<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>National jurisprudence | Cabinet avocat Andreea Coman</title>
	<atom:link href="https://www.coman.law/category/national-jurisprudence/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.coman.law</link>
	<description>Expertiză și profesionalism. Găsim soluții și avem rezultate.</description>
	<lastBuildDate>Fri, 13 Nov 2020 18:50:19 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.4.12</generator>

<image>
	<url>https://www.coman.law/wp-content/uploads/2020/05/favicon_avocat_andreea_coman.ico</url>
	<title>National jurisprudence | Cabinet avocat Andreea Coman</title>
	<link>https://www.coman.law</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cleared civil servant. Repairing the damage caused to the employee</title>
		<link>https://www.coman.law/2020/07/31/cleared-civil-servant-repairing-the-damage-caused-to-the-employee/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 31 Jul 2020 17:01:20 +0000</pubDate>
				<category><![CDATA[National jurisprudence]]></category>
		<guid isPermaLink="false">https://www.coman.law/?p=898</guid>

					<description><![CDATA[<p>I. The factual situation, briefly On 2nd October, 2015, the prosecution of the defendant, a civil servant, was ordered by the Prosecutor&#8217;s Office attached to the District Court of Sector 1 Bucharest, context in which on 16th October, 2015 it was ordered the legal suspension of the employment relationship, during the sending in judgment. On [&#8230;]</p>
<p>Articolul <a rel="nofollow" href="https://www.coman.law/2020/07/31/cleared-civil-servant-repairing-the-damage-caused-to-the-employee/">Cleared civil servant. Repairing the damage caused to the employee</a> apare prima dată în <a rel="nofollow" href="https://www.coman.law/en">Cabinet avocat Andreea Coman</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>I. The factual situation, briefly</strong></p>



<p>On 2<sup>nd</sup> October, 2015, the prosecution of the defendant, a civil servant, was ordered by the Prosecutor&#8217;s Office attached to the District Court of Sector 1 Bucharest, context in which on 16<sup>th</sup> October, 2015 it was ordered the legal suspension of the employment relationship, during the sending in judgment.</p>



<p>On 30<sup>th</sup> March, 2017, <strong>it was definitively ordered to acquit him</strong> regarding the commission of the crime of <strong>abuse of office</strong>, deed provided under art. 297 para. (1) of the Criminal Code.</p>



<p>In the action filed before the administrative and fiscal litigation, the court of law, on 1<sup>st</sup> November 2018, admitted the request of the civil servant (plaintiff) and <strong><em>obliged the employer</em></strong> <em>to recognize to the plaintiff as seniority in the work field, seniority in the specialty and seniority in the civil service the period 17<sup>th</sup> October 2015 and 10<sup>th</sup> May, 2017, when his service report was suspended by law, as well as granting him the leave related to that period of time.</em></p>



<p>In order to rule in this regard, the County Court took into account the provisions of art. 86 para. (3) of Law no. 188/1999, as well as art. 52 para. (2) of the Labour Code, which regulates the employer&#8217;s obligation to remove the damage caused to the employee (employee or civil servant), during the period of legal suspension of employment, as a result of the criminal investigation of the employee following which, however, his criminal liability was not established, and by regulating this obligation, the legislator has in fact made a rightful transposition of the <em>principle restitutio in integrum</em> in order to remove the material damages caused to the employee in such a situation.</p>



<p>It was also noted that the provisions of art. 86 para. (3) of Law no. 188/1999 cannot be interpreted as excluding from the scope the <em>“salary rights related to the period of suspension”,</em> the recognition of this period as seniority in the work field, seniority in the speciality of the studies and seniority in civil functions, as such recognition directly influences the salary rights of the civil servant , in the conditions in which the classification in the salary class, professional degree or hierarchy coefficient is also made according to the respective seniorities, and the exclusion from the calculation of these seniorities of the period when his service report was suspended by law, would mean that in the event that the civil servant was acquitted, for example, without any fault, he would suffer damages resulting from his failure to take up his duties, with direct consequences for determining the level of remuneration he could have received during that period, if the work relationship would not have been suspended by law.</p>



<p>In addition, it was believed that, from the same perspective, the right of the civil servant to benefit from the annual leave related to the period during which his employment relationship was suspended by law must be taken into account, the legislator&#8217;s view being that the civil servant in the situation regulated by art. 86 para. (3) of Law no. 188/1999 should to be treated as if during the period of legal suspension of his work relations he had actually carried out the activity related to the occupied public position.</p>



<p><strong>II. Referral to the High Court of Cassation and Justice for a preliminary ruling</strong></p>



<p>In resolving the appeal filed by the appellants-defendants, the Court of Appeal of Bucharest allowed the request to notify the High Court of Cassation and Justice with a preliminary ruling on the resolution of a question of law concerning:</p>



<p><em>„The interpretation and application of the provisions of art. 86 para. (3) of Law no. 188/1999 on the Status of civil servants, in the sense of establishing the meaning of the phrase “salary rights”, respectively:</em></p>



<p><strong><em>(1)</em></strong><em> if the provisions of art. 86 para. (3) of Law no. 188/1999 are completed with the provisions of art. 52 para. (2) of Law no. 53/2003 &#8211; Labour Code;</em></p>



<p><strong><em>(2)</em></strong><em> in case of an affirmative answer to the first question, if the phrase “and the other rights” from the content of art. 52 para. 2 of Law no. 53/2003 &#8211; The labour code also means or not &#8220;seniority in the work field&#8221;, &#8220;seniority in the specialty&#8221;, &#8220;seniority in public office&#8221;, &#8220;annual leave&#8221;. &#8220;</em></p>



<p>The High Court of Cassation and Justice, <strong>although it rejected as inadmissible the notification</strong> of the Bucharest Court of Appeal through Decision no. 38 of 18<sup>th</sup> May 2020 (Official Gazette no. 661 of 27<sup>th</sup> July 2020) raised the following issues in content of the decision:</p>



<ul><li>The lack of a relevant legal practice for the legal issue analysed, as the national courts did not address the legal issue in question and the theoretical points of view are different.</li><li>The possibility of completing with the provisions of the labour legislation of any provisions of Law no. 188/1999 is regulated by the provisions of art. 117 of the law, which also provides the conditions for such completion, respectively following a verification of the extent to which these provisions do not contravene the rules of the legislation specific to the civil service.</li><li>In this case, the main criticisms brought by the holder of the notification concern the incorrect application of the general provisions of the labour legislation, ignoring the special provisions, in the sense of an incidence in question of art. 96 para. (4) of Law no. 188/1999, which regulates the seniority in public office, of art. 3 lit. l) of the Government Decision no. 611/2008, and regarding the rest leave, during the suspension period, of art. 35 of Law no. 188/1999 and art. 4 para. (2) of the Government Decision no. 250/1992, legal norms that did not form the object of the notification, in view of an interpretation by way of the preliminary decision.</li></ul>



<p><em>(waiting the final solution of the court)</em></p>
<p>Articolul <a rel="nofollow" href="https://www.coman.law/2020/07/31/cleared-civil-servant-repairing-the-damage-caused-to-the-employee/">Cleared civil servant. Repairing the damage caused to the employee</a> apare prima dată în <a rel="nofollow" href="https://www.coman.law/en">Cabinet avocat Andreea Coman</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Judicial practice. Illegal access to a computer system</title>
		<link>https://www.coman.law/2020/06/18/judicial-practice-illegal-access-to-a-computer-system/</link>
					<comments>https://www.coman.law/2020/06/18/judicial-practice-illegal-access-to-a-computer-system/#respond</comments>
		
		<dc:creator><![CDATA[Coman Andreea]]></dc:creator>
		<pubDate>Thu, 18 Jun 2020 10:43:01 +0000</pubDate>
				<category><![CDATA[National jurisprudence]]></category>
		<guid isPermaLink="false">https://www.coman.law/?p=465</guid>

					<description><![CDATA[<p>Articolul <a rel="nofollow" href="https://www.coman.law/2020/06/18/judicial-practice-illegal-access-to-a-computer-system/">Judicial practice. Illegal access to a computer system</a> apare prima dată în <a rel="nofollow" href="https://www.coman.law/en">Cabinet avocat Andreea Coman</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_0 et_section_regular">
				
				
				
				
					<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0 et_pb_bg_layout_light  et_pb_text_align_left">
				
				
				<div class="et_pb_text_inner">
					<h2>1. Does accessing a Facebook account fall within the provisions of art. 360 of the Criminal Code?</h2>
<p>Deed committed out of curiosity by a student at the Faculty of Engineering. Through criminal sentence no. 38 of 21.02.2019, pronounced by the County Court of Arad<a href="#nota1"><strong><sup>1</sup></strong></a> the defendant was sentenced to 1 year and 4 months imprisonment for the crime of illegal access to a computer system, provided for by the provisions of art. 360, par. 1 and 3 of the Criminal Code, noting that the defendant accessed without having the right – without having the consent of the account holder &#8211; the Facebook account of the aggrieved party, provided that access was restricted to users other than the account holder, without the consent of the account holder. The defendant knew the aggrieved party, sometime before the incident he had helped her change her accesspassword to her personal e-mail account, circumstance in which he knew the security questions. His motivation was just curiosity to see how easily a Facebook account can be accessed. In fact, he acknowledged this before the Judge.</p>
<p>As it is about accessing a service of the information society, I believe that we cannot talk about accessing an information system in this particular situation. However, the doctrine admits that the Facebook account is created and hosted on a „<em>virtual machine</em>” (on a server) and, through his action, the student intentionally accessed the server area allocated to the account of the aggrieved party, situation in which the provisions of art. 360 par. 1 and 2 Criminal Codedo apply. However, regarding par. 3 of art. 360 of the Criminal Code, it could be retained if there was an actual violation of security measures, but not in the event that the perpetrator accesses the computer system through already known access credentials.</p>
<p>In this context, I anticipate that at the appropriate time, the legislator will consider the criminalizing of illegal access to an electronic communications service or to an information society service in order to eliminate possible inconsistencies or ambiguities.</p>
<h2>2. What does &#8220;obtaining computer data&#8221; mean?</h2>
<p>Within a procedure of notifying the court with a plea agreement, the defendant was sentenced to 6 years in prison under the aspect of committing the crime provided by art. 360 par. 1, 2 and 3 of the Criminal Code, consisting in the fact that „<em>he entered the office of the aggrieved party (…) and stole a wallet containing the amount of 185 lei and a BCR bank card; (…) After stealing the wallet, finding inside a bank card and a document containing the PIN code attached to the card, in the time interval 15.49 &#8211; 15.51, repeatedly, at short intervals, used the electronic payment instrument without right, respectively performed from an ATM three cash withdrawal operations, thus stealing the amounts of 1,000, 2,000 and 2,000 lei (in total the amount of 5,000 lei)</em>”. In addition to the offense of illegal access to a computer system, the defendant was charged with, among other things, the offense of fraudulently conducting financial transactions.</p>
<p>Of course, given the recognition procedure, the motivation of the court, at least regarding the retention of art. 360 par. 2 of the Criminal Code, is missing<a href="#nota2"><sup>2</sup></a>. The „<em>visual capture of data</em>” displayed by the ATM was probably taken into account, but this was not the intention and purpose of the defendant, who allegedly committed the crime of illegal access to a computer system, regardless of whether or not the data was displayed on the screen; thus, compared to the factual situation retained in the charge of the defendant, I consider that the variant from par. 2 of art. 360 of the Criminal Code was wrongly retained, and the correct solution would have been to restrain only the incriminated crime in the standard version (art. 360 paragraph 1 of the Criminal Code).</p>
<p>An interesting and different factual situation, from the perspective of art.360 para. 2 of the Criminal Code, is also the one retained in the Criminal Sentence no. 1 / PI of 03.01.2020 pronounced by the County Court of Timiș consisting in „<em>unauthorized access to a computer system by using a computer program to which access is prohibited (POS systems) for certain categories of users in order to obtain computer data.</em>”<a href="#nota3"><sup>3</sup></a>, whereas „<em>software</em>” is a „<em>set of instructions that can be executed by a computer system to achieve a given result</em>”<a href="#nota4"><sup>4</sup></a>, such as operating systems, antivirus programs, etc., and not a computer system.</p>
<h2>Is the POS an information system within the meaning of art.360 of the Criminal Code?</h2>
<p>Another case in which the first court wrongly ordered the change of the legal classification retaining the accusation brought against the defendant, including par. 2 in art. 360 of the Criminal Code was remedied by the court of judicial control<a href="#nota5"><sup>5</sup></a>, considering that „<em>the first instance erroneously assessed that the situation of an ATM &#8211; device that always requires the entry of a PIN code, and if it is correct, allows direct access of the person who entered it to the computer data related to the bank account of the cardholder &#8211; would be the same as that of a POS device, intended exclusively for making payments to merchants and which, regardless of the need to enter or not a PIN code, allows only one payment, without the person using the bank card gaining direct access to the computer data held by the bank. It follows, therefore, that in the case of the unauthorized use of an authentic bank card in a POS device belonging to a merchant for the purpose of making payments, this is not intended to obtain computer data, as this type of operation is not in a position obtaining such data. In this context, the Court reiterated that the person using the card on a POS device can only obtain in this way a payment and never access to computer data.</em>”. The solution of the court of judicial control of detention in charge of the defendant is only the standard version of the crime provided by art. 360 Criminal Code is correct. Of course, the crime of fraudulent financial transactions was also detected in the case.</p>
<p>An even more interesting situation is the one retained in the content of the criminal Sentence no. 235 / F of 14.02.2019 of the County Court of Bucharest, in which although the defendant tried to make payments with two previously stolen bank cards he failed because one of the two electronic payment instruments did not have sufficient funds and access to the other was blocked, being convicted for two offenses of illegal access to a computer system provided by art. 360 par. 1 Criminal Code to 3 years imprisonment each<a href="#nota6"><sup>6</sup></a>. Given that the defendant used the two bank cards in the same context and in the same circumstance, I consider that in this case the continued form of the crime of illegal access to a computer system should have been retained. In this case, it was necessary to retain the continued form also with regard to the offenses of attempting to carry out financial operations fraudulently.</p>
<p>Also, in a similar case, I was struck by the reasoning of the court: „<em>In this case, the qualified version of the crime of illegal access to a computer system will be retained. Par. 2 will be retained because the deed was committed in order to obtain computer data, consisting of computer data found on the server of the bank issuing the card that allows checking the balance of the bank account to which the bank card is attached, and checking the validity of the card .Par. 3 will be noted as the computer system of the POS and the card issuing bank is restricted through internal procedures for legitimate users of bank cards and, in addition, in the case of transactions by typing the PIN code there is an additional restriction generated by entering the code correct. Thus, the aggravated form will be retained even when the disregard of the restriction is facilitated by the deficiencies of the protection system, which allow the easy evasion of the protection. The removal of the requirement to enter the PIN code for contactless payments under 100 lei was made as a result of a standard provision of the bank, tacitly accepted by the injured party, a circumstance that cannot be retained in favour of the defendant.</em>”<a href="#nota7"><sup>7</sup></a> „<em>7 nine contactless payments to the POS machine of the commercial unit where she was employed, in the amount of 650 lei, an amount she appropriated in cash from receipts, accessing without right the computer system of the card issuing bank, but also of POS acquis.” </em> The court&#8217;s view that the concepts of <em> „access to the POS computer system</em>” și „<em>contactless payment</em>” are equivalent is erroneous.</p>
<p>From a technical point of view, although the POS can be considered an information system, I appreciate that the interpretation of the courts is exaggerated, being able to create unwanted precedents in the sense of considering that any interaction with an electronic equipment would represent the crime of illegal access to computer system on the grounds that that device functions as a computer system. In this case, I consider that it would have been necessary only to detain the offense of carrying out financial operations fraudulently (art. 250 of the Criminal Code).</p>
<h2>4. Does In dubio pro reo apply in the field of cybercrime ?!</h2>
<p>The solution of the High Court of Cassation And Justice pronounced by a decision<a href="#nota8"><sup>8</sup></a> by which the defendant was sentenced, among other things, to 6 months imprisonment for the crime of illegal access to a computer system, prev. of art. 42 of Law no. 161/2003, with the application of art.41 para. (2) of the Criminal Code previously and art. 5 of the Criminal Code, keeping in mind that he would have used without right the bank card of his deceased grandmother, accessing a computer system (ATM). The defendant defended himself by stating that his grandmother gave him the card to use from the beginning, that he went with her to the bank to open the account and that he had power of attorney on the account, and the fact that he had the right to use it also resulted from the fact that he had the PIN code. In support of his claims, he requested the taking of evidence (hearings of witnesses, requesting documents from the banking unit), which were rejected. He also stated that the legal framework that was withheld from him is specific to those who clone cards and steal money from the account holders, without right, which has nothing to do with the current situation. The High Court rejected the defendant&#8217;s defences, holding the defendant in charge „<em>illegal use of a bank card belonging to his deceased grandmother, illegal access to the ATM and financial operations.</em>”. Although the court&#8217;s reasoning frequently includes the phrase „<em>illegal use of a bank card</em>”, along with „<em>fraudulent financial transactions</em>”, the first does not represent a distinct crime, but a manifestation of the crime provided by art. 250 Criminal Code. It is interesting that the Supreme Court invoked in support of the solution the lack of relevance of the quality of sole heir of the defendant and the agreement given by the grandmother to use the card since there were no documents on the record of the cardholder&#8217;s death and use of the card, by knowing the security element by the defendant appellant, although the evidence previously requested by the defendant to be administered in the case was rejected. I note that the court&#8217;s presumption of the crime of illegal access to a computer system was one of guilt, a presumption extracted from the whole factual situation that outlined the commission, both objectively and subjectively, of the crimes of complicity in computer fraud and computer fraud, but also performing financial operations fraudulently.</p>
<p>A recent conviction was upheld by the Ploiești Court of Appeal by Criminal Decision no. 299 of March 25, 2020<a href="#nota9"><sup>9</sup></a> under the aspect of committing the crime provided by art. 360 para. 1 and 3 of the Criminal Code &#8211; 18 material acts and the crime of computer fraud (art. 249 Criminal Code) &#8211; 18 material acts, consisting in the fact that the defendant, as a counselor in the Treasury, „<em>Accessed without right, the computer system of the Boldești Scăieni Treasury, by logging in to the TREZOR application, where he had a“ creative ”user account with the TREZ13 ID and related password (which according to internal rules was updated / changed twice a month) and validated these fraudulent transactions, using the user account &#8220;confirming&#8221; with the SEP ID 01 and the corresponding password he held.</em>” The financial transactions for payments from the accounts of some clients were carried out without their consent or approval to a bank account opened by her husband.</p>
<p>Since other relevant details regarding the factual situation are not presented in this case, at least under the aspect of the crime provided by art. 360 of the Criminal Code, I appreciate that the court correctly retained in the charge of the defendant the provisions of the standard version of the crime provided by art. 360 of the Criminal Code, as the banking official is authorized by the employing banking unit to access (use) the computer system for a certain (legal) purpose and based on an approved working procedure. Any other banking operation performed in excess of the limits set by the employer is an illegal act (manifested by exceeding the limits of the authorization), especially if it overlaps with others, for example with material acts limited to the crime of computer fraud. Regarding the retention of the aggravated variant (art. 360 par. 3 of the Criminal Code), I consider that it was not required, since it does not appear that the defendant violated / evaded any security measure, having a user account and the corresponding password in the current year of its activity.</p>
<h2>Conclusions</h2>
<p>It is observed from the judicial practice that the scope of protection that the legislator understood to grant to the computer systems would be apparently much wider, there being cases in which the judicial bodies analyse potential incriminations of the legal norm in particular situations.</p>
<p>It is very important that cybercrime legislation receives increased attention in order to really respond to the need for social protection according to the rule of criminalization, while avoiding exaggerated and forced interpretations of the rule of law.</p>
<p>It is obvious that if all the technical data that are limited to the material element of computer crimes are not understood by someone who applies or uses such computer systems and / or computer programs are very difficult to understand, and the lack of technical information to the level of legal practitioners can have serious consequences, because a magistrate who convicts instead of acquitting commits a miscarriage of justice.</p>
<p>&nbsp;</p>
<p><strong><span style="color: #000000;">FOOTNOTES</span></strong></p>
<p class="p2 pfn" id="nota1"><span class="s1 fn">1. </span><span class="s1 fn1">County Court of Arad, Criminal sentence nr. 38 from 21.02.2019, available here: <a href="http://rolii.ro/hotarari/5c9c36c1e490098c0900003a">http://rolii.ro/hotarari/5c9c36c1e490098c0900003a</a>.</span></p>
<p class="p2 pfn" id="nota2"><span class="s1 fn">2. </span><span class="s1 fn1"> County Court of Cluj, Criminal sentence nr. 344 from 23.12.2019, available here: <a href="http://rolii.ro/hotarari/5e4df379e490099c22000038">http://rolii.ro/hotarari/5e4df379e490099c22000038</a>.</span></p>
<p class="p2 pfn" id="nota3"><span class="s1 fn">3. </span><span class="s1 fn1"> County Court of Timiș, Criminal sentence nr. 1/PI from 03.01.2020, available here: <a href="http://rolii.ro/hotarari/5e34e676e49009e41e00004b">http://rolii.ro/hotarari/5e34e676e49009e41e00004b</a>.</span></p>
<p class="p2 pfn" id="nota4"><span class="s1 fn">4. </span><span class="s1 fn1"> Source: (c) 2018 dr. Maxim DOBRINOIU, Nicolae Titulescu University of Bucharest, available on <a href="www.e-crime.ro">www.e-crime.ro</a>.</span></p>
<p class="p2 pfn" id="nota5"><span class="s1 fn">5. </span><span class="s1 fn1"> County Court of Appeal Bucharest, Criminal Section II, Criminal sentence nr. 675 from17thMay 2019, available here: <a href="https://www.jurisprudenta.com/jurisprudenta/speta-15mbq13o/">https://www.jurisprudenta.com/jurisprudenta/speta-15mbq13o/</a>.</span></p>
<p class="p2 pfn" id="nota6"><span class="s1 fn">6. </span><span class="s1 fn1"> County Court of Bucharest, Criminal sentence nr. 235/F from 14.02.2019, available here: <a href="http://rolii.ro/hotarari/5c80873be49009281b000042">http://rolii.ro/hotarari/5c80873be49009281b000042</a></span></p>
<p class="p2 pfn" id="nota7"><span class="s1 fn">7. </span><span class="s1 fn1"> County Court of Bucharest, Criminal sentence nr. 111 from 28.01.2020, available here: <a href="http://rolii.ro/hotarari/5e38d8a3e49009801c00002c">http://rolii.ro/hotarari/5e38d8a3e49009801c00002c</a>.</span></p>
<p class="p2 pfn" id="nota8"><span class="s1 fn">8. </span><span class="s1 fn1"> High Court of Cassation and Justice, Criminal Section, Decision nr. 19/A/2020 from 22 January 2020, available here:  <a href="http://www.scj.ro/1093/Detalii-jurisprudenta?customQuery%5B0%5D.Key=id&amp;customQuery%5B0%5D.Value=157728">http://www.scj.ro/1093/Detalii-jurisprudenta?customQuery%5B0%5D.Key=id&amp;customQuery%5B0%5D.Value=157728</a>.</span></p>
<p class="p2 pfn" id="nota9"><span class="s1 fn">9. </span><span class="s1 fn1"> Court of Appeal Ploiești, Criminal Decision nr. 299 from 25 March 2020, available here: <a href="http://rolii.ro/hotarari/5ea78cede49009381d000036">http://rolii.ro/hotarari/5ea78cede49009381d000036</a>.</span></p>
<!-- /divi:paragraph -->
				</div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row -->
				
				
			</div> <!-- .et_pb_section --></p>
<p>Articolul <a rel="nofollow" href="https://www.coman.law/2020/06/18/judicial-practice-illegal-access-to-a-computer-system/">Judicial practice. Illegal access to a computer system</a> apare prima dată în <a rel="nofollow" href="https://www.coman.law/en">Cabinet avocat Andreea Coman</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.coman.law/2020/06/18/judicial-practice-illegal-access-to-a-computer-system/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
