﻡ ﻣﻮﺿﻮﻋﻬﺎ ﻳﺸﻜﻞ ﺟﺮﳝﺔ‪.‬‬
‫ﻭﺍﳊﻘﻴﻘﺔ ﺃﻧﻪ ﻋﻠﻰ ﺣﺴﺐ ﻛﺜﺮﺓ ﺍﻟﺘﻌﺎﻣﻞ ﺑﺎﳊﺎﺳﺐ ﺍﻵﱄ ﻳﺘﻜﺎﺛﺮ ﳏﺘﻮﻯ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﳑﺎ ﻳﺰﻳﺪ‬
‫ﻣﻦ ﺻﻌﻮﺑﺔ ﻓﺤﺼﻪ ﺑﺎﻟﻨﻈﺮ ﺇﱃ ﺍﳊﺠﻢ ﺍﻟﻀﺨﻢ ﻭﺍﻟﻜﻢ ﺍﳍﺎﺋﻞ ﻣﻦ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺨﺰﻧﺔ ﻓﻴﻪ‪.‬‬
‫ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺃﻥ ﻋﻤﻠﻴﺔ ﲢﺰﻳﻦ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻻ ﺗﺘﺨﺬ ﺷﻜﻼ ﳏﺪﺩﺍ ﻭﺇﳕﺎ ﺗﺘﻨﻮﻉ ﺃﺳﺎﻟﻴﺒﻬﺎ‪ ،‬ﻭﺍﻟﱵ ﻳﺼﻞ‬
‫ﻣﺪﺍﻫﺎ ﺇﱃ ﺣﺪ ﺇﻣﻜﺎﻧﻴﺔ ﲣﺰﻳﻦ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺑﺸﻜﻞ ﺁﻣﻦ ﰲ ﺍﳊﺎﺳﻮﺏ ﺑﻨﻈﺎﻡ ﺍﻟﺘﺸﻐﻴﻞ ﺃﻭ ﺑﻨﻈﺎﻡ ﺇﺧﻔﺎﺀ‬
‫ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﰐ ﲝﻴﺚ ﻻ ﻳﻈﻬﺮ ﺍﳌﻠﻒ ﺣﱴ ﰲ ﺣﺎﻟﺔ ﺍﻟﺒﺤﺚ ﺍﻵﱄ ﻟﻠﺤﺎﺳﺐ ﻋﻨﻪ ﻭﺍﻟﺬﻱ ﻗﺪ ﳛﺘﻮﻱ‬
‫) ‪(2‬‬
‫ﻋﻠﻰ ﻣﻮﺍﺩ ﺇﺟﺮﺍﻣﻴﺔ‪ ،‬ﻭﺗﻔﻮﺕ ﺍﻟﻔﺮﺻﺔ ﺑﺴﺒﺐ ﻫﺬﻩ ﺍﻟﺘﻘﻨﻴﺔ ﻋﻠﻰ ﺍﶈﻘﻘﲔ ﻣﻦ ﺍﻟﻮﺻﻮﻝ ﺇﻟﻴﻪ‪.‬‬
‫ﺛﺎﻧﻴﺎ‪ :‬ﻓﺤﺺ ﺃﻧﻈﻤﺔ ﺍﻹﺗﺼﺎﻝ ﺑﺎﻷﻧﺘﺮﻧﺎﺕ‪ :‬ﻳﻘﺼﺪ ﺑﻨﻈﺎﻡ ﺍﻹﺗﺼﺎﻝ ﺑﺎﻷﻧﺘﺮﻧﺎﺕ ﺑﺎﳌﻔﻬﻮﻡ ﺍﻹﺟﺮﺍﺋﻲ‬
‫ﻫﻮ ﺗﻠﻚ ﺍﻷﺟﺮﺍﺀﺍﺕ ﺃﻭ ﺍﳌﺮﺍﺣﻞ ﺍﳌﺘﺒﻌﺔ ﺣﺎﻝ ﺇﺳﺘﺨﺪﺍﻡ ﺍﻹﺗﺼﺎﻝ ﺑﺎﻷﻧﺘﺮﻧﺎﺕ‪ ،‬ﻭﻣﻦ ﺃﻫﻢ ﺍﳌﺴﺎﺋﻞ ﺍﳌﺜﺎﺭﺓ‬
‫ﰲ ﺻﺪﺩ ﻓﺤﺺ ﺃﻧﻈﻤﺔ ﺍﻹﺗﺼﺎﻝ ﺑﺎﻷﻧﺘﺮﻧﺎﺕ ﺳﻌﻴﺎ ﻭﺭﺍﺀ ﺍﻟﺒﺤﺚ ﻋﻦ ﺍﻟﺪﻟﻴﻞ ﻫﻲ ﻣﺴﺄﻟﺔ ﲢﺪﻳﺪ ﻣﻜﺎﻥ‬
‫ﺍﳉﺮﳝﺔ ﺃﻭ ﺟﻬﺎﺯ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﺍﻟﺬﻱ ﺇﻧﻄﻠﻖ ﻣﻨﻪ ﺍﻟﻨﺸﺎﻁ ﺍﻹﺟﺮﺍﻣﻲ‪ ،‬ﻭﺫﻟﻚ ﻣﻦ ﺧﻼﻝ ﺗﺘﺒﻊ ﺍﳊﺮﻛﺔ‬
‫ﺍﻟﻌﻜﺴﻴﺔ ﳌﺴﺎﺭ ﺍﻷﻧﺘﺮﻧﺎﺕ ﺃﻱ ﺗﺘﺒﻊ ﺍﳊﺮﻛﺔ ﺍﻟﺘﺮﺍﺳﻠﻴﺔ ﻟﻠﻨﺸﺎﻁ ﺍﳌﻤﺎﺭﺱ ﻣﻦ ﺧﻼﻝ ﺍﻷﻧﺘﺮﻧﺎﺕ‪،‬‬
‫ﻓﺎﳊﺎﺳﻮﺏ ﲟﺠﺮﺩ ﺃﻥ ﻳﺘﻌﺮﻑ ﻋﻠﻰ ﺍﳌﺴﺎﺭ ﻳﻘﻮﻡ ﺗﻠﻘﺎﺋﻴﺎ ﺑﺈﺧﺘﻴﺎﺭ ﺍﻟﱪﻭﺗﻮﻛﻮﻝ ﺍﻟﺘﺮﺍﺳﻠﻲ ﺍﻟﺬﻱ ﻣﻦ ﺧﻼﻟﻪ‬
‫) ‪(3‬‬
‫ﻳﻘﻮﻡ ﺑﺈﺳﺘﺪﻋﺎﺀ ﺍﻟﺒﻴﺎﻧﺎﺕ‪.‬‬

‫)‪(1‬ﺇﻥ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻟﻠﺤﺎﺳﺐ ﺍﻵﱄ ﻻ ﳛﺘﻮﻱ ﻋﻠﻰ ﻣﻌﻠﻮﻣﺎﺕ ﻣﻜﺘﻮﺑﺔ ﻛﻤﺎ ﻫﻮ ﺍﳌﻌﺘﻘﺪ ﺍﻟﺴﺎﺋﺪ‪ ،‬ﻭﺇﳕﺎ ﺍﶈﺘﻮﻯ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻋﺎﺩﺓ ﻣﺎ ﻳﺘﻜﻮﻥ ﻣﻦ ﺑﻴﺎﻧﺎﺕ‬
‫ﺛﻨﺎﺋﻴﺔ ﺍﳍﻴﺌﺔ ﺍﻟﺮﻗﻤﻴﺔ ﻳﺘﻢ ﺇﻳﺪﺍﻋﻬﺎ ﰲ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﰲ ﺷﻜﻞ ﲣﺰﻳﻦ )‪ (Stockage‬ﻭﻳﻘﻮﻡ ﺍﳊﺎﺳﻮﺏ ﲟﻌﺎﳉﺔ ﻫﺬﻩ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﻳﱪﺯﻫﺎ ﻋﻠﻰ ﻫﻴﺄﺓ ﻣﻌﻠﻮﻣﺔ‬
‫ﳏﺪﺩﺓ ﺣﲔ ﻳﺘﻢ ﺇﺳﺘﺪﻋﺎﺅﻫﺎ ﻣﻦ ﻗﺒﻞ ﻣﺴﺘﺨﺪﻡ ﺍﳊﺎﺳﻮﺏ ﻭﻣﺎ ﺩﺍﻡ ﱂ ﻳﺘﻢ ﺇﺳﺘﺪﻋﺎﺀ ﻣﻌﻠﻮﻣﺎﺓ ﳏﺪﺩﺓ ﻓﺈﻥ ﺑﻴﺎﻧﺎ‪‬ﺎ ﺗﻀﻞ ﰲ ﺣﺎﻟﺔ ﲣﺰﻳﻦ ﰲ ﺍﳊﺎﺳﻮﺏ ﻓﻼ ﻳﻘﻮﻡ‬
‫ﺍﳊﺎﺳﻮﺏ ﺑﺈﺳﺘﺪﻋﺎﺀ ﻛﺎﻓﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻣﺮﺓ ﻭﺍﺣﺪﺓ‪.‬‬
‫)‪(2‬ﺧﺎﻟﺪ ﳑﺪﻭﺡ ﺇﺑﺮﺍﻫﻴﻢ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ‪.222‬‬
‫)‪(3‬ﻋﻤﺮ ﺑﻦ ﻳﻮﻧﺲ ﺍﳉﺮﺍﺋﻢ ﺍﻟﻨﺎﺷﺌﺔ ﻋﻦ ﺇﺳﺘﺨﺪﺍﻡ ﺍﻷﻧﺘﺮﻧﺎﺕ‪،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ‪.998‬‬

‫‪- 134 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﻳﺴﺘﺨﺪﻡ ﰲ ﻋﻤﻠﻴﺔ ﺗﺘﺒﻊ ﺣﺮﻛﺔ ﻣﺴﺎﺭ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻧﻈﺎﻡ ﻓﺤﺺ ﺇﻟﻜﺘﺮﻭﱐ ﻳﻄﻠﻖ ﻋﻠﻴﻪ ﻋﻠﻢ‬
‫) ‪(1‬‬
‫ﺍﻟﺒﺼﻤﺎﺕ ﺍﳌﻌﺎﺻﺮ‪ ،‬ﻭﻣﺎ ﻳﺘﻢ ﺍﻟﺘﻮﺻﻞ ﺇﻟﻴﻪ ﺑﻌﺪ ﺫﻟﻚ ﻫﻮ ﻋﻨﻮﺍﻧﺮﻗﻤﻲ ﻳﺴﻤﻰ ‪adresse IPInternet‬‬
‫‪protocol‬ﻭ ﻫﻮ ﻋﺒﺎﺭﺓ ﻋﻦ ﺑﺮﺗﻮﻛﻮﻝ ﻟﻌﻨﻮﻧﺔ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﺍﳌﻮﺍﻗﻊ ﰲ ﺷﺒﻜﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ‪ ،‬ﻭﲟﻘﺘﻀﻰ ﻫﺬﺍ‬
‫ﺍﻟﱪﻭﺗﻮﻛﻮﻝ)‪ (IP‬ﻳﺘﻢ ﺍﻟﺘﻌﺮﻑ ﻋﻠﻰ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﺍﳌﻮﺻﻮﻝ ﺑﺸﺒﻜﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻣﻦ ﺧﻼﻝ ﻋﻨﺎﻭﻳﻦ ﻋﺪﺩﻳﺔ‪،‬‬
‫ﺣﻴﺚ ﻟﻜﻞ ﻛﻮﻣﺒﻴﻮﺗﺮ ‪‬ﺎ ﻋﻨﻮﺍﻧﻪ ﺍﻟﻮﺣﻴﺪ ﻭﺍﳋﺎﺹ ﺑﻪ ﲤﺎﻣﺎ)‪(2‬ﻳﺴﻤﻰ‪IPAdresse‬ﻭﻛﻞ ﻋﻨﻮﺍﻥ ‪IP‬ﻣﻜﻮﻥ‬
‫ﻣﻦ ﺟﺰﺋﲔ ﺍﻷﻭﻝ ﻳﺸﻤﻞ ﺃﺭﻗﺎﻡ ﺍﻟﺸﺒﻜﺔ ﻭﺍﻟﺜﺎﱐ ﻳﺸﻤﻞ ﺃﺭﻗﺎﻡ ﻣﻘﺪﻡ ﺍﳋﺪﻣﺔ)‪(3‬ﻭﻳﻌﻤﻞ ﺑﺮﻭﺗﻮﻛﻮﻝ‬
‫‪IP‬ﺑﺸﻜﻞ ﻣﺘﺰﺍﻣﻦ ﻣﻊ ﺑﺮﻭﺗﻜﻮﻝ ﺁﺧﺮ ﻭﻫﻮ ﺑﺮﻭﺗﻮﻛﻮﻝ ﺍﻟﺘﺤﻜﻢ ﺑﺎﻟﻨﻘﻞ ) ‪Trams mission control‬‬
‫‪TCP(protocol‬ﻭﻫﺬﺍﻥ ﺍﻟﱪﺗﻮﻛﻮﻻﻥ‪TCP/IP‬ﳘﺎ ﻣﻦ ﻋﺎﺋﻠﺔ ﺑﺮﺗﻮﻛﻮﻻﺕ ﺍﻹﺗﺼﺎﻝ ﺑﲔ ﻋﺪﺓ ﺃﺟﻬﺰﺓ‬
‫ﻣﻦ ﺍﳊﻮﺍﺳﻴﺐ ﻃﻮﺭﺕ ﺃﺳﺎﺳﺎ ﻟﻨﻘﻞ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺑﲔ ﺃﻧﻈﻤﺔ)‪(4) (UNIX‬ﰒ ﺃﺻﺒﺤﺖ ﺍﳌﻘﻴﺎﺱ ﺍﳌﺴﺘﺨﺪﻡ‬
‫ﻟﻨﻘﻞ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻟﺮﻗﻤﻴﺔ ﻋﱪ ﺷﺒﻜﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ‪ ،‬ﻭﻳﺮﺗﻜﺰ ﺍﻟﱪﺗﻮﻛﻮﻻﻥ ﻣﻌﺎ )‪ (TCP/IP‬ﻋﻠﻰ ﺗﻘﻨﻴﺔ ﺍﻟﺘﺒﺪﻳﻞ‬
‫ﺍﳌﻌﻠﻮﻣﺎﰐ ﺑﻮﺍﺳﻄﺔ ﺍﳊﺰﻡ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ )‪ (Pachet‬ﺑﲔ ﳐﺘﻠﻒ ﺍﻟﻮﺻﻼﺕ ﺍﻟﺴﻠﻜﻴﺔ ﻭﺍﻟﻼﺳﻠﻜﻴﺔ ﺍﳌﺘﺨﺼﺼﺔ‬
‫ﺍﻟﱵ ﺗﺮﺑﻂ ﺍﻟﺸﺒﻜﺎﺕ ﺍﳌﺨﺘﻠﻔﺔ ﺍﳌﻮﺻﻮﻟﺔ ﻓﻴﻤﺎ ﺑﻴﻨﻬﺎ‪ .‬ﻭﺣﺰﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺟﺰﺀ ﺃﻭ ﻗﺴﻢ ﻣﻦ ﻣﻠﻒ‬
‫ﻣﻌﻠﻮﻣﺎﰐ ﺫﺍﺕ ﺣﺠﻢ ﻣﺼﻐﺮ ﺛﺎﺑﺖ ﲢﻤﻞ ﻛﻞ ﻣﻨﻬﺎ ﺭﻗﻤﺎ ﺧﺎﺻﺎ ﻭﻣﻌﻠﻮﻣﺎﺕ ﺗﻌﺮﻳﻔﻴﺔ ﺑﻜﻞ ﻣﻦ ﺍﳌﺮﺳﻞ‬
‫ﻭﺍﳌﺮﺳﻞ ﺇﻟﻴﻪ‪ ،‬ﻭﻋﻨﺪ ﻛﻞ ﻭﺻﻠﺔ ﺗﺘﻢ ﻗﺮﺍﺀﺓ ﺟﻬﺔ ﺍﳌﻘﺼﺪ ﺃﻭ ﺍﳌﺮﺳﻞ ﺇﻟﻴﻪ ﰒ ﺗﺘﻢ ﺇﻋﺎﺩﺓ ﺇﺭﺳﺎﻝ ﺍﳊﺰﻣﺔ‬
‫ﺍﳌﺎﺭﺓ ﻋﱪﳘﺎ ﳓﻮ ﺍﻟﻮﺻﻼﺕ ﺍﻟﺘﺎﻟﻴﺔ ﺍﻷﻗﺮﺏ ﺇﱃ ﺟﻬﺔ ﺍﳌﻘﺼﺪ ﺍﻟﻨﻬﺎﺋﻴﺔ‪.‬‬

‫)‪(1‬ﻭﻗﺪ ﰎ ﺇﺳﺘﺨﺪﺍﻡ ﻫﺬﺍ ﺍﳌﻨﻬﺞ ﰲ ﺍﻟﻜﺸﻒ ﻋﻦ ﺍﻟﻌﺪﻳﺪ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﻣﺜﻞ ﺗﺘﺒﻊ ﻣﺒﺘﻜﺮ ﻓﲑﻭﺱ ﻣﻴﻠﻴﺴﺎ ﻭﻛﺬﺍ ﺍﻟﺘﻮﺻﻞ ﺇﱃ ﺍﻟﺸﺨﺺ ﺍﻟﺬﻱ ﺇﺑﺘﻜﺮ ﻣﻮﻗﻊ‬
‫ﺧﺪﻣﺎﺕ ﺑﻮﳌﱪﻭﺝ ﻷﺧﺒﺎﺭ ﺍﳌﺎﻝ ﺍﻹﺣﺘﻴﺎﱄ ﻟﻜﻦ ﻳﺮﻓﻊ ﺍﻷﺳﻬﻢ ﺑﻄﺮﻳﻖ ﺍﳋﺪﺍﻉ‪.‬‬
‫)‪(2‬ﻋﺒﺪ ﺍﳊﻤﻴﺪ ﻋﺒﺪ ﺍﳌﻄﻠﺐ ﺇﺳﺘﺨﺪﺍﻡ ﺑﺮﺗﻮﻛﻮﻝ ‪ TCP/IP‬ﰲ ﲝﺚ ﻭﲢﻘﻴﻖ ﺍﳉﺮﺍﺋﻢ ﻣﻊ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪.‬ﺹ‪.5‬‬
‫)‪(3‬ﻳﻌﱪ ﻋﻦ ﻋﻨﺎﻭﻳﻦ ﺍﻷﻧﺘﺮﻧﺎﺕ ﺍﻟﺮﻗﻤﻴﺔ ﺍﻟﻮﺣﻴﺪ ﺳﻠﺴﻠﺔ ﻣﺆﻟﻔﺔ ﻣﻦ ﺃﺭﺑﻊ ﳎﻤﻮﻋﺎﺕ ﻣﻦ ﺍﻷﺭﻗﺎﻡ ﻣﻔﺼﻮﻟﺔ ﻋﻦ ﺑﻌﻀﻬﺎ ﺑﻨﻘﺎﻁ ﺃﻭ ﺣﺮﻭﻑ ﺃﲜﺪﻳﺔ ﺭﻣﺰﻳﺔ ﺩﺍﻟﺔ‬
‫ﻋﻠﻴﻬﺎ‪ ،‬ﳚﺮﻱ ﺻﻔﻬﺎ ﺿﻤﻦ ﺗﺴﻠﺴﻞ ﻫﺮﻣﻲ ﻭﻳﺘﻮﱃ ﻧﺴﺦ ﻫﺬﻩ ﺍﻷﺭﻗﺎﻡ ﺃﻭ ﺇﺳﺘﺒﺪﺍﳍﺎ ﲝﺮﻭﻑ ﻣﺆﺳﺴﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ ﳌﻨﺢ ﺍﻷﲰﺎﺀ ﻭﺍﻷﺭﻗﺎﻡ ﻭﻫﻲ ﳉﻨﺔ ﺩﻭﻟﻴﺔ‬
‫ﺧﺎﺻﺔ ﺗﻌﻤﻞ ﺑﺎﻟﺘﻨﺴﻴﻖ ﻣﻊ ﺍﳌﻨﻈﻤﺔ ﺍﻟﺪﻭﻟﻴﺔ ﻟﻠﻤﻠﻜﻴﺔ ﺍﻟﻔﻜﺮﻳﺔ ﻣﻬﻤﺘﻬﺎ ﺇﺑﺘﻜﺎﺭ ﺁﻟﻴﺔ ﳌﻨﺢ ﻋﻨﺎﻭﻳﻦ ﺍﳌﻮﺍﻗﻊ ﻭﺗﺄﺧﺬ ﰲ ﺍﳊﺴﺒﺎﻥ ﺍﻟﺒﻌﺪ ﺍﻟﺪﻭﱄ ﻟﺸﺒﻜﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ‬
‫ﻭﻛﻴﻔﻴﺔ ﺣﻞ ﺍﳌﻨﺎﺯﻋﺎﺕ ﺑﺸﺄ‪‬ﺎ‪ ،‬ﻭﻛﺎﻥ ﻳﻘﻮﻡ ‪‬ﺬﻩ ﺍﳌﻬﻤﺔ ﻗﺒﻞ ﺇﻧﺸﺎﺀ ﺍﳌﺆﺳﺴﺔ ﻋﺎﻡ ‪ 1988‬ﳉﻨﺔ ﻣﻨﺢ ﺍﻷﺭﻗﺎﻡ ﰲ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻭﻫﻲ ﻫﻴﺌﺔ ﺃﻧﺎﻃﺖ ﻣﺆﺳﺴﺔ‬
‫ﺍﻷﻧﺘﺮﻧﺖ ‪‬ﺎ ﻣﻬﻤﺔ ﺇﺩﺭﺍﺓ ﻧﻈﺎﻡ ﻣﻨﺢ ﻋﻨﺎﻭﻳﻦ ﺍﻷﻧﺘﺮﻧﺎﺕ ﺣﺴﺐ ﺑﺮﺗﻮﻛﻮﻝ ‪ IP‬ﻗﺒﻞ ﺃﻥ ﺗﻨﺘﻘﻞ ﻫﺬﻩ ﺍﳌﻬﻤﺔ ﺇﱃ ﻣﺆﺳﺴﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ ﳌﻨﺢ ﺍﻷﺭﻗﺎﻡ ﻭﺍﻷﲰﺎﺀ‪.‬‬
‫)‪ UNIX(4‬ﻫﻮ ﻧﻈﺎﻡ ﺗﺸﻐﻴﻞ ﻣﺘﻌﺪﺩ ﺍﳌﻬﺎﻡ ﻭﻣﺘﻌﺪﺩ ﺍﳌﺴﺘﺨﺪﻣﲔ ﻣﺼﻤﻢ ﻹﺳﺘﺨﺪﺍﻣﻪ ﰲ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﺍﳌﱰﱄ ﺃﻭ ﺍﳌﻜﺘﱯ ﺑﺈﻋﺘﺒﺎﺭ ﺃﻥ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ ﻣﻜﺘﻮﺏ‬
‫ﺑﻠﻐﺔ )‪ (C‬ﻟﺬﻟﻚ ﻓﻬﻮ ﺃﻛﺜﺮ ﻗﺎﺑﻠﻴﺔ ﻟﻠﻨﻘﻞ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻣﻦ ﺍﻷﻧﻈﻤﺔ ﺍﻷﺧﺮﻯ‪ ،‬ﻭﺍﻟﻠﻐﺔ )‪ (C‬ﻟﻐﺔ ﺑﺮﳎﺔ ﻋﺎﻟﻴﺔ ﺍﳌﺴﺘﻮﻯ ﺻﻤﻤﺖ ﺃﺻﻼ ﻟﺘﻌﻤﻞ ﲢﺖ ﺍﻟﻨﻈﺎﻡ‬
‫‪ UNIX‬ﻭﻫﻲ ﻣﺴﺘﺨﺪﻣﺔ ﰲ ﻛﺘﺎﺑﺔ ﻛﺎﻓﺔ ﺍﻟﺘﻄﺒﻴﻘﺎﺕ ﺑﻌﺪ ﺃﻥ ﻳﺮﻯ ﻭﺿﻊ ﻣﻘﺎﻳﻴﺴﻬﺎ ﻣﻦ ﻗﺒﻞ ﺍﳌﻌﻬﺪ ﺍﻟﻘﻮﻣﻲ ﺍﻷﻣﺮﻳﻜﻲ ﻟﻠﻤﻘﺎﻳﻴﺲ‪.‬‬

‫‪- 135 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﻳﻌﺘﱪ ﻧﻈﺎﻡ ‪ TCP/IP‬ﻣﻦ ﺃﻛﺜﺮ ﺍﻟﱪﺗﻮﻛﻮﻻﺕ ﺍﳌﺴﺘﺨﺪﻣﺔ ﰲ ﺷﺒﻜﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻓﻬﻮ ﺟﺰﺀ‬
‫ﺃﺳﺎﺳﻲ ﻣﻨﻪ‪ ،‬ﻟﺬﻟﻚ ﺗﱪﺯ ﺃﳘﻴﺔ ﺍﻹﺳﺘﻌﺎﻧﺔ ﺑﺎﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﳌﺼﺎﺩﺭ ﻭﺍﻟﻌﻨﺎﻭﻳﻦ ﺍﻟﱵ ﳝﻜﻦ ﺃﻥ ﳛﺘﻮﻳﻬﺎ ﻫﺬﺍ‬
‫ﺍﻟﱪﺗﻮﻛﻮﻝ ﰲ ﲢﻘﻴﻖ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺣﻴﺚ ﺗﺪﻝ ﺑﺼﻔﺔ ﺟﺎﺯﻣﺔ ﻋﻦ ﻣﺼﺪﺭ ﺍﳉﻬﺎﺯ ﺍﳌﺴﺘﺨﺪﻡ ﰲ‬
‫ﺍﳉﺮﳝﺔ ﻭﲢﺪﻳﺪ ﺍﻷﺟﻬﺰﺓ ﺍﻟﱵ ﺃﺻﺎ‪‬ﺎ ﺍﻟﻀﺮﺭ ﻣﻦ ﺍﻟﻔﻌﻞ ﺍﻷﺟﺮﺍﻣﻲ ﻭﲢﺪﻳﺪ ﻧﻮﻋﻴﺔ ﺍﻟﻨﺸﺎﻁ ﺍﻹﺟﺮﺍﻣﻲ ﻣﻦ‬
‫ﺧﻼﻝ ﺍﻟﻔﺘﺮﺓ ﺍﻟﺰﻣﻨﻴﺔ ﻹﻗﺘﺮﺍﻑ ﺍﳉﺮﳝﺔ)‪.(1‬‬
‫ﻭﻳﺘﻨﺎﺯﻉ ﺇﻣﻜﺎﻧﻴﺔ ﲢﺪﻳﺪ ﻣﺴﺎﺭ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻣﻦ ﻋﺪﻣﻪ ﺭﺃﻳﺎﻥ‪ ،‬ﺇﺫ ﻳﺬﻫﺐ ﺭﺃﻱ ﺇﱃ ﺃﻧﻪ ﻻ ﳝﻜﻦ‬
‫ﲢﺪﻳﺪ ﻣﺴﺎﺭ ﺇﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﻭﺗﻜﻤﻦ ﻭﺟﺎﻫﺔ ﻫﺬﺍ ﺍﻟﺮﺃﻱ ﰲ ﺃﻥ ﺷﺒﻜﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ ﺫﺍﺕ ﻃﺒﻴﻌﺔ ﻣﺮﻧﺔ‬
‫ﲝﻴﺚ ﺃﻧﻪ ﺣﱴ ﻭﺇﻥ ﺃﻣﻜﻦ ﻣﺴﺘﻘﺒﻼ ﲢﺪﻳﺪ ﻣﺴﺎﺭ ﺍﻷﻧﺘﺮﻧﺎﺕ‪ ،‬ﻓﺈﻥ ﻣﺎ ﻳﺘﻢ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ ﰲ ﻫﺬﺍ ﺍﻹﻃﺎﺭ‬
‫ﺇﳕﺎ ﻫﻮ ﺩﻟﻴﻞ ﺭﻗﻤﻲ ﳛﺘﺎﺝ ﺇﱃ ﺗﻜﻤﻠﺘﻪ ﺑﺄﺩﻟﺔ ﺇﺛﺒﺎﺕ ﺃﺧﺮﻯ‪ ،‬ﻓﻴﻤﺎ ﻟﻮ ﺇﻗﺘﺼﺮ ﺍﻷﻣﺮ ﻋﻠﻰ ﻫﺬﺍ ﺍﻟﺪﻟﻴﻞ ﻓﺈﻥ‬
‫ﺍﻷﻣﺮ ﻳﻈﻞ ﰲ ﺣﻮﻣﺔ ﺍﻟﺸﻚ)‪(2‬ﺫﻟﻚ ﺃﻥ ﻣﺎ ﻳﺘﻢ ﺍﻟﺘﻮﺻﻞ ﺇﻟﻴﻪ ﰲ ﺍﳊﻘﻴﻘﺔ ﻣﻦ ﺧﻼﻝ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺇﳕﺎ‬
‫ﻫﻮ ﻋﻨﻮﺍﻥ ﺭﻗﻤﻲ ﻓﻘﻂ )‪ (adresse TP‬ﻭﻫﺬﺍ ﻻ ﻳﻜﻔﻲ ﰲ ﻧﺴﺒﺔ ﺍﻟﻌﻤﻞ ﺍﻹﺟﺮﺍﻣﻲ ﺇﱃ ﺻﺎﺣﺐ‬
‫ﺍﳊﺎﺳﻮﺏ ﺃﻭ ﺍﻟﻌﻨﻮﺍﻥ ﺍﳌﺬﻛﻮﺭ‪ ،‬ﺇﺫ ﻣﻦ ﺍﳌﻤﻜﻦ ﺃﻻ ﻳﻜﻮﻥ ﻫﻮ ﻣﺮﺗﻜﺐ ﺍﳉﺮﳝﺔ ﻛﻤﺎ ﻟﻮ ﻛﺎﻥ ﺟﻬﺎﺯ‬
‫ﺍﳊﺎﺳﻮﺏ ﻣﺴﺮﻭﻗﺎ ﺃﻭ ﻳﻜﻮﻥ ﺃﺣﺪ ﻳﺴﺘﺨﺪﻣﻪ ﺇﺣﺘﻴﺎﻻ ﺃﻭ ﻳﺘﻢ ﺇﺳﺘﺨﺪﺍﻡ ﺟﻬﺎﺯ ﺍﳊﺎﺳﻮﺏ ﰲ ﻣﻘﻬﻰ‬
‫ﺍﻷﻧﺘﺮﻧﺎﺕ‪ ،‬ﻓﻤﺜﻞ ﻫﺬﻩ ﺍﻷﻣﻮﺭ ﲡﻌﻞ ﻣﻦ ﺍﻟﺼﻌﻮﺑﺔ ﲟﻜﺎﻥ ﺍﻹﻋﺘﻤﺎﺩ ﻋﻠﻰ ﻣﺴﺎﺭ ﺣﺮﻛﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ‬
‫ﻟﻠﺘﻮﺻﻞ ﺇﱃ ﲢﺪﻳﺪ ﺷﺨﺺ ﺍﳉﺎﱐ ﻭﺇﳕﺎ ﻗﺪ ﳛﺘﺎﺝ ﺍﻷﻣﺮ ﺇﱃ ﺩﻟﻴﻞ ﻣﺎﺩﻱ ﻣﻜﻤﻞ ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪ ،‬ﻭﳝﻜﻦ‬
‫ﺍﻟﺘﺄﻛﻴﺪ ﻋﻠﻰ ﺃﻧﻪ ﺣﱴ ﰲ ﺍﳊﺎﻻﺕ ﺍﻟﱵ ﲤﺖ ﻓﻴﻬﺎ ﺇﺩﺍﻧﺔ ﺃﺷﺨﺎﺹ ﺃﻣﺎﻡ ﺍﻟﻘﻀﺎﺀ ﺍﳌﻘﺎﺭﻥ ﻛﺎﻥ ﻫﻨﺎﻙ ﺩﺍﺋﻤﺎ‬
‫ﺩﻟﻴﻞ ﻣﺎﺩﻱ ﻳﺘﻢ ﺍﻹﺳﺘﻨﺎﺩ ﺇﻟﻴﻪ ﺇﱃ ﺟﻮﺍﺭ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪ .‬ﰲ ﺣﲔ ﻳﺬﻫﺐ ﺍﻟﺮﺃﻱ ﺍﻵﺧﺮ ﺇﱃ ﺍﻟﻘﻮﻝ‬
‫ﺑﺈﻣﻜﺎﻧﻴﺔ ﺗﺘﺒﻊ ﻣﺴﺎﺭ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻭﳝﻜﻦ ﻣﻦ ﺧﻼﻝ ﻫﺬﺍ ﺍﻟﺘﺘﺒﻊ ﺍﻟﺘﻮﺻﻞ ﺇﱃ ﲢﺪﻳﺪ ﻣﺴﺎﺭ ﺍﻟﻌﻤﻞ‬
‫ﺍﻹﺟﺮﺍﻣﻲ‪.‬‬
‫ﻭﲡﺪﺭ ﺍﻹﺷﺎﺭﺓ ﺇﱃ ﺃﻧﻪ ﰲ ﺇﻃﺎﺭ ﻓﺤﺺ ﻧﻈﺎﻡ ﺍﻹﺗﺼﺎﻝ ﺑﺎﻷﻧﺘﺮﻧﺎﺕ ﻛﻤﺼﺪﺭ ﳝﻜﻦ ﻣﻦ ﺧﻼﻟﻪ‬
‫ﺍﻟﺒﺤﺚ ﻋﻦ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪ ،‬ﻳﺘﻀﻤﻦ ﺃﻳﻀﺎ ﻟﺰﻭﻡ ﻓﺤﺺ ﺍﳋﺎﺩﻡ ﺃﻭ ﺍﳌﻠﻘﻢ "‪"serveur‬ﻭﻫﻮ ﺣﺎﺳﻮﺏ‬
‫ﺿﺨﻢ ﻣﻬﻤﺘﻪ ﲢﻘﻴﻖ ﺣﺮﻛﺔ ﺍﻹﺗﺼﺎﻝ ﺑﺎﳌﻮﺍﻗﻊ ﻭﺍﻟﺼﻔﺤﺎﺕ ﺍﻟﱵ ﺗﺘﻢ ﺇﺳﺘﻀﺎﻓﺘﻬﺎ ﻋﻠﻰ ﻫﻴﺌﺔ ﺭﻗﻤﻴﺔ ﻓﻴﻪ‪،‬‬
‫ﻟﺬﻟﻚ ﻓﺈﻧﻪ ﻳﻄﻠﻖ ﻋﻠﻰ ﺍﳋﺎﺩﻡ ‪lieu de stokage numerisees des donnees‬‬

‫)‪(1‬ﳑﺪﻭﺡ ﻋﺒﺪ ﺍﳊﻤﻴﺪ ﻋﺒﺪ ﺍﳌﻄﻠﺐ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.1‬‬


‫)‪(2‬ﺧﺎﻟﺪ ﳑﺪﻭﺡ ﺇﺑﺮﺍﻫﻴﻢ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ‪208-207‬‬

‫‪- 136 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪- 137 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺗﻌﺎﻭﻥ ﻣﺰﻭﺩﻱ ﺍﳋﺪﻣﺔ ﻣﻊ ﺟﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ‪:‬‬


‫ﳌﺎ ﻛﺎﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻗﺎﺑﻊ ﰲ ﺍﻟﺒﻴﺌﺔ ﺍﻟﺘﻘﻨﻴﺔ ﻭﻳﺘﺴﻢ ﲞﺼﺎﺋﺼﻬﺎ‪ ،‬ﻭﻫﻲ ﺧﺼﺎﺋﺺ ﺗﺒﲎ ﻋﻠﻰ‬
‫ﺃﺳﺎﺱ ﺍﻟﻄﺒﻴﻌﺔ ﺍﳌﺮﻧﺔ ﺍﻟﱵ ﻋﻠﻴﻬﺎ ﺍﻟﻌﺎﱂ ﺍﻹﻓﺘﺮﺍﺿﻲ‪ ،‬ﻓﺈﻥ ﻟﻠﻔﺎﻋﻞ ﺇﻣﻜﺎﻧﻴﺔ ﺇﺯﺍﻟﺔ ﺍﻟﺪﻟﻴﻞ ﻣﻦ ﻋﻠﻰ ﺑﻌﺪ‬
‫ﺑﺈﺳﺘﺨﺪﺍﻡ ﺍﻟﺘﻘﻨﻴﺔ ﺫﺍ‪‬ﺎ‪ .‬ﻣﻦ ﺃﺟﻞ ﺫﻟﻚ ﺇﺳﺘﻠﺰﻡ ﺍﻷﻣﺮ ﻭﺿﻊ ﺇﻃﺎﺭ ﻗﺎﻧﻮﱐ ﻭﻫﻮ ﻧﻈﺎﻡ ﺇﻟﺰﺍﻡ ﻣﺰﻭﺩﻱ‬
‫ﺍﳋﺪﻣﺔ)‪(1‬ﲝﻔﻆ ﺍﳌﻌﻄﻴﺎﺕ‪.‬‬
‫ﻭﻫﺬﺍ ﻣﺎ ﺗﻀﻤﻨﻪ ﻗﺮﺍﺭ ﺍﳉﻤﻌﻴﺔ ﺍﻟﻌﺎﻣﺔ ﻟﻸﻣﻢ ﺍﳌﺘﺤﺪﺓ ﺭﻗﻢ )‪ (63/55‬ﺍﳌﺆﺭﺥ ﰲ ‪2001 /01/22‬‬
‫ﻭﺍﳌﺘﻌﻠﻖ ﲟﻜﺎﻓﺤﺔ ﺇﺳﺎﺀﺓ ﺇﺳﺘﻌﻤﺎﻝ ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻷﻏﺮﺍﺽ ﺇﺟﺮﺍﻣﻴﺔ‪ ،‬ﻭﺫﻟﻚ ﰲ ﺍﻟﻔﻘﺮﺓ "ﻭ" ﻣﻦ‬
‫ﺍﳌﺎﺩﺓ ﺍﻷﻭﱃ ﻣﻨﻪ ﻭﺍﻟﱵ ﺃﻟﺰﻣﺖ ﺍﻟﺪﻭﻝ ﺃﻥ ﺗﺴﻤﺢ ﲝﻔﻆ ﺍﳌﻌﻄﻴﺎﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﻟﺘﺤﻘﻴﻘﺎﺕ‬
‫ﺍﳉﻨﺎﺋﻴﺔ ﺍﳋﺎﺻﺔ ﻭﺳﺮﻋﺔ ﺍﻟﻮﺻﻮﻝ ﺇﻟﻴﻬﺎ ﻭﻫﻮ ﻣﺎ ﺃﻛﺪﻩ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﲟﻮﺟﺐ ﺍﳌﺎﺩﺓ ‪ 10‬ﻣﻦ ﺍﻟﻔﺼﻞ‬
‫ﺍﻟﺮﺍﺑﻊ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﺍﳌﺘﻀﻤﻦ ﺍﻟﻘﻮﺍﻋﺪ ﺍﳋﺎﺻﺔ ﺑﺎﻟﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ‬
‫ﻭﺍﻹﺗﺼﺎﻝ ﻭﻣﻜﺎﻓﺤﺘﻬﺎ ﲢﺖ ﻋﻨﻮﺍﻥ "ﺇﻟﺘﺰﺍﻣﺎﺕ ﻣﻘﺪﻣﻲ ﺍﳋﺪﻣﺎﺕ‪".‬‬
‫ﺃﻭﻻ‪ :‬ﺍﳌﻘﺼﻮﺩ ﲟﺰﻭﺩﻱ ﺍﳋﺪﻣﺎﺕ‪ :‬ﺣﺴﺐ ﺍﳌﺎﺩﺓ ﺍﻷﻭﱃ ﻓﻘﺮﺓ"ﺝ" ﻣﻦ ﺇﺗﻔﺎﻗﻴﺔ ﺑﻮﺩﺍﺑﺴﺖ ﻓﺈﻥ‬
‫ﻣﺰﻭﺩ ﺍﳋﺪﻣﺔ ﻫﻮ ﻛﻞ ﻣﻦ ﻳﻘﻮﻡ ﲞﺪﻣﺎﺕ ﺍﻹﻳﺼﺎﻝ ﺃﻭ ﺧﺪﻣﺎﺕ ﻣﻌﺎﳉﺔ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺃﻭ ﺧﺪﻣﺎﺕ ﲣﺰﻳﻦ‬
‫ﺍﻟﺒﻴﺎﻧﺎﺕ‪ ،‬ﻭﻗﺪ ﻳﻜﻮﻥ ﺟﻬﺔ ﻋﺎﻣﺔ ﺃﻭ ﺟﻬﺔ ﺧﺎﺻﺔ ﻭﻗﺪ ﻳﻘﺪﻡ ﺧﺪﻣﺎﺗﻪ ﻟﻠﺠﻤﻬﻮﺭ ﺃﻭ ‪‬ﻤﻮﻋﺔ ﻣﻦ‬
‫ﺍﳌﺴﺘﺨﺪﻣﲔ ﺍﻟﺬﻳﻦ ﻳﺸﻜﻠﻮﻥ ﳎﻤﻮﻋﺔ ﻣﻐﻠﻘﺔ‪.‬‬
‫ﻭﻳﻌﺮﻑ ﻗﺎﻧﻮﻥ ﲪﺎﻳﺔ ﺍﳊﻴﺎﺓ ﺍﳋﺎﺻﺔ ﰲ ﳎﺎﻝ ﺍﻹﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﰲ ﺍﻟﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ‬
‫ﺍﻷﻣﺮﻳﻜﻴﺔ ﻧﻮﻋﲔ ﻣﻦ ﻣﺰﻭﺩﻱ ﺍﳋﺪﻣﺔ‪:‬‬
‫ﺍﻟﻨﻮﻉ ﺍﻷﻭﻝ‪ :‬ﻣﺰﻭﺩ ﺧﺪﻣﺔ ﺍﻹﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﻳﻘﺼﺪ ﺑﻪ ﻛﻞ ﻣﻦ ﻳﻘﺪﻡ ﺧﺪﻣﺔ ﺇﱃ‬
‫ﻣﺴﺘﺨﺪﻣﻲ ﺍﻟﺸﺒﻜﺔ ﻭﺍﻟﱵ ﺗﺘﻤﺜﻞ ﰲ ﺗﺴﻬﻴﻞ ﺇﺭﺳﺎﻝ ﻭﺇﺳﺘﻘﺒﺎﻝ ﺍﻹﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪.‬‬
‫ﻭﺍﻟﻨﻮﻉ ﺍﻟﺜﺎﱐ ﻭﻫﻮ ﻣﺰﻭﺩ ﺧﺪﻣﺔ ﺍﳊﻮﺳﺒﺔ ﻋﻦ ﺑﻌﺪ ﻭﻳﻘﺼﺪ ﺑﻪ ﻛﻞ ﻣﻦ ﻳﻘﺪﻡ ﻟﻠﺠﻤﻬﻮﺭ ﺧﺪﻣﺔ‬
‫ﻣﻌﺎﳉﺔ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻋﻦ ﺑﻌﺪ ﺑﻮﺳﻴﻠﺔ ﻣﻦ ﻭﺳﺎﺋﻞ ﺍﻹﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪.‬‬

‫)‪(1‬ﺃﻭﺭﺩ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﰲ ﺍﳌﺎﺩﺓ ‪ 10‬ﺃﻧﻪ ﰲ ﺇﻃﺎﺭ ﺗﻄﺒﻴﻖ ﺃﺣﻜﺎﻡ ﻫﺬﺍ ﺍﻟﻘﺎﻧﻮﻥ )‪ (04/09‬ﻳﺘﻌﲔ ﻋﻠﻰ ﻣﺰﻭﺩﻱ ﺍﳋﺪﻣﺔ ﺗﻘﺪﱘ ﺍﳌﺴﺎﻋﺪﺍﺕ ﻟﻠﺴﻠﻄﺎﺕ‬
‫ﺍﳌﻜﻠﻔﺔ ﺑﺎﻟﺘﺤﺮﻳﺎﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ‪ ...‬ﺑﻮﺿﻊ ﺍﳌﻌﻄﻴﺎﺕ ﺍﻟﱵ ﻳﺘﻌﲔ ﻋﻠﻴﻬﻢ ﺣﻔﻈﻬﺎ ﻭﻓﻘﺎ ﻷﺣﻜﺎﻡ ﺍﳌﺎﺩﺓ ‪ 11‬ﺃﺩﻧﺎﻩ ﲢﺖ ﺗﺼﺮﻑ ﻫﺬﻩ ﺍﻟﺴﻠﻄﺎﺕ‪.‬‬

‫‪- 138 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﻗﺪ ﻋﺮﻑ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻣﻮﺯﺩ ﺍﳋﺪﻣﺔ )ﻣﻘﺪﻡ ﺍﳋﺪﻣﺔ( ﲟﻮﺟﺐ ﺍﻟﻔﻘﺮﺓ ‪ 06‬ﻣﻦ ﺍﳌﺎﺩﺓ ﺍﻟﺜﺎﻧﻴﺔ‬
‫ﰲ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﺑﺄﻧﻪ‪:‬‬
‫‪/1‬ﻛﻞ ﻛﻴﺎﻥ ﻋﺎﻡ ﺃﻭ ﺧﺎﺹ ﻳﻘﺪﻡ ﳌﺴﺘﻌﻤﻠﻲ ﺧﺪﻣﺎﺗﻪ ﺿﻤﺎﻧﺔ ﺍﻟﻘﺪﺭﺓ ﻋﻠﻰ ﺍﻹﺗﺼﺎﻝ ﺑﻮﺍﺳﻄﺔ‬
‫ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﻭ‪/‬ﺃﻭ ﻧﻈﺎﻡ ﻟﻺﺗﺼﺎﻻﺕ‪.‬‬
‫‪ /2‬ﺃﻱ ﻛﻴﺎﻥ ﺁﺧﺮ ﻳﻘﻮﻡ ﲟﻌﺎﳉﺔ ﺃﻭ ﲣﺰﻳﻦ ﻣﻌﻄﻴﺎﺕ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﻟﻔﺎﺋﺪﺓ ﺧﺪﻣﺔ ﺍﻹﺗﺼﺎﻝ ﺍﳌﺬﻛﻮﺭﺓ‬
‫ﺃﻭ ﳌﺴﺘﻌﻤﻠﻴﻬﺎ‪.‬‬
‫ﻭﻋﻠﻰ ﻫﺪﻱ ﺫﻟﻚ ﻓﺈﻥ ﺍﳌﺮﺍﺳﻠﺔ ﺑﺎﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻭﺍﻟﱵ ﻳﺘﻢ ﺇﺳﺘﻘﺒﺎﳍﺎ ﺑﻮﺍﺳﻄﺔ ﻣﺰﻭﺩ ﺍﳋﺪﻣﺔ‬
‫ﺍﳋﺎﺹ ﺑﺎﳌﺮﺳﻞ ﺇﻟﻴﻪ ﻭﺍﻟﱵ ﱂ ﻳﻄﻠﻊ ﻋﻠﻴﻬﺎ ﺑﻌﺪ‪،‬ﻓﺈ‪‬ﺎ ﺗﺴﺘﻘﺮ ﰲ ﺣﺎﻟﺔ ﲣﺰﻳﻦ ﺇﻟﻜﺘﺮﻭﱐ ﻭﺗﻜﻮﻥ ﰲ ﻫﺬﻩ‬
‫ﺍﳌﺮﺣﻠﺔ ﺍﻟﻨﺴﺨﺔ ﻣﻦ ﺍﻹﺗﺼﺎﻝ ﺍﳌﺨﺰﻧﺔ ﺗﺘﻮﺍﺟﺪ ﻓﻘﻂ ﻛﺈﺟﺮﺍﺀ ﺃﻭ ﻭﺳﻴﻂ ﻣﺆﻗﺖ ﰲ ﺇﻧﺘﻈﺎﺭ ﺇﺳﺘﻘﺒﺎﻝ‬
‫ﺍﳌﺮﺳﻞ ﺇﻟﻴﻪ ﳍﺎ ﻣﻦ ﻣﺰﻭﺩﺍﳋﺪﻣﺔ‪ ،‬ﻭﲟﺠﺮﺩ ﺇﺳﺘﻼﻡ ﺍﳌﺮﺳﻞ ﺇﻟﻴﻪ ﺍﳌﺮﺍﺳﻠﺔ ﺑﺎﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻓﺈﻥ ﺍﻹﺗﺼﺎﻝ‬
‫ﻳﻜﻮﻥ ﻗﺪ ﻭﺻﻞ ﺇﱃ ﻭﺟﻬﺘﻪ ﺍﻷﺧﲑﺓ‪ ،‬ﻭﻫﻨﺎ ﻳﻜﻮﻥ ﻣﻮﻗﻒ ﻣﺰﻭﺩ ﺍﳋﺪﻣﺔ ﻳﺘﺮﺍﻭﺡ ﺑﲔ ﺃﻣﺮﻳﻦ‪ :‬ﺇﻣﺎ ﺃﻥ‬
‫) ‪(1‬‬
‫ﻳﻘﻮﻡ ﲟﺴﺢ ﺗﻠﻚ ﺍﻟﺮﺳﺎﻟﺔ ﺃﻭ ﻳﻘﻮﻡ ﺑﺎﻹﺣﺘﻔﺎﻅ ‪‬ﺎ‪.‬‬
‫ﺛﺎﻧﻴﺎ ﺇﻟﺘﺰﺍﻣﺎﺕ ﻣﻘﺪﻣﻲ ﺍﳋﺪﻣﺔ‪ :‬ﺃﻟﺰﻡ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻣﻘﺪﻣﻲ ﺍﳋﺪﻣﺎﺕ ﲝﻔﻆ‬
‫ﺍﳌﻌﻄﻴﺎﺕ‪(2)،‬ﻭﺫﻟﻚ ﺑﺘﺠﻤﻴﻊ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺣﻔﻈﻬﺎ ﻭﺣﻴﺎﺯ‪‬ﺎ ﰲ ﺃﺭﺷﻴﻒ ﻭﻭﺿﻌﻬﺎ ﰲ ﺗﺮﺗﻴﺐ‬
‫ﻣﻌﲔ ﰲ ﺇﻧﺘﻈﺎﺭ ﺇﲣﺎﺫ ﺇﺟﺮﺍﺀﺍﺕ ﻗﺎﻧﻮﻧﻴﺔ ﳏﺘﻤﻠﺔ ﺃﺧﺮﻯ ﻛﺎﻟﺘﻔﺘﻴﺶ ﻭﻏﲑﻩ‪.‬‬
‫ﻭﻣﺎ ﲡﺪﺭ ﺍﻹﺷﺎﺭﺓ ﺇﻟﻴﻪ ﰲ ﻫﺬﺍ ﺍﻹﻃﺎﺭ ﺃﻧﻪ ﻟﻴﺲ ﺃﻱ ﻣﻌﻄﻴﺎﺕ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﳏﻞ ﺇﻋﺘﺒﺎﺭ ﻣﻦ ﺍﳌﺸﺮﻉ‪،‬‬
‫ﺑﻞ ﺣﺼﺮ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﻮﺍﺟﺐ ﺣﻔﻈﻬﺎ ﻣﻦ ﻃﺮﻑ ﻣﺰﻭﺩﻱ ﺍﳋﺪﻣﺔ ﰲ‬
‫ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﲝﺮﻛﺔ ﺍﻟﺴﲑ )ﻣﻌﻄﻴﺎﺕ ﺍﳌﺮﻭﺭ(‪ ،‬ﻭﻫﻲ ﻛﻤﺎ ﻋﺮﻓﻬﺎ ﰲ ﺍﳌﺎﺩﺓ ﺍﻟﺜﺎﻧﻴﺔ ﻣﻦ‬
‫ﺍﻟﻘﺎﻧﻮﻥ‪ 04/09‬ﺗﻠﻚ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﻹﺗﺼﺎﻝ ﻋﻦ ﻃﺮﻳﻖ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﻨﺘﺠﻬﺎ ﻫﺬﻩ ﺍﻷﺧﲑﺓ‬

‫)‪(1‬ﲡﺪﺭ ﺍﻹﺷﺎﺭﺓ ﺇﱃ ﺃﻧﻪ ﻣﻦ ﺍﻷﳘﻴﺔ ﲟﻜﺎﻥ ﺍﻟﺘﻔﺮﻗﺔ ﺑﲔ ﻣﺼﻄﻠﺤﻲ ﺍﻟﺘﺤﻔﻆ ﻋﻠﻰ ﺍﳌﻌﻄﻴﺎﺕ ‪ la conservation des donneés‬ﻭﺍﻹﺣﺘﻔﺎﻅ ﺃﻭ‬
‫ﺃﺭﺷﻔﺔ ﺍﳌﻌﻄﻴﺎﺕ ‪ l’ archivge des données‬ﻓﺮﻏﻢ ﺃﻥ ﻟﻠﻜﻠﻤﺘﲔ ﻣﻌﻨﻴﲔ ﻣﺘﺠﺎﻭﺭﻳﻦ ﰲ ﺍﻟﻠﻐﺔ ﺍﻟﺸﺎﺋﻌﺔ ﻟﻜﻦ ﳍﻤﺎ ﻣﻌﲎ ﳐﺘﻠﻒ ﰲ ﺍﻟﻠﻐﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﺇﺫ ﺃﻥ ﻋﺒﺎﺭﺓ ﻳﺘﺤﻔﻆ ﻋﻠﻰ ﺍﳌﻌﻄﻴﺎﺕ ﺗﻌﲏ ﺣﻔﻆ ﻣﻌﻄﻴﺎﺕ ﺳﺒﻖ ﻭﺟﻮﺩﻫﺎ ﰲ ﺷﻜﻞ ﳐﺰﻥ ﻭﲪﺎﻳﺘﻬﺎ ﻣﻦ ﻛﻞ ﺷﻲﺀ ﳝﻜﻦ ﺃﻥ ﻳﺆﺩﻱ ﺇﱃ ﺇﺗﻼﻓﻬﺎ ﺃﻭ ﲡﺮﻳﺪﻫﺎ‬
‫ﻣﻦ ﺻﻘﺘﻬﺎ ﺃﻭ ﺣﺎﻟﺘﻬﺎ ﺍﻟﺮﺍﻫﻨﺔ‪ ،‬ﰲ ﺣﲔ ﺃﻥ ﻋﺒﺎﺭﺓ ﺍﻹﺣﺘﻔﺎﻅ ﺑﺎﳌﻌﻄﻴﺎﺕ ﺗﻌﲏ ﺣﻔﻆ ﺍﳌﻌﻄﻴﺎﺕ ﻟﺪﻯ ﺣﺎﺋﺰﻫﺎ ﺑﺎﻟﻨﺴﺒﺔ ﳌﺴﺘﻘﺒﻞ ﺍﳌﻌﻄﻴﺎﺕ ﺍﻟﱵ ﰲ ﻃﻮﺭ ﺍﻹﻧﺘﺎﺝ‬
‫ﻭﺍﻟﺘﻮﺍﻟﺪ ﻭﻣﻌﲎ ﺫﻟﻚ ﺃﻥ ﺃﺭﺷﻔﺔ ﺍﳌﻌﻄﻴﺎﺕ ﻋﺒﺎﺭﺓ ﻋﻦ ﻋﻤﻠﻴﺔ ﲣﺰﻳﻦ ﻟﻠﻤﻌﻄﻴﺎﺕ ﻋﻠﻰ ﻋﻜﺲ ﺍﻟﺘﺤﻔﻆ ﻋﻠﻴﻬﺎ ﺍﻟﺬﻱ ﻳﻌﲏ ﺍﻟﻨﺸﺎﻁ ﺍﻟﺬﻱ ﻳﻀﻤﻦ ﻟﻠﻤﻌﻄﻴﺎﺕ‬
‫ﺳﻼﻣﺘﻬﺎ ﻭﺳﺮﻳﺘﻬﺎ‪.‬‬
‫)‪(2‬ﺁﺛﺮ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﺇﺳﺘﻌﻤﺎﻝ ﻋﺒﺎﺭﺓ ﺣﻔﻆ ﺍﳌﻌﻄﻴﺎﺕ ﰲ ﺍﳌﺎﺩﺓ ‪ 11‬ﺑﺪﻝ ﺍﻟﺘﺤﻔﻆ ﻋﻠﻰ ﺍﳌﻌﻄﻴﺎﺕ ﻭﺫﻟﻚ ﻋﻜﺲ ﻣﺎ ﻓﻌﻠﺖ ﺇﺗﻔﺎﻗﻴﺔ ﺑﻮﺩﺍﺑﺴﺖ ﰲ ﺍﳌﺎﺩﺓ‬
‫‪ 16‬ﻣﻨﻬﺎ ﻭﻫﻮ ﺑﺬﻟﻚ ﺇﻣﺎ ﺃﻧﻪ ﻻﻳﻔﺮﻕ ﺑﲔ ﺍﳌﺼﻄﻠﺤﲔ ﺃﻭ ﺃﻧﻪ ﻻ ﻳﻘﻴﻢ ﺃﳘﻴﺔ ﳌﺴﺄﻟﺔ ﺿﻤﺎﻥ ﺃﻣﻦ ﺍﳌﻌﻄﻴﺎﺕ ﻣﻦ ﺧﻄﺮ ﺍﻟﺘﻐﲑ ﺃﻭ ﺍﻟﺘﺠﺮﻳﺪ ﻣﻦ ﺻﻔﻘﻬﺎ ﺃﻭ‬
‫ﺣﺎﻟﺘﻬﺎ ﺍﻟﺮﺍﻫﻨﺔ‪.‬‬

‫‪- 139 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺑﺈﻋﺘﺒﺎﺭﻫﺎ ﺟﺰﺀﺍ ﰲ ﺣﻠﻘﺔ ﺍﻹﺗﺼﺎﻻﺕ‪ ،‬ﺗﻮﺿﺢ ﻣﺼﺪﺭ ﺍﻹﺗﺼﺎﻝ‪،‬ﺍﻟﻮﺟﻬﻪ ﺍﳌﺮﺳﻞ ﺇﻟﻴﻬﺎ ﻭﺍﻟﻄﺮﻳﻖ ﺍﻟﺬﻱ‬
‫ﻳﺴﻠﻜﻪ ﻭﻭﻗﺖ ﻭﺗﺎﺭﻳﺦ ﻭﺣﺠﻢ ﻭﻣﺪﺓ ﺍﻹﺗﺼﺎﻝ‪ ،‬ﻭﻧﻮﻉ ﺍﳋﺪﻣﺔ ‪.‬ﻭﻗﺪ ﺣﺼﺮ ﺍﳌﺸﺮﻉ ﻣﻌﻄﻴﺎﺕ ﺍﳌﺮﻭﺭ‬
‫ﺍﻟﱵ ﺃﻟﺰﻡ ﰲ ﺍﳌﺎﺩﺓ ‪11‬ﻣﺰﻭﺩﻱ ﺍﳋﺪﻣﺔ ﲝﻔﻈﻬﺎ ﰲ‪:‬‬
‫‪ -1‬ﺍﳌﻌﻄﻴﺎﺕ ﺍﻟﱵ ﺗﺴﻤﺢ ﺑﺎﻟﺘﻌﺮﻑ ﻋﻠﻰ ﻣﺴﺘﻌﻤﻠﻲ ﺍﳋﺪﻣﺔ‪.‬‬
‫‪ -2‬ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﻟﺘﺠﻬﻴﺰﺍﺕ ﺍﻟﻄﺮﻓﻴﺔ ﺍﳌﺴﺘﻌﻤﻠﺔ ﻟﻺﺗﺼﺎﻝ‪.‬‬
‫‪ -3‬ﺍﳋﺼﺎﺋﺺ ﺍﻟﺘﻘﻨﻴﺔ ﻭﻛﺬﺍ ﺗﺎﺭﻳﺦ ﻭﻭﻗﺖ ﻭﻣﺪﺓ ﻛﻞ ﺇﺗﺼﺎﻝ‪.‬‬
‫‪ -4‬ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﳋﺪﻣﺎﺕ ﺍﻟﺘﻜﻤﻴﻠﻴﺔ ﺍﳌﻄﻠﻮﺑﺔ ﺃﻭ ﺍﳌﺴﺘﻌﻤﻠﺔ ﻭﻣﻘﺪﻣﻴﻬﺎ‪.‬‬
‫‪ -5‬ﺍﳌﻌﻄﻴﺎﺕ ﺍﻟﱵ ﺗﺴﻤﺢ ﺑﺎﻟﺘﻌﺮﻑ ﻋﻠﻰ ﺍﳌﺮﺳﻞ ﺇﻟﻴﻪ ﺍﻹﺗﺼﺎﻝ ﻭﻛﺬﺍ ﻋﻨﺎﻭﻳﻦ ﺍﳌﻮﺍﻗﻊ ﺍﳌﻄﻠﻊ‬
‫ﻋﻠﻴﻬﺎ‪.‬‬
‫ﻭﻗﺪ ﻋﺮﻓﺖ ﺇﺗﻔﺎﻗﻴﺔ ﺑﻮﺩﺍﺳﺒﺖ ﰲ ﻣﺎﺩ‪‬ﺎ ﺍﻷﻭﱃ ﺍﻟﻔﻘﺮﺓ ّﺩ"ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳌﻌﻄﻴﺎﺕ ﺑﺄ‪‬ﺎ ﺻﻨﻒ‬
‫ﻣﻦ ﺑﻴﺎﻧﺎﺕ ﺍﳊﺎﺳﻮﺏ ﺍﻟﱵ ﺗﺸﻜﻞ ﳏﻼ ﻟﻨﻈﺎﻡ ﻗﺎﻧﻮﱐ ﳏﺪﺩ‪ ،‬ﺣﻴﺚ ﻳﺘﻢ ﺗﻮﺍﻟﺪ ﻫﺬﻩ ﺍﳌﻌﻄﻴﺎﺕ ﻣﻦ‬
‫ﺍﳊﻮﺍﺳﻴﺐ ﻋﱪ ﺗﺴﻠﺴﻞ ﺣﺮﻛﺔ ﺍﻹﺗﺼﺎﻻﺕ ﻟﺘﺤﺪﻳﺪ ﺳﻠﻚ ﺍﻹﺗﺼﺎﻻﺕ ﻣﻦ ﻣﺼﺪﺭﻫﺎ ﺇﱃ ﺍﳉﻬﺔ‬
‫ﺍﳌﻘﺼﻮﺩﺓ‪ ،‬ﻭﻫﻲ ﺑﺬﻟﻚ ﺗﺸﻤﻞ ﻃﺎﺋﻔﺔ ﻣﻦ ﺍﳌﻌﻄﻴﺎﺕ ﺗﺘﻤﺜﻞ ﰲ ﻣﺼﺪﺭ ﺍﻹﺗﺼﺎﻝ‪ ،‬ﻭﻭﺟﻬﺘﻪ ﺍﳌﻘﺼﻮﺩﺓ‬
‫ﺧﻂ ﺍﻟﺴﲑ‪ ،‬ﻭﻗﺖ ﺃﻭ ﺯﻣﻦ ﺍﻹﺗﺼﺎﻝ‪ ،‬ﺣﺠﻢ ﺍﻹﺗﺼﺎﻝ‪ ،‬ﻭﻣﺪﺗﻪ ﻭﻧﻮﻉ ﺍﳋﺪﻣﺔ ﺍﳌﺆﺩﺍﺓ‪ .‬ﻭﲟﺎ ﺃﻥ ﺣﻔﻆ‬
‫ﺍﳌﻌﻄﻴﺎﺕ ﺇﺟﺮﺍﺀ ﻭﻗﱵ ﻭ ﺇﺣﺘﺮﺍﻣﺎ ﻟﻠﺤﻖ ﰲ ﺍﳋﺼﻮﺻﻴﺔ ﻓﺎﻥ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻭﺿﻊ ﺇﻟﺘﺰﺍﻣﺎ ﻋﻠﻰ‬
‫ﻣﺰﻭﺩﻱ ﺍﳋﺪﻣﺎﺕ ﺑﺈﺯﺍﻟﺔ ﺍﳌﻌﻄﻴﺎﺕ ﺍﻟﱵ ﻳﻘﻮﻣﻮﻥ ﺑﺘﺨﺰﻳﻨﻬﺎ ﺑﻌﺪ ﺳﻨﺔ ﻣﻦ ﺗﺎﺭﻳﺦ ﺍﻟﺘﺴﺠﻴﻞ‪(1)،‬ﻭﻋﻠﻰ ﻏﺮﺍﺭ‬
‫ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﳒﺪ ﺍﳌﺸﺮﻉ ﺍﻟﻔﺮﻧﺴﻲ ﺣﺮﺹ ﺑﺪﻭﺭﻩ ﰲ ﻧﻄﺎﻕ ﺍﻟﺘﺨﺰﻳﻦ ﺍﻟﺘﻠﻘﺎﺋﻲ ﻟﻠﻤﻌﻄﻴﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ‬
‫ﺑﺎﻹﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﺫﻟﻚ ﲟﻮﺟﺐ ﺍﳌﺎﺩﺓ ‪ 32‬ﻗﺎﻧﻮﻥ ﺍﻟﱪﻳﺪ ﻭﺍﻹﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺍﳌﻀﺎﻓﺔ‬
‫ﲟﻮﺟﺐ ﺍﳌﺎﺩﺓ ‪ 29‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ﺭﻗﻢ ‪ 1062/2001‬ﻭﺍﳌﻌﺪﻟﺔ ﺑﺎﳌﺎﺩﺓ ‪ 20‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪ 239/2003‬ﺍﳌﺆﺭﺥ‬
‫ﰲ ‪ 2003/03/18‬ﺍﳌﺘﻌﻠﻖ ﺑﺎﻷﻣﻦ ﺍﻟﺪﺍﺧﻠﻲ ﻋﻠﻰ ﺿﺮﻭﺭﺓ ﻣﺴﺢ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﺨﺰﻧﺔ ﺑﻌﺪ ﺍﻹﺣﺘﻔﺎﻅ ‪‬ﺎ ﳌﺪﺓ‬
‫ﺃﻗﺼﺎﻫﺎ ﺳﻨﺔ ﺇﺫﺍ ﺩﻋﺖ ﻣﻘﺘﻀﻴﺎﺕ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﻘﻴﻖ ﻭﺍﳌﺘﺎﺑﻌﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺫﻟﻚ‪.‬‬

‫)‪(1‬ﺍﳌﺎﺩﺓ ‪ 11‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪...."04/09‬ﲢﺪﺩ ﻣﺪﺓ ﺣﻔﻆ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﺬﻛﻮﺭﺓ ﰲ ﻫﺬﻩ ﺍﳌﺎﺩﺓ ﺑﺴﻨﺔ ﻭﺍﺣﺪﺓ ﺇﺑﺘﺪﺍﺀ ﻣﻦ ﺗﺎﺭﻳﺦ ﺍﻟﺘﺴﺠﻴﻞ‪.".....‬‬

‫‪- 140 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﻗﺪ ﺭﺗﺐ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻣﺴﺆﻭﻟﻴﺔ ﺇﺩﺍﺭﻳﺔ ﻭﺃﺧﺮﻯ ﺟﺰﺍﺋﻴﺔ ﻋﻠﻰ ﺗﻘﺎﻋﺲ ﻣﺰﻭﺩﻱ ﺍﳋﺪﻣﺔ ﻋﻦ‬
‫ﺣﻔﻆ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﺬﻛﻮﺭﺓ‪(1)،‬ﻹﻣﻜﺎﻧﻴﺔ ﺃﻥ ﻳﺸﻜﻞ ﻫﺬﺍ ﺍﻟﺘﻘﺼﲑ ﻋﺮﻗﻠﺔ ﻟﻠﺴﲑ ﺍﻟﻌﺎﺩﻱ ﻟﻠﺘﺤﺮﻳﺎﺕ‬
‫ﺍﻟﻘﻀﺎﺋﻴﺔ‪.‬‬
‫ﻭﺇﺳﺘﺮﺷﺎﺩﺍ ﲟﺎ ﺫﻛﺮ ﻓﺈﻥ ﻣﺰﻭﺩﻱ ﳋﺪﻣﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻳﻌﺘﱪﻭﻥ ﻣﺼﺪﺭﺍ ﳉﻬﺎﺕ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﻘﻴﻖ‬
‫ﻟﻠﺤﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻣﻦ ﺧﻼﻝ ﺍﳌﻌﻄﻴﺎﺕ ﺍﻟﱵ ﻳﻜﻮﻧﻮﻥ ﻣﻠﺰﻣﲔ ﲝﻔﻈﻬﺎ ﻭﻣﻠﺰﻣﲔ ﰲ ﻧﻔﺲ‬
‫ﺍﻟﻮﻗﺖ ﺑﻮﺿﻌﻬﺎ ﲢﺖ ﺗﺼﺮﻑ ﻫﺬﻩ ﺍﳉﻬﺎﺕ ﺇﺫﺍ ﻣﺎ ﰎ ﻃﻠﺒﻬﺎ‪.‬‬

‫)‪(1‬ﺍﳌﺎﺩﺓ ‪ 11‬ﺍﻟﻔﻘﺮﺓ ﺍﻷﺧﲑﺓ"‪ .....‬ﻳﻌﺎﻗﺐ ﺍﻟﺸﺨﺺ ﺍﻟﻄﺒﻌﻲ ﺑﺎﳊﺒﺲ ﻣﻦ ‪ 06‬ﺃﺷﻬﺮ ﺇﱃ ‪ 05‬ﺳﻨﻮﺍﺕ ﻭﺑﻐﺮﺍﻣﺔ ﻣﻦ ‪ 50.000‬ﺩﺝ ﻭﻳﻌﺎﻗﺐ ﺍﻟﺸﺨﺺ‬
‫ﺍﳌﻌﻨﻮﻱ ﻭﻓﻘﺎ ﻟﻠﻘﻮﺍﻋﺪ ﺍﳌﻘﺮﺭﺓ ﰲ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ"‪.‬‬

‫‪- 141 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﳌﺒﺤﺚ ﺍﻟﺜﺎﱐ‪:‬‬
‫ﺍﻟﻘﻮﺍﻋﺪ ﺍﻹﺟﺮﺍﺋﻴﺔﰲ ﺇﺳﺘﺨﻼﺹ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‬
‫ﻻﺷﻚ ﺃﻥ ﺍﻟﺘﻄﻮﺭ ﺍﳊﺎﺻﻞ ﰲ ﳎﺎﻝ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻗﺪ ﺭﺗﺐ ﺁﺛﺎﺭﺍ ﻫﺎﻣﺔ ﺇﻧﻌﻜﺴﺖ ﻋﻠﻰ ﺍﳉﺮﺍﺋﻢ ﻣﻦ‬
‫ﺣﻴﺚ ﺍﻟﻮﺳﺎﺋﻞ ﺍﻟﱵ ﺗﺮﺗﻜﺐ ‪‬ﺎ‪ ،‬ﻭﺍﶈﻞ ﺍﻟﺬﻱ ﺗﻘﻊ ﻋﻠﻴﻪ‪ ،‬ﻭﻧﻮﻉ ﺍﳉﻨﺎﺓ ﺍﻟﺬﻳﻦ ﻳﺮﺗﻜﺒﻮ‪‬ﺎ‪ .‬ﻭﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ‬
‫ﺃﻱ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﲡﻤﻊ ﺑﲔ ﺫﻛﺎﺀ ﺍ‪‬ﺮﻡ )ﺍﻟﺬﻛﺎﺀ ﺍﻹﻧﺴﺎﱐ( ﻭﺫﻛﺎﺀ ﺍﻷﺟﻬﺰﺓ ﺍﻟﺮﻗﻤﻴﺔ )ﺍﻟﺬﻛﺎﺀ‬
‫ﺍﻹﺻﻄﻨﺎﻋﻲ(‪ ،‬ﻟﺬﻟﻚ ﻓﺈﻥ ﻫﺬﺍ ﺍﻟﺘﻄﻮﺭ ﺍﻟﺘﻜﻨﻮﻟﻮﺟﻲ ﳚﺐ ﺃﻥ ﻳﻮﺍﻛﺒﻪ ﺗﻄﻮﻳﺮ ﻟﻘﻮﺍﻧﲔ ﺍﻟﻌﻘﻮﺑﺎﺕ ﻭ ﻗﻮﺍﻧﲔ‬
‫ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﻣﻦ ﺃﺟﻞ ﺇﺳﺘﻌﺎﺏ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺴﺘﺤﺪﺛﺔ ﺍﻟﱵ ﺗﺮﺗﻜﺐ ﻋﱪ ﺍﻟﻮﺳﺎﺋﻂ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﻛﻤﺎ‬
‫ﳚﺐ ﺍﻟﻌﻤﻞ ﻋﻠﻰ ﺗﻄﻮﻳﺮ ﻭﺳﺎﺋﻞ ﺍﻹﺛﺒﺎﺕ ﺍﳉﺰﺍﺋﻴﺔ ﲟﺎ ﻳﺘﻮﺍﻓﻖ ﻭﺍﳊﻘﺎﺋﻖ ﺍﻟﻌﻠﻤﻴﺔ‪ ،‬ﻓﺎﻟﻘﺎﻧﻮﻥ ﳚﺐ ﺃﻥ ﻻ‬
‫) ‪(1‬‬
‫ﻳﻨﻔﺼﻞ ﻋﻦ ﺍﻟﻮﺍﻗﻊ ﺍﻟﺬﻱ ﺃﻧﺘﺠﻪ‪.‬‬
‫ﻭﺍﳊﺎﺻﻞ ﺃﻧﻪ ﻣﻊ ﻇﻬﻮﺭ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﱵ ﲤﺜﻞ ﺿﺮﺑﺎ ﻣﻦ ﻇﺮﻭﺏ ﺍﻟﺬﻛﺎﺀ ﺍﻹﺟﺮﺍﻣﻲ‪ ،‬ﻭﺍﻟﱵ‬
‫ﺑﺎﺗﺖ ﺗﺘﺨﺬ ﺃﳕﺎﻃﺎ ﺟﺪﻳﺪﺓ ﺃﺻﺒﺢ ﻻ ﳚﺪﻱ ﻣﻌﻬﺎ ﺇﺗﺒﺎﻉ ﺍﻟﻄﺮﻕ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﰲ ﲢﺼﻴﻞ ﺍﻟﺪﻟﻴﻞ ﻹﺛﺒﺎ‪‬ﺎ ﳌﺎ‬
‫ﺗﺜﲑﻩ ﻃﺒﻴﻌﺘﻬﺎ ﻏﲑ ﺍﳌﺎﺩﻳﺔ ﻣﻦ ﺇﺷﻜﺎﻻﺕ‪ ،‬ﻭﻣﺎ ﺗﺆﺩﻳﻪ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳊﺪﻳﺜﺔ ﻣﻦ ﺩﻭﺭ ﰲ ﺇﺭﺗﻜﺎ‪‬ﺎ‪ ،‬ﻓﺈﺛﺒﺎﺕ‬
‫ﺍﳉﺮﺍﺋﻢ ﺍﳌﺎﺩﻳﺔ ﺍﻟﱵ ﺗﺘﺮﻙ ﺁﺛﺎﺭﺍ ﻣﻠﺤﻮﻇﺔ ﺃﻣﺮ ﺳﻬﻞ ﻭﻣﻴﺴﻮﺭ‪،‬ﺑﻌﻜﺲ ﺇﺛﺒﺎﺕ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺫﺍﺕ‬
‫ﺍﻟﻄﺒﻴﻌﺔ ﺍﳌﻌﻨﻮﻳﺔﺑﺎﻟﻨﻈﺮ ﺇﱃ ﺃ‪‬ﺎ ﻻ ﺗﺘﺮﻙ ﺁﺛﺎﺭ ﺗﺪﻝ ﻋﻠﻴﻬﺎ‪ ،‬ﻋﻠﻰ ﺃﺳﺎﺱ ﺃﻥ ﺃﻏﻠﺐ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﺍﳌﻌﻄﻴﺎﺕ ﺍﻟﱵ‬
‫ﺗﺘﺪﺍﻭﻝ ﻋﱪ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ ﺍﻟﱵ ﻣﻦ ﺧﻼﳍﺎ ﺗﺘﻢ ﺍﻟﻌﻤﻠﻴﺎﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺗﻜﻮﻥ ﰲ ﻫﻴﺌﺔ ﺭﻣﻮﺯ ﻭﻧﺒﻀﺎﺕ‬
‫ﳐﺰﻧﺔ ﻋﻠﻰ ﻭﺳﺎﺋﻂ ﲣﺰﻳﻦ ﳑﻐﻨﻄﺔ ﻻ ﳝﻜﻦ ﻟﻺﻧﺴﺎﻥ ﻗﺮﺍﺀ‪‬ﺎ ﺃﻭ ﺇﺩﺭﺍﻛﻬﺎ ﺇﻻ ﻣﻦ ﺧﻼﻝ ﻫﺬﻩ ﺍﳊﻮﺍﺳﺐ‬
‫ﺍﻟﱵ ﲢﻔﻈﻬﺎ‪.‬‬
‫ﻓﺎﻟﺘﻄﻮﺭ ﺍﻟﺘﻘﲏ ﺍﻟﺬﻱ ﳊﻖ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻓﻀﻼ ﻋﻦ ﺍﻟﻄﺒﻴﻌﺔ ﺍﳋﺎﺻﺔ ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺳﻴﺆﺩﻱ‬
‫ﺣﺘﻤﺎ ﻭﺩﻭﻥ ﺃﻱ ﺷﻚ ﺇﱃ ﺗﻐﻴﲑ ﻛﺜﲑﹴ ﻣﻦ ﺍﳌﻔﺎﻫﻴﻢ ﺍﻟﺴﺎﺋﺪﺓ ﺣﻮﻝ ﺇﺟﺮﺍﺀﺍﺕ ﻭﻃﺮﻕ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻬﺎ‪،‬‬
‫ﻭﻫﻮ ﺍﻷﻣﺮ ﺍﻟﺬﻱ ﳛﺘﺎﺝ ﺑﺎﻟﻀﺮﻭﺭﺓ ﺇﱃ ﺇﻋﺎﺩﺓ ﺗﻘﻴﻴﻢ ﳌﻨﻬﺞ ﺑﻌﺾ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﰲ ﻗﺎﻧﻮﻥ‬
‫ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‪ ،‬ﻓﻀﻼ ﻋﻦ ﺇﺳﺘﺤﺪﺍﺙ ﻗﻮﺍﻋﺪ ﺇﺟﺮﺍﺋﻴﺔ ﺃﺧﺮﻯ ﺗﺘﻼﺀﻡ ﻣﻊ ﻃﺒﻴﻌﺔ ﺍﻟﺒﻴﺌﺔ ﺍﻟﺘﻘﻨﻴﺔ‪.‬‬
‫ﻓﺘﻄﻮﻳﺮ ﺍﻹﺛﺒﺎﺕ ﻭﻭﺳﺎﺋﻠﻪ ﺃﻣﺮ ﰲ ﻏﺎﻳﺔ ﺍﻷﳘﻴﺔ ﳌﻮﺍﺟﻬﺔ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﺍﳉﺪﻳﺪ ﻣﻦ ﺍﻹﺟﺮﺍﻡ‪،‬ﻭﻫﻮ ﺍﻷﻣﺮ‬
‫ﺍﻟﺬﻱ ﺳﻮﻑ ﻧﻌﺎﳉﺔ ﻣﻦ ﺣﻴﺚ ﲝﺚ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﺇﱃ ﺃﻱ ﻣﺪﻯ ﳝﻜﻦ ﺍﻹﺳﺘﻨﺎﺩ ﺇﻟﻴﻬﺎ ﰲ‬

‫)‪(1‬ﻋﺎﺩﻝ ﻋﺰﺍﻡ ﺳﻘﻒ ﺍﳊﻴﻂ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ ﺹ‪،221 :‬‬

‫‪- 142 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪ ،‬ﰒ ﻧﻌﺮﺝ ﺇﱃ ﺗﺪﻋﻴﻢ ﺍﳌﺸﺮﻉ ﺟﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﺑﻮﺳﺎﺋﻞ ﺇﺟﺮﺍﺋﻴﺔ‬
‫ﻣﺴﺘﺤﺪﺛﺔ ﺗﺘﻔﻖ ﻭﻋﻤﻠﻴﺔ ﺍﻟﺒﺤﺚ ﻋﻦ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻣﻦ ﺣﻴﺚ ﻃﺒﻴﻌﺘﻪ ﻭﻃﺒﻴﻌﺔ ﺍﻟﺒﻴﺌﺔ ﺍﻟﱵ ﻳﺘﻮﺍﺟﺪ ‪‬ﺎ‪.‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻷﻭﻝ‪ :‬ﺍﻟﻘﻮﺍﻋﺪ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻻﺳﺘﺨﻼﺹ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪:‬‬
‫ﻳﺼﻌﺐ ﺣﱴ ﻫﺬﻩ ﺍﻟﻠﺤﻈﺔ ﰲ ﻏﺎﻟﺒﻴﺔ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺃﻥ ﳓﺪﺩ ﺇﱃ ﺃﻱ ﻣﺪﻯ ﺗﻜﻔﻲ ﺍﻷﺳﺎﻟﻴﺐ‬
‫) ‪(1‬‬
‫ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻹﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻷﺩﻟﺔ ﻣﻦ ﺃﺟﻞ ﻣﺒﺎﺷﺮﺓ ﲢﻘﻴﻘﺎﺕ ﻧﺎﺟﺤﺔ ﰲ ﳎﺎﻝ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫ﻭﳑﺎ ﻻ ﺷﻚ ﻓﻴﻪ ﺃﻥ ﺍﳌﺸﺮﻉ ﱂ ﳚﺰ ﺇﺳﺘﺨﻼﺹ ﺍﻟﺪﻟﻴﻞ ﻣﻦ ﻏﲑ ﺿﻮﺍﺑﻂ ﲢﻜﻢ ﺫﻟﻚ ﻋﻦ ﻃﺮﻳﻖ‬
‫ﻗﻮﺍﻋﺪ ﺇﺟﺮﺍﺋﻴﺔ ﻣﻌﻴﻨﺔ ﺃﳘﻬﺎ‪ :‬ﺍﳌﻌﺎﻳﻨﺔ‪ ،‬ﺍﳋﱪﺓ‪ ،‬ﺍﻟﺘﻔﺘﻴﺶ ﻭﺿﺒﻂ ﺍﻷﺷﻴﺎﺀ ﻭﳑﺎ ﻻﺷﻚ ﻓﻴﻪ ﺃﻳﻀﺎ ﺃﻥ ﻫﺬﻩ‬
‫ﺍﻟﻘﻮﺍﻋﺪ ﻋﺎﻣﺔ ﺍﻟﻨﻄﺎﻕ ﺗﻨﻈﻢ ﺇﺳﺘﺨﻼﺹ ﺍﻟﺪﻟﻴﻞ ﰲ ﲨﻴﻊ ﺍﳉﺮﺍﺋﻢ‪ ،‬ﺗﻘﻠﻴﺪﻳﺔ ﻛﺎﻧﺖ ﺃﻡ ﻣﺴﺘﺤﺪﺛﺔ ﺇﻻ ﺃ‪‬ﺎ‬
‫ﰲ ﺍﻟﺜﺎﻧﻴﺔ ﻗﺪ ﺗﻜﻮﻥ ﲝﺎﺟﺔ ﺇﱃ ﺗﻄﻮﻳﺮ ﻟﻜﻲ ﺗﺘﻨﺎﺳﺐ ﻣﻊ ﻃﺒﻴﻌﺘﻬﺎ ﺍﳋﺎﺻﺔ ﻭﻃﺒﻴﻌﺔ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺬﻱ ﻳﺼﻠﺢ‬
‫ﻹﺛﺒﺎ‪‬ﺎ ﻭﻫﻮ ﻣﺎ ﺳﻮﻑ ﻧﻌﺮﻓﻪ ﻣﻦ ﺧﻼﻝ ﻣﺎ ﻳﻠﻲ‪:‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺍﻟﺘﻔﺘﻴﺶ ﻭﺿﺒﻂ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪:‬‬
‫ﳚﻤﻊ ﺍﻟﻔﻘﻪ ﺍﳉﻨﺎﺋﻲ ﻋﻠﻰ ﺃﻥ ﺍﻟﺘﻔﺘﻴﺶ ﻫﻮ ﺇﺟﺮﺍﺀ ﻣﻦ ﺇﺟﺮﺍﺀﺍﺕ ﺍﻟﺘﺤﻘﻴﻖ ﻳﺒﺎﺷﺮﻩ ﻣﻮﻇﻒ ﳐﺘﺺ‬
‫‪‬ﺪﻑ ﺍﻟﺒﺤﺚ ﻋﻦ ﺃﺩﻟﺔ ﻣﺎﺩﻳﺔ ﳉﻨﺎﻳﺔ ﺃﻭ ﺟﻨﺤﺔ‪ ،‬ﲢﻘﻖ ﻭﻗﻮﻋﻬﺎ ﰲ ﳏﻞ ﻳﺘﻤﺘﻊ ﲝﺮﻣﺔ‪ ،‬ﻭﺫﻟﻚ ﻭﻓﻘﺎ‬
‫ﻟﻠﻀﻤﺎﻧﺎﺕ ﻭﺍﻟﻘﻴﻮﺩ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﳌﻘﺮﺭﺓ‪.‬‬
‫ﻭﺃﻥ ﺿﺒﻂ ﺍﻷﺩﻟﺔ ﻫﻮ ﺍﻟﻨﺘﻴﺠﺔ ﺍﻟﻄﺒﻴﻌﻴﺔ ﺍﻟﱵ ﻳﻨﺘﻬﻲ ﺇﻟﻴﻬﺎ ﺍﻟﺘﻔﺘﻴﺶ ﻭﺍﻟﱵ ﻳﺘﻢ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻬﺎ ﺃﺛﻨﺎﺀﻩ‪.‬‬
‫ﻭﻋﻠﻰ ﺫﻟﻚ ﻓﺈﻧﻪ ﻳﺘﻀﺢ ﻟﻨﺎ ﺃﻥ ﻫﺬﻳﻦ ﺍﻹﺟﺮﺍﺋﲔ ﻣﺎ ﳘﺎ ﺇﻻ ﻭﺳﻴﻠﺔ ﻟﻺﺛﺒﺎﺕ ﺍﳌﺎﺩﻱ‪ ،‬ﺫﻟﻚ ﺃﻥ‬
‫ﺍﻟﺘﻔﺘﻴﺶ ﻳﺴﺘﻬﺪﻑ ﺿﺒﻂ ﺃﺷﻴﺎﺀ ﻣﺎﺩﻳﺔ ﺗﺴﺎﻋﺪ ﰲ ﺇﺛﺒﺎﺕ ﻭﻗﻮﻉ ﺍﳉﺮﳝﺔ ﻭﺇﺳﻨﺎﺩﻫﺎ ﺇﱃ ﺍﳌﺘﻬﻢ ﺍﳌﻨﺴﻮﺏ‬
‫ﺇﻟﻴﻪ ﺇﺭﺗﻜﺎ‪‬ﺎ‪.‬ﻛﻤﺎ ﺃﻥ ﺭﺟﺎﻝ ﺍﻟﻀﺒﻄﻴﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻗﺪ ﺗﻌﻮﺩﻭﺍ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻋﻠﻰ ﺿﺒﻂ ﺇﻻ ﺍﻷﺷﻴﺎﺀ‬
‫ﺍﳌﺎﺩﻳﺔ‪.‬‬
‫ﻣﻦ ﺃﺟﻞ ﻫﺬﺍ ﻓﺈﻥ ﺗﻔﺘﻴﺶ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻳﻌﺪ ﻣﻦ ﺃﺧﻄﺮ ﺍﳌﺮﺍﺣﻞ ﺣﺎﻝ ﺇﲣﺎﺫ ﺍﻹﺟﺮﺍﺀﺍﺕ‬
‫ﺍﳉﺰﺍﺋﻴﺔ ﺿﺪ ﻣﺮﺗﻜﺐ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻟﻜﻮﻥ ﳏﻞ ﺍﻟﺘﻔﺘﻴﺶ ﻓﻴﻬﺎ ﻫﻮ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﺫﻭ ﺍﻟﻄﺎﺑﻊ‬
‫ﻏﲑ ﺍﳌﺎﺩﻱ‪ ،‬ﻭﻻ ﻳﻌﺪﻭ ﺃﻥ ﻳﻜﻮﻥ ﺇﻻ ﻣﻌﻠﻮﻣﺎﺕ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ ﻟﻴﺲ ﳍﺎ ﺃﻱ ﻣﻈﻬﺮ ﻣﺎﺩﻱ ﳏﺴﻮﺱ ﰲ ﺍﻟﻌﺎﱂ‬

‫)‪ (1‬ﺍﻟﺮﺍﺋﺪ ﻋﺒﺪ ﺍﷲ ﺣﺴﲔ ﻋﻠﻲ ﳏﻤﻮﺩ‪ ،‬ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻷﺩﻟﺔ ﰲ ﳎﺎﻝ ﺳﺮﻗﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﲝﺚ ﻣﻨﺸﻮﺭ ﻋﻠﻰ‬
‫ﻣﻮﻗﻊ‪www.arablawinfo.com:‬ﺑﺪﻭﻥ ﺗﺮﻗﻴﻢ‪.‬‬

‫‪- 143 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﳋﺎﺭﺟﻲ‪.‬ﻓﻤﺎ ﻣﺪﻯ ﺻﻼﺣﻴﺔ ﻣﻜﻮﻧﺎﺕ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻷﻥ ﺗﻜﻮﻥ ﳏﻼ ﻳﺮﺩ ﻋﻠﻴﻪ ﺍﻟﺘﻔﺘﻴﺶ ﻭﻣﺎ ﻫﻲ‬
‫ﺍﻷﺷﻴﺎﺀ ﺍﳌﻀﺒﻮﻃﺔ ﰲ ﻇﻞ ﺍﻟﺘﻔﺘﻴﺶ ﰲ ﺍﻟﻌﺎﱂ ﺍﻹﻓﺘﺮﺍﺿﻲ؟‬
‫ﺃﻭﻻ‪ :‬ﺍﻟﺘﻔﺘﻴـﺶ ﰲ ﺍﻟـﺒﻴﺌﺔ ﺍﻟــﺮﻗﻤﻴﺔ‪:‬ﻳﺜﻮﺭ ﺍﻟﺘﺴﺎﺅﻝ ﺣﻮﻝ ﺇﻣﻜﺎﻧﻴﺔ ﺗﻄﺒﻴﻖ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻟﻌﺎﻣﺔ‬
‫ﻟﻠﺘﻔﺘﻴﺶ ﻋﻠﻰ ﺻﻮﺭﺓ ﺗﻔﺘﻴﺶ ﻧﻈﻢ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻹﻧﺘﺮﻧﺎﺕ‪ ،‬ﺫﻟﻚ ﺃﻥ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﻳﻬﺪﻑ ﺇﱃ ﲨﻊ ﺍﻷﺩﻟﺔ‬
‫ﺍﳌﺎﺩﻳﺔ ﰲ ﺣﲔ ﺃﻥ ﻧﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﺒﺎﺭﺓ ﻋﻦ ﻛﻴﺎﻥ ﻣﻌﻨﻮﻱ)‪(1‬ﻭﻻ ﺗﺘﻮﺍﻓﺮ ﻟﻪ ﺻﻔﺔ ﺍﳌﺎﺩﺓ ﺳﻮﺍﺀ ﺗﻌﻠﻖ‬
‫ﺫﻟﻚ ﺑﱪﺍﳎﺤﺎﺳﻮﺏ ﺃﻡ ﻣﺎ ﻳﺸﻤﻞ ﻋﻠﻴﻪ ﻣﻦ ﺑﻴﺎﻧﺎﺕ‪.‬‬
‫ﻟﻜﻦ ﻣﻦ ﺍﳌﻌﺮﻭﻑ ﺃﻥ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﺗﺘﻜﻮﻥ ﻣﻦ ﻣﻜﻮﻧﺎﺕ ﻣﺎﺩﻳﺔ ﻭﺃﺧﺮﻯ ﻏﲑ ﻣﺎﺩﻳﺔ ﺗﺮﺗﺒﻂ‬
‫) ‪(2‬‬
‫ﺑﻐﲑﻫﺎ ﻋﱪ ﺷﺒﻜﺎﺕ ﺇﺗﺼﺎﻝ ﺑﻌﺪﻳﺔ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﶈﻠﻲ ﺃﻭ ﺍﻟﺪﻭﱄ‬
‫ﻭﺇﺫﺍ ﻛﺎﻥ ﺍﻟﺘﻔﺘﻴﺶ ﻫﻮ ﺍﻟﺘﻨﻘﻴﺐ ﰲ ﻭﻋﺎﺀ ﺍﻟﺴﺮ ﺑﻘﺼﺪ ﺿﺒﻂ ﻣﺎ ﻳﻔﻴﺪ ﻣﻦ ﺍﻷﺳﺮﺍﺭ ﰲ ﻛﺸﻒ‬
‫ﺍﳊﻘﻴﻘﺔ‪ ،‬ﻭﺃﻥ ﺟﻮﻫﺮﻩ ﻫﻮ ﻛﺸﻒ ﻧﻘﺎﺏ ﺍﻟﺴﺮﻳﺔ ﻋﻤﺎ ﲢﻮﻳﻪ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻣﻦ ﺧﻔﺎﻳﺎ ﻭﺃﺳﺮﺍﺭ‬
‫ﻭﻧﻮﺍﻳﺎ ﺇﺟﺮﺍﻣﻴﺔ‪ ،‬ﻭﺑﺎﻟﺘﺎﱄ ﺇﺯﺍﺣﺔ ﺳﺘﺎﺭ ﺍﻟﻜﺘﻤﺎﻥ ﻋﻨﻬﺎ ﻟﻺﺳﺘﻔﺎﺩﺓ ﻣﻨﻬﺎ ﰲ ﻣﻌﺮﻓﺔ ﺍﳊﻘﻴﻘﺔ‪ .‬ﻭﺍﺫﺍ ﻛﺎﻥ ﻫﺬﺍ‬
‫ﺍﳌﻌﲎ ﻻ ﻳﺘﻘﻴﺪ ﺑﺎﻟﻜﻴﺎﻥ ﺍﳌﺎﺩﻱ ﻟﻮﻋﺎﺀ ﺍﻟﺴﺮ‪ ،‬ﻓﺈﻥ ﺍﻷﻣﺮ ﻳﺘﻄﻠﺐ ﻣﻨﺎ ﺍﻟﺒﺤﺚ ﰲ ﻣﺴﺄﻟﺔ ﺍﶈﻞ ﺍﻟﺬﻱ‬
‫ﻳﻨﺼﺐ ﻋﻠﻴﻪ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﺍﻟﺘﺤﻘﻴﻘﻲ ﰲ ﳎﺎﻝ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫) ‪HARD‬‬ ‫‪/1‬ﳏﻞ ﺍﻟﺘﻔﺘﻴﺶ ﰲ ﺍﻟﺒﻴﺌﺔ ﺍﻟﺮﻗﻤﻴﺔ‪:‬ﻳﺘﻜﻮﻥ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻣﻦ ﻣﻜﻮﻧﺎﺕ ﻣﺎﺩﻳﺔ‬
‫‪(WARE‬ﻭﻣﻜﻮﻧﺎﺕ ﻣﻨﻄﻘﻴﺔ )‪،(SOFT WARE‬ﻛﻤﺎ ﺃﻥ ﻟﻪ ﺷﺒﻜﺎﺕ ﺇﺗﺼﺎﻻﺕ ﺑﻌﺪﻳﺔ ﺳﻠﻜﻴﺔ ﻭﻻ‬
‫ﺳﻠﻜﻴﺔ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﶈﻠﻲ ﻭﺍﻟﺪﻭﱄ ﻓﻬﻞ ﲣﻀﻊ ﻫﺬﻩ ﺍﳌﻜﻮﻧﺎﺕ ﻟﻠﺘﻔﺘﻴﺶ؟‬
‫‪/1.1‬ﺗﻔﺘﻴﺶ ﺍﳌﻜﻮﻧﺎﺕ ﺍﳌﺎﺩﻳﺔ ﻟﻨﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ‪:‬ﺇﻥ ﺍﻟﺘﻔﺘﻴﺶ ﺍﻟﻮﺍﻗﻊ ﻋﻠﻰ ﺍﳌﻜﻮﻧﺎﺕ ﺍﳌﺎﺩﻳﺔ‬
‫ﻟﻠﻨﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻻ ﺗﻮﺟﺪ ﻓﻴﻪ ﺃﻱ ﻣﺸﻜﻠﺔ ﰲ ﺍﻟﺘﻨﻔﻴﺬ ﻹﻣﻜﺎﻧﻴﺔ ﺫﻟﻚ ﻭﺳﻬﻮﻟﺘﻪ‪ ،‬ﻣﻊ ﺍﻷﺧﺬ ﺑﻌﲔ‬
‫ﺍﻹﻋﺘﺒﺎﺭ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳋﺎﺻﺔ ﺑﻀﺒﻂ ﻫﺬﻩ ﺍﻷﺟﻬﺰﺓ ﳊﺴﺎﺳﻴﺘﻬﺎ ﻭﺇﻣﻜﺎﻧﻴﺔ ﺇﺗﻼﻓﻬﺎ‪ ،‬ﻭﺗﺄﰐ ﺳﻬﻮﻟﺔ ﻫﺬﺍ‬
‫ﺍﻟﺘﻔﺘﻴﺶ ﻷﻧﻪ ﻳﺮﺩ ﻋﻠﻰ ﺃﺷﻴﺎﺀ ﻣﺎﺩﻳﺔ ﻻ ﺧﻼﻑ ﺣﻮﻝ ﺧﻀﻮﻋﻬﺎ ﻟﻠﺘﻔﺘﻴﺶ ﻃﺒﻘﺎ ﻟﻘﻮﺍﻋﺪ ﻗﺎﻧﻮﻥ‬
‫ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺍﳋﺎﺻﺔ ‪‬ﺬﺍ ﺍﻻﺟﺮﺍﺀ‪ .‬ﻓﻔﻲ ﻧﺺ ﺍﳌﺎﺩﺓ ‪ 44‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﻭﺭﺩ‬
‫ﺑﺎﳌﻌﲎ ﺃﻥ ﺍﻟﺘﻔﺘﻴﺶ ﻳﺮﺩ ﻋﻠﻰ ﺍﻷﺷﻴﺎﺀ‪ ،‬ﻭﻫﻲ ﻛﻠﻤﺔ ﺗﻨﺼﺮﻑ ﰲ ﺍﻷﺭﺟﺢ ﻋﻠﻰ ﺍﳌﻜﻮﻧﺎﺕ ﺍﳌﺎﺩﻳﺔ ﻭﻧﻔﺲ‬

‫)‪(1‬ﻋﻠﻲ ﺣﺴﻦ ﳏﻤﺪ ﺍﻟﻄﻮﺍﻟﺒﺔ‪،‬ﺍﻟﺘﻔﺘﻴﺶ ﺍﳉﻨﺎﺋﻲ ﻋﻠﻰ ﻧﻈﻢ ﺍﳊﺎﺳﻮﺏ ﻭ ﺍﻹﻧﺘﺮﻧﺎﺕ‪،‬ﻋﺎﱂ ﺍﻟﻜﺘﺐ ﺍﳊﺪﻳﺜﺔ ‪.‬ﺍﻷﺭﺩﻥ ‪ 2004‬ﺹ‪.7‬‬
‫)‪(2‬ﺭﺷﻴﺪﺓ ﺑﻮﻛﺮ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪.‬ﺹ‪،394‬‬

‫‪- 144 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﻟﻘﻮﻝ ﻳﻨﺼﺮﻑ ﻋﻠﻰ ﻣﺎ ﺟﺎﺀﺕ ﺑﻪ ﺍﳌﺎﺩﺓ ‪ 64‬ﻣﻦ ﻧﻔﺲ ﺍﻟﻘﺎﻧﻮﻥ ﺑﻨﺼﻬﺎ‪ :‬ﻻ ﳚﻮﺯ ﺗﻔﺘﻴﺶ ﺍﳌﺴﺎﻛﻦ‪...‬‬
‫ﻭﺿﺒﻂ ﺍﻷﺷﻴﺎﺀ‪"...‬‬
‫ﻭﻋﻠﻰ ﻫﺪﻱ ﺫﻟﻚ ﻓﺈﻧﻪ ﻻ ﻳﻮﺟﺪ ﻣﺎﻧﻊ ﻗﺎﻧﻮﱐ ﻣﻦ ﺃﻥ ﻳﻨﺼﺐ ﺍﻟﺘﻔﺘﻴﺶ ﻋﻠﻰ ﺍﳌﻜﻮﻧﺎﺕ ﺍﳌﺎﺩﻳﺔ‬
‫ﻟﻠﺤﺎﺳﻮﺏ ﻭﻣﻠﺤﻘﺎ‪‬ﺄﻭﻣﻌﺪﺍﺗﻪ‪ ،‬ﻭﺫﻟﻚ ﺗﺒﻌﺎ ﻟﻄﺒﻴﻌﺔ ﺍﳌﻜﺎﻥ ﺍﻟﺬﻱ ﻳﺘﻮﺍﺟﺪ ﻓﻴﻪ ﺍﳊﺎﺳﻮﺏ ﻭﻫﺬﻩ‬
‫ﺍﳌﻠﺤﻘﺎﺕ‪ ،‬ﺳﻮﺍﺀ ﻣﻦ ﺍﻷﻣﺎﻛﻦ ﺍﻟﻌﺎﻣﺔ ﺃﻭ ﻣﻦ ﺍﻷﻣﺎﻛﻦ ﺍﳋﺎﺻﺔ‪ ،‬ﺇﺫ ﺃﻥ ﻟﺼﻔﺔ ﺍﳌﻜﺎﻥ ﺃﳘﻴﺔ ﺧﺎﺻﺔ ﰲ‬
‫ﳎﺎﻝ ﺍﻟﺘﻔﺘﻴﺶ‪ ،‬ﻓﺈﺫﺍ ﻛﺎﻧﺖ ﺧﺎﺻﺔ ﻛﻤﺴﻜﻦ ﺍﳌﺘﻬﻢ ﺃﻭ ﺃﺣﺪ ﻣﻠﺤﻘﺎﺗﻪ ﻛﺎﻧﺖ ﳍﺎ ﺣﻜﻤﻪ ﻓﻼ ﳚﻮﺯ‬
‫) ‪(1‬‬
‫ﺗﻔﺘﻴﺸﻬﺎ ﺇﻻ ﰲ ﺍﳊﺎﻻﺕ ﺍﻟﱵ ﳚﻮﺯ ﻓﻴﻬﺎ ﺗﻔﺘﻴﺶ ﻣﺴﻜﻨﻪ ﻭﺑﻨﻔﺲ ﺍﻟﻀﻤﺎﻧﺎﺕ ﺍﳌﻘﺮﺭﺓ ﻗﺎﻧﻮﻧﺎ‪.‬‬
‫ﺇﻻ ﺃﻥ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﲟﻨﺎﺳﺒﺔ ﺍﻟﺘﻌﺪﻳﻞ ﺍﻟﺬﻱ ﺃﳊﻘﻪ ﻋﻠﻰ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺑﺎﻟﻘﺎﻧﻮﻥ‬
‫‪22/06‬ﺍﳌﺆﺭﺥ ﰲ‪ 20‬ﺩﻳﺴﻤﱪ ‪2006‬ﺇﺳﺘﺜﲎ ﲟﻮﺟﺐ ﺍﻟﻔﻘﺮﺓ ﺍﻟﺜﺎﻟﺜﺔ ﻣﻦ ﺍﳌﺎﺩﺓ ‪ 45‬ﻭﻛﺬﺍ ﺍﻟﻔﻘﺮﺓ ﺍﻟﺜﺎﻧﻴﺔ ﻣﻦ‬
‫ﺍﳌﺎﺩﺓ ‪ 47‬ﻭﺍﻟﻔﻘﺮﺓ ﺍﻟﺜﺎﻟﺜﺔ ﻣﻦ ﺍﳌﺎﺩﺓ ‪ 64‬ﺗﻄﺒﻴﻖ ﻫﺬﻩ ﺍﻟﻀﻤﺎﻧﺎﺕ ﻋﻨﺪ ﺇﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﲟﻨﺎﺳﺒﺔ ﲢﻘﻴﻖ‬
‫ﻣﻔﺘﻮﺡ ﲞﺼﻮﺹ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫ﻭﻳﻔﻬﻢ ﻣﻦ ﺇﺳﺘﻘﺮﺍﺀ ﻫﺬﻩ ﺍﳌﻮﺍﺩ ﺃﻥ ﺍﳌﺸﺮﻉ ﻻ ﻳﺸﺘﺮﻁ ﺣﻀﻮﺭ ﺍﻟﺸﺨﺺ ﺍﻟﺬﻱ ﻳﺸﺘﺒﻪ ﰲ ﺃﻧﻪ‬
‫ﺳﺎﻫﻢ ﰲ ﺇﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﻋﻨﺪ ﺗﻔﺘﻴﺶ ﻣﺴﻜﻨﻪ‪(2)،‬ﻭﺃﻧﻪ ﳚﻮﺯ ﺍﻟﻘﻴﺎﻡ ﺑﺈﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﰲ ﻛﻞ ﺳﺎﻋﺔ ﻣﻦ‬
‫) ‪(4‬‬
‫ﺳﺎﻋﺎﺕ ﺍﻟﻨﻬﺎﺭ ﺃﻭ ﺍﻟﻠﻴﻞ)‪(3‬ﻭ ﻭﺩﻭﻥ ﺣﺎﺟﺔ ﺇﱃ ﺭﺿﺎﺋﻪ ﻋﻨﺪ ﺍﻟﻘﻴﺎﻡ ‪‬ﺬﺍ ﺍﻹﺟﺮﺍﺀ‪.‬‬
‫ﻭﺍﳌﻼﺣﻆ ﺃﻥ ﺍﻟﺸﺮﻉ ﰲ ﻫﺬﻩ ﺍﳊﺎﻟﺔ ﻗﺪ ﻏﻠﺐ ﺍﳌﺼﻠﺤﺔ ﺍﻟﻌﺎﻣﺔ ﻋﻠﻰ ﺣﺮﻳﺎﺕ ﺍﻷﻓﺮﺍﺩ‪ ،‬ﻭ ﻣﺮﺩ‬
‫ﺫﻟﻚ ﺇﱃ ﺇﻋﺘﺒﺎﺭﻳﻦ‪:‬‬
‫‪-‬ﺫﺍﺗﻴﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﳌﺘﻤﺜﻠﺔ ﰲ ﺇﻣﻜﺎﻧﻴﺔ ﺇﺧﺘﻔﺎﺋﻬﺎ ﺑﺴﺮﻋﺔ ﻓﺎﺋﻘﺔ‪.‬‬
‫‪-‬ﺇﻓﺘﺮﺍﺽ ﻛﻮﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻫﻮ ﺍﻟﺪﻟﻴﻞ ﺍﻟﻮﺣﻴﺪ ﰲ ﺍﻟﺪﻋﻮﻯ ﺍﳉﺰﺍﺋﻴﺔ ﻭﻣﻦ ﰒ ﺇﺭﺗﻜﺎﺯ ﻛﻞ‬
‫ﺍﻟﻌﻤﻠﻴﺔ ﺍﻹﺛﺒﺎﺗﻴﺔ ﻋﻠﻰ ﻭﺟﻮﺩﻩ‪.‬‬

‫)‪(1‬ﻧﺼﺖ ﺍﳌﺎﺩﺓ ‪ 64‬ﻣﻦ ﻕ ﺇﺝ ﺃﻧﻪ ﻻ ﳚﻮﺯ ﺗﻔﺘﻴﺶ ﺍﳌﺴﺎﻛﻦ‪....‬ﺇﻻ ﺑﺮﺿﺎ ﺻﺮﻳﺢ ﻣﻦ ﺍﻟﺸﺨﺺ ﺍﻟﺬﻱ ﺳﺘﺘﺨﺬ ﻟﺪﻳﻪ ﻫﺬﻩ ﺍﻹﺟﺮﺍﺀﺍﺕ‪ "...‬ﻓﻀﻼ ﻋﻦ ﻣﺎ‬
‫ﻭﺭﺩ ﰲ ﺍﳌﻮﺍﺩ ﻣﻦ ‪ 44‬ﺇﱃ ‪ 47‬ﻣﻦ ﻧﻔﺲ ﺍﻟﻘﺎﻧﻮﻥ‪.‬‬
‫)‪(2‬ﺍﻟﻔﻘﺮﺓ ‪ 03‬ﻣﻦ ﺍﳌﺎﺩﺓ ‪ 45‬ﺗﻨﺺ ﻋﻠﻰ ﺃﻧﻪ "ﻻ ﺗﻄﺒﻖ ﺃﺣﻜﺎﻡ ﻫﺬﻩ ﺍﳌﺎﺩﺓ ﺇﺫﺍ ﺗﻌﻠﻖ ﺍﻷﻣﺮ ﺑﺎﳉﺮﺍﺋﻢ ‪....‬ﺃﻧﻈﻤﺔ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ"‪.‬‬
‫)‪(3‬ﺍﻟﻔﻘﺮﺓ ‪ 03‬ﻣﻦ ﺍﳌﺎﺩﺓ ‪ 47‬ﺗﻨﺺ ﻋﻠﻰ‪ ":‬ﻋﻨﺪﻣﺎ ﻳﺘﻌﻠﻖ ﺍﻷﻣﺮ ﺑـ‪.....‬ﺍﳉﺮﺍﺋﻢ ﺍﳌﺎﺩﺓ ﺑﺄﻧﻈﻤﺔ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ‪.....‬ﻓﺈﻧﻪ ﳚﻮﺯ ﺇﺟﺮﺍﺀ‬
‫ﺍﻟﺘﻔﺘﻴﺶ‪ .....‬ﰲ ﻛﻞ ﳏﻞ ﻣﺴﻜﻦ ﺃﻭ ﻏﲑ ﺳﻜﲏ ﰲ ﻛﻞ ﺳﺎﻋﺔ ﻣﻦ ﺳﺎﻋﺎﺕ ﺍﻟﻨﻬﺎﺭ ﺃﻭ ﺍﻟﻠﻴﻞ‪.ّ....‬‬
‫)‪(4‬ﺍﻟﻔﻘﺮﺓ ﺍﻟﺜﺎﻧﻴﺔ ﻣﻦ ﺍﳌﺎﺩﺓ ‪ ....."64‬ﻭﺗﻄﺒﻖ ﻓﻀﻼ ﻋﻦ ﺫﻟﻚ ﺃﺣﻜﺎﻡ ﺍﳌﻮﺍﺩ ‪ 44‬ﺇﱃ ‪ 47‬ﻣﻦ ﻫﺬﺍ ﺍﻟﻘﺎﻧﻮﻥ" ﺃﻱ ﻋﺪﻡ ﺗﻄﺒﻖ ﺍﻟﻀﻤﺎﻧﺎﺕ ﺍﻟﻮﺍﺭﺩﺓ ‪‬ﺬﻩ ﺍﳌﺎﺩﺓ‬
‫ﲞﺼﻮﺹ ﺍﻟﺘﻔﺘﻴﺶ ﺍﳌﺘﻌﻠﻖ ﲜﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫‪- 145 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪/2.1‬ﺗﻔﺘﻴﺶ ﺍﳌﻜﻮﻧﺎﺕ ﺍﳌﻌﻨﻮﻳﺔ ﻟﻨﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ‪:‬ﺇﺫﺍ ﻛﺎﻥ ﺍﻷﻣﺮ ﻗﺪ ﺇﻧﺘﻬﻰ ﺑﻨﺎ ﺇﱃ ﺻﻼﺣﻴﺔ‬
‫ﺍﳌﻜﻮﻧﺎﺕ ﺍﳌﺎﺩﻳﺔ ﻟﻠﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻛﻤﺤﻞ ﻳﺮﺩ ﻋﻠﻴﻪ ﺍﻟﺘﻔﺘﻴﺶ‪ ،‬ﻓﺈﻥ ﺇﻣﺘﺪﺍﺩ ﺫﻟﻚ ﺇﱃ ﻣﻜﻮﻧﺎﺗﻪ ﻏﲑ ﺍﳌﺎﺩﻳﺔ‬
‫ﻫﻮ ﳏﻞ ﺟﺪﻝ ﻛﺒﲑ ﺣﻮﻝ ﻣﺪﻯ ﺻﻼﺣﻴﺘﻬﺎ ﻷﻥ ﺗﻜﻮﻥ ﻣﻮﺿﻮﻋﺎ ﻟﻠﺘﻔﺘﻴﺶ ﲤﻬﻴﺪﺍ ﻟﻀﺒﻂ ﺍﻷﺩﻟﺔ‪.‬‬
‫ﻓﺎﳋﻼﻑ ﺣﺎﺻﻞ ﰲ ﻣﺴﺄﻟﺔ ﺃﻥ ﺍﻟﺘﻔﺘﻴﺶ ﺍﻟﺘﺤﻘﻴﻘﻲ ﻭﺳﻴﻠﺔ ﻟﻠﺒﺤﺚ ﻋﻦ ﺍﻷﺩﻟﺔ ﺍﳌﺎﺩﻳﺔ‪ ،‬ﺇﺫ ﻫﻮ‬
‫ﺇﺟﺮﺍﺀ ﻳﺴﻌﻰ ﺇﱃ ﺿﺒﻂ ﺍﻷﺩﻟﺔ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﳉﺮﳝﺔ ﻟﺘﻘﺪﳝﻬﺎ ﺇﱃ ﺍﶈﻜﻤﺔ ﺍﳌﺨﺘﺼﺔ ﻛﺪﻟﻴﻞ ﺇﺩﺍﻧﺔ‪ ،‬ﻟﺬﻟﻚ ﻳﺜﻮﺭ‬
‫ﺍﻟﺸﻚ ﻭﺍﻟﺘﺴﺎﺅﻝ ﺣﻮﻝ ﺇﻣﻜﺎﻧﻴﺔ ﺇﻋﺘﺒﺎﺭ ﺍﻟﺒﺤﺚ ﻋﻦ ﺃﺩﻟﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﻧﻄﺎﻕ ﻧﻈﻢ ﺍﳊﺎﺳﻮﺏ‬
‫ﻧﻮﻋﺎ ﻣﻦ ﺍﻟﺘﻔﺘﻴﺶ ﺑﺈﻋﺘﺒﺎﺭ ﺃﻥ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺃﻭ ﺍﻟﱪﺍﻣﺞ ﰲ ﺣﺪ ﺫﺍ‪‬ﺎ ﻟﻴﺲ ﳍﺎ ﻣﻈﻬﺮ ﻣﺎﺩﻱ‬
‫ﳏﺴﻮﺱ ﰲ ﺍﶈﻴﻂ ﺍﳋﺎﺭﺟﻲ ﻭﻳﺴﺘﺸﻌﺮ ﺍﻟﻔﻘﻪ ﺻﻌﻮﺑﺔ ﺍﳌﺴﺄﻟﺔ ﻧﻈﺮﺍ ﻟﻐﻴﺎﺏ ﺍﻟﻄﺒﻴﻌﺔ ﺍﳌﺎﺩﻳﺔ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﰲ‬
‫ﺫﺍ‪‬ﺎ ﳎﺮﺩﺓ ﻣﻦ ﺩﻋﺎﻣﺘﻬﺎ ﺍﳌﺎﺩﻳﺔ‪(1).‬ﻭﻗﺪ ﺫﻫﺐ ﺍﻟﻔﻘﻪ ‪‬ﺬﺍ ﺍﻟﺸﺄﻥ ﻣﺴﺎﺭﻳﻦ ﺭﺋﺴﲔ‪:‬‬
‫ﺍﳌﺴﺎﺭ ﺍﻷﻭﻝ‪ :‬ﺗﺘﻤﺜﻞ ﻓﻜﺮﺗﻪ ﰲ ﻋﺪﻡ ﺇﻣﻜﺎﻧﻴﺔ ﺇﻧﺴﺠﺎﻡ ﻭﺗﻄﺎﺑﻖ ﺃﺣﻜﺎﻡ ﺍﻟﺘﻔﺘﻴﺶ ﰲ ﺍﻟﻘﺎﻧﻮﻥ‬
‫ﺍﳉﻨﺎﺋﻲ ﺍﻹﺟﺮﺍﺋﻲ ﻣﻊ ﻣﺎ ﻗﺪ ﻳﺘﻄﻠﺒﻪ ﻛﺸﻒ ﺍﳊﻘﻴﻘﺔ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﲝﺚ ﻭﺗﻨﻘﻴﺐ ﻋﻦ ﺍﻷﺩﻟﺔ‬
‫ﰲ ﺑﺮﺍﻣﺞ ﺍﳊﺎﺳﻮﺏ ﻭﺑﻴﺎﻧﺎﺗﻪ‪.‬‬
‫ﻓﻬﻨﺎﻙ ﺟﺎﻧﺐ ﻣﻦ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻹﺟﺮﺍﺋﻴﺔ ﻗﺪ ﺣﺪﺩ ﻫﺪﻑ ﺍﻟﺘﻔﺘﻴﺶ ﰲ ﺍﻟﺒﺤﺚ ﻋﻦ ﺍﻷﺷﻴﺎﺀ‬
‫ﻭﺿﺒﻄﻬﺎ‪ ،‬ﻭﻫﺬﺍ ﺍﻟﺸﻲﺀ ﻳﻘﺘﺼﺮ ﲟﻔﻬﻮﻣﻪ ﻋﻠﻰ ﺍﳌﺎﻝ ﺫﻱ ﺍﳊﻴﺰ ﺍﳌﺎﺩﻱ ﺍﶈﺴﻮﺱ ﻭﻻ ﳝﺘﺪ ﰲ ﻧﻄﺎﻕ ﴰﻮﻟﻪ‬
‫ﺇﱃ ﺍﻟﻜﻴﺎﻧﺎﺕ ﺍﳌﻨﻄﻘﻴﺔ‪ ،‬ﻭﻗﺪ ﻋﻤﻠﺖ ﺍﻟﺪﻭﻝ ﺍﻟﱵ ﺃﺧﺬﺕ ‪‬ﺬﺍ ﺍﻹﲡﺎﻩ ﺇﱃ ﲪﺎﻳﺔ ﻫﺬﻩ ﺍﻟﻜﻴﺎﻧﺎﺕ ﺍﳌﻨﻄﻘﻴﺔ‬
‫) ‪(2‬‬
‫ﻋﱪ ﻗﻮﺍﻧﲔ ﺍﳌﻠﻜﻴﺔ ﺍﻟﻔﻜﺮﻳﺔ‪.‬‬
‫ﺍﳌﺴﺎﺭ ﺍﻟﺜﺎﱐ‪ :‬ﳜﻠﺺ ﺃﺻﺤﺎﺏ ﺍﳌﺴﺎﺭ ﺇﱃ ﺃﻥ ﺑﺮﺍﻣﺞ ﺍﳊﺎﺳﻮﺏ ﳝﻜﻦ ﺃﻥ ﺗﻨﻄﺒﻖ ﻋﻠﻴﻬﺎ ﺧﺼﺎﺋﺺ‬
‫ﻭﲰﺎﺕ ﺍﳌﺎﺩﺓ‪ ،‬ﻭﺑﺎﻟﺘﺎﱄ ﺗﺪﺧﻞ ﰲ ﻧﻄﺎﻕ ﺍﻷﺷﻴﺎﺀ ﺍﳌﺎﺩﻳﺔ ﻭﻳﺴﺘﻮﻱ ﰲ ﺫﻟﻚ ﺃﻥ ﺗﻜﻮﻥ ﺑﺮﺍﻣﺞ ﻧﻈﺎﻡ ﺃﻭ‬
‫ﺑﺮﺍﻣﺞ ﺗﻄﺒﻴﻘﺎﺕ‪(3)،‬ﻣﺴﺘﻨﺪﻳﻦ ﰲ ﺫﻟﻚ ﺇﱃ ﺃﻥ ﺍﳌﺎﺩﺓ ﻫﻲ ﻛﻞ ﻣﺎ ﻳﺸﻐﻞ ﺣﻴﺰﺍ ﻣﺎﺩﻳﺎ ﰲ ﻓﺮﺍﻍ ﻣﻌﲔ‪ ،‬ﻭﺃﻥ‬
‫ﻫﺬﺍ ﺍﳊﻴﺰ ﳝﻜﻦ ﻗﻴﺎﺳﻪ ﻭﺍﻟﺘﺤﻜﻢ ﻓﻴﻪ ﻭﺑﻨﺎﺀﺍ ﻋﻠﻴﻪ ﻓﺈﻥ ﺍﻟﻜﻴﺎﻥ ﺍﳌﻨﻄﻘﻲ ﻟﻠﺤﺎﺳﻮﺏ ﺃﻭ ﺍﻟﱪﻧﺎﻣﺞ ﻳﺸﻐﻞ‬
‫)‪(kb‬‬‫ﺣﻴﺰﺍ ﻣﺎﺩﻳﺎ ﰲ ﺫﺍﻛﺮﺓ ﺍﳊﺎﺳﻮﺏ ﻭﳝﻜﻦ ﻗﻴﺎﺳﻪ ﲟﻘﻴﺎﺱ ﻣﻌﲔ ﻫﻮ ﺍﻟﺒﺎﻳﺖ )‪ (Byte‬ﻭﺍﻟﻜﻴﻠﻮﺑﺎﻳﺖ‬
‫ﻭﺍﳌﻴﻐﺎﺑﺎﻳﺖ)‪ ،(MB‬ﻭﻫﻜﺬﺍ ﺗﻘﺎﺱ ﺳﻌﺔ ﺃﻭ ﺣﺠﻢ ﺍﻟﺬﺍﻛﺮﺓ ﺍﻟﺪﺍﺧﻠﻴﺔ ﻟﻠﺤﺎﺳﻮﺏ ﺑﻌﺪﺩ ﺍﳊﺮﻭﻑ ﺍﻟﱵ‬

‫)‪(1‬ﻋﺒﺪ ﺍﻟﻌﻈﻴﻢ ﻭﺯﻳﺮ‪ ،‬ﺷﺮﺡ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﺍﻟﻘﺴﻢ ﺍﳋﺎﺹ ﺟﺮﺍﺋﻢ ﺍﻹﻋﺘﺪﺍﺀ ﻋﻠﻰ ﺍﻷﻣﻮﺍﻝ ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ‪ ،‬ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ ﺍﻟﻘﺎﻫﺮﺓ ‪ ،1993‬ﺹ‪.40‬‬
‫)‪(2‬ﻋﻠﻲ ﺣﺴﻦ ﳏﻤﺪ ﺍﻟﻄﻮﺍﻟﺒﺔ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ ﺹ‪..31‬‬
‫)‪(3‬ﻫﻼﱄ ﻋﺒﺪ ﺍﻟﻼﻩ ﺃﲪﺪ‪ ،‬ﺗﻔﺘﻴﺶ ﻧﻈﻢ ﺍﳊﺎﺳﻮﺏ ﺍﻵﱄ ﻭﺿﻤﺎﻧﺎﺕ ﺍﳌﺘﻬﻢ ﺍﳌﻌﻠﻮﻣﺎﰐ‪.‬ﺩﺭﺍﺳﺔ ﻣﻘﺎﺭﻧﺔ‪ .‬ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ‪.‬ﺍﻟﻘﺎﻫﺮﺓ ‪ 2006‬ﺹ‪ 75‬ﻭﻣﺎ‬
‫ﺑﻌﺪﻫﺎ ‪.‬‬

‫‪- 146 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﳝﻜﻦ ﺧﺰ‪‬ﺎ ﻓﻴﻬﺎ‪(1).‬ﻟﺬﻟﻚ ﺫﻫﺐ ﺍﻟﻔﻘﻪ ﰲ ﺗﻔﺴﲑﻩ ﺇﱃ ﺍﻹﺳﺘﻨﺎﺩ ﻋﻠﻰ ﺍﻟﺮﺑﻂ ﺑﲔ ﺍﻟﻨﺼﻮﺹ ﺍﻹﺟﺮﺍﺋﻴﺔ‬
‫ﺍﻟﱵ ﺃﻭﺭﺩﺕ ﻋﺒﺎﺭﺓ "ﺃﻱ ﺷﻲﺀ")‪(2‬ﻭﺍﻟﱵ ﻳﻘﺼﺪ ‪‬ﺎ ﺍﳌﺎﺩﺓ ﻭﺑﲔ ﺍﻟﻌﻠﻮﻡ ﺍﻟﻄﺒﻴﻌﻴﺔ ﻭﻣﻔﻬﻮﻣﻬﺎ ﰲ ﺍﻟﺒﻴﺎﻧﺎﺕ‬
‫ﺍﳌﻨﻄﻘﻴﺔ ﺃﻭ ﺍﻟﱪﺍﻣﺞ‪.‬‬
‫ﻏﲑ ﺃﻥ ﺍﻟﻨﺼﻮﺹ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﱵ ﺃﺭﺳﺖ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻟﱵ ﲢﻜﻢ ﺍﻟﺘﻔﺘﻴﺶ ﰎ ﺳﻨﻬﺎ ﻗﺒﻞ ﺃﻥ ﻳﻌﺮﻑ‬
‫ﺍﻟﻘﺎﻧﻮﻥ ﺍﻷﺷﻴﺎﺀ ﻏﲑ ﺍﳌﺎﺩﻳﺔ‪ ،‬ﻟﻜﻦ ﺗﻘﺪﻡ ﺍﻟﻔﻜﺮ ﺍﻟﺒﺸﺮﻱ ﻭﺍﻟﺘﻄﻮﺭ ﺍﻟﺬﻱ ﺭﺍﻓﻘﻪ ﺃﻇﻬﺮ ﻟﻠﻮﺟﻮﺩ ﻗﻴﻤﺎ‬
‫ﺇﻗﺘﺼﺎﺩﻳﺔ ﻭﺃﺷﻴﺎﺀ ﻏﲑ ﻣﺎﺩﻳﺔ ﻟﻴﺲ ﳍﺎ ﺣﻴﺰ ﳏﺴﻮﺱ‪ ،‬ﻟﺬﻟﻚ ﻓﺄﻳﺎ ﻛﺎﻧﺖ ﺍﳌﱪﺭﺍﺕ ﺍﻟﱵ ﺳﺎﻗﻬﺎ ﻣﻌﺘﻨﻘﻮﺍ‬
‫ﺍﳌﺴﺎﻭﺍﺓ ﺑﲔ ﺍﻟﻜﻴﺎﻥ ﺍﳌﺎﺩﻱ ﻭﻧﻘﻴﻀﻪ ﻓﺈﻥ ﻃﺒﻴﻌﺔ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﻌﺎﳉﺔ ﺗﺘﻄﻠﺐ ﻗﻮﺍﻋﺪ ﺧﺎﺻﺔ‬
‫ﲢﻜﻤﻬﺎ ﺑﺪﻻ ﻣﻦ ﳏﺎﻭﻟﺔ ﺗﻄﻮﻳﻊ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻭﺗﻮﺳﻴﻊ ﻧﻄﺎﻗﻬﺎ‪ ،‬ﻭﻫﺬﺍ ﻳﺘﺄﺗﻰ ﻣﻦ ﺧﻼﻝ ﺇﺟﺮﺍﺀ‬
‫ﺗﻌﺪﻳﻞ ﻋﻠﻴﻬﺎ ﻣﻦ ﺷﺄﻧﻪ ﺗﻮﺳﻴﻊ ﻧﻄﺎﻕ ﺍﻷﺷﻴﺎﺀ ﺍﻟﱵ ﺗﻜﻮﻥ ﻣﺸﻤﻮﻟﺔ ﺑﺎﻟﺘﻔﺘﻴﺶ ﻭﺗﻀﻤﻴﻨﻬﺎ ﻣﻦ ﺍﻷﺣﻜﺎﻡ ﲟﺎ‬
‫ﻳﺘﻼﺀﻡ ﻭﻣﺘﻄﻠﺒﺎﺕ ﻫﺬﻩ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳉﺪﻳﺪﺓ ‪،‬ﻓﺎﻟﻨﺼﻮﺹ ﺍﳋﺎﺻﺔ ﺑﺎﻟﺘﻔﺘﻴﺶ ﲟﻌﻨﺎﻩ ﺍﻟﺘﻘﻠﻴﺪﻱ ﻻ ﳝﻜﻦ ﺇﻋﻤﺎﳍﺎ‬
‫ﻣﺒﺎﺷﺮﺓ ﻋﻠﻰ ﺍﻟﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻷﻥ ﻗﻴﺎﺳﻬﺎ ﻋﻠﻰ ﺍﻷﺷﻴﺎﺀ ﺍﳌﺎﺩﻳﺔ ﺳﻴﻜﻮﻥ ﻣﻨﺎﻓﻴﺎ ﻟﻠﺸﺮﻋﻴﺔ ﺍﻹﺟﺮﺍﺋﻴﺔ‪.‬‬
‫ﻭﻳﺘﻀﺢ ﻣﻮﻗﻒ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻣﻦ ﺧﻼﻝ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﺍﳌﺘﻌﻠﻖ ﺑﺎﻟﻘﻮﺍﻋﺪ ﺍﳋﺎﺻﺔ ﻟﻠﻮﻗﺎﻳﺔ‬
‫ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭﺍﻹﺗﺼﺎﻝ ﻭﻣﻜﺎﻓﺤﺘﻬﺎ‪ ،‬ﺣﻴﻨﻤﺎ ﺃﺟﺎﺯ ﺻﺮﺍﺣﺔ ﺗﻔﺘﻴﺶ‬
‫ﺍﳌﻨﻈﻮﻣﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﺫﻟﻚ ﲟﻮﺟﺐ ﺍﳌﺎﺩﺓ ‪ 05‬ﻣﻨﻪ ﺍﻟﱵ ﻧﺼﺖ ﻋﻠﻰ ﺃﻧﻪ ﳚﻮﺯ ﻟﻠﺴﻠﻄﺎﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ‬
‫ﺍﳌﺨﺘﺼﺔ ﻭﻛﺬﺍ ﺿﺒﺎﻁ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﰲ ﺇﻃﺎﺭ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‪ ....‬ﺍﻟﺪﺧﻮﻝ ﺑﻐﺮﺽ‬
‫ﺍﻟﺘﻔﺘﻴﺶ ﻭﻟﻮ ﻋﻦ ﺑﻌﺪ ﺇﱃ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻭ ﺟﺰﺀ ﻣﻨﻬﺎ ﻭﻛﺬﺍ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﳌﺨﺰﻧﺔ ﻓﻴﻬﺎ‬
‫ﻭﻛﺬﺍ ﻣﻨﻈﻮﻣﺔ ﲣﺰﻳﻦ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫ﻭﺇﱃ ﺟﺎﻧﺐ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻗﺎﻡ ﺍﳌﺸﺮﻉ ﺍﻟﻔﺮﻧﺴﻲ ﺑﺘﻌﺪﻳﻞ ﺍﻟﻨﺼﻮﺹ ﺍﻟﱵ ﲢﻜﻢ ﺍﻟﺘﻔﺘﻴﺶ‬
‫ﻭﺃﺿﺎﻑ ﻋﺒﺎﺭﺓ "ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ" ﰲ ﺍﳌﺎﺩﺓ ‪ 94‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﲟﻮﺟﺐ ﺍﳌﺎﺩﺓ ‪42‬‬
‫ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ﺭﻗﻢ ‪ 2004/545‬ﺍﳌﺆﺭﺥ ﰲ ‪ 2004/06/21‬ﺍﳌﺘﻌﻠﻖ ﺑﺎﻟﺜﻘﺔ ﰲ ﺍﻹﻗﺘﺼﺎﺩ ﺍﻟﺮﻗﻤﻲ ﻟﻴﺼﺒﺢ ﻧﺺ‬

‫)‪(1‬ﻭﻣﺎ ﻳﺆﻳﺪ ﻫﺬﺍ ﺍﻟﺮﺃﻱ ﺃﻥ ﻫﺬﻩ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺗﻜﻮﻥ ﻋﻠﻰ ﺷﻜﻞ ﻧﺒﻀﺎﺕ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﻫﻲ ﰲ ﻫﺬﺍ ﺗﺸﺒﻪ ﺍﻟﺘﻴﺎﺭ ﺍﻟﻜﻬﺮﺑﺎﺋﻲ ﺍﻟﺬﻱ ﺇﻋﺘﱪﺗﻪ ﺑﻌﺾ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ‬
‫ﺃﺷﻴﺎﺀ ﻣﺎﺩﻳﺔ ﻣﻨﻘﻮﻟﺔ ﻭﻋﺎﻗﺒﺖ ﻋﻠﻰ ﺍﻹﺳﺘﺨﺪﺍﻡ ﺍﻟﻘﺎﻧﻮﱐ ﻟﻪ‪.‬‬
‫)‪(2‬ﻓﺎﳌﺎﺩﺓ ‪ 487‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﻜﻨﺪﻱ ﺗﻘﻀﻲ ﺑﺈﻣﻜﺎﻧﻴﺔ ﺇﺻﺪﺍﺭ ﺃﻣﺮ ﻗﻀﺎﺋﻲ ﻟﺘﻔﺘﻴﺶ ﻭﺿﺒﻂ ﺃﻱ ﺷﻲﺀ ﺗﺘﻮﺍﻓﺮ ﺑﺸﺄﻧﻪ ﺃﺳﺲ ﻭﻣﱪﺭﺍﺕ ﻣﻌﻘﻮﻟﺔ ﺗﺪﻋﻮ ﺇﱃ‬
‫ﺍﻹﻋﺘﻘﺎﺩ ﺑﺄﻥ ﺍﳉﺮﳝﺔ ﻗﺪ ﻭﻗﻌﺖ ﺃﻭ ﻳﺸﺘﺒﻪ ﰲ ﻭﻗﻮﻋﻬﺎ ﺃﻭ ﻫﻨﺎﻙ ﻧﻴﺔ ﻹﺳﺘﺨﺪﺍﻣﻪ ﰲ ﺇﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﺃﻭ ﺃﻧﻪ ﻳﺴﺘﻨﺘﺞ ﺩﻟﻴﻼ ﻋﻠﻰ ﻭﻗﻮﻉ ﺍﳉﺮﳝﺔ ﻓﺈﻥ ﺍﻟﻔﻘﻪ‬
‫ﺍﻟﻜﻨﺪﻱ ﰲ ﺗﻔﺴﲑﻩ ﳍﺬﻩ ﺍﳌﺎﺩﺓ ﻭﺳﻊ ﻣﻦ ﻧﻄﺎﻗﻬﺎ ﺇﱃ ﺣﺪ ﻳﺴﻤﺢ ﺑﺘﻔﺘﻴﺶ ﺑﻴﺎﻧﺎﺕ ﻭﻧﻈﻢ ﺍﳊﺎﺳﻮﺏ ﻏﲑ ﺍﳌﺎﺩﻳﺔ ‪.‬‬

‫‪- 147 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻫﺬﻩ ﺍﳌﺎﺩﺓ ﻋﻠﻰ ﺍﻟﻨﺤﻮ ﺍﻟﺘﺎﱄ‪ ":‬ﻳﺒﺎﺷﺮ ﺍﻟﺘﻔﺘﻴﺶ ﰲ ﲨﻴﻊ ﺍﻷﻣﺎﻛﻦ ﺍﻟﱵ ﳝﻜﻦ ﺍﻟﻌﺜﻮﺭ ﻓﻴﻬﺎ ﻋﻠﻰ ﺃﺷﻴﺎﺀ ﺃﻭ‬
‫ﻣﻌﻄﻴﺎﺕ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﻳﻜﻮﻥ ﻛﺸﻔﻬﺎ ﻣﻔﻴﺪﺍ ﻹﻇﻬﺎﺭ ﺍﳊﻘﻴﻘﺔ"‪.‬‬
‫ﻭﻳﻨﺺ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻹﻧﻜﻠﻴﺰﻱ ﺍﳌﺘﻌﻠﻖ ﺑﺈﺳﺎﺀﺓ ﺇﺳﺘﺨﺪﺍﻡ ﺍﳊﺎﺳﻮﺏ ﻋﻠﻰ ﺟﻮﺍﺯ ﺗﻔﺘﻴﺶ ﻧﻈﻢ‬
‫ﺍﳊﺎﺳﻮﺏ ﺍﳌﺎﺩﻳﺔ ﻭﺍﳌﻌﻨﻮﻳﺔ‪ ،‬ﻭﺇﻋﺘﱪ ﻫﺬﺍ ﺍﻟﻘﺎﻧﻮﻥ ﺃﻥ ﺇﺟﺮﺍﺀﺍﺕ ﺗﻔﺘﻴﺶ ﻧﻈﻢ ﺍﳊﺎﺳﻮﺏ ﰲ ﺟﺮﺍﺋﻢ ﺍﻟﻮﻟﻮﺝ‬
‫ﺃﻭ ﺍﻟﺘﻌﺪﻳﻞ ﻏﲑ ﺍﳌﺼﺮﺡ ﺑﻪ ﻋﻠﻰ ﺃﻧﻈﻤﺔ ﺍﳊﺎﺳﻮﺏ ﺗﺘﻢ ﺩﻭﻥ ﺇﺫﻥ ﻃﺎﳌﺎ ﻛﺎﻥ ﻫﺪﻑ ﺍﻟﻮﻟﻮﺝ ﺇﺭﺗﻜﺎﺏ‬
‫ﺃﻓﻌﺎﻝ ﻏﲑ ﻣﺸﺮﻭﻋﺔ ﻋﻦ ﻗﺼﺪ‪ ،‬ﺃﻣﺎ ﺇﺫﺍ ﻛﺎﻥ ﺍﻟﻮﻟﻮﺝ ﳎﺮﺩﺍ ﺩﻭﻥ ﻧﻴﺔ ﺇﺭﺗﻜﺎﺏ ﺃﻓﻌﺎﻝ ﻏﲑ ﻣﺸﺮﻭﻋﺔ ﻓﺈﻥ‬
‫ﺍﻟﺘﻔﺘﻴﺶ ﳑﻜﻦ ﻭﻟﻜﻦ ﺑﺈﺫﻥ ﻗﻀﺎﺋﻲ‪.‬‬
‫ﻭﰲ ﻫﺬﺍ ﺍﻟﺼﺪﺩ ﺻﺮﺣﺖ ﺍﻹﺗﻔﺎﻗﻴﺔ ﺍﻷﺭﻭﺑﻴﺔ ﰲ ﺷﺄﻥ ﺟﺮﺍﺋﻢ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﲝﻖ ﺍﻟﺪﻭﻝ‬
‫ﺍﻷﻋﻀﺎﺀ ﰲ ﺗﻔﺘﻴﺶ ﺍﻟﻨﻈﻢ ﰲ ﺇﻃﺎﺭ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‪ ،‬ﻭﺫﻟﻚ ﻣﻦ ﺧﻼﻝ ﺍﻟﻔﻘﺮﺓ ﺍﻷﻭﱃ ﻣﻦ ﺍﳌﺎﺩﺓ ‪19‬‬
‫ﻣﻦ ﺍﻟﻘﺴﻢ ﺍﻟﺮﺍﺑﻊ ﺃﻳﻦ ﻧﺼﺖ ﻋﻠﻰ ﺃﻧﻪ ﻟﻜﻞ ﺩﻭﻟﺔ ﻃﺮﻑ ﺍﳊﻖ ﰲ ﺃﻥ ﺗﺴﻦ ﻣﻦ ﺍﻟﻘﻮﺍﻧﲔ ﻣﺎ ﻫﻮ ﺿﺮﻭﺭﻱ‬
‫ﻟﺘﻤﻜﲔ ﺍﻟﺴﻠﻄﺎﺕ ﺍﳌﺨﺘﺼﺔ ﺑﺎﻟﺘﻔﺘﻴﺶ ﺃﻭ ﺍﻟﺪﺧﻮﻝ ﺇﱃ‪:‬‬
‫‪ -‬ﻧﻈﺎﻡ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﺃﻭ ﺟﺰﺀ ﻣﻨﻪ ﺃﻭ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺨﺰﻧﺔ ﻓﻴﻪ‪.‬‬
‫‪ -‬ﺍﻟﻮﺳﺎﺋﻂ ﺍﻟﱵ ﻳﺘﻢ ﲣﺰﻳﻦ ﻣﻌﻠﻮﻣﺎﺕ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ‪‬ﺎ ﻣﺎ ﺩﺍﻣﺖ ﳐﺰﻧﺔ ﰲ ﺇﻗﻠﻴﻤﻬﺎ‪.‬‬
‫‪/3.1‬ﺗﻔﺘﻴﺶ ﺍﻟﺸﺒﻜﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﳌﺘﺼﻠﺔ ﺑﺎﳊﺎﺳﻮﺏ‪ ‬ﺍﻟﺘﻔﺘﻴﺶ ﻋﻦ ﺑﻌﺪ"‪ :‬ﺗﻌﺮﻑ ﺍﻟﺸﺒﻜﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﺄ‪‬ﺎ ﳎﻤﻮﻋﺔ ﻣﻜﻮﻧﺔ ﻣﻦ ﺇﺛﻨﲔ ﻓﺄﻛﺜﺮ ﻣﻦ ﺃﺟﻬﺰﺓ ﺍﳊﺎﺳﻮﺏ ﻭﺍﳌﺘﺼﻠﺔ ﺑﺒﻌﻀﻬﺎ ﺇﺗﺼﺎﻻ ﺳﻠﻜﻴﺎ‬
‫) ‪(1‬‬
‫ﺃﻭ ﻻ ﺳﻠﻜﻴﺎ‪ .‬ﻭﻗﺪ ﺗﻜﻮﻥ ﺍﻷﺟﻬﺰﺓ ﻣﻮﺟﻮﺩﺓ ﰲ ﻧﻔﺲ ﺍﳌﻮﻗﻊ ﻭﺗﺴﻤﻰ ﺑﺎﻟﺸﺒﻜﺔ ﺍﶈﻠﻴﺔ ) ‪local Area‬‬
‫‪،(Net worh-LAN‬ﻭﻗﺪ ﺗﻜﻮﻥ ﻣﻮﺯﻋﺔ ﰲ ﺃﻣﺎﻛﻦ ﻣﺘﻔﺮﻗﺔ ﻳﺘﻢ ﺭﺑﻄﻬﺎ ﻋﻦ ﻃﺮﻳﻖ ﺧﻄﻮﻁ ﺍﳍﺎﺗﻒ‬
‫) ‪(2‬‬
‫)‪.(Wide Area-Net werh-WAN‬‬ ‫ﻭﺗﺴﻤﻰ ﺑﺎﻟﺸﺒﻜﺔ ﺑﻌﻴﺪﺓ ﺍﳌﺪﻯ‬

‫)‪(1‬ﻋﻠﻲ ﺣﺴﻦ ﳏﻤﺪ ﺍﻟﻄﻮﺍﻟﺒﺔ ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،.‬ﺹ‪34‬‬


‫)‪(2‬ﻳﺘﻢ ﺍﻹﺗﺼﺎﻝ ﺃﻭ ﻧﻘﻞ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﻮﺍﺳﻄﺔ ﺍﻟﺸﺒﻜﻴﺔ ﺑﺄﺷﻜﺎﻝ ﺛﻼﺙ ﻫﻲ‪:‬‬
‫ﺇﺗﺼﺎﻝ ﺃﺣﺎﺩﻱ ﺍﳉﺎﻧﺐ )‪ (Simplex‬ﻭﻳﺘﻢ ﻫﺬﺍ ﺍﻹﺗﺼﺎﻝ ﺑﲔ ﺟﻬﺎﺯ ﺍﳊﺎﺳﻮﺏ ﺍﳌﺴﺘﻔﻴﺪ ﻣﻊ ﺟﻬﺎﺯ ﻣﺮﻛﺰﻱ‪.‬‬
‫ﺇﺗﺼﺎﻝ ﺛﻨﺎﺋﻲ ﻏﲑ ﻛﺎﻣﻞ ﺍﳌﻌﻠﻮﻣﺎﺕ )‪ (Half Duplex‬ﻭﻳﺘﻢ ﺍﻹﺗﺼﺎﻝ ﺑﲔ ﺟﻬﺎﺯﻳﻦ ﻳﺮﺳﻞ ﺍﻷﻭﻝ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﻟﺜﺎﱐ ﻳﺴﺘﻘﺒﻠﻬﺎ ﻭﺑﻌﺪ ﺇﻧﺘﻬﺎﺀ ﺍﻷﻭﻝ ﻳﻘﻮﻡ‬
‫ﺍﻟﺜﺎﱐ ﺑﺈﺭﺳﺎﻝ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﻳﺴﺘﻘﺒﻠﻬﺎ ﺍﻷﻭﻝ ﻭﻫﻜﺬﺍ ﻟﻜﻦ ﻻ ﻳﺴﺘﻄﻴﻊ ﺍﻹﺛﻨﺎﻥ ﺍﻟﺘﺨﺎﻃﺐ "ﺍﻹﺭﺳﺎﻝ ﻭﺍﻹﺳﺘﻘﺒﺎﻝ" ﰲ ﺁﻥ ﻭﺍﺣﺪ‪.‬‬
‫ﺇﺗﺼﺎﻝ ﺛﻨﺎﺋﻲ ﻛﺎﻣﻞ ﺍﳌﻌﻠﻮﻣﺎﺕ )‪ (Full Duplex‬ﻭﻳﺘﻢ ﺍﻹﺗﺼﺎﻝ ﺑﻮﺍﺳﻄﺘﻪ ﺑﲔ ﺟﻬﺎﺯﻳﻦ ﺍﻹﺭﺳﺎﻝ ﻭﺍﻹﺳﺘﻘﺒﺎﻝ ﰲ ﻧﻔﺲ ﺍﻟﻮﻗﺖ‪.‬‬

‫‪- 148 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﻣﻊ ﺍﻟﺘﻄﻮﺭ ﺍﻟﺘﻜﻨﻮﻟﻮﺟﻲ ﻟﺜﻮﺭﺓ ﺍﻹﺗﺼﺎﻻﺕ ﱂ ﻳﻌﺪ ﻧﻄﺎﻕ ﺍﻹﺗﺼﺎﻻﺕ ﳏﺪﻭﺩﺍ ﰲ ﺇﻗﻠﻴﻢ ﺩﻭﻟﺔ‬
‫ﻭﺍﺣﺪﺓ‪ ،‬ﺑﻞ ﺇﻣﺘﺪ ﻟﻴﺸﻤﻞ ﻛﻞ ﺃﺭﺟﺎﺀ ﺍﻟﻌﺎﱂ ﺑﻌﺪ ﻇﻬﻮﺭ ﺷﺒﻜﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻭﺍﻟﱵ ﻫﻲ ﻋﺒﺎﺭﺓ ﻋﻦ ﻣﻨﻈﻮﻣﺔ‬
‫ﻭﺍﺳﻌﺔ ﺟﺪﺍ ﻣﻦ ﺷﺒﻜﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳊﺎﺳﻮﺑﻴﺔ ﺍﳌﺘﺼﻠﺔ ﻣﻊ ﺑﻌﺾ ﺍﻟﺒﻌﺾ ﺑﻄﺮﻳﻘﺔ ﻻ ﻣﺮﻛﺰﻳﺔ‪ ،‬ﻭﻳﺪﺧﻞ‬
‫ﰲ ﺗﺮﻛﻴﺐ ﻫﺬﻩ ﺍﻟﺸﺒﻜﺔ ﻣﻼﻳﲔ ﺍﳊﻮﺍﺳﻴﺐ ﺍﳌﻮﺯﻋﺔ ﻋﱪ ﳐﺘﻠﻒ ﺩﻭﻝ ﺍﻟﻌﺎﱂ‪.‬‬
‫ﻭﺍﻟﺴﺆﺍﻝ ﺍﳌﻄﺮﻭﺡ ﰲ ﻫﺬﺍ ﺍﻟﺼﺪﺩ ﻳﺘﻌﻠﻖ ﲟﺪﻯ ﺧﻀﻮﻉ ﺷﺒﻜﺎﺕ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﺘﻔﺘﻴﺶ‬
‫ﺑﻌﺪ)‪(Perquisitionsadistence‬‬ ‫ﻭﻫﻲ ﻣﺴﺄﻟﺔ ﻋﻠﻰ ﺩﺭﺟﺔ ﻛﺒﲑﺓ ﻣﻦ ﺍﳋﻄﻮﺭﺓ ﺗﺘﻌﻠﻖ ﺑﺎﻟﺘﻔﺘﻴﺶ ﻋﻦ‬
‫ﻭﺫﻟﻚ ﻧﺘﻴﺠﺔ ﻟﻠﻄﺒﻴﻌﺔ ﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺍﻟﱵ ﺗﺴﻤﺢ ﺑﺘﻮﺯﻳﻊ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﱵ ﲢﺘﻮﻱ ﺃﺩﻟﺔ ﻋﱪ‬
‫ﺷﺒﻜﺎﺕ ﺣﺎﺳﻮﺑﻴﺔ ﰲ ﺃﻣﺎﻛﻦ ﳎﻬﻮﻟﺔ ﺑﻌﻴﺪﺍ ﲤﺎﻣﺎ ﻋﻦ ﺍﳌﻮﻗﻊ ﺍﳌﺎﺩﻱ ﻟﻠﺘﻔﺘﻴﺶ‪،‬ﻓﻘﺪ ﻳﻜﻮﻥ ﺍﳌﻮﻗﻊ ﺍﻟﻔﻌﻠﻲ‬
‫ﻟﻠﺸﺒﻜﺎﺕ ﺩﺍﺧﻞ ﺇﺧﺘﺼﺎﺹ ﻗﻀﺎﺋﻲ ﺁﺧﺮ ﻭﺣﱴ ﰲ ﺑﻠﺪ ﺁﺧﺮ‪ ،‬ﻭﻫﻮ ﻣﺎ ﻳﺰﻳﺪ ﺍﳌﺴﺄﻟﺔ ﺗﻌﻘﻴﺪﺍ ﺑﺈﻋﺘﺒﺎﺭ ﺃﻥ‬
‫ﺍﻟﺸﺒﻜﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﳑﺘﺪﺓ ﰲ ﺃﺭﺟﺎﺀ ﺍﻟﻌﺎﱂ ﺗﻘﺮﻳﺒﺎ‪ ،‬ﻭﺑﺎﻟﺘﺎﱄ ﻓﺈﻥ ﺍﳊﺎﺳﻮﺏ ﺃﻭ ﺍﻟﻨﻬﺎﻳﺔ ﺍﻟﻄﺮﻓﻴﺔ ﺍﻟﱵ ﳝﻜﻦ‬
‫) ‪(1‬‬
‫ﺃﻥ ﺗﺮﺗﻜﺐ ﻋﻠﻴﻬﺎ ﺃﻭ ﺑﻮﺍﺳﻄﺘﻬﺎ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﲣﻀﻊ ﻟﻠﻘﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺋﻲ ﺍﳋﺎﺹ ﺑﺘﻠﻚ ﺍﳌﻨﻄﻘﺔ‪.‬‬
‫ﻟﺬﻟﻚ ﻳﺜﺎﺭ ﺍﻟﺘﺴﺎﺅﻝ ﺣﻮﻝ ﺃﺛﺮ ﺗﻔﺘﻴﺶ ﺍﻷﻧﻈﻤﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﳌﺘﺼﻠﺔ ﺑﺎﻟﻨﻈﺎﻡ ﺍﳌﺄﺫﻭﻥ ﺑﺘﻔﺘﻴﺸﻪ ﺇﺫﺍ‬
‫ﺗﻮﺍﺟﺪﺕ ﰲ ﺩﻭﺍﺋﺮ ﺇﺧﺘﺼﺎﺹ ﳐﺘﻠﻔﺔ‪ .‬ﻭﻧﺴﺘﻄﻴﻊ ﺃﻥ ﳕﻴﺰ ﰲ ﻫﺬﻩ ﺍﻟﺼﻮﺭﺓ ﺑﲔ ﺇﺣﺘﻤﺎﻟﲔ ﻋﻠﻰ ﺍﻟﻨﺤﻮ‬
‫ﺍﻟﺘﺎﱄ‪:‬‬
‫‪/1.3‬ﺇﺗﺼﺎﻝ ﺣﺎﺳﺐ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﺃﻭ ﺍﳌﺘﻬﻢ ﲝﺎﺳﺐ ﺁﺧﺮ ﺃﻭ ‪‬ﺎﻳﺔ ﻃﺮﻓﻴﺔ ﻣﻮﺟﻮﺩﺓ ﰲ ﻣﻜﺎﻥ ﺁﺧﺮ‬
‫ﺩﺍﺧﻞ ﺍﻟﺪﻭﻟﺔ‪،‬ﻭﻫﻨﺎ ﻳﺜﻮﺭ ﺍﻟﺘﺴﺎﺅﻝ ﺣﻮﻝ ﻣﺪﻯ ﺇﻣﻜﺎﻧﻴﺔ ﺇﻣﺘﺪﺍﺩ ﺍﳊﻖ ﰲ ﺍﻟﺘﻔﺘﻴﺶ ﺇﱃ ﺃﺟﻬﺰﺓ ﺍﳊﺎﺳﻮﺏ‬
‫ﺍﳌﺘﺼﻠﺔ ﲜﻬﺎﺯ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﺃﻭ ﺍﳌﺘﻬﻢ‪ .‬ﻭﰲ ﻫﺬﻩ ﺍﳊﺎﻟﺔ ﻋﻤﺪﺕ ﺑﻌﺾ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺇﱃ ﺣﻞ ﻫﺬﻩ‬
‫ﺍﳌﺸﻜﻠﺔ ﻣﻦ ﺧﻼﻝ ﻧﺼﻬﺎ ﻋﻠﻰ ﺇﺟﺎﺯﺓ ﺗﻔﺘﻴﺶ ﻧﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺘﺼﻠﺔ ﺑﺎﳊﺎﺳﻮﺏ ﺍﻟﺬﻱ ﳚﺮﻱ ﺗﻔﺘﻴﺸﻪ‬
‫)ﺃﻱ ﺍﻟﺸﺒﻜﺔ ﻭﻣﺎ ﻳﺘﺼﻞ ‪‬ﺎ(‪ ،‬ﻭﺗﺴﺠﻴﻞ ﻛﻞ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻟﻼﺯﻣﺔ ﻛﺄﺩﻟﺔ ﺇﺛﺒﺎﺕ ﻹﺩﺍﻧﺔ ﺍﳌﺘﻬﻢ ﺃﻣﺎﻡ ﺍﶈﻜﻤﺔ‪.‬‬
‫ﻭﻳﻌﺘﱪ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻣﻦ ﺑﲔ ﻫﺬﻩ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺣﲔ ﻧﺼﺖ ﺍﻟﻔﻘﺮﺓ ﺍﻟﺜﺎﻧﻴﺔ ﻣﻦ ﺍﳌﺎﺩﺓ ‪ 05‬ﻣﻦ‬
‫ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﺑﺄﻧﻪ ﰲ ﺣﺎﻟﺔ ﺗﻔﺘﻴﺶ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻭ ﺟﺰﺀ ﻣﻨﻬﺎ ﻭﻛﺬﺍ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﺍﳌﺨﺰﻧﺔ ﻓﻴﻬﺎ ﺇﺫﺍ ﻛﺎﻧﺖ ﻫﻨﺎﻙ ﺃﺳﺒﺎﺏ ﺗﺪﻋﻮ ﻟﻺﻋﺘﻘﺎﺩ ﺑﺄﻥ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﺒﺤﻮﺙ ﻋﻨﻬﺎ ﳐﺰﻧﺔ ﰲ ﻣﻨﻈﻮﻣﺔ‬
‫ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﺧﺮﻯ ﻭﺃﻥ ﻫﺬﻩ ﺍﳌﻌﻄﻴﺎﺕ ﳝﻜﻦ ﺍﻟﺪﺧﻮﻝ ﺇﻟﻴﻬﺎ ﺇﻧﻄﻼﻗﺎ ﻣﻦ ﺍﳌﻨﻈﻮﻣﺔ ﺍﻷﻭﱃ‪ ،‬ﳚﻮﺯ ﲤﺪﻳﺪ‬
‫ﺍﻟﺘﻔﺘﻴﺶ ﺑﺴﺮﻋﺔ ﺇﱃ ﻫﺬﻩ ﺍﳌﻨﻈﻮﻣﺔ ﺃﻭ ﺟﺰﺀ ﻣﻨﻬﺎ ﺑﻌﺪ ﺇﻋﻼﻡ ﺍﻟﺴﻠﻄﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﺨﺘﺼﺔ ﻣﺴﺒﻘﺎ ﺑﺬﻟﻚ"‪.‬‬

‫)‪(1‬ﻋﻠﻲ ﺣﺴﻦ ﺍﻟﻄﻮﺍﻟﺒﺔ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ ﺹ‪.،42‬‬

‫‪- 149 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﺇﱃ ﺟﺎﻧﺐ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﳒﺪ ﺍﳌﺸﺮﻉ ﺍﻷﳌﺎﱐ ﰲ ﺍﳌﺎﺩﺓ ‪ 103‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‬
‫ﺍﻷﳌﺎﱐ ﻳﻨﺺ ﻋﻠﻰ ﺇﻣﻜﺎﻧﻴﺔ ﺇﻣﺘﺪﺍﺩ ﺍﻟﺘﻔﺘﻴﺶ ﺇﱃ ﺳﺠﻼﺕ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻟﱵ ﺗﻜﻮﻥ ﰲ ﻣﻮﻗﻊ ﺁﺧﺮ‪ ،‬ﻭﻛﺬﻟﻚ‬
‫ﺍﳌﺸﺮﻉ ﺍﻟﺒﻠﺠﻴﻜﻲ ﰲ ﺍﳌﺎﺩﺓ ‪88‬ﻣﻨﻘﺎﻧﻮﻥ ﲢﻘﻴﻖ ﺍﳉﻨﺎﻳﺎﺕ ﺍﻟﺒﻠﺠﻴﻜﻲ ﺍﻟﱵ ﺗﻨﺺ ﻋﻠﻰ" ﺇﺫﺍ ﺃﻣﺮ ﻗﺎﺿﻲ‬
‫ﺍﻟﺘﺤﻘﻴﻖ ﺑﺎﻟﺘﻔﺘﻴﺶ ﰲ ﻧﻈﺎﻡ ﻣﻌﻠﻮﻣﺎﰐ ﺃﻭ ﰲ ﺟﺰﺀ ﻣﻨﻪ ﻓﺈﻥ ﺍﻟﺒﺤﺚ ﳝﻜﻦ ﺃﻥ ﳝﺘﺪ ﺇﱃ ﻧﻈﺎﻡ ﻣﻌﻠﻮﻣﺎﰐ‬
‫) ‪(1‬‬
‫ﺁﺧﺮ ﻳﻮﺟﺪ ﰲ ﻣﻜﺎﻥ ﺁﺧﺮ ﻏﲑ ﻣﻜﺎﻥ ﺍﻟﺒﺤﺚ ﺍﻷﺻﻠﻲ‪".‬‬
‫ﻭﺍﳌﺸﺮﻉ ﺍﻟﻔﺮﻧﺴﻲ ﺣﺴﻢ ﻫﺬﻩ ﺍﳌﺴﺄﻟﺔ ﺃﻳﻀﺎ ﲟﻨﺎﺳﺒﺔ ﺗﻌﺪﻳﻠﻪ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﲟﻮﺟﺐ‬
‫ﺍﻟﻘﺎﻧﻮﻥ ‪ 2003/239‬ﺍﳌﺘﻌﻠﻖ ﺑﺎﻷﻣﻦ ﺍﻟﺪﺍﺧﻠﻲ ﺍﻟﺼﺎﺩﺭ ﰲ ‪ 2003/03/18‬ﺍﻟﺬﻱ ﺃﺟﺎﺯﺕ ﺍﳌﺎﺩﺓ ‪ 17‬ﻣﻨﻪ‬
‫ﻟﻀﺒﺎﻁ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺃﻭ ﲢﺖ ﻣﺴﺆﻭﻟﻴﺎ‪‬ﻢ ﺃﻋﻮﺍﻥ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﰲ ﺇﻃﺎﺭ ﺍﻟﺘﻔﺘﻴﺶ ﺍﳌﻨﺼﻮﺹ‬
‫ﻋﻠﻴﻪ ﺍﻟﺪﺧﻮﻝ ﻋﻦ ﻃﺮﻳﻖ ﺍﻷﻧﻈﻤﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﳌﺜﺒﺘﺔ ﰲ ﺍﻷﻣﺎﻛﻦ ﺍﻟﱵ ﻓﻴﻬﺎ ﺍﻟﺘﻔﺘﻴﺶ ﻋﻠﻰ ﺍﳌﻌﻄﻴﺎﺕ ﺍﻟﱵ‬
‫‪‬ﻢ ﺍﻟﺘﺤﻘﻴﻖ ﻭﺍﳌﺨﺰﻧﺔ ﰲ ﺍﻟﻨﻈﺎﻡ ﺍﳌﺬﻛﻮﺭ ﺃﻭ ﰲ ﺃﻱ ﻧﻈﺎﻡ ﻣﻌﻠﻮﻣﺎﰐ ﺁﺧﺮ‪ ،‬ﲟﺎ ﺃﻥ ﻫﺬﻩ ﺍﳌﻌﻄﻴﺎﺕ ﻳﺘﻢ‬
‫) ‪(2‬‬
‫ﺍﻟﺪﺧﻮﻝ ﺇﻟﻴﻬﺎ ﺃﻭ ﺗﻜﻮﻥ ﻣﺘﺎﺣﺔ ﺇﻧﻄﻼﻗﺎ ﻣﻦ ﺍﻟﻨﻈﺎﻡ ﺍﻟﺮﺋﻴﺴﻲ‬
‫ﻭﺗﺴﻤﺢ ﺍﻹﺗﻔﺎﻗﻴﺔ ﺍﻷﻭﺭﻭﺑﻴﺔ ﳉﺮﺍﺋﻢ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻟﻌﺎﻡ ‪ 2001‬ﻟﻠﺪﻭﻝ ﺍﻷﻋﻀﺎﺀ ﺃﻥ ﲤﺪ ﻧﻈﺎﻕ‬
‫ﺍﻟﺘﻔﺘﻴﺶ ﺍﻟﺬﻱ ﻛﺎﻥ ﳏﻠﻪ ﺟﻬﺎﺯ ﻛﻮﻣﺒﻴﻮﺗﺮ ﻣﻌﲔ ﺇﱃ ﻏﲑﻩ ﻣﻦ ﺍﻷﺟﻬﺰﺓ ﺍﳌﺮﺗﺒﻄﺔ ﺑﻪ ﰲ ﺣﺎﻝ ﺍﻹﺳﺘﻌﺠﺎﻝ‬
‫ﺇﺫﺍ ﻛﺎﻥ ﻳﺘﻮﺍﺟﺪ ﺑﻪ ﻣﻌﻠﻮﻣﺎﺕ ﻳﺘﻢ ﺍﻟﺪﺧﻮﻝ ﺇﻟﻴﻬﺎ ﰲ ﻫﺬﺍ ﺍﳉﻬﺎﺯ ﻣﻦ ﺧﻼﻝ ﺍﳉﻬﺎﺯ ﳏﻞ ﺍﻟﺘﻔﺘﻴﺶ)‪.(3‬‬
‫‪/2.3‬ﺇﺗﺼﺎﻝ ﺣﺎﺳﺐ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﺃﻭ ﺍﳌﺘﻬﻢ ﲝﺎﺳﺐ ﺁﺧﺮ ﺃﻭ ‪‬ﺎﻳﺔ ﻃﺮﻓﻴﺔ ﻣﻮﺟﻮﺩﺓ ﰲ ﻣﻜﺎﻥ ﺁﺧﺮ‬
‫ﺧﺎﺭﺝ ﺍﻟﺪﻭﻟﺔ‪ ،‬ﻭﻫﻨﺎ ﻣﻦ ﺍﳌﺘﺼﻮﺭ ﻃﺒﻘﺎ ﳍﺬﺍ ﺍﻹﺣﺘﻤﺎﻝ ﺃﻥ ﻳﻘﻮﻡ ﻣﺮﺗﻜﺒﻮﺍ ﺍﳉﺮﺍﺋﻢ ﺑﺘﺨﺰﻳﻦ ﺑﻴﺎﻧﺎ‪‬ﻢ ﰲ‬
‫ﺃﻧﻈﻤﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﺧﺎﺭﺝ ﺍﻟﺪﻭﻟﺔ ﻋﻦ ﻃﺮﻳﻖ ﺷﺒﻜﺎﺕ ﺍﻹﺗﺼﺎﻝ ﺍﻟﺒﻌﻴﺪﺓ ‪‬ﺪﻑ ﻋﺮﻗﻠﺔ ﺳﻠﻄﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ‬
‫) ‪(4‬‬
‫ﰲ ﲨﻊ ﺍﻷﺩﻟﺔ‪.‬‬

‫)‪(1‬ﺧﺎﻟﺪ ﳑﺪﻭﺡ ﺇﺑﺮﺍﻫﻴﻢ‪ ،‬ﻓﻦ ﺍﻟﺘﺤﻘﻴﻖ ﺍﳉﻨﺎﺋﻲ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.203‬‬
‫‪(2)voire plus Myriam QUENER.joél FERRY. Cybercriminalité Défi mondial 2em edition 2009 p2‬‬
‫)‪(3‬ﺗﻨﺺ ﺍﳌﺎﺩﺓ ‪ 2/19‬ﻣﻦ ﺍﻟﻘﺴﻢ ﺍﻟﺮﺍﺑﻊ ﻋﻠﻰ ﺃﻧﻪ ﻣﻦ ﺣﻖ ﺍﻟﺴﻠﻄﺔ ﺍﻟﻘﺎﺋﻤﺔ ﺑﺘﻔﺘﻴﺶ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﺍﳌﺘﻮﺍﺟﺪ ﰲ ﺩﺍﺋﺮﺓ ﺇﺧﺘﺼﺎﺻﻬﺎ ﺃﻥ ﺗﻘﻮﻡ ﰲ ﺣﺎﻟﺔ‬
‫ﺍﻹﺳﺘﻌﺠﺎﻝ ﲟﺪ ﻧﻄﺎﻕ ﺍﻟﺘﻔﺘﻴﺶ ﺇﱃ ﺃﻱ ﺟﻬﺎﺯ ﺁﺧﺮ ﺇﺫﺍ ﻛﺎﻧﺖ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺨﺰﻧﺔ ﻳﺘﻢ ﺍﻟﺪﺧﻮﻝ ﺇﻟﻴﻬﺎ ﻣﻦ ﺍﳊﺎﺳﺐ ﺍﻷﺻﻠﻲ ﳏﻞ ﺍﻟﺘﻔﺘﻴﺶ‪.‬‬
‫)‪(4‬ﻋﺒﺪ ﺍﷲ ﺣﻠﻴﺲ ﻋﻠﻲ ﳏﻤﻮﺩ‪ ،‬ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻷﺩﻟﺔ ﰲ ﳎﺎﻝ ﺳﺮﻗﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﲝﺚ ﻣﻨﺸﻮﺭ ﻋﻠﻰ ﻣﻮﻗﻊ‪www.arablawinfo.com:‬‬

‫‪- 150 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻓﻤﻦ ﺍﳌﺸﺎﻛﻞ ﺍﳊﻘﻴﻘﻴﺔ ﺍﻟﱵ ﺗﻮﺍﺟﻪ ﺟﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﲨﻊ ﺍﻷﺩﻟﺔ‪ ،‬ﺣﺎﻟﺔ ﺗﻄﻠﺐ ﺇﻣﺘﺪﺍﺩ ﺍﻹﺫﻥ‬
‫ﺑﺎﻟﺘﻔﺘﻴﺶ ﺇﱃ ﺧﺎﺭﺝ ﺍﻹﻗﻠﻴﻢ ﺍﳉﻐﺮﺍﰲ ﻟﻠﺪﻭﻟﺔ ﺍﻟﱵ ﺻﺪﺭ ﻋﻦ ﺟﻬﺎ‪‬ﺎ ﺍﳌﺨﺘﺼﺔ ﺍﻹﺫﻥ ﺑﺎﻟﺘﻔﺘﻴﺶ‪ ،‬ﻭﺩﺧﻮﻟﻪ‬
‫ﰲ ﺍ‪‬ﺎﻝ ﺍﳉﻐﺮﺍﰲ ﻟﺪﻭﻟﺔ ﺃﺧﺮﻯ‪ .‬ﻭﻫﻮ ﻣﺎﻳﺴﻤﻰ ﺑﺎﻟﺘﻔﺘﻴﺶ ﺍﻟﻌﺎﺑﺮ ﻟﻠﺤﺪﻭﺩ‪ ،‬ﻭﻗﺪ ﻳﺘﻌﺬﺭ ﺍﻟﻘﻴﺎﻡ ﺑﻪ ﺑﺴﺒﺐ‬
‫ﲤﺴﻚ ﻛﻞ ﺩﻭﻟﺔ ﺑﺴﻴﺎﺩ‪‬ﺎ ﻭﺣﺪﻭﺩﻫﺎ ﺍﻹﻗﻠﻴﻤﻴﺔ‪.‬‬
‫ﻟﺬﺍ ﻓﺈﻥ ﺟﺎﻧﺒﺎ ﻣﻦ ﺍﻟﻔﻘﻪ ﻳﺮﻯ ﺃﻥ ﺍﻟﺘﻔﺘﻴﺶ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﻟﻌﺎﺑﺮ ﻟﻠﺤﺪﻭﺩ ﻳﻨﺒﻐﻲ ﺃﻥ ﻳﺘﻢ ﰲ ﺇﻃﺎﺭ‬
‫ﺇﺗﻔﺎﻗﻴﺎﺕ ﺗﻌﺎﻭﻥ ﺧﺎﺻﺔ ﺛﻨﺎﺋﻴﺔ ﺃﻭ ﺩﻭﻟﻴﺔ ﲡﻴﺰ ﻫﺬﺍ ﺍﻹﻣﺘﺪﺍﺩ‪ ،‬ﻭﺃﻧﻪ ﻻ ﳚﻮﺯ ﺍﻟﻘﻴﺎﻡ ﺑﻪ ﰲ ﻇﻞ ﻏﻴﺎﺏ ﺗﻠﻚ‬
‫ﺍﻹﺗﻔﺎﻗﻴﺎﺕ‪(1)،‬ﻭﻭﻓﻘﺎ ﳌﺎ ﺟﺎﺀ ﺑﺘﻘﺮﻳﺮ ﺍ‪‬ﻠﺲ ﺍﻷﺭﻭﰊ ﻓﺈﻥ ﺍﻹﺧﺘﺮﺍﻕ ﺍﳌﺒﺎﺷﺮ ﻳﻌﺪ ﺇﻧﺘﻬﺎﻛﺎ ﻟﺴﻴﺎﺩﺓ ﺩﻭﻟﺔ‬
‫ﺃﺧﺮﻯ ﻣﺎ ﱂ ﺗﻮﺟﺪ ﺇﺗﻔﺎﻗﻴﺔ ﺩﻭﻟﻴﺔ ﰲ ﻫﺬﺍ ﺍﻟﺸﺄﻥ‪ ،‬ﻓﺈﺳﺘﺮﺟﺎﻉ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻟﱵ ﰎ ﲣﺰﻳﻨﻬﺎ ﺑﺎﳋﺎﺭﺝ ﺩﻭﻥ‬
‫ﻋﻠﻢ ﺍﻟﺪﻭﻟﺔ ﺍﻷﺧﺮﻯ ﺃﻭ ﺭﺿﺎﻫﺎ ﻳﻌﺪ ﺇﻧﺘﻬﺎﻛﺎ ﺍﻟﺴﻴﺎﺩﺓ ﻟﻠﺪﻭﻟﺔ ﺍﻷﺧﺮﻯ ﻭﺧﺮﻗﺎ ﻟﻠﻘﻮﺍﻧﲔ‪.‬‬
‫ﻭﳌﻮﺍﺟﻬﺔ ﻫﺬﺍ ﺍﻹﺣﺘﻤﺎﻝ ﳒﺪ ﺃﻥ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻗﺪ ﺃﺟﺎﺯ ﺗﻔﺘﻴﺶ ﺍﻷﻧﻈﻤﺔ ﺍﳌﺘﺼﻠﺔ ﺣﱴ ﻭﻟﻮ‬
‫ﻛﺎﻧﺖ ﻣﺘﻮﺍﺟﺪﺓ ﺧﺎﺭﺝ ﺍﻹﻗﻠﻴﻢ ﺍﻟﻮﻃﲏ‪ ،‬ﻭﻫﻮ ﺍﻟﻮﺍﺭﺩ ﺑﺎﻟﻔﻘﺮﺓ ﺍﻟﺜﺎﻟﺜﺔ ﻣﻦ ﻧﺺ ﺍﳌﺎﺩﺓ ‪ 05‬ﻣﻦ‬
‫ﺍﻟﻘﺎﻧﻮﻥ‪ ...."04/09‬ﺇﺫﺍ ﺗﺒﲔ ﻣﺴﺒﻘﺎ ﺑﺄﻥ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﺒﺤﻮﺙ ﻋﻨﻬﺎ ﻭﺍﻟﱵ ﳝﻜﻦ ﺍﻟﺪﺧﻮﻝ ﺇﻟﻴﻬﺎ ﺇﻧﻄﻼﻗﺎ‬
‫ﻣﻦ ﺍﳌﻨﻈﻮﻣﺔ ﺍﻷﻭﱃ ﳐﺰﻧﺔ ﰲ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﻘﻊ ﺧﺎﺭﺝ ﺍﻹﻗﻠﻴﻢ ﺍﻟﻮﻃﲏ‪ ،‬ﻓﺈﻥ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻬﺎ ﻳﻜﻮﻥ‬
‫ﲟﺴﺎﻋﺪﺓ ﺍﻟﺴﻠﻄﺎﺕ ﺍﻷﺟﻨﺒﻴﺔ ﺍﳌﺨﺘﺼﺔ ﻃﺒﻘﺎ ﻟﻺﺗﻔﺎﻗﻴﺎﺕ ﺍﻟﺪﻭﻟﻴﺔ ﺫﺍﺕ ﺍﻟﺼﻠﺔ ﻭﻭﻓﻘﺎ ﳌﺒﺪﺃ ﺍﳌﻌﺎﻣﻠﺔ‬
‫ﺑﺎﳌﺜﻞ"‪ .‬ﻭﻟﻌﻞ ﻫﺬﻩ ﺍﻟﻔﻘﺮﺓ ﻣﺄﺧﻮﺫ ﻧﺼﻬﺎ ﻣﻦ ﺍﻟﻔﻘﺮﺓ ﺍﻟﺜﺎﻧﻴﺔ ﻣﻦ ﺍﳌﺎﺩﺓ ‪ 1-57‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ‬
‫) ‪(2‬‬
‫ﺍﳉﺰﺍﺋﻴﺔ ﺍﻟﻔﺮﻧﺴﻲ‬
‫ﻭﰲ ﻧﻔﺲ ﺍﻹﻃﺎﺭ ﺃﺻﺪﺭ ﺍ‪‬ﻠﺲ ﺍﻷﺭﻭﰊ ﺗﻮﺻﻴﺔ ﲢﻤﻞ ﺭﻗﻢ ‪ 13‬ﻟﺴﻨﺔ ‪ 1995‬ﻭﺍﳌﺘﻌﻠﻘﺔ‬
‫ﺑﺎﳌﺸﻜﻼﺕ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻘﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﳚﻴﺰ ﻣﻦ ﺧﻼﳍﺎ ﺃﻥ ﳝﺘﺪ‬
‫ﺗﻔﺘﻴﺶ ﺍﳊﺎﺳﻮﺏ ﺇﱃ ﺍﻟﺸﺒﻜﺔ ﺍﳌﺘﺼﻠﺔ ‪‬ﺎ ﻭﻟﻮ ﻛﺎﻧﺖ ﺗﻠﻚ ﺍﻟﺸﺒﻜﺔ ﺗﻘﻊ ﺧﺎﺭﺝ ﺇﻗﻠﻴﻢ ﺍﻟﺪﻭﻟﺔ‪.‬‬
‫ﻭﻟﻜﻦ ﻃﺎﳌﺎ ﺃﻥ ﺍﻟﺘﻔﺘﻴﺶ ﻋﻦ ﺑﻌﺪ ﳝﺘﺪ ﺇﱃ ﺇﻗﻠﻴﻢ ﺑﻠﺪ ﺃﺟﻨﱯ ﻓﺈﻥ ﺍﻷﻣﺮ ﻳﺴﺘﻠﺰﻡ ﺑﺎﻟﻀﺮﻭﺭﺓ ﺍﻟﺪﺧﻮﻝ‬
‫ﰲ ﺇﻃﺎﺭ ﲝﺚ ﻫﺬﺍ ﺍﻹﺧﺘﺮﺍﻕ ﺍﳌﺒﺎﺷﺮ ﻋﻠﻰ ﻣﺴﺘﻮﻯ ﺍﻟﺪﻭﻝ ﻛﺎﻓﺔ ﺑﺈﻋﺘﺒﺎﺭﻩ ﺇﺟﺮﺍﺀ ﻋﺎﺑﺮﺍ ﻟﻠﺤﺪﻭﺩ ﻭﻫﻮ‬

‫)‪(1‬ﳏﻤﺪ ﺃﺑﻮ ﺍﻟﻌﻼ ﻋﻘﻴﺪﺓ‪ .‬ﺍﻟﺘﺤﻘﻴﻖ ﻭﲨﻊ ﺍﻷﺩﻟﺔ ﰲ ﳎﺎﻝ ﺍﳉﺮﺍﺋﻢ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﲝﺚ ﻣﻘﺪﻡ ﻟﻠﻤﺆﲤﺮ ﺍﻟﻌﻠﻤﻲ ﺍﻻﻭﻝ ﺣﻮﻝ ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻭ ﺍﻻﻣﻨﻴﺔ‬
‫ﻟﻠﻌﻤﻠﻴﺎﺕ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ‪.‬ﺍﻛﺎﺩﳝﻴﺔ ﺍﻟﺸﺮﻃﺔ‪.‬ﻣﺮﻛﺰ ﺍﻟﺒﺤﻮﺙ ﻭ ﺍﻟﺪﺭﺍﺳﺎﺕ‪.‬ﺩﰊ ﺧﻼﻝ ﺍﻟﻔﺘﺮﺓ ‪28/26‬ﺍﻓﺮﻳﻞ‪ .2003‬ﻣﻨﺸﻮﺭ ﻋﻠﻰ ﻣﻮﻗﻊ‬
‫‪ ،www.arablaw info.com‬ﺹ‪.10‬‬
‫)‪(2‬ﺍﳌﺎﺩﺓ ‪ 2/1-57‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺍﻟﻔﺮﻧﺴﻲ ﻣﻀﺎﻓﺔ ﲟﻮﺟﺐ ﺍﳌﺎﺩﺓ ‪ 2/17‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪"2003/239‬ﺇﺫﺍ ﺗﺒﲔ ﻣﺴﺒﻘﺎ ﺃﻥ ﻫﺬﻩ‬
‫ﺍﳌﻌﻄﻴﺎﺕ ﳐﺰﻧﺔ ﰲ ﻧﻈﺎﻡ ﻣﻌﻠﻮﻣﺎﰐ ﻣﻮﺟﻮﺩ ﺧﺎﺭﺝ ﺍﻹﻗﻠﻴﻢ ﺍﻟﻮﻃﲏ ﻭﺃﻧﻪ ﳝﻜﻦ ﺍﻟﺪﺧﻮﻝ ﺇﻟﻴﻬﺎ ﻭﺃ‪‬ﺎ ﻣﺘﺎﺣﺔ ﺇﻧﻄﻼﻗﺎ ﻣﻦ ﺍﻟﻨﻈﺎﻡ ﺍﻟﺮﺋﻴﺴﻲ ﻓﺈﻧﻪ ﳝﻜﻦ ﺍﳊﺼﻮﻝ‬
‫ﻋﻠﻴﻬﺎ ﻣﻦ ﻃﺮﻑ ﺿﺒﺎﻁ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻣﻊ ﻣﺮﺍﻋﺎﺓ ﺍﻟﺸﺮﻭﻁ ﺍﳌﻨﺼﻮﺹ ﻋﻠﻴﻬﺎ ﰲ ﺍﳌﻌﺎﻫﺪﺍﺕ ﺍﻟﺪﻭﻟﻴﺔ"‪.‬‬

‫‪- 151 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﻷﻣﺮ ﺍﻟﺬﻱ ﻻ ﳜﻠﻮ ﻣﻦ ﺿﺮﻭﺭﺓ ﺍﻟﺘﻮﺻﻞ ﺇﱃ ﺇﺗﻔﺎﻕ ﺩﻭﱄ ﻳﻀﻤﻦ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﺪﻭﱄ ﻓﻴﻤﺎ ﺑﲔ ﺍﻟﺴﻠﻄﺎﺕ‬
‫ﺍﳌﺨﺘﺼﺔ‪ ،‬ﻭﺍﻟﻘﻮﻝ ﺑﻐﲑ ﺫﻟﻚ ﳚﻌﻞ ﻣﻦ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ‪‬ﺪﻳﺪﺍ ﻟﺴﻴﺎﺩﺓ ﺍﻟﺪﻭﻝ‪.‬‬
‫ﺇﻻ ﺃﻧﻪ ﻭﺑﺎﻟﺮﻏﻢ ﻣﻦ ﺫﻟﻚ ﻓﺈﻥ ﺍﻹﺗﻔﺎﻗﻴﺔ ﺍﻷﺭﻭﺑﻴﺔ ﺍﳋﺎﺻﺔ ﲜﺮﺍﺋﻢ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺃﺟﺎﺯﺕ ﰲ‬
‫ﺍﳌﺎﺩﺓ ‪ 32‬ﻣﻨﻬﺎ ﺇﻣﻜﺎﻧﻴﺔ ﺍﻟﺪﺧﻮﻝ ﺑﻐﺮﺽ ﺍﻟﺘﻔﺘﻴﺶ ﺇﱃ ﺃﺟﻬﺰﺓ ﻭﺷﺒﻜﺎﺕ ﺗﺎﺑﻌﺔ ﻟﺪﻭﻟﺔ ﺃﺧﺮﻯ ﺑﺪﻭﻥ ﺇﺫ‪‬ﺎ‬
‫ﰲ ﺣﺎﻟﺘﲔ‪":‬‬
‫ﺇﺫﺍ ﺗﻌﻠﻖ ﺍﻟﺘﻔﺘﻴﺶ ﲟﻌﻠﻮﻣﺎﺕ ﺃﻭ ﺑﻴﺎﻧﺎﺕ ﻣﺒﺎﺣﺔ ﻟﻠﺠﻤﻬﻮﺭ‪.‬‬ ‫‪-‬‬
‫ﺇﺫﺍ ﺭﺿﻲ ﺻﺎﺣﺐ ﺃﻭ ﺣﺎﺋﺰ ﻫﺬﻩ ﺍﳌﻌﻠﻮﻣﺎﺕ ‪‬ﺬﺍ ﺍﻟﺘﻔﺘﻴﺶ‪.‬‬ ‫‪-‬‬
‫‪/2‬ﺷﺮﻭﻁ ﺍﻟﺘﻔﺘﻴﺶ ﰲ ﺍﻟﺒﻴﺌﺔ ﺍﻟﺮﻗﻤﻴﺔ‪:‬‬
‫ﻟﻘﺪ ﺣﺮﺻﺖ ﺍﻟﻘﻮﺍﻧﲔ ﺍﻹﺟﺮﺍﺋﻴﺔ ﻋﻠﻰ ﺇﺣﺎﻃﺔ ﺇﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﺑﺸﺮﻭﻁ ﻭﺿﻤﺎﻧﺎﺕ ﺃﺳﺎﺳﻴﺔ ﻧﻈﺮﺍ‬
‫ﳌﺎ ﳝﻜﻦ ﺃﻥ ﳛﺪﺛﻪ ﻣﻦ ﻣﺴﺎﺱ ﳛﻖ ﺍﻹﻧﺴﺎﻥ ﰲ ﺣﺮﻳﺘﻪ ﺍﻟﺸﺨﺼﻴﺔ‪ ،‬ﻭﻫﺪﻑ ﺫﻟﻚ ﻫﻮ ﲢﻘﻴﻖ ﺍﳌﻮﺍﺯﻧﺔ ﺑﲔ‬
‫ﻣﺼﻠﺤﺔ ﺍ‪‬ﺘﻤﻊ ﰲ ﻋﻘﺎﺏ ﺍ‪‬ﺮﻡ ﻭﺑﲔ ﺣﻘﻮﻕ ﺍﻷﻓﺮﺍﺩ ﻭﺣﺮﻳﺎ‪‬ﻢ‪.‬ﻭﻣﻦ ﺍﻟﺸﺮﻭﻁ ﻭﺍﻟﻀﻤﺎﻧﺎﺕ ﺍﻟﱵ ﳚﺐ‬
‫ﺗﻮﺍﻓﺮﻫﺎ ﻣﻨﻬﺎ ﻣﺎ ﻫﻮ ﻣﻮﺿﻮﻋﻲ ﻭﻣﻨﻬﺎ ﻣﺎ ﻫﻮ ﺷﻜﻠﻲ‪.‬‬
‫‪/1.2‬ﺍﻟﺸﺮﻭﻁ ﺍﻟﺸﻜﻠﻴﺔ ﻟﻠﺘﻔﺘﻴﺶ ﰲ ﺍﻟﺒﻴﺌﺔ ﺍﻟﺮﻗﻤﻴﺔ‪:‬‬
‫ﺇﻥ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻟﺸﻜﻠﻴﺔ ﻻ ‪‬ﺪﻑ ﺇﱃ ﲢﻘﻴﻖ ﻣﺼﻠﺤﺔ ﺍﻟﻌﺪﺍﻟﺔ ﰲ ﺿﻤﺎﻥ ﺻﺤﺔ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﻟﱵ‬
‫ﺗﺘﺨﺬ ﳉﻤﻊ ﺍﻷﺩﻟﺔ ﻓﺤﺴﺐ‪ ،‬ﻭﺇﳕﺎ ﺗﻘﻴﻢ ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﻣﻘﺘﻀﻴﺎﺕ ﺍﻹﺟﺮﺍﺀ ﺳﻴﺎﺟﺎ ﳛﻤﻲ ﺍﳊﺮﻳﺎﺕ‬
‫ﺍﻟﻔﺮﺩﻳﺔ‪(1).‬ﻭﻟﻌﻞ ﺃﺑﺮﺯ ﻫﺬﻩ ﺍﻟﺸﺮﻭﻁ ﻫﻲ‪:‬‬
‫‪ /1.1‬ﺇﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﲝﻀﻮﺭ ﺃﺷﺨﺎﺹ ﻣﻌﻴﻨﲔ ﺑﺎﻟﻘﺎﻧﻮﻥ‪:‬ﻏﲏ ﻋﻦ ﺍﻟﺒﻴﺎﻥ ﺃﻥ ﺍﻟﺘﻔﺘﻴﺶ ﻓﻴﻪ‬
‫ﺇﻃﻼﻉ ﻋﻠﻰ ﺃﺳﺮﺍﺭ ﺍﻟﻐﲑ ﺍﻟﱵ ﲢﺮﻡ ﺃﻏﻠﺐ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﻹﻃﻼﻉ ﻋﻠﻴﻬﺎ‪ ،‬ﻟﺬﻟﻚ ﻓﺈﻧﻪ ﻭﻣﻦ‬
‫ﻣﻄﺎﻟﻌﺔ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﳌﻘﺎﺭﻧﺔ ﳒﺪ ﺃﻥ ﺑﻌﻀﻬﺎ ﺃﻭﺟﺐ ﺣﻀﻮﺭ ﻋﻤﻠﻴﺔ ﺍﻟﺘﻔﺘﻴﺶ ﺍﻟﺬﻱ ﲡﺮﻳﻪ ﺍﻟﻀﺒﻄﻴﺔ‬
‫ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﺃﻭ ﺷﻬﻮﺩﺍ‪.‬ﻭﺃﻭﺟﺒﺘﺘﺸﺮﻳﻌﺎﺕ ﺃﺧﺮﻯ ﺣﻀﻮﺭ ﺃﺷﺨﺎﺹ ﻣﻌﻴﻨﲔ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ﰲ‬
‫ﺣﺎﻻﺕ ﻣﻌﻴﻨﺔ‪ ،‬ﻭﺃﺟﺎﺯﺕ ﰲ ﺃﺣﻮﺍﻝ ﺃﺧﺮﻯ ﺇﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﺩﻭﻥ ﺣﻀﻮﺭ ﺃﺣﺪ‪ ،‬ﻭﻫﻨﺎﻙ ﺗﺸﺮﻳﻌﺎﺕ‬
‫ﺳﻜﺘﺖ ﲤﺎﻣﺎ ﻋﻦ ﺍﻟﺘﻌﺮﺽ ﳍﺬﺍ ﺍﻟﺸﺮﻁ‪.‬‬

‫)‪ (1‬ﻋﻠﻲ ﺣﺴﻦ ﺍﻟﻄﻮﺍﻟﺒﺔ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ ﺹ‪،47‬‬

‫‪- 152 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﺇﻥ ﻛﺎﻥ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻣﻦ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﻟﱵ ﺃﻭﺟﺒﺖ ﺿﺮﻭﺭﺓ ﺣﺼﻮﻝ ﺇﺟﺮﺍﺀ‬
‫ﺍﻟﺘﻔﺘﻴﺶ ﺍﳌﺘﻌﻠﻖ ﺑﺎﳌﺴﺎﻛﻦ ﻭﻣﻠﺤﻘﺎ‪‬ﺎ ﲝﻀﻮﺭ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﻋﻨﺪﻣﺎ ﻳﺘﻢ ﺗﻔﺘﻴﺶ ﻣﺴﻜﻨﻪ ﻣﻦ ﻃﺮﻑ ﺍﻟﻀﺒﻄﻴﺔ‬
‫ﺍﻟﻘﻀﺎﺋﻴﺔ‪ ،‬ﻭﺇﻥ ﺗﻌﺬﺭ ﺫﻟﻚ ﺑﺈﻣﺘﻨﺎﻋﻪ ﻋﻦ ﺣﻀﻮﺭ ﺍﻟﺘﻔﺘﻴﺶ ﺃﻭ ﻛﺎﻥ ﻫﺎﺭﺑﺎ ﻳﺘﻢ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﲝﻀﻮﺭ‬
‫ﺷﺎﻫﺪﻳﻦ ﻣﻦ ﻏﲑ ﺍﳌﻮﻇﻔﲔ ﺍﳋﺎﺿﻌﲔ ﻟﺴﻠﻄﺔ ﺿﺎﺑﻂ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﻟﻘﺎﺋﻢ ﺑﺎﻟﺘﻔﺘﻴﺶ‪(1)،‬ﺇﻻ ﺃﻧﻪ‬
‫ﻭﲟﻮﺟﺐ ﺍﻟﺘﻌﺪﻳﻞ ﺍﻟﺬﻱ ﺃﳊﻘﻪ ﻋﻠﻰ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺑﺎﻟﻘﺎﻧﻮﻥ ‪.22/06‬ﺇﺳﺘﺜﲎ ﺗﻄﺒﻴﻖ ﻫﺬﻩ‬
‫ﺍﻟﺸﺮﻭﻁ )ﺣﻀﻮﺭ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﺃﻭ ﺍﻟﺸﺎﻫﺪﻳﻦ ﻋﻨﺪﻣﺎ ﻳﺘﻌﻠﻖ ﺍﻷﻣﺮ ﺑﺎﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ(‪(2)،‬ﻭﻫﻮ ﻣﺎ ﻳﻌﺪ‬
‫ﺇﻗﺮﺍﺭﺍ ﻣﻦ ﺍﳌﺸﺮﻉ ﺑﺬﺍﺗﻴﺔ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﻭﻣﺎ ﻳﺘﻄﻠﺒﻪ ﺍﻟﺘﺤﻘﻴﻖ ﺑﺸﺄ‪‬ﺎ ﻣﻦ ﺑﺴﻂ ﻧﻮﻉ ﻣﻦ ﺍﻟﺴﺮﻳﺔ‬
‫ﺃﺛﻨﺎﺀ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺍﻹﺳﺮﺍﻉ ﰲ ﺇﺳﺘﺨﻼﺻﻪ ﻗﺒﻞ ﻓﻘﺪﺍﻧﻪ‪.‬‬
‫ﻭﳒﺪ ﺗﻄﺒﻴﻖ ﺫﻟﻚ ﰲ ﺍﻟﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ ﺍﻷﻣﺮﻳﻜﻴﺔ ﺣﻴﺚ ﺗﺼﺪﺭ ﺍﻟﺴﻠﻄﺔ ﺍﳌﺨﺘﺼﺔ ﺑﺎﻟﺘﺤﻘﻴﻖ‬
‫ﺃﻭﺍﻣﺮ ﺍﻟﺘﻔﺘﻴﺶ ﺩﻭﻥ ﺇﺧﻄﺎﺭ ﻣﺴﺒﻖ ﰲ ﺍﻟﺪﻋﺎﻭﻯ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﺫﻟﻚ ﺧﻮﻓﺎ ﻣﻦ ﺳﻬﻮﻟﺔ‬
‫ﺗﺪﻣﲑ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﻮﺟﻮﺩﺓ ﻋﻠﻰ ﺫﺍﻛﺮﺓ ﺍﳊﺎﺳﻮﺏ ﲟﺎ ﻗﺪ ﻳﻀﺮ ﲝﺴﻦ ﺳﲑ ﺇﺟﺮﺍﺀﺍﺕ ﺍﻟﺘﺤﻘﻴﻖ‬
‫‪/2.1‬ﺍﳌﻴﻌﺎﺩ ﺍﻟﺰﻣﲏ ﻹﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﰲ ﺍﻟﺒﻴﺌﺔ ﺍﻟﺮﻗﻤﻴﺔ‪:‬‬
‫ﺇﺧﺘﻠﻔﺖ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻹﺟﺮﺍﺋﻴﺔ ﰲ ﻭﻗﺖ ﺗﻨﻔﻴﺬ ﺍﻟﺘﻔﺘﻴﺶ‪ ،‬ﻓﻤﻨﻬﺎ ﻣﺎ ﳛﻈﺮ ﺗﻔﺘﻴﺶ ﺍﳌﺴﺎﻛﻦ ﻟﻴﻼ ﺇﻻ‬
‫ﰲ ﺃﺣﻮﺍﻝ ﻣﻌﻴﻨﺔ‪ ،‬ﻭﻣﻨﻬﺎ ﱂ ﻳﻘﻴﺪ ﺍﻟﻘﻴﺎﻡ ‪‬ﺬﺍ ﺍﻹﺟﺮﺍﺀ ﺑﻮﻗﺖ ﻣﻌﲔ ﻭﺗﺮﻙ ﺍﻷﻣﺮ ﻟﺘﻘﺪﻳﺮ ﺍﻟﻘﺎﺋﻢ ﺑﺎﻟﺘﻔﺘﻴﺶ‬
‫) ‪(3‬‬
‫ﻹﺧﺘﻴﺎﺭ ﺍﻟﻮﻗﺖ ﺍﳌﻼﺋﻢ ﻟﺘﻨﻔﻴﺬﻩ ﺿﻤﻦ ﺍﳌﺪﺓ ﺍﶈﺪﺩﺓ ﺑﺎﻹﺫﻥ‪.‬‬
‫ﻭﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﺫﻫﺐ ﺇﱃ ﺣﻀﺮ ﺗﻔﺘﻴﺶ ﺍﳌﺴﺎﻛﻦ ﻭﻣﺎ ﰲ ﺣﻜﻤﻬﺎ ﰲ ﺃﻭﻗﺎﺕ ﻣﻌﻴﻨﺔ ﻭﺣﺪﺩ‬
‫ﻣﻴﻘﺎﺕ ﺗﻨﻔﻴﺬ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﻣﻦ ﺍﻟﺴﺎﻋﺔ ﺍﳋﺎﻣﺴﺔ ﺻﺒﺎﺣﺎ ﺇﱃ ﺍﻟﺴﺎﻋﺔ ﺍﻟﺜﺎﻣﻨﺔ ﻣﺴﺎﺀﺍ‪(4)،‬ﻭﻫﻨﺎﻙ ﺣﺎﻻﺕ‬
‫ﺇﺳﺘﺜﻨﺎﺋﻴﺔ ﳚﻮﺯ ﻓﻴﻬﺎ ﺍﳋﺮﻭﺝ ﻋﻦ ﻫﺬﺍ ﺍﳌﻴﻘﺎﺕ ﻭﻳﺼﺢ ﺇﺟﺮﺍﺅﻩ ﰲ ﺃﻱ ﺳﺎﻋﺔ ﻣﻦ ﺳﺎﻋﺎﺕ ﺍﻟﻠﻴﻞ ﻭﺍﻟﻨﻬﺎﺭ‬
‫ﻋﻨﺪﻣﺎ ﻳﺘﻌﻠﻖ ﺍﻷﻣﺮ ﺑﺎﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻨﺼﻮﺹ ﻋﻠﻴﻬﺎ ﺑﺎﳌﻮﺍﺩ‪ 342‬ﺇﱃ‪ 348‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ‬
‫ﺍﳌﺮﺗﻜﺒﺔ ﰲ ﺃﻣﺎﻛﻦ ﻣﻌﻴﻨﺔ)‪(5‬ﺃﻭ ﰲ ﺣﺎﻟﺔ ﺭﺿﺎ ﺻﺎﺣﺐ ﺍﳌﺴﻜﻦ ﺻﺮﺍﺣﺔ‪.‬‬

‫)‪(1‬ﺃﻧﻈﺮ ﻧﺺ ﺍﳌﺎﺩﺓ ‪ 45‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‪.‬‬


‫)‪(2‬ﺃﻧﻈﺮ ﺍﻟﻔﻘﺮﺓ ﺍﻷﺧﲑﺓ ﻣﻦ ﺍﳌﺎﺩﺓ ‪ 45‬ﻕ‪.‬ﺇ‪.‬ﺝ‪.‬‬
‫)‪(3‬ﺃﻧﻈﺮ ﻗﺎﻧﻮﻥ ﺍﻟﺸﺮﻃﺔ ﻭﺍﻷﺩﻟﺔ ﺍﳉﻨﺎﺋﻴﺔ ﺍﻟﱪﻳﻄﺎﱐ ﻟﺴﻨﺔ ‪.1984‬‬
‫)‪(4‬ﺍﳌﺸﺮﻉ ﺍﻟﻔﺮﻧﺴﻲ ﻣﻦ ﺧﻼﻝ ﺍﳌﺎﺩﺓ ‪ 59‬ﻕ‪.‬ﺇ‪.‬ﺝ ﳛﺪﺩ ﻣﻴﻘﺎﺕ ﺗﻨﻔﻴﺬ ﺍﻟﺘﻔﺘﻴﺶ ﻣﻦ ﺍﻟﺴﺎﻋﺔ ﺍﻟﺴﺎﺩﺳﺔ ﺇﱃ ﺍﻟﺴﺎﻋﺔ ﺍﻟﺘﺎﺳﻌﺔ ﻣﺴﺎﺀﺍ‪.‬‬
‫)‪(5‬ﺍﳌﺎﺩﺓ ‪ 47‬ﻕ‪.‬ﺇ‪.‬ﺝ‪.‬‬

‫‪- 153 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪47‬‬ ‫ﻭﰲ ﻧﻄﺎﻕ ﺍﻟﺘﻔﺘﻴﺶ ﺍﳌﺘﻌﻠﻖ ﺑﺎﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻓﺈﻥ ﺍﻹﺳﺘﺜﻨﺎﺀ ﺍﻟﻮﺍﺭﺩ ﺑﺎﻟﻔﻘﺮﺓ ﺍﻟﺜﺎﻟﺜﺔ ﻣﻦ ﺍﳌﺎﺩﺓ‬
‫ﻕ‪.‬ﺇ‪.‬ﺝ ﻭﺍﳌﺘﻌﻠﻖ ﲜﻮﺍﺯ ﺇﺟﺮﺍﺀ ﺿﺎﺑﻂ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻟﻠﺘﻔﺘﻴﺶ ﰲ ﻛﻞ ﺳﺎﻋﺔ ﻣﻦ ﺳﺎﻋﺎﺕ ﺍﻟﻠﻴﻞ ﺃﻭ‬
‫ﺍﻟﻨﻬﺎﺭ ﻋﻨﺪﻣﺎ ﻳﺘﻌﻠﻖ ﺍﻟﺘﺤﻘﻴﻖ ﺑﻨﻮﻉ ﻣﻌﲔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‪ ،‬ﻓﻘﺪ ﴰﻞ ﻫﺬﺍ ﺍﻹﺳﺘﺜﻨﺎﺀ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺣﻴﺚ‬
‫ﺟﺎﺀ ﰲ ﻧﺼﻬﺎ"‪ ....‬ﻋﻨﺪﻣﺎ ﻳﺘﻌﻠﻖ ﺍﻷﻣﺮ ﲜﺮﺍﺋﻢ ﺍﳌﺨﺪﺭﺍﺕ ﺃﻭ ﺍﳉﺮﳝﺔ ﺍﳌﻨﻈﻤﺔ ﻋﱪ ﺍﻟﻮﻃﻨﻴﺔ ﺃﻭ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﳌﺎﺳﺔ ﺑﺄﻧﻈﻤﺔ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ﻭ ‪ ...‬ﻓﺈﻧﻪ ﳚﻮﺯ ﺇﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ‪...‬ﰲ ﻛﻞ ﳏﻞ ﺳﻜﲏ ﺃﻭ ﻏﲑ‬
‫ﺳﻜﲏ ﰲ ﻛﻞ ﺳﺎﻋﺔ ﻣﻦ ﺳﺎﻋﺎﺕ ﺍﻟﻨﻬﺎﺭ ﺃﻭ ﺍﻟﻠﻴﻞ ﻭﺫﻟﻚ ﺑﻨﺎﺀﺍ ﻋﻠﻰ ﺇﺫﻥ ﻣﺴﺒﻖ ﻣﻦ ﻭﻛﻴﻞ ﺍﳉﻤﻬﻮﺭﻳﺔ‬
‫ﺍﳌﺨﺘﺺ"‪.‬‬
‫‪/2.2‬ﺍﻟﺸﺮﻭﻁ ﺍﳌﻮﺿﻮﻋﻴﺔ ﻟﻠﺘﻔﺘﻴﺶ ﰲ ﺍﻟﺒﻴﺌﺔ ﺍﻟﺮﻗﻤﻴﺔ‪ :‬ﳝﻜﻦ ﲢﺪﻳﺪ ﺍﻟﻘﻮﺍﻋﺪ ﺍﳌﻮﺿﻮﻋﻴﺔ‬
‫ﻟﺘﻔﺘﻴﺶ ﻧﻈﻢ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻟﱵ ﺗﻌﺪ ﺍﻟﻀﻮﺍﺑﻂ ﺍﻟﻼﺯﻣﺔ ﻹﺟﺮﺍﺀ ﺗﻔﺘﻴﺶ ﺻﺤﻴﺢ ﰲ ﻣﺎ ﻳﻠﻲ‪:‬‬
‫‪/1.2‬ﻭﺟﻮﺩ ﺳﺒﺐ ﻟﻠﺘﻔﺘﻴﺶ‪ :‬ﺇﻥ ﺳﺒﺐ ﺍﻟﺘﻔﺘﻴﺶ ﰲ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻟﻌﺎﻣﺔ ﺑﻮﺻﻔﺔ ﺇﺟﺮﺍﺀ ﻣﻦ ﺇﺟﺮﺍﺀﺍﺕ‬
‫ﺍﻟﺘﺤﻘﻴﻖ ﻫﻮ ﻭﻗﻮﻉ ﺟﺮﳝﺔ )ﺟﻨﺎﻳﺔ ﺃﻭ ﺟﻨﺤﺔ( ﻭﺇ‪‬ﺎﻡ ﺷﺨﺺ ﺃﻭ ﻋﺪﺓ ﺃﺷﺨﺎﺹ ﺑﺈﺭﺗﻜﺎ‪‬ﺎ ﺃﻭ ﺍﳌﺴﺎﳘﺔ‬
‫ﻓﻴﻬﺎ‪ ،‬ﻭﺗﻮﺍﻓﺮ ﺃﻣﺎﺭﺍﺕ ﻭﻗﺮﺍﺋﻦ ﻗﻮﻳﺔ ﻋﻠﻰ ﻭﺟﻮﺩ ﺃﺷﻴﺎﺀ ﰲ ﻛﺸﻒ ﺍﳊﻘﻴﻘﺔ ﻟﺪﻯ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﺃﻭ‬
‫ﻏﲑﻩ)‪(1‬ﻭﺑﻨﺎﺀﺍ ﻋﻠﻴﻪ ﻭﺗﻄﺒﻴﻘﺎ ﻋﻠﻰ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻓﺈﻥ ﺳﺒﺐ ﺍﻟﺘﻔﺘﻴﺶ ﺍﳌﺘﻌﻠﻖ ‪‬ﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‬
‫ﻳﻌﲏ‪:‬‬
‫ﺿﺮﻭﺭﺓ ﻭﻗﻮﻉ ﺟﺮﳝﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﱵ ﻧﺺ ﻋﻠﻴﻬﺎ ﺍﳌﺸﺮﻉ ﰲ ﻧﺼﻮﺹ ﺍﻟﺘﺠﺮﱘ‬ ‫‪-‬‬
‫ﻭﺍﻟﻌﻘﺎﺏ ﻃﺒﻘﺎ ﳌﺒﺪﺃ ﺷﺮﻋﻴﺔ ﺍﳉﺮﺍﺋﻢ ﻭﺍﻟﻌﻘﻮﺑﺎﺕ‪ ،‬ﻛﻤﺎ ﻫﻮ ﺍﳊﺎﺻﻞ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ ﺍﻟﺬﻱ ﺃﺩﺭﺝ‬
‫ﻓﺼﻼ ﺧﺎﺻﺎ ‪-‬ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺑﻊ‪ -‬ﰲ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﳉﺮﺍﺋﻢ ﺍﻹﻋﺘﺪﺍﺀ ﻋﻠﻰ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ‬
‫ﻟﻠﻤﻌﻄﻴﺎﺕ‪ ،‬ﺫﻟﻚ ﺃﻥ ﺍﻟﺘﻔﺘﻴﺶ ﺍﻟﺬﻱ ﻳﻘﻊ ﻣﻦ ﺃﺟﻞ ﻓﻌﻞ ﻻ ﻳﺸﻜﻞ ﺟﺮﳝﺔ ﻳﻌﺘﱪ ﺑﺎﻃﻼ‪ ،‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺃﻥ‬
‫ﺗﻜﻮﻥ ﻫﺬﻩ ﺍﳉﺮﳝﺔ ﻗﺪ ﻭﻗﻌﺖ ﻓﻌﻼ ﻓﻼ ﳚﻮﺯ ﺍﻟﻘﻴﺎﻡ ‪‬ﺬﺍ ﺍﻹﺟﺮﺍﺀ ﻟﻀﺒﻂ ﺃﺩﻟﺔ ﰲ ﺟﺮﳝﺔ ﻣﺴﺘﻘﺒﻠﻴﺔ ﻭﻟﻮ‬
‫ﻗﺎﻣﺖ ﺍﻟﺘﺤﺮﻳﺎﺕ ﻭﺍﻟﺪﻻﺋﻞ ﺍﳉﺪﻳﺔ ﻋﻠﻰ ﺃ‪‬ﺎ ﺳﺘﻘﻊ ﺑﺎﻟﻔﻌﻞ‪ ،‬ﺇﻻ ﺃﻧﻪ ﻭﺑﺎﻟﺮﺟﻮﻉ ﺍﱃ ﻧﺺ ﺍﳌﺎﺩﺓ ‪ 05‬ﻣﻦ‬
‫ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﳒﺪ ﺍﻥ ﺍﳌﺸﺮﻉ ﻗﺪ ﺍﺟﺎﺯ ﺇﻣﻜﺎﻧﻴﺔ ﺍﻟﻠﺠﻮﺀ ﺍﱃ ﺇﺟﺮﺍﺀ ﺗﻔﺘﻴﺶ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺇﻣﺎ‬

‫)‪(1‬ﻭﻫﻮ ﻣﺎ ﺃﻗﺮﺗﻪ ﳏﻜﻤﺔ ﺍﻟﻨﻘﺾ ﺍﳌﺼﺮﻳﺔ ﺑﺈﻋﺘﺒﺎﺭﻫﺎ ﺃﻥ ﺍﻹﺫﻥ ﺑﺎﻟﺘﻔﺘﻴﺶ ﻻ ﻳﺼﺢ ﺇﺻﺪﺍﺭﻩ ﺇﻻ ﻟﻀﺒﻂ ﺟﺮﳝﺔ ﻭﺍﻗﻌﺔ ﺑﺎﻟﻔﻌﻞ ﻭﺗﺮﺟﺤﺖ ﻧﺴﺒﺘﻬﺎ ﺇﱃ ﻣﺘﻬﻢ ﻣﻌﲔ‬
‫ﻭﺃﻥ ﻫﻨﺎﻙ ﻣﻦ ﺍﻟﺪﻻﺋﻞ ﻣﺎ ﻳﻜﻔﻲ ﻟﻠﺘﺼﺪﻱ ﳊﺮﻣﺔ ﻣﺴﻜﻨﻪ ﺃﻭ ﳊﺮﻣﺘﻪ ﺍﻟﺸﺨﺼﻴﺔ ‪.‬ﻃﻌﻦ ﻧﻘﺾ ﺟﻨﺎﺋﻲ ﺟﻠﺴﺔ ‪ 1967/10/16‬ﳎﻤﻮﻋﺔ ﺃﺣﻜﺎﻡ ﺍﻟﻨﻘﺾ‬
‫ﺱ‪ 18‬ﺭﻗﻢ ‪ ،195‬ﺹ‪.965‬‬

‫‪- 154 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻟﻠﻮﻗﺎﻳﺔ ﻣﻦ ﺣﺪﻭﺙ ﺟﺮﺍﺋﻢ ﺃﻭ ﰲ ﺣﺎﻟﺔ ﺗﻮﻓﺮ ﻣﻌﻠﻮﻣﺎﺕ ﻋﻦ ﺍﺣﺘﻤﺎﻝ ﻭﻗﻮﻉ ﺟﺮﺍﺋﻢ ﻣﻌﻴﻨﺔ ﺫﻛﺮ‪‬ﺎ ﺍﳌﺎﺩﺓ‬
‫ﺍﺍﻟﺮﺍﺑﻌﺔ ﻣﻦ ﻧﻔﺲ ﺍﻟﻘﺎﻧﻮﻥ‪ ،‬ﻭﻫﻮ ﺍﻻﻣﺮ ﺍﻟﺬﻱ ﻳﻔﻬﻢ ﺻﺮﺍﺣﺔ ﺑﻘﺮﺍﺀﺓ ﻧﺺ ﺍﳌﺎﺩﺗﲔ ﻣﻌﺎ‪.‬‬
‫ﺿﺮﻭﺭﺓ ﺍﻹﺷﺘﺒﺎﻩ ﰲ ﺷﺨﺺ ﻣﻌﲔ ﺃﻭ ﺇ‪‬ﺎﻣﻪ ﺑﺈﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﺃﻭ ﺍﳌﺸﺎﺭﻛﺔ ﻓﻴﻬﺎ‪،‬ﻓﻼ ﻳﻜﻒ‬ ‫‪-‬‬
‫ﻟﻘﻴﺎﻡ ﺳﺒﺐ ﺍﻟﺘﻔﺘﻴﺶ ﻭﻗﻮﻉ ﺟﺮﳝﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﻞ ﻻﺑﺪ ﺃﻥ ﻳﻜﻮﻥ ﻫﻨﺎﻙ ﺇ‪‬ﺎﻡ ﻣﻮﺟﻪ ﺿﺪ ﺷﺨﺺ ﻣﻌﲔ‬
‫ﺃﻭ ﺃﻥ ﺗﺘﻮﺍﻓﺮ ﺩﻻﺋﻞ ﻛﺎﻓﻴﺔ ﺗﺪﻋﻮ ﻟﻺﻋﺘﻘﺎﺩ ﺑﺈﺭﺗﻜﺎﺑﻪ ﻟﻠﺠﺮﳝﺔ ﺣﱴ ﳝﻜﻦ ﺇﻧﺘﻬﺎﻙ ﺣﻖ ﺍﳋﺼﻮﺻﻴﺔ ﻟﺪﻳﻪ‬
‫‪46‬‬ ‫ﻭﺗﻔﺘﻴﺶ ﺣﺎﺳﻮﺑﻪ ﺍﻟﺸﺨﺼﻲ ﻭﺑﺮﺍﳎﻪ ﺍﳋﺎﺻﺔ ﻭﳝﻜﻦ ﺍﻹﺳﺘﺪﻻﻝ ﻋﻠﻰ ﺫﻟﻚ ﲟﺎ ﻧﺼﺖ ﻋﻠﻴﻪ ﺍﳌﺎﺩﺓ‬
‫ﻕ‪.‬ﺇ‪.‬ﺝ" ﻻ ﳚﻮﺯ ﻟﻀﺒﺎﻁ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﻹﻧﺘﻘﺎﻝ ﺇﱃ ﻣﺴﺎﻛﻦ ﺍﻷﺷﺨﺎﺹ ﺍﻟﺬﻳﻦ ﻳﻈﻬﺮ ﺃ‪‬ﻢ ﺳﺎﳘﻮﺍ‬
‫ﰲ ﺍﳉﻨﺎﻳﺔ ﻭﳛﻮﺯﻭﻥ ﺃﺷﻴﺎﺀ ﳍﺎ ﻋﻼﻗﺔ ﺑﺎﻷﻓﻌﺎﻝ ﺍﳉﻨﺎﺋﻴﺔ ﺍﳌﺮﺗﻜﺒﺔ ﻹﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ‪ "....‬ﻭﻣﻦ ﺍﻟﺪﻻﺋﻞ‬
‫ﺍﳌﺴﺘﻤﺪﺓ ﻣﻦ ﺍﻟﻮﺍﻗﻊ ﻭﺍﻟﻘﺮﺍﺋﻦ ﺍﻟﱵ ﺗﻨﺒﺊ ﻋﻦ ﺇﺭﺗﻜﺎﺏ ﺍﻟﺸﺨﺺ ﳉﺮﳝﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺗﺮﺟﺢ ﺇﻣﻜﺎﻧﻴﺔ‬
‫ﻧﺴﺒﺘﻬﺎ ﻟﻪ ﻭﻓﻖ ﺍﻟﺴﻴﺎﻕ ﺍﻟﻌﻘﻠﻲ ﻭﺍﳌﻨﻄﻘﻲ ﺃﻥ ﻳﺘﻢ ﲢﺪﻳﺪ ﻫﻮﻳﺔ ﺍﳊﺎﺳﻮﺏ )‪ (IP‬ﺍﻟﺬﻱ ﰎ ﺇﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ‬
‫ﺑﻪ ﻭﻛﺎﻥ ﺫﻟﻚ ﺍﳊﺎﺳﻮﺏ ﳜﺺ ﺷﺨﺼﺎ ﺑﻌﻴﻨﻪ‪.‬‬
‫‪/2.2‬ﲢﺪﻳﺪ ﳏﻞ ﺍﻟﺘﻔﺘﻴﺶ‪ :‬ﻳﻘﺼﺪ ﲟﺤﻞ ﺍﻟﺘﻔﺘﻴﺶ ﺍﳌﺴﺘﻮﺩﻉ ﺍﻟﺬﻱ ﳛﺘﻔﻆ ﻓﻴﻪ ﺍﻟﺸﺨﺺ ﺑﺎﻷﺷﻴﺎﺀ‬
‫ﺍﻟﱵ ﺗﺘﻀﻤﻦ ﺳﺮﻩ‪ ،‬ﻭﳏﻞ ﺍﻟﺘﻔﺘﻴﺶ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻫﻮ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﺑﻜﻞ ﻣﻜﻮﻧﺎﺗﻪ ﺍﳌﺎﺩﻳﺔ‬
‫ﻭﺍﳌﻌﻨﻮﻳﺔ ﻭﺷﺒﻜﺎﺕ ﺍﻹﺗﺼﺎﻝ ﻛﻤﺎ ﺳﺒﻖ ﺷﺮﺣﻪ ﻭﺑﻴﺎﻧﻪ‪.‬‬
‫ﻭﺣﻜﻢ ﺗﻔﺘﻴﺶ ﻫﺬﻩ ﺍﳌﻜﻮﻧﺎﺕ ﻳﺘﻮﻗﻒ ﻋﻠﻰ ﻃﺒﻴﻌﺔ ﺍﳌﻜﺎﻥ ﺍﳌﻮﺟﻮﺩ ﻓﻴﻪ‪ ،‬ﻓﻴﻤﺎ ﺇﺫﺍ ﻛﺎﻥ ﻣﻦ‬
‫ﺍﻷﻣﺎﻛﻦ ﺍﻟﻌﺎﻣﺔ ﺃﻡ ﻣﻦ ﺍﻷﻣﺎﻛﻦ ﺍﳋﺎﺻﺔ‪ ،‬ﻭﺗﻜﻤﻦ ﺃﳘﻴﺔ ﺍﻟﺘﻔﺮﻗﺔ ﻫﻨﺎ ﰲ ﺃﻥ ﻫﺬﻩ ﺍﻟﻜﻴﺎﻧﺎﺕ ﰲ ﺍﻷﻣﺎﻛﻦ‬
‫ﺍﳋﺎﺻﺔ ﻳﻜﻮﻥ ﳍﺎ ﺣﻜﻢ ﺗﻔﺘﻴﺶ ﺍﳌﺴﺎﻛﻦ ﺑﻨﻔﺲ ﺍﻟﻀﻤﺎﻧﺎﺕ ﺍﳌﻘﺮﺭﺓ ﻗﺎﻧﻮﻧﺎ ﺳﻴﻤﺎ ﺇﺷﺘﺮﺍﻁ ﺍﻹﺫﻥ‬
‫ﺑﺎﻟﺘﻔﺘﻴﺶ ﻣﻦ ﺍﻟﺴﻠﻄﺎﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﺨﺘﺼﺔ ﻭﻫﻮ ﻣﺎ ﻧﺼﺖ ﻋﻠﻴﻪ ﺍﳌﺎﺩﺓ ‪ 44‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ‬
‫ﺍﳉﺰﺍﺋﻴﺔ ﺃﻧﻪ ﻻ ﳚﻮﺯ ﻟﻀﺒﺎﻁ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﻟﺪﺧﻮﻝ ﺇﱃ ﺍﳌﺴﺎﻛﻦ ﻭﺇﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﺇﻻ ﺑﺈﺫﻥ ﻣﻜﺘﻮﺏ‬
‫ﻣﻦ ﻭﻛﻴﻞ ﺍﳉﻤﻬﻮﺭﻳﺔ ﺃﻭ ﻣﻦ ﻗﺎﺿﻲ ﺍﻟﺘﺤﻘﻴﻖ‪ ،‬ﻭﻫﺬﻩ ﺍﻟﻀﻤﺎﻧﺔ ﺧﺎﺻﺔ ﲜﻤﻴﻊ ﺍﳉﺮﺍﺋﻢ ﲟﺎ ﻓﻴﻬﺎ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ .‬ﺃﻣﺎ ﺍﻟﺘﻔﺘﻴﺶ ﺍﻟﻮﺍﻗﻊ ﻋﻠﻰ ﻣﻜﻮﻧﺎﺕ ﺍﳊﺎﺳﻮﺏ ﺍﳌﻮﺟﻮﺩﺓ ﰲ ﺍﻷﻣﺎﻛﻦ ﺍﻟﻌﺎﻣﺔ ﻓﺈﻥ ﺃﻏﻠﺐ‬
‫ﺍﻟﺸﺮﻳﻌﺎﺕ ﲡﻴﺰ ﻟﺮﺟﺎﻝ ﺍﻟﻀﺒﻄﻴﺔ ﺩﺧﻮﻝ ﺍﶈﺎﻝ ﺍﻟﻌﺎﻣﺔ ﺍﳌﻔﺘﻮﺣﺔ ﻟﻠﺠﻤﻬﻮﺭ ﻛﻤﻘﺎﻫﻲ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻣﻦ ﺃﺟﻞ‬
‫) ‪(1‬‬
‫ﻣﺮﺍﻗﺒﺘﻬﺎ ﻭﺍﻟﺘﺄﻛﺪ ﻣﻦ ﺇﺣﺘﺮﺍﻣﻬﺎ ﻟﻸﺧﻼﻕ ﻭﺍﻵﺩﺍﺏ ﺍﻟﻌﺎﻣﺔ ﺑﻜﻞ ﺳﻬﻮﻟﺔ ﺩﻭﻥ ﺣﺎﺟﺔ ﻹﺫﻥ ﺑﺎﻟﺘﻔﺘﻴﺶ‬

‫)‪ (1‬ﻋﻠﻲ ﺣﺴﻦ ﳏﻤﺪ ﺍﻟﻄﻮﺍﻟﺒﺔ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ ﺹ‪.81‬‬

‫‪- 155 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪/3.2‬ﺍﻹﺫﻥ ﺑﺎﻟﺘﻔﺘﻴﺶ‪:‬ﻳﺜﻮﺭ ﺍﻟﺘﺴﺎﺅﻝ ﺣﻮﻝ ﺇﻣﻜﺎﻧﻴﺔ ﺗﻄﺒﻴﻖ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻟﻌﺎﻣﺔ ﰲ ﺍﻟﺘﻔﺘﻴﺶ ﻋﻠﻰ‬
‫ﺻﻮﺭﺓ ﺗﻔﺘﻴﺶ ﻧﻈﻢ ﺍﳊﺎﺳﻮﺏ‪ ،‬ﻋﻠﻤﺎ ﺃﻥ ﺍﻟﺘﻔﺘﻴﺶ ﺍﻟﺘﻘﻠﻴﺪﻱ ﻳﻬﺪﻑ ﺇﱃ ﲨﻊ ﺍﻷﺩﻟﺔ ﺍﳌﺎﺩﻳﺔ ﰲ ﺣﲔ ﺃﻥ‬
‫ﻧﻈﻢ ﺍﳊﺎﺳﻮﺏ ﻋﺒﺎﺭﺓ ﻋﻦ ﻛﻴﺎﻥ ﻣﻌﻨﻮﻱ ﻭﻻ ﺗﺘﻮﺍﻓﺮ ﻟﻪ ﺻﻔﺔ ﺍﳌﺎﺩﺓ‪ ،‬ﻭﳌﺎ ﻛﺎﻥ ﳏﻞ ﺍﻟﺘﻔﺘﻴﺶ ﺑﺼﻮﺭﺗﻪ‬
‫ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﺍﳌﺴﺎﻛﻦ ﻭﺍﻷﻣﺎﻛﻦ ﺍﳌﻠﺤﻘﺔ ‪‬ﺎ‪ ،‬ﻓﻘﺪ ﺃﺿﻔﻰ ﻋﻠﻴﻬﺎ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺋﻲ ﲪﺎﻳﺔ ﺧﺎﺻﺔ ﺑﺈﻋﺘﺒﺎﺭﻫﺎ‬
‫ﻣﻜﻨﻮﻧﺎ ﻟﺴﺮ ﺍﻷﻓﺮﺍﺩ ﻭﳏﻼ ﳋﺼﻮﺻﻴﺎ‪‬ﻢ‪ ،‬ﻭﻣﻦ ﺍﻟﻀﻤﺎﻧﺎﺕ ﺍﳌﻘﺮﺭﺓ ﰲ ﺍﻟﺸﺮﻳﻌﺎﺕ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﳉﺰﺍﺋﻴﺔ ﺃﻧﻪ‬
‫ﻻ ﳚﻮﺯ ﺗﻔﺘﻴﺶ ﺍﳌﺴﺎﻛﻦ ﺃﻭ ﺍﻟﺸﺮﻭﻉ ﰲ ﺗﻔﺘﻴﺸﻬﺎ ﺇﻻ ﺑﺈﺫﻥ ﻣﻜﺘﻮﺏ ﻣﻦ ﺍﻟﺴﻠﻄﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﺨﺘﺼﺔ ‪.‬‬
‫ﻭﺍﻟﺴﺆﺍﻝ ﺍﳌﻄﺮﻭﺡ ﻫﻨﺎ ﻫﻞ ﳝﻜﻦ ﺇﻋﻤﺎﻝ ﺫﺍﺕ ﺍﻟﺸﺮﻁ ﻋﻨﺪﻣﺎ ﻳﺘﻌﻠﻖ ﺍﻷﻣﺮ ﺑﺘﻔﺘﻴﺶ ﻣﻨﻈﻮﻣﺔ‬
‫ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻭ ﺟﺰﺀ ﻣﻨﻬﺎ؟ ﺃﻱ ﻫﻞ ﳝﻜﻦ ﺍﻟﻘﻮﻝ ﺃﻧﻪ ﻻ ﳚﻮﺯ ﺍﻟﻮﻟﻮﺝ ﺇﱃ ﺍﻟﺒﻴﺌﺔ ﺍﻟﺮﻗﻤﻴﺔ ﻭﺍﻟﻘﻴﺎﻡ ﺑﺘﻔﺘﻴﺸﻬﺎ‬
‫ﻣﻦ ﻃﺮﻑ ﺍﻟﻀﺒﻄﻴﺔ ﺇﻻ ﺑﺈﺫﻥ ﻣﻜﺘﻮﺏ ﻣﻦ ﺍﻟﺴﻠﻄﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﺨﺘﺼﺔ؟ ﺃﻭ ﲟﻌﲎ ﺁﺧﺮ ﻣﺎ ﻣﺪﻯ ﺍﺷﺘﺮﺍﻁ‬
‫ﺇﺫﻥ ﺑﺎﻟﺘﻔﺘﻴﺶ ﺧﺎﺹ ﺑﺎﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‪.‬‬
‫ﻏﺎﻟﺒﺎ ﻣﺎ ﻳﺼﺪﺭ ﺍﻹﺫﻥ ﺑﺘﻔﺘﻴﺶ ﻣﺴﻜﻦ ﺍﳌﺘﻬﻢ ﻭﻳﻨﺼﺮﻑ ﻫﺬﺍ ﺍﻹﺫﻥ ﺇﱃ ﻛﻞ ﻣﺎ ﻳﺘﻮﺍﺟﺪ ﰲ‬
‫ﺍﳌﺴﻜﻦ ﻭﻣﻦ ﰒ ﻓﻬﻞ ﳚﻮﺯ ﲟﺘﻘﻀﻰ ﻫﺬﺍﺍﻹﺫﻥ ﻟﻀﺒﺎﻁ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﻟﻮﻟﻮﺝ ﺇﱃ ﺍﻟﺒﻴﺌﺔ ﺍﻟﺮﻗﻤﻴﺔ‬
‫ﻭﺍﻟﺘﻐﻠﻐﻞ ﰲ ﺍﳌﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻟﻠﺒﺤﺚ ﻋﻦ ﺍﻷﺩﻟﺔ ﺍﻹﺛﺒﺎﺗﻴﺔ ﺍﻟﱵ ﳝﻜﻦ ﺃﻥ ﺗﻜﻮﻥ ﳏﻞ ﺿﺒﻂ؟‬
‫ﺇﻧﻪ ﻣﻦ ﺍﳌﺴﺘﻘﺮ ﻋﻠﻴﻪ ﰲ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﳌﻘﺎﺭﻧﺔ ﻛﺎﻟﻘﺎﻧﻮﻥ ﺍﻻﻣﺮﻳﻜﻲ ﻣﺜﻼ ﻻ ﳚﻴﺰ ﺗﻔﺘﻴﺶ ﺟﻬﺎﺯ‬
‫ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﺍﻻ ﺑﻨﺎﺀ ﻋﻠﻰ ﺇﺫﻥ ﻭﻓﻘﺎ ﻟﻠﺼﻞ ﺍﻟﻌﺎﻡ ‪.‬ﺃﻣﺎ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻓﺈﻧﻪ ﰲ ﺍﻋﺘﻘﺎﺩﻧﺎ ﱂ ﻳﻘﺪﻡ ﺣﻼ‬
‫ﳍﺬﻩ ﺍﳌﺴﺄﻟﺔ ﺑﺼﻮﺭﺓ ﺻﺮﳛﺔ‪ ،‬ﺫﻟﻚ ﺃﻥ ﺍﻟﻘﻮﺍﻋﺪ ﺍﳋﺎﺻﺔ ﺑﺈﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﺍﳌﺬﻛﻮﺭﺓ ﰲ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ‬
‫ﺍﳉﺰﺍﺋﻴﺔ ﺗﺘﻌﻠﻖ ﺑﺎﻟﺘﻔﺘﻴﺶ ﺍﻟﺘﻘﻠﻴﺪﻱ ﺍﻟﺬﻱ ﳏﻠﻪ ﺍﳌﺴﺎﻛﻦ ﻭﻣﻠﺤﻘﺎ‪‬ﺎ‪ ،‬ﻭﺃﻥ ﺍﻟﻘﻮﺍﻋﺪ ﺍﳋﺎﺻﺔ ﺑﺈﺟﺮﺍﺀ‬
‫ﺍﻟﺘﻔﺘﻴﺶ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺍﻟﻮﺍﺭﺩﺓ ﺑﺎﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﻻ ﳒﺪ ﺍﻟﺸﺮﻉ ﻳﺘﺤﺪﺙ ﻋﻦ ﻫﺬﺍ ﺍﻟﺸﺮﻁ ﺇﻃﻼﻗﺎ‪ ،‬ﻛﻞ ﻣﺎ‬
‫ﰲ ﺍﻷﻣﺮ ﺃﻧﻪ ﲢﺪﺙ ﻋﻦ ﺇﻋﻼﻡ ﺟﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﺍﻟﺴﻠﻄﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﺨﺘﺼﺔ ﰲ ﺣﺎﻟﺔ ﲤﺪﻳﺪ ﺍﻟﺘﻔﺘﻴﺶ ﺇﱃ‬
‫ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﺧﺮﻯ‪.‬‬
‫ﻓﻬﻞ ﻳﻌﲏ ﻫﺬﺍ ﺍﻟﺴﻜﻮﺕ ﻣﻦ ﻃﺮﻑ ﺍﳌﺸﺮﻉ ﺃﻧﻪ ﳚﻮﺯ ﺗﻔﺘﻴﺶ ﺍﳌﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺩﻭﻥ ﺣﺎﺟﺔ‬
‫ﺇﱃ ﺇﺫﻥ ﺁﺧﺮ ﺑﺎﻟﺘﻔﺘﻴﺶ ﳜﺺ ﺍﳌﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻳﻜﻔﻲ ﻓﻘﻂ ﺍﻹﺫﻥ ﺍﳌﺘﻌﻠﻖ ﺑﺎﳌﺴﻜﻦ ﺍﻟﺬﻱ ﻳﺘﻮﺍﺟﺪ‬
‫ﻓﻴﻪ ﺍﳊﺎﺳﻮﺏ؟‬
‫ﻭﻃﺒﻘﺎ ﳌﻌﻴﺎﺭ ﺍﳋﺼﻮﺻﻴﺔ ﺍﻟﱵ ﳛﻤﻴﻬﺎ ﺍﳌﺸﺮﻉ ﻓﺈﻥ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻭﻣﺎ ﳛﺘﻮﻳﻪ ﻣﻦ ﺃﺳﺮﺍﺭ‬
‫ﻭﺧﺼﻮﺻﻴﺎﺕ ﺍﻷﺷﺨﺎﺹ‪ ،‬ﻓﺈﻧﻪ ﳜﻀﻊ ﺑﺎﻟﺘﺒﻌﻴﺔ ﳌﺒﺪﺃ ﻋﺪﻡ ﺟﻮﺍﺯ ﺍﻟﺪﺧﻮﻝ ﺇﱃ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‬

‫‪- 156 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﺗﻔﺘﻴﺸﻪ ﺩﻭﻥ ﺇﺫﻥ ﻣﻦ ﺍﻟﺴﻠﻄﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﺨﺘﺼﺔ‪ ،‬ﻭﻣﺆﺩﻯ ﺫﻟﻚ ﺃﻥ ﺿﺎﺑﻂ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻣﻦ ﺃﺟﻞ‬
‫ﺗﻔﺘﻴﺶ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﻓﺈﻧﻪ ﳛﺘﺎﺝ ﰲ ﺍﻟﻐﺎﻟﺐ ﺇﱃ ﺇﺫﻧﲔ ﺑﺎﻟﺘﻨﻔﺘﻴﺶ‪ ،‬ﺍﻷﻭﻝ ﳜﺺ ﺍﳌﺴﻜﻦ ﺍﻟﺬﻱ‬
‫ﻳﺘﻮﺍﺟﺪ ﺑﻪ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻟﺜﺎﱐ ﻳﺘﻌﻠﻖ ﺑﺘﻔﺘﻴﺶ ﺍﳌﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺣﺪ ﺫﺍ‪‬ﺎ ﺃﻭ ﻋﻠﻰ ﺍﻷﻗﻞ ﺇﺫﻧﺎ ﻭﺍﺣﺪﺍ‬
‫ﳚﻴﺰ ﻟﻀﺎﺑﻂ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺗﻔﺘﻴﺶ ﺟﻬﺎﺯ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﺍﳋﺎﺹ ﺑﺎﻟﺘﻬﻢ ﺇﱃ ﺟﺎﻧﺐ ﺗﻔﺘﻴﺶ ﺍﻟﺴﻜﻦ‪.‬‬
‫‪/4.2‬ﲢﺪﻳﺪ ﳎﺎﻝ ﺍﻹﺫﻥ ﺑﺎﻟﺘﻔﺘﻴﺶﻳﺘﺠﻪ ﺍﻟﺮﺃﻱ ﺍﻟﻐﺎﻟﺐ ﰲ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﳌﻘﺎﺭﻧﺔ ﻋﻠﻰ ﻏﺮﺍﺭ‬
‫ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﺇﱃ ﺗﻄﻠﺐ ﺷﺮﻁ ﺍﻟﺘﺤﺪﻳﺪ ﻟﺼﺤﺔ ﺍﻹﺫﻥ ﺑﺎﻟﺘﻔﺘﻴﺶ ﺇﺫ ﻧﺼﺖ ﺍﳌﺎﺩﺓ ‪....." 44‬ﳚﺐ‬
‫ﺃﻥ ﻳﺘﻌﲔ ﺍﻹﺫﻥ ﺑﺎﻟﺘﻔﺘﻴﺶ ﺑﻴﺎﻥ ﻭﺻﻒ ﺍﳉﺮﻡ ﻭﻋﻨﻮﺍﻥ ﺍﻷﻣﺎﻛﻦ ﺍﻟﱵ ﻳﺘﻢ ﺯﻳﺎﺭ‪‬ﺎ ﻭﺗﻔﺘﻴﺸﻬﺎ ﻭﺫﻟﻚ ﲢﺖ‬
‫ﻃﺎﺋﻠﺔ ﺍﻟﺒﻄﻼﻥ"‪.‬ﻭﰲ ﻧﻄﺎﻕ ﺗﻔﺘﻴﺶ ﺍﻷﻧﻈﻤﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔﻓﻤﻦ ﺍﳌﻌﻠﻮﻡ ﺃﻥ ﺍﻟﺘﺨﺰﻳﻦ ﻫﻮ ﺍﻟﺒﻴﺌﺔ ﺍﻟﱵ ﺗﺘﺼﻒ‬
‫‪‬ﺎ ﺍﳊﻮﺳﺒﺔ ﺃﻭ ﺍﻟﺮﻗﻤﻴﺔ‪ ،‬ﻓﺎﻟﺒﻴﺌﺔ ﺍﻟﺮﻗﻤﻴﺔ ‪‬ﺬﻩ ﺍﻟﺼﻔﺔ ﺗﻌﺪ ﳎﺎﻻ ﺿﺨﻤﺎ ﳝﻜﻨﻪ ﲣﺰﻳﻦ ﻣﻠﻴﺎﺭﺍﺕ ﺍﳌﻌﻠﻮﻣﺎﺕ‬
‫ﻭﺍﳌﻠﻔﺎﺕ‪ ،‬ﻣﻦ ﺃﺟﻞ ﻫﺬﺍ ﻓﺈﻥ ﺻﻴﺎﻏﺔ ﺍﻹﺫﻥ ﺑﺎﻟﺘﻔﺘﻴﺶ ﺍﳋﺎﺹ ﺑﺎﻟﺒﻴﺌﺔ ﺍﻟﺮﻗﻤﻴﺔ ﻭﺣﱴ ﺗﻨﻔﻴﺬﻩ ﻳﺸﻜﻼﻥ‬
‫ﲢﺪﻳﺎﺕ ﻛﺒﲑﺓ ﺇﺫ ﺃﻥ ﺍﳌﺎﺩﺓ ﺍﳌﻄﻠﻮﺑﺔ ﻗﺪ ﲣﺘﻠﻂ ﺑﻜﻤﻴﺎﺕ ﻫﺎﺋﻠﺔ ﻣﻦ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻷﺧﺮﻯ ﺍﻟﱵ ﻻ ﺗﻨﺎﺳﺐ‬
‫ﺍﳌﻮﺿﻮﻉ ﻗﻴﺪ ﺍﻟﺘﺤﻘﻴﻖ‪ ،‬ﻟﺬﻟﻚ ﻓﺈﻧﻪ ﻻ ﻳﺴﺘﻘﻴﻢ ﺍﻷﻣﺮ ﻣﻊ ﻣﺒﺪﺃ ﺍﳋﺼﻮﺻﻴﺔ ﺃﻥ ﻳﻄﻠﻊ ﺿﺎﺑﻂ ﺍﻟﺸﺮﻃﺔ‬
‫ﺍﻟﻘﻀﺎﺋﻴﺔ ﻋﻠﻰ ﲨﻴﻊ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻟﺸﺨﺼﻴﺔ ﺍﳌﻮﺟﻮﺩﺓ ﺑﺎﳊﺎﺳﻮﺏ‪ ،‬ﻛﻤﺎ ﺃﻥ ﺿﺒﻂ ﺍﻟﻨﻈﺎﻡ ﺑﺮﻣﺘﻪ ﻗﺪ ﻳﺴﺒﺐ‬
‫) ‪(1‬‬
‫ﺧﺴﺎﺭﺓ ﻏﲑ ﻭﺍﺟﺒﺔ ﻟﻠﻤﺸﺘﺒﻪ ﻓﻴﻪ‬
‫ﻭﺑﺎﻟﺘﺎﱄ ﻻ ﻳﻔﻴﺪ ﺍﻟﺘﻔﺘﻴﺶ ﺃﻥ ﻳﻜﻮﻥ ﺷﺎﻣﻼ ﻭﺇﳕﺎ ﻳﻨﺒﻐﻲ ﺃﻥ ﻳﻜﻮﻥ ﺃﻛﺜﺮ ﲣﺼﺼﺎ ﻟﻜﻲ ﻳﻜﻮﻥ‬
‫ﻣﱪﺭﺍ‪.‬ﻭﻻ ﺷﻚ ﺃﻥ ﰲ ﲢﺪﻳﺪ ﺇﺫﻥ ﺍﻟﺘﻔﺘﻴﺶ ﲢﺪﻳﺪﺍ ﺩﻗﻴﻘﺎﺑﺎﻟﻨﺴﺒﺔ ﻟﻠﺠﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻗﺪ ﳜﻠﻖ ﺻﻌﻮﺑﺔ‬
‫ﺃﺛﻨﺎﺀ ﺍﳌﻤﺎﺭﺳﺔ ﺍﻟﻌﻤﻠﻴﺔ ﰲ ﺗﻔﺘﻴﺶ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ‪ ،‬ﻭﻳﺮﺟﻊ ﺫﻟﻚ ﻛﻤﺎ ﺫﻛﺮﻧﺎ ﺇﱃ ﺍﻟﻄﺒﻴﻌﺔ ﺍﳋﺎﺻﺔ‬
‫ﳍﺬﻩ ﺍﻷﺧﲑﺓ ﻣﻦ ﺣﻴﺚ ﻛﻮ‪‬ﺎ ﲢﺘﻮﻱ ﻋﻠﻰ ﻋﺪﺩ ﻛﺒﲑ ﻣﻦ ﺍﳌﻠﻔﺎﺕ ﻭﻫﻮ ﻣﺎ ﻳﺜﲑ ﺍﻟﺘﺴﺎﺅﻝ ﺣﻮﻝ ﻣﺎ ﺇﺫﺍ‬
‫ﻛﺎﻥ ﻛﻞ ﻣﻠﻒ ﻳﻠﺰﻡ ﻣﻌﺎﻣﻠﺘﻪ ﻛﺼﻨﺪﻭﻕ ﻣﻐﻠﻖ ﳛﺘﺎﺝ ﻛﻞ ﻭﺍﺣﺪ ﻣﻨﻬﺎ ﺇﱃ ﺇﺫﻥ ﻗﻀﺎﺋﻲ ﻣﺴﺘﻘﻞ ﻋﻦ‬
‫) ‪(2‬‬
‫ﺍﻵﺧﺮ‬
‫ﻭﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻛﺄﻏﻠﺐ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﻻ ﻳﻘﺪﻡ ﺣﻼ ﳍﺬﻩ ﺍﳌﺴﺄﻟﺔ ﻭﻣﺎ ﳒﺪﻩ ﻋﻠﻰ ﻣﺴﺘﻮﻯ‬
‫ﺍﻟﻌﻤﻞ ﺍﻟﻘﻀﺎﺋﻲ ﰲ ﺍﻟﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ ﺍﻷﻣﺮﻳﻜﻴﺔ‪ ،‬ﻭﺟﻮﺩ ﺗﻀﺎﺭﺏ ﺑﲔ ﺍﻷﺣﻜﺎﻡ ﺍﻟﻘﻀﺎﺋﻴﺔ ﲞﺼﻮﺹ‬
‫ﻫﺬﻩ ﺍﳌﺴﺄﻟﺔ ﻓﻔﻴﻤﺎ ﺇﻋﺘﱪﺕ ﺑﻌﺾ ﺍﻷﺣﻜﺎﻡ ﺃﻥ ﺟﻬﺎﺯ ﺍﳊﺎﺳﻮﺏ ﲟﺎ ﳛﺘﻮﻳﻪ ﻣﻦ ﻣﻠﻔﺎﺕ ﻭﻣﻌﻠﻮﻣﺎﺕ‬

‫)‪(1‬ﺃﻧﻈﺮ ﰲ ﻫﺬﺍ ﺍﳌﻌﲏ ﺩ‪.‬ﺧﺎﻟﺪ ﳑﺪﻭﺡ ﺇﺑﺮﺍﻫﻴﻢ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪.221 ،‬‬


‫)‪(2‬ﺷﻴﻤﺎﺀ ﻋﺒﺪ ﺍﻟﻐﲏ ﳏﻤﺪ ﻋﻄﺎﺀ ﺍﷲ‪،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ‪.290‬‬

‫‪- 157 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺻﻨﺪﻭﻗﺎ ﻭﺍﺣﺪﺍ ﻭﻻ ﻳﺴﺘﻮﺟﺐ ﺗﻔﺘﻴﺸﻪ ﺇﻻ ﺇﺫﻧﺎ ﻭﺍﺣﺪﺍ ﻓﻘﻂ‪ ،‬ﺇﻋﺘﱪﺕ ﻋﻠﻰ ﺧﻼﻑ ﺫﻟﻚ ﺃﺣﻜﺎﻡ‬
‫ﺃﺧﺮﻯ ﺃﻥ ﻛﻞ ﻣﻠﻒ ﰲ ﺍﳊﺎﺳﻮﺏ ﻳﺘﻄﻠﺐ ﺇﺫﻧﺎ ﺧﺎﺻﺎ ﻟﺘﻔﺘﻴﺸﻪ‪ ،‬ﻣﺴﺒﺒﺔ ﺣﻜﻤﻬﺎ ﻋﻠﻰ ﺃﺳﺎﺱ ﺃﻥ‬
‫ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﳛﺘﻮﻱ ﻋﻠﻰ ﺍﻟﻜﺜﲑ ﻣﻦ ﺍﳌﻠﻔﺎﺕ‪ ،‬ﻭ ﺇﺫﺍ ﻛﺎﻥ ﺃﺟﻴﺰ ﻟﻀﺎﺑﻂ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻓﺘﺢ ﺍﳌﻠﻔﺎﺕ‬
‫ﺍﻷﺧﺮﻯ ﺍﳌﻮﺟﻮﺩﺓ ﺩﺍﺧﻞ ﺟﻬﺎﺯ ﺍﳊﺎﺳﻮﺏ ﻓﺈﻥ ﺫﻟﻚ ﺳﻮﻑ ﻳﺆﺩﻱ ﺑﺎﻟﻔﻌﻞ ﺇﱃ ﺍﻹﻋﺘﺪﺍﺀ ﻋﻠﻰ ﺍﳊﻴﺎﺓ‬
‫ﺍﳋﺎﺻﺔ ﺍﻟﱵ ﻳﺘﻤﺘﻊ ‪‬ﺎ ﺍﻟﻔﺮﺩ‪.1‬‬
‫ﻭﻣﻦ ﺍﻟﺪﻭﻝ ﺍﻟﱵ ﻧﺼﺖ ﺗﺸﺮﻳﻌﺎ‪‬ﺎ ﻋﻠﻰ ﺿﺮﻭﺭﺓ ﲢﺪﻳﺪ ﳎﺎﻝ ﺍﻹﺫﻥ ﺑﺎﻟﺘﻔﺘﻴﺶ ﺍﻟﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ‬
‫ﺍﻷﻣﺮﻳﻜﻴﺔ ﻭﻛﻨﺪﺍ ﺣﻴﺚ ﻧﺼﺘﺎ ﻋﻠﻰ ﺃﻥ ﻳﻜﻮﻥ ﺇﺫﻥ ﺍﻟﺘﻔﺘﻴﺶ ﻣﺘﻀﻤﻨﺎ‪:‬‬
‫‪ -‬ﺍﻟﺒﺤﺚ ﻋﻦ ﺃﺩﻟﺔ ﻣﺘﺤﺼﻠﺔ ﻣﻦ ﻛﻴﺎﻥ ﺍﳊﺎﺳﺐ ﺍﳌﻨﻄﻘﻲ ﻭﺍﻟﱵ ﻳﺪﺧﻞ ﻓﻴﻬﺎ ﺑﺮﺍﻣﺞ ﺍﻟﺘﻄﺒﻴﻖ‬
‫ﻭﻧﻈﻢ ﺍﻟﺘﺸﻐﻴﻞ‪.‬‬
‫‪ -‬ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﳌﺴﺘﺨﺪﻣﺔ ﺑﻮﺍﺳﻄﺔ ﺑﺮﻧﺎﻣﺞ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ‪.‬‬
‫‪ -‬ﺍﻟﺴﺠﻼﺕ ﺍﻟﱵ ﺗﺜﺒﺖ ﺇﺳﺘﺨﺪﺍﻡ ﺍﻷﻧﻈﻤﺔ ﺍﻵﻟﻴﺔ ﳌﻌﺎﳉﺔ ﺍﻟﺒﻴﺎﻧﺎﺕ ‪.‬‬
‫‪ -‬ﺍﻟﺴﺠﻼﺕ ﺍﳌﺴﺘﺨﺪﻣﺔ ﰲ ﻋﻤﻠﻴﺔ ﺍﻟﻮﻟﻮﺝ ﰲ ﺍﻟﻨﻈﺎﻡ ﺍﻵﱄ ﳌﻌﺎﳉﺔ ﺍﻟﺒﻴﺎﻧﺎﺕ‪.‬‬
‫ﺛﺎﻧﻴﺎ‪ :‬ﺿﺒﻂ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪ :‬ﺇﻥ ﺍﻟﻨﺘﻴﺠﺔ ﺍﻟﻄﺒﻴﻌﻴﺔ ﺍﻟﱵ ﻳﻨﺘﻬﻲ ﺇﻟﻴﻬﺎ ﺍﻟﺘﻔﺘﻴﺶ ﻫﻲ ﺿﺒﻂ ﺍﻷﺩﻟﺔ‬
‫ﺍﻟﱵ ﻳﺘﻢ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻬﺎ ﺃﺛﻨﺎﺀﻩ ﻓﺎﻟﻀﺒﻂ ﺇﺫﻥ ﻫﻮ ﻏﺎﻳﺔ ﺍﻟﺘﻔﺘﻴﺶ ﺍﻟﻘﺮﻳﺒﺔ ﻭﺍﻷﺛﺮ ﺍﳌﺒﺎﺷﺮ ﺍﻟﺬﻱ ﻳﺴﻔﺮ ﻋﻨﻪ‬
‫ﺍﻹﺟﺮﺍﺀ‪.‬‬
‫ﻭﺍﻷﺳﺎﺱ ﺍﻟﻘﺎﻧﻮﱐ ﻟﻠﻀﺒﻂ ﻫﻮ ﺍﻟﻌﻼﻗﺔ ﺍﻟﱵ ﺗﺮﺑﻂ ﺑﻴﻨﻪ ﻭﺑﲔ ﺍﻷﺷﻴﺎﺀ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﳉﺮﳝﺔ ﺍﻟﱵ ﻳﺸﻤﻠﻬﺎ‬
‫ﺍﻟﺘﺤﻘﻴﻖ ﻭﺍﻟﱵ ﺗﻔﻴﺪ ﰲ ﻛﺸﻒ ﺍﳊﻘﻴﻘﺔ ﻣﺎ ﻛﺎﻥ ﻣﻨﻬﺎ ﺿﺪ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﺃﻭ ﻣﺎ ﻛﺎﻥ ﰲ ﻣﺼﻠﺤﺘﻪ‪.‬‬
‫ﻭﻟﻘﺪ ﺗﻌﻮﺩﺕ ﺟﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﺃﻥ ﻳﻘﻊ ﺍﻟﻀﺒﻂ ﻋﻠﻰ ﺍﻷﺷﻴﺎﺀ ﺍﳌﺎﺩﻳﺔ ﻓﻘﻂ‬
‫ﺑﻮﺻﻔﻬﺎ ﺃﺩﻟﺔ ﻣﺎﺩﻳﺔ ﻟﻠﺠﺮﳝﺔ ﺍﻟﱵ ﳚﺮﻱ ﺍﻟﺘﻔﺘﻴﺶ ﺑﺸﺄ‪‬ﺎ‪ ،‬ﻟﻜﻦ ﰲ ﳎﺎﻝ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﻄﺒﻴﻌﻴﺔ‬
‫ﺍﻟﻌﻠﻤﻴﺔ ﺍﳌﻌﻘﺪﺓ ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺍﻟﺬﻱ ﻳﻮﺟﺐ ﺍﻟﺘﻔﺘﻴﺶ ﻋﻨﻪ ﻭﺿﺒﻄﻪ ﻹﺛﺒﺎﺕ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﻟﻴﺲ‬
‫ﻛﺎﻟﺪﻟﻴﻞ ﺍﻟﺘﻘﻠﻴﺪﻱ‪ ،‬ﻓﺎﻟﺒﻴﺌﺔ ﺍﻹﻓﺘﺮﺍﺿﻴﺔ ﻻ ﺗﻨﺘﺞ ﺳﻜﻴﻨﺎ ﺃﻭ ﺳﻼﺣﺎﻧﺎﺭﻳﺎ ﻭﺇﳕﺎ ﺗﻨﺘﺞ ﻧﺒﻀﺎﺕ ﺭﻗﻤﻴﺔ ﺗﺸﻜﻞ‬
‫ﻗﻴﻤﺔ ﻭﺟﻮﻫﺮ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻓﻬﻞ ﻳﺼﻠﺢ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﻟﺪﻟﻴﻞ ﻷﻥ ﻳﻜﻮﻥ ﳏﻼ ﻟﻠﻀﺒﻂ‪،‬ﻭﻣﺎ ﻫﻲ‬
‫ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳌﺘﺒﻌﺔ ﰲ ﺫﻟﻚ؟‬

‫‪1‬‬
‫) ( ﻣﺸﺎر اﻟﯿﮫ ﻟﺪى رﺷﯿﺪة ﺑﻮﻛﺮ‪ ،‬ﻣﺮﺟﻊ ﺳﺎﺑﻖ ‪،‬ص‪.412‬‬

‫‪- 158 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪/1‬ﻣﺪﻯ ﺻﻼﺣﻴﺔ ﺿﺒﻂ ﺃﺩﻟﺔ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬ﻏﲏ ﻋﻦ ﺍﻟﺒﻴﺎﻥ ﺃﻥ ﺍﻟﻀﺒﻂ ﻫﻮ ﻭﺿﻊ ﺍﻟﻴﺪ‬
‫ﻋﻠﻰ ﺷﻲﺀ ﻳﺘﺼﻞ ﺑﺎﳉﺮﳝﺔ ﻭﻳﻔﻴﺪ ﰲ ﻛﺸﻒ ﺍﳊﻘﻴﻘﺔ ﻋﻨﻬﺎ ﻭﻋﻦ ﻣﺮﺗﻜﺒﻬﺎ‪(1)،‬ﻭﻫﻮ ﻛﻤﺎ ﺳﺒﻖ ﺍﻟﻘﻮﻝ ﻻ‬
‫ﻳﺮﺩ ﺇﻻ ﻋﻠﻰ ﺍﻷﺷﻴﺎﺀ ﺍﳌﺎﺩﻱ‪ ،‬ﻭﻋﻠﻰ ﻫﺬﺍ ﺍﻷﺳﺎﺱ ﻓﺈﻥ ﺿﺒﻂ ﺍﳌﻜﻮﻧﺎﺕ ﺍﳌﺎﺩﻳﺔ ﻟﻠﺤﺎﺳﻮﺏ ﻻ ﻳﺜﲑ‬
‫ﻣﺸﺎﻛﻞ ﰲ ﺍﻟﻔﻘﻪ ﺍﳌﻘﺎﺭﻥ ﻭﻻ ﻳﻮﺟﺪ ﺧﻼﻑ ﺑﲔ ﻓﻘﻬﺎﺀ ﺍﻟﻘﺎﻧﻮﻥ ﰲ ﺇﻣﻜﺎﻧﻴﺔ ﺿﺒﻂ ﻫﺬﻩ ﺍﳌﻜﻮﻧﺎﺕ)‪(2‬ﺑﻞ‬
‫ﺣﱴ ﺇﻣﻜﺎﻧﻴﺔ ﺿﺒﻂ ﺍﳊﺎﺳﻮﺏ ﺑﺸﻜﻞ ﻛﺎﻣﻞ ﻟﺘﺄﻛﻴﺪ ﺍﻹﺣﺘﻔﺎﻅ ﺑﺎﻟﺪﻟﻴﻞ ﺇﺫﺍ ﻛﺎﻥ ﻣﺸﻐﻞ ﺍﳉﻬﺎﺯ ﻏﲑ‬
‫ﻣﺘﻌﺎﻭﻥ ﻣﻊ ﺟﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ‪(3).‬ﺃﻣﺎ ﺑﺎﻟﻨﺴﺒﺔ ﳌﻜﻮﻧﺎﺕ ﺍﳊﺎﺳﻮﺏ ﺍﳌﻌﻨﻮﻳﺔ ﻓﺈﻥ ﺍﳌﺴﺄﻟﺔ ﲢﺘﺎﺝ ﺇﱃ ﻭﻗﻔﺔ‬
‫ﻣﻦ ﺃﺟﻞ ﺍﻟﺒﺤﺜﻔﻴﻬﺎ ﺑﺸﻜﻞ ﺩﻗﻴﻖ ‪.‬‬
‫ﻟﻘﺪ ﺇﺧﺘﻠﻔﺖ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻹﺟﺮﺍﺋﻴﺔ ﻭﺍﻹﲡﺎﻫﺎﺕ ﺍﻟﻔﻘﻬﻴﺔ ﺣﻮﻝ ﻣﺴﺄﻟﺔ ﺿﺒﻂ ﺍﻷﺷﻴﺎﺀ ﺍﳌﻌﻨﻮﻳﺔ‬
‫ﻭﺍﻟﻜﻴﺎﻧﺎﺕ ﺍﳌﻨﻄﻘﻴﺔ ﻭﺍﻟﱵ ﻻ ﺗﺼﻠﺢ ﺑﻄﺒﻴﻌﺘﻬﺎ ﳏﻼ ﻟﻮﺿﻊ ﺍﻟﻴﺪ ﻭﻫﻲ ﳎﺮﺩﺓ ﻣﻦ ﺩﻋﺎﻣﺘﻬﺎ ﺍﳌﺎﺩﻳﺔ ﺍﳌﺜﺒﺘﺔ‬
‫ﻋﻠﻴﻬﺎ‪ ،‬ﻭﺇﻧﻘﺴﻤﺖ ﰲ ﺫﻟﻚ ﺇﱃ ﺇﲡﺎﻫﲔ‪:‬‬
‫ﺍﻹﲡﺎﻩ ﺍﻷﻭﻝ‪ :‬ﻳﺮﻯ ﺃﺻﺤﺎﺑﻪ ﺃﻧﻪ ﻻ ﳝﻜﻦ ﺗﺼﻮﺭ ﺇﺟﺮﺍﺀ ﺍﻟﻀﺒﻂ ﻋﻠﻰ ﺍﻟﻜﻴﺎﻧﺎﺕ ﺍﳌﻨﻄﻘﻴﺔ‬
‫ﻟﻠﺤﺎﺳﻮﺏ ﻹﻧﺘﻔﺎﺀ ﺍﻟﻜﻴﺎﻥ ﺍﳌﺎﺩﻱ ﻋﻨﻬﺎ‪ ،‬ﻭﺑﺎﻟﺘﺎﱄ ﻋﺪﻡ ﺻﻼﺣﻴﺔ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﳌﺨﺰﻧﺔ ﺁﻟﻴﺎ ﻷﻥ ﺗﻜﻮﻥ ﳏﻼ‬
‫ﻟﻠﻀﺒﻂ ﺑﺎﻟﻜﻴﻔﻴﺔ ﺍﳌﻨﺼﻮﺹ ﻋﻠﻴﻬﺎ ﲟﻮﺟﺐ ﺍﻟﻨﺼﻮﺹ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻹﻧﺘﻔﺎﺀ ﺍﻟﻄﺎﺑﻊ ﺍﳌﺎﺩﻱ ﻋﻦ ﻫﺬﻩ ﺍﻟﺒﻴﺎﻧﺎﺕ‬
‫ﰲ ﺣﺎﻝ ﲡﺮﺩﻫﺎ ﻋﻦ ﺍﻟﺪﻋﺎﻣﺔ ﺍﳌﺎﺩﻳﺔ‪(4)،‬ﻭﻣﻦ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻟﱵ ﺃﺧﺬﺕ ‪‬ﺬﺍ ﺍﻹﲡﺎﻩ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ‬
‫) ‪(5‬‬
‫ﺍﳉﻨﺎﺋﻴﺔ ﺍﻷﳌﺎﱐ‬
‫ﺍﻹﲡﺎﻩ ﺍﻟﺜﺎﱐ‪ :‬ﻳﺮﻯ ﺃﻧﺼﺎﺭ ﻫﺬﺍ ﺍﻹﲡﺎﻩ ﺃﻥ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﺨﺰﻧﺔ ﺁﻟﻴﺎ ﻛﻮ‪‬ﺎ ﳎﺮﺩﺓ ﻋﻦ ﺍﻟﺪﻋﺎﻣﺔ‬
‫ﺍﳌﺎﺩﻳﺔ ﺍﻟﱵ ﲢﻮﻳﻬﺎ ﻻ ﻳﻮﺟﺪ ﻣﺎ ﳝﻨﻊ ﻣﻦ ﺻﻼﺣﻴﺘﻬﺎ ‪‬ﺬﻩ ﺍﻟﺼﻮﺭﺓ ﻷﻥ ﺗﻜﻮﻥ ﳏﻼ ﻟﻠﻀﺒﻂ ﺍﳌﻨﺼﻮﺹ‬
‫ﻋﻠﻴﻪ ﲟﻘﺘﻀﻰ ﺍﻟﻨﺼﻮﺹ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻣﺴﺘﻨﺪﻳﻦ ﺇﱃ ﺃﻥ ﺍﻟﻐﺎﻳﺔ ﻣﻦ ﺍﻟﺘﻔﺘﻴﺶ ﻫﻮ ﺿﺒﻂ ﺍﻷﺩﻟﺔ ﺍﻟﱵ ﺗﻔﻴﺪ ﰲ‬
‫ﻛﺸﻒ ﺍﳊﻘﻴﻘﺔ ﻭﺑﺎﻟﺘﺎﱄ ﳝﺘﺪ ﻫﺬﺍ ﺍﳌﻔﻬﻮﻡ ﻟﻴﺸﻤﻞ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﲟﺨﺘﻠﻒ ﺃﺷﻜﺎﳍﺎ‪.‬‬

‫)‪(1‬ﺧﺎﻟﺪ ﻋﻴﺎﺩ ﺍﳊﻠﱯ‪ ،‬ﺇﺟﺮﺍﺀﺍﺕ ﺍﻟﺘﺤﺮﻱ ﻭ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺟﺮﺍﺋﻢ ﺍﳊﺎﺳﻮﺏ ﻭ ﺍﻷﻧﺘﺮﻧﺎﺕ‪.‬ﺩﺍﺭ ﺍﻟﺜﻘﺎﻓﺔ ﻟﻠﻨﺸﺮ ﻭ ﺍﻟﺘﻮﺯﻳﻊ ‪.‬ﺍﻷﺭﺩﻥ ‪2011‬ﺹ‪.170‬‬
‫)‪(2‬ﻫﺎﺷﻢ ﳏﻤﺪ ﻓﺮﻳﺪ ﺭﺳﺘﻢ‪ .‬ﺍﳉﻮﺍﻧﺐ ﺍﻹﺟﺮﺍﺋﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺩﺭﺍﺳﺔ ﻣﻘﺎﺭﻧﺔ ﻣﻜﺘﺒﺔ ﺍﻵﻻﺕ ﺍﳊﺪﻳﺜﺔ ﺃﺳﻴﻮﻁ ‪ ،1994‬ﺹ‪.93‬‬
‫)‪(3‬ﻋﻔﻴﻔﻲ ﻛﺎﻣﻞ ﻋﻔﻴﻔﻲ‪.‬ﺟﺮﺍﺋﻢ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﻭﺣﻘﻮﻕ ﺍﳌﺆﻟﻒ ﻭﺍﳌﺼﻔﺎﺕ ﺍﻟﻔﻨﻴﺔ ﻭﺩﻭﺭ ﺍﻟﺸﺮﻃﺔ ﻭﺍﻟﻘﺎﻧﻮﻥ ﺩﺭﺍﺳﺔ ﻣﻘﺎﺭﻧﺔ‪ .‬ﻣﻨﺸﺄﺓ ﺍﳌﻌﺎﺭﻑ ﺍﻹﺳﻜﻨﺪﺭﻳﺔ‪،‬‬
‫ﺹ‪.353‬‬
‫)‪(4‬ﻋﻔﻴﻔﻲ ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.358‬‬
‫)‪(5‬ﻳﺮﻯ ﺃﺻﺤﺎﺏ ﻫﺬﺍ ﺍﻹﲡﺎﻩ ﺃﻥ ﻳ‪‬ﺼﺎﺭ ﺇﱃ ﺍﻟﺘﺪﺧﻞ ﺍﻟﺘﺸﺮﻳﻌﻲ ﻟﺘﻮﺳﻴﻊ ﺩﺍﺋﺮﺓ ﺍﻷﺷﻴﺎﺀ ﺍﻟﱵ ﳝﻜﻦ ﺃﻥ ﻳﺮﺩ ﻋﻠﻴﻬﺎ ﺍﻟﻀﺒﻂ ﻟﺘﺸﻤﻞ ﲜﺎﻧﺐ ﺍﻷﺷﻴﺎﺀ ﺍﳌﺎﺩﻳﺔ‬
‫ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺑﻜﺎﻓﺔ ﺃﻧﻮﺍﻋﻬﺎ ﻭﺃﳕﺎﻃﻬﺎ ﺍﶈﻮﺳﺒﺔ‪.‬‬

‫‪- 159 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﰲ ﺍﳉﺰﺍﺋﺮ ﻓﻘﺪ ﺗﺪﺧﻞ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﲟﻮﺟﺐ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﺍﳌﺘﻀﻤﻦ ﺍﻟﻘﻮﺍﻋﺪ ﺍﳋﺎﺻﺔ‬
‫ﻟﻠﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭﺍﻹﺗﺼﺎﻝ‪ ،‬ﺃﻳﻦ ﺇﺳﺘﺤﺪﺙ ﺍﳌﺎﺩﺓ ‪ 06‬ﺍﻟﱵ ﺗﻨﺺ ﻋﻠﻰ‬
‫ﺃﻧﻪ" ﻋﻨﺪﻣﺎ ﺗﻜﺘﺸﻒ ﺍﻟﺴﻠﻄﺔ ﺍﻟﱵ ﺗﺒﺎﺷﺮ ﺍﻟﺘﻔﺘﻴﺶ ﰲ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻌﻄﻴﺎﺕ ﳐﺰﻧﺔ ﺗﻜﻮﻥ ﻣﻔﻴﺪﺓ ﰲ‬
‫ﺍﻟﻜﺸﻒ ﻋﻦ ﺍﳉﺮﺍﺋﻢ ﺃﻭ ﻣﺮﺗﻜﺒﻴﻬﺎ ﻭﺃﻧﻪ ﻟﻴﺲ ﻣﻦ ﺍﻟﻀﺮﻭﺭﻱ ﺣﺠﺰ ﻛﻞ ﺍﳌﻨﻈﻮﻣﺔ ﻳﺘﻢ ﻧﺴﺦ ﺍﳌﻌﻄﻴﺎﺕ‬
‫ﳏﻞ ﺍﻟﺒﺤﺚ ﻭﻛﺬﺍ ﺍﳌﻌﻄﻴﺎﺕ ﺍﻟﻼﺯﻣﺔ ﻟﻔﻬﻤﻬﺎ ﻋﻠﻰ ﺩﻋﺎﻣﺔ ﲣﺰﻳﻦ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ ﺗﻜﻮﻥ ﻗﺎﺑﻠﺔ ﻟﻠﺤﺠﺰ‬
‫ﻭﺍﻟﻮﺿﻊ ﰲ ﺃﺣﺮﺍﺯ ﻭﻓﻖ ﺍﻟﻘﻮﺍﻋﺪ ﺍﳌﻘﺮﺭﺓ ﰲ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‪ "....‬ﻭﺇﱃ ﺟﺎﻧﺐ ﺍﻟﺸﺮﻉ‬
‫ﺍﳉﺰﺍﺋﺮﻱ ﳒﺪ ﺍﳌﺸﺮﻉ ﺍﻟﻔﺮﻧﺴﻲ ﻗﺎﻡ ﺑﺈﺩﺧﺎﻝ ﺗﻌﺪﻳﻞ ﻋﻠﻰ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﲟﻮﺟﺐ ﻗﺎﻧﻮﻥ‬
‫ﺍﻷﻣﻦ ﺍﻟﺪﺍﺧﻠﻲ ‪ 2003/239‬ﺃﻳﻦ ﺇﺳﺘﺤﺪﺙ ﺍﻟﻔﻘﺮﺓ ﺍﻟﺜﺎﻟﺜﺔ ﻣﻦ ﺍﳌﺎﺩﺓ ‪ 57‬ﺍﻟﱵ ﺗﻨﺺ ﻋﻠﻰ ﺍﳌﻌﻄﻴﺎﺕ ﺍﻟﱵ‬
‫ﻳﺘﻢ ﺑﻠﻮﻏﻬﺎ ﰲ ﻇﻞ ﺍﻟﺸﺮﻭﻁ ﺍﳌﻨﺼﻮﺹ ﻋﻠﻴﻬﺎ ﰲ ﺍﳌﺎﺩﺓ ﺍﻟﺴﺎﺑﻘﺔ ﻳﺘﻌﲔ ﻧﺴﺨﻬﺎ ﻋﻠﻰ ﺩﻋﺎﻣﺎﺕ ﺍﻟﺘﺨﺰﻳﻦ‬
‫) ‪(1‬‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻳﺘﻢ ﲢﺮﻳﺰﻫﺎ ﰲ ﺃﺣﺮﺍﺯ ﳐﺘﻮﻣﺔ ﻭﻓﻖ ﺍﻟﺸﺮﻭﻁ ﺍﳌﻨﺼﻮﺹ ﻋﻠﻴﻬﺎ ﰲ ﻫﺬﺍ ﺍﻟﻘﺎﻧﻮﻥ"‬
‫ﻭﺍﻟﺴﺆﺍﻝ ﺍﳌﻄﺮﻭﺡ ﻫﻨﺎ ﻣﺎ ﻫﻲ ﺍﻷﺩﻟﺔ ﺍﻟﱵ ﻳﺘﻢ ﺿﺒﻄﻬﺎ ﰲ ﳎﺎﻝ ﺇﺛﺒﺎﺕ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ؟‬
‫‪/1.1‬ﺃﻧﻮﺍﻉ ﺍﻷﺩﻟﺔ ﳏﻞ ﺍﻟﻀﺒﻂ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ :‬ﺇﻥ ﺍﻟﻐﺎﻳﺔ ﻣﻦ ﺍﻟﺘﻔﺘﻴﺶ ﻫﻮ ﺻﺒﻂ ﺷﻲﺀ‬
‫ﻳﺘﻌﻠﻖ ﺑﺎﳉﺮﳝﺔ ﻭﻳﻔﻴﺪ ﺍﻟﺘﺤﻘﻴﻖ ﺍﳉﺎﺭﻱ ﺑﺸﺄ‪‬ﺎ ﺳﻮﺍﺀ ﺃﻛﺎﻥ ﻫﺬﺍ ﺍﻟﺸﻲﺀ ﺃﺩﻭﺍﺕ ﺇﺳﺘﻌﻤﻠﺖ ﰲ ﺇﺭﺗﻜﺎﺏ‬
‫) ‪(2‬‬
‫ﺍﳉﺮﳝﺔ ﺃﻭ ﺷﻴﺌﺎ ﻧﺘﺞ ﻋﻨﻬﺎ ﺃﻭ ﻏﲑ ﺫﻟﻚ ﳑﺎ ﻳﻔﻴﺪ ﰲ ﻛﺸﻒ ﺍﳊﻘﻴﻘﺔ‪.‬‬
‫ﻭﺍﻟﻀﺒﻂ ﰲ ﳎﺎﻝ ﺍﳉﺮﺍﺋﻢ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻳﺘﺼﻞ ﺑﻀﺒﻂ ﺍﳌﻜﻮﻧﺎﺕ ﺍﳌﺎﺩﻳﺔ ﻷﻧﻈﻤﺔ ﺍﳊﺎﺳﻮﺏ‪ ،‬ﺿﺒﻂ‬
‫ﺍﳌﻜﻮﻧﺎﺕ ﺍﳌﻌﻨﻮﻳﺔ ﻭﺍﻟﱪﳎﻴﺎﺕ‪ ،‬ﻭﻛﺬﺍ ﺿﺒﻂ ﺍﳌﻌﻄﻴﺎﺕ ﺍﻟﱵ ﺗﺘﻨﺎﻗﻞ ﺃﻭ ﳚﺮﻱ ﺗﺒﺎﺩﳍﺎ ﰲ ﻧﻄﺎﻕ ﺷﺒﻜﺔ‬
‫) ‪(3‬‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﱵ ﺗﺮﺑﻂ ﺍﳊﻮﺍﺳﻴﺐ ﻭﻣﺎ ﻳﺘﺼﻞ ‪‬ﺎ‬
‫ﻭﻋﻠﻰ ﻫﺬﺍ ﺍﻷﺳﺎﺱ ﻓﺈﻥ ﻣﻦ ﺍﻷﺷﻴﺎﺀ ﺍﻟﱵ ﻳﺘﻢ ﺿﺒﻄﻬﺎ ﻭﺍﻟﺘﺤﻔﻆ ﻋﻠﻴﻬﺎ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﻭﺍﻟﱵ ﳍﺎ ﻗﻴﻤﺔ ﰲ ﺇﺛﺒﺎﺕ ﺗﻠﻚ ﺍﳉﺮﺍﺋﻢ ﻭﻧﺴﺒﺘﻬﺎ ﺇﱃ ﺍﳌﺘﻬﻢ‪:‬‬

‫)‪(1‬ﻟﻘﺪ ﻛﺎﻥ ﻫﺬﺍ ﺍﻟﺘﻌﺪﻳﻞ ﺇﺳﺘﺠﺎﺑﺔ ﻹﺗﻔﺎﻗﻴﺔ ﺑﻮﺩﺍﺑﺴﺖ ﻟﻌﺎﻡ ‪ 2001‬ﺍﻟﱵ ﻧﺼﺖ ﻋﻠﻰ ﺿﺒﻂ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﰲ ﺍﻟﻔﻘﺮﺓ ﺍﻟﺜﺎﻟﺜﺔ ﻣﻦ ﺍﳌﺎﺩﺓ ‪ 19‬ﻣﻦ ﺍﻟﻘﺴﻢ‬
‫ﺍﻟﺮﺍﺑﻊ ﻣﻨﻬﺎ ﺑﺈﻋﺘﺒﺎﺭﻫﺎ ﺃﻧﻪ ﻣﻦ ﺳﻠﻄﺔ ﻛﻞ ﺩﻭﻟﺔ ﻃﺮﻑ ﺃﻥ ﺗﺘﺨﺬ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﻟﺘﺎﻟﻴﺔ‪:‬‬
‫ﺃﻥ ﺗﻀﺒﻂ ﻧﻈﺎﻡ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﺃﻭ ﺟﺰﺀ ﻣﻨﻪ ﺃﻭ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺨﺰﻧﺔ ﻋﻠﻰ ﺃﻱ ﻭﺳﻴﻂ ﻣﻦ ﻭﺳﺎﺋﻂ ﺍﻟﺘﺨﺰﻳﻦ ﺍﳋﺎﺻﺔ ﺑﺎﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﻭﺃﻥ ﲢﺎﻓﻆ ﻋﻠﻰ ﺳﻼﻣﺔ ﺗﻠﻚ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺨﺰﻧﺔ‪.‬‬
‫)‪(2‬ﻋﻮﺽ ﳏﻤﺪ ﺍﳌﺒﺎﺩﺉ ﺍﻟﻌﺎﻣﺔ ﰲ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﻨﺎﺋﻴﺔ‪،‬ﺍﳉﺰﺀ ﺍﻻﻭﻝ ﺩﺍﺭ ﺍﳌﻄﺒﻮﻋﺎﺕ ﺍﳉﺎﻣﻌﻴﺔ‪ .‬ﺹ‪.281‬‬
‫)‪(3‬ﻋﻴﺎﺩﺍﳊﻠﱯ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪.‬ﺹ‪.169‬‬

‫‪- 160 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪ -‬ﺿﺒﻂ ﺟﻬﺎﺯ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﻭﻣﻠﺤﻘﺎﺗﻪ‪ ":‬ﺫﻟﻚ ﺃﻥ ﺿﺒﻄﻪ ﺃﻣﺮ ﻣﻬﻢ ﺟﺪﺍ ﻟﻠﻘﻮﻝ ﺑﺄﻥ ﺍﳉﺮﳝﺔ ﺍﻟﻮﺍﻗﻌﺔ ﻫﻲ‬
‫ﺟﺮﳝﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺃ‪‬ﺎ ﻣﺮﺗﺒﻄﺔ ﺑﺎﳌﻜﺎﻥ ﻭﺍﻟﺸﺨﺺ ﺍﳊﺎﺋﺰ ﻋﻠﻰ ﺍﳉﻬﺎﺯ‪(1).‬ﻭﻷﺟﻬﺰﺓ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﺃﻧﻮﺍﻉ‬
‫ﳐﺘﻠﻔﺔ ﺍﻷﻣﺮ ﺍﻟﺬﻱ ﻳﺘﻄﻠﺐ ﰲ ﺿﺎﺑﻂ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﻌﺮﻓﺔ ﺍﻟﻜﺎﻓﻴﺔ ﺍﻟﱵ ﺗﺆﻫﻠﻪ ﻟﻠﺘﻌﺎﻣﻞ ﻣﻌﻪ‬
‫ﻭﺍﻟﺘﻌﺮﻑ ﻋﻠﻰ ﻣﻮﺍﺻﻔﺎﺗﻪ ﺑﺴﺮﻋﺔ‪.‬‬
‫‪-‬ﺿﺒﻂ ﺍﳌﻌﺪﺍﺕ ﺍﳌﺴﺘﻌﻤﻠﺔ ﰲ ﺷﺒﻜﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻭﺃﳘﻬﺎ ﺍﳌﻮﺩﻡ )‪ (Modem‬ﻭﻫﻲ ﺍﻟﻮﺳﻴﻠﺔ ﺍﻟﱵ ﲤﻜﻦ‬
‫ﺃﺟﻬﺰﺓ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﻣﻦ ﺍﻹﺗﺼﺎﻝ ﺑﺒﻌﻀﻬﺎ ﺍﻟﺒﻌﺾ ﻋﱪ ﺧﻄﻮﻁ ﺍﳍﺎﺗﻒ‪.‬‬
‫‪ -‬ﻭﺳﺎﺋﻂ ﺍﻟﺘﺨﺰﻳﻦ ﺍﳌﺘﺤﺮﻛﺔ ﻛﺎﻷﻗﺮﺍﺹ ﺍﳌﺪﳎﺔ )ﺃﻗﺮﺍﺹ ﺍﻟﻠﻴﺰﺭ( ﻭﺍﻷﻗﺮﺍﺹ ﺍﳌﺮﻧﺔ ﻭﺍﻷﺷﺮﻃﺔ‬
‫ﺍﳌﻐﻨﺎﻃﻴﺴﻴﺔ‪.‬‬
‫‪ -‬ﺿﺒﻂ ﺍﻟﱪﳎﻴﺎﺕ ‪Software‬ﻓﺈﺫﺍ ﻛﺎﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻳﻨﺸﺄ ﺑﺈﺳﺘﺨﺪﺍﻡ ﺑﺮﻧﺎﻣﺞ ﺧﺎﺹ ﻓﺈﻥ ﺿﺒﻂ‬
‫ﺍﻷﻗﺮﺍﺹ ﺍﳋﺎﺻﺔ ﺑﺘﺜﺒﻴﺖ ﻭﺗﻨﺼﻴﺐ ﻫﺬﺍ ﺍﻟﱪﻧﺎﻣﺞ ﺃﻣﺮ ﰲ ﻏﺎﻳﺔ ﺍﻷﳘﻴﺔ ﻋﻨﺪ ﻓﺤﺺ ﺍﻟﺪﻟﻴﻞ‪.‬‬
‫‪ -‬ﺿﺒﻂ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻭﺍﻟﺬﻱ ﳛﺘﻮﻱ ﻋﻠﻰ ﺑﺮﺍﻣﺞ ﻣﺘﺨﺼﺼﺔ ﻟﻜﺘﺎﺑﺔ ﻭﺇﺭﺳﺎﻝ ﻭﺇﺳﺘﻌﺮﺍﺽ ﻭﲣﺰﻳﻦ‬
‫ﺍﻟﺮﺳﺎﺋﻞ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪،‬ﻭﻫﺬﻩ ﺍﻟﺮﺳﺎﺋﻞ ﻻ ﳜﺘﻠﻒ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻌﻬﺎ ﻋﻦ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻊ ﺍﻟﺮﺳﺎﻟﺔ ﺍﻟﻮﺭﻗﻴﺔ‪،‬ﺇﺫ‬
‫ﲟﻘﺪﻭﺭ ﺍﳌﺴﺘﺨﺪﻡ ﺃﻥ ﻳﻄﺮﺣﻬﺎ ﺟﺎﻧﺒﺎ ﺃﻭ ﻳﺮﺩ ﻋﻠﻴﻬﺎ ﺃﻭ ﻳﻨﻘﻠﻬﺎ ﺇﱃ ﺷﺨﺺ ﺁﺧﺮ ﺃﻭ ﳛﻔﻆ ‪‬ﺎ ﰲ ﻣﻠﻒ‬
‫ﺧﺎﺹ‪ ،‬ﻟﺬﻟﻚ ﻓﺎﶈﻘﻖ ﺍﻟﺬﻱ ﻳﺮﻳﺪ ﺿﺒﻂ ﺍﻟﺮﺳﺎﺋﻞ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ )‪ (boitte Email‬ﺍﳋﺎﺹ ﺑﻪ ﰒ ﻳﺸﻐﻞ‬
‫ﺑﺮﺍﻣﺞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﰲ ﺟﻬﺎﺯ ﺣﺎﺳﻮﺑﻪ ﰒ ﻣﺮﺍﺟﻌﺔ ﻗﺎﺋﻤﺔ ﺍﻟﺮﺳﺎﺋﻞ ﻟﻴﻠﺘﻘﻂ ﻣﻦ ﺑﻴﻨﻬﺎ ﺍﻟﺮﺳﺎﻟﺔ‬
‫ﺍﳌﻄﻠﻮﺑﺔ‪.‬‬
‫‪/2.1‬ﺍﻟﺼﻌﻮﺑﺎﺕ ﺍﻟﱵ ﺗﻮﺍﺟﻪ ﺍﶈﻘﻖ ﺃﺛﻨﺎﺀ ﻋﻤﻠﻴﺔ ﺍﻟﻀﺒﻂ‪:‬ﺇﻥ ﻋﻤﻠﻴﺔ ﺿﺒﻂ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﳌﻌﺎﳉﺔ ﺁﻟﻴﺎ‬
‫ﺗﻮﺍﺟﻬﻬﺎ ﻋﺪﺓ ﺻﻌﻮﺑﺎﺕ ﺃﳘﻬﺎ‪:‬‬
‫‪-‬ﺿﺨﺎﻣﺔ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻟﱵ ﻣﻦ ﺍﻟﻮﺍﺟﺐ ﻓﺤﺼﻬﺎ ﻣﻦ ﻗﺒﻞ ﺍﶈﻘﻖ ﻭﺫﻟﻚ ﻧﺘﻴﺠﺔ ﺣﺠﻢ ﺍﻟﺸﺒﻜﺔ ﺍﻟﱵ ﲢﺘﻮﻱ‬
‫ﻋﻠﻰ ﻫﺬﻩ ﺍﻟﺒﻴﺎﻧﺎﺕ‪ ،‬ﺍﻷﻣﺮ ﺍﻟﺬﻱ ﻳﺘﻄﻠﺐ ﻣﻦ ﺍﳋﱪﺓ ﺍﻟﻔﻨﻴﺔ ﻣﺎ ﻳﻠﺰﻡ ﻟﺘﺤﺪﻳﺪ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻟﱵ ﺗﺼﻠﺢ ﻛﺄﺩﻟﺔ‬
‫) ‪(2‬‬
‫ﺟﻨﺎﺋﻴﺔ ﻣﻦ ﻋﺪﻣﻪ‬

‫)‪(1‬ﺧﺎﻟﺪ ﳑﺪﻭﺡ ﺇﺑﺮﺍﻫﻴﻢ‪،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪275‬‬


‫)‪(2‬ﻋﻔﻴﻔﻲ ﻛﺎﻣﻞ ﻋﻔﻴﻔﻲ‪،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪.355،‬‬

‫‪- 161 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪ -‬ﻗﺪ ﳛﺘﻮﻱ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺃﻭ ﺍﻟﺸﺒﻜﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﻋﻨﺎﺻﺮ ﻻ ﳝﻜﻦ ﻓﺼﻠﻬﺎ ﻭﻣﻊ ﺫﻟﻚ ﻳﺘﻌﲔ‬
‫ﺿﺒﻄﻬﺎ‪ ،‬ﻷ‪‬ﺎ ﺗﺘﻀﻤﻦ ﻋﻨﺎﺻﺮ ﺍﻹﺛﺒﺎﺕ ﻓﻴﻠﺰﻡ ﺑﺎﻟﻀﺮﻭﺭﺓ ﺿﺒﻂ ﺍﻟﻨﻈﺎﻡ ﺃﻭ ﺍﻟﺸﺒﻜﺔ ﻛﻠﻬﺎ ﻭﻫﻮ ﺍﻷﻣﺮ‬
‫ﺍﻟﺬﻱ ﻗﺪ ﻳﺘﺮﺗﺐ ﻋﻠﻴﻪ ﺍﻟﺘﻮﻗﻒ ﻋﻦ ﺍﻟﻌﻤﻞ ﰲ ﺍﳌﺸﺮﻭﻋﺎﺕ ﺻﺎﺣﺒﺔ ﺍﻟﻨﻈﺎﻡ‪(1)،‬ﻟﺬﻟﻚ ﻓﺈﻧﻪ ﻳﺘﻌﲔ ﰲ ﻫﺬﻩ‬
‫ﺍﳊﺎﻟﺔ ﺇﻋﻤﺎﻝ ﻣﺒﺪﺃ ﺍﻟﺘﻨﺎﺳﺐ ﻭﺍﻟﺬﻱ ﻳﻘﺼﺪ ﺑﻪ ﺇﻗﺘﺼﺎﺭ ﺍﻟﻀﺒﻂ ﻋﻠﻰ ﺍﻷﺩﻟﺔ ﺍﻟﱵ ﺗﻔﻴﺪ ﰲ ﻛﺸﻒ‬
‫) ‪(2‬‬
‫ﺍﳊﻘﻴﻘﺔ ﻭﳍﺎ ﻋﻼﻗﺔ ﺑﺎﳉﺮﳝﺔ‬
‫‪ -‬ﻛﻤﺎ ﺃﻧﻪ ﻗﺪ ﺗﻮﺟﺪ ﻫﺬﻩ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﺍﳌﻌﻄﻴﺎﺕ ﰲ ﺷﺒﻜﺎﺕ ﻭﺃﺟﻬﺰﺓ ﺗﺎﺑﻌﺔ ﻟﺪﻭﻟﺔ ﺃﺟﻨﺒﻴﺔ ﳑﺎ ﻳﺴﺘﺪﻋﻲ‬
‫ﺗﻌﺎﻭ‪‬ﺎ ﻣﻊ ﺟﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﺍﻟﻮﻃﻨﻴﺔ‪.‬‬
‫ﻭﺇﺫﺍ ﻛﺎﻧﺖ ﻋﻤﻠﻴﺔ ﺍﻟﻀﺒﻂ ﳍﺬﻩ ﺍﻟﻮﺳﺎﺋﻞ ﺍﻟﺘﻘﻨﻴﺔ ﺗﺘﻢ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﻜﺒﲑﺓ ﺃﻭ‬ ‫‪-‬‬
‫ﺍﻟﺸﺒﻜﺎﺕ ﺍﻟﻜﺒﲑﺓ ﻓﻘﺪ ﻳﺆﺩﻱ ﺇﺟﺮﺍﺀ ﺍﻟﻀﺒﻂ ﺇﱃ ﻋﺰﻝ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺑﺎﻟﻜﺎﻣﻞ ﻋﻦ ﺩﺍﺋﺮﺗﻪ ﳌﺪﺓ ﺯﻣﻨﻴﺔ‬
‫ﻗﺪ ﺗﻄﻮﻝ ﺃﻭ ﺗﻘﺼﺮ‪ ،‬ﳑﺎ ﻗﺪ ﻳﺘﺴﺒﺐ ﰲ ﺇﳊﺎﻕ ﺃﺿﺮﺍﺭ ﺑﺎﳉﻬﺔ ﺍﳌﺴﺘﺨﺪﻣﺔ ﺑﺎﻟﻨﻈﺎﻡ ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﻋﺪﻡ‬
‫ﺇﺑﺪﺍﺀ ﻣﺴﺘﺨﺪﻣﻲ ﺍﻷﻧﻈﻤﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻹﺳﺘﻌﺪﺍﺩ ﻟﻠﺘﻌﺎﻭﻥ ﺍﻟﻜﺎﻣﻞ ﻭﺍﻟﻔﻌﺎﻝ ﻣﻊ ﺳﻠﻄﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﳌﺎ ﻗﺪ‬
‫ﻳﻌﻨﻴﻪ ﺇﺟﺮﺍﺀ ﺍﻟﻀﺒﻂ ﺑﺎﻟﻨﺴﺒﺔ ﳍﺎ ﻣﺴﺎﺳﺎ ﺑﺎﻟﺴﺮﻳﺔ‪.‬‬
‫‪-‬ﻛﻤﺎ ﺃﻥ ﺍﻟﻀﺒﻂ ﰲ ﳎﺎﻝ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻗﺪ ﳝﺜﻞ ﺃﺣﻴﺎﻧﺎ ﺇﻋﺘﺪﺍﺀ ﻋﻠﻰ ﺣﻘﻮﻕ ﺍﻟﻐﲑ ﺃﻭ ﻋﻠﻰ ﺣﺮﻣﺔ ﺣﻴﺎ‪‬ﻢ‬
‫) ‪(3‬‬
‫ﺍﳋﺎﺻﺔ ﳑﺎ ﻳﺴﺘﻮﺟﺐ ﺇﲣﺎﺫ ﺍﻟﻀﻤﺎﻧﺎﺕ ﺍﻟﻼﺯﻣﺔ ﳊﻤﺎﻳﺔ ﻫﺬﻩ ﺍﳊﻘﻮﻕ ﻭﺍﳊﺮﻳﺎﺕ‪.‬‬
‫ﻭﻣﻦ ﺍﻟﺼﻌﻮﺑﺎﺕ ﻛﺬﻟﻚ ﺍﻟﱵ ﺗﻌﻴﻖ ﺍﻟﻮﺻﻮﻝ ﺇﱃ ﺿﺒﻂ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺗﻠﻚ ﺍﻷﺣﺰﻣﺔ ﺍﻷﻣﻨﻴﺔ‬
‫ﺍﳌﻔﺮﻭﺿﺔ ﻣﻦ ﻗﺒﻞ ﻣﺴﺘﺨﺪﻡ ﺍﻟﻨﻈﺎﻡ ﺣﻮﻝ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻟﱵ ﳛﻮﻳﻬﺎ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ‪ ،‬ﻭ ﳑﺎ ﻳﺰﻳﺪ ﻣﻦ ﺻﻌﻮﺑﺔ‬
‫ﺍﻷﻣﺮ ﻋﻠﻰ ﺍﶈﻘﻖ ﺍﳉﻨﺎﺋﻲ ﻋﺪﻡ ﻣﻌﺮﻓﺘﻪ ﻟﻜﻠﻤﺎﺕ ﺍﻟﺴﺮ ﺃﻭ ﺷﻔﺮﺍﺕ ﺍﳌﺮﻭﺭ ﺃﻭ ﺷﻔﺮﺍﺕ ﺗﺮﻣﻴﺰ ﺍﻟﺒﻴﺎﻧﺎﺕ‬
‫ﻭﻗﺪ ﻻ ﻳﺒﺪﻱ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﺗﻌﺎﻭﻧﻪ ﰲ ﺍﻟﻜﺸﻒ ﻋﻦ ﻫﺬﻩ ﺍﻟﺸﻔﺮﺍﺕ ﳉﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ‪.‬‬
‫‪/2‬ﺇﺟﺮﺍﺀﺍﺕ ﺿﺒﻂ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪:‬ﻳﺼﻌﺐ ﺇﻗﺎﻣﺔ ﺍﻟﺪﻟﻴﻞ ﻋﻠﻰ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﲕ ﺗﻘﻊ ﻋﻠﻰ ﺍﻟﻌﻤﻠﻴﺎﺕ‬
‫ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺍﳌﺨﺘﻠﻔﺔ ﻭﺫﻟﻚ ﺑﺴﺒﺐ ﺍﻟﻄﺒﻴﻌﺔ ﺍﳌﻌﻨﻮﻳﺔ ﻟﻠﻤﺤﻞ ﺍﻟﺬﻱ ﻭﻗﻌﺖ ﻋﻠﻴﻪ ﺍﳉﺮﳝﺔ ﻷﻥ ﳏﻞ ﺗﻠﻚ‬
‫ﺍﳉﺮﺍﺋﻢ ﻛﻤﺎ ﻋﺮﻓﻨﺎ ﺳﺎﺑﻘﺎ ﻫﻮ ﺟﻮﺍﻧﺐ ﻣﻌﻨﻮﻳﺔ ﺗﺘﻌﻠﻖ ﺑﺎﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ﻭﺍﻟﱵ ﺗﻜﻮﻥ ﰲ ﻫﻴﺄﺓ‬

‫)‪(1‬ﺷﻴﻤﺎﺀ ﻋﺒﺪ ﺍﻟﻐﲏ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪،‬ﺹ‪.358‬‬


‫)‪(2‬ﰲ ﻫﺬﺍ ﺍﻟﺼﺪﺩ ﻗﻀﺖ ﺍﶈﻜﻤﺔ ﺍﻟﻔﺪﺭﺍﻟﻴﺔ ﺍﻷﳌﺎﻧﻴﺔ ﺑﺈﺍﻟﻐﺎﺀ ﻗﺮﺍﺭ ﺍﻟﻀﺒﻂ ﺍﻟﺬﻱ ﻭﺭﺩ ﻋﻠﻰ ‪ 220‬ﻗﺮﺹ ﺻﻠﺐ ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺍﻟﻮﺣﺪﺓ ﺍﳌﺮﻛﺰﻳﺔ ﻭﺫﻟﻚ ﻋﻠﻰ‬
‫ﺳﻨﺪ ﳐﺎﻟﻔﺔ ﻣﺒﺪﺃ ﺍﻟﺘﻨﺎﺳﺐ‪.‬‬
‫)‪ (3‬ﺃﲪﺪ ﺃﺑﻮ ﺍﻟﻌﻼ ﻋﻘﻴﺪﺓ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ ﺹ‪.39‬‬

‫‪- 162 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺭﻣﻮﺯ ﻭﻧﺒﻀﺎﺕ ﳐﺰﻧﺔ ﻋﻠﻰ ﻭﺳﺎﺋﻂ ﲣﺰﻳﻦ ﳑﻐﻨﻄﺔ ﻻ ﳝﻜﻦ ﻟﻺﻧﺴﺎﻥ ﻗﺮﺍﺀ‪‬ﺎ ﺃﻭ ﺇﺩﺭﺍﻛﻬﺎ ﺇﻻ ﻣﻦ ﺧﻼﻝ‬
‫ﻫﺬﻩ ﺍﳊﻮﺍﺳﻴﺐ ﺍﻟﱵ ﲢﻔﻈﻬﺎ‪ ،‬ﻷﺟﻞ ﺫﻟﻚ ﻓﺈﻥ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﰲ ﺍﻹﺛﺒﺎﺕ ﻻ ﺗﻜﻒ ﻟﻀﺒﻂ ﻣﺜﻞ ﻫﺬﻩ‬
‫ﺍﻟﺒﻴﺎﻧﺎﺕ ‪.‬‬
‫ﻟﺬﻟﻚ ﻓﺈﻥ ﻃﺮﻳﻘﺔ ﺿﺒﻂ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﻌﺎﺟﺔ ﺁﻟﻴﺎ ﲣﺘﻠﻒ ﻋﻤﺎ ﻫﻲ ﻋﻠﻴﻪ ﻋﻨﺪ ﺿﺒﻂ ﺍﳌﻜﻮﻧﺎﺕ‬
‫ﺍﶈﺴﻮﺳﺔ ﻛﺎﻷﻗﺮﺍﺹ ﺍﳌﺮﻧﺔ‪ ،‬ﺍﳌﻮﺩﻡ‪ ،‬ﻭﺍﳋﺎﺩﻡ‪...‬‬
‫ﻭﻣﻦ ﺧﻼﻝ ﺩﺭﺍﺳﺘﻨﺎ ﻟﻠﻘﺎﻧﻮﻥ ‪ 04/09‬ﺍﳌﺘﻀﻤﻦ ﺍﻟﻘﻮﺍﻋﺪ ﺍﳋﺎﺻﺔ ﻟﻠﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ‬
‫ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭ ﺍﻹﺗﺼﺎﻝ ﻭ ﻣﻜﺎﻓﺤﺘﻬﺎ ﳒﺪ ﺃﻥ ﺍﳌﺸﺮﻉ ﻭﺿﻊ ﻃﺮﻳﻘﺘﲔ ﻟﻀﺒﻂ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ‪،‬‬
‫ﺍﻷﻭﱃ ﻭﺗﻜﻮﻥ ﻋﻦ ﻃﺮﻳﻖ ﻧﺴﺦ ﺍﳌﻌﻄﻴﺎﺕ ﳏﻞ ﺍﻟﺒﺤﺚ ﻋﻠﻰ ﺩﻋﺎﻣﺔ ﲣﺰﻳﻦ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ ﺗﻜﻮﻥ ﻫﺬﻩ‬
‫ﺍﻷﺧﲑﺓ ﻗﺎﺑﻠﺔ ﳊﺠﺰﻫﺎ ﻭﻭﺿﻌﻬﺎ ﰲ ﺃﺣﺮﺍﺯ ﺣﺴﺐ ﻣﺎ ﻫﻮ ﻣﻘﺮﺭ ﰲ ﻗﻮﺍﻋﺪ ﲢﺮﻳﺰ ﺍﻟﺪﻟﻴﻞ ﺍﳌﻨﺼﻮﺹ ﻋﻠﻬﺎ‬
‫ﰲ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‪ ،‬ﻭ ﺍﻟﻄﺮﻳﻘﺔ ﺍﻟﺜﺎﻧﻴﺔ ﺗﻜﻮﻥ ﺑﺎﺳﺘﻌﻤﺎﻝ ﺍﻟﺘﻘﻨﻴﺎﺕ ﺍﳌﻨﺎﺳﺒﺔ ﳌﻨﻊ ﺍﻻﺷﺨﺎﺹ‬
‫ﺍﳌﺮﺧﺺ ﳍﻢ ﺑﺎﺳﺘﻌﻤﺎﻝ ﺍﳌﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﺍﻟﻮﺻﻮﻝ ﺍﱃ ﺍﳌﻌﻄﻴﺎﺕ ﺍﻟﱵ ﲢﻮﻳﻬﺎ ﻫﺬﻩ ﺍﳌﻨﻈﻮﻣﺔ ﺃﻭ‬
‫ﺍﻟﻘﻴﺎﻡ ﺑﻨﺴﺨﻬﺎ ﻭﻳﻜﻮﻥ ﺫﻟﻚ ﰲ ﺣﺎﻟﺔ ﻣﺎ ﺇﺫﺍ ﺍﺳﺘﺤﺎﻝ ﻷﺳﺒﺎﺏ ﺗﻘﻨﻴﺔ ﺿﺒﻂ ﻫﺬﻩ ﺍﳌﻌﻄﻴﻠﺖ ﻭﻓﻖ‬
‫ﺍﻟﻄﺮﻳﻘﺔ ﺍﻻﻭﱃ‪.‬‬
‫ﻭﺇﻥ ﻛﺎﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﳜﻀﻊ ﰲ ﺿﺒﻄﻪ ﺇﱃ ﻗﻮﺍﻋﺪ ﲢﺮﻳﺰ ﺍﻷﺩﻟﺔ ﺍﳉﻨﺎﺋﻴﺔ ﻋﻤﻮﻣﺎ ﺇﻻ ﺃﻧﻪ ﻭﻧﻈﺮﺍ‬
‫ﺇﱃ ﺍﻟﻄﺒﻴﻌﺔ ﺍﳋﺎﺻﺔ ﻟﻪ ﻓﺈﻥ ﻋﻤﻠﻴﺔ ﺿﺒﻄﻪ ﻭﲢﺮﻳﺰﻩ ﲢﺘﺎﺝ ﺍﺇﻯ ﺑﻌﺾ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳋﺎﺻﺔ ﳊﻤﺎﻳﺘﻪ ﻓﻨﻴﺎ ﻭ‬
‫ﺍﳊﻔﺎﻅ ﻋﻠﻴﻪ ﻭﺻﻴﺎﻧﺘﻪ ﻣﻦ ﺇﻣﻜﺎﻧﻴﺔ ﺍﻟﻌﺒﺚ ﺑﻪ‪ ،‬ﻭﻫﻮ ﻣﺎﻧﻮﻩ ﻋﻠﻴﻪ ﺍﳌﺸﺮﻉ ﰲ ﺍﳌﺎﺩﺓ ﺍﻟﺴﺎﺩﺳﺔ ﺍﻟﻔﻘﺮﺓ ﺍﻟﺜﺎﻟﺜﺔ‬
‫ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﺣﻴﻨﻤﺎ ﺃﻭﺟﺐ ﻋﻠﻰ ﺍﻟﺴﻠﻄﺎﺕ ﺍﻟﱵ ﺗﻘﻮﻡ ﺑﻌﻤﻠﻴﺔ ﺿﺒﻂ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺃﻥ ﺗﺴﻬﺮ‬
‫ﻋﻠﻰ ﺳﻼﻣﺔ ﺍﳌﻌﻄﻴﺎﺕ ﰲ ﺍﳌﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﱵ ﲡﺮﻱ ‪‬ﺎ ﺍﻟﻌﻤﻠﻴﺔ‪ ،‬ﻭﺃﻥ ﻻ ﻳﺆﺩﻱ ﺇﺳﺘﻌﻤﺎﻝ ﺍﻟﻮﺳﺎﺋﻞ‬
‫ﺍﻟﺘﻘﻨﻴﺔ ﰲ ﺫﻟﻚ ﺇﱃ ﺍﳌﺴﺎﺱ ﲟﺤﺘﻮﻯ ﻫﺬﻩ ﺍﳌﻌﻄﻴﺎﺕ‪ .‬ﻭﻣﻦ ﻫﺬﻩ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳋﺎﺻﺔ ﰲ ﻫﺬﺍ ﺍﻻﻃﺎﺭ‬
‫ﻧﺬﻛﺮ ﻋﻠﻰ ﺳﺒﻴﻞ ﺍﳌﺜﺎﻝ ‪:‬‬
‫‪ -‬ﺃﺧﺬ ﻧﺴﺨﺔ ﺍﺣﺘﻴﺎﻃﻴﺔ ﻋﻦ ﺍﳌﻌﻄﻴﺎﺕ ﻭ ﺍﻟﻌﻤﻞ ﻋﻠﻴﻬﺎ ﻟﻀﻤﺎﻥ ﻋﺪﻡ ﺍﳌﺴﺎﺱ ﺑﺎﻟﺪﻟﻴﻞ ﺍﻷﺻﻠﻲ‪.‬‬
‫‪ -‬ﻋﺪﻡ ﺗﻨﻔﻴﺬ ﺑﺮﺍﻣﺞ ﻋﻠﻰ ﺍﳊﺎﺳﻮﺏ ﻣﺴﺮﺡ ﺍﳉﺮﳝﺔ ﺧﻮﻓﺎ ﻣﻦ ﺇﺗﻼﻑ ﺍﻷﺩﻟﺔ ﺍﳌﻮﺟﻮﺩﺓ ﻋﻠﻴﻪ ﺃﻭ ﳏﻮ‬
‫ﺍﻟﺬﺍﻛﺮﺓ ﺃﻭ ﺍﳌﻠﻔﺎﺕ ﻭﻋﺪﻡ ﺍﻟﺴﻤﺎﺡ ﻟﻠﻤﺸﺘﺒﻪ ﺑﻪ ﺑﺎﻟﺘﻌﺎﻣﻞ ﻣﻊ ﺍﳊﺎﺳﻮﺏ‪.‬‬
‫‪ -‬ﺿﺒﻂ ﺍﻟﺪﻋﺎﺋﻢ ﺍﻷﺻﻠﻴﺔ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﻭﻋﺪﻡ ﺍﻹﻗﺘﺼﺎﺭ ﻋﻠﻰ ﺿﺒﻂ ﻧﺴﺨﻬﺎ‬
‫‪ -‬ﻋﺪﻡ ﺛﲏ ﺍﻟﻘﺮﺹ ﻷﻥ ﺫﻟﻚ ﻳﺆﺩﻱ ﺇﱃ ﺗﻠﻔﻪ ﻭﻓﻘﺪﺍﻧﻪ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﺍﳌﺴﺠﻠﺔ ﻋﻠﻴﻪ‬

‫‪- 163 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪ -‬ﻋﺪﻡ ﺗﻌﺮﻳﺾ ﺍﻷﻗﺮﺍﺹ ﻭ ﺍﻷﺷﺮﻃﺔ ﺍﳌﻤﻐﻨﻄﺔ ﻟﺪﺭﺟﺎﺕ ﺣﺮﺍﺭﺓ ﻋﺎﻟﻴﺔ ﻭ ﻻ ﺇﱃ ﺍﻟﺮﻃﻮﺑﺔ ‪.‬‬
‫ﻭﰲ ﻫﺬﺍ ﺍﻻﻃﺎﺭ ﺑﺎﻟﺬﺍﺕ ﳒﺪ ﺍﳍﻴﺄﺓ ﺍﻟﺪﻭﻟﻴﺔ ﻟﺪﻟﻴﻞ ﺍﳊﺎﺳﺐ ﺍﻵﱄ )‪(IOCE‬‬
‫‪ Organzation on computer evedenceInternational‬ﻭﺿﻌﺖ ﻋﺪﺓ ﺿﻮﺍﺑﻂ ﻟﻌﻤﻠﻴﺔ‬
‫ﺿﺒﻂ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻣﻨﻬﺎ ﺃﻻ ﺗﻜﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳌﺘﺨﺬﺓ ﰲ ﲢﺮﻳﺰ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺳﺒﺒﺎ ﰲ ﺗﻐﻴﲑ ﻃﺒﻴﻌﺔ‬
‫ﻫﺬﺍ ﺍﻟﺪﻟﻴﻞ ﻭﺃﻥ ﺗﻜﻮﻥ ﲨﻴﻎ ﺍﻷﻧﺸﻄﺔ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺘﺤﺮﻳﺰ ﺍﻟﻮﺛﺎﺋﻖ ﺍﻟﺮﻗﻤﻴﺔ ﺃﻭ ﺍﻟﺪﺧﻮﻝ ﺇﻟﻴﻬﺎ ﺃﻭ ﻧﻘﻠﻬﺎ ﻣﻮﺛﻘﺔ‬
‫ﺗﻮﺛﻴﻘﺎ ﻛﺎﻣﻼ ﻣﻊ ﺍﶈﺎﻓﻈﺔ ﻋﻠﻴﻬﺎ ﻭﺗﻮﻓﲑﻫﺎ ﻟﻠﻤﺮﺍﺟﻌﺔ‪ ،‬ﻭﻫﻮ ﺍﻷﻣﺮ ﺍﻟﺬﻱ ﺃﻭﺭﺩﺗﻪ ﻛﺬﻟﻚ ﺍﻟﻔﻘﺮﺓ ﺍﻟﺜﺎﻟﺜﺔ‬
‫ﻣﻦ ﺍﳌﺎﺩﺓ ‪ 19‬ﻣﻦ ﺍﻹﺗﻔﺎﻗﻴﺔ ﺍﻷﺭﻭﺑﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫‪- 164 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺍﳋﱪﺓ ﰲ ﺇﺛﺒﺎﺕ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬‬


‫ﻟﻘﺪ ﺗﺮﺗﺐ ﻋﻦ ﺍﻟﺘﻄﻮﺭ ﺍﻟﺘﻘﲏ ﰲ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﺇﱃ ﺗﻐﻴﲑ ﻛﺒﲑ ﰲ ﺍﳌﻔﺎﻫﻴﻢ ﺍﻟﺴﺎﺋﺪﺓ ﺣﻮﻝ‬
‫ﺍﻟﺪﻟﻴﻞ‪ ،‬ﻭﻗﺎﺩ ﻣﺜﻞ ﻫﺬﺍ ﺍﻟﻘﻮﻝ ﰲ ﺍﳊﻘﻴﻘﺔ ﺇﱃ ﺗﻌﺎﻇﻢ ﺩﻭﺭ ﺍﻹﺛﺒﺎﺕ ﺍﻟﻌﻠﻤﻲ ﻭﺇﻋﻼﻥ ﺇﻧﻀﻤﺎﻡ ﺍﳋﱪﺓ‬
‫ﺍﻟﺘﻘﻨﻴﺔ ﺇﱃ ﻋﺎﱂ ﺍﳋﱪﺓ ﺍﻟﻘﻀﺎﺋﻴﺔ‪ ،‬ﺫﻟﻚ ﺃﻥ ﺇﺷﺘﻘﺎﻕ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺍﳌﻄﻠﻮﺑﺔ ﰲ ﺇﺛﺒﺎﺕ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﻭﻛﺸﻒ ﺃﳕﺎﻃﻬﺎ ﺃﻣﺮ ﻳﻀﻄﻠﻊ ﺑﻪ ﺍﳋﱪﺍﺀ ﺍﳌﺘﺨﺼﺼﻮﻥ ﰲ ﻫﺬﺍ ﺍ‪‬ﺎﻝ‪.‬‬
‫ﻭﻻ ﳝﻜﻦ ﺍﻟﺘﺼﻮﺭ ﺃﻥ ﻳﺮﻓﺾ ﺍﻟﻘﺎﺿﻲ ﺍﻟﻠﺠﻮﺀ ﺇﱃ ﻧﺪﺏ ﺧﺒﲑ ﰲ ﻗﻀﺎﻳﺎ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﺇﺫ ﻫﻲ‬
‫ﻗﻀﺎﻳﺎ ﻓﻨﻴﺔ ﺗﺘﻄﻠﺐ ﺧﱪﺓ ﺧﺎﺻﺔ‪ ،‬ﻭﻳﻜﻮﻥ ﺣﻜﻤﻪ ﳎﺎﻧﺒﺎ ﻟﻠﻤﻨﻄﻖ ﺍﻟﻌﻠﻤﻲ ﻭﻣﻌﻴﺒﺎ ﺇﺫﺍ ﱂ ﻳﺴﺘﻨﺪ ﺇﱃ ﺍﳋﱪﺓ‬
‫ﺍﻟﺘﻘﻨﻴﺔ ﰲ ﻫﺬﺍ ﺍ‪‬ﺎﻝ)‪(1‬ﲢﻘﻴﻘﺎ ﳌﺒﺪﺃ ﻫﺎﻡ ﻫﻮ ﻣﺒﺪﺃ ﺍﻟﺘﺨﺼﺺ‪ ،‬ﻭﺇﺫﺍ ﻛﺎﻧﺖ ﺍﳋﱪﺓ ﺍﻟﺘﻘﻨﻴﺔ ﰲ ﳎﺎﻝ ﺍﻟﺘﻌﺎﻭﻥ‬
‫ﺍﻟﻘﻀﺎﺋﻲ ﺗﻌﺪ ﺃﻗﻮﻯ ﻣﻈﺎﻫﺮ ﺍﻟﺘﻌﺎﻣﻞ ﺍﻟﻘﺎﻧﻮﱐ ﻭﺍﻟﻘﻀﺎﺋﻲ ﻣﻊ ﻇﺎﻫﺮﺓ ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﻷﻧﺘﺮﻧﺎﺕ‬
‫ﺧﺎﺻﺔ ﺇﺯﺍﺀ ﻧﻘﺺ ﺍﳌﻌﺮﻓﺔ ﻟﺪﻯ ﺍﻟﻘﺎﻧﻮﻧﻴﲔ ﺑﻈﺎﻫﺮﺓ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﻓﻬﻞ ﻳﻌﲏ ﻫﺬﺍ ﺗﻌﺮﺽ ﻣﺒﺪﺃ‬
‫ّﺍﻟﻘﺎﺿﻲ ﺧﺒﲑ ﺍﳋﱪﺍﺀ ﳍﺰﺍﺕ ﻋﻨﻴﻔﺔ ﺇﺯﺍﺀ ﺍﻟﺘﺰﺍﻳﺪ ﺍﳌﺘﻮﺍﺻﻞ ﳌﺒﺪﺃ ﺍﻟﺘﻔﺎﻋﻞ ﺍﻟﻘﺎﻧﻮﱐ ﻣﻊ ﻇﺎﻫﺮﺓ ﺍﻟﺒﻴﺌﺔ ﺍﻟﺮﻗﻤﻴﺔ‬
‫ﺍﻟﱵ ﺗﻘﻊ ﰲ ﺇﺧﺘﺼﺎﺹ ﺁﺧﺮ ﻏﲑ ﺍﳉﻮﺍﻧﺐ ﺍﻟﻨﻈﺮﻳﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﱵ ﻻ ﺗﺴﻤﺢ ﺛﻘﺎﻓﺔ ﺍﻟﻘﺎﺿﻲ ﺍﳌﺒﻨﻴﺔ ﻋﻠﻰ‬
‫ﻣﻌﺎﻳﲑ ﺍﻟﺪﺭﺍﺳﺎﺕ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻣﻦ ﺍﻟﺘﻔﺎﻋﻞ ﻣﻌﻬﺎ‪.‬‬
‫ﺃﻭﻻ‪ :‬ﺍﻟﻘﻮﺍﻋﺪ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﱵ ﲢﻜﻢ ﺍﳋﱪﺓ ﺍﻟﻘﻀﺎﺋﻴﺔ ﰲ ﳎﺎﻝ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬ﺍﳋﱪﺓ ﻫﻲ‬
‫ﺇﺟﺮﺍﺀ ﻳﺴﺘﻬﺪﻑ ﺇﺳﺘﺨﺪﺍﻡ ﻗﺪﺭﺍﺕ ﺷﺨﺺ ﺍﻟﻔﻨﻴﺔ ﻭﺍﻟﻌﻠﻤﻴﺔ ﻭﺍﻟﱵ ﻻ ﺗﺘﻮﺍﻓﺮ ﻟﺪﻯ ﺭﺟﻞ ﺍﻟﻘﻀﺎﺀ ﺃﻭ‬
‫ﺍﶈﻘﻖ ﻣﻦ ﺃﺟﻞ ﺍﻟﻜﺸﻒ ﻋﻦ ﺩﻟﻴﻞ ﻳﻔﻴﺪ ﰲ ﻣﻌﺮﻓﺔ ﺍﳊﻘﻴﻘﺔ ﺑﺸﺄﻥ ﻭﻗﻮﻉ ﺍﳉﺮﳝﺔ‪.‬‬
‫ﻭﻗﺪ ﻋﺮﻓﻬﺎ ﺍﻟﺒﻌﻀﺒﺄ‪‬ﺎ ﺍﻹﺳﺘﺸﺎﺭﺓ ﺍﻟﻔﻨﻴﺔ ﺍﻟﱵ ﻳﺴﺘﻌﲔ ‪‬ﺎ ﺍﻟﻘﺎﺿﻲ ﺃﻭ ﺍﶈﻘﻖ ﳌﺴﺎﻋﺪﺗﻪ ﰲ ﺗﻜﻮﻳﻦ‬
‫) ‪(2‬‬
‫ﻋﻘﻴﺪﺗﻪ ﻋﻠﻰ ﳓﻮ ﺍﳌﺴﺎﺋﻞ ﺍﻟﱵ ﳛﺘﺎﺝ ﺗﻘﺪﻳﺮﻫﺎ ﺇﱃ ﻣﻌﺮﻓﺔ ﺃﻭ ﺩﺭﺍﻳﺔ ﻋﻠﻤﻴﺔ ﺧﺎﺻﺔ ﻻ ﺗﺘﻮﺍﻓﺮ ﻟﺪﻳﻪ‪.‬‬
‫ﻭﺍﳋﺒﲑ ﻫﻮ ﻛﻞ ﺷﺨﺺ ﻟﺪﻳﻪ ﺩﺭﺍﻳﺔ ﺧﺎﺻﺔ ﲟﺴﺄﻟﺔ ﻣﻦ ﺍﳌﺴﺎﺋﻞ ﻗﺪ ﻳﺴﺘﺪﻋﻲ ﺍﻟﺘﺤﻘﻴﻖ ﻓﺤﺼﻬﺎ‬
‫ﻭﻳﺴﺘﻠﺰﻡ ﺫﻟﻚ ﻛﻔﺎﺀ ﺧﺎﺻﺔ ﻓﻨﻴﺔ ﺃﻭ ﻋﻠﻤﻴﺔ ﻻ ﻳﺸﻌﺮ ﺍﶈﻘﻖ ﺑﺘﻮﺍﻓﺮﻫﺎ ﰲ ﻧﻔﺴﻪ‪ ،‬ﻓﻴﻤﻜﻨﻪ ﺃﻥ ﻳﺴﺘﻌﲔ‬

‫)‪(1‬ﻋﺎﺩﻝ ﻋﺰﺍﻡ ﺳﻘﻒ ﺍﳊﻴﻂ‪،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ ﺹ‪.273‬‬


‫)‪(2‬ﻭﻣﻦ ﺃﻫﻢ ﺍﻟﺘﻌﺮﻳﻔﺎﺕ ﺍﻟﱵ ﻭﺭﺩﺕ ﲞﺼﻮﺹ ﺍﳋﱪﺓ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺃ‪‬ﺎ ﻋﺒﺎﺭﺓ ﻋﻦ ﺇﺟﺮﺍﺀﺍﺕ ﻣﻦ ﺇﺟﺮﺍﺀﺍﺕ ﺍﻟﺘﺤﻘﻴﻖ ﻳﻌﻬﺪ ﺑﻪ ﺍﻟﻘﺎﺿﻲ ﺇﱃ ﺷﺨﺺ ﳐﺘﺺ ﻳﻨﻌﺖ‬
‫ﺑﺎﳋﺒﲑ ﻭﺗﺘﻌﻠﻖ ﺑﻮﺍﻗﻌﺔ ﻳﺴﺘﻠﺰﻡ ﲝﺜﻬﺎ ﺃﻭ ﺗﻘﺪﻳﺮﻫﺎ ﺇﺑﺪﺍﺀ ﺭﺃﻱ ﻳﺘﻌﻠﻖ ‪‬ﺎ ﻋﻠﻤﺎ ﺃﻭ ﻓﻨﺎ ﻻ ﻳﺘﻮﺍﻓﺮ ﰲ ﺍﻟﺸﺨﺺ ﺍﻟﻌﺎﺩﻱ ﻟﻴﻘﺪﻡ ﻟﻪ ﺑﻴﺎﻧﺎ ﺃﻭ ﺭﺃﻳﺎ ﻓﻨﻴﺎ ﻻ ﻳﺴﺘﻄﻴﻊ‬
‫ﺍﶈﻘﻖ ﺍﻟﻮﺻﻮﻝ ﺇﻟﻴﻪ ﻭﺣﺪﻩ‪.‬‬

‫‪- 165 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺑﺎﳋﺒﲑ ﻛﻤﺎ ﻫﻮ ﺍﳊﺎﻝ ﻣﺜﻼ ﰲ ﺗﻘﺮﻳﺮ ﺍﻟﺼﻔﺔ ﺍﻟﺘﺸﺮﳛﻴﺔ ﰲ ﺟﺮﺍﺋﻢ ﺍﻟﻘﺘﻞ ﺃﻭ ﲢﻠﻴﻞ ﺍﳌﺎﺩﺓ ﺍﳌﻄﻌﻮﻣﺔ ﰲ‬
‫) ‪(1‬‬
‫ﺟﺮﺍﺋﻢ ﺍﻟﺘﺴﻤﻢ ﺃﻭ ﻓﺤﺺ ﺧﻄﻮﻁ ﺍﻟﻜﺘﺎﺑﺔ ﰲ ﺟﺮﳝﺔ ﺍﻟﺘﺰﻭﻳﺮ‪.‬‬
‫‪ /1‬ﺃﳘﻴﺔ ﺍﳋﱪﺓ ﰲ ﺍﻟﺒﺤﺚ ﻋﻦ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪:‬ﺗﻜﻤﻦ ﺃﳘﻴﺔ ﺍﳋﱪﺓ ﰲ ﺃ‪‬ﺎ ﺗﻨﲑ ﺍﻟﻄﺮﻳﻖ ﳉﻬﺔ‬
‫ﺍﻟﺘﺤﻘﻴﻖ ﻭﺍﻟﻘﻀﺎﺀ ﻭﻟﺴﺎﺋﺮ ﺍﻟﺴﻠﻄﺎﺕ ﺍﳌﺨﺘﺼﺔ ﺑﺎﻟﺪﻋﻮﻯ ﺍﳉﺰﺍﺋﻴﺔ‪ ،‬ﻟﺬﻟﻚ ﻓﻘﺪ ﺇﻫﺘﻢ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ‬
‫ﺑﺘﻨﻈﻴﻢ ﺃﻋﻤﺎﻝ ﺍﳋﱪﺓ ﻣﻦ ﺍﳌﻮﺍﺩ ‪ 143‬ﺇﱃ ‪ 156‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﻭﺇﻋﺘﺒﺎﺭﻫﺎ ﻣﻦ ﺇﺟﺮﺍﺀﺍﺕ‬
‫ﺍﻟﺒﺤﺚ ﻋﻦ ﺍﻟﺪﻟﻴﻞ ﺣﻴﺚ ﻧﺼﺖ ﺍﳌﺎﺩﺓ ‪ 143‬ﺃﻧﻪ ﳉﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﺃﻭ ﺍﳊﻜﻢ ﻋﻨﺪﻣﺎ ﺗﻌﺮﺽ ﳍﺎ ﻣﺴﺄﻟﺔ‬
‫ﺫﺍﺕ ﻃﺎﺑﻊ ﻓﲏ ﺃﻥ ﺗﺄﻣﺮ ﺑﻨﺪﺏ ﺧﺒﲑ ﺇﻣﺎ ﻣﻦ ﺗﻠﻘﺎﺀ ﻧﻔﺴﻬﺎ ﺃﻭ ﺑﻨﺎﺀ ﻋﻠﻰ ﻃﻠﺐ ﻣﻦ ﺍﻟﻨﻴﺎﺑﺔ ﺍﻟﻌﺎﻣﺔ ﻭ ﺇﻣﺎ‬
‫ﺑﻄﻠﺐ ﻣﻦ ﺍﳋﺼﻮﻡ‪.‬‬
‫ﻭﺇﺫﺍ ﻛﺎﻧﺖ ﺍﻹﺳﺘﻌﺎﻧﺔ ﲞﺒﲑ ﻓﲏ ﰲ ﺍﳌﺴﺎﺋﻞ ﺍﻟﻔﻨﻴﺔ ﺍﻟﺒﺤﺘﺔ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﺃﻣﺮ ﻭﺍﺟﺐ ﻋﻠﻰ‬
‫ﺟﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ‪ ،‬ﻓﻬﻲ ﺃﻭﺟﺐ ﰲ ﳎﺎﻝ ﺇﺳﺘﺨﻼﺹ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻹﺛﺒﺎﺕ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺣﻴﺚ‬
‫ﺗﺘﻌﻠﻖ ﲟﺴﺎﺋﻞ ﻓﻨﻴﺔ ﺁﻳﺔ ﰲ ﺍﻟﺘﻌﻘﻴﺪ‪ ،‬ﻳﺼﻌﺐ ﻋﻠﻰ ﺍﶈﻘﻖ ﺃﻥ ﻳﺸﻖ ﻃﺮﻳﻘﺔ ﻓﻴﻬﺎ ﻭﻳﻌﺠﺰ ﻋﻦ ﲨﻊ ﺍﻷﺩﻟﺔ‬
‫ﺑﺎﻟﻨﺴﺒﺔ ﳍﺎ ﺑﺎﻟﻮﺳﺎﺋﻞ ﺍﻷﺧﺮﻯ ﻟﻺﺛﺒﺎﺕ‪ (2)،‬ﻭﻣﻨﺬ ﻇﻬﻮﺭ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻓﺈﻥ ﺍﻟﻀﺒﻄﻴﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ‬
‫ﻭﺳﻠﻄﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﻋﻤﻮﻣﺎ ﺗﺴﺘﻌﲔ ﺑﺄﺻﺤﺎﺏ ﺍﳋﱪﺓ ﺍﻟﻔﻨﻴﺔ ﺍﳌﺘﻤﻴﺰﺓ ﰲ ﳎﺎﻝ ﺍﳊﺎﺳﺐ ﺍﻵﱄ‬
‫ﻭﺍﳌﻨﻈﻮﻣﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺫﻟﻚ ﺑﻐﺮﺽ ﻛﺸﻒ ﻏﻤﻮﺽ ﺍﳉﺮﳝﺔ ﻭﲡﻤﻴﻊ ﺃﺩﻟﺘﻬﺎ ﻭﺍﻟﺘﺤﻔﻆ ﻋﻠﻴﻬﺎ‪ ،‬ﺃﻭ‬
‫ﻣﺴﺎﻋﺪﺓ ﺍﶈﻘﻖ ﰲ ﺇﺟﻼﺀ ﺟﻮﺍﻧﺐ ﺍﻟﻐﻤﻮﺽ ﰲ ﺍﻟﻌﻤﻠﻴﺎﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺍﻟﺪﻗﻴﻘﺔ ﺫﺍﺕ ﺍﻟﺼﻠﺔ ﺑﺎﳉﺮﳝﺔ ﳏﻞ‬
‫ﺍﻟﺘﺤﻘﻴﻖ ﻭﻳﻼﺣﻆ ﺃﻥ ﳒﺎﺡ ﺍﻹﺳﺘﺪﻻﻻﺕ ﻭﺃﻋﻤﺎﻝ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻳﻜﻮﻥ ﻣﺮ‪‬ﻨﺎ ﺑﻜﻔﺎﺀﺓ‬
‫ﻭﲣﺼﺺ ﻫﺆﻻﺀ ﺍﳋﱪﺍﺀ‪ ،‬ﻓﺈﺟﺮﺍﻡ ﺍﻟﺬﻛﺎﺀ ﻭﺍﻟﻔﻦ ﻻ ﻳﻜﺸﻔﻪ ﻭﻻ ﻳﻔﻠﻪ ﺇﻻ ﺫﻛﺎﺀ ﻭﻓﻦ ﳑﺎﺛﻠﲔ‪(3)،‬ﻭﺗﱪﺯ‬
‫ﺃﳘﻴﺔ ﺍﻹﺳﺘﻌﺎﻧﺔ ﺑﺎﳋﺒﲑ ﰲ ﳎﺎﻝ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻨﺪ ﻏﻴﺎﺑﻪ ﻓﻘﺪ ﺗﻌﺠﺰ ﺍﻟﻀﺒﻄﻴﺔ ﰲ ﻛﺸﻒ ﻏﻤﻮﺽ‬
‫ﺍﳉﺮﳝﺔ ﻟﻨﻘﺺ ﺍﻟﻜﻔﺎﺀﺓ ﻭﺍﻟﺘﺨﺼﺺ ﺍﻟﻼﺯﻣﲔ ﻟﻠﺘﻌﺎﻣﻞ ﻣﻊ ﺍﳉﻮﺍﻧﺐ ﺍﻟﺘﻘﻨﻴﺔ ﻭﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺔ ﺍﻟﱵ ﺇﺭﺗﻜﺒﺖ‬

‫)‪(1‬ﻋﺒﺪ ﺍﻟﻨﺎﺻﺮ ﳏﻤﺪ ﳏﻤﻮﺩﻓﺮﻏﻠﻲ ﻭ ﳏﻤﺪ ﻋﺒﻴﺪ ﺳﻴﻒ ﺳﻌﻴﺪ ﺍﻟﻐﺎﻓﺮﻱ‪،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ‪.24‬‬
‫)‪(2‬ﻋﻠﻲ ﳏﻤﻮﺩ ﻋﻠﻲ ﲪﻮﺩﺓ‪ ،‬ﺍﻷﺩﻟﺔ ﺍﳌﺘﺤﺼﻠﺔ ﻣﻦ ﺍﻟﻮﺳﺎﺋﻞ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﰲ ﺇﻃﺎﺭ ﻧﻈﺮﻳﺔ ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ‪،‬ﻭﺭﻗﺔ ﻋﻤﻞ ﻟﻠﻤﺆﲤﺮ ﺍﻟﻌﻠﻤﻲ ﺍﻻﻭﻝ ﺣﻮﻝ ﺍﳉﻮﺍﻧﺐ‬
‫ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻭ ﺍﻻﻣﻨﻴﺔ ﻟﻠﻌﻤﻠﻴﺎﺕ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﻮ ﺩﰊ ‪ 2003‬ﻣﻨﺸﻮﺭ ﻋﻠﻰ ﻣﻮﻗﻊ‪ www.arablawinfo.com :‬ﺑﺪﻭﻥ ﺗﺮﻗﻴﻢ‪.‬‬
‫)‪(3‬ﳏﻤﺪ ﺃﺑﻮ ﺍﻟﻌﻼﺀ ﻋﻘﻴﺪﺓ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ ﺹ‪،6‬‬

‫‪- 166 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺑﻮﺍﺳﻄﺘﻬﺎ ﺍﳉﺮﳝﺔ‪ ،‬ﻭﻫﻮ ﻣﺎ ﻗﺪ ﻳﺆﺩﻱ ﺇﱃ ﺗﺪﻣﲑ ﺍﻟﺪﻟﻴﻞ ﻭﳏﻮﻩ ﺑﺴﺒﺐ ﺍﳉﻬﻞ ﺃﻭ ﺍﻹﳘﺎﻝ ﻋﻨﺪ ﺍﻟﺘﻌﺎﻣﻞ‬
‫) ‪(1‬‬
‫ﻣﻌﻪ‪.‬‬
‫ﻭﻟﻌﻞ ﻫﺬﻩ ﺍﻷﳘﻴﺔ ﻟﻠﺨﱪﺓ ﰲ ﳎﺎﻝ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺟﻌﻞ ﺑﻌﺾ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﻻ‬
‫ﺗﻜﺘﻒ ﺑﺎﻟﻨﺼﻮﺹ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﺍﻟﱵ ﺗﻨﻈﻢ ﺍﳋﱪﺓ ﻭﻋﻤﺪﺕ ﻋﻠﻰ ﺇﺩﺭﺍﺝ ﻧﺼﻮﺹ ﻗﺎﻧﻮﻧﻴﺔ ﺧﺎﺻﺔ ﺗﻨﻈﻢ ﺍﳋﱪﺓ‬
‫ﰲ ﻫﺬﺍ ﺍ‪‬ﺎﻝ‪ ،‬ﻭﻣﻨﻬﺎ ﺍﳌﺸﺮﻉ ﺍﻟﺒﻠﺠﻴﻜﻲ ﲟﻮﺟﺐ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﺼﺎﺩﺭ ﰲ ‪ 2000/11/23‬ﺣﻴﺚ ﻧﺼﺖ‬
‫ﺍﳌﺎﺩﺓ ‪ 88‬ﻣﻨﻪ ﺃﻧﻪ ﳚﻮﺯ ﻟﻠﻘﺎﺿﻲ ﻭﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺃﻥ ﻳﺴﺘﻌﻴﻨﺎ ﲞﺒﲑ ﻟﻴﻘﺪﻡ ﻭﺑﻄﺮﻳﻘﺔ ﻣﻔﻬﻮﻣﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﻼﺯﻣﺔ ﻋﻦ ﻛﻴﻔﻴﺔ ﺗﺸﻐﻴﻞ ﺍﻟﻨﻈﺎﻡ ﻭﻛﻴﻔﻴﺔ ﺍﻟﺪﺧﻮﻝ ﻓﻴﻪ ﺃﻭ ﺍﻟﺪﺧﻮﻝ ﻟﻠﺒﻴﺎﻧﺎﺕ ﺍﳌﺨﺰﻧﺔ ﺃﻭ‬
‫ﺍﳌﻌﺎﳉﺔ ﺃﻭ ﺍﳌﻨﻘﻮﻟﺔ ﺑﻮﺍﺳﻄﺘﻪ‪ ،‬ﻭﻳﻌﻄﻲ ﺍﻟﻘﺎﻧﻮﻥ ﻟﺴﻠﻄﺔ ﺍﻟﺘﺤﻘﻴﻖ ﺃﻥ ﺗﻄﻠﺐ ﻣﻦ ﺍﳋﺒﲑ ﺗﺸﻐﻴﻞ ﺍﻟﻨﻈﺎﻡ ﺃﻭ‬
‫ﺍﻟﺒﺤﺚ ﻓﻴﻪ ﺃﻭ ﻋﻤﻞ ﻧﺴﺨﺔ ﻣﻦ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﳌﻄﻠﻮﺑﺔ ﻟﻠﺘﺤﻘﻴﻖ ﺃﻭ ﺳﺤﺐ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﳌﺨﺰﻧﺔ ﺃﻭ ﺍﶈﻤﻮﻟﺔ ﺃﻭ‬
‫ﺍﳌﻨﻘﻮﻟﺔ ﻋﻠﻰ ﺃﻥ ﻳﺘﻢ ﺫﻟﻚ ﺑﺎﻟﻄﺮﻳﻘﺔ ﺍﻟﱵ ﺗﺮﻳﺪﻫﺎ ﺟﻬﺔ ﺍﻟﺘﺤﻘﻴﻖ"‪.‬‬
‫ﻭﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﱂ ﻳﺘﺨﻠﻒ ﻋﻦ ﻫﺬﻩ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺣﻴﻨﻤﺎ ﺃﺷﺎﺭ ﰲ ﺍﳌﺎﺩﺓ ‪ 05‬ﺍﻟﻔﻘﺮﺓ ﺍﻷﺧﲑﺓ‬
‫ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﺍﳌﺘﻀﻤﻦ ﺍﻟﻘﻮﺍﻋﺪ ﺍﳋﺎﺻﺔ ﺑﺎﻟﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ‬
‫ﻭﺍﻹﺗﺼﺎﻝ ﻭﻣﻜﺎﻓﺤﺘﻬﺎ ﺃﻧﻪ ﳝﻜﻦ ﻟﻠﺴﻠﻄﺎﺕ ﺍﳌﻜﻠﻔﺔ ﺑﺘﻔﺘﻴﺶ ﺍﳌﻨﻈﻮﻣﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﺴﺨﲑ ﻛﻞ ﺷﺨﺺ‬
‫ﻟﻪ ﺩﺭﺍﻳﺔ ﺑﻌﻤﻞ ﺍﳌﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﳏﻞ ﺍﻟﺒﺤﺚ ﺃﻭ ﺑﺎﻟﺘﺪﺍﺑﲑ ﺍﳌﺘﺨﺬﺓ ﳊﻤﺎﻳﺔ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﱵ‬
‫ﺗﺘﻀﻤﻨﻬﺎ ﻗﺼﺪ ﻣﺴﺎﻋﺪ‪‬ﺎ ﻭﺗﺰﻭﻳﺪﻫﺎ ﺑﻜﻞ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﻀﺮﻭﺭﻳﺔ ﻹﳒﺎﺯ ﻣﻬﻤﺘﻬﺎ‪.‬‬
‫‪/2‬ﺷﺮﻭﻁ ﺻﺤﺔ ﺍﳋﱪﺓ ﻭﻣﺪﻯ ﺣﺠﻴﺘﻬﺎ‪:‬ﻧﻈﺮﺍ ﻟﻸﳘﻴﺔ ﺍﻟﺒﺎﻟﻐﺔ ﻟﻠﺨﱪﺓ ﻭﺍﻟﺪﻭﺭ ﺍﻟﺬﻱ ﺗﻠﻌﺒﻪ ﰲ‬
‫ﻋﻤﻠﻴﺔ ﺍﻹﺛﺒﺎﺕ ﰲ ﺍ‪‬ﺎﻝ ﺍﳉﻨﺎﺋﻲ‪ ،‬ﻓﻘﺪ ﺣﺮﺻﺖ ﻣﻌﻈﻢ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﻋﻠﻰ ﺗﻨﻈﻴﻢ ﺍﳋﱪﺓ ﻭﻭﺿﻊ ﺷﺮﻭﻁ‬
‫ﻭﺿﻮﺍﺑﻂ ﳍﺎ‪ .‬ﻭﺑﺸﻜﻞ ﻋﺎﻡ ﻓﺈﻥ ﺍﻟﻔﻘﻪ ﺍﳉﻨﺎﺋﻲ ﻳﻘﺪﺭ ﺃﻥ ﺍﳋﱪﺓ ﺗﺴﺘﺪﻋﻲ ﺗﻮﺍﻓﺮ ﺭﻛﻨﲔ ﺃﺳﺎﺳﲔ ﳘﺎ‪:‬‬
‫ﺍﻟﺮﻛﻦ ﺍﻟﺸﻜﻠﻲ ﻭﺍﻟﺮﻛﻦ ﺍﳌﻮﺿﻮﻋﻲ‪ ،‬ﻭﺇﺫﺍ ﻛﺎﻥ ﻫﺬﺍ ﺍﻷﺧﲑ ﻣﻘﺪﻭﺭﺍ ﻟﻪ ﻗﺪﺭﺍ ﻣﻦ ﺍﳊﺮﻳﺔ ﺍﻟﻌﻠﻤﻴﺔ ﻭﻳﻜﻮﻥ‬
‫ﺍﳋﺒﲑ ﻓﻴﻪ ﻣﺴﺘﺨﺪﻣﺎ ﻷﺩﻭﺍﺗﻪ ﺍﻟﻌﻠﻤﻴﺔ ﻭﺍﻟﻌﻤﻠﻴﺔ ﺍﻟﱵ ﲟﻘﺘﻀﺎﻫﺎ ﻳﻨﻄﻠﻖ ﺇﱃ ﻭﺿﻊ ﺍﻹﺟﺎﺑﺔ ﻋﻠﻰ ﺍﳌﻌﻀﻠﺔ‬
‫ﺍﻟﻔﻨﻴﺔ ﳏﻞ ﺳﺆﺍﻝ ﺟﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ‪ ،‬ﻓﺈﻥ ﺍﻟﺮﻛﻦ ﺍﻟﺸﻜﻠﻲ ﻓﻴﻬﺎ ﳝﺜﻞ ﺍﻟﺘﺨﺼﺺ ﻭﺍﻟﻌﻠﻢ ﺍﻟﺬﻱ ﺇﻛﺘﺴﺒﻪ‬
‫ﺍﳋﺒﲑ‪ ،‬ﺇﺫ ﻳﺸﺘﺮﻁ ﰲ ﺍﳋﺒﲑ ﺣﻘﻴﻘﺔ ﺍﳉﻤﻊ ﺑﲔ ﺍﻟﻌﻠﻢ ﺫﻱ ﺍﻹﺧﺘﺼﺎﺹ ﻭﺍﳋﱪﺓ ﺍﻟﻌﻠﻤﻴﺔ‪ ،‬ﻓﻼ ﻳﻜﻔﻲ‬
‫ﻓﻘﻂ ﻛﻔﺎﺀﺓ ﻋﻠﻤﻴﺔ ﻋﺎﻟﻴﺔ ﰲ ﳎﺎﻝ ﺍﻟﺘﺨﺼﺺ ﺑﻞ ﻳﻀﺎﻑ ﺇﻟﻴﻬﺎ ﺳﻨﻮﺍﺕ ﻣﻦ ﺃﻋﻤﺎﻝ ﺍﳋﱪﺓ ﰲ ﺍ‪‬ﺎﻝ‪،‬‬

‫)‪(1‬ﻓﻘﺪ ﺣﺪﺙ ﺃﻥ ﻃﻠﺒﺖ ﺇﺣﺪﻯ ﺩﻭﺍﺋﺮ ﺍﻟﺸﺮﻃﺔ ﺑﺎﻟﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ ﺍﻷﻣﺮﻳﻜﻴﺔ ﻣﻦ ﺷﺮﻛﺔ ﺗﻌﺮﺿﺖ ﻟﻠﻘﺮﺻﻨﺔ ﺃﻥ ﺗﺘﻮﻗﻒ ﻋﻦ ﺗﺸﻐﻴﻞ ﺟﻬﺎﺯﻫﺎ ﺍﻵﱄ ﻟﻠﺘﻤﻜﻦ‬
‫ﻣﻦ ﻭﺿﻌﺔ ﲢﺖ ﺍﳌﺮﺍﻗﺒﺔ ‪‬ﺪﻑ ﻛﺸﻒ ﻣﺮﺗﻜﺐ ﺍﳉﺮﳝﺔ ﻓﺤﺪﺙ ﻧﺘﻴﺠﺔ ﻟﺬﻟﻚ ﺃﻥ ﺗﺴﺒﺒﺖ ﺩﻭﺍﺋﺮ ﺍﻟﺸﺮﻃﺔ ﺑﺪﻭﻥ ﻗﺼﺪ ﰲ ﺇﺗﻼﻑ ﻣﺎ ﻛﺎﻥ ﻗﺪ ﰎ ﻣﻦ ﺍﳌﻠﻔﺎﺕ‬
‫ﻭﺍﻟﱪﺍﻣﺞ‪.‬ﺃﻧﻈﺮ ﻟﻠﺘﻔﺼﻞ ﺃﻛﺜﺮ ﺩ‪.‬ﻫﺸﺎﻡ ﺭﺳﺘﻢ ﺍﳉﻮﺍﻧﺐ ﺍﻹﺟﺮﺍﺋﻴﺔ ﻟﻠﺠﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪ ،1994‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ‪.29‬‬

‫‪- 167 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺣﻴﺚ ﺳﺎﺭ ﺍﻟﺘﻘﻠﻴﺪ ﺍﻟﻘﻀﺎﺋﻲ ﰲ ﻫﺬﺍ ﺍﻹﻃﺎﺭ ﻋﻠﻰ ﺿﺮﻭﺭﺓ ﺍﻟﻠﺠﻮﺀ ﺇﱃ ﺍﳋﱪﺓ ﺍﳌﺘﻮﺍﻓﺮ ﻓﻴﻬﺎ ﻫﺬﺍﻥ‬
‫ﺍﻟﺮﻛﻨﺎﻥ‪.‬‬
‫ﻭﻣﻦ ﺍﻟﺸﺮﻭﻁ ﺍﻟﱵ ﺩﺭﺟﺖ ﺃﻏﻠﺐ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﻋﻠﻰ ﲢﺪﻳﺪﻫﺎ ﻣﻨﻬﺎ ﻣﺎ ﻳﺘﻌﻠﻖ ﺑﺎﳋﺒﲑ ﻭﻣﻨﻬﺎ ﻣﺎ‬
‫ﻳﺘﻌﻠﻖ ﺑﺘﻘﺮﻳﺮ ﺍﳋﱪﺓ‪ .‬ﻓﺄﻣﺎ ﻣﺎ ﻳﺘﻌﻠﻖ ﺑﺎﳋﺒﲑ ﻓﺄﻧﻪ ﻳﺸﺘﺮﻁ‪:‬‬
‫*ﺇﺧﺘﻴﺎﺭﻩ ﻣﻦ ﻗﺎﺋﻤﺔ ﺍﳋﱪﺍﺀ ﺍﶈﺪﺩﺓ ﺃﲰﺎﺅﻫﻢ ﺿﻤﻦ ﺍﳉﺪﻭﻝ ﺍﳌﻌﺪ ﻣﺴﺒﻘﺎ‪ ،‬ﻭﻗﺪ ﻧﺼﺖ ﺍﳌﺎﺩﺓ‬
‫‪ 144‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﻋﻠﻰ ﺫﻟﻚ ﺑﻘﻮﳍﺎ‪ ":‬ﳜﺘﺎﺭ ﺍﳋﱪﺍﺀ ﻣﻦ ﺍﳉﺪﻭﻝ ﺍﻟﺬﻱ ﺗﻌﺪﻩ ﺍ‪‬ﺎﻟﺲ‬
‫ﺍﻟﻘﻀﺎﺋﻴﺔ ﺑﻌﺪ ﺇﺳﺘﻄﻼﻉ ﺭﺃﻱ ﺍﻟﻨﻴﺎﺑﺔ ﺍﻟﻌﺎﻣﺔ"‪.‬ﻭﺇﺫﺍ ﱂ ﻳﺘﻀﻤﻦ ﺍﳉﺪﻭﻝ ﻣﻦ ﺍﳋﱪﺍﺀ ﺍﳌﺘﺨﺼﺼﲔ ﰲ ﳎﺎﻝ‬
‫ﺍﳋﱪﺓ ﻓﺈﻧﻪ ﳚﻮﺯ ﳉﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﺑﺼﻔﺔ ﺇﺳﺘﺜﻨﺎﺋﻴﺔ ﺇﺧﺘﻴﺎﺭ ﺧﱪﺍﺀ ﻟﻴﺴﻮﺍ ﻣﻘﻴﺪﻳﻦ ﰲ ﺍﳉﺪﻭﻝ ‪.‬‬
‫ﻭﰲ ﺍﳊﻘﻴﻘﺔ ﻓﺈﻥ ﺍﻹﺳﺘﻌﺎﻧﺔ ﺑﺎﳋﱪﺍﺀ ﻭﻓﻖ ﺍﳌﻨﻬﺞ ﺍﻟﺘﻘﻠﻴﺪﻱ ﰲ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﻳﺮﺗﺒﻂ ﲟﻨﻄﻖ‬
‫ﺗﻘﻠﻴﺪﻱ‪ ،‬ﳚﺐ ﺃﻥ ﻳﺘﺴﻊ ﺻﺪﺭ ﺍﳌﺸﺮﻉ ﺍﻹﺟﺮﺍﺋﻲ ﺑﺼﺪﺩﻫﺎ ﲟﺎ ﻳﺴﻤﺢ ﺑﺘﺠﺎﻭﺯﻫﺎ ﰲ ﺇﻃﺎﺭ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺫﻟﻚ ﺃﻧﻪ ﻓﻀﻼ ﻋﻦ ﻗﺎﻋﺪﺓ ﺃﻧﻪ ﻟﻴﺲ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ﻣﺎ ﳝﻨﻊ ﺟﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﻣﻦ ﻧﺪﺏ ﺧﱪﺍﺀ‬
‫ﻣﻦ ﻏﲑ ﺍﳌﻘﻴﺪﻳﻦ ﺑﺎﳉﺪﻭﻝ ﻓﺈﻥ ﻫﺬﺍ ﺍﻟﺘﻮﺟﻪ ﳚﺐ ﺃﻥ ﻳﺘﻢ ﺗﻄﻮﻳﺮﻩ ﻟﻜﻲ ﳝﻜﻦ ﺍﻹﺳﺘﻌﺎﻧﺔ ﲞﱪﺍﺀ ﰲ ﺍﻟﻌﺎﱂ‬
‫ﺍﻹﻓﺘﺮﺍﺿﻲ ﺇﱃ ﺃﺑﻌﺪ ﻣﻦ ﺍﻟﻨﻄﺎﻕ ﺍﻹﻗﻠﻴﻤﻲ ﳑﺜﻼ ﰲ ﺍﳊﺪﻭﺩ ﺍﳌﺎﺩﻳﺔ ﻟﻠﺪﻭﻝ ﲝﻴﺚ ﳝﻜﻦ ﺃﻥ ﻳﻜﻮﻥ ﻫﺆﻻﺀ‬
‫ﺍﳋﱪﺍﺀ ﻣﻦ ﺧﺎﺭﺝ ﺍﻟﺪﻭﻟﺔ ﻭﻫﻮ ﺃﻣﺮ ﺗﺴﻤﺢ ﺑﻪ ﻣﻘﻮﻣﺎﺕ ﺍﻟﻌﺎﱂ ﺍﻹﻓﺘﺮﺍﺿﻲ ﺑﺈﻋﺘﺒﺎﺭﻩ ﺑﻴﺌﺔ ﺇﺗﺼﺎﻟﻴﺔ ﺭﻗﻤﻴﺔ‬
‫) ‪(1‬‬
‫ﻋﺎﳌﻴﺔ‪.‬‬
‫*ﺣﻠﻒ ﺍﻟﻴﻤﲔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ‪ ،‬ﺇﺫ ﳚﺐ ﻟﺼﺤﺔ ﻋﻤﻞ ﺍﳋﺒﲑ ﺃﺩﺍﺀ ﺍﻟﻴﻤﲔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻭﺫﻟﻚ ﳊﻤﻠﻪ ﻋﻠﻰ‬
‫ﺍﻟﺼﺪﻕ ﻭﺍﻷﻣﺎﻧﺔ ﰲ ﻋﻤﻠﻪ ﻭﺑﺚ ﺍﻟﻄﻤﺄﻧﻴﻨﺔ ﰲ ﺁﺭﺍﺋﻪ ﺍﻟﱵ ﻳﻘﺪﻣﻬﺎ ﺳﻮﺍﺀ ﺑﺎﻟﻨﺴﺒﺔ ﻟﺘﻘﺪﻳﺮ ﺍﻟﻘﺎﺿﻲ ﺃﻭ ﻟﺜﻘﺔ‬
‫ﺑﻘﻴﺔ ﺃﻃﺮﺍﻑ ﺍﻟﺪﻋﻮﻯ‪ ،‬ﻭﻻ ﻳﻐﲏ ﻋﻦ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﺃﻱ ﺿﻤﺎﻧﺔ ﺃﺧﺮﻯ ﻣﻦ ﺍﻟﻀﻤﺎﻧﺎﺕ‪ ،‬ﻭﻗﺪ ﺃﻭﺟﺐ‬
‫ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﺑﻨﺺ ﺍﳌﺎﺩﺓ ‪ 145‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺃﻥ ﳛﻠﻒ ﺍﳋﺒﲑ ﺍﻟﻴﻤﲔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ‬
‫ﻗﺒﻞ ﺃﺩﺍﺀ ﻣﻬﻤﺘﻪ ﻏﲑ ﺃﻧﻪ ﺇﺫﺍ ﻛﺎﻥ ﺍﳋﺒﲑ ﺍﳌﻌﲔ ﻣﻘﻴﺪﺍ ﰲ ﺍﳉﺪﻭﻝ ﻓﻼ ﻳﻠﺰﻡ ﺃﻥ ﳚﺪﺩ ﺣﻠﻔﻪ ﻟﻠﻴﻤﲔ ﻣﺮﺓ‬
‫ﺃﺧﺮﻯ‪.‬‬
‫ﻭﺃﻣﺎ ﺍﻟﺸﺮﻭﻁ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺘﻘﺮﻳﺮ ﺍﳋﱪﺓ ﻓﺈﻥ ﺍﳋﺒﲑ ﺑﻌﺪ ﺇﻧﺘﻬﺎﺋﻪ ﻣﻦ ﺃﲝﺎﺛﻪ ﻭﻓﺤﻮﺻﺎﺗﻪ ﻳﻌﺪ ﺗﻘﺮﻳﺮﺍ‬
‫ﻳﻀﻤﻨﻪ ﺧﻼﺻﺔ ﻣﺎ ﺗﻮﺻﻞ ﺇﻟﻴﻪ ﻣﻦ ﻧﺘﺎﺋﺞ‪ ،‬ﺑﻌﺪ ﺗﻄﺒﻴﻖ ﺍﻷﺳﺲ ﻭﺍﻟﻘﻮﺍﻋﺪ ﺍﻟﻌﻠﻤﻴﺔ ﺍﻟﻔﻨﻴﺔ ﻋﻠﻰ ﺍﳌﺴﺄﻟﺔ ﳏﻞ‬
‫ﺍﻟﺒﺤﺚ‪.‬ﻭﺇﻥ ﻛﺎﻥ ﺍﳌﺸﺮﻉ ﱂ ﻳﻮﺟﺐ ﺇﺗﺒﺎﻉ ﺷﻜﻞ ﻣﻌﲔ ﰲ ﺗﻘﺮﻳﺮ ﺍﳋﱪﺓ ﻓﻘﺪ ﻳﻜﻮﻥ ﺷﻔﻮﻳﺎ ﻭﻗﺪ ﻳﻜﻮﻥ‬

‫)‪(1‬ﳑﺪﻭﺡ ﺇﺑﺮﺍﻫﻴﻢ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ ﺹ‪.،292‬‬

‫‪- 168 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻛﺘﺎﺑﻴﺎ ﻭﻓﻘﺎ ﳌﺎ ﲢﺪﺩﻩ ﻃﺒﻴﻌﺔ ﺍﳌﺄﻣﻮﺭﻳﺔ‪(1).‬ﻟﻜﻦ ﺍﻟﻮﺍﻗﻊ ﺍﻟﻌﻤﻠﻲ ﺃﺛﺒﺖ ﺃﻥ ﻣﺎ ﻳﺘﻢ ﰲ ﺍﻟﻐﺎﻟﺐ ﺍﻷﻋﻢ ﻫﻮ ﺃﻥ‬
‫ﻳﻄﻠﺐ ﻣﻦ ﺍﳋﺒﲑ ﺇﻳﺪﺍﻉ ﺗﻘﺮﻳﺮﻩ ﻛﺘﺎﺑﺔ‪ ،‬ﺳﻴﻤﺎ ﺇﺫﺍ ﻣﺎ ﻛﺎﻧﺖ ﺍﳌﺴﺄﻟﺔ ﻣﻮﺿﻮﻉ ﺍﳋﱪﺓ ﺗﺘﻄﻠﺐ ﺇﺟﺮﺍﺀ‬
‫ﺃﲝﺎﺙ ﻭﲡﺎﺭﺏ ﻭﻓﺤﻮﺻﺎﺕ ﻋﻠﻤﻴﺔ ﻭﻋﻤﻠﻴﺔ ﻭﻣﻌﻤﻠﻴﺔ‪ .‬ﻭﻏﺎﻟﺒﺎ ﻣﺎ ﻳﺮﻓﻖ ﺍﳋﺒﲑ ﺑﺎﻟﺘﻘﺮﻳﺮ ﻣﻠﺤﻘﺎ ﺇﻳﻀﺎﺣﻴﺎ‬
‫ﺑﺎﻟﺼﻮﺭ ﺣﱴ ﻳﺴﻬﻞ ﻋﻠﻰ ﺟﻬﺔ ﺍﻟﺘﺤﻘﻴﻖ ﻓﻬﻢ ﺍﳋﱪﺓ ﻭﻋﻠﻰ ﺟﻬﺔ ﺍﳊﻜﻢ ﺗﻜﻮﻳﻦ ﻋﻘﻴﺪ‪‬ﺎ ﻭﺇﻗﺘﻨﺎﻋﻬﺎ‬
‫ﺍﻟﺬﺍﰐ ﺑﺎﻟﺪﻟﻴﻞ‪.‬‬
‫ﻭﺇﺫﺍ ﻛﺎﻥ ﺍﳊﺎﻝ ﻛﺬﻟﻚ ﺑﺎﻟﻨﺴﺒﺔ ﳌﻮﺿﻮﻋﺎﺕ ﺍﳋﱪﺓ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻓﺈﻥ ﺃﳘﻴﺔ ﺇﻋﺪﺍﺩ ﺗﻘﺎﺭﻳﺮ ﻓﻨﻴﺔ‬
‫ﻣﻜﺘﻮﺑﺔ ﻭﻣﻼﺣﻖ ﺗﻮﺿﻴﺤﻴﺔ ﻣﺼﻮﺭﺓ ﺗﺼﺒﺢ ﺣﺘﻤﻴﺔ ﰲ ﺣﺎﻟﺔ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺣﻴﺚ ﻳﻘﺘﻀﻲ ﺍﻷﻣﺮ‬
‫ﻋﺮﺽ ﻭﺗﻮﺿﻴﺢ ﻭﲢﻠﻴﻞ ﺍﻟﺪﻟﻴﻞ ﺍﳉﻨﺎﺋﻲ ﺍﻟﺮﻗﻤﻲ ﻭﻛﻴﻔﻴﺔ ﺇﺷﺘﻘﺎﻗﻪ ﻭﺇﺳﺘﺨﻼﺻﻪ‪.‬‬
‫ﻭﻳﺸﺘﺮﻁ ﺃﻳﻀﺎ ﻓﻴﻤﺎ ﻳﺘﻌﻠﻖ ﺑﺘﻘﺮﻳﺮ ﺍﳋﱪﺓ ﺃﻥ ﻳﻘﻮﻡ ﺍﳋﺒﲑ ﺑﺈﻳﺪﺍﻉ ﺗﻘﺮﻳﺮ ﺧﱪﺗﻪ ﺧﻼﻝ ﺍﳌﺪﺓ ﺍﶈﺪﺩﺓ‬
‫ﻟﻪ ﰲ ﺃﻣﺮ ﺃﻭ ﺣﻜﻢ ﺍﻟﻨﺪﺏ‪ ،‬ﻓﺈﻥ ﱂ ﻳﻮﺩﻉ ﺗﻘﺮﻳﺮﻩ ﺧﻼﻝ ﻫﺬﻩ ﺍﳌﺪﺓ ﺟﺎﺯ ﻟﻠﻘﺎﺿﻲ ﺇﺳﺘﺒﺪﺍﻟﻪ ﺑﻐﲑﻩ ﻣﺎ ﱂ‬
‫ﻳﻘﺪﻡ ﺍﳋﺒﲑ ﻃﻠﺒﺎ ﺑﺘﻤﺪﻳﺪ ﻫﺬﻩ ﺍﳌﻬﻠﺔ ﻭﺫﻟﻚ ﻧﻈﺮﺍ ﳌﺎ ﺗﺘﺴﻢ ﺑﻪ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﻣﻦ ﻃﺎﺑﻊ ﺍﻟﺴﺮﻋﺔ‬
‫ﺳﻴﻤﺎ ﺇﺫﺍ ﺗﻌﻠﻖ ﺍﻷﻣﺮ ﺑﺎﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫ﺛﺎﻧﻴﺎ‪ :‬ﺍﻟﻘﻮﺍﻋﺪ ﺍﻟﻔﻨﻴﺔ ﺍﻟﱵ ﲢﻜﻢ ﻋﻤﻞ ﺍﳋﺒﲑ ﰲ ﳎﺎﻝ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬ﺗﺘﻨﻮﻉ ﺍﻟﻮﺳﺎﺋﻞ‬
‫ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﺍﻷﺟﻬﺰﺓ ﺍﻟﱵ ﺗﺴﺘﺨﺪﻡ ﻧﻈﺎﻡ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ‪ ،‬ﻛﻤﺎ ﺗﺘﻨﻮﻉ ﺷﺒﻜﺎﺕ ﺍﻹﺗﺼﺎﻝ ﺑﻴﻨﻬﺎ‬
‫ﻭﺗﺘﻤﺎﻳﺰ ﺧﺼﺎﺋﺼﻬﺎ ﺍﻟﻔﻨﻴﺔ ﻓﺘﻨﺪﺭﺝ ﲢﺖ ﲣﺼﺼﺎﺕ ﻓﻨﻴﺔ ﻭﻋﻠﻤﻴﺔ ﺩﻗﻴﻘﺔ ﳑﺎ ﻳﺴﺘﻮﺟﺐ ﻭﺍﳊﺎﻝ ﻛﺬﻟﻚ‬
‫ﺃﻥ ﻳﺘﻮﺍﻓﺮ ﻟﺪﻯ ﺍﳋﺒﲑ ﺍﻹﻣﻜﺎﻧﻴﺎﺕ ﻭﺍﻟﻘﺪﺭﺍﺕ ﺍﻟﻌﻠﻤﻴﺔ ﻭﺍﻟﻔﻨﻴﺔ ﰲ ﳎﺎﻝ ﺍﻟﺘﺨﺼﺺ‪ ،‬ﻭﻋﻠﻰ ﺟﻬﺎﺕ‬
‫ﺍﻟﺘﺤﻘﻴﻖ ﺃﻥ ﺗﺪﻗﻖ ﻋﻨﺪ ﺇﺧﺘﻴﺎﺭﻫﺎ ﻟﻠﺨﺒﲑ ﻭﺗﺘﻴﻘﻦ ﻣﻦ ﻫﺬﻩ ﺍﳌﺴﺄﻟﺔ‪.‬‬
‫ﻛﻤﺎ ﺃﻥ ﻋﻤﻠﻴﺔ ﲡﻤﻴﻊ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺗﻌﺪ ﻣﻦ ﺃﺻﻌﺐ ﺍﻷﻣﻮﺭ ﺍﻟﱵ ﺗﻮﺍﺟﻪ ﺍﳋﺒﲑ ﺍﻟﺘﻘﲏ‪ ،‬ﻟﺬﻟﻚ‬
‫ﻛﺎﻥ ﻟﺰﺍﻣﺎ ﻋﻠﻴﻪ ﺇﺗﺒﺎﻉ ﺧﻄﻮﺍﺕ ﻭﺃﺳﺎﻟﻴﺐ ﻋﻠﻤﻴﺔ ﺗﺘﻨﺎﺳﺐ ﻣﻊ ﺍﻟﺒﻴﺌﺔ ﺍﻟﱵ ﻳﺘﻮﺍﺟﺪ ‪‬ﺎ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ‬
‫ﺍﻟﺪﻟﻴﻞ‪.‬‬
‫‪/1‬ﻣﺘﻄﻠﺒﺎﺕ ﺃﻋﻤﺎﻝ ﺍﳋﱪﺓ ﰲ ﳎﺎﻝ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬ﺇﻧﻪ ﺑﺎﻟﻨﻈﺮ ﺇﱃ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﻔﻨﻴﺔ ﻭﺍﻟﻌﻠﻤﻴﺔ‬
‫) ‪(2‬‬
‫ﻟﻠﺨﱪﺓ ﰲ ﳎﺎﻝ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻓﺈﻧﻪ ﻳﻨﺒﻐﻲ ﻟﻠﺨﺒﲑ ﺍﻹﳌﺎﻡ ﺑﺎﳌﻮﺿﻮﻋﺎﺕ ﺍﻵﺗﻴﺔ‪:‬‬

‫)‪(1‬ﻋﺒﺪ ﺍﻟﻨﺎﺻﺮ ﳏﻤﺪ ﳏﻤﻮﺩ ﻓﺮﻏﻠﻲ ﻭﳏﻤﺪ ﻋﺒﻴﺪ ﺳﻴﻒ ﺳﻌﻴﺪ ﺍﳌﺴﻤﺎﺭﻱ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪.‬ﺹ‪،27‬‬
‫)‪(2‬ﻫﺸﺎﻡ ﺭﺳﺘﻢ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪.‬ﺹ‪،143-142‬‬

‫‪- 169 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪ -‬ﺍﻹﳌﺎﻡ ﺑﺘﺮﻛﻴﺐ ﺍﳊﺎﺳﺐ ﻭﺻﻨﺎﻋﺘﻪ ﻭﻃﺮﺍﺯﻩ ﻭﻧﻈﻢ ﺗﺸﻐﻴﻠﻪ ﺍﻟﺮﺋﻴﺴﻴﺔ ﻭﺍﻟﻔﺮﻋﻴﺔ ﻭﺍﻷﺟﻬﺰﺓ ﺍﻟﻄﺮﻓﻴﺔ‬
‫ﺍﳌﻠﺤﻘﺔ ﺑﻪ ﻭﻛﻠﻤﺎﺕ ﺍﳌﺮﻭﺭ ﺃﻭ ﺍﻟﺴﺮ ﻭﺭﻣﻮﺯ ﺍﻟﺘﺸﻔﲑ‪.‬‬
‫‪ -‬ﻃﺒﻴﻌﺔ ﺍﻟﺒﻴﺌﺔ ﺍﻟﱵ ﻳﻌﻤﻞ ﰲ ﻇﻠﻬﺎ ﺍﳊﺎﺳﺐ ﻣﻦ ﺣﻴﺚ ﺗﻨﻈﻴﻢ ﻭﻣﺪﻯ ﺗﺮﻛﻴﺰ ﺃﻭ ﺗﻮﺯﻳﻊ ﻋﻤﻞ ﺍﳌﻌﺎﳉﺔ‬
‫ﺍﻵﻟﻴﺔ ﻭﲢﺪﻳﺪ ﺃﻣﺎﻛﻦ ﺍﻟﺘﺨﺰﻳﻦ ﻭﺍﻟﻮﺳﺎﺋﻞ ﺍﳌﺴﺘﺨﺪﻣﺔ ﰲ ﺫﻟﻚ‪.‬‬
‫‪ -‬ﺍﻟﻘﺪﺭﺓ ﻋﻠﻰ ﺃﺩﺍﺀ ﺍﳌﻬﺎﻡ ﺩﻭﻥ ﺃﻥ ﻳﺘﺮﺗﺐ ﻋﻠﻰ ﺫﻟﻚ ﺇﻋﻄﺎﺏ ﺃﻭ ﺗﺪﻣﲑ ﺍﻷﺩﻟﺔ ﺍﳌﺘﺤﺼﻠﺔ ﻣﻦ ﺍﻟﻮﺳﺎﺋﻞ‬
‫ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪.‬‬
‫‪ -‬ﺍﻟﺘﻤﻜﻦ ﻣﻦ ﻧﻘﻞ ﺃﺩﻟﺔ ﺍﻹﺛﺒﺎﺕ ﻏﲑ ﺍﳌﺮﺋﻴﺔ ﻭﲢﻮﻳﻠﻬﺎ ﺇﱃ ﺃﺩﻟﺔ ﻣﻘﺮﻭﺀﺓ ﺃﻭ ﺍﶈﺎﻓﻈﺔ ﻋﻠﻰ ﺩﻋﺎﻣﺘﻬﺎ ﳊﲔ‬
‫ﺍﻟﻘﻴﺎﻡ ﺑﺄﻋﻤﺎﻝ ﺍﳋﱪﺓ ﺑﻐﲑ ﺃﻥ ﻳﻠﺤﻘﻬﺎ ﺗﺪﻣﲑ ﺃﻭ ﺇﺗﻼﻑ‪ ،‬ﻣﻊ ﺇﺛﺒﺎﺕ ﺃﻥ ﺍﳌﺨﺮﺟﺎﺕ ﺍﻟﻮﺭﻗﻴﺔ ﳍﺬﻩ ﺍﻷﺩﻟﺔ‬
‫ﺗﻄﺎﺑﻖ ﻣﺎ ﻫﻮ ﻣﺴﺠﻞ ﻋﻠﻰ ﺩﻋﺎﺋﻤﻬﺎ ﺍﳌﻤﻐﻨﻄﺔ‪.‬‬
‫‪ -‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺿﺮﻭﺭﺓ ﺇﳌﺎﻡ ﺍﳋﺒﲑ ﺃﻳﻀﺎ)‪(1‬ﺑﻨﻈﻢ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﲟﻜﻮﻧﺎﺗﻪ ﺍﳌﺎﺩﻳﺔ ﻭﺍﻟﱪﺍﳎﻴﺔ‪.‬‬
‫‪ -‬ﻣﻌﺮﻓﺘﻪ ﻟﻮﺳﺎﺋﻞ ﻭﻃﺮﻕ ﻓﺤﺺ ﻧﻈﺎﻡ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻛﱪﺍﻣﺞ ﻛﺸﻒ ﻭﺇﺯﺍﻟﺔ ﻟﻠﻔﲑﻭﺳﺎﺕ ﻭﺑﺮﺍﻣﺞ‬
‫ﺇﺳﺘﺮﺟﺎﻉ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺇﺻﻼﺡ ﺍﻟﺘﺎﻟﻒ ﻭﺇﻇﻬﺎﺭ ﺍﳌﺨﻔﻲ ﻣﻨﻬﺎ‪.‬‬
‫‪ -‬ﻣﻌﺮﻓﺘﻪ ﻟﻮﺳﺎﺋﻞ ﻧﺴﺦ ﺍﻟﱪﺍﻣﺞ ﻭﺍﳌﻠﻔﺎﺕ ﻭﻋﻤﻞ ﻧﺴﺦ ﻣﻦ ﺍﻟﻘﺮﺹ ﺍﻟﺼﻠﺐ ﻃﺒﻖ ﺍﻷﺻﻞ‪.‬‬
‫‪ -‬ﻣﻌﺮﻓﺘﻪ ﻟﻜﻴﻔﻴﺔ ﺍﻟﺮﺑﻂ ﺑﲔ ﺍﻟﺪﻟﻴﻞ ﺍﳌﺎﺩﻱ ﻭﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﰲ ﺍﻟﻮﻗﺎﺋﻊ ﳏﻞ ﺍﻟﺒﺤﺚ‪.‬‬
‫ﻭﻻ ﻳﻨﺠﺢ ﺍﳋﺒﲑ ﺍﳌﻌﻠﻮﻣﺎﰐ ﰲ ﺃﺩﺍﺋﻪ ﳌﻬﺎﻣﻪ ﺍﳌﻨﻮﻃﺔ ﺑﻪ ﻭﺇﲤﺎﻣﻪ ﻟﻠﻤﺄﻣﻮﺭﻳﺔ ﺍﳌﻜﻠﻒ ‪‬ﺎ ﺇﻥ ﱂ ﻳﻜﻦ ﻟﺪﻳﻪ‬
‫ﻫﺬﺍ ﺍﻟﻘﺪﺭ ﻣﻦ ﺍﳌﺘﻄﻠﺒﺎﺕ ﺍﻟﻔﻨﻴﺔ‪.‬‬
‫ﻓﺎﳋﱪﺓ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﺴﺎﻋﺪ ﰲ ﺍﻟﻨﻬﺎﻳﺔ ﻋﻠﻰ‪:‬‬
‫‪ -‬ﺍﻟﻜﺸﻒ ﻋﻦ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪.‬‬
‫‪ -‬ﺇﺟﺮﺍﺀ ﺍﻹﺧﺘﺒﺎﺭﺍﺕ ﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺔ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻟﻠﺘﺤﻘﻖ ﻣﻦ ﺃﺻﺎﻟﺘﻪ ﻭﻣﺼﺪﺭﻩ ﻛﺪﻟﻴﻞ ﳝﻜﻦ‬
‫ﺗﻘﺪﳝﻪ ﻷﺟﻬﺰﺓ ﺇﻧﻔﺎﺫ ﺍﻟﻘﺎﻧﻮﻥ‪.‬‬
‫‪ -‬ﲢﺪﻳﺪ ﺍﳋﺼﺎﺋﺺ ﺍﻟﻔﺮﻳﺪﺓ ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪.‬‬
‫‪ -‬ﺇﺻﻼﺡ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻭﺇﻋﺎﺩﺓ ﲡﻤﻴﻌﻪ ﻣﻦ ﺍﳌﻜﻮﻧﺎﺕ ﺍﳌﺎﺩﻳﺔ ﻟﻠﻜﻮﻣﺒﻴﻮﺗﺮ‪.‬‬
‫‪ -‬ﻋﻤﻞ ﻧﺴﺨﺔ ﺃﺻﻠﻴﺔ ﻣﻦ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻟﻠﺘﺄﻛﺪ ﻣﻦ ﻋﺪﻡ ﻭﺟﻮﺩ ﻣﻌﻠﻮﻣﺎﺕ ﻣﻔﻘﻮﺩﺓ ﺃﺛﻨﺎﺀ ﻋﻤﻠﻴﺔ‬
‫ﺇﺳﺘﺨﻼﺹ ﺍﻟﺪﻟﻴﻞ‪.‬‬

‫)‪(1‬ﻋﺒﺪ ﺍﻟﻨﺎﺻﺮ ﳏﻤﺪ ﳏﻤﻮﺩ ﻓﺮﻏﻠﻲ ﻭﺩ ﳏﻤﺪ ﻋﺒﻴﺪ ﺳﻴﻒ ﺳﻌﻴﺪ ﺍﳌﺴﻤﺎﺭﻱ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪،‬ﺹ‪.33‬‬

‫‪- 170 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪ -‬ﲨﻊ ﺍﻵﺛﺎﺭ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺍﻟﱵ ﺗﻜﻮﻥ ﻗﺪ ﺗﺒﺪﻟﺖ ﺧﻼﻝ ﺍﻟﺸﺒﻜﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫‪/2‬ﺍﻷﺳﺎﻟﻴﺐ ﺍﻟﻔﻨﻴﺔ ﰲ ﻋﻤﻞ ﺍﳋﺒﲑ ﺍﳌﻌﻠﻮﻣﺎﰐ ﰲ ﺇﻛﺘﺸﺎﻑ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪:‬ﻟﻠﺨﺒﲑ ﺍﳌﻌﻠﻮﻣﺎﰐ‬
‫ﰲ ﺳﺒﻴﻞ ﲢﺮﻱ ﺍﳊﻘﻴﻘﺔ ﺃﻥ ﻳﻘﻮﻡ ﺑﻜﻞ ﻣﺎ ﳝﻜﻨﻪ ﻣﻦ ﺍﻟﺘﻮﺻﻞ ﺇﻟﻴﻬﺎ‪ ،‬ﻭﻫﻮ ﰲ ﺇﻃﺎﺭ ﺍﻟﻘﻴﺎﻡ ﺑﻌﻤﻠﻪ ﻟﻪ ﺃﻥ‬
‫ﻳﺴﺘﺨﺪﻡ ﺍﻷﺳﺎﻟﻴﺐ ﺍﻟﻌﻠﻤﻴﺔ ﺍﻟﱵ ﻳﻘﻮﻡ ﻋﻠﻴﻬﺎ ﲣﺼﺼﻪ ﻭﻟﻴﺲ ﻟﻠﻤﺤﻜﻤﺔ ﺃﻥ ﺗﺮﻓﺾ ﺗﻠﻚ ﺍﻷﺳﺎﻟﻴﺐ ﻣﺎ ﱂ‬
‫) ‪(1‬‬
‫ﻳﻜﻦ ﺭﻓﻀﻬﺎ ﳍﺎ ﻣﺴﺒﺒﺎ ﺑﺸﻜﻞ ﻣﻨﻄﻘﻲ‬
‫ﻭﻳﻌﺘﻤﺪ ﻋﻤﻞ ﺍﳋﺒﲑ ﺍﳌﻌﻠﻮﻣﺎﰐ ﰲ ﺳﺒﻴﻞ ﲢﺮﻱ ﺍﳊﻘﻴﻘﺔ ﰲ ﳎﺎﻝ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﲨﻊ‬
‫ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﻭﲢﺼﻴﻠﻬﺎ ﻣﻦ ﺧﻮﺍﺩﻡ ﺍﳌﻮﺍﻗﻊ )‪(Les serveurs‬ﻭﻣﻦ ﺟﻬﺎﺯ ﺍﳌﻌﺘﺪﻱ ﺑﻌﺪ‬
‫ﺍﻟﺘﻮﺻﻞ ﺇﱃ ﲢﺪﻳﺪﻩ‪ ،‬ﰒ ﻳﻘﻮﻡ ﺑﻌﻤﻠﻴﺔ ﲢﻠﻴﻞ ﺭﻗﻤﻲ ﳍﺎ ﳌﻌﺮﻓﺔ ﻛﻴﻔﻴﺔ ﺇﻋﺪﺍﺩﻫﺎ ﺍﻟﱪﳎﻲ ﻭﻧﺴﺒﺘﻬﺎ ﺇﱃ‬
‫ﻣﺴﺎﺭﻫﺎ ﺍﻟﺬﻱ ﺃﻋﺪﺕ ﻓﻴﻪ ﻭﲢﺪﻳﺪ ﻋﻨﺎﺻﺮ ﺣﺮﻛﺘﻬﺎ‪ ،‬ﻭﻣﻦ ﰒ ﺍﻟﺘﻮﺻﻞ ﰲ ﺍﻟﻨﻬﺎﻳﺔ ﺇﱃ ﻣﻌﺮﻓﺔ ﺑﺮﻭﺗﻜﻮﻝ‬
‫ﺍﻷﻧﺘﺮﻧﺎﺕ )‪ (IP‬ﻟﻠﺤﺎﺳﻮﺏ ﺍﻟﺬﻱ ﺻﺪﺭﺕ ﻣﻨﻪ ﺍﻟﺮﺳﺎﺋﻞ ﻭﺍﻟﻨﺒﻀﺎﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪.‬‬
‫ﻭﻳﺮﻯ ﺑﻌﺾ ﺍﳌﺘﺨﺼﺼﲔ ﺃﻥ ﻋﻤﻞ ﺍﳋﺒﲑ ﺍﳌﻌﻠﻮﻣﺎﰐ ﰲ ﺇﺷﺘﻘﺎﻕ ﻭﲡﻤﻴﻊ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﻳﺘﻢ ﻋﱪ‬
‫ﺛﻼﺙ ﻣﺮﺍﺣﻞ‪:‬‬
‫ﺍﳌﺮﺣﻠﺔ ﺍﻷﻭﱃ‪ :‬ﲡﻤﻴﻊ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺨﺰﻧﺔ ﻟﺪﻯ ﺍﻟﻄﺮﻑ ﻣﻘﺪﻡ ﺍﳋﺪﻣﺔ ﻣﻦ ﺧﻼﻝ ﺗﺘﺒﻊ ﺍﳊﺎﺳﺒﺎﺕ‬
‫ﺍﳋﺎﺩﻣﺔ ﺍﻟﱵ ﺩﺧﻞ ﻣﻨﻬﺎ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻭﳏﺎﻭﻟﺔ ﺇﳚﺎﺩ ﺃﺛﺮ ﻟﻪ‪.‬‬
‫ﺍﳌﺮﺣﻠﺔ ﺍﻟﺜﺎﻧﻴﺔ‪ :‬ﻣﺮﺣﻠﺔ ﺍﳌﺮﺍﻗﺒﺔ ﻭﻳﺘﻢ ﺫﻟﻚ ﺑﻄﺮﻕ ﳐﺘﻠﻔﺔ ﺃﳘﻬﺎ ﺇﺳﺘﺨﺪﺍﻡ ﺑﺮﺍﻣﺞ ﻣﺮﺍﻗﺒﺔ ﳝﻜﻦ‬
‫ﲢﻤﻴﻠﻬﺎ ﻟﻠﺒﺤﺚ ﻋﻦ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻬﺎ ﻭﺣﺼﺮ ﻭﺗﺴﺠﻴﻞ ﺑﻴﺎﻧﺎﺕ ﻛﻞ ﺩﺧﻮﻝ ﻭﺧﺮﻭﺝ ﺑﺎﳌﻮﻗﻊ‪.‬‬
‫ﺍﳌﺮﺣﻠﺔ ﺍﻟﺜﺎﻟﺜﺔ‪ :‬ﻓﺤﺺ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﺑﻌﺪ ﺿﺒﻄﻪ ﻣﻦ ﻃﺮﻑ ﺟﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ‬
‫ﲟﻜﻮﻧﺎﺗﻪ ﺍﳌﺎﺩﻳﺔ ﻭﺍﳌﻌﻨﻮﻳﺔ ﻹﺷﺘﻘﺎﻗﺎﻟﺪﻟﻴﻞ ﻭﺗﻘﺪﳝﻪ ﳉﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﻭﺗﻘﺮﻳﺮ ﻣﺪﻯ ﻭﻗﻮﻉ ﺍﳉﺮﳝﺔ‬
‫ﺑﺈﺳﺘﺨﺪﺍﻡ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻀﺒﻮﻁ ﻣﻦ ﻋﺪﻣﻪ‪.‬‬
‫ﻭﻗﺪ ﻭﺿﻌﺖ ﻭﺯﺭﺍﺓ ﺍﻟﻌﺪﻝ ﺍﻷﻣﺮﻳﻜﻴﺔ ﺇﻃﺎﺭﺍ ﻋﻤﻠﻴﺎ ﳛﺪﺩ ﺧﻄﻮﺍﺕ ﺃﺳﺎﺳﻴﺔ ﳉﻤﻊ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ‬
‫ﰒ ﻓﺤﺼﻬﺎ ﻭﻣﻦ ﰒ ﲢﻠﻴﻠﻬﺎ ﻭﺃﺧﲑﺍ ﻛﺘﺎﺑﺔ ﺍﻟﻨﺘﺎﺋﺞ ﺍﳌﺘﻮﺻﻞ ﺇﻟﻴﻬﺎ ﰲ ﺗﻘﺮﻳﺮ‪ ،‬ﻭﳝﻜﻦ ﺇﳚﺎﺯ ﻫﺬﻩ ﺍﳋﻄﻮﺍﺕ‬
‫ﰲ ﺍﳌﺮﺍﺣﻞ ﺍﻟﺘﺎﻟﻴﺔ‪:‬‬
‫‪-‬ﺧﻄﻮﺍﺕ ﻣﺎ ﻗﺒﻞ ﺍﻟﺘﺸﻐﻴﻞ ﻭﺍﻟﻔﺤﺺ‪:‬‬
‫*ﺍﻟﺘﺄﻛﺪ ﻣﻦ ﻣﻄﺎﺑﻘﺔ ﳏﺘﻮﻳﺎﺕ ﺃﺣﺮﺍﺯ ﺍﳌﻀﺒﻮﻃﺎﺕ ﳌﺎ ﻫﻮ ﻣﺪﻭﻥ ﻋﻠﻴﻬﺎ‪.‬‬

‫)‪(1‬ﺧﺎﻟﺪ ﳑﺪﻭﺡ ﺇﺑﺮﺍﻫﻴﻢ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪،‬ﺹ‪.301‬‬

‫‪- 171 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫*ﺍﻟﺘﺄﻛﺪ ﻣﻦ ﺻﻼﺣﻴﺔ ﻭﺣﺪﺍﺕ ﻧﻈﺎﻡ ﺍﻟﺘﺸﻐﻴﻞ‪.‬‬


‫*ﺗﺴﺠﻴﻞ ﻣﻌﻄﻴﺎﺕ ﻭﺣﺪﺍﺕ ﺍﳌﻜﻮﻧﺎﺕ ﺍﳌﻀﺒﻮﻃﺔ‪.‬‬
‫‪ -‬ﺧﻄﻮﺍﺕ ﺍﻟﺘﺸﻐﻴﻞ ﺍﻟﻔﺤﺺ‪:‬‬
‫*ﺇﺳﺘﻜﻤﺎﻝ ﺗﺴﺠﻴﻞ ﺑﺎﻗﻲ ﻣﻌﻄﻴﺎﺕ ﺍﻟﻮﺣﺪﺍﺕ ﻣﻦ ﺧﻼﻝ ﻗﺮﺍﺀﺍﺕ ﺍﳉﻬﺎﺯ‪.‬‬
‫*ﻋﻤﻞ ﻧﺴﺨﺔ ﻣﻦ ﻛﻞ ﻭﺳﺎﺋﻂ ﺍﻟﺘﺨﺰﻳﻦ ﺍﳌﻀﺒﻮﻃﺔ ﻭﻋﻠﻰ ﺭﺃﺳﻬﺎ ﺍﻟﻘﺮﺹ ﺍﻟﺼﻠﺐ ﻹﺟﺮﺍﺀ ﻋﻤﻠﻴﺔ‬
‫ﺍﻟﻔﺤﺺ ﺍﳌﺒﺪﺋﻲ ﻋﻠﻰ ﻫﺬﻩ ﺍﻟﻨﺴﺨﺔ ﳊﻤﺎﻳﺔ ﺍﻷﺻﻞ ﻣﻦ ﺃﻱ ﻓﻘﺪ ﺃﻭ ﺗﻠﻒ ﺃﻭ ﺗﺪﻣﲑ ﺳﻮﺍﺀ ﻋﻦ ﺳﻮﺀ‬
‫ﺍﻹﺳﺘﺨﺪﺍﻡ ﺃﻭ ﻟﻮﺟﻮﺩ ﻓﲑﻭﺳﺎﺕ ﺃﻭ ﻗﻨﺎﺑﻞ ﺑﺮﳎﻴﺔ‪.‬‬
‫*ﲢﺪﻳﺪ ﺃﻧﻮﺍﻉ ﻭﺃﲰﺎﺀ ﺍ‪‬ﻤﻮﻋﺎﺕ ﺍﻟﱪﺍﳎﻴﺔﻛﱪﺍﻣﺞ ﺍﻟﻨﻈﺎﻡ )ﺑﺮﺍﻣﺞ ﺍﻟﺘﺸﻐﻴﻞ(‪ ،‬ﺑﺮﺍﻣﺞ ﺍﻟﺘﻄﺒﻴﻘﺎﺕ‬
‫ﻭﺑﺮﺍﻣﺞ ﺍﻹﺗﺼﺎﻻﺕ‪ ،‬ﻭﻣﺎ ﺇﺫﺍ ﻛﺎﻥ ﻫﻨﺎﻙ ﺑﺮﺍﻣﺞ ﺃﺧﺮﻯ ﺫﺍﺕ ﺩﻻﻟﺔ ﲟﻮﺿﻮﻉ ﺍﳉﺮﳝﺔ‪.‬‬
‫*ﺇﻇﻬﺎﺭ ﺍﳌﻠﻔﺎﺓ ﺍﳌﺨﺒﺄﺓ ﻭﺍﻟﻨﺼﻮﺹ ﺍﳌﺨﻔﻴﺔ ﺩﺍﺧﻞ ﺍﻟﺼﻮﺭ‪.‬‬
‫*ﺇﺳﺘﺮﺟﺎﻉ ﺍﳌﻠﻔﺎﺕ ﺍﻟﱵ ﰎ ﳏﻮﻫﺎ ﻣﻦ ﺍﻷﺻﻞ ﻭﺫﻟﻚ ﺑﺈﺳﺘﺨﺪﺍﻡ ﺃﺣﺪ ﺑﺮﺍﻣﺞ ﺇﺳﺘﻌﺎﺩﺓ ﺍﳌﻌﻠﻮﻣﺎﺕ‬
‫ﻭﻛﺬﻟﻚ ﺑﺎﻟﻨﺴﺒﺔ ﻟﻠﻤﻠﻔﺎﺕ ﺍﳌﻌﻄﻠﺔ ﺃﻭ ﺍﻟﺘﺎﻟﻔﺔ‪.‬‬
‫*ﲣﺰﻳﻦ ﻫﺬﻩ ﺍﳌﻠﻔﺎﺕ ﺃﻭ ﺍﳌﻌﻄﻴﺎﺕ ﻭﻋﻤﻞ ﻧﺴﺦ ﺃﺧﺮﻯ ﻃﺒﻖ ﺍﻷﺻﻞ ﻣﻦ ﺍﻷﺳﻄﻮﺍﻧﺔ ﺃﻭ ﺍﻟﻘﺮﺹ‬
‫ﺍﶈﺘﻮﻱ ﳍﺎ ﻭﻟﻔﺤﺼﻬﺎ ﻋﻦ ﻃﺮﻳﻖ ﺗﻄﺒﻴﻖ ﺍﳋﻄﻮﺍﺕ ﺳﺎﻟﻔﺔ ﺍﻟﺬﻛﺮ‪.‬‬
‫*ﺇﻋﺪﺍﺩ ﻗﺎﺋﻤﺔ ﻳﻴﺠﺮﺩ ﻓﻴﻬﺎ ﺍﳋﺒﲑ ﻛﻞ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺍﻟﱵ ﰎ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻬﺎ‪ ،‬ﻣﻊ ﺇﺟﺮﺍﺀ ﻣﺮﺍﺟﻌﺔ‬
‫ﻟﻜﻞ ﺻﻮﺭﺓ ﳏﺘﻔﻆ ‪‬ﺎ ﰲ ﺍﻟﻘﺮﺹ ﺍﻟﺼﻠﺐ ﳊﺎﺳﻮﺏ ﺁﺧﺮ ﻟﻠﺘﺄﻛﺪ ﻣﻦ ﺳﻼﻣﺔ ﺍﻟﻘﺎﺋﻤﺔ‪.‬‬
‫*ﲢﻮﻳﻞ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺇﱃ ﻫﻴﺄﺓ ﻣﺎﺩﻳﺔ ﻭﺫﻟﻚ ﻋﻦ ﻃﺮﻳﻖ ﻃﺒﺎﻋﺔ ﺍﳌﻠﻔﺎﺕ ﺃﻭ ﺗﺼﻮﻳﺮ ﳏﺘﻮﺍﻫﺎ ﺃﻭ‬
‫) ‪(1‬‬
‫ﻭﺿﻌﻬﺎ ﰲ ﺃﻱ ﻭﻋﺎﺀ ﺁﺧﺮ ﺣﺴﺐ ﻧﻮﻉ ﺍﳌﻌﻄﻴﺎﺕ ﻭﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﻜﻮﻧﺔ ﻟﻠﺪﻟﻴﻞ‪.‬‬
‫ﻭﻓﻀﻼ ﻋﻤﺎ ﺳﺒﻖ ﻓﺈﻥ ﺍﳋﺒﲑ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻭﻫﻮ ﰲ ﺇﻃﺎﺭ ﺍﻟﻘﻴﺎﻡ ﺑﻌﻤﻠﻪ ﻟﻪ ﺃﻥ ﻳﺴﺘﺨﺪﻡ ﺍﻟﻌﺪﻳﺪ ﻣﻦ‬
‫ﺍﻟﻮﺳﺎﺋﻞ ﺍﻟﻌﻠﻤﻴﺔ ﻭﺍﻟﱪﳎﻴﺎﺕ ﺍﻟﱵ ﲤﻜﻨﻪ ﻣﻦ ﺇﺳﺘﺨﻼﺹ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻭ ﺗﺴﺎﻋﺪﻩ ﰲ ﺍﻟﻮﺻﻮﻝ ﺇﱃ‬
‫ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‪ ،‬ﻭﻏﺎﻟﺒﺎ ﻣﺎ ﺗﻜﻮﻥ ﻫﺬﻩ ﺍﻟﻮﺳﺎﺋﻞ ﺃﺩﻭﺍﺕ ﻓﻨﻴﺔ ﺗﺴﺘﺨﺪﻡ ﰲ ﺑﻨﻴﺔ ﻧﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﺕ‪.‬‬
‫ﻭﻧﺬﻛﺮ ﻣﻨﻬﺎ ﻋﻠﻰ ﺳﺒﻴﻞ ﺍﳌﺜﺎﻝ ﻻ ﺍﳊﺼﺮ‪:‬‬

‫)‪(1‬ﻋﺒﺪ ﺍﻟﻨﺎﺻﺮ ﳏﻤﺪ ﳏﻤﻮﺩ ﻓﺮﻏﻠﻲ ﻭ ﻋﺒﻴﺪ ﺳﻴﻒ ﺳﻌﻴﺪ ﺍﳌﺴﻤﺎﺭﻱ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.،35‬‬

‫‪- 172 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫*ﺑﺮﻭﺗﻮﻛﻮﻝ ﺍﻷﻧﺘﺮﻧﺎﺕ)‪(IP‬ﻭﻫﻮ ﺍﳌﺴﺆﻭﻝ ﻋﻦ ﺗﺮﺍﺳﻞ ﺣﺰﻡ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻋﱪ ﺷﺒﻜﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ‬


‫ﻭﺗﻮﺟﻴﻬﻬﺎ ﺇﱃ ﺃﻫﺪﺍﻓﻬﺎ‪ ،‬ﻭﻫﻮ ﻳﻮﺟﺪ ﺑﻜﻞ ﺟﻬﺎﺯ ﻣﺮﺗﺒﻂ ﺑﺎﻷﻧﺘﺮﻧﺎﺕ ﻭﻳﺘﻜﻮﻥ ﻣﻦ ﺃﺭﺑﻌﺔ ﺃﺟﺰﺍﺀ ﻛﻞ‬
‫ﺟﺰﺀ ﻳﺘﻜﻮﻥ ﻣﻦ ﺃﺭﺑﻊ ﺧﺎﻧﺎﺕ‪ ،‬ﺣﻴﺚ ﻳﺸﲑ ﺍﳉﺰﺀ ﺍﻷﻭﻝ ﻣﻦ ﺍﻟﻴﺴﺎﺭ ﺇﱃ ﺍﳌﻨﻄﻘﺔ ﺍﳉﻐﺮﺍﻓﻴﺔ‪ ،‬ﻭﺍﳉﺰﺀ‬
‫ﺍﻟﺜﺎﱐ ﳌﺰﻭﺩ ﺍﳋﺪﻣﺔ‪ ،‬ﻭﺍﻟﺜﺎﻟﺚ ‪‬ﻤﻮﻋﺔ ﺍﳊﺎﺳﺒﺎﺕ ﺍﳌﺮﺗﺒﻄﺔ‪ ،‬ﻭﺍﻟﺮﺍﺑﻊ ﳛﺪﺩ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﺍﻟﺬﻱ ﰎ ﺍﻹﺗﺼﺎﻝ‬
‫ﻣﻨﻪ‪(1)،‬ﻣﻊ ﻣﻼﺣﻈﺔ ﺃﻥ ﻋﻨﻮﺍﻥ ‪ IP‬ﻗﺪ ﻳﺘﻐﲑ ﰲ ﻛﻞ ﺇﺗﺼﺎﻝ ﺑﺸﺒﻜﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ‪.‬‬
‫*ﻧﻈﺎﻡ ﺍﻟﱪﻭﻛﺴﻲ)‪ :(PROXY‬ﻳﻌﻤﻞ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ ﻛﻮﺳﻴﻂ ﺑﲔ ﺍﻟﺸﺒﻜﺔ ﻭﻣﺴﺘﺨﺪﻣﻴﻬﺎ ﲝﻴﺚ‬
‫ﻳﻀﻤﻦ ﻣﻘﺪﻡ ﺍﳋﺪﻣﺔ ﺗﻮﻓﲑ ﺧﺪﻣﺎﺕ ﺍﻟﺬﺍﻛﺮﺓ ﺍﳉﺎﻫﺰﺓ‪ ،‬ﻭﺗﻘﻮﻡ ﻓﻜﺮﻩ ﺍﻟﱪﻭﻛﺴﻲ ﻋﻠﻰ ﺗﻠﻘﻲ ﻣﺰﻭﺩ‬
‫ﺍﻟﱪﻭﻛﺴﻲ ﻃﻠﺒﺎﹰ ﻣﻦ ﺍﳌﺴﺘﺨﺪﻡ ﻟﻠﺒﺤﺚ ﻋﻦ ﺻﻔﺤﺔ ﻣﺎ ﺿﻤﻦ ﺍﻟﺬﺍﻛﺮﺓ ﺍﳉﺎﻫﺰﺓ‪ ،‬ﻓﻴﺘﺤﻘﻖ ﺍﻟﱪﻭﻛﺴﻲ‬
‫ﻓﻴﻤﺎ ﺇﺫﺍ ﻛﺎﻧﺖ ﻫﺬﻩ ﺍﻟﺼﻔﺤﺔ ﻗﺪ ﰎ ﺗﱰﻳﻠﻬﺎ ﻣﻦ ﻗﺒﻞ ﻓﻴﻘﻮﻡ ﺑﺈﺭﺳﺎﳍﺎ ﺇﱃ ﺍﳌﺴﺘﺨﺪﻡ ﺩﻭﻥ ﺣﺎﺟﺔ ﺇﱃ‬
‫ﺇﺭﺳﺎﻝ ﺍﻟﻄﻠﺐ ﺇﱃ ﺍﻟﺸﺒﻜﺔ ﺍﻟﻌﺎﳌﻴﺔ‪ ،‬ﺃﻣﺎ ﺇﺫﺍ ﱂ ﻳﺘﻢ ﺗﱰﻳﻠﻬﺎ ﻣﻦ ﻗﺒﻞ ﻓﻴﺘﻢ ﺇﺭﺳﺎﻝ ﺍﻟﻄﻠﺐ ﺇﱃ ﺍﻟﺸﺒﻜﺔ‬
‫ﺍﻟﻌﺎﳌﻴﺔ ﻭﻫﻨﺎ ﻳﺴﺘﺨﺪﻡ ﺍﻟﱪﻭﻛﺴﻲ ﺃﺣﺪ ﻋﻨﺎﻭﻳﻦ ‪ .IP‬ﻭﻣﻦ ﺃﻫﻢ ﻣﺰﺍﻳﺎ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ ﺃﻥ ﺍﻟﺬﺍﻛﺮﺓ ﺍﳌﺘﻮﻓﺮﺓ‬
‫ﻟﺪﻳﻪ ﳝﻜﻦ ﺃﻥ ﺗﺘﺤﻔﻆ ﺑﺘﻠﻚ ﺍﻟﻌﻤﻠﻴﺎﺕ ﺍﻟﱵ ﲤﺖ ﻋﻠﻴﻬﺎ ﳑﺎ ﳚﻌﻞ ﺩﻭﺭﻩ ﻗﻮﻱ ﰲ ﺍﻹﺛﺒﺎﺕ ﻋﻦ ﻃﺮﻳﻖ‬
‫ﻓﺤﺺ ﺗﻠﻚ ﺍﻟﻌﻤﻠﻴﺎﺕ ﺍﶈﻔﻮﻇﺔ‪.‬‬
‫*ﺑﺮﻧﺎﻣﺞ ﺍﻟﺪﻣﺞ ﻭﻓﻚ ﺍﻟﺪﻣﺞ)‪ (pkzip‬ﻭﻳﺴﺘﺨﺪﻡ ﻫﺬﺍ ﺍﻟﱪﻧﺎﻣﺞ ﻟﻔﻚ ﺩﻣﺞ ﺍﻟﱪﺍﻣﺞ‪ ،‬ﻓﻘﺪ ﻳﻜﻮﻥ‬
‫ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻗﺪ ﻗﺎﻡ ﺑﺪﻣﺞ ﺑﺮﺍﳎﻪ ﻓﻼ ﳝﻜﻦ ﺍﻹﻃﻼﻉ ﻋﻠﻴﻬﺎ ﺇﻻ ﺑﻌﺪ ﻓﻚ ﺍﻟﺪﻣﺞ‪.‬‬
‫*ﺑﺮﻧﺎﻣﺞ ‪Visual route5.2 a‬ﻭﻫﻮ ﻋﺒﺎﺭﺓ ﻋﻦ ﺑﺮﻧﺎﻣﺞ ﻳﻠﺘﻘﻂ ﺃﻱ ﻋﻤﻠﻴﺔ ﻓﺤﺺ ﺿﺪ ﺍﻟﺸﺒﻜﺔ‬
‫ﻓﻴﻘﻮﻡ ﺑﺘﻘﺪﱘ ﺃﺟﻮﺑﺔ ﺗﺒﲔ ﺍﳌﻌﻠﻮﻣﺎﻥ ﺍﻟﱵ ﺣﺪﺙ ﻓﻴﻬﺎ ﺍﳌﺴﺢ ﻭﺍﳌﻨﺎﻃﻖ ﺍﻟﱵ ﰎ ﻓﻴﻬﺎ ﺍﳍﺠﻮﻡ‪ ،‬ﻭﺑﻌﺪ ﻣﻌﺮﻓﺔ‬
‫ﻋﻨﻮﺍﻥ ‪IP‬ﺇﺳﻢ ﺍﳉﻬﺔ ﻳﺮﺳﻢ ﺍﻟﱪﻧﺎﻣﺞ ﺧﻄﺎ ﻳﻮﺿﺢ ﻣﻦ ﺧﻼﻟﻪ ﻣﺴﺎﺭ ﺍﳍﺠﻮﻡ ﺑﲔ ﻣﺼﺪﺭﻩ ﻭﺍﳉﻬﺔ ﺍﻟﱵ‬
‫ﺇﺳﺘﻬﺪﻓﻬﺎ ﺍﳍﺠﻮﻡ‪.‬‬
‫*ﺑﺮﻧﺎﻣﺞ ﻣﻌﺎﳉﺔ ﺍﳌﻠﻔﺎﺕ‪ (Xtree Progold) :‬ﻭﻫﻮ ﺑﺮﻧﺎﻣﺞ ﳝﻜﻦ ﻣﻦ ﺍﻟﻌﺜﻮﺭ ﻋﻠﻰ ﺍﳌﻠﻔﺎﺕ ﰲ‬
‫ﺃﻱ ﻣﻜﺎﻥ ﻋﻠﻰ ﺍﻟﺸﺒﻜﺔ ﺃﻭ ﻋﻠﻰ ﺍﻟﻘﺮﺹ ﺍﻟﺼﻠﺐ‪ ،‬ﻭﻳﺴﺘﺨﺪﻡ ﻟﺘﻘﻴﻴﻢ ﳏﺘﻮﻳﺎﺕ ﺍﻟﻘﺮﺹ ﺍﻟﺼﻠﺐ ﺍﳋﺎﺹ‬
‫ﺑﺎﳌﺘﻬﻢ ﻭﺍﻷﻗﺮﺍﺽ ﺍﳌﺮﻧﺔ ﺍﳌﻀﺒﻮﻃﺔ ﺃﻭ ﻳﺴﺘﺨﺪﻡ ﻟﻘﺮﺍﺀﺓ ﺍﻟﱪﺍﻣﺞ ﰲ ﺻﻮﺭ‪‬ﺎ ﺍﻷﺻﻠﻴﺔ‪.‬‬

‫)‪(1‬ﻭﺗﻮﺟﺪ ﺃﻛﺜﺮ ﻣﻦ ﻃﺮﻳﻘﺔ ﳝﻜﻦ ﻣﻦ ﺧﻼﳍﺎ ﻣﻌﺮﻓﺔ ﻋﻨﻮﺍﻥ ‪ IP‬ﺍﳋﺎﺹ ﲜﻬﺎﺯ ﺍﳊﺎﺳﻮﺏ ﻣﻨﻬﺎ ﻋﻠﻰ ﺳﺒﻴﻞ ﺍﳌﺜﺎﻝ ﻣﺎ ﻳﺴﺘﺨﺪﻡ ﰲ ﺣﺎﻟﺔ ﺍﻟﻌﻤﻞ ﻋﻠﻰ ﻧﻈﺎﻡ‬
‫ﺗﺸﻐﻴﻞ ‪ Windous‬ﺣﻴﺚ ﻳﺘﻢ ﻛﺘﺎﺑﺔ ‪ WINPCFG‬ﰲ ﺃﻣﺮ ﺍﻟﺘﺸﻐﻴﻞ ﻟﻴﻈﻬﺮ ﻣﺮﺟﻊ ﺣﻮﺍﺭ ﺑﲔ ﻓﻴﻪ ‪IP‬‬

‫‪- 173 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫*ﺑﺮﻧﺎﻣﺞ ‪Hark Tracerv1.2‬ﻭﻫﻮ ﺃﺣﺪ ﺑﺮﺍﻣﺞ ﺍﻟﺘﺘﺒﻊ ﻳﺘﻜﻮﻥ ﻣﻦ ﺷﺎﺷﺔ ﺭﺋﻴﺴﻴﺔ ﺗﻘﺪﻡ‬
‫ﻟﻠﻤﺴﺘﺨﺪﻡ ﺑﻴﺎﻥ ﺷﺎﻣﻞ ﺑﻌﻤﻠﻴﺎﺕ ﺍﻹﺧﺘﺮﺍﻕ ﺍﻟﱵ ﺗﻌﺮﺽ ﳍﺎ ﺟﻬﺎﺯﻩ‪ ،‬ﳛﺘﻮﻱ ﻋﻠﻰ ﺗﺎﺭﻳﺦ ﺍﻟﻮﺍﻗﻌﺔ ﻭﻋﻨﻮﺍﻥ‬
‫‪ IP‬ﺍﻟﺬﻱ ﰎ ﻣﻦ ﺧﻼﻟﻪ ﻋﻤﻠﻴﺔ ﺍﻹﺧﺘﺮﺍﻕ ﻭﺇﺳﻢ ﺍﻟﺪﻭﻟﺔ ﺍﻟﱵ ﻣﻨﻬﺎ ﺍﻹﺧﺘﺮﺍﻕ ﻭﺇﺳﻢ ﺍﻟﺸﺮﻛﺔ ﺍﳌﺰﻭﺩﺓ‬
‫ﳋﺪﻣﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ ﺍﳌﺴﺘﻀﻴﻔﺔ ﻟﻠﻤﺨﺘﺮﻕ ﻭﺭﻗﻢ ﺍﳌﻨﻔﺬ ﻭﺍﻟﺒﻮﺍﺑﺔ ﺍﳋﺎﺻﺔ ﻭﺑﻴﺎﻧﺎﺕ ﺍﻟﺸﺒﻜﺔ ﺍﻟﱵ ﺗﺘﺒﻌﻬﺎ‬
‫ﺍﻟﺸﺮﻛﺔ ﺍﳌﺴﺘﻀﻴﻔﺔ ﻟﻠﻤﺨﺘﺮﻕ ﲟﺎ ﻓﻴﻬﺎ ﺃﺭﻗﺎﻡ ﻫﻮﺍﺗﻔﻬﺎ‪.‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﱐ‪ :‬ﺍﻟﻘﻮﺍﻋﺪ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﳊﺪﻳﺜﺔ ﻹﺳﺘﺨﻼﺹ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪:‬‬
‫ﱂ ﺗﺴﻠﻢ ﻃﺮﻕ ﺍﻹﺛﺒﺎﺕ ﻣﻦ ﺗﺄﺛﲑﺍﺕ ﺛﻮﺭﺓ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﻹﺗﺼﺎﻻﺕ‪ ،‬ﻓﺎﻟﺘﻨﺎﻏﻢ‬
‫ﺍﳌﻄﻠﻮﺏ ﲢﻘﻴﻘﻪ ﺩﺍﺋﻤﺎ ﺑﲔ ﻃﺒﻴﻌﺔ ﺍﻟﺪﻟﻴﻞ ﻭﻃﺒﻴﻌﺔ ﺍﳉﺮﳝﺔ ﺍﻟﱵ ﻳﻮﻟﺪ ﻣﻨﻬﺎ ﻭﻳﺼﻠﺢ ﻹﺛﺒﺎ‪‬ﺎ‪ ،‬ﺃﻓﺮﺯ ﺇﱃ ﺣﻴﺰ‬
‫ﺍﻟﻮﺟﻮﺩ ﻃﺮﻗﺎ ﺇﺟﺮﺍﺋﻴﺔ ﺗﺘﻨﺎﺳﺐ ﻭﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﺘﻘﻨﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪ ،‬ﻟﻜﻲ ﳝﻜﻦ ﻋﻦ‬
‫ﻃﺮﻳﻘﻬﺎ ﺍﻟﻮﺻﻮﻝ ﺇﻟﻴﻪ ﻭﺇﺳﺘﺨﻼﺻﻪ ﻭﻧﻘﺼﺪ ﺑﺬﻟﻚ ﺗﻜﺮﻳﺲ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﳉﻤﻊ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪.‬‬
‫ﻭﻣﻦ ﺿﻤﻦ ﺍﳌﻘﻮﻣﺎﺕ ﺍﻟﺘﺸﺮﻳﻌﻴﺔ ﺍﻟﱵ ﺃﺭﺳﺎﻫﺎ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﺿﻤﻦ ﺧﻄﺘﻪ ﰲ ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻣﺎ ﺟﺎﺀ ﺑﻪ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ‪ 22/06‬ﺍﳌﺆﺭﺥ ﰲ ‪ 2006/12/20‬ﺍﳌﻌﺪﻝ ﻭﺍﳌﺘﻤﻢ ﻟﻘﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ‬
‫ﺍﳉﺰﺍﺋﻴﺔ)ﺍﻷﻣﺮ ‪ (155/66‬ﻣﻦ ﺧﻼﻝ ﺇﺟﺮﺍﺋﻲ ﺍﻟﺘﺴﺮﺏ ﻭﺇﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ‪ ،‬ﰒ ﻣﻦ ﺧﻼﻝ ﺍﻟﻘﺎﻧﻮﻥ‬
‫‪ 04/09‬ﺇﺳﺘﺤﺪﺙ ﺇﺟﺮﺍﺋﲔ ﺁﺧﺮﻳﻦ ﻭﳘﺎ ﺍﳌﺮﺍﻗﺒﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﺣﻔﻆ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﲝﺮﻛﺔ ﺍﻟﺴﲑ‪.‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺍﻟﺘﺴﺮﺏ ﻭﺇﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ‬
‫ﺗﻌﺘﱪ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﺑﲔ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﳝﻜﻦ ﻓﻴﻬﺎ ﺍﻟﻠﺠﻮﺀ ﺇﱃ ﺇﺟﺮﺍﺀ ﺍﻟﺘﺴﺮﺏ ﺃﻭ ﺇﻋﺘﺮﺍﺽ‬
‫ﺍﳌﺮﺍﺳﻼﺕ ﺇﺫﺍ ﺍﻗﺘﻀﺖ ﺫﻟﻚ ﺍﻟﻀﺮﻭﺭﺍﺕ ﺍﻟﺘﺤﺮﻱ ﺃﻭ ﺍﻟﺘﺤﻘﻴﻖ ﺑﺸﺄ‪‬ﺎ‪.‬‬
‫ﺃﻭﻻ‪:‬ﺍﻟﺘﺴــﺮﺏﻟﻘﺪ ﺣﺪﺩ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻧﻄﺎﻕ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﺑﺎﳉﺮﺍﺋﻢ ﺍﳌﺬﻛﻮﺭﺓ ﻋﻠﻰ‬
‫ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﻭﺍﻟﱵ ﻣﻦ ﺑﻴﻨﻬﺎ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺎﺳﺔ‬ ‫‪5‬‬ ‫ﺳﺒﻴﻞ ﺍﳊﺼﺮ ﰲ ﺍﳌﺎﺩﺓ ‪ 65‬ﻣﻜﺮﺭ‬
‫) ‪(1‬‬
‫ﺑﺄﻧﻈﻤﺔ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﺍﳌﻌﻄﻴﺎﺕ‬
‫‪/1‬ﻣﻔﻬﻮﻡ ﺍﻟﺘﺴﺮﺏ ﻭﺷﺮﻭﻃﻪ‪:‬ﻟﻘﺪ ﻧﻈﻢ ﺍﳌﺸﺮﻉ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﰲ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﻭﻓﻖ‬
‫ﺗﻨﺎﻭﻝ ﻣﻦ ﺧﻼﳍﺎ ﲢﺪﻳﺪ ﻣﻔﻬﻮﻡ ﻫﺬﺍ‬ ‫‪18‬‬ ‫ﲦﺎﻧﻴﺔ ﻣﻮﺍﺩ ﻣﻦ ﺍﳌﺎﺩﺓ ‪ 65‬ﻣﻜﺮﺭ ‪ 11‬ﺇﱃ ﺍﳌﺎﺩﺓ ‪ 65‬ﻣﻜﺮﺭ‬
‫ﺍﻹﺟﺮﺍﺀ ﻭﺷﺮﻭﻃﻪ ﻭﺳﻨﺤﺎﻭﻝ ﺗﻔﺼﻴﻞ ﺫﻟﻚ ﻣﻦ ﺧﻼﻝ ﻣﺎ ﻳﻠﻲ‪:‬‬

‫)‪(1‬ﺃﻧﻈﺮﻧﺺ ﺍﳌﺎﺩﺓ ‪ 65‬ﻣﻜﺮﺭ ‪ 5‬ﻭ‪65‬ﻣﻜﺮﺭ ‪.11‬‬

‫‪- 174 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪/1.1‬ﻣﻔﻬﻮﻡ ﺍﻟﺘﺴﺮﺏ‪:‬ﺇﻥ ﺍﻟﺘﺴﺮﺏ ﻣﻦ ﺍﻟﻨﺎﺣﻴﺔ ﺍﻷﻣﻨﻴﺔ ﻫﻮ ﺗﻠﻚ ﺍﻟﻌﻤﻠﻴﺔ ﺍﶈﻀﺮ ﳍﺎ ﻭﺍﳌﻨﻈﻤﺔ‪،‬‬


‫ﺍﳌﺮﺍﺩ ﻣﻦ ﺍﻟﻘﻴﺎﻡ ‪‬ﺎ ﺍﻟﺘﻮﻏﻞ ﺩﺍﺧﻞ ﻭﺳﻂ ﳌﻌﺮﻓﺔ ﺣﻘﻴﻘﺘﻪ ﻣﻌﺮﻓﺔ ﺟﻴﺪﺓ ﻣﻦ ﺧﻼﻝ ﻧﺸﺎﻃﻪ ﺍﻟﺒﺎﺭﺯ ﻭﻛﺸﻒ‬
‫ﺍﳋﻔﻲ ﻓﻴﻪ‪ ،‬ﻭﻳﻜﻮﻥ ﻫﺬﺍ ﺍﻟﻮﺳﻂ ﳏﺪﺩﺍ ﻣﺴﺒﻘﺎ ﺑﻄﺒﻴﻌﺘﻪ ﻭﺍﻟﻌﻤﻞ ﻣﻦ ﺃﺟﻞ ﺍﻹﺳﺘﻌﻼﻡ ﻋﻨﻪ ﻭﻣﻌﺮﻓﺔ ﺃﺩﻕ‬
‫ﺍﻟﺘﻔﺎﺻﻴﻞ ﻓﻴﻪ ﻭﺧﺼﻮﺻﻴﺎﺗﻪ ﻭﺃﺳﺮﺍﺭﻩ ﺣﺴﺐ ﺗﻄﻠﻌﺎﺕ ﺍﳉﻬﺎﺕ ﺍﻷﻣﻨﻴﺔ ﻭﻓﺎﺋﺪﺓ ﺍﳌﺼﻠﺤﺔ‪،‬ﺃﻣﺎ ﻣﻦ ﺍﻟﻨﺎﺣﻴﺔ‬
‫ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻓﺎﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﺣﺪﺩ ﺍﳌﻘﺼﻮﺩ ‪‬ﺬﺍ ﺍﻹﺟﺮﺍﺀ ﲟﻮﺟﺐ ﺍﳌﺎﺩﺓ ‪ 65‬ﻣﻜﺮﺭ ‪ 12‬ﻋﻠﻰ ﺃﻧﻪ ﻗﻴﺎﻡ‬
‫ﺿﺎﺑﻂ ﺃﻭ ﻋﻮﻥ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﲢﺖ ﻣﺴﺆﻭﻟﻴﺔ ﺿﺎﺑﻂ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﻜﻠﻒ ﺑﺘﻨﺴﻴﻖ ﺍﻟﻌﻤﻠﻴﺔ‬
‫ﲟﺮﺍﻗﺒﺔ ﺍﻷﺷﺨﺎﺹ ﺍﳌﺸﺘﺒﻪ ﰲ ﺇﺭﺗﻜﺎ‪‬ﻢ ﺟﻨﺎﻳﺔ ﺃﻭ ﺟﻨﺤﺔ ﺑﺈﻳﻬﺎﻣﻬﻢ ﺃﻧﻪ ﻓﺎﻋﻞ ﻣﻌﻬﻢ ﺃﻭ ﺷﺮﻳﻚ ﺃﻭ‬
‫) ‪(1‬‬
‫ﺧﺎﻑ‬
‫ﻭﻳﻼﺣﻆ ﻣﻦ ﺧﻼﻝ ﻣﺎ ﺳﺒﻖ ﺫﻛﺮﻩ ﺃﻥ ﺍﻟﺘﺴﺮﺏ ﻋﻤﻠﻴﺔ ﻣﻌﻘﺪﺓ ﺗﺘﻄﻠﺐ ﺃﻥ ﻳﺪﺧﻞ ﺍﻟﻌﻮﻥ ﺍﳌﻜﻠﻒ‬
‫ﺑﺎﻟﻌﻤﻠﻴﺔ ﰲ ﺇﺗﺼﺎﻝ ﺑﺎﻷﺷﺨﺎﺹ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻬﻢ ﻭﻳﺮﺑﻂ ﻣﻌﻬﻢ ﻋﻼﻗﺎﺕ ﻣﻦ ﺃﺟﻞ ﲢﻘﻴﻖ ﺍﳍﺪﻑ ﺍﻟﻨﻬﺎﺋﻲ‬
‫ﻣﻦ ﺍﻟﻌﻤﻠﻴﺔ‪ ،‬ﻭﺗﺘﻄﻠﺐ ﻋﻠﻰ ﺍﳋﺼﻮﺹ ﺍﳌﺸﺎﺭﻛﺔ ﺍﳌﺒﺎﺷﺮﺓ ﰲ ﻧﺸﺎﻁ ﺍﳋﻠﻴﺔ ﺍﻹﺟﺮﺍﻣﻴﺔ ﺍﻟﱵ ﺗﺴﺮﺏ ﺇﻟﻴﻬﺎ‪.‬‬
‫ﻭﻋﻠﻰ ﻫﺪﻱ ﺫﻟﻚ ﻓﺈﻥ ﺍﻟﺘﺴﺮﺏ ﻳﺮﺗﻜﺰ ﻋﻠﻰ ﻣﺒﺪﺋﲔ‪:‬‬
‫ﺍﳌﺒﺪﺃ ﺍﻟﻌﺎﻡ ﻳﺴﺘﻨﺪ ﻋﻠﻰ ﺗﻘﺪﱘ ﺻﻮﺭﺓ ﻋﻠﻰ ﺍﻟﻮﺳﻂ ﺍﳌﺮﺍﺩ ﺍﻟﺘﺴﺮﺏ ﻓﻴﻪ‪ ،‬ﻭﻳﺴﺘﻮﺟﺐ ﺫﻟﻚ ﻣﻌﺮﻓﺔ‬
‫ﻋﻤﻮﻣﻴﺎﺕ ﻋﻦ ﻫﺬﺍ ﺍﻟﻮﺳﻂ ﻣﻊ ﺗﻮﺛﻴﻖ ﻫﺬﻩ ﺍﳌﻌﻄﻴﺎﺕ‪.‬‬
‫ﻭﺍﳌﺒﺪﺃ ﺍﳋﺎﺹ ﺍﻟﺬﻱ ﻳﺴﺘﻨﺪ ﻋﻠﻰ ﺗﻌﻤﻴﻖ ﺍﻟﺘﺤﺮﻱ ﻋﻦ ﻫﺬﺍ ﺍﻟﻮﺳﻂ ﻭﻧﺸﺎﻃﺎﺗﻪ ﻭﳑﻴﺰﺍﺗﻪ ﻭﻭﺳﺎﺋﻠﻪ‬
‫ﻭﻃﺒﻴﻌﺔ ﺍﻷﺷﺨﺎﺹ ﺍﳌﻨﺘﻤﲔ ﺇﻟﻴﻪ‪ ،‬ﻟﻴﺘﻢ ﺑﻌﺪ ﺫﻟﻚ ﺩﺭﺍﺳﺔ ﺍﻟﻮﻇﻴﻔﺔ ﺍﻟﻌﻤﻠﻴﺎﺗﻴﺔ ﰲ ﻫﺬﺍ ﺍ‪‬ﺎﻝ ﺑﺘﻮﻓﲑ‬
‫ﺍﻟﻮﺳﺎﺋﻞ ﺍﻟﺒﺸﺮﻳﺔ ﻭﺍﻟﺘﻘﻨﻴﺔ ﺍﻟﻼﺯﻣﺔ‪.‬‬
‫‪/2.1‬ﺷﺮﻭﻁ ﺍﻟﺘﺴﺮﺏ‪:‬ﺇﻧﻪ ﻭﻣﻦ ﺃﺟﻞ ﺇﳒﺎﺡ ﻋﻤﻠﻴﺔ ﺍﻟﺘﺴﺮﺏ ﻭﺗﺴﻬﻴﻞ ﻣﻬﺎﻡ ﺍﻟﺸﺨﺺ ﺍﳌﺘﺴﺮﺏ‬
‫ﻟﺒﻠﻮﻍ ﺍﳍﺪﻑ ﺍﳌﺮﺟﻮ ﻣﻦ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﺑﺈﻋﺘﺒﺎﺭﻩ ﳑﺎﺭﺳﺔ ﻏﲑ ﻣﺄﻟﻮﻓﺔ ﻟﻠﻀﺎﺑﻂ ﺃﻭ ﻋﻮﻥ ﺍﻟﺸﺮﻃﺔ‬
‫ﺍﻟﻘﻀﺎﺋﻴﺔ‪ ،‬ﻭﻛﺬﺍ ﻟﻜﻮﻥ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﻣﻦ ﺃﺧﻄﺮ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺇﻧﺘﻬﺎﻛﺎ ﳊﺮﻣﺔ ﺍﳊﻴﺎﺓ ﺍﳋﺎﺻﺔ ﻟﻠﻤﺸﺘﺒﻪ ﻓﻴﻪ‪،‬‬
‫ﻓﻘﺪ ﺃﺣﺎﻃﻪ ﺍﳌﺸﺮﻉ ﲜﻤﻠﺔ ﻣﻦ ﺍﻟﺸﺮﻭﻁ ﻳﺘﻌﲔ ﻣﺮﺍﻋﺎ‪‬ﺎ ﻋﻨﺪﻣﺎ ﺗﻘﺘﻀﻲ ﺿﺮﻭﺭﺍﺕ ﺍﻟﺘﺤﺮﻱ ﻭﺍﻟﺘﺤﻘﻴﻖ‬
‫ﺍﻟﻠﺠﻮﺀ ﺇﻟﻴﻪ‪.‬‬

‫)‪(1‬ﺗﻜﻠﻢ ﺍﳌﺸﺮﻉ ﺍﻟﻔﺮﻧﺴﻲ ﻋﻦ ﺍﻟﺘﺴﺮﺏ)‪ (Infiltration‬ﰲ ﺍﳌﻮﺍﺩ ‪ 81/706‬ﺇﱃ ‪ 87/706‬ﻭﻛﺬﺍ ﺍﳌﺎﺩﺗﲔ ‪ 7/694‬ﻭ‪9/694‬ﻣﻦ ﺗﻌﺪﻳﻞ ﻗﺎﻧﻮﻥ‬
‫ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﲟﻮﺟﺐ ﺍﻟﻘﺎﻧﻮﻥ ‪ 297/2007‬ﺍﳌﺆﺭﺥ ﰲ ‪.2004/03/09‬‬

‫‪- 175 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪/1.2‬ﺍﻟﺸﺮﻭﻁ ﺍﻟﺸﻜﻠﻴﺔ‪ :‬ﺗﻨﺤﺼﺮ ﺍﻟﺸﺮﻭﻁ ﺍﻟﺸﻜﻠﻴﺔ ﳍﺬﺍ ﺍﻹﺟﺮﺍﺀ ﰲ ﺍﻹﺫﻥ ﻭﻣﺎ ﳚﺐ ﺃﻥ ﻳﺘﻀﻤﻨﻪ ﻓﻼ‬
‫ﳝﻜﻦ ﺑﺄﻱ ﺣﺎﻝ ﻣﻦ ﺍﻷﺣﻮﺍﻝ ﺃﻥ ﻳﺒﺎﺷﺮ ﻇﺎﺑﻂ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻋﻤﻠﻴﺔ ﺍﻟﺘﺴﺮﺏ ﲟﻔﺮﺩﻩ ﺩﻭﻥ ﺃﻥ ﻳﻜﻮﻥ‬
‫ﻣﺘﺤﺼﻼ ﻋﻠﻰ ﺇﺫﻥ ﺑﺬﻟﻚ ﻣﻦ ﻗﺒﻞ ﺍﳉﻬﺎﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﺨﺘﺼﺔ‪ ،‬ﻭﻫﺬﺍ ﻣﺎ ﻧﺼﺖ ﻋﻠﻴﻪ ﺍﳌﺎﺩﺓ ‪ 65‬ﻣﻜﺮﺭ‬
‫‪ 11‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ"‪....‬ﳚﻮﺯ ﻟﻮﻛﻴﻞ ﺍﳉﻤﻬﻮﺭﻳﺔ ﺃﻭ ﻟﻘﺎﺿﻲ ﺍﻟﺘﺤﻘﻴﻖ ﺑﻌﺪ ﺇﺧﻄﺎﺭ ﻭﻛﻴﻞ‬
‫ﺍﳉﻤﻬﻮﺭﻳﺔ ﺃﻥ ﻳﺄﺫﻥ‪ .....‬ﺣﺴﺐ ﺍﳊﺎﻟﺔ ﲟﺒﺎﺷﺮﺓ ﻋﻤﻠﻴﺔ ﺍﻟﺘﺴﺮﺏ"‪.‬‬
‫ﻓﺎﳉﻬﺔ ﺍﳌﺨﺘﺼﺔ ﺑﺈﺻﺪﺍﺭ ﺃﻭ ﻣﻨﺢ ﺍﻹﺫﻥ ﺑﺎﻟﺘﺴﺮﺏ ﺇﻣﺎ ﻭﻛﻴﻞ ﺍﳉﻤﻬﻮﺭﻳﺔ ﺃﻭ ﻗﺎﺿﻲ ﺍﻟﺘﺤﻘﻴﻖ‬
‫ﻭﳚﺐ ﺃﻥ ﻳﻜﻮﻥ ﻫﺬﺍ ﺍﻹﺫﻥ ﻣﻜﺘﻮﺑﺎ ﻭﺇﻻ ﻛﺎﻥ ﺍﻹﺟﺮﺍﺀ ﺑﺎﻃﻼ‪ ،‬ﻭﻫﺬﺍ ﻣﺎ ﻧﺼﺖ ﻋﻠﻴﻪ ﺍﳌﺎﺩﺓ ‪ 65‬ﻣﻜﺮﺭ‬
‫‪ 15‬ﺑﻘﻮﳍﺎ ﳚﺐ ﺃﻥ ﻳﻜﻮﻥ ﺍﻹﺫﻥ ﺍﳌﺴﻠﻢ ﻃﺒﻘﺎ ﻟﻠﻤﺎﺩﺓ ‪ 65‬ﻣﻜﺮﺭ ‪ 11‬ﻣﻜﺘﻮﺑﺎ ﲢﺖ ﻃﺎﺋﻠﺔ ﺍﻟﺒﻄﻼﻥ"‬
‫ﻭﺫﻟﻚ ﻷﻥ ﺍﻷﺻﻞ ﰲ ﺍﻟﻌﻤﻞ ﺍﻹﺟﺮﺍﺋﻲ ﺍﻟﻜﺘﺎﺑﺔ‪ ،‬ﻭﻣﻦ ﺟﻬﺔ ﺃﺧﺮﻯ ﻓﺈﻥ ﺍﻹﺫﻥ ﳚﺐ ﺃﻥ ﻳﺘﻀﻤﻦ‬
‫ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻟﺸﺮﻭﻁ ﻳﺘﻮﻗﻒ ﻋﻠﻰ ﲢﺪﻳﺪﻫﺎ ﺻﺤﺔ ﺍﻹﺟﺮﺍﺀ ﰲ ﺣﺪ ﺫﺍﺗﻪ ﻛﺬﻛﺮ ﻫﻮﻳﺔ ﺿﺎﺑﻂ ﺍﻟﺸﺮﻃﺔ‬
‫ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﻟﺬﻱ ﺗﺘﻢ ﻋﻤﻠﻴﺔ ﺍﻟﺘﺴﺮﺏ ﲢﺖ ﻣﺴﺆﻭﻟﻴﺘﻪ‪ ،‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﲢﺪﻳﺪ ﺍﳌﺪﺓ ﺍﳌﻄﻠﻮﺑﺔ ﰲ ﻋﻤﻠﻴﺔ‬
‫ﺍﻟﺘﺴﺮﺏ ﻭﺍﻟﱵ ﳚﺐ ﺃﻻ ﺗﺘﺠﺎﻭﺯ ﺃﺭﺑﻌﺔ ﺃﺷﻬﺮ ﻭﳝﻜﻦ ﺃﻥ ﲡﺪﺩ ﺣﺴﺐ ﻣﻘﺘﻀﻴﺎﺕ ﺍﻟﺘﺤﺮﻱ ﻭﺍﻟﺘﺤﻘﻴﻖ‬
‫ﺿﻤﻦ ﻧﻔﺲ ﺍﻟﺸﺮﻭﻁ ﺍﻟﺸﻜﻠﻴﺔ ﻭﺍﻟﺰﻣﻨﻴﺔ‪ ،‬ﻭﰲ ﻧﻔﺲ ﺍﻟﻮﻗﺖ ﺃﺟﺎﺯ ﺍﻟﻘﺎﻧﻮﻥ ﻟﻠﻘﺎﺿﻲ ﺍﻟﺬﻱ ﺃﺫﻥ ‪‬ﺬﺍ‬
‫ﺍﻹﺟﺮﺍﺀ ﺃﻥ ﻳﺄﻣﺮ ﰲ ﺃﻱ ﻭﻗﺖ ﻳﻮﻗﻔﻪ ﻗﺒﻞ ﺇﻧﻘﻀﺎﺀ ﺍﳌﺪﺓ ﺍﶈﺪﺩﺓ‪.‬‬
‫‪/2.2‬ﺍﻟﺸﺮﻭﻁ ﺍﳌﻮﺿﻮﻋﻴﺔ‪ :‬ﳝﻜﻦ ﺇﳚﺎﺯ ﺍﻟﺸﺮﻭﻁ ﺍﳌﻮﺿﻮﻋﻴﺔ ﻟﻌﻤﻠﻴﺔ ﺍﻟﺘﺴﺮﺏ ﻭﻓﻖ ﺍﻷﺣﻜﺎﻡ ﺍﻟﱵ‬
‫ﻧﻈﻤﻬﺎ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﰲ ﺷﺮﻃﲔ ﺃﺳﺎﺳﲔ‪:‬‬
‫‪-‬ﺍﻷﻭﻝ ﻳﺘﻤﺜﻞ ﰲ ﲢﺪﻳﺪ ﻧﻮﻉ ﺍﳉﺮﳝﺔ ﻭﺍﻟﱵ ﳚﺐ ﺃﻻ ﲣﺮﺝ ﻋﻦ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﺣﺪﺩ‪‬ﺎ ﻋﻠﻰ ﺳﺒﻴﻞ‬
‫ﺍﳊﺼﺮ ﺍﳌﺎﺩﺓ ‪ 65‬ﻣﻜﺮﺭ ‪ 05‬ﰲ ﺳﺒﻌﺔ ﺃﻧﻮﺍﻉ ﻭﻫﻲ‪ ":‬ﺟﺮﺍﺋﻢ ﺍﳌﺨﺪﺭﺍﺕ‪ ،‬ﺍﳉﺮﳝﺔ ﺍﳌﻨﻈﻤﺔ ﺍﻟﻌﺎﺑﺮﺓ‬
‫ﻟﻠﻮﻃﻨﻴﺔ‪ ،‬ﺟﺮﺍﺋﻢ ﺗﺒﻴﺾ ﺍﻷﻣﻮﺍﻝ‪ ،‬ﺍﳉﺮﺍﺋﻢ ﺍﻹﺭﻫﺎﺑﻴﺔ‪ ،‬ﺟﺮﺍﺋﻢ ﺍﻟﻔﺴﺎﺩ‪ ،‬ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﻟﺘﺸﺮﻳﻊ ﺍﳋﺎﺹ‬
‫ﺑﺎﻟﺼﺮﻑ ﻭﺍﳉﺮﺍﺋﻢ ﺍﳌﺎﺳﺔ ﺑﺄﻧﻈﻤﺔ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ‪.‬‬
‫‪ -‬ﺃﻣﺎ ﺍﻟﺸﺮﻁ ﺍﳌﻮﺿﻮﻋﻲ ﺍﻟﺜﺎﱐ ﻓﻬﻮ ﺃﻥ ﻳﻜﻮﻥ ﺍﻹﺫﻥ ﺑﺎﻟﺘﺴﺮﺏ ﻣﺴﺒﺒﺎﹰ‪،‬ﻓﻤﻦ ﺧﻼﻝ ﺍﻟﺘﺴﺒﻴﺐ‬
‫ﺗﺘﺒﲔ ﺍﻟﻌﻨﺎﺻﺮ ﺍﻟﱵ ﺃﻗﻨﻌﺖ ﺍﳉﻬﺎﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﺨﺘﺼﺔ ﳌﻨﺢ ﺍﻹﺫﻥ ﻭﻛﺬﺍ ﺍﻟﻌﻨﺎﺻﺮ ﺍﻟﱵ ﺩﻓﻌﺖ ﺿﺎﺑﻂ‬
‫ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻟﻠﺠﻮﺀ ﺇﱃ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﻭﺍﻟﱵ ﺗﻜﻮﻥ ﺿﻤﻦ ﻣﻮﺿﻮﻉ ﻃﻠﺒﻪ ﺍﻹﺫﻥ‪.‬‬

‫‪- 176 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻟﺬﻟﻚ ﻓﻜﺎﻥ ﻟﺰﺍﻣﺎﹰ ﻋﻨﺪ ﺇﺻﺪﺍﺭ ﺍﻹﺫﻥ ﺑﺎﻟﺘﺴﺮﺏ ﺳﻮﺍﺀﺍ ﻣﻦ ﻃﺮﻑ ﻭﻛﻴﻞ ﺍﳉﻤﻬﻮﺭﻳﺔ ﺃﻭ ﻣﻦ‬
‫ﻃﺮﻑ ﻗﺎﺿﻲ ﺍﻟﺘﺤﻘﻴﻖ ﺇﻇﻬﺎﺭ ﲨﻴﻊ ﺍﻷﺩﻟﺔ ﺑﻌﺪ ﺗﻘﺪﻳﺮ ﺍﻟﻌﻨﺎﺻﺮ ﺍﳌﻌﺮﻭﺿﺔ ﻋﻠﻴﻪ ﻣﻦ ﻃﺮﻑ ﺿﺎﺑﻂ‬
‫) ‪(1‬‬
‫ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ‪.‬‬
‫‪/2‬ﻃﺮﻕ ﺍﻟﺘﺴﺮﺏ ﰲ ﳎﺎﻝ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬ﳝﻜﻦ ﺗﺼﻮﺭ ﻋﻤﻠﻴﺔ ﺍﻟﺘﺴﺮﺏ ﰲ ﻧﻄﺎﻕ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺩﺧﻮﻝ ﺿﺎﺑﻂ ﺃﻭ ﻋﻮﻥ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺇﱃ ﺍﻟﻌﺎﱂ ﺍﻹﻓﺘﺮﺍﺿﻲ ﻭﺫﻟﻚ ﺑﺈﺧﺘﺮﺍﻗﻪ ﳌﻮﺍﻗﻊ‬
‫ﻣﻌﻴﻨﺔ ﻭﻓﺘﺢ ﺛﻐﺮﺍﺕ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ ﻓﻴﻬﺎ‪ ،‬ﺃﻭ ﺇﺷﺘﺮﺍﻛﻪ ﰲ ﳏﺎﺩﺛﺎﺕ ﻏﺮﻑ ﺍﻟﺪﺭﺩﺷﺔ ﺃﻭ ﺣﻠﻘﺎﺕ ﺍﻹﺗﺼﺎﻝ‬
‫ﺍﳌﺒﺎﺷﺮ ﻣﻊ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻬﻢ ﻭﺍﻟﻈﻬﻮﺭ ﲟﻈﻬﺮ ﻛﻤﺎ ﻟﻮ ﻛﺎﻥ ﻓﺎﻋﻼ ﻣﺜﻠﻬﻢ‪ ،‬ﻣﺴﺘﺨﺪﻣﺎ ﰲ ﺫﻟﻚ ﺃﲰﺎﺀ ﺃﻭ‬
‫ﺻﻔﺎﺕ ﻫﻴﺂﺕ ﻣﺴﺘﻌﺎﺭﺓ ﻭﻭﳘﻴﺔ ﺳﻌﻴﺎ ﻣﻨﻪ ﻟﻺﺳﺘﻔﺎﺩﺓ ﻣﻨﻬﻢ ﺣﻮﻝ ﻛﻴﻔﻴﺔ ﺇﻗﺘﺤﺎﻡ ﺍﳍﺎﻛﺮ ﻟﻠﻤﻮﻗﻊ‪.‬‬
‫ﺛﺎﻧﻴﺎ‪ :‬ﺇﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ ﺍﻟﺴﻠﻜﻴﺔ ﻭﺍﻟﻼﺳﻠﻜﻴﺔ‪:‬ﺇﺳﺘﺤﺪﺙ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﲟﻮﺟﺐ ﺍﻟﻘﺎﻧﻮﻥ‬
‫ﺭﻗﻢ ‪ 22/06‬ﺍﳌﺆﺭﺥ ﰲ ‪ 2006/12/20‬ﺍﳌﻌﺪﻝ ﻭﺍﳌﺘﻤﻢ ﻟﻘﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﻣﻦ ﺧﻼﻝ ﺍﻟﻔﺼﻞ‬
‫ﺍﻟﺮﺍﺑﻊ ﻣﻦ ﺍﻟﺒﺎﺏ ﺍﻟﺜﺎﱐ ﻣﻦ ﺍﻟﻜﺘﺎﺏ ﺍﻷﻭﻝ ﲢﺖ ﻋﻨﻮﺍﻥ ﺇﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ ﻭﺗﺴﺠﻴﻞ ﺍﻷﺻﻮﺍﺕ‬
‫ﻭﺇﻟﺘﻘﺎﻁ ﺍﻟﺼﻮﺭ‪ ،‬ﻭﻗﺪ ﺿﻤﻨﻪ ﺳﺘﺔ ﻣﻮﺍﺩ ﻣﻦ ﺍﳌﺎﺩﺓ ‪ 65‬ﻣﻜﺮﺭ ﺇﱃ ﺍﳌﺎﺩﺓ ‪ 65‬ﻣﻜﺮﺭ ‪ ،10‬ﻭﺗﻨﺎﻭﻝ ﻣﻦ‬
‫ﺧﻼﳍﺎ ﺍﳌﻘﺼﻮﺩ ‪‬ﺬﺍ ﺍﻹﺟﺮﺍﺀ ﻭﺿﻤﺎﻧﺎﺕ ﺇﺳﺘﺨﺪﺍﻣﻪ‪.‬‬
‫‪/1‬ﻣﻔﻬﻮﻡ ﺇﺟﺮﺍﺀ ﺇﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ ﺍﻟﺴﻠﻜﻴﺔ ﻭﺍﻟﻼﺳﻠﻜﻴﺔﻭﺷﺮﻭﻃﻪ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ‪ :‬ﺇﺳﺘﺤﺪﺙ‬
‫ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﲟﻮﺟﺐ ﺍﻟﻘﺎﻧﻮﻥ ﺭﻗﻢ ‪ 22/06‬ﺍﳌﺆﺭﺥ ﰲ ﺩﻳﺴﻤﱪ ﺳﻨﺔ ‪2006‬ﺍﳌﻌﺪﻝ ﻭ‬
‫ﺍﳌﺘﻤﻢ ﻟﻘﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‬
‫‪/1.1‬ﻣﻔﻬﻮﻡ ﺇﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺗﺎﻟﺴﻠﻜﻴﺔ ﻭ ﺍﻟﻼﺳﻠﻜﻴﺔ‪:‬ﻭﺭﺩ ﰲ ﺇﺟﺘﻤﺎﻉ ﳉﻨﺔ ﺍﳋﱪﺍﺀ ﻟﻠﱪﳌﺎﻥ‬
‫ﺍﻷﻭﺭﻭﰊ ﺑﺴﺘﺮﺍﺯﺑﻮﺭﻍ ﺍﳌﺆﺭﺥ ﰲ ‪ 2006/20/06‬ﺣﻮﻝ ﺃﺳﺎﻟﻴﺐ ﺍﻟﺘﺤﺮﻱ ﺍﻟﺘﻘﻨﻴﺔ ﻭﻋﻼﻗﺘﻬﺎ ﺑﺎﻷﻓﻌﺎﻝ‬
‫ﺍﻹﺭﻫﺎﺑﻴﺔ ﺗﻌﺮﻳﻔﺎ ﻹﺟﺮﺍﺀ ﺇﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ ﺑﺄ‪‬ﺎ ﻋﻤﻠﻴﺔ ﻣﺮﺍﻗﺒﺔ ﺳﺮﻳﺔ ﺍﳌﺮﺍﺳﻼﺕ ﺍﻟﺴﻠﻜﻴﺔ‬
‫ﻭﺍﻟﻼﺳﻠﻜﻴﺔ‪ ،‬ﻭﺫﻟﻚ ﰲ ﺇﻃﺎﺭ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﳝﺔ ﻭﲨﻊ ﺍﻷﺩﻟﺔ ﻭﺍﳌﻌﻠﻮﻣﺎﺕ ﺣﻮﻝ ﺍﻷﺷﺨﺎﺹ‬
‫) ‪(2‬‬
‫ﺍﳌﺸﺘﺒﻪ ﻓﻴﻬﻢ ﺃﻭ ﰲ ﻣﺸﺎﺭﻛﺘﻬﻢ ﰲ ﺇﺭﺗﻜﺎﺏ ﺍﳉﺮﺍﺋﻢ‪.‬‬

‫)‪(1‬ﻧﺼﺖ ﺍﳌﺎﺩﺓ ‪ 65‬ﻣﻜﺮﺭ ‪ 15‬ﻋﻠﻰ ﺃﻧﻪ ﳚﺐ ﺃﻥ ﻳﻜﻮﻥ ﺍﻹﺫﻥ ﲟﺒﺎﺷﺮﺓ ﻋﻤﻠﻴﺔ ﺍﻟﺘﺴﺮﺏ‪....‬ﻣﺴﺒﺒﺎ ﻭﺫﻟﻚ ﲢﺖ ﻃﺎﺋﻠﺔ ﺍﻟﺒﻄﻼﻥ"‪.‬‬
‫)‪(2‬ﻣﺸﺎﺭ ﻟﻪ ﻟﺪﻯ ﻟﻮﺟﺎﱐ ﻧﻮﺭ ﺍﻟﺪﻳﻦ ﺃﺳﺎﻟﻴﺐ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﺍﳋﺎﺻﺔ ﻭﺇﺟﺮﺍﺀﺍ‪‬ﺎ ﻭﻓﻘﺎ ﻟﻘﺎﻧﻮﻥ ‪ 22/06‬ﻣﺪﺍﺧﻠﺔ ﰲ ﻳﻮﻡ ﺩﺭﺍﺳﻲ ﺣﻮﻝ ﻋﻼﻗﺔ ﺍﻟﻨﻴﺎﺑﺔ‬
‫ﺑﺎﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ "ﺇﺣﺘﺮﺍﻡ ﺣﻘﻮﻕ ﺍﻹﻧﺴﺎﻥ ﻭﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ‪ ،‬ﻭﺯﺍﺭﺓ ﺍﻟﺪﺍﺧﻠﻴﺔ ﺍﳌﺪﻳﺮﻳﺔ ﺍﻟﻌﺎﻣﺔ ﻟﻸﻣﻦ ﺍﻟﻮﻃﲏ ﻣﻨﻌﻘﺪ ﻳﻮﻡ ‪ 2007/12/12‬ﺑﺈﻟﻴﺰﻱ ‪،‬‬
‫ﺹ‪.8‬‬

‫‪- 177 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﻣﻦ ﺧﻼﻝ ﻧﺺ ﺍﳌﺎﺩﺓ ‪ 65‬ﻣﻜﺮﺭ ‪ 05‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﳒﺪ ﺃﻥ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ‬
‫ﻳﻘﺼﺪ ﺑﺈﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ‪ ،‬ﺇﻋﺘﺮﺍﺽ ﺃﻭ ﺗﺴﺠﻴﻞ ﺃﻭ ﻧﺴﺦ ﺍﳌﺮﺍﺳﻼﺕ ﺍﻟﱵ ﺗﺘﻢ ﻋﻦ ﻃﺮﻳﻖ ﻗﻨﻮﺍﺕ ﺃﻭ‬
‫ﻭﺳﺎﺋﻞ ﺍﻹﺗﺼﺎﻝ ﺍﻟﺴﻠﻜﻴﺔ ﻭﺍﻟﻼﺳﻠﻜﻴﺔ‪ ،‬ﻭﻫﺬﻩ ﺍﳌﺮﺍﺳﻼﺕ ﻫﻲ ﻋﺒﺎﺭﺓ ﻋﻦ ﺑﻴﺎﻧﺎﺕ ﻗﺎﺑﻠﺔ ﻟﻺﻧﺘﺎﺝ‬
‫ﻭﺍﻟﺘﻮﺯﻳﻊ ‪،‬ﺍﻟﺘﺨﺰﻳﻦ‪ ،‬ﺍﻹﺳﺘﻘﺒﺎﻝ ﻭﺍﻟﻌﺮﺽ‪.‬‬
‫ﻭﺇﱃ ﺟﺎﻧﺐ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﳒﺪ ﻛﺬﻟﻚ ﺍﳌﺸﺮﻉ ﺍﻟﻔﺮﻧﺴﻲ ﻗﺪ ﻛﺮﺱ ﻫﺬﻩ ﺍﻟﺘﻘﻨﻴﺔ ﰲ ﺍﳌﺎﺩﺓ‬
‫‪ 100‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺍﻟﱵ ﺗﻨﺺ ﻋﻠﻰ ﺃﻧﻪ ﰲ ﺍﳌﻮﺍﺩ ﺍﳉﻨﺎﺋﻴﺔ ﻭﺍﳌﻮﺍﺩ ﺍﳉﻨﺤﻴﺔ ﺇﺫﺍ ﻛﺎﻧﺖ‬
‫ﺍﻟﻌﻘﻮﺑﺔ ﺗﻔﻮﻕ ﺳﻨﺘﲔ ﳝﻜﻦ ﻟﻘﺎﺿﻲ ﺍﻟﺘﺤﻘﻴﻖ ﺇﺫﺍ ﺩﻋﺖ ﻣﻘﺘﻀﻴﺎﺕ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﺃﻥ ﻳﺄﻣﺮ ﺑﺈﻋﺘﺮﺍﺽ‬
‫ﻭﺗﺴﺠﻴﻞ ﻭﻧﻘﻞ ﺍﳌﺮﺍﺳﻼﺕ ﺍﻟﱵ ﺗﺘﻢ ﻋﻦ ﻃﺮﻳﻖ ﻭﺳﺎﺋﻞ ﺍﻹﺗﺼﺎﻝ"‬
‫ﻭﻟﻘﺪ ﺣﺪﺩ ﺍﳌﺸﺮﻉ ﺍﻟﻔﺮﻧﺴﻲ ﻣﻔﻬﻮﻡ ﺍﳌﺮﺍﺳﻼﺕ ﺍﳋﺎﺻﺔ ﺍﻟﱵ ﺗﻜﻮﻥ ﳏﻼ ﻟﻺﻋﺘﺮﺍﺽ ﻣﻦ ﺧﻼﻝ‬
‫ﺍﳌﻨﺸﻮﺭ ﺍﳌﺆﺭﺥ ﰲ ‪ 1988/02/17‬ﺍﻟﺬﻱ ﺇﻋﺘﱪ ﺃﻧﻪ ﺗﻜﻮﻥ ﺍﳌﺮﺍﺳﻠﺔ ﺧﺎﺻﺔ ﺇﺫﺍ ﻛﺎﻧﺖ ﺍﻟﺮﺳﺎﻟﺔ ﻣﻮﺟﻬﺔ‬
‫ﺑﺼﻮﺭﺓ ﺣﺼﺮﻳﺔ ﻟﺸﺨﺺ ﺃﻭ ﺃﺷﺨﺎﺹ ﻃﺒﻴﻌﻴﲔ ﺃﻭ ﻣﻌﻨﻮﻳﲔ ﳏﺪﺩﻳﻦ ﻋﻠﻰ ﻭﺟﻪ ﺍﳋﺼﻮﺹ")‪(1‬ﺑﻐﺾ‬
‫ﺍﻟﻨﻈﺮ ﻋﻦ ﺍﻟﺸﻜﻞ ﺍﻟﺬﻱ ﺗﻜﻮﻥ ﻋﻠﻴﻪ‪.‬‬
‫ﺃﻣﺎ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﺰﺍﺋﺮﻱ ﳒﺪ ﺍﳌﺎﺩﺓ ‪ 6-9‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪ 03/2000‬ﺍﳌﺆﺭﺥ ﰲ ‪2000 /08/05‬‬
‫ﺍﶈﺪﺩ ﻟﻠﻘﻮﺍﻋﺪ ﺍﻟﻌﺎﻣﺔ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﻟﱪﻳﺪ ﻭﺍﳌﻮﺍﺻﻼﺕ‪،‬ﺍﻋﺘﱪﺕ ﺃﻥ ﻣﺎﺩﺓ ﺍﳌﺮﺍﺳﻼﺕ ﻫﻲ ﻛﻞ ﺇﺗﺼﺎﻝ ﳎﺴﺪ‬
‫ﰲ ﺷﻜﻞ ﻛﺘﺎﰊ ﻳﺘﻢ ﻋﱪ ﻛﺎﻓﺔ ﺍﻟﻮﺳﺎﺋﻞ ﺍﳌﺎﺩﻳﺔ ﺍﻟﱵ ﻳﺘﻢ ﺗﺮﺣﻴﻠﻬﺎ ﺇﱃ ﺍﻟﻌﻨﻮﺍﻥ ﺍﳌﺸﺎﺭ ﺇﻟﻴﻪ ﻣﻦ ﻃﺮﻑ‬
‫ﺍﻟﺮﺳﻞ ﻧﻔﺴﻪ ﺃﻭ ﺑﻄﻠﺐ ﻣﻨﻪ‪ ،‬ﻭﻻ ﺗﻌﺘﱪ ﺍﻟﻜﺘﺐ ﻭﺍﳉﺮﺍﺋﺪ ﻭﺍ‪‬ﻼﺕ ﻭﺍﻟﻴﻮﻣﻴﺎﺕ ﻛﻤﺎﺩﺓ ﻣﺮﺍﺳﻼﺕ‪.‬‬
‫ﻭﺑﺎﻟﺘﺎﱄ ﻓﺤﺴﺐ ﻣﻔﻬﻮﻡ ﻫﺬﻩ ﺍﳌﺎﺩﺓ ﻓﺈﻥ ﺍﳌﺮﺍﺳﻼﺕ ﺍﳋﺎﺻﺔ ﺗﺼﺒﺢ ﳏﺼﻮﺭﺓ ﰲ ﺍﻟﺮﺳﺎﺋﻞ ﺍﳌﻜﺘﻮﺑﺔ‬
‫ﺑﺎﳌﻔﻬﻮﻡ ﺍﻟﺘﻘﻠﻴﺪﻱ‪.‬‬
‫ﺇﻻ ﺃﻧﻪ ﻭﺑﺎﻟﺮﺟﻮﻉ ﺇﱃ ﻧﺺ ﺍﳌﺎﺩﺓ ‪ 39‬ﻣﻦ ﺍﻟﺪﺳﺘﻮﺭ ﺍﳉﺰﺍﺋﺮﻱ ﺍﻟﱵ ﺗﻨﺺ ﻋﻠﻰ ﺃﻥ ﺳﺮﻳﺔ‬
‫ﺍﳌﺮﺍﺳﻼﺕ ﻭﺍﻹﺗﺼﺎﻻﺕ ﺍﳋﺎﺻﺔ ﺑﻜﻞ ﺃﺷﻜﺎﳍﺎ ﻣﻀﻤﻮﻧﺔ‪ ،‬ﻭﻛﺬﺍ ﻧﺺ ﺍﳌﺎﺩﺓ ‪ 303‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ‬
‫ﺍﻟﱵ ﺗﻌﺎﻗﺐ ﻛﻞ ﻣﻦ ﻳﻔﺾ ﺃﻭ ﻳﺘﻠﻒ ﺭﺳﺎﺋﻞ ﺃﻭ ﻣﺮﺍﺳﻼﺕ ﻣﻮﺟﻬﺔ ﻟﻠﻐﲑ‪ ،‬ﻓﺈﻧﻪ ﳝﻜﻦ ﺍﻟﺘﻮﺻﻞ ﻟﻠﻘﻮﻝ ﺃﻥ‬
‫ﺍﳌﺮﺍﺳﻼﺕ ﺍﳋﺎﺻﺔ ﺗﻌﲏ ﻛﻞ ﺭﺳﺎﻟﺔ ﻣﻜﺘﻮﺑﺔ ﺑﺄﻱ ﺷﻜﻞ ﻣﻦ ﺍﻷﺷﻜﺎﻝ ﺳﻮﺍﺀ ﻣﺎﺩﻳﺎ ﺃﻭ ﺇﻟﻜﺘﺮﻭﻧﻴﺎ ﻭﺳﻮﺍﺀ‬

‫‪1‬‬
‫‪circulaire francaise du 17 février 1988 prise en application de larticle 43 de loi 86-1067 du 30‬‬
‫‪septemper 1986 relative a la liberté de comminication concernant le régime déclaratif aplicable a‬‬
‫‪certains services de comanunication audivisuelle jorf du 09 mars 1988 p31-49.‬‬

‫‪- 178 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻛﺎﻧﺖ ﻋﻠﻰ ﺩﻋﺎﻣﺔ ﻭﺭﻗﻴﺔ ﺃﻭ ﺭﻗﻤﻴﺔ‪ ،‬ﻣﺮﺳﻠﺔ ﺑﺄﻱ ﻭﺳﻴﻠﺔ ﻟﻌﺪﺩ ﻣﻌﲔ ﻭﳏﺪﺩ ﻣﻦ ﺍﳌﺮﺳﻞ ﺇﻟﻴﻬﻢ‪ ،‬ﺑﺈﺳﺘﺜﻨﺎﺀ‬
‫ﺍﻟﻜﺘﺐ ﻭﺍ‪‬ﻼﺕ ﻭﺍﳉﺮﺍﺋﺪ ﻭﺍﳊﻮﻟﻴﺎﺕ ﺍﻟﱵ ﻻ ﺗﻌﺘﱪ ﻣﺮﺍﺳﻼﺕ ﺧﺎﺻﺔ‪.‬‬
‫ﻭﻫﺬﺍ ﻣﺎ ﻳﺆﻛﺪﻩ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﰲ ﺍﳌﺎﺩﺓ ‪/02‬ﺍﻟﻔﻘﺮﺓ "ﻭ" ﰲ ﺗﻌﺮﻳﻔﻪ ﻟﻺﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‬
‫ﻋﻠﻰ ﺃ‪‬ﺎ ﺃﻥ ﺗﺮﺍﺳﻞ ﺃﻭ ﺇﺭﺳﺎﻝ ﺃﻭ ﺇﺳﺘﻘﺒﺎﻝ ﻋﻼﻣﺎﺕ ﺃﻭ ﺇﺷﺎﺭﺍﺕ ﺃﻭ ﻛﺘﺎﺑﺎﺕ ﺃﻭ ﺻﻮﺭ ﺃﻭ ﺃﺻﻮﺍﺕ ﺃﻭ‬
‫ﻣﻌﻠﻮﻣﺎﺕ ﳐﺘﻠﻔﺔ ﺑﻮﺍﺳﻄﺔ ﺃﻱ ﻭﺳﻴﻠﺔ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ‪.‬‬
‫ﻭﲣﺘﻠﻒ ﻭﺗﺘﻨﻮﻉ ﺍﳌﺮﺍﺳﻼﺕ ﻋﱪ ﻭﺳﺎﺋﻞ ﺍﻹﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﺍﻟﱵ ﻣﻦ ﺃﳘﻬﺎ ﺍﻟﺘﺮﺍﺳﻞ ﻋﱪ‬
‫ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ‪ ،‬ﻓﻬﺬﻩ ﺍﻟﺘﻘﻨﻴﺔ ﰎ ﺇﺑﺘﻜﺎﺭﻫﺎ ﻟﻴﺘﻤﻜﻦ ﻣﺴﺘﺨﺪﻣﻮﻫﺎ ﻣﻦ ﺗﺒﺎﺩﻝ ﺍﻟﺮﺳﺎﺋﻞ ﻭﺍﻟﺼﻮﺭ ﻭﻏﲑﻫﺎ‬
‫ﻣﻦ ﺍﳌﻮﺍﺩ ﺍﻟﻘﺎﺑﻠﺔ ﻟﻺﺩﺧﺎﻝ ﺍﻟﺮﻗﻤﻲ ﰲ ﺻﻨﺪﻭﻕ ﺍﻟﺮﺳﺎﻟﺔ‪ ،‬ﺃﻭ ﺍﻟﻘﺎﺑﻠﺔ ﻟﻠﺘﺤﻤﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺑﺼﻔﺘﻬﺎ ﻣﻠﺤﻘﺎﺕ‬
‫ﺑﺎﻟﺮﺳﺎﻟﺔ ﰒ ﺗﺮﺳﻞ ﺗﻠﻚ ﺍﻟﺮﺳﺎﻟﺔ ﻣﻦ ﺑﺮﻳﺪ ﺷﺨﺺ ﺇﱃ ﺁﺧﺮ ﻋﱪ ﻋﻨﻮﺍﻥ ﺑﺮﻳﺪ ﺇﻟﻜﺘﺮﻭﱐ ﺩﻭﳕﺎ ﺃﻱ ﺇﺑﻄﺎﺀ‪.‬‬
‫ﻭﻳﺘﻤﺘﻊ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﲞﺪﻣﺔ ﻗﺎﺋﻤﺔ ﺍﻟﺘﺮﺍﺳﻞ )‪ (Mailinglist‬ﻭﻫﻮ ﻧﻈﺎﻡ ﺗﺮﺍﺳﻞ ﲨﺎﻋﻲ ﳝﻨﺢ‬
‫ﺻﻼﺣﻴﺔ ﺑﺚ ﺭﺳﺎﻟﺔ ﺇﱃ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻷﺷﺨﺎﺹ ﺍﳌﺴﺠﻠﲔ ﰲ ﻫﺬﻩ ﺍﻟﻘﺎﺋﻤﺔ‪ ،‬ﻭﳛﺘﻮﻱ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ‬
‫ﺑﺮﺍﻣﺞ ﻣﺘﺨﺼﺼﺔ ﻟﻜﺘﺎﺑﺔ ﺍﻟﺮﺳﺎﺋﻞ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﺇﺭﺳﺎﳍﺎ ﻭﺇﺳﺘﻌﺮﺍﺿﻬﺎﻭﲣﺰﻧﺘﻬﺎ‪.‬‬
‫ﻭﻗﺪ ﺇﺑﺘﻜﺮﺕ ﻧﻈﻢ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺑﺮﺍﻣﺞ ﺗﺸﻔﲑ ﺧﺎﺻﺔ ﳊﻤﺎﻳﺔ ﺧﺪﻣﺔ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻣﻦ‬
‫ﺍﻹﺧﺘﺮﺍﻗﺎﺕ ﻭﺿﻤﺎﻥ ﺧﺼﻮﺻﻴﺔ ﳏﺘﻮﻳﺎ‪‬ﺎ‪.‬‬
‫ﻭﺇﺫﺍ ﻛﺎﻧﺖ ﻫﺬﻩ ﺍﳌﺮﺍﺳﻼﺕ ﺗﺘﻤﺘﻊ ﺑﺎﳋﺼﻮﺻﻴﺔ ﲪﻰ ﺍﳌﺸﺮﻉ ﺳﺮﻳﺘﻬﺎ ﺑﺴﻦ ﻗﻮﺍﻧﲔ ﺗﻌﻤﻞ ﻋﻠﻰ‬
‫ﺗﻮﻓﲑ ﻗﺪﺭ ﻛﺒﲑ ﻣﻦ ﺍﳊﻤﺎﻳﺔ ﺍﳉﺰﺍﺋﻴﺔ ﳍﺎ‪ ،‬ﺇﻻ ﺃﻥ ﻫﺬﺍ ﺍﻷﻣﺮ ﻟﻴﺲ ﻋﻠﻰ ﺇﻃﻼﻗﻪ ﻓﺈﺫﺍ ﺇﻗﺘﻀﺖ ﺿﺮﻭﺭﺍﺕ‬
‫ﺍﻟﺘﺤﺮﻱ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﺘﻠﺒﺲ ‪‬ﺎ ﺃﻭ ﺍﻟﺘﺤﻘﻴﻖ ﺍﻹﺑﺘﺪﺍﺋﻲ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺎﺳﺔ ﺑﺄﻧﻈﻤﺔ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ‬
‫ﻟﻠﻤﻌﻄﻴﺎﺕ‪ ،‬ﻓﺈﻧﻪ ﳚﻮﺯ ﺇﻋﺘﺮﺍﺽ ﻫﺬﻩ ﺍﳌﺮﺍﺳﻼﺕ ﻭﻛﺸﻒ ﺍﻟﺴﺮﻳﺔ ﻋﻨﻬﺎ ﰲ ﺳﺒﻴﻞ ﺍﻟﺒﺤﺚ ﻋﻦ ﺍﻟﺪﻟﻴﻞ‪،‬‬
‫ﻭﻫﻮ ﺍﻟﺴﻨﺪ ﺍﻟﺸﺮﻋﻲ ﺍﳌﱪﺭ ﻹﺑﺎﺣﺔ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﺑﺴﺒﺐ ﺃﻧﻪ ﻳﺘﻀﻤﻦ ﺇﻋﺘﺪﺍﺀ ﺟﺴﻴﻤﺎ ﻋﻠﻰ ﺣﺮﻣﺔ ﺍﳊﻴﺎﺓ‬
‫ﺍﳋﺎﺻﺔ ﻭﺳﺮﻳﺔ ﺍﻹﺗﺼﺎﻻﺕ‪ ،‬ﻓﻴﺒﺎﺡ ﺇﺳﺘﺜﻨﺎﺀﺍ ﻭﰲ ﺣﺪﻭﺩ ﺿﻴﻘﺔ ﻭﺫﻟﻚ ﻟﻠﻔﺎﺋﺪﺓ ﺍﳌﻨﺘﻈﺮﺓ ﻣﻨﻪ ﻭﺍﻟﱵ ﺗﺘﻌﻠﻖ‬
‫) ‪(1‬‬
‫ﺑﺈﻇﻬﺎﺭ ﺍﳊﻘﻴﻘﻴﺔ ﻭﻛﺸﻒ ﺍﻟﻐﻤﻮﺽ ﻋﻦ ﺍﳉﺮﳝﺔ ﻭﺿﺒﻂ ﺍﳉﻨﺎﺓ‪.‬‬
‫ﻭﲡﺪﺭ ﺍﻹﺷﺎﺭﺓ ﰲ ﻫﺬﺍ ﺍﻟﺼﺪﺩ ﺃﻥ ﺍﳌﺮﺍﺳﻼﺕ ﺍﻟﱵ ﺗﺼﻠﺢ ﻹﺟﺮﺍﺀ ﺇﻋﺘﺮﺍﺿﻬﺎ ﳚﺐ ﺃﻥ ﺗﺘﺴﻢ‬
‫ﺑﺎﳋﺼﻮﺻﻴﺔ‪ ،‬ﻭﻟﻜﻲ ﺗﻜﻮﻥ ﻛﺬﻟﻚ ﻳﻠﺰﻡ ﺃﻥ ﻳﺘﻮﺍﻓﺮ ﻟﺪﻳﻬﺎ ﻋﻨﺼﺮﺍﻥ ﺃﺳﺎﺳﻴﺎﻥ ﳘﺎ‪:‬‬

‫)‪ (1‬ﳏﻤﺪ ﺃﺑﻮ ﺍﻟﻌﻼﺀ ﻋﻘﻴﺪﺓ‪ ،‬ﻣﺮﺍﻗﺒﺔ ﺍﶈﺎﺩﺛﺎﺕ ﺍﻟﺘﻠﻔﻮﻧﻴﺔ‪ ،‬ﺩﺭﺍﺳﺔ ﻣﻘﺎﺭﻧﺔﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ ‪، 2008‬ﺹ‪.192‬‬

‫‪- 179 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪ -‬ﻋﻨﺼﺮ ﻣﻮﺿﻮﻋﻲ ﻭﻳﺘﻌﻠﻖ ﲟﻮﺿﻮﻉ ﻭﻣﻀﻤﻮﻥ ﺍﻟﺮﺳﺎﻟﺔ ﰲ ﺣﺪ ﺫﺍ‪‬ﺎ ﲟﻌﲎ ﺃﻥ ﺗﻜﻮﻥ ﺍﻟﺮﺳﺎﻟﺔ‬
‫ﺫﺍﺕ ﻃﺎﺑﻊ ﺷﺨﺼﻲ ﻭﺳﺮﻱ ﺃﻭ ﺧﺎﺹ ﻓﻴﻤﺎ ﲣﱪ ﺑﻪ‪.‬‬
‫ﻭﻋﻨﺼﺮ ﺷﺨﺼﻲ ﻭﺍﳌﺮﺍﺩ ﺑﻪ ﺇﺭﺍﺩﺓ ﺍﳌﺮﺳﻞ ﰲ ﲢﺪﻳﺪ ﺍﳌﺮﺳﻞ ﺇﻟﻴﻪ ﻭﺭﻏﺒﺘﻪ ﰲ ﻋﺪﻡ ﺍﻟﺴﻤﺎﺡ ﻟﻠﻐﲑ‬ ‫‪-‬‬

‫ﺑﺎﻹﻃﻼﻉ ﻋﻠﻰ ﻣﻀﻤﻮﻥ ﺍﻟﺮﺳﺎﻟﺔ‪(1)،‬ﻭﻫﺬﺍ ﺍﻷﻣﺮ ﺫﻫﺒﺖ ﺇﱃ ﺗﺄﻛﻴﺪﻩ ﺍﶈﻜﻤﺔ ﺍﻟﻌﻠﻴﺎ ﺑﻜﻨﺪﺍ ﺑﻘﻮﳍﺎ ﺃﻥ‬
‫ﺍﳊﺎﻟﺔ ﺍﻟﺬﻫﻨﻴﺔ ﻟﻠﻤﺮﺳﻞ ﻫﻲ ﺍﳊﺎﲰﺔ ﰲ ﲢﺪﻳﺪ ﺍﻟﺼﻔﺔ ﺍﳋﺎﺻﺔ ﺃﻭ ﺍﻟﻌﺎﻣﺔ ﻟﻺﺗﺼﺎﻝ‪ ،‬ﻭﻧﻔﺲ ﺍﻹﲡﺎﻩ ﺃﺧﺬﺗﻪ‬
‫ﺇﺣﺪﻯ ﺍﶈﺎﻛﻢ ﰲ ﺍﻟﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ ﺍﻷﻣﺮﻳﻜﻴﺔ ﺣﻴﺚ ﺃﺷﺎﺭﺕ ﺇﱃ ﺃﻥ ﺧﺼﻮﺻﻴﺔ ﺍﻟﺮﺳﺎﺋﻞ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‬
‫ﺗﻌﺘﻤﺪ ﺑﺸﻜﻞ ﻛﺒﲑ ﻋﻠﻰ ﻃﺒﻴﻌﺔ ﺗﻜﻠﻢ ﺍﻟﺮﺳﺎﺋﻞ ﻭﻃﺒﻴﻌﺔ ﻣﺮﺳﻠﻬﺎ‪(2)،‬ﻭﻋﻨﺪ ﺗﻮﺍﻓﺮ ﻫﺬﺍﻥ ﺍﻟﻌﻨﺼﺮﺍﻥ ﰲ‬
‫ﺍﻟﺮﺳﺎﻟﺔ ﻓﺈ‪‬ﺎ ﺗﺘﺼﻒ ﺑﺎﳌﺮﺍﺳﻠﺔ ﺍﳋﺎﺻﺔ ﺍﻟﱵ ﳍﺎ ﺧﺼﻮﺻﻴﺘﻬﺎ ﻭﺳﺮﻳﺘﻬﺎ ﺍﶈﻤﻴﺔ ﻗﺎﻧﻮﻧﺎ ﻭﻻ ﺃﳘﻴﺔ ﻟﺸﻜﻞ‬
‫ﺍﻟﺮﺳﺎﻟﺔ ﺃﻭ ﻃﺮﻕ ﻧﻘﻠﻬﺎ ﻭﺗﻮﺻﻴﻠﻬﺎ ﺇﱃ ﺍﳌﺮﺳﻞ ﺇﻟﻴﻪ‪.‬‬
‫‪/2.1‬ﺍﻟﺸﺮﻭﻁ ﻭﺍﻟﻀﻤﺎﻧﺎﺕ ﺍﳌﻘﺮﺭﺓ ﻹﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ ﺍﻟﺴﻠﻜﻴﺔ ﻭ ﺍﻟﻼﺳﻠﻜﻴﺔ‪ :‬ﳑﺎ ﻻﺷﻚ‬
‫ﻓﻴﻪ ﺃﻥ ﺃﺳﻠﻮﺏ ﺇﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ ﺍﻟﺴﻠﻜﻴﺔ ﻭﺍﻟﻼﺳﻠﻜﻴﺔ ﺩﻭﻥ ﻋﻠﻢ ﺃﺻﺤﺎ‪‬ﺎ ﺑﻘﺪﺭ ﻣﺎ ﻳﻔﻴﺪ ﰲ ﻛﺸﻒ‬
‫ﺍﳊﻘﻴﻘﺔ ﻭﻳﺴﻬﻞ ﺇﺛﺒﺎﺕ ﻛﺜﲑ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﻟﻐﺎﻣﻀﺔ ﻛﺘﻠﻚ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻓﻬﻮ ﻣﻦ ﺟﺎﻧﺐ‬
‫ﺁﺧﺮ ﳝﺜﻞ ﺇﻧﺘﻬﺎﻛﺎ ﳊﺮﻣﺔ ﺍﳊﻴﺎﺓ ﺍﳋﺎﺻﺔ ﻟﻸﻓﺮﺍﺩ ﻭﺇﻋﺘﺪﺍﺀ ﻋﻠﻰ ﺳﺮﻳﺔ ﻣﺮﺍﺳﻼ‪‬ﻢ ﻭﺇﺗﺼﻼ‪‬ﻢ ﺍﻟﱵ ﻛﻔﻠﺘﻬﺎ‬
‫ﺍﻟﺪﺳﺎﺗﲑ ﻭﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻟﻌﻘﺎﺑﻴﺔ‪(3).‬ﻭﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﰲ ﻫﺬﺍ ﺍﻟﺼﺪﺩ ﻛﻤﺎ ﺃﻋﻄﻰ ﻟﺴﻠﻄﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ‬
‫ﻣﻜﻨﺔ ﺇﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ ﻛﺄﺳﻠﻮﺏ ﻣﺴﺘﺤﺪﺙ ﻟﻠﺒﺤﺚ ﻋﻦ ﺍﻟﺪﻟﻴﻞ ﻳﺘﻤﺎﺷﻰ ﻣﻊ ﺍﻷﺳﺎﻟﻴﺐ ﺍﳌﺘﻄﻮﺭﺓ‬
‫ﺍﻟﱵ ﻳﻠﺠﺄ ﺇﻟﻴﻬﺎ ﺍﳉﻨﺎﺓ ﰲ ﺗﻨﻔﻴﺬ ﺟﺮﺍﺋﻤﻬﻢ ﻭﺇﺧﻔﺎﺀ ﺃﻱ ﺃﺛﺮ ﻳﺪﻝ ﻋﻠﻴﻬﻢ‪ ،‬ﻓﻤﻦ ﻧﺎﺣﻴﺔ ﺃﺧﺮﻯ ﱂ ﻳﻔﺘﺢ‬
‫ﺍﻟﺒﺎﺏ ﻋﻠﻰ ﻣﺼﺮﻋﻴﻪ ﰲ ﺍﻟﻠﺠﻮﺀ ﺇﱃ ﻫﺬﻩ ﺍﻟﻮﺳﻴﻠﺔ ﺑﻞ ﺃﺣﺎﻁ ﺇﺳﺘﺨﺪﺍﻣﻬﺎ ﺑﺸﺮﻭﻁ ﻗﺎﻧﻮﻧﻴﺔ ﺗﻌﻤﻞ ﻋﻠﻰ‬
‫ﻣﻨﻊ ﺍﻟﺘﻌﺴﻒ ﻭﺗﺼﻮﻥ ﺍﳊﺮﻳﺔ ﺍﻟﻔﺮﺩﻳﺔ ﻭﺗﺘﻤﺜﻞ ﻫﺬﻩ ﺍﻟﺸﺮﻭﻁ ﰲ‪:‬‬
‫‪/1.2‬ﺗﺮﺧﻴﺺ ﺍﻟﺴﻠﻄﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻭﻣﺮﺍﻗﺒﺘﻬﺎ ﻟﻌﻤﻠﻴﺔ ﺍﻟﺘﻨﻔﻴﺬ‪ :‬ﻃﺒﻘﺎ ﻟﻠﻤﺎﺩﺓ ‪ 05‬ﻣﻜﺮﺭ ﻣﻦ ﻗﺎﻧﻮﻥ‬
‫ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﻓﺈﻧﻪ ﻻ ﳝﻜﻦ ﻟﻀﺎﺑﻂ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﻟﻠﺠﻮﺀ ﺇﱃ ﺇﺟﺮﺍﺀ ﺇﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ ﺇﻻ‬
‫ﺑﻌﺪ ﺃﻥ ﳛﺼﻞ ﻋﻠﻰ ﺇﺫﻥ ﻣﻜﺘﻮﺏ ﻭﻣﺴﺒﺐ ﻣﻦ ﻃﺮﻑ ﻭﻛﻴﻞ ﺍﳉﻤﻬﻮﺭﻳﺔ ﺃﻭ ﻗﺎﺿﻲ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺣﺎﻟﺔ‬

‫)‪(1‬ﻧﺸﻮﻯ ﺭﺃﻓﺖ ﺇﺑﺮﺍﻫﻴﻢ ﺍﳊﻤﺎﻳﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﳋﺼﻮﺻﻴﺔ ﻣﺮﺍﺳﻼﺕ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ‪ ،‬ﲝﺚ ﻣﻘﺪﻡ ﰲ ﻛﻠﻴﺔ ﺍﳊﻘﻮﻕ ﲜﺎﻣﻌﺔ ﺍﳌﻨﺼﻮﺭﺓ‪ ،‬ﺹ‪. 04‬‬
‫)‪(2‬ﻣﺸﺎﺭ ﺇﻟﻴﻪ ﻟﺪﻯ ﺩ ﻋﻤﺮ ﳏﻤﺪ ﺑﻦ ﻳﻮﻧﺲ‪ ،‬ﺃﺷﻬﺮ ﺍﳌﺒﺎﺩﺉ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﻷﻧﺘﺮﻧﺎﺕ ﰲ ﺍﻟﻘﻀﺎﺀ ﺍﻷﻣﺮﻳﻜﻲ ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ ﺍﻟﻘﺎﻫﺮﺓ ‪ ،2004‬ﺹ‪.582‬‬
‫)‪(3‬ﺍﳊﻤﺎﻳﺔ ﻋﻠﻰ ﻣﺴﺘﻮﻯ ﺍﻟﺪﺳﺎﺗﲑ ﺃﻧﻈﺮ ﺍﳌﺎﺩﺓ ‪ 39‬ﻣﻦ ﺍﻟﺪﺳﺘﻮﺭ ﺍﳉﺰﺍﺋﺮﻱ ﺍﻟﱵ ﺗﻨﺺ "‪....‬ﺃﻥ ﺳﺮﻳﺔ ﺍﳌﺮﺍﺳﻼﺕ ﻭﺍﻹﺗﺼﺎﻻﺕ ﺍﳋﺎﺻﺔ ﺑﻜﻞ ﺃﺷﻜﺎﳍﺎ ﳏﻤﻴﺔ"‬
‫ﻭﺍﳊﻤﺎﻳﺔ ﻋﻠﻰ ﻣﺴﺘﻮﻯ ﺍﻟﻨﺼﻮﺹ ﺍﻟﻌﻘﺎﺑﻴﺔ ﺃﻧﻈﺮ ﺍﳌﺎﺩﺓ ‪ 303‬ﻣﻜﺮﺭ ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﺍﳉﺰﺍﺋﺮﻱ‪.‬‬

‫‪- 180 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻓﺘﺢ ﲢﻘﻴﻖ ﻗﻀﺎﺋﻲ‪ ،‬ﻓﺎﻟﺴﻠﻄﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻫﻲ ﻭﺣﺪﻫﺎ ﺍﳌﺨﺘﺼﺔ ﺑﺈﺻﺪﺍﺭ ﻫﺬﺍ ﺍﻹﺫﻥ ﻭﻫﻮ ﻣﺎ ﻳﻌﺪ ﺿﻤﺎﻧﺔ‬
‫) ‪(1‬‬
‫ﻻﺯﻣﺔ ﳌﺸﺮﻭﻋﻴﺔ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ‪.‬‬
‫ﻭﻋﻠﻰ ﻭﻛﻴﻞ ﺍﳉﻤﻬﻮﺭﻳﺔ ﺃﻭ ﻗﺎﺿﻲ ﺍﻟﺘﺤﻘﻴﻖ ﻗﺒﻞ ﻣﻨﺢ ﻫﺬﺍ ﺍﻹﺫﻥ ﺗﻘﺪﻳﺮ ﻓﺎﺋﺪﺓ ﺇﺟﺮﺍﺀ ﺍﻹﻋﺘﺮﺍﺽ‬
‫ﻭﺟﺪﻳﺘﻪ ﻭﻣﻼﺀﻣﺘﻪ ﻟﺴﲑ ﺇﺟﺮﺍﺀﺍﺕ ﺍﻟﺪﻋﻮﻯ ﻣﻦ ﺧﻼﻝ ﻣﻌﻄﻴﺎﺕ ﺍﻟﺘﺤﺮﻳﺎﺕ ﺍﻟﱵ ﻗﺎﻣﺖ ‪‬ﺎ ﺍﻟﻀﺒﻄﻴﺔ‬
‫ﺍﻟﻘﻀﺎﺋﻴﺔ ﻣﺴﺒﻘﺎ‪ ،‬ﻣﻊ ﻣﻼﺣﻈﺔ ﺃﻧﻪ ﰲ ﻓﺮﻧﺴﺎ ﻭﻣﻨﺬ ﺻﺪﻭﺭ ﺍﻟﻘﺎﻧﻮﻥ ‪ 204/2004‬ﺍﳌﺆﺭﺥ ﰲ‬
‫‪ 2004/03/09‬ﺍﳌﻌﺪﻝ ﻟﻘﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺃﺻﺒﺢ ﺣﺴﺐ ﺍﳌﺎﺩﺓ ‪ 95/706‬ﺍﻹﺫﻥ ﺑﺈﻋﺘﺮﺍﺽ‬
‫ﺍﳌﺮﺍﺳﻼﺕ ﻣﻦ ﺇﺧﺘﺼﺎﺹ ﻗﺎﺿﻲ ﺍﳊﺮﻳﺎﺕ ﻭﺍﻹﺣﺘﺒﺎﺱ ﲟﻨﺤﻪ ﺑﻨﺎﺀﺍ ﻋﻠﻰ ﻃﻠﺐ ﻣﻦ ﻭﻛﻴﻞ ﺍﳉﻤﻬﻮﺭﻳﺔ ﺇﺫﺍ‬
‫ﺗﻌﻠﻖ ﺍﻷﻣﺮ ﺑﺎﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﶈﺪﺩﺓ ﺣﺼﺮﺍ ﺑﺎﳌﺎﺩﺓ ‪ ،73-706‬ﻭﲣﻀﻊ ﺇﺟﺮﺍﺀﺍﺕ ﺍﻹﻋﺘﺮﺍﺽ ﻟﺮﻗﺎﺑﺘﻪ‬
‫ﰲ ﺃﺟﻞ ‪ 15‬ﻳﻮﻡ ﻗﺎﺑﻠﺔ ﻟﻠﺘﺠﺪﻳﺪ ﺑﻨﻔﺲ ﺍﻟﺸﺮﻭﻁ ﰲ ﺍﻟﺸﻜﻞ ﻭﺍﻷﺟﻞ‪.‬‬
‫ﻭﻗﺪ ﻧﺼﺖ ﺍﳌﺎﺩﺓ ‪ 65‬ﻣﻜﺮﺭ ‪ 09‬ﻋﻠﻰ ﺃﻥ ﻋﻤﻠﻴﺔ ﺗﻨﻔﻴﺬ ﺇﺟﺮﺍﺀ ﺇﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ ﺗﺘﻢ ﲢﺖ ﺭﻗﺎﺑﺔ‬
‫ﺍﻟﺴﻠﻄﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﻟﱵ ﺃﺫﻧﺖ ﺑﻪ ﻭﺫﻟﻚ ﻣﻦ ﺧﻼﻝ ﻗﻴﺎﻡ ﺿﺎﺑﻂ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﺄﺫﻭﻥ ﻟﻪ ﺃﻭ ﺍﳌﻨﺎﺏ‬
‫ﻣﻦ ﻃﺮﻑ ﺍﻟﻘﺎﺿﻲ ﺍﳌﺨﺘﺺ ﺑﺈﻋﺪﺍﺩ ﳏﻀﺮﺍ ﻋﻦ ﻛﻞ ﻋﻤﻠﻴﺔ ﺇﻋﺘﺮﺍﺽ ﻟﻠﻤﺮﺍﺳﻼﺕ ﻭﻛﺬﺍ ﻋﻦ ﻋﻤﻠﻴﺎﺕ‬
‫ﻭﺿﻊ ﺍﻟﺘﺮﺗﻴﺒﺎﺕ ﺍﻟﺘﻘﻨﻴﺔ ﳍﺬﺍ ﺍﻟﻐﺮﺽ‪ ،‬ﻭﻳﺬﻛﺮ ﰲ ﻫﺬﺍ ﺍﶈﻀﺮ ﺗﺎﺭﻳﺦ ﻭﺳﺎﻋﺔ ﺑﺪﺍﻳﺔ ﻫﺬﻩ ﺍﻟﻌﻤﻠﻴﺎﺕ‬
‫ﻭﺍﻹﻧﺘﻬﺎﺀ ﻣﻨﻬﺎ‪.‬‬
‫‪65‬‬ ‫‪/2.2‬ﲢﺪﻳﺪ ﻃﺒﻴﻌﺔ ﺍﳌﺮﺍﺳﻠﺔ ﻭﻣﺪﺓ ﺍﻹﻋﺘﺮﺍﺽ‪ :‬ﻭﻫﺬﺍ ﻣﺎ ﻳﻔﻬﻢ ﺻﺮﺍﺣﺔ ﻣﻦ ﻧﺺ ﺍﳌﺎﺩﺓ‬
‫ﻣﻜﺮﺭ ‪ 7‬ﺍﻟﱵ ﻧﺼﺖ ﻋﻠﻰ ﺃﻧﻪ ﳚﺐ ﺃﻥ ﻳﺘﻀﻤﻦ ﺍﻹﺫﻥ ﺑﺈﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ ﻛﻞ ﺍﻟﻌﻨﺎﺻﺮ ﺍﻟﱵ ﺗﺴﻤﺢ‬
‫ﺑﺎﻟﺘﻌﺮﻑ ﻋﻠﻰ ﺍﻹﺗﺼﺎﻻﺕ ﺃﻭ ﺍﳌﺮﺍﺳﻼﺕ ﺍﳌﻄﻠﻮﺏ ﺇﻋﺘﺮﺍﺿﻬﺎ‪ ،‬ﻛﻤﺎ ﺃﻥ ﺍﳌﺸﺮﻉ ﻗﺪ ﺇﺳﺘﻮﺟﺐ ﺃﻥ ﻻ‬
‫ﺗﺘﺠﺎﻭﺯ ﻣﺪﺓ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﺃﺭﺑﻌﺔ ﺃﺷﻬﺮ ﻗﺎﺑﻠﺔ ﻟﻠﺘﺠﺪﻳﺪ ﺣﺴﺐ ﺗﻘﺪﻳﺮ ﻧﻔﺲ ﺍﻟﺴﻠﻄﺔ ﻣﺼﺪﺭﻩ ﺍﻹﺫﻥ ﻭﻓﻘﺎ‬
‫ﳌﻘﺘﻀﻴﺎﺕ ﺍﻟﺘﺤﺮﻱ ﻭﺍﻟﺘﺤﻘﻴﻖ ﻭﻫﻲ ﻧﻔﺲ ﺍﳌﺪﺓ ﺍﻟﱵ ﺣﺪﺩﻫﺎ ﺍﳌﺸﺮﻉ ﺍﻟﻔﺮﻧﺴﻲ ﰲ ﺍﳌﺎﺩﺓ ‪ 100‬ﻣﻦ ﻗﺎﻧﻮﻥ‬
‫ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺍﻟﻔﺮﻧﺴﻲ‪.‬‬
‫‪/2‬ﻃﺮﻕ ﺇﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪:‬ﻳﻌﺘﱪ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺃﻫﻢ ﻭﺳﻴﻠﺔ ﺗﻘﻨﻴﺔ ﰲ ﳎﺎﻝ‬
‫ﺍﻟﺘﺮﺍﺳﻞ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻭﻣﻦ ﰒ ﻓﻌﻤﻠﻴﺔ ﺍﻹﻋﺘﺮﺍﺽ ﺗﻨﺼﺐ ﻋﻠﻴﻪ‪ ،‬ﻭﻣﻦ ﺍﳌﻌﻠﻮﻡ ﺃﻥ ﻛﻞ ﺭﺳﺎﻟﺔ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ‬
‫ﻳﻈﻬﺮ ﻓﻴﻬﺎ ﻣﻌﻠﻮﻣﺎﺕ ﻋﺎﻣﺔ ﻣﺜﻞ ﺗﺎﺭﻳﺦ ﺇﻧﺸﺎﺀ ﺍﻟﺮﺳﺎﻟﺔ ﻭﺗﺎﺭﻳﺦ ﺗﻠﻘﻴﻬﺎ ﻭﻛﺬﺍ ﻋﻨﻮﺍﻥ ﺍﳌﺮﺳﻞ ﻭﻋﻨﻮﺍﻥ‬
‫)‪(1‬ﺗﻨﺺ ﺍﳌﺎﺩﺓ ‪ 65‬ﻣﻜﺮﺭ ‪ ":05‬ﺇﺫﺍ ﺇﻗﺘﻀﺖ ﺿﺮﻭﺭﺍﺕ ﺍﻟﺘﺤﺮﻱ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﺘﻠﺒﺲ ‪‬ﺎ ﺃﻭ ﺍﻟﺘﺤﻘﻴﻖ ﺍﻹﺑﺘﺪﺍﺋﻲ ﰲ ﺟﺮﺍﺋﻢ‪ ....‬ﺃﻭ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺎﺳﺔ ﺑﺄﻧﻈﻤﺔ‬
‫ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ﳚﻮﺯ ﻟﻮﻛﻴﻞ ﺍﳉﻤﻬﻮﺭﻳﺔ ﺃﻥ ﻳﺄﺫﻥ ﺑﺈﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ ﺍﻟﱵ ﺗﺘﻢ ﻋﻦ ﻃﺮﻳﻖ ﻭﺳﺎﺋﻞ ﺍﻹﺗﺼﺎﻝ ﺍﻟﺴﻠﻜﻴﺔ ﻭﺍﻟﻼﺳﻠﻜﻴﺔ‪ ....‬ﻭﰲ ﺣﺎﻟﺔ‬
‫ﻓﺘﺢ ﲢﻘﻴﻖ ﻗﻀﺎﺋﻲ ﺗﺘﻢ ﺍﻟﻌﻤﻠﻴﺔ ﺑﻨﺎﺀﺍ ﻋﻠﻰ ﺇﺫﻥ ﻣﻦ ﻗﺎﺿﻲ ﺍﻟﺘﺤﻘﻴﻖ ﻭﲢﺖ ﻣﺮﺍﻗﺒﺘﻪ ﺍﳌﺒﺎﺷﺮﺓ"‪.‬‬

‫‪- 181 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﳌﺮﺳﻞ ﺇﻟﻴﻪ‪ ،‬ﻭﻟﻜﻦ ﻫﺬﻩ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻟﻴﺴﺖ ﻛﺎﻓﻴﺔ ﳌﻌﺮﻓﺔ ﺍﳌﺮﺳﻞ ﺇﺫ ﺑﺈﻣﻜﺎﻥ ﻫﺬﺍ ﺍﻷﺧﲑ ﺇﻃﻼﻕ ﺭﺳﺎﺋﻠﻪ‬
‫ﻣﻦ ﺻﻨﺎﺩﻳﻖ ﺑﺮﻳﺪ ﻣﺴﺠﻠﺔ ﺑﺄﲰﺎﺀ ﻭﳘﻴﺔ‪ ،‬ﻛﻤﺎ ﺃﻥ ﻫﻨﺎﻙ ﻭﺳﺎﺋﻞ ﺗﺘﻴﺢ ﻟﻠﻤﺮﺳﻞ ﺃﻥ ﻳﺮﺳﻞ ﺭﺳﺎﻟﺘﻪ ﺩﻭﻥ‬
‫ﺃﻥ ﻳﻈﻬﺮ ﻓﻴﻬﺎ ﻋﻨﻮﺍﻥ ﺑﺮﻳﺪﻩ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﻟﺼﺤﻴﺢ ﻟﺬﻟﻚ ﻻﺑﺪ ﻣﻦ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﳌﺰﻳﺪ ﻣﻦ ﺍﳌﻌﻠﻮﻣﺎﺕ‬
‫ﺍﻟﱵ ﳝﻜﻦ ﺍﻟﻌﺜﻮﺭ ﻋﻠﻴﻬﺎ ﰲ ﺣﺎﺷﻴﺔ ﺭﺳﺎﺋﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻭﺍﻟﱵ ﻳﻄﻠﻖ ﻋﻠﻴﻬﺎ ﻣﺼﻄﻠﺢ " ‪Email‬‬
‫‪ "Header‬ﻭﻫﻲ ﺃﻭﻝ ﺧﻄﻮﺓ ﻟﻠﺒﺪﺀ ﺑﺎﻟﺘﺤﺮﻱ ﻋﻦ ﻣﺮﺳﻞ ﺍﻟﺮﺳﺎﻟﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﻫﺬﻩ ﺍﳊﺎﺷﻴﺔ ﻻ ﺗﻈﻬﺮ‬
‫) ‪(1‬‬
‫ﺑﺼﻮﺭﺓ ﻣﺒﺎﺷﺮﺓ ﻭﺇﳕﺎ ﻳﺘﻄﻠﺐ ﺍﻷﻣﺮ ﻣﻦ ﺍﳌﺴﺘﺨﺪﻡ ﺇﺟﺮﺍﺀ ﺑﻌﺾ ﺍﳋﻄﻮﺍﺕ ﻟﻠﺤﺼﻮﻝ ﻋﻠﻴﻬﺎ‪.‬‬
‫ﻭﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﱵ ﲢﺘﻮﻳﻬﺎ ﺣﺎﺷﻴﺔ ﺍﻟﺮﺳﺎﻟﺔ)‪ (Email Header‬ﻫﻲ ﻋﺒﺎﺭﺓ ﻋﻦ ﻣﻌﻠﻮﻣﺎﺕ ﺗﺮﺍﻛﻤﻴﺔ‬
‫ﳌﺨﺘﻠﻒ ﺍﻷﺟﻬﺰﺓ ﺍﳋﺎﺩﻣﺔ ﻟﻠﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﻟﱵ ﻣﺮﺕ ﻣﻦ ﺧﻼﳍﺎ ﺍﻟﺮﺳﺎﻟﺔ‪ ،‬ﻓﺎﳌﻌﺘﺪﻱ ﻋﻨﺪﻣﺎ ﻳﺮﺳﻞ‬
‫ﺭﺳﺎﻟﺘﻪ ﺗﺬﻫﺐ ﺗﻠﻚ ﺍﻟﺮﺳﺎﻟﺔ ﺇﱃ ﺟﻬﺎﺯ ﺍﳊﺎﺳﻮﺏ ﺍﳌﺮﻛﺰﻱ ﺍﳌﻤﻠﻮﻙ ﻟﻠﺠﻬﺔ ﺍﻟﱵ ﻣﻨﺤﺖ ﻟﻪ ﺣﺴﺎﺏ‬
‫ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ‪ ،‬ﻭﺫﻟﻚ ﺍﳉﻬﺎﺯ ﻳﻘﻮﻡ ﻓﻮﺭﺍ ﺑﺈﺭﺳﺎﻝ ﺍﻟﺮﺳﺎﻟﺔ ﺇﱃ ﺍﳊﺎﺳﻮﺏ ﺍﳌﺮﻛﺰﻱ ﺍﻵﺧﺮ ﺍﳌﻤﻠﻮﻙ‬
‫ﻟﻠﺠﻬﺔ ﺍﻟﱵ ﻣﻨﺤﺖ ﻟﻠﻤﺮﺳﻞ ﺇﻟﻴﻪ ﺣﺴﺎﺏ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ‪ ،‬ﻭﻫﻨﺎ ﻳﻘﻮﻡ ﺍﳉﻬﺎﺯ ﺍﻷﺧﲑ ﺑﺈﺭﺳﺎﻝ‬
‫ﺍﻟﺮﺳﺎﻟﺔ ﺇﱃ ﺍﳌﺮﺳﻞ ﺇﻟﻴﻪ ﻭﳍﺬﺍ ﺍﻟﺴﺒﺐ ﳒﺪ ﺃﻥ ﺣﺎﺷﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺳﺘﺘﻀﻤﻦ ﺃﺭﻗﺎﻡ ّ‪"IP‬ﳐﺘﻠﻔﺔ ﲤﺜﻞ ﺃﺭﻗﺎﻡ‬
‫ﺧﺎﺻﺔ ﺑﻜﻞ ﺍﻷﺟﻬﺰﺓ ﺍﻟﱵ ﻣﺮﺕ ‪‬ﺎ ﺍﻟﺮﺳﺎﻟﺔ‪ ،‬ﻭﻋﺎﺩﺓ ﻣﺎ ﻳﻈﻬﺮ ﺭﻗﻢ ‪IP‬ﺍﳋﺎﺹ ﲟﺮﺳﻞ ﺍﻟﺮﺳﺎﻟﺔ ﺃﻣﺎﻡ‬
‫ﻋﺒﺎﺭﺓ"‪ ،xoriginating IP‬ﻭﰲ ﺣﺎﻟﺔ ﻋﺪﻡ ﻇﻬﻮﺭ ﻫﺬﻩ ﺍﻟﻌﺒﺎﺭﺓ ﻓﺈﻥ ﺭﻗﻢ ‪IP‬ﺍﳋﺎﺹ ﳌﺮﺳﻞ ﺍﻟﺮﺳﺎﻟﺔ‬
‫ﻳﻜﻮﻥ ﺃﻣﺎﻡ ﺁﺧﺮ ﻛﻠﻤﺔ ‪ ،Received‬ﻭﺗﻌﺪ ﰲ ﻫﺬﻩ ﺍﳌﻌﻠﻮﻣﺔ ﺃﺳﺎﺳﻴﺔ ﳝﻜﻦ ﻣﻦ ﺧﻼﳍﺎ ﺍﻹﺳﺘﺪﻻﻝ ﻋﻠﻰ‬
‫ﺻﺎﺣﺐ ﺍﻟﺮﺳﺎﻟﺔ ﻭﻳﺼﺒﺢ ﺑﻌﺪ ﺫﻟﻚ ﻣﻦ ﺍﻟﺴﻬﻞ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﳌﺰﻳﺪ ﻣﻦ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻋﻦ ﺍﳌﺮﺳﻞ ﻭﺫﻟﻚ‬
‫ﺑﺈﺩﺧﺎﻝ ﺭﻗﻢ ‪IP‬ﰲ ﺑﻌﺾ ﺍﳌﻮﺍﻗﻊ ﺍﻟﱵ ﺗﻘﻮﻡ ﺑﺎﻟﻜﺸﻒ ﻋﻦ ﻣﺼﺪﺭ ﺍﻟﺮﺳﺎﻟﺔ ﻭﺍﳌﻜﺎﻥ ﺍﳉﻐﺮﺍﰲ ﺍﻟﺬﻱ‬
‫ﺃﺭﺳﻠﺖ ﻣﻨﻪ ﻭﻛﺬﺍ ﻣﺰﻭﺩ ﺍﳋﺪﻣﺔ ﺍﻟﺬﻱ ﻳﺘﻌﺎﻣﻞ ﻣﻌﻪ ﻣﺮﺳﻞ ﺍﻟﺮﺳﺎﻟﺔ ﻭﻳﻜﻮﻥ ﺑﺬﻟﻚ ﻣﻦ ﺍﻟﺴﻬﻞ ﲤﺎﻣﺎ‬
‫ﺇﻋﺘﺮﺍﺽ ﻫﺬﻩ ﺍﳌﺮﺍﺳﻼﺕ ﻭﺍﻹﻃﻼﻉ ﻋﻠﻰ ﳏﺘﻮﺍﻫﺎ ﺩﻭﻥ ﻋﻠﻢ ﻣﺮﺳﻠﻬﺎ)‪.(2‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺍﳌﺮﺍﻗﺒﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﺣﻔﻆ ﺍﳌﻌﻄﻴﺎﺕ‪:‬‬
‫ﺳﻮﻑ ﻧﺘﻨﺎﻭﻝ ﺑﺎﻟﺸﺮﺡ ﺇﺟﺮﺍﺀ ﺍﳌﺮﺍﻗﺒﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻓﻘﻂ ﻋﻠﻰ ﺇﻋﺘﺒﺎﺭ ﺃﻧﻪ ﺳﺒﻖ ﺍﳊﺪﻳﺚ ﻋﻦ ﺣﻔﻆ‬
‫ﺍﳌﻌﻄﻴﺎﺕ‪.‬‬

‫)‪(1‬ﺣﻮﻝ ﻃﺮﻕ ﺇﺳﺘﺨﺮﺍﺝ ﺣﺎﺷﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﰲ ﺃﺷﻬﺮ ﺣﺴﺎﺑﺎﺕ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺃﻧﻈﺮ ﻋﺎﺩﻝ ﻋﺰﺍﻡ ﺳﻘﻒ ﺍﳊﻴﻂ‪،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ‪.256‬‬
‫)‪ (2‬ﺃﻧﻈﺮ ﻣﻘﺎﻝ ﺣﻮﻝ ﻃﺮﻳﻘﺔ ﺍﻟﻜﺸﻒ ﻋﻦ ﻫﻮﻳﺔ ﻣﺮﺳﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ‪ ،‬ﳎﻠﺔ ﺩﻟﻴﻞ ﺍﻷﻧﺘﺮﻧﺎﺕ‪ .‬ﳎﻠﺔ ﺷﻬﺮﻳﺔ ﻣﺘﺨﺼﺼﺔ ﺍﻟﻌﺪﺩ ‪ 109‬ﺍﻟﺴﻨﺔ ﺍﻟﺘﺎﺳﻌﺔ‬
‫‪ 2009‬ﻣﻄﺒﻌﺔ ﻓﻴﻠﻤﺰ ﺍﻟﻜﻮﻳﺖ‪.‬‬

‫‪- 182 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﻟﻘﺎﻧﻮﻥ‪04/09‬‬ ‫ﺇﺳﺘﺤﺪﺙ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﺇﺟﺮﺍﺀ ﺍﳌﺮﺍﻗﺒﺔ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ ﲟﻮﺟﺐ ﺍﳌﺎﺩﺓ ﺍﻟﺜﺎﻟﺜﺔ ﻣﻦ‬
‫ﺍﳌﺘﻀﻤﻦ ﺍﻟﻘﻮﺍﻋﺪ ﺍﳋﺎﺻﺔ ﻟﻠﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭﺍﻹﺗﺼﺎﻝ ﻭﻣﻜﺎﻓﺤﺘﻬﺎ‬
‫ﺣﻴﻨﻤﺎ ﺃﺟﺎﺯ ﺗﺒﻌﺎ ﳌﺴﺘﻠﺰﻣﺎﺕ ﺍﻟﺘﺤﺮﻳﺎﺕ ﻭﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳉﺎﺭﻳﺔ ﰲ ﺇﻃﺎﺭ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﻟﻠﺠﻮﺀ ﺇﱃ ﻭﺿﻊ ﺗﺮﺗﻴﺒﺎﺕ ﺗﻘﻨﻴﺔ ﳌﺮﺍﻗﺒﺔ ﺍﻹﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﲡﻤﻴﻊ ﻭﺗﺴﺠﻴﻞ ﳏﺘﻮﺍﻫﺎ‪.‬‬
‫ﺃﻭﻻ‪ :‬ﺍﳌﻘﺼﻮﺩ ﲟﺮﺍﻗﺒﺔ ﺍﻹﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪:‬ﱂ ﻳﺘﻄﺮﻕ ﺍﻟﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﺷﺄﻧﻪ ﰲ ﺫﻟﻚ‬
‫ﺷﺄﻥ ﺃﻏﻠﺐ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﳌﻘﺎﺭﻧﺔ ﺇﱃ ﲢﺪﻳﺪ ﻣﺎ ﺍﳌﻘﺼﻮﺩ ﲟﺮﺍﻗﺒﺔ ﺍﻹﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻣﻜﺘﻒ ﰲ ﺫﻟﻚ‬
‫ﺑﺘﺤﺪﻳﺪ ﻣﻔﻬﻮﻡ ﺍﻹﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻓﺤﺴﺐ‪ ،‬ﻏﲑ ﺃﻥ ﺍﻟﻔﻘﻪ ﻗﺪ ﺗﺼﺪﻯ ﺇﱃ ﻫﺬﻩ ﺍﳌﻬﻤﺔ ﺣﻴﺚ‬
‫ﻋﺮﻑ ﺇﺟﺮﺍﺀ ﺍﳌﺮﺍﻗﺒﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻋﻠﻰ ﺃﻧﻪ ﻣﺮﺍﻗﺒﺔ ﺷﺒﻜﺔ ﺍﻹﺗﺼﺎﻻﺕ‪ ،‬ﺃﻭ ﻫﻮ ﺍﻟﻌﻤﻞ ﺍﻟﺬﻱ ﻳﻘﻮﻡ ﺑﻪ‬
‫ﺍﳌﺮﺍﻗﺐ ﺑﺈﺳﺘﺨﺪﺍﻡ ﺍﻟﺘﻘﻨﻴﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﳉﻤﻊ ﻣﻌﻄﻴﺎﺕ ﻭﻣﻌﻠﻮﻣﺎﺕ ﻋﻦ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﺳﻮﺍﺀ ﺃﻛﺎﻥ ﺷﺨﺼﺎ‬
‫ﺃﻭ ﻣﻜﺎﻧﺎ ﺃﻭ ﺷﻴﺌﺎ ﺣﺴﺐ ﻃﺒﻴﻌﺘﻪ ﻣﺮﺗﺒﻂ ﺑﺎﻟﺰﻣﻦ ﻟﺘﺤﻘﻴﻖ ﻏﺮﺽ ﺃﻣﲏ ﺃﻭ ﻷﻱ ﻏﺮﺽ ﺁﺧﺮ‪.‬‬

‫‪- 183 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﺍﳌﻼﺣﻆ ﺃﻥ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳌﺴﺘﺨﺪﻣﺔ ﰲ ﻫﺬﻩ ﺍﳌﺮﺍﻗﺒﺔ ﻫﻲ ﺍﻟﺘﻘﻨﻴﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﻭﺍﻟﱵ ﺗﻌﲏ ﳎﻤﻮﻋﺔ‬
‫ﺍﻷﺟﻬﺰﺓ ﺍﳌﺘﻜﺎﻣﻠﺔ ﻣﻊ ﺑﻌﻀﻬﺎ ﺑﻐﺮﺽ ﺗﺸﻐﻴﻞ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻟﺪﺍﺧﻠﺔ ﻭﻓﻘﺎ ﻟﱪﻧﺎﻣﺞ ﻣﻮﺿﻮﻉ‬
‫ﻣﺴﺒﻘﺎ ﻟﻠﺤﺼﻮﻝ ﻋﻠﻰ ﺍﻟﻨﺘﺎﺋﺞ ﺍﳌﻄﻠﻮﺑﺔ‪(1)،‬ﻭﻣﻦ ﺑﲔ ﺗﻠﻚ ﺍﻟﺘﻘﻨﻴﺎﺕ ﳒﺪ ﺑﺮﻧﺎﻣﺞ ﻛﺎﺭﻳﻨﻔﻮﺭ)‪(2‬ﻭﺗﻘﻨﻴﺔ‬
‫ﻣﺮﺍﻗﺒﺔ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ‪.‬‬
‫ﻭﻣﻦ ﺍﻟﻮﺍﺿﺢ ﺃﻥ ﺍﻟﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﱂ ﻳﻌﺘﱪ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﻣﻦ ﺿﻤﻦ ﻃﺮﻕ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ‬
‫ﺍﻟﺮﻗﻤﻲ ﻓﻘﻂ‪،‬ﺑﻞ ﺃﺩﺭﺟﻪ ﺿﻤﻦ ﺍﻟﺘﺪﺍﺑﲑ ﺍﻟﻮﻗﺎﺋﻴﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﳝﻜﻦ ﺃﻥ ﺗﺮﺗﻜﺐ ﺑﻮﺍﺳﻄﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪،‬‬
‫ﻓﺈﱃ ﺟﺎﻧﺐ ﺇﻣﻜﺎﻧﻴﺔ ﺍﻟﻘﻴﺎﻡ ﺑﺈﺟﺮﺍﺀ ﻣﺮﺍﻗﺒﺔ ﺍﻹﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﰲ ﺇﻃﺎﺭ ﺍﻟﺘﺤﺮﻳﺎﺕ‬
‫ﻭﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻣﻦ ﺃﺟﻞ ﺍﻟﻮﺻﻮﻝ ﺇﱃ ﺃﺩﻟﺔ ﱂ ﻳﻜﻦ ﺑﺎﻹﻣﻜﺎﻥ ﺍﻟﻮﺻﻮﻝ ﺇﻟﻴﻬﺎ ﺩﻭﻥ ﺍﻟﻠﺠﻮﺀ ﺇﱃ‬
‫ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀﻓﺈﻧﻪ ﳝﻜﻦ ﻛﺬﻟﻚ ﺗﻄﻮﻳﻊ ﻫﺬﻩ ﺍﻟﺘﻘﻨﻴﺔ ﻟﻜﻲ ﺗﻌﻤﻞ ﰲ ﺑﻴﺌﺔ ﺍﻟﺮﻗﺎﺑﺔ ﻟﻐﺮﺽ ﺍﻟﻮﻗﺎﻳﺔ ﻣﻦ‬
‫ﺇﺣﺘﻤﺎﻝ ﻭﻗﻮﻉ ﺟﺮﺍﺋﻢ ﺧﻄﲑﺓ ﺑﻮﺍﺳﻄﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﺷﺄ‪‬ﺎ ‪‬ﺪﻳﺪ ﻛﻴﺎﻥ ﺍﻟﺪﻭﻟﺔ ﻭﻫﻮ ﻣﺎ ﻗﺮﺭﺗﻪ ﺍﳌﺎﺩﺓ‬
‫ﺍﻟﺮﺍﺑﻌﺔ ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﺑﻘﻮﳍﺎ ﺃﻧﻪ ﳝﻜﻦ ﺍﻟﻘﻴﺎﻡ ﺑﻌﻤﻠﻴﺎﺕ ﺍﳌﺮﺍﻗﺒﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻟﻺﺗﺼﺎﻻﺕ ﻟﻠﻮﻗﺎﻳﺔ ﻣﻦ‬
‫ﺍﻷﻓﻌﺎﻝ ﺍﳌﻮﺻﻮﻓﺔ ﲜﺮﺍﺋﻢ ﺍﻹﺭﻫﺎﺏ ﺃﻭ ﺍﻟﺘﺨﺮﻳﺐ ﺃﻭ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺎﺳﺔ ﺑﺄﻣﻦ ﺍﻟﺪﻭﻟﺔ ﻭﻛﺬﺍ ﰲ ﺣﺎﻟﺔ ﺗﻮﻓﺮ‬
‫ﻣﻌﻠﻮﻣﺎﺕ ﻋﻦ ﺇﺣﺘﻤﺎﻝ ﺇﻋﺘﺪﺍﺀ ﻋﻠﻰ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﳓﻮ ﻳﻬﺪﺩ ﺍﻟﻨﻈﺎﻡ ﺍﻟﻌﺎﻡ ﺃﻭ ﺍﻟﺪﻓﺎﻉ ﺍﻟﻮﻃﲏ‪.‬‬
‫ﻭﻳﻌﺘﱪ ﺗﻜﺮﻳﺲ ﺍﳌﺸﺮﻉ ﻹﺟﺮﺍﺀ ﺍﻟﺮﺍﻗﺒﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻟﻺﺗﺼﺎﻻﺕ ﺧﻄﻮﺓ ﺟﺮﻳﺌﺔ ﻣﻨﻪ ﻋﻠﻰ ﺇﻋﺘﺒﺎﺭ‬
‫ﺃﻥ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﻳﻌﺪ ﻣﻦ ﺃﺧﻄﺮ ﺍﻹﺟﺮﺍﺀﺍﺕ ﰲ ﺇﻃﺎﺭ ﺍﻟﻨﻈﺎﻡ ﺍﻹﺟﺮﺍﺋﻲ ﻋﱪ ﺍﻟﻌﺎﱂ ﺍﻹﻓﺘﺮﺍﺿﻲ ﻟﻜﻮﻧﻪ ﳝﺲ‬
‫ﻣﺒﺎﺷﺮﺓ ﺧﺼﻮﺻﻴﺎﺕ ﺍﻹﻧﺴﺎﻥ ‪،‬ﻭﺫﻟﻚ ﺑﺎﻟﺮﻏﻢ ﻣﻦ ﺃﻥ ﺍﻟﺒﻌﺾ ﻣﻦ ﺍﻟﻔﻘﻪ ﻳﺮﻯ ﺃﻥ ﺍﳌﺮﺍﻗﺒﺔ ﻻ ﺗﺰﺍﻝ ﳏﻞ‬
‫ﻧﻈﺮ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ﻣﻦ ﺣﻴﺚ ﺿﺮﻭﺭﺓ ﺍﻹﻟﺘﺰﺍﻡ ﲟﺎ ﻫﻮ ﻣﻘﺮﺭ ﰲ ﺍﻟﻘﻮﺍﻧﲔ ﻭﺍﻟﻀﻤﺎﻧﺎﺕ ﺍﻟﺪﺳﺘﻮﺭﻳﺔ ﻟﻠﺤﻖ ﰲ‬
‫ﺍﳋﺼﻮﺻﻴﺔ‪.‬‬

‫)‪(1‬ﻣﺼﻄﻔﻰ ﳏﻤﺪ ﻣﻮﺳﻰ ﺍﳌﺮﺍﻗﺒﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻋﱪ ﺷﺒﻜﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ ﺩﺭﺍﺳﺔ ﻣﻘﺎﺭﻧﺔ ﺑﲔ ﺍﳌﺮﺍﻗﺒﺔ ﺍﻷﻣﻨﻴﺔ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ‪ ،‬ﺩﺍﺭ ﺍﻟﻜﺘﺐ ﻭﺍﻟﻮﺛﺎﺋﻖ ﺍﻟﻘﻮﻣﻴﺔ ﺍﳌﺼﺮﻳﺔ‬
‫ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪ ،2000‬ﺹ‪.205‬‬
‫)‪(2‬ﻗﺎﻣﺖ ﺇﺩﺍﺭﺓ ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﺘﺎﺑﻌﺔ ﳌﻜﺘﺐ ﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﺍﻟﻔﺪﺭﺍﱄ )‪ (FBI‬ﺑﺘﻄﻮﻳﺮ ﻫﺬﻩ ﺍﻟﺘﻘﻨﻴﺔ ﻭﺫﻟﻚ ﻣﻦ ﺃﺟﻞ ﺗﻌﻘﺐ ﻭﻓﺤﺺ ﺭﺳﺎﺋﻞ ﺍﻟﱪﻳﺪ‬
‫ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﳌﺮﺳﻠﺔ ﻭﺍﻟﻮﺍﺭﺩﺓ ﻋﱪ ﺃﻱ ﺣﺎﺳﺐ ﺧﺎﺩﻡ ﺗﺴﺘﺨﺪﻣﻪ ﺃﻱ ﺷﺮﻛﺔ ﺗﻘﻮﻡ ﺑﺘﻮﻓﲑ ﺧﺪﻣﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻭﻳﺸﺘﺒﻪ ﰲ ﺃﻥ ﺗﻴﺎﺭ ﺍﻟﺮﺳﺎﺋﻞ ﺍﳌﺎﺭ ﻋﱪ ﺧﺪﻣﺎ‪‬ﺎ‬
‫ﳛﻤﻞ ﻣﻌﻠﻮﻣﺎﺕ ﻋﻦ ﺟﺮﺍﺋﻢ ﻭﻳﺘﻢ ﺗﻨﻔﻴﺬ ﻋﻤﻠﻴﺎﺕ ﺍﻟﺘﻌﻘﺐ ﻭﺍﻟﻔﺤﺺ ﺑﻮﺿﻊ ﺃﺟﻬﺰﺓ ﺍﻟﺸﺮﻛﺔ ﺍﳌﻮﻓﺮﺓ ﻟﻠﺨﺪﻣﺔ ﲢﺖ ﺍﳌﺮﺍﻗﺒﺔ ﻭﻟﻘﺪ ﺃﺻﺒﺢ ﻳﻄﻠﻖ ﻋﻠﻰ ﻫﺬﻩ‬
‫ﺍﻟﺘﻘﻨﻴﺔ ﺑﻌﺪ ﺃﺣﺪﺍﺙ ‪ 2011/09/11‬ﺗﻘﻨﻴﺔ ‪C/CS1000‬‬

‫‪- 184 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺛﺎﻧﻴﺎ‪ :‬ﺷﺮﻭﻁ ﺍﳌﺮﺍﻗﺒﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻟﻺﺗﺼﺎﻻﺕ‪ :‬ﺃﺣﺎﻁ ﺍﳌﺸﺮﻉ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﺑﺈﻋﺘﺒﺎﺭﻩ ﻭﺳﻴﻠﺔ‬
‫ﺇﺟﺮﺍﺋﻴﺔ ﻟﻠﺤﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﰲ ﳎﺎﻝ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﲟﺠﻤﻮﻋﺔ ﻣﻦ ﺍﻟﺸﺮﻭﻁ ﺃﳘﻬﺎ‪:‬‬
‫‪ -‬ﺃﻥ ﻳﺘﻢ ﺗﻨﻔﻴﺬ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﲢﺖ ﺳﻠﻄﺔ ﺍﻟﻘﻀﺎﺀ ﻭﺑﺈﺫﻥ ﻣﻨﻪ‪ ،‬ﻭﻫﻮ ﻣﺎ ﻛﺮﺳﺘﻪ ﺍﳌﺎﺩﺓ ﺍﻟﺮﺍﺑﻌﺔ ﻣﻦ‬
‫ﺍﻟﻘﺎﻧﻮﻥ ﺍﳌﺘﻀﻤﻦ ﺍﻟﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭﺍﻹﺗﺼﺎﻝ ﺑﻨﺼﻬﺎ ﻋﻠﻰ ﺃﻧﻪ ﻻ ﳚﻮﺯ‬
‫ﺇﺟﺮﺍﺀ ﻋﻤﻠﻴﺎﺕ ﺍﳌﺮﺍﻗﺒﺔ ﺇﻻ ﺑﺈﺫﻥ ﻣﻦ ﺍﻟﺴﻠﻄﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﺨﺘﺼﺔ‪.‬‬
‫‪ -‬ﺃﻥ ﺗﻜﻮﻥ ﻫﻨﺎﻙ ﺿﺮﻭﺭﺓ ﺗﺘﻄﻠﺐ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﻭﺗﺘﺤﻘﻖ ﻫﺬﻩ ﺍﻟﻀﺮﻭﺭﺓ ﻋﻨﺪﻣﺎ ﻳﻜﻮﻥ ﻣﻦ ﺍﻟﺼﻌﺐ‬
‫ﺍﻟﻮﺻﻮﻝ ﺇﱃ ﻧﺘﻴﺠﺔ ‪‬ﻢ ﳎﺮﻳﺎﺕ ﺍﻟﺘﺤﺮﻱ ﺃﻭ ﺍﻟﺘﺤﻘﻴﻖ ﺩﻭﻥ ﺍﻟﻠﺠﻮﺀ ﺇﱃ ﺍﳌﺮﺍﻗﺒﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﻫﻮ ﻣﺎ ﺃﻛﺪ‬
‫ﻋﻠﻴﻪ ﺍﳌﺸﺮﻉ ﰲ ﺍﻟﻔﻘﺮﺓ ّﺝ" ﻣﻦ ﺍﳌﺎﺩﺓ ﺍﻟﺮﺍﺑﻌﺔ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ‪.04/09‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﻟﺚ‪:‬ﻣﻌﻮﻗﺎﺕ ﺃﻭ ﺻﻌﻮﺑﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬‬
‫ﻳﺘﺴﻢ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﺎﻟﻌﺪﻳﺪ ﻣﻦ ﺍﳌﻌﻮﻗﺎﺕ ﻭﺍﻟﺼﻌﻮﺑﺎﺕ‪ ،‬ﻓﻨﻈﺮﺍ ﻟﻮﻗﻮﻉ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺿﻤﻦ ﺑﻴﺌﺔ ﺭﻗﻤﻴﺔ ﻛﺎﻣﻨﺔ ﰲ ﺃﺟﻬﺰﺓ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻭﺍﳋﻮﺍﺩﻡ )‪ (Serveur‬ﻭﺍﳌﻀﻴﻔﺎﺕ‬
‫ﻭﺍﻟﺸﺒﻜﺎﺕ ﲟﺨﺘﻠﻒ ﺃﻧﻮﺍﻋﻬﺎ‪ ،‬ﺃﺩﺕ ﺇﱃ ﻇﻬﻮﺭ ﻧﻮﻉ ﻣﻦ ﺍﻟﺘﺤﺪﻱ ﻟﻸﺟﻬﺰﺓ ﺍﳌﺨﺘﺼﺔ ﺑﺎﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ‬
‫ﰲ ﺗﻄﺒﻴﻖ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﻟﱵ ﻧﻈﻤﺖ ﻣﺴﺄﻟﺔ ﺇﺳﺘﺨﻼﺹ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪ ،‬ﻭﺗﻀﻌﻒ ﻗﻴﻤﺘﻬﺎ ﰲ‬
‫ﻣﻜﺎﻓﺤﺔ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﻭﺗﺆﺛﺮ ﻋﻠﻰ ﻋﻤﻠﻴﺔ ﺍﻟﺘﺤﻘﻴﻖ ﻭﺗﺆﺩﻱ ‪‬ﺎ ﺇﱃ ﺍﳋﺮﻭﺝ ﺑﻨﺘﺎﺋﺞ ﺳﻠﺒﻴﺔ‬
‫ﺗﻨﻌﻜﺲ ﻋﻠﻰ ﻧﻔﺴﻴﺔ ﺍﶈﻘﻖ ﺑﻔﻘﺪﺍﻧﻪ ﺍﻟﺜﻘﺔ ﰲ ﺃﺟﻬﺰﺓ ﺍﻟﺘﺤﻘﻴﻖ‪ ،‬ﺑﻞ ﻭﺗﻨﻌﻜﺲ ﻋﻠﻰ ﺍ‪‬ﺮﻡ ﻧﻔﺴﻪ ﺣﻴﺚ‬
‫ﻳﺸﻌﺮ ﺃﻥ ﺍﳉﻬﺎﺕ ﺍﻷﻣﻨﻴﺔ ﻏﲑ ﻗﺎﺩﺭﺓ ﻋﻠﻰ ﺇﻛﺘﺸﺎﻑ ﺃﻣﺮﻩ ﻭﺃﻥ ﺧﱪﺓ ﺍﻟﻘﺎﺋﻤﲔ ﻋﻠﻰ ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ‬
‫) ‪(1‬‬
‫ﻭﺍﻟﺘﺤﻘﻴﻖ ﻓﻴﻬﺎ ﻻ ﲡﺎﺭﻱ ﺧﱪﺗﻪ‪ ،‬ﺍﻷﻣﺮ ﺍﻟﺬﻱ ﻳﻌﻄﻴﻪ ﺛﻘﺔ ﺃﻛﱪ ﰲ ﺇﺭﺗﻜﺎﺏ ﺍﳌﺰﻳﺪ ﻣﻦ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ‪.‬‬

‫)‪(1‬ﺧﺎﻟﺪ ﻋﻴﺎﺩ ﺍﳊﻠﱯ‪ ،‬ﺇﺟﺮﺍﺀﺍﺕ ﺍﻟﺘﺤﺮﻱ ﻭﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺟﺮﺍﺋﻢ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻷﻧﺘﺮﻧﺎﺕ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.220‬‬

‫‪- 185 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﻟﻘﺪ ﻛﺎﻧﺖ ﻫﺬﻩ ﺍﻟﺘﺤﺪﻳﺎﺕ ﺇﺣﺪﻯ ﺍﳌﺴﺎﺋﻞ ﺍﳍﺎﻣﺔ ﺍﻟﱵ ﻧﺎﻗﺸﺘﻬﺎ ﺍﳌﺆﲤﺮﺍﺕ ﺍﻟﺪﻭﻟﻴﺔ ﻭﻟﻌﻞ ﺃﳘﻬﺎ‬
‫ﻣﺆﲤﺮ ﺍﻷﻧﺘﺮﺑﻮﻝ ﺍﻟﺴﺎﺩﺱ ﳉﺮﺍﺋﻢ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﺬﻱ ﺷﻬﺪﺗﻪ ﺍﻟﻘﺎﻫﺮﺓ ﰲ ﺍﻟﻔﺘﺮﺓ ﻣﺎ ﺑﲔ ‪ 13‬ﺇﱃ‬
‫) ‪(1‬‬
‫‪2005./04/15‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪:‬ﺍﳌﻌﻮﻗﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﲜﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﻭﺇﺟﺮﺍﺀﺍﺕ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ‪:‬‬
‫ﻣﻦ ﺃﻫﻢ ﺍﳌﻌﻮﻗﺎﺕ ﺃﻭ ﺍﻟﺼﻌﻮﺑﺎﺕ ﺍﻟﱵ ﻗﺪ ﺗﻮﺍﺟﻪ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻌﻮﻗﺎﺕ ﺗﺘﻌﻠﻖ ﲜﻬﺎﺕ‬
‫ﺍﻟﺘﺤﻘﻴﻖ ﻭﺇﺟﺮﺍﺀﺍﺕ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ‪ ،‬ﻭﺳﻮﻑ ﳓﺎﻭﻝ ﺃﻥ ﻧﺘﻨﺎﻭﻝ ﺫﻟﻚ ﺑﺸﻴﺊ ﻣﻦ ﺍﻟﺘﻔﺎﺻﻴﻞ ﻋﻠﻰ‬
‫ﺍﻟﻨﺤﻮ ﺍﻟﺘﺎﱄ‪:‬‬
‫ﺃﻭﻻ‪:‬ﺍﳌﻌﻮﻗﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﲜﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ‪ :‬ﺗﺘﻌﻠﻖ ﻫﺬﻩ ﺍﳌﻌﻮﻗﺎﺕ ﺑﺎﻟﻌﺎﻣﻞ ﺍﻟﺒﺸﺮﻱ ﺍﻟﻘﺎﺋﻢ‬
‫ﺑﺎﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻓﺈﺫﺍ ﻛﺎﻧﺖ ﺍﻟﺴﻠﻄﺎﺕ ﺍﻟﻘﺎﺋﻤﺔ ﺑﺎﻟﺘﺤﻘﻴﻖ ﻣﻦ ﺭﺟﺎﻝ ﺍﻟﻀﺒﻄﻴﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ‬
‫ﻭﻗﻀﺎﺓ ﲟﺎ ﳍﺎ ﻣﻦ ﺧﻠﻔﻴﺔ ﻗﺎﻧﻮﻧﻴﺔ ﺗﻠﻌﺐ ﺩﻭﺭﺍ ﻛﺒﲑﺍ ﰲ ﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﺍﺋﻢ ﻭﺍﻟﺒﺤﺚ ﻋﻦ ﻣﺮﺗﻜﺒﻴﻬﺎ ﰲ‬
‫ﺇﻃﺎﺭ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻓﺈﻥ ﻭﻇﻴﻔﺘﻬﺎ ﰲ ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻻ ﺗﺮﻕ ﺇﱃ ﻧﻔﺲ ﺍﻟﺪﺭﺟﺔ‪ ،‬ﺫﻟﻚ‬
‫ﺃﻥ ﺍﻟﻄﺒﻴﻌﺔ ﺍﳋﺎﺻﺔ ﻟﻠﺒﻴﺌﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺍﻟﱵ ﺗﺘﻌﺎﻣﻞ ﻣﻌﻬﺎ ﻓﻀﻼ ﻋﻦ ﺧﺼﻮﺻﻴﺔ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻳﻨﻌﻜﺲ‬
‫ﻋﻠﻰ ﻋﻤﻞ ﺍﳉﻬﺎﺕ ﺍﳌﻜﻠﻔﺔ ﺑﺎﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ‪.‬ﺣﻴﺚ ﻳﺘﻄﻠﺐ ﺍﻟﻜﺸﻒ ﻋﻦ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﺇﻛﺘﺴﺎﺏ‬
‫ﺟﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﻣﻬﺎﺭﺍﺕ ﺧﺎﺻﺔ ﻋﻠﻰ ﳓﻮ ﻳﺴﺎﻋﺪﻫﻢ ﻋﻠﻰ ﻣﻮﺍﺟﻬﺔ ﺍﻟﺘﻘﻨﻴﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪(2)،‬ﺇﺫ ﻳﺮﻯ‬
‫ﺍﳌﺘﺨﺼﺼﻮﻥ ﰲ ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻥ ﺍﻷﻧﻈﻤﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻣﺎ ﻳﻘﻊ ﻋﻠﻴﻬﺎ ﻣﻦ ﺟﺮﺍﺋﻢ ﺗﻌﺪ‬
‫ﲢﺪﻳﺎ ﻫﺎﺋﻼ ﻷﺟﻬﺰﺓ ﺍﻟﻌﺪﺍﻟﺔ ﺍﳉﻨﺎﺋﻴﺔ ﺫﻟﻚ ﺃﻥ ﺭﺟﻞ ﺍﻷﻣﻦ ﻏﲑ ﺍﳌﺘﺨﺼﺺ ﻭﺍﻟﺬﻱ ﺇﳓﺼﺮﺕ ﻣﻌﻠﻮﻣﺎﺗﻪ‬
‫ﰲ ﺟﺮﺍﺋﻢ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﺑﺼﻮﺭﺗﻪ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻣﻦ ﻗﺘﻞ ﻭﺿﺮﺏ ﻭﺳﺮﻗﺔ ﻟﻦ ﻳﻜﻮﻥ ﻗﺎﺩﺭﺍ ﻋﻠﻰ ﺍﻟﺘﻌﺎﻣﻞ‬
‫ﻣﻊ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺍﻟﱵ ﺗﻘﻊ ﺑﻄﺮﻳﻘﺔ ﺗﻘﻨﻴﺔ ﻋﺎﻟﻴﺔ‪.‬‬

‫)‪(1‬ﻧﺎﻗﺶ ﺍﳌﺆﲤﺮ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻟﺘﺤﺪﻳﺎﺕ ﺫﺍﺕ ﺃﳘﻴﺔ ﺑﺎﻟﻐﺔ ﻭﳍﺎ ﺍﻷﺛﺮ ﰲ ﻋﻤﻠﻴﺔ ﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﳝﺔ ﻭﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻭﻣﻦ ﺃﻫﻢ ﻫﺬﻩ ﺍﻟﺘﺤﺪﻳﺎﺕ‪:‬‬
‫‪-‬ﺍﻟﺘﺤﺪﻱ ﺍﻷﻭﻝ‪ :‬ﻭﻳﺘﻤﺜﻞ ﰲ ﺇﻧﺘﺸﺎﺭ ﻣﻘﺎﻫﻲ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻭﺍﻟﱵ ﻳﺴﺘﻄﻴﻊ ﺃﻱ ﻓﺮﺩ ﻣﻦ ﺧﻼﳍﺎ ﺃﻥ ﻳﺘﻌﺎﻣﻞ ﻣﻊ ﺷﺒﻜﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ ﲟﺎ ﻓﻴﻪ ﺍ‪‬ﺮﻡ ﺍﻟﺬﻱ ﻳﺴﺘﺨﺪﻣﻬﺎ‬
‫ﻹﺭﺗﻜﺎﺏ ﺟﺮﺍﺋﻤﻪ ﻭﻫﻮ ﻣﺎ ﻳﺆﺩﻱ ﺇﱃ ﺻﻌﻮﺑﺔ ﺍﻟﺘﻮﺻﻞ ﺇﱃ ﻣﺮﺗﻜﺒﻬﺎ ﻧﻈﺮﺍ ﻹﻣﻜﺎﻧﻴﺔ ﺗﻨﻘﻞ ﺍ‪‬ﺮﻡ ﺑﲔ ﺃﻛﺜﺮ ﻣﻦ ﻣﻘﻬﻰ ﺧﻼﻝ ﺍﻟﻴﻮﻡ ﺍﻟﻮﺍﺣﺪ ﳑﺎ ﻳﺆﺩﻱ ﺇﱃ‬
‫ﺻﻌﻮﺑﺔ ﺍﻟﺘﻮﺻﻞ ﺑﺼﻮﺭﺓ ﺩﻭﺭﻳﺔ ﻷﺩﻟﺔ ﺍﻹﺛﺒﺎﺕ ﻟﻘﻴﺎﻡ ﺗﻠﻚ ﺍﳌﻘﺎﻫﻲ ﺑﺈﻋﺎﺩﺓ ﺗﺸﻜﻴﻞ ﺗﻠﻚ ﺍﻷﺟﻬﺰﺓ‪.‬‬
‫‪-‬ﺍﻟﺘﺤﺪﻱ ﺍﻟﺜﺎﱐ ﻳﺘﻤﺜﻞ ﰲ ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻓﺎﺋﻖ ﺍﻟﺴﺮﻋﺔ )‪(A.D.S.L‬ﻭﺍﻟﺬﻱ ﱂ ﻳﺴﻠﻢ ﻫﻮ ﺍﻵﺧﺮ ﻣﻦ ﻳﺪ ﺍ‪‬ﺮﻣﲔ ﺇﺫﺍ ﺇﺳﺘﺨﺪﻣﻮﻩ ﻟﺘﻨﻔﻴﺬ ﳐﻄﻄﺎ‪‬ﻢ‬
‫ﺍﻹﺟﺮﺍﻣﻴﺔ ﻭﺫﻟﻚ ﻋﻦ ﻃﺮﻳﻖ ﺇﺷﺘﺮﺍﻛﻬﻢ ﺇﱃ ﺟﺎﻧﺐ ﺃﺷﺨﺎﺹ ﺁﺧﺮﻳﻦ ﰲ ﺟﻬﺎﺯ ﻭﺍﺣﺪ ﻋﻦ ﻃﺮﻳﻖ ﻣﻮﺯﻉ ﺧﻄﻮﻁ ﳑﺎ ﻳﺆﺩﻱ ﺇﱃ ﺻﻌﻮﺑﺔ ﺍﻟﺘﻮﺻﻞ ﺇﻟﻴﻬﻢ‪.‬‬
‫‪-‬ﺍﻟﺘﺤﺪﻱ ﺍﻟﺜﺎﻟﺚ‪ :‬ﻭﻳﺘﻤﺜﻞ ﰲ ﻋﻤﻠﻴﺎﺕ ﺍﻟﺘﺨﻔﻲ )‪ (Proxy‬ﺃﺛﻨﺎﺀ ﺍﻟﺘﺠﻮﺍﻝ ﻋﱪ ﺍﻟﺸﺒﻜﺔ ﺍﻟﱵ ﺗﺆﻣﻨﻬﺎ ﺑﻌﺾ ﺍﳌﻮﺍﻗﻊ ﻭﺍﻟﱵ ﺇﺳﺘﻐﻠﺖ ﻣﻦ ﻃﺮﻑ ﺍﻟﻘﺮﺍﺻﻨﺔ‬
‫ﻓﻤﺼﻤﻤﻲ ﺍﻟﻔﲑﻭﺳﺎﺕ ﺍﳌﺪﻣﺮﺓ ﻳﻘﻮﻣﻮﻥ ﺑﺈﻃﻼﻕ ﻓﲑﻭﺳﺎ‪‬ﻢ ﻋﱪ ﺗﻠﻚ ﺍﳌﻮﺍﻗﻊ‪.‬‬
‫)‪(2‬ﺭﺷﻴﺪﺓ ﺑﻮﻛﺮ‪،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ ﺹ‪.461‬‬

‫‪- 186 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻓﻨﻘﺺ ﺍﳌﻬﺎﺭﺓ ﺍﻟﻔﻨﻴﺔ ﰲ ﺇﺳﺘﺨﺪﺍﻡ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﻭﺍﻷﻧﺘﺮﻧﺎﺕ ﻭﻋﺪﻡ ﺗﻮﻓﺮ ﺍﳌﻌﺮﻓﺔ ﺑﺄﺳﺎﻟﻴﺐ ﺇﺭﺗﻜﺎﺏ‬
‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻗﻠﺔ ﺍﳋﱪﺓ ﰲ ﳎﺎﻝ ﺍﻟﺘﺤﻘﻴﻖ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺟﺮﺍﺋﻢ ﺍﻟﻌﺎﱂ ﺍﻹﻓﺘﺮﺍﺿﻲ‪ ،‬ﻋﻮﺍﻣﻞ ﻣﻦ‬
‫ﺷﺄ‪‬ﺎ ﺃﻥ ﺗﻀﻌﻒ ﺩﻭﺭ ﺍﻷﺟﻬﺰﺓ ﺍﳌﺨﺘﺼﺔ ﺑﺎﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﺍﺋﻢ ﻭﻛﺸﻒ ﺍﻟﻨﻘﺎﺏ ﻋﻨﻬﺎ‪ ،‬ﻭﻟﻴﺲ ﻫﺬﺍ‬
‫ﻓﺤﺴﺐ ﻓﺈﻥ ﻣﻦ ﺍﳌﺴﺎﺋﻞ ﺍﻟﱵ ﺗﺸﻜﻞ ﻋﻘﺒﺔ ﺃﻣﺎﻡ ﺳﻠﻄﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﻣﺴﺄﻟﺔ ﻛﻴﻔﻴﺔ ﺍﻟﺘﻌﺎﻣﻞ ﻭﺍﳊﻔﺎﻅ ﻋﻠﻰ‬
‫) ‪(1‬‬
‫ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺍﻟﱵ ﻣﻜﻤﻨﻬﺎ ﺍﳊﻮﺍﺳﻴﺐ ﻭﺍﳋﻮﺍﺩﻡ ﻭﺍﳌﻀﻴﻔﺎﺕ ﻭﺍﻟﺸﺒﻜﺎﺕ‪.‬‬
‫ﻷﺟﻞ ﺫﻟﻚ ﺑﺪﺃﺕ ﺑﻌﺾ ﺍﻷﺟﻬﺰﺓ ﺍﻷﻣﻨﻴﺔ ﻭﺍﻟﻘﻀﺎﺋﻴﺔ ﰲ ﺇﺳﺘﻘﻄﺎﺏ ﺍﳌﺘﺨﺼﺼﲔ ﰲ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ‬
‫ﻟﻴﻜﻮﻧﻮﺍ ﺿﻤﻦ ﻛﻮﺍﺩﺭﻫﺎ‪ ،‬ﻛﻤﺎ ﳚﺮﻱ ﺗﺪﺭﻳﺐ ﺭﺟﺎﻝ ﺍﻟﻀﺒﻄﻴﺔ ﻭﺍﻟﻘﻀﺎﺓ ﻋﻠﻰ ﺇﺳﺘﺨﺪﺍﻡ ﺍﳊﻮﺍﺳﻴﺐ‬
‫ﻭﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﻭﻋﻠﻰ ﺍﻟﺮﻏﻢ ﻣﻦ ﺫﻟﻚ ﻓﻘﺪ ﺗﻜﻮﻥ ﺗﻠﻚ ﺍﻷﺟﻬﺰﺓ ﻏﲑ ﻗﺎﺩﺭﺓ ﻋﻠﻰ ﻣﻮﺍﻛﺒﺔ‬
‫ﺍﻟﺘﻄﻮﺭ ﺍﻟﺴﺮﻳﻊ ﰲ ﳎﺎﻝ ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ)‪(2‬ﻟﻌﺪﺓ ﺃﺳﺒﺎﺏ ﺃﳘﻬﺎ‪ ،‬ﺃﻥ ﺗﻜﻮﻥ ﺃﻣﺎﻡ ﺃﺟﻬﺰﺓ ﺍﻟﺸﺮﻃﺔ‬
‫ﻭﺍﻟﻘﻀﺎﺀ ﳎﺎﻻﺕ ﻣﺘﻨﻮﻋﺔ ﺃﺧﺮﻯ ﻳﻨﺒﻐﻲ ﺗﻐﻄﻴﺘﻬﺎ ﻓﻬﻲ ﻟﻴﺴﺖ ﻣﺘﻔﺮﻏﺔ ﲤﺎﻣﺎ ﻟﻠﺠﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺣﺪﻫﺎ‪.‬‬
‫ﺇﺯﺍﺀ ﺫﻟﻚ ﻳﺮﻯ ﺍﻟﺒﻌﺾ ﺃﻧﻪ ﻣﻦ ﺍﳌﺴﺘﺤﺴﻦ ﺃﻥ ﺗﻮﻛﻞ ﻣﻬﻤﺔ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‬
‫ﺇﱃ ﺟﻬﺎﺕ ﻣﺘﺨﺼﺼﺔ ﰲ ﻫﺬﺍ ﺍ‪‬ﺎﻝ ﺳﻴﻤﺎ ﻣﻊ ﻭﺟﻮﺩ ﺷﺮﻛﺎﺕ ﻋﺎﳌﻴﺔ ﻣﺘﺨﺼﺼﺔ ﰲ ﲢﻘﻴﻖ ﺍﳉﺮﺍﺋﻢ‬
‫) ‪(3‬‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺣﻘﻘﺖ ﺍﻟﻨﺠﺎﺡ ﰲ ﻛﺜﲑ ﻣﻦ ﺍﳊﺎﻻﺕ‪.‬‬
‫ﺇﻻ ﺃﻥ ﻫﺬﺍ ﺍﻟﺮﺃﻱ ﱂ ﻳﻠﻖ ﺍﻟﻘﺒﻮﻝ ﻟﺪﻯ ﺍﻟﻜﺜﲑ ﻣﻦ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺫﻟﻚ ﺃﻥ ﻣﺘﻄﻠﺒﺎﺕ ﺍﻟﻌﺪﺍﻟﺔ‬
‫ﺍﳉﻨﺎﺋﻴﺔ ﺗﻘﺘﻀﻲ ﲢﻤﻞ ﺍﻷﺟﻬﺰﺓ ﺍﻷﻣﻨﻴﺔ ﺍﳊﻜﻮﻣﻴﺔ ﻛﺎﻣﻞ ﺍﳌﺴﺆﻭﻟﻴﺔ ﲡﺎﻩ ﺇﻛﺘﺸﺎﻑ ﻛﺎﻓﺔ ﺍﳉﺮﺍﺋﻢ ﻭﻣﻦ‬
‫ﺑﻴﻨﻬﺎ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﰲ ﻫﺬﺍ ﺍﻟﺼﺪﺩ ﺃﻟﺰﻣﺖ ﺍﻹﺗﻔﺎﻗﻴﺔ ﺍﻷﺭﻭﺑﻴﺔ ﳉﺮﺍﺋﻢ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﺪﻭﻝ‬
‫ﺍﻷﻃﺮﺍﻑ ﺑﻀﺮﻭﺭﺓ ﺗﺒﲏ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﻟﺘﺸﺮﻳﻌﻴﺔ ﺃﻭ ﺃﻳﺔ ﺇﺟﺮﺍﺀﺍﺕ ﺃﺧﺮﻯ ﺗﺮﻯ ﺃ‪‬ﺎ ﺿﺮﻭﺭﻳﺔ ﻭﻓﻘﺎ ﻟﻘﺎﻧﻮ‪‬ﺎ‬
‫ﺍﻟﺪﺍﺧﻠﻲ ﻣﻦ ﺃﺟﻞ ﺇﻧﺸﺎﺀ ﻭﺗﺄﺳﻴﺲ ﺳﻠﻄﺎﺕ ﳐﺘﺼﺔ ﰲ ﳎﺎﻝ ﺍﻟﺘﻨﻘﻴﺒﺎﺕ ﻭﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﻨﺎﺋﻴﺔ ﺍﻟﻨﻮﻋﻴﺔ ﰲ‬
‫) ‪(4‬‬
‫ﳎﺎﻝ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬

‫)‪(1‬ﻭﺿﺮﺏ ﺍﳌﺜﺎﻝ ﻋﻠﻰ ﺫﻟﻚ ﻗﻴﺎﻡ ﺭﺟﺎﻝ ﺍﻟﺸﺮﻃﺔ ﺑﻮﺿﻊ ﺣﻘﻴﺒﺔ ﻛﺎﻣﻠﺔ ﲢﺘﻮﻱ ﻋﻠﻰ ﺃﺳﻄﻮﺍﻧﺎﺕ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﺍﳌﺼﺎﺩﺭﺓ ﰲ ﺻﻨﺪﻭﻕ ﺍﻟﺴﻴﺎﺭﺓ ﺑﺎﻟﻘﺮﺏ ﻣﻦ‬
‫ﺟﻬﺎﺯ ﺍﻹﺭﺳﺎﻝ ﻭﺍﻹﺳﺘﻘﺒﺎﻝ ﺍﻟﻼﺳﻠﻜﻲ ﻓﻜﺎﻧﺖ ﺍﻟﻨﺘﻴﺠﺔ ﺃﻥ ﺍﻹﺷﺎﺭﺍﺕ ﺍﻟﻜﻬﺮﺑﺎﺋﻴﺔ ﺍﻟﻘﻮﻳﺔ ﺗﺴﺒﺒﺖ ﰲ ﺗﺪﻣﲑﻫﺎ ﲨﻴﻌﺎ‪.‬‬
‫)‪(2‬ﳏﻤﺪ ﺃﻣﲔ ﺍﻟﺒﺸﺮﻱ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﲝﺚ ﻣﻘﺪﻡ ﳌﺆﲤﺮ ﺍﻟﻘﺎﻧﻮﻥ ﻭﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﻭﺍﻷﻧﺘﺮﻧﺎﺕ ﻛﻠﻴﺔ ﺍﻟﺸﺮﻳﻌﺔ ﻭﺍﻟﻘﺎﻧﻮﻥ ﲜﺎﻣﻌﺔ ﺍﻹﻣﺎﺭﺍﺕ‬
‫ﺍﻟﻌﺮﺑﻴﺔ ﺍﳌﺘﺤﺪﺓ ‪ 2000/05/03‬ﺍﻟﻄﺒﻌﺔ ﺍﻟﺜﺎﻟﺜﺔ ‪ ،2004‬ﺹ‪.107‬‬
‫)‪(3‬ﻣﺸﺎﺭ ﺇﻟﻴﺪ ﻟﺪﻯ ﺧﺎﻟﺪ ﳑﺪﻭﺡ ﺇﺑﺮﺍﻫﻴﻢ ‪،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.81‬‬
‫)‪(4‬ﰎ ﺍﻹﺷﺎﺭﺓ ﺇﱃ ﻫﺬﺍ ﺍﳌﻮﺿﻮﻉ ﰲ ﺍﳌﺆﲤﺮ ﺍﻟﺪﻭﱄ ﺑﻌﻨﻮﺍﻥ ﺍﻟﺸﺮﻃﺔ ﻭﺍﻷﻧﺘﺮﻧﺎﺕ ﺍﳌﻨﻌﻘﺪ ﲜﺎﻣﻌﺔ ﺍﻟﺴﺮﺑﻮﻥ ﺑﺎﺭﻳﺲ ﰲ ‪ 2005/01/14‬ﻭﻛﺬﺍ ﺍﳌﺆﲤﺮ ﺍﻟﺪﻭﱄ‬
‫ﺍﻟﺴﺎﺩﺱ ﺑﺸﺄﻥ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﳌﻨﻌﻘﺪ ﺑﺎﻟﻘﺎﻫﺮﺓ ﰲ ﺍﻟﻔﺘﺮﺓ ﻣﻦ ‪ 13‬ﺇﱃ ‪.2005/04/15‬‬

‫‪- 187 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﻗﺪ ﺑﺎﺩﺭﺕ ﳐﺘﻠﻒ ﺍﻟﺪﻭﻝ ﺇﱃ ﺇﻧﺸﺎﺀ ﻭﺣﺪﺍﺕ ﻣﺘﺨﺼﺼﺔ ﰲ ﳎﺎﻝ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺩﺍﺧﻞ ﺍﻷﺟﻬﺰﺓ ﺍﳊﻜﻮﻣﻴﺔ )ﺍﻟﻀﺒﻄﻴﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ()‪(1‬ﻓﻔﻲ ﻓﺮﻧﺴﺎ ﻣﺜﻼ ﻗﺎﻣﺖ ﺑﺈﻧﺸﺎﺀ ﻋﺪﺓ‬
‫ﻭﺣﺪﺍﺕ ﻣﺘﺨﺼﺼﺔ ﻭﻏﲑ ﻣﺘﺨﺼﺼﺔ ﺿﻤﻦ ﺟﻬﺎﺯﻱ ﺍﻟﺸﺮﻃﺔ ﻭﺍﻟﺪﺭﻙ ﳌﻜﺎﻓﺤﺔ ﻫﺬﺍ ﺍﻹﺟﺮﺍﻡ‬
‫ﺍﳌﺴﺘﺤﺪﺙ ﲜﻤﻴﻊ ﺻﻮﺭﻩ ﻭﻣﻦ ﺫﻟﻚ ﺍﳌﻜﺘﺐ ﺍﳌﺮﻛﺰﻱ ﳌﻜﺎﻓﺤﺔ ﺍﻹﺟﺮﺍﻡ ﺍﳌﺮﺗﺒﻂ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ‬
‫ﻭﺍﻹﺗﺼﺎﻻﺕ)‪ (OCLTIC)(2‬ﻭﺍﻟﺬﻱ ﻣﻦ ﺑﲔ ﺃﻫﻢ ﻣﻬﺎﻣﻪ ﺗﻘﺪﱘ ﺍﳌﺴﺎﻋﺪﺓ ﺍﻟﺘﻘﻨﻴﺔ ﳉﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ‬
‫ﻭﺗﻨﺴﻴﻖ ﺍﻷﻋﻤﺎﻝ ﺍﻟﺘﺤﻀﲑﻳﺔ ﺍﻟﻼﺯﻣﺔ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻟﻮﻃﲏ‪ ،‬ﻭﻳﺸﺎﺭﻙ ﰲ ﻧﺸﺎﻃﺎﺕ ﺍﳌﻨﻈﻤﺎﺕ ﺍﻟﺪﻭﻟﻴﺔ‬
‫ﻭﳛﺎﻓﻆ ﻋﻠﻰ ﺍﻟﺮﻭﺍﺑﻂ ﺍﻟﻌﻤﻠﻴﺔ ﺑﲔ ﺍﳌﺼﺎﱀ ﺍﳌﺘﺨﺼﺼﺔ ﰲ ﺍﻟﺒﻠﺪﺍﻥ ﺍﻷﺧﺮﻯ ﺍﻟﱵ ﺗﺴﻬﺮ ﻋﻠﻰ ﻣﻜﺎﻓﺤﺔ‬
‫ﺟﺮﺍﺋﻢ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﺼﻔﺔ ﻋﺎﻣﺔ ﻭﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﺗﺴﺘﻬﺪﻑ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﳌﻌﻄﻴﺎﺕ ﺑﺼﻔﺔ‬
‫ﺧﺎﺻﺔ‪.‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﻗﺴﻢ ﺍﻷﻧﺘﺮﻧﺎﺕ ﺍﻟﺘﺎﺑﻊ ﻟﻠﻤﺼﻠﺤﺔ ﺍﻟﺘﻘﻨﻴﺔ ﻟﻠﺒﺤﻮﺙ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻭﺍﻟﻮﺛﺎﺋﻘﻴﺔ ﺍﳌﻌﺮﻭﻑ‬
‫ﺇﺧﺘﺼﺎﺭﺍ )‪ ،(STRTD‬ﻭﺍﻟﻘﺴﻢ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﻟﺘﺎﺑﻊ ﳌﻌﻬﺪ ﺍﻟﺒﺤﻮﺙ ﺍﳉﺰﺍﺋﻴﺔ ﺍﻟﺘﺎﺑﻊ ﻟﻠﺪﺭﻙ ﺍﻟﻮﻃﲏ‬
‫ﺍﳌﻌﺮﻭﻑ ﺇﺧﺘﺼﺎﺭﺍ ﺑـ )‪ (IRCGN‬ﻭﻛﺬﺍ ﻭﺣﺪﺍﺕ ﺃﻗﺴﺎﻡ ﺍﻹﺳﺘﻌﻼﻣﺎﺕ ﻭﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ‬
‫) ‪(3‬‬
‫ﺍﳌﻌﺮﻑ ﺇﺧﺘﺼﺎﺭﺍ ﺑـ )‪.(BDRIJ‬‬
‫ﻭﰲ ﺍﳉﺰﺍﺋﺮﻓﺈﻧﻪ ﻭﺑﺎﻻﺿﺎﻓﺔ ﺍﱃ ﻣﺼﺎﱀ ﺍﻟﻀﺒﻄﻴﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﻟﺘﺎﺑﻌﺔ ﻟﻠﺸﺮﻃﺔ ﺃﻭ ﺍﻟﺪﺭﻙ ﻓﺈﻧﻪ‬
‫ﻭﲟﻮﺟﺐ ﺍﳌﺮﺳﻮﻡ ﺍﻟﺮﺋﺎﺳﻲ ﺭﻗﻢ ‪ 183/04‬ﺍﳌﺆﺭﺥ ﰲ ‪ 2004/06/26‬ﰎ ﺇﺣﺪﺍﺙ ﺍﳌﻌﻬﺪ ﺍﻟﻮﻃﲏ ﻟﻸﺩﻟﺔ‬
‫ﺍﳉﻨﺎﺋﻴﺔ ﻭﻋﻠﻢ ﺍﻻﺟﺮﺍﻡ ﲢﺖ ﻭﺻﺎﻳﺔ ﺍﻟﻘﻴﺎﺩﺓ ﺍﻟﻌﺎﻣﺔ ﻟﻠﺪﺭﻙ ﺍﻟﻮﻃﲏ‪ ،‬ﺣﻴﺚ ﺗﻨﺺ ﺍﳌﺎﺩﺓ ﺍﻟﺜﺎﻧﻴﺔ ﻣﻦ ﻫﺬﺍ‬
‫ﺍﳌﺮﺳﻮﻡ ﺃﻧﻪ ﻳﻜﻠﻒ ﻫﺬﺍ ﺍﳌﻌﻬﺪ ﺑﺈﺟﺮﺍﺀ ﺍﳋﱪﺍﺕ ﻭ ﺍﻟﻔﺤﻮﺹ ﺍﻟﻌﻠﻤﻴﺔ ﰲ ﺇﻃﺎﺭ ﺍﻟﺘﺤﺮﻳﺎﺕ ﺍﻷﻭﻟﻴﺔ ﻭ‬
‫ﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺑﻐﺮﺽ ﺇﻗﺎﻣﺔ ﺍﻷﺩﻟﺔ ﺍﻟﱵ ﺗﺴﻤﺢ ﺑﺎﻟﺘﻌﺮﻑ ﻋﻠﻰ ﻣﺮﺗﻜﱯ ﺍﳉﻨﺎﻳﺎﺕ ﻭ ﺍﳉﻨﺢ‪ ،‬ﻭﺫﻟﻚ‬
‫ﺑﻨﺎﺀ ﻋﻠﻰ ﻃﻠﺐ ﻣﻦ ﺍﻟﻘﻀﺎﺓ ﺃﻭ ﺍﶈﻘﻘﲔ ﺃﻭ ﺍﻟﺴﻠﻄﺎﺕ ﺍﳌﺆﻫﻠﺔ‪ ،‬ﻭﳛﺘﻮﻱ ﻫﺬﺍ ﺍﳌﻌﻬﺪ ﻋﻠﻰ ﻗﺴﻢ ﺍﻹﻋﻼﻡ‬

‫)‪(1‬ﰲ ﺍﻟﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ ﺍﻷﻣﺮﻳﻜﻴﺔ ﰎ ﺇﻧﺸﺎﺀ ﺩﺍﺧﻞ ﻣﻜﺘﺐ ﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﺍﻟﻔﺪﺭﺍﱄ)‪ (FBI‬ﺇﺩﺍﺭﺓ ﻣﺘﺨﺼﺼﺔ ﳌﺘﺎﺑﻌﺔ ﺟﺮﺍﺋﻢ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﰲ ﺇﺳﺒﺎﻧﻴﺎ‬
‫ﺃﻧﺸﺄﺕ ﻋﻠﻰ ﻣﺴﺘﻮﻯ ﺍﻹﺩﺍﺭﺓ ﺍﳌﺮﻛﺰﻳﺔ ﻟﻮﺯﺍﺭﺓ ﺍﻟﺪﺍﺧﻠﻴﺔ ﺍﻹﺳﺒﺎﻧﻴﺔ ﻭﺣﺪﺓ ﺍﻟﺘﺤﺮﻳﺎﺕ ﺍﳌﺮﻛﺰﻳﺔ ﺍﳌﻌﻨﻴﺔ ﲟﻌﻠﻮﻣﺎﺕ ﺟﺮﺍﺋﻢ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﰲ ﻣﺼﺮ ﺃﻧﺸﺄﺕ‬
‫ﻋﻠﻰ ﻣﺴﺘﻮﻯ ﻭﺯﺍﺭﺓ ﺍﻟﺪﺍﺧﻠﻴﺔ ﺇﺩﺍﺭﺓ ﻣﻜﺎﻓﺤﺔ ﺟﺮﺍﺋﻢ ﺍﳊﺎﺳﺒﺎﺕ ﻭﺷﺒﻜﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﰲ ﺍﻷﺭﺩﻥ ﰎ ﺇﻧﺸﺎﺀ ﻋﻠﻰ ﻣﺴﺘﻮﻯ ﻣﺪﻳﺮﻳﺔ ﺍﻷﻣﻦ ﺍﻟﻌﺎﻡ ﻗﺴﻢ ﺧﺎﺹ‬
‫ﲜﺮﺍﺋﻢ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻳﺘﻮﱃ ﺇﺟﺮﺍﺀﺍﺕ ﺍﻟﺘﺤﻘﻴﻖ ﻭﺍﻹﺳﺘﺪﻻﻝ ﰲ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ‪.‬‬
‫)‪(2‬ﰎ ﺇﻧﺸﺎﺅﻩ ﲟﻮﺟﺐ ﻣﺮﺳﻮﻡ ﻭﺯﺍﺭﻱ ﻣﺸﺘﺮﻙ ﺭﻗﻢ )‪ (405/2000‬ﻣﺆﺭﺥ ﰲ ‪ 2000/05/15‬ﻋﻠﻰ ﻣﺴﺘﻮﻯ ﺍﳌﺪﻳﺮﻳﺔ ﺍﳌﺮﻛﺰﻳﺔ ﻟﻠﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ‬
‫ﺑﻮﺯﺍﺭﺓ ﺍﻟﺪﺍﺧﻠﻴﺔ‪.‬‬
‫‪L’ocltic est une structure mixte interministérielle centralisée et opérationelle en‬‬
‫‪matiére de cybercriminalité a compitence nationale et composé de policiers et de gendarmes agissant‬‬
‫‪ensemble dans la lutte contre cybercriminlité. vore plus myriam QUEMENER et joel FERRY cy‬‬
‫‪bercri minalité défi mondial 2 edition 2009p214.‬‬
‫)‪(3‬ﺍﳌﺰﻳﺪ ﻣﻦ ﺍﻟﺘﻔﺎﺻﻴﻞ ﺣﻮﻝ ﻫﺬﻩ ﺍﻷﺟﻬﺰﺓ ﺃﻧﻈﺮ‪Myriam QUEMENER:‬‬

‫‪- 188 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﻵﱄ ﳜﺘﺺ ﺑﺎﻟﺘﺤﻘﻴﻖ ﻗﻲ ﻛﻞ ﻣﺎ ﻳﺘﺼﻞ ﺑﺎﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺇﱃ ﺟﺎﻧﺒﻪ ﻳﻮﺟﺪﻣﺮﻛﺰ ﺍﻟﻮﻗﺎﻳﺔ ﻣﻦ‬
‫ﺟﺮﺍﺋﻢ ﺍﻹﻋﻼﻡ ﺍﻵﱄ ﻭ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔﺗﺎﺑﻊ ﺃﻳﻀﺎ ﻟﻘﻴﺎﺩﺓ ﺍﻟﺪﺭﻙ ﺍﻟﻮﻃﲏ ﻭﻫﻮ ﻗﻴﺪ ﺍﻹﻧﺸﺎﺀ‪ ،‬ﺃﻣﺎ ﻋﻠﻰ‬
‫ﻣﺴﺘﻮﻯ ﺍﳌﺪﻳﺮﻳﺔ ﺍﻟﻌﺎﻣﺔ ﻟﻸﻣﻦ ﺍﻟﻮﻃﲏ ﻓﺘﻮﺟﺪ ﳐﺎﺑﺮ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻌﻠﻤﻴﺔ ﺍﻟﺘﺎﺑﻌﺔ ﳌﺪﻳﺮﻳﺔ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ‪،‬‬
‫ﻭﻣﻦ ﺍﻟﻔﺮﻭﻉ ﺍﻟﺘﻘﻨﻴﺔ ﺍﻟﱵ ﺗﻀﻤﻬﺎ ﻫﺬﻩ ﺍﳌﺨﺎﺑﺮ‪ ،‬ﺧﻠﻴﺔ ﺍﻹﻋﻼﻡ ﺍﻵﱄ ﻭﺍﻟﱵ ﲣﺘﺺ ﺑﺎﻟﺘﺤﻘﻴﻖ ﰲ ﻛﻞ ﻣﺎ‬
‫ﻳﺘﺼﻞ ﺑﺎﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﻨﺎﺀ ﻋﻠﻰ ﺗﺴﺨﲑﺍﺕ ﺃﻭ ﺇﻧﺎﺑﺎﺕ ﻗﻀﺎﺋﻴﺔ‪ .‬ﻭﺣﱴ ﺗﻜﺘﻤﻞ ﻗﺪﺭﺍﺕ ﺗﻠﻚ‬
‫ﺍﻷﺟﻬﺰﺓ ﰲ ﻫﺬﺍ ﺍ‪‬ﺎﻝ ﻓﻘﺪ ﰎ ﺇﻧﺸﺎﺀ ﺍﳍﻴﺄﺓ ﺍﻟﻮﻃﻨﻴﺔ ﻟﻠﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ‬
‫ﻭﺍﻹﺗﺼﺎﻝ ﻭﻣﻜﺎﻓﺤﺘﻪ‪ ،‬ﺗﺘﻮﱃ ﻫﺬﻩ ﺍﳍﻴﺄﺓ ﺧﺼﻮﺻﺎ ﺗﻨﺸﻴﻂ ﻭﺗﻨﺴﻴﻖ ﻋﻤﻠﻴﺎﺕ ﺍﻟﻮﻗﺎﻳﺔ ﻣﻦ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ‬
‫ﺍﳉﺮﺍﺋﻢ ﻭﺗﻌﻤﻞ ﻋﻠﻰ ﺗﻘﺪﱘ ﺍﳌﺴﺎﻋﺪﺓ ﻟﻠﺴﻠﻄﺎﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻭﻣﺼﺎﱀ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﰲ ﺍﻟﺘﺤﺮﻳﺎﺕ ﺍﻟﱵ‬
‫ﲡﺮﻳﻬﺎ ﺑﺸﺄﻥ ﺍﳉﺮﺍﺋﻢ ﺫﺍﺕ ﺍﻟﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭﺍﻹﺗﺼﺎﻝ‪ ،‬ﲟﺎ ﰲ ﺫﻟﻚ ﲡﻤﻴﻊ ﺍﳌﻌﻠﻮﻣﺎﺕ‬
‫ﻭﺇﳒﺎﺯ ﺍﳋﱪﺍﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻛﻤﺎ ﻳﻮﻛﻞ ﳍﺬﻩ ﺍﳍﻴﺄﺓ ﻋﻤﻠﻴﺔ ﺗﺒﺎﺩﻝ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻣﻊ ﻧﻈﲑﺍ‪‬ﺎ ﰲ ﺍﳋﺎﺭﺝ ﻗﺼﺪ‬
‫ﲨﻊ ﻛﻞ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﻔﻴﺪﺓ ﰲ ﺍﻟﺘﻌﺮﻑ ﻋﻠﻰ ﻣﺮﺗﻜﱯ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﻹﻋﻼﻡ ﻭﺍﻹﺗﺼﺎﻝ‬
‫) ‪(1‬‬
‫ﻭﻣﻜﺎﻥ ﺗﻮﺍﺟﺪﻫﻢ‪.‬‬
‫ﻭﰲ ﺇﻃﺎﺭ ﳏﺎﻭﻟﺔ ﺍﻟﺘﻐﻠﺐ ﻋﻠﻰ ﺍﳌﻌﻮﻗﺎﺕ ﻭﺍﻟﺼﻌﻮﺑﺎﺕ ﺍﻟﱵ ﺗﻮﺍﺟﻪ ﺟﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﳎﺎﻝ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻓﺈﻧﻪ ﻣﻦ ﻏﲑ ﺍﻟﻜﺎﰲ ﺃﻥ ﻳﺘﻢ ﺇﻧﺸﺎﺀ ﺃﺟﻬﺰﺓ ﻓﻨﻴﺔ ﻣﺘﺨﺼﺼﺔ‪ ،‬ﺑﻞ ﻻﺑﺪ ﻣﻦ ﺇﺗﺒﺎﻉ ﺫﻟﻚ ﺑﺘﻮﻓﲑ‬
‫ﺇﺳﺘﺮﺍﺗﻴﺠﻴﺔ ﺗﺪﺭﻳﺒﻴﺔ ﻭﺗﻜﻮﻳﻦ ﻣﺘﻌﻤﻖ ﰲ ﻣﻴﺪﺍﻥ ﺗﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭﺍﻹﺗﺼﺎﻝ ﺍﻟﻌﺎﻣﻠﲔ ﰲ ﳎﺎﻝ‬
‫ﺍﻟﻌﺪﺍﻟﺔ ﺍﳉﺰﺍﺋﻴﺔ ﺑﺼﻔﺔ ﻋﺎﻣﺔ‪.‬‬
‫ﺛﺎﻧﻴﺎ‪ :‬ﺍﳌﻌﻮﻗﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺈﺟﺮﺍﺀﺍﺕ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ‪:‬ﺇﺫﺍ ﻛﺎﻥ ﻣﻦ ﺍﻟﺴﻬﻞ ﻋﻠﻰ ﺟﻬﺎﺕ‬
‫ﺍﻟﺘﺤﺮﻱ ﻭﺍﻟﺘﺤﻘﻴﻖ ﺃﻥ ﺗﺘﺤﺮﻯ ﻋﻦ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻋﻦ ﻃﺮﻳﻖ ﺍﳌﺸﺎﻫﺪﺓ ﺃﻭ ﺍﻟﺘﺘﺒﻊ ﺃﻭ ﲰﺎﻉ‬
‫ﺍﻟﺸﻬﻮﺩ‪ ،‬ﻓﺈﻧﻪ ﻗﺪ ﻳﺼﻌﺐ ﻋﻠﻴﻬﺎ ﺫﻟﻚ ‪‬ﺬﻩ ﺍﻟﻄﺮﻕ ﺑﺎﻟﻨﺴﺒﺔ ﻟﻠﺠﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﱵ ﺗﺮﺗﻜﺐ‬
‫ﺑﺎﻟﻮﺳﺎﺋﻞ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪(2)،‬ﻭﻫﺬﺍ ﺭﺍﺟﻊ ﺇﱃ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺍﻟﱵ ﻳﺘﻜﻮﻥ ﻣﻨﻬﺎ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺘﻘﲏ ﺳﻮﺍﺀ ﻣﻦ‬
‫ﺣﻴﺚ ﻛﻮﻧﻪ ﻏﲑ ﻣﺮﺋﻲ ﰲ ﺷﻜﻞ ﻧﺒﻀﺎﺕ ﻣﻐﻨﺎﻃﻴﺴﻴﺔ ﺃﻭ ﻛﻬﺮﺑﺎﺋﻴﺔ ﻻ ﻳﺪﺭﻛﻬﺎ ﺍﻟﺮﺟﻞ ﺍﻟﻌﺎﺩﻱ‬
‫ﺑﺎﳊﻮﺍﺱ ﺍﻟﻄﺒﻴﻌﻴﺔ‪ ،‬ﺃﻭ ﻣﻦ ﺣﻴﺚ ﺗﻮﺍﺟﺪﻩ ﰲ ﺍﻟﻌﺎﱂ ﺍﻹﻓﺘﺮﺍﺿﻲ ﻋﻠﻰ ﺍﻟﻜﻴﻔﻴﺔ ﺍﳌﻌﻨﻮﻳﺔ ﻏﲑ ﺍﳌﻠﻤﻮﺳﺔ‬
‫ﺿﻤﻦ ﻣﻜﻮﻥ ﺭﻗﻤﻲ ﰲ ﺷﻜﻞ ﳐﺘﻠﻂ ﻭﺫﻟﻚ ﻧﺘﻴﺠﺔ ﻟﻌﺪﻡ ﺇﻣﻜﺎﻧﻴﺔ ﻭﺟﻮﺩ ﻓﺮﺯ ﺫﺍﰐ ﰲ ﺇﻃﺎﺭ‬

‫)‪(1‬ﺍﳌﺎﺩﺗﲔ ‪ 14-13‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﺍﳌﺘﻌﻠﻖ ﺑﺎﻟﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ‪.‬ﻭ ﺍﻹﺗﺼﺎﻝ‬
‫)‪(2‬ﺣﺴﲔ ﺑﻦ ﺳﻌﻴﺪ ﺑﻦ ﺳﻴﻒ ﺍﻟﻐﺎﻓﺮﻱ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.413‬‬

‫‪- 189 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﻟﺘﺨﺰﻳﻦ ﺍﻟﺮﻗﻤﻲ‪ ،‬ﻭﻣﺎ ﻳﺘﺮﺗﺐ ﻋﻠﻰ ﻫﺬﻩ ﺍﳋﺎﺻﻴﺔ ﺍﻷﺧﲑﺓ ﺻﻌﻮﺑﺔ ﰲ ﲨﻊ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳉﻨﺎﺋﻴﺔ ﺍﻟﱵ‬
‫ﺗﻔﻴﺪ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﻘﻴﻖ ﺍﳉﻨﺎﺋﻲ‪ ،‬ﺫﻟﻚ ﻷ‪‬ﺎ ﻋﺎﺩﺓ ﻣﺎ ﺗﻜﻮﻥ ﳐﺘﻠﻄﺔ ﺑﻐﲑﻫﺎ ﻣﻦ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﻌﺎﺩﻳﺔ‬
‫ﳌﺴﺘﺨﺪﻣﻲ ﺍﳊﻮﺍﺳﻴﺐ ﻏﲑ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻬﺎ ﻭﻫﻮ ﺃﻣﺮ ﻗﺪ ﻳﺸﻜﻞ ‪‬ﺪﻳﺪﺍ ﳋﺼﻮﺻﻴﺔ ﻫﺆﻻﺀ ﻧﻈﺮﺍ‬
‫) ‪(1‬‬
‫ﻹﻣﻜﺎﻧﻴﺔ ﺇﻣﺘﺪﺍﺩ ﺁﺛﺎﺭ ﺗﻔﺘﻴﺶ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺇﻟﻴﻬﻢ‪.‬‬
‫ﻓﻀﻼ ﻋﻦ ﺫﻟﻚ ﻓﺈﻥ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻏﺎﻟﺒﺎ ﻣﺎ ﻳﻀﺮﺏ ﺳﻴﺎﺟﺎ ﺃﻣﻨﻴﺎ ﻋﻠﻰ ﺃﻓﻌﺎﻟﻪ ﻏﲑ ﺍﳌﺸﺮﻭﻋﺔ‬
‫ﻗﺒﻞ ﺇﺭﺗﻜﺎﺑﻪ ﳍﺎ‪ ،‬ﻓﻴﺰﻳﺪ ﺑﺬﻟﻚ ﻣﻦ ﺻﻌﻮﺑﺔ ﺗﻄﺒﻴﻖ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﻟﱵ ﻳﺘﻮﻗﻊ ﺣﺪﻭﺛﻬﺎ ﻟﻠﺒﺤﺚ ﻋﻦ‬
‫ﺍﻷﺩﻟﺔ ﺍﻟﺘﻘﻨﻴﺔ ﺍﻟﱵ ﺗﺪﻳﻨﻪ ﻭﺫﻟﻚ ﺑﺎﻟﻌﻤﻞ ﻋﻠﻰ ﺗﺮﻣﻴﺰ ﺃﻭ ﺗﺸﻔﲑ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺨﺰﻧﺔ ﺇﻟﻜﺘﺮﻭﻧﻴﺎ ﻭﺍﳌﻨﻘﻮﻟﺔ ﻋﱪ‬
‫ﺷﺒﻜﺎﺕ ﺍﻹﺗﺼﺎﻝ‪ ،‬ﲝﻴﺚ ﻳﺴﺘﺤﻴﻞ ﻋﻠﻰ ﻏﲑﻩ ﺍﻹﻃﻼﻉ ﻋﻠﻴﻬﺎ ﻭﻳﺼﺒﺢ ﺑﺬﻟﻚ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻣﺮﻣﺰﺍ ﺃﻭ‬
‫ﻣﺸﻔﺮﺍ ﻭﺑﺎﻟﺘﺎﱄ ﻳﻜﻮﻥ ﻋﺎﺋﻘﺎ ﺃﻣﺎﻡ ﺳﻠﻄﺎﺕ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﻘﻴﻖ ﺃﺛﻨﺎﺀ ﺗﻄﺒﻴﻘﻬﺎ ﻟﻠﻘﻮﺍﻋﺪ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﳌﻘﺮﺭﺓ‬
‫ﻹﺳﺘﺨﻼﺻﻪ‪.‬‬
‫ﻭﻣﻦ ﺍﻟﺼﻌﻮﺑﺎﺕ ﺍﻟﱵ ﺗﻌﻴﻖ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﳎﺎﻝ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺍﳌﺮﺗﺒﻄﺔ ﺑﺎﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻫﻲ‬
‫ﺳﻬﻮﻟﺔ ﳏﻮ ﻫﺬﺍ ﺍﻟﺪﻟﻴﻞ ﺃﻭ ﺗﺪﻣﲑﻩ ﰲ ﺯﻣﻦ ﻗﺼﲑ ﺟﺪﺍ‪ ،‬ﻓﺈﺭﺗﺒﺎﻁ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﺎﻟﺒﻴﺌﺔ ﺍﻟﺘﻘﻨﻴﺔ‬
‫ﺇﻧﻌﻜﺲ ﻋﻠﻰ ﻃﺒﻴﻌﺔ ﺍﻟﺪﻟﻴﻞ ﺍﳌﺘﺮﺗﺐ ﻋﻨﻬﺎ ﻣﻦ ﺣﻴﺚ ﺃﻥ ﺃﻣﺮ ﻃﻤﺴﻪ ﻭﳏﻮ ﺁﺛﺎﺭﻩ ﻣﻦ ﻗﺒﻞ ﺍﻟﻔﺎﻋﻞ ﺃﻣﺮﺍ ﰲ‬
‫ﻏﺎﻳﺔ ﺍﻟﺴﻬﻮﻟﺔ‪ ،‬ﺇﺫ ﺑﺈﻣﻜﺎﻥ ﺍﳌﺴﺘﺨﺪﻡ ﺍﻟﺬﻱ ﻳﺘﺤﻜﻢ ﰲ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺃﻥ ﻳﺴﺘﻌﻤﻞ ﻧﻈﺎﻣﺎ ﻣﻌﻠﻮﻣﺎﺗﻴﺎ ﻣﻦ‬
‫ﺃﺟﻞ ﳏﻮ ﺗﻠﻚ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﱵ ﺗﻌﺪ ﻣﻮﺿﻮﻋﺎ ﻟﻠﺘﻨﻘﻴﺐ ﺍﳉﻨﺎﺋﻲ ﻭﺑﺎﻟﺘﺎﱄ ﺗﺪﻣﲑ ﻛﻞ ﺍﻷﺩﻟﺔ‪.‬‬
‫ﻓﺎﳉﺎﱐ ﳝﻜﻨﻪ ﺃﻥ ﳝﺤﻮ ﺍﻷﺩﻟﺔ ﺍﻟﱵ ﺗﻜﻮﻥ ﻗﺎﺋﻤﺔ ﺿﺪﻩ ﺃﻭ ﺗﺪﻣﲑﻫﺎ ﲝﻴﺚ ﻻ ﺗﺘﻤﻜﻦ ﺍﻟﺴﻠﻄﺎﺕ ﻣﻦ‬
‫) ‪(2‬‬
‫ﻛﺸﻒ ﺍﳉﺮﳝﺔ‪ ،‬ﻭ ﺇﺫﺍ ﻣﺎ ﻋﻠﻤﺖ ‪‬ﺎ ﻻ ﺗﺴﺘﻄﻴﻊ ﺇﻗﺎﻣﺔ ﺍﻟﺪﻟﻴﻞ ﺿﺪﻩ‬
‫ﻟﺬﻟﻚ ﻓﺈﻥ ﺍﻟﺘﺤﻔﻆ ﻋﻠﻰ ﺍﳌﻌﻄﻴﺎﺕ ﻳﻌﺘﱪ ﺇﺟﺮﺍﺀ ﺃﻭﻟﻴﺎ ﺃﻭ ﲤﻬﻴﺪﻳﺎ‪ ،‬ﺍﳍﺪﻑ ﻣﻨﻪ ﻫﻮ ﺍﻹﺣﺘﻔﺎﻅ‬
‫ﺑﺎﳌﻌﻄﻴﺎﺕ ﻗﺒﻞ ﻓﻘﺪﺍ‪‬ﺎ‪.‬ﻭﻗﺪ ﻳﻜﻮﻥ ﺫﻟﻚ ﺑﺎﻟﺘﻌﺎﻭﻥ ﻣﻊ ﺍﳉﻬﺎﺕ ﺍﻟﱵ ﺗﻘﺪﻡ ﺍﳋﺪﻣﺔ)‪(3‬ﺑﺈﻟﺰﺍﻣﻬﻢ ﺑﻄﺮﻳﻘﺔ ﺃﻭ‬
‫ﺑﺄﺧﺮﻯ ﻋﻠﻰ ﺣﻔﻆ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﳌﺨﺰﻧﺔ ﲟﺎ ﰲ ﺫﻟﻚ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﳌﺮﻭﺭ ﺍﳌﺨﺰﻧﺔ ﺑﻮﺍﺳﻄﺔ‬
‫) ‪(4‬‬
‫ﻧﻈﺎﻡ ﻣﻌﻠﻮﻣﺎﰐ‪.‬‬

‫)‪(1‬ﺧﺎﻟﺪ ﳑﺪﻭﺡ ﺇﺑﺮﺍﻫﻴﻢ‪،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.77‬‬


‫)‪(2‬ﺃﻧﻈﺮ ﰲ ﺫﻟﻚ ﺩ‪.‬ﻏﻨﺎﻡ ﳏﻤﺪ ﻏﻨﺎﻡ‪ ،‬ﻋﺪﻡ ﻣﻼﺀﻣﺔ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﰲ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﳌﻜﺎﻓﺤﺔ ﺟﺮﺍﺋﻢ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ‪ ،‬ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔﺹ‪ 04‬ﻭﻣﺎ‬
‫ﺑﻌﺪﻫﺎ‬
‫)‪(3‬ﻣﻘﺪﻣﻮ ﺍﳋﺪﻣﺎﺕ ﺣﺴﺐ ﺍﻟﺘﻌﺮﻳﻒ ﺍﻟﻮﺍﺭﺩ ﰲ ﺍﳌﺎﺩﺓ ‪ 02‬ﺍﻟﻔﻘﺮﺓ ﺩ ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﻫﻢ ﺃﻱ ﻛﻴﺎﻥ ﻋﺎﻡ ﺃﻭ ﺧﺎﺹ ﻳﻘﺪﻡ ﳌﺴﺘﻌﻤﻠﻲ ﺧﺪﺍﻣﺘﻪ ﺍﻟﻘﺪﺭﺓ‬
‫ﻋﻠﻰ ﺍﻹﺗﺼﺎﻝ ﺑﻮﺍﺳﻄﺔ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻭ ﻧﻈﺎﻡ ﺍﻹﺗﺼﺎﻻﺕ‪.‬‬
‫)‪(4‬ﻟﻘﺪ ﺣﺪﺩﺕ ﺍﳌﺬﻛﺮ ﺍﻟﺘﻔﺴﲑﻳﺔ ﻹﺗﻔﺎﻗﻴﺔ ﺑﻮﺍﺩﺳﻴﺖ ﻣﱪﺭﺍﺕ ﺇﲣﺎﺫ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﻛﻤﺎ ﻳﻠﻲ‪:‬‬

‫‪- 190 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﰲ ﻫﺬﺍ ﺍﻹﻃﺎﺭ ﳒﺪ ﺃﻥ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻗﺪ ﺃﻟﺰﻡ ﰲ ﺍﳌﺎﺩﺓ ‪ 10‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﻣﻘﺪﻣﻲ‬
‫ﺍﳋﺪﻣﺎﺕ ﲝﻔﻆ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﲝﺮﻛﺔ ﺍﻟﺴﲑ ﻭ ﺍﻟﱵ ﺣﺪﺩﻫﺎ ﰲ ﺍﳌﺎﺩﺓ ‪ 11‬ﻣﻦ ﻧﻔﺲ ﺍﻟﻘﺎﻧﻮﻥ‬
‫ﻭﻭﺿﻌﻬﺎ ﲢﺖ ﺗﺼﺮﻑ ﺍﻟﺴﻠﻄﺎﺕ ﺍﳌﻜﻠﻔﺔ ﺑﺎﻟﺘﺤﺮﻳﺎﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ‪.‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺍﳌﻌﻮﻗﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﳉﻬﺎﺕ ﺍﳌﺘﻀﺮﺭﺓ ﻭﺻﻌﻮﺑﺔ ﲢﺪﻳﺪ ﺍﳉﺎﱐ‪:‬‬
‫ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺍﳌﻌﻮﻗﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﲜﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﻭﺇﺟﺮﺍﺀﺍﺕ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ‪ ،‬ﻓﻬﻨﺎﻙ‬
‫ﻣﻌﻮﻗﺎﺕ ﺃﺧﺮﻯ ﺗﺘﻌﻠﻖ ﺑﺎﳉﻬﺎﺕ ﺍﳌﺘﻀﺮﺭﺓ ﻭﺍﻟﻘﺪﺭﺓ ﻋﻠﻰ ﲢﺪﻳﺪ ﺍﳉﺎﱐ‪.‬‬
‫ﺃﻭﻻ‪ :‬ﻣﻌﻮﻗﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﳉﻬﺎﺕ ﺍﳌﺘﻀﺮﺭﺓ‪:‬ﻗﺪ ﻳﻜﻮﻥ ﻟﻠﺠﻬﺎﺕ ﺍﳌﺘﻀﺮﺭﺓ ﻣﻦ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻳﺪ ﰲ ﺇﻋﺎﻗﺔ ﺍﻟﺘﺤﻘﻴﻖ ﻭﺍﻟﻮﺻﻮﻝ ﺇﱃ ﺍﻟﺪﻟﻴﻞ ﻹﺛﺒﺎﺕ ﺍﳉﺮﳝﺔ‪ .‬ﻓﺎﻟﺘﻘﻨﻴﺔ ﺍﳌﺴﺘﺨﺪﻣﺔ ﰲ ﻧﻈﻢ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ ﺗﻌﺪ ﳎﺎﻝ ﺇﺳﺘﺜﻤﺎﺭ ﻭﺗﺴﺎﺑﻖ ﺑﲔ ﺍﻟﺸﺮﻛﺎﺕ ﳑﺎ ﻳﺪﻓﻌﻬﺎ ﰲ ﻣﻘﺎﺑﻞ ﲢﻘﻴﻖ ﺍﻟﺮﺑﺢ ﺇﱃ ﺗﺒﺴﻴﻂ‬
‫ﺍﻹﺟﺮﺍﺀﺍﺕ ﻭﺗﺴﻬﻴﻞ ﺇﺳﺘﺨﺪﺍﻡ ﺍﻟﱪﺍﻣﺞ ﻭﻣﻠﺤﻘﺎ‪‬ﺎ ﻭﺯﻳﺎﺩﺓ ﺍﳌﻨﺘﺠﺎﺕ ﻭﺇﻗﺘﺼﺎﺭ ﺗﺮﻛﻴﺰﻫﺎ ﻋﻠﻰ ﺗﻘﺪﱘ‬
‫ﺍﳋﺪﻣﺔ ﰲ ﻣﻘﺎﺑﻞ ﺇﳘﺎﻝ ﺍﳉﺎﻧﺐ ﺍﻷﻣﲏ‪ ،‬ﻭﻗﺪ ﻭﺻﻞ ﺍﳊﺪ ﺑﺒﻌﺾ ﻣﺴﺘﺨﺪﻣﻲ ﺷﺒﻜﺎﺕ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻋﱪ‬
‫ﻣﺰﻭﺩﻱ ﺍﳋﺪﻣﺔ ﰲ ﺧﻀﻢ ﺍﻟﺘﻨﺎﻓﺲ ﺍﻟﺘﺠﺎﺭﻱ ﺇﱃ ﺩﺭﺟﺔ ﻋﺪﻡ ﻣﻄﺎﻟﺒﺔ ﺍﳌﺸﺘﺮﻛﲔ ﺑﺘﺤﺪﻳﺪ ﻫﻮﻳﺎ‪‬ﻢ ﻋﻨﺪ‬
‫ﺍﻹﺷﺘﺮﺍﻙ ﰲ ﺧﺪﻣﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ ﳑﺎ ﳛﻮﻝ ﺩﻭﻥ ﻣﻌﺮﻓﺔ ﻫﻮﻳﺔ ﺍﳌﺴﺘﺨﺪﻡ ﰲ ﺣﺎﻟﺔ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻨﻬﺎ‬
‫ﻣﻦ ﻃﺮﻑ ﺍﳉﻬﺎﺕ ﻟﻠﺘﺤﻘﻴﻖ‪ ،‬ﻭﻣﻦ ﻧﺎﺣﻴﺔ ﺃﺧﺮﻯ ﻓﺈﻥ ﻛﺜﲑﺍ ﻣﻦ ﺍﳉﻬﺎﺕ ﺍﻟﱵ ﺗﺘﻌﺮﺽ ﺃﻧﻈﻤﺘﻬﺎ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻟﻺﻋﺘﺪﺍﺀ ﺗﻌﻤﺪ ﺇﱃ ﻋﺪﻡ ﺍﻟﻜﺸﻒ ﻭﺍﻟﺘﺒﻴﻠﻎ ﻋﻦ ﺫﻟﻚ ﻟﺪﻯ ﺍﻟﺴﻠﻄﺎﺕ ﺍﳌﺨﺘﺼﺔ ﲡﻨﺒﺎ ﻟﻺﺿﺮﺍﺭ‬
‫ﺑﺴﻤﻌﺘﻬﺎ ﺃﻭ ﺧﻮﻓﺎ ﻣﻦ ﺃﻥ ﺍﻟﻜﺸﻒ ﻋﻦ ﺃﺳﻠﻮﺏ ﺇﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﻗﺪ ﻳﺆﺩﻱ ﺇﱃ ﺗﻜﺮﺍﺭ ﻭﻗﻮﻋﻬﺎ‬
‫ﺑﺘﻘﻠﻴﺪﻫﺎ ﻣﻦ ﻃﺮﻑ ﺍﻵﺧﺮﻳﻦ‪.‬‬
‫ﻓﺬﺍﺗﻴﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﻴﺔ ﻣﻦ ﺣﻴﺚ ﻛﻮ‪‬ﺎ ﳎﻬﻮﻟﺔ ﻭﻣﺴﺘﺘﺮﺓ ﺗﺘﻢ ﰲ ﺑﻴﺌﺔ ﺗﻘﻨﻴﺔ ﻻ ﺗﺘﺮﻙ ﻭﺭﺍﺀﻫﺎ ﺃﻱ‬
‫ﺃﺛﺮ ﺧﺎﺭﺟﻲ ﲢﻮﻝ ﺩﻭﻥ ﺇﻛﺘﺸﺎﻓﻬﺎ ﻣﻦ ﻃﺮﻑ ﺍ‪‬ﲏ ﻋﻠﻴﻪ‪ ،‬ﻭﺇﺫﺍ ﻣﺎ ﺗﺼﺎﺩﻑ ﻭﺇﻛﺘﺸﻔﻬﺎ ﻓﺈﻧﻪ ﻳﻌﻤﺪ ﰲ‬
‫ﺃﻏﻠﺐ ﺍﻷﺣﻴﺎﻥ ﺇﱃ ﺍﻟﺘﺴﺘﺮ ﻋﻠﻴﻬﺎ ﻭﺍﻟﺼﻤﺖ ﺑﺪﻝ ﺇﺑﻼﻍ ﺍﻟﺸﺮﻃﺔ ﻟﻠﺘﺤﻘﻴﻖ ﺑﺸﺄ‪‬ﺎ ﻭﻣﻌﺮﻓﺔ ﻣﺮﺗﻜﺒﻬﺎ ﻭﻫﻮ‬
‫ﻣﺎ ﻳﻨﺠﻢ ﻋﻨﻪ ﻋﺪﻡ ﺍﻟﺘﻌﺎﻭﻥ ﻣﻊ ﺍﻟﺴﻠﻄﺎﺕ ﺍﳌﺨﺘﺼﺔ ﳌﻜﺎﻓﺤﺔ ﻫﺬﺍ ﺍﻟﻨﻤﻂ ﺍﻹﺟﺮﺍﻣﻲ‪.‬‬
‫‪-1‬ﻗﺎﺑﻠﻴﺔ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻟﻠﺘﻼﺷﻲ ﺣﻴﺚ ﺗﻜﻮﻥ ﳏﻼ ﻟﻠﻤﺤﻮ ﺃﻭ ﺍﻟﺘﻐﻴﲑ ﺳﻮﺍﺀ ﻛﺎﻥ ﺫﻟﻚ ﺑﺪﺍﻓﻊ ﺇﺟﺮﺍﻣﻲ ‪‬ﺪﻑ ﺿﻤﻦ ﻣﻌﺎﱂ ﺍﳉﺮﳝﺔ ﺃﻭ ﺃﻱ ﻋﻨﺼﺮ‬
‫ﺇﺛﺒﺎﰐ ﻟﺸﺨﺺ ﺍ‪‬ﺮﻡ ﺃﻭ ﺑﺪﺍﻓﻊ ﻏﲑ ﺇﺟﺮﺍﻣﻲ ﰲ ﺇﻃﺎﺭ ﺍﳊﺬﻑ ﺍﻟﺮﻭﺗﻴﲏ ﻟﻠﻤﻌﻄﻴﺎﺕ‪.‬‬
‫‪-2‬ﺣﻔﻆ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﱵ ﳝﻜﻦ ﺃﻥ ﺗﺘﻀﻤﻦ ﳏﺘﻮﻳﺎ‪‬ﺎ ﺇﺗﺼﺎﻻﺕ ﻏﲑ ﻣﺸﺮﻭﻋﺔ ﺗﺴﺎﻋﺪ ﰲ ﲢﺪﻳﺪ ﻣﺼﺪﺭ ﻫﺬﻩ ﺍﻹﺗﺼﺎﻻﺕ ﻭﻣﻦ ﲦﺔ ﲢﺪﻳﺪ ﻫﻮﻳﺔ‬
‫ﻣﺮﺗﻜﱯ ﺍﳉﺮﳝﺔ‪.‬‬
‫‪-3‬ﺗﺄﻣﲔ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺘﻘﲏ ﻣﻦ ﺍﻟﻀﻴﺎﻉ ﺣﻴﺚ ﻳﺘﻢ ﻧﺴﺦ ﺩﻟﻴﻞ ﻋﻠﻰ ﻧﺸﺎﻁ ﺟﻨﺎﺋﻲ ﻣﻦ ﻗﺒﻞ ﻣﺰﻭﺩﻱ ﺍﳋﺪﻣﺔ ﻣﺜﻞ ﺍﳌﺮﺍﺳﻠﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺍﻟﱵ ﰎ ﺇﺭﺳﺎﳍﺎ ﺃﻭ‬
‫ﺇﺳﺘﻘﺒﺎﳍﺎ ﻭﻣﻦ ﰒ ﳝﻜﻦ ﺍﻟﻜﺸﻒ ﻋﻦ ﺩﻟﻴﻞ ﺟﻨﺎﺋﻲ ﻟﻠﺠﺮﺍﺋﻢ ﺍﳌﺮﺗﻜﺒﺔ‪.‬‬

‫‪- 191 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪- 192 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻷﺟﻞ ﺫﻟﻚ ﻓﻘﺪ ﻃﺮﺣﺖ ﺍﻟﻌﺪﻳﺪ ﻣﻦ ﺍﻹﻗﺘﺮﺍﺣﺎﺕ ﳊﻤﻞ ﺍ‪‬ﲏ ﻋﻠﻴﻬﻢ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ‬
‫ﺍﻟﺘﺒﻠﻴﻎ ﻭﺍﻟﺘﻌﺎﻭﻥ ﻣﻊ ﺍﻟﺴﻠﻄﺎﺕ ﺑﺄﻥ ﺗﻔﺮﺽ ﺍﻟﻨﺼﻮﺹ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﳌﺘﻌﻠﻘﺔ ﲜﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺇﻟﺘﺰﺍﻣﺎ ﻋﻠﻰ‬
‫ﻋﺎﺗﻖ ﻣﻮﻇﻔﻲ ﺍﳉﻬﺎﺕ ﺍ‪‬ﲏ ﻋﻠﻴﻬﺎ ﺑﺎﻹﺑﻼﻍ ﻋﻤﺎ ﻳﺼﻠﻬﻢ ﻣﻦ ﺃﺧﺒﺎﺭ ﻋﻦ ﻭﻗﻮﻉ ﺗﻠﻚ ﺍﳉﺮﺍﺋﻢ ﻣﻊ ﺗﻘﺪﻳﺮ‬
‫ﺍﳉﺰﺍﺀ ﻋﻦ ﺍﻹﺧﻼﻝ ‪‬ﺬﺍ ﺍﻹﻟﺘﺰﺍﻡ‪.‬‬
‫ﺛﺎﻧﻴﺎ‪ :‬ﺻﻌﻮﺑﺔ ﲢﺪﻳﺪ ﻫﻮﻳﺔ ﺍﳉﺎﱐ‪:‬ﺇﻥ ﺍﻟﻮﺻﻮﻝ ﺇﱃ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺗﻌﺘﺮﺿﻪ ﻋﻘﺒﺔ ﺃﺧﺮﻯ ﺗﻜﻤﻦ‬
‫ﰲ ﺃﻥ ﺍﳉﻨﺎﺓ ﺍﳌﺘﻤﺮﺳﲔ ﳚﺘﻬﺪﻭﻥ ﰲ ﺇﺧﻔﺎﺀ ﻫﻮﻳﺎ‪‬ﻢ ﻟﻠﺤﻴﻠﻮﻟﺔ ﺩﻭﻥ ﺗﻌﻘﺒﻬﻢ ﺃﻭ ﻛﺸﻒ ﺃﻣﺮﻫﻢ‪(1)،‬ﲝﻴﺚ‬
‫ﺗﻈﻞ ﺃﻧﺸﻄﺘﻬﻢ ﳎﻬﻮﻟﺔ ﲟﻨﺄﻯ ﻋﻦ ﻋﻠﻢ ﺍﻟﺴﻠﻄﺎﺕ ﺍﳌﻌﻨﻴﺔ ﲟﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ‪ .‬ﻭﻣﻦ ﺍﻷﻣﺜﻠﺔ ﺍﻟﱵ ﺗﺴﺎﻕ ﻋﻠﻰ‬
‫ﺫﻟﻚ ﺇﺳﺘﺨﺪﺍﻡ ﺍﳉﺎﱐ ﺣﺎﺳﺒﺎ ﺁﺧﺮ ﻏﲑ ﺣﺎﺳﺒﻪ ﺍﻟﺸﺨﺼﻲ ﻛﺈﺳﺘﺨﺪﺍﻡ ﺍﳊﻮﺍﺳﻴﺐ ﺍﳌﻮﺟﻮﺩﺓ ﰲ ﺍﻷﻣﺎﻛﻦ‬
‫ﺍﻟﻌﺎﻣﺔ ﺃﻭ ﺍﻟﻠﺠﻮﺀ ﺇﱃ ﻣﻘﺎﻫﻲ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻋﻠﻰ ﺇﻋﺘﺒﺎﺭ ﺃﻥ ﺟﻞ ﻫﺬﻩ ﺍﳌﻘﺎﻫﻲ ﻻ ﺗﻘﻮﻡ ﺑﺘﺴﺠﻴﻞ ﺃﲰﺎﺀ‬
‫ﻣﺮﺗﺎﺩﻳﻬﺎ ﺃﻭ ﺍﻟﺘﺤﻘﻖ ﻣﻦ ﻫﻮﻳﺎ‪‬ﻢ ﻻ ﺳﻴﻤﺎ ﺇﺫﺍ ﻋﻠﻤﻨﺎ ﺃﻥ ﺷﺒﻜﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ ﺗﺘﻴﺢ ﳌﺴﺘﺨﺪﻣﻴﻬﺎ ﺇﺳﺘﻌﻤﺎﻝ‬
‫ﺍﳋﻂ ﺍﻟﻮﺍﺣﺪ ﻣﻦ ﺃﻛﺜﺮ ﻣﻦ ﺷﺨﺺ ﰲ ﺁﻥ ﻭﺍﺣﺪ ﻣﻌﺎ‪ ،‬ﻣﺎ ﳚﻌﻞ ﺍﳌﺮﺍﻗﺒﺔ ﻭﺍﻟﺘﻌﻘﺐ ﻟﻠﻤﺸﺘﺒﻪ ﻓﻴﻪ ﺃﻣﺮﺍ‬
‫ﻳﻨﻄﻮﻱ ﻋﻠﻰ ﺍﻟﺼﻌﻮﺑﺔ ﻭﻏﲑ ﻣﻴﺴﻮﺭ ﰲ ﻛﺜﲑ ﻣﻦ ﺍﻷﺣﻴﺎﻥ ﻭﺭﲟﺎ ﺗﺘﻌﻘﺪ ﺍﳌﺴﺄﻟﺔ ﺃﻛﺜﺮ ﻋﻨﺪ ﺇﺳﺘﺨﺪﺍﻡ‬
‫) ‪(2‬‬
‫ﺍﻷﻧﺘﺮﻧﺎﺕ ﺍﻟﻼﺳﻠﻜﻲ‪.‬‬
‫ﻭﺗﻌﺪ ﻣﺴﺄﻟﺔ ﺻﻌﻮﺑﺔ ﲢﺪﻳﺪ ﻫﻮﻳﺔ ﻣﺮﺗﻜﺐ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﺇﺣﺪﻯ ﺍﳌﺸﺎﻛﻞ ﺍﻟﱵ ﺗﻄﺮﺡ‬
‫ﻟﻠﻜﻔﺎﺡ ﺿﺪ ﺍﻹﺟﺮﺍﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‪ ،‬ﻭﺇﻥ ﻛﺎﻥ ﳝﻜﻦ ﻣﻌﺮﻓﺔ ﺍﻟﻨﻈﺎﻡ ﺃﻱ ﻫﻮﻳﺔ ﺍﳊﺎﺳﻮﺏ ﻭﺍﳋﺎﺩﻡ ﻭﺍﳌﻀﻴﻒ‬
‫) ‪(3‬‬
‫ﻭﺍﻟﺸﺒﻜﺎﺕ ﺍﻟﺬﻱ ﺇﺭﺗﻜﺒﺖ ﻣﻦ ﺧﻼﻟﻪ‪.‬‬
‫ﻭﻗﺪ ﺃﺷﲑ ﰲ ﺍﳌﺆﲤﺮ ﺍﻟﺪﻭﱄ ﳉﺮﺍﺋﻢ ﺍﳊﺎﺳﻮﺏ ﺍﳌﻨﻌﻘﺪ ﰲ ﺃﻭﺳﻠﻮ ﰲ ﺍﻟﻔﺘﺮﺓ ﻣﺎ ﺑﲔ ‪-29‬‬
‫‪ 2000/05/31‬ﻣﻮﺿﻮﻉ ﻋﺪﻡ ﺇﻣﻜﺎﻧﻴﺔ ﺍﻟﺒﻨﻴﺔ ﺍﻟﺘﺤﺘﻴﺔ ﻟﻸﻧﺘﺮﻧﺎﺕ ﻣﻦ ﺍﻟﺘﻮﺻﻞ ﺇﱃ ﲢﺪﻳﺪ ﺷﺨﺼﻴﺔ‬
‫ﻣﺮﺗﻜﺐ ﺍﳉﺮﳝﺔ ﺃﻭ ﺍﳌﺼﺪﺭ ﺍﳊﻘﻴﻘﻲ ﳍﺎ‪ ،‬ﻭﺇﻥ ﻛﺎﻧﺖ ﺗﻮﻓﺮ ﺇﻣﻜﺎﻧﻴﺔ ﺍﻟﺘﻌﺮﻑ ﻋﻠﻰ ﻋﻨﻮﺍﻥ ﻭﺭﻗﻢ‬
‫ﺍﳊﺎﺳﻮﺏ ﻓﻘﻂ ﺍﳌﺮﺗﺒﻂ ﺑﺎﻷﻧﺘﺮﻧﺎﺕ ﻭﺍﳌﺴﺘﻌﻤﻞ ﻛﻮﺳﻴﻠﺔ ﻹﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﻋﻦ ﻃﺮﻳﻖ ﻋﻨﻮﺍﻥ ‪IP‬ﺍﻟﺬﻱ‬

‫)‪(1‬ﻣﻮﺳﻰ ﻣﺴﻌﻮﺩ ﺃﺭﺣﻮﻣﺔ‪ ،‬ﺍﻹﺷﻜﺎﻻﺕ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﻟﱵ ﺗﺜﲑﻫﺎ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﱪ ﺍﻟﻮﻃﻨﻴﺔ ﲝﺚ ﻣﻘﺪﻡ ﺍﳌﺆﲤﺮ ﺍﳌﻐﺎﺭﰊ ﺍﻷﻭﻝ ﺣﻮﻝ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﻭﺍﻟﻘﺎﻧﻮﻥ‪ ،‬ﺗﻨﻈﻤﺔ ﺃﻛﺎﺩﳝﻴﺔ ﺍﻟﺪﺭﺍﺳﺎﺕ ﺍﻟﻌﻠﻴﺎ ﻃﺮﺍﺑﻠﺲ ﺍﻟﻔﺘﺮﺓ ﻣﻦ ‪ 2009/10/29-28‬ﺩﻭﻥ ﺗﺮﻗﻴﻢ‬
‫)‪(2‬ﻫﻼﱄ ﻋﺒﺪ ﺍﻟﻼﻩ ﺃﲪﺪ‪ ،‬ﺍﳉﻮﺍﻧﺐ ﺍﳌﻮﺿﻮﻋﻴﺔ ﻭﺍﻹﺟﺮﺍﺋﻴﺔ ﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﺿﻮﺀ ﺇﺗﻔﺎﻗﻴﺔ ﺑﻮﺩﺍﻳﺴﺖ ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ ﺍﻟﻘﺎﻫﺮﺓ‬
‫‪ ،2006‬ﺹ‪.160‬‬
‫)‪(3‬ﻣﺜﻞ ﻫﺬﺍ ﺍﻷﻣﺮ ﺃﻭﺟﺪ ﺇﲡﺎﻫﺎﺕ ﰲ ﺍﻟﻔﻘﻪ ﺍﳌﻘﺎﺭﻥ ﺗﻘﻀﻲ ﺑﺈﻋﺘﺒﺎﺭ ﻣﺰﻭﺩ ﺍﳋﺪﻣﺔ ﻟﻸﻧﺘﺮﻧﺎﺕ ﻣﺴﺆﻭﻻ ﻋﻦ ﺍﳉﺮﳝﺔ ﺣﺎﻝ ﻋﺪﻡ ﻣﻌﺮﻓﺔ ﺷﺨﺼﻴﺔ ﺍﳉﺎﱐ‬
‫ﺍﻷﺻﻠﻲ ﻋﻠﻰ ﺃﺳﺎﺱ ﻣﺒﺪﺃ ﺇﻓﺘﺮﺍﺽ ﻣﺴﺆﻭﻟﻴﺔ ﺍﻟﻐﲑ‪ ،‬ﺃﻧﻈﺮ ﰲ ﻫﺬﺍ ﺍﻟﺸﺄﻥ ﺩ ﻋﻤﺮ ﺃﺑﻮ ﺑﻜﺮ ﻳﻮﻧﺲ ﺍﳉﺮﺍﺋﻢ ﺍﻟﻨﺎﺷﺌﺔ ﻋﻦ ﺇﺳﺘﺨﺪﺍﻡ ﺍﻷﻧﺘﺮﻧﺎﺕ‪ ،‬ﻣﺮﺟﻊ ﺳﺎﺑﻖ‪،‬‬
‫ﺹ‪.835‬‬

‫‪- 193 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻳﺸﲑ ﺇﱃ ﺭﻗﻢ ﻳﻌﲔ ﺍﳊﺎﺳﻮﺏ ﺍﳌﻮﺻﻮﻝ ﻋﻠﻰ ﺍﻷﻧﺘﺮﻧﺎﺕ‪ .‬ﻟﻜﻦ ﰲ ﻣﻘﺎﺑﻞ ﺫﻟﻚ ﻓﺈﻥ ﻫﺬﺍ ﺍﻟﺮﻗﻢ ﻟﻴﺲ‬
‫ﻣﻮﺣﺪﺍ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻟﻌﺎﳌﻲ‪ ،‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺃﻥ ﻣﺼﺪﺍﻗﻴﺔ ﺍﳍﻮﻳﺔ ﻋﱪ ﺍﻷﻧﺘﺮﻧﺎﺕ)‪ (IP‬ﺗﺘﻘﻠﺺ ﻛﺜﲑﺍ ﰲ‬
‫ﺑﻌﺾ ﺍﻟﺪﻭﻝ ﺇﺫﺍ ﻋﻠﻤﻨﺎ ﺃﻥ ﻛﻞ ﺧﻂ ﻫﻮﻳﺔ ﻋﻠﻰ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻳﺼﺎﺩﻓﻪ ﻋﺪﺩ ﻣﻦ ﺍﳍﻮﻳﺎﺕ ﺍﻟﱵ ﳝﻜﻦ ﺃﻥ‬
‫ﺗﻜﻮﻥ ﳏﻼ ﻟﻠﺘﻐﺎﻳﺮ ﺑﲔ ﺃﻋﻀﺎﺀ ﺍﻷﻧﺘﺮﻧﺎﺕ ﺍﳌﺸﺘﺮﻛﲔ ﰲ ﻣﺰﻭﺩ ﺧﺪﻣﺔ ﻭﺍﺣﺪ‪ ،‬ﺫﻟﻚ ﺃﻥ ﺃﻱ ﺷﺨﺺ‬
‫ﳝﻠﻚ ﻫﻮﻳﺔ ﺭﻗﻤﻴﺔ ﳏﺪﺩﺓ ﺣﻘﺎ ﺣﺎﻝ ﻭﺟﻮﺩﻩ ﻋﻠﻰ ﺍﻷﻧﺘﺮﻧﺎﺕ‪ ،‬ﺇﻻ ﺃﻧﻪ ﺇﺫﺍ ﺣﺪﺙ ﻭﺇﻧﻘﻄﻊ ﺍﻹﺭﺳﺎﻝ ﻓﺈﻥ‬
‫ﺍﻟﺸﺨﺺ ﻧﻔﺴﻪ ﺇﺫﺍ ﻋﺎﺩ ﻣﻦ ﺟﺪﻳﺪ ﺇﱃ ﺍﻷﻧﺘﺮﻧﺎﺕ ﻓﺈﻥ ﺍﳍﻮﻳﺔ ﺍﻟﺴﺎﺑﻘﺔ ﻟﻦ ﺗﻜﻮﻥ ﻟﻪ ﻭﺇﳕﺎ ﻟﻐﲑﻩ ﻭﻣﻦ‬
‫ﺍﳌﻤﻜﻦ ﺟﺪﺍ ﺃﻥ ﻳﺘﻮﺍﺟﺪ ‪‬ﻮﻳﺔ )‪ (IP‬ﺃﺧﺮﻯ‪.‬‬
‫ﻭﻳﺰﺩﺍﺩ ﺍﻷﻣﺮ ﺻﻌﻮﺑﺔ ﺣﻴﻨﻤﺎ ﺗﻜﻮﻥ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﶈﻤﻠﺔ ﰲ ﻋﻨﺎﻭﻳﻦ )‪ (IP‬ﻏﲑ ﺣﻘﻴﻘﻴﺔ ﺃﻭ ﺯﺍﺋﻔﺔ‬
‫ﻭﻫﺬﺍ ﳑﻜﻦ ﺣﲔ ﺇﺳﺘﺨﺪﺍﻡ ﺍﳊﺰﻡ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ )‪ (Packet‬ﻋﻨﻮﺍﻥ ‪IP‬ﺯﺍﺋﻒ‪ ،‬ﲝﻴﺚ ﻳﻈﻬﺮ ﺃﻥ ﺍﳌﻌﻠﻮﻣﺎﺕ‬
‫ﺟﺎﺀﺕ ﻣﻦ ﻧﻈﺎﻡ ﻣﻌﺎﳉﺔ ﳏﺪﺩ ﺑﻴﻨﻤﺎ ﰲ ﺍﳊﻘﻴﻘﺔ ﺟﺎﺀ ﻣﻦ ﻛﻮﻣﺒﻴﻮﺗﺮ ﺁﺧﺮ ﻭﻣﺜﺎﻝ ﺫﻟﻚ ﻋﻨﺪﻣﺎ ﻳﻘﻮﻡ‬
‫ﺑﺮﻧﺎﻣﺞ ﺧﺒﻴﺚ ﺑﺈﺩﺧﺎﻝ ﻣﻌﻠﻮﻣﺎﺕ ﻛﺎﺫﺑﺔ ﺃﻭ ﻏﲑ ﺣﻘﻴﻘﻴﺔ ﻋﻦ ﻋﻨﻮﺍﻥ )‪ (IP‬ﰲ ﺣﺰﻡ ﺍﻹﺭﺳﺎﻝ ﻭﻗﺒﻞ‬
‫ﺍﻟﻮﻟﻮﺝ ﰲ ﺍﻟﺸﺒﻜﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ .‬ﻟﻜﻦ ﻳﺬﻫﺐ ﺍﻟﺒﻌﺾ ﺇﱃ ﺍﻟﻘﻮﻝ ﺃﻥ ﻣﺴﺄﻟﺔ ﻋﺪﻡ ﻣﻌﺮﻓﺔ ﺷﺨﺼﻴﺔ ﻭﻫﻮﻳﺔ‬
‫ﺍﻟﻔﺎﻋﻞ ﺍﻟﺬﻱ ﻳﺘﺴﺘﺮ ﻭﺭﺍﺀﻫﺎ ﻣﺮﺳﻞ ﺍﻟﺮﺳﺎﻟﺔ ﻏﲑ ﺍﳌﺸﺮﻭﻋﺔ ﻫﻮ ﺃﻣﺮ ﻧﺴﱯ ﺇﺫ ﻻ ﻳﻮﺟﺪ ﲡﻬﻴﻞ ﺑﺎﳌﻌﲎ‬
‫ﺍﻟﺼﺤﻴﺢ ﺑﺎﻟﻨﺴﺒﺔ ﻟﺸﺒﻜﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﺣﻴﺚ ﻳﺘﺮﻙ ﺍﻟﻔﺎﻋﻞ ﺁﺛﺎﺭﺍ ﺃﺛﻨﺎﺀ ﺗﻨﻘﻠﻪ ﰲ ﻃﺮﻗﺎﺕ ﺷﺒﻜﺎﺕ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ ﺗﺴﻤﺢ ﻟﻠﻤﺤﻘﻘﲔ ﻣﻦ ﺍﻟﻮﺻﻮﻝ ﺇﻟﻴﻪ‪ ،‬ﻭﺍﻷﻣﺮ ﻫﻨﺎ ﻣﺘﺮﻭﻙ ﻟﻔﻄﻨﺔ ﺭﺟﺎﻝ ﺍﻟﻀﺒﻄﻴﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻣﻦ‬
‫ﺧﻼﻝ ﺍﻹﺳﺘﻨﺎﺩ ﺇﱃ ﻓﻜﺮﺓ ﺍﻟﺪﻻﺋﻞ ﺍﻟﻜﺎﻓﻴﺔ ﻭﻣﺎ ﻳﻨﺒﺜﻖ ﻋﻨﻬﺎ ﻣﻦ ﺷﺒﻬﺎﺕ‪ ،‬ﻛﻤﺎ ﻟﻮ ﻛﺎﻥ ﺍﳊﺎﺳﻮﺏ ﺍﻟﺬﻱ‬
‫ﰎ ﻋﱪﻩ ﺟﺮﳝﺔ ﺍﻹﺧﺘﺮﺍﻕ ﻫﻮ ﺣﺎﺳﻮﺏ ﺷﺨﺼﻲ ﻭﰲ ﻫﺬﻩ ﺍﳊﺎﻟﺔ ﻓﺈﻥ ﺿﺒﻂ ﺍﳊﺎﺳﻮﺏ ﺫﺍﺗﻪ ﻳﺴﺘﺪﻋﻲ‬
‫ﺳﺆﺍﻝ ﺻﺎﺣﺒﻪ ﻓﻴﻤﺎ ﺇﺫﺍ ﻛﺎﻥ ﻗﺪ ﺇﺳﺘﺨﺪﻡ ﺃﺣﺪ ﺁﺧﺮ ﺍﳊﺎﺳﻮﺏ ﺍﳌﺬﻛﻮﺭ ﺃﻭ ﺃﻥ ﻳﻜﻮﻥ ﺍﳊﺎﺳﻮﺏ ﺍﳌﻌﲏ‬
‫ﻣﻮﺟﻮﺩﺍ ﰲ ﺍﻟﻐﺮﻓﺔ ﺍﻟﺸﺨﺼﻴﺔ ﺃﻭ ﻛﺎﻥ ﻣﻮﺟﻮﺩﺍ ﰲ ﺷﺮﻛﺔ ﺃﻭ ﻣﻜﺘﺐ‪.‬‬
‫ﻭﰲ ﻛﻞ ﺍﻷﺣﻮﺍﻝ ﻓﺈﻥ ﺍﻷﻣﺮ ﻳﺘﻄﻠﺐ ﲢﺴﲔ ﺃﺳﻠﻮﺏ ﺗﺘﺒﻊ ﺁﺛﺎﺭ ﺍﻟﺮﺳﺎﺋﻞ ﻭﲢﺪﻳﺪ ﻫﻮﻳﺔ‬
‫ﺍﳌﺴﺘﺨﺪﻣﲔ ﺣﱴ ﳝﻜﻦ ﲢﺪﻳﺪ ﻫﻮﻳﺔ ﺍﻟﺸﺨﺺ ﺍﳌﺴﺆﻭﻝ ﺟﻨﺎﺋﻴﺎ‪.‬‬
‫ﻭﰲ ﻫﺬﺍ ﺍﻹﻃﺎﺭ ﳒﺪ ﺃﻥ ﺍﳌﺸﺮﻉ ﺍﻟﻔﺮﻧﺴﻲ ﻗﺪ ﺃﻭﺟﺐ ﻋﻠﻰ ﲨﻴﻊ ﻣﺰﻭﺩﻱ ﺧﺪﻣﺎﺕ ﺍﻹﺗﺼﺎﻝ‬
‫ﻟﻠﺠﻤﻬﻮﺭ ﺃﻥ ﳛﺪﺩﻭﺍ ﻋﻠﻰ ﻣﻮﺍﻗﻌﻬﻢ ﻫﻮﻳﺔ ﻧﺎﺷﺮ ﻣﻀﻤﻮﻥ ﺍﻟﺮﺳﺎﻟﺔ ﻭﺑﻴﺎﻧﺎﺗﻪ ﻭﺫﻟﻚ ﲟﻮﺟﺐ ﺍﳌﺎﺩﺓ ‪ 43‬ﻣﻦ‬
‫ﻗﺎﻧﻮﻥ ‪ 1986/09/30‬ﻭﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﻣﻦ ﺷﺄﻧﻪ ﺃﻥ ﻳﻘﺪﻡ ﺍﻟﻜﺜﲑ ﻣﻦ ﺍﻟﺸﻔﺎﻓﻴﺔ ﺑﺎﻟﻨﺴﺒﺔ ﻟﻠﺨﺪﻣﺎﺕ‬
‫ﺍﳌﻮﺿﻮﻋﺔ ﲢﺖ ﺗﺼﺮﻑ ﺍﳉﻤﻬﻮﺭ ﻭﻳﺴﺎﻋﺪ ﻋﻠﻰ ﺳﻬﻮﻟﺔ ﲢﺪﻳﺪ ﻫﻮﻳﺔ ﺍﳉﺎﱐ‪ ،‬ﺑﺎﻹﺿﺎﻓﺔ ﻛﺬﻟﻚ ﺇﱃ‬

‫‪- 194 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺿﺮﻭﺭﺓ ﲢﺪﻳﺪ ﻫﻮﻳﺔ ﺍﳌﺸﺘﺮﻛﲔ ﺑﺸﺒﻜﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻟﺘﺴﻬﻴﻞ ﻋﻤﻞ ﺍﻟﻀﺒﻄﻴﺔ ﰲ ﺣﺎﻝ ﻭﻗﻮﻉ ﺃﻱ ﳐﺎﻟﻔﺔ‬
‫ﲝﻴﺚ ﳚﺐ ﻋﻠﻰ ﻣﺆﺩﻱ ﺍﳋﺪﻣﺔ ﺃﻥ ﻳﻜﻮﻥ ﻗﺎﺩﺭﺍ ﻋﻠﻰ ﺗﻘﺪﱘ ﺑﻴﺎﻧﺎﺕ ﺷﺨﺼﻴﺔ ﻋﻦ ﺯﺑﺎﺋﻨﻪ ﰲ ﺇﻃﺎﺭ‬
‫) ‪(1‬‬
‫ﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﻋﻨﺪﻣﺎ ﻳﻄﻠﺐ ﻣﻨﻪ ﺫﻟﻚ‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺮﺍﺑﻊ‪ :‬ﺿﻤﺎﻧﺎﺕ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﺃﺛﻨﺎﺀ ﺇﺟﺮﺍﺀﺍﺕ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‬
‫ﺇﻥ ﺍﳋﺼﻮﺻﻴﺔ ﺃﻭ ﺍﳊﻖ ﰲ ﺍﳊﻴﺎﺓ ﺍﻟﺸﺨﺼﻴﺔ ﻳﻌﺪ ﺃﺣﺪ ﺣﻘﻮﻕ ﺍﻹﻧﺴﺎﻥ ﺍﻷﺳﺎﺳﻴﺔ ﺍﻟﱵ ﺃﺛﺎﺭﺕ‬
‫ﺟﺪﻻ ﻭﺍﺳﻌﺎ ﻋﻠﻰ ﺍﳌﺪﻯ ﺍﻟﺘﺎﺭﳜﻲ‪ ،‬ﻭﻟﻌﻠﻪ ﺍﳊﻖ ﺍﻟﺬﻱ ﻳﻌﺎﺩ ﺍﻟﺘﺮﻛﻴﺰ ﻋﻠﻴﻪ ﻋﻠﻰ ﳓﻮ ﻣﺘﻌﺎﻇﻢ ﰲ ﺍﻟﻮﻗﺖ‬
‫) ‪(2‬‬
‫ﺍﳊﺎﺿﺮ ﰲ ﻇﻞ ﺍﻟﺘﻄﻮﺭ ﺍﻟﺘﻜﻨﻮﻟﻮﺟﻲ ﺍﻟﺬﻱ ﻛﺎﻥ ﻟﻪ ﺗﺄﺛﲑ ﺳﻠﱯ ﻋﻠﻰ ﺍﳊﻴﺎﺓ ﺍﳋﺎﺻﺔ‪.‬‬
‫ﻭﻟﻘﺪ ﻛﻔﻠﺖ ﺍﻟﺪﺳﺎﺗﲑ ﺍﳊﻤﺎﻳﺔ ﻟﻠﺤﻴﺎﺓ ﺍﳋﺎﺻﺔ ﻭﻣﻨﻬﺎ ﺍﻟﺪﺳﺘﻮﺭ ﺍﳉﺰﺍﺋﺮﻱ‪(3)،‬ﻭﺫﻟﻚ ﻣﻦ ﺧﻼﻝ‬
‫ﻣﻨﻊ ﺍﻟﻐﲑ ﻣﻦ ﺍﻹﻃﻼﻉ ﻋﻠﻴﻬﺎ ﺑﻘﺼﺪ ﺗﻮﻓﲑ ﻧﻮﻉ ﻣﻦ ﺍﻹﺳﺘﻘﺮﺍﺭ ﻭﺍﻷﻣﻦ ﻟﻠﻤﻮﺍﻃﻦ ﺣﱴ ﻳﺘﻤﻜﻦ ﻣﻦ ﺃﺩﺍﺀ‬
‫ﺩﻭﺭﻩ ﺍﻹﺟﺘﻤﺎﻋﻲ‪ .‬ﻭﺃﻥ ﺇﺣﺪﺍﺙ ﺗﻮﺍﺯﻥ ﺑﲔ ﻓﻌﺎﻟﻴﺔ ﺍﻟﻌﺪﺍﻟﺔ ﺍﳉﺰﺍﺋﻴﺔ ﻭﺿﻤﺎﻥ ﺍﳊﺮﻳﺔ ﺍﻟﺸﺨﺼﻴﺔ ﻫﻮ ﺍﻟﺬﻱ‬
‫ﻳﻌﻄﻲ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﻣﺼﺪﺍﻗﻴﺘﻬﺎ ﰲ ﺩﻭﻟﺔ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﱵ ﺗﻘﻮﻡ ﻓﻴﻬﺎ ﺳﻠﻄﺎ‪‬ﺎ ﻭﺃﺟﻬﺰ‪‬ﺎ ﻋﻠﻰ ﺇﺣﺘﺮﺍﻡ‬
‫ﺳﻴﺎﺩﺓ ﺍﻟﻘﺎﻧﻮﻥ‪ ،‬ﻟﺬﻟﻚ ﳚﺐ ﺃﻥ ﺗﺮﺍﻋﻲ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﲪﺎﻳﺔ ﺍﳊﺮﻳﺔ ﺍﻟﺸﺨﺼﻴﺔ ﰲ ﲨﻴﻊ ﺻﻮﺭﻫﺎ‬
‫ﻭﺃﺷﻜﺎﳍﺎ ﰲ ﻛﺎﻓﺔ ﻣﺮﺍﺣﻞ ﺍﻟﺪﻋﻮﻯ‪.‬‬
‫ﻭﻳﺘﻔﻖ ﻓﻘﻬﺎﺀ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﻨﺎﺋﻲ ﻋﻠﻰ ﺃﻥ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﻳﻌﺘﱪ ﻣﻦ ﺍﻟﻘﻮﺍﻧﲔ ﺍﳌﻨﻈﻤﺔ‬
‫ﻟﻠﺤﺮﻳﺔ ﺍﻟﺸﺨﺼﻴﺔ ﻟﻠﻤﺸﺘﺒﻪ ﻓﻴﻪ ﻭﻟﻠﻤﺘﻬﻢ‪ ،‬ﻟﺬﻟﻚ ﻳﻌﺘﱪ ﻫﺬﺍ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳌﺮﺁﺓ ﺍﻟﱵ ﺗﻌﻜﺲ ﻣﺪﻯ ﺇﺣﺘﺮﺍﻡ‬
‫ﺣﺮﻳﺎﺕ ﻭﺣﻘﻮﻕ ﺍﻷﻓﺮﺍﺩ ﰲ ﺃﻱ ﺩﻭﻟﺔ‪ ،‬ﻛﻤﺎ ﺃﻥ ﻗﻮﺍﻋﺪ ﻫﺬﺍ ﺍﻟﻘﺎﻧﻮﻥ ﲢﺎﻭﻝ ﺍﻟﺘﻮﻓﻴﻖ ﺑﲔ ﻣﺼﻠﺤﺘﲔ‬
‫ﻣﺘﻌﺎﺭﺿﺘﲔ ﳘﺎ ﻣﺼﻠﺤﺔ ﺍﻟﺪﻭﻟﺔ ﺍﻟﱵ ‪‬ﺪﻑ ﺇﱃ ﺍﳌﺼﻠﺤﺔ ﺍﻟﻌﺎﻣﺔ ﻭﺫﻟﻚ ﻋﻦ ﻃﺮﻳﻖ ﺍﻟﻮﺻﻮﻝ ﺇﱃ ﺍﻟﻜﺸﻒ‬
‫ﻋﻦ ﺍﳊﻘﻴﻘﺔ ﺑﻐﺮﺽ ﺇﻗﺘﻀﺎﺀ ﺍﻟﺪﻭﻟﺔ ﳊﻘﻬﺎ ﰲ ﺍﻟﻌﻘﺎﺏ‪ ،‬ﻭﻣﺼﻠﺤﺔ ﺍﻟﻔﺮﺩ ﺑﻀﻤﺎﻥ ﺣﻘﻮﻗﻪ ﻭﺣﺮﻳﺘﻪ‪ .‬ﻭﺃﻥ‬
‫ﺗﻐﻠﻴﺐ ﺇﺣﺪﻯ ﻫﺎﺗﲔ ﺍﳌﺼﻠﺤﺘﲔ ﻋﻠﻰ ﺍﻷﺧﺮﻯ ﳛﺪﺙ ﺧﻠﻼ ﰲ ﻧﻈﺎﻡ ﺍ‪‬ﺘﻤﻊ ﺇﻣﺎ ﺑﻘﻴﺎﻡ ﻧﻈﺎﻡ‬
‫ﺇﺳﺘﺒﺪﺍﺩﻱ ﺑﻮﻟﻴﺴﻲ ﺃﻭ ﺇﻧﺘﺸﺎﺭ ﺍﻟﻔﻮﺿﻰ ﺍﻟﱵ ‪‬ﺪﺩ ﺍﻷﻣﻦ ﻭﺍﻟﻨﻈﺎﻡ ﺍﻟﻌﺎﻡ‪.‬‬
‫ﻭﻫﻨﺎ ﺗﱪﺯ ﺑﻮﺿﻮﺡ ﻣﺴﺄﻟﺔ ﺍﻟﻀﻤﺎﻧﺎﺕ ﰲ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﻭﺃ‪‬ﺎ ﲟﺜﺎﺑﺔ ﺍﻟﻮﺍﻗﻲ ﻭﺍﻟﺴﻴﺎﺝ ﺍﳊﺎﻣﻲ‬
‫ﻟﻠﺤﻘﻮﻕ ﻭﺍﳊﺮﻳﺎﺕ‪ ،‬ﺫﻟﻚ ﺃﻧﻪ ﻭﺇﻥ ﻛﺎﻥ ﺣﻘﺎ ﺃﻥ ﺍﻟﻔﺮﺩ ﻗﺪ ﺃﺧﻞ ﺑﺎﻟﻨﻈﺎﻡ ﺍﻷﻣﲏ ﺇﻻﺟﺘﻤﺎﻋﻲ ﻣﻦ ﺧﻼﻝ‬

‫)‪(1‬ﺻﺎﱀ ﺃﲪﺪ ﺍﻟﱪﺑﺮﻱ‪ ،‬ﺩﻭﺭ ﺍﻟﺸﺮﻃﺔ ﰲ ﻣﻜﺎﻓﺤﺔ ﺟﺮﺍﺋﻢ ﺍﻷﻧﺘﺮﻧﺎﺕ ﰲ ﺇﻃﺎﺭ ﺇﺗﻔﺎﻗﻴﺔ ﺑﻮﺍﺩﺳﻴﺖ ﲝﺚ ﻣﺄﺧﻮﺫ ﻣﻦ ﻣﻮﻗﻊ‪:‬‬
‫‪www.arablaw.com‬‬
‫)‪(2‬ﺑﻮﻟﲔ ﺃﻧﻄﻮﻧﻴﻮﺱ ﺃﻳﻮﺏ‪،‬ﺍﳊﻤﺎﻳﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺤﻴﺎﺓ ﺍﻟﺸﺨﺼﻴﺔ ﰲ ﳎﺎﻝ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺩﺭﺍﺳﺔ ﻣﻘﺎﺭﻧﺔ ﻣﻨﺸﻮﺭﺍﺕ ﺍﳊﻠﱯ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪ ،2009‬ﺹ‪.15‬‬
‫)‪(3‬ﺃﻧﻈﺮ ﺍﳌﻮﺍﺩ‪ 48-47-46-45-40-39:‬ﻣﻦ ﺩﺳﺘﻮﺭ ‪1996.‬‬

‫‪- 195 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﻟﻔﻌﻞ ﺍﳉﺮﻣﻲ ﺍﻟﺬﻱ ﺇﺭﺗﻜﺒﻪ ﺇﻻ ﺃﻧﻪ ﻭﻣﻊ ﺫﻟﻚ ﻣﺎﺯﺍﻝ ﻛﻤﺎ ﻭﻟﺪ ﻋﻠﻴﻪ ﻣﻦ ﻳﻘﲔ ﺍﻟﱪﺍﺀﺓ‪ ،‬ﺍﻷﻣﺮ ﺍﻟﺬﻱ‬
‫) ‪(1‬‬
‫ﻳﻮﺟﺐ ﺍﻟﺘﺤﻔﻆ ﰲ ﻣﻌﺎﻣﻠﺘﻪ ﻭﺗﻘﻴﻴﺪ ﺍﳌﺴﺎﺱ ﲝﺮﻳﺘﻬﺒﺎﻟﻘﺪﺭ ﺍﻟﻼﺯﻡ ﻭﺍﻟﻀﺮﻭﺭﻱ ﻟﺬﻟﻚ‪.‬‬
‫ﻭﺗﻌﺪ ﻃﺮﻕ ﻭﺃﺳﺎﻟﻴﺐ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﻹﺛﺒﺎﺕ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﻟﱵ ﻣﻦ ﺷﺄ‪‬ﺎ‬
‫ﺍﳌﺴﺎﺱ ﺑﺎﳊﻖ ﰲ ﺍﳋﺼﻮﺻﻴﺔ ﻭﺗﻌﺘﱪ ﺇﺳﺘﺜﻨﺎﺀﺍ ﻣﻦ ﺍﻟﻘﺎﻋﺪﺓ ﺍﻟﱵ ﺗﻘﻀﻲ ﺑﻌﺪﻡ ﺍﳌﺴﺎﺱ ﲝﺮﻳﺎﺕ ﺍﻟﻨﺎﺱ‬
‫ﻭﺣﺮﻣﺔ ﺣﻴﺎ‪‬ﻢ ﺍﳋﺎﺻﺔ‪ ،‬ﻟﺬﻟﻚ ﻓﻘﺪ ﻗﻴﺪﺕ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻹﺟﺮﺍﺋﻴﺔ ﻋﻨﺪ ﲰﺎﺣﻬﺎ ﺑﺬﻟﻚ ﺳﻠﻄﺎﺕ ﺍﻟﺘﺤﺮﻱ‬
‫ﻭﺍﻟﺘﺤﻘﻴﻖ ﺑﺸﺮﻭﻁ ﻭﺷﻜﻠﻴﺎﺕ ﲤﺜﻞ ﰲ ﺣﻘﻴﻘﺔ ﺃﻣﺮﻫﺎ ﺿﻤﺎﻧﺎﺕ ﻟﻠﻤﺸﺘﺒﻪ ﻓﻴﻪ‪.‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺿﻤﺎﻧﺎﺕ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﻋﻨﺪ ﺇﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﻭﺿﺒﻂ ﺍﳌﺮﺍﺳﻼﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‬
‫ﺃﺳﻠﻔﻨﺎ ﺍﳊﺪﻳﺚ ﺑﺎﻟﻘﻮﻝ ﺃﻥ ﺍﳊﻖ ﰲ ﺍﳋﺼﻮﺻﻴﺔ ﻣﻦ ﺍﳊﻘﻮﻕ ﺍﻟﻔﺮﺩﻳﺔ ﺍﻟﻠﺼﻴﻘﺔ ﺑﺸﺨﺼﻴﺔ ﺍﻹﻧﺴﺎﻥ‬
‫ﻭﻫﻮ ﻣﻦ ﺍﳊﻘﻮﻕ ﺍﻟﺪﺳﺘﻮﺭﻳﺔ ﺍﻟﱵ ﻻ ﳝﻜﻦ ﺗﺼﻮﺭ ﺇﻧﺴﺎﻥ ﻻ ﻳﺘﻤﺘﻊ ‪‬ﺬﺍ ﺍﳊﻖ‪.‬‬
‫ﻭﻗﺪ ﺇﺗﻀﺢ ﺃﻥ ﺇﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﳝﺲ ﲝﻘﻮﻕ ﺍﻷﻓﺮﺍﺩ ﺳﻮﺍﺀ ﰲ ﺣﺮﻳﺘﻬﻢ ﺍﻟﺸﺨﺼﻴﺔ ﺃﻡ ﰲ ﺣﺮﻣﺔ‬
‫ﻣﺴﺎﻛﻨﻬﻢ ﺃﻡ ﻣﺮﺍﺳﻼ‪‬ﻢ ﺃﻡ ﰲ ﺣﻴﺎ‪‬ﻢ ﺍﳋﺎﺻﺔ‪ ،‬ﻭﻗﺪ ﺃﺟﻴﺰ ﻟﻀﺮﻭﺭﺓ ﺍﻟﻮﺻﻮﻝ ﺇﱃ ﺍﳊﻘﻴﻘﺔ‬
‫) ‪(2‬‬
‫ﺇﺟﺮﺍﺅﻩ‪.‬ﻟﺬﻟﻚ ﻳﻨﺒﻐﻲ ﺃﻥ ﻳﻘﺪﺭ ﺑﻘﺪﺭﻩ ﻭﻻ ﻳﺘﻌﺪﻯ ﻧﻄﺎﻕ ﺍﻟﻐﺮﺽ ﺍﻟﺬﻱ ﺍﺑﺘﻐﻲ ﻣﻨﻪ‪.‬‬
‫ﻭﻟﻘﺪ ﺃﺩﺭﻛﺖ ﻏﺎﻟﺒﻴﺔ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻹﺟﺮﺍﺋﻴﺔ ﻫﺬﻩ ﺍﳊﻘﻴﻘﺔ ﻭﻣﻨﻬﺎ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‬
‫ﺍﳉﺰﺍﺋﺮﻱ‪ ،‬ﳑﺎ ﺣﺪﻯ ﺑﻪ ﺇﱃ ﺗﻮﻓﲑ ﺍﻟﻌﺪﻳﺪ ﻣﻦ ﺍﻟﻀﻤﺎﻧﺎﺕ ﺍﳋﺎﺻﺔ ﺑﺎﳌﺸﺘﺒﻪ ﻓﻴﻪ ﻋﻨﺪ ﺗﻘﺮﻳﺮ ﻣﺜﻞ ﻫﺬﺍ‬
‫ﺍﻹﺟﺮﺍﺀ‪ ،‬ﻓﻬﻞ ﲤﺘﺪ ﻫﺬﻩ ﺍﻟﻀﻤﺎﻧﺎﺕ ﻟﺘﺸﻤﻞ ﺣﻘﻮﻕ ﻭﺣﺮﻳﺎﺕ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﻋﻨﺪ ﺗﻔﺘﻴﺶ ﻧﻈﻢ ﺍﳊﺎﺳﻮﺏ‬
‫ﻭﺍﻷﻧﺘﺮﻧﺎﺕ؟ ﺇﻥ ﺍﻹﺟﺎﺑﺔ ﻋﻠﻰ ﻫﺬﺍ ﺍﻟﺘﺴﺎﺅﻝ ﺗﺘﻄﻠﺐ ﻣﻨﺎ ﺍﻟﺒﺤﺚ ﰲ ﺍﻟﻀﻤﺎﻧﺎﺕ ﻭﺍﻟﺸﺮﻭﻁ ﺍﻟﻌﺎﻣﺔ ﺍﳌﻘﺮﺭﺓ‬
‫ﻋﻨﺪ ﺍﻟﻘﻴﺎﻡ ﺑﺈﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﰒ ﻣﺪﻯ ﺃﺧﺬ ﺍﳌﺸﺮﻉ ‪‬ﺎ ﻋﻨﺪ ﻣﺎ ﻳﻌﺘﻠﻖ ﺍﻷﻣﺮ ﺑﺘﻔﺘﻴﺶ ﻧﻈﻢ ﺍﳊﺎﺳﻮﺏ ﺃﻭ ﻣﺎ‬
‫‪La perquisition numirque.‬‬ ‫ﻳﺴﻤﻰ ﺑﺎﻟﺘﻔﺘﻴﺶ ﺍﻹﻟﻜﺘﺮﻭﱐ‬
‫ﺃﻭﻻ‪ :‬ﺍﻟﻀﻤﺎﻧﺎﺕ ﺍﻟﻌﺎﻣﺔ ﻟﻠﻤﺸﺘﺒﻪ ﻓﻴﻪ ﰲ ﻣﻮﺍﺟﻬﺔ ﺍﻟﺘﻔﺘﻴﺶ ﻭﺿﺒﻂ ﺍﻷﺩﻟﺔ‪:‬ﺇﻥ ﺍﻟﺘﻔﺘﻴﺶ ﺍﳌﻌﺘﱪ‬
‫ﺇﺟﺮﺍﺀ ﻣﻦ ﺇﺟﺮﺍﺀﺍﺕ ﺍﻟﺘﺤﺮﻱ ﻭﺍﻟﺒﺤﺚ ﻋﻦ ﺃﺩﻟﺔ ﺍﳉﺮﳝﺔ ﻫﻮ ﺇﻃﻼﻉ ﺍﶈﻘﻖ ﻋﻠﻰ ﳏﻞ ﻣﻨﺤﻪ ﺍﻟﻘﺎﻧﻮﻥ‬
‫ﺣﺮﻣﺔ ﺧﺎﺻﺔ ﻟﻜﻮﻧﻪ ﻣﺴﺘﻮﺩﻉ ﺳﺮ ﺻﺎﺣﺒﻪ ﻭﻫﺬﺍ ﻟﻀﺒﻂ ﻣﺎ ﳛﺘﻤﻞ ﻭﺟﻮﺩﻩ ﺑﻪ ﻣﱴ ﻛﺎﻥ ﺫﻟﻚ ﻣﻔﻴﺪﺍ‬
‫ﻟﻠﺤﻘﻴﻘﺔ‪ ،‬ﻟﺬﻟﻚ ﻓﻜﻠﻤﺎ ﻭﺟﺪ ﺍﻟﺴﺮ ﻭﺍﻟﻜﺘﻤﺎﻥ ﻭﺍﳊﻤﺎﻳﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻭﺟﺪ ﺍﻟﺘﻔﺘﻴﺶ ﺑﺸﺮﻭﻃﻪ ﻭﻣﺘﻄﻠﺒﺎﺗﻪ‪،‬‬
‫ﺃﻣﺎ ﺇﺫﺍ ﺻﺮﻧﺎ ﺇﱃ ﺍﻟﻌﻼﻧﻴﺔ ﻭﺍ‪‬ﺎﻫﺮﺓ ﺇﻧﻌﺪﻡ ﻣﺴﺘﻮﺩﻉ ﺍﻟﺴﺮ ﻭﻻ ﻛﻼﻡ ﻋﻨﺪﺋﺬ ﻋﻦ ﺍﻟﺘﻔﺘﻴﺶ‪.‬‬
‫)‪(1‬ﳏﻤﺪ ﳏﺪﺓ‪ ،‬ﺿﻤﺎﻧﺎﺕ ﺍﳌﺘﻬﻢ ﺃﺛﻨﺎﺀ ﺍﻟﺘﺤﻘﻴﻖ‪ ،‬ﺩﺍﺭ ﺍﳍﺪﻯ ﻋﲔ ﻣﻠﻴﻠﺔ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪ ،1992-1991‬ﺹ‪.6‬‬
‫)‪(2‬ﳏﻤﺪ ﻋﺒﺪ ﺍﶈﺴﻦ ﺍﳌﻘﺎﻃﻊ‪ ،‬ﲪﺎﻳﺔ ﺍﳊﻴﺎﺓ ﺍﳋﺎﺻﺔ ﻟﻸﻓﺮﺍﺩ ﻭﺿﻤﺎﻧﺎ‪‬ﺎ ﰲ ﻣﻮﺍﺟﻬﺔ ﺍﳊﺎﺳﻮﺏ ﺍﻵﱄ ﺩﺭﺍﺳﺔ ﲢﻠﻴﻠﻴﺔ ﻧﻘﺪﻳﺔ ﻣﻘﺎﺭﻧﺔ ﻟﻠﺤﻖ ﰲ ﺍﳋﺼﻮﺻﻴﺔ‬
‫ﻭﺗﻄﺒﻴﻘﺎﺗﻪ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﻜﻮﰐ‪ ،‬ﻣﻄﺒﻮﻋﺎﺕ ﺟﺎﻣﻌﺔ ﺍﻟﻜﻮﻳﺖ ‪ ،1992‬ﺹ‪.156‬‬

‫‪- 196 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﰲ ﺣﻘﻴﻘﺔ ﺍﻷﻣﺮ ﻓﺈﻥ ﺗﻠﻚ ﺍﻟﺸﺮﻭﻁ ﻭﺍﻟﺸﻜﻠﻴﺎﺕ ﻭﺍﻟﱵ ﻗﻴﺪ ‪‬ﺎ ﺍﻟﻘﺎﻧﻮﻥ ﺳﻠﻄﺔ ﺍﻟﺘﺤﺮﻱ‬
‫ﻭﺍﻟﺘﺤﻘﻴﻖ ﻋﻨﺪ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﲤﺜﻞ ﻛﻠﻬﺎ ﺿﻤﺎﻧﺎﺕ ﻟﻠﻤﺸﺘﺒﻪ ﻓﻴﻪ ﺃﻭ ﻟﻠﻤﺘﻬﻢ ﻭﻣﻦ ﺫﻟﻚ‪:‬‬
‫‪-‬ﻻ ﻳﺼﺪﺭ ﺍﻹﺫﻥ ﺑﺎﻟﺘﻔﺘﻴﺶ ﺇﻻ ﺑﻌﺪ ﻭﻗﻮﻉ ﺟﺮﳝﺔ‪ ،‬ﻓﺤﻤﺎﻳﺔ ﻟﻠﻤﺸﺘﺒﻪ ﻓﻴﻪ ﻣﻦ ﺇﺳﺘﺨﺪﺍﻡ ﻫﺬﺍ‬
‫ﺍﻹﺟﺮﺍﺀ ﺑﺼﻮﺭﺓ ﻏﲑ ﻣﺸﺮﻭﻋﺔ ﻧﺼﺖ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻹﺟﺮﺍﺋﻴﺔ ﻭﻣﻨﻬﺎ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻋﻠﻰ ﻋﺪﻡ ﺇﻣﻜﺎﻧﻴﺔ‬
‫ﺇﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﺇﻻ ﺑﻌﺪ ﻭﻗﻮﻉ ﺟﺮﳝﺔ‪ ،‬ﻭﻫﻮ ﻣﺎ ﻳﻔﻬﻢ ﻣﻦ ﻧﺺ ﺍﳌﺎﺩﺓ ‪ 44‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‬
‫ﺍﳉﺰﺍﺋﺮﻱ ‪،‬ﻭﺍﻟﺴﺎﺋﺪ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ﺃﻥ ﺇﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﻻﻳﻘﻊ ﺇﻻ ﰲ ﺣﺎﻟﺔ ﻭﻗﻮﻉ ﺟﺮﳝﺔ ﻳﻌﺘﱪﻫﺎ ﺍﻟﻘﺎﻧﻮﻥ‬
‫ﺟﻨﺎﻳﺔ ﺃﻡ ﺟﻨﺤﺔ‪ ،‬ﺃﻣﺎ ﺍﳌﺨﺎﻟﻔﺔ ﻓﻠﻴﺲ ﰲ ﻭﻗﻮﻋﻬﺎ ﻣﺎ ﻳﱪﺭ ﻣﺒﺎﺷﺮﺓ ﺍﻟﺘﻔﺘﻴﺶ ﺑﺸﺄ‪‬ﺎ ﻷ‪‬ﺎ ﻟﻴﺴﺖ ﻣﻦ‬
‫ﺍﻷﳘﻴﺔ ﺑﺎﻟﻘﺪﺭ ﺍﻟﺬﻱ ﻳﺴﻤﺢ ﺑﺎﻟﺘﻌﺮﺽ ﻟﻠﺤﺮﻳﺔ ﺍﻟﺸﺨﺼﻴﺔ ﺃﻭ ﺇﻧﺘﻬﺎﻙ ﺣﺮﻣﺔ ﺍﳌﺴﺎﻛﻦ‪ ،‬ﻛﻤﺎ ﺇﺳﺘﻘﺮ ﺍﻟﻔﻘﻪ‬
‫ﺍﻹﺟﺮﺍﺋﻲ ﻭﻣﻌﻪ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺃﻧﻪ ﻻ ﳚﻮﺯ ﺇﺻﺪﺍﺭ ﺇﺫﻥ ﺑﺎﻟﺘﻔﺘﻴﺶ ﺑﺸﺄﻥ ﺟﺮﳝﺔ ﳛﺘﻤﻞ ﻭﻗﻮﻋﻬﺎ ﻣﺴﺘﻘﺒﻼ‪.‬‬
‫‪ -‬ﲢﻘﻴﻖ ﻓﺎﺋﺪﺓ ﻣﺮﺟﻮﺓ ﻣﻦ ﺇﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﺫﻟﻚ ﺃﻥ ﺍﻟﻐﺮﺽ ﻣﻦ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﻫﻮ ﺇﺣﺘﻤﺎﻝ‬
‫ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺃﺷﻴﺎﺀ ﺗﻔﻴﺪ ﰲ ﻛﺸﻒ ﺍﳊﻘﻴﻘﺔ ﻭﻣﻦ ﺃﺟﻞ ﺃﻻ ﻳﻜﻮﻥ ﺇﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﻭﺳﻴﻠﺔ ﻟﻼﻓﺘﺌﺎﺕ‬
‫ﻋﻠﻰ ﺣﺮﻳﺎﺕ ﺍﻷﻓﺮﺍﺩ ﺩﻭﻥ ﻭﺟﻪ ﺣﻖ ﻓﻘﺪ ﻗﺮﺭ ﺍﻟﺸﺮﻉ ﺃﻥ ﻳﻜﻮﻥ ﻫﻨﺎﻙ ﻓﺎﺋﺪﺓ ﻣﻦ ﺗﻘﺮﻳﺮ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ‪،‬‬
‫ﻭﲢﻘﻖ ﺍﻟﻔﺎﺋﺪﺓ ﺍﳌﺮﺟﻮﺓ ﻣﻦ ﺍﻟﺘﻔﺘﻴﺶ ﺗﻌﲏ ﺃﻥ ﺗﻘﻮﻡ ﻗﺮﺍﺋﻦ ﻭﺃﻣﺎﺭﺍﺕ ﻋﻠﻰ ﻭﺟﻮﺩ ﺃﺷﻴﺎﺀ ﺗﺘﻌﻠﻖ ﺑﺎﳉﺮﳝﺔ ﰲ‬
‫ﺍﳌﻜﺎﻥ ﺍﳌﺮﺍﺩ ﺗﻔﺘﻴﺸﻪ‪ ،‬ﻭﻫﺬﺍ ﻣﺎ ﻳﻔﻬﻢ ﻣﻦ ﻧﺺ ﺍﳌﺎﺩﺓ ‪ 44‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺑﻘﻮﳍﺎ‪ ":‬ﻻ‬
‫ﳚﻮﺯ ﻟﻀﺒﺎﻁ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﻹﻧﺘﻘﺎﻝ ﺇﱃ ﻣﺴﺎﻛﻦ ﺍﻷﺷﺨﺎﺹ ﺍﻟﺬﻳﻦ ﻳﻈﻬﺮ ﺃ‪‬ﻢ ﺳﺎﳘﻮﺍ ﰲ ﺍﳉﻨﺎﻳﺔ‬
‫ﻭﺃ‪‬ﻢ ﳛﻮﺯﻭﻥ ﺃﺷﻴﺎﺀ ﳍﺎ ﻋﻼﻗﺔ ﺑﺎﳉﺮﳝﺔ ﻹﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ‪ ".....‬ﻭﻛﺬﺍ ﻧﺺ ﺍﳌﺎﺩﺓ ‪ 81‬ﻣﻦ ﻧﻔﺲ ﺍﻟﻘﺎﻧﻮﻥ‬
‫ﺑﻘﻮﳍﺎ ﺃﻧﻪ ﻳﺒﺎﺷﺮ ﺍﻟﺘﻔﺘﻴﺶ ﰲ ﲨﻴﻊ ﺍﻷﻣﺎﻛﻦ ﺍﻟﱵ ﳝﻜﻦ ﺍﻟﻌﺜﻮﺭ ﻓﻴﻬﺎ ﻋﻠﻰ ﺃﺷﻴﺎﺀ ﻳﻜﻮﻥ ﻛﺸﻔﻬﺎ ﻣﻔﻴﺪﺍ‬
‫ﻹﻇﻬﺎﺭ ﺍﳊﻘﻴﻘﺔ‪.‬ﻭﺇﺫﺍ ﻛﺎﻥ ﺇﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﺩﻭﻥ ﻓﺎﺋﺪﺓ ﳏﺘﻤﻠﺔ ﻓﺈﻧﻪ ﻳﻜﻮﻥ ﲢﻜﻤﻴﺎ ﺑﺴﺒﺐ ﺇﻧﺘﻔﺎﺀ‬
‫) ‪(1‬‬
‫ﺍﳌﺼﻠﺤﺔ‪.‬‬
‫ﻭﺗﻘﺪﻳﺮ ﺿﺮﻭﺭﺓ ﺇﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﻟﺘﺤﻘﻴﻖ ﺍﻟﻔﺎﺋﺪﺓ ﻣﻦ ﺇﺟﺮﺍﺋﻪ ﻳﻌﻮﺩ ﻟﻠﺴﻠﻄﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﺎﳓﺔ ﻟﻺﺫﻥ‬
‫ﺑﻪ ﻭﺗﺘﻄﻠﺐ ﻫﺬﻩ ﺍﻟﻀﻤﺎﻧﺔ ﺃﻥ ﻳﻘﻮﻡ ﺍﻟﻘﺎﺋﻢ ﺑﺎﻟﺘﻔﺘﻴﺶ ﺑﺈﺟﺮﺍﺋﻪ ﻭﻓﻘﺎ ﻟﻠﻜﻴﻔﻴﺔ ﺍﻟﱵ ﺗﺘﻨﺎﺳﺐ ﻣﻊ ﺍﻟﻐﺮﺽ‬
‫ﺍﳌﺮﺟﻮ ﻣﻦ ﻭﺭﺍﺋﻪ ﻭﻫﻮ ﳜﺘﻠﻒ ﺑﻄﺒﻴﻌﺔ ﺍﳊﺎﻝ ﺣﺴﺐ ﻧﻮﻉ ﺍﳉﺮﳝﺔ‪.‬‬

‫)‪(1‬ﺭﺅﻭﻑ ﻋﺒﻴﺪ ﻣﺒﺎﺩﺉ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﻨﺎﺋﻴﺔ ﺍﳌﺼﺮﻱ‪ ،‬ﻣﻄﺒﻌﺔ ﺍﻹﺳﺘﻘﻼﻝ ﺍﻟﻜﱪﻯ‪ ،‬ﻁ‪ 1‬ﺍﻟﻘﺎﻫﺮﺓ ‪ ،1986‬ﺹ‪.394‬‬

‫‪- 197 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪-‬ﻻ ﻳﺘﻢ ﺍﻟﺘﻔﺘﻴﺶ ﺇﻻ ﺑﻨﺎﺀﺍ ﻋﻠﻰ ﺇﺫﻥ ﻣﺴﺒﻖ ﻣﻦ ﺍﻟﺴﻠﻄﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﺨﺘﺼﺔ ﻭﻫﻮ ﺷﺮﻁ‬
‫ﺩﺳﺘﻮﺭﻱ)‪(1‬ﻧﺼﺖ ﻋﻠﻴﻬﺎ ﺍﳌﺎﺩﺓ ‪ 38‬ﻣﻦ ﺍﻟﺪﺳﺘﻮﺭ ﺑﻘﻮﳍﺎ ﺃﻧﻪ ﻻ ﺗﻔﺘﻴﺶ ﺇﻻ ﺑﺄﻣﺮ ﻣﻜﺘﻮﺏ ﺻﺎﺩﺭ ﻣﻦ‬
‫ﺍﻟﺴﻠﻄﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﺨﺘﺼﺔ" ﻭﻫﻮ ﻣﺎ ﺗﺆﻛﺪﻩ ﺑﻌﺪ ﺫﻟﻚ ﺍﳌﺎﺩﺓ ‪ 44‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‪.‬‬
‫‪ -‬ﲢﺪﻳﺪ ﻣﻴﻌﺎﺩ ﻣﻌﲔ ﻹﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﻭﻫﻮ ﻣﺎ ﻗﺎﻣﺖ ﺑﻪ ﺑﻌﺾ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻹﺟﺮﺍﺋﻴﺔ ﻭﻣﻨﻬﺎ‬
‫ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﺍﻟﺬﻱ ﻋﻤﻞ ﻋﻠﻰ ﲢﺪﻳﺪ ﻭﻗﺖ ﻣﻌﲔ ﻟﺘﻨﻔﻴﺬ ﺇﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﻣﻮﺍﺯﻧﺎ ﺑﲔ ﻣﺎ ﳝﻜﻦ‬
‫ﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ ﻣﻦ ﺃﺩﻟﺔ ﺍﳉﺮﳝﺔ ﻭﻣﺎ ﳝﻜﻦ ﺣﺼﻮﻟﻪ ﻣﻦ ﺇﺿﻄﺮﺍﺏ ﰲ ﺣﻴﺎﺓ ﺍﻟﻨﺎﺱ‪ ،‬ﻭﺍﺿﻌﺎ ﻧﺼﺐ ﻋﻴﻨﻴﻪ‬
‫ﺩﺍﺋﻤﺎ ﺟﺴﺎﻣﺔ ﺍﳉﺮﳝﺔ‪ ،‬ﻓﻤﻦ ﻛﺎﻥ ﻣﺘﻬﻤﺎ ﲜﻨﺎﻳﺔ ﻟﻴﺲ ﻛﻤﻦ ﻫﻮ ﻣﺘﻬﻢ ﲜﻨﺤﺔ‪ ،‬ﻭﻣﻦ ﻛﺎﻥ ﻛﺬﻟﻚ ﻓﺈﻧﻪ ﻻ‬
‫ﳚﻮﺯ ﺗﻔﺘﻴﺶ ﻣﺴﻜﻨﻪ ﺇﻻ ﰲ ﺍﻷﻭﻗﺎﺕ ﺍﻟﱵ ﺣﺪﺩ‪‬ﺎ ﺍﳌﺎﺩﺓ ‪ 47‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﻭﻫﺬﺍ ﻳﻌﲏ‬
‫ﺃﻧﻪ ﻻ ﻳﻜﻮﻥ ﻗﺒﻞ ﺍﳋﺎﻣﺴﺔ ﺻﺒﺎﺣﺎ ﻭﻻ ﺑﻌﺪ ﺍﻟﺴﺎﻋﺔ ﺍﻟﺜﺎﻣﻨﺔ ﻣﺴﺎﺀﺍ‪ ،‬ﻟﻜﻦ ﺇﺫﺍ ﻛﺎﻥ ﺍﻟﻘﺎﺋﻢ ﺑﺎﻟﺘﻔﺘﻴﺶ ﻗﺪ‬
‫ﺑﺪﺃ ﺗﻔﺘﻴﺸﻪ ﻗﺒﻞ ﻫﺬﻩ ﺍﻟﺴﺎﻋﺔ ﻭ ﺃﺩﺭﻛﻪ ﺍﻟﻮﻗﺖ ﻭﱂ ﻳﻨﺘﻪ ﺗﻔﺘﻴﺸﻪ ﻓﻠﻪ ﺃﻥ ﻳﻜﻤﻞ ﺩﻭﻥ ﺇﻧﻘﻄﺎﻉ‪ ،‬ﺃﻣﺎ ﺇﺫﺍ‬
‫ﻛﺎﻥ ﺍﻟﺸﺨﺺ ﻣﺘﻬﻤﺎ ﲜﻨﺎﻳﺔ ﻓﺈﻥ ﺍﻟﺸﺮﻉ ﺃﻋﻄﻰ ﻟﻘﺎﺿﻲ ﺍﻟﺘﺤﻘﻴﻖ ﺩﻭﻥ ﺳﻮﺍﻩ ﺍﳊﻖ ﰲ ﺇﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﰲ‬
‫ﻏﲑ ﺍﻟﺴﺎﻋﺎﺕ ﺍﶈﺪﺩﺓ ﰲ ﺍﳌﺎﺩﺓ ‪ 47‬ﺑﺸﺮﻁ ﺃﻥ ﳚﺮﻱ ﺍﻟﺘﻔﺘﻴﺶ ﺑﻨﻔﺴﻪ ﺩﻭﻥ ﺇﻧﺎﺑﺔ ﻗﻀﺎﺋﻴﺔ ﰲ ﺫﻟﻚ ﻭﺃﻥ‬
‫ﻳﺘﻢ ﲝﻀﻮﺭ ﻭﻛﻴﻞ ﺍﳉﻤﻬﻮﺭﻳﺔ ﻭﻫﻮ ﻣﺎ ﺗﻘﻮﻝ ﺑﻪ ﺍﳌﺎﺩﺓ ‪ 82‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‪.‬‬
‫‪ -‬ﺣﻀﻮﺭ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﺃﻭ ﺍﳌﺘﻬﻢ ﺃﺛﻨﺎﺀ ﺇﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﻭﻫﻮ ﻣﺎ ﻗﺪ ﺇﺗﻔﻘﺖ ﻋﻠﻴﻪ ﻏﺎﻟﺒﻴﺔ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ‬
‫ﺍﻹﺟﺮﺍﺋﻴﺔ ﻣﻦ ﺿﺮﻭﺭﺓ ﺣﻀﻮﺭﻩ ﺃﻭ ﻣﻦ ﻳﻨﻮﺏ ﻋﻨﻪ ﻋﻨﺪ ﻋﻤﻠﻴﺔ ﺍﻟﺘﻔﺘﻴﺶ ﻭﻫﺬﺍ ﺣﱴ ﻳﻜﻮﻥ ﻋﻠﻰ ﺑﻴﻨﺔ‬
‫ﻭﺩﺭﺍﻳﺔ ﲟﺎ ﺿﺒﻂ ﺃﻭ ﺇﻛﺘﺸﻒ‪ ،‬ﻭﻛﻀﻤﺎﻧﺔ ﳍﺬﻩ ﺍﳊﻘﻮﻕ ﻓﺈﻥ ﺍﻟﺸﺮﻉ ﰲ ﺣﺎﻟﺔ ﺭﻓﺾ ﺍﳌﺸﺒﻪ ﻓﻴﻪ ﺍﳊﻀﻮﺭ‬
‫ﺃﻭ ﰲ ﺣﺎﻟﺔ ﻋﺪﻡ ﻗﺪﺭﺗﻪ ﻋﻠﻰ ﺫﻟﻚ ﺇﺷﺘﺮﻁ ﺣﻀﻮﺭ ﻣﻦ ﻳﻨﻮﺏ ﻋﻨﻪ‪.‬‬
‫‪ -‬ﺍﶈﺎﻓﻈﺔ ﻋﻠﻰ ﺍﻷﺳﺮﺍﺭ ﻭﻫﻲ ﺿﻤﺎﻧﺔ ﳒﺪ ﳍﺎ ﳏﻼ ﺑﻨﺺ ﺍﳌﺎﺩﺓ ‪ 45‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ‬
‫ﺍﳉﺰﺍﺋﻴﺔ ﺑﻨﺼﻬﺎ‪....":‬ﻏﲑ ﺃﻧﻪ ﳚﺐ ﻋﻨﺪ ﺗﻔﺘﻴﺶ ﺃﻣﺎﻛﻦ ﻳﺸﻐﻠﻬﺎ ﺷﺨﺺ ﻣﻠﺰﻡ ﻗﺎﻧﻮﻧﺎ ﺑﻜﺘﻤﺎﻥ ﺍﻟﺴﺮ‬
‫ﺍﳌﻬﲏ ﺃﻥ ﺗﺘﺨﺬ ﻣﻘﺪﻣﺎ ﲨﻴﻊ ﺍﻟﺘﺪﺍﺑﲑ ﺍﻟﻼﺯﻣﺔ ﻟﻀﻤﺎﻥ ﺇﺣﺘﺮﺍﻡ ﺫﻟﻚ ﺍﻟﺴﺮ" ﻭﺃﻋﻘﺐ ﺍﻟﺸﺮﻉ ﻋﻠﻰ ﺫﻟﻚ‬
‫ﺑﺎﻟﺘﺠﺮﱘ ﻭﺍﻟﻌﻘﺎﺏ ﰲ ﺍﳌﺎﺩﺓ ‪ 46‬ﻟﻜﻞ ﺷﺨﺺ ﻳﻔﺸﻲ ﻣﺴﺘﻨﺪﺍ ﻧﺎﲡﺎ ﻣﻦ ﺍﻟﺘﻔﺘﻴﺶ‪.‬ﻭﰲ ﻫﺬﺍ ﺿﻤﺎﻧﺔ‬
‫ﻟﻠﻤﺸﺘﺒﻪ ﻓﻴﻪ ﺣﻴﺚ ﲢﻔﻆ ﺃﺳﺮﺍﺭﻩ ﻣﻦ ﺇﻃﻼﻉ ﻏﲑ ﺍﶈﻘﻖ ﻋﻠﻴﻬﺎ ﻭﻟﻮ ﻛﺎﻧﻮﺍ ﻣﻦ ﻣﺴﺎﻋﺪﻳﻪ ﺃﻭ ﺃﺷﺨﺎﺹ‬
‫ﺁﺧﺮﻳﻦ ﻻ ﺻﻔﺔ ﳍﻢ ﻗﺎﻧﻮﻧﺎ ﰲ ﺍﻹﻃﻼﻉ ﻋﻠﻴﻬﺎ‪.‬‬

‫)‪(1‬ﻫﺬﺍ ﺍﻟﺸﺮﻁ ﻣﻄﻠﻮﺏ ﰲ ﺍﻟﺪﻭﻝ ﺍﻟﱵ ﺗﻔﺼﻞ ﺃﻧﻈﻤﺘﻬﺎ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺑﲔ ﺟﻬﺔ ﺍﻟﺘﺤﻘﻴﻖ ﻭﺟﻬﺔ ﺍﻟﺘﺤﺮﻱ‪.‬‬

‫‪- 198 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﻓﻴﻤﺎ ﻳﺘﻌﻠﻖ ﺑﻀﺒﻂ ﺍﻷﺩﻟﺔ ﺍﳌﺘﺤﺼﻞ ﻋﻠﻴﻬﺎ ﺑﺴﺒﺐ ﺍﻟﺘﻔﺘﻴﺶ ﻓﺈﻥ ﺍﻟﺸﺮﻉ ﺃﻳﻀﺎ ﺃﺣﺎﻁ ﻫﺬﻩ ﺍﻟﻌﻤﻠﻴﺔ‬
‫ﺑﻀﻤﺎﻧﺎﺕ ﻭﺷﺮﻭﻁ ﻣﻨﻬﺎ‪:‬‬
‫‪-‬ﺍﶈﺎﻓﻈﺔ ﻋﻠﻰ ﺍﳌﻀﺒﻮﻃﺎﺕ ﻓﻘﺪ ﺃﻭﺟﺐ ﺍﳌﺸﺮﻉ ﻋﻠﻰ ﺿﺎﺑﻂ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﻟﺬﻱ ﻭﺟﺪ‬
‫ﺃﺷﻴﺎﺀ ﺗﻔﻴﺪ ﰲ ﳎﺮﻳﺎﺕ ﺍﻟﺘﺤﺮﻳﺎﺕ ﻭﺃﺭﺍﺩ ﺿﺒﻄﻬﺎ ﺃﻥ ﻳﻌﺮﺿﻬﺎ ﻋﻠﻰ ﺍﳌﺮﺍﺩ ﺗﻔﺘﻴﺸﻪ ﻟﻠﺘﻌﺮﻑ ﻋﻠﻴﻬﺎ ﻭﻋﻠﻰ‬
‫ﻃﺒﻴﻌﺘﻬﺎ‪ ،‬ﻭﰲ ﻫﺬﺍ ﺍﻹﻃﺎﺭ ﻧﺼﺖ ﺍﳌﺎﺩﺓ ‪ 84‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺃﻧﻪ‪ ....":‬ﳚﺐ ﻋﻠﻰ ﺍﻟﻔﻮﺭ‬
‫ﺇﺣﺼﺎﺀ ﺍﻷﺷﻴﺎﺀ ﺍﳌﻀﺒﻮﻃﺔ ﻭﻭﺿﻌﻬﺎ ﰲ ﺃﺣﺮﺍﺯ ﳐﺘﻮﻣﺔ ﻭﻻ ﳚﻮﺯ ﻓﺘﺢ ﻫﺬﻩ ﺍﻷﺣﺮﺍﺯ ﺇﻻ ﲝﻀﻮﺭ ﺍﳌﺘﻬﻢ‬
‫ﻛﻤﺎ ﺃﻧﻪ ﻻ ﳚﻮﺯ ﺿﺒﻂ ﺇﻻ ﺍﻷﺷﻴﺎﺀ ﺍﻟﻨﺎﻓﻌﺔ ﰲ ﺇﻇﻬﺎﺭ ﺍﳊﻘﻴﻘﺔ‪ ،‬ﺑﻞ ﻭﺍﻷﻛﺜﺮ ﻣﻦ ﺫﻟﻚ ﻓﻘﺪ ﺃﺟﺎﺯ ﺍﳌﺸﺮﻉ‬
‫ﺃﻥ ﳛﺼﻞ ﺍﳌﺘﻬﻢ ﻋﻠﻰ ﺻﻮﺭﺓ ﻓﻮﺗﻮﻏﺮﺍﻓﻴﺔ ﻟﻸﺷﻴﺎﺀ ﺍﳌﻀﺒﻮﻃﺔ ﻭﺫﻟﻚ ﻋﻠﻰ ﻧﻔﻘﺘﻪ ﺇﺫﺍ ﱂ ﻳﺆﺛﺮ ﺫﻟﻚ ﻋﻠﻰ‬
‫ﳎﺮﻳﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ‪.‬‬
‫ﺛﺎﻧﻴﺎ‪ :‬ﺿﻤﺎﻧﺎﺕ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﰲ ﳎﺎﻝ ﺗﻔﺘﻴﺶ ﻧﻈﻢ ﺍﳊﺎﺳﻮﺑﻮﺿﺒﻂ ﺍﳌﻌﻄﻴﺎﺕ‪ :‬ﻳﺘﺒﲔ ﻣﻦ ﺇﺳﺘﻘﺮﺍﺋﻨﺎ‬
‫ﺍﻟﻨﺼﻮﺹ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﳌﻨﻈﻤﺔ ﳍﺬﺍ ﺍﻹﺟﺮﺍﺀ ﺃﻥ ﻣﺎ ﺳﺒﻖ ﺍﳌﺸﺮﻉ ﺃﻥ ﻗﺮﺭﻩ ﻣﻦ ﺿﻤﺎﻧﺎﺕ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ‬
‫ﺣﻴﺎﻝ ﺇﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﻗﺪ ﺗﺘﻘﻠﺺ ﻋﻨﺪﻣﺎ ﻳﺘﻌﻠﻖ ﺍﻷﻣﺮ ﺑﺎﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﻫﺬﺍ ﺭﺍﺟﻊ ﺇﱃ ﺍﳋﺼﺎﺋﺺ ﺍﻟﱵ ﺗﺘﻤﻴﺰ ‪‬ﺎ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻦ ﻏﲑﻫﺎ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﻷﺧﺮﻯ ﻛﺴﺮﻋﺔ ﺗﻨﻔﻴﺬﻫﺎ ﻭﳏﻮ ﺁﺛﺎﺭﻫﺎ ﻭﺑﻌﺪﻫﺎ ﺍﳌﺘﺨﻄﻲ ﻟﻠﺤﺪﻭﺩ ﺍﻟﻮﻃﻨﻴﺔ ﻭﻳﺒﺪﻭ ﺫﻟﻚ ﻣﻦ ﺧﻼﻝ‬
‫ﻣﺎ ﻳﻠﻲ‪:‬‬
‫‪-‬ﺇﻣﻜﺎﻧﻴﺔ ﺇﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﻋﻠﻰ ﺍﳌﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﲞﺼﻮﺹ ﺟﺮﺍﺋﻢ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﳛﺘﻤﻞ ﻭﻗﻮﻋﻬﺎ ﰲ‬
‫ﺍﳌﺴﺘﻘﺒﻞ ﻭﻫﺬﺍ ﺧﻼﻓﺎ ﳌﺎ ﺳﺒﻖ ﻭﺃﻥ ﻣﺮ ﺑﻨﺎ ﻣﻦ ﺃﻧﻪ ﻻ ﻳﺼﺪﺭ ﺍﻹﺫﻥ ﺑﺎﻟﺘﻔﺘﻴﺶ ﺇﻻ ﺑﻌﺪ ﻭﻗﻮﻉ ﺟﺮﳝﺔ‬
‫ﻭﻳﻔﻬﻢ ﺫﻟﻚ ﻣﻦ ﻧﺺ ﺍﳌﺎﺩﺓ ‪ 05‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﺍﻟﱵ ﺃﺟﺎﺯﺕ ﻟﻠﺴﻠﻄﺎﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﺨﺘﺼﺔ ﻭﻛﺬﺍ‬
‫ﺿﺒﺎﻁ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﻟﺪﺧﻮﻝ ﺇﱃ ﺍﳌﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻭ ﺟﺰﺀ ﻣﻨﻬﺎ ﺑﻐﺮﺽ ﺍﻟﻘﻴﺎﻡ ﺑﺘﻔﺘﻴﺸﻬﺎ ﻣﻦ‬
‫ﺃﺟﻞ ﺍﻟﻮﻗﺎﻳﺔ ﻣﻦ ﺃﻓﻌﺎﻝ ﺇﺭﻫﺎﺑﻴﺔ ﺃﻭ ﲣﺮﻳﺒﻴﺔ ﺃﻭ ﺍﻟﻮﻗﺎﻳﺔ ﻣﻦ ﺟﺮﺍﺋﻢ ﻣﺎﺳﺔ ﺑﺄﻣﻦ ﺍﻟﺪﻭﻟﺔ‪ ،‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ‬
‫ﺇﻣﻜﺎﻧﻴﺔ ﺍﻟﻘﻴﺎﻡ ‪‬ﺬﺍ ﺍﻹﺟﺮﺍﺀ ﰲ ﺣﺎﻟﺔ ﺗﻮﻓﺮ ﻣﻌﻠﻮﻣﺎﺕ ﻋﻦ ﺇﺣﺘﻤﺎﻝ ﺇﻋﺘﺪﺍﺀ ﻋﻠﻰ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﻳﻜﻮﻥ ﻏﺮﺿﻬﺎ ‪‬ﺪﻳﺪ ﺍﻟﻨﻈﺎﻡ ﺍﻟﻌﺎﻡ ﺃﻭ ﺍﻟﺪﻓﺎﻉ ﺍﻟﻮﻃﲏ ﺃﻭ ﻣﺆﺳﺴﺎﺕ ﺍﻟﺪﻭﻟﺔ ﺃﻭ ﺍﻹﻗﺘﺼﺎﺩ ﺍﻟﻮﻃﲏ‪.‬‬
‫ﻓﺈﺳﺘﻌﻤﺎﻝ ﺍﻟﺸﺮﻉ ﳌﺼﻄﻠﺤﻲ "ﻣﻦ ﺃﺟﻞ ﺍﻟﻮﻗﺎﻳﺔ"‪ ،‬ﻭ"ﺇﺣﺘﻤﺎﻝ ﺇﻋﺘﺪﺍﺀ" ﻳﻔﻬﻢ ﻣﻨﻬﻤﺎ ﺃﻥ ﺍﻟﻘﺎﻧﻮﻥ‬
‫‪ 04/09‬ﻗﺪ ﺃﺟﺎﺯ ﺍﻟﻠﺠﻮﺀ ﺇﱃ ﺇﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺣﱴ ﻭﻟﻮ ﱂ ﺗﻘﻊ ﺟﺮﳝﺔ‬

‫‪- 199 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺑﻌﺪ‪.‬ﻟﻜﻨﻮﻧﻈﺮﺍ ﳋﻄﻮﺭﺓ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﻋﻠﻰ ﺍﳊﻖ ﰲ ﺍﳋﺼﻮﺻﻴﺔ ﻓﺈﻥ ﺍﻟﺸﺮﻉ ﻗﺪ ﺣﺼﺮ ﻧﻄﺎﻗﻪ ﰲ ﺣﺎﻻﺕ‬
‫) ‪(1‬‬
‫ﳏﺪﺩﺓ ﻋﻠﻰ ﺳﺒﻴﻞ ﺍﳊﺼﺮ‬
‫‪-‬ﻭﻗﺪ ﲤﺴﻚ ﺍﳌﺸﺮﻉ ﺑﺸﺮﻁ ﺿﺮﻭﺭﺓ ﺃﻥ ﺗﻜﻮﻥ ﻫﻨﺎﻙ ﻓﺎﺋﺪﺓ ﻣﺮﺟﻮﺓ ﻣﻦ ﺇﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﻭﺍﻟﺬﻱ‬
‫ﻳﻌﲏ ﻛﻤﺎ ﺳﺒﻖ ﺍﻟﺬﻛﺮ ﻗﻴﺎﻡ ﻗﺮﺍﺋﻦ ﻭﺃﻣﺎﺭﺍﺕ ﻋﻠﻰ ﻭﺟﻮﺩ ﺃﺷﻴﺎﺀ ﺗﺘﻌﻠﻖ ﺑﺎﳉﺮﳝﺔ ﰲ ﺍﶈﻞ ﺍﳌﺮﺍﺩ ﺗﻔﺘﻴﺸﻪ‬
‫ﻭﺫﻟﻚ ﺣﻴﻨﻤﺎ ﺇﺷﺘﺮﻃﺖ ﺍﳌﺎﺩﺓ ‪ 02/05‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﺍﻟﺪﺧﻮﻝ ﺇﱃ ﺍﳌﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﻐﺮﺽ‬
‫ﺗﻔﺘﻴﺸﻬﺎ ﺑﻀﺮﻭﺭﺓ ﺃﻥ ﺗﻜﻮﻥ ﻫﻨﺎﻙ ﺃﺳﺒﺎﺏ ﺗﺪﻋﻮ ﻟﻺﻋﺘﻘﺎﺩ ﺑﺄﻥ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﺒﺤﻮﺙ ﻋﻨﻬﺎ ﳐﺰﻧﺔ ﻓﻌﻼ ﰲ‬
‫ﻫﺬﻩ ﺍﳌﻨﻈﻮﻣﺔ ﳏﻞ ﺍﻟﺘﻔﺘﻴﺶ‪ ،‬ﻛﻤﺎ ﻳﻔﻬﻢ ﻣﻦ ﻧﺺ ﺍﳌﺎﺩﺓ ‪ 06‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ‪ 04/09‬ﺃﻧﻪ ﺇﺫﺍ ﻛﺎﻥ ﻟﻴﺲ ﻣﻦ‬
‫ﺍﻟﻀﺮﻭﺭﻱ ﺣﺠﺰ ﻛﻞ ﺍﳌﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻓﺈﻥ ﺍﻟﺴﻠﻄﺔ ﺍﻟﱵ ﺗﺒﺎﺷﺮ ﺍﻟﺘﻔﺘﻴﺶ ﺗﻘﻮﻡ ﻓﻘﻂ ﺑﻨﺴﺦ ﺍﳌﻌﻄﻴﺎﺕ‬
‫ﺍﻟﱵ ﺗﻜﻮﻥ ﻣﻔﻴﺪﺓ ﰲ ﺍﻟﻜﺸﻒ ﻋﻦ ﺍﳉﺮﺍﺋﻢ ﺃﻭ ﻣﺮﺗﻜﺒﻴﻬﺎ ﻭ ﻫﺬﺍ ﻣﺎ ﻳﻌﺪ ﺿﻤﺎﻧﺔ ﺃﺧﺮﻯ‪.‬‬
‫‪ -‬ﺃﻣﺎ ﻋﻦ ﺷﺮﻁ ﲢﺪﻳﺪ ﻣﻴﻌﺎﺩ ﻣﻌﲔ ﻹﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﻓﺈﻥ ﺍﻟﺸﺮﻉ ﻗﺪ ﺗﻨﺎﺯﻝ ﺻﺮﺍﺣﺔ ﻋﻦ ﻫﺬﺍ‬
‫ﺍﻟﺸﺮﻁ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺃﺟﺎﺯ ﺍﻟﻘﻴﺎﻡ ﺑﺈﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﻋﻠﻰ ﺍﳌﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻛﺬﺍ ﺍﻷﻣﺎﻛﻦ‬
‫ﺍﻟﱵ ﻳﺘﻮﺍﺟﺪ ‪‬ﺎ ﺍﳊﺎﺳﻮﺏ ﰲ ﺃﻱ ﺳﺎﻋﺔ ﻣﻦ ﺳﺎﻋﺎﺕ ﺍﻟﻠﻴﻞ ﻭﺍﻟﻨﻬﺎﺭ‪(2)،‬ﻭﺭﲟﺎ ﻳﻌﺪ ﺫﻟﻚ ﺇﻧﺴﺠﺎﻣﺎ ﻣﻊ‬
‫ﺧﺼﺎﺋﺺ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ .‬ﺫﻟﻚ ﺃﻥ ﺍﻟﻄﺎﺑﻊ ﺍﻟﺪﻭﱄ ﳍﺬﻩ ﺍﳉﺮﳝﺔ ﻳﻌﲏ ﺇﺭﺗﻜﺎ‪‬ﺎ ﻣﻦ ﻋﺪﺓ ﺩﻭﻝ ﰲ‬
‫ﻧﻔﺲ ﺍﻟﻮﻗﺖ ﻭﻫﺬﺍ ﻳﻌﲏ ﺃﻥ ﺍﻟﻮﻗﺖ ﰲ ﺑﻌﻀﻬﺎ ﻗﺪ ﻳﻜﻮﻥ ﻟﻴﻼ ﺑﻴﻨﻤﺎ ﰲ ﺩﻭﻝ ﺃﺧﺮﻯ ﻳﻜﻮﻥ ‪‬ﺎﺭﺍ ﺇﺿﺎﻓﺔ‬
‫ﺇﱃ ﻃﺎﺑﻊ ﺍﻟﺴﺮﻋﺔ ﺍﻟﺬﻱ ﳝﻴﺰ ﺇﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻛﺬﺍ ﳏﻮ ﺁﺛﺎﺭﻫﺎ‪.‬‬
‫‪ -‬ﻛﻤﺎ ﳒﺪ ﺃﻥ ﺍﻟﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﺃﺻﺒﺢ ﻻ ﻳﺸﺘﺮﻁ ﺣﻀﻮﺭ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﺃﻭ ﻣﻦ ﻳﻨﻮﺑﻪ ﻋﻤﻠﻴﺔ‬
‫ﺍﻟﺘﻔﺘﻴﺶ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻫﻮ ﻣﺎ ﻧﺺ ﻋﻠﻴﻪ ﺻﺮﺍﺣﺔ ﰲ ﺍﳌﺎﺩﺓ ‪ 6/45‬ﺑﻘﻮﳍﺎ ﺃﻧﻪ ﻻ ﺗﻄﺒﻴﻖ ﺍﻷﺣﻜﺎﻡ‬
‫ﺍﳌﻨﺼﻮﺹ ﻋﻠﻴﻬﺎ ﰲ ﻫﺬﻩ ﺍﳌﺎﺩﺓ ﺇﺫﺍ ﺗﻌﻠﻖ ﺍﻷﻣﺮ ﺑﺎﳉﺮﺍﺋﻢ ﺍﳌﺎﺳﺔ ﺑﺄﻧﻈﻤﺔ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ‪.‬‬
‫‪ -‬ﺃﻣﺎ ﺍﶈﺎﻓﻈﺔ ﻋﻠﻰ ﺍﻷﺳﺮﺍﺭ ﻭﻫﻲ ﺍﻟﻀﻤﺎﻧﺔ ﺍﻟﱵ ﺗﻘﺮﺭﻫﺎ ﺍﳌﺎﺩﺗﲔ ‪ 09-08‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﺇﺫ‬
‫ﻗﺮﺭ ﺍﳌﺸﺮﻉ ﻣﻦ ﺧﻼﳍﻤﺎ ﺃﻧﻪ ﳝﻜﻦ ﻟﻠﺴﻠﻄﺔ ﺍﻟﱵ ﺗﺒﺎﺷﺮ ﺍﻟﺘﻔﺘﻴﺶ ﺃﻥ ﺗﺄﻣﺮ ﺑﺈﲣﺎﺫ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﻟﻼﺯﻣﺔ ﳌﻨﻊ‬
‫ﺍﻹﻃﻼﻉ ﻋﻠﻰ ﺍﳌﻌﻄﻴﺎﺕ ﺍﻟﱵ ﻳﺸﻜﻞ ﳏﺘﻮﺍﻫﺎ ﺟﺮﳝﺔ‪ ،‬ﻭﺃﻧﻪ ﻻ ﳚﻮﺯ ﺇﺳﺘﻌﻤﺎﻝ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺘﺤﺼﻞ ﻋﻠﻴﻬﺎ‬
‫ﺇﻻ ﰲ ﺍﳊﺪﻭﺩ ﺍﻟﻀﺮﻭﺭﻳﺔ ﻟﻠﺘﺤﺮﻳﺎﺕ ﻭﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻭﻫﺬﺍ ﲢﺖ ﻃﺎﺋﻠﺔ ﺍﻟﻌﻘﻮﺑﺎﺕ ﺍﳌﻨﺼﻮﺹ‬
‫ﻋﻠﻴﻬﺎ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳌﻌﻤﻮﻟﻪ ﺑﻪ‪(3).‬ﻓﺈﺫﺍ ﻛﺎﻥ ﺍﳌﺸﺮﻉ ﻗﺪ ﺧﻮﻝ ﳉﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﺍﳌﺨﺘﺼﺔ ﺣﻖ ﺍﻹﻃﻼﻉ‬

‫)‪(1‬ﺃﻧﻈﺮ ﺍﳌﺎﺩﺓ ‪ 03‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪.04/09‬‬


‫)‪(2‬ﺍﳌﺎﺩﺓ ‪ 3/47‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‪.‬‬
‫)‪(3‬ﺃﻧﻈﺮ ﺍﳌﺎﺩﺓ ‪ 46‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‪.‬‬

‫‪- 200 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻋﻠﻰ ﺑﻌﺾ ﺍﻷﺳﺮﺍﺭ ﺍﳌﻔﻴﺪﺓ ﰲ ﻛﺸﻒ ﺍﳊﻘﻴﻘﺔ ﻓﺈﻥ ﻋﻠﻴﻬﺎ ﺃﻻ ﺗﺘﻮﺳﻊ ﰲ ﺫﻟﻚ‪ ،‬ﻓﺈﺫﺍ ﻛﺎﻥ ﺿﺎﺑﻂ‬
‫ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻳﺒﺤﺚ ﻋﻦ ﺑﺮﻧﺎﻣﺞ ﻋﻠﻰ ﺫﺍﻛﺮﺓ ﺍﳊﺎﺳﻮﺏ ﺍﻟﺮﺋﻴﺴﻴﺔ ﻓﻴﺠﺐ ﻋﻠﻴﻪ ﺃﻻ ﻳﻘﻮﻡ ﺑﻔﺘﺢ‬
‫ﺍﳌﻠﻔﺎﺕ ﺍﳋﺎﺻﺔ ﺑﺄﺳﺮﺍﺭ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﻭﺍﻹﻃﻼﻉ ﻋﻠﻴﻬﺎ)‪(1‬ﺇﻻ ﺇﺫﺍ ﻛﺎﻧﺖ ﻫﺬﻩ ﺍﳌﻠﻔﺎﺕ ﺗﺘﻌﻠﻖ ﺑﺎﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﳌﺮﺗﻜﺒﺔ‪.‬ﻭﻓﻴﻤﺎ ﻳﺘﻌﻠﻖ ﺑﻀﺒﻂ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﳌﺘﺤﺼﻞ ﻋﻠﻴﻬﺎ ﺑﺴﺒﺐ ﺗﻔﺘﻴﺶ ﻣﻨﻈﻮﻣﺔ‬
‫ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﻓﻘﺪ ﺃﺣﺎﻃﻬﺎ ﺍﳌﺸﺮﻉ ﻫﺬﻩ ﺍﻟﻌﻤﻠﻴﺔ ﺃﻳﻀﺎ ﺑﻀﻤﺎﻧﺎﺕ ﻭﺷﺮﻭﻁ ﺃﳘﻬﺎ‪:‬‬
‫‪ -‬ﺍﶈﺎﻓﻈﺔ ﻫﻠﻰ ﺍﳌﻀﺒﻮﻃﺎﺕ ﻭﺫﻟﻚ ﺑﺎﻟﻄﺮﻳﻘﺔ ﺍﻟﺘﻘﻨﻴﺔ ﺍﻟﱵ ﺗﺘﻨﺎﺳﺐ ﻣﻌﻬﺎ ﺣﻴﺚ ﺃﻭﺟﺐ ﺍﳌﺸﺮﻉ‬
‫ﰲ ﺍﳌﺎﺩﺓ ‪ 01/06‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﺃﻥ ﻳﺘﻢ ﺿﺒﻂ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﺨﺰﻧﺔ ﰲ ﺍﳌﻨﻈﻮﻣﺔ ﺑﻨﺴﺨﻬﺎ ﻋﻠﻰ ﺩﻋﺎﻣﺔ‬
‫ﲣﺰﻳﻦ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ ﺗﻜﻮﻥ ﻗﺎﺑﻠﺔ ﻟﻠﻮﺿﻊ ﰲ ﺃﺣﺮﺍﺯ ﻭﻓﻘﺎ ﻟﻠﻘﻮﺍﻋﺪ ﺍﳌﻘﺮﺭﺓ ﰲ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‪.‬‬
‫ﻛﻤﺎ ﺃﻭﺟﺐ ﺍﻟﺸﺮﻉ ﺃﻳﻀﺎ ﻋﻠﻰ ﺍﻟﺴﻠﻄﺔ ﺍﻟﱵ ﺗﻘﻮﻡ ﺑﻀﺒﻂ ﺍﳌﻌﻄﻴﺎﺕ ﺍﻟﻌﻤﻞ ﻋﻠﻰ ﺳﻼﻣﺔ ﺍﳌﻌﻄﻴﺎﺕ‬
‫ﰲ ﺍﳌﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﳏﻞ ﺍﻟﺘﻔﺘﻴﺶ ﻭﺃﻧﻪ ﺇﺫﺍ ﻣﺎ ﺍﺳﺘﻌﻤﻠﺖ ﺗﻘﻨﻴﺎﺕ ﻹﻋﺎﺩﺓ ﺗﺸﻜﻴﻞ ﻫﺬﻩ ﺍﳌﻌﻄﻴﺎﺕ‬
‫ﻗﺼﺪ ﺟﻌﻠﻬﺎ ﻗﺎﺑﻠﺔ ﻟﻺﺳﺘﻐﻼﻝ ﻓﺈﻥ ﺫﻟﻚ ﳚﺐ ﺃﻻ ﻳﺆﺩﻱ ﺇﱃ ﺍﳌﺴﺎﺱ ﲟﺤﺘﻮﺍﻫﺎ‪.‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ ‪:‬ﺿﻤﺎﻧﺎﺕ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﺃﺛﻨﺎﺀ ﺇﺟﺮﺍﺀ ﺇﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ ﻭﺍﳌﺮﺍﻗﺒﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪:‬‬
‫ﳑﺎ ﻻﺷﻚ ﻓﻴﻪ ﺃﻥ ﻣﺮﺍﻗﺒﺔ ﺍﻹﺗﺼﺎﻻﺕ ﺍﳋﺎﺻﺔ)‪(2‬ﻭﻛﺬﺍ ﺇﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ ﳝﺲ)‪ (3‬ﲝﻖ ﺍﻹﻧﺴﺎﻥ‬
‫ﰲ ﺍﳋﺼﻮﺻﻴﺔ ﻭﻳﻌﺪ ﺇﻋﺘﺪﺍﺀ ﺻﺎﺭﺧﺎ ﻋﻠﻰ ﺍﳊﻴﺎﺓ ﺍﳋﺎﺻﺔ‪ ،‬ﺫﻟﻚ ﺍﳊﻖ ﺍﻟﺬﻱ ﺣﻈﻲ ﲝﻤﺎﻳﺔ ﺩﺳﺘﻮﺭﻳﺔ ﰲ‬
‫ﳐﺘﻠﻒ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﳊﺪﻳﺜﺔ‪ ،‬ﳌﺎ ﳋﺼﻮﺻﻴﺔ ﺍﻷﻓﺮﺍﺩ ﻣﻦ ﺃﳘﻴﺔ ﻗﺼﻮﻯ ﻋﻠﻰ ﻛﻴﺎﻥ ﺍﻟﻔﺮﺩ ﻭﺍ‪‬ﺘﻤﻊ ﻣﻌﺎ‬
‫ﻭﺍﳊﻖ ﰲ ﺍﳋﺼﻮﺻﻴﺔ ﻭﻣﺎ ﻳﺘﻔﺮﻍ ﻋﻨﻪ ﻣﻦ ﺣﺮﻳﺔ ﺍﳌﺮﺍﺳﻼﺕ ﻭﺳﺮﻳﺔ ﺍﻷﺣﺎﺩﻳﺚ ﺍﳋﺎﺻﺔ ﺃﺿﺤﻰ ﰲ‬
‫ﺍﻟﻮﻗﺖ ﺍﻟﺮﺍﻫﻦ ﲢﺖ ‪‬ﺪﻳﺪ ﻭﺳﺎﺋﻞ ﺗﻘﻨﻴﺔ ﺣﺪﻳﺜﺔ ﺇﺧﺘﺮﻗﺖ ﺍﳊﺠﺐ ﻭﻧﻔﺬﺕ ﻣﻦ ﺧﻼﻝ ﺍﻟﺴﻴﺎﺝ ﺍﳌﻨﻴﻊ‬
‫ﺍﻟﺬﻱ ﳛﻴﻂ ﺑﺎﳊﻴﺎﺓ ﺍﳋﺎﺻﺔ‪.‬‬
‫ﻭﻟﻘﺪ ﻛﻔﻠﺖ ﺍﻟﻘﻮﺍﻧﲔ ﻟﻠﻔﺮﺩ ﺣﻘﻪ ﰲ ﺧﺼﻮﺻﻴﺔ ﻣﺮﺍﺳﻼﺗﻪ ﺑﻐﺾ ﺍﻟﻨﻈﺮ ﻋﻦ ﻭﺳﻴﻠﺔ ﺇﺭﺳﺎﳍﺎ ﺳﻮﺍﺀ‬
‫ﻛﺎﻧﺖ ﻣﺮﺳﻠﺔ ﺑﻮﺍﺳﻄﺔ ﺍﻟﱪﻳﺪ ﺍﻟﻌﺎﺩﻱ ﺃﻡ ﺑﻮﺍﺳﻄﺔ ﺍﻷﻧﺘﺮﻧﺎﺕ )ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ )‪ (Email‬ﻭﺳﻮﺍﺀ‬
‫ﻛﺎﻧﺖ ﻫﺬﻩ ﺍﻟﺮﺳﺎﻟﺔ ﻣﻐﻠﻘﺔ ﺃﻡ ﻣﻔﺘﻮﺣﺔ ﻣﺸﻔﺮﺓ ﺃﻡ ﻏﲑ ﻣﺸﻔﺮﺓ‪ ،‬ﻃﺎﳌﺎ ﺃﻥ ﻣﻦ ﺍﻟﻮﺍﺿﺢ ﻗﺼﺪ ﺍﳌﺮﺳ‪‬ﻞ ﻋﺪﻡ‬
‫ﺭﻏﺒﺘﻪ ﰲ ﺇﻃﻼﻉ ﺍﻟﻐﲑ ﻋﻠﻴﻬﺎ ﺑﺪﻭﻥ ﲤﻴﻴﺰ‪ ،‬ﻭﺑﺎﻟﺘﺎﱄ ﻓﺈﻥ ﺣﺮﻣﺔ ﺍﳌﺮﺍﺳﻼﺕ ﻣﺴﺘﻤﺪﺓ ﻣﻦ ﺍﳊﻖ ﰲ ﺍﳊﻴﺎﺓ‬
‫ﺍﳋﺎﺻﺔ ﻷ‪‬ﺎ ﺗﻌﺘﱪ ﻣﺴﺘﻮﺩﻋﺎ ﻟﻠﺴﺮ ﻓﻼ ﳚﻮﺯ ﺍﳌﺴﺎﺱ ‪‬ﺎ ﺇﻻ ﲟﻮﺍﻓﻘﺔ ﻣﻦ ﻳﺘﻌﻠﻖ ﺍﳋﻄﺎﺏ ﲝﻴﺎﺗﻪ ﺍﳋﺎﺻﺔ‪.‬‬

‫)‪(1‬ﺻﱪﻱ ﻋﺒﺪ ﺍ‪‬ﻴﺪ ﻭ ﺻﱪﻱ ﲪﺪ ﺧﺎﻃﺮ‪ ،‬ﺍﳊﻤﺎﻳﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﻤﻠﻜﻴﺔ ﺍﻟﻔﻜﺮﻳﺔ‪ ،‬ﺑﻴﺖ ﺍﳊﻜﻤﺔ ﺑﻐﺪﺍﺩ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪ ،2001‬ﺹ‪.264‬‬
‫)‪(2‬ﺍﳌﺎﺩﺓ ‪ 03‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪.04/09‬‬
‫)‪(3‬ﺍﳌﺎﺩﺓ ‪ 65‬ﻣﻜﺮﺭ ‪ 05‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‪.‬‬

‫‪- 201 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﺇﺳﺘﺮﺷﺎﺩ‪‬ﺍ ﻋﻠﻰ ﺫﻟﻚ ﻧﺼﺖ ﺍﳌﺎﺩﺓ ﺍﻟﺜﺎﻣﻨﺔ ﰲ ﻓﻘﺮ‪‬ﺎ ﺍﻷﻭﱃ ﻣﻦ ﺍﻹﺗﻔﺎﻗﻴﺔ ﺍﻷﺭﻭﺑﻴﺔ ﳊﻘﻮﻕ‬
‫ﺍﻹﻧﺴﺎﻥ ﻋﻠﻰ ﺃﻥ ﻟﻜﻞ ﺷﺨﺺ ﺍﳊﻖ ﰲ ﺇﺣﺘﺮﺍﻡ ﺣﻴﺎﺗﻪ ﺍﳋﺎﺻﺔ ﻭﺍﻟﻌﺎﺋﻠﻴﺔ ﻭﻣﻮﻃﻨﻪ ﻭﻣﺮﺍﺳﻼﺗﻪ‪ ،‬ﻭﺣﻈﺮﺕ‬
‫ﰲ ﺍﻟﻔﻘﺮﺓ ﺍﻟﺜﺎﻣﻨﺔ ﻋﻠﻰ ﺍﻟﺴﻠﻄﺎﺕ ﺍﳊﻜﻮﻣﻴﺔ ﺃﻱ ﺗﺪﺧﻞ ﺃﻭ ﺇﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ ﺃﻭ ﺍﻹﺗﺼﺎﻻﺕ‬
‫ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺇﻻ ﺇﺫﺍ ﻧﺺ ﺍﻟﻘﺎﻧﻮﻥ ﻋﻠﻰ ﺫﻟﻚ‪ ،‬ﻭﺃﻥ ﻳﻜﻮﻥ ﻟﻀﺮﻭﺭﺓ ﺗﺘﻌﻠﻖ ﺑﺎﻟﻨﻈﺎﻡ ﺃﻭ ﺍﻷﻣﻦ ﺍﻟﻘﻮﻣﻲ ﺃﻭ‬
‫ﺇﻗﺘﺼﺎﺩ ﺍﻟﺪﻭﻟﺔ ﺃﻭ ﺍﳌﻨﻊ ﻭﺍﻟﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺃﻭ ﳊﻤﺎﻳﺔ ﺍﻟﺼﺤﺔ ﺍﻟﻌﺎﻣﺔ ﻭﺍﻷﺧﻼﻕ ﻭﳊﻤﺎﻳﺔ ﺣﻘﻮﻕ ﻭ‬
‫ﺣﺮﻳﺎﺕ ﺍﻟﻐﲑ‪.‬‬
‫ﻛﻤﺎ ﻗﺪ ﺣﻈﻲ ﻣﺒﺪﺃ ﺧﺼﻮﺻﻴﺔ ﺍﳌﺮﺍﺳﻼﺕ ﰲ ﻓﺮﻧﺴﺎ ﺑﺘﺸﺮﻳﻊ ﺧﺎﺹ ﺑﻪ ﻭﻫﻮ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳌﺘﻌﻠﻖ‬
‫ﺑﺎﻹﺗﺼﺎﻻﺕ ﻋﻦ ﺑﻌﺪ)‪(1‬ﺍﻟﺼﺎﺩﺭ ﰲ ‪ ،1991/07/10‬ﻭﺍﻟﺬﻱ ﻧﺺ ﺻﺮﺍﺣﺔ ﻋﻠﻰ ﺃﻥ ﺳﺮﻳﺔ ﺍﳌﺮﺍﺳﻼﺕ‬
‫ﺍﻟﱵ ﺗﺘﻢ ﻋﻦ ﺑﻌﺪ ﻳﻜﻔﻠﻬﺎ ﺍﻟﻘﺎﻧﻮﻥ ﻭﻻ ﳚﻮﺯ ﺍﳌﺴﺎﺱ ﺑﺴﺮﻳﺘﻬﺎ ﺇﻻ ﺑﻮﺍﺳﻄﺔ ﺍﻟﺴﻠﻄﺔ ﺍﻟﻌﺎﻣﺔ) ﺍﻟﻨﻴﺎﺑﺔ ﺍﻟﻌﺎﻣﺔ(‬
‫) ‪(2‬‬
‫ﻭﰲ ﺣﺎﻻﺕ ﺍﳌﺼﻠﺤﺔ ﺍﻟﻌﺎﻣﺔ ﻭﺑﺎﻟﺸﺮﻭﻁ ﺍﳌﻨﺼﻮﺹ ﻋﻠﻴﻬﺎ ﻭﺍﶈﺪﺩﺓ ﻗﺎﻧﻮﻧﺎ‪.‬‬
‫ﻭﺍﻟﻮﺿﻊ ﺫﺍﺗﻪ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﻷﻣﺮﻳﻜﻲ ﻓﺒﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺍﻟﺘﻌﺪﻳﻞ ﺍﻟﺮﺍﺑﻊ ﻟﻠﺪﺳﺘﻮﺭ ﺍﻷﻣﺮﻳﻜﻲ ﺍﻟﺬﻱ ﻋﺰﺯ‬
‫ﻣﻔﻬﻮﻡ ﺍﳋﺼﻮﺻﻴﺔ‪ ،‬ﺻﺪﺭ ﻗﺎﻧﻮﻥ ﺧﺼﻮﺻﻴﺔ ﺍﻹﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻋﺎﻡ ‪1986‬ﺍﻟﺬﻱ ﻧﺺ ﰲ ﺍﻟﺒﺎﺏ‬
‫ﺍﻷﻭﻝ ﻣﻨﻪ ﻋﻠﻰ ﺣﻈﺮ ﻛﻞ ﺇﻋﺘﺮﺍﺽ ﻏﲑ ﻣﺮﺧﺺ ﺑﻪ ﻟﻺﺗﺼﺎﻻﺕ ﺍﻟﱵ ﺗﺄﺧﺬ ﺍﻟﻄﺮﻳﻖ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻭﺣﻈﺮ‬
‫ﻛﺬﻟﻚ ﺍﻟﺪﺧﻮﻝ ﻏﲑ ﺍﳌﺴﻤﻮﺡ ﺑﻪ ﻟﻠﺮﺳﺎﺋﻞ ﻭﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﳌﻮﺟﻮﺩﺓ ﻋﻠﻰ ﺫﺍﻛﺮﺓ ﺍﳊﺎﺳﻮﺏ ﻭﺍﺷﺘﺮﻁ‬
‫) ‪(3‬‬
‫ﳌﺸﺮﻭﻋﻴﺔ ﺫﻟﻚ ﺿﺮﻭﺭﺓ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺇﺫﻥ ﻣﻦ ﺍﻟﻘﻀﺎﺀ‬
‫ﻭﱂ ﻳﻜﻦ ﺍﻟﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﰲ ﻏﻴﺒﺔ ﻋﻦ ﻫﺬﺍ ﺍﻷﻣﺮ‪ ،‬ﺇﺫ ﺃﻧﻪ ﻭﲟﻮﺟﺐ ﺍﻟﻘﺎﻧﻮﻥ ‪ 23/06‬ﺍﳌﺆﺭﺥ ﰲ‬
‫‪ 2006/12/20‬ﺍﳌﻌﺪﻝ ﻭﺍﳌﺘﻤﻢ ﻟﻘﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﺃﺿﺎﻑ ﺍﳌﺎﺩﺓ ‪ 303‬ﻣﻜﺮﺭ ﺍﻟﱵ ﺗﻌﺎﻗﺐ ﺑﺎﳊﺒﺲ ﻟﻜﻞ‬
‫ﻣﻦ ﻳﺘﻌﻤﺪ ﺍﳌﺴﺎﺱ ﲝﺮﻣﺔ ﺍﳊﻴﺎﺓ ﺍﳋﺎﺻﺔ ﻟﻸﺷﺨﺎﺹ ﺑﺄﻱ ﺗﻘﻨﻴﺔ ﻛﺎﻧﺖ ﻭﺫﻟﻚ ﺑﺈﻟﺘﻘﺎﻁ ﺃﻭ ﺗﺴﺠﻴﻞ ﺃﻭ‬
‫ﻧﻘﻞ ﻣﻜﺎﳌﺎﺕ ﺃﻭ ﺃﺣﺎﺩﻳﺚ ﺃﻭ ﺳﺮﻳﺔ‪ ،‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺍﳌﺎﺩﺓ ‪ 127‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪ 03/2000‬ﺍﶈﺪﺩ ﻟﻠﻘﻮﺍﻋﺪ‬
‫ﺍﻟﻌﺎﻣﺔ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﻟﱪﻳﺪ ﻭﺍﳌﻮﺍﺻﻼﺕ ﺍﻟﺴﻠﻜﻴﺔ ﻭﺍﻟﻼﺳﻠﻜﻴﺔ ﺍﻟﱵ ﺗﻨﺺ ﻛﺬﻟﻚ ﻋﻠﻰ ﻣﻌﺎﻗﺒﺔ ﻛﻞ ﺷﺨﺺ‬
‫ﺳﻮﺍﺀ ﻛﺎﻥ ﻣﺮﺧﺼﺎ ﻟﻪ ﺑﺘﻘﺪﱘ ﺧﺪﻣﺔ ﺍﳌﻮﺍﺻﻼﺕ ﺍﻟﺴﻠﻜﻴﺔ ﻭﺍﻟﻼﺳﻠﻜﻴﺔ ﺃﻭ ﻛﺎﻥ ﻋﺎﻣﻼ ﻟﺪﻯ ﻣﺘﻌﺎﻣﻠﻲ‬

‫)‪(1‬ﻳﻘﺼﺪ ﺑﺎﻹﺗﺼﺎﻝ ﻋﻦ ﺑﻌﺪ ﻛﻞ ﺇﻧﺘﻘﺎﻝ ﺃﻭ ﺇﺭﺳﺎﻝ ﺃﻭ ﺇﺳﺘﻘﺒﺎﻝ ﻟﺮﻣﻮﺯ ﺃﻭ ﺇﺷﺎﺭﺍﺕ ﺃﻭ ﻛﺘﺎﺑﺔ ﺃﻭ ﺃﺻﻮﺍﺕ ﺃﻭ ﻣﻌﻠﻮﻣﺎﺕ ﺃﻳﺎ ﻛﺎﻧﺖ ﻃﺒﻴﻌﺘﻬﺎ ﺑﻮﺍﺳﻄﺔ ﺃﻟﻴﺎﻑ‬
‫ﺑﺼﺮﻳﺔ ﺃﻭ ﻃﺎﻗﺔ ﻻ ﺳﻠﻜﻴﺔ ﺃﻭ ﺃﻱ ﺃﻧﻈﻤﺔ ﺇﻟﻜﺘﺮﻭﻣﻐﻨﺎﻃﻴﺴﻴﺔ ﺃﺧﺮﻯ‪.‬‬
‫)‪(2‬ﻭﰲ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﺍﻟﻔﺮﻧﺴﻲ ﻧﺼﺖ ﺍﻟﻔﻘﺮﺓ ﺍﻟﺜﺎﻧﻴﺔ ﻣﻦ ﺍﳌﺎﺩﺓ ‪ 432‬ﻋﻠﻰ ﻣﻌﺎﻗﺒﺔ ﻛﻞ ﺷﺨﺺ ﻋﺎﻡ ﺃﻭ ﻣﻜﻠﻒ ﲞﺪﻣﺔ ﻋﺎﻣﺔ ﺇﺫﺍ ﻗﺎﻡ ﺃﻭ ﺃﻣﺮ ﺃﻭ ﺳﻬﻞ‬
‫ﺃﺛﻨﺎﺀ ﻣﺒﺎﺷﺮﺗﻪ ﻟﻌﻤﻠﻪ ﺃﻭ ﲟﻨﺎﺳﺒﺘﻪ ﻭﰲ ﻏﲑ ﺍﳊﺎﻻﺕ ﺍﳌﻘﺮﺭﺓ ﻗﺎﻧﻮﻧﺎ ﺑﺈﻟﺘﻘﺎﻁ ﺃﻭ ﺇﺧﺘﻼﺱ ﻣﺮﺍﺳﻼﺕ ﺗﺘﻢ ﺃﻭ ﺗﻨﻘﻞ ﺃﻭ ﲢﻤﻞ ﺑﻄﺮﻳﻖ ﺍﻹﺗﺼﺎﻻﺕ ﻭﻛﺬﺍ ﺇﺳﺘﻌﻤﺎﳍﺎ‬
‫ﺃﻭ ﻓﺾ ﳏﺘﻮﺍﻫﺎ‪.‬‬
‫)‪ (3‬ﻧﺸﻮﻯ ﺭﺃﻓﺖ ﺇﺑﺮﺍﻫﻴﻢ‪،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.13‬‬

‫‪- 202 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﻟﺸﺒﻜﺎﺕ ﺍﻟﻌﻤﻮﻣﻴﺔ ﻟﻠﻤﻮﺍﺻﻼﺕ ﺍﻟﺴﻠﻜﻴﺔ ﻭﺍﻟﻼﺳﻠﻜﻴﺔ ﺃﻭ ﺃﻱ ﺷﺨﺺ ﺁﺧﺮ ﻏﲑ ﻫﺆﻻﺀ ﻳﻘﻮﻡ ﺑﺄﻱ‬
‫ﻃﺮﻳﻘﺔ ﻛﺎﻧﺖ ﺑﺈﻧﺘﻬﺎﻙ ﺳﺮﻳﺔ ﺍﳌﺮﺍﺳﻼﺕ ﺍﻟﺼﺎﺩﺭﺓ ﺃﻭ ﺍﳌﺮﺳﻠﺔ ﺃﻭ ﺍﳌﺴﺘﻘﺒﻠﺔ ﻋﻦ ﻃﺮﻳﻖ ﺍﳌﻮﺍﺻﻼﺕ‬
‫ﺍﻟﺴﻠﻜﻴﺔ ﺃﻭ ﺍﻟﻼﺳﻠﻜﻴﺔ‪.‬‬
‫ﺇﻻ ﺃﻥ ﻫﺬﻩ ﺍﳊﻤﺎﻳﺔ ﺍﳉﺰﺍﺋﻴﺔ ﻟﺴﺮﻳﺔ ﺍﳌﺮﺍﺳﻼﺕ ﻭﺍﻹﺗﺼﺎﻻﺕ ﻟﻴﺴﺖ ﻣﻄﻠﻘﺔ ﻋﻠﻰ ﺣﺎﳍﺎ‪ ،‬ﺫﻟﻚ ﺃﻧﻪ‬
‫ﺇﺫﺍ ﺗﻌﻠﻖ ﺍﻷﻣﺮ ﲟﺴﺄﻟﺔ ‪‬ﺪﻳﺪ ﺃﻣﻦ ﺍﻟﺪﻭﻟﺔ ﻭﻣﻮﺍﻃﻨﻴﻬﺎ ﺃﻭ ﺇﺣﺘﻤﺎﻝ ﺣﺪﻭﺙ ﺃﻓﻌﺎﻝ ﻣﻦ ﺷﺄ‪‬ﺎ ﺍﳌﺴﺎﺱ‬
‫ﺑﺎﻟﻨﻈﺎﻡ ﺍﻟﻌﺎﻡ‪ ،‬ﻓﺈﻥ ﺍﳌﺸﺮﻉ ﻗﺪﺭ ﺃﻥ ﻫﺬﻩ ﺍﳌﺴﺎﺋﻞ ﺗﻌﻠﻮ ﻋﻠﻰ ﺣﻖ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻬﻢ ﰲ ﺧﺼﻮﺻﻴﺔ ﻣﺮﺍﺳﻼ‪‬ﻢ‬
‫ﻭﺇﺗﺼﺎﻻ‪‬ﻢ‪ ،‬ﻷﺟﻞ ﻫﺬﺍ ﺃﺟﺎﺯ ﺇﻋﺘﺮﺍﺽ ﻫﺬﻩ ﺍﳌﺮﺍﺳﻼﺕ ﻭﻣﺮﺍﻗﺒﺔ ﺍﻹﺗﺼﺎﻻﺕ ﺇﻣﺎ ﻛﺈﺟﺮﺍﺀ ﲢﻘﻴﻘﻲ ﺃﻭ‬
‫ﻛﺈﺟﺮﺍﺀ ﻭﻗﺎﺋﻲ‪.‬‬
‫ﻭﺇﺫﺍ ﻛﺎﻥ ﺍﳌﺸﺮﻉ ﻗﺪ ﺃﺑﺎﺡ ﻭﺿﻊ ﺗﺮﺗﻴﺒﺎﺕ ﺗﻘﻨﻴﺔ ﳌﺮﺍﻗﺒﺔ ﺍﻹﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﲡﻤﻴﻌﻤﺤﺘﻮﺍﻫﺎ‬
‫ﻭﻛﺬﺍ ﺇﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ ﺍﻟﺴﻠﻜﻴﺔ ﻭﺍﻟﻼﺳﻠﻜﻴﺔ‪ ،‬ﻓﺈﻧﻪ ﻗﺪ ﺃﺣﺎﻁ ﻫﺬﻩ ﺍﻹﺟﺮﺍﺀﺍﺕ ﲟﺠﻤﻮﻋﺔ ﻣﻦ‬
‫ﺍﻟﻀﻤﺎﻧﺎﺕ ﺍﻟﱵ ﺗﻌﺪ ﺿﺮﻭﺭﻳﺔ ﳊﻤﺎﻳﺔ ﺣﻖ ﺍﻹﻧﺴﺎﻥ ﰲ ﺳﺮﻳﺔ ﺇﺗﺼﺎﻻﺗﻪ‪ .‬ﻭﻫﺬﺍ ﻣﺎ ﳝﻜﻦ ﺃﻥ ﳒﻤﻠﻪ ﰲ ﻣﺎ‬
‫ﻳﻠﻲ‪:‬‬
‫ﺃﻭﻻ‪ :‬ﺿﻤـﺎﻧﺎﺕ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﻋﻨﺪ ﺇﻋﺘـﺮﺍﺽ ﺍﳌـﺮﺍﺳﻼﺕ‪ :‬ﱂ ﳚﺰ ﺍﳌﺸﺮﻉ ﻟﻠﻀﺒﻄﻴﺔ‬
‫ﺍﻟﻘﻀﺎﺋﻴﺔ ﺇﺟﺮﺍﺀ ﺇﻋﺘﺮﺍﺽ ﺍﻟﺮﺍﺳﻼﺕ ﺍﻟﺴﻠﻜﻴﺔ ﺃﻭ ﺍﻟﻼﺳﻠﻜﻴﺔ ﺇﻻ ﲟﻮﺟﺐ ﺇﺫﻥ ﻣﻜﺘﻮﺏ ﻣﻦ ﺍﻟﺴﻠﻄﺔ‬
‫ﺍﳌﺨﺘﺼﺔ ﻭﺍﳌﺘﻤﺜﻠﺔ ﰲ ﻭﻛﻴﻞ ﺍﳉﻤﻬﻮﺭﻳﺔ ﰲ ﺣﺎﻟﺔ ﺍﻟﺘﺤﻘﻴﻖ ﺍﻹﺑﺘﺪﺍﺋﻲ‪ ،‬ﺃﻭ ﻗﺎﺿﻲ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺣﺎﻟﺔ ﻣﺎ ﺇﺫﺍ‬
‫ﻓﺘﺢ ﲢﻘﻴﻖ ﻗﻀﺎﺋﻲ‪(1).‬ﻭﻫﻮ ﻣﺎ ﳚﻌﻞ ﻫﺬﻩ ﺍﻟﻌﻤﻠﻴﺎﺕ ﺗﻜﻮﻥ ﰲ ﺿﻤﺎﻧﺔ ﻣﻦ ﺃﻫﻢ ﺍﻟﻀﻤﺎﻧﺎﺕ ﺍﻹﺟﺮﺍﺋﻴﺔ‬
‫ﻭﻫﻲ ﺳﻠﻄﺔ ﺍﻟﻘﻀﺎﺀ‪.‬‬
‫ﻛﻤﺎ ﺇﺷﺘﺮﻁ ﺍﳌﺸﺮﻉ ﺿﺮﻭﺭﺓ ﺃﻥ ﻳﺘﻀﻤﻦ ﺍﻹﺫﻥ ﺍﳌﻤﻨﻮﺡ ﻣﻦ ﺍﳉﻬﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﺨﺘﺼﺔ ﻭﺻﻔﺎ‬
‫ﻟﻠﻤﺮﺍﺳﻼﺕ ﺍﻟﱵ ﳚﺐ ﺇﻋﺘﺮﺍﺿﻬﺎ‪ ،‬ﻭﺫﻟﻚ ﺑﺒﻴﺎﻥ ﺍﻟﻌﻨﺎﺻﺮ ﺍﻟﱵ ﺗﺴﻤﺢ ﺑﺎﻟﺘﻌﺮﻑ ﻋﻠﻰ ﻫﺬﻩ ﺍﳌﺮﺍﺳﻼﺕ‬
‫ﺍﳌﻄﻠﻮﺑﺔ ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﲢﺪﻳﺪ ﺍﳌﺪﺓ ﺍﻟﱵ ﺗﺴﺘﻐﺮﻗﻬﺎ ﺍﻟﺘﺪﺍﺑﲑ ﺍﻟﺘﻘﻨﻴﺔ ﺍﻟﻼﺯﻣﺔ ﰲ ﻋﻤﻠﻴﺔ ﺍﻹﻋﺘﺮﺍﺽ‪(2)،‬ﻭﻫﻨﺎ‬
‫ﺣﺪﺩ ﺍﻟﺸﺮﻉ ﻣﺪﺓ ﺍﻹﺫﻥ ﺑﺄﺭﺑﻌﺔ ﺃﺷﻬﺮ ﻗﺎﺑﻠﺔ ﻟﻠﺘﺠﺪﻳﺪ ﺣﺴﺐ ﻣﻘﺘﻀﻴﺎﺕ ﺍﻟﺘﺤﺮﻱ ﺃﻭ ﺍﻟﺘﺤﻘﻴﻖ ﺿﻤﻦ‬
‫ﻧﻔﺲ ﺍﻟﺸﺮﻭﻁ ﺍﻟﺸﻜﻠﻴﺔ ﻭﺍﻟﺰﻣﻨﻴﺔ‪.‬‬

‫)‪(1‬ﺍﳌﺎﺩﺓ ‪ 65‬ﻣﻜﺮﺭ ‪ 5‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‪ ....":‬ﳚﻮﺯ ﻟﻮﻛﻴﻞ ﺍﳉﻤﻬﻮﺭﻳﺔ ﺍﳌﺨﺘﺺ ﺃﻥ ﻳﺄﺫﻥ ﲟﺎ ﻳﺄﰐ‪ :‬ﺇﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ ﺍﻟﱵ ﺗﺘﻢ ﻋﻦ ﻃﺮﻳﻖ‬
‫ﺍﻹﺗﺼﺎﻻﺕ ﺍﻟﺴﻠﻜﻴﺔ ﺃﻭ ﺍﻟﻼﺳﻠﻜﻴﺔ ﻭﰲ ﺣﺎﻟﺔ ﻓﺘﺢ ﲢﻘﻴﻖ ﻗﻀﺎﺋﻲ ﺗﺘﻢ ﺍﻟﻌﻤﻠﻴﺎﺕ ﺍﳌﺬﻛﻮﺭﺓ ﺑﻨﺎﺀﺍ ﻋﻠﻰ ﺇﺫﻥ ﻣﻦ ﻗﺎﺿﻲ ﺍﻟﺘﺤﻘﻴﻖ‪ .‬ﻭﻧﺼﺖ ﺍﳌﺎﺩﺓ ‪ 04‬ﻣﻦ‬
‫ﺍﻟﻘﺎﻧﻮﻥ ‪ ...."09/04‬ﻻ ﳚﻮﺯ ﺇﺟﺮﺍﺀ ﻋﻤﻠﻴﺎﺕ ﺍﳌﺮﺍﻗﺒﺔ ﺇﻻ ﺑﺈﺫﻥ ﻣﻜﺘﻮﺏ ﻣﻦ ﺍﻟﺴﻠﻄﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﺨﺘﺼﺔ"‪.‬‬
‫)‪(2‬ﺃﻧﻈﺮ ﺍﳌﺎﺩﺓ ‪ 65‬ﻣﻜﺮﺭ ‪ 07‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‪.‬‬

‫‪- 203 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪- 204 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﻣﻦ ﺑﲔ ﺍﻟﻀﻤﺎﻧﺎﺕ ﺍﻟﱵ ﲢﻴﻂ ‪‬ﺬﻩ ﺍﻟﻌﻤﻠﻴﺔ ﺃﻳﻀﺎ ﻫﻮ ﻭﺟﻮﺏ ﲢﺪﻳﺪ ﺳﺎﻋﺎﺕ ﺍﻹﻋﺘﺮﺍﺽ ﻭﺫﻛﺮ‬
‫ﺫﻟﻚ ﰲ ﺍﶈﻀﺮ ﺍﻟﺬﻱ ﳛﺮﺭﻩ ﺿﺎﺑﻂ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻋﻦ ﻛﻞ ﻋﻤﻠﻴﺔ ﺇﻋﺘﺮﺍﺽ ﻳﻘﻮﻡ ‪‬ﺎ‪ ،‬ﻭﻫﻮ ﻣﺎ‬
‫ﻧﺼﺖ ﻋﻠﻴﻪ ﺍﳌﺎﺩﺓ ‪ 65‬ﻣﻜﺮﺭ" ﳛﺮﺭ ﺿﺎﺑﻂ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ‪ ....‬ﳏﻀﺮﺍ ﻋﻦ ﻛﻞ ﻋﻤﻠﻴﺔ ﺇﻋﺘﺮﺍﺽ‬
‫ﻟﻠﻤﺮﺍﺳﻼﺕ ﻭﻳﺬﻛﺮ ﺑﺎﶈﻀﺮ ﺗﺎﺭﻳﺦ ﻭﺳﺎﻋﺔ ﺑﺪﺍﻳﺔ ﻫﺬﻩ ﺍﻟﻌﻤﻠﻴﺎﺕ ﻭﺍﻹﻧﺘﻬﺎﺀ ﻣﻨﻬﺎ‪.‬‬
‫ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺫﻟﻚ ﻓﻘﺪ ﺃﻟﺰﻡ ﺍﳌﺸﺮﻉ ﺑﻨﺺ ﺍﳌﺎﺩﺓ ‪ 65‬ﻣﻜﺮﺭ ‪ 10‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‬
‫ﺿﺎﺑﻂ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺃﻥ ﻳﻨﺴﺦ ﻓﻘﻂ ﺍﳌﺮﺍﺳﻼﺕ ﻭﺍﶈﺎﺩﺛﺎﺕ ﺍﻟﱵ ﺗﻜﻮﻥ ﻣﻔﻴﺪﺓ ﰲ ﺇﻇﻬﺎﺭ ﺍﳊﻘﻴﻘﺔ‪.‬‬
‫ﺛﺎﻧﻴﺎ‪ :‬ﺿﻤﺎﻧﺎﺕ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﺃﺛﻨﺎﺀ ﻣﺮﺍﻗﺒﺔ ﺍﻹﺗﺼﺎﻻﺕ‪:‬ﰲ ﺍﳊﻘﻴﻘﺔ ﺃﻥ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﳏﺎﻁ ﺑﻜﺜﲑ‬
‫ﻣﻦ ﺍﻟﻘﻠﻖ ﺍﻟﺬﻱ ﻳﺒﺪﻳﻪ ﺭﺟﺎﻝ ﺍﻟﻘﺎﻧﻮﻥ ﺩﻓﺎﻋﺎ ﻋﻦ ﺍﳊﺮﻳﺎﺕ ﺍﳋﺎﺻﺔ‪ ،‬ﺇﻻ ﺃﻥ ﺍﳌﺴﺄﻟﺔ ﰲ ﺍﻟﻨﻬﺎﻳﺔ ﺗﺘﻮﻗﻒ‬
‫ﻋﻠﻰ ﻗﺪﺭﺓ ﺍﳌﺸﺮﻉ ﰲ ﺇﻗﺎﻣﺔ ﺍﻟﺘﻮﺍﺯﻥ ﺑﲔ ﺣﻖ ﺍ‪‬ﺘﻤﻊ ﰲ ﺍﻷﻣﻦ ﻭﻣﻨﻊ ﺍﳉﺮﳝﺔ ﻭﺣﻖ ﺍﻷﻓﺮﺍﺩ ﰲ ﺍﻟﺴﺮﻳﺔ‪،‬‬
‫ﻭﺫﻟﻚ ﺑﺈﺟﺎﺯﺓ ﺍﻟﻠﺠﻮﺀ ﺇﱃ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﻟﻜﻦ ﻣﻊ ﺿﻤﺎﻥ ﻋﺪﻡ ﺍﻟﺘﻌﺴﻒ ﰲ ﺇﺳﺘﺨﺪﺍﻣﻪ ﻣﻦ ﺧﻼﻝ‬
‫ﺇﺣﺎﻃﺘﻪ ﲜﻤﻠﺔ ﻣﻦ ﺍﻟﺸﺮﻭﻁ‪.‬‬
‫ﻭﻗﺪ ﺍﺳﺘﻬﻞ ﺍﳌﺸﺮﻉ ﻧﺺ ﺍﳌﺎﺩﺓ ﺍﻟﺜﺎﻟﺜﺔ ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ‪ 04/09‬ﺑﺈﺷﺘﺮﺍﻁ ﺍﻟﻘﻴﺎﻡ ﺑﺈﺟﺮﺍﺀ ﺍﳌﺮﺍﻗﺒﺔ‬
‫ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻟﻺﺗﺼﺎﻻﺕ ﰲ ﺇﻃﺎﺭ ﺇﺣﺘﺮﺍﻡ ﺍﻷﺣﻜﺎﻡ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﱵ ﺗﻀﻤﻦ ﺳﺮﻳﺔ ﺍﳌﺮﺍﺳﻼﺕ ﻭﺍﻹﺗﺼﻼﺕ‬
‫ﺣﻴﻨﻤﺎ ﻧﺼﺖ‪ ":‬ﻣﻊ ﻣﺮﺍﻋﺎﺓ ﺍﻷﺣﻜﺎﻡ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﱵ ﺗﻀﻤﻦ ﺳﺮﻳﺔ ﺍﳌﺮﺍﺳﻼﺕ ﻭﺍﻹﺗﺼﻼﺕ‪ .....‬ﳝﻜﻦ‬
‫ﻭﺿﻊ ﺗﺮﺗﻴﺒﺎﺕ ﳌﺮﺍﻗﺒﺔ ﺍﻹﺗﺼﺎﻻﺕ‪.".....‬‬
‫ﻛﻤﺎ ﺣﺪﺩ ﺍﳌﺸﺮﻉ ﰲ ﻧﺺ ﺍﳌﺎﺩﺓ ‪ 04‬ﻣﻦ ﻧﻔﺲ ﺍﻟﻘﺎﻧﻮﻥ ﺻﺮﺍﺣﺔ ﺍﳊﺎﻻﺕ ﺍﻟﱵ ﳚﻮﺯ ﻓﻴﻬﺎ ﺍﻟﻠﺠﻮﺀ‬
‫ﺇﱃ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ ﺇﺫﺍ ﻛﺎﻥ ﺍﻟﻐﺮﺽ ﻣﻨﻪ ﺍﻟﻮﻗﺎﻳﺔ ﻓﻘﻂ ﺩﻭﻥ ﺃﻥ ﺗﻜﻮﻥ ﻫﻨﺎﻙ ﺟﺮﳝﺔ ﻗﺪ ﻭﻗﻌﺖ ﺃﺻﻼ ﻭﺫﻟﻚ‬
‫ﻛﻮﺳﻴﻠﺔ ﻹﺟﻬﺎﺽ ﺍﳌﺸﺮﻭﻋﺎﺕ ﺍﻹﺟﺮﺍﻣﻴﺔ ﺍﻟﱵ ﻳﻜﻮﻥ ﺍﳍﺪﻑ ﻣﻨﻬﺎ ﺍﻟﻨﻴﻞ ﻣﻦ ﺍﳌﺼﺎﱀ ﺍﻟﻜﱪﻯ ﻟﻠﺪﻭﻟﺔ‬
‫ﻭﻳﻜﻮﻥ ﻣﻦ ﺍﻟﺼﻌﺐ ﻣﻌﺎﳉﺔ ﺁﺛﺎﺭﻫﺎ ﺇﺫﺍ ﲢﻘﻘﺖ ﻓﻌﻼ‪ ،‬ﻣﻘﺪﺭﺍ ﺧﻄﻮﺭﺓ ﻭﺟﺴﺎﻣﺔ ﻫﺬﻩ ﺍﻷﻓﻌﺎﻝ ﻭﺍﻟﱵ ﻣﻨﻬﺎ‬
‫ﺍﻷﻓﻌﺎﻝ ﺍﳌﻮﺻﻮﻓﺔ ﺑﺎﳉﺮﺍﺋﻢ ﺍﻹﺭﻫﺎﺑﻴﺔ ﻭﺍﳉﺮﺍﺋﻢ ﺍﳌﺴﺎﺓ ﺑﺄﻣﻦ ﺍﻟﺪﻭﻟﺔ ﺃﻭ ﺍﻹﻋﺘﺪﺍﺀ ﻋﻠﻰ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﻋﻠﻰ ﳓﻮ ﻳﻬﺪﺩ ﺍﻟﻨﻈﺎﻡ ﺍﻟﻌﺎﻡ ﻭﺍﻟﺪﻓﺎﻉ ﺍﻟﻮﻃﲏ ﺃﻭ ﻣﺆﺳﺴﺎﺕ ﺍﻟﺪﻭﻟﺔ ﺃﻭ ﺍﻹﻗﺘﺼﺎﺩ ﺍﻟﻮﻃﲏ‪.‬ﺃﻣﺎ ﰲ ﺇﻃﺎﺭ‬
‫ﺍﻟﺘﺤﺮﻳﺎﺕ ﻭ ﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻓﺈﻧﻪ ﻻ ﻳﺘﻢ ﺍﻟﻠﺠﻮﺀ ﺍﱃ ﺍﺟﺮﺍﺀ ﺍﳌﺮﺍﻗﺒﺔ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ ﻟﻼﺗﺼﺎﻻﺕ ﺍﻻ‬
‫ﰲ ﺍﳊﺎﻟﺔ ﺍﻟﱵ ﻳﻜﻮﻥ ﻓﻴﻬﺎ ﻣﻦ ﺍﻟﺼﻌﺐ ﺍﻟﻮﺻﻮﻝ ﺍﱃ ﻧﺘﻴﺠﺔ ‪‬ﻢ ﻫﺬﻩ ﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﺩﻭﻥ ﺍﻟﻠﺠﻮﺀ ﺍﱃ ﻫﺬﺍ‬
‫ﺍﻻﺟﺮﺍﺀ‪.‬‬

‫‪- 205 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﺇﻥ ﻛﺎﻥ ﺍﳌﺸﺮﻉ ﻗﺪ ﺃﻟﺰﻡ ﰲ ﻛﻞ ﺇﺟﺮﺍﺀ ﻣﻦ ﺷﺄﻧﻪ ﺍﳌﺴﺎﺱ ﺑﺎﳊﺮﻳﺎﺕ ﻋﺪﻡ ﺟﻮﺍﺯ ﺍﻟﻘﻴﺎﻡ ﺑﻪ ﺇﻻ‬
‫ﲟﻮﺟﺐ ﺇﺫﻥ ﻣﻦ ﺍﻟﺴﻠﻄﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﺨﺘﺼﺔ‪،‬ﻓﺈﻧﻪ ﺇﺷﺘﺮﻁ ﰲ ﺍﳌﺎﺩﺓ ﺍﻟﺮﺍﺑﻌﺔ ﺍﻟﻔﻘﺮﺓ ﺍﻟﺴﺎﺩﺳﺔ ﻣﻦ‬
‫ﺍﻟﻘﺎﻧﻮﻥ‪ 09/04‬ﺃﻧﻪ ﻻ ﳚﻮﺯ ﺇﺟﺮﺍﺀ ﻋﻤﻠﻴﺎﺕ ﺍﳌﺮﺍﻗﺒﺔ ﺇﻻ ﺑﺈﺫﻥ ﻣﻜﺘﻮﺏ ﻣﻦ ﺍﻟﺴﻠﻄﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ‪ .‬ﺇﻻ ﺃﻧﻨﺎ‬
‫ﻧﺮﻯ ﺃﻧﻪ ﻛﺎﻥ ﻋﻠﻰ ﺍﳌﺸﺮﻉ ﲢﺪﻳﺪ ﻣﺪﺓ ﺍﳌﺮﺍﻗﺒﺔ ﻛﻤﺎ ﻓﻌﻞ ﺑﺸﺄﻥ ﺍﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ‪ ،‬ﻷﻥ ﺍﳌﺮﺍﻗﺒﺔ‬
‫ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺍﳌﻔﺘﻮﺣﺔ ﺗﺘﻌﺎﺭﺽ ﻣﻊ ﺍﻟﻐﺎﻳﺔ ﻣﻨﻬﺎ ﻭﺍﻟﱵ ﳚﺐ ﺃﻥ ﺗﻜﻮﻥ ﰲ ﺃﺿﻴﻖ ﺣﺪﻭﺩﻫﺎ ﺫﻟﻚ ﺃﻥ ﺇﻃﺎﻟﺔ‬
‫) ‪(1‬‬
‫ﻭﻗﺖ ﺍﳌﺮﺍﻗﺒﺔ ﻓﻴﻪ ﺇﻃﻼﻉ ﻭﻛﺸﻒ ﻷﺳﺮﺍﺭ ﺍﻷﺷﺨﺎﺹ ﺩﻭﳕﺎ ﻣﱪﺭ‪.‬‬

‫)‪(1‬ﺗﻜﻠﻢ ﺍﳌﺸﺮﻉ ﻋﻦ ﲢﺪﻳﺪ ﻣﺪﺓ ﺍﳌﺮﺍﻗﺒﺔ ﰲ ﺣﺎﻟﺔ ﻭﺍﺣﺪﺓ ﻓﻘﻂ ﺗﺘﻌﻠﻖ ﺑﺎﳌﺮﺍﻗﺒﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺍﻟﱵ ﻳﻘﻮﻡ ‪‬ﺎ ﺿﺒﺎﻁ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﻨﺘﻤﲔ ﺇﱃ ﺍﳍﻴﺄﺓ ﺍﻟﻮﻃﻨﻴﺔ‬
‫ﻟﻠﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺤﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭﺍﻹﺗﺼﺎﻝ ﲞﺼﻮﺹ ﲢﺮﻳﻬﻢ ﻟﻠﻮﻗﺎﻳﺔ ﻣﻦ ﺃﻓﻌﺎﻝ ﻣﻮﺻﻮﻓﺔ ﲜﺮﺍﺋﻢ ﺍﻹﺭﻫﺎﺏ ﻭﺍﳉﺮﺍﺋﻢ ﺍﳌﺎﺳﺔ ﺑﺄﻣﻦ ﺍﻟﺪﻭﻟﺔ‬
‫ﻭﻫﻲ ﺳﺘﺔ ﺃﺷﻬﺮ ﻗﺎﺑﻠﺔ ﻟﻠﺘﺠﺪﻳﺪ‪.‬‬

‫‪- 206 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﳌﺒﺤﺚ ﺍﻟﺜﺎﻟﺚ‪:‬‬
‫ﺍﻟﻘﻴﻤﺔ ﺍﻟﻘﺎﻧـﻮﻧﻴﺔ ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﰲ ﳎﺎﻝ ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ‪:‬‬
‫ﻟﻘﺪ ﺗﻮﺟﺲ ﻛﻞ ﻣﻦ ﺍﻟﻔﻘﻪ ﻭﺍﻟﻘﻀﺎﺀ ﺧﻴﻔﺔ ﻣﻦ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻹﻣﻜﺎﻧﻴﺔ ﻋﺪﻡ ﺗﻌﺒﲑﻩ ﻋﻦ ﺍﳊﻘﻴﻘﺔ‬
‫ﻧﻈﺮﺍ ﳌﺎ ﳝﻜﻦ ﺃﻥ ﲣﻀﻊ ﻟﻪ ﻃﺮﻕ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ ﻣﻦ ﺍﻟﺘﻌﺮﺽ ﻭﺍﻟﺘﺰﻳﻴﻒ ﻭﺍﻟﺘﺤﺮﻳﻒ ﻭﺍﻟﻌﺒﺚ‪ ،‬ﻭﻫﻮ ﻣﺎ‬
‫ﻳﺜﲑ ﻣﺴﺄﻟﺔ ﻣﺸﺮﻭﻋﻴﺔ ﺍﻷﺧﺬ ﺑﻪ‪ ،‬ﺇﺫ ﻳﺸﺘﺮﻁ ﰲ ﺍﻟﺪﻟﻴﻞ ﺍﳉﻨﺎﺋﻲ ﺑﻮﺟﻪ ﻋﺎﻡ ﺃﻥ ﻳﻜﻮﻥ ﻣﺸﺮﻭﻋﺎ ﻣﻦ ﺣﻴﺚ‬
‫ﻭﺟﻮﺩﻩ ﻭﻣﻦ ﺣﻴﺚ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ‪.‬‬
‫ﻛﻤﺎ ﻳﺜﲑ ﺃﻳﻀﺎ ﻣﺴﺄﻟﺔ ﻣﺼﺪﺍﻗﻴﺔ ﺃﻭ ﺣﺠﻴﺔ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﰲ ﺗﻌﺒﲑﻩ ﻋﻦ ﺍﳊﻘﻴﻘﺔ ﺍﻟﱵ ‪‬ﺪﻑ ﺇﻟﻴﻬﺎ‬
‫ﺍﻟﺪﻋﻮﻯ ﺍﳉﺰﺍﺋﻴﺔ ﻻﺳﻴﻤﺎ ﺇﺫﺍ ﺃﺧﺬﻧﺎ ﺑﺎﻹﻋﺘﺒﺎﺭ ﺍﻟﺼﻌﻮﺑﺎﺕ ﺍﻟﱵ ﺗﺼﺎﺣﺐ ﺇﺳﺘﺨﻼﺻﻪ‪ ،‬ﻓﻀﻼ ﻋﻦ ﺍﻟﺘﻄﻮﺭ‬
‫ﰲ ﳎﺎﻝ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﺬﻱ ﻗﺪ ﻳﺘﻴﺢ ﺍﻟﻌﺒﺚ ‪‬ﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﻷﺩﻟﺔ ﲟﺎ ﳚﻌﻞ ﻣﻀﻤﻮ‪‬ﺎ ﳐﺎﻟﻔﺎ ﻟﻠﺤﻘﻴﻘﺔ‬
‫ﻭﻋﻠﻰ ﺫﻟﻚ ﻓﻜﻴﻒ ﻧﻀﻤﻦ ﻣﺼﺪﺍﻗﻴﺔ ﻫﺬﻩ ﺍﻷﺩﻟﺔ ﻭﺗﻜﻮﻥ ﳍﺎ ﺍﳊﺠﻴﺔ ﰲ ﺍﻹﺛﺒﺎﺕ‪ ،‬ﻭﻣﺎ ﻣﺪﻯ ﺇﻗﺘﺮﺍ‪‬ﺎ ﳓﻮ‬
‫ﺍﳊﻘﻴﻘﺔ؟ ﻭﻫﻞ ﻣﻔﻬﻮﻡ ﺍﳊﺠﻴﺔ ﺍﻟﱵ ﳚﺐ ﺃﻥ ﻳﺘﻤﺘﻊ ‪‬ﺎ ﺍﻟﺪﻟﻴﻞ ﺍﳉﻨﺎﺋﻲ ﻳﺘﻌﺎﺭﺿﻤﻊ ﺍﻟﻄﺒﻴﻌﺔ ﺍﳋﺎﺻﺔ ﻟﻠﺪﻟﻴﻞ‬
‫ﺍﻟﺮﻗﻤﻲ‪.‬‬
‫ﺇﻥ ﳎﺮﺩ ﻭﺟﻮﺩ ﺩﻟﻴﻞ ﻳﺜﺒﺖ ﻭﻗﻮﻉ ﺍﳉﺮﳝﺔ ﻭﻧﺴﺒﺘﻬﺎ ﺇﱃ ﺷﺨﺺ ﻣﻌﲔ ﻻ ﻳﻜﻒ ﻟﻠﺘﻌﻮﻳﻞ ﻋﻠﻴﻪ‪ ،‬ﺇﺫ‬
‫ﻳﻠﺰﻡ ﺃﻥ ﺗﻜﻮﻥ ﳍﺬﻩ ﺍﻷﺩﻟﺔ ﻗﻴﻤﺔ ﻗﺎﻧﻮﻧﻴﺔ‪ ،‬ﻭﻗﻴﻤﺔ ﺍﻟﺪﻟﻴﻞ ﺍﳉﻨﺎﺋﻲ ﺗﺘﻮﻗﻒ ﻋﻠﻰ ﻣﺴﺄﻟﺘﲔ ﺭﺋﻴﺴﻴﺘﲔ‪ :‬ﺍﻷﻭﱃ‬
‫ﻫﻲ ﻣﺸﺮﻭﻋﻴﺔ ﺍﻟﺪﻟﻴﻞ ﻭﺍﻟﺜﺎﻧﻴﺔ ﻫﻲ ﺣﺠﻴﺔ ﺍﻟﺪﻟﻴﻞ ﻋﻠﻰ ﺍﻟﻮﻗﺎﺋﻊ ﺍﳌﺮﺍﺩ ﺇﺛﺒﺎ‪‬ﺎ‪.‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻷﻭﻝ‪ :‬ﻣﺸﺮﻭﻋﻴﺔ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗــﻤﻲ‬
‫ﺗﻌﺮﻑ ﺍﳌﺸﺮﻭﻋﻴﺔ ﺑﺄ‪‬ﺎ ﺍﻟﺘﻮﺍﻓﻖ ﻭﺍﻟﺘﻘﻴﺪ ﺑﺄﺣﻜﺎﻡ ﺍﻟﻘﺎﻧﻮﻥ ﰲ ﺇﻃﺎﺭﻩ ﻭﻣﻀﻤﻮﻧﻪ ﺍﻟﻌﺎﻡ‪ ،‬ﻓﻬﻲ ‪‬ﺪﻑ‬
‫ﺇﱃ ﺗﻘﺮﻳﺮ ﺿﻤﺎﻧﺔ ﺃﺳﺎﺳﻴﺔ ﻭﺟﺪﻳﺔ ﻟﻸﻓﺮﺍﺩ ﳊﻤﺎﻳﺔ ﺣﺮﻳﺎ‪‬ﻢ ﻭﺣﻘﻮﻗﻬﻢ ﺍﻟﺸﺨﺼﻴﺔ ﺿﺪ ﺗﻌﺴﻒ ﺍﻟﺴﻠﻄﺔ‬
‫ﻭﻣﻦ ﺍﻟﺘﻄﺎﻭﻝ ﻋﻠﻴﻬﺎ ﰲ ﻏﲑ ﺍﳊﺎﻻﺕ ﺍﻟﱵ ﺭﺧﺺ ﻓﻴﻬﺎ ﺍﻟﻘﺎﻧﻮﻥ ﺑﺬﻟﻚ‪ ،‬ﻣﻦ ﺃﺟﻞ ﲪﺎﻳﺔ ﺍﻟﻨﻈﺎﻡ‬
‫) ‪(1‬‬
‫ﺍﻹﺟﺘﻤﺎﻋﻲ ﻭﺑﻨﻔﺲ ﺍﻟﻘﺪﺭ ﲢﻘﻴﻖ ﲪﺎﻳﺔ ﳑﺎﺛﻠﺔ ﻟﻠﻔﺮﺩ ﺫﺍﺗﻪ‪.‬‬
‫ﻟﺬﻟﻚ ﻓﺈﻧﻪ ﻟﺼﺤﺔ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﻟﱵ ﺗﻘﻮﻡ ‪‬ﺎ ﺟﻬﺔ ﺍﻟﺘﺤﻘﻴﻖ ﺃﻥ ﺗﻐﻠﻒ ﲟﺒﺪﺃ ﺍﳌﺸﺮﻭﻋﻴﺔ ﻣﻦ ﺃﺟﻞ‬
‫ﺃﻥ ﺗﺜﻤﺮ ﻋﻠﻰ ﺩﻟﻴﻞ ﺻﺤﻴﺢ ﻭﺳﻠﻴﻢ ﻳﻌﻮﻝ ﻋﻠﻴﻪ ﺍﻟﻘﻀﺎﺀ ﰲ ﺃﺣﻜﺎﻣﻪ‪.‬‬
‫ﻓﻼ ﺷﻚ ﺃﻥ ﻣﺒﺪﺃ ﺷﺮﻋﻴﺔ ﺍﳉﺮﺍﺋﻢ ﻭﺍﻟﻌﻘﻮﺑﺎﺕ ﺍﻟﺬﻱ ﻳﺴﺘﻘﻴﻢ ﻋﻠﻴﻪ ﺑﻨﻴﺎﻥ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﻨﺎﺋﻲ‬
‫ﺍﳌﻮﺿﻮﻋﻲ ﻳﻨﻌﻜﺲ ﻋﻠﻰ ﻗﻮﺍﻋﺪ ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ ﻭﻳﻔﺮﺽ ﺧﻀﻮﻋﻬﺎ ﻫﻲ ﺍﻷﺧﺮﻯ ﳌﺒﺪﺃ ﺍﻟﺸﺮﻋﻴﺔ‪ ،‬ﻭﺍﻟﱵ‬

‫)‪(1‬ﻫﻼﱄ ﻋﺒﺪ ﺍﷲ ﺃﲪﺪ‪ ،‬ﺣﺠﻴﺔ ﺍﳌﺨﺮﺟﺎﺕ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮﻳﺔ ﰲ ﺍﳌﻮﺍﺩ ﺍﳉﻨﺎﺋﻴﺔ‪،‬ﺍﻟﻄﺒﻌﺔ ﺍﻟﺜﺎﻧﻴﺔ ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ ‪ ،2008‬ﺹ‪.104‬‬

‫‪- 207 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺗﺴﺘﻠﺰﻡ ﻋﺪﻡ ﻗﺒﻮﻝ ﺃﻱ ﺩﻟﻴﻞ ﻳﻜﻮﻥ ﺍﻟﺒﺤﺚ ﻋﻨﻪ ﺃﻭ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ ﻗﺪ ﰎ ﺑﻄﺮﻳﻘﺔ ﻏﲑ ﻣﺸﺮﻭﻋﺔ‪ ،‬ﻭﺗﻌﺪ‬
‫ﻣﺴﺄﻟﺔ ﻗﺒﻮﻝ ﺍﻟﺪﻟﻴﻞ ﺍﳉﻨﺎﺋﻲ ﺑﺼﻔﺔ ﻋﺎﻣﺔ ﺍﳋﻄﻮﺓ ﺍﻷﻭﱃ ﺍﻟﱵ ﻳﺘﺨﺬﻫﺎ ﺍﻟﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﲡﺎﻫﻪ ﻭﺫﻟﻚ ﺑﻌﺪ‬
‫ﺍﻟﺘﻨﻘﻴﺐ ﻋﻨﻪ ﻭﻗﺒﻞ ﺇﺧﻀﺎﻋﻪ ﻟﺘﻘﺪﻳﺮﻩ‪ ،‬ﻭﻗﺒﻮﻝ ﺍﻟﺪﻟﻴﻞ ﻋﻠﻰ ﻫﺬﺍ ﺍﻟﻨﺤﻮ ﻳﺘﺴﻊ ﻭﻳﻀﻴﻖ ﺗﺒﻌﺎﹰ ﻟﻠﻤﺒﺎﺩﺉ ﺍﻟﱵ‬
‫ﺗﻘﻮﻡ ﻋﻠﻴﻬﺎ ﺃﻧﻈﻤﺔ ﺍﻹﺛﺒﺎﺕ ﺍﻟﺴﺎﺋﺪﺓ‪.‬‬
‫ﻭﺍﳊﻘﻴﻘﺔ ﺃﻥ ﻣﺸﺮﻭﻋﻴﺔ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻫﻲ ﻣﺸﺮﻭﻋﻴﺔ ﻭﺟﻮﺩ ﻭﻣﺸﺮﻭﻋﻴﺔ ﺣﺼﻮﻝ‪.‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﻣﺸﺮﻭﻋﻴﺔ ﻭﺟﻮﺩ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗـﻤﻲ‪:‬‬
‫ﺗﻘﺘﻀﻲ ﻣﺸﺮﻭﻋﻴﺔ ﻭﺟﻮﺩ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺃﻥ ﻳﻜﻮﻥ ﺍﳌﺸﺮﻉ ﻗﺪ ﻗﺒﻞ ﻫﺬﺍ ﺍﻟﺪﻟﻴﻞ ﺿﻤﻦ ﺃﺩﻟﺔ‬
‫ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ‬
‫ﺃﻭﻻ‪ :‬ﺍﳌﻘﺼﻮﺩ ﲟﺸﺮﻭﻋﻴﺔ ﺍﻟﻮﺟﻮﺩ‪:‬ﻭﻳﻘﺼﺪ ﲟﺸﺮﻭﻋﻴﺔ ﻭﺟﻮﺩ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺃﻥ ﻳﻌﺘﺮﻑ‬
‫ﺍﳌﺸﺮﻉ ‪‬ﺬﺍ ﺍﻟﺪﻟﻴﻞ ﻣﻦ ﺧﻼﻝ ﺗﺼﻨﻴﻔﻪ ﰲ ﻗﺎﺋﻤﺔ ﺍﻷﺩﻟﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﱵ ﳚﻴﺰ ﺍﻟﻘﺎﻧﻮﻥ ﻓﻴﻬﺎ ﻟﻠﻘﺎﺿﻲ‬
‫ﺍﻹﺳﺘﻨﺎﺩ ﺇﻟﻴﻪ ﰲ ﺗﻜﻮﻳﻦ ﻋﻘﻴﺪﺗﻪ‪ ،‬ﻭﻟﻌﻞ ﺍﳌﻌﻴﺎﺭ ﺍﻟﺬﻱ ﻳﺘﺤﺪﺩ ﻋﻠﻰ ﺃﺳﺎﺳﻪ ﻣﻮﻗﻒ ﺍﻟﻘﻮﺍﻧﲔ ﻓﻴﻤﺎ ﻳﺘﻌﻠﻖ‬
‫ﺑﺴﻠﻄﺔ ﺍﻟﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﰲ ﻗﺒﻮﻝ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻳﺘﻤﺜﻞ ﰲ ﻃﺒﻴﻌﺔ ﻧﻈﺎﻡ ﺍﻹﺛﺒﺎﺕ ﺍﻟﺴﺎﺋﺪ ﰲ ﺍﻟﺪﻭﻟﺔ‪ ،‬ﺇﺫ‬
‫ﲣﺘﻠﻒ ﺍﻟﻨﻈﻢ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﰲ ﻣﻮﻗﻔﻬﺎ ﻣﻦ ﺣﻴﺚ ﺍﻷﺩﻟﺔ ﺍﻟﱵ ﳝﻜﻦ ﻗﺒﻮﳍﺎ ﰲ ﺍﻹﺛﺒﺎﺕ‪.‬‬
‫ﺛﺎﻧﻴﺎ‪ :‬ﻣﻮﻗﻒ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻣﻦ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪ :‬ﻟﻘﺪ ﻋﺮﻓﺖ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﳉﺰﺍﺋﻴﺔ‬
‫ﻧﻈﺎﻣﲔ ﺭﺋﻴﺴﲔ ﻟﻺﺛﺒﺎﺕ ﳘﺎ‪:‬‬
‫‪ -‬ﻧﻈﺎﻡ ﺍﻹﺛﺒﺎﺕ ﺍﳌﻘﻴﺪ ﻭﻓﻴﻪ ﻳﻘﻮﻡ ﺍﳌﺸﺮﻉ ﺑﺘﺤﺪﻳﺪ ﺃﺩﻟﺔ ﺍﻹﺛﺒﺎﺕ ﺣﺼﺮﺍ ﻭﻛﺬﺍ ﺍﻟﻘﻮﺓ ﺍﻹﺛﺒﺎﺗﻴﺔ‬
‫ﻟﻜﻞ ﺩﻟﻴﻞ ﻣﻦ ﺍﻷﺩﻟﺔ ﺑﻨﺎﺀﺍ ﻋﻠﻰ ﻗﻨﺎﻋﺔ ﺍﳌﺸﺮﻉ ‪‬ﺎ‪.‬ﻭﻫﻮ ﻣﺎ ﻳﻌﺮﻑ ﺑﻨﻈﺎﻡ ﺍﻷﺩﻟﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ‪ ،‬ﺇﺫ ﻻ ﻳﻜﻮﻥ‬
‫ﻟﻘﻨﺎﻋﺔ ﺍﻟﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﰲ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ ﺃﻱ ﺩﻭﺭ ﰲ ﺗﻘﺪﻳﺮ ﺍﻷﺩﻟﺔ ﺃﻭ ﺍﻟﺒﺤﺚ ﻋﻨﻬﺎ‪ ،‬ﻓﺘﺤﺪﺩ ﻟﻠﻘﺎﺿﻲ‬
‫ﺍﻷﺩﻟﺔ ﺍﻟﱵ ﳚﻮﺯ ﻟﻪ ﻗﺒﻮﳍﺎ ﻭﺍﻟﻠﺠﻮﺀ ﺇﻟﻴﻬﺎ ﰲ ﺍﻹﺛﺒﺎﺕ ﻭﻻ ﺳﺒﻴﻞ ﻟﻺﺳﺘﻨﺎﺩ ﺇﱃ ﺃﻱ ﺩﻟﻴﻞ ﱂ ﻳﻨﺺ ﻋﻠﻴﻪ‬
‫ﺍﻟﻘﺎﻧﻮﻥ ﺻﺮﺍﺣﺔ ﺿﻤﻦ ﺃﺩﻟﺔ ﺍﻹﺛﺒﺎﺕ‪.‬‬
‫‪ -‬ﻧﻈﺎﻡ ﺍﻹﺛﺒﺎﺕ ﺍﳊﺮ ﻭﺍﻟﺬﻱ ﻳﻘﻮﻡ ﻋﻠﻰ ﺃﺳﺎﺱ ﺣﺮﻳﺔ ﺍﻹﺛﺒﺎﺕ ﻓﻼ ﻳﻘﻮﻡ ﺍﳌﺸﺮﻉ ﺑﺘﺤﺪﻳﺪ ﺍﻷﺩﻟﺔ‬
‫ﺑﻞ ﻳﻜﻮﻥ ﻟﻠﻘﺎﺿﻲ ﺩﻭﺭ ﺇﳚﺎﰊ ﰲ ﺍﻟﺒﺤﺚ ﻋﻦ ﺍﻷﺩﻟﺔ ﻭﺗﻘﺪﻳﺮ ﻗﻮ‪‬ﺎ ﺍﻟﺜﺒﻮﺗﻴﺔ ﺣﺴﺐ ﻗﻨﺎﻋﺘﻪ ‪‬ﺎ‪ ،‬ﻓﻼ‬
‫ﻳﻠﺰﻣﻪ ﺍﻟﻘﺎﻧﻮﻥ ﺑﺄﺩﻟﺔ ﻟﻺﺳﺘﻨﺎﺩ ﺇﻟﻴﻬﺎ ﰲ ﺗﻜﻮﻳﻦ ﻗﻨﺎﻋﺘﻪ ﻓﻠﻪ ﺃﻥ ﻳﺒﲏ ﻫﺬﻩ ﺍﻟﻘﻨﺎﻋﺔ ﻋﻠﻰ ﺃﻱ ﺩﻟﻴﻞ ﻭﺇﻥ ﱂ‬
‫ﻳﻜﻦ ﻣﻨﺼﻮﺻﺎ ﻋﻠﻴﻪ‪ ،‬ﺑﻞ ﺇﻥ ﺍﳌﺸﺮﻉ ﰲ ﻣﺜﻞ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ ﻻ ﳛﻔﻞ ﺑﺎﻟﻨﺺ ﻋﻠﻰ ﺃﺩﻟﺔ ﺍﻹﺛﺒﺎﺕ ﻓﻜﻞ ﺍﻷﺩﻟﺔ‬
‫ﺗﺘﺴﺎﻭﻯ ﻗﻴﻤﺘﻬﺎ ﺍﻹﺛﺒﺎﺗﻴﺔ ﰲ ﻧﻈﺮ ﺍﳌﺸﺮﻉ‪ ،‬ﻭﺍﻟﻘﺎﺿﻲ ﻫﻮ ﺍﻟﺬﻱ ﳜﺘﺎﺭ ﻣﻦ ﺑﲔ ﻣﺎ ﻳﻄﺮﺡ ﻋﻠﻴﻪ ﻣﺎ ﻳﺮﺍﻩ‬

‫‪- 208 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺻﺎﳊﺎ ﻟﻠﻮﺻﻮﻝ ﺇﱃ ﺍﳊﻘﻴﻘﺔ ﻭﻫﻮ ﰲ ﺫﻟﻚ ﻳﺘﻤﺘﻊ ﲟﻄﻠﻖ ﺍﳊﺮﻳﺔ ﻟﻘﺒﻮﻝ ﺍﻟﺪﻟﻴﻞ ﺃﻭ ﺭﻓﻀﻪ ﺇﺫﺍ ﱂ ﻳﻄﻤﺌﻦ‬
‫ﺇﻟﻴﻪ‪ ،‬ﻓﻼ ﻳﺘﺪﺧﻞ ﺍﳌﺸﺮﻉ ﰲ ﲢﺪﻳﺪ ﺍﻟﻘﻴﻤﺔ ﺍﻹﻗﻨﺎﻋﻴﺔ ﻟﻠﺪﻟﻴﻞ ﻭﻟﺬﻟﻚ ﻓﺎﻟﻘﺎﺿﻲ ﰲ ﻣﺜﻞ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ ﻳﺘﻤﺘﻊ‬
‫) ‪(1‬‬
‫ﺑﺪﻭﺭ ﺇﳚﺎﰊ ﰲ ﳎﺎﻝ ﺍﻹﺛﺒﺎﺕ ﰲ ﻣﻘﺎﺑﻞ ﺇﳓﺼﺎﺭ ﺩﻭﺭ ﺍﳌﺸﺮﻉ‪.‬‬
‫ﻭﻋﻠﻰ ﻫﺬﺍ ﺍﻷﺳﺎﺱ ﻭﺇﺳﺘﺮﺷﺎﺩﺍ ﲟﺎ ﺳﺒﻖ ﺫﻛﺮﻩ ﻓﺈﻥ ﺍﻟﻨﻈﻢ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﱵ ﺗﺘﺒﲎ ﻧﻈﺎﻡ ﺍﻷﺩﻟﺔ‬
‫ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻻ ﳝﻜﻦ ﰲ ﻇﻠﻬﺎ ﺍﻹﻋﺘﺮﺍﻑ ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺑﺄﻳﺔ ﻗﻴﻤﺔ ﺇﺛﺒﺎﺗﻴﺔ ﻣﺎ ﱂ ﻳﻨﺺ ﺍﻟﻘﺎﻧﻮﻥ ﻋﻠﻴﻪ ﺻﺮﺍﺣﺔ‬
‫ﺿﻤﻦ ﻗﺎﺋﻤﺔ ﺃﺩﻟﺔ ﺍﻹﺛﺒﺎﺕ‪ ،‬ﻭﻣﻦ ﰒ ﻓﺈﻥ ﺧﻠﻮ ﺍﻟﻘﺎﻧﻮﻥ ﻣﻦ ﺍﻟﻨﺺ ﻋﻠﻴﻪ ﺳﻴﻬﺪﺭ ﻗﻴﻤﺘﻪ ﺍﻹﺛﺒﺎﺗﻴﺔ ﻣﻬﻤﺎ‬
‫ﺗﻮﺍﻓﺮﺕ ﻓﻴﻪ ﺷﺮﻭﻁ ﺍﻟﻴﻘﲔ‪ ،‬ﻓﻼ ﳚﻮﺯ ﻟﻠﻘﺎﺿﻲ ﺃﻥ ﻳﺴﺘﻨﺪ ﺇﻟﻴﻪ ﻟﺘﻜﻮﻳﻦ ﻗﻨﺎﻋﺘﻪ‪(2).‬ﻭﺗﻄﺒﻴﻘﺎ ﳍﺬﺍ ﺍﻟﻔﻬﻢ‬
‫ﻧﺺ ﻗﺎﻧﻮﻥ ﺍﻹﺛﺒﺎﺕ ﰲ ﺍﳌﻮﺍﺩ ﺍﳉﻨﺎﺋﻴﺔ ﺍﻟﱪﻳﻄﺎﱐ ﻋﻠﻰ ﻗﺒﻮﻝ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻭﺣﺪﺩ ﻗﻴﻤﺘﻪ ﺍﻹﺛﺒﺎﺗﻴﺔ ﲡﺎﻭﺑﺎ‬
‫) ‪(3‬‬
‫ﻭﺇﺗﻔﺎﻗﺎ ﻣﻊ ﻃﺒﻴﻌﺔ ﺍﻟﻨﻈﺎﻡ ﺍﻟﻘﺎﻧﻮﱐ ﰲ ﺑﺮﻳﻄﺎﻧﻴﺎ‪.‬‬
‫ﻭﳝﻜﻦ ﺃﻥ ﻳﻌﺎﺏ ﻋﻠﻰ ﻧﻈﺎﻡ ﺍﻹﺛﺒﺎﺕ ﺍﻟﻘﺎﻧﻮﱐ ﺃﻥ ﻣﻦ ﺷﺄﻧﻪ ﺗﻘﻴﻴﺪ ﺍﻟﻘﺎﺿﻲ ﻋﻠﻰ ﳓﻮ ﻳﻔﻘﺪﻩ ﺳﻠﻄﺘﻪ‬
‫ﰲ ﺍﳊﻜﻢ ﲟﺎ ﻳﺘﻔﻖ ﻣﻊ ﺍﻟﻮﺍﻗﻊ ﻓﻴﺤﻜﻢ ﰲ ﻛﺜﲑ ﻣﻦ ﺍﻷﺣﻴﺎﻥ ﲟﺎ ﳜﺎﻟﻒ ﻗﻨﺎﻋﺘﻪ ﺍﻟﱵ ﺗﻜﻮﻧﺖ ﻟﺪﻳﻪ ﻣﻦ‬
‫ﺃﺩﻟﺔ ﻻ ﻳﻌﺘﺮﻑ ‪‬ﺎ ﺫﻟﻚ ﺍﻟﻨﻈﺎﻡ‪ ،‬ﻓﻴﺼﺒﺢ ﺍﻟﻘﺎﺿﻲ ﻛﺎﻵﻟﺔ ﰲ ﺇﻃﺎﻋﺘﻪ ﻟﻠﻨﺼﻮﺹ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﺬﻟﻚ ﻓﺈﻥ ﻫﺬﺍ‬
‫ﺍﻟﻨﻈﺎﻡ ﺑﺪﺃ ﻳﻨﺤﺼﺮ ﻧﻄﺎﻗﻪ ﺣﱴ ﰲ ﺍﻟﺪﻭﻝ ﺍﻟﱵ ﺗﻌﺘﱪ ﺍﻷﻛﺜﺮ ﺇﻋﺘﻨﺎﻗﺎ ﻟﻪ‪.‬‬
‫ﻓﻔﻲ ﺑﺮﻳﻄﺎﻧﻴﺎ ﻣﺜﻼ ﺑﺪﺃﺕ ﲣﻔﻒ ﻣﻦ ﻏﻠﻮﺍﺋﻪ ﺣﻴﺚ ﻇﻬﺮ ﻓﻴﻬﺎ ﻣﺎ ﻳﻌﺮﻑ ﺑﻘﺎﻋﺪﺓ ﺍﻹﺩﺍﻧﺔ ﺩﻭﻥ ﺃﺩﱏ‬
‫ﺷﻚ ﻭﺍﻟﱵ ﻣﻔﺎﺩﻫﺎ ﺃﻥ ﺍﻟﻘﺎﺿﻲ ﻳﺴﺘﻄﻴﻊ ﺃﻥ ﻳﻜﻮﻥ ﻗﻨﺎﻋﺘﻪ ﻣﻦ ﺃﻱ ﺩﻟﻴﻞ ﻭﺇﻥ ﱂ ﻳﻜﻦ ﺿﻤﻦ ﺍﻷﺩﻟﺔ‬
‫ﺍﳌﻨﺼﻮﺹ ﻋﻠﻴﻬﺎ ﻣﱴ ﻛﺎﻥ ﻫﺬﺍ ﺍﻟﺪﻟﻴﻞ ﻗﺎﻃﻌﺎ ﰲ ﺩﻻﻟﺘﻪ‪.‬‬
‫ﺃﻣﺎ ﺑﺎﻟﻨﺴﺒﺔ ﻟﻠﻨﻈﻢ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﱵ ﺗﻌﺘﻤﺪ ﻧﻈﺎﻡ ﺍﻹﺛﺒﺎﺕ ﺍﳊﺮ ﻛﻤﺎ ﻫﻮ ﺍﳊﺎﻝ ﻋﻠﻴﻪ ﰲ ﺍﻟﻘﺎﻧﻮﻥ‬
‫ﺍﳉﺰﺍﺋﺮﻱ)‪)(4‬ﺍﳌﺎﺩﺓ ‪ 212‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ( ﻭﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﻔﺮﻧﺴﻲ )ﺍﳌﺎﺩﺓ ‪ 427‬ﻗﺎﻧﻮﻥ‬
‫ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺍﻟﻔﺮﻧﺴﻲ( ﻓﺈﻧﻪ ﻻ ﺗﺜﻮﺭ ﻣﺸﻜﻠﺔ ﻣﺸﺮﻭﻋﻴﺔ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻣﻦ ﺣﻴﺚ ﺍﻟﻮﺟﻮﺩ‪ ،‬ﻋﻠﻰ‬
‫ﺇﻋﺘﺒﺎﺭ ﺃﻥ ﺍﳌﺸﺮﻉ ﻻ ﻳﻌﺘﻤﺪ ﺳﻴﺎﺳﺔ ﺍﻟﻨﺺ ﻋﻠﻰ ﻗﺎﺋﻤﺔ ﻷﺩﻟﺔ ﺍﻹﺛﺒﺎﺕ ﻓﺎﻷﺳﺎﺱ ﻫﻮ ﺣﺮﻳﺔ ﺍﻷﺩﻟﺔ‪ ،‬ﻟﺬﻟﻚ‬

‫)‪(1‬ﻫﻼﱄ ﻋﺒﺪ ﺍﻟﻠﻼﻩ ﺃﲪﺪ‪ ،‬ﺣﺠﻴﺔ ﺍﳌﺨﺮﺟﺎﺕ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮﻳﺔ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ‪،29‬‬
‫)‪(2‬ﻃﺎﺭﻕ ﳏﻤﺪ ﺍﳉﻤﻠﻲ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﰲ ﳎﺎﻝ ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.23‬‬
‫)‪(3‬ﺍﻟﺪﻭﻝ ﺫﺍﺕ ﺍﻟﺜﻘﺎﻓﺔ ﺍﻷﳒﻠﻮﺳﻜﻮﻧﻴﺔ ﻣﺜﻞ ﺑﺮﻳﻄﺎﻧﻴﺎ ﻭﺍﻟﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ ﺍﻷﻣﺮﻳﻜﻴﺔ ﺃﺧﺬﺕ ﺑﻨﻈﺎﻡ ﺍﻹﺛﺒﺎﺕ ﺍﻟﻘﺎﻧﻮﱐ‪.‬‬
‫)‪(4‬ﻫﻨﺎﻙ ﺍﻟﻌﺪﻳﺪ ﻣﻦ ﺍﻷﺳﺒﺎﺏ ﺍﻟﱵ ﺗﱪﺭ ﺍﻷﺧﺬ ﲟﺒﺪﺃ ﺣﺮﻳﺔ ﺍﻹﺛﺒﺎﺕ ﰲ ﻧﻄﺎﻕ ﻧﻈﺮﻳﺔ ﺍﻹﺛﺒﺎﺕ ﺍﳉﺰﺍﺋﻲ ﻣﻨﻬﺎ ﺃﻥ ﺣﺮﻳﺔ ﺍﻹﺛﺒﺎﺕ ﺗﻌﺪ ﻧﺘﻴﺠﺔ ﻣﻨﻄﻘﻴﺔ ﳌﺒﺪﺃ ﺃﻥ‬
‫ﺍﻟﻘﺎﺿﻲ ﻳﻘﻀﻲ ﲟﺤﺾ ﺇﻗﺘﻨﺎﻋﻪ ﺍﻟﺬﺍﰐ ﻭﺍﻟﱵ ﺗﺴﺘﻠﺰﻡ ﺑﺎﻟﻀﺮﻭﺭﺓ ﻣﻨﺢ ﺍﳊﺮﻳﺔ ﻟﻠﻘﺎﺿﻲ ﺑﺎﻹﺳﺘﻌﺎﻧﺔ ﲜﻤﻴﻊ ﻭﺳﺎﺋﻞ ﺍﻹﺛﺒﺎﺕ ﺍﻟﱵ ﻳﻘﺘﻨﻊ ﻭﻳﻄﻤﺌﻦ ﺇﻟﻴﻬﺎ ﺣﱴ ﻳﺘﺴﲎ‬
‫ﻟﻪ ﺃﺩﺍﺀ ﺭﺳﺎﻟﺘﻪ ﰲ ﺇﺭﺳﺎﺀ ﺍﻟﻌﺪﺍﻟﺔ ﺑﲔ ﺍﳌﺘﻘﺎﺿﲔ‪ ،‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺃﻥ ﺍﻹﺛﺒﺎﺕ ﰲ ﺍﻟﺪﻋﻮﻯ ﺍﳉﺰﺍﺋﻴﺔ ﻳﺮﺩ ﻋﻠﻰ ﻭﻗﺎﺋﻊ ﻣﺎﺩﻳﺔ ﻳﺼﻌﺐ ﺑﻞ ﻗﺪ ﻳﺴﺘﺤﻴﻞ ﺍﳊﺼﻮﻝ‬
‫ﻋﻠﻰ ﺩﻟﻴﻞ ﻣﺴﺒﻖ ﳍﺎ ﻭﺫﻟﻚ ﺑﻌﻜﺲ ﺍﻟﺪﻋﻮﻯ ﺍﳌﺪﻧﻴﺔ ﺍﻟﱵ ﻳﺮﺩ ﺍﻹﺛﺒﺎﺕ ﻓﻴﻬﺎ ﻋﻠﻰ ﺗﺼﺮﻓﺎﺕ ﻗﺎﻧﻮﻧﻴﺔ ﻳﺴﻬﻞ ﺇﻋﺪﺍﺩ ﺩﻟﻴﻞ ﻣﺴﺒﻖ ﺑﺸﺄ‪‬ﺎ‪.‬‬

‫‪- 209 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻓﻤﺴﺄﻟﺔ ﻗﺒﻮﻝ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻻ ﻳﻨﺎﻝ ﻣﻨﻬﺎ ﺳﻮﻯ ﻣﺪﻯ ﺇﻗﺘﻨﺎﻉ ﺍﻟﻘﺎﺿﻲ ﺑﻪ ﺇﺫﺍ ﻛﺎﻥ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ‬
‫ﺍﻷﺩﻟﺔ ﳝﻜﻦ ﺇﺧﻀﺎﻋﻪ ﻟﺘﻘﺪﻳﺮ ﺍﻟﻘﺎﺿﻲ ﻭﻫﻮ ﻣﺎ ﺳﻮﻑ ﻧﺘﻨﺎﻭﻟﻪ ﻻﺣﻘﺎ ﻋﻨﺪ ﺍﳊﺪﻳﺚ ﻋﻠﻰ ﺣﺠﻴﺔ ﺍﻟﺪﻟﻴﻞ‬
‫ﺍﻟﺮﻗﻤﻲ‪.‬‬
‫ﻭﰲ ﻫﺬﺍ ﺍﻟﺼﺪﺩ ﻓﺈﻥ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻭﻛﻐﲑﻩ ﻣﻦ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﳌﻨﺘﻤﻴﺔ ﺇﱃ ﻧﻈﺎﻡ ﺍﻹﺛﺒﺎﺕ ﺍﳊﺮ‬
‫ﻻ ﳒﺪﻩ ﻗﺪ ﺃﻓﺮﺩ ﻧﺼﻮﺻﺎ ﺧﺎﺻﺔ ﲢﻈﺮ ﻋﻠﻰ ﺍﻟﻘﺎﺿﻲ ﻣﻘﺪﻣﺎ ﻗﺒﻮﻝ ﺃﻭ ﻋﺪﻡ ﻗﺒﻮﻝ ﺃﻱ ﺩﻟﻴﻞ ﲟﺎ ﰲ ﺫﻟﻚ‬
‫ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪ ،‬ﻭﻫﻮ ﺃﻣﺮ ﻣﻨﻄﻘﻲ ﻃﺎﳌﺎ ﺃﻥ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻳﺴﺘﻨﺪ ﳌﺒﺪﺃ ﺣﺮﻳﺔ ﺍﻹﺛﺒﺎﺕ ﺣﻴﺚ ﱂ‬
‫ﻳﺘﻀﻤﻦ ﻗﺎﻧﻮﻥ ‪ 04/09‬ﺍﳌﺘﻀﻤﻦ ﺍﻟﻘﻮﺍﻋﺪ ﺍﳋﺎﺻﺔ ﺑﺎﻟﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ‬
‫ﻭﺍﻹﺗﺼﺎﻝ ﻭﻣﻜﺎﻓﺤﺘﻬﺎ ﺃﻳﺔ ﺃﻭﺿﺎﻉ ﺧﺎﺻﺔ ﻭﺗﺮﻙ ﺍﻷﻣﺮ ﻟﻠﻘﻮﺍﻋﺪ ﺍﻟﻌﺎﻣﺔ‪ ،‬ﻭﻣﻨﻬﺎ ﺃﻥ ﺍﻷﺻﻞ ﰲ ﺍﻷﺩﻟﺔ‬
‫ﻣﺸﺮﻭﻋﻴﺔ ﻭﺟﻮﺩﻫﺎ ﻭﻣﻦ ﰒ ﻓﺈﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺳﻴﻜﻮﻥ ﻣﺸﺮﻭﻋﺎ ﻣﻦ ﺣﻴﺚ ﺍﻟﻮﺟﻮﺩ ﺇﺻﻄﺤﺎﺑﺎ‬
‫ﻟﻸﺻﻞ‪ ،‬ﻭﻣﻦ ﺟﻬﺔ ﺃﺧﺮﻯ ﻓﺈﻧﻪ ﻭﻃﺒﻘﺎ ﳌﺒﺪﺃ ﺍﻟﺸﺮﻋﻴﺔ ﺍﻹﺟﺮﺍﺋﻴﺔﻓﻼ ﻳﻜﻮﻥ ﺍﻟﺪﻟﻴﻞ ﻣﻘﺒﻮﻻ ﰲ ﻋﻤﻠﻴﺔ‬
‫ﺍﻹﺛﺒﺎﺕ ﺇﻻ ﺇﺫﺍ ﻛﺎﻥ ﻣﺸﺮﻭﻋﺎ ﺫﻟﻚ ﺃﻥ ﺍﻟﻘﺎﺿﻲ ﻻ ﻳﻘﺪﺭ ﺇﻻ ﺍﻟﺪﻟﻴﻞ ﺍﳌﻘﺒﻮﻝ ﻭﻻ ﻳﻜﻮﻥ ﻛﺬﻟﻚ ﺇﻻ ﺇﺫﺍ‬
‫ﻛﺎﻥ ﻣﺸﺮﻭﻋﺎ ﺑﺄﻥ ﰎ ﺍﻟﺒﺤﺚ ﻋﻨﻪ ﻭﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ ﻭﻓﻘﺎ ﻟﻄﺮﻕ ﻣﺸﺮﻭﻋﺔ‪.‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﻣﺸﺮﻭﻋﻴﺔ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪:‬‬
‫ﺇﻧﻪ ﻣﻦ ﺍﻟﻀﺮﻭﺭﻱ ﺃﻥ ﻳﺘﻢ ﺭﺳﻢ ﺿﻮﺍﺑﻂ ﻭﺃﻃﺮ ﻣﻌﻴﻨﺔ ﻳﺘﻌﲔ ﺃﻥ ﲤﺎﺭﺱ ﰲ ﻧﻄﺎﻗﻬﺎ ﻋﻤﻠﻴﺔ ﺍﻟﺒﺤﺚ‬
‫ﻋﻦ ﺍﻷﺩﻟﺔ ﻭﲢﺼﻴﻠﻬﺎ ﻭﺍﻟﺘﺤﻘﻴﻖ ﻓﻴﻬﺎ‪ ،‬ﲝﻴﺚ ﻻ ﺗﻨﺤﺮﻑ ﻋﻦ ﺍﻟﻐﺮﺽ ﺍﻟﺬﻱ ﻳﺒﺘﻐﻴﻪ ﺍﳌﺸﺮﻉ ﻣﻦ ﻭﺭﺍﺋﻬﺎ‬
‫ﻭﻫﻮ ﺍﻟﻮﺻﻮﻝ ﺇﱃ ﺍﳊﻘﻴﻘﺔ ﺍﻟﻔﻌﻠﻴﺔ ﰲ ﺍﻟﺪﻋﻮﻯ ﻭﻫﻲ ﺍﳍﺪﻑ ﺍﻷﲰﻰ ﻟﻘﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‪.‬‬
‫ﺃﻭﻻ‪ :‬ﺍﳌﻘﺼﻮﺩ ﲟﺸﺮﻭﻋﻴﺔ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪:‬ﺇﻧﻪ ﻣﻦ ﺍﳌﻘﺮﺭ ﺃﻥ ﺍﻹﺩﺍﻧﺔ ﰲ ﺃﻱ‬
‫ﺟﺮﳝﺔﻻﺑﺪ ﻭﺃﻥ ﺗﻜﻮﻥ ﻣﺒﻨﻴﺔ ﻋﻠﻰ ﺃﺩﻟﺔ ﻣﺸﺮﻭﻋﺔ ﰎ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻬﺎ ﻭﻓﻖ ﻗﻮﺍﻋﺪ ﺍﻷﺧﻼﻕ ﻭﺍﻟﱰﺍﻫﺔ‬
‫ﻭﺇﺣﺘﺮﺍﻡ ﺍﻟﻘﺎﻧﻮﻥ ﻣﻦ ﻃﺮﻑ ﺍﳉﻬﺔ ﺍﳌﺨﺘﺼﺔ ﲜﻤﻊ ﺍﻟﺪﻟﻴﻞ ﺍﳉﺰﺍﺋﻲ ﲟﺎ ﻳﺘﻀﻤﻨﻪ ﻣﻦ ﺃﺩﻟﺔ ﻣﺴﺘﺨﺮﺟﺔ ﻣﻦ‬
‫ﻭﺳﺎﺋﻞ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﻭ ﻻ ﻳﻜﻮﻥ ﻣﺸﺮﻭﻋﺎ ﺇﻻ ﺇﺫﺍ ﺃﺟﺮﻯ ﺍﻟﺘﻨﻘﻴﺐ ﻋﻨﻪ ﺃﻭ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ ﺃﻭﻛﺎﻧﺖ ﻋﻤﻠﻴﺔ‬
‫ﺗﻘﺪﳝﻪ ﺇﱃ ﺍﻟﻘﻀﺎﺀ ﺃﻭ ﺇﻗﺎﻣﺘﻪ ﺃﻣﺎﻣﻪ ﺑﺎﻟﻄﺮﻕ ﺍﻟﱵ ﺭﲰﻬﺎ ﺍﻟﻘﺎﻧﻮﻥ‪ ،‬ﻓﻤﱴ ﻣﺎ ﰎ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ‬
‫ﺧﺎﺭﺝ ﻫﺬﻩ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻓﻼ ﻳﻌﺘﺪ ﺑﻘﻴﻤﺘﻪ ﻣﻬﻤﺎ ﻛﺎﻧﺖ ﺩﻻﻟﺘﻪ ﺍﳊﻘﻴﻘﻴﺔ ﻭﺫﻟﻚ ﻟﻌﺪﻡ ﻣﺸﺮﻭﻋﻴﺘﻪ‪،‬‬
‫ﻭﻋﻠﻰ ﻫﺬﺍ ﺍﻷﺳﺎﺱ ﻓﺈﻥ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺍﳌﺘﺤﺼﻠﺔ ﻣﻦ ﺍﻟﻮﺳﺎﺋﻞ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺇﺫﺍ ﺧﺎﻟﻔﺖ‬
‫ﺍﻟﻘﻮﺍﻋﺪ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﻟﱵ ﺗﻨﻈﻢ ﻛﻴﻔﻴﺔ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻬﺎ ﻓﺈ‪‬ﺎ ﺗﻜﻮﻥ ﺑﺎﻃﻠﺔ‪ ،‬ﻭﺑﺎﻟﺘﺎﱄ ﺑﻄﻼﻥ ﺍﻟﺪﻟﻴﻞ ﺍﳌﺴﺘﻤﺪ‬
‫ﻣﻨﻬﺎ ﻭﻻ ﺗﺼﻠﺢ ﻷﻥ ﺗﻜﻮﻥ ﺃﺩﻟﺔ ﺗﺒﲎ ﻋﻠﻴﻬﺎ ﺍﻷﺩﺍﻧﺔ ﰲ ﺍﳌﻮﺍﺩ ﺍﳉﻨﺎﺋﻴﺔ‪ .‬ﻭﰲ ﺇﻃﺎﺭ ﻣﺸﺮﻭﻋﻴﺔ ﺍﻷﺩﻟﺔ‬

‫‪- 210 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﻟﺮﻗﻤﻴﺔ ﳒﺪ ﺃﻥ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﻨﺎﺋﻴﺔ ﺍﻟﻔﺮﻧﺴﻲ ﺭﻏﻢ ﺃﻧﻪ ﱂ ﻳﺘﻀﻤﻦ ﺃﻱ ﻧﺼﻮﺹ ﺗﺘﻌﻠﻖ ﲟﺒﺪﺃ‬
‫ﺍﻷﻣﺎﻧﺔ ﻭﺍﻟﱰﺍﻫﺔ ﰲ ﺍﻟﺒﺤﺚ ﻋﻦ ﺍﳊﻘﻴﻘﺔ ﺇﻻ ﺃﻥ ﺍﻟﻔﻘﻪ ﻭﺍﻟﻘﻀﺎﺀ ﻛﺎﻧﺎ ﲜﺎﻧﺐ ﻫﺬﺍ ﺍﳌﺒﺪﺃ ﺳﻮﺍﺀ ﰲ ﳎﺎﻝ‬
‫ﺍﻟﺘﻨﻘﻴﺐ ﻋﻦ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﺃﻡ ﰲ ﳎﺎﻝ ﺍﻟﺘﻨﻘﻴﺐ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﻳﺸﲑ ﺭﺃﻱ ﻓﻘﻬﻲ ﻓﺮﻧﺴﻲ‬
‫ﺇﱃ ﺃﻥ ﺍﻟﻘﻀﺎﺀ ﻗﺪ ﻗﺒﻞ ﺇﺳﺘﺨﺪﺍﻡ ﺍﻟﻮﺳﺎﺋﻞ ﺍﻟﻌﻠﻤﻴﺔ ﺍﳊﺪﻳﺜﺔ ﰲ ﻋﻤﻠﻴﺔ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﺍﺋﻢ‬
‫ﲢﺖ ﲢﻔﻆ ﺃﻥ ﻳﺘﻢ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻷﺩﻟﺔ ﺍﳉﻨﺎﺋﻴﺔ ﻭﻣﻦ ﺑﻴﻨﻬﺎ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺑﻄﺮﻳﻘﺔ ﺷﺮﻋﻴﺔ‬
‫ﻭﻧﺰﻳﻬﺔ‪(1).‬ﻭﻗﺪ ﻗﻀﻲ ﰲ ﻫﻠﻨﺪﺍ ﺃﻧﻪ ﺇﺫﺍ ﻛﺎﻧﺖ ﺑﻴﺎﻧﺎﺕ ﺍﳊﺎﺳﻮﺏ ﺍﳌﺴﺠﻠﺔ ﰲ ﻣﻠﻔﺎﺕ ﺍﻟﺸﺮﻃﺔ ﻏﲑ‬
‫ﻗﺎﻧﻮﻧﻴﺔ ﻓﺬﻟﻚ ﻳﺆﺩﻱ ﺇﱃ ﻧﺘﻴﺠﺔ ﻣﺆﺩﺍﻫﺎ ﺿﺮﻭﺭﺓ ﳏﻮ ﻫﺬﻩ ﺍﻟﺒﻴﺎﻧﺎﺕ ﻭﻋﺪﻡ ﺇﻣﻜﺎﻧﻴﺔ ﺇﺳﺘﺨﺪﺍﻣﻬﺎ ﻛﺪﻟﻴﻞ‬
‫ﺟﻨﺎﺋﻲ ﺑﺴﺒﺐ ﻣﺒﺪﺃ ﺇﺳﺘﺒﻌﺎﺩ ﺍﻷﺩﻟﺔ ﻏﲑ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ‪.‬ﻭﻣﻦ ﻗﺒﻴﻞ ﺍﻻﺩﻟﺔ ﻏﲑ ﺍﳌﺸﺮﻭﻋﺔ ﺍﳊﺼﻮﻝ ﻏﻠﻰ ﻋﻠﻰ‬
‫ﺩﻟﻴﻞ ﺭﻗﻤﻲ ﻣﻦ ﺧﻼﻝ ﺍﺟﺮﺍﺀ ﻣﺮﺍﻗﺒﺔ ﺍﻻﺗﺼﺎﻻﺕ ﺩﻭﻥ ﺍﻥ ﻳﻜﻮﻥ ﳏﻼ ﻻﺫﻥ ﻣﻦ ﺍﻟﺴﻠﻄﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ‬
‫ﺍﳌﺨﺘﺼﺔ ﺍﻭ ﺍﲣﺎﺫ ﺗﺮﺗﻴﺒﺎﺕ ﺗﻘﻨﻴﺔ ﻣﻦ ﺃﺟﻞ ﺗﻔﺘﻴﺶ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﺆﺩﻱ ﺇﱃ ﺍﳌﺴﺎﺱ ﺑﺎﳊﻴﺎﺓ ﺍﳋﺎﺻﺔ‬
‫ﻟﻠﻐﲑ ﺃﻭ ﳑﺎﺭﺳﺔ ﺍﻹﻛﺮﺍﻩ ﺍﳌﺎﺩﻱ ﺃﻭ ﺍﳌﻌﻨﻮﻱ ﰲ ﻣﻮﺍﺟﻬﺔ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﻣﻦ ﺃﺟﻞ ﻓﻚ ﺷﻔﺮﺓ ﻧﻈﺎﻡ ﻣﻦ ﺍﻟﻨﻈﻢ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻭ ﺍﻟﺘﺤﺮﻳﺾ ﻋﻠﻰ ﺇﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﻋﻦ ﻃﺮﻑ ﺍﻟﻀﺒﻄﻴﺔ‪(2)،‬ﻭﻳﻌﺪ ﻣﻦ ﺍﻟﻄﺮﻕ ﻏﲑﺍﳌﺸﺮﻭﻋﺔ‬
‫ﺃﻳﻀﺎ ﺇﺳﺘﺨﺪﺍﻡ ﺍﻟﺘﺪﻟﻴﺲ ﺃﻭ ﺍﻟﻐﺶ ﺃﻭ ﺍﳋﺪﺍﻉ ﰲ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻷﺩﻟﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪.‬‬
‫ﻭﻟﻘﺪ ﺻﺎﺩﻗﺖ ﳉﻨﺔ ﺍﻟﻮﺯﺭﺍﺀ ﺍﻟﺘﺎﺑﻌﺔ ﻟﻠﻤﺠﻠﺲ ﺍﻷﺭﻭﰊ ﰲ ‪ 1981/01/28‬ﻋﻠﻰ ﺇﺗﻔﺎﻗﻴﺔ ﺧﺎﺻﺔ ﲝﻤﺎﻳﺔ‬
‫ﺍﻷﺷﺨﺎﺹ ﰲ ﻣﻮﺍﺟﻬﺔ ﳐﺎﻃﺮ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﺒﻴﺎﻧﺎﺕ ﺫﺍﺕ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﺸﺨﺼﻴﺔ‪ ،‬ﻭﻣﻦ ﺍﶈﺎﻭﺭ ﺍﳌﻬﻤﺔ ﺍﻟﱵ‬
‫ﺗﻨﺎﻭﻟﺘﻬﺎ ﺍﻹﺗﻔﺎﻗﻴﺔ ﺿﺮﻭﺭﺓ ﺃﻥ ﺗﻜﻮﻥ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﳌﻀﺒﻮﻃﺔ ﺻﺤﻴﺤﺔ ﻭﻛﺎﻣﻠﺔ ﻭﺩﻗﻴﻘﺔ ﻭﻣﺴﺘﻤﺪﺓ ﺑﻄﺮﻕ‬
‫ﻣﺸﺮﻭﻋﺔ ﻭﻋﺪﻡ ﺇﻓﺸﺎﺋﻬﺎ ﺃﻭ ﺇﺳﺘﻌﻤﺎﳍﺎ ﰲ ﻏﲑ ﺍﻷﻏﺮﺍﺽ ﺍﳌﺨﺼﺼﺔ ﳍﺎ‪،‬ﻛﻤﺎ ﺃﻥ ﻟﻠﺸﺨﺺ ﺍﳌﻌﲏ ﺍﳊﻖ‬
‫ﰲ ﺍﻟﺘﻌﺮﻑ ﻭﺍﻹﻃﻼﻉ ﻋﻠﻰ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﳌﺴﺠﻠﺔ ﺍﳌﺘﻌﻠﻘﺔ ﺑﻪ ﻭﺗﺼﺤﻴﺤﻬﺎ ﻭﺗﻌﺪﻳﻠﻬﺎ ﻭﻣﻨﺎﻗﻀﺘﻬﺎ ﻭﳏﻮﻫﺎ ﺇﺫﺍ‬
‫) ‪(3‬‬
‫ﻛﺎﻧﺖ ﺑﺎﻃﻠﺔ‬
‫ﻭﻟﻘﺪ ﻭﺿﻌﺖ ﺍﻟﺪﺳﺎﺗﲑ ﻭﺍﻟﻘﻮﺍﻧﲔ ﺍﻹﺟﺮﺍﺋﻴﺔ ﻧﺼﻮﺻﺎ ﺗﺘﻀﻤﻦ ﺿﻮﺍﺑﻂ ﻟﺸﺮﻋﻴﺔ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳌﺎﺳﺔ‬
‫ﺑﺎﳊﺮﻳﺔ‪ ،‬ﻭﻣﻦ ﰒ ﳐﺎﻟﻔﺔ ﻫﺬﻩ ﺍﻟﻨﺼﻮﺹ ﰲ ﺇﺳﺘﺨﻼﺹ ﺍﻟﺪﻟﻴﻞ ﻳﺼﺒﻎ ﻫﺬﺍ ﺍﻟﺪﻟﻴﻞ ﺑﺎﻻﻣﺸﺮﻭﻋﻴﺔ ﻭﺍﻟﻘﻮﻝ‬
‫ﺑﺬﻟﻚ ﻳﻬﺪﺭ ﻗﻴﻤﺘﻪ‪ ،‬ﻓﻤﺸﺮﻭﻋﻴﺔ ﺍﻟﺪﻟﻴﻞ ﺗﺘﻄﻠﺐ ﺻﺪﻗﻪ ﰲ ﻣﻀﻤﻮﻧﻪ ﻭﺃﻥ ﻳﻜﻮﻥ ﻫﺬﺍ ﺍﳌﻀﻤﻮﻥ ﻗﺪ ﰎ‬
‫ﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ ﺑﻄﺮﻕ ﻣﺸﺮﻭﻋﺔ ﺗﺪﻝ ﻋﻠﻰ ﺍﻷﻣﺎﻧﺔ ﻭﺍﻟﱰﺍﻫﺔ ﻣﻦ ﺣﻴﺚ ﻃﺮﻕ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ‪.‬‬

‫)‪(1‬ﻋﻠﻲ ﺣﺴﻦ ﳏﻤﺪ ﺍﻟﻄﻮﺍﻟﺒﺔ‪ ،‬ﺍﻟﺘﻔﺘﻴﺶ ﺍﳉﻨﺎﺋﻲ ﻋﻠﻰ ﻧﻈﻢ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻷﻧﺘﺮﻧﺎﺕ ﻋﺎﱂ ﺍﻟﻜﺘﺐ ﺍﳊﺪﻳﺜﺔ ﺍﻷﺭﺩﻥ‪ ،‬ﺹ‪.186‬‬
‫)‪(2‬ﻋﻠﻲ ﺣﺴﻦ ﳏﻤﺪ ﺍﻟﻄﻮﺍﻟﺒﺔ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.189‬‬
‫)‪(3‬ﻣﺸﺎﺭ ﺇﻟﻴﻪ ﻟﺪﻯ ﺭﺷﻴﺪﺓ ﺑﻮﻛﺮ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ .‬ﺹ‪،492‬‬

‫‪- 211 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﺍﳊﻘﻴﻘﺔ ﺃﻥ ﻣﺸﺮﻭﻋﻴﺔ ﺍﻟﺪﻟﻴﻞ ﺗﻌﺪ ﻗﻴﺪﺍ ﻭﺧﻄﺎ ﻓﺎﺻﻼ ﺑﲔ ﺣﻖ ﺍﻟﺪﻭﻟﺔ ﰲ ﺗﻮﻗﻴﻊ ﺍﻟﻌﻘﺎﺏ ﻟﻀﻤﺎﻥ ﺃﻣﻦ‬
‫ﻭﺇﺳﺘﻘﺮﺍﺭ ﺍ‪‬ﺘﻤﻊ ﻣﻦ ﺟﻬﺔ‪ ،‬ﻭﺑﲔ ﺿﻤﺎﻥ ﺣﻘﻮﻕ ﺍﻷﻓﺮﺍﺩ ﻭﺣﺮﻳﺎ‪‬ﻢ ﻣﻦ ﺟﻬﺔ ﺃﺧﺮﻯ ﻟﺬﻟﻚ ﻓﺎﻟﺴﺆﺍﻝ‬
‫ﺍﳌﻄﺮﻭﺡ ﰲ ﻫﺬﺍ ﺍﻹﻃﺎﺭ ﻣﺎ ﻫﻮ ﻣﻮﻗﻒ ﺍﻟﻘﻀﺎﺀ ﻣﻦ ﺍﻟﺪﻟﻴﻞ ﻏﲑ ﺍﳌﺸﺮﻭﻉ ﻭﻣﺎ ﻫﻲ ﻗﻴﻤﺘﻪ ﰲ ﺍﻹﺛﺒﺎﺕ‬
‫ﺍﳉﻨﺎﺋﻲ؟‬
‫ﺛﺎﻧﻴﺎ‪ :‬ﻣﻮﻗﻒ ﺍﻟﻘﻀﺎﺀ ﻣﻦ ﺍﻟﺪﻟﻴﻞ ﻏﲑ ﺍﳌﺸﺮﻭﻉ‪:‬ﺇﻥ ﻫﺬﺍ ﺍﻟﺘﺴﺎﺅﻝ ﻳﻘﻮﺩ ﺇﱃ ﲝﺚ ﻗﻴﻤﺔ ﻛﻞ ﻣﻦ‬
‫ﺩﻟﻴﻞ ﺍﻹﺩﺍﻧﺔ ﻭﺩﻟﻴﻞ ﺍﻟﱪﺍﺀﺓ ﳌﻌﺮﻓﺔ ﻗﻴﻤﺘﻪ ﰲ ﺍﳊﺎﻟﺘﲔ‪:‬‬
‫ﻓﺎﻟﺒﻨﺴﺒﺔ ﻟﺪﻟﻴﻞ ﺍﻹﺩﺍﻧﺔ ﻓﺈﻥ ﺍﻷﻣﺮ ﻳﻘﺘﻀﻲ ﻣﻦ ﺃﺟﻞ ﻛﺴﺮ ﻗﺮﻳﻨﺔ ﺍﻟﱪﺍﺀﺓ ﺍﻟﱵ ﻳﺘﻤﺘﻊ ‪‬ﺎ ﺍﳌﺘﻬﻢ ﺃﻥ‬
‫ﺗﻜﻮﻥ ﺍﻷﺩﻟﺔ ﺍﻟﱵ ﻳﺆﺳﺲ ﻋﻠﻴﻬﺎ ﺣﻜﻢ ﺍﻹﺩﺍﻧﺔ ﻣﺸﺮﻭﻋﺔ‪(1)،‬ﻭﻳﺴﺘﻮﻱ ﰲ ﺫﻟﻚ ﺇﻥ ﻛﺎﻧﺖ ﺃﺩﻟﺔ ﺗﻘﻠﻴﺪﻳﺔ‬
‫ﺃﻡ ﻣﺴﺘﺨﻠﺼﺔ ﻣﻦ ﺍﻟﻮﺳﺎﺋﻞ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪ .‬ﻭﺃﻱ ﺩﻟﻴﻞ ﰎ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ ﺑﻄﺮﻳﻘﺔ ﻏﲑ ﻣﺸﺮﻭﻋﺔ ﺃﻭ ﺑﻮﺳﻴﻠﺔ‬
‫ﳐﺎﻟﻔﺔ ﻟﻠﻘﺎﻧﻮﻥ ﻳﻌﺘﱪ ﻏﲑ ﻣﻘﺒﻮﻝ ﰲ ﻋﻤﻠﻴﺔ ﺍﻹﺛﺒﺎﺕ ﻷﻧﻪ ﺇﺫﺍ ﻣﺎ ﲰﺢ ﺑﻘﺒﻮﻝ ﺃﺩﻟﺔ ﻭﻟﻴﺪﺓ ﻋﻦ ﺇﺟﺮﺍﺀﺍﺕ‬
‫ﺑﺎﻃﻠﺔ ﺃﺩﻯ ﺫﻟﻚ ﺇﱃ ﺇﻫﺪﺍﺭ ﺍﻟﻀﻤﺎﻧﺎﺕ ﺍﻟﱵ ﻛﻔﻠﻬﺎ ﺍﻟﻘﺎﻧﻮﻥ ﳊﻤﺎﻳﺔ ﺣﻘﻮﻕ ﺍﳌﻮﺍﻃﻦ ﻭﻛﺮﺍﻣﺘﻪ‪ ،‬ﻭﺗﺮﺗﻴﺒﺎ‬
‫ﻋﻠﻰ ﺫﻟﻚ ﻓﺈﻧﻪ ﻻ ﳚﻮﺯ ﻟﻠﻘﺎﺿﻲ ﺍﻟﻘﺒﻮﻝ ﺑﺪﻟﻴﻞ ﺭﻗﻤﻲ ﰎ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ ﻣﻦ ﺇﺟﺮﺍﺀ ﺍﻟﺘﺴﺮﺏ ﺟﺮﻯ‬
‫ﺍﻟﻘﻴﺎﻡ ﺑﻪ ﺩﻭﻥ ﻣﺮﺍﻋﺎﺓ ﺍﻟﺸﺮﻭﻁ ﺍﻟﺸﻜﻠﻴﺔ ﻭﺍﳌﻮﺿﻮﻋﻴﺔ ﻟﻺﺫﻥ ﲟﺒﺎﺷﺮﺓ ﻫﺬﺍ ﺍﻹﺟﺮﺍﺀ‪ ،‬ﺃﻭ ﻛﺎﻥ ﺍﻟﺪﻟﻴﻞ‬
‫ﻣﺘﺤﺼﻼ ﻋﻠﻴﻪ ﻋﻦ ﻃﺮﻳﻖ ﺇﻛﺮﺍﻩ ﺍﳌﺘﻬﻢ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻣﻦ ﺃﺟﻞ ﻓﻚ ﺷﻔﺮﺓ ﻟﻠﺪﺧﻮﻝ ﺇﱃ ﺍﻟﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻭ‬
‫ﻛﻠﻤﺔ ﺍﻟﺴﺮ ﺍﻟﻼﺯﻣﺔ ﻟﻠﺪﺧﻮﻝ ﺇﱃ ﻣﻠﻔﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺨﺘﺰﻧﺔ ﺃﻭ ﺍﻟﻘﻴﺎﻡ ﺑﺈﺟﺮﺍﺀ ﺍﻟﺘﻨﺼﺖ ﺃﻭ ﺍﳌﺮﺍﻗﺒﺔ‬
‫ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻋﻦ ﺑﻌﺪ ﺩﻭﻥ ﻣﺴﻮﻍ ﻗﺎﻧﻮﱐ‪ ،‬ﻭﻳﻜﻮﻥ ﺍﻟﺪﻟﻴﻞ ﺍﳌﺘﺤﺼﻞ ﻋﻠﻴﻪ ﻭﻓﻖ ﺍﻟﻄﺮﻕ ﺍﻟﺴﺎﺑﻘﺔ ﺑﺎﻃﻼ‬
‫ﻭﻋﺪﻡ ﺇﻧﺘﺎﺝ ﺍﻵﺛﺎﺭ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﳌﺘﺮﺗﺒﺔ ﻋﻠﻴﻪ‪.‬‬
‫ﻭﺍﻟﻘﺎﻋﺪﺓ ﺃﻥ ﺍﻹﺟﺮﺍﺀ ﺍﻟﺒﺎﻃﻞ ﳝﺘﺪ ﺑﻄﻼﻧﻪ ﺇﱃ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﻟﻼﺣﻘﺔ ﻟﻪ ﻣﺒﺎﺷﺮﺓ ﻭﻫﻮ ﺍﻟﺮﺃﻱ ﺍﻟﺮﺍﺟﺢ ﺍﻟﺬﻱ‬
‫ﺃﺧﺬ ﺑﻪ ﺍﻟﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﺑﻨﺺ ﺍﳌﺎﺩﺓ ‪ 191‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺍﻟﱵ ﻧﺼﺖ ﻋﻠﻰ ﺃﻧﻪ ﺗﻨﻈﺮ‬
‫ﻏﺮﻓﺔ ﺍﻹ‪‬ﺎﻡ ﰲ ﺻﺤﺔ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳌﺮﻓﻮﻋﺔ ﺇﻟﻴﻬﺎ ﻭﺇﺫﺍ ﺗﻜﺘﺸﻒ ﳍﺎ ﺳﺒﺐ ﻣﻦ ﺃﺳﺒﺎﺏ ﺍﻟﺒﻄﻼﻥ ﻗﻀﺖ‬
‫ﺑﺒﻄﻼﻥ ﺍﻹﺟﺮﺍﺀ ﺍﳌﺸﻮﺏ ﺑﻪ ﻭﻋﻨﺪ ﺍﻹﻗﺘﻀﺎﺀ ﺑﺒﻄﻼﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﻟﺘﺎﻟﻴﺔ ﻟﻪ ﻛﻠﻬﺎ ﺃﻭ ﺑﻌﻀﻬﺎ‪ .‬ﻭﻗﺪ‬
‫ﺃﻭﺻﻰ ﺍﳌﺆﲤﺮ ﺍﻟﺪﻭﱄ ﺍﳋﺎﻣﺲ ﻋﺸﺮ ﻟﻠﺠﻤﻌﻴﺔ ﺍﻟﺪﻭﻟﻴﺔ ﻟﻘﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺗﻔﻲ ﳎﺎﻝ ﺣﺮﻛﺔ ﺇﺻﻼﺡ‬
‫ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﻨﺎﺋﻴﺔ ﻭﲪﺎﻳﺔ ﺣﻘﻮﻕ ﺍﻹﻧﺴﺎﻥ ﲟﺠﻤﻮﻋﺔ ﻣﻦ ﺍﻟﺘﻮﺻﻴﺎﺕ ﻣﻨﻬﺎ ﺍﻟﺘﻮﺻﻴﺔ ﺭﻗﻢ ‪ 18‬ﺍﻟﱵ ﺗﻨﺺ‬
‫ﻋﻠﻰ ﺃﻥ ﻛﻞ ﺍﻷﺩﻟﺔ ﺍﻟﱵ ﰎ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻬﺎ ﻋﻦ ﻃﺮﻳﻖ ﺇﻧﺘﻬﺎﻙ ﺣﻖ ﺃﺳﺎﺳﻲ ﻟﻠﻤﺘﻬﻢ ﻭﺍﻷﺩﻟﺔ ﺍﻟﻨﺎﲡﺔ ﻋﻨﻬﺎ‬

‫)‪(1‬ﲨﻴﻞ ﻋﺒﺪ ﺍﻟﺒﺎﻗﻲ ﺍﻟﺼﻐﲑ‪ ،‬ﺃﺩﻟﺔ ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ‪،‬ﻭ ﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳊﺪﻳﺜﺔ‪،‬ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔﺍﻟﻘﺎﻫﺮﺓ‪، 2002‬ﺹ‪.111‬‬

‫‪- 212 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺗﻜﻮﻥ ﺑﺎﻃﻠﺔ ﻭﻻ ﳝﻜﻦ ﺍﻟﺘﻤﺴﻚ ‪‬ﺎ ﺃﻭ ﻣﺮﺍﻋﺎ‪‬ﺎ ﰲ ﺃﻱ ﻣﺮﺣﻠﺔ ﻣﻦ ﻣﺮﺍﺣﻞ ﺍﻹﺟﺮﺍﺀﺍﺕ‪ ،‬ﻭﻗﺪ ﺃﺷﺎﺭ ﻫﺬﺍ‬
‫ﺍﳌﺆﲤﺮ ﺇﱃ ﺿﺮﻭﺭﺓ ﺇﺣﺘﺮﺍﻡ ﻣﺒﺪﺃ ﺍﳌﺸﺮﻭﻋﻴﺔ ﻋﻨﺪ ﺍﻟﺒﺤﺚ ﻋﻦ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺑﻴﺌﺔ‬
‫ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺇﻻ ﺗﺮﺗﺐ ﻋﻠﻴﻪ ﺑﻄﻼﻥ ﺍﻹﺟﺮﺍﺀ‪.‬‬
‫ﺃﻣﺎ ﺇﺫﺍ ﻛﺎﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻏﲑ ﺍﳌﺸﺮﻭﻉ ﺩﻟﻴﻞ ﺑﺮﺍﺀﺓ ﻓﺈﻥ ﺍﻷﻣﺮ ﻓﻴﻪ ﺇﺧﺘﻼﻑ‪ ،‬ﻭ ﳝﻜﻦ ﺭﺩ ﺫﻟﻚ‬
‫ﺇﱃ ﺛﻼﺙ ﺇﲡﺎﻫﺎﺕ‪:‬‬
‫‪-‬ﺍﻷﻭﻝ ﻳﺮﻯ ﺃﻥ ﺍﳌﺸﺮﻭﻋﻴﺔ ﻻﺯﻣﺔ ﰲ ﻛﻞ ﺩﻟﻴﻞ ﺳﻮﺍﺀ ﺃﻛﺎﻥ ﺩﻟﻴﻞ ﺇﺩﺍﻧﺔ ﺃﻡ ﺑﺮﺍﺀﺓ‪ ،‬ﻭ ﺇﺛﺒﺎﺕ‬
‫ﺍﻟﱪﺍﺀﺓ ﻛﺎﻹﺩﺍﻧﺔ ﻻ ﻳﻜﻮﻥ ﺇﻻ ﻣﻦ ﺩﻟﻴﻞ ﰎ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ ﻣﻦ ﺧﻼﻝ ﺳﺒﻞ ﻣﺸﺮﻭﻋﺔ ﻭﻻ ﻳﺼﺢ ﺃﻥ ﻳﻔﻠﺖ‬
‫ﺇﺛﺒﺎﺕ ﺍﻟﱪﺀﺍﺓ ﻣﻦ ﻗﻴﺪ ﺍﳌﺸﺮﻭﻋﻴﺔ ﺍﻟﺬﻱ ﻫﻮ ﺷﺮﻁ ﺃﺳﺎﺳﻲ ﰲ ﺃﻱ ﺗﺸﺮﻳﻊ‪.‬‬
‫‪ -‬ﻭﺍﻹﲡﺎﻩ ﺍﻟﺜﺎﱐ ﻳﺮﻯ ﺃﻥ ﺍﳌﺸﺮﻭﻋﻴﺔ ﻻﺯﻣﺔ ﰲ ﺃﺩﻟﺔ ﺍﻹﺩﺍﻧﺔ ﺩﻭﻥ ﺍﻟﱪﺍﺀﺓ ﻷﻥ ﺍﻷﺻﻞ ﰲ ﺍﻹﻧﺴﺎﻥ‬
‫ﺍﻟﱪﺍﺀﺓ ﻭﻻ ﺣﺎﺟﺔ ﻹﺛﺒﺎ‪‬ﺎ‪.‬‬
‫‪ -‬ﺃﻣﺎ ﺍﻹﲡﺎﻩ ﺍﻟﺜﺎﻟﺚ ﻓﲑﻯ ﺃﻥ ﺃﺩﻟﺔ ﺍﻟﱪﺍﺀﺓ ﻏﲑ ﺍﳌﺸﺮﻭﻋﺔ ﳝﻜﻦ ﺍﻷﺧﺬ ‪‬ﺎ ﻭﻗﺒﻮﳍﺎ ﰲ ﺣﺎﻻﺕ‬
‫ﺩﻭﻥ ﺃﺧﺮﻯ ﻃﺎﳌﺎ ﺃﻧﻪ ﰎ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻬﺎ ﺑﻮﺳﺎﺋﻞ ﻻ ﺗﺼﻞ ﺇﱃ ﺣﺪ ﺍﳉﺮﳝﺔ‪ ،‬ﻭﺇﳕﺎ ﺗﺘﻀﻤﻦ ﳐﺎﻟﻔﺔ ﻗﺎﻋﺪﺓ‬
‫ﺇﺟﺮﺍﺋﻴﺔ ﺇﺫ ﳝﻜﻦ ﰲ ﻫﺬﻩ ﺍﳊﺎﻟﺔ ﺍﻹﺳﺘﻨﺎﺩ ﺇﱃ ﻫﺬﻩ ﺍﻷﺩﻟﺔ‪.‬‬
‫ﻭﺍﻟﺮﺍﺟﺢ ﻣﻦ ﺑﲔ ﻫﺬﻩ ﺍﻹﲡﺎﻫﺎﺕ ﻫﻮ ﺍﻹﲡﺎﻩ ﺍﻟﺬﻱ ﻳﻘﺼﺮ ﺍﳌﺸﺮﻭﻋﻴﺔ ﻋﻠﻰ ﺩﻟﻴﻞ ﺍﻹﺩﺍﻧﺔ ﺩﻭﻥ‬
‫ﺍﻟﱪﺍﺀﺓ ﻷﻥ ﻋﺪﻡ ﻗﺒﻮﻝ ﺩﻟﻴﻞ ﺍﻟﱪﺍﺀﺓ ﲝﺠﺔ ﺃﻧﻪ ﻏﲑ ﻣﺸﺮﻭﻉ ﻳﺆﺩﻱ ﺇﱃ ﻧﺘﻴﺠﺔ ﺧﻄﲑﺓ ﻭﻫﻲ ﺇﻣﻜﺎﻧﻴﺔ ﺇﺩﺍﻧﺔ‬
‫ﺑﺮﻱﺀ ﻭﻫﻮ ﻣﺎ ﻻ ﻳﺴﺘﻘﻴﻢ ﻋﺪﻻ ﻭﻻ ﻣﻨﻄﻘﺎ‪.‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﱐ‪ :‬ﺣﺠﻴﺔ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﰲ ﺇﻃﺎﺭ ﻧﻈـﺮﻳﺔ ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ‬
‫ﺇﻥ ﻣﺴﺄﻟﺔ ﺗﻘﻴﻢ ﺍﻟﺪﻟﻴﻞ ﺍﳉﻨﺎﺋﻲ ﰲ ﺇﺛﺒﺎﺕ ﺍﻟﻮﺍﻗﻌﺔ ﺍﳉﺮﻣﻴﺔ ﻫﻲ ﻣﺴﺄﻟﺔ ﻣﻮﺿﻮﻋﻴﺔ ﳏﻀﺔ‪ ،‬ﻟﻠﻘﺎﺿﻲ‬
‫ﺃﻥ ﳝﺎﺭﺱ ﺳﻠﻄﺘﻪ ﺍﻟﺘﻘﺪﻳﺮﻳﺔ ﻓﻴﻬﺎ‪ ،‬ﻷﺟﻞ ﻫﺬﺍ ﻓﺎﻟﺴﺎﺋﺪ ﰲ ﺍﻟﻔﻘﻪ ﺍﳉﻨﺎﺋﻲ ﺃﻥ ﺍﻟﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﻟﻪ ﺍﳊﺮﻳﺔ‬
‫ﰲ ﺗﻘﺪﻳﺮ ﺍﻷﺩﻟﺔ ﺍﳉﻨﺎﺋﻴﺔ ﻭﺗﻜﻮﻳﻦ ﻗﻨﺎﻋﺘﻪ‪،‬ﻭﺃﻥ ﻳﺒﲏ ﺣﻜﻤﻪ ﻋﻠﻰ ﺃﻱ ﺩﻟﻴﻞ ﻣﱴ ﺇﻃﻤﺄﻥ ﺇﻟﻴﻪ ﺣﱴ ﻭﻟﻮ‬
‫ﻛﺎﻥ ﻫﺬﺍ ﺍﻟﺪﻟﻴﻞ ﻣﺴﺘﻤﺪﺍ ﻣﻦ ﳏﺎﺿﺮ ﲨﻊ ﺍﻹﺳﺘﺪﻻﻻﺕ)‪.(1‬‬
‫ﻭﻻ ﻳﺸﺘﺮﻁ ﺃﻥ ﻳﻜﻮﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺬﻱ ﻳﺴﺘﻨﺪ ﺇﻟﻴﻪ ﺍﻟﻘﺎﺿﻲ ﺻﺮﳛﺎ ﺩﺍﻻ ﻋﻠﻰ ﺍﻟﻮﺍﻗﻌﺔ ﺍﳌﺮﺍﺩ ﺇﺛﺒﺎ‪‬ﺎ ﺑﻞ‬
‫ﻳﻜﻔﻲ ﺃﻥ ﻳﻜﻮﻥ ﺇﺳﺘﺨﻼﺻﻬﺎ ﺇﺳﺘﻨﺘﺎﺟﺎ ﻣﻦ ﺍﻟﻈﺮﻭﻑ ﻭﺍﻟﻘﺮﺍﺋﻦ ﻭﺗﺮﺗﻴﺐ ﺍﻟﻨﺘﺎﺋﺞ ﻋﻠﻰ ﺍﳌﻘﺪﻣﺎﺕ‪ .‬ﻭﺃﺩﻟﺔ‬

‫)‪(1‬ﳏﻤﺪ ﻋﻴﺪ ﺍﻟﻐﺮﻳﺐ‪ ،‬ﺣﺮﻳﺔ ﺍﻟﻘﺎﺿﻲ ﺍﳉﻨﺎﺋﻲ ﰲ ﺍﻹﻗﺘﻨﺎﻉ ﺍﻟﻴﻘﻴﲏ ﻭ ﺃﺛﺮﻩ ﰲ ﺗﺴﺒﻴﺐ ﺍﻷﺣﻜﺎﻡ‪ ،‬ﺹ‪.32‬‬

‫‪- 213 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﻟﺪﻋﻮﻯ ﲣﻀﻊ ﰲ ﻛﻞ ﺍﻷﺣﻮﺍﻝ ﻟﺘﻘﺪﻳﺮ ﺍﻟﻘﺎﺿﻲ ﻣﺎ ﺩﺍﻡ ﻫﺬﺍ ﺍﻟﺪﻟﻴﻞ ﻏﲑ ﻣﻘﻄﻮﻉ ﺑﺼﺤﺘﻪ‪ ،(1)،‬ﻭﻳﺘﺮﺗﺐ‬
‫ﻋﻠﻰ ﺫﻟﻚ ﺃﻥ ﺍﻷﺩﻟﺔ ﺍﳉﺰﺍﺋﻴﺔ ﻻ ﲢﻆ ﺃﻣﺎﻡ ﺍﻟﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﺑﻘﻮﺓ ﺣﺎﲰﺔ ﰲ ﺍﻹﺛﺒﺎﺕ‪ ،‬ﻭﻋﻠﻰ ﻫﺬﺍ‬
‫ﺍﻷﺳﺎﺱ ﻓﻜﻤﺎ ﻳﺼﺢ ﻟﻠﻘﺎﺿﻲ ﺃﻥ ﻳﺆﺳﺲ ﺇﻗﺘﻨﺎﻋﻪ ﻋﻠﻰ ﺃﻱ ﺩﻟﻴﻞ ﻳﺼﺢ ﻟﻪ ﺃﻳﻀﺎ ﺃﻥ ﻳﻬﺪﺭﻩ‪.‬ﻟﻜﻦ ﰲ‬
‫ﺍﳌﻘﺎﺑﻞ ﻻ ﺗﻌﲏ ﺣﺮﻳﺔ ﺍﻟﻘﺎﺿﻲ ﰲ ﺍﻹﻗﺘﻨﺎﻉ ﺍﻟﺘﺤﻜﻢ ﺍﳌﻄﻠﻖ ﺑﻞ ﺇﻥ ﺍﻟﻘﺎﺿﻲ ﻳﻠﺘﺰﻡ ﺑﺄﻥ ﻳﺘﺤﺮﻯ ﺍﳌﻨﻄﻖ‬
‫ﺍﻟﺪﻗﻴﻖ ﰲ ﺗﻔﻜﲑﻩ ﺍﻟﺬﻱ ﻗﺎﺩﻩ ﺇﱃ ﺇﻗﺘﻨﺎﻋﻪ‪ ،‬ﻓﻔﻲ ﺍﻟﻮﻗﺖ ﺍﻟﺬﻱ ﻣﻨﺢ ﻓﻴﻪ ﺍﻟﻘﺎﻧﻮﻥ ﻟﻠﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﺣﺮﻳﺔ‬
‫ﻭﺍﺳﻌﺔ ﰲ ﳎﺎﻝ ﺗﻘﺪﻳﺮ ﺍﻷﺩﻟﺔ ﻭﻓﻘﺎ ﻹﻗﺘﻨﺎﻋﻪ ﺍﻟﺸﺨﺼﻲ ﻭﻓﺘﺢ ﺃﻣﺎﻣﻪ ﺑﺎﺏ ﺍﻹﺛﺒﺎﺕ ﻋﻠﻰ ﻣﺼﺮﺍﻋﻴﻪ ﻛﻲ‬
‫ﻳﺴﺘﻠﻬﻢ ﻋﻘﻴﺪﺗﻪ ﻣﻦ ﺃﻱ ﻣﻮﻃﻦ ﻳﺮﺍﻩ ﻓﺈﻧﻪ ﰲ ﺍﳌﻘﺎﺑﻞ ﱂ ﻳﻄﻠﻖ ﻟﻪ ﺍﻟﻌﻨﺎﻥ ﻟﻴﻘﻀﻲ ﻛﻴﻔﻤﺎ ﺷﺎﺀ ﺃﻭ ﺃﺭﺍﺩ ﻭﻓﻘﺎ‬
‫ﳌﺰﺍﺟﻪ ﺍﻟﺸﺨﺼﻲ ﻭﺣﺴﺐ ﺃﻫﻮﺍﺋﻪ ﺑﻞ ﻟﻘﺪ ﺃﺣﺎﻃﻪ ﺑﺴﻴﺎﺝ ﻣﻦ ﺍﻟﻘﻴﻮﺩ ﻭﺍﻟﻀﻮﺍﺑﻂ ﺍﻟﱵ ﺗﺸﻜﻞ ﰲ‬
‫ﳎﻤﻮﻋﻬﺎ ﺷﺮﻭﻃﺎ ﻹﻋﻤﺎﻝ ﺍﳌﺒﺪﺃ ﻭﺗﻄﺒﻴﻘﻪ ﺍﻟﺘﻄﺒﻴﻖ ﺍﻷﻣﺜﻞ ﲟﺎ ﻳﻀﻤﻦ ﺍﻟﻮﺻﻮﻝ ﺇﱃ ﺍﳊﻘﻴﻘﺔ ﺍﻟﻔﻌﻠﻴﺔ ﺩﻭﻥ‬
‫ﺍﻹﻓﺘﺌﺎﺕ ﻋﻠﻰ ﺍﳊﻘﻮﻕ ﻭﺍﳊﺮﻳﺎﺕ‪.‬‬
‫ﺇﻻ ﺃﻥ ﺗﻄﺒﻴﻖ ﺫﻟﻚ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻗﺪ ﻳﺜﲑ ﺑﻌﺾ ﺍﻟﺼﻌﻮﺑﺎﺕ‪ ،‬ﻓﺎﻟﻘﺎﺿﻲ ﺑﺜﻘﺎﻓﺘﻪ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻻ‬
‫ﳝﻜﻨﻪ ﺇﺩﺭﺍﻙ ﺍﳊﻘﺎﺋﻖ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺄﺻﺎﻟﺔ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪ ،‬ﻓﻀﻼ ﻋﻦ ﲤﺘﻊ ﻫﺬﺍ ﺍﻟﺪﻟﻴﻞ ﻣﻦ ﺣﻴﺚ ﻗﻮﺗﻪ‬
‫ﺍﻟﺘﺪﻟﻴﻠﻴﺔ ﺑﻘﻴﻤﺔ ﺇﺛﺒﺎﺗﻴﺔ ﻗﺪ ﺗﺼﻞ ﺇﱃ ﺣﺪ ﺍﻟﻴﻘﲔ ﺷﺄﻧﻪ ﰲ ﺫﻟﻚ ﺷﺄﻥ ﺍﻷﺩﻟﺔ ﺍﻟﻌﻠﻤﻴﺔ ﻋﻤﻮﻣﺎ‪ ،‬ﻭﻣﻦ ﺟﻬﺔ‬
‫ﺃﺧﺮﻯ ﻓﺈﻥ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﻔﻨﻴﺔ ﺍﳋﺎﺻﺔ ﺑﺎﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﲤﻜﻦ ﻣﻦ ﺍﻟﻌﺒﺚ ﲟﻀﻤﻮﻧﻪ ﻋﻠﻰ ﳓﻮ ﳛﺮﻑ ﺍﳊﻘﻴﻘﺔ‬
‫ﺩﻭﻥ ﺃﻥ ﻳﻜﻮﻧﺒﻤﻘﺪﻭﺭ ﻏﲑ ﺍﳌﺘﺨﺼﺺ ﺇﺩﺭﺍﻙ ﺫﻟﻚ ﺍﻟﻌﺒﺚ‪ ،‬ﻭﻣﻊ ﻧﻘﺺ ﺍﻟﺜﻘﺎﻓﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻟﻠﻘﺎﺿﻲ‬
‫ﺍﳉﺰﺍﺋﻲ ﻓﻬﻞ ﻋﻠﻴﻪ ﺍﻟﺘﻮﺳﻊ ﰲ ﺳﻠﻄﺘﻪ ﻋﻨﺪ ﺗﻘﺪﻳﺮ ﺍﻟﺪﻟﻴﻞ ﻟﺘﻤﺘﺪ ﻭﺗﺸﻤﻞ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪ ،‬ﻭﻫﻞ ﳝﻜﻦ‬
‫ﺍﻟﺘﺴﻠﻴﻢ ﲞﻀﻮﻉ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻟﻠﻤﻨﺎﻗﺸﺔ ﻭﺍﻟﺒﺤﺚ ﰲ ﻣﺼﺪﺍﻗﻴﺘﻪ ﻟﻘﺒﻮﻟﻪ ﺃﻭ ﻃﺮﺣﻪ ﻟﻌﺪﻡ ﺍﻹﻗﺘﻨﺎﻉ ﺑﻪ‪.‬‬
‫ﻭﻋﻠﻰ ﻫﺪﻱ ﻣﺎ ﺳﺒﻖ ﻃﺮﺣﻪ ﻓﺈﻧﻨﺎ ﺳﻮﻑ ﻧﻨﺎﻗﺶ ﻣﺎ ﻫﻲ ﺍﻟﺸﺮﻭﻁ ﺍﻟﱵ ﳚﺐ ﺃﻥ ﻳﺘﻮﺍﻓﺮ ﻋﻠﻴﻬﺎ‬
‫ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺣﱴ ﻳﻌﱪ ﻋﻦ ﺣﻘﻴﻘﺔ ﻋﻠﻤﻴﺔ ﺛﺎﺑﺘﺔ )ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ( ﻭﻣﺪﻯ ﺗﺄﺛﲑ ﺫﻟﻚ ﻋﻠﻰ ﻣﺒﺪﺃ ﺍﻹﻗﺘﻨﺎﻉ‬
‫ﺍﻟﺸﺨﺼﻲ ﻟﻠﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ )ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ(‪.‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺷﺮﻭﻁ ﻗﺒﻮﻝ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪:‬‬
‫ﳑﺎ ﻻﺷﻚ ﻓﻴﻪ ﺃﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻣﺎ ﻫﻮ ﺇﻻ ﺗﻄﺒﻴﻖ ﻣﻦ ﺗﻄﺒﻴﻘﺎﺕ ﺍﻟﺪﻟﻴﻞ ﺍﻟﻌﻠﻤﻲ ﺑﻞ ﻭﺃﻛﺜﺮ ﻣﻨﻪ‬
‫ﺣﺠﻴﺔ ﰲ ﺍﻹﺛﺒﺎﺕ ﻭﺫﻟﻚ ﲟﺎ ﻳﺘﻤﻴﺰ ﺑﻪ ﻣﻦ ﻣﻮﺿﻮﻋﻴﺔ ﻭﺣﻴﺎﺩ ﻭﻛﻔﺎﺀﺓ‪ ،‬ﻭﻫﻮ ﳏﻜﻢ ﻭﻓﻖ ﻗﻮﺍﻋﺪ ﻋﻠﻤﻴﺔ‬
‫ﺣﺴﺎﺑﻴﺔ ﻗﺎﻃﻌﺔ ﻻ ﺗﻘﺒﻞ ﺍﻟﺘﺄﻭﻳﻞ‪ ،‬ﳑﺎ ﻳﻘﻮﻱ ﻣﻦ ﻳﻘﻴﻨﻴﺘﻪ ﻭﻳﺴﺎﻋﺪ ﺍﻟﻘﺎﺿﻲ ﰲ ﺍﻟﺘﻘﻠﻴﻞ ﻣﻦ ﺍﻷﺧﻄﺎﺀ‬

‫)‪(1‬ﺃﺷﺮﻑ ﻋﺒﺪ ﺍﻟﻘﺎﺩﺭ ﻗﻨﺪﻳﻞ‪ ،‬ﺍﻟﻨﻈﺮﻳﺔ ﺍﻟﻌﺎﻣﺔ ﻟﻠﺒﺤﺚ ﺍﳉﻨﺎﺋﻲ ﻭﺃﺛﺮﻫﺎ ﰲ ﻋﻘﻴﺪﺓ ﺍﻟﻘﺎﺿﻲ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ ﺹ‪.،235‬‬

‫‪- 214 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﻟﻘﻀﺎﺋﻴﺔ ﻭﺍﻹﻗﺘﺮﺍﺏ ﺃﻛﺜﺮ ﺇﱃ ﲢﻘﻴﻖ ﺍﻟﻌﺪﺍﻟﺔ ﻭﺍﻟﺘﻮﺻﻞ ﺑﺪﺭﺟﺔ ﺃﻛﱪ ﳓﻮ ﺍﳊﻘﻴﻘﺔ‪ ،‬ﺫﻟﻚ ﺃﻥ ﺍﻟﺘﻘﻨﻴﺔ‬
‫ﺍﻟﻌﻠﻤﻴﺔ ﻗﺪ ﺗﻮﻓﺮ ﻃﺮﻗﺎ ﺩﻗﻴﻘﺔ ﳉﻤﻊ ﺍﻷﺩﻟﺔ ﺗﺘﻤﺘﻊ ﺑﻘﻮﺓ ﻋﻠﻤﻴﺔ ﻳﺼﻌﺐ ﺇﺛﺒﺎﺕ ﻋﻜﺴﻬﺎ‪.‬ﻟﻜﻦ ﺇﺫﺍ ﻛﺎﻥ‬
‫ﺻﺤﻴﺤﺎ ﺃﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻭﲝﻜﻢ ﻃﺒﻴﻌﺘﻪ ﺍﻟﻌﻠﻤﻴﺔ ﳝﺜﻞ ﺃﺧﺒﺎﺭﺍ ﺻﺎﺩﻗﺎ ﻋﻦ ﺍﻟﻮﺍﻗﻊ ﺑﺈﻋﺘﺒﺎﺭ ﻋﻠﻤﻴﺘﻪ‬
‫ﻭﻣﻮﺿﻮﻋﻴﺘﻪ ﻭﺣﻴﺎﺩﻩ ﻭﻛﻔﺎﺀﺗﻪ‪ ،‬ﺇﻻ ﺃﻥ ﻫﺬﺍ ﻻ ﻳﻨﻒ ﺇﺳﺘﺒﻌﺎﺩ ﻛﻮﻧﻪ ﻣﻮﺿﻊ ﺷﻚ ﻣﻦ ﺣﻴﺚ ﺳﻼﻣﺘﻪ ﻣﻦ‬
‫ﺍﻟﻌﺒﺚ ﻣﻦ ﻧﺎﺣﻴﺔ ﻭﺻﺤﺔ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳌﺘﺒﻌﺔ ﰲ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ ﻣﻦ ﻧﺎﺣﻴﺔ ﺃﺧﺮﻯ‪ ،‬ﺇﺫ ﳝﻜﻦ ﺃﻥ ﻳﺸﻜﻚ‬
‫ﰲ ﺳﻼﻣﺔ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻣﻦ ﻧﺎﺣﻴﺘﲔ ‪:‬‬
‫‪-‬ﺍﻷﻭﱃ‪:‬ﺇﻣﻜﺎﻧﻴﺔ ﺧﻀﻮﻋﻪ ﻟﻠﻌﺒﺚ ﻭﳋﺮﻭﺝ ﺑﻪ ﻋﻠﻰ ﳓﻮ ﳜﺎﻟﻒ ﺍﳊﻘﻴﻘﺔ‪ ،‬ﺇﺫ ﻳﻘﺪﻡ ﻫﺬﺍ ﺍﻟﺪﻟﻴﻞ‬
‫ﻣﻌﱪﺍ ﻋﻦ ﻭﺍﻗﻌﺔ ﻣﻌﻴﻨﺔ ﺻﻨﻊ ﺃﺳﺎﺳﺎ ﻷﺟﻞ ﺍﻟﺘﻌﺒﲑ ﻋﻨﻬﺎ ﺧﻼﻓﺎ ﻟﻠﺤﻘﻴﻘﺔ‪ ،‬ﺩﻭﻥ ﺃﻥ ﻳﻜﻮﻥ ﰲ ﺇﺳﺘﻄﺎﻋﺔ‬
‫ﻏﲑ ﺍﳌﺘﺨﺼﺺ ﺇﺩﺭﺍﻙ ﺫﻟﻚ ﺍﻟﻌﺒﺚ ﻋﻠﻰ ﳓﻮ ﳝﻜﻦ ﻣﻌﻪ ﺍﻟﻘﻮﻝ ﺃﻥ ﺫﻟﻚ ﻗﺪ ﺃﺻﺒﺢ ﻫﻮ ﺍﻟﺸﺄﻥ ﺑﺎﻟﻨﺴﺒﺔ‬
‫ﻷﻏﻠﺐ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺍﻟﱵ ﺗﻘﺪﻡ ﻟﻠﻘﻀﺎﺀ‪ ،‬ﺫﻟﻚ ﺃﻥ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳊﺪﻳﺜﺔ ﲤﻜﻦ ﻣﻦ ﺍﻟﻌﺒﺚ ﺑﺎﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‬
‫ﺑﺴﻬﻮﻟﺔ ﲝﻴﺚ ﻳﻈﻬﺮ ﻭﻛﺄﻧﻪ ﻧﺴﺨﺔ ﺃﺻﻠﻴﺔ ﰲ ﺗﻌﺒﲑﻩ ﻋﻦ ﺍﳊﻘﻴﻘﺔ‪.‬‬
‫‪ -‬ﻭﺍﻟﺜﺎﻧﻴﺔ ﺗﺘﻌﻠﻖ ﺑﻨﺴﺒﺔ ﺍﳋﻄﺄ ﰲ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻭﺫﻟﻚ ﺭﺍﺟﻊ ﺇﻣﺎ ﻟﻠﺨﻄﺄ ﰲ‬
‫ﺇﺳﺘﺨﺪﺍﻡ ﺍﻷﺩﺍﺓ ﺍﳌﻨﺎﺳﺒﺔ ﰲ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻛﺎﳋﻠﻞ ﰲ ﺍﻟﺸﻔﺮﺓ ﺍﳌﺴﺘﺨﺪﻣﺔ ﺃﻭ ﺇﺳﺘﺨﺪﺍﻡ‬
‫ﻣﻮﺍﺻﻔﺎﺕ ﺧﺎﻃﺌﺔ‪ ،‬ﻭﺇﻣﺎ ﺍﳋﻄﺄ ﰲ ﺇﺳﺘﺨﻼﺹ ﺍﻟﺪﻟﻴﻞ ﺑﺴﺒﺐ ﺇﺳﺘﺨﺪﺍﻡ ﺃﺩﺍﺓ ﺗﻘﻞ ﻧﺴﺒﺔ ﺻﻮﺍ‪‬ﺎ ﻋﻦ‬
‫‪ %100‬ﻭﻫﺬﺍ ﻣﺎ ﳛﺪﺙ ﻏﺎﻟﺒﺎ ﰲ ﻭﺳﺎﺋﻞ ﺇﺧﺘﺰﺍﻝ ﺍﳌﻌﻄﻴﺎﺕ ﺃﻭ ﻣﻌﺎﳉﺘﻬﺎ ﺑﻄﺮﻳﻘﺔ ﲣﺘﻠﻒ ﻋﻦ ﺍﻟﻄﺮﻳﻘﺔ‬
‫ﺍﻷﺻﻠﻴﺔ ﺍﻟﱵ ﰎ ﺗﻘﻴﻴﻤﻬﺎ‪.‬‬
‫ﻭﻋﻠﻰ ﻫﺬﺍ ﺍﻷﺳﺎﺱ ﻓﺈﻥ ﺍﻟﺸﻚ ﰲ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻻ ﻳﺘﻌﻠﻖ ﲟﻀﻤﻮﻧﻪ ﻭﺇﳕﺎ ﺑﻌﻮﺍﻣﻞ ﻣﺴﺘﻘﻠﺔ ﻋﻨﻪ‬
‫ﻟﻜﻨﻬﺎ ﺗﺆﺛﺮ ﰲ ﻣﺼﺪﺍﻗﻴﺘﻪ‪ ،‬ﻟﺬﻟﻚ ﻓﺈﻥ ﺍﻷﻣﺮ ﻳﺘﻄﻠﺐ ﻭﺟﻮﺏ ﺗﻮﺍﻓﺮ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻟﺸﺮﻭﻁ)‪(1‬ﰲ ﺍﻟﺪﻟﻴﻞ‬
‫ﺍﻟﺮﻗﻤﻲ ﻣﻦ ﺃﺟﻞ ﺇﻗﺘﺮﺍﺑﻪ ﳓﻮ ﺍﳊﻘﻴﻘﺔ ﻭﻗﺒﻮﻟﻪ ﻛﺪﻟﻴﻞ ﰲ ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ‪،‬ﺗ‪‬ﺸﻴﺪ ﻋﻠﻴﻪ ﺍﳊﻘﻴﻘﺔ ﰲ ﺍﻟﺪﻋﻮﻯ‬
‫ﺍﳉﻨﺎﺋﻴﺔ ﺳﻮﺍﺀ ﺑﺎﻹﺩﺍﻧﺔ ﺃﻭ ﺍﻟﱪﺍﺀﺓ‪.‬‬

‫)‪(1‬ﻧﺼﺖ ﺑﻌﺾ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﳌﻘﺎﺭﻧﺔ ﻋﻠﻰ ﺑﻌﺾ ﺍﻟﺸﺮﻭﻁ ﻭﺍﻟﻀﻮﺍﺑﻂ ﺍﻟﱵ ﳚﺐ ﻣﺮﺍﻋﺎ‪‬ﺎ ﰲ ﳐﺮﺟﺎﺕ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻟﻜﻲ ﳝﻜﻦ ﻗﺒﻮﳍﺎ ﻛﺄﺩﻟﺔ ﺇﺛﺒﺎﺕ ﻣﻦ‬
‫ﺃﳘﻬﺎ ﺃﻥ ﻳﺘﻢ ﲢﺪﺩ ﻫﻮﻳﺔ ﺍﻟﺸﺨﺺ ﺃﻭ ﺍﳉﻬﺔ ﺍﳌﻨﺴﻮﺏ ﳍﺎ ﻫﺬﻩ ﺍﳌﺨﺮﺟﺎﺕ ﺑﺼﻮﺭﺓ ﻗﺎﻃﻌﺔ ﻭﺃﻥ ﻳﺘﻢ ﺇﺳﺘﺨﻼﺹ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺨﺰﻧﺔ ﺇﻟﻜﺘﺮﻭﻧﻴﺎ ﻭﺣﻔﻈﻬﺎ‬
‫ﺑﺼﻮﺭ‪‬ﺎ ﺍﻷﺻﻠﻴﺔ ﺍﻟﱵ ﺃﻧﺸﺌﺖ ﻋﻠﻴﻬﺎ ﻭﺑﺼﻮﺭﺓ ﺗﻀﻤﻦ ﻋﺪﻡ ﺗﻌﺮﺿﻬﺎ ﻷﻱ ﺷﻜﻞ ﻣﻦ ﺃﺷﻜﺎﻝ ﺍﻟﻌﺒﺚ ﻭﺍﻟﺘﻠﻒ ﻭﻫﺬﺍ ﺍﻟﺸﺮﻁ ﻳﺘﻄﻠﺐ ﺇﲣﺎﺫ ﺑﻌﺾ ﺍﻹﺟﺮﺍﺀﺍﺕ‬
‫ﻣﻦ ﺃﳘﻬﺎ ﺍﻟﺘﺤﻘﻖ ﻣﻦ ﺳﻼﻣﺔ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻭﺩﻗﺘﻪ ﰲ ﻋﺮﺽ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺨﺰﻧﺔ ﻭﺣﻔﻆ ﳐﺮﺟﺎﺕ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻭﲣﺰﻳﻨﻬﺎ ﰲ ﺑﻴﺌﺔ ﻣﻨﺎﺳﺒﺔ ﻭﻛﻔﺎﺀﺓ ﻭﻧﺰﺍﻫﺔ‬
‫ﺍﻟﻘﺎﺋﻤﲔ ﻋﻠﻰ ﲨﻊ ﺍﻷﺩﻟﺔ ﻭﲣﺰﻳﻨﻬﺎ‪.‬‬

‫‪- 215 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺃﻭﻻ‪ :‬ﻭﺟﻮﺏ ﻳﻘﻴـﻨﻴﺔ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﻭ ﻏﲑ ﻗﺎﺑﻠﺘﻬﺎ ﻟﻠﺸﻚ‪:‬ﻳﺸﺘﺮﻁ ﰲ ﺍﻷﺩﻟﺔ ﺍﳌﺴﺘﺨﺮﺟﺔ ﻣﻦ‬
‫ﺍﳌﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺍﻷﻧﺘﺮﻧﺎﺕ ﺃﻥ ﺗﻜﻮﻥ ﻏﲑ ﻗﺎﺑﻠﺔ ﻟﻠﺸﻚ ﺣﱴ ﳝﻜﻦ ﺍﳊﻜﻢ ﲟﻮﺟﺒﻬﺎ ﺑﺎﻹﺩﺍﻧﺔ ﺫﻟﻚ‬
‫ﺃﻧﻪ ﻻ ﳎﺎﻝ ﻟﺪﺣﺾ ﻗﺮﻳﻨﺔ ﺍﻟﱪﺍﺀﺓ ﺃﻭ ﺇﻓﺘﺮﺍﺽ ﻋﻜﺴﻬﺎ ﺇﻻ ﻋﻨﺪﻣﺎ ﻳﺼﻞ ﺇﻗﺘﻨﺎﻉ ﺍﻟﻘﺎﺿﻲ ﺇﱃ ﺣﺪ ﺍﳉﺰﻡ‬
‫ﻭﺍﻟﻴﻘﲔ‪ (1)،‬ﻭﳝﻜﻦ ﺍﻟﺘﻮﺻﻞ ﺇﱃ ﺫﻟﻚ ﻣﻦ ﺧﻼﻝ ﻣﺎ ﻳﻌﺮﺽ ﻣﻦ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﻋﻠﻰ ﺇﺧﺘﻼﻑ ﺃﺷﻜﺎﳍﺎ‬
‫ﺍﻟﱵ ﺗﺘﻮﺍﻓﺮ ﻋﻦ ﻃﺮﻳﻖ ﺍﻟﻮﺻﻮﻝ ﺍﳌﺒﺎﺷﺮ ﺇﻟﻴﻬﺎ ﺃﻭ ﲟﺠﺮﺩ ﻋﺮﺿﻬﺎ ﻛﻤﺨﺮﺟﺎﺕ ﻋﻠﻰ ﺷﺎﺷﺔ ﺍﳊﺎﺳﻮﺏ‪،‬‬
‫ﻭﻳﺴﺘﻄﻴﻊ ﺍﻟﻘﺎﺿﻲ ﻣﻦ ﺧﻼﻝ ﻣﺎ ﻳﻌﺮﺽ ﻋﻠﻴﻪ ﻣﻦ ﳐﺮﺟﺎﺕ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ )ﺭﻗﻤﻴﺔ( ﻭﻣﺎ ﻳﻨﻄﺒﻊ ﰲ ﺫﻣﺘﻪ ﻣﻦ‬
‫ﺗﺼﻮﺭﺍﺕ ﻭﺇﺣﺘﻤﺎﻻﺕ ﺑﺎﻟﻨﺴﺒﺔ ﳍﺎ ﺃﻥ ﳛﺪﺩ ﻗﻮ‪‬ﺎ ﺍﻹﺳﺘﺪﻻﻟﻴﺔ ﻋﻠﻰ ﺻﺪﻕ ﻧﺴﺒﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺇﱃ‬
‫ﺷﺨﺺ ﻣﻌﲔ ﻣﻦ ﻋﺪﻣﻪ‪ ،‬ﻭﻛﺬﺍ ﺍﻟﻮﺻﻮﻝ ﺇﱃ ﻳﻘﻴﻨﻴﺔ ﻫﺬﻩ ﺍﳌﺨﺮﺟﺎﺕ ﻋﻦ ﻃﺮﻳﻖ ﺍﳌﻌﺮﻓﺔ ﺍﳊﺴﻴﺔ ﺍﻟﱵ‬
‫ﺗﺪﺭﻛﻬﺎ ﺍﳊﻮﺍﺱ ﻣﻦ ﺧﻼﻝ ﻣﻌﺎﻳﻨﺘﻪ ﳍﺬﻩ ﺍﳌﺨﺮﺟﺎﺕ ﻭﻓﺤﺼﻬﺎ‪ ،‬ﻭﻛﺬﺍ ﻋﻦ ﻃﺮﻳﻖ ﺍﳌﻌﺮﻓﺔ ﺍﻟﻌﻘﻠﻴﺔ ﻣﻦ‬
‫ﺧﻼﻝ ﻣﺎ ﻳﻘﻮﻡ ﺑﻪ ﻣﻦ ﺇﺳﺘﻘﺮﺍﺀ ﻭﺇﺳﺘﻨﺘﺎﺝ ﻟﻴﺼﻞ ﺇﱃ ﺍﳊﻘﻴﻘﺔ ﺍﻟﱵ ﻳﻬﺪﻑ ﺇﻟﻴﻬﺎ ﻭﳚﺐ ﺃﻥ ﻳﺼﺪﺭ ﺣﻜﻤﻪ‬
‫) ‪(2‬‬
‫ﺇﺳﺘﻨﺎﺩﺍ ﺇﻟﻴﻬﺎ‪.‬‬
‫ﻭﻳﺸﺘﺮﻁ ﻗﺎﻧﻮﻥ ﺍﻟﺒﻮﻟﻴﺲ ﻭﺍﻹﺛﺒﺎﺕ ﺍﻟﱪﻳﻄﺎﱐ ﻟﺴﻨﺔ ‪ 1984‬ﺣﱴ ﺗﺘﺤﻘﻖ ﻳﻘﻴﻨﻴﺔ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺃﻥ‬
‫ﺗﻜﻮﻥ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺩﻗﻴﻘﺔ ﻭﻧﺎﲡﺔ ﻋﻦ ﺍﳊﺎﺳﻮﺏ ﺑﺼﻮﺭﺓ ﺳﻠﻴﻤﺔ‪ ،‬ﻭﰲ ﻛﻨﺪﺍ ﻓﺈﻥ ﺍﻟﺮﺃﻱ ﺍﻟﺴﺎﺋﺪ ﰲ ﺍﻟﻔﻘﻪ ﻫﻮ‬
‫ﺇﻋﺘﺒﺎﺭ ﳐﺮﺟﺎﺕ ﺍﳊﺎﺳﻮﺏ ﻣﻦ ﺃﻓﻀﻞ ﺍﻷﺩﻟﺔ ﻟﺬﺍ ﻓﺈ‪‬ﺎ ﲢﻘﻖ ﺍﻟﻴﻘﲔ ﺍﳌﻨﺸﻮﺩ ﰲ ﺍﻷﺣﻜﺎﻡ ﺍﳉﺰﺍﺋﻴﺔ‪ .‬ﻭﻗﺪ‬
‫ﻧﺼﺖ ﺑﻌﺾ ﺍﻟﻘﻮﺍﻧﲔ ﰲ ﺍﻟﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ ﺍﻷﻣﺮﻳﻜﻴﺔ ﺃﻥ ﺍﻟﻨﺴﺦ ﺍﳌﺴﺘﺨﺮﺟﺔ ﻣﻦ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﻟﱵ ﳛﺘﻮﻳﻬﺎ‬
‫ﺍﳊﺎﺳﻮﺏ ﺗﻌﺪ ﻣﻦ ﺃﻓﻀﻞ ﺍﻷﺩﻟﺔ ﺍﳌﺘﺎﺣﺔ ﻟﻺﺛﺒﺎﺕ ﻭﺑﺎﻟﺘﺎﱄ ﻳﺘﺤﻘﻖ ﻣﺒﺪﺃ ﺍﻟﻴﻘﲔ ﳍﺬﻩ ﺍﻷﺩﻟﺔ‪ ،‬ﻭﺗﻨﺺ‬
‫ﺍﻟﻘﻮﺍﻋﺪ ﺍﻟﻔﺪﺭﺍﻟﻴﺔ ﻋﻠﻰ ﺃﻥ ﺍﻟﺸﺮﻁ ﺍﻷﺳﺎﺳﻲ ﻟﻠﺘﻮﺛﻴﻖ ﺃﻭ ﺍﻟﺘﺤﻘﻖ ﻣﻦ ﺻﺤﺔ ﺃﻭ ﺻﺪﻕ ﺍﻟﺪﻟﻴﻞ ﻛﺸﺮﻁ‬
‫ﻣﺴﺒﻖ ﻟﻘﺒﻮﻟﻪ ﻫﻮ ﺃﻥ ﻳﻔﻲ ﺑﺄﻣﺎﺭﺓ ﺃﻭ ﺑﻴﻨﺔ ﻛﺎﻓﻴﺔ ﻷﻥ ﺗﺪﻋﻢ ﺍﻟﻮﺻﻮﻝ ﺇﱃ ﺍﻷﺳﺮﺍﺭ ﺍﻟﱵ ﺗﺘﺼﻞ ﺑﺎﳌﻮﺿﻮﻉ‬
‫) ‪(3‬‬
‫ﲟﺎ ﻳﺆﻳﺪ ﺍﳌﻄﺎﻟﺒﺔ ﺍﳌﺪﻋﻰ ‪‬ﺎ‪.‬‬
‫ﻭﻳﺘﺤﻘﻖ ﺍﻟﻴﻘﲔ ﻟﻸﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺃﻛﺜﺮ ﺑﺈﺧﻀﺎﻋﻬﺎ ﻟﻠﺘﻘﻴﻴﻢ ﺍﻟﻔﲏ ﺑﻮﺳﺎﺋﻞ ﻓﻨﻴﺔ ﻣﻦ ﻃﺒﻴﻌﺔ ﻫﺬﺍ ﺍﻟﺪﻟﻴﻞ‬
‫ﲤﻜﻦ ﻣﻦ ﻓﺤﺼﻪ ﻟﻠﺘﺄﻛﺪ ﻣﻦ ﺳﻼﻣﺘﻪ ﻭﻛﺬﺍ ﺻﺤﺔ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳌﺘﺒﻌﺔ ﰲ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ ﻣﻦ ﺃﺟﻞ‬
‫ﺗﻔﺎﺩﻱ ﺗﻠﻚ ﺍﻟﻌﻴﻮﺏ ﺍﻟﱵ ﻗﺪ ﺗﺸﻮﺑﻪ‪ ،‬ﻓﻤﺜﻠﻤﺎ ﳜﻀﻊ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻟﻘﻮﺍﻋﺪ ﻭﺇﺟﺮﺍﺀﺍﺕ ﻣﻌﻴﻨﺔ ﲢﻜﻢ‬

‫)‪(1‬ﻋﻠﻲ ﺣﺴﻦ ﳏﻤﺪ ﺍﻟﻄﻮﺍﻟﺒﺔ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪ ،190‬ﻣﺮﺟﻊ ﺳﺎﺑﻖ‪.‬‬


‫)‪(2‬ﻫﻼﱄ ﻋﺒﺪ ﺍﻟﻼﻩ ﺃﲪﺪ‪ ،‬ﺣﺠﻴﺔ ﺍﳌﺨﺮﻳﺎﺕ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮﻳﺔ ﰲ ﺍﳌﻮﺍﺩ ﺍﳉﻨﺎﺋﻴﺔ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،،‬ﺹ‪. 91‬‬
‫)‪ (3‬ﻋﻠﻲ ﺣﺴﻦ ﳏﻤﺪ ﺍﻟﻄﻮﺍﻟﺒﺔ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ ﺹ‪.191‬‬

‫‪- 216 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻃﺮﻗﺎﳊﺼﻮﻝ ﻋﻠﻴﻪ ﻓﺈﻧﻪ ﳜﻀﻊ ﻟﻘﻮﺍﻋﺪ ﺃﺧﺮﻯ ﻟﻠﺤﻜﻢ ﻋﻠﻰ ﻗﻴﻤﺘﻪ ﺍﻟﺘﺪﻟﻴﻠﻴﺔ ﻣﻦ ﺍﻟﻨﺎﺣﻴﺔ ﺍﻟﻌﻠﻤﻴﺔ ﻭﺫﻟﻚ‬
‫ﺭﺍﺟﻊ ﻟﻠﻄﺒﻴﻌﺔ ﺍﻟﻔﻨﻴﺔ ﳍﺬﺍ ﺍﻟﺪﻟﻴﻞ‪(1).‬ﻭﺗﺘﻤﺜﻞ ﻭﺳﺎﺋﻞ ﺗﻘﻴﻴﻢ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﰲ‪:‬‬
‫‪/1‬ﺗﻘﻴﻴﻢ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻟﻠﺘﺤﻘﻖ ﻣﻦ ﺳﻼﻣﺘﻪ ﻣﻦ ﺍﻟﻌﺒﺚ‪ :‬ﻭﳝﻜﻦ ﺍﻟﺘﺄﻛﺪ ﻣﻦ ﺳﻼﻣﺔ ﺍﻟﺪﻟﻴﻞ‬
‫ﺍﻟﺮﻗﻤﻲ ﻣﻦ ﻭﻗﻮﻉ ﺍﻟﻌﺒﺚ ﺑﻪ ﺑﻌﺪﺓ ﻃﺮﻕ ﺃﳘﻬﺎ‪:‬‬
‫‪ -‬ﻓﻜﺮﺓ ﺍﻟﺘﺤﻠﻴﻞ ﺍﻟﺘﻨﺎﻇﺮﻱ ﺍﻟﺮﻗﻤﻲ ﻭﺍﻟﱵ ﻣﻦ ﺧﻼﳍﺎ ﻳﺘﻢ ﻣﻘﺎﺭﻧﺔ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺍﳌﻘﺪﻡ ﻟﻠﻘﻀﺎﺀ‬
‫ﺑﺎﻷﺻﻞ ﺍﳌﺪﺭﺝ ﺑﺎﻵﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ‪ ،‬ﻭﻣﻦ ﰒ ﻳﺘﻢ ﺍﻟﺘﺄﻛﺪ ﻣﻦ ﻣﺪﻯ ﺣﺼﻮﻝ ﻋﺒﺚ ﰲ ﺍﻟﻨﺴﺨﺔ ﺍﳌﺴﺘﺨﺮﺟﺔ ﺃﻡ‬
‫ﻻ‪(2).‬ﻭﻳﺴﺘﻌﺎﻥ ﰲ ﺫﻟﻚ ﺑﺈﺳﺘﺨﺪﺍﻡ ﻋﻠﻢ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮ ﺍﻟﺬﻱ ﻳﻠﻌﺐ ﺩﻭﺭﺍ ﻣﻬﻤﺎ ﰲ ﺗﻘﺪﱘ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﻔﻨﻴﺔ‬
‫ﺍﻟﱵ ﺗﺴﺎﻫﻢ ﰲ ﻓﻬﻢ ﻣﻀﻤﻮﻥ ﻭﻛﻴﻨﻮﻧﺔ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪ ،‬ﻭﻫﺬﺍ ﺍﻟﻌﻠﻢ ﻳﺴﺘﻌﺎﻥ ﺑﻪ ﺃﻳﻀﺎ ﰲ ﻛﺸﻒ ﻣﺪﻯ‬
‫ﺍﻟﺘﻼﻋﺐ ﲟﻀﻤﻮﻥ ﻫﺬﺍ ﺍﻟﺪﻟﻴﻞ‪.‬‬
‫‪ -‬ﺇﺳﺘﺨﺪﺍﻡ ﻋﻤﻠﻴﺎﺕ ﺣﺴﺎﺑﻴﺔ ﺧﺎﺻﺔ ﺗﺴﻤﻰ ﺍﳋﻮﺍﺭﺯﻣﻴﺎﺕ ﻭﻳﻠﺠﺆ ﺇﱃ ﻫﺬﻩ ﺍﻟﺘﻘﻨﻴﺔ ﰲ ﺣﺎﻟﺔ ﻋﺪﻡ‬
‫ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﻨﺴﺨﺔ ﺍﻷﺻﻠﻴﺔ ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪ ،‬ﺃﻭ ﰲ ﺣﺎﻟﺔ ﺃﻥ ﺍﻟﻌﺒﺚ ﻗﺪ ﻭﻗﻊ ﻋﻠﻰ ﺍﻟﻨﺴﺨﺔ ﺍﻷﺻﻠﻴﺔ‬
‫ﺇﺫ ﺑﺎﻷﻣﻜﺎﻥ ﺍﻟﺘﺄﻛﺪ ﻣﻦ ﺳﻼﻣﺔ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻣﻦ ﺍﻟﺘﺒﺪﻳﻞ ﻭﺍﻟﺘﺤﺮﻳﻒ ﻭﺍﻟﺘﻐﻴﲑ ﺑﺈﺳﺘﻌﻤﺎﻝ ﻫﺬﻩ‬
‫ﺍﻟﻌﻤﻠﻴﺎﺕ ﺍﳊﺴﺎﺑﻴﺔ‪.‬‬
‫‪ -‬ﺇﺳﺘﻌﻤﺎﻝ ﺍﻟﺪﻟﻴﻞ ﺍﶈﺎﻳﺪ ﻭﻫﻮ ﻧﻮﻉ ﻣﻦ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺍﳌﺨﺰﻭﻥ ﰲ ﺍﻟﺒﻴﺌﺔ ﺍﻹﻓﺘﺮﺍﺿﻴﺔ ﻻ ﻋﻼﻗﺔ‬
‫ﻟﻪ ﲟﻮﺿﻮﻉ ﺍﳉﺮﳝﺔ‪ ،‬ﻭﻟﻜﻨﻪ ﻳﺴﺎﻋﺪ ﰲ ﺍﻟﺘﺄﻛﺪ ﻣﻦ ﻣﺪﻯ ﺳﻼﻣﺔ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺍﳌﻘﺼﻮﺩ ﻣﻦ ﺣﻴﺚ‬
‫) ‪(3‬‬
‫ﻋﺪﻡ ﺣﺼﻮﻝ ﺃﻱ ﺗﻌﺪﻳﻞ ﻋﻠﻴﻪ ﰲ ﺍﻟﻨﻈﺎﻡ ﺍﻟﻜﻮﻣﺒﻴﻮﺗﺮﻱ‪.‬‬
‫ﻭﻻ ﺷﻚ ﺃﻥ ﺍﳋﱪﺓ ﺍﻟﺘﻘﻨﻴﺔ ﲢﺘﻞ ﰲ ﻫﺬﻩ ﺍﳊﺎﻟﺔ ﺩﻭﺭﺍ ﻣﻬﻤﺎ ﰲ ﺍﻟﺘﺜﺒﺖ ﻣﻦ ﺳﻼﻣﺔ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‬
‫ﻓﺈﺫﺍ ﻛﺎﻥ ﻟﻠﺨﱪﺓ ﺍﻟﺘﻘﻨﻴﺔ ﺃﳘﻴﺔ ﻛﱪﻯ ﰲ ﳎﺎﻝ ﺇﺳﺘﺨﻼﺹ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪،‬ﻓﺈﻥ ﳍﺎ ﺫﺍﺕ ﺍﻟﺪﻭﺭ ﰲ ﲝﺚ‬
‫ﻣﺼﺪﺍﻗﻴﺘﻪ ﻭﺗﻘﻴﻴﻤﻪ ﻣﻦ ﺣﻴﺚ ﻋﺪﻡ ﺣﺼﻮﻝ ﺃﻱ ﻋﺒﺚ ﻋﻠﻴﻪ‪ ،‬ﻓﻨﻘﺺ ﺍﻟﺜﻘﺎﻓﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻟﻠﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ‬
‫ﻗﺪ ﳛﺘﻢ ﻭﻛﻮﺍﺟﺐ ﻗﻀﺎﺋﻲ ﺃﻥ ﻳﺴﺘﻌﲔ ﰲ ﻫﺬﻩ ﺍﳌﺴﺎﺋﻞ ﺑﻮﺳﺎﺋﻞ ﺍﳋﱪﺓ ﻛﻨﻬﺞ ﻟﻴﺲ ﻣﻦ ﺃﺟﻞ ﺇﺳﺘﻘﺎﺀ‬
‫ﺍﻟﺪﻟﻴﻞ ﻓﺤﺴﺐ‪ ،‬ﺑﻞ ﻟﺒﺤﺚ ﻣﺼﺪﺍﻗﻴﺘﻪ ﰲ ﳎﺎﻝ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﻭﲢﻘﻴﻖ ﺍﻟﻴﻘﻴﻨﻴﺔ ﳍﺬﺍ ﺍﻟﺪﻟﻴﻞ‪.‬‬
‫‪/2‬ﺗﻘﻴﻴﻢ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻣﻦ ﺣﻴﺚ ﺍﻟﺴﻼﻣﺔ ﺍﻟﻔﻨﻴﺔ ﻟﻺﺟﺮﺍﺀﺍﺕ ﺍﳌﺴﺘﺨﺪﻣﺔ ﰲ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ‪:‬‬

‫)‪(1‬ﺧﺎﻟﺪ ﻋﺒﺎﺩ ﺍﳊﻠﱯ‪ ،‬ﺇﺟﺮﺍﺀﺍﺕ ﺍﻟﺘﺤﺮﻱ ﰲ ﺟﺮﺍﺋﻢ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻷﻧﺘﺮﻧﺎﺕ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪.‬ﺹ‪249‬‬
‫)‪(2‬ﻃﺎﺭﻕ ﳏﻤﺪ ﺍﳉﻤﻠﻲ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺑﺪﻭﻥ ﺗﺮﻗﻴﻢ‪.‬‬
‫)‪(3‬ﳑﺪﻭﺡ ﻋﺒﺪ ﺍﳊﻤﻴﺪ ﻋﺒﺪ ﺍﳌﻄﻠﺐ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪.‬ﺹ‪22-47‬‬

‫‪- 217 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺳﺒﻖ ﺍﳊﺪﻳﺚ ﻋﻠﻰ ﺃﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻳﺘﻢ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ ﺑﺈﺗﺒﺎﻉ ﲨﻠﺔ ﻣﻦ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﻟﻔﻨﻴﺔ ﻭﺍﻟﱵ‬
‫ﻣﻦ ﺍﳌﻤﻜﻦ ﺃﻥ ﻳﻌﺘﺮﻳﻬﺎ ﺧﻄﺄ ﻗﺪ ﻳﺸﻜﻚ ﰲ ﺳﻼﻣﺔ ﻧﺘﺎﺋﺠﻬﺎ‪ ،‬ﺍﻷﻣﺮ ﺍﻟﺬﻱ ﳛﺘﻢ ﺇﺧﻀﺎﻋﻬﺎ ﺇﱃ‬
‫ﺇﺧﺘﺒﺎﺭﺍﺕ)‪(1‬ﻛﻮﺳﻴﻠﺔ ﻟﻠﺘﺄﻛﺪ ﻣﻦ ﺳﻼﻣﺔ ﻫﺬﻩ ﺍﻹﺟﺮﺍﺀﺍﺕ ﻣﻦ ﺣﻴﺚ ﺇﻧﺘﺎﺟﻬﺎ ﻟﺪﻟﻴﻞ ﺗﺘﻮﺍﻓﺮ ﻓﻴﻪ ﺍﳌﺼﺪﺍﻗﻴﺔ‬
‫ﻟﻘﺒﻮﻟﻪ ﻛﺪﻟﻴﻞ ﺇﺛﺒﺎﺕ‪ ،‬ﻭﻳﺘﺒﻊ ﰲ ﺫﻟﻚ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﳋﻄﻮﺍﺕ ﺃﳘﻬﺎ‪:‬‬
‫‪-‬ﺇﺧﻀﺎﻉ ﺍﻷﺩﺍﺓ ﺍﳌﺴﺘﺨﺪﻣﺔ ﻟﻌﺪﺓ ﲡﺎﺭﺏ ﻟﻠﺘﺄﻛﺪ ﻣﻦ ﺩﻗﺘﻬﺎ ﰲ ﺇﻋﻄﺎﺀ ﺍﻟﻨﺘﺎﺋﺞ ﻭﻳﻜﻮﻥ ﺫﻟﻚ‬
‫ﺑﺈﺗﺒﺎﻉ ﺇﺧﺘﺒﺎﺭﻳﻦ ﺃﺳﺎﺳﻴﲔ ﻳﺘﻢ ﺍﻟﺘﺄﻛﺪ ﻣﻦ ﺧﻼﳍﻤﺎ ﺃﻥ ﺍﻷﺩﺍﺓ ﺍﳌﺴﺘﺨﺪﻣﺔ ﻋﺮﺿﺖ ﻛﻞ ﺍﳌﻌﻄﻴﺎﺕ‬
‫ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻭﰲ ﺫﺍﺕ ﺍﻟﻮﻗﺖ ﱂ ﻧﻀﻒ ﺇﻟﻴﻬﺎ ﺃﻱ ﺑﻴﺎﻥ ﺟﺪﻳﺪ‪ ،‬ﻭﻫﻮ ﻣﺎ ﻗﺪ ﻳﻌﻄﻲ ﻟﻠﻨﺘﺎﺋﺞ‬
‫ﺍﳌﻘﺪﻣﺔ ﻣﺼﺪﺍﻗﻴﺔ ﰲ ﺍﻟﺘﺪﻟﻴﻞ ﻋﻠﻰ ﺍﻟﻮﺍﻗﻊ‪ ،‬ﻭﻳﺘﻤﺜﻞ ﻫﺬﺍﻥ ﺍﻹﺧﺘﺒﺎﺭﺍﻥ ﰲ‪ :‬ﺇﺧﺘﺒﺎﺭ ﺍﻟﺴﻠﺒﻴﺎﺕ ﺍﻟﺰﺍﺋﻔﺔ‬
‫ﻭﻣﻔﺎﺩﻩ ﺃﻥ ﲣﻀﻊ ﺍﻷﺩﺍﺓ ﺍﳌﺴﺘﺨﺪﻣﺔ ﰲ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﻹﺧﺘﺒﺎﺭ ﻳﺒﲔ ﻣﺪﻯ ﻗﺪﺭ‪‬ﺎ ﻋﻠﻰ ﻋﺮﺽ‬
‫ﻛﺎﻓﺔ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻭﺃﻧﻪ ﱂ ﻳﺘﻤﺈﻏﻔﺎﻝ ﻣﻌﻄﻴﺎﺕ ﻣﻬﻤﺔ ﻋﻨﻪ‪ .‬ﺃﻣﺎ ﺍﻹﺧﺘﺒﺎﺭ ﺍﻟﺜﺎﱐ‬
‫ﻭﺍﻟﺬﻱ ﻳﻌﺮﻑ ﺑﺈﺧﺘﺒﺎﺭ ﺍﻹﳚﺎﺑﻴﺎﺕ ﺍﻟﺰﺍﺋﻔﺔ ﻓﻤﻔﺎﺩﻩ ﺇﺧﻀﺎﻉ ﺍﻷﺩﺍﺓ ﺍﳌﺴﺘﺨﺪﻣﺔ ﰲ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ‬
‫ﺍﻟﺮﻗﻤﻲ ﻹﺧﺘﺒﺎﺭ ﳝﻜﻦ ﻣﻦ ﺍﻟﺘﺄﻛﺪ ﻣﻦ ﺃﻥ ﻫﺬﻩ ﺍﻷﺩﺍﺓ ﻻ ﺗﻌﺮﺽ ﻣﻌﻄﻴﺎﺕ ﺇﺿﺎﻓﻴﺔ ﺟﺪﻳﺪﺓ‪.‬‬
‫‪-‬ﺍﻹﻋﺘﻤﺎﺩ ﻋﻠﻰ ﺍﻷﺩﻭﺍﺕ ﺍﻟﱵ ﺃﺛﺒﺘﺖ ﺍﻟﺪﺭﺍﺳﺎﺕ ﺍﻟﻌﻠﻤﻴﺔ ﻛﻔﺎﺀ‪‬ﺎ ﰲ ﺗﻘﺪﱘ ﻧﺘﺎﺋﺞ ﺃﻓﻀﻞ‪ ،‬ﺇﺫ ﺗﺒﲔ‬
‫ﺍﻟﺪﺭﺍﺳﺎﺕ ﺍﻟﻌﻠﻤﻴﺔ ﻭﺍﻟﺒﺤﻮﺙ ﺍﳌﻨﺸﻮﺭﺓ ﰲ ﳎﺎﻝ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﻄﺮﻕ ﺍﻟﺴﻠﻴﻤﺔ ﺍﻟﱵ ﳚﺐ ﺇﺗﺒﺎﻋﻬﺎ ﰲ‬
‫ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻭﰲ ﺍﳌﻘﺎﺑﻞ ﺑﻴﻨﺖ ﺗﻠﻚ ﺍﻟﺪﺭﺍﺳﺎﺕ ﺃﻳﻀﺎ ﺍﻷﺩﻭﺍﺕ ﺍﳌﺸﻜﻮﻙ ﰲ ﻛﻔﺎﺀ‪‬ﺎ‬
‫ﻭﻫﻮ ﻣﺎ ﻳﺴﺎﻫﻢ ﰲ ﲢﺪﻳﺪ ﻣﺼﺪﺍﻗﻴﺔ ﺍﳌﺨﺮﺟﺎﺕ ﺍﳌﺴﺘﻤﺪﺓ ﻣﻦ ﺗﻠﻚ ﺍﻷﺩﻭﺍﺕ‪.‬‬

‫)‪(1‬ﺗﻌﺮﻑ ﻫﺬﻩ ﺍﻹﺧﺘﺒﺎﺭﺍﺕ ﺑﺈﺧﺘﺒﺎﺭﺍﺕ )ﺩﺍﻭﺑﻮﺭﺕ( ﻭﺫﻟﻚ ﻧﺴﺒﺔ ﻟﻠﺤﻜﻢ ﺍﻟﺬﻱ ﺃﺻﺪﺭﺗﻪ ﺍﶈﻜﻤﺔ ﺍﻟﻌﻠﻴﺎ ﺍﻷﻣﺮﻳﻜﻴﺔ ﰲ ﻗﻀﻴﺔ ﺩﺍﻭﻳﻮﺭﺕ ﺿﺪ ﻣﲑﻳﻞ‬
‫ﻟﻠﺼﻨﺎﻋﺎﺕ ﺍﻟﺪﻭﺍﺋﻴﺔ ﺳﻨﺔ ‪.1993‬‬

‫‪- 218 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺛﺎﻧﻴﺎ‪ :‬ﻭﺟﻮﺏ ﻣﻨﺎﻗﺸﺔ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺍﳌﺴﺘﺨﺮﺟﺔ ﻣﻦ ﺍﳊﺎﺳﻮﺏ‪:‬ﺇﻥ ﺣﺮﻳﺔ ﺍﻟﺪﻟﻴﻞ ﺍﳉﻨﺎﺋﻲ‬
‫ﻣﺸﺮﻭﻃﺔ ﺑﺄﻥ ﻳﻜﻮﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺬﻱ ﻳﺴﺘﻨﺪ ﺇﻟﻴﻪ ﺍﻟﻘﺎﺿﻲ ﻗﺪ ﻃﺮﺣﺖ ﻣﻨﺎﻗﺸﺘﻪ ﺑﺎﳉﻠﺴﺔ‪ ،‬ﻭﻳﻜﻮﻥ ﻛﺬﻟﻚ‬
‫ﻣﱴ ﻛﺎﻥ ﻟﻪ ﺃﺻﻞ ﺛﺎﺑﺖ ﰲ ﺃﻭﺭﺍﻕ ﺍﻟﻘﻀﻴﺔ ﺍﳌﻄﺮﻭﺣﺔ ﻋﻠﻰ ﺍﻟﻘﺎﺿﻲ‪ (1)،‬ﻭﻫﻮ ﻣﺎ ﳚﻌﻞ ﻫﺬﻫﺎﻷﺩﻟﺔ ﻣﺘﺎﺣﺔ‬
‫ﻟﻠﺨﺼﻮﻡ ﻟﻜﻲ ﻳﺘﻤﻜﻦ ﻛﻞ ﺧﺼﻢ ﻣﻦ ﺇﻋﺪﺍﺩ ﺩﻓﺎﻋﻪ ﻓﺈﻥ ﻛﺎﻥ ﺍﻟﺪﻟﻴﻞ ﰲ ﺻﺎﳊﻪ ﻳﺪﺍﻓﻊ ﻋﻨﻬﻮﺇﻥ ﻛﺎﻥ‬
‫ﺿﺪﻩ ﻳﺸﻚ ﻓﻴﻪ ﻭﺑﻀﻌﻔﻪ‪ .‬ﻭﻻ ﳝﻜﻦ ﻟﻠﻘﺎﺿﻲ ﺣﻴﻨﺌﺬ ﺃﻥ ﻳﺆﺳﺲ ﺇﻗﺘﻨﺎﻋﻪ ﺇﻻ ﻋﻠﻰ ﺍﻟﻌﻨﺎﺻﺮ ﺍﻹﺛﺒﺎﺗﻴﺔ ﺍﻟﱵ‬
‫ﻃﺮﺣﺖ ﰲ ﺟﻠﺴﺎﺕ ﺍﶈﻜﻤﺔ ﻭﺧﻀﻌﺖ ﳊﺮﻳﺔ ﻣﻨﺎﻗﺸﺔ ﺃﻃﺮﺍﻑ ﺍﻟﺪﻋﻮﻯ‪.‬‬
‫ﻭﻫﺬﺍ ﻳﻌﲏ ﺃﻥ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺍﳌﺘﺤﺼﻠﺔ ﻹﺛﺒﺎﺕ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺳﻮﺍﺀ ﻛﺎﻧﺖ ﻣﻄﺒﻮﻋﺔ ﺃﻡ‬
‫ﺇﲣﺬﺕ ﺷﻜﻞ ﺃﺷﺮﻃﺔ ﺃﻭ ﺃﻗﺮﺍﺹ ﳑﻐﻨﻄﺔ ﺃﻭ ﺿﻮﺋﻴﺔ ﺃﻭ ﻣﺼﻮﺭﺍﺕ ﻓﻠﻤﻴﺔ‪ ،‬ﻛﻠﻬﺎ ﺳﺘﻜﻮﻥ ﳏﻼ ﻟﻠﻤﻨﺎﻗﺸﺔ‬
‫ﻋﻨﺪ ﺍﻷﺧﺬ ‪‬ﺎ ﻛﺄﺩﻟﺔ ﺇﺛﺒﺎﺕ ﺃﻣﺎﻡ ﺍﶈﻜﻤﺔ‪ ،‬ﻭﻋﻠﻰ ﺫﻟﻚ ﻓﺈﻥ ﻛﻞ ﺩﻟﻴﻞ ﻳﺘﻢ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ ﻣﻦ ﺧﻼﻝ‬
‫ﺍﻟﺒﻴﺌﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﳚﺐ ﺃﻥ ﻳﻌﺮﺽ ﰲ ﺟﻠﺴﺔ ﺍﶈﻜﻤﺔ ﻟﻴﺲ ﻣﻦ ﺧﻼﻝ ﻣﻠﻒ ﺍﻟﺪﻋﻮﻯ ﰲ ﺍﻟﺘﺤﻘﻴﻖ‬
‫ﺍﻹﺑﺘﺪﺍﺋﻲ ﻭﺇﳕﺎ ﻳﻌﺮﺽ ﺑﺼﻔﺔ ﻣﺒﺎﺷﺮﺓ ﺃﻣﺎﻡ ﺍﻟﻘﺎﺿﻲ‪.‬‬
‫ﻭﻫﺬﻩ ﺍﻷﺣﻜﺎﻡ ﺗﻨﻄﺒﻖ ﻋﻠﻰ ﻛﺎﻓﺔ ﺍﻷﺩﻟﺔ ﺍﳌﺘﻮﻟﺪﺓ ﻣﻦ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻓﺒﺎﻟﻨﺴﺒﺔ ﻟﺸﻬﻮﺩ‬
‫ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ)‪(2‬ﺍﻟﺬﻳﻦ ﻳﻜﻮﻥ ﻗﺪ ﺳﺒﻖ ﲰﺎﻋﻬﻢ ﰲ ﺍﻟﺘﺤﻘﻴﻖ ﺍﻹﺑﺘﺪﺍﺋﻲ ﻓﺈﻧﻪ ﳚﺐ ﺃﻥ ﻳﺘﻢ ﺇﻋﺎﺩﺓ‬
‫ﲰﺎﻋﻬﻢ ﻣﺮﺓ ﺃﺧﺮﻯ ﻣﻦ ﺟﺪﻳﺪ ﺃﻣﺎﻡ ﺍﶈﻜﻤﺔ‪ ،‬ﻛﺬﻟﻚ ﺑﺎﻟﻨﺴﺒﺔ ﳋﱪﺍﺀ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﺇﺧﺘﻼﻑ‬
‫ﲣﺼﺼﺎ‪‬ﻢ ﻳﻨﺒﻐﻲ ﺃﻥ ﳝﺜﻠﻮﺍ ﺃﻣﺎﻡ ﺍﶈﻜﻤﺔ ﳌﻨﺎﻗﺸﺘﻬﻢ ﻭﻣﻨﺎﻗﺸﺔ ﺗﻘﺎﺭﻳﺮﻫﻢ ﺍﻟﱵ ﺧﻠﺼﻮﺍ ﺇﻟﻴﻬﺎ‪.‬‬
‫ﻭﻳﺘﺮﺗﺐ ﻋﻠﻰ ﻫﺬﺍ ﺍﳌﺒﺪﺃ ﺃﻥ ﺍﻟﻘﺎﺿﻲ ﻻ ﳝﻜﻨﻪ ﺃﻥ ﳛﻜﻢ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﻨﺎﺀﺍ ﻋﻠﻰ ﻋﻠﻤﻪ‬
‫ﺍﻟﺸﺨﺼﻲ ﺃﻭﺇﺳﺘﻨﺎﺩﺍ ﺇﱃ ﺭﺃﻱ ﺍﻟﻐﲑ ﺇﻻ ﺇﺫﺍ ﻛﺎﻥ ﺍﻟﻐﲑ ﻣﻦ ﺍﳋﱪﺍﺀ ﻭﻗﺪ ﺇﺭﺗﺎﺡ ﺿﻤﲑﻩ ﺇﱃ ﺍﻟﺘﻘﺮﻳﺮ ﺍﶈﺮﺭ‬
‫ﻣﻦ ﻗﺒﻠﻪ ﻓﻘﺮﺭ ﺍﻹﺳﺘﻨﺎﺩ ﺇﻟﻴﻪ ﺿﻤﻦ ﺑﺎﻗﻲ ﺍﻷﺩﻟﺔ ﺍﻟﻘﺎﺋﻤﺔ ﰲ ﺃﻭﺭﺍﻕ ﺍﻟﺪﻋﻮﻯ ﺍﳌﻌﺮﻭﺿﺔ ﻋﻠﻴﻪ‪.‬‬
‫ﻭﺍﳊﺪﻳﺚ ﰲ ﻫﺬﻩ ﺍﳌﺴﺄﻟﺔ ﳚﺮﻧﺎ ﺇﱃ ﻣﻨﺎﻗﺸﺔ ﻣﺪﻯ ﺗﺄﺛﲑ ﺍﻷﺻﺎﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ)‪(3‬ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻋﻠﻰ‬
‫ﻣﺒﺪﺃ ﻗﺒﻮﻟﻪ ﻣﻦ ﻃﺮﻑ ﺍﻟﻘﻀﺎﺀ‪ ،‬ﺇﺫ ﺗﱪﺯ ﻫﺬﻩ ﺍﳌﺸﻜﻠﺔ ﺑﺼﻮﺭﺓ ﺟﻠﻴﺔ ﻋﻨﺪﻣﺎ ﻳﻘﻮﻡ ﺍﳌﺘﻬﻢ ﺑﺈﺯﺍﻟﺔ ﺍﻟﺪﻟﻴﻞ‬

‫)‪(1‬ﺃﲪﺪ ﻓﺘﺤﻲ ﺳﺮﻭﺭ ﺍﻟﻮﺳﻴﻂ ﰲ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﻨﺎﺋﻴﺔ‪ ،‬ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ‪1996 ،‬ﺹ‪.392‬‬
‫)‪(2‬ﺍﻟﺸﺎﻫﺪ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻫﻮ ﺍﻟﻔﲏ ﺻﺎﺣﺐ ﺍﳋﱪﺓ ﻭﺍﳌﺘﺨﺼﺺ ﰲ ﺗﻘﻨﻴﺔ ﻋﻠﻮﻡ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻭﺍﻟﺬﻱ ﺗﻜﻮﻥ ﻟﺪﻳﻪ ﻣﻌﻠﻮﻣﺎﺕ ﺟﻮﻫﺮﻳﺔ ﻟﻮﻟﻮﺝ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ‬
‫ﺍﻵﻟﻴﺔ ﻟﻠﺒﻴﺎﻧﺎﺕ ﺇﺫﺍ ﻛﺎﻧﺖ ﻣﺼﻠﺤﺔ ﺍﻟﺘﺤﻘﻴﻖ ﺗﻘﺘﻀﻲ ﺍﻟﺘﻨﻘﻴﺐ ﻋﻦ ﺃﺩﻟﺔ ﺍﳉﺮﳝﺔ ﺩﺍﺧﻠﻪ‪.‬‬
‫)‪ (3‬ﻫﻨﺎﻙ ﲤﻴﻴﺰ ﺣﻘﻴﻘﻲ ﺑﲔ ﺍﻷﺻﺎﻟﺔ ﻟﻠﺪﻟﻴﻞ ﰲ ﻃﺎﺑﻌﻬﺎ ﺍﳌﺎﺩﻱ ﻭﺑﲔ ﺍﻷﺻﺎﻟﺔ ﰲ ﻃﺎﺑﻌﻬﺎ ﺍﻟﺮﻗﻤﻲ ﻣﻦ ﺣﻴﺚ ﺃﻥ ﺍﻷﻭﱃ ﺇﻥ ﻫﻲ ﺳﻮﻯ ﺗﻌﺒﲑ ﻋﻦ ﻭﺿﻌﻴﺔ ﻣﺎﺩﻳﺔ‬
‫ﻣﻠﻤﻮﺳﺔ ﻛﻤﺎ ﻫﻮ ﺍﻟﺸﺄﻥ ﰲ ﺍﻟﻮﺭﻕ ﺍﳌﻜﺘﻮﺏ ﺃﻭ ﺑﺼﻤﺔ ﺍﻷﺻﺒﻊ ﺃﻭ ﺍﳊﺪﻭﺙ ﺍﻟﻌﻴﲏ ﻟﻠﻮﺍﻗﻌﺔ ﰲ ﺣﲔ ﺃﻥ ﺍﻟﺜﺎﻧﻴﺔ ﻟﻴﺴﺖ ﺳﻮﻯ ﺗﻌﺪﺍﺩ ﻏﲑ ﳏﺪﻭﺩ ﻷﺭﻗﺎﻡ ﺛﻨﺎﺋﻴﺔ‬
‫ﻣﻮﺣﺪﺓ ﰲ ﺍﻟﺼﻔﺮ ﺍﻟﻮﺍﺣﺪ‪.‬‬

‫‪- 219 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﻟﺮﻗﻤﻲ ﻋﻨﺪ ﺑﻌﺪ‪ ،‬ﻓﻴﻜﻮﻥ ﻣﺎ ﺗﺒﻘﻰ ﻣﻨﻪ ﻫﻮ ﳎﺮﺩ ﻧﺴﺨﺔ ﻓﻘﻂ ﻳﺘﻢ ﺍﻟﺘﻮﺻﻞ ﺇﻟﻴﻬﺎ ﻋﻦ ﺑﻌﺪ ﺃﻳﻀﺎ ﺑﻄﺮﻕ‬
‫ﺍﳌﺮﺍﻗﺒﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻣﺜﻼ‪ ،‬ﻭﻣﻦ ﰒ ﻓﺎﻟﺴﺆﺍﻝ ﻫﻨﺎ ﻫﻞ ﻳﻜﻔﻲ ﻧﺎﺗﺞ ﺍﳌﺮﺍﻗﺒﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﺣﺪﻩ ﻟﻠﻘﻮﻝ ﺑﺄﻥ‬
‫ﺍﻟﺪﻟﻴﻞ ﻫﻨﺎ ﻫﻮ ﺩﻟﻴﻞ ﺃﺻﻠﻲ ﻭﺑﺎﻟﺘﺎﱄ ﻳﻘﺒﻞ ﻃﺮﺣﻪ ﻋﻠﻰ ﺍﻟﻘﻀﺎﺀ ﻭﻣﻨﺎﻗﺸﺘﻪ ﺿﻤﻦ ﺃﺩﻟﺔ ﺍﻟﺪﻋﻮﻯ ﻭﺫﺍﺕ‬
‫ﺍﻟﺴﺆﺍﻝ ﻳﻨﻄﺒﻖ ﻋﻠﻰ ﺣﺎﻟﺔ ﺍﻟﺪﻟﻴﻞ ﺍﳌﺴﺘﺮﺩ ﺑﻌﺪﻣﺎ ﰎ ﺣﺬﻓﻪ ﺑﺈﺳﺘﺨﺪﺍﻡ ﺧﺎﺻﻴﺔ ﺍﻹﻟﻐﺎﺀ‪.‬‬
‫ﺇﻥ ﻣﻨﺎﻗﺸﺔ ﻫﺬﻩ ﺍﳌﺴﺄﻟﺔ ﻣﻦ ﺍﻟﻨﺎﺣﻴﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺩﻓﻊ ﺑﺎﻟﺘﺸﺮﻳﻊ ﺍﳌﻘﺎﺭﻥ ﺃﻥ ﻳﻌﺘﻤﺪ ﻣﻨﻄﻖ ﺇﻓﺘﺮﺍﺽ‬
‫ﺃﺻﺎﻟﺔ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪ ،‬ﺣﻴﺚ ﻧﺺ ﻗﺎﻧﻮﻥ ﺍﻹﺛﺒﺎﺕ ﺍﻷﻣﺮﻳﻜﻲ ﰲ ﺍﳌﺎﺩﺓ )‪ (3/1003‬ﺃﻧﻪ ﺇﺫﺍ ﻛﺎﻧﺖ‬
‫ﺍﻟﺒﻴﺎﻧﺎﺕ ﺍﳌﺨﺰﻧﺔ ﰲ ﺣﺎﺳﻮﺏ ﺃﻭ ﺁﻟﺔ ﻣﺸﺎ‪‬ﺔ ﻓﺈﻥ ﺃﻱ ﳐﺮﺟﺎﺕ ﻃﺎﺑﻌﺔ ﻣﻨﻬﺎ ﺃﻭ ﳐﺮﺟﺎﺕ ﻣﻘﺮﻭﺀﺓ ﺗﱪﺯ‬
‫ﺇﻧﻌﻜﺎﺳﺎ ﺩﻗﻴﻘﺎ ﻟﻠﺒﻴﺎﻧﺎﺕ ﻭ ﺗﻌﺪ ﺑﻴﺎﻧﺎﺕ ﺃﺻﻠﻴﺔ‪ .‬ﻭﺗﱪﺯ ﺃﳘﻴﺔ ﺍﻟﺘﺴﻠﻴﻢ ﲟﻨﻄﻖ ﺇﻓﺘﺮﺍﺽ ﺍﻷﺻﺎﻟﺔ ﰲ ﺍﻟﺪﻟﻴﻞ‬
‫ﺍﻟﺮﻗﻤﻲ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻟﻘﺎﻧﻮﱐ ﺫﻟﻚ ﺃﻥ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﺘﻘﻨﻴﺔ ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻻ ﺗﻌﱪ ﻋﻦ ﻗﻴﻤﺔ ﺃﺻﻠﻴﺔ ﲟﺠﺮﺩ‬
‫) ‪(1‬‬
‫ﺭﻓﻊ ﳏﺘﻮﺍﻩ ﻣﻦ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺇﺫ ﻳﺒﻘﻰ ﻣﺘﻮﺍﺟﺪﺍ ﰲ ﻛﻞ ﻣﻜﺎﻥ ﻳﺘﻢ ﺇﺳﺘﺪﻋﺎﺅﻩ ﻣﻨﻪ‪.‬‬
‫ﻭﻋﻠﻰ ﻫﺪﻱ ﻣﺎ ﺳﺒﻖ ﻓﺈﻥ ﻫﻨﺎﻙ ﻣﻦ ﻳﺬﻫﺐ ﺇﱃ ﺍﻹﻋﺘﻘﺎﺩ ﺑﺄﻧﻪ ﲟﻘﺪﺍﺭ ﺇﺗﺴﺎﻉ ﻣﺴﺎﺣﺔ ﺍﻷﺩﻟﺔ‬
‫ﺍﻟﻌﻠﻤﻴﺔ ﲟﻘﺪﺍﺭ ﻣﺎ ﻳﻜﻮﻥ ﺇﻧﻜﻤﺎﺵ ﻭﺗﻀﺎﺅﻝ ﺩﻭﺭ ﺍﻟﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﰲ ﺍﻟﺘﻘﺪﻳﺮ‪ ،‬ﺧﺎﺻﺔ ﺃﻣﺎﻡ ﻏﻴﺎﺏ‬
‫ﺍﻟﺜﻘﺎﻓﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻟﻠﻘﺎﺿﻲ ﻭﻗﺪ ﻳ‪‬ﺴﺘﺘﺒﻊ ﺫﻟﻚ ﺑﺎﻟﻘﻮﻝ ﺃﻥ ﺍﻟﺘﻄﻮﺭ ﺍﻟﻌﻠﻤﻲ ﻣﻦ ﺷﺄﻧﻪ ﺃﻥ ﻳﻄﻐﻰ ﻋﻠﻰ ﻧﻈﺎﻡ‬
‫ﺍﻹﻗﺘﻨﺎﻉ ﺍﻟﻘﻀﺎﺋﻲ ﻭﻻ ﻳﺒﻘﻰ ﻟﻠﻘﺎﺿﻲ ﺳﻮﻯ ﺍﻹﺫﻋﺎﻥ ﻟﺮﺃﻱ ﺍﳋﱪﺍﺀ ﺍﳌﺨﺘﺼﲔ ﺩﻭﻥ ﺃﻱ ﺗﻘﺪﻳﺮ ﻣﻦ ﺟﺎﻧﺒﻪ‬
‫ﻓﻤﺜﻞ ﻫﺬﺍ ﺍﻷﻣﺮ ﻳﺪﻓﻌﻨﺎ ﺇﱃ ﲝﺚ ﻣﺪﻯ ﺗﺄﺛﲑ ﺍﻟﻘﻴﻤﺔ ﺍﻟﻌﻠﻤﻴﺔ ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻋﻠﻰ ﻣﺒﺪﺃ ﺇﻗﺘﻨﺎﻉ ﺍﻟﻘﺎﺿﻲ‬
‫ﺍﳉﺰﺍﺋﻲ‪.‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺃﺛﺮ ﺍﻟﻘﻴﻤﺔ ﺍﻟﻌﻠﻤﻴﺔ ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﰲ ﳎﺎﻝ ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ‬
‫ﻟﻘﺪ ﺗﻌﺎﻇﻢ ﺩﻭﺭ ﺍﻹﺛﺒﺎﺕ ﺍﻟﻌﻠﻤﻲ ﻣﻊ ﺑﺮﻭﺯ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺇﱃ ﺣﻘﻞ ﺍﻷﺩﻟﺔ ﺍﳉﻨﺎﺋﻴﺔ ﻛﺄﻓﻀﻞ ﺩﻟﻴﻞ‬
‫ﻹﺛﺒﺎﺕ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﳑﺎ ﺃﻟﺰﻡ ﺍﻟﻘﺎﺿﻲ ﺃﻥ ﻳﺘﻌﺎﻣﻞ ﻣﻌﻪ ﰲ ﻣﻘﺎﺑﻞ ﻧﻘﺺ ﺍﻟﺜﻘﺎﻓﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ‬
‫ﺟﻬﺔ ﻭﺷﺮﻭﻁ ﺍﻟﺴﻼﻣﺔ ﺍﻟﱵ ﻳﺘﻤﺘﻊ ‪‬ﺎ ﻣﻦ ﺍﻟﻌﺒﺚ ﻭﺍﳋﻄﺄ ﻣﻦ ﺟﻬﺔ ﺃﺧﺮﻯ‪ ،‬ﻓﻬﻞ ﻣﻦ ﺷﺄﻥ ﺫﻟﻚ ﺃﻥ‬
‫ﻟﻠﻘﺎﺿﻲ ﻳﺴﻠﻢ ﻭﻳﺒﲏ ﺇﻗﺘﻨﺎﻋﻪ ﺑﺎﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻋﻠﻰ ﺃﺳﺎﺱ ﺃﻥ ﺃﻣﺮﻩ ﳏﺴﻮﻡ ﻋﻠﻤﻴﺎ؟‬
‫ﻳﺮﻯ ﺍﻟﺒﻌﺾ)‪(2‬ﺃﻧﻪ ﻟﻴﺲ ﺑﺸﺮﻁ ﺃﻥ ﻳﻜﻮﻥ ﺇﻗﺘﻨﺎﻉ ﺍﻟﻘﺎﺿﻲ ﻳﻘﻴﻨﻴﺎ ﻭﺫﻟﻚ ﺣﺴﺐ ﺍﳌﻔﻬﻮﻡ ﺍﻟﻘﻀﺎﺋﻲ‬
‫ﻟﻪ ﻭﻳﱪﺭﻭﻥ ﺫﻟﻚ ﺑﺄﻥ ﺍﻟﻘﺎﺿﻲ ﻻ ﳝﻠﻚ ﻭﺳﺎﺋﻞ ﺇﺩﺭﺍﻙ ﺍﻟﻴﻘﲔ ﻛﺤﺎﻟﺔ ﺫﻫﻨﻴﺔ ﺗﻠﺘﺼﻖ ﺑﺎﳊﻘﻴﻘﺔ ﺩﻭﻥ ﺃﻥ‬

‫)‪(1‬ﳏﻤﺪ ﺑﻮﺑﻜﺮ ﺑﻦ ﻳﻮﻧﺲ‪ ،‬ﺍﳉﺮﺍﺋﻢ ﺍﻟﻨﺎﺷﺌﺔ ﻋﻦ ﺇﺳﺘﺨﺪﺍﻡ ﺍﻷﻧﺘﺮﻧﺎﺕ‪ ،‬ﻣﺮﺟﻊ ﺳﺎﺑﻖ‪ .‬ﺹ‪،973‬‬
‫)‪(2‬ﺃﻧﻈﺮ ﺩ‪.‬ﳏﻤﺪ ﺯﻛﻲ ﺃﺑﻮ ﻋﺎﻣﺮ‪ ،‬ﺍﻻﺟﺮﺍﺀﺍﺕ ﺍﳉﻨﺎﺋﻴﺔ‪ ،‬ﺩﺍﺭ ﺍﳉﺎﻣﻌﺔ ﺍﳉﺪﻳﺪﺓ ‪،‬ﻃﺒﻌﺔ ‪، 2008‬ﺹ‪.814-813‬‬

‫‪- 220 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﲣﺘﻠﻂ ﺑﺄﻱ ﺷﻚ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻟﺸﺨﺼﻲ ﺃﻭ ﲜﻬﻞ ﺃﻭ ﻏﻠﻂ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﳌﻮﺿﻮﻋﻲ‪ ،‬ﻛﻤﺎ ﺃﻥ‬
‫ﺍﻹﻗﺘﻨﺎﻉ ﻟﻴﺲ ﺇﻋﺘﻘﺎﺩﺍ ﻷﻥ ﺍﻟﻘﺎﺿﻲ ﻻ ﳚﻮﺯ ﺃﻥ ﳛﻜﻢ ﺑﻨﺎﺀﺍ ﻋﻠﻰ ﺃﺳﺒﺎﺏ ﺷﺨﺼﻴﺔ ﺻﻠﺤﺖ ﳊﻤﻠﻪ ﻫﻮ‬
‫ﻧﻔﺴﻪ ﻋﻠﻰ ﺍﻟﺘﺴﻠﻴﻢ ﺑﺜﺒﻮﺕ ﺍﻟﻮﻗﺎﺋﻊ‪ ،‬ﻟﻜﻨﻬﺎ ﺗﺼﻠﺢ ﺇﺫﺍ ﻧﻈﺮ ﺇﻟﻴﻬﺎ ﻣﻦ ﺍﻟﻨﺎﺣﻴﺔ ﺍﳌﻮﺿﻮﻋﻴﺔ ﻣﻦ ﺟﺎﻧﺐ‬
‫ﺍﻵﺧﺮﻳﻦ‪ (1).‬ﻭﻳﻨﺘﻬﻲ ﺃﺻﺤﺎﺏ ﻫﺬﺍ ﺍﻹﲡﺎﻩ ﺇﱃ ﺃﻥ ﺍﻹﻗﺘﻨﺎﻉ ﻳﻘﻒ ﻣﻮﻗﻔﺎ ﻭﺳﻄﺎ ﺑﲔ ﺍﻟﻴﻘﲔ ﻭﺍﻹﻋﺘﻘﺎﺩ‬
‫ﻭﻳﺆﻛﺪﻭﻥ ﺃﻥ ﺍﻹﻗﺘﻨﺎﻉ ﻟﻴﺲ ﻳﻘﻴﻨﺎ ﻭﻟﻴﺲ ﺟﺰﻣﺎ ﺑﺎﳌﻌﲎ ﺍﻟﻌﻠﻤﻲ ﻟﻠﻴﻘﲔ ﻭﺍﳉﺰﻡ ﻛﺤﺎﻟﺔ ﻣﻮﺿﻮﻋﻴﺔ ﻻ‬
‫ﺗﻮﺭﺙ ﺷﻜﺎ ﻟﺪﻯ ﻣﻦ ﺗﻴﻘﻦ ﺃﻭ ﺟﺰﻡ ﻭﻻ ﺟﻬﻼ ﻭﻻ ﻏﻠﻄﺎ ﻟﺪﻯ ﺍﻵﺧﺮﻳﻦ‪ ،‬ﻭﺇﳕﺎ ﺍﻹﻗﺘﻨﺎﻉ ﻫﻮ ﺇﻋﺘﻘﺎﺩ‬
‫ﻗﺎﺋﻢ ﻋﻠﻰ ﺃﺩﻟﺔ ﻣﻮﺿﻮﻋﻴﺔ ﻳﻘﻮﻡ ﻋﻠﻰ ﺇﺳﺘﻘﺮﺍﺀ ﻭﺇﺳﺘﺤﻴﺎﺀ ﺍﻷﺩﻟﺔ ﺍﻟﱵ ﻳﺘﻮﺟﻪ ‪‬ﺎ ﺃﻃﺮﺍﻑ ﺍﳋﺼﻮﻣﺔ ﻟﻨﻴﻞ‬
‫ﺇﻗﺘﻨﺎﻉ ﺍﻟﻘﺎﺿﻲ‪.‬‬
‫ﻭﻳﻘﺼﺪ ﺑﺎﻟﺪﻟﻴﻞ ﺍﻟﻌﻠﻤﻲ ﺗﻠﻚ ﺍﻟﻨﺘﻴﺠﺔ ﺍﻟﱵ ﺗﺴﻔﺮ ﻋﻠﻴﻬﺎ ﺍﻟﺘﺠﺎﺭﺏ ﺍﻟﻌﻠﻤﻴﺔ ﻹﺛﺒﺎﺕ ﺃﻭ ﻟﻨﻔﻲ ﺍﻟﻮﺍﻗﻌﺔ‬
‫ﺍﻟﱵ ﻳﺜﺎﺭ ﺍﻟﺸﻚ ﺑﺸﺄ‪‬ﺎ‪ ،‬ﻭﻏﺎﻟﺒﺎ ﻣﺎ ﻳﺘﻄﻠﺐ ﻓﻬﻤﻬﺎ ﻣﻌﺮﻓﺔ ﻭﺩﺭﺍﻳﺔ ﺧﺎﺻﺔ ﻗﺪ ﻻ ﳝﻠﻜﻬﺎ ﺍﻟﻘﺎﺿﻲ ﲝﻜﻢ‬
‫ﺗﻜﻮﻳﻨﻪ ﺍﻟﻘﺎﻧﻮﱐ ﺍﶈﺾ‪ ،‬ﻭﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺑﻮﺻﻔﻪ ﺗﻄﺒﻴﻘﺎ ﻣﻦ ﺗﻄﺒﻴﻘﺎﺕ ﺍﻟﺪﻟﻴﻞ ﺍﻟﻌﻠﻤﻲ ﻻ ﳝﻜﻦ ﻟﻠﻘﺎﺿﻲ‬
‫ﺃﻥ ﻳﻨﺎﺯﻉ ﰲ ﻗﻴﻤﺔ ﻣﺎ ﻳﺘﻤﺘﻊ ﺑﻪ ﻣﻦ ﻗﻮﺓ ﺇﺳﺘﺪﻻﻟﻴﺔ ﻗﺪ ﺇﺳﺘﻘﺮﺕ ﺑﺎﻟﻨﺴﺒﺔ ﻟﻪ ﻭﺗﺄﻛﺪﺕ ﻣﻦ ﺍﻟﻨﺎﺣﻴﺔ‬
‫ﺍﻟﻌﻠﻤﻴﺔ‪.‬‬
‫ﻓﺈﺫﺍ ﻛﺎﻥ ﻟﻠﻘﺎﺿﻲ ﰲ ﺍﻟﺪﻟﻴﻞ ﺳﻠﻄﺔ ﺗﻘﺪﻳﺮﻳﺔ ﻭﺍﺳﻌﺔ ﰲ ﺍﻟﻠﺠﻮﺀ ﺇﱃ ﺍﳋﱪﺓ ﻭﺗﻘﺪﻳﺮ ﻗﻴﻤﺘﻬﺎ ﺍﻹﺛﺒﺎﺗﻴﺔ‬
‫ﺇﻧﻄﻼﻗﺎ ﻣﻦ ﻣﺒﺪﺃ ﺣﺮﻳﺔ ﺍﻹﺛﺒﺎﺕ ﰲ ﺍﳌﻮﺍﺩ ﺍﳉﺰﺍﺋﻴﺔ ﻭﺍﻟﺬﻱ ﺗﻮﻟﺪ ﻋﻨﻪ ﻣﺒﺪﺃ ﺍﻟﻘﺎﺿﻲ ﺧﺒﲑ ﺍﳋﱪﺍﺀ ﻓﺈﻥ‬
‫ﺫﻟﻚ ﻣﻘﺘﺼﺮ ﻋﻠﻰ ﻣﺎ ﳝﻜﻦ ﻟﻠﻘﺎﺿﻲ ﺃﻥ ﻳﺒﺖ ﻓﻴﻪ ﻟﻮﺣﺪﻩ‪ ،‬ﺃﻣﺎ ﺍﳌﺴﺎﺋﻞ ﺫﺍﺕ ﺍﻟﺼﺒﻐﺔ ﺍﻟﻔﻨﻴﺔ ﺍﻟﺒﺤﺘﺔ ﻓﻼ‬
‫ﳚﻮﺯ ﻟﻠﻘﺎﺿﻲ ﺃﻥ ﳛﻞ ﻧﻔﺴﻪ ﻓﻴﻬﺎ ﳏﻞ ﺍﳋﺒﲑ ﻭﻻ ﳝﻜﻨﻪ ﻃﺮﺡ ﺭﺃﻳﻪ ﺇﻻ ﻷﺳﺒﺎﺏ ﺳﺎﺋﻐﺔ ﻭﻣﻘﺒﻮﻟﺔ‪ ،‬ﺇﺫ‬
‫ﻳﺬﻫﺐ ﰲ ﻫﺬﺍ ﺍﻟﺼﺪﺩ ﺇﲡﺎﻩ ﻋﺮﻳﺾ ﻣﻦ ﺍﻟﻔﻘﻪ ﺍﳉﻨﺎﺋﻲ ﺇﱃ ﺍﻟﻘﻮﻝ ﺃﻥ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺗﺘﻤﺘﻊ ﲝﺠﻴﺔ ﻗﺎﻃﻌﺔ‬
‫ﰲ ﺍﻟﺪﻻﻟﺔ ﻋﻠﻰ ﺍﻟﻮﻗﺎﺋﻊ ﺍﻟﱵ ﺗﺘﻀﻤﻨﻬﺎ‪ ،‬ﻭﺃﻧﻪ ﳝﻜﻦ ﺍﻟﺘﻐﻠﺐ ﻋﻠﻰ ﻣﺸﻜﻠﺔ ﺍﻟﺘﺸﻜﻴﻚ ﰲ ﻣﺼﺪﺍﻗﻴﺘﻬﺎ ﻣﻦ‬
‫ﺧﻼﻝ ﺇﺧﻀﺎﻋﻬﺎ ﻹﺧﺘﺒﺎﺭﺍﺕ ﲤﻜﻦ ﻣﻦ ﺍﻟﺘﺄﻛﺪ ﻣﻦ ﺻﺤﺘﻬﺎ ﻭﺳﻼﻣﺘﻬﺎ‪ ،‬ﻭﺃﻧﻪ ﻻ ﳚﺐ ﺍﳋﻠﻂ ﺑﲔ ﺍﻟﺸﻚ‬
‫ﺍﻟﺬﻱ ﻳﺸﻮﺏ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺑﺴﺒﺐ ﺇﻣﻜﺎﻧﻴﺔ ﺍﻟﻌﺒﺚ ﺑﻪ ﺃﻭ ﻟﻮﺟﻮﺩ ﺧﻄﺄ ﰲ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ‪ ،‬ﻭﺑﲔ ﺍﻟﻘﻴﻤﺔ‬
‫ﺍﻹﻗﻨﺎﻋﻴﺔ ﳍﺬﺍ ﺍﻟﺪﻟﻴﻞ‪ ،‬ﻓﺎﳊﺎﻟﺔ ﺍﻷﻭﱃ ﻻ ﳝﻠﻚ ﺍﻟﻘﺎﺿﻲ ﺍﻟﻔﺼﻞ ﻓﻴﻬﺎ ﻷ‪‬ﺎ ﻣﺴﺄﻟﺔ ﻓﻨﻴﺔ ﻭﺍﻟﻘﻮﻝ ﻓﻴﻬﺎ ﻫﻮ‬
‫ﻗﻮﻝ ﺃﻫﻞ ﺍﳋﱪﺓ‪ ،‬ﻓﺈﻥ ﺳﻠﻢ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻣﻦ ﺍﻟﻌﺒﺚ ﻭﺍﳋﻄﺄ ﻭﺗﻮﺍﻓﺮﺕ ﻓﻴﻪ ﺍﻟﺸﺮﻭﻁ ﺍﳌﺬﻛﻮﺭﺓ ﺳﺎﺑﻘﺎ‬
‫ﻓﺈﻧﻪ ﻟﻦ ﻳﻜﻮﻥ ﻟﻠﻘﺎﺿﻲ ﺳﻮﻯ ﺍﻟﻘﺒﻮﻝ ‪‬ﺬﺍ ﺍﻟﺪﻟﻴﻞ ﻭﻻ ﳝﻜﻨﻪ ﺭﺩﻩ ﺃﻭ ﺍﻟﺘﺸﻜﻴﻚ ﰲ ﻗﻴﻤﺘﻪ ﺍﻟﺘﺪﻟﻴﻠﻴﺔ ﻟﻜﻮﻧﻪ‬

‫)‪(1‬ﻋﻔﻴﻔﻲ ﻛﺎﻣﻞ ﻋﻔﻴﻔﻲ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.384‬‬

‫‪- 221 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﲝﻜﻢ ﻃﺒﻴﻌﺘﻪ ﺍﻟﻔﻨﻴﺔ ﳝﺜﻞ ﺃﺧﺒﺎﺭﺍ ﺻﺎﺩﻗﺎ ﻋﻦ ﺍﻟﻮﻗﺎﺋﻊ‪ ،‬ﻣﺎ ﱂ ﻳﺜﺒﺖ ﻋﺪﻡ ﺻﻠﺔ ﻫﺬﺍ ﺍﻟﺪﻟﻴﻞ ﺑﺎﳉﺮﳝﺔ ﺍﳌﺮﺍﺩ‬
‫ﺇﺛﺒﺎ‪‬ﺎ‪ ،‬ﻟﺬﻟﻚ ﻳﺮﻯ ﻫﺬﺍ ﺍﻹﲡﺎﻩ ﺃﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﻌﻠﻤﻲ ﻭﻣﻨﻪ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺃﺻﺒﺢ ﻳﻘﻴﺪ ﺣﺮﻳﺔ ﺍﻟﻘﺎﺿﻲ ﰲ‬
‫ﺗﻘﺪﻳﺮ ﺍﻟﺪﻟﻴﻞ ﻭﳚﱪﻩ ﻋﻠﻰ ﺍﳊﻜﻢ ﲟﻘﺘﻀﺎﻩ ﻭﻟﻮ ﱂ ﻳﻜﻦ ﻣﻘﺘﻨﻌﺎ ﺑﺼﺤﺔ ﺍﻟﻮﺍﻗﻌﺔ ﺍﳌﻄﺮﻭﺣﺔ ﺃﻣﺎﻣﻪ‪ ،‬ﺇﺫ ﱂ‬
‫ﻳﻌﺪ ﺍﻟﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﻭﻓﻘﺎ ﳍﺬﺍ ﺍﻹﲡﺎﻩ ﺣﺮﺍ ﰲ ﻭﺯﻥ ﻭﺗﻘﺪﻳﺮ ﺍﻟﺪﻟﻴﻞ ﺍﻟﻌﻠﻤﻲ ﺍﻟﺬﻱ ﺑﺎﺕ ﻳﺄﺧﺬ ﺩﻭﺭ‬
‫ﺍﻟﺼﺪﺍﺭﺓ ﰲ ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ ﺧﺎﺻﺔ ﺑﻌﺪ ﻇﻬﻮﺭ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﻭﺇﻧﺸﺎﺀ ﺍﳌﻌﺎﻣﻞ ﺍﳉﻨﺎﺋﻴﺔ ﻟﻔﺤﺺ ﻫﺬﻩ‬
‫ﺍﻷﺩﻟﺔ ﻭﺗﻘﻴﻴﻤﻬﺎ‪.‬‬
‫ﻟﻜﻦ ﲦﺔ ﺭﺃﻱ ﺁﺧﺮ ﻳﺮﻯ ﺃﻥ ﺍﻟﻮﺳﺎﺋﻞ ﺍﻟﻌﻠﻤﻴﺔ ﰲ ﺃﻏﻠﺐ ﺣﺎﻻ‪‬ﺎ ﻟﻴﺴﺖ ﺩﻟﻴﻼ ﻣﺴﺘﻘﻼ ﰲ ﺫﺍﺗﻪ‬
‫ﻭﺇﳕﺎ ﻫﻲ ﻗﺮﺍﺋﻦ ﻳﺘﻢ ﺩﺭﺍﺳﺘﻬﺎ ﻹﺳﺘﺨﻼﺹ ﺩﻻﻟﺘﻬﺎ ﻭﻫﻲ ﻏﲑ ﻣﺴﺘﻘﻠﺔ ﻋﻦ ﺍﻟﻘﺮﺍﺋﻦ‪ ،‬ﻭﻣﺆﺩﻯ ﺫﻟﻚ ﺃ‪‬ﺎ ﻻ‬
‫ﺗﺼﻠﺢ ﰲ ﺫﺍ‪‬ﺎ ﻛﺪﻟﻴﻞ ﻭﺣﻴﺪ ﰲ ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ‪ ،‬ﻭﺃﻧﻪ ﺇﺫﺍ ﻛﺎﻥ ﻳﺘﻌﲔ ﻋﻠﻰ ﺍﻟﻘﺎﺿﻲ ﺍﻹﺳﺘﻌﺎﻧﺔ ﺑﺄﻫﻞ‬
‫ﺍﳋﱪﺓ ﰲ ﺍﳌﺴﺎﺋﻞ ﺍﻟﻔﻨﻴﺔ ﺍﻟﺒﺤﺘﺔ ﻭﺃﻥ ﻳﻌﺘﻤﺪ ﻋﻠﻰ ﺭﺃﻳﻬﻢ ﻓﻴﻤﺎ ﻳﺘﻌﻠﻖ ‪‬ﺬﻩ ﺍﳌﺴﺎﺋﻞ‪ ،‬ﺇﻻ ﺃﻧﻪ ﻣﻦ ﻏﲑ‬
‫ﺍﳌﻘﺒﻮﻝ ﺃﻥ ﻳﺘﺨﻠﻰ ﺍﻟﻘﺎﺿﻲ ﻋﻦ ﺣﻘﻪ ﺇﺫﺍ ﺭﺃﻯ ﻷﻱ ﺳﺒﺐ ﻣﻦ ﺍﻷﺳﺒﺎﺏ ﺃﻻ ﻳﺄﺧﺬ ﺑﺮﺃﻱ ﺍﳋﺒﲑ ﻛﺄﻥ‬
‫ﻳﺘﺒﲔ ﻟﻪ ﺑﺄﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻻ ﻳﺘﻔﻖ ﻣﻊ ﺍﻟﻈﺮﻭﻑ ﻭﺍﳌﻼﺑﺴﺎﺕ ﺍﻟﱵ ﻭﺟﺪ ﻓﻴﻬﺎ‪ ،‬ﻓﻬﻲ ﻣﺎ ﻳﺪﺧﻞ ﰲ‬
‫ﻧﻄﺎﻕ ﺗﻘﺪﻳﺮﻩ ﺍﻟﺬﺍﰐ ﻭﻣﻦ ﺻﻤﻴﻢ ﻭﻇﻴﻔﺘﻪ ﺍﻟﻘﻀﺎﺋﻴﺔ‪.‬‬
‫ﺫﻟﻚ ﺃﻥ ﳎﺮﺩ ﺗﻮﺍﻓﺮ ﺍﻟﺪﻟﻴﻞ ﺍﻟﻌﻠﻤﻲ ﺍﻟﺮﻗﻤﻲ ﻻ ﻳﻌﲏ ﺃﻥ ﺍﻟﻘﺎﺿﻲ ﻣﻠﺰﻡ ﺑﺎﳊﻜﻢ ﲟﻮﺟﺒﻪ ﻣﺒﺎﺷﺮﺓ‬
‫ﺳﻮﺍﺀ ﺑﺎﻹﺩﺍﻧﺔ ﺃﻭ ﺍﻟﱪﺍﺀﺓ‪ ،‬ﻓﺎﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻟﻴﺲ ﺁﻟﻴﺔ ﻣﻌﺪﺓ ﻟﺘﻘﺮﻳﺮ ﺇﻗﺘﻨﺎﻉ ﺍﻟﻘﺎﺿﻲ ﲞﺼﻮﺹ ﻣﺴﺄﻟﺔ ﻏﲑ‬
‫ﻣﺆﻛﺪﺓ‪(1).‬ﻓﺤﺴﺐ ﻫﺬﺍ ﺍﻹﲡﺎﻩ ﺃﻧﻪ ﻣﻬﻤﺎ ﻋﻼ ﺷﺄﻥ ﺍﻷﺩﻟﺔ ﺍﻟﻌﻠﻤﻴﺔ ﻭﺍﻟﺮﻗﻤﻴﺔ ﰲ ﻣﺴﺄﻟﺔ ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ‬
‫ﻓﺈﻧﻪ ﳚﺐ ﺃﻥ ﻧﺒﻘﻲ ﻋﻠﻰ ﺳﻠﻄﺔ ﺍﻟﻘﺎﺿﻲ ﺍﻟﺘﻘﺪﻳﺮﻳﺔ ﰲ ﺗﻜﻮﻳﻦ ﺇﻗﺘﻨﺎﻋﻪ ﻣﻦ ﻫﺬﻩ ﺍﻷﺩﻟﺔ ﻭﺫﻟﻚ ﻣﻦ ﺃﺟﻞ‬
‫ﺿﻤﺎﻥ ﺗﻨﻘﻴﺔ ﻫﺬﻩ ﺍﻷﺩﻟﺔ ﻣﻦ ﺷﻮﺍﺋﺐ ﺍﳊﻘﻴﻘﺔ ﺍﻟﻌﻠﻤﻴﺔ‪ ،‬ﻭﻳﻈﻞ ﺍﻟﻘﺎﺿﻲ ﻫﻮ ﺍﳌﺴﻴﻄﺮ ﻋﻠﻰ ﻫﺬﻩ ﺍﳊﻘﻴﻘﺔ‬
‫ﻷﻧﻪ ﻣﻦ ﺧﻼﻝ ﺳﻠﻄﺘﻪ ﺍﻟﺘﻘﺪﻳﺮﻳﺔ ﻳﺴﺘﻄﻴﻊ ﺃﻥ ﻳﻔﺴﺮ ﺍﻟﺸﻚ ﻟﺼﺎﱀ ﺍﳌﺘﻬﻢ ﻭﺃﻥ ﻳﺴﺘﺒﻌﺪ ﺍﻷﺩﻟﺔ ﺍﻟﱵ ﻳﺘﻢ‬
‫ﺍﳊﺼﻮﻝ ﻋﻠﻴﻬﺎ ﺑﻄﺮﻕ ﻏﲑ ﻣﺸﺮﻭﻋﺔ ﻭﺿﺮﻭﺭﻳﺔ ﺃﻛﺜﺮ ﻣﻦ ﺃﺟﻞ ﺟﻌﻞ ﺍﳊﻘﻴﻘﺔ ﺍﻟﻌﻠﻤﻴﺔ ﻗﻀﺎﺋﻴﺔ‪.‬‬

‫)‪(1‬ﲨﻴﻞ ﻋﺒﺪ ﺍﻟﺒﺎﻗﻲ ﺍﻟﺼﻐﲑ ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.22‬‬

‫‪- 222 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﳌﻄﺐ ﺍﻟﺜﺎﻟﺚ‪ :‬ﻣﻮﻗﻒ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻣﻦ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻓـﻴﻤﺠـﺎﻝ ﺍﻹﺛﺒﺎﺕ ﺍﳉﺰﺍﺋﻲ‬
‫ﺇﻥ ﺍﻹﺛﺒﺎﺕ ﰲ ﺍﳌﻮﺍﺩ ﺍﳉﻨﺎﺋﻴﺔ ﻫﻮ ﺍﻟﻨﺘﻴﺠﺔ ﺍﻟﱵ ﺗﺘﺤﻘﻖ ﺑﺎﺳﺘﻌﻤﺎﻝ ﻭﺳﺎﺋﻠﻪ ﻭﻃﺮﻗﻪ ﺍﳌﺨﺘﻠﻔﺔ‬
‫ﻟﻠﻮﺻﻮﻝ ﺇﱃ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺬﻱ ﻳﺴﺘﻌﲔ ﺑﻪ ﺍﻟﻘﺎﺿﻲ ﻹﺳﺘﺨﻼﺹ ﺣﻘﻴﻘﺔ ﺍﻟﻮﻗﺎﺋﻊ ﺍﳌﻌﺮﻭﺿﺔ ﻋﻠﻴﻪ ﻭ ﺇﻋﻤﺎﻝ‬
‫) ‪(1‬‬
‫ﺣﻜﻢ ﺍﻟﻘﺎﻧﻮﻥ ﻋﻠﻴﻬﺎ‪ ،‬ﻭﻳﻌﲏ ﺫﻟﻚ ﺃﻥ ﻣﻮﺿﻮﻉ ﺍﻹﺛﺒﺎﺕ ﻫﻮ ﺍﻟﻮﻗﺎﺋﻊ ﻭﻟﻴﺲ ﺍﻟﻘﺎﻧﻮﻥ‪.‬‬
‫ﻭﺑﺎﻟﺘﺎﱄ ﻓﺈﻥ ﺍﻹﺛﺒﺎﺕ ﺍﳉﺰﺍﺋﻲ ﻫﻮ ﻛﻞ ﻣﺎ ﻳﺆﺩﻱ ﺇﱃ ﻛﺸﻒ ﻏﻤﻮﺽ ﺍﳉﺮﳝﺔ ﻭﺇﻗﺎﻣﺔ ﺍﻟﺪﻟﻴﻞ ﻋﻠﻰ‬
‫ﻭﻗﻮﻋﻬﺎ ﻭﺍﻟﺘﺄﻛﺪ ﻣﻦ ﺃﻥ ﺍﳌﺘﻬﻢ ﻫﻮ ﻣﺮﺗﻜﺐ ﺍﳉﺮﳝﺔ ﺑﺎﻟﻔﻌﻞ ﻭﻭﺟﻮﺩ ﺍﻟﺪﻟﻴﻞ ﻋﻠﻰ ﺫﻟﻚ‪ ،‬ﻭﻳﻌﺘﱪ ﺍﻟﺪﻟﻴﻞ‬
‫ﺍﻟﻮﺳﻴﻠﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﱵ ﻳﺴﺘﻴﻌﻦ ‪‬ﺎ ﺍﻟﻘﺎﺿﻲ ﻟﻠﻮﺻﻮﻝ ﺇﱃ ﺍﳊﻘﻴﻘﺔ ﻭﻛﺸﻒ ﻏﻤﻮﺽ ﺍﳉﺮﳝﺔ ﻭﻧﺴﺒﺘﻬﺎ ﺇﱃ‬
‫ﺍﳌﺘﻬﻢ‪.‬‬
‫ﻭﻟﻘﺪ ﺫﻫﺐ ﺍﻟﻔﻘﻪ ﺍﻹﺟﺮﺍﺋﻲ ﺇﱃ ﻭﺿﻊ ﻧﻈﺎﻣﲔ ﺇﺟﺮﺍﺋﲔ ﰲ ﳎﺎﻝ ﺍﻹﺛﺒﺎﺕ ﺍﳉﺰﺍﺋﻲ ﳜﺘﻠﻔﺎﻥ ﻓﻴﻤﺎ‬
‫ﺑﻴﻨﻬﻤﺎ ﻣﻦ ﺣﻴﺚ ﺍﻷﺳﺲ ﺍﻟﱵ ﻳﻘﻮﻡ ﻋﻠﻴﻬﺎ ﻛﻞ ﻭﺍﺣﺪ ﻣﻨﻬﻤﺎ ﻭﻫﺬﻩ ﺍﻷﻧﻈﻤﺔ ﻫﻲ‪:‬‬
‫‪-‬ﻧﻈﺎﻡ ﺍﻹﺛﺒﺎﺕ ﺍﻟﻘﺎﻧﻮﱐ ﺃﻭ ﺍﳌﻘﻴﺪ ﻭﻓﻴﻪ ﳛﺪﺩ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻷﺩﻟﺔ ﺍﻟﱵ ﳚﻮﺯ ﺍﻷﺧﺬ ‪‬ﺎ ﻭﺍﻹﺳﺘﻨﺎﺩ ﻋﻠﻴﻬﺎ‬
‫ﻭﺍﻟﺜﺎﱐ ﻫﻮ ﻧﻈﺎﻡ ﺍﻹﺛﺒﺎﺕ ﺍﳊﺮ ﺃﻭ ﺍﳌﻄﻠﻖ ﻭﻓﻴﻪ ﻻ ﻳﻘﻴﺪ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﻘﺎﺿﻲ ﺑﺄﺩﻟﺔ ﻣﻌﻴﻨﺔ ﰲ ﺇﺛﺒﺎﺕ ﺍﻟﻮﺍﻗﻌﺔ‬
‫ﻭﻟﻪ ﺃﻥ ﻳﻘﺘﻨﻊ ﺑﺄﻱ ﺩﻟﻴﻞ ﻳﻌﺮﺽ ﻋﻠﻴﻪ‪.‬‬
‫ﻓﺄﻱ ﻣﻦ ﻫﺬﻳﻦ ﺍﻟﻨﻈﺎﻣﲔ ﺃﺧﺬ ﺍﻟﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻭﻣﺎ ﺃﺛﺮ ﺫﻟﻚ ﻋﻠﻰ ﻣﺴﺄﻟﺔ ﺍﻹﺛﺒﺎﺕ ﺑﺎﻟﺪﻟﻴﻞ‬
‫ﺍﻟﺮﻗﻤﻲ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺃﻧﻈـﻤﺔ ﺍﻹﺛﺒﺎﺕ ﺍﳉـﺰﺍﺋﻲ‬
‫ﻳﻮﺟﺪ ﰲ ﳎﺎﻝ ﺍﻹﺛﺒﺎﺕ ﺍﳉﺰﺍﺋﻲ ﻧﻈﺎﻣﺎﻥ‪:‬‬
‫ﺃﻭﻻ‪ :‬ﻧﻈﺎﻡ ﺍﻹﺛﺒﺎﺕ ﺍﳌﻘﻴﺪ ﺃﻭ ﻧﻈﺎﻡ ﺍﻷﺩﻟﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ‪Systémedela preuve légale:‬ﻣﻔﺎﺩ‬
‫ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ ﻫﻮ ﺃﻥ ﻳﺘﻘﻴﺪ ﺍﻟﻘﺎﺿﻲ ﰲ ﺣﻜﻤﻪ ﺳﻮﺍﺀ ﺑﺎﻹﺩﺍﻧﺔ ﺃﻭ ﺍﻟﱪﺍﺀﺓ ﺑﺄﻧﻮﺍﻉ ﻣﻌﻴﻨﺔ ﻣﻦ ﺍﻷﺩﻟــﺔ‬
‫ﻃﺒﻘﺎ ﳌﺎ ﻳﺮﲰﻪ ﺍﻟﺘﺸﺮﻳﻊ‪ ،‬ﻓﺎﻟﻔﻜﺮﺓ ﺍﻷﺳﺎﺳﻴﺔ ﳍﺬﺍ ﺍﻟﻨﻈﺎﻡ ﺗﻘﻮﻡ ﻋﻠﻰ ﺃﻥ ﺍﳌﺸـﺮﻋﻬﻮ ﺍﻟﺬﻱ ﻳﻜـﻮﻥ ﻟﻪ‬
‫ﺍﻟﺪﻭﺭ ﺍﻷﺳﺎﺳﻲ ﰲ ﺍﻹﺛﺒﺎﺕ‪ ،‬ﻭﺫﻟﻚ ﻣﻦ ﺧﻼﻝ ﺍﻟﺘﺤﺪﻳﺪ ﺍﳌﺴﺒﻖ ﻟﻸﺩﻟﺔ ﺍﳌﻘﺪﻣﺔ ﰲ ﺍﻟﺪﻋـﻮﻯ ﻭﺍﻟـﱵ‬
‫ﻳﺴﺘﻨﺪ ﺇﻟﻴﻬﺎ ﺍﻟﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﰲ ﺣﻜﻤﻪ ﻭﻻ ﺳﺒﻴﻞ ﻟﻪ ﺇﱃ ﺍﻹﺳﺘﻨﺎﺩ ﺇﱃ ﺃﻱ ﺩﻟﻴﻞ ﱂ ﻳﻨﺺ ﻋﻠﻴﻪ ﺍﻟﻘﺎﻧﻮﻥ‬
‫ﺻﺮﺍﺣﺔ ﺿﻤﻦ ﺃﺩﻟﺔ ﺍﻹﺛﺒﺎﺕ‪.‬‬

‫)‪(1‬ﺃﺷﺮﻑ ﻋﺒﺪ ﺍﻟﻘﺎﺩﺭ ﻗﻨﺪﻳﻞ ﺍﻟﻨﻈﺮﻳﺔ ﺍﻟﻌﺎﻣﺔ ﻟﻠﺒﺤﺚ ﺍﳉﻨﺎﺋﻲ ﻭﺃﺛﺮﻫﺎ ﰲ ﻋﻘﻴﺪﺓ ﺍﻟﻘﺎﺿﻲ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.212‬‬

‫‪- 223 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﰲ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ ﻻ ﻳﻜﻮﻥ ﻟﻠﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﺩﻭﺭ ﰲ ﺗﻘﺪﻳﺮ ﺍﻟﻘﻴﻤﺔ ﺍﻹﻗﻨﺎﻋﻴﺔ ﻟﻠﺪﻟﻴﻞ ﻓﻴﺘﻘﻴﺪ ﺍﻟﻘﺎﺿﻲ‬
‫ﻭﻓﻖ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ ﺑﺎﻷﺩﻟﺔ ﺍﻟﱵ ﺭﲰﻬﺎ ﺍﻟﺸﺮﻉ ﺳﻠﻔﺎ ﺩﻭﻥ ﺃﻥ ُﻳﻌﻤﻞ ﻓﻴﻬﺎ ﻣﻴﻮﻟﻪ ﺃﻭ ﺇﻗﺘﻨﺎﻋﻪ ﺍﻟﺸﺨﺼﻲ‬
‫ﺑﺸﺄ‪‬ﺎ‪ ،‬ﺇﺫ ﻳﻘﻮﻡ ﺇﻗﺘﻨﺎﻉ ﺍﻟﺸﺮﻉ ﻣﻘﺎﻡ ﺇﻗﺘﻨﺎﻉ ﺍﻟﻘﺎﺿﻲ ﻭﻋﻠﻴﻪ ﻓﺈﻥ ﺍﻟﻴﻘﲔ ﺍﻟﻘﺎﻧﻮﱐ ﻳﻘﻮﻡ ﺃﺳﺎﺳﺎ ﻋﻠﻰ‬
‫ﺇﻓﺘﺮﺍﺽ ﺻﺤﺔ ﺍﻟﺪﻟﻴﻞ ﺑﻐﺾ ﺍﻟﻨﻈﺮ ﻋﻦ ﺣﻘﻴﻘﺔ ﺍﻟﻮﺍﻗﻊ ﻭﺇﺧﺘﻼﻑ ﻇﺮﻭﻑ ﺍﻟﺪﻋﻮﻯ‪ ،‬ﻭﻳﺘﺠﻠﻰ ﺩﻭﺭ‬
‫ﺍﻟﻘﺎﺿﻲ ﰲ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ ﻛﻤﻄﺒﻖ ﻓﺤﺴﺐ ﻣﻦ ﺣﻴﺚ ﻣﺮﺍﻋﺎﺓ ﺗﻮﺍﻓﺮ ﺍﻟﺪﻟﻴﻞ ﻭﺷﺮﻭﻃﻪ‪ ،‬ﲝﻴﺚ ﺇﺫﺍ ﱂ ﺗﺘﻮﺍﻓﺮ‬
‫ﻫﺬﻩ ﺍﻟﺸﺮﻭﻁ ﻭﺗﻠﻚ ﺍﻵﻟﻴﺎﺕ ﺍﻟﱵ ﻳﺘﻄﻠﺒﻬﺎ ﺍﻟﻘﺎﻧﻮﻥ ﰲ ﺍﻟﺪﻟﻴﻞ ﻓﺈﻥ ﺍﻟﻘﺎﺿﻲ ﻻ ﻳﺴﺘﻄﻴﻊ ﺃﻥ ﳛﻜﻢ‬
‫ﺑﺎﻹﺩﺍﻧﺔ ﺣﱴ ﻭﻟﻮ ﻛﺎﻥ ﺇﻗﺘﻨﺎﻋﻪ ﻳﻘﻴﻨﻴﺎ ﺑﺈﺭﺗﻜﺎﺏ ﺍﳌﺘﻬﻢ ﻟﻠﺠﺮﳝﺔ ﺍﳌﺴﻨﺪﺓ ﺇﻟﻴﻪ‪.‬‬
‫ﻭﻳﻘﻮﻡ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ ﻋﻠﻰ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﳋﺼﺎﺋﺺ ﺃﳘﻬﺎ ﺃﻥ ﺩﻭﺭ ﺍﻟﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﺳﻠﱯ‪ ،‬ﺫﻟﻚ ﺃﻥ‬
‫ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ ﰲ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ ﳜﻀﻊ ﻟﻘﻮﺍﻋﺪ ﺷﻜﻠﻴﺔ ﺗﺘﻀﺢ ﰲ ﺳﻠﻄﺔ ﺍﻟﻘﺎﺿﻲ ﺍﳌﻘﻴﺪﺓ ﰲ ﺗﻘﺪﻳﺮ‬
‫ﻋﻨﺎﺻﺮ ﺍﻹﺛﺒﺎﺕ ﺍﻟﱵ ﻳﺴﺘﻤﺪ ﻣﻨﻬﺎ ﺇﻗﺘﻨﺎﻋﻪ ﻭﺗﻘﺪﻳﺮ ﻗﻴﻤﺔ ﺍﻷﺩﻟﺔ ﺍﳌﻌﺮﻭﺿﺔ ﻋﻠﻴﻪ‪ ،‬ﻛﻤﺎ ﻳﺘﻤﻴﺰ ﺃﻳﻀﺎ ﻫﺬﺍ‬
‫ﺍﻟﻨﻈﺎﻡ ﺑﺎﻟﺪﻭﺭ ﺍﻹﳚﺎﰊ ﻟﻠﻤﺸﺮﻉ ﰲ ﻋﻤﻠﻴﺔ ﺍﻹﺛﺒﺎﺕ ﻣﻦ ﺣﻴﺚ ﺃﻧﻪ ﻫﻮ ﺍﻟﺬﻱ ﻳﻨﻈﻢ ﻗﺒﻮﻝ ﺍﻷﺩﻟﺔ ﺳﻮﺍﺀ‬
‫ﻋﻦ ﻃﺮﻳﻖ ﺗﻌﻴﲔ ﺍﻷﺩﻟﺔ ﺍﳌﻘﺒﻮﻟﺔ ﻟﻠﺤﻜﻢ ﺑﺎﻹﺩﺍﻧﺔ‪ ،‬ﺃﻭ ﺑﺈﺳﺘﺒﻌﺎﺩ ﺃﺩﻟﺔ ﺃﺧﺮﻯ ﺃﻭ ﺑﺈﺧﻀﺎﻉ ﻛﻞ ﺩﻟﻴﻞ‬
‫ﻟﺸﺮﻭﻁ ﻣﻌﻴﻨﺔ‪ ،‬ﻭﺃﻧﻪ ﻫﻮ ﺍﻟﺬﻱ ﳛﺪﺩ ﺍﻟﻘﻴﻤﺔ ﺍﻹﻗﻨﺎﻋﻴﺔ ﻟﻜﻞ ﺩﻟﻴﻞ ﺑﺄﻥ ﻳﻌﻄﻲ ﻟﺒﻌﺾ ﺍﻷﺩﻟﺔ ﺍﳊﺠﻴﺔ‬
‫ﺍﻷﻗﻮﻯ ﺩﻭﻥ ﺍﻷﺩﻟﺔ ﺍﻷﺧﺮﻯ‪.‬‬
‫ﻭﻗﺪ ﺃﻋﺎﺏ ﺍﻟﻔﻘﻪ ﺍﳉﻨﺎﺋﻲ ﻋﻠﻰ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ ﺃﻧﻪ ﺃﺧﺮﺝ ﺍﻟﻘﺎﺿﻲ ﻣﻦ ﻭﻇﻴﻔﺘﻪ ﺍﻟﻄﺒﻴﻌﻴﺔ ﺍﻟﱵ ﺗﺘﻤﺜﻞ ﰲ‬
‫ﻓﺤﺼﺔ ﻟﻠﺪﻟﻴﻞ ﻭﺗﻘﺪﻳﺮﻩ‪ ،‬ﻭﻣﻦ ﰒ ﺗﻜﻮﻳﻦ ﺇﻗﺘﻨﺎﻋﻪ ﺍﻟﺸﺨﺼﻲ ﻭﺃﻗﺤﻢ ﺍﳌﺸﺮﻉ ﰲ ﻭﻇﻴﻔﺔ ﺍﻟﻘﺎﺿﻲ ﻭﺇﻣﻼﺀ‬
‫ﺃﺩﻟﺔ ﺍﻹﺩﺍﻧﺔ ﻋﻠﻴﻪ ﻋﻠﻰ ﺳﺒﻴﻞ ﺍﳊﺼﺮ‪.‬‬
‫ﻭﻣﻦ ﺍﻟﻌﻴﻮﺏ ﺍﻟﱵ ﻭﺍﺟﻬﻬﺎ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ ﺃﻳﻀﺎ ﺃﻧﻪ ﻗﺎﻡ ﺑﺘﻘﻨﲔ ﺍﻟﻴﻘﲔ ﰲ ﻧﺼﻮﺹ ﻗﺎﻧﻮﻧﻴﺔ ﳏﺪﺩﺓ‬
‫ﺳﻠﻔﺎ ﺭﻏﻢ ﺃﻥ ﺍﻟﻴﻘﲔ ﻣﺴﺄﻟﺔ ﻳﻄﺮﺣﻬﺎ ﺍﻟﻮﺍﻗﻊ ﻭﻳﻘﺪﺭﻫﺎ ﺍﻟﻘﺎﺿﻲ‪.‬‬
‫ﺛﺎﻧﻴﺎ‪ :‬ﻧﻈﺎﻡ ﺍﻹﺛﺒﺎﺕ ﺍﳊﺮ ﺃﻭ ﻧﻈﺎﻡ ﺍﻹﻗﺘﻨﺎﻉ ﺍﻟﺸﺨﺼﻲ ﻟﻠﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ‪:‬ﻭﻓﻘﺎ ﳍﺬﺍ ﺍﻟﻨﻈﺎﻡ ﻻ‬
‫ﻳﺮﺳﻢ ﺍﻟﻘﺎﻧﻮﻥ ﻃﺮﻗﺎ ﳏﺪﺩﺓ ﻟﻺﺛﺒﺎﺕ‪ ،‬ﺇﺫ ﻳﺘﻤﺘﻊ ﺍﻟﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﰲ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ ﲝﺮﻳﺔ ﻣﻄﻠﻘﺔ ﰲ ﺗﻜﻮﻳﻦ‬
‫ﺇﻋﺘﻘﺎﺩﻩ ﻣﻦ ﺃﻱ ﺩﻟﻴﻞ ُﻳﻄﺮﺡ ﺃﻣﺎﻣﻪ‪(1).‬ﻭﻣﻦ ﲦﺔ ﻓﺈﻥ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ ﻳﻘﻮﻡ ﻋﻠﻰ ﺧﺎﺻﻴﺘﲔ ﺃﺳﺎﺳﻴﺘﲔ‪:‬‬

‫)‪(1‬ﳏﻤﺪ ﻋﻴﺪ ﺍﻟﻐﺮﻳﺐ ﺣﺮﻳﺔ ﺍﻟﻘﺎﺿﻲ ﺍﳉﻨﺎﺋﻲ ﰲ ﺍﻹﻗﺘﻨﺎﻉ ﺍﻟﻴﻘﻴﲏ ﻭﺃﺛﺮﻩ ﰲ ﺗﺴﺒﻴﺐ ﺍﻷﺣﻜﺎﻡ‪،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.8‬‬

‫‪- 224 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪-‬ﺍﻷﻭﱃ ﺗﺘﻤﺜﻞ ﰲ ﺇﻃﻼﻕ ﺣﺮﻳﺔ ﺍﻹﺛﺒﺎﺕ ﻟﻠﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﺇﻧﻄﻼﻗﺎ ﻣﻦ ﻣﻮﺿﻮﻉ ﺍﻹﺛﺒﺎﺕ ﰲ‬
‫ﺍﳌﺴﺎﺋﻞ ﺍﳉﺰﺍﺋﻴﺔ ﻳﺘﻌﻠﻖ ﺑﻮﻗﺎﺋﻊ ﻣﺎﺩﻳﺔ ﻭﻧﻔﺴﻴﺔ ﻻ ﻳﺼﻠﺢ ﻹﺛﺒﺎ‪‬ﺎ ﲢﺪﻳﺪ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻹﺛﺒﺎﺗﻴﺔ‬
‫ﻣﺴﺒﻘﺎ‪ ،‬ﺑﻞ ﺇﻥ ﺍﻹﺛﺒﺎﺕ ﰲ ﻫﺬﻩ ﺍﳌﺴﺎﺋﻞ ﻳﻜﻮﻥ ﺑﻜﺎﻓﺔ ﻃﺮﻕ ﺍﻹﺛﺒﺎﺕ‪.‬‬
‫‪ -‬ﻭﺍﳋﺎﺻﻴﺔ ﺍﻟﺜﺎﻧﻴﺔ ﺗﺘﻤﺜﻞ ﰲ ﺣﺮﻳﺔ ﺍﻟﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﰲ ﺍﻹﻗﺘﻨﺎﻉ ﺑﺎﻟﺪﻟﻴﻞ ﺍﳌﻄﺮﻭﺡ ﻋﻠﻴﻪ ﰲ‬
‫ﺟﻠﺴﺔ ﺍﶈﺎﻛﻤﺔ ﺩﻭﻥ ﺃﻥ ﻳﻜﻮﻥ ﻋﻠﻴﻪ ﺃﻱ ﺭﻗﻴﺐ ﺳﻮﻯ ﺿﻤﲑﻩ ﻭﺩﻭﻥ ﺃﻥ ﻳﻜﻮﻥ ﻣﻄﺎﻟﺒﺎ ﺑﺒﻴﺎﻥ ﺳﺒﺐ‬
‫ﺇﻗﺘﻨﺎﻋﻪ ﺑﺪﻟﻴﻞ ﺩﻭﻥ ﺁﺧﺮ‪.‬‬
‫ﻭﻋﻠﻰ ﻫﺬﺍ ﺍﻷﺳﺎﺱ ﻳﻜﻮﻥ ﻟﻠﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﺩﻭﺭ ﻓﻌﺎﻝ ﺣﻴﺎﻝ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺬﻱ ﻳﻮﺿﻊ ﺃﻣﺎﻣﻪ‪ ،‬ﻭﻟﻪ ﰲ‬
‫ﻣﻘﺎﺑﻞ ﺫﻟﻚ ﻛﺎﻓﺔ ﺍﻟﺼﻼﺣﻴﺎﺕ ﺍﻟﱵ ﲤﻜﻨﻪ ﻣﻦ ﺇﲣﺎﺫ ﺍﻹﺟﺮﺍﺀ ﺍﻟﺬﻱ ﻳﺮﺍﻩ ﻣﻨﺎﺳﺒﺎ ﻭﳜﺪﻡ ﺇﻇﻬﺎﺭ ﺍﳊﻘﻴﻘﺔ‪.‬‬
‫ﻭﻋﻘﻴﺪﺓ ﺍﻟﻘﺎﺿﻲ ﻫﻲ ﻧﺘﺎﺝ ﻭﺯﻥ ﺍﻷﺩﻟﺔ ﺍﳌﻄﺮﻭﺣﺔ ﺑﺎﻟﺪﻋﻮﻯ ﺍﳉﺰﺍﺋﻴﺔ ﺃﻣﺎﻣﻪ ﻭﺍﻟﺬﻱ ﻳﻘﻮﻡ ﺑﻘﺒﻮﻝ‬
‫ﺍﻷﺩﻟﺔ ﺍﻟﱵ ﻗﺪﻣﻬﺎ ﺃﻃﺮﺍﻑ ﺍﻟﺪﻋﻮﻯ‪ ،‬ﻓﻼ ﻳﻮﺟﺪ ﺣﻈﺮ ﻋﻠﻰ ﺃﺩﻟﺔ ﺇﻻ ﺇﺫﺍ ﻛﺎﻧﺖ ﻏﲑ ﻣﺸﺮﻭﻋﺔ‪ .‬ﻭﻗﺪ‬
‫ﺫﻫﺐ ﺍﻟﺒﻌﺾ)‪(1‬ﺇﱃ ﺍﻟﻘﻮﻝ ﺃﻥ ﺍﻹﻗﺘﻨﺎﻉ ﺍﻟﺸﺨﺼﻲ ﻟﻠﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﻫﻮ ﺍﻟﻀﻤﺎﻧﺔ ﺍﳊﻘﻴﻘﻴﺔ ﻟﻀﺒﻂ ﻣﻴﺰﺍﻥ‬
‫ﺍﻟﻌﺪﺍﻟﺔ‪.‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪:‬ﻣﻮﻗﻒ ﺍﻟﺸﺮﻉ ﺍﳉﺰﺍﺋﻲ ﺍﳉﺰﺍﺋﺮﻱ ﻣﻦ ﺃﻧﻈﻤﺔ ﺍﻹﺛﺒﺎﺕ ﻭﺃﺛﺮ ﺫﻟﻚ ﰲ ﺇﺛﺒﺎﺕ‬
‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫ﻧﺼﺖ ﺍﳌﺎﺩﺓ ‪ 212‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﻋﻠﻰ ﺃﻧﻪ ﳚﻮﺯ ﺇﺛﺒﺎﺕ ﺍﳉﺮﺍﺋﻢ ﺑﺄﻱ ﻃﺮﻳﻖ ﻣﻦ‬
‫ﻃﺮﻕ ﺍﻹﺛﺒﺎﺕ ﻭﻟﻠﻘﺎﺿﻲ ﺃﻥ ﻳﺼﺪﺭ ﺣﻜﻤﻪ ﺗﺒﻌﺎ ﻹﻗﺘﻨﺎﻋﻪ ﺍﳋﺎﺹ‪ "....‬ﻛﻤﺎ ﻧﺼﺖ ﺍﳌﺎﺩﺓ ‪ 307‬ﻣﻦ‬
‫ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺃﻳﻀﺎ ﺃﻥ ﺍﻟﻘﺎﻧﻮﻥ ﻻ ﻳﻄﻠﺐ ﻣﻦ ﺍﻟﻘﻀﺎﺓ ﺃﻥ ﻳﻘﺪﻣﻮﺍ ﺣﺴﺎﺑﺎ ﻋﻦ ﺍﻟﻮﺳﺎﺋﻞ ﺍﻟﱵ‬
‫‪‬ﺎ ﻗﺪ ﻭﺻﻠﻮﺍ ﺇﱃ ﺗﻜﻮﻳﻦ ﺇﻗﺘﻨﺎﻋﻬﻢ ﻭﺃﻥ ﻳﺒﺤﺜﻮﺍ ﺑﺈﺧﻼﺹ ﺿﻤﺎﺋﺮﻫﻢ ﰲ ﺃﻱ ﺗﺄﺛﲑ ﻗﺪ ﺃﺣﺪﺛﺘﻪ ﰲ‬
‫ﺇﺩﺭﺍﻛﻬﻢ ﺍﻷﺩﻟﺔ ﺍﳌﺴﻨﺪﺓ ﻟﻠﻤﺘﻬﻢ‪"....‬‬
‫ﻭﻣﻦ ﺧﻼﻝ ﻫﺬﻳﻦ ﺍﻟﻨﺼﲔ ﺍﻟﻘﺎﻧﻮﻧﻴﲔ ﻳﺘﻀﺢ ﺟﻠﻴﺎ ﺃﻥ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻗﺪ ﺗﺒﲎ ﻛﻘﺎﻋﺪﺓ ﻋﺎﻣﺔ‬
‫ﻧﻈﺎﻡ ﺍﻹﻗﺘﻨﺎﻉ ﺍﻟﺸﺨﺼﻲ ﻟﻠﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ‪ ،‬ﺇﻻ ﻭﺍﺳﺘﺜﻨﺎﺀ ﳒﺪﻩ ﺃﺧﺬ ﺃﻳﻀﺎ ﺑﻨﻈﺎﻡ ﺍﻷﺩﻟﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﰲ‬
‫ﺇﺛﺒﺎﺕ ﺑﻌﺾ ﺍﳉﺮﺍﺋﻢ ﺃﻳﻦ ﺍﺷﺘﺮﻁ ﻹﺛﺒﺎ‪‬ﺎ ﺃﺩﻟﺔ ﻗﺎﻧﻮﻧﻴﺔ ﳏﺪﺩﺓ ﻣﺴﺒﻘﺎ ﻭﻋﻠﻰ ﺳﺒﻴﻞ ﺍﳊﺼﺮ)‪.(2‬‬

‫)‪(1‬ﺃﺷﺮﻑ ﻋﺒﺪ ﺍﻟﻘﺎﺩﺭ ﻗﻨﺪﻳﻞ‪ ،‬ﺍﳌﺮﺟﻊ ﺍﻟﺴﺎﺑﻖ‪ ،‬ﺹ‪.213‬‬


‫)‪ (2‬ﺃﻧﻈﺮ ﺍﳌﺎﺩﺗﲔ ‪ 339،341‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﺍﳉﺰﺍﺋﺮﻱ‬

‫‪- 225 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻭﺑﺘﺤﻠﻴﻞ ﺍﳌﺎﺩﺓ ‪ 212‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﳒﺪﻫﺎ ﺗﻜﺮﺱ ﻗﺎﻋﺪﺗﲔ ﺗﻜﻤﻞ ﺇﺣﺪﺍﳘﺎ‬
‫ﺍﻷﺧﺮﻯ‪ ،‬ﻗﺎﻋﺪﺓ ﺍﻹﻗﺘﻨﺎﻉ ﺍﳊﺮ ﻟﻠﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﻣﻦ ﺟﻬﺔ ﻭﻗﺎﻋﺪﺓ ﺣﺮﻳﺔ ﺇﺧﺘﻴﺎﺭ ﻭﺳﺎﺋﻞ ﺍﻹﺛﺒﺎﺕ‬
‫ﺍﳉﺰﺍﺋﻲ ﻣﻦ ﺟﻬﺔ ﺃﺧﺮﻯ‪.‬‬
‫ﻭﺇﺫﺍ ﻛﺎﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺫﻭ ﺍﻷﺻﺎﻟﺔ ﺍﻟﻌﻠﻤﻴﺔ ﻫﻮ ﺍﻷﻭﻓﺮ ﻭﺍﻷﻧﺴﺐ ﰲ ﺇﺛﺒﺎﺕ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﻓﻤﺎ ﻣﺪﻯ ﺇﻣﻜﺎﻧﻴﺔ ﺇﻋﻤﺎﻝ ﺍﻟﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﳌﺒﺪﺃ ﺍﻹﻗﺘﻨﺎﻉ ﺍﻟﺸﺨﺼﻲ ﺣﻴﺎﻝ ﻫﺬﺍ ﺍﻟﺪﻟﻴﻞ ﻃﺒﻘﺎ ﻷﺣﻜﺎﻡ‬
‫ﺍﳌﺎﺩﺓ ‪ 212‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‪.‬‬

‫ﺃﻭﻻ‪ :‬ﻣﻔﻬﻮﻡ ﺍﻹﻗﺘﻨﺎﻉ ﺍﻟﺸﺨﺼﻲ ﻟﻠﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ‪:‬ﺇﻥ ﺍﻹﻗﺘﻨﺎﻉ ﺍﻟﺸﺨﺼﻲ ﻟﻠﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﻫﻮ‬
‫ﻋﺒﺎﺭﺓ ﻋﻦ ﻧﺸﺎﻁ ﻋﻘﻠﻲ ﻻ ﻳﺘﺪﺧﻞ ﺍﳌﺸﺮﻉ ﻟﻴﺒﲔ ﻟﻠﻘﺎﺿﻲ ﻛﻴﻔﻴﺔ ﳑﺎﺭﺳﺘﻪ ﻭ ﺗﺮﲨﺘﻪ ﺇﱃ ﻭﺍﻗﻊ ﻣﻨﺘﺞ ﻭﻻ‬
‫ﻳﺮﺳﻢ ﻟﻪ ﻛﻴﻒ ﻳﺸﻜﻞ ﻣﻌﺎﺩﻻﺗﻪ ﺍﻟﺬﻫﻨﻴﺔ ﰲ ﳎﺎﻝ ﺗﻘﺪﻳﺮ ﺍﻷﺩﻟﺔ ﻟﻴﺼﻞ ﻣﻦ ﺧﻼﳍﺎ ﺇﱃ ﺍﳊﻘﻴﻘﺔ‪.‬‬
‫‪/1‬ﺗﻌﺮﻳﻒ ﻣﺒﺪﺃ ﺍﻹﻗﺘﻨﺎﻉ ﺍﻟﺸﺨﺼﻲ‪:‬ﻳﻌﺮﻑ ﻓﻘﻬﺎﺀ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﻨﺎﺋﻲ ﺍﻹﻗﺘﻨﺎﻉ ﺑﺄﻧﻪ ﺣﺎﻟﺔ ﺫﻫﻨﻴﺔ‬
‫ﺫﺍﺗﻴﺔ ﺗﺴﺘﻨﺘﺞ ﻣﻦ ﺍﻟﻮﻗﺎﺋﻊ ﺍﳌﻌﺮﻭﺿﺔ ﻋﻠﻰ ﺑﺴﺎﻁ ﺍﻟﺒﺤﺚ‪ ،‬ﺃﻭ ﲟﻌﲎ ﺁﺧﺮ ﻫﻮ ﺣﺎﻟﺔ ﺫﻫﻨﻴﺔ ﺫﻭ ﺧﺎﺻﻴﺔ‬
‫ﺫﺍﺗﻴﺔ ﻧﺘﻴﺠﺔ ﺗﻔﺎﻋﻞ ﺿﻤﲑ ﺍﻟﻘﺎﺿﻲ ﻭﺃﺩﻟﺔ ﺍﻹﺛﺒﺎﺕ ﺍﳌﻄﺮﻭﺣﺔ ﻭﺍﻟﱵ ﻳﺜﲑﻫﺎ ﺍﳋﺼﻮﻡ ﺇﻣﺎ ﻹﺛﺒﺎﺕ ﺃﻭ ﺇﻧﻜﺎﺭ‬
‫ﺇ‪‬ﺎﻡ‪(1).‬ﻛﻤﺎ ﻋ‪‬ﺮﻑ ﺍﻹﻗﺘﻨﺎﻉ ﺍﻟﺸﺨﺼﻲ ﺃﻳﻀﺎ ﺑﺄﻧﻪ ﺣﺎﻟﺔ ﺫﻫﻨﻴﺔ ﺫﺍﺗﻴﺔ ﺗﻨﺠﻢ ﻋﻦ ﺇﻣﻌﺎﻥ ﺍﻟﻔﻜﺮ ﰲ ﻭﻗﺎﺋﻊ‬
‫ﻣﻌﺮﻭﺿﺔ ﻣﻦ ﺃﺟﻞ ﲝﺜﻬﺎ ﻭﺍﻟﻮﺻﻮﻝ ﺑﻌﺪ ﺫﻟﻚ ﺇﱃ ﺣﺎﻟﺔ ﺗﻄﺮﺩ ﺍﻟﺸﻚ ﻭﺍﻹﺣﺘﻤﺎﻝ‪ ،‬ﻭﳚﺪ ﻫﺬﺍ ﺍﳌﺒﺪﺃ‬
‫ﻣﻨﺎﺧﻪ ﺍﻟﻄﺒﻴﻌﻲ ﺍﳌﻼﺋﻢ ﰲ ﻇﻞ ﻣﺬﻫﺐ ﺍﻹﺛﺒﺎﺕ ﺍﳊﺮ ﺍﻟﺬﻱ ﻻ ﻳﻀﻊ ﺗﻘﺪﻳﺮﺍ ﻣﺴﺒﻘﺎ ﻷﺩﻟﺔ ﻣﻌﻴﻨﺔ ﻻ ﳝﻜﻦ‬
‫ﺍﻟﻮﺻﻮﻝ ﺑﻐﲑﻫﺎ ﺇﱃ ﺍﻟﻴﻘﲔ‪(2).‬ﻭﻣﻦ ﺧﻼﻝ ﻫﺬﺍ ﺍﻟﺘﻌﺮﻳﻒ ﻓﺈﻥ ﺍﻹﻗﺘﻨﺎﻉ ﺍﻟﺸﺨﺼﻲ ﻟﻠﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ‬
‫ﻳﺘﻤﻴﺰ ﲞﺎﺻﻴﺘﲔ ﳘﺎ‪:‬‬
‫‪-‬ﺃﻧﻪ ﺣﺎﻟﺔ ﺫﻫﻨﻴﺔ ﻣﺒﻨﻴﺔ ﻋﻠﻰ ﺍﻹﺣﺘﻤﺎﻝ ﻭﺃﻥ ﺍﻟﻌﱪﺓ ﻟﻴﺴﺖ ﺑﻜﺜﺮ ﺍﻷﺩﻟﺔ ﻭﺇﳕﺎ ﲟﺎ ﺗﺘﺮﻛﻪ ﻣﻦ ﺃﺛﺮ ﰲ‬
‫ﻧﻔﺴﻴﺔ ﺍﻟﻘﺎﺿﻲ‪ ،‬ﻷﻥ ﻫﺬﺍ ﺍﻟﺘﺄﺛﲑ ﺳﻴﻠﻌﺐ ﺩﻭﺭﺍ ﰲ ﲢﺪﻳﺪ ﻣﺼﲑ ﺍﻟﺪﻋﻮﻯ ﺍﳉﺰﺍﺋﻴﺔ ﺑﺎﻹﺩﺍﻧﺔ ﺃﻭ ﺍﻟﱪﺍﺀﺓ‪.‬‬
‫‪ -‬ﻭﺍﳋﺎﺻﻴﺔ ﺍﻟﺜﺎﻧﻴﺔ ﺗﺘﻤﺜﻞ ﰲ ﺃﻥ ﺍﻟﻘﺎﺿﻲ ﺣﺮﰲ ﺃﻥ ﻳﺄﺧﺬ ﻋﻘﻴﺪﺗﻪ ﺃﻭ ﺇﻗﺘﻨﺎﻋﻪ ﻣﻦ ﺃﻱ ﺩﻟﻴﻞ ﻟﻜﻦ‬
‫ﳚﺐ ﺍﻟﺘﺄﻛﻴﺪ ﻫﻨﺎ ﺃﻥ ﺣﺮﻳﺔ ﺍﻹﺛﺒﺎﺕ ﰲ ﺍﳌﺴﺎﺋﻞ ﺍﳉﺰﺍﺋﻴﺔ ﻟﻴﺴﺖ ﺧﺎﺻﻴﺔ ﻳﺘﻤﻴﺰ ‪‬ﺎ ﺍﻟﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ‬

‫)‪(1‬ﻧﺼﺮ ﺍﻟﺪﻳﻦ ﻣﺎﺭﻭﻙ‪ ،‬ﺍﻟﻨﻈﺮﻳﺔ ﺍﻟﻌﺎﻣﺔ ﻟﻺﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ‪ ،‬ﺍﳉﺰﺀ ﺍﻷﻭﻝ‪ ،‬ﺹ‪.620‬‬
‫)‪(2‬ﺯﺑﺪﺓ ﻣﺴﻌﻮﺩ‪ ،‬ﺍﻹﻗﺘﻨﺎﻉ ﺍﻟﺸﺨﺺ ﻟﻠﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ‪ ،‬ﺍﳌﺆﺳﺴﺔ ﺍﻟﻮﻃﻨﻴﺔ ﻟﻠﻜﺘﺎﺏ ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ‪ ،‬ﺹ‪.08‬‬

‫‪- 226 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻟﺘﺘﺴﻊ ﺳﻠﻄﺘﻪ ﰲ ﺍﻹﺩﺍﻧﺔ ﺃﻭ ﺍﻟﱪﺍﺀﺓ ﻭﻟﻜﻨﻬﺎ‪ ،‬ﺗﺮﺟﻊ ﺇﱃ ﺃﻥ ﺍﻹﺛﺒﺎﺕ ﰲ ﺍﳌﺴﺎﺋﻞ ﺍﳉﺰﺍﺋﻴﺔ ﻭﺍﻟﻮﺻﻮﻝ ﺇﱃ‬
‫ﺍﻟﺪﻟﻴﻞ ﻣﺴﺄﻟﺔ ﺟﺪ ﺻﻌﺒﺔ ﻭﺫﻟﻚ ﻹﺧﺘﻼﻑ ﺃﺳﺎﻟﻴﺐ ﺇﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﻭﺃﻥ ﺍ‪‬ﺮﻡ ﻋﺎﺩﺓ ﻣﺎ ﻳﺴﻌﻰ ﺇﱃ‬
‫ﺇﺧﻔﺎﺀ ﺟﺮﳝﺘﻪ‪ ،‬ﻟﺬﻟﻚ ﻓﺎﻟﺒﺤﺚ ﻋﻦ ﺍﳊﻘﻴﻘﺔ ﻣﻦ ﺧﻼﻝ ﺍﻷﺩﻟﺔ ﺍﳉﺰﺍﺋﻴﺔ ﻻ ﻳﻜﻮﻥ ﺇﻻ ﻋﻦ ﻃﺮﻳﻖ ﻣﻨﺢ‬
‫ﺍﻟﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﻫﺎﻣﺸﺎ ﻋﻦ ﺍﳊﺮﻳﺔ ﳌﻨﺎﻗﺸﺔ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺬﻱ ﻳﺮﺍﻩ ﻣﻨﺎﺳﺒﺎ ﰲ ﺇﺛﺒﺎﺕ ﺍﳉﺮﳝﺔ‪.‬‬

‫‪- 227 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫‪/2‬ﻭﺳﺎﺋﻞ ﺗﻜﻮﻳﻦ ﺍﻹﻗﺘﻨﺎﻉ ﺍﻟﺸﺨﺼﻲ ﻟﻠﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ‪ :‬ﺇﻥ ﺍﳉﻬﺪ ﺍﻹﺳﺘﻨﺒﺎﻃﻲ ﺍﻟﺬﻱ ﻳﺒﺬﻟﻪ‬
‫ﺍﻟﻘﺎﺿﻲ ﻣﻦ ﺧﻼﻝ ﻧﺸﺎﻃﻪ ﺍﻟﻌﻘﻠﻲ ﺍﳌﻜﻮﻥ ﻟﻘﻨﺎﻋﺘﻪ ﻭ ﺍﻟﺬﻱ ﻳﻨﺼﺮﻑ ﺇﱃ ﻓﺮﺯ ﺍﳊﻘﻴﻘﺔ ﻣﻦ ﺍﻟﺪﻟﻴﻞ ﳏﻞ‬
‫ﺗﻘﺪﻳﺮﻫﲑﺗﻜﺰ ﻓﻴﻪ ﺍﻟﻘﺎﺿﻲ ﻋﻠﻰ‪:‬‬
‫‪ -‬ﻗﺒﻮﻟﻪ ﲨﻴﻊ ﺍﻷﺩﻟﺔ ﺍﳌﻄﺮﻭﺣﺔ ﺃﻣﺎﻣﻪ ﰲ ﺍﳉﻠﺴﺔ ﻭﻻ ﳛﻈﺮ ﻋﻠﻰ ﺍﻟﻘﺎﺿﻲ ﺃﻭ ﻳﻔﺮﺽ ﻋﻠﻴﻪ ﺩﻟﻴﻞ‬
‫ﳏﺪﺩ ﻭﻻ ﻳﺘﻘﻴﺪ ﺇﻻ ﺑﻘﻴﺪ ﻣﺸﺮﻭﻋﻴﺔ ﺍﻟﺪﻟﻴﻞ ﻭﺃﻧﻪ ﻗﺪ ﰎ ﻃﺮﺣﻪ ﻟﻠﻤﻨﺎﻗﺸﺔ ﺑﺎﳉﻠﺴﺔ‪.‬‬
‫‪ -‬ﺃﻥ ﻳﻘﻮﻡ ﺍﻟﻘﺎﺿﻲ ﺑﻮﺯﻥ ﻛﻞ ﺩﻟﻴﻞ ﻋﻠﻰ ﺣﺪﻯ ﻋﻦ ﺑﺎﻗﻲ ﺍﻷﺩﻟﺔ ﺍﳌﻄﺮﻭﺣﺔ ﺃﻣﺎﻣﻪ ﻭﻟﻪ ﺃﻥ ﻳﻬﺪﺭ‬
‫ﺃﻱ ﺩﻟﻴﻞ ﻣﻬﻤﺎ ﻛﺎﻧﺖ ﻗﻴﻤﺘﻪ ﻃﺎﳌﺎ ﺃﻧﻪ ﱂ ﻳﻄﻤﺌﻦ ﺇﻟﻴﻪ‪.‬‬
‫‪ -‬ﺳﻠﻄﺔ ﺍﻟﻘﺎﺿﻲ ﰲ ﺗﻨﺴﻴﻖ ﺍﻷﺩﻟﺔ ﺍﳌﻄﺮﻭﺣﺔ ﺃﻣﺎﻣﻪ ﻭﻣﺴﺎﻧﺪﺓ ﺍﻷﺩﻟﺔ ﻟﺒﻌﻀﻬﺎ ﺃﻭ ﻣﺎ ﻳﻌﺮﻑ‬
‫ﺑﺘﺴﺎﻧﺪ ﺍﻷﺩﻟﺔ‪.‬‬
‫ﺛﺎﻧﻴﺎ‪ :‬ﺳﻠﻄﺔ ﺍﻟﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﰲ ﺗﻘﺪﻳﺮ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪:‬ﺇﻥ ﺍﻷﺻﺎﻟﺔ ﺍﻟﻌﻠﻤﻴﺔ ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‬
‫ﺟﻌﻠﺖ ﻣﻦ ﺳﻠﻄﺔ ﺍﻟﻘﺎﺿﻲ ﰲ ﺗﻘﺪﻳﺮ ﻫﺬﺍ ﺍﻟﺪﻟﻴﻞ ﳏﻞ ﺧﻼﻑ ﻓﻘﻬﻲ‪ ،‬ﺇﺫ ﺃﻥ ﻫﻨﺎﻙ ﻣﻦ ﻳﺮﻯ ﺃﻥ ﺍﻟﺪﻟﻴﻞ‬
‫ﺍﻟﻌﻠﻤﻲ ﻭﻣﻨﻪ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻟﻪ ﻗﻮﺗﻪ ﺍﻟﺜﺒﻮﺗﻴﺔ ﺍﳌﻠﺰﻣﺔ ﺣﱴ ﻟﻠﻘﺎﺿﻲ‪ ،‬ﻣﺴﺘﻨﺪﻳﻦ ﰲ ﺭﺃﻳﻬﻢ ﺇﱃ ﺃﻥ ﻫﺬﺍ‬
‫ﺍﻟﺪﻟﻴﻞ ﻳﺘﺴﻢ ﺑﺎﻟﺪﻗﺔ ﺍﻟﻌﻠﻤﻴﺔ ﺍﻟﱵ ﻳﺒﻠﻎ ﻣﻌﻬﺎ ﺇﱃ ﺩﺭﺟﺔ ﺍﻟﻴﻘﲔ ﻭﻫﻨﺎﻙ ﻣﻦ ﻳﺮﻯ ﺃﻥ ﻣﺒﺪﺃ ﺣﺮﻳﺔ ﺍﻟﻘﺎﺿﻲ‬
‫ﰲ ﺍﻹﻗﺘﻨﺎﻉ ﳚﺐ ﺃﻥ ﻳﺒﺴﻂ ﺳﻠﻄﺎﻧﻪ ﻋﻠﻰ ﻛﻞ ﺍﻷﺩﻟﺔ ﺩﻭﻥ ﺇﺳﺘﺜﻨﺎﺀ ﺣﱴ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪ ،‬ﻣﻌﺘﱪﻳﻦ‬
‫ﺃﻥ ﺇﻋﻄﺎﺀ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻗﻮﺓ ﺛﺒﻮﺗﻴﺔ ﻻ ﻳﺴﺘﻄﻴﻊ ﺍﻟﻘﺎﺿﻲ ﻣﻨﺎﻗﺸﺘﻬﺎ ﺃﻭ ﺗﻘﺪﻳﺮﻫﺎ ﻳﻌﺪ ﲟﺜﺎﺑﺔ ﺭﺟﻮﻉ ﺇﱃ‬
‫ﻣﺬﻫﺐ ﺍﻹﺛﺒﺎﺕ ﺍﻟﻘﺎﻧﻮﱐ )ﺍﳌﻘﻴﺪ(‪.‬ﻭﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻛﻤﺎ ﺳﺒﻖ ﺑﻴﺎﻧﻪ ﺃﺟﺎﺯ ﺇﺛﺒﺎﺕ ﺍﳉﺮﺍﺋﻢ ﺑﺄﻱ ﻃﺮﻳﻖ‬
‫ﻣﻦ ﻃﺮﻕ ﺍﻹﺛﺒﺎﺕ ﻣﺎ ﻋﺪﺍ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﻗﺪ ﻳﺘﻄﻠﺐ ﺇﺛﺒﺎ‪‬ﺎ ﺩﻟﻴﻼ ﻣﻌﻴﻨﺎ‪ ،‬ﻭﻣﻨﺢ ﺍﻟﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﺳﻠﻄﺔ‬
‫ﺗﻘﺪﻳﺮ ﺍﻟﺪﻟﻴﻞ ﻭﺍﳊﺮﻳﺔ ﰲ ﺗﻜﻮﻳﻦ ﺇﻗﺘﻨﺎﻋﻪ ﻣﻦ ﺃﻱ ﺩﻟﻴﻞ ﻳﻄﻤﺌﻦ ﺇﻟﻴﻪ‪ ،‬ﻓﻬﻞ ﺗﻨﺼﺮﻑ ﻫﺬﻩ ﺍﻟﺴﻠﻄﺔ‬
‫ﺍﻟﺘﻘﺪﻳﺮﻳﺔ ﺍﻟﱵ ﻳﺘﻤﺘﻊ ‪‬ﺎ ﺍﻟﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﺇﱃ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺍﳌﺴﺘﺨﺮﺝ ﻣﻦ ﺍﻟﻮﺳﺎﺋﻞ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ؟‬
‫ﻟﻘﺪ ﺳﺒﻖ ﺍﻟﺬﻛﺮ ﺃﻥ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﺰﺍﺋﺮﻱ ﺗﺸﻤﻞ ﺍﻷﻓﻌﺎﻝ ﺍﳌﺎﺳﺔ ﺑﺄﻧﻈﻤﺔ‬
‫ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ﻭﻛﺬﺍ ﻛﻞ ﺟﺮﳝﺔ ﺃﺧﺮﻯ ﺗﺮﺗﻜﺐ ﺃﻭ ﻳﺴﻬﻞ ﺇﺭﺗﻜﺎ‪‬ﺎ ﺑﻮﺍﺳﻄﺔ ﻣﻨﻈﻮﻣﺔ‬
‫ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻭ ﻧﻈﺎﻡ ﻟﻺﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﻭﻫﺬﻩ ﺍﻷﺧﲑﺓ ﻗﺪ ﺗﻨﺼﺮﻑ ﺇﱃ ﺟﺮﺍﺋﻢ ﺗﻘﻠﻴﺪﻳﺔ ﻣﻨﺼﻮﺹ‬
‫ﻋﻠﻴﻬﺎ ﰲ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﳝﻜﻦ ﺣﺴﺐ ﻃﺒﻴﻌﺘﻬﺎ ﺃﻥ ﺗﺮﺗﻜﺐ ﺑﻮﺍﺳﻄﺔ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﻫﺬﺍ ﻳﻌﲏ‬
‫ﺃﻥ ﺍﻹﺟﺮﺍﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻗﺪ ﻳﺄﺧﺬ ﻭﺻﻒ ﺍﳉﻨﺎﻳﺔ ﺃﻭ ﺍﳉﻨﺤﺔ ﺃﻭ ﺍﳌﺨﺎﻟﻔﺔ ﺣﺴﺐ ﻭﺻﻒ ﺍﳉﺮﻡ ﺍﳌﺮﺗﻜﺐ‬
‫ﺑﻮﺍﺳﻄﺔ ﺍﳌﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬ﻭﺇﻥ ﻛﺎﻥ ﻣﺒﺪﺃ ﺍﻹﻗﺘﻨﺎﻉ ﺍﻟﻘﻀﺎﺋﻲ ﻋﺎﻡ ﺍﻟﻨﻄﺎﻕ ﻟﺪﻯ ﻛﺎﻓﺔ ﺃﻧﻮﺍﻉ‬

‫‪- 228 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﺍﶈﺎﻛﻤﺎﳉﺰﺍﺋﻴﺔ ﺳﻮﺍﺀ ﻛﺎﻧﺖ ﳏﺎﻛﻢ ﺍﳉﻨﺎﻳﺎﺕ ﺃﻡ ﺍﳉﻨﺢ ﺃﻡ ﺍﳌﺨﺎﻟﻔﺎﺕ )‪،(1‬ﻓﺈﻥ ﻗﻮﺍﻋﺪ ﺑﻴﺎﻥ ﻋﻨﺎﺻﺮ ﺗﻘﺪﻳﺮ‬
‫ﺍﻟﺪﻟﻴﻞ ﲣﺘﻠﻒ ﺣﺴﺐ ﺇﺧﺘﻼﻑ ﻭﺻﻒ ﺍﻟﻔﻌﻞ ﺍ‪‬ﺮﻡ‪ .‬ﻓﺈﺫﺍ ﻛﺎﻥ ﺍﻟﻔﻌﻞ ﻣﻦ ﻃﺒﻴﻌﺔ ﺟﻨﺎﺋﻴﺔ ﻓﺈﻥ ﳏﻜﻤﺔ‬
‫ﺍﳉﻨﺎﻳﺎﺕ ﺗﺘﻤﺘﻊ ﺑﺴﻠﻄﺔ ﺗﻘﺪﻳﺮﻳﺔ ﻣﻄﻠﻘﺔ ﰲ ﻣﻮﺍﺟﻬﺔ ﺍﻷﺩﻟﺔ ﺍﳌﻌﺮﻭﺿﺔ ﺃﻣﺎﻣﻬﺎ ﻭﺗﺼﺪﺭ ﺃﺣﻜﺎﻣﻬﺎ ﺩﻭﻥ ﺃﻥ‬
‫ﻳﻜﻮﻥ ﻗﻀﺎ‪‬ﺎ ﻣﻄﺎﻟﺒﲔ ﺑﺘﺴﺒﻴﺐ ﺃﺣﻜﺎﻣﻬﻢ ﻭﻻ ﺭﻗﺎﺑﺔ ﳉﻬﺎﺕ ﺍﻟﻄﻌﻦ ﻋﻠﻴﻬﻢ‪.‬ﺃﻣﺎ ﺇﺫﺍ ﺃﺧﺬ ﺍﻟﻔﻌﻞ ﺍ‪‬ﺮﻡ‬
‫ﻭﺻﻒ ﺍﳉﻨﺤﺔ ﻓﺈﻥ ﻗﺎﺿﻲ ﺍﳉﻨﺢ ﻣﻄﺎﻟﺐ ﺑﻌﺮﺽ ﻭﺑﻴﺎﻥ ﺗﻘﺪﻳﺮﻩ ﻟﻠﺪﻟﻴﻞ ﺍﳌﻌﺮﻭﺽ ﻋﻠﻴﻪ ﻣﻦ ﺧﻼﻝ‬
‫ﺗﺴﺒﻴﺐ ﺣﻜﻤﻪ‪ ،‬ﻭﺍﻟﺬﻱ ﻳﻜﻮﻥ ﳏﻞ ﺭﻗﺎﺑﺔ ﻣﻦ ﺟﻬﺎﺕ ﺍﻟﻄﻌﻦ‪(2)،‬ﳍﺬﺍ ﻓﻬﻮ ﻣﻄﺎﻟﺐ ﺑﺈﺣﺘﺮﺍﻡ ﺍﻟﻘﻮﺍﻋﺪ‬
‫ﺍﻟﻌﺎﻣﺔ ﺍﳌﻨﻈﻤﺔ ﻟﻠﻘﻮﺓ ﺍﻟﺜﺒﻮﺗﻴﺔ ﻟﻜﻞ ﻭﺳﻴﻠﺔ ﻣﻦ ﻭﺳﺎﺋﻞ ﺍﻹﺛﺒﺎﺕ ﻭﺍﻟﱵ ﻗﺪ ﺗﺄﺧﺬ ﺷﻜﻞ ﳏﺎﺿﺮ ﻣﻌﺪﺓ‬
‫ﲟﻨﺎﺳﺒﺔ ﺗﻔﺘﻴﺶ ﺃﻭ ﺇﻋﺘﺮﺍﺽ ﻣﺮﺍﺳﻼﺕ ﺃﻭ ﺷﻜﻞ ﺗﻘﺮﻳﺮ ﺧﱪﺓ ﳏﺮﺭ ﲟﻨﺎﺳﺒﺔ ﻣﻌﺎﻳﻨﺔ ﻭﻓﺤﺺ ﺍﻷﺩﻟﺔ‬
‫ﺍﳌﻀﺒﻮﻃﺔ ﻣﻦ ﺟﻬﺎﺯ ﺍﻹﻋﻼﻡ ﺍﻵﱄ ﺃﻭ ﺩﻋﺎﻣﺎﺕ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ‪.‬‬
‫ﻓﺄﻣﺎ ﻣﺎ ﻳﺘﻌﻠﻖ ﺑﺎﶈﺎﺿﺮ ﻓﺈﻥ ﺍﻟﺸﺮﻉ ﺇﻋﺘﱪ ﺃ‪‬ﺎ ﻛﻘﺎﻋﺪﺓ ﻋﺎﻣﺔ ﳎﺮﺩ ﺇﺳﺘﺪﻻﻻﺕ ﻣﺎ ﱂ ﻳﻨﺺ‬
‫ﺍﻟﻘﺎﻧﻮﻥ ﻋﻠﻰ ﺧﻼﻑ ﺫﻟﻚ‪ ،‬ﻭﻻ ﻳﻜﻮﻥ ﻟﻠﻤﺤﻀﺮ ﺃﻱ ﻗﻮﺓ ﺇﺛﺒﺎﺕ ﺇﻻ ﺇﺫﺍ ﻛﺎﻥ ﺻﺤﻴﺤﺎ ﻣﻦ ﺣﻴﺚ‬
‫ﺍﻟﺸﻜﻞ‪ ،‬ﻭﺃﻧﻪ ﻗﺪ ﰎ ﺇﻋﺪﺍﺩﻩ ﻣﻦ ﻃﺮﻑ ﻭﺍﺿﻌﻪ ﺃﺛﻨﺎﺀ ﻣﺒﺎﺷﺮﺓ ﺃﻋﻤﺎﻝ ﻭﻇﻴﻔﺘﻪ‪ ،‬ﻭﻳﻜﻮﻥ ﻣﻀﻤﻮﻧﻪ ﻣﺎ‬
‫ﻳﺪﺧﻞ ﰲ ﺇﺧﺘﺼﺎﺻﻪ‪(3).‬ﺇﻻ ﺃﻥ ﺍﶈﺎﺿﺮ ﺍﻟﱵ ﳜﻮﻝ ﺍﻟﻘﺎﻧﻮﻥ ﻟﻀﺒﺎﻁ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺇﻋﺪﺍﺩﻫﺎ ﺑﻨﺺ‬
‫) ‪(4‬‬
‫ﺧﺎﺹ ﻹﺛﺒﺎﺕ ﺟﻨﺢ ﻣﻌﻴﻨﺔ ﻓﺈﻥ ﻫﺬﻩ ﺍﶈﺎﺿﺮ ﺗﻜﻮﻥ ﳍﺎ ﺣﺠﻴﺘﻬﺎ ﻣﺎ ﱂ ﻳﺪﺣﻀﻬﺎ ﺩﻟﻴﻞ ﻋﻜﺴﻲ‪.‬‬
‫ﺃﻣﺎ ﺑﺎﻟﻨﺴﺒﺔ ﻟﺘﻘﺎﺭﻳﺮ ﺍﳋﱪﺓ ﻓﺈﻥ ﺍﶈﻜﻤﺔ ﺍﻟﻌﻠﻴﺎ ﺫﻫﺒﺖ ﻟﻠﻘﻮﻝ ﺃﻥ ﺍﳋﱪﺓ ﺷﺄ‪‬ﺎ ﺷﺄﻥ ﺑﺎﻗﻲ ﺃﺩﻟﺔ‬
‫ﺍﻹﺛﺒﺎﺕ ﲣﻀﻊ ﻟﻠﺴﻠﻄﺔ ﺍﻟﺘﻘﺪﻳﺮﻳﺔ ﻟﻘﺎﺿﻲ ﺍﳌﻮﺿﻮﻉ‪(5)،‬ﻭﻫﺬﺍ ﺍﳌﻌﲎ ﺗﺆﻛﺪﻩ ﺍﳌﺎﺩﺓ ‪ 215‬ﻣﻦ ﻗﺎﻧﻮﻥ‬
‫ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺍﻟﱵ ﺗﻨﺺ ﻋﻠﻰ ﺃﻧﻪ‪ ":‬ﻻ ﺗﻌﺘﱪ ﺍﻟﺘﻘﺎﺭﻳﺮ ﺍﳌﺜﺒﺘﺔ ﻟﻠﺠﻨﺎﻳﺎﺕ ﺃﻭ ﺍﳉﻨﺢ ﺇﻻ ﳎﺮﺩ‬
‫ﺇﺳﺘﺪﻻﻻﺕ‪."....‬‬

‫)‪(1‬ﻭﺇﻥ ﻛﺎﻥ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﱂ ﳛﺪﺩ ﺫﻟﻚ ﺻﺮﺍﺣﺔ ﰲ ﺍﳌﻮﺍﺩ ﺍﳌﻘﺮﺭﺓ ﳍﺬﺍ ﺍﳌﺒﺪﺃ ﺭﺍﺟﻊ ﺍﳌﻮﺍﺩ ‪ 307. 212‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﲞﻼﻑ‬
‫ﺍﳌﺸﺮﻉ ﺍﻟﻔﺮﻧﺴﻲ ﻓﻘﺪ ﺻﺮﺡ ﺫﻟﻚ ﺻﺮﺍﺣﺔ ﺣﻴﺚ ﺧﺼﺺ ﺍﳌﺎﺩﺓ )‪ (1-353‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﻟﺘﻄﺒﻴﻖ ﺍﳌﺒﺪﺃ ﺃﻣﺎﻡ ﳏﻜﻤﺔ ﺍﳉﻨﺎﻳﺎﺕ ﻛﻤﺎ‬
‫ﻧﺼﺖ ﺍﳌﺎﺩﺓ )‪ (427‬ﻣﻦ ﺫﺍﺕ ﺍﻟﻘﺎﻧﻮﻥ ﻋﻠﻰ ﺗﻄﺒﻴﻖ ﻫﺬﺍ ﺍﳌﺒﺪﺃ ﺑﺎﻟﻨﺴﺒﺔ ﶈﺎﻛﻢ ﺍﳉﻨﺢ‪.‬‬
‫)‪(2‬ﺃﻧﻈﺮ ﺍﳌﺎﺩﺓ ‪ 379‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺍﳉﺰﺍﺋﺮﻱ ﻭﺍﻟﱵ ﺗﻘﺎﺑﻠﻬﺎ ﺍﳌﺎﺩﺗﲔ ‪ 593-485‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺍﻟﻔﺮﻧﺴﻲ‪.‬‬
‫)‪(3‬ﺃﻧﻈﺮ ﺍﳌﺎﺩﺓ ‪ 214‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‪.‬‬
‫)‪(4‬ﺃﻧﻈﺮ ﺍﳌﺎﺩﺓ ‪ 216‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ‪.‬‬
‫)‪(5‬ﻭﺭﺩ ﰲ ﻣﻀﻤﻮﻥ ﻗﺮﺍﺭ ﺍﶈﻜﻤﺔ ﺍﻟﻌﻠﻴﺎ ﺍﳌﺆﺭﺥ ﰲ ‪ 1995/07/11‬ﺍﳌﻨﺸﻮﺭ ﰲ ﻧﺸﺮﺓ ﺍﻟﻘﻀﺎﺀ ﺭﻗﻢ ‪ 58‬ﻟﺴﻨﺔ ‪ ،2006‬ﺹ‪.170‬‬

‫‪- 229 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﱘ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‬

‫ﻟﻜﻦ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﻌﻠﻤﻴﺔ ﻭﺍﻟﺘﻘﻨﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻏﺎﻟﺒﺎ ﻣﺎ ﺗﻔﺮﺽ ﻋﻠﻰ ﺍﻟﻘﺎﺿﻲ ﺍﻹﺳﺘﻨﺎﺩ ﰲ‬
‫ﺗﻜﻮﻳﻦ ﺇﻗﺘﻨﺎﻋﻪ ﻋﻠﻰ ﺍﳋﱪﺓ ﺍﻟﻔﻨﻴﺔ ﻭﺍﻟﺘﻘﻴﺪ ﺑﺎﻟﻨﺘﻴﺠﺔ ﺍﳌﺘﻮﺻﻞ ﺇﻟﻴﻬﺎ ﺍﳋﺒﲑ ﰲ ﺗﻘﺮﻳﺮ ﺧﱪﺗﻪ ﻭﻻ ﳝﻜﻨﻪ‬
‫ﻃﺮﺣﻬﺎ ﻭﺇﺳﺘﺒﻌﺎﺩﻫﺎ ﺇﻻ ﺇﺫﺍ ﻗﺪﺭ ﺃﻥ ﻣﺎ ﲢﻤﻠﻪ ﻣﻦ ﺃﺩﻟﺔ ﻻ ﻳﺘﻮﺍﻓﻖ ﻣﻊ ﻇﺮﻭﻑ ﻭﻣﻼﺑﺴﺎﺕ ﺍﻟﻮﺍﻗﻌﺔ ﺃﻭ‬
‫ﺗﺘﻨﺎﻗﺾ ﻣﻊ ﺍﳊﻘﻴﻘﺔ ﺍﻟﻌﻠﻤﻴﺔ‪.‬ﻓﺤﺴﺐ ﺍﻹﺟﺘﻬﺎﺩ ﺍﻟﻘﻀﺎﺋﻲ ﺃﻧﻪ ﺃﺣﻴﺎﻧﺎ ﻣﺎ ﺗﻜﻮﻥ ﺍﳋﱪﺓ ﻭﺣﺪﻫﺎ ﻛﺎﻓﻴﺔ‬
‫ﺑﺎﻟﻨﺴﺒﺔ ﻟﻠﻘﺎﺿﻲ ﻋﻨﺪﻣﺎ ﻳﻜﻮﻥ ﻣﻄﺎﻟﺒﺎ ﻟﻠﻔﺼﻞ ﰲ ﻭﻗﺎﺋﻊ ﺫﺍﺕ ﻃﺎﺑﻊ ﺗﻘﲏ ﺩﻭﻥ ﺃﻥ ﳛﺘﺎﺝ ﺇﱃ‬
‫) ‪(1‬‬
‫ﻣﻨﺎﻗﺸﺘﻬﺎ‪.‬‬
‫ﻭﰲ ﺍﻷﺧﲑ ﳝﻜﻦ ﺍﻟﻘﻮﻝ ﺃﻥ ﺇﺳﺎﺀﺓ ﺍﺳﺘﺨﺪﺍﻡ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﻌﺪ ﻣﻦ ﺍﳌﻮﺿﻮﻋﺎﺕ ﺍﻟﱵ ﻓﺮﺿﺖ‬
‫ﻧﻔﺴﻬﺎ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻟﻮﻃﲏ ﻭ ﺍﻟﺪﻭﱄ ﻋﻠﻰ ﺣﺪ ﺳﻮﺍﺀ‪ ،‬ﻭﺃﺟﱪﺕ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﻲ ﻋﻠﻰ ﺍﻟﺘﺪﺧﻞ ﻣﻦ‬
‫ﺃﺟﻞ ﻣﻮﺍﺟﻬﺘﻬﺎ ﺑﺘﺸﺮﻳﻌﺎﺕ ﺣﺎﲰﺔ ﳌﻜﺎﻓﺤﺘﻬﺎ ﻭﻣﻌﺎﻗﺒﺔ ﻣﺮﺗﻜﺒﻴﻬﺎ‪.‬ﺇﻻ ﺃﻥ ﺫﻟﻚ ﻳﺒﺪﻭ ﻏﲑ ﻛﺎﻑ ﻟﺘﺤﻘﻴﻖ‬
‫ﻫﺬﺍ ﺍﳍﺪﻑ ﻓﻌﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻹﺟﺮﺍﺋﻲ ﺗﺜﲑ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﺸﻜﻼﺕ ﻋﺪﺓ ﺑﺪﺀﺍﻣﻦ ﻣﺮﺣﻠﺔ ﺍﻹﺳﺘﺪﻻﻝ‬
‫ﺣﱴ ﺻﺪﻭﺭ ﺍﳊﻜﻢ ﺍﳉﺰﺍﺋﻲ ﻻ ﺳﻴﻤﺎ ﻓﻴﻤﺎ ﻳﺘﻌﻠﻖ ﺑﺈﺛﺒﺎﺕ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻣﺪﻯ ﺻﻼﺣﻴﺔ ﺍﻟﺪﻟﻴـﻞ‬
‫ﺍﻟﺮﻗﻤﻲ ﻟﻺﺛﺒﺎﺕ ﻭﻣﺪﻯ ﺷﺮﻋﻴﺔ ﺍﻷﺩﻟﺔ ﺍﳌﺘﺤﺼﻞ ﻋﻠﻴﻬﺎ ﻋﱪ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺣﺠﻴﺘﻬﺎ ﺃﻣﺎﻡ ﺍﻟﻘـﺎﺿﻲ‬
‫ﺍﳉﺰﺍﺋﻲ‪ ،‬ﻟﺬﻟﻚ ﺧ‪‬ﺼﺺ ﻫﺬﺍ ﺍﻟﻔﺼﻞ ﻟﺘﻨﺎﻭﻝ ﻫﺬﻩ ﺍﳌﺴﺎﺋﻞ ﻣﻦ ﺧﻼﻝ ﲢﺪﻳﺪ ﺍﻷﺟﻬﺰﺓ ﺍﳌﻜﻠﻔﺔ‬
‫ﺑﺎﻟﺒـﺤﺚ ﻭ ﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﰒ ﺍﻟﺘﻌﺮﻳﻒ ﺑﺎﳋﺼﺎﺋﺺ ﺍﻟﱵ ﻳﺘﻤﻴﺰ ‪‬ﺎ ﺍﻟﺘﺤﻘﻴﻖ ﻭ‬
‫ﺍﶈﻘﻘـﻮﻥ ﻓﻴﻬﺎ‪ ،‬ﰒ ﺑﻌﺪ ﺫﻟﻚ ﰎ ﺍﻟﺒﺤﺚ ﰲ ﺍﻟﺪﻟﻴﻞ ﺍﳌﻨﺎﺳﺐ ﻹﺛﺒﺎﺕ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﻭﻫﻮ ﻣﺎ‬
‫ﻳﻌﺮﻑ ﺑﺎﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺃﻳﻦ ﰎ ﺗﻮﺿﻴﺢ ﻣﻔﻬﻮﻣﻪ ﻭﲢﺪﻳﺪ ﺃﺷﻜﺎﻟﻪ ﻭﻣﺼﺎﺩﺭ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ‪ ،‬ﻛﻤﺎ ﰎ‬
‫ﻣﻌﺎﳉﺔ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﳌﺴﺘﻌﻤﻠﺔ ﰲ ﺍﻟﺘﺤﻘﻴﻖ ﻣﻦ ﺃﺟﻞ ﺍﺳﺘﺨﻼﺻﻪ ﻭﻣﺎﻫﻲ ﺍﻟﺼﻌﻮﺑﺎﺕ ﻭ ﺍﳌﻌﻮﻗﺎﺕ‬
‫ﺍﻟﱵ ﺗﻮﺍﺟﻪ ﺍﻟﻘﺎﺋﻤﲔ ﻋﻠﻰ ﺫﻟﻚ‪،‬ﻛﻤﺎ ﰎ ﺍﻟﺘﻨﺎﻭﻝ ﰲ ﻫﺬﺍ ﺍﻟﻔﺼﻞ ﻣﺴﺄﻟﺔ ﺿﻤﺎﻧﺎﺕ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﺃﺛﻨﺎﺀ‬
‫ﳑﺎﺭﺳﺔ ﺇﺟﺮﺍﺀﺍﺕ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻭﺃﺛﺮﻫﺎ ﻋﻠﻰ ﺍﳊﻖ ﰲ ﺍﳋﺼﻮﺻﻴﺔ‪ ،‬ﻭﺃﺧﲑﺍ ﰎ ﲝﺚ‬
‫ﺍﻟﻘﻴﻤﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﰲ ﳎﺎﻝ ﺍﻹﺛﺒﺎﺕ ﺍﳉﺰﺍﺋﻲ ﻭﻣﺎ ﻫﻮ ﻣﻮﻗﻒ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻣﻦ ﻫﺬﺍ‬
‫ﺍﻟﺪﻟﻴﻞ‪.‬‬

‫)‪(1‬ﻗﺮﺍﺭ ﺍﶈﻜﻤﺔ ﺍﻟﻌﻠﻴﺎ ﺍﻟﻐﺮﻓﺔ ﺍﳉﻨﺎﺋﻴﺔ ﻣﺆﺭﺥ ﰲ ‪ 2002/06/04‬ﻧﺸﺮﺓ ﺍﻟﻘﻀﺎﺓ ﺭﻗﻢ ‪ 58‬ﻟﺴﻨﺔ ‪ ،2006‬ﺹ‪.255‬‬

‫‪- 230 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺧــــﺎﺗﻤــــﺔ‬

PDF created with pdfFactory Pro trial version www.pdffactory.com


‫ﺧـﺎﺗـﻤـﺔ‬

‫ﺑﻌﺪ ﺃﻥ ﻓﺮﻏﺖ ﻣﻦ ﺑﺴﻂ ﻣﺴﺎﺋﻞ ﺍﻟﺪﺭﺍﺳﺔ ﻭﺳﻌﻴﺖ ﺇﱃ ﳏﺎﻭﻟﺔ ﺍﻹﺣﺎﻃﺔ ﲜﻮﺍﻧﺐ ﺍﻟﺒﺤﺚ ﺿﻤﻦ‬
‫ﺭﺅﻳﺔ ﺇﺟﺮﺍﺋﻴﺔ ﺗﺘﻨﺎﻭﻝ ﻣﺴﺄﻟﺔ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫ﻭﻭﻓﺎﺀ ﳍﺬﻩ ﺍﻟﻐﺎﻳﺔ ﻛﺎﻥ ﻟﺰﺍﻣﺎ ﻋﻠﻲ ﺍﻟﻮﻗﻮﻑ ﻋﻠﻰ ﲢﺪﻳﺪ ﺍﻹﻃﺎﺭ ﺍﻟﻘﺎﻧﻮﱐ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﻫﻮ‬
‫ﺍﻷﻣﺮ ﺍﻟﺬﻱ ﺭﺻﺪﺗﻪ ﰲ ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ﻣﻦ ﻫﺬﻩ ﺍﻟﺪﺭﺍﺳﺔ ﺃﻳﻦ ﺗﻨﺎﻭﻟﺖ ﻣﻦ ﺧﻼﻟﻪ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ‬
‫ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺃﺑﺮﺯﺕ ﻓﻴﻪ ﺧﺼﺎﺋﺼﻬﺎ ﻭﺧﺼﺎﺋﺺ ﻣﺮﺗﻜﺒﻴﻬﺎ ﻭﺃﻭﺟﻪ ﺍﳊﻤﺎﻳﺔ ﺍﳉﺰﺍﺋﻴﺔ ﻟﻠﻨﻈﻢ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﻣﻮﺍﺟﻬﺘﻬﺎ‪ ،‬ﻛﻤﺎ ﺗﻌﺮﺿﺖ ﺃﻳﻀﺎ ﳌﻮﻗﻒ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻣﻨﻬﺬﺍ ﺍﻟﻨﻤﻂ ﺍﻹﺟﺮﺍﻣﻲ‪.‬‬
‫ﻭﻣﺎ ﺩﻓﻌﲏ ﺇﱃ ﺗﻨﺎﻭﻝ ﻫﺬﻩ ﺍﳌﺴﺎﺋﻞ ﻫﻮ ﺍ‪‬ﺮﻯ ﺍﳌﻨﻄﻘﻲ ﻟﻸﻣﻮﺭ ﺇﺫ ﻻ ﻳﺴﺘﻘﻴﻢ ﻣﻨﻄﻘﺎ ﻭﻻ ﻋﻘﻼ‬
‫ﺃﻥ ﻳﻘﻮﻡ ﺍﶈﻘﻘﻮﻥ ﻣﻦ ﺭﺟﺎﻝ ﺍﻟﻀﺒﻄﻴﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺃﻭ ﺍﻟﻘﻀﺎﺀ ﺑﺎﻟﺒﺤﺚ ﻋﻦ ﺍﻟﺪﻟﻴﻞ ﻹﺛﺒﺎﺕ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺩﻭﻥ ﺃﻥ ﻳﻜﻮﻥ ﳍﺆﻻﺀ ﻓﻬﻤﺎ ﻣﻮﺿﻮﻋﻴﺎ ﳍﺬﻩ ﺍﳉﺮﳝﺔ‪ ،‬ﰒ ﻛﺮﺳﺖ ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﱐ ﻟﻠﺠﻮﺍﻧﺐ‬
‫ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﳌﺘﻌﻠﻘﺔ ﲟﺴﺄﻟﺔ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﻓﻴﻬﺎ ﺑﻴﻨﺖ ﺍﳋﺼﺎﺋﺺ ﺍﻟﱵ ﻳﺘﺴﻢ ‪‬ﺎ‬
‫ﺍﻟﺘﺤﻘﻴﻖ ﻭﻛﺬﺍ ﺍﻟﺼﻔﺎﺕ ﺍﻟﱵ ﳚﺐ ﺃﻥ ﻳﺘﻤﻴﺰ ‪‬ﺎ ﺍﶈﻘﻖ ﰲ ﻫﺬﺍ ﺍﻟﻨﻤﻂ ﺍﻹﺟﺮﺍﻣﻲ‪ ،‬ﰒ ﻓﺼ‪‬ﻠﺖ ﺍﻟﻘﻮﻝ‬
‫ﻓﺬﻛﺮﺕ ﺧﺼﺎﺋﺺ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻛﺪﻟﻴﻞ ﻣﻨﺎﺳﺐ ﰲ ﺇﺛﺒﺎﺕ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﺃﺭﺩﻓﺖ ﺗﺮﺗﻴﺒﺎ ﻋﻠﻰ‬
‫ﺫﻟﻚ ﺑﺘﻔﺼﻴﻞ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻹﺟﺮﺍﺋﻴﺔ ﻟﻠﺤﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻭﺍﻧﺘﻬﻴﺖ ﺇﱃ ﲢﺪﻳﺪ ﺍﻟﻘﻴﻤﺔ‬
‫ﺍﻟﻘﺎﻧﻮﻧﻴﺔﳍﺬﺍ ﺍﻟﺪﻟﻴﻞ ﰲ ﳎﺎﻝ ﺇﺛﺒﺎﺕ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ .‬ﻭﻋﻠﻰ ﺃﺳﺎﺱ ﺫﻟﻚ ﲢﺪﺩﺕ ﺍﻹﺷﻜﺎﻟﻴﺔ‬
‫ﺍﳉﻮﻫﺮﻳﺔ ﻟﻠﺒﺤﺚ ﻣﻦ ﺧﻼﻝ ﲢﻠﻴﻞ ﻣﺪﻯ ﺗﺄﺛﲑ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﺍﳉﺎﻧﺐ ﺍﻹﺟﺮﺍﺋﻲ ﻟﻠﻘﺎﻧﻮﻥ‬
‫ﺍﳉﺰﺍﺋﻲ‪.‬‬
‫ﻭﻋﻠىﻀﻮﺀ ﺍﻹﺷﻜﺎﻟﻴﺎﺕ ﺍﻟﱵ ﺃﻇﻬﺮ‪‬ﺎ ﺍﻟﺪﺭﺍﺳﺔ ﺧﻠﺼﺖ ﰲ ﺍﻹﺟﺎﺑﺔ ﻋﻨﻬﺎ ﺇﻟىﺠﻤﻠﺔ ﻣﻦ ﺍﻟﻨﺘﺎﺋﺞ‬
‫ﻛﻤﺎ ﻳﻠﻲ‪:‬‬
‫• ﺇﻥ ﻣﻔﻬﻮﻡ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻳﻨﺼﺮﻑ ﺇﱃ ﺍﻷﻓﻌﺎﻝ ﺍﻟﱵ ﺗﺸﻜﻞ ﺍﻋﺘﺪﺍﺀ ﻋﻠﻰ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ‬
‫ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ‪ ،‬ﻭﺍﻟﱵ ﺗﺴﺘﻬﺪﻑ ﺑﺸﻜﻞ ﺧﺎﺹ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳌﺨﺘﻠﻔﺔ ﰲ ﺍﻟﺒﻴﺌﺔ ﺍﻟﺮﻗﻤﻴﺔ‪ ،‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ‬
‫ﻛﻞ ﺟﺮﳝﺔ ﺗﺮﺗﻜﺐ ﺃﻭﻳﺴﻬﻞ ﺍﺭﺗﻜﺎ‪‬ﺎ ﺑﻮﺍﺳﻄﺔ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﻫﺬﻩ ﺍﻷﺧﲑﺓ ﰲ ﺍﻟﻐﺎﻟﺐ ﻣﺎ‬
‫ﺗﻜﻮﳒﺮﺍﺋﻢ ﺗﻘﻠﻴﺪﻳﺔ ‪.‬‬
‫• ﺇﳕﻦ ﺃﻫﻢ ﳑﻴﺰﺍﺕ ﺟﺮﺍﺋﻢ ﺍﻻﻋﺘﺪﺍﺀ ﻋﻠﻰ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ‪،‬ﺃ‪‬ﺎ ﺗﻨﺼﺐ ﻋﻠﻰ ﳏﻞ‬
‫ﻣﻦ ﻧﻮﻉ ﺧﺎﺹ ﳜﺘﻠﻒ ﲤﺎﻣﺎ ﻋﻠﻰ ﳏﻞ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻓﻬﺬﻩ ﺍﳉﺮﺍﺋﻢ ﺗﺴﺘﻬﺪﻑ ﺍﳌﺴﺎﺱ ﺑﺎﳌﻌﻠﻮﻣﺎﺕ‬

‫‪- 223 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺧـﺎﺗـﻤـﺔ‬

‫ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﺍﳌﺘﻮﺍﺟﺪﺓ ﰲ ﺍﻟﺒﻴﺌﺔ ﺍﻟﺮﻗﻤﻴﺔ ﻋﻠﻰ ﻫﻴﺌﺔ ﺇﺷﺎﺭﺍﺕ ﻭﻧﺒﻀﺎﺕ ﻏﲑ ﻣﺮﺋﻴﺔ ﺗﻨﺴﺎﺏ ﻋﱪ ﺃﺟﺰﺍﺀ‬
‫ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻭﺷﺒﻜﺎﺕ ﺍﻹﺗﺼﺎﻝ ﺍﻟﻌﺎﳌﻴﺔ‪.‬‬
‫• ﻭﻗﺪ ﺗﺒﲔ ﱄ ﺃﻧﻪ ﻭﻧﻈﺮﺍ ﻟﻜﻮﻥ ﺍﻟﻨﺼﻮﺹ ﺍﳉﺰﺍﺋﻴﺔ ﺍﻟﻌﻘﺎﺑﻴﺔ ﺇﳕﺎ ﻭﺿﻌﺖ ﻟﻠﺘﻌﺎﻣﻞ ﻣﻊ ﺟﺮﺍﺋﻢ‬
‫ﺗﻨﺼﺐ ﻋﻠﻰ ﳏﻞ ﻣﺎﺩﻱ ﻣﻠﻤﻮﺱ‪ ،‬ﻓﺈﻥ ﺍﻷﻣﺮ ﻗﺪ ﺍﺳﺘﺘﺒﻌﻪ ﻗﺼﻮﺭ ﺃﻭﻋﺠﺰ ﻫﺬﻩ ﺍﻟﻨﺼﻮﺹ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻋﻦ‬
‫ﺗﻮﻓﲑ ﺍﳊﻤﺎﻳﺔ ﺍﳉﺰﺍﺋﻴﺔ ﳌﺜﻞ ﳏﻞ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻓﻜﺎﻥ ﺫﻟﻚ ﻣﻦ ﺩﻭﺍﻋﻲ ﺗﺪﺧﻞ ﺍﳌﺸﺮﻉ ﺇﱃ ﺇﺻﺪﺍﺭ‬
‫ﻧﺼﻮﺹ ﺟﺰﺍﺋﻴﺔ ﲡﺮﻡ ﲝﻖ ﺍﻷﻓﻌﺎﻝ ﺍﻟﱵ ﺗﺸﻜﻞ ﺍﻋﺘﺪﺍﺀ ﻋﻠﻰ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ﻭﻫﻮ ﻣﺎ‬
‫ﻳﻘﺘﻀﻴﻪ ﻣﺒﺪﺃ ﺍﻟﺸﺮﻋﻴﺔ ﺍﳌﻮﺿﻮﻋﻴﺔ ﺍﻟﻘﺎﺋﻢ ﻋﻠﻰ ﺍﻟﺘﻔﺴﲑ ﺍﻟﻀﻴﻖ ﻟﻠﻨﺼﻮﺹ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﻌﻘﺎﺑﻴﺔ ﻭﻋﺪﻡ ﺟﻮﺍﺯ‬
‫ﺍﻟﻘﻴﺎﺱ‪.‬‬
‫• ﻭﻗﺪ ﺗﻮﺻﻠﺖ ﺃﻳﻀﺎ ﺇﱃ ﺃﻥ ﻫﺬﺍ ﺍﻟﻘﺼﻮﺭ ﱂ ﻳﻌﺘﺮ ﺍﻟﻨﺼﻮﺹ ﺍﳌﻮﺿﻮﻋﻴﺔ ﻓﻘﻂ ﻭﱂ ﻳﻘﻒ ﻋﻨﺪ‬
‫ﺍﻟﺸﻖ ﺍﳌﻮﺿﻮﻋﻲ ﻟﻠﻘﺎﻧﻮﻥ ﺍﳉﺰﺍﺋﻲ‪ ،‬ﺑﻞ ﺍﻣﺘﺪ ﺗﺄﺛﲑ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺇﱃ ﺍﻟﺸﻖ ﺍﻹﺟﺮﺍﺋﻲ ﻟﻠﻘﺎﻧﻮﻥ‬
‫ﺍﳉﺰﺍﺋﻲ‪ ،‬ﻓﻘﺪ ﺃﺛﺎﺭﺕ ﻫﺬﻩ ﺍﻟﺘﻘﻨﻴﺔ ﺍﳊﺪﻳﺜﺔ ﺍﻟﻌﺪﻳﺪ ﻣﻦ ﺍﻹﺷﻜﺎﻻﺕ ﰲ ﻧﻄﺎﻗﻪ ﺫﻟﻚ ﺃﻥ ﻧﺼﻮﺹ ﻗﺎﻧﻮﻥ‬
‫ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺋﻴﺔ ﺇﳕﺎ ﻭﺿﻌﺖ ﻟﺘﺤﻜﻢ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳌﺘﻌﻠﻘﺔ ﲜﺮﺍﺋﻢ ﺗﻘﻠﻴﺪﻳﺔ ﻻ ﺗﻮﺟﺪ ﺻﻌﻮﺑﺎﺕ ﰲ‬
‫ﺇﺛﺒﺎ‪‬ﺎ ﺃﻭ ﺍﻟﺘﺤﻘﻴﻖ ﻓﻴﻬﺎ ﻭﲨﻊ ﺍﻷﺩﻟﺔ ﺍﳌﺘﻌﻠﻘﺔ ‪‬ﺎ ﻣﻊ ﺧﻀﻮﻋﻬﺎ ﳌﺒﺪﺃ ﺣﺮﻳﺔ ﺍﻟﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﰲ ﺍﻻﻗﺘﻨﺎﻉ‪.‬‬
‫• ﻟﺬﻟﻚ ﻓﻘﺪ ﺗﻮﺻﻠﺖ ﰲ ﻫﺬﺍ ﺍﻟﺒﺤﺚ ﺇﱃ ﺃﻥ ﺍﻟﻄﺒﻴﻌﺔ ﺍﳋﺎﺻﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺩﻋﺖ‬
‫ﺍﳌﺸﺮﻉ ﺇﱃ ﺇﻋﺎﺩﺓ ﺗﻘﻴﻴﻤﺒﻌﺾ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﳌﺘﺎﺣﺔ ﰲ ﺍﺳﺘﺨﻼﺹ ﺍﻟﺪﻟﻴﻞ ﻛﺎﻟﺘﻔﺘﻴﺶ ﻭﺍﻟﻀﺒﻂ‬
‫ﻭﺟﻌﻠﻬﺎ ﺻﺎﺋﻐﺔ ﺍﻻﺳﺘﻌﻤﺎﻝ ﰲ ﳎﺎﻝ ﺍﻟﺒﻴﺌﺔ ﺍﻟﺮﻗﻤﻴﺔ‪ ،‬ﻭﻫﻮ ﻣﺎ ﻛﺎﻥ ﻓﻌﻼ ﲟﻮﺟﺐ ﺍﻟﻘﺎﻧﻮﻥ ‪ 09/04‬ﺍﳌﺘﻌﻠﻖ‬
‫ﺑﺎﻟﻘﻮﺍﻋﺪ ﺍﳋﺎﺻﺔ ﻟﻠﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭﺍﻹﺗﺼﺎﻝ ﻭﻣﻜﺎﻓﺤﺘﻬﺎ‪ ،‬ﻓﻀﻼ ﻋﻦ‬
‫ﺍﺳﺘﺤﺪﺍﺙ ﻧﻮﻉ ﻣﻦ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﻷﺧﺮﻯ ﺗﺘﻼﺀﻡ ﻣﻊ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺍﻟﱵ ﻳﻜﻮﻥ ﻋﻠﻴﻬﺎ ﺍﻟﺪﻟﻴﻞ‬
‫ﺍﳌﻨﺎﺳﺐ ﰲ ﺇﺛﺒﺎ‪‬ﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﻛﺈﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ ﻭﺍﳌﺮﺍﻗﺒﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪.‬‬
‫ﻭﻗﺪ ﺗﺒﲔ ﻣﻌﻨﺎ ﻛﺬﻟﻚ ﺃﻥ ﺍﻟﺪﻟﻴﻞ ﺍﳌﻨﺎﺳﺐ ﻭﺍﻷﻭﻓﺮ ﰲ ﺇﺛﺒﺎﺕ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻫﻮ ﺍﻟﺪﻟﻴﻞ‬
‫ﺍﻟﺮﻗﻤﻲ ﻭﺍﻟﺬﻱ ﻫﻮ ﻋﺒﺎﺭﺓ ﻋﻦ ﻣﻌﻠﻮﻣﺎﺕ ﳐﺰﻧﺔ ﰲ ﺍﻟﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺷﻜﻞ ﻧﺒﻀﺎﺕ ﻣﻐﻨﺎﻃﻴﺴﻴﺔ ﺃﻭ‬
‫ﻛﻬﺮﺑﺎﺋﻴﺔ ﻣﻦ ﺍﳌﻤﻜﻦ ﻣﻦ ﺍﻟﻨﺎﺣﻴﺔ ﺍﻟﺘﻘﻨﻴﺔ ﺍﺳﺘﺨﻼﺻﻪ ﻣﻦ ﺍﻟﺒﻴﺌﺔ ﺍﻟﺮﻗﻤﻴﺔ ﺍﻟﱵ ﻳﺘﻮﺍﺟﺪ ‪‬ﺎ‪ ،‬ﻭﲡﻤﻴﻌﻪ‬
‫ﺑﺎﺳﺘﺨﺪﺍﻡ ﺑﺮﺍﻣﺞ ﻭﺗﻄﺒﻴﻘﺎﺕ ﺗﻘﻨﻴﺔ‪ ،‬ﻟﻴﻈﻬﺮ ﺑﻌﺪ ﺫﻟﻚ ﰲ ﺷﻜﻞ ﳐﺮﺟﺎﺕ ﺇﻟﻜﺘﺮﻭﻧﻴﺔ ﺃﻭ ﺣﱴ ﻭﺭﻗﻴﺔ‬
‫ﺑﻌﺪﻃﺒﻌﻪ‪.‬‬

‫‪- 224 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺧـﺎﺗـﻤـﺔ‬

‫ﻛﻤﺎ ﺃﻇﻬﺮ ﺍﻟﺒﺤﺚ ﺃﻳﻀﺎ ﺃﻥ ﻋﻤﻠﻴﺔ ﺍﺳﺘﺨﻼﺹ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺳﻮﺍﺀ ﺑﺎﻟﻄﺮﻕ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ‬
‫ﺃﻭﺍﳌﺴﺘﺤﺪﺛﺔ ﻟﻴﺲ ﻣﻦ ﺍﻟﺴﻬﻮﻟﺔ ﲟﺎ ﻛﺎﻥ‪ ،‬ﺇﺫ ﺗﻌﻮﻗﻬﺎ ﰲ ﻏﺎﻟﺐ ﺍﻷﺣﻴﺎﻥ ﺻﻌﻮﺑﺎﺕ ﺗﺘﻌﻠﻖ ﺇﻣﺎ ﺑﺎﻟﻄﺒﻴﻌﺔ‬
‫ﺍﻟﺘﻜﻮﻳﻨﻴﺔ ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺃﻭ ﺑﺎﻟﻌﺎﻣﻞ ﺍﻟﺒﺸﺮﻱ‪.‬‬
‫• ﺇﻥ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻋﻠﻰ ﺿﻮﺀ ﻣﺎ ﺃﺳﻔﺮﺕ ﻋﻠﻴﻪ ﺍﻟﺘﻄﻮﺭﺍﺕ ﺍﻟﺘﻘﻨﻴﺔ ﰲ ﳎﺎﻝ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻻ ﻳﻐﲏ‬
‫ﻋﻨﻪ ﺃﻥ ﻳﻜﻮﻥ ﻣﺸﺮﻭﻋﺎ‪ ،‬ﻭﺫﻟﻚ ﺑﺄﻥ ﻳﺘﻢ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ ﺑﺎﻟﻄﺮﻕ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻭﺃﻥ ﻳﻘﺪﻡ ﻟﻠﻤﺤﻜﻤﺔ ﻋﻠﻰ‬
‫ﻧﻔﺲ ﺍﳍﻴﺌﺔ ﺍﻟﱵ ﰎ ﲨﻌﻪ ﻋﻠﻴﻬﺎ‪ ،‬ﺑﺄﻥ ﻻ ﻳﻄﺮﺃ ﻋﻠﻴﻪ ﺃﻱ ﺗﻐﻴﲑ ﺃﻭ ﲢﺮﻳﻒ ﺧﻼﻝ ﻓﺘﺮﺓ ﺣﻔﻈﻪ‪.‬‬
‫• ﺇﻥ ﺍﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﻭﺇﻥ ﻛﺎﻧﺖ ﺗﺘﻤﺘﻊ ﺑﻘﻴﻤﺔ ﻋﻠﻤﻴﺔ ﻗﺎﻃﻌﺔ ﰲ ﺍﻟﺪﻻﻟﺔﻋﻠﻰ ﺍﳊﻘﺎﺋﻖ ﺍﻟﱵ‬
‫ﺗﺘﻀﻤﻨﻬﺎ‪ ،‬ﺇﻻ ﺃﻥ ﺍﻟﻜﺸﻒ ﻋﻦ ﺍﳍﻮﻳﺔ ﺍﳊﻘﻴﻘﻴﺔ ﻟﻠﻔﺎﻋﻞ ﻟﻴﺲ ﺑﺎﻷﻣﺮ ﺍﻟﺴﻬﻞ ﻓﻘﺪ ﳝﻜﻦ ﺍﻟﺘﻌﺮﻑ ﻋﻠﻰ‬
‫ﻫﻮﻳﺔ ﺍﳊﺎﺳﻮﺏ ﺍﳌﺴﺘﻌﻤﻞ ﰲ ﺍﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﻭﺍﳌﺮﺗﺒﻂ ﺑﺸﺒﻜﺔ ﺍﻹﻧﺘﺮﻧﺖ ﻣﻦ ﺧﻼﻝ ﻋﻨﻮﺍﻥ ‪ IP‬ﺇﻻ ﺃﻧﻪ‬
‫ﻣﻦ ﺍﻟﺼﻌﺐ ﲢﺪﻳﺪ ﻫﻮﻳﺔ ﺍﻟﻔﺎﻋﻞ ﻣﺎ ﱂ ﻳﺘﻢ ﺗﺪﻋﻴﻢ ﻫﺬﺍ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺑﺎﻷﺩﻟﺔ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﺍﻷﺧﺮﻯ ﻓﻴﻤﺎ‬
‫ﺑﻌﺪ‪.‬‬
‫• ﻭﻗﺪ ﻻﺣﻈﺖ ﻣﻦ ﺧﻼﻝ ﺍﻟﺒﺤﺚ ﺣﻮﻝ ﻣﺴﺄﻟﺔ ﺗﻘﺪﻳﺮ ﺍﻟﻘﻴﻤﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﺃﻧﻪ ﳚﺐ‬
‫ﺍﻟﺘﻤﻴﻴﺰ ﺑﲔ ﺃﻣﺮﻳﻦ ﺍﻷﻭﻝ ‪ :‬ﺍﻟﻘﻴﻤﺔ ﺍﻟﻌﻠﻤﻴﺔ ﺍﻟﻘﺎﻃﻌﺔ ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻭﺍﻟﺜﺎﱐ ‪ :‬ﺍﻟﻈﺮﻭﻑ ﻭﺍﳌﻼﺑﺴﺎﺕ ﺍﻟﱵ‬
‫ﲢﻴﻂ ‪‬ﺬﺍ ﺍﻟﺪﻟﻴﻞ‪ ،‬ﻓﺎﻟﻘﺎﺿﻲ ﻟﻴﺲ ﻟﻪ ﺃﻥ ﻳﻨﺎﺯﻉ ﻓﻴﻤﺎ ﺃﺳﻔﺮﺕ ﻋﻠﻴﻪ ﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔﻭﺍﻟﻌﻠﻮﻡ ﺍﻟﺘﻘﻨﻴﺔ‬
‫ﻣﻦ ﺍﻟﻨﺎﺣﻴﺔ ﺍﻟﻌﻠﻤﻴﺔ ﻭﺇﳕﺎ ﻟﻪ ﺃﻥ ﻳﻘﺪﺭ ﺍﻟﻈﺮﻭﻑ ﻭﺍﳌﻼﺑﺴﺎﺕ ﺍﻟﱵ ﺃﺣﺎﻃﺖ ‪‬ﺬﺍ ﺍﻟﺪﻟﻴﻞ‪ ،‬ﻭﳝﻜﻦ ﻟﻪ ﰲ‬
‫ﺳﺒﻴﻞ ﺫﻟﻚ ﺍﻹﺳﺘﻌﺎﻧﺔ ﺑﻄﺮﻕ ﺍﻹﺛﺒﺎﺕ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﺍﻟﱵ ﺗﻮﺟﺪ ﻋﺎﺩﺓ ﺇﻟىﺠﺎﻧﺐ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪ ،‬ﻭﻟﻪ ﰲ‬
‫ﺫﻟﻚ ﺃﻥ ﻳﺮﻓﺾ ﻫﺬﺍ ﺍﻟﺪﻟﻴﻞ ﺇﺫﺍ ﱂ ﻳﻘﺘﻨﻊ ﺑﻈﺮﻭﻑ ﺍﻟﻘﻀﻴﺔ ﻭﻣﻼﺑﺴﺎ‪‬ﺎ‪.‬‬
‫• ﻭﻫﺬﺍ ﻣﺎ ﻗﺎﺩﱐ ﺇﱃ ﺍﻟﻮﺻﻮﻝ ﺇﱃ ﻧﺘﻴﺠﺔ ﺃﺧﺮﻯ ﻣﺆﺩﺍﻫﺎ ﲤﺘﻊ ﺍﻟﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ ﺑﺪﻭﺭ ﺇﳚﺎﰊ ﻣﻦ‬
‫ﺣﻴﺚ ﺗﻘﺪﻳﺮ ﺍﻟﻘﻴﻤﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻭﺧﻀﻮﻋﻪ ﻟﻠﺴﻠﻄﺔ ﺍﻟﺘﻘﺪﻳﺮﻳﺔ‪ ،‬ﺷﺄﻧﻪ ﰲ ﺫﻟﻚ ﺷﺄﻥ ﺑﺎﻗﻲ‬
‫ﺍﻷﺩﻟﺔ‪.‬‬
‫• ﻛﻤﺎ ﺗﺒﲔ ﺃﻥ ﺍﻹﺗﺼﺎﻻﺗﺎﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﺍﻟﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﻌﺘﱪ ﺃﺣﺪ ﺃﻭﺟﻪ ﺍﳊﻴﺎﺓ ﺍﳋﺎﺻﺔ‬
‫ﻟﻺﻧﺴﺎﻥ ﻭﻣﻈﻬﺮﺍ ﻣﻦ ﻣﻈﺎﻫﺮ ﺧﺼﻮﺻﻴﺎﺗﻪ ‪ ،‬ﻭﺑﺎﻟﺘﺎﱄ ﻓﺈﻥ ﺇﺟﺮﺍﺀﺍﺕ ﺍﺳﺘﺨﻼﺹ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﻟﺒﻴﺌﺔ ﺍﻟﺮﻗﻤﻴﺔ‬
‫ﻗﺪ ﺗﺆﺩﻱ ﺇﱃ ﺍﳌﺴﺎﺱ ‪‬ﺬﻩ ﺍﳋﺼﻮﺻﻴﺔ ﻭﺇﻣﻜﺎﻧﻴﺔ ﺇﻃﻼﻉ ﺍﶈﻘﻘﲔ ﻋﻠﻰ ﺃﺳﺮﺍﺭ ﺧﺎﺻﺔ ﺑﺄﺷﺨﺎﺹ ﻗﺪ ﻻ‬
‫ﻳﻜﻮﻥ ﳍﻢ ﺃﺻﻼ ﻳﺪ‪ ‬ﰲ ﺍﳉﺮﳝﺔ‪ ،‬ﳑﺎ ﺟﻌﻞ ﺍﳌﺸﺮﻉ ﳛﺮﺹ ﻛﻞ ﺍﳊﺮﺹ ﻋﻠﻰ ﻫﺬﻩ ﺍﳌﺴﺄﻟﺔ ﺑﺄﻥ ﺍﺷﺘﺮﻁ‬

‫‪- 225 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺧـﺎﺗـﻤـﺔ‬

‫ﺍﻟﻠﺠﻮﺀ ﺇﱃ ﻫﺬﻩ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺇﺫﺍ ﺩﻋﺖ ﺇﱃ ﺫﻟﻚ ﺿﺮﻭﺭﺓ ﺍﻟﺘﺤﺮﻱ ﻭﺍﻟﺘﺤﻘﻴﻖ ﻭﺍﻟﱵ ﳚﺐ ﺃﻥ ﺗﻘﺪﺭ‬
‫ﺑﻘﺪﺭﻫﺎ‪.‬‬
‫• ﻭﰲ ﺍﻷﺧﲑ ﻓﺈﻧﻪ ﻭﻋﻠﻰ ﻫﺪﻱ ﻣﺎ ﺗﻮﺻﻠﺖ ﺇﻟﻴﻪ ﰲ ﻫﺬﺍ ﺍﻟﺒﺤﺚ ﻓﺈﻧﻪ ﻗﺪ ﺑﺪﺍ ﱄ ﺃﻥ ﺃﻗﺪﻡ ﲨﻠﺔ‬
‫ﻣﻦ ﺍﳌﻘﺘﺮﺣﺎﺕ ﺁﻣﻞ ﺃﻥ ﺃﻛﻮﻥ ﻣﻮﻓﻘﺎ ﰲ ﻃﺮﺣﻬﺎ‪.‬‬
‫• ﺇﻥ ﺍﳉﺰﺍﺋﺮ ﻭﻫﻲ ﲣﻄﻮﺍ ﺍﳋﻄﻮﺍﺕ ﺍﻷﻭﱃ ﰲ ﺗﻄﺒﻴﻖ ﻣﺸﺮﻭﻉ ﺍﳊﻜﻮﻣﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﺍﻟﺬﻱ ﻣﻦ‬
‫ﺧﻼﻟﻪ ﻳﺘﻢ ﺍﻟﺴﻌﻲ ﺇﱃ ﺍﺳﺘﺨﺪﺍﻡ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﻻﺗﺼﺎﻻﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﰲ ﺗﻮﻓﲑ ﻭﺗﻘﺪﱘ ﻣﻌﻠﻮﻣﺎﺕ‬
‫ﻭﺧﺪﻣﺎﺕ ﺍﳊﻜﻮﻣﺔ ﻟﻠﻤﻮﺍﻃﻨﲔ ﻭﺟﻌﻠﻬﺎ ﻣﺘﺎﺣﺔ ﻟﻠﺠﻤﻬﻮﺭ‪ ،‬ﻓﻬﺬﺍ ﺍﳌﺸﺮﻭﻉ ﻻﺑﺪ ﺃﻥ ﻳﺴﺘﺘﺒﻌﻪ ﺧﻄﻮﺓ‬
‫ﺗﺸﺮﻳﻌﻴﺔ ﻫﺎﻣﺔﻳﻜﻮﻥ ﺍﳍﺪﻑ ﻣﻨﻬﺎ ﺗﻮﻓﲑ ﺍﳊﻤﺎﻳﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﺸﺎﻣﻠﺔ ﳍﺬﺍ ﺍﳌﻔﻬﻮﻡ ﺑﺼﻮﺭﺓ ﻣﻨﺴﺠﻤﺔ‬
‫ﻭﻣﺘﺰﺍﻣﻨﺔ ﻣﻊ ﻫﺬﺍ ﺍﻟﺘﺤﻮﻝ ﻣﻦ ﺃﺟﻞ ﲣﻄﻲ ﺍﻟﺜﻐﺮﺍﺕ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻟﱵ ﻗﺪ ﻳﺴﺘﻔﻴﺪ ﻣﻨﻬﺎ ﺍﻟﻌﺎﺑﺜﻮﻥ ﺑﺄﻣﻦ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﺳﻴﻤﺎ ﻭﺃﻥ ﺍﻷﻣﺮ ﻳﺘﻌﻠﻖ ﺑﺄﻧﻈﻤﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﲣﺺ ﺇﺩﺍﺭﺍﺕ ﺍﻟﺪﻭﻟﺔ‪.‬‬
‫• ﺣﺴﺐ ﻣﻔﻬﻮﻡ ﺍﳌﺎﺩﺓ ‪ 44‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺍﻟﻔﻘﺮﺓ ﺍﻟﺜﺎﻧﻴﺔ ﺍﳌﺪﺭﺟﺔ ﲟﻮﺟﺐ‬
‫ﺍﻟﻘﺎﻧﻮﻥ ‪ 06/22‬ﺍﳌﺆﺭﺥ ﰲ ‪ 2006/12/20‬ﻓﺈﻧﻪ ﻻ ﳚﻮﺯ ﻟﻀﺒﺎﻁ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﰲ ﺇﻃﺎﺭ ﺍﻟﺘﺤﺮﻱ‬
‫ﻭﺍﻟﺘﺤﻘﻴﻖ ﻋﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺎﺳﺔ ﺑﺄﻧﻈﻤﺔ ﺍﳌﻌﺎﳉﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ﺍﻹﻧﺘﻘﺎﻝ ﺇﱃ ﻣﺴﺎﻛﻦ ﺍﻷﺷﺨﺎﺹ ﺍﻟﺬﻳﻦ‬
‫ﻳﻈﻬﺮﻭﻥ ﺃ‪‬ﻢ ﺳﺎﳘﻮﺍ ﰲ ﺍﺭﺗﻜﺎﺏ ﻫﺬﻩ ﺍﳉﺮﳝﺔ ﻹﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﻫﻨﺎﻙ ﺇﻻ ﺑﺈﺫﻥ ﻣﻜﺘﻮﺏ ﻣﻦ ﺍﳉﻬﺔ‬
‫ﺍﳌﺨﺘﺼﺔ‪ ،‬ﻣﻊ ﻭﺟﻮﺏ ﺍﺳﺘﻈﻬﺎﺭ ﻫﺬﺍ ﺍﻹﺫﻥ ﻗﺒﻞ ﺍﻟﺪﺧﻮﻝ ﺇﱃ ﺍﳌﺴﻜﻦ ﻭﺍﻟﺸﺮﻭﻉ ﰲ ﻋﻤﻠﻴﺔ‬
‫ﺍﻟﻘﺎﻧﻮﻥ‪09 /04‬‬‫ﺍﻟﺘﻔﺘﻴﺶ‪،‬ﻭﻋﻠﻴﻪ ﻓﺎﻹﺫﻥ ﰲ ﻫﺬﻩ ﺍﳌﺎﺩﺓ ﻳﺘﻌﻠﻖ ﺣﺼﺮﺍ ﺑﺘﻔﺘﻴﺶ ﺍﳌﺴﺎﻛﻦ ‪ ،‬ﻟﻜﻦ ﺍﳌﺸﺮﻉ ﰲ‬
‫ﺃﺟﺎﺯ ﰲ ﺇﻃﺎﺭ ﺍﻟﺘﺤﺮﻱ ﻭﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﻔﺘﻴﺶ ﳏﻞ ﺁﺧﺮ ﻏﲑ ﺍﻟﺴﻜﻦ ﻭﻫﻮ ﺍﳌﻨﻈﻮﻣﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺩﻭﻥ ﺃﻥ ﻳﺸﺘﺮﻁ ﻟﻠﺪﺧﻮﻝ ﺇﻟﻴﻬﺎ ﺿﺮﻭﺭﺓ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺇﺫﻥ ﻣﻦ ﺍﳉﻬﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﺨﺘﺼﺔ‪،‬‬
‫ﻓﺤﺼﻮﻝ ﺿﺎﺑﻂ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﻋﻠﻰ ﺇﺫﻥ ﻳﺴﻤﺢ ﻟﻪ ﺑﺎﻟﺪﺧﻮﻝ ﺇﱃ ﺍﻷﻣﺎﻛﻦ ﺍﻟﱵ ﺗﺘﻮﺍﺟﺪ ‪‬ﺎ‬
‫ﺍﳊﻮﺍﺳﻴﺐ ﻻ ﻳﻨﺼﺮﻑ ﰲ ﺭﺃﻳﻲ ﺇﱃ ﺍﻹﺫﻥ ﺑﺪﺧﻮﻝ ﺍﳌﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﳍﺬﻩ ﺍﳊﻮﺍﺳﻴﺐ ﻭﺗﻔﺘﻴﺸﻬﺎ‬
‫ﻻﺧﺘﻼﻑ ﳏﻞ ﺍﻟﺘﻔﺘﻴﺶ ﺃﺻﻼ ‪ ،‬ﻟﺬﻟﻚ ﺃﻗﺘﺮﺡ ﻋﻠﻰ ﺍﳌﺸﺮﻉ ﺇﺿﺎﻓﺔ ﻓﻘﺮﺓ ﺃﺧﺮﻯ ﻟﻠﻤﺎﺩﺓ ‪ 05‬ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ‬
‫‪ 04/09‬ﻛﻤﺎ ﻳﻠﻲ "ﻻ ﳚﻮﺯ ﺇﺟﺮﺍﺀ ﻋﻤﻠﻴﺎﺕ ﺍﻟﺘﻔﺘﻴﺶ ﰲ ﺍﳊﺎﻻﺕ ﺍﳌﺬﻛﻮﺭﺓ ﺃﻋﻼﻩ ﺇﻻ ﺑﺈﺫﻥ ﻣﻜﺘﻮﺏ ﻣﻦ‬
‫ﺍﻟﺴﻠﻄﺔ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳌﺨﺘﺼﺔ"‪.‬‬
‫• ﺳﺒﻖ ﻭﺃﻥ ﻣﺮ ﺑﻨﺎ ﺃﻥ ﻣﻦ ﺑﲔ ﺍﻟﺼﻌﻮﺑﺎﺕ ﰲ ﲢﺪﻳﺪ ﻫﻮﻳﺔ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻫﻮ ﺍﺳﺘﻌﻤﺎﻝ ﻫﺬﺍ‬
‫ﺍﻷﺧﲑ ﳊﻮﺍﺳﻴﺐ ﻏﲑ ﺷﺨﺼﻴﺔ ﰲ ﺗﻨﻔﻴﺬ ﺟﺮﳝﺘﻪ ﻭﻏﺎﻟﺒﺎ ﻣﺎ ﺗﻜﻮﻥ ﰲ ﻣﻘﺎﻫﻲ ﺍﻹﻧﺘﺮﻧﺖ‪ ،‬ﻫﺬﻩ ﺍﻷﺧﲑﺓ‬

‫‪- 226 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺧـﺎﺗـﻤـﺔ‬

‫ﺍﻟﱵ ﻳﺮﺗﺎﺩﻫﺎ ﻋﺪﺩ ﻛﺒﲑ ﻣﻦ ﺍﻟﺰﺑﺎﺋﻦ ﻻ ﳝﻜﻦ ﻣﻌﺮﻓﺔ ﻫﻮﺍﻳﺎ‪‬ﻢ ‪ ،‬ﻟﺬﻟﻚ ﺃﻗﺘﺮﺡ ﻋﻠﻰ ﺍﳌﺸﺮﻉ ﺇﻋﺎﺩﺓ ﺍﻟﻨﻈﺮ‬
‫ﰲ ﺗﺴﲑ ﻫﺬﻩ ﺍﳌﻘﺎﻫﻲ ﻭﻋﺪﻡ ﺍﻋﺘﺒﺎﺭﻫﺎ ﳎﺮﺩ ﻧﺸﺎﻁ ﲡﺎﺭﻱ ﻛﻐﲑﻩ ﻣﻦ ﺍﻷﻧﺸﻄﺔ ﺍﻟﺘﺠﺎﺭﻳﺔ ﺍﻷﺧﺮﻯ‪ ،‬ﺑﻞ‬
‫ﻻﺑﺪ ﻣﻦ ﻓﺮﺽ ﺃﻋﺒﺎﺀ ﻭﺍﻟﺘﺰﺍﻣﺎﺕ ﻋﻠﻰ ﻣﻘﺪﻣﻲ ﻫﺬﻩ ﺍﳋﺪﻣﺔ ﻭﻣﺴﲑﻱ ﻣﻘﺎﻫﻲ ﺍﻹﻧﺘﺮﻧﺖ‪ ،‬ﻛﺄﻥ ﻳﻄﻠﺐ‬
‫ﻣﻦ ﺃﻱ ﺯﺑﻮﻥ ﻗﺒﻞ ﺷﺮﻭﻋﻪ ﰲ ﺍﺳﺘﻌﻤﺎﻻﻹﻧﺘﺮﻧﺘﻤﻞﺀ ﺍﺳﺘﻤﺎﺭﺓ ﲢﺪﺩ ﻓﻴﻬﺎ ﻛﺎﻣﻞ ﻫﻮﻳﺘﻪ ﻭﺍﻟﺘﻮﻗﻴﺖ ﺍﻟﺬﻱ‬
‫ﺍﺳﺘﻌﻤﻞ ﻓﻴﻪ ﺷﺒﻜﺔ ﺍﻹﻧﺘﺮﻧﺖ ﻭﺭﻗﻢ ﺟﻬﺎﺯ ﺍﳊﺎﺳﻮﺏ ﺍﻟﺬﻱ ﺍﺳﺘﻌﻤﻠﻪ‪،‬ﻛﻤﺎ ﻳﻠﺘﺰﻡ ﻣﺴﲑ‬
‫ﺍﳌﻘﻬىﺒﺎﻻﺣﺘﻔﺎﻅ ﺑﻌﻨﺎﻭﻳﻨﺎﳌﻮﺍﻗﻊ ﺍﻟﱵ ﰎ ﺯﻳﺎﺭ‪‬ﺎ ﰲ ﺫﺍﻛﺮﺓ ﻛﻞ ﺣﺎﺳﻮﺏ ﳌﺪﺓ ﻣﻌﻴﻨﺔ‪ ،‬ﻭﻧﻔﺲ ﺍﻟﺸﻲﺀ‬
‫ﺑﺎﻟﻨﺴﺒﺔ ﻻﺳﺘﻌﻤﺎﻝ ﺷﺒﻜﺎﺕ ﺍﻹﻧﺘﺮﻧﺖ ﺍﳌﻮﺟﻮﺩﺓ ﰲ ﺍﳌﺆﺳﺴﺎﺕ ﺍﻟﻌﺎﻣﺔ ﻛﺎﳉﺎﻣﻌﺎﺕ ﻭﻏﲑﻫﺎ‪.‬‬
‫• ﻟﻴﺲ ﺑﺎﳋﻔﻲ ﺃﻥ ﻫﻨﺎﻙ ﻣﻦ ﺍﻟﺸﺮﻛﺎﺕ ﺍﳋﺎﺻﺔ ﺍﻟﱵ ﲢﻮﻱ ﻣﻨﻈﻮﻣﺎ‪‬ﺎ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﺸﺨﺼﻴﺔ ﺃﻭ ﺍﻻﲰﻴﺔ ﻟﻠﻌﺪﻳﺪ ﻣﻦ ﺍﳌﺘﻌﺎﻣﻠﲔ ﻣﻌﻬﺎ‪ ،‬ﻓﺎﻟﺸﺮﻛﺎﺕ ﺍﳌﺘﺨﺼﺼﺔ ﰲ ﳎﺎﻝ‬
‫ﺍﻹﺗﺼﺎﻻﺕ ﻣﺜﻼ‪،‬ﻛﻤﺘﻌﺎﻣﻠﻲ ﺍﳍﺎﺗﻒ ﺍﻟﻨﻘﺎﻟﺘﻌﺘﱪ ﻣﻦ ﺧﻼﻝ ﻋﺪﺩ ﺍﳌﺸﺘﺮﻛﲔ ﻟﺪﻳﻬﺎ ﲟﺜﺎﺑﺔ ﺑﻨﻚ‬
‫ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﺍﻹﲰﻴﺔ ﻭﺍﻟﱵ ﳝﻜﻦ ﺍﻟﺘﻼﻋﺐ ﻭﺍﺳﺘﻌﻤﺎﳍﺎ ﰲ ﺃﻏﺮﺍﺽ ﻏﲑ ﻣﺸﺮﻭﻋﺔ‪ ،‬ﻟﺬﻟﻚ ﺍﻗﺘﺮﺡ ﻋﻠﻰ‬
‫ﺍﳌﺸﺮﻉ ﺃﻥ ﻳﺘﺪﺧﻞ ﻟﻮﺿﻊ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﳋﺎﺻﺔ ﺑﺎﻟﻀﻤﺎﻧﺎﺕ ﺍﻟﻮﻗﺎﺋﻴﺔ ﻟﻠﺤﻴﺎﺓ ﺍﻟﺸﺨﺼﻴﺔ ﰲ ﺇﻃﺎﺭ‬
‫ﻗﺎﻧﻮﻥ ﻣﺘﻜﺎﻣﻞ ﻳﻜﻮﻥ ﲟﺜﺎﺑﺔ ﻣﺒﺎﺩﺉ ﻳﻘﻮﻡ ﻋﻠﻴﻬﺎ ﻧﺸﺎﻁ ﻧﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﺸﺨﺼﻴﺔ ﺃﻭ ﺍﻹﲰﻴﺔ ﻭﻫﺬﺍ‬
‫ﺍﳌﻮﺿﻮﻉ ﺃﺭﻯ ﺃﻧﻪ ﺟﺪﻳﺮ ﺑﺎﻟﺒﺤﺚ ﻭﺍﳌﻨﺎﻗﺸﺔ ﰲ ﺩﺭﺍﺳﺎﺕ ﻻﺣﻘﺔ ﺇﻥ ﻭﻓﻘﲏ ﺍﷲ‪.‬‬
‫ﺃﺭﺟﻮﺍ ﺃﻥ ﺃﻛﻮﻥ ﻗﺪ ﻭﻗﻔﺖ ﰲ ﻣﻌﺎﳉﺔ ﻫﺬﺍ ﺍﳌﻮﺿﻮﻉ‪ ،‬ﻭﺇﻥ ﱂ ﺃﻭﻓﻖ ﻓﻌﺬﺭﻱ ﺃﻧﲏ ﺍﺟﺘﻬﺪﺕ‬
‫ﻭﻟﻜﻞ ﳎﺘﻬﺪ ﻧﺼﻴﺐ‪.‬‬

‫‪- 227 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﻗﺎﺋﻤﺔ اﻟﻤﺮاﺟﻊ‬

PDF created with pdfFactory Pro trial version www.pdffactory.com


‫ﻗـﺎﺋﻤﺔ ﺍﳌﺮﺍﺟﻊ‪:‬‬

‫ﻗـﺎﺋﻤﺔ ﺍﳌﺮﺍﺟﻊ‪:‬‬
‫ﺃﻭﻻ‪ :‬ﺍﳌﺼــﺎﺩﺭ‬
‫‪/1‬ﺍﻟﻘـﻮﺍﻧﲔ‬
‫ﺍﻟﺪﺳﺘﻮﺭ ﺍﳉﺰﺍﺋﺮﻱ ﺳﻨﺔ ‪.1996‬‬ ‫‪-‬‬
‫ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﺍﳌﻌﺪﻝ ﻭﺍﳌﺘﻤﻢ‬ ‫‪-‬‬
‫ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺍﳌﻌﺪﻝ ﻭﺍﳌﺘﻤﻢ‬ ‫‪-‬‬
‫ﺍﳌﺘﻀﻤﻦ ﺍﻟﻘﻮﺍﻋﺪ‬ ‫‪2009‬‬ ‫ﺃﻭﺕ‬ ‫‪5‬‬ ‫ﻗﺎﻧﻮﻥ ‪ 04/09‬ﺍﳌﺆﺭﺥ ﰲ ‪ 14‬ﺷﻌﺒﺎﻥ ‪ 1430‬ﺍﳌﻮﺍﻓﻖ ﻟـ‬ ‫‪-‬‬
‫ﺍﳋﺎﺻﺔ ﻟﻠﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭﺍﻻﺗﺼﺎﻝ ﻭﻣﻜﺎﻓﺤﺘﻬﺎ‪.‬‬
‫‪ -‬ﻗﺎﻧﻮﻥ ‪ 03/2000‬ﺍﳌﺆﺭﺥ ﰲ ‪ 5‬ﲨﺎﺩﻯ ﺍﻷﻭﱃ ‪ 1421‬ﺍﳌﻮﺍﻓﻖ ﻟـ ‪ 5‬ﺃﻭﺕ ‪ 2000‬ﳏﺪﺩ‬
‫ﺍﻟﻘﻮﺍﻋﺪ ﺍﻟﻌﺎﻣﺔ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﻟﱪﻳﺪ ﻭﺍﳌﻮﺍﺻﻼﺕ ﺍﻟﺴﻠﻜﻴﺔ ﻭﺍﻟﻼﺳﻠﻜﻴﺔ‪.‬‬
‫ﻣﺮﺳﻮﻡ ﺭﺋﺎﺳﻲ ‪183/04‬ﻣﺆﺭﺥ ﰲ ‪ 8‬ﲨﺎﺩﻯ ﺍﻷﻭﱃ‪ 1425‬ﺍﳌﻮﺍﻓﻖ ﻟـ ‪ 26‬ﻳﻮﻧﻴﻮ ‪ 2004‬ﻳﺘﻀﻤﻦ‬
‫ﺇﺣﺪﺍﺙ ﺍﳌﻌﻬﺪ ﺍﻟﻮﻃﲏ ﻟﻸﺩﻟﺔ ﺍﳉﻨﺎﺋﻴﺔ ﻭﻋﻠﻢ ﺍﻹﺟﺮﺍﻡ ﻟﻠﺪﺭﻙ ﺍﻟﻮﻃﲏ ﻭﲢﺪﻳﺪ ﺍﻟﻘﺎﻧﻮﱐ ﺍﻷﺳﺎﺳﻲ‪.‬‬
‫ﺛﺎﻧﻴﺎ‪ :‬ﺍﻟﻜﺘﺐ ﺑـﺎﻟﻠﻐﺔ ﺍﻟﻌـﺮﺑﻴﺔ‪:‬‬
‫‪ /1‬ﺍﻟﻜﺘﺐ ﺍﻟﻌﺎﻣـﺔ‪:‬‬
‫‪ .1‬ﺃﲪﺪ ﻏﺎﻱ‪ ،‬ﺿﻤﺎﻧﺎﺕ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﺃﺛﻨﺎﺀ ﺍﻟﺘﺤﺮﻳﺎﺕ ﺍﻷﻭﻟﻴﺔ‪ ،‬ﺩﺍﺭ ﻫﻮﻣﺔ‪ ،‬ﻃﺒﻌﺔ ‪.2003‬‬
‫‪ .2‬ﺃﲪﺪ ﻓﺘﺤﻲ ﺳﺮﻭﺭ‪ ،‬ﺍﻟﻮﺳﻴﻂ ﰲ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﻨﺎﺋﻴﺔ‪،‬ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ‪.1996 ،‬‬
‫‪ .3‬ﺃﺷﺮﻑ ﻋﺒﺪ ﺍﻟﻘﺎﺩﺭ ﻗﻨﺪﻳﻞ‪،‬ﺍﻟﻨﻈﺮﻳﺔ ﺍﻟﻌﺎﻣﺔ ﻟﻠﺒﺤﺚ ﺍﳉﻨﺎﺋﻲ ﻭﺃﺛﺮﻫﺎ ﰲ ﻋﻘﻴﺪﺓ ﺍﻟﻘﺎﺿﻲ‪ ،‬ﺩﺍﺭ‬
‫ﺍﳉﺎﻣﻌﺔ ﺍﳉﺪﻳﺪﺓ ‪ ،‬ﻃﺒﻌﺔ ‪.2011‬‬
‫‪ .4‬ﺣﺎﰎ ﺣﺴﻦ ﻣﻮﺳﻰ ﺑﻜﺎﺭ‪ ،‬ﺳﻠﻄﺔ ﺍﻟﻘﺎﺿﻲ ﺍﳉﻨﺎﺋﻲ ﰲ ﺗﻘﺪﻳﺮ ﺍﻟﻌﻘﻮﺑﺔ ﻭﺍﻟﺘﺪﺍﺑﲑ ﺍﻹﺣﺘﺮﺍﺯﻳﺔ‪،‬‬
‫ﺍﻟﺪﺍﺭ ﺍﳉﻤﺎﻫﲑﻳﺔ ﻟﻠﻨﺸﺮ ﻭﺍﻟﺘﻮﺯﻳﻊ ﻭﺍﻹﻋﻼﻥ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪.2005‬‬
‫‪ .5‬ﻓﺎﻳﺰ ﺍﻹﻳﻌﺎﱄ‪ ،‬ﻗﻮﺍﻋﺪ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺃﻭ ﺃﺻﻮﻝ ﺍﶈﺎﻛﻤﺎﺕ ﺍﳉﺰﺍﺋﻴﺔﻋﻠﻰ ﺿﻮﺀ ﺍﻟﻘﺎﻧﻮﻥ‬
‫ﻭﺍﻟﻔﻘﻪ ﻭﺍﻹﺟﺘﻬﺎﺩ ‪ ،‬ﺍﳌﺆﺳﺴﺔ ﺍﳊﺪﻳﺜﺔ ﻟﻠﻜﺘﺎﺏ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪.1994،‬‬
‫‪ .6‬ﻋﺒﺪ ﺍﷲ ﺳﻠﻴﻤﺎﻥ ‪ ،‬ﺷﺮﺡ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﺍﳉﺰﺍﺋﺮﻱ ﺍﻟﻘﺴﻢ ﺍﻟﻌﺎﻡ ﺍﳉﺰﺀ ﺍﻷﻭﻝ )ﺍﳉﺮﳝﺔ(‪،‬‬
‫ﺩﻳﻮﺍﻥ ﺍﳌﻄﺒﻮﻋﺎﺕ ﺍﳉﺎﻣﻌﻴﺔ‪.‬‬

‫‪- 229 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﻗـﺎﺋﻤﺔ ﺍﳌﺮﺍﺟﻊ‪:‬‬

‫‪ .7‬ﻋﻠﻲ ﺃﲪﺪ ﻋﺒﺪ ﺍﻟﺰﻋﱯ‪ ،‬ﺣﻖ ﺍﳋﺼﻮﺻﻴﺔ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﻨﺎﺋﻲ‪ ،‬ﺍﳌﺆﺳﺴﺔ ﺍﳊﺪﻳﺜﺔ‬
‫ﻟﻠﻜﺘﺎﺏ‪.2006،‬‬
‫‪ .8‬ﻋﺒﺪ ﺍﷲ ﺃﻭﻫﻴﺒﻴﺔ‪ ،‬ﺷﺮﺡ ﻗﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﺍﳉﺰﺍﺋﺮﻱ ﺍﻟﺘﺤﺮﻱ ﻭﺍﻟﺘﺤﻘﻴﻖ‪ ،‬ﺩﺍﺭ ﻫﻮﻣﺔ‪،‬‬
‫ﺍﻟﻄﺒﻌﺔ ‪.2003‬‬
‫‪ .9‬ﳏﻤﺪ ﳏﺪﺓ‪ ،‬ﺿﻤﺎﻧﺎﺕ ﺍﳌﺘﻬﻢ ﺃﺛﻨﺎﺀ ﺍﻟﺘﺤﻘﻴﻖ‪،‬ﺩﺍﺭ ﺍﳍﺪﻯ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪.1992-1991‬‬
‫‪ .10‬ﳏﻤﺪ ﺣﺰﻳﻂ‪ ،‬ﻗﺎﺿﻲ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺍﻟﻨﻈﺎﻡ ﺍﻟﻘﻀﺎﺋﻲ ﺍﳉﺰﺍﺋﺮﻱ‪ ،‬ﺩﺍﺭ ﻫﻮﻣﺔ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻟﺜﺎﺛﻴﺔ‪.2010‬‬
‫‪ .11‬ﳏﻤﺪ ﺯﻛﻲ ﺃﺑﻮ ﻋﺎﻣﺮ‪ ،‬ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﻨﺎﺋﻴﺔ‪ ،‬ﺩﺍﺭ ﺍﳉﺎﻣﻌﺔ ﺍﳉﺪﻳﺪﺓ ﺍﻟﻘﺎﻫﺮﺓ‪ ،‬ﻃﺒﻌﺔ ‪.2008‬‬
‫‪/2‬ﺍﻟﻜﺘﺒﺎﳌـﺘﺨﺼﺼﺔ‬

‫‪ .1‬ﺃﻣﲑ ﻓﺮﺝ ﻳﻮﺳﻒ‪:‬‬


‫ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﺷﺒﻜﺔ ﺍﻹﻧﺘﺮﻧﺖ‪ ،‬ﺩﺍﺭ ﺍﳌﻄﺒﻮﻋﺎﺕ ﺍﳉﺎﻣﻌﻴﺔ ﺍﻹﺳﻜﻨﺪﺭﻳﺔ‪.2009‬‬ ‫‪-‬‬
‫‪ -‬ﺍﳉﺮﳝﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﺍﳉﻬﻮﺩ ﺍﻟﺪﻭﻟﻴﺔ ﻭﺍﶈﻠﻴﺔ ﳌﻜﺎﻓﺤﺔ ﺟﺮﺍﺋﻢ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﺍﻹﻧﺘﺮﻧﺖ‪،‬‬
‫ﻣﻜﺘﺒﺔ ﺍﻟﻮﻓﺎﺀ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﻹﺳﻜﻨﺪﺭﻳﺔ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪.2011‬‬
‫ﺃﲪﺪ ﺧﻠﻴﻔﺔ ﺍﳌﻠﻂ ‪ ،‬ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪ ،‬ﺩﺍﺭ ﺍﻟﻔﻜﺮ ﺍﳉﺎﻣﻌﻲ ﺍﻹﺳﻜﻨﺪﺭﻳﺔ ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻟﺜﺎﻧﻴﺔ‪،‬‬ ‫‪.2‬‬
‫‪.2006‬‬
‫‪ .3‬ﺇﻳﻬﺎﺏ ﻓﻮﺯﻱ ﺍﻟﺴﻘﺎ‪ ،‬ﺟﺮﳝﺔ ﺍﻟﺘﺰﻭﻳﺮ ﰲ ﺍﶈﺮﺭﺍﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﺩﺍﺭ ﺍﳉﺎﻣﻌﺔ ﺍﳉﺪﻳﺪﺓ‬
‫ﻟﻠﻨﺸﺮﺍﻹﺳﻜﻨﺪﺭﻳﺔ ‪.2008‬‬
‫‪ .4‬ﺍﻟﺸﺤﺎﺕ ﺇﺑﺮﺍﻫﻴﻢ ﳏﻤﺪ ﻣﻨﺼﻮﺭ‪ ،‬ﺍﳉﺮﺍﺋﻢ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﰲ ﺍﻟﺸﺮﻳﻌﺔ ﺍﻹﺳﻼﻣﻴﺔ ﻭﺍﻟﻘﻮﺍﻧﲔ ﺍﻟﻮﺿﻌﻴﺔ‬
‫ﲝﺚ ﻓﻘﻬﻲ ﻣﻘﺎﺭﻥ‪ ،‬ﺩﺍﺭ ﺍﻟﻔﻜﺮ ﺍﳉﺎﻣﻌﻲ ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ‪.2011‬‬
‫‪ .5‬ﺑﻮﻟﲔ ﺃﻧﻄﻮﻧﻴﻮﺱ ﺃﻳﻮﺏ‪ ،‬ﺍﳊﻤﺎﻳﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺤﻴﺎﺓ ﺍﻟﺸﺨﺼﻴﺔ ﰲ ﳎﺎﻝ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺩﺭﺍﺳﺔ ﻣﻘﺎﺭﻧﺔ‬
‫‪ ،‬ﻣﻨﺸﻮﺭﺍﺕ ﺍﳊﻠﱯ ﺍﳊﻘﻮﻗﻴﺔ ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪. 2009‬‬
‫‪ .6‬ﺧﺎﻟﺪ ﻋﻴﺎﺩ ﺍﳊﻠﱯ‪،‬ﺇﺟﺮﺍﺀﺍﺕ ﺍﻟﺘﺤﺮﻱ ﻭﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺟﺮﺍﺋﻢ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻹﻧﺘﺮﻧﺖ‪ ،‬ﺩﺍﺭ ﺍﻟﺜﻘﺎﻓﺔ‬
‫ﻟﻠﻨﺸﺮ ﻭﺍﻟﺘﻮﺯﻳﻊ ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪2011‬‬
‫‪ .7‬ﺧﺎﻟﺪ ﳑﺪﻭﺡ ﺇﺑﺮﺍﻫﻴﻢ‪:‬‬
‫‪ -‬ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺩﺍﺭ ﺍﻟﻔﻜﺮ ﺍﳉﺎﻣﻌﻲ ﺍﻹﺳﻜﻨﺪﺭﻳﺔ ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪.2009‬‬
‫ﺃﻣﻦ ﺍﳉﺮﳝﺔﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﺍﻟﺪﺍﺭ ﺍﳉﺎﻣﻌﻴﺔ‪ ،‬ﺍﻹﺳﻜﻨﺪﺭﻳﺔ‪ ،‬ﺍﻟﻄﺒﻌﺔ ‪.2008‬‬ ‫‪-‬‬
‫‪- 230 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﻗـﺎﺋﻤﺔ ﺍﳌﺮﺍﺟﻊ‪:‬‬

‫ﻓﻦ ﺍﻟﺘﺤﻘﻴﻖ ﺍﳉﻨﺎﺋﻲ ﰲ ﺍﳉﺮﺍﺋﻤﺎﻹﻟﻜﺘﺮﻭﻧﻴﺔ ‪،‬ﺩﺍﺭ ﺍﻟﻔﻜﺮ ﺍﳉﺎﻣﻌﻲ ﺍﻹﺳﻜﻨﺪﺭﻳﺔ ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ‬ ‫‪-‬‬
‫‪.2009‬‬
‫‪ .8‬ﺧﺜﲑﻣﺴﻌﻮﺩ ‪ ،‬ﺍﳊﻤﺎﻳﺔ ﺍﳉﻨﺎﺋﻴﺔ ﻟﱪﺍﻣﺞ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ‪ ،‬ﺩﺍﺭ ﺍﳍﺪﻯ ﻋﲔ ﻣﻠﻴﻠﺔ ‪ ،‬ﺍﻟﻄﺒﻌﺔ ‪.2010‬‬
‫‪ .9‬ﺭﺷﻴﺪﺓ ﺑﻮﻛﺮ ‪ ،‬ﺟﺮﺍﺋﻢ ﺍﻹﻋﺘﺪﺍﺀ ﻋﻠﻰ ﻧﻈﻢ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ‬
‫ﺍﳌﻘﺎﺭﻥ‪،‬ﻣﻨﺸﻮﺭﺍﺕ ﺍﳊﻠﱯ ﺍﳊﻘﻮﻗﻴﺔ ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ‪.2012‬‬
‫‪ .10‬ﺷﻴﻤﺎﺀ ﻋﺒﺪ ﺍﻟﻐﲏ ﳏﻤﺪ ﻋﻄﺎﺍﷲ ‪ ،‬ﺍﳊﻤﺎﻳﺔ ﺍﳉﻨﺎﺋﻴﺔ ﻟﻠﺘﻌﺎﻣﻼﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ‪ ،‬ﺩﺍﺭ ﺍﳉﺎﻣﻌﺔ‬
‫ﺍﳉﺪﻳﺪﺓ ‪.2007،‬‬
‫‪ .11‬ﻋﻔﻴﻔﻲ ﻛﺎﻣﻞ ﻋﻔﻴﻔﻲ‪ ،‬ﺟﺮﺍﺋﻢ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﻭﺣﻘﻮﻕ ﺍﳌﺆﻟﻒ ﻭﺍﳌﺼﻨﻔﺎﺕ ﺍﻟﻔﻨﻴﺔ ﻭﺩﻭﺭ ﺍﻟﺸﺮﻃﺔ‬
‫ﻭﺍﻟﻘﺎﻧﻮﻥ‪،‬ﺩﺭﺍﺳﺔ ﻣﻘﺎﺭﻧﺔ ‪ ،‬ﻣﻨﺸﻮﺭﺍﺕ ﺍﳊﻠﱯ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻟﺜﺎﻧﻴﺔ ‪.2007،‬‬
‫‪.12‬ﻋﺎﺩﻝ ﻋﺰﺍﻡ ﺳﻘﻒ ﺍﳊﻴﻂ‪،‬ﺟﺮﺍﺋﻢ ﺍﻟﺬﻡ ﻭ ﺍﻟﻘﺪﺣﻮ ﺍﻟﺘﺤﻘﲑ ﺍﳌﺮﺗﻜﺒﺔ ﻋﱪ ﺍﻟﻮﺳﺎﺋﻂ‬
‫ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔﺩﺭﺍﺳﺔ ﻗﺎﻧﻮﻧﻴﺔ ﻣﻘﺎﺭﻧﺔ‪ ،‬ﺩﺍﺭ ﺍﻟﺜﻘﺎﻓﺔ ﻟﻠﻨﺸﺮ ﻭﺍﻟﺘﻮﺯﻳﻊ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ‪.2011 ،‬‬
‫‪.13‬ﻋﻠﻲ ﻋﺪﻧﺎﻥ ﺍﻟﻔﻴﻞ ‪ ،‬ﺍﻹﺟﺮﺍﻡ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺪﺭﺍﺳﺔ ﻣﻘﺎﺭﻧﺔ‪ ،‬ﻣﻨﺸﻮﺭﺍﺕ ﺯﻳﻦ ﺍﳊﻘﻮﻗﻴﺔ ‪ ،‬ﺍﻟﻄﺒﻌﺔ‬
‫ﺍﻷﻭﱃ‪.2011‬‬
‫‪ .14‬ﻋﺒﺪ ﺍﻟﻔﺘﺎﺡ ﺑﻴﻮﻣﻲ ﺣﺠﺎﺯﻱ ‪:‬‬
‫‪ -‬ﳓﻮ ﺻﻴﺎﻏﺔ ﻧﻈﺮﻳﺔ ﻋﺎﻣﺔ ﰲ ﻋﻠﻢ ﺍﳉﺮﳝﺔ ﻭﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ‪ ،‬ﻣﻨﺸﺄﺓ ﺍﳌﻌﺎﺭﻑ ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪.2009‬‬
‫‪-‬ﻣﺒﺎﺩﺉ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﻨﺎﺋﻴﺔ ﰲ ﺟﺮﺍﺋﻢ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﻭﺍﻹﻧﺘﺮﻧﺖ‪ ،‬ﺩﺍﺭ ﺍﻟﻔﻜﺮ ﺍﳉﺎﻣﻌﻲ ﺍﻹﺳﻜﻨﺪﺭﻳﺔ‪،‬‬
‫ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪.2006‬‬
‫‪ -‬ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ ﰲ ﺟﺮﺍﺋﻢ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﻭﺍﻹﻧﺘﺮﻧﺖ ‪ ،‬ﺩﺍﺭ ﺍﻟﻜﺘﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ‪.2007 ،‬‬
‫‪ -‬ﺍﳉﺮﳝﺔ ﰲ ﻋﺼﺮ ﺍﻟﻌﻮﳌﺔ )ﺩﺭﺍﺳﺔ ﰲ ﺍﻟﻈﺎﻫﺮﺓ ﺍﻹﺟﺮﺍﻣﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ( ‪ ،‬ﺩﺍﺭ ﺍﻟﻔﻜﺮ ﺍﳉﺎﻣﻌﻲ‪،‬‬
‫ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪.2007‬‬
‫‪ .15‬ﻋﻠﻲ ﺣﺴﻦ ﳏﻤﺪ ﺍﻟﻄﻮﺍﻟﺒﺔ ‪ ،‬ﺍﻟﺘﻔﺘﻴﺶ ﺍﳉﻨﺎﺋﻲ ﻋﻠﻰ ﻧﻈﻢ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻹﻧﺘﺮﻧﺖ‪ ،‬ﻋﺎﱂ ﺍﻟﻜﺘﺐ‬
‫ﺍﳊﺪﻳﺜﺔ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪.2004‬‬
‫‪ .16‬ﳏﻤﺪ ﻃﺎﺭﻕ ﻋﺒﺪ ﺍﻟﺮﺅﻭﻑ ﺍﳊﻦ‪ ،‬ﺟﺮﳝﺔ ﺍﻹﺣﺘﻴﺎﻝ ﻋﱪ ﺍﻹﻧﺘﺮﻧﺖ ) ﺍﻷﺣﻜﺎﻡ ﺍﳌﻮﺿﻮﻋﻴﺔ‬
‫‪2011‬‬ ‫ﻭﺍﻷﺣﻜﺎﻡ ﺍﻹﺟﺮﺍﺋﻴﺔ ( ﻣﻨﺸﻮﺭﺍﺕ ﺍﳊﻠﱯ ﺍﳊﻘﻮﻗﻴﺔ ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ‬

‫‪- 231 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﻗـﺎﺋﻤﺔ ﺍﳌﺮﺍﺟﻊ‪:‬‬

‫‪ .17‬ﳏﻤﺪ ﺃﻣﲔ ﺍﻟﺸﻮﺍﺑﻜﺔ ‪ ،‬ﺟﺮﺍﺋﻢ ﺍﳊﺎﺳﻮﺏ ﻭﺍﻹﻧﺘﺮﻧﺖ ""ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ""‪ ،‬ﺩﺍﺭ ﺍﻟﺜﻘﺎﻓﺔ‬
‫ﻟﻠﻨﺸﺮ ﻭﺍﻟﺘﻮﺯﻳﻊ ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪.2009‬‬
‫‪ .18‬ﳏﻤﺪ ﺧﻠﻴﻔﺔ‪ ،‬ﺍﳊﻤﺎﻳﺔ ﺍﳉﻨﺎﺋﻴﺔ ﳌﻌﻄﻴﺎﺕ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﺰﺍﺋﺮﻱ ﻭﺍﳌﻘﺎﺭﻥ‪،‬ﺩﺍﺭ‬
‫ﺍﳉﺎﻣﻌﺔ ﺍﳉﺪﻳﺪﺓ ﺍﻹﺳﻜﻨﺪﺭﻳﺔ ‪.2007،‬‬
‫‪ .19‬ﻣﺼﻄﻔﻰ ﳏﻤﺪ ﻣﻮﺳﻰ‪ ،‬ﺍﻟﺘﺤﻘﻴﻖ ﺍﳉﻨﺎﺋﻲ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﻣﻄﺎﺑﻊ ﺍﻟﺸﺮﻃﺔ ﺍﻟﻘﺎﻫﺮﺓ‪،‬‬
‫ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪2009‬‬
‫‪ .20‬ﳏﻤﺪ ﻋﺒﺪ ﺍﷲ ﺃﺑﻮ ﺑﻜﺮ ﺳﻼﻣﺔ ‪،‬ﺟﺮﺍﺋﻢ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﻭﺍﻹﻧﺘﺮﻧﺖ ‪ ،‬ﻣﻨﺸﺄﺓ ﺍﳌﻌﺎﺭﻑ‪2006،‬‬
‫‪ .21‬ﳏﻤﻮﺩ ﺃﲪﺪ ﻋﺒﺎﻧﺔ ‪ ،‬ﺟﺮﺍﺋﻢ ﺍﳊﺎﺳﻮﺏ ﻭﺃﺑﻌﺎﺩﻫﺎ ﺍﻟﺪﻭﻟﻴﺔ ‪ ،‬ﺩﺍﺭ ﺍﻟﺜﻘﺎﻓﺔ ﻟﻠﻨﺸﺮ ﻭﺍﻟﺘﻮﺯﻳﻊ ‪ ،‬ﺍﻟﻄﺒﻌﺔ‬
‫ﺍﻷﻭﱃ ‪.2009‬‬
‫‪ .22‬ﻣﻨﲑ ﳏﻤﺪ ﺍﳉﻨﺒﻴﻬﻴﻮﳑﺪﻭﺡ ﳏﻤﺪ ﺍﳉﻨﺒﻴﻬﲏ‪:‬‬
‫‪ -‬ﺟﺮﺍﺋﻢ ﺍﻹﻧﺘﺮﻧﺖ ﻭﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻭﻭﺳﺎﺋﻞ ﻣﻜﺎﻓﺤﺘﻬﻤﺎ ‪ ،‬ﺩﺍﺭ ﺍﻟﻔﻜﺮ ﺍﳉﺎﻣﻌﻲ ‪.2004‬‬
‫ﺃﻣﻦ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ‪ ،‬ﺩﺍﺭ ﺍﻟﻔﻜﺮ ﺍﳉﺎﻣﻌﻲ ‪2006‬‬ ‫‪-‬‬
‫‪ .23‬ﻧﺎﺋﻠﺔ ﻋﺎﺩﻝ ﳏﻤﺪ ﻓﺮﻳﺪ ﻗﻮﺭﺓ ‪ ،‬ﺟﺮﺍﺋﻢ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﺍﻻﻗﺘﺼﺎﺩﻳﺔ‪ ،‬ﻣﻨﺸﻮﺭﺍﺕ ﺍﳊﻠﱯ‪ ،‬ﺍﻟﻄﺒﻌﺔ‬
‫ﺍﻷﻭﱃ‪.2005‬‬
‫‪.24‬ﻠﺔ ﻋﺒﺪ ﺍﻟﻘﺎﺩﺭ ﺍﳌﻮﻣﲏ‪ ،‬ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪ ،‬ﺩﺍﺭ ﺍﻟﺜﻘﺎﻓﺔ ﻟﻠﻨﺸﺮ ﻭﺍﻟﺘﻮﺯﻳﻊ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻟﺜﺎﻧﻴﺔ ‪.2010‬‬
‫‪ .25‬ﻫﺸﺎﻡ ﳏﻤﺪ ﻓﺮﻳﺪ ﺭﺳﺘﻢ ‪ ،‬ﺍﳉﻮﺍﻧﺐ ﺍﻹﺟﺮﺍﺋﻴﺔ ﻟﻠﺠﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪ ،‬ﻣﻜﺘﺒﺔ ﺍﻵﻻﺕ ﺍﳊﺪﻳﺜﺔ‪،‬‬
‫ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ ‪1994‬‬
‫‪ .26‬ﻭﺿﺎﺡ ﳏﻤﻮﺩ ﺍﳊﻤﻮﺩ ﻭﻧﺸﺄﺕ ﻣﻔﻀﻲ ﺍ‪‬ﺎﱄ‪ ،‬ﺟﺮﺍﺋﻢ ﺍﻹﻧﺘﺮﻧﺖ‪،‬ﺩﺍﺭ ﺍﳌﻨﺎﺭ ﻟﻠﻨﺸﺮ ﻭﺍﻟﺘﻮﺯﻳﻊ‬
‫‪.2005‬‬
‫‪ .27‬ﻳﻮﻧﺲ ﻋﺮﺏ‪ ،‬ﻗﺎﻧﻮﻥ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﻣﻮﺳﻮﻋﺔ ﺍﻟﻘﺎﻧﻮﻥ ﻭﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﻣﻨﺸﻮﺭﺍﺕ ﺇﲢﺎﺩ‬
‫ﺍﳌﺼﺎﺭﻑ ﺍﻟﻌﺮﺑﻴﺔ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ‪.2001‬‬
‫ﺛﺎﻟﺜﺎ‪ :‬ﺍﻟﺮﺳﺎﺋﻞ ﺍﻟﻌﻠﻤﻴﺔ‪:‬‬
‫‪ .1‬ﺃﺑﻮ ﺍﳌﻌﺎﱄ ﳏﻤﺪ ﻋﻴﺴﻰ‪ ،‬ﺍﳊﺎﺟﺔ ﺇﱃ ﲢﺪﻳﺚ ﺁﻟﻴﺎﺕ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﺪﻭﱄ ﰲ ﳎﺎﻝ ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﺭﻗﺔ ﻣﻘﺪﻣﺔ ﻟﻠﻤﺆﲤﺮ ﺍﳌﻐﺎﺭﰊ ﺍﻷﻭﻝ ﺣﻮﻝ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺍﻟﻘﺎﻧﻮﻥ‪.‬‬

‫‪- 232 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﻗـﺎﺋﻤﺔ ﺍﳌﺮﺍﺟﻊ‪:‬‬

‫‪ .2‬ﺻﺎﱀ ﺃﲪﺪ ﺍﻟﱪﺑﺮﻱ ‪ ،‬ﺩﻭﺭ ﺍﻟﺸﺮﻃﺔ ﰲ ﻣﻜﺎﻓﺤﺔ ﺟﺮﺍﺋﻢ ﺍﻹﻧﺘﺮﻧﺖ ﰲ ﺇﻃﺎﺭ ﺍﻹﺗﻔﺎﻗﻴﺔ‬
‫ﺍﻷﻭﺭﻭﺑﻴﺔﺍﳌﻮﻗﻌﺔ ﰲ ﺑﻮﺩﺍﺑﺴﺖ ﰲ ‪ .2001/11/23‬ﲝﺚ ﻣﻨﺸﻮﺭ ﻋﻠﻰ ﻣﻮﻗﻊ‬
‫‪.www.arablawinfo.com‬‬
‫‪ .3‬ﻃﺎﺭﻕ ﳏﻤﺪ ﺍﳉﻤﻠﻲ‪ ،‬ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﰲ ﳎﺎﻝ ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ‪ ،‬ﻭﺭﻗﺔ ﻋﻤﻞ ﻣﻘﺪﻣﺔ ﻟﻠﻤﺆﲤﺮ‬
‫ﺍﳌﻐﺎﺭﰊ ﺍﻷﻭﻝ ﺣﻮﻝ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﳌﻨﻌﻘﺪ ﰲ ‪ 2009/10/ 29-28‬ﻷﻛﺎﺩﳝﻴﺔ ﺍﻟﺪﺭﺍﺳﺎﺕ ﺍﻟﻌﻠﻴﺎ ﻃﺮﺍﺑﻠﺲ‪.‬‬
‫‪ .4‬ﻋﺎﺩﻝ ﻳﻮﺳﻒ ﻋﺒﺪ ﺍﻟﻨﱯ ﺍﻟﺸﻜﺮﻱ ‪ ،‬ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺃﺯﻣﺔ ﺍﻟﺸﺮﻋﻴﺔ ﺍﳉﺰﺍﺋﻴﺔ‪ ،‬ﺟﺎﻣﻌﺔ ﺍﻟﻜﻮﻓﺔ‪،‬‬
‫ﻛﻠﻴﺔ ﺍﻟﻘﺎﻧﻮﻥ‪.‬‬
‫‪ .5‬ﻋﺒﺪ ﺍﳉﺒﺎﺭ ﺍﳊﻨﻴﺺ‪ ،‬ﺍﻹﺳﺘﺨﺪﺍﻡ ﻏﲑ ﺍﳌﺸﺮﻭﻉ ﻟﻨﻈﺎﻡ ﺍﳊﺎﺳﻮﺏ ﰲ ﻭﺟﻬﺔ ﻧﻈﺮ ﺍﻟﻘﺎﻧﻮﻥ‬
‫ﺍﳉﻨﺎﺋﻲ‪ ،‬ﳎﻠﺔ ﺟﺎﻣﻌﺔ ﺩﻣﺸﻖ ﻟﻠﻌﻠﻮﻡ ﺍﻹﻗﺘﺼﺎﺩﻳﺔ ﻭﺍﻟﻘﺎﻧﻮﻧﻴﺔ‪ ،‬ﺍ‪‬ﻠﺪ ‪ ،27‬ﺍﻟﻌﺪﺩ ﺍﻷﻭﻝ‪.2001 :‬‬
‫‪ .6‬ﻋﺒﺪ ﺍﷲ ﺣﺴﲔ ﻋﻠﻲ ﳏﻤﻮﺩ ‪ ،‬ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻷﺩﻟﺔ ﰲ ﳎﺎﻝ ﺟﺮﳝﺔ ﺳﺮﻗﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ‪.‬‬
‫‪ .7‬ﻋﻤﺮ ﳏﻤﺪ ﺑﻦ ﻳﻮﻧﺲ ‪ ،‬ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪ ،‬ﲝﺚ ﻣﻨﺸﻮﺭ ﻋﻠﻰ ﻣﻮﻗﻊ ‪.www.arablawinfo.com‬‬

‫‪ .8‬ﻋﻄﺎ ﺍﷲ ﻓﺸﺎﺭ‪،‬ﻣﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ‪ ،‬ﺟﺎﻣﻌﺔ ﺍﳉﻠﻔﺔ‪.‬‬


‫‪ .9‬ﳏﻤﺪ ﻋﻴﺪ ﺳﻴﻒ ﺳﻌﻴﺪ ﺍﳌﺴﻤﺎﺭﻱ‪ ،‬ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ ﺑﺎﻷﺩﻟﺔ ﺍﻟﺮﻗﻤﻴﺔ ﻣﻦ ﺍﻟﻨﺎﺣﺘﲔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ‬
‫ﻭﺍﻟﻔﻨﻴﺔ ﺩﺭﺍﺳﺔ ﺗﻄﺒﻴﻘﻴﺔ ﻣﻘﺎﺭﻧﺔ ‪،‬ﺟﺎﻣﻌﺔ ﻧﺎﻳﻒ ﺍﻟﻌﺮﺑﻴﺔ ﻟﻠﻌﻠﻮﻡ ﺍﻷﻣﻨﻴﺔ‪ ،‬ﺍﳌﺆﲤﺮ ﺍﻟﻌﺮﰊ ﺍﻷﻭﻝ ﻟﻌﻠﻮﻡ ﺍﻷﺩﻟﺔ‬
‫ﺍﳉﻨﺎﺋﻴﺔ ﻭﺍﻟﻄﺐ ﺍﻟﺸﺮﻋﻲ‪.‬‬
‫‪.10‬ﳏﻤﺪ ﺃﺑﻮ ﺍﻟﻌﻼﺀ ﻋﻘﻴﺪﺓ ‪ ،‬ﺍﻟﺘﺤﻘﻴﻖ ﻭﲨﻊ ﺍﻷﺩﻟﺔ ﰲ ﳎﺎﻝ ﺍﳉﺮﺍﺋﻢ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪.‬‬
‫‪.11‬ﻣﻔﺘﺎﺡ ﺑﻮﺑﻜﺮ ﺍﳌﻄﺮﺩﻱ‪ ،‬ﻭﺭﻗﺔ ﻣﻘﺪﻣﺔ ﺇﱃ ﺍﳌﺆﲤﺮ ﺍﻟﺜﺎﻟﺚ ﻟﺮﺅﺳﺎﺀ ﺍﶈﺎﻛﻢ ﺍﻟﻌﻠﻴﺎ ﰲ ﺍﻟﺪﻭﻝ ﺍﻟﻌﺮﺑﻴﺔ‬
‫ﲜﻤﻬﻮﺭﻳﺔ ﺍﻟﺴﻮﺩﺍﻥ ﺍﳌﻨﻌﻘﺪ ﰲ ‪. 2012/9/ 25-23‬‬
‫‪ .12‬ﳑﺪﻭﺡ ﻋﺒﺪ ﺍﳊﻤﻴﺪ ﻋﺒﺪ ﺍﳌﻄﻠﺐ‪ ،‬ﺍﺳﺘﺨﺪﺍﻡ ﺑﺮﻭﺗﻮﻛﻮﻝ ‪ TCP/IP‬ﰲ ﲝﺚ ﻭﲢﻘﻴﻖ ﺍﳉﺮﺍﺋﻢ ﻋﻠﻰ‬
‫ﺍﻟﻜﻤﺒﻴﻮﺗﺮ‪ ،‬ﲝﺚ ﻣﻨﺸﻮﺭ ﻋﻠﻰ ﻣﻮﻗﻊ ‪www.arablawinfo.com‬‬
‫‪ .13‬ﻣﻮﺳﻰ ﻣﺴﻌﻮﺩ ﺃﺭﺣﻮﻣﺔ ‪ ،‬ﺍﻹﺷﻜﺎﻟﻴﺎﺗﺎﻹﺟﺮﺍﺋﻴﺔ ﺍﻟﱵ ﺗﺜﲑﻫﺎ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﱪ ﺍﻟﻮﻃﻨﻴﺔ‪ ،‬ﺍﳌﺆﲤﺮ‬
‫ﺍﳌﻐﺎﺭﰊ ﺍﻷﻭﻝ ﺣﻮﻝ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺍﻟﻘﺎﻧﻮﻥ ﺧﻼﻝ ﺍﻟﻔﺘﺮﺓ ‪.2009/10/ 29-28‬‬
‫‪.14‬ﳏﺮﻭﺱ ﻧﺼﺎﺭ ﺍﻟﻐﺎﻳﺐ‪ ،‬ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﲝﺚ ﻣﻘﺪﻡ ﻣﻦ ﺍﳌﻌﻬﺪ ﺍﻟﺘﻘﲏ ﺟﺎﻣﻌﺔ ﺍﻷﻧﺒﺎﺭ ﺍﻟﻌﺮﺍﻕ‪.‬‬

‫‪- 233 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


:‫ﻗـﺎﺋﻤﺔ ﺍﳌﺮﺍﺟﻊ‬

:‫ ﺍﳌﺮﺍﺟﻊ ﺑﺎﻟﻠﻐﺔ ﺍﻷﺟﻨﺒﻴﺔ‬:‫ﺭﺍﺑﻌﺎ‬


:‫ﺍﻟﻘـﻮﺍﻧﲔ ﺍﻟﻔﺮﻧﺴـﻴﺔ‬/1
1. Code pénal, Dalloz, paris 2009
2. Code de procédure pénal ,Dalloz, paris 2009
3. Loi n° 78/17 du 6 janvier relative à l’informatique aux fichiers et aux
libertés.
‫ ﺍﻟﻜﺘﺐ ﺑﺎﻟﻠﻐﺔ ﺍﻟﻔﺮﻧﺴﻴﺔ‬/2
1. Myriam QUEMENER :yves CHARPENEL .cybercriminalité Droit pénal
appliqué .Normandie Roto impression 2010.
2. Christiane Féral –Schuhl .cybercriminalité le droit à l’épreuve de
l’internet 6emédition –dalloz 2011.2012
‫ ﺍﻟﺮﺳﺎﺋﻞ ﺍﻟﻌﻠﻤﻴﺔ ﺑﺎﻟﻠﻐﺔ ﺍﻟﻔﺮﻧﺴﻴﺔ‬/3
1. Offices fédérale de la polices. la cybercriminalité la face cachée de la
révolution de l’information .rapport d’analyse stratégique : octobre 2001.
2. Département fédérale de justice et police .cybercriminalité Rapport de la
commission d’experts .Berne juin 2003.
3. combattre cybercriminalité dans le respect des droits et libertés
www.quadratre .net

- 234 -

PDF created with pdfFactory Pro trial version www.pdffactory.com




PDF created with pdfFactory Pro trial version www.pdffactory.com


‫ﻓﻬـﺮﺳﺔ ﺍﳌﻮﺿـﻮﻋﺎﺕ‬
‫ﻣﻘﺪﻣﺔ ‪8 - 2.... ..................................................................‬‬
‫ﺍﳌﻌﻠﻮﻣـﺎﺗﻴﺔ ‪10..... ................‬‬ ‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪:‬ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧـﻮﻧﻴﺔ ﻟﻠﺠـﺮﳝﺔ‬
‫ﺍﳌﺒﺤﺚ ﺍﻷﻭﻝ‪ :‬ﻣﺎﻫﻴﺔ ﺍﳉﺮﳝـﺔ ﺍﳌﻌﻠﻮﻣـﺎﺗﻴﺔ ‪11..... ...................................‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻷﻭﻝ ‪ :‬ﻣـﻔﻬﻮﻡ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪12 ...................................................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺗﻌﺮﻳﻒ ﺍﳌﻌﻠﻮﻣﺎﺕ ‪13 ......................................................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺧﺼﺎﺋﺺ ﻭﺷﺮﻭﻁ ﺍﳌﻌـﻠﻮﻣﺔ ‪20 .............................................‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﱐ‪ :‬ﺗﻌﺮﻳﻒ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪24 ................................................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺍﻹﲡﺎﻫﺎﳌﻀﻴﻘﻠﻤﻔﻬﻮﻡ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪25 ....................................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺍﻹﲡﺎﻩ ﺍﳌﻮﺳﻊ ﳌﻔﻬﻮﻡ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪27 ....................................‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﻟﺚ‪ :‬ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪29 .....................................‬‬
‫ﺍﻟﻔﺮﻋﺎﻷﻭﻝ‪ :‬ﺧﺼﺎﺋﺺ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪30 ...............................................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﳏـﻞ ﺍﳉﺮﳝـﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪34 ...............................................‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺮﺍﺑﻊ‪ :‬ﻣﻮﻗﻒ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻣﻦ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪40 ............................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﻣﻔﻬﻮﻡ ﻧﻈـﺎﻡ ﺍﳌﻌﺎﳉـﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌـﻄﻴﺎﺕ‪40 ...............................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺍﳌﻘﺼﻮﺩ ﺑﺎﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭﺍﻹﺗﺼﺎﻝ ‪45 ...................‬‬
‫ﺍﳌﺒﺤﺚ ﺍﻟﺜﺎﱐ‪:‬ﺃﻃﺮﺍﻑ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣـﺎﺗﻴﺔ ‪49 .............................................‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻷﻭﻝ‪ :‬ﺍ‪‬ــﺮﻡ ﺍﳌﻌـﻠﻮﻣﺎﰐ ‪49 .................................................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺧﺼﺎﺋﺺ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ‪49 ...............................................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪:‬ﺃﺻﻨـﺎﻑ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ‪52 ................................................‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﱐ‪ :‬ﺃﺳﺎﻟﻴﺐ ﻭﺩﻭﺍﻓﻊ ﺍﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪54 ...............................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺃﺳﺎﻟﻴﺐ ﻭ ﺗﻘﻨﻴﺎﺕ ﺍﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪55 ..............................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪:‬ﺩﻭﺍﻓـﻊ ﺍﺭﺗﻜﺎﺏ ﺍﳉــﺮﳝﺔ ﺍﳌﻌﻠـﻮﻣﺎﺗﻴﺔ ‪59 .................................‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﻟﺚ‪ :‬ﺍ‪‬ﲏ ﻋﻠﻴﻬﻔﻲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪62 ........................................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺍﻟﻀﺤﻴﺔ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪62 ............................................‬‬

‫‪- 236 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﳐﺎﻃﺮ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪66 ..................................................‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺮﺍﺑﻊ‪ :‬ﺍﳊﻤﺎﻳﺔ ﺍﻟﻔﻨﻴﺔ ﻟﻠﻤﻨﻈﻮﻣﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪69 .......................................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺍﳊﻤﺎﻳﺔ ﺍﻟﻔﻨﻴﺔ ﻋﻦ ﻃﺮﻳﻖ ﺍﻟﱪﺍﻣﺞ ‪69 ..........................................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺍﳊﻤﺎﻳﺔ ﺍﻟﻔﻨﻴﺔ ﻋﻦ ﻃﺮﻳﻖ ﻧﻈﺎﻡ ﺍﻟﺮﻗﺎﺑﺔ ﺍﻟﻮﻗﺎﺋﻴﺔ ﻋﱪ ﺍﻟﻮﺳﺎﺋﻞ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ‪71 .........‬‬
‫ﺍﳌﺒﺤﺚ ﺍﻟﺜﺎﻟﺚ‪ :‬ﺍﳌﻮﺍﺟﻬﺔ ﺍﻟﺘﺸﺮﻳﻌﻴﺔ ﺍﳌﻮﺿﻮﻋﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪74 .........................‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻷﻭﻝ‪ :‬ﲪﺎﻳﺔ ﺍﻟﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﻣﺴﺘﻮﻯ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﻟﻮﻃﻨﻴﺔ ‪75 ...................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﻣﻮﺍﺟﻬﺔ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪76 ..............................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﻣﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳌﻘﺎﺭﻥ ‪77 ...............................‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﱐ‪ :‬ﻣﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻟﺪﻭﱄ ‪80 ...........................‬‬
‫ﺍﻟﻔﺮﻋﺎﻷﻭﻝ‪ :‬ﺟﻬﻮﺩ ﺃﻭ ﺩﻭﺭ ﺍﻷﻣﻢ ﺍﳌﺘﺤﺪﺓ ﰲ ﻣﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪80 ....................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺍﳉﻬﻮﺩ ﺍﻹﻗﻠﻴﻤﻴﺔ ﰲ ﻣﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪82 ..............................‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﻟﺚ‪ :‬ﺍﻟﺘﻌـﺎﻭﻥ ﺍﻟـﺪﻭﱄ ﰲ ﳎﺎﻝ ﻣﻜﺎﻓﺤـﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠـﻮﻣﺎﺗﻴﺔ ‪84 ...............‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﻣﻈﺎﻫﺮ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﺪﻭﱄ ﰲ ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪85 ........................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺍﻟﺼﻌﻮﺑﺎﺕ ﺃﻭ ﺍﳌﻌﻮﻗﺎﺕ ﺍﻟﱵ ﺗﻮﺍﺟﻪ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﺪﻭﱄ ‪90 ..........................‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺮﺍﺑﻊ‪ :‬ﻗﻮﺍﻋﺪﺍﻻﺧﺘﺼﺎﺹ ﺍﻟﻘﻀﺎﺋﻴﻔﻲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪92 ...........................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﻗﻮﺍﻋﺪ ﲢﺪﻳﺪ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﻮﺍﺟﺐ ﺍﻟﺘﻄﺒﻴﻖ ‪92 ....................................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺃﺛﺮ ﺧﺼﻮﺻﻴﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﻣﺴﺄﻟﺔ ﺍﻹﺧﺘﺼﺎﺹ ‪95 .....................‬‬
‫ﺍﻟﻔﺼـﻞ ﺍﻟﺜـﺎﱐ‪ :‬ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺘﺤﻘﻴﻖ ﻭ ﺇﺟﺮﺍﺀﺍﺕ ﲨﻊ ﺍﻟﺪﻟﻴﻞ ﰲ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪101 ...................................................................‬‬
‫ﺍﳌﺒﺤﺚ ﺍﻷﻭﻝ‪ :‬ﺍﻟﺘﺤﻘﻴـﻖ ﰲ ﺍﳉـﺮﳝﺔ ﺍﳌﻌﻠـﻮﻣﺎﺗﻴﺔ ‪102 ....................................‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻷﻭﻝ‪ :‬ﺍﻷﺟﻬﺰﺓ ﺍﳌﻜﻠﻔﺔ ﺑﺎﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪103 ..................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺍﻷﺟﻬﺰﺓ ﺍﳌﺨﺘﺼﺔ ﺑﺎﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻟﺪﺍﺧﻠﻲ‬
‫‪103 ...................................................................................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺍﻷﺟﻬﺰﺓ ﺍﳌﺨﺘﺼﺔ ﺑﺎﻟﺒﺤﺚ ﻭﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﺍﳌﺴﺘﻮىﺎﻟﺪﻭﱄ‬
‫ﻭﺍﻹﻗﻠﻴﻤﻲ ‪107 ...................................................................................‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﱐ‪ :‬ﺧﺼـﺎﺋﺺ ﺍﻟﺘﺤﻘﻴﻖ ﻭ ﺍﶈﻘـﻖ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪108 ......................‬‬
‫‪- 237 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪:‬ﺧﺼﺎﺋﺺ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪109 ....................................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺧﺼﺎﺋﺺ ﺍﶈﻘﻖ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﻠﺘﻴﺔ ‪114 ......................................‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﻟﺚ ‪ :‬ﺍﻟﺪﻟﻴﻞ ﺍﳌﻨﺎﺳﺐ ﻹﺛﺒﺎﺕ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪118 ...............................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﻣﻔﻬـﻮﻡ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗـﻤﻲ ‪119 ...............................................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺃﺷﻜﺎﻝ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻭﺃﻧﻮﺍﻋﻪ ‪125 ............................................‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺮﺍﺑﻊ‪ :‬ﻣﺼﺎﺩﺭ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ‪128 ....................................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﻓﺤﺺ ﺟﻬﺎﺯ ﺍﳊﺎﺳﻮﺏ ﺍﳋﺎﺹ ﺑﺎﳉﺎﱐ ﻭ ﺍ‪‬ﲏ ﻋﻠﻴﻪ ‪128 ........................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺗﻌﺎﻭﻥ ﻣﺰﻭﺩﻱ ﺍﳋﺪﻣﺔ ﻣﻊ ﺟﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ‪134 .................................‬‬
‫ﺍﳌﺒﺤﺚ ﺍﻟﺜﺎﱐ‪ :‬ﺍﻟﻘﻮﺍﻋﺪ ﺍﻹﺟﺮﺍﺋﻴﺔ ﰲ ﺍﺳﺘﺨﻼﺹ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ‪138 ...........................‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻷﻭﻝ‪ :‬ﺍﻟﻘﻮﺍﻋﺪ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻻﺳﺘﺨﻼﺹ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ‪139 .....................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺍﻟﺘﻔﺘﻴﺶ ﻭﺿﺒﻂ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ‪139 ...........................................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺍﳋﱪﺓ ﰲ ﺇﺛﺒﺎﺕ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪160 .........................................‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﱐ‪ :‬ﺍﻟﻘﻮﺍﻋﺪ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﳊﺪﻳﺜﺔ ﻻﺳﺘﺨﻼﺹ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ‪169 ......................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺍﻟﺘﺴﺮﺏ ﻭﺍﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ ‪169 ............................................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺍﳌﺮﺍﻗﺒﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﺣﻔﻆ ﺍﳌﻌﻄﻴﺎﺕ ‪177 .......................................‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﻟﺚ ‪:‬ﻣﻌﻮﻗﺎﺕ ﺃﻭ ﺻﻌﻮﺑﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪179 .......................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺍﳌﻌﻮﻗﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﲜﻬﺎﺕ ﺍﻟﺘﺤﻘﻴﻖ ﻭﺇﺟﺮﺍﺀﺍﺕ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ‪180 ............‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺍﳌﻌﻮﻗﺎﺕ ﺍﳌﺘﻌﻠﻘﺔ ﺑﺎﳉﻬﺎﺕ ﺍﳌﺘﻀﺮﺭﺓ ﻭﺻﻌﻮﺑﺔ ﲢﺪﻳﺪ ﻫﻮﻳﺔ ﺍﳉﺎﱐ ‪185 ..............‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺮﺍﺑﻊ‪ :‬ﺿﻤﺎﻧﺎﺕ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﺃﺛﻨﺎﺀ ﺇﺟﺮﺍﺀﺍﺕ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ‪188 ............‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺿﻤﺎﻧﺎﺕ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﻋﻨﺪ ﺇﺟﺮﺍﺀ ﺍﻟﺘﻔﺘﻴﺶ ﻭﺿﺒﻂ ﺍﳌﺮﺍﺳﻼﺕ ‪189 ..................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺿﻤﺎﻧﺎﺕ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﺃﺛﻨﺎﺀ ﺇﺟﺮﺍﺀ ﺍﻋﺘﺮﺍﺽ ﺍﳌﺮﺍﺳﻼﺕ ﻭﺍﳌﺮﺍﻗﺒﺔ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ ‪194 ......‬‬
‫ﺍﳌﺒﺤﺜﺎﻟﺜﺎﻟﺚ‪:‬ﺍﻟﻘﻴﻤﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﰲ ﳎﺎﻝ ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ ‪199 .......................‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻷﻭﻝ‪ :‬ﻣﺸﺮﻭﻋﻴﺔ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ‪199 ................................................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﻣﺸﺮﻭﻋﻴﺔ ﻭﺟﻮﺩ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ‪200 ..........................................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﻣﺸﺮﻭﻋﻴﺔ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ‪202 ....................................‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﱐ‪ :‬ﺣﺠﻴﺔ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﰲ ﺇﻃﺎﺭ ﻧﻈﺮﻳﺔ ﺍﻹﺛﺒﺎﺕ ﺍﳉﺰﺍﺋﻲ ‪205 .......................‬‬
‫‪- 238 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺷﺮﻭﻁ ﻗﺒﻮﻝ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ‪206 ..............................................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﺃﺛﺮ ﺍﻟﻘﻴﻤﺔ ﺍﻟﻌﻠﻤﻴﺔ ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﰲ ﳎﺎﻝ ﺍﻹﺛﺒﺎﺕ ﺍﳉﺰﺍﺋﻲ ‪212 ....................‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﻟﺚ‪ :‬ﻣﻮﻗﻔﺎﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﻲ ﺍﳉﺰﺍﺋﺮﻱ ﻣﻦ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﰲ ﳎﺎﻝ ﺍﻹﺛﺒﺎﺕ ﺍﳉﺰﺍﺋﻲ‪214..‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‪ :‬ﺃﻧﻈﻤﺔ ﺍﻹﺛﺒﺎﺕ ﺍﳉـﺰﺍﺋﻲ ‪215 ................................................‬‬
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﱐ‪ :‬ﻣﻮﻗﻒ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﻲ ﺍﳉﺰﺍﺋﺮﻱ ﻣﻦ ﺃﻧﻈﻤﺔ ﺍﻹﺛﺒﺎﺕ ﻭﺃﺛﺮ ﺫﻟﻚ ﰲ ﺇﺛﺒﺎﺕ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪217 ..........................................................................‬‬
‫ﺧﺎﲤﺔ ‪223 ..............................................................................‬‬
‫ﻗﺎﺋﻤﺔ ﺍﳌﺼﺎﺩﺭ ﻭﺍﳌﺮﺍﺟﻊ ‪229 ...............................................................‬‬
‫ﻓﻬﺮﺱ ﺍﶈﺘﻮﻳﺎﺕ ‪236 .............................................................................‬‬
‫ﻣﻠﺨﺺ‪.‬‬

‫‪- 239 -‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


‫ﻣﻠــــﺨﺺ‬

‫ﻳﺘﻼﺀﻡ ﻣﻮﺿﻮﻉ ﻫﺬﻩ ﺍﻟﺪﺭﺍﺳﺔ ﻣﻊ ﺍﻟﺘﻄﻮﺭﺍﺕ ﺍﳊﺪﻳﺜﺔ ﺍﳊﺎﺻﻠﺔ ﰲ ﳎﺎﻝ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﱵ ﺃﺻﺒﺤﺖ ﺗﺸﻜﻞ ﺃﺩﺍﺓ‬
‫ﻻﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﺃﻭ ﳎﺎﻻ ﳍﺎ‪ ،‬ﻭﺫﻟﻚ ﺑﺈﺳﺎﺀﺓ ﺍﺳﺘﺨﺪﺍﻣﻬﺎ ﻭ ﺍﺳﺘﻐﻼﳍﺎ ﻋﻠﻰ ﳓﻮ ﻏﲑ ﻣﺸﺮﻭﻉ‪ .‬ﻭﻗﺪ ﺳﻌﻴﺖ ﻣﻦ‬
‫ﺧﻼﳍﺎ )ﻫﺬﻩ ﺍﻟﺪﺭﺍﺳﺔ( ﺇﱃ ﺗﻮﺿﻴﺢ ﺍﻟﻘﻮﺍﻋﺪ ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﻟﱵ ﻋﻠﻰ ﻣﺪﺍﻫﺎ ﳝﺎﺭﺱ ﺍﻟﻌﺎﻣﻠﻮﻥ ﰲ ﳎﺎﻝ ﺍﻟﺒﺤﺚ ﻭ‬
‫ﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻤﻠﻬﻢ ﻣﻦ ﺃﺟﻞ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺍﳌﻨﺎﺳﺐ ﻹﺛﺒﺎﺕ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ‪ ،‬ﻭﻗﺪ‬
‫ﺗﻨﺎﻭﻟﺖ ﰲ ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ﺍﳉﺎﻧﺐ ﺍﻟﻨﻈﺮﻱ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﺧﻼﻝ ﻣﻨﺎﻗﺸﺔ ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﳍﺬﻩ ﺍﳉﺮﳝﺔ‪،‬‬
‫ﻭﺿﻤﻦ ﻫﺬﺍ ﺍﻟﻌﻨﻮﺍﻥ ﰎ ﺍﻟﺒﺤﺚ ﰲ ﻣﺎﻫﻴﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﺧﻼﻝ ﲢﺪﻳﺪ ﻣﻔﻬﻮﻡ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻛﺸﺮﻁ ﻣﻔﺘﺮﺽ‬
‫ﻟﻘﻴﺎﻣﻬﺎ‪ ،‬ﻭﺍﻟﱵ ﺗﺒﲔ ﺃ‪‬ﺎ ﺗﻘﻮﻡ ﺃﺳﺎﺳﺎ ﻋﻠﻰ ﺍﻟﻌﻼﻗﺔ ﺑﲔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭ ﺍﻟﺘﻘﺘﻴﺔ ﺍﳊﺪﻳﺜﺔ ﺍﻟﱵ ﺗﺴﺘﺨﺪﻡ ﰲ ﻣﻌﺎﳉﺔ ﻫﺬﻩ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﻟﺬﻟﻚ ﻛﺎﻥ ﻣﻦ ﺍﻟﻼﺯﻡ ﺗﻌﺮﻳﻒ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭ ﺗﻮﺿﻴﺢ ﺧﺼﺎﺋﺼﻬﺎ ﻭﺷﺮﻭﻃﻬﺎ‪ ،‬ﰒ ﺗﻨﺎﻭﻟﺖ ﺃﻳﻀﺎ ﺃﻫﻢ‬
‫ﺍﻟﺘﻌﺮﻳﻔﺎﺕ ﺍﻟﱵ ﺻﺎﻏﻬﺎ ﺍﻟﻔﻘﻪ ﺍﳉﻨﺎﺋﻲ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻛﺬﺍ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﳋﺎﺻﺔ ﺍﻟﱵ ﲤﻴﺰ ﻫﺬﻩ ﺍﳉﺮﳝﺔ ﻋﻦ‬
‫ﻏﲑﻫﺎ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ‪ ،‬ﻭﻛﺬﺍ ﺍﳋﺼﺎﺋﺺ ﺍﻟﱵ ﻳﺘﻤﻴﺰ ‪‬ﺎ ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻭﺃﻫﻢ ﺍﻟﻄﻮﺍﺋﻒ ﻭ ﺍﻷﺻﻨﺎﻑ ﺍﻟﱵ‬
‫ﺗﻨﺘﻤﻲ ﺇﻟﻴﻬﺎ ﻫﺬﻩ ﺍﻟﻔﺌﺔ ﻣﻦ ﺍ‪‬ﺮﻣﲔ‪ ،‬ﻭﻣﺎﻫﻲ ﺍﻷﺳﺎﻟﻴﺐ ﻭ ﺍﻟﺘﻘﻨﻴﺎﺕ ﺍﳌﺴﺘﻌﻤﻠﻪ ﰲ ﺍﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻭﻛﺬﺍ‬
‫ﺍﻟﺪﻭﺍﻭﻓﻊ ﺍﶈﺮﻛﺔ ﻟﻠﻤﺠﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻻﺭﺗﻜﺎﺏ ﻫﺬﻩ ﺍﳉﺮﳝﺔ‪ .‬ﰒ ﺑﻌﺪ ﺫﻟﻚ ﺗﻨﺎﻭﻟﺖ ﻣﻈﺎﻫﺮ ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻟﺘﺸﺮﻳﻌﻲ ﺳﻮﺍﺀ ﺍﻟﻮﻃﲏ ﺃﻡ ﺍﳌﻘﺎﺭﻧﻦ ﻭﻛﺬﺍ ﺍﳉﻬﻮﺩ ﺍﳌﺒﺬﻭﻟﺔ ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻟﺪﻭﱄ ﰲ‬
‫ﻣﻜﺎﻓﺤﺔ ﻫﺬﻩ ﺍﳉﺮﳝﺔ‪ ،‬ﻭﰲ ﺍﻷﺧﲑ ﰎ ﻃﺮﺡ ﻣﺴﺄﻟﺔ ﺍﻹﺧﺘﺼﺎﺹ ﺍﻟﻘﻀﺎﺋﻲ ﻛﺄﻫﻢ ﻣﺸﻜﻠﺔ ﺗﺜﲑﻫﺎ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﻟﻜﻮﻥ ﺍﻟﻨﺸﺎﻁ ﺍﻹﺟﺮﺍﻣﻲ ﻓﻴﻬﺎ ﻻ ﻳﻌﺘﺮﻑ ﺑﺎﳊﺪﻭﺩ‪.‬‬
‫ﻭﰲ ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﱐ ﰎ ﻣﻌﺎﳉﺔ ﻣﻮﺿﻮﻉ ﺇﺟﺮﺍﺀﺍﺕ ﲢﺼﻴﻞ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻹﺛﺒﺎﺕ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺃﻫﻢ‬
‫ﺍﳉﻮﺍﻧﺐ ﺍﻟﻘﺎﻧﻮﻳﺔ ﻟﻌﻤﻠﻴﺔ ﺍﻟﺘﺤﻘﻴﻖ ﰲ ﻫﺬﻩ ﺍﳉﺮﳝﺔ‪ ،‬ﻭﻫﻨﺎ ﺗﻨﺎﻭﻟﺖ ﺍﻷﺟﻬﺰﺓ ﺍﳌﺆﻫﻠﺔ ﻟﻠﺒﺤﺚ ﻭ ﺍﻟﺘﺤﺮﻱ ﻋﻦ ﺍﳉﺮﳝﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺳﻮﺍﺀ ﰲ ﺍﻟﻨﻈﺎﻡ ﺍﻟﻘﺎﻧﻮﱐ ﺍﳉﺰﺍﺋﺮﻱ ﺃﻭ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﺍﳌﻘﺎﺭﻧﺔ‪ ،‬ﻛﻤﺎ ﰎ ﺑﻌﺪ ﺫﻟﻚ ﺍﻟﺒﺤﺚ ﰲ‬
‫ﺍﳋﺼﺎﺋﺺ ﺍﻟﱵ ﻳﺘﻤﻴﺰ ‪‬ﺎ ﺍﻟﺘﺤﻘﻴﻖ ﻭ ﺍﶈﻘﻖ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﰒ ﰎ ﲢﺪﻳﺪ ﻣﻔﻬﻮﻡ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻣﻦ ﺧﻼﻝ‬
‫ﺗﻮﺿﻴﺢ ﺧﺼﺎﺋﺼﻪ ﻭ ﺃﻧﻮﺍﻋﻪ ﻭﻣﺼﺎﺩﺭ ﺍﳊﺼﻮﻝ ﻋﻠﻴﻪ‪ ،‬ﻭﺑﻌﺪ ﺫﻟﻚ ﰎ ﺍﻟﺘﺮﻛﻴﺰ ﺑﻨﻮﻉ ﻣﻦ ﺍﻟﺸﺮﺡ ﻋﻠﻰ ﺍﻟﻘﻮﺍﻋﺪ‬
‫ﺍﻹﺟﺮﺍﺋﻴﺔ ﺍﳌﻨﺎﺳﺒﺔ ﰲ ﻋﻤﻠﻴﺔ ﺍﺳﺘﺨﻼﺹ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻣﻦ ﺑﻴﺌﺘﻪ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﺗﺒﻴﺎﻥ ﺃﻫﻢ ﺍﻟﺼﻌﻮﺑﺎﺕ ﻭ ﺍﳌﻌﻮﻗﺎﺕ‬
‫ﺍﻟﱵ ﺗﻮﺍﺟﻬﻬﺎ ﻫﺬﻩ ﺍﻟﻌﻤﻠﻴﺔ ‪.‬‬
‫ﻛﻤﺎ ﺗﻨﺎﻭﻟﺖ ﰲ ﻫﺬﺍ ﺍﻟﻔﺼﻞ ﺃﻳﻀﺎ ﺿﻤﺎﻧﺎﺕ ﺍﳌﺸﺘﺒﻪ ﻓﻴﻪ ﻭ ﺃﺛﺮ ﺇﺟﺮﺍﺀﺍﺕ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﺍﻟﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﻋﻠﻰ‬
‫ﺍﳊﻖ ﰲ ﺍﳋﺼﻮﺻﻴﺔ ﻭ ﺃﺧﲑﺍ ﺗﻨﺎﻭﻟﺖ ﻣﺴﺄﻟﺔ ﺍﻟﻘﻴﻤﺔ ﺍﻟﻘﺎﻧﻮﻳﺔ ﻟﻠﺪﻟﻴﻞ ﺍﻟﺮﻗﻤﻲ ﰲ ﳎﺎﻝ ﺍﻹﺛﺒﺎﺕ ﺍﳉﻨﺎﺋﻲ ﺳﻮﺍﺀ ﻣﻦ‬
‫ﺣﻴﺚ ﻣﺸﺮﻭﻋﻴﺘﻪ ﺃﻡ ﻣﻦ ﺣﻴﺚ ﺣﺠﻴﺘﻪ ﺃﻣﺎﻡ ﺍﻟﻘﺎﺿﻲ ﺍﳉﺰﺍﺋﻲ‪.‬‬
‫ﻭ ﰲ ﺍﳋﺎﲤﺔ ﰎ ﺗﺒﻴﺎﻥ ﺃﻫﻢ ﺍﻟﻨﺘﺎﺋﺞ ﺍﻟﱵ ﰎ ﺍﻟﺘﻮﺻﻞ ﺇﻟﻴﻬﺎ ﻭ ﻭﺿﻊ ﺑﻌﺾ ﺍﻟﺘﻮﺻﻴﺎﺕ ﻭ ﺍﻹﻗﺘﺮﺍﺣﺎﺕ ﺍﻟﱵ ﻣﻦ‬
‫ﺷﺄ‪‬ﺎ ﺗﻔﻌﻴﻞ ﻭﺗﻨﻈﻴﻢ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳌﻨﺎﺳﺒﺔ ﻟﻠﺘﺤﻘﻴﻖ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫ﻭ ﺍﷲ ﻭﱄ ﺍﻟﺘﻮﻓﻴﻖ‪.‬‬

‫‪PDF created with pdfFactory Pro trial version www.pdffactory.com‬‬


Summary :
The subject of this study fits with the current modern happened in
informatics scopewhich became a tool or a way for the perpetration of the crime
byusing it in illegal purposes, through this study, I worked hard to clarify procedural
rules, that are proceeded by the workers in searching and investigation field on
informatics crimes, to obtain the right proof to prove these crimes, I have taken in
the first chapter the theory hand of the informatics crime toward the discussion of
the legal hands of this crime, within this title, we have searched for informatics
crimes definitions through determining the concept of informatics as a supposed
condition to complete it ( proceed it), we revealed that it depends basically on the
relation between informatics and modern technic used in treating these
informations, this is why it was necessary to define informations and clarify its
specifics and conditions, after that we mentioned the most important definition
that was established by criminal philology for criminal informatics as well as the
legal and special nature that specialize this crime from other traditional crimes and
also the features of informatics criminal and the major sects and types that this
kind of criminals belong to, and what are the used ways and technics in acting
informatic crimes ,in addition to reasons of the informatic criminal behavior , after
that I mentioned the legislative measures that had been taken to fight informatics
crimes either on national or comparative level as well as the efforts that had been
made on international in fighting this crime .
And finally we introduced the judicatory specialization as a main problem
that causes informatics crime taking in consideration that criminal activity doesn’t
recognize limits.
In chapter two we dealt with the procedures of obtaining digital proof to prove
informatics crime, and the most important and valid parts to complete the
investigation in this crime, and there we treated the qualified instruments for
researching and investigating informatics crimes , in Algerian laws likewise other
legal comparative regimes, after that we searched through characteristics that
specialize the investigation and investigator in informatic crime then we extracted
the definition of digital proof through clarifying its characteristics and types and
sources of obtaining it.
After that we concentrated descriptively on the appropriate measurement rules in
the operation extracting digital proof from its electronic environment and gaining
the major abstractions and difficulties in this operation.
In this chapter I also mentioned the guaranties of the suspect and the affections
during the measures of obtaining digital proof on the right of privacy. in the end I
dealt with the legal value of digital proof in criminal approving field whether it
legislative or its persuasion in front of the penal judge.
In conclusion I clarified the most important results that have been obtained and
putting some recommendations and suggestions that could be effective and helps
to regulate the appropriate measures in investing informatic crimes.
God is the source of strength.

PDF created with pdfFactory Pro trial version www.pdffactory.com

You might also like