Civil protection for e-mail users

Section: RESEARCH
Published
Aug 4, 2025
Pages
134-190

Abstract

The service of electronic mail via internet is deemed to be a landmark in the world of modern communications and postal services. It enables people and private and public services to send their messages very quickly and very cheaply. Also, it is characterized by secrecy and privateers. Due to the diffusion of electronic mail, such a technology is being exposed to the risks of penetration and espionage, which arouses a sort of worry and loss of confidence as a result of violating the private ness of individuals and liberty of correspondence particularly is the electronic mail contains personal information or electronic contracts related to important trading transactions, a case which results in big loss whether in one's financial asset or honour and reputation. Therefore, it is necessary to study electronic mail and the way civil protection from the violation of private ness and secrecy may be provided for its user. Moreover, it is necessary to investigate the legal nature of the electronic mail user and the methods to which one can resort to be provided with civil protection whether such methods are legal (and domestically and internationally legislative) or technical methods.

References

  1. Fifth: Laws1. Iraqi Civil Law No. 40 of 1951.2. The Egyptian Civil Code No. 131 of 1948.3. Iraqi Penal Code No. 111 of 1969.4. The Permanent Iraqi Constitution of 2005.5. Code of Algerian Procedure.6. Iraqi Transport Law of 1948.7. Iraqi Trade Law of 1948.8. Iraqi Evidence Law of 1979.9. Law of the Federal Supreme Court, published in the Iraqi facts, No. 3996 on 17/3/2005.10. Rules of Procedure for the Conduct of Work in the Federal Court for the year 2005, published in the Iraqi Proceedings No. 3997 on 2/5/2005.
  2. Fourth: Theses1. Rondak Saleh Noman, E-mail and its proof of proof, Master Thesis submitted to the Council of the Faculty of Law and Politics, Dohuk, 2009.2. Dr. Saleh Ahmed Al-Lahibi, direct and causing tort liability, Master Thesis submitted to the Council of the Faculty of Law - University of Mosul, 2000.
  3. Seventh: Internet sites1. General conditions for registering on Yahoo are available at:http://info.yahoo.com/legal/fr/yahoo/tos.html2. Email filter is available at:http://www.desnhost.net/clinet/knowledgebase/php?actions.display.article&id=7
  4. Sixth: Foreign sources1. Auther Forauzan, Data communications and networking, security, threats & attacks, chapter 28.
  5. SourcesFirst: Dictionaries1. Ibn Manzoor, The Tongue of the Arabs, Volume II, issued for printing and publishing, Beirut-Lebanon, i 4, 2005.2. Abdullah Al-Bustani, Al-Wafi Dictionary of Arabic Language Intermediary, Library of Lebanon, 1980.3. Ali Ben Hadia, Belhassen Elbelich, Jilani Benhaj Yahia, Presented by Mahmoud El Massadi, Tunisian Distribution Company, National Distribution Company - Algeria.4. Louis Maalouf, Upholstered in Language, Spreading Institution, Dar Al-Elm, 20th Floor, 1986.
Download this PDF file

Statistics