Data Privacy in Electronic Commerce: Analysing Legal Provisions in Iran

被引:2
作者
Bagheri, Parviz [1 ]
Hassan, Kamal Halili [2 ]
机构
[1] Payam e Noor Univ, Fac Law, Tehran, Iran
[2] Univ Kebangsaan Malaysia, Fac Law, Bangi 43600, Malaysia
关键词
data protection; internet commerce; Iran; privacy; Electronic Commerce Law;
D O I
10.5539/jpl.v9n7p133
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
This article discusses the legal protection of data privacy in electronic commerce in Iran. Currently, there is a gap in respect of data privacy protection in Iran as there is no specific privacy legislation in force. Consequently, e-consumers dealing in internet commerce are less protected. However there are rules and regulations in the laws in Iran such as the Islamic Republic (IR) of Iran Constitution, Computer Crimes Act, Penal Code, and Civil Liability Act which relate to privacy in general, although not directly related to data privacy in e-commerce. The Electronic Commerce Law (ECL) is the main legislation in Iran which contains some provisions on personal data privacy. This article discusses the relevant provisions in the ECL pertaining to data messages and privacy and interprets its various meanings to determine whether they are in line with well established principles found in good data privacy protection measures.
引用
收藏
页码:133 / 141
页数:9
相关论文
共 16 条
[1]  
Abbasi A., 2007, WEBOLOGY, V4
[2]  
[Anonymous], 2012, ASRE IRAN ELECT NEWS
[3]  
[Anonymous], 2012, ASRIRAN NEWS
[4]  
Bagher A., 2004, J LAW POLITICAL SCI, P1
[5]  
Bagheri P., 2012, INT BUSINESS MANAGEM, V6, P333
[6]  
Bagheri P., 2012, INT BUSINESS MANAGEM, V6, P317
[7]   Access to information and rights of withdrawal in Internet contracts in Iran: The legal challenges [J].
Bagheri, Parviz ;
Hassan, Kamal Haliui .
COMPUTER LAW & SECURITY REVIEW, 2015, 31 (01) :90-98
[8]  
Esfandiari M., 2011, INTERNET MARKETING
[9]  
Hamidreza A., 2006, INFORM TECHNOLOGY LA
[10]   Personal data protection in employment: New legal challenges for Malaysia [J].
Hassan, Kamal Halili .
COMPUTER LAW & SECURITY REVIEW, 2012, 28 (06) :696-703