Şan & Eken Law Firm, Law Firm, Ankara, law, consultancy, law firm, consultancy, our fields of practice, LABOR LAW, EXECUTION AND BANKRUPTCY LAW, LEGAL CONSULTING, COMMERCIAL AND COMPANIES LAW, INTERNATIONAL LAW, INSURANCE LAW, CRIMINAL LAW, CRIMINAL LAW, TRAFFIC LAW, ADMINISTRATIVE LAW, RENTAL LAW, CONSUMER LAW, PROPERTY LAW, Our Team, blog, communication, law blog, lawyer publications, faq, frequently asked questions, ankara lawyer consulting, Legal Counseling, Women's and Children's Rights, Victim's Rights (victimology) Application to the Constitutional Court and ECtHR, Foreigners Law, Family Law, Labor Law, Criminal Law, Commercial Law, Enforcement-Bankruptcy Law, KVKK, IT Law, Trademark and Patent Law, Legal Counseling in Foreign Languages, Mediation, Conciliation, Foreign Court Recognition and Enforcement of Decisions, us in the press, communication, Kızılay lawyer, ankara lawyer

Internet law, freedom of expression and privacy concepts form the basis of informatics law. Information Technology Law We can examine information law under two main headings as Internet Law. Information Technology Law includes information provisions that have been digitized, with provisions on how to distribute computer programs. Information law covers the protection of information during information sharing and exchange and the regulations in online shopping, which we call e-commerce. As for internet law, it deals with legal issues that occur during internet use. Internet use, freedom of expression and security are always determined by the rules taken within the framework of the law. In order to solve possible problems, support from informatics law is requested.

Cybercrimes

In a report published jointly by the United Nations Commission and the European Union, cyber crimes were examined in 6 main articles. According to this;

– Accessing and listening to the accesses provided by computer systems without authorization,
– Sabotaging computers,
– Defrauding others through the computer,
– Fraud again using the computer,
– Deciphering and using legally protected software without permission