Blog
Crime of libel committed through Facebook requires prior verification of the IP address
- Tuesday 24 April 2018
- Digital Crime
With its recent ruling n. 5352 of February 5th 2018, the Fifth Chamber of the Italian Supreme Court (hereinafter: S.C.) stated a principle according to which libel crimes committed on-line – ex art. 595, co.3 of the Italian Criminal Code – cannot be considered to be charged in the ...
Possession of pornographic material: transfer of files on hardware supports integrates the malice
- Tuesday 13 March 2018
- Digital Crime
This is the opinion of the 3rd Chamber of the Criminal Supreme Court (decision n. 48175 of October 19th 2017) in relation to the subjective element required for the crime of possession of pornographic material realized through the sexual exploitation of minors. The diffusion of the internet ...
Cyberstalking: photos and videos posted on social networks could constitute the crime of stalking
- Tuesday 20 February 2018
- Cyber security, Digital Crime
With the recent ruling n. 57764 of December 28th 2017, the Fifth Criminal Chamber of the Supreme Court has, once again, addressed the issue concerning the crime of stalking - ex art. 612 bis - c.p., when the harassing or behaviors typical of the said criminal offense are perpetrated through the ...
BLB LAW FIRM APPOINTS A NEW OF COUNSEL: PROFESSOR PAOLO GALDIERI HEADS THE DIGITAL CRIME DEPARTMENT
- Tuesday 06 February 2018
- Cyber security, Cyber Warfare, Data Protection, Digital Crime, Digital Forensics, Privacy
- Italia
BLB expands its team with a new key entrance. Professor Paolo Galdieri joins the Law Firm as of Counsel. BLB Law Firm has a relevant expertise in many fields of law of fundamental importance for the SMEs, both start-ups and bigger sized companies. Professor Galdieri completes the BLB ...
The United Chambers of the Italian Supreme Court regarding the unlawful access to an IT system
- Friday 02 February 2018
- Cyber security, Digital Crime
In the opinion of the Supreme Court there are two key points regarding the unlawful access to IT systems: 1) In spite of being authorized to access a certain IT system, a person can still be found guilty of this particular crime, if it is ascertained that the performed operation did not fall ...