Skip to main content

Criminal Law and the Risks Posed by Internet. An Examination of Spanish Criminal Law

  • Chapter
  • First Online:
Security and Defence: Ethical and Legal Challenges in the Face of Current Conflicts
  • 449 Accesses

Abstract

The vertiginous advance of technology has seen the advent of new forms of crime such as hacking, phishing, child grooming, cracking and denial of service, and also the use of computer networks to commit traditional offences such as fraud, harassment, defamation, intimidation, industrial espionage, and child pornography. It is fair to say that today’s society has become a society of risk. Cyberspace has become a haven for criminality and a platform for organised crime. The specific characteristics of information and communication technologies (ICTs) require a new response from the field of criminal law in order to tackle cybercrime. Thus, it is necessary in some situations to advance the punitive barrier (to use the Spanish expression), that is, to bring forward the moment when the conduct is considered an offence; in others, to reformulate certain criminal concepts in order to adapt to the new scenario; and in still others, to create new criminal offences (though related to existing ones) since the new types of criminal activity do not conform to the definitions traditionally used in criminal law. Furthermore, the cross-border nature of these activities means that an efficient response of the system requires the reinforcement of international cooperation mechanisms; the harmonisation of criminal provisions; and the enhancement of effective procedural instruments, even though this may imply a certain renunciation of sovereignty on the part of the States concerned. This is the main purpose of the creation of supranational regulations, represented above all by the Council of Europe Convention on cybercrime (Budapest, 23.11.2001) and Directive 2013/40/EU of the European Parliament and of the Council on attacks against information systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://www.boe.es/buscar/abrir_fiscalia.php?id=FIS-C-2017-00003.pdf.

References

  • Álvarez Vizcaya, M. (2001). Consideraciones político criminales sobre la delincuencia informática: el papel del Derecho penal en la Red. Internet y Derecho penal, Madrid, Consejo General del Poder Judicial, pp. 255 y ss.

    Google Scholar 

  • Andrés Domínguez, Ana Cristina. (2010). Daños. Comentarios a la reforma penal de 2010, Valencia, Tirant lo Blanch, pp. 291–296.

    Google Scholar 

  • Carrasco Andrino. (2010, Mar), “El delito de acceso ilícito a los sistemas informáticos. Comentarios a la reforma penal de 2010, Valencia Tirant lo Blanch, pp. 249–256.

    Google Scholar 

  • Circular Fiscalía General Del ESTADO 3/2017, 21-9.

    Google Scholar 

  • Code Pénal Française, modifié par LOI nº 2015-912 du 24 juillet 2015-art- 4.

    Google Scholar 

  • Codice Penale Italiano D.L. nº 130/2020, 21 ottobre 2020 con modificazioni dalla L. 18 diciembre 2020, n. 173.

    Google Scholar 

  • Codigo Penal Español (LO 10/1995, 23-11) modificado por LO 1/2015, 30-3.

    Google Scholar 

  • De La Mata Barranco, Norberto (2016). Los delitos contra la integridad y disponibilidad de datos y sistemas informáticos después de la LO 1/2015”, Estudios de Derecho penal. Homenaje al profesor Miguel Bajo, Madrid, Ramón Areces, pp. 1089–1108.

    Google Scholar 

  • Fernández Teruelo, J. (2007). Cibercrimen. Los delitos cometidos a través de Internet, Oviedo, Constitutio Criminalis Carolina.

    Google Scholar 

  • Flores Prada, I. (2012). Criminalidad informática. Aspectos sustantivos y procesales, Valencia, Tirant lo Blanch.

    Google Scholar 

  • Galán Muñoz, A. (2009). Libertad de expresión y responsabilidad penal por contenidos ajenos en Internet, Valencia, Tirant lo Blanch.

    Google Scholar 

  • González, P. O. (2016–2017). Delitos contra la intimidad, derecho a la propia imagen e inviolabilidad del domicilio. Memento práctico penal económico y de la empresa, Madrid: Francis Lefebvre.

    Google Scholar 

  • Cibercrímenes económicos y patrimoniales. (2016–2017). Memento práctico penal económico y de la empresa, Madrid: Francis Lefebvre.

    Google Scholar 

  • Lezertúa Rodríguez, M. (2001). El Proyecto de Convenio sobre el cybercrimen del Consejo de Europa. Internet y Derecho Penal, Madrid: Consejo General del Poder Judicial. Servicio de formación continua, Escuela Judicial.

    Google Scholar 

  • Llaneza González, P. (2000). Internet y comunicaciones digitales, Barcelona: Bosch.

    Google Scholar 

  • López Ortega, J. J. (2001). Libertad de expresión y responsabilidad por los contenidos en la Red. Internet y Derecho Penal, Madrid: Consejo General del Poder Judicial. Servicio de formación continua, Escuela Judicial

    Google Scholar 

  • Miró Llinares, F. (2012). El cibercrimen fenomenología y criminología de la delincuencia en el ciberespacio. Madrid: Marcial Pons.

    Google Scholar 

  • Morales Prats, F. (2002). Internet: riesgos para la intimidad. Internet y Derecho penal, Madrid, Cuadernos de Derecho Judicial.

    Google Scholar 

  • Morales García, O. (2001). Criterios de atribución de responsabilidad penal a los prestadores de servicios e intermediarios de la Sociedad de la Información”, Revista de Derecho y Proceso Penal, nº 5, Aranzadi, pp. 139 a 167.

    Google Scholar 

  • Morales García, O. (2010) Delincuencia informática: intrusismo, sabotaje informático y uso ilícito de tarjetas. La reforma penal de 2010: análisis y comentarios, Pamplona, Aranzadi, pp. 181–194.

    Google Scholar 

  • StGB (Strafgesetzbuch) Deutschland. (2015, Dezember). Bundesgesetzblatt (BGBI) I. S. 2218, geändert worden ist.

    Google Scholar 

Download references

Acknowledgements

This study was carried out as part of the research project “H2019/HUM-5699 (ON TRUST-CM. Interuniversity program in culture of legality), financed by the Community of Madrid and the European Social Fund” and the research projet “Criminal responsibility of transnational corporations for violations of human rights and the environment” (DER2017-85144-C2).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pilar Otero .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Otero, P. (2022). Criminal Law and the Risks Posed by Internet. An Examination of Spanish Criminal Law. In: Cayón Peña, J. (eds) Security and Defence: Ethical and Legal Challenges in the Face of Current Conflicts. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-95939-5_6

Download citation

Publish with us

Policies and ethics