0% found this document useful (0 votes)
24 views13 pages

الجريمة المعلوماتية في التشريع الجزائري

The document discusses the evolution of information crime within Algerian legislation, highlighting the risks faced by economic institutions due to advancements in information and communication technologies. It emphasizes the need for legal provisions and international agreements to protect these institutions, noting that despite amendments, current laws remain inadequate compared to the rapid development of informational criminal activities. The study aims to analyze the effectiveness of Algeria's criminal law in combating information crime and its implications for intellectual and industrial property rights.

Uploaded by

zahra roussi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views13 pages

الجريمة المعلوماتية في التشريع الجزائري

The document discusses the evolution of information crime within Algerian legislation, highlighting the risks faced by economic institutions due to advancements in information and communication technologies. It emphasizes the need for legal provisions and international agreements to protect these institutions, noting that despite amendments, current laws remain inadequate compared to the rapid development of informational criminal activities. The study aims to analyze the effectiveness of Algeria's criminal law in combating information crime and its implications for intellectual and industrial property rights.

Uploaded by

zahra roussi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

60 -48 ‫ ﺹ‬،(2021) 04 :‫ ﺍﻟﻌـــﺪﺩ‬/ 14‫ﻠﺪ‬‫ﺍ‬ ‫ﳎﻠـﺔﺍﳊﻘﻮﻕ ﻭﺍﻟﻌﻠﻮﻡ ﺍﻹﻧﺴﺎﻧﻴﺔ‬

‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ‬


Information crime in Algerian legislation

‫ﺑﻮﻫﺮﻳﻦ ﻓﺘﻴﺤﺔ‬
[email protected] ،(‫ )ﺍﳉﺰﺍﺋﺮ‬2 ‫ﺣﺎﻣﻌﺔ ﻗﺴﻨﻄﻴﻨﺔ‬
2021/11/12 :‫ﺗﺎﺭﻳﺦ ﺍﻟﻨﺸﺮ‬ 2021/10/04 :‫ﺗﺎﺭﻳﺦ ﺍﻟﻘﺒﻮﻝ‬ 2021/05/06 :‫ﺗﺎﺭﻳﺦ ﺍﻻﺳﺘﻼﻡ‬

‫ ﺗﺘﻌﺮﺽ ﺍﳌﺆﺳﺴﺎﺕ ﺍﻻﻗﺘﺼﺎﺩﻳﺔ ﺇﱃ ﻋﺪﺓ ﳐﺎﻃﺮ ﲤﺲ ﻛﻞ ﺍﻟﻮﻇﺎﺋﻒ ﺍﻟﱵ ﲤﺎﺭﺳﻬﺎ ﻣﻦ ﺑﲔ ﻫﺬﻩ ﺍﳌﺨﺎﻃﺮ‬:‫ﻣﻠﺨﺺ‬
‫ ﺣﻴﺚ ﻋﻤﻠﺖ ﺍﻟﺪﻭﻝ ﻋﻠﻰ ﺳﻦ ﻧﺼﻮﺹ ﻗﺎﻧﻮﻧﻴﺔ‬، ‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﱵ ﺗﻄﻮﺭﺕ ﺑﺘﻄﻮﺭ ﺗﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭ ﺍﻻﺗﺼﺎﻝ‬
‫ﳊﻤﺎﻳﺔ ﺍﳌﺆﺳﺴﺔ ﻣﻦ ﻫﺬﻩ ﺍﳉﺮﳝﺔ ﻭﻋﻘﺪ ﺍﺗﻔﺎﻗﻴﺎﺕ ﺩﻭﻟﻴﺔ ﻟﺬﻟﻚ ﻭﻣﻦ ﺑﲔ ﻫﺬﻩ ﺍﻟﺪﻭﻝ ﺍﳉﺰﺍﺋﺮ ﺍﻟﱵ ﻋﻤﻠﺖ ﻋﻠﻰ ﲪﺎﻳﺔ‬
،‫ﺍﳌﺆﺳﺴﺎﺕ ﺍﻻﻗﺘﺼﺎﺩﻳﺔ ﻣﻦ ﺟﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻦ ﻃﺮﻳﻖ ﺇﺩﺧﺎﻝ ﺗﻐﲑﺍﺕ ﺟﺬﺭﻳﺔ ﰲ ﻗﺎﻧﻮﻥ ﺍﳌﻠﻜﻴﺔ ﺍﻟﻔﻜﺮﻳﺔ ﻭﺍﳌﻠﻜﻴﺔ ﺍﻟﺼﻨﺎﻋﻴﺔ‬
‫ ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﻭﺿﻊ ﻗﻮﺍﻧﲔ ﻣﻜﻤﻠﺔ ﺗﺘﻄﻮﺭ ﺑﺘﻄﻮﺭ ﺍﳉﺮﳝﺔ ﻭﻋﻠﻴﻪ ﺳﻨﺤﺎﻭﻝ ﰲ ﻫﺬﻩ ﺍﻟﺪﺭﺍﺳﺔ ﺗﻨﺎﻭﻝ‬،‫ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﻨﺎﺋﻲ ﻟﻸﻋﻤﺎﻝ‬
‫ﺎ ﺍﳉﺰﺍﺋﺮ ﰲ‬ ‫ ﻭﻟﻘﺪ ﺗﻮﺻﻠﺖ ﺍﻟﺪﺭﺍﺳﺔ ﺇﱃ ﺍﻧﻪ ﺑﺎﻟﺮﻏﻢ ﻣﻦ ﺍﻟﺘﻌﺪﻳﻼﺕ ﺍﻟﱵ ﻗﺎﻣﺖ‬.‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺘﻴﺔ ﺿﻤﻦ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ‬
.‫ﳎﺎﻝ ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺇﻻ ﺃﻥ ﻫﺬﻩ ﺍﻟﻨﺼﻮﺹ ﺗﺒﻘﻰ ﻏﲑ ﻛﺎﻓﻴﺔ ﻣﻘﺎﺭﻧﺔ ﺑﺘﻄﻮﺭ ﺍﻻﺣﺘﺮﺍﻑ ﺍﻹﺟﺮﺍﻣﻲ ﺃﳌﻌﻠﻮﻣﺎﰐ‬
.‫ ؛ ﻣﺧﺎطر اﻟﻣﻌﻠوﻣﺎت؛ ﺟرﯾﻣﺔ؛ ﻗﺎﻧون ﺟﻧﺎﺋﻲ؛ اﺗﻔﺎﻗﯾﺔ ﺗرﺑس‬:‫ﻣﻔﺘﺎﺣﻴﺔ‬ ‫ﻛﻠﻤﺎﺕ‬
Abstract: The economic institutions are exposed to a number of risks that affect all the
functions that they practice. Among these risks is the crime of information, which developed
through the development of information and communication technologies. The countries
worked to enact legal provisions to protect the institution from this crime and to conclude
international agreements. On the protection of economic institutions from the crimes of
information by introducing radical changes in the law of intellectual property and industrial
property in addition to the development of complementary laws evolve the evolution of crime,
and we will try in this study to discuss abouth Information crime in Algerian legislation.
The study found that despite the amendments made by Algeria in the field of combating
information crime, these texts remain insufficient compared to the development of
informational criminal professionalism.
Keywords: Information Risk; Crime; Criminal Law; TRIPS

48
‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ‬

‫‪ -1‬ﻣﻘﺪﻣﺔ‬

‫ﻟﻘﺪ ﻋﺮﻓﺖ ﺍﻟﻌﺪﻳﺪ ﻣﻦ ﺍﻟﺪﻭﻝ ﰲ ﺍﻟﻘﺮﻥ ﺍﻟﻌﺸﺮﻳﻦ ﺗﻄﻮﺭﺍ ﻫﺎﻣﺎ ﰲ ﳐﺘﻠﻒ ﺍ‪‬ﺎﻻﺕ ﻭﺍﳌﻴﺎﺩﻳﻦ ﻧﺘﺞ ﻋﻨﻪ ﻇﻬﻮﺭ ﻣﺎ ﻳﺴﻤﻰ‬
‫ﺑﺎﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﻫﺬﻩ ﺍﻷﺧﲑﺓ ﺗﻌﺘﱪ ﲰﺔ ﺍﻟﻌﺼﺮ ﻭ ﺍﳌﻘﻴﺎﺱ ﺍﻟﺬﻱ ﳛﺪﺩ ﻣﺪﻯ ﺗﻘﺪﻡ ﺍﻟﺸﻌﻮﺏ ﺣﻴﺚ ﺍﻧﻪ ﻛﻤﺎ ﻛﺎﻥ ﻫﻨﺎﻙ ﻣﺎ ﻳﺴﻤﻰ‬
‫ﺑﺎﻟﺜﻮﺭﺓ ﺍﻟﺼﻨﺎﻋﻴﺔ ﺗﻮﺟﺪ ﺛﻮﺭﺓ ﻛﻠﻴﺔ ﺷﺎﻣﻠﺔ ﲡﺘﺎﺡ ﺍﻟﻌﺎﱂ ﺍﻵﻥ ﻫﻲ ﺍﻟﺜﻮﺭﺓ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻟﱵ ﻧﻘﻠﺖ ﺍﻹﻧﺴﺎﻥ ﻣﻦ ﻋﺼﺮ ﺍﻟﺼﻨﺎﻋﺔ ﺇﱃ‬
‫ﻋﺼﺮ ﺃﻭ ﳎﺘﻤﻊ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫ﻭ ﲤﺎﺷﻴﺎ ﻣﻊ ﻫﺬﺍ ﺍﻟﻌﺼﺮ ﻛﺎﻥ ﻻﺯﻣﺎ ﻋﻠﻰ ﻫﺬﻩ ﺍﻟﺪﻭﻝ ﻣﻦ ﺃﺟﻞ ﺿﻤﺎﻥ ‪‬ﻀﺘﻬﺎ ﺃﻥ ﺗﻌﻤﻞ ﻋﻠﻰ ﻣﻮﺍﻛﺒﺔ ﺍﻟﺘﻄﻮﺭ ﺍﻟﺘﻜﻨﻮﻟﻮﺟﻲ‬
‫ﻭ ﺍﻻﻟﻜﺘﺮﻭﱐ ﺍﻟﺬﻱ ﳒﻢ ﻋﻨﻪ ﲢﻮﻝ ﺍﻟﻌﺪﻳﺪ ﺇﱃ ﳎﺘﻤﻌﺎﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﺔ ﺗﻌﺘﺘﻤﺪ ﻋﻠﻰ ﺭﻗﻤﻴﺔ ﺍﻷﺩﺍﺀ ﰲ ﺃﻋﻤﺎﳍﺎ ﺣﻴﺚ ﱂ ﻳﻌﺪ ﻫﻨﺎﻙ‬
‫ﳎﺎﻝ ﺍﻗﺘﺼﺎﺩﻱ ﺃﻭ ﺍﺟﺘﻤﺎﻋﻲ ﺃﻭ ﺻﻨﺎﻋﻲ ﺃﻭ ﺇﺩﺍﺭﻱ ﺇﻻ ﻭ ﺗﺒﺎﺷﺮ ﺍﳊﺎﺳﺒﺎﺕ ﻭ ﺗﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺩﻭﺭﺍ ﺃﺳﺎﺳﻴﺎ ﰲ ﺃﺩﺍﺋﻪ ﻭ ﺗﻄﻮﻳﺮﻩ‬
‫ﻓﺘﺰﺍﻳﺪ ﺍﻻﻋﺘﻤﺎﺩ ﻋﻠﻰ ﺗﻘﺪﻡ ﺗﻘﻨﻴﺎﺕ ﺍﳊﺎﺳﺒﺎﺕ ﻭﺍﳌﻌﻠﻮﻣﺎﺕ ﻭ ﺗﺰﺍﻳﺪ ﺍﻻﻋﺘﻤﺎﺩ ﻋﻠﻴﻬﺎ ﰲ ﺗﺴﻴﲑ ﺍ‪‬ﺘﻤﻌﺎﺕ‪.‬‬
‫ﻏﲑ ﺃﻥ ﺍﻟﺜﻮﺭﺓ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺟﺎﺀﺕ ﻣﺼﺤﻮﺑﺔ ﺑﻔﺮﺹ ﺟﺪﻳﺪﺓ ﻻﺭﺗﻜﺎﺏ ﺃﺷﻜﺎﻝ ﻭ ﺻﻮﺭ ﻣﺴﺘﺤﺪﺛﺔ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﻟﻔﻨﻴﺔ‪ ،‬ﺍﻟﱵ‬
‫ﺃﺛﺮﺕ ﻋﻠﻰ ﺣﻘﻮﻕ ﺍﻷﺷﺨﺎﺹ ﺍﻟﻄﺒﻴﻌﻴﺔ ﻭ ﺍﳌﻌﻨﻮﻳﺔ‪ ،‬ﻭ ﺣﺮﻳﺎ‪‬ﻢ ﻧﺘﻴﺠﺔ ﺍﺳﺘﻐﻼﻝ ﺍﻷﻓﺮﺍﺩ ﻭ ﺍﳉﻬﺎﺕ ﻟﻠﺘﻘﻨﻴﺎﺕ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ‬
‫ﻏﲑ ﺍﻟﻐﺮﺽ ﺍﻟﺬﻱ ﺧﻠﻘﺖ ﻷﺟﻠﻪ ﻭﺃﺿﺤﺖ ﳏﻼ ﻟﻼﻋﺘﺪﺍﺀ ﻭ ﺇﺳﺎﺀﺓ ﺍﻻﺳﺘﺨﺪﺍﻡ‪.‬‬
‫ﻭ ﰲ ﺍﻟﻮﻗﺖ ﺍﻟﺬﻱ ﺗﻘﺪﻡ ﻓﻴﻪ ﺗﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭ ﺍﻻﺗﺼﺎﻝ ﻷﺟﻬﺰﺓ ﺍﻷﻣﻦ ﻭ ﻟﻠﺪﻭﻝ ﺍﻟﻜﺜﲑ ﻣﻦ ﺍﻟﺘﺴﻬﻴﻼﺕ ﺍﻟﱵ‬
‫ﺗﺴﺎﻫﻢ ﰲ ﺭﻓﻊ ﺇﻣﻜﺎﻧﺎ‪‬ﺎ ﻟﻠﻘﻀﺎﺀ ﻋﻠﻰ ﺍﳉﺮﳝﺔ ﺇﻻ ﺃ‪‬ﺎ ﻭ ﰲ ﺍﻟﻮﻗﺖ ﻧﻔﺴﻪ ﺃﺩﺕ ﺇﱃ ﺗﻄﻮﻳﺮ ﻭ ﲢﺪﻳﺚ ﺍﳉﺮﳝﺔ ‪ ،‬ﻓﻠﻢ ﻳﻌﺪ ﺍ‪‬ﺮﻡ‬
‫ﺫﻟﻚ ﺍﻟﺮﺟﻞ ﺍﻟﺬﻱ ﻳﺸﻬﺮ ﺳﻼﺣﺎ ﰲ ﻭﺟﻪ ﺃﺧﺮ‪ ،‬ﺑﻞ ﺃﺻﺒﺢ ﺭﺟﻼ ﺫﺍ ﻋﻠﻢ ﺍﺳﺘﺨﺪﻡ ﻋﻠﻤﻪ ﺿﺪ ﺍﳌﺆﺳﺴﺔ ﺍﻟﱵ ﺗﻌﺘﱪ ﺃﺳﺎﺱ‬
‫ﺍﻗﺘﺼﺎﺩ ﻛﻞ ﺩﻭﻟﺔ ﻣﺰﻋﺰﻋﺎ ﺑﺬﻟﻚ ﺁﻣﻨﻬﺎ ﻭ ﺍﺳﺘﻘﺮﺍﺭﻫﺎ‪ ،‬ﻭﻣﻦ ﻫﻨﺎ ﺑﺪﺍ ﻳﻈﻬﺮ ﻧﻮﻉ ﺃﺧﺮ ﻣﻦ ﺍ‪‬ﺮﻣﲔ ﻧﻘﻠﻮﺍ ﺍﳉﺮﳝﺔ ﻣﻦ ﺻﻮﺭ‪‬ﺎ‬
‫ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﺇﱃ ﺃﺧﺮﻯ ﺍﻟﻜﺘﺮﻭﻧﻴﺔ ﻳﺼﻌﺐ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻌﻬﺎ ﻻﺭﺗﺒﺎﻃﻬﺎ ﺑﺎﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎ‪.‬‬
‫ﺇﻥ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﺛﺎﺭ ﻋﻠﻰ ﺍﳌﺆﺳﺴﺔ ﺍﻻﻗﺘﺼﺎﺩﻳﺔ ﻣﻦ ﺣﻴﺚ ﺗﻘﻠﻴﺺ ﺣﺠﻢ ﺳﻮﻗﻬﺎ‪ ،‬ﺍﻟﻘﻀﺎﺀ ﻋﻠﻰ ﻣﻨﺘﺠﺎ‪‬ﺎ ﻭ‬
‫ﻏﲑﻫﺎ ﻣﻦ ﺍﳌﺨﺎﻃﺮ ﺍﻟﱵ ﺗﺘﻄﻠﺐ ﲪﺎﻳﺔ ﻗﺎﻧﻮﻧﻴﺔ‪ ،‬ﺧﺎﺻﺔ ﻭ ﺃﻥ ﻫﺬﻩ ﺍﳉﺮﳝﺔ ﻻ ﳝﻜﻦ ﺍﻟﺘﻄﺒﻴﻖ ﰲ ﺷﺄ‪‬ﺎ ﺍﻟﻨﺼﻮﺹ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ‪.‬‬
‫‪ -2-1‬ﻣﺸﻜﻠﺔ ﺍﻟﺪﺭﺍﺳﺔ‪:‬‬
‫ﻭ ﻣﻊ ﺃﻥ ﺍﻹﺟﺮﺍﻡ ﺃﳌﻌﻠﻮﻣﺎﰐ ﱂ ﻳﺘﺨﺬ ﰲ ﺍﳉﺰﺍﺋﺮ ﻭ ﺍﻟﻮﻃﻦ ﺍﻟﻌﺮﰊ ﺑﻌﺪﺍ ﻛﺎﻟﺬﻱ ﺍﲣﺬﻩ ﰲ ﺍﻟﺪﻭﻝ ﺍﳌﺘﻘﺪﻣﺔ ﺍﻟﱵ ﺃﺧﺬﺕ ﲢﻈﻰ‬
‫ﺑﺎﻫﺘﻤﺎﻡ ﻣﺘﺰﺍﻳﺪ ﻣﻦ ﺣﻜﻮﻣﺎﺕ ﺩﻭﻝ ﻫﺬﻩ ﺍﻷﺧﲑﺓ‪ ،‬ﺇﻻ ﺃﻥ ﺫﻟﻚ ﻻ ﻳﻨﻔﻲ ﺿﺮﻭﺭﺓ ﺍﻟﺘﺼﺪﻱ ﻟﺒﻮﺍﺩﺭ ﻫﺬﻩ ﺍﻟﻈﺎﻫﺮﺓ ﺧﺎﺻﺔ ﻭ ﺇﻧﻨﺎ‬
‫ﰲ ﻋﺼﺮ ﺍﻟﻌﻮﳌﺔ ﻭ ﺍﳉﺰﺍﺋﺮ ﻟﻴﺴﺖ ﺑﺒﻌﻴﺪﺓ ﻋﻦ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﻹﺟﺮﺍﻡ ﺍﻟﺬﻱ ﲡﺎﻭﺯ ﺍﳊﺪﻭﺩ ﺍﻹﻗﻠﻴﻤﻴﺔ ﻟﻠﺪﻭﻟﺔ‪ ،‬ﻭ ﻋﻠﻰ ﻫﺬﺍ‬
‫ﺍﻷﺳﺎﺱ ﻗﺎﻣﺖ ﺍﳉﺰﺍﺋﺮ ﺑﺴﻦ ﻗﻮﺍﻧﲔ ﺿﻤﻦ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﻨﺎﺋﻲ ﻭ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﶈﺎﺭﺑﺔ ﻫﺬﻩ ﺍﳉﺮﳝﺔ ﻭ ﻋﻠﻴﻪ ﺗﺘﻨﺎﻭﻝ ﻫﺬﻩ‬
‫ﺍﻟﺪﺭﺍﺳﺔ ﺍﻹﺷﻜﺎﻟﻴﺔ ﺍﻟﺘﺎﻟﻴﺔ‪:‬‬
‫ﻣﺎ ﺍﳌﻘﺼﻮﺩ ﺑﺎﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ؟‬

‫‪49‬‬
‫ﻓﺘﻴﺤﺔ ﺑﻮﻫﺮﻳﻦ‬

‫‪ -2-1‬ﺍﳍﺪﻑ ﻣﻦ ﺍﻟﺪﺭﺍﺳﺔ‪:‬‬
‫ﰲ ﺿﻮﺀ ﻣﺎ ﺗﻀﻤﻨﺘﻪ ﻣﺸﻜﻠﺔ ﺍﻟﺒﺤﺚ ﻓﺎﻥ ﺃﻫﺪﺍﻑ ﻫﺬﻩ ﺍﻟﺪﺭﺍﺳﺔ ﳝﻜﻦ ﺣﺼﺮﻫﺎ ﰲ‪:‬‬

‫‪-‬ﺍﻟﺘﻌﺮﻑ ﻋﻠﻰ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬


‫‪-‬ﻃﺮﻕ ﻣﻌﺎﳉﺔ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‪.‬‬
‫‪-‬ﺍﻟﻘﻮﺍﻧﲔ ﺍﻟﱵ ﺳﻨﺘﻬﺎ ﺍﳉﺰﺍﺋﺮ ﳌﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫‪ -3-1‬ﻣﻨﻬﺠﻴﺔ ﺍﻟﺪﺭﺍﺳﺔ‪:‬‬
‫‪‬ﺪﻑ ﺍﻹﺟﺎﺑﺔ ﻋﻠﻰ ﺍﻹﺷﻜﺎﻟﻴﺔ ﺍﻟﺮﺋﻴﺴﻴﺔ ﺍﺳﺘﺨﺪﻣﻨﺎ ﺍﳌﻨﻬﺞ ﺍﻟﻮﺻﻔﻲ ﺍﻟﺘﺤﻠﻴﻠﻲ ﻭ ﺫﻟﻚ ﻋﻦ ﻃﺮﻳﻖ ﻭﺻﻒ ﻇﺎﻫﺮﺓ ﺍﳉﺮﳝﺔ‬
‫ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ ﻣﻦ ﺧﻼﻝ ﺳﺮﺩ ﺍﳉﺎﻧﺐ ﺍﻟﻨﻈﺮﻱ‪ ،‬ﻭ ﲢﻠﻴﻞ ﺍﻟﻘﻮﺍﻧﲔ ﺍﳉﺰﺍﺋﺮﻳﺔ ﺍﻟﱵ ﺗﻨﺎﻭﻟﺖ ﺍﳌﻮﺿﻮﻉ‪.‬‬
‫‪ -4-1‬ﻫﻴﻜﻞ ﺍﻟﺪﺭﺍﺳﺔ‪:‬‬
‫ﻭ ﻟﻠﻮﺻﻮﻝ ﺇﱃ ﺍﳍﺪﻑ ﻣﻦ ﻫﺬﻩ ﺍﻟﺪﺭﺍﺳﺔ ﻗﻤﻨﺎ ﺑﺘﻘﺴﻴﻤﻬﺎ ﺇﱃ ﺛﻼﺙ ﳏﺎﻭﺭ ﺣﻴﺚ ﺗﻨﺎﻭﻟﻨﺎ ﰲ ﺍﶈﻮﺭ ﺍﻷﻭﻝ ﺍﻹﻃﺎﺭ ﺍﻟﻨﻈﺮﻱ‬
‫ﻟﻠﺠﺮﳝﺔ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﺃﻣﺎ ﺍﶈﻮﺭ ﺍﻟﺜﺎﱐ ﻓﺘﻄﺮﻗﻨﺎ ﻓﻴﻪ ﺇﱃ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺿﻤﻦ ﺍﻟﻘﻮﺍﻧﲔ ﺍﻟﺪﻭﻟﻴﺔ‪ ،‬ﻟﻴﻜﻦ ﺍﶈﻮﺭ ﺍﻟﺜﺎﻟﺚ ﻭ ﺍﻷﺧﲑ‬
‫ﺣﻮﻝ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ‪ .‬ﻭ ﺧﺘﻤﻨﺎ ﺍﻟﺪﺭﺍﺳﺔ ﲞﺎﲤﺔ ﺗﻨﺎﻭﻟﻨﺎ ﻓﻴﻬﺎ ﺃﻫﻢ ﺍﻟﻨﺘﺎﺋﺞ ﺍﳌﺘﻮﺻﻞ ﺇﻟﻴﻬﺎ‪.‬‬
‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬‬ ‫‪-2‬‬
‫ﺗﻌﺘﱪ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﺑﲔ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﺗﺒﺎﻳﻨﺖ ﺗﺴﻤﻴﺎ‪‬ﺎ ﻋﱪ ﺍﳌﺮﺍﺣﻞ ﺍﻟﺰﻣﻨﻴﺔ ﻟﺘﻄﻮﺭﺍ‪‬ﺎ ﺍﻟﱵ ﺍﺭﺗﺒﻄﺖ ﺑﺘﻘﻨﻴﺔ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ‪ ،‬ﻓﻘﺪ ﺍﺻﻄﻠﺢ ﻋﻠﻰ ﺗﺴﻤﻴﺘﻬﺎ ﺑﺪﺍﻳﺔ ﺑﺈﺳﺎﺀﺓ ﺍﺳﺘﺨﺪﺍﻡ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ‪ ،‬ﰒ ﺍﺣﺘﻴﺎﻝ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﻓﺎﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭ ﺳﻨﻌﺎﰿ‬
‫ﰲ ﻫﺬﺍ ﺍﳉﺰﺀ ﻣﻦ ﺍﻟﺒﺤﺚ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﻣﻦ ﺣﻴﺚ ﺍﻟﺘﻌﺮﻳﻒ‪ ،‬ﺍﻷﻃﺮﺍﻑ ﻭ ﺍﳋﺼﺎﺋﺺ‪.‬‬
‫‪ -1-2‬ﺗﻌﺮﻳﻒ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬‬
‫ﻻ ﻳﻮﺟﺪ ﺗﻌﺮﻳﻒ ﻣﺘﻔﻖ ﻋﻠﻴﻪ ﺑﲔ ﻓﻘﻬﺎﺀ ﺍﻟﻘﺎﻧﻮﻥ ﻧﺘﻴﺠﺔ ﺍﺧﺘﻼﻑ ﺍﳌﺼﻄﻠﺢ ﺍﳌﺴﺘﺨﺪﻡ ﺣﻴﺚ ﻫﻨﺎﻙ ﻣﻦ ﻳﻌﺮﻓﻬﺎ ﺑﺄ‪‬ﺎ "‬
‫ﺍﻻﺳﺘﺨﺪﺍﻡ ﺍﻟﻐﲑ ﻣﺼﺮﺡ ﺑﻪ ﻷﻧﻈﻤﺔ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﺍﶈﻤﻴﺔ ﺃﻭ ﻣﻠﻔﺎﺕ ﺍﻟﺒﻴﺎﻧﺎﺕ ﺃﻭ ﺍﻻﺳﺘﺨﺪﺍﻡ ﺍﳌﺘﻌﻤﺪ ﺍﻟﻀﺎﺭ ﻷﺟﻬﺰﺓ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﺃﻭ‬
‫ﻣﻠﻔﺎﺕ ﺍﻟﺒﻴﺎﻧﺎﺕ "‪. 1‬‬
‫ﻳﺘﻨﺎﻭﻝ ﻫﺬﺍ ﺍﻟﺘﻌﺮﻳﻒ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﺣﻴﺚ ﺷﻜﻞ ﻭﺍﺣﺪ ﺁﻻ ﻭ ﻫﻲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺮﺗﺒﻄﺔ ﺑﺎﻟﻜﻤﺒﻴﻮﺗﺮ ﺃﻱ ﺍﻟﺘﺰﻭﻳﺮ ﻭ‬
‫ﺍﻻﺣﺘﻴﺎﻝ‪ .‬ﻛﻤﺎ ﺃﻥ ﺗﻨﺎﻭﻝ ﺗﻌﺮﻳﻒ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﳚﻌﻠﻨﺎ ﻧﻄﺮﻕ ﺇﱃ ﺗﻌﺮﻳﻒ ‪ Don.Parker‬ﻭ ﺍﻟﺬﻱ ﺍﻋﺘﻤﺪ ﻣﻦ ﻃﺮﻑ‬
‫ﻭﺯﺍﺭﺓ ﺍﻟﻌﺪﻝ ﺍﻷﻣﺮﻳﻜﻴﺔ ‪ ،‬ﻭﻫﻮ ﻳﻌﺘﱪ ﺃﻭﻝ ﺗﻌﺮﻳﻒ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺣﻴﺚ ﻋﺮﻓﻬﺎ ﺑﺄ‪‬ﺎ " ﻛﻞ ﻋﻤﻞ ﻳﺘﻄﻠﺐ ﺗﻜﻮﻳﻦ ﺃﺳﺎﺳﻲ‬

‫‪ 1‬ﺣﺪﻱ ﻧﺴﻴﻤﺔ‪ :‬ﺟﺮﺍﺋﻢ ﺍﳌﺴﺎﺱ ﺑﺄﻧﻈﻤﺔ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ‪ ،‬ﻣﺬﻛﺮﺓ ﻟﻨﻴﻞ ﺷﻬﺎﺩﺓ ﺍﳌﺎﺟﺴﺘﲑ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﻨﺎﺋﻲ‪ ،‬ﻛﻠﻴﺔ ﺍﳊﻘﻮﻕ‪ ،‬ﺟﺎﻣﻌﺔ‬
‫ﻭﻫﺮﺍﻥ‪ ،‬ﺍﳉﺰﺍﺋﺮ‪ ،2014/2013 ،‬ﺹ ‪8‬‬
‫‪50‬‬
‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ‬

‫ﻟﻺﻋﻼﻡ ﺍﻵﱄ ﺃﻭ ﺍﻟﻘﻴﺎﻡ ﺑﺘﺤﻀﲑ ﺑﺮﻧﺎﻣﺞ "ﺧﱪﺍﺀ ﺍﻟﺴﺮﻗﺔ ﺃﻭ ﻣﻦ ﺍﺟﻞ ﻣﺘﺎﺑﻌﺔ ﻋﻘﻮﺑﺔ‪ .1‬ﻣﻦ ﺧﻼﻝ ﻫﺬﺍ ﺍﻟﺘﻌﺮﻳﻒ ﻧﺴﺘﻨﺘﺞ ﺃﻥ‬
‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﺮﺗﺒﻄﺔ ﲜﻬﺎﺯ ﺍﻹﻋﻼﻡ ﺍﻵﱄ ﻭ ﻣﻠﺤﻘﺎﺗﻪ‪.‬‬
‫ﻭﻋﺮﻓﻬﺎ ‪ Tiedement‬ﺑﺄ‪‬ﺎ " ﻛﻞ ﺃﺷﻜﺎﻝ ﺍﻟﺴﻠﻮﻙ ﻏﲑ ﺍﳌﺸﺮﻭﻉ ﺍﻟﺬﻱ ﻳﺮﺗﻜﺐ ﺑﺎﺳﺘﺨﺪﺍﻡ ﺍﳊﺎﺳﻮﺏ"‪ .‬ﱂ‬
‫ﳛﺪﺩ ﻫﺬﺍ ﺍﻟﺘﻌﺮﻳﻒ ﺃﻧﻮﺍﻉ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭ ﻋﱪ ﻋﻨﻬﺎ ﲜﻤﻴﻊ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱵ ﺗﺮﺗﻜﺐ ﺑﺎﺳﺘﺨﺪﺍﻡ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ‪ .‬ﻭﻳﻌﺮﻓﻬﺎ ﺍﻟﻔﻘﻴﻪ‬
‫‪Marw‬ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠﻰ ﺃ‪‬ﺎ "ﺍﻟﻔﻌﻞ ﺍﻟﻐﲑ ﻣﺸﺮﻭﻉ ﺍﻟﺬﻱ ﻳﺘﻮﺭﻁ ﰲ ﺍﺭﺗﻜﺎﺑﻪ ﺍﳊﺎﺳﺐ ﺍﻵﱄ"‪.2‬‬
‫ﻣﻦ ﺧﻼﻝ ﻫﺬﺍ ﺍﻟﺘﻌﺮﻳﻒ ﻧﺴﺘﻨﺘﺞ ﺃﻥ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﺮﺗﺒﻄﺔ ﲜﻬﺎﺯ ﺍﻹﻋﻼﻡ ﺍﻵﱄ ﺣﻴﺚ ﻫﻮ ﺍﻟﺴﺒﺐ ﺍﻟﺮﺋﻴﺴﻲ‬
‫ﻟﻮﺟﻮﺩﻫﺎ‪ .‬ﻣﻊ ﺍﻟﻌﻠﻢ ﺃﻥ ﺍﻟﺘﻌﺎﺭﻳﻒ ﺍﻟﺴﺎﺑﻘﺔ ﺗﻨﺎﻭﻟﺖ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻣﻦ ﺟﺎﻧﺐ ﺿﻴﻖ ‪ ،‬ﺃﻣﺎ ﺃﻧﺼﺎﺭ ﺩﻋﺎﺓ ﺍﻟﺘﻮﺳﻊ ﻓﻴﻌﺮﻓﻮﻥ‬
‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﺄ‪‬ﺎ ﺳﻠﻮﻙ ﺇﺟﺮﺍﻣﻲ ﻳﺘﻢ ﲟﺴﺎﻋﺪﺓ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﺃﻭ ﻫﻲ ﻛﻞ ﺟﺮﳝﺔ ﺗﺘﻢ ﰲ ﳏﻴﻂ ﺃﺟﻬﺰﺓ ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﻭ ﻣﻦ‬
‫ﺃﻧﺼﺎﺭ ﻫﺬﺍ ﺍﻻﲡﺎﻩ ﻧﺬﻛﺮ ‪Michel &Credo‬‬
‫ﻭ ﻣﻦ ﺧﻼﻝ ﻫﺬﻩ ﺍﻟﺘﻌﺎﺭﻳﻒ ﻧﺴﺘﻄﻊ ﺃﻥ ﻧﻘﻮﻝ ﺑﺄﻧﻪ ﺗﻌﺮﻑ ﺍﳉﺮﳝﺔ ﻋﻠﻰ ﺃﺳﺎﺱ ﻭﺳﻴﻠﺔ ﺍﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﺃﻭ‬
‫ﻣﻮﺿﻮﻉ ﺍﳉﺮﳝﺔ ﺃﻭ ﻭﺟﻮﺏ ﺇﳌﺎﻡ ﺍﻟﻔﺎﻋﻞ ﺑﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ‪.‬‬
‫‪ -2-2‬ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ ﻛﻠﻤﺔ ﺷﺎﻉ ﺍﺳﺘﺨﺪﺍﻣﻬﺎ ﻣﻨﺬ ﺍﳋﻤﺴﻴﻨﺎﺕ ﻣﻦ ﺍﻟﻘﺮﻥ ﺍﳌﺎﺿﻲ ﰲ ﳎﺎﻻﺕ ﳐﺘﻠﻔﺔ ﻭﺳﻴﺎﻗﺎﺕ ﺷﱴ‪ ،‬ﳑﺎ ﺟﻌﻞ ﳍﺎ ﺍﻻﺳﺘﻌﻤﺎﻝ‬
‫ﺍﻟﺪﺍﺭﺝ ﻣﻔﺎﻫﻴﻢ ﻣﺘﻨﻮﻋﺔ ﻭﻣﺘﻌﺪﺩﺓ ﻭﻫﻲ ﻛﻤﻦ ﺣﻴﺚ ﺍﻟﻠﻐﺔ ﻣﺸﺘﻘﺔ ﻣﻦ ﻛﻠﻤﺔ ﻋﻠﻢ ﻭﺩﻻﻟﺘﻬﺎ ﻓﻴﻬﺎ ﺗﺪﻭﺭ ﺑﻮﺟﻪ ﻋﺎﻡ ﺣﻮﻝ ﺍﳌﻌﺮﻓﺔ ﺍﻟﱵ ﳝﻜﻦ ﻧﻘﻠﻬﺎ‬
‫ﻭﺍﻛﺘﺴﺎ‪‬ﺎ ﻭﺗﺘﻤﻴﺰ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﻌﺪﺓ ﺧﺼﺎﺋﺺ ﲤﻴﺰﻫﺎ ﻋﻦ ﺑﺎﻗﻲ ﺍﳉﺮﺍﺋﻢ ﻭ ﺍﳌﺘﻤﺜﻠﺔ ﰲ‪:3‬‬
‫‪-1 -2-2‬ﺍﳌﻌﻠﻮﻣﺎﺕ ﳍﺎ ﻃﺒﻴﻌﺔ ﻣﻦ ﻧﻮﻉ ﺧﺎﺹ‪ :‬ﻳﺮﻯ ﺍﻟﻔﻘﻪ ﺍﻟﺘﻘﻠﻴﺪﻱ ﺃﻥ ﺍﳌﻌﻠﻮﻣﺔ ﳍﺎ ﻃﺒﻴﻌﺔ ﻣﻦ ﻧﻮﻉ ﺧﺎﺹ‪ ،‬ﻭﺫﻟﻚ‬
‫ﺍﻧﻄﻼﻗﺎ ﻣﻦ ﺣﻘﻴﻘﺔ ﺃﻥ ﻭﺻﻒ ﺍﻟﻘﻴﻤﺔ ﻳﻀﻔﻲ ﻋﻠﻰ ﺍﻷﺷﻴﺎﺀ ﺍﳌﺎﺩﻳﺔ ﻭﺣﺪﻫﺎ ﻭﻫﻲ ﺍﻟﻘﻴﻢ ﺍﻟﱵ ﺗﻘﺒﻞ ﺍﻻﺳﺘﺤﻮﺍﺫ ﻭﺍﻻﺳﺘﺌﺜﺎﺭ‬
‫ﻭﺑﺎﻟﻨﻈﺮ ﻟﻠﻤﻌﻠﻮﻣﺎﺕ ﻛﻄﺒﻴﻌﺔ ﻣﻌﻨﻮﻳﺔ ﻓﺈﻧﻪ ﻣﻦ ﻏﲑ ﺍﳌﻌﻘﻮﻝ ﺃﻥ ﺗﻜﻮﻥ ﻗﺎﺑﻠﺔ ﻟﻼﺳﺘﺤﻮﺍﺫ ﻭﻓﻘﺎ ﳍﺬﺍ ﺍﳌﻨﻬﺞ ﺇﻻ ﰲ ﺿﻮﺀ ﺣﻘﻮﻕ‬
‫ﺍﳌﻠﻜﻴﺔ ﺍﻟﻔﻜﺮﻳﺔ‪.‬‬
‫ﺇﺫﻥ ﻓﻜﻞ ﻣﻌﻠﻮﻣﺔ ﳐﺰﻧﺔ ﻻ ﺗﻨﺘﻤﻲ ﺇﱃ ﺍﳌﻮﺍﺩ ﺍﻷﺩﺑﻴﺔ ﺃﻭ ﺍﻟﺼﻨﺎﻋﻴﺔ ﺃﻭ ﺍﻟﺬﻫﻨﻴﺔ ﻻ ﺗﻨﺪﺭﺝ ﺿﻤﻦ ﺍﻟﻘﻴﻢ ﺍﶈﻤﻴﺔ‪ ،‬ﻏﲑ ﺃﻥ‬
‫ﺍﻟﻘﻮﻝ ﺑﺬﻟﻚ ﻳﻨﻔﻲ ﻣﻮﻗﻒ ﺍﻟﻔﻘﻪ ﻭﺍﻟﻘﻀﺎﺀ ﺍﻟﻠﺬﺍﻥ ﻳﻌﺘﺮﻓﺎﻥ ﺑﻮﺟﻮﺩ ﺍﻋﺘﺪﺍﺀ ﳚﺐ ﺍﻟﻌﻘﺎﺏ ﻋﻠﻴﻪ ﻋﻨﺪ ﺍﻻﺳﺘﻴﻼﺀ ﻏﲑ ﺍﳌﺸﺮﻭﻉ ﻋﻠﻰ‬
‫ﻣﻌﻠﻮﻣﺎﺕ ﺍﻟﻐﲑ ﻟﺬﻟﻚ ﺗﻌﺪﺩﺕ ﻭﺟﻬﺎﺕ ﻧﻈﺮ ﺍﻟﻔﻘﻬﺎﺀ ﺣﻮﻝ ﺗﱪﻳﺮ ﺍﻟﻌﻘﺎﺏ ﺍﻟﺬﻱ ﳝﻜﻦ ﺃﻥ ﻳﺘﺮﺗﺐ ﻋﻠﻰ ﺍﻻﻋﺘﺪﺍﺀ ﻋﻠﻰ‬
‫ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﻐﲑ‪.‬‬

‫‪1‬‬
‫‪Liang jianshez : griminalité informatique, rapport de stage de l’informatique, école national‬‬
‫‪des l’informatiques et des bibiotheque, France, 1999, p20.‬‬
‫‪2‬ﺧﺎﻟﺪ ﳑﺪﻭﺡ ﺇﺑﺮﺍﻫﻴﻢ‪ :‬ﺃﻣﻦ ﺍﳉﺮﳝﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﺍﻟﺪﺍﺭ ﺍﳉﺎﻣﻌﻴﺔ‪ ،‬ﻣﺼﺮ‪2008 ،‬ﺹ ‪42‬‬
‫‪3‬ﻫﻼﱄ ﻋﺒﺪ ﺍﻹﻟﻪ ﺃﲪﺪ‪ :‬ﺍﻟﺘﺰﺍﻡ ﺍﻟﺸﺎﻫﺪ ﻭﺍﻹﻋﻼﻡ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺩﺭﺍﺳﺔ ﻣﻘﺎﺭﻧﺔ‪ ،‬ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ‪ ،‬ﻣﺼﺮ‪ ،.1997 ،‬ﺹ‪3‬‬
‫‪51‬‬
‫ﻓﺘﻴﺤﺔ ﺑﻮﻫﺮﻳﻦ‬

‫‪ -2-2-2‬ﺍﳌﻌﻠﻮﻣﺎﺕ ﳎﻤﻮﻋﺔ ﻣﺴﺘﺤﺪﺛﺔ ﻣﻦ ﺍﻟﻘﻴﻢ‪ :‬ﻳﺮﻯ ﻫﺬﺍ ﺍﻻﲡﺎﻩ ﺍﳊﺪﻳﺚ ﺃﻥ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻣﺎ ﻫﻲ ﺇﻻ ﳎﻤﻮﻋﺔ‬
‫ﻣﺴﺘﺤﺪﺛﺔ ﻣﻦ ﺍﻟﻘﻴﻢ ﻭﻳﻌﻮﺩ ﺍﻟﻔﻀﻞ ﰲ ﺫﻟﻚ ﻟﻸﺳﺘﺎﺫﻳﻦ ‪ Vivant‬ﻭ ‪ Catala‬ﺇﺫ ﻳﺮﻯ ﻫﺬﺍ ﺍﻷﺧﲑ ﺃﻥ ﺍﳌﻌﻠﻮﻣﺔ ﺍﳌﺴﺘﻘﻠﺔ ﻋﻦ‬
‫ﺩﻋﺎﻣﺘﻬﺎ ﺍﳌﺎﺩﻳﺔ ﺗﻜﻮﻥ ﳍﺎ ﻗﻴﻤﺔ ﻗﺎﺑﻠﺔ ﻟﻼﺳﺘﺤﻮﺍﺫ ﻭﺫﻟﻚ ﻷ‪‬ﺎ ﺗﻘﻮﻡ ﻭﻓﻘﺎ ﻟﺴﻌﺮ ﺍﻟﺴﻮﻕ ﻣﱴ ﻛﺎﻧﺖ ﻏﲑ ﳏﻈﻮﺭﺓ ﲡﺎﺭﻳﺎ ﻛﻤﺎ‬
‫ﻭﺃ‪‬ﺎ ﻣﻨﺘﺞ ﺑﺼﺮﻑ ﺍﻟﻨﻈﺮ ﻋﻦ ﺩﻋﺎﻣﺘﻬﺎ ﺍﳌﺎﺩﻳﺔ ﻭﻋﻦ ﻋﻤﻞ ﻣﺎ ﻗﺪﻣﻬﺎ ﻭﺇ‪‬ﺎ ﺗﺮﺗﺒﻂ ﲟﺆﻟﻔﻬﺎ ﻋﻦ ﻃﺮﻳﻖ ﻋﻼﻗﺔ ﻗﺎﻧﻮﻧﻴﺔ ﺗﺘﻤﺜﻞ ﰲ‬
‫ﻋﻼﻗﺔ ﺍﳌﺎﻟﻚ ﺑﺎﻟﺸﻲﺀ ﺍﻟﺬﻱ ﳝﻠﻜﻪ‪ ،‬ﻭﻫﻲ ﲣﺺ ﻣﺆﻟﻔﻬﺎ ﺑﺴﺒﺐ ﻋﻼﻗﺔ ﺍﻟﺘﺒﲏ ﺍﻟﱵ ﲡﻤﻊ ﺑﻴﻨﻬﻤﺎ‪ ،‬ﻭﻳﻼﺣﻆ ﺃﻧﻪ ﺍﻋﺘﻤﺪ ﻋﻠﻰ‬
‫ﺣﺠﺘﲔ ﰲ ﺫﻟﻚ ﻹﻋﻄﺎﺀ ﻭﺻﻒ ﺍﻟﻘﻴﻤﺔ ﻋﻠﻰ ﺍﳌﻌﻠﻮﻣﺔ‪:‬‬
‫‪ ‬ﺍﻟﻘﻴﻤﺔ ﺍﻻﻗﺘﺼﺎﺩﻳﺔ‬
‫‪ ‬ﻋﻼﻗﺔ ﺍﻟﺘﺒﲏ ﺍﻟﱵ ﲡﻤﻊ ﺑﻴﻨﻬﺎ ﻭ ﺑﲔ ﻣﺆﻟﻔﻬﺎ‪.‬‬
‫‪ ‬ﺃﻃﺮﺍﻑ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭ ﺧﺼﺎﺋﺼﻬﺎ‪:‬‬
‫‪ -1 -3- 2‬ﺃﻃﺮﺍﻑ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬‬
‫ﻳﺸﺘﺮﻙ ﰲ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﺪﺓ ﺃﺷﺨﺎﺹ ﻗﺪ ﻳﻜﻮﻧﻮﻥ ﻣﻮﻇﻔﲔ ﰲ ﻣﺆﺳﺴﺔ ﺃﻭ ﺗﻘﻨﻴﲔ ﻫﺬﺍ ﺑﺎﻟﻨﺴﺒﺔ ﺇﱃ ﺍﳉﻨﺎﺓ ﺃﻣﺎ‬
‫ﺑﺎﻟﻨﺴﺒﺔ ﺇﱃ ﺍ‪‬ﲏ ﻋﻠﻴﻬﻢ ﻓﺘﺨﺘﻠﻒ ﺭﺩﻭﺩ ﺃﻓﻌﺎﳍﻢ ﻋﻤﺎ ﻳﻔﻌﻞ ﺍ‪‬ﲏ ﻋﻠﻴﻬﻢ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﻟﻌﺎﺩﻳﺔ‪ .‬ﻭﺳﻨﻮﺿﺢ ﰲ ﻫﺬﺍ ﺍﳉﺰﺀ ﻣﻦ‬
‫ﺍﻟﺪﺭﺍﺳﺔ ﺗﻠﻚ ﺍﻷﻃﺮﺍﻑ‪.‬‬
‫ﺃ‪ -‬ﺍﳉـﺎﱐ‪ :‬ﲟﺎ ﺃﻥ ﺍ‪‬ﺮﻡ ﺃﳌﻌﻠﻮﻣﺎﰐ ﻳﺮﺗﻜﺐ ﺟﺮﺍﺋﻤﻪ ﻭﻫﻮ ﳝﺎﺭﺱ ﻭﻇﻴﻔﺘﻪ ﰲ ﳎﺎﻝ ﺍﻷﺟﻬﺰﺓ ﺍﻵﻟﻴﺔ ﻓﻼﺑﺪ ﺃﻥ ﻳﻜﻮﻥ ﺇﻧﺴﺎﻧﺎ‬
‫ﺍﺟﺘﻤﺎﻋﻴﺎ ﻭﺳﻂ ﺍ‪‬ﺘﻤﻊ ﻳﻘﻮﻡ ﺑﻮﺍﺟﺒﺎﺗﻪ ﻭﳝﺎﺭﺱ ﺣﻘﻮﻗﻪ ﺩﻭﻥ ﻭﺟﻮﺩ ﺃﻱ ﻋﺎﺋﻖ ﻣﻦ ﺟﻬﺔ‪ ،‬ﻭ ﺇﻧﺴﺎﻧﺎ ﳏﺘﺮﻓﺎ ﻳﺘﻤﺘﻊ ﺑﺬﻛﺎﺀ ﻛﺒﲑ‬
‫ﻣﻦ ﺟﻬﺔ ﺃﺧﺮﻯ‪ .‬ﻭ ﻋﻠﻴﻪ ﳝﻜﻨﻨﺎ ﺗﺼﻨﻴﻒ ﺟﻨﺎﺓ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺇﱃ ﻋﺪﺓ ﺃﺻﻨﺎﻑ ﻳﻮﺿﺤﻬﺎ ﻟﻨﺎ ﺍﳉﺪﻭﻝ ﺍﳌﻮﺍﱄ‪:‬‬
‫ﺍﳉﺪﻭﻝ ﺭﻗﻢ ‪: 01‬ﺃﻧﻮﺍﻉ ﺟﻨﺎﺓ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﺍﳋﺼﺎﺋﺺ‬ ‫ﻧﻮﻉ ﺍﳉﺎﱐ‬
‫ﻋﺪﻡ ﻭﺟﻮﺩ ﻧﻴﺔ ﺃﻭ ﻗﺼﺪ ﻹﺗﻼﻑ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺃﻭ ﲣﺮﻳﺐ ﺃﻧﻈﻤﺔ ﺍﳊﺎﺳﺐ ﻭﺷﺒﻜﺎﺕ‬ ‫ﺍﻟﻘﺮﺍﺻﻨﺔ ) ‪(Hackers‬‬
‫ﺍﻻﺗﺼﺎﻝ‪.‬ﻳﺘﻤﺜﻞ ﻫﺪﻓﻬﻢ ﰲ ﺍﻻﺳﺘﻜﺸﺎﻑ ﻭﺍﻟﺒﺤﺚ ﻋﻦ ﺍﳉﺪﻳﺪ ﰲ ﻫﺬﺍ ﺍﻟﻌﺎﱂ ﺍﳋﻴﺎﱄ‪.‬‬
‫ﺃﺷﺨﺎﺹ ﻫﺪﻓﻬﻢ ﺇﳊﺎﻕ ﺧﺴﺎﺋﺮ ﺑﺎ‪‬ﲏ ﻋﻠﻴﻬﻢ ﺩﻭﻥ ﺃﻥ ﻳﻜﻮﻥ ﺍﳊﺼﻮﻝ ﻋﻠﻰ ﻣﻜﺎﺳﺐ‬ ‫ﺍﻟﻘﺮﺍﺻﻨﺔ ﺍﳋﺒﻴﺜﻮﻥ )‪(Crackers‬‬
‫ﻣﺎﻟﻴﺔ ﻣﻦ ﺿﻤﻦ ﻫﺬﻩ ﺍﻷﻫﺪﺍﻑ‬
‫ﺍﻷﺷﺨﺎﺹ ﺍﻟﺬﻳﻦ ﻳﺮﺗﻜﺒﻮﻥ ﺟﺮﺍﺋﻢ‪ :‬ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺑﻐﺮﺽ ﺍﻟﺘﺴﻠﻴﺔ ﻭﺍﳌﺰﺍﺡ ﻣﻊ ﺍﻵﺧﺮﻳﻦ‪،‬‬ ‫ﺍﳌﺨﺎﺩﻋﻮﻥ) ‪(Pranksters‬‬
‫ﺑﺪﻭﻥ ﺃﻥ ﻳﻜﻮﻥ ﰲ ﻧﻴﺘﻬﻢ ﺇﺣﺪﺍﺙ ﺃﻱ ﺿﺮﺭ ﺑﺎ‪‬ﲏ ﻋﻠﻴﻬﻢ‬
‫ﳝﺘﺎﺯﻭﻥ ﺑﻨﻔﺲ ﺍﻟﺴﻤﺎﺕ ﺍﻟﱵ ﻳﺘﻤﻴﺰ ‪‬ﺎ ﺍ‪‬ﺮﻡ ﺍﻟﺘﻘﻠﻴﺪﻱ‪ ،‬ﻫﺪﻓﻬﻢ ﲢﻘﻴﻖ ﺍﻟﺮﺑﺢ ﺑﻄﺮﻳﻘﺔ‬ ‫ﺍ‪‬ﺮﻣﻮﻥ ﺍﳌﻮﻇﻔﻮﻥ ) ‪Career‬‬
‫ﻏﲑ ﺷﺮﻋﻴﺔ‪.‬‬ ‫‪(Criminals‬‬
‫ﻭﺍﻟﱵ ﺗﻀﻢ ﻭﺍﺣﺪﺓ ﻣﻦ ﺃﻫﻢ ﺍﳌﺸﻜﻼﺕ ﺍﻟﱵ ﺗﺘﺼﻞ ﺑﺈﺳﺎﺀﺓ ﺍﺳﺘﺨﺪﺍﻡ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ‪،‬‬ ‫ﺍﳌﻘﺼﺮﻭﻥ ﺟﻨﺎﺋﻴﺎ‬
‫ﺃﻻ ﻭﻫﻲ ﺍﻹﳘﺎﻝ ﺍﻟﺬﻱ ﻳﺘﺮﺗﺐ ﻋﻠﻴﻪ ﰲ ﳎﺎﻝ ﺍﳊﺎﺳﺒﺎﺕ ﺍﻵﻟﻴﺔ ﰲ ﺃﻏﻠﺐ ﺍﻷﺣﻴﺎﻥ ﻧﺘﺎﺋﺞ‬ ‫‪The Criminally Negligence‬‬

‫ﺧﻄﲑﺓ ﻗﺪ ﺗﺼﻞ ﺇﱃ ﺣﺪ ﺇﺯﻫﺎﻕ ﺍﻟﺮﻭﺡ‪،‬‬


‫ﺍﳌﺼﺪﺭ‪ :‬ﻣﻦ ﺇﻋﺪﺍﺩ ﺍﻟﺒﺎﺣﺜﺔ ﺑﺎﻻﻋﺘﻤﺎﺩ ﻋﻠﻰ‪:‬‬

‫‪52‬‬
‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ‬

‫ﻳﺎﲰﻴﻨﺔ ﺑﻮﻧﻌﺎﺭﺓ‪ :‬ﺍﳉﺮﳝﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ )ﻋﻠﻰ ﺍﳋﻂ( ‪http://www.univ-emir.dz/download/madjala-‬‬


‫‪ oussoul/39bounara-yasmina.pdf.‬ﺗﺎﺭﻳﺦ ﺍﻻﻃﻼﻉ ‪2018/9/15‬‬

‫ﻭﻳﺘﻤﻴﺰ ﺍ‪‬ﺮﻡ ﺃﳌﻌﻠﻮﻣﺎﰐ ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺫﻟﻚ ﲟﺠﻤﻮﻋﺔ ﻣﻦ ﺍﳋﺼﺎﺋﺺ ﺍﻟﱵ ﲤﻴﺰﻩ ﺑﺼﻔﺔ ﻋﺎﻣﺔ ﻋﻦ ﻏﲑﻩ ﻣﻦ ﺍ‪‬ﺮﻣﲔ ﻭ ﻳﺮﻣﺰ‬
‫ﳍﺎ ﺍﻷﺳﺘﺎﺫ ‪ Parker‬ﺑﻜﻠﻤﺔ ‪ S.K.R.A.M‬ﻭ ﻫﻲ ﺗﻌﲏ‪:1‬‬

‫‪ : S‬ﺍﳌﻬﺎﺭﺓ ‪Skills‬‬

‫‪ : K‬ﺍﳌﻌﺮﻓﺔ ‪Knowledge‬‬
‫‪S.K.R.A.M‬‬
‫‪.M‬‬
‫‪ : .R‬ﺍﻟﻮﺳﻴﻠﺔ ‪Resources‬‬

‫‪ : .A‬ﺍﻟﺴﻠﻄﺔ ‪Anthority‬‬

‫‪ : .M‬ﺍﻟﺒﺎﻋﺚ ‪Motives‬‬

‫ﺍ‪‬ﲏ ﻋﻠﻴﻪ ) ﺿﺤﺎﻳﺎ ﺍﻹﺟﺮﺍﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ( ‪:‬ﳝﻜﻦ ﺍﻟﻘﻮﻝ ﺃﻧﻪ ﺗﺮﺗﺐ ﻋﻠﻰ ﺩﻳﻮﻥ ﺍﳌﻌﺎﺭﻑ ﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎ ﻧﺘﻴﺠﺔ ﻟﺜﻮﺭﺓ‬ ‫ﺏ‪-‬‬
‫ﺍﻟﺘﻘﻨﻴﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﻧﺘﺸﺎﺭ ﺍﻟﻮﺳﺎﺋﻞ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﲨﻴﻊ ﺍﻷﻧﺸﻄﺔ ﺍﻟﱵ ﺗﺰﺍﻭﻝ ﰲ ﺍ‪‬ﺘﻤﻌﺎﺕ ﺍﳊﺪﻳﺜﺔ ﺳﻮﺍﺀ ﺗﻌﻠﻘﺖ ﻫﺬﻩ ﺍﻟﻮﺳﺎﺋﻞ‬
‫ﺑﺎﻷﻧﺸﻄﺔ ﺍﻻﻗﺘﺼﺎﺩﻳﺔ ﺃﻭ ﺍﻻﺟﺘﻤﺎﻋﻴﺔ ﺃﻭ ﺍﻟﻌﺴﻜﺮﻳﺔ ﺃﻭ ﺍﳌﺆﺳﺴﺎﺕ ﺍﳌﺎﻟﻴﺔ ﻭﺍﻟﺘﺠﺎﺭﻳﺔ ﰲ ﺍﻟﺪﻭﻟﺔ‪.‬‬
‫ﻭﳌﺎ ﻛﺎﻧﺖ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺗﻨﺼﺐ ﺃﺳﺎﺳﺎ ﻋﻠﻰ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﻟﱵ ﺃﺻﺒﺤﺖ ﺍﻵﻥ ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻟﻘﻴﻢ ﺍﳌﺴﺘﺨﺪﻣﺔ ﻓﻴﻤﻜﻦ‬
‫ﺗﺼﻮﺭ ﻭﻗﻮﻉ ﺍﻋﺘﺪﺍﺀ ﰲ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻋﻠﻰ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺳﻮﺍﺀ ﻋﻦ ﻃﺮﻳﻖ ﺑﻴﻌﻬﺎ ﺃﻭ ﻣﻘﺎﻳﻀﺘﻬﺎ ﺃﻭ ﺇﺗﻼﻓﻬﺎ‬

‫‪ - 2-3-2‬ﺍﳋﺼﺎﺋﺺ ﺍﻟﻌﺎﻣﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬‬


‫ﳑﺎ ﻻﺷﻚ ﻓﻴﻪ ﺃﻥ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﲣﺘﻠﻒ ﻋﻦ ﺍﳉﺮﺍﺋﻢ ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﻣﻦ ﻧﺎﺣﻴﺔ ﺍﻷﻓﻌﺎﻝ ﺍﻹﺟﺮﺍﻣﻴﺔ ﻭﻣﻦ ﰎ ﻟﻴﺲ ﻣﻦ ﺍﳌﺴﺘﻐﺮﺏ‬
‫ﺃﻥ ﲣﺘﻠﻒ ﻋﻨﻬﺎ ﰲ ﺑﻌﺾ ﺍﻟﺼﻔﺎﺕ ﺍﻟﱵ ﲤﻴﺰﻫﺎ ﻋﻦ ﻏﲑﻫﺎ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﲞﻼﻑ ﺍﻟﺼﻔﺎﺕ ﺍﻟﱵ ﺗﻄﺎﺑﻖ ﺻﻔﺎﺕ ﺍﳉﺮﺍﺋﻢ ﺍﻷﺧﺮﻯ‪:2‬‬

‫‪1‬‬
‫‪PARKER Donn: finding computer crime a new frame work for protecting‬‬
‫‪information, wetly, Canada, 1998,p114‬‬
‫‪2‬ﳏﻤﺪ ﺳﺎﻣﻲ ﺍﻟﺸﻮﺍ ‪ :‬ﺛﻮﺭﺓ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﻧﻌﻜﺎﺳﺎ‪‬ﺎ ﻋﻠﻰ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ‪ ،‬ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ‪ ،‬ﺍﻟﻄﺒﻌﺔ ﺍﻟﺜﺎﻧﻴﺔ‪ ،‬ﻣﺼﺮ‪ ،‬ﺏ‪.‬ﺱ‪.‬ﻁ ‪،‬‬
‫ﺹ‪60-58‬‬
‫‪53‬‬
‫ﻓﺘﻴﺤﺔ ﺑﻮﻫﺮﻳﻦ‬

‫‪ -1-2-3-2‬ﳏـﻞ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬‬


‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻻ ﺗﻘﻊ ﻋﻠﻰ ﺟﻬﺎﺯ ﺍﳊﺎﺳﺐ ﺍﻵﱄ ﻭﺇﳕﺎ ﺗﻘﻊ ﰲ ﺍﻷﺻﻞ ﺿﺪ ﺃﺣﺪ ﻣﻜﻮﻧﺎﺕ ﺍﻟﻨﻈﺎﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻭﻗﺪ ﺗﻘﻊ ﺃﻳﻀﺎ‬
‫ﻣﻦ ﺧﻼﻝ ﺍﺳﺘﻐﻼﻝ ﻫﺬﺍ ﺍﻟﻨﻈﺎﻡ ﻭﻏﺎﻟﺒﺎ ﻣﺎ ﻳﻜﻮﻥ ﻫﺪﻑ ﺍﳉﺎﱐ ﻫﻮ ﺍﻟﺮﻏﺒﺔ ﰲ ﺇﺩﺧﺎﻝ ﺗﻌﺪﻳﻞ ﻋﻠﻰ ﻋﻨﺎﺻﺮ ﺍﻟﺬﻣﺔ ﺍﳌﺎﻟﻴﺔ ﺃﺛﻨﺎﺀ‬
‫ﻣﺮﺍﺣﻞ ﺍﻟﺘﺸﻐﻴﻞ ﺇﺩﺧﺎﻻ ﺃﻭ ﻣﻌﺎﳉﺔ ﻭﺇﺧﺮﺍﺟﺎ‪.‬‬
‫‪ -2-2-3-2‬ﺍﻟﺪﻭﺍﻓﻊ ﺍﻟﺮﺋﻴﺴﻴﺔ ﻻﺭﺗﻜﺎﺏ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪:‬‬
‫ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﺪﺓ ﺩﻭﺍﻓﻊ ﻻﺭﺗﻜﺎ‪‬ﺎ ﻓﺒﻌﻀﻬﺎ ﻳﺮﺟﻊ ﺇﱃ ﺩﺍﻓﻊ ﺷﺨﺼﻲ ﻭﻣﻨﻬﺎ ﻣﺎ ﻳﺮﺟﻊ ﺇﱃ ﺩﺍﻓﻊ ﺧﺎﺭﺟﻲ ﻭﻣﻨﻬﺎ ﻣﺎ‬
‫ﻳﻜﻮﻥ ﺧﺎﺹ ﺑﺎﳌﻨﺸﺄﺓ ﻭﻛﻞ ﻫﺬﻩ ﺍﻟﺪﻭﺍﻓﻊ ﻗﺪ ﻳﻜﻮﻥ ﻣﺼﺪﺭﻫﺎ ﻫﻮ ﺍﻟﺮﻏﺒﺔ ﺍﻹﺟﺮﺍﻣﻴﺔ ﻭ ﺳﻨﺘﻌﺮﺽ ﻟﺬﻟﻚ ﻣﻦ ﺧﻼﻝ ‪ 3‬ﻋﻨﺎﺻﺮ‬
‫ﻫﻲ‪:‬‬

‫ﺍ‪ -‬ﺍﻟﺪﻭﺍﻓﻊ ﺍﻟﺸﺨﺼﻴﺔ ‪ :‬ﻭ ﳝﻜﻦ ﺭﺩ ﺍﻟﺪﻭﺍﻓﻊ ﺍﻟﺸﺨﺼﻴﺔ ﻟﺪﻯ ﻣﺮﺗﻜﺐ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﱃ ﺩﻭﺍﻓﻊ ﻣﺎﻟﻴﺔ ﻭ ﺩﻭﺍﻓﻊ‬
‫ﺫﻫﻨﻴﺔ ﺃﻭ ﳕﻄﻴﺔ‪.‬‬
‫ﺕ‪-‬ﺍﻟﺪﻭﺍﻓﻊ ﺍﳋﺎﺭﺟﻴﺔ‪ :‬ﰲ ﺑﻌﺾ ﺍﳌﻮﺍﻗﻒ ﻳﺘﺄﺛﺮ ﺍﻹﻧﺴﺎﻥ ﻭ ﻳﺴﺘﺴﻠﻢ ﻟﻠﻤﺆﺛﺮﺍﺕ ﻭﺍﻟﺪﻭﺍﻓﻊ ﺍﳋﺎﺭﺟﻴﺔ ﺑﺎﺭﺗﻜﺎﺑﻪ ﺑﻌﺾ‬
‫ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭ ﺗﺘﻤﺜﻞ ﻫﺬﻩ ﺍﻟﺪﻭﺍﻓﻊ ﻭ ﺍﳌﺆﺛﺮﺍﺕ ﰲ ‪:‬‬

‫‪ ‬ﺩﺍﻓﻊ ﺍﻻﻧﺘﻘﺎﻡ‪ :‬ﻗﺪ ﻳﻜﻮﻥ ﻣﺆﺛﺮﺍ ﰲ ﺍﺭﺗﻜﺎﺏ ﺗﻠﻚ ﺍﳉﺮﳝﺔ ﻛﺄﻥ ﻳﺘﻢ ﻓﺼﻞ ﺍﳉﺎﱐ ﻣﻦ ﻋﻤﻠﻪ ﻓﻴﻌﻤﺪ ﺇﱃ ﺗﺪﻣﲑ ﺍﻟﱪﺍﻣﺞ‬
‫ﻭﺍﻷﻧﻈﻤﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪.‬‬
‫‪ ‬ﺩﺍﻓﻊ ﺟﻨﻮﻥ ﺍﻟﻌﻈﻤﺔ ﺃﻭ ﺍﻟﻄﺒﻴﻌﺔ ﺍﻟﺘﻨﺎﻓﺴﻴﺔ‪ :‬ﻭﻳﻜﻮﻥ ﺫﻟﻚ ﻣﻦ ﺧﻼﻝ ﺍﻟﻌﺎﻣﻠﲔ ﺩﺍﺧﻞ ﺍﳌﻨﺸﺄﺓ ﻹﻇﻬﺎﺭ ﻗﺪﺭﺍ‪‬ﻢ ﺍﻟﻔﻨﻴﺔ‬
‫ﻹﺩﺍﺭﺓ ﺍﳌﻨﺸﺄﺓ ﺣﱴ ﻳﻨﺎﻓﺲ ﺯﻣﻼﺋﻪ ﻟﻠﻮﺻﻮﻝ ﺍﱃ ﺍﳌﺮﺍﻛﺰ ﺍﳌﺮﻣﻮﻗﺔ‬
‫‪ ‬ﺩﺍﻓﻊ ﺍﻟﺘﻌﺎﻭﻥ ﻭﺍﻟﺘﻮﺍﻃﺆ ﻋﻠﻰ ﺍﻷﺿﺮﺍﺭ ‪ :‬ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻛﺜﲑ ﺍﻟﺘﻜﺮﺍﺭ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﻏﺎﻟﺒﺎ ﻣﺎ ﳛﺪﺙ ﻣﻦ‬
‫ﻣﺘﺨﺼﺺ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻳﻘﻮﻡ ﺑﺎﳉﺎﻧﺐ ﺍﻟﻔﲏ ﻣﻦ ﺍﳌﺸﺮﻭﻉ ﻭﺁﺧﺮ ﻣﻦ ﺍﶈﻴﻂ ﺃﻭ ﺧﺎﺭﺝ ﺍﳌﺆﺳﺴﺔ ﺍ‪‬ﲏ ﻋﻠﻴﻬﺎ‬
‫ﻟﺘﻐﻄﻴﺔ ﺍﻟﺘﻼﻋﺐ ﻭﲤﻮﻳﻞ ﺍﳌﻜﺎﺳﺐ ﺍﳌﺎﺩﻳﺔ ﻭﻋﺎﺩﺓ ﻣﺎ ﳝﺎﺭﺳﻮﻥ ﺍﻟﺘﻠﺼﺺ ﻋﻠﻰ ﺍﻷﻧﻈﻤﺔ ‪.‬‬

‫ﺝ‪ -‬ﺍﻟﺪﻭﺍﻓﻊ ﺍﳋﺎﺻﺔ ﺑﺎﳌﺆﺳﺴﺔ‪ :‬ﻣﻦ ﺍﻟﻌﻨﺎﺻﺮ ﺍﳌﺆﺛﺮﺓ ﺍﻟﱵ ﺗﺆﺩﻱ ﺇﱃ ﺯﻳﺎﺩﺓ ﺍﳉﺮﺍﺋﻢ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻟﺪﻯ ﺍﳌﻨﺸﺄﺓ ﺑﻌﺾ‬
‫ﺍﻟﺪﻭﺍﻓﻊ ﺍﻟﱵ ﺗﻜﻮﻥ ﺧﺎﺻﺔ ‪‬ﺎ ﻭﺍﳌﺘﻤﺜﻠﺔ ﻟﺪﻯ ﺍﻟﺸﺨﺺ ﺍﳌﺴﺌﻮﻝ ﻋﻦ ﺍﳌﺮﻛﺰ ﺃﳌﻌﻠﻮﻣﺎﰐ ﺑﺎﳌﺆﺳﺴﺔ ﺣﻴﺚ ﳝﻜﻨﻪ ﻭﺿﻌﻪ ﺍﻟﻮﻇﻴﻔﻲ‬
‫ﻣﻦ ﺍﺳﺘﻐﻼﻝ ﻣﻨﺼﺒﻪ ﺇﺫﺍ ﺷﺎﺀ ﻣﺼﻠﺤﺘﻪ‪ ،‬ﻭﻳﻌﺘﻘﺪ ﺑﻌﺾ ﺍﳌﺘﺨﺼﺼﲔ ﰲ ﺗﻘﻨﻴﺔ ﺍﻷﻧﻈﻤﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺃﻥ ﻣﻦ ﻣﺰﺍﻳﺎ ﻣﺮﺍﻛﺰﻫﻢ‬
‫ﺍﻟﻮﻇﻴﻔﻴﺔ ﻭﻣﻬﺎﺭ‪‬ﻢ ﺍﻟﻔﻨﻴﺔ ﺍﺳﺘﺨﺪﺍﻡ ﺍﻷﻧﻈﻤﺔ ﻭﺑﺮﺍﳎﻬﺎ ﻷﻏﺮﺍﺽ ﺷﺨﺼﻴﺔ ﺃﻭ ﻟﻠﺘﺒﺎﺭﻱ ﺍﻟﻔﻜﺮﻱ ﻓﻴﻤﺎ ﺑﻴﻨﻬﻢ ﺃﻭ ﳑﺎﺭﺳﺔ ﺑﻌﺾ‬

‫‪54‬‬
‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ‬

‫ﺍﳍﻮﺍﻳﺎﺕ ﺍﻟﺪﺍﺋﺮﺓ ﰲ ﻓﻠﻚ ﺍﻟﺘﻘﻨﻴﺔ ﻭﻣﻦ ﺷﻜﻞ ﲤﺎﺩﻱ ﺑﻌﻀﻬﻢ ﺍﱃ ﺍﺳﺘﺨﺪﺍﻡ ﺍﻷﻧﻈﻤﺔ ﺑﺼﻮﺭﺓ ﻏﲑ ﻣﺸﺮﻭﻋﺔ ﺗﺼﻞ ﺍﱃ ﺣﺪ‬
‫ﺍﺭﺗﻜﺎﺏ ﺟﺮﺍﺋﻢ ﺧﻄﲑﺓ ﺑﺎﳌﺆﺳﺴﺔ ﳌﺼﻠﺤﺘﻪ ﺍﳋﺎﺻﺔ‪.‬‬

‫ﻭ ﻣﻦ ﺃﺟﻞ ﳏﺎﺭﺑﺔ ﻫﺬﻩ ﺍﳉﺮﳝﺔ ﻗﺎﻣﺖ ﺍﻟﺪﻭﻝ ﺑﺴﻦ ﺍﺗﻔﺎﻗﻴﺎﺕ ﺩﻭﻟﻴﺔ ﻭ ﺛﻨﺎﺋﻴﺔ ﺑﺎﻹﺿﺎﻓﺔ ﺇﱃ ﺳﻦ ﻧﺼﻮﺹ ﻗﺎﻧﻮﻧﻴﺔ‬
‫ﺿﻤﻦ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﻨﺎﺋﻲ ﺳﻮﺍﺀ ﺍﻟﻌﺎﻡ ﺃﻭ ﺍﳋﺎﺹ ‪‬ﺪﻑ ﻣﻌﺎﻗﺒﺔ ﻛﻞ ﻣﻦ ﻳﺮﺗﻜﺐ ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻭﳔﺺ ﻫﻨﺎ ﺍﳉﺰﺍﺋﺮ ﻭ ﺍﻟﱵ ﺳﺘﻜﻮﻥ‬
‫ﳏﻮﺭ ﺩﺭﺍﺳﺘﻨﺎ ﰲ ﺍﳉﺰﺀ ﺍﳌﻮﺍﱄ‪.‬‬

‫‪ -3‬ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ‪:‬‬


‫ﳌﺎ ﻛﺎﻧﺖ ﺍﳊﺎﺟﺔ ﻣﻠﺤﺔ ﻭﺿﺮﻭﺭﻳﺔ ﳊﻤﺎﻳﺔ ﺍﳌﺎﻝ ﺃﳌﻌﻠﻮﻣﺎﰐ ﻗﺪ ﺍﺳﺘﻘﺮ ﺍﻟﻔﻜﺮ ﺍﻟﻘﺎﻧﻮﱐ ﻋﻠﻰ ﺿﺮﻭﺭﺓ ﻭﺟﻮﺩ ﻧﺼﻮﺹ‬
‫ﻗﺎﻧﻮﻧﻴﺔ ﳍﺬﺍ ﺍﻟﻐﺮﺽ ﻭﻗﺪ ﺍﺳﺘﺠﺎﺑﺖ ﻋﺪﺓ ﺩﻭﻝ ﻭﻣﻨﻬﺎ ﺍﳉﺰﺍﺋﺮ‪.‬ﻓﺒﺎﻟﻨﺴﺒﺔ ﻟﻠﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ ﺗﺪﺍﺭﻙ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﻣﺆﺧﺮﺍ‬
‫ﺍﻟﻔﺮﺍﻍ ﺍﻟﻘﺎﻧﻮﱐ ﰲ ﳎﺎﻝ ﺍﻹﺟﺮﺍﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﻭ ﺫﻟﻚ ﺑﺎﺳﺘﺤﺪﺍﺙ ﻧﺼﻮﺹ ﲡﺮﳝﻴﺔ ﻟﻘﻤﻊ ﺍﻻﻋﺘﺪﺍﺀﺍﺕ ﺍﻟﻮﺍﺭﺩﺓ ﻋﻠﻰ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﺿﻤﻦ ﻧﺼﻮﺹ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ‪ ،‬ﻗﺎﻧﻮﻥ ﺍﳌﻠﻜﻴﺔ ﺍﻟﻔﻜﺮﻳﺔ ﻭ ﺍﻟﺼﻨﺎﻋﻴﺔ‪ ،‬ﻭﻋﻠﻴﻪ ﺳﻨﻌﺎﰿ ﰲ ﻫﺬﺍ ﺍﳉﺰﺀ ﻣﻦ ﺍﻟﺪﺭﺍﺳﺔ ﺍﻟﻘﻮﺍﻧﲔ ﺍﻟﱵ‬
‫ﺳﻨﺘﻬﺎ ﺍﳉﺰﺍﺋﺮ ﳌﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭ ﺍﳍﻴﺌﺎﺕ ﺍﳌﻜﻠﻔﺔ ﲟﺤﺎﺭﺑﺔ ﻫﺬﻩ ﺍﳉﺮﳝﺔ‪.‬‬

‫‪ -1-3‬ﺗﻌﺮﻳﻒ ﻭ ﺃﻧﻮﺍﻉ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ‪:‬‬


‫ﻟﻘﺪ ﺃﻃﻠﻖ ﺍﳌﺸﺮﻉ ﺍﳉﺰﺍﺋﺮﻱ ﺗﺴﻤﻴﺔ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭ ﺍﻻﺗﺼﺎﻝ ﻋﻠﻰ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪،‬‬
‫ﻭﻟﻘﺪ ﻋﺮﻓﻬﺎ ﰲ ﺍﳌﺎﺩﺓ ﺍﻟﺜﺎﻧﻴﺔ ﻣﻦ ﺍﻟﻘﺎﻧﻮﻥ ﺭﻗﻢ ‪ 04-09‬ﺍﳌﺆﺭﺥ ﰲ ‪ 2009/8/5‬ﺑﺄ‪‬ﺎ‪" :‬ﺟﺮﺍﺋﻢ ﺍﳌﺴﺎﺱ ﺑﺄﻧﻈﻤﺔ ﺍﳌﻌﺎﳉﺔ‬
‫ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ﺍﶈﺪﺩﺓ ﰲ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﻭ ﺃﻱ ﺟﺮﳝﺔ ﺃﺧﺮﻯ ﺗﺮﺗﻜﺐ ﺍﻭ ﻳﺴﻬﻞ ﺍﺭﺗﻜﺎ‪‬ﺎ ﻋﻦ ﻃﺮﻳﻖ ﻣﻨﻈﻮﻣﺔ ﻣﻌﻠﻮﻣﺎﺗﻴﺔ‬
‫ﺃﻭ ﻧﻈﺎﻡ ﻟﻼﺗﺼﺎﻻﺕ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ"‪.1‬‬
‫ﻭ ﺑﺎﻟﺮﺟﻮﻉ ﺇﱃ ﺍﻻﺗﻔﺎﻗﻴﺔ ﺍﻟﺪﻭﻟﻴﺔ ﺣﻮﻝ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺍﳌﻨﻌﻘﺪﺓ ﺑﺒﻮﺩﺍﺑﺴﺖ ﺳﻨﺔ ‪ ، 2001‬ﳒﺪ ﺃﻥ ﺍﳌﺸﺮﻉ‬
‫ﺍﳉﺰﺍﺋﺮﻱ ﺍﺳﺘﻤﺪ ﺗﻌﺮﻳﻔﻪ ﻣﻦ ﺍﻻﺗﻔﺎﻗﻴﺔ ﺍﻟﺪﻭﻟﻴﺔ ﺍﻟﺴﺎﻟﻔﺔ ﺍﻟﺬﻛﺮ‪.‬‬
‫ﻫﺬﺍ ﲞﺼﻮﺹ ﺗﻌﺮﻳﻒ ﺍﳉﺮﳝﺔ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ ﺃﻣﺎ ﻓﻴﻤﺎ ﻳﺘﻌﻠﻖ ﺑﺄﻧﻮﺍﻋﻬﺎ ﻭ ﺍﻟﱵ ﺣﺪﺩﻫﺎ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﺍﳉﺰﺍﺋﺮﻱ ﰲ‬
‫ﺍﻟﻘﺴﻢ ﺍﻟﺴﺎﺑﻊ ﺿﻤﻦ ﺍﳌﻮﺍﺩ ‪ 394‬ﻣﻜﺮﺭ ﺇﱃ ‪ 394‬ﻣﻜﺮﺭ ‪ 6‬ﻓﻴﻤﻜﻦ ﺇﲨﺎﳍﺎ ﰲ‪:‬‬

‫‪1‬ﺍﳉﻤﻬﻮﺭﻳﺔ ﺍﳉﺰﺍﺋﺮﻳﺔ ﺍﻟﺪﳝﻘﺮﺍﻃﻴﺔ ﺍﻟﺸﻌﺒﻴﺔ ‪ :‬ﺍﳉﺮﻳﺪﺓ ﺍﻟﺮﲰﻴﺔ‪ ،‬ﺍﻟﻌﺪﺩ ‪ ، 47‬ﺍﳌﺘﻀﻤﻦ ﻗﺎﻧﻮﻥ ﺭﻗﻢ ‪ 04-09‬ﺍﳌﺘﻌﻠﻖ ﺑﺎﻟﻘﻮﺍﻋﺪ ﺍﳋﺎﺻﺔ ﻟﻠﻮﻗﺎﻳﺔ ﻣﻦ‬
‫ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭ ﺍﻻﺗﺼﺎﻝ ﻭﻣﻜﺎﻓﺤﺘﻬﺎ‪ ،‬ﺍﳉﺰﺍﺋﺮ‪ ،.2009/8/16 ،‬ﺹ ‪.05‬‬
‫‪55‬‬
‫ﻓﺘﻴﺤﺔ ﺑﻮﻫﺮﻳﻦ‬

‫‪ ‬ﺟﺮﺍﺋﻢ ﺍﳊﺬﻑ ﺃﻭ ﺍﻟﺘﻐﻴﲑ ﰲ ﻣﻌﻄﻴﺎﺕ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ‪ :‬ﻭ ﻧﺼﺖ ﻋﻠﻰ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺎﺩﺓ ‪ 394‬ﻣﻜﺮﺭ‬
‫‪ 1‬ﻣﻦ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﺍﳉﺰﺍﺋﺮﻱ " ﻳﻌﺎﻗﺐ ﺑﺎﳊﺒﺲ ﻣﻦ ﺳﺘﺔ ﺃﺷﻬﺮ ﺇﱃ ﺛﻼﺛﺔ ﺳﻨﻮﺍﺕ ﻭﺑﻐﺮﺍﻣﺔ ﻣﺎﻟﻴﺔ ﻣﻦ ‪500000‬‬
‫ﺩ‪.‬ﺝ ﺇﱃ ‪ 2000000‬ﺩ‪.‬ﺝ ﻛﻞ ﻣﻦ ﺍﺩﺧﻞ ﺑﻄﺮﻳﻖ ﺍﻟﻐﺶ ﻣﻌﻄﻴﺎﺕ ﰲ ﻧﻈﺎﻡ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﺃﻭ ﺃﺯﺍﻝ ﺃﻭ ﻋﺪﻝ ﺑﻄﺮﻳﻖ‬
‫ﺍﻟﻐﺶ ﺍﳌﻌﻄﻴﺎﺕ ﺍﻟﱵ ﻳﺘﻀﻤﻨﻬﺎ"‪.‬‬
‫‪ ‬ﺟﺮﺍﺋﻢ ﺣﻴﺎﺯﺓ ﺃﻭ ﺇﻓﺸﺎﺀ ﺃﻭ ﻧﺸﺮ ﺃﻭ ﺍﺳﺘﻌﻤﺎﻝ ﺍﳌﻌﻄﻴﺎﺕ ﺍﻵﻟﻴﺔ‪ :‬ﻭﻫﺬﺍ ﻣﺎ ﻧﺼﺖ ﻋﻠﻴﻪ ﺍﳌﺎﺩﺓ ‪ 394‬ﻣﻜﺮﺭ‪" 2‬ﻳﻌﺎﻗﺐ‬
‫ﺑﺎﳊﺒﺲ ﻣﻦ ﺷﻬﺮﻳﻦ ﺇﱃ ‪ 3‬ﺳﻨﻮﺍﺕ ﻭ ﺑﻐﺮﺍﻣﺔ ﻣﻦ ‪ 1000000‬ﺩ‪.‬ﺝ ﺇﱃ ‪ 5000000‬ﺩ‪.‬ﺝ ﻛﻞ ﻣﻦ ﻳﻘﻮﻡ ﻋﻤﺪﺍ ﺃﻭ‬
‫ﻋﻦ ﻃﺮﻳﻖ ﺍﻟﻐﺶ ﲟﺎ ﻳﻠﻲ‪:‬‬

‫‪‬ﺗﺼﻤﻴﻢ ﺃﻭ ﲝﺚ ﺃﻭ ﲡﻤﻴﻊ ﺃﻭ ﺗﻮﻓﲑ ﺃﻭ ﻧﺸﺮ ﺃﻭ ﺍﻻﲡﺎﺭ ﰲ ﻣﻌﻄﻴﺎﺕ ﳐﺰﻧﺔ ﺃﻭ ﻣﻌﺎﳉﺔ ﺃﻭ ﻣﺮﺍﺳﻠﺔ ﻋﻦ ﻃﺮﻳﻖ ﻣﻨﻈﻮﻣﺔ‬
‫ﻣﻌﻠﻮﻣﺎﺕ ﳝﻜﻦ ﺗﺮﺗﻜﺐ ‪‬ﺎ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻨﺼﻮﺹ ﻋﻠﻴﻬﺎ ﰲ ﻫﺬﺍ ﺍﻟﺘﻨﻈﻴﻢ‪.‬‬
‫‪‬ﺣﻴﺎﺯﺓ ﺃﻭ ﺇﻓﺸﺎﺀ ﺃﻭ ﻧﺸﺮ ﺃﻭ ﺍﺳﺘﻌﻤﺎﻝ ﻷﻱ ﻏﺮﺽ ﻛﺎﻥ ﺍﳌﻌﻄﻴﺎﺕ ﺍﳌﺘﺤﺼﻞ ﻋﻠﻴﻬﺎ ﻣﻦ ﺇﺣﺪﻯ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻨﺼﻮﺹ ﻋﻠﻴﻬﺎ‬
‫ﰲ ﻫﺬﺍ ﺍﻟﺘﻨﻈﻴﻢ"‪.‬‬
‫‪ -2-3‬ﺍﻟﻘﻮﺍﻧﲔ ﺍﳌﻨﻈﻤﺔ ﻟﻠﺠﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ‪:‬‬
‫ﻗﺎﻣﺖ ﺍﳉﺰﺍﺋﺮ ﺑﺴﻦ ﻗﻮﺍﻧﲔ ﺧﺎﺻﺔ ﺑﺎﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭ ﻫﻲ ﺗﻌﺘﱪ ﻣﺘﺄﺧﺮﺓ ﻣﻘﺎﺭﻧﺔ ﺑﺒﻌﺾ ﺍﻟﺪﻭﻝ ﺍﻟﻌﺮﺑﻴﺔ‪ ،‬ﺑﺎﻟﺮﻏﻢ‬
‫ﻣﻦ ﺍﺣﺘﻼﳍﺎ ﺍﳌﺮﺍﺗﺐ ﺍﻷﻭﱃ ﻋﺮﺑﻴﺎ ﻭ ﺇﻓﺮﻳﻘﻴﺎ ‪ ،‬ﻭ ﻣﻦ ﺑﲔ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﻧﺬﻛﺮ ﻣﻨﻬﺎ‪:‬‬

‫‪ ‬ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ‪ :‬ﻗﺎﻣﺖ ﺍﳉﺰﺍﺋﺮ ﺑﺘﻌﺪﻳﻞ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﲟﻮﺟﺐ ﺍﻟﻘﺎﻧﻮﻥ ﺭﻗﻢ ‪ 15-04‬ﺍﳌﺆﺭﺥ ﰲ ‪ 10‬ﻧﻮﻓﻤﱪ‬
‫‪ ،2004‬ﻭﺍﻟﺬﻱ ﺍﺩﺧﻞ ﻋﻠﻴﻪ ﺗﻌﺪﻳﻞ ﰲ ‪ 20‬ﺩﻳﺴﻤﱪ ‪ .2006‬ﻭ ﻳﺘﻀﻤﻦ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ ﺍﳉﺰﺍﺋﺮﻱ ﺍﻟﻘﺴﻢ ﺍﻟﺴﺎﺑﻊ‬
‫ﲢﺖ ﻋﻨﻮﺍﻥ ﺍﳌﺴﺎﺱ ﺑﺄﻧﻈﻤﺔ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ ﺿﻤﻦ ﺍﳌﻮﺍﺩ ﻣﻦ ‪ 394‬ﺇﱃ ‪ 394‬ﻣﻜﺮﺭ‪ ،6‬ﻭ ﺍﻟﱵ ﺗﻨﺎﻭﻟﺖ‬
‫ﺃﻧﻮﺍﻉ ﺍﳉﺮﺍﺋﻢ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ ﻭ ﻋﻘﻮﺑﺘﻬﺎ ﻭ ﺍﻟﱵ ﰎ ﺗﻨﺎﻭﻝ ﺑﻌﻀﻬﺎ ﻣﻦ ﻗﺒﻞ‪.‬‬
‫‪ ‬ﻗﺎﻧﻮﻥ ﺭﻗﻢ ‪ 04-09‬ﺍﳌﺆﺭﺥ ﰲ ‪ : 2009/8/16‬ﻭ ﻫﻮ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳌﺘﻀﻤﻦ ﺍﻟﻘﻮﺍﻋﺪ ﺍﳋﺎﺻﺔ ﻟﻠﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﻹﻋﻼﻡ ﻭ ﺍﻻﺗﺼﺎﻝ ﻭ ﻣﻜﺎﻓﺤﺘﻬﺎ‪ ،‬ﺻﺪﺭ ﻫﺬﺍ ﺍﻟﻘﺎﻧﻮﻥ ﰲ ﺍﳉﺮﻳﺪﺓ ﺍﻟﺮﲰﻴﺔ ﺭﻗﻢ ‪ 47‬ﺍﻟﺼﺎﺩﺭﺓ ﺑﺘﺎﺭﻳﺦ‬
‫‪ . 2009/8/16‬ﳛﺘﻮﻱ ﻋﻠﻰ ‪ 6‬ﻓﺼﻮﻝ ﺗﻨﺎﻭﻟﺖ ﺍﻟﺘﻌﺮﻳﻒ ﺑﺎﳉﺮﳝﺔ‪ ،‬ﻣﺮﺍﻗﺒﺔ ﺍﻻﺗﺼﺎﻻﺕ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﺍﻟﻘﻮﺍﻋﺪ‬
‫ﺍﻹﺟﺮﺍﺋﻴﺔ‪ ،‬ﺍﳍﻴﺌﺔ ﺍﻟﻮﻃﻨﻴﺔ ﻟﻠﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭ ﺍﻻﺧﺘﺼﺎﺹ ﺍﻟﻘﻀﺎﺋﻲ ﻭ ﻫﺬﺍ ﰲ ‪ 19‬ﻣﺎﺩﺓ‪.‬‬

‫‪ -3-3‬ﺍﳍﻴﺌﺎﺕ ﺍﳌﻜﻠﻔﺔ ﲟﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺍﳉﺰﺍﺋﺮ‪:‬‬


‫ﻣﻦ ﺍﺟﻞ ﻣﻮﺍﺟﻬﺔ ﺍﳉﺮﳝﺔ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ ﻗﺎﻣﺖ ﺍﳉﺰﺍﺋﺮ ﺑﻮﺿﻊ ﻋﺪﺓ ﺃﺟﻬﺰﺓ ﻭﻫﻴﺌﺎﺕ ﻧﺬﻛﺮ ﻣﻨﻬﺎ‪:‬‬
‫‪ -1-3-3‬ﺍﳍﻴﺌﺔ ﺍﻟﻮﻃﻨﻴﺔ ﻟﻠﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﻹﻋﻼﻡ ﻭ ﺍﻻﺗﺼﺎﻝ‪:‬‬

‫‪56‬‬
‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ‬

‫ﺃﻧﺸﺌﺖ ﻫﺬﻩ ﺍﳍﻴﺌﺔ ﲟﻮﺟﺐ ﺍﻟﻘﺎﻧﻮﻥ ﺭﻗﻢ ‪ 04-09‬ﺍﳌﺆﺭﺥ ﰲ ‪ 5‬ﺃﻭﺕ ‪ 2009‬ﻭ ﺍﻟﺬﻱ ﺣﺪﺩﺕ ﺍﳌﺎﺩﺓ ‪ 14‬ﻣﻨﻪ ﻣﻬﺎﻡ ﺍﳍﻴﺌﺔ‬
‫ﻭ ﺍﳌﺘﻤﺜﻠﺔ ﰲ‪:‬‬

‫‪ -‬ﺗـﻨـﺸﻴـﻂ ﻭﺗـﻨـﺴﻴـﻖ ﻋـﻤـﻠﻴـﺎﺕ ﺍﻟـﻮﻗـﺎﻳـﺔ ﻣﻦ ﺍﳉـﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭ‬


‫ﺍﻻﺗﺼﺎﻝ ﻭﻣﻜﺎﻓﺤﺘﻪ‪.‬‬
‫‪ -‬ﻣــــﺴـــﺎﻋــــﺪﺓ ﺍﻟــــﺴـــﻠــــﻄـــﺎﺕ‬
‫ﺍﻟــــﻘـــﻀــــﺎﺋـــﻴــــﺔ ﻭﻣــــﺼـــﺎﻟﺢ ﺍﻟـﺸـﺮﻃـﺔ‬
‫ﺍﻟـﻘـﻀـﺎﺋـﻴــﺔ ﻓﻲ ﺍﻟـﺘـﺤـﺮﻳـﺎﺕ ﺍﻟـﺘﻲ ﲡـﺮﻳـﻬـﺎ ﺑـﺸـﺄﻥ ﺍﳉــﺮﺍﺋـﻢ ﺫﺍﺕ‬
‫ﺍﻟــﺼـــﻠــﺔ ﺑـﺘــﻜـﻨـﻮﻟـﻮﺟــﻴـﺎﺕ ﺍﻹﻋﻼﻡ ﻭ ﺍﻻﺗﺼﺎﻝ ﻓﻲ ﺫﻟﻚ ﲤﻴﻊ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭ ﺍﳒﺎﺯ‬
‫ﺍﳋﱪﺍﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ‪.‬‬
‫‪ -‬ﺗﺒﺎﺩﻝ ﺍﱂﻌﻠـﻮﻣﺎﺕ ﻣﻊ ﻧﻈﻴﺮﺍﺗﻬﺎ ﻓﻲ ﺍﳋﺎﺭﺝ ﻗﺼﺪ ﺟــﻤﻊ ﻛﻞ ﺍﳌــﻌــﻄــﻴــﺎﺕ ﺍﳌـﻔــﻴــﺪﺓ‬
‫ﻓﻲ ﺍﻟــﺘــﻌــﺮﻑ ﻋــﻠﻰ ﻣــﺮﺗــﻜــﺒﻲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨـﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭ ﺍﻻﺗﺼﺎﻝ‬
‫ﻭﲢﺪﻳﺪ ﻣﻜﺎﻥ ﺗﻮﺍﺟﺪﻫﻢ‪.‬‬
‫‪ -2-3-3‬ﺍﳍﻴﺌﺎﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﳉﺰﺍﺋﻴﺔ ﺍﳌﺘﺨﺼﺼﺔ‪:‬‬
‫ﻭ ﺍﻟﱵ ﰎ ﺇﻧﺸﺎﺅﻫﺎ ﲟﻮﺟﺐ ﺍﻟﻘﺎﻧﻮﻥ ‪ 14/04‬ﺍﳌﺆﺭﺥ ﰲ ‪ 10‬ﻧﻮﻓﻤﱪ ‪ 2004‬ﺍﳌﻌﺪﻝ ﻟﻠﻘﺎﻧﻮﻥ ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳉﺰﺍﺋﻴﺔ ﻭ ﺃﻥ‬
‫ﺍﺧﺘﺼﺎﺻﻬﺎ ﺇﻗﻠﻴﻤﻲ ﻣﻮﺳﻊ ﻃﺒﻘﺎ ﻟﻠﻤﺮﺳﻮﻡ ﺍﻟﺘﻨﻔﻴﺬﻱ ﺭﻗﻢ ‪ 348/06‬ﺍﳌﺆﺭﺥ ﰲ ‪. 2006/1/5‬‬
‫‪ -3-3-3‬ﺍﳌﻌﻬﺪ ﺍﻟﻮﻃﲏ ﻟﻸﺩﻟﺔ ﺍﳉﻨﺎﺋﻴﺔ ﻭ ﻋﻠﻢ ﺍﻹﺟﺮﺍﻡ‪:‬‬
‫ﺃﻧﺸﺊ ﻫﺬﺍ ﺍﳌﻌﻬﺪ ﲟﻮﺟﺐ ﻣﺮﺳﻮﻡ ﺭﺋﺎﺳﻲ ﺭﻗﻢ ‪ 183-04‬ﺍﳌﺆﺭﺥ ﰲ ‪ 26‬ﺟﻮﺍﻥ ‪ 2004‬ﻭ ﻫﻮ ﻣﺆﺳﺴﺔ ﻋﻤﻮﻣﻴﺔ ﺫﺍﺕ‬
‫ﻃﺎﺑﻊ ﺇﺩﺍﺭﻱ ﺗﺘﻤﺘﻊ ﺑﺎﻟﺸﺨﺼﻴﺔ ﺍﳌﻌﻨﻮﻳﺔ ﻭ ﺍﻻﺳﺘﻘﻼﻝ ﺍﳌﺎﱄ‪ ،‬ﻭﻳﻮﺿﻊ ﲢﺖ ﻭﺻﺎﻳﺔ ﻭﺯﻳﺮ ﺍﻟﺪﻓﺎﻉ ﺍﻟﻮﻃﲏ‪.‬‬
‫ﻳﺘﻜﻮﻥ ﺍﳌﻌﻬﺪ ﻣﻦ ‪ 11‬ﺩﺍﺋﺮﺓ ﻣﺘﺨﺼﺼﺔ ﰲ ﳎﺎﻻﺕ ﳐﺘﻠﻔﺔ ﻣﻦ ﺑﻴﻨﻬﺎ ﺩﺍﺋﺮﺓ ﺍﻹﻋﻼﻡ ﺍﻵﱄ ﻭﺍﻻﻟﻜﺘﺮﻭﱐ ﻣﻜﻠﻔﺔ ﲟﻌﺎﳉﺔ ﻭ‬
‫ﲢﻠﻴﻞ ﻭ ﺗﻘﺪﱘ ﻛﻞ ﺩﻟﻴﻞ ﺭﻗﻤﻲ ﻳﺴﺎﻋﺪ ﺍﻟﻌﺪﺍﻟﺔ ﻛﻤﺎ ﺗﻘﺪﻡ ﻣﺴﺎﻋﺪﺓ ﺗﻘﻨﻴﺔ ﻟﻠﻤﺤﻘﻘﲔ ﰲ ﺍﳌﻌﺎﻳﻨﺎﺕ‪.‬‬
‫‪ -4-3‬ﺍﻟﺘﺪﺍﺑﲑ ﺍﻟﻮﻗﺎﺋﻴﺔ ﺍﳌﺴﺘﺤﺪﺛﺔ ‪:‬‬
‫ﻟﻘﺩ ﺟـﺎﺀ ﻓـﻲ ﺍﻟﻘـﺎﻧﻭﻥ ﺭﻗﻢ ‪ 09-04‬ﳎﻤﻮﻋﺔ ﻣﻦ ﺍﻟﺘﺪﺍﺑﲑ ﺍﻟﻮﻗﺎﺋﻴﺔ ﺍﻟﱵ ﻳﺘﻢ ﺍﲣﺎﺫﻫﺎ ﻣﺴﺒﻘﺎ ﻣـﻦ ﻃــﺮﻑ‬
‫ﻣﺻـﺎﻟﺢ ﻣﻌﻴﻨﺔ ﻟﺗﻔـﺎﺩﻱ ﻭﻗــﻮﻉ ﺟﺭﺍﺋﻢ ﻣﻌﻠﻭﻣﺎﺗﻴﺔ ﺃﻭ ﺍﻟﻛﺷـﻒ ﻋﻧﻬــﺎ ﻭ ﻋﻦ ﻣﺮﺗﻜﺒﻴﻬﺎ ﰲ ﻭﻗﺖ ﻣﺒﻜﺮ ﻭ ﻫﻲ‬
‫ﻛﺎﻟﺗﺎﻟﻲ‪:1‬‬

‫‪1‬ﺑﺭﺍ ﻫﯾﻣﻲ ﺟﻣــــــــــﺎﻝ‪ :‬ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﺍﺋﻢ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ‪ ،‬ﺍ‪‬ﻠﺔ ﺍﻟﻨﻘﺪﻳﺔ ﻟﻠﻘﺎﻧﻮﻥ ﻭﺍﻟﻌﻠﻮﻡ‬
‫ﺍﻟﺴﻴﺎﺳﻴﺔ‪،‬ﺍ‪‬ﻠﺪ ‪ ، 2‬ﺍﻟﻌﺪﺩ‪ ، 2‬ﺟﺎﻣﻌﺔ ﻣﻮﻟﻮﺩ ﻣﻌﻤﺮﻱ‪ -‬ﺗﻴﺰﻱ ﻭﺯﻭ‪ ،‬ﺍﳉﺰﺍﺋﺮ‪، 1997/11/15 ،‬ﺹ ‪153-152‬‬
‫‪57‬‬
‫ﻓﺘﻴﺤﺔ ﺑﻮﻫﺮﻳﻦ‬

‫ﺃ‪ -‬ﻣﺮﺍﻗﺒﺔ ﺍﻻﺗﺼﺎﻻﺕ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ‪ :‬ﻟﻘـــﺪ ﻧﺻـــﺖ ﺍﻟﻣـــﺎﺩﺓ ‪ 1‬ﻋﻠــــﻰ ﺃﺭﺑﻊ‬


‫ﺣــــﺎﻻﺕ ﺍﻟﺗــــﻲ ﯾﺟــــﻮﺯ ﻓﯾﻬــــﺎ ﻟﺳــــﻠﻁﺎﺕ ﺍﻷﻣــــﻦ ﺍﻟﻘﻴﺎﻡ ﲟﺮﺍﻗﺒﺔ‬
‫ﺍﳌﺮﺳﻼﺕ ﻭ ﺍﻻﺗﺼﺎﻻﺕ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﻭﺫﻟﻙ ﺑﺎﻟﻧﻇﺮ ﺇﻟﻰ ﺧﻃﻮﺭﺓ ﺍﻟﺘﻬﺪﻳﺪﺍﺕ ﺍﻟﻣﺣﺗﻣﻠﺔ ﻭﺃﳘﻴﺔ ﺍﻟﻣﺻﻠﺣﺔ ﺍﶈﺘﻤﻠﺔ‬
‫ﻭﻫﻲ‪:‬‬

‫‪ -‬ﻟﻠﻮﻗﺎﻳﺔ ﻣـﻦ ﺍﻷﻓﻌــﺎﻝ ﺍﻟﺗـﻲ ﺗﺣﻣــﻞ ﻭﺻـﻒ ﺟﺮﺍﺋﻢ ﺍﻹﺭﻫﺎﺏ ﻭﺍﻟﺘﺨﺮﻳﺐ ﻭ ﺟﺮﺍﺋﻢ ﺍﻣﻥ ﺍﻟﺩﻭﻟﺔ‪.‬‬
‫‪ -‬ﻋﻧــﺪﻣﺎ ﺗﺗــﻮﻓﺭ ﻣﻌﻠﻭﻣــﺎﺕ ﻋــﻦ ﺍﺣﺗﻣــﺎﻝ ﻭﻗــﻮﻉ ﺍﻋﺗــﺪﺍﺀ ﻋﻠــﻰ ﻣﻧﻇﻮﻣــﺔ‬
‫ﻣﻌﻠﻮﻣﺎﺗﻴﺔ ﻋﻠــﻰ ﻧﺣﻭ ﯾﻬﺩﺩ ﻣﺅﺳﺳﺎﺕ ﺍﻟﺩﻭﻟﺔ ﺃﻭ ﺍﻟﺩﻓﺎﻉ ﺍﻟﻭﻁﻧﻲ ﺃﻭ ﺍﻟﻧﻅﺎﻡ ﺍﻟﻌﺎﻡ‪.‬‬
‫‪ -‬ﻟﺿـــﺮﻭﺭﺓ ﺍﻟﺘﺤﻘﻴﻘﺎﺕ ﻭ ﺍﻟﻣﻌﻠﻭﻣـــﺎﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺣﻴﻨﻤﺎ ﻳﺼﻌﺐ ﺍﻟﻭﺻـــﻮﻝ ﺇﻟـــﻰ ﻧﺘﻴﺠﺔ‬
‫ﺗﻬﻡ ﺍﻷﺑﺣﺎﺙ ﺍﳉﺎﺭﻳﺔ ﺩﻭﻥ ﺍﻟﻠﺟﻭﺀ ﺇﻟﻰ ﺍﳌﺮﺍﻗﺒﺔ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ‪.‬‬
‫‪ -‬ﻓﻲ ﺇﻃﺎﺭ ﺗﻨﻔﻴﺬ ﻁﻠﺑﺎﺕ ﺍﻟﻣﺳﺎﻋﺩﺍﺕ ﺍﻟﻘﻀﺎﺋﻴﺔ ﺍﻟﺪﻭﻟﻴﺔ ﺍﳌﺘﺒﺎﺩﻟﺔ‪.‬‬
‫ﺏ‪ -‬ﺇﻗﺣﺎﻡ ﻣﺯﻭﺩﻱ ﺧﺩﻣﺎﺕ ﺍﻻﺗﺼﺎﻻﺕ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ ﻓﻲ ﻣﺳﺎﺭ ﺍﻟﻮﻗﺎﻳﺔ ﻣﻥ ﺍﻟﺟﺭﺍﺋﻡ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ‪:‬ﻭﺫﻟﻙ ﻣﻥ ﺧﻼﻝ‬
‫ﻓﺭﺽ ﻋﻠﻴﻬﻢ ﻣﺟﻣﻭﻋﺔ ﻣﻥ ﺍﻻﻟﺘﺰﺍﻣﺎﺕ ﻣﺫﻛﻭﺭﺓ ﻓﻲ ﺍﳌﻮﺍﺩ ﺍﻟﺗﺎﻟﻳﺔ ‪ 11 ، 10‬ﻭ ‪: 12‬‬

‫‪ -‬ﺍﻻﻟﺘﺰﺍﻡ ﺑﺎﻟﺗﻌـﺎﻭﻥ ﻣـﻊ ﻣﺻـﺎﻟﺢ ﺍﻷﻣـﻦ ﺍﻟﻣﻛﻠـﻒ ﺑﺎﻟﺘﺤﻘﻴﻖ ﺍﻟﻘﺿـﺎﺋﻲ ﻋـﻦ ﻃﺮﯾـﻖ ﺟﻣـﻊ ﺃﻭ ﺗﺳﺟﯾﻝ‬
‫ﺍﳌﻌﻄﻴﺎﺕ ﺍﻟﻣﺗﻌﻠﻘﺔ ﺑﺎﻻﺗﺼﺎﻻﺕ ﻭﺍﳌﺮﺍﺳﻼﺕ ﻭ ﻭﺿـﻌﻬﺎ ﺗﺣـﺖ ﺗﺻـﺮﻓﻬﺎ ﻣﻊ ﻣﺮﺍﻋﺎﺓ ﺳﺭﯾﺔ ﻫﺫﻩ ﺍﻹﺟﺮﺍﺀﺍﺕ ﻭ ﺍﻟﺗﺣﻘﯾﻕ‬
‫‪.‬‬
‫‪ -‬ﺍﻻﻟﺘﺰﺍﻡ ﺑﺣﻔﻅ ﺍﳌﻌﻄﻴﺎﺕ ﺍﻟﻣﺗﻌﻠﻘﺔ ﺑﺣﺭﻛﺔ ﺍﻟﺴﲑ ﻭ ﻛﻝ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﺍﻟﺗﻲ ﻣﻥ ﺷﺎﻧﻬﺎ ﺃﻥ ﺗﺳﺎﻫﻡ ﻓﻲ ﺍﻟﻛﺷﻑ ﻋﻥ‬
‫ﺍﳉﺮﺍﺋﻢ ﻭ ﻣﺮﺗﻜﺒﻴﻬﺎ‪ ،‬ﻭﻫﺬﻳﻦ ﺍﻻﻟﺘﺰﺍﻣﲔ ﻣﻮﺟﻬﲔ ﻟﻜﻞ ﻣﻘﺩﻣﻲ ﺧﺩﻣﺎﺕ ﺍﻻﺗﺼﺎﻻﺕ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ ﺩﻭﻥ ﺍﺳﺗﺛﻧﺎﺀ ‪.‬‬
‫‪ -‬ﺍﻻﻟﺘﺰﺍﻡ ﺑﺎﻟﺗـــﺪﺧﻝ ﺍﻟﻔـــﻮﺭﻱ ﻟﺳـــﺣﺏ ﺍﶈﺘﻮﻳﺎﺕ ﺍﻟﺗـــﻲ ﯾﺳـــﻣﺢ ﻟﻬـــﻢ ﺍﻻﻃﻼﻉ‬
‫ﻋﻠﻴﻬﺎ ﲟﺠﺮﺩ ﺍﻟﻌﻠــﻢ ﻃﺮﻳﻘﺔ ﻣﺑﺎﺷــﺮﺓ ﺃﻭ ﻏﲑ ﻣﺑﺎﺷــﺮﺓ ﺑﻣﺧﺎﻟﻔﺗﻬــﺎ ﻟﻠﻘــﺎﻧﻭﻥ‪ ،‬ﻭ ﲣﺰﻳﻨﻬﺎ ﺃﻭ ﺟﻌــﻞ‬
‫ﺍﻟﻭﺻﻭﻝ ﺇﻟﻴﻬﺎ ﻏﲑ ﳑﻜﻦ‪.‬‬
‫‪ -‬ﺍﻻﻟﺘﺰﺍﻡ ﺑﻭﺿـــﻊ ﺗﺮﺗﻴﺒﺎﺕ ﺗﻘﻨﻴﺔ ﻟﻠﺣـــﺪ ﻣــــﻦ ﺇﻣﻜﺎﻧﻴﺔ ﺍﻟﺪﺧﻮﻝ ﺇﱃ ﺍﻟﻣﻭﺯﻋـــﺎﺕ‬
‫ﺍﻟﺗــــﻲ ﺗﺣﺗــــﻮﻱ ﻋﻠــــﻰ ﻣﻌﻠﻭﻣــــﺎﺕ ﻣﺘﻨﺎﻓﻴﺔ ﻣــــﻊ ﺍﻟﻧﻇــــﺎﻡ ﺍﻟﻌــــﺎﻡ‬
‫ﻭﺍﻵﺩﺍﺏ ﺍﻟﻌﺎﻣــــﺔ ﻣــــﻊ ﺇﺧﻃــــﺎﺭ ﺍﳌﺸﺘﺮﻛﲔ ﻟﺪﻳﻬﻢ ﺑﻭﺟﻭﺩﻫﺎ ‪.‬ﻭ ﻧﻧﺸﲑ ﺇﻟﻰ ﺃﻥ ﻫﺬﻳﻦ ﺍﻻﻟﺘﺰﺍﻣﲔ‬
‫ﳜﺼﺎﻥ ﻓﻘـﻂ ﻣﻘـﺪﻣﻲ ﺍﻟﺩﺧﻭﻝ ﺇﻟﻰ ﺍﻻﻧﺘﺮﻧﺖ‪.‬‬

‫‪ .4‬ﺧﺎﲤﺔ‪:‬‬

‫‪58‬‬
‫ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ‬

‫ﺍﻭﻻ‪ :‬ﻧﺘﺎﺋﺞ ﺍﻟﺪﺭﺍﺳﺔ‪ :‬ﻣﻦ ﺧﻼﻝ ﻫﺬﻩ ﺍﻟﺪﺭﺍﺳﺔ ﻧﺘﻮﺻﻞ ﺇﱃ ﻧﺘﺎﺋﺞ ﺍﻟﺒﺤﺚ ﺍﻟﺘﺎﻟﻴﺔ‪:‬‬

‫‪ ‬ﻧﻈﺮﺍ ﳊﺪﺍﺛﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻻ ﻳﻮﺟﺪ ﳊﺪ ﺍﻵﻥ ﺇﲨﺎﻉ ﻓﻘﻬﻲ ﻋﻠﻰ ﺗﻌﺮﻳﻒ ﻣﻮﺣﺪ ﳍﺎ‪.‬‬
‫‪ ‬ﺍﺭﺗﺒﻂ ﻇﻬﻮﺭ ﺃﳕﺎﻁ ﻣﺴﺘﺤﺪﺛﺔ ﻣﻦ ﻣﺮﺗﻜﱯ ﺍﳉﺮﺍﺋﻢ ﺑﻌﺪ ﺍﻻﻗﺘﺼﺎﺭ ﻋﻠﻰ ﺫﺍﺕ ﺍﻟﺪﻭﺍﻓﻊ ﰲ ﺍﺭﺗﻜﺎﺏ ﺍﳉﺮﺍﺋﻢ‬
‫ﺍﻟﺘﻘﻠﻴﺪﻳﺔ ﺣﻴﺚ ﻇﻬﺮﺕ ﺩﻭﺍﻓﻊ ﺣﺪﻳﺜﺔ ﻭ ﻏﺎﻟﺒﺎ ﴰﻠﺖ ﲜﺎﻧﺐ ﲢﻘﻴﻖ ﺍﻟﻜﺴﺐ ﺍﳌﺎﺩﻱ ﻭ ﺍﻻﻧﺘﻘﺎﻡ ﴰﻠﺖ ﺃﻳﻀﺎ ﺇﺛﺒﺎﺕ‬
‫ﺍﻟﺘﻔﻮﻕ ﺍﻟﻌﻠﻤﻲ ﻭ ﺍﻟﺪﻋﺎﻳﺔ ﻭ ﺍﻟﺘﺴﻠﻴﺔ‪.‬‬
‫‪ ‬ﺍ‪‬ﺮﻡ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺭﺟﻞ ﳜﺘﻠﻒ ﻋﻦ ﺍ‪‬ﺮﻡ ﺍﻟﺘﻘﻠﻴﺪﻱ ﻓﻬﻮ ﺭﺟﻞ ﺫﻭ ﻋﻠﻢ ﻭ ﻛﻔﺎﺀﺓ ﻭ ﻳﺘﻤﻴﺰ ﺑﻘﺪﺭﺍﺕ ﻋﻘﻠﻴﺔ ﻭ ﺫﻫﻨﻴﺔ‬
‫ﲤﻜﻨﻪ ﻣﻦ ﺍﻹﻓﻼﺕ ﻣﻦ ﺍﻟﻌﻘﺎﺏ‪.‬‬
‫‪ ‬ﻫﺬﻩ ﺍﳉﺮﺍﺋﻢ ﻻ ﺗﺘﺮﻙ ﺃﺛﺮﺍ ﻣﺎﺩﻳﺎ ﰲ ﻣﺴﺮﺡ ﺍﳉﺮﳝﺔ ﻛﻤﺎ ﺃﻥ ﻣﺮﺗﻜﺒﻴﻬﺎ ﳝﻠﻜﻮﻥ ﺍﻟﻘﺪﺭﺓ ﻋﻠﻰ ﺇﺗﻼﻑ ﺃﻭ ﺗﺸﻮﻳﻪ ﺃﻭ‬
‫ﺇﺿﺎﻋﺔ ﺍﻟﺪﻟﻴﻞ ﰲ ﻓﺘﺮﺓ ﻗﺼﲑﺓ‪.‬‬
‫ﺑﺎﻟﺮﻏﻢ ﻣﻦ ﺍﻟﺘﻌﺪﻳﻼﺕ ﺍﻟﱵ ﻗﺎﻣﺖ ‪‬ﺎ ﺍﳉﺰﺍﺋﺮ ﰲ ﳎﺎﻝ ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺇﻻ ﺃﻥ ﻫﺬﻩ ﺍﻟﻨﺼﻮﺹ ﺗﺒﻘﻰ ﻏﲑ ﻛﺎﻓﻴﺔ‬
‫ﻣﻘﺎﺭﻧﺔ ﺑﺘﻄﻮﺭ ﺍﻻﺣﺘﺮﺍﻑ ﺍﻹﺟﺮﺍﻣﻲ ﺃﳌﻌﻠﻮﻣﺎﰐ‪.‬‬
‫ﺛﺎﻧﻴﺎ‪ :‬ﺍﻟﺘﻮﺻﻴﺎﺕ‪:‬‬
‫ﻣﻦ ﺧﻼﻝ ﺍﻟﻨﺘﺎﺋﺞ ﺍﳌﺘﻮﺻﻞ ﺍﻟﻴﻬﺎ ﻧﻘﺘﺮﺡ ﺍﻟﺘﻮﺻﻴﺎﺕ ﺍﻟﺘﺎﻟﻴﺔ‪:‬‬
‫ﺍﻟﻮﻃﻨﻴﺔ ﺍﻟﱵ ﳍﺎ ﻋﻼﻗﺔ ﺑﺎﳉﺮﳝﺔ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ ﻭﳔﺺ ﻫﻨﺎ ﻗﺎﻧﻮﻥ ﺍﳌﻠﻜﻴﺔ‬ ‫‪ ‬ﺿﺮﻭﺭﺓ ﻣﺮﺍﺟﻌﺔ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ‬
‫ﺍﻟﻔﻜﺮﻳﺔ‪ ،‬ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﺘﺠﺎﺭﻱ ﻭﺍﻟﻘﺎﻧﻮﻥ ﺍﳌﺪﱐ‪.‬‬
‫‪ ‬ﺍﻧﺸﺎﺀ ﻣﺮﻛﺰ ﲝﺚ ﺣﻮﻝ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻳﻌﻤﻞ ﻋﻠﻰ ﺩﺭﺍﺳﺔ ﺗﻄﻮﺭﻫﺎ ﻭﺍﻻﺟﺮﺍﺀﺍﺕ ﺍﻟﻜﻔﻴﻠﺔ ﻟﻠﺤﺪ ﻣﻨﻬﺎ‪.‬‬
‫‪ ‬ﻋﻠﻰ ﺍﳉﺰﺍﺋﺮ ﺍﻟﺪﺧﻮﻝ ﰲ ﺍﺗﻔﺎﻗﻴﺎﺕ ﺩﻭﻟﻴﺔ ﻣﻦ ﺍﺟﻞ ﳏﺎﺭﺑﺔ ﺍﳉﺮﳝﺔ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﻭﺣﺎﻭﻟﺔ ﺍﻻﺳﺘﻔﺎﺩﺓ ﻣﻦ‬
‫ﲡﺎﺭﺏ ﺑﺎﻗﻲ ﺍﻟﺪﻭﻝ ﰲ ﻫﺬﺍ ﺍ‪‬ﺎﻝ ‪‬ﺪﻑ ﲢﺴﲔ ﺍﻟﻴﺎﺕ ﻣﻮﺍﺟﻬﺔ ﺍﳉﻮﺍﺋﻢ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ ﺑﺸﱴ ﺍﻧﻮﺍﻋﻬﺎ‪.‬‬
‫‪ .5‬ﻗﺎﺋﻤﺔﺍﳌﺮﺍﺟﻊ‪:‬‬

‫‪ ‬ﺃﲪﺪ ﺧﻠﻴﻔﺔ‪ :‬ﺃﳕﺎﻁ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‪ ،‬ﺩﺍﺭ ﺍﻟﻔﻜﺮ ﺍﳉﺎﻣﻌﻲ‪ ،‬ﻣﺼﺮ‪.2006 ،‬‬
‫‪ ‬ﺍﳉﻤﻬﻮﺭﻳﺔ ﺍﳉﺰﺍﺋﺮﻳﺔ ﺍﻟﺪﳝﻘﺮﺍﻃﻴﺔ ﺍﻟﺸﻌﺒﻴﺔ ‪ :‬ﺍﳉﺮﻳﺪﺓ ﺍﻟﺮﲰﻴﺔ‪ ،‬ﺍﻟﻌﺪﺩ ‪ ، 47‬ﺍﳌﺘﻀﻤﻦ ﻗﺎﻧﻮﻥ ﺭﻗﻢ ‪ 04-09‬ﺍﳌﺘﻌﻠﻖ ﺑﺎﻟﻘﻮﺍﻋﺪ‬
‫ﺍﳋﺎﺻﺔ ﻟﻠﻮﻗﺎﻳﺔ ﻣﻦ ﺍﳉﺮﺍﺋﻢ ﺍﳌﺘﺼﻠﺔ ﺑﺘﻜﻨﻮﻟﻮﺟﻴﺎﺕ ﺍﻹﻋﻼﻡ ﻭ ﺍﻻﺗﺼﺎﻝ ﻭﻣﻜﺎﻓﺤﺘﻬﺎ‪ ،‬ﺍﳉﺰﺍﺋﺮ‪.2009/8/16 ،‬‬
‫‪ ‬ﺑﺭﺍ ﻫﯾﻣﻲ ﺟﻣــــــــــﺎﻝ‪ :‬ﻣﻜﺎﻓﺤﺔ ﺍﳉﺮﺍﺋﻢ ﺍﻻﻟﻜﺘﺮﻭﻧﻴﺔ ﰲ ﺍﻟﺘﺸﺮﻳﻊ ﺍﳉﺰﺍﺋﺮﻱ‪ ،‬ﺍ‪‬ﻠﺔ ﺍﻟﻨﻘﺪﻳﺔ ﻟﻠﻘﺎﻧﻮﻥ‬
‫ﻭﺍﻟﻌﻠﻮﻡ ﺍﻟﺴﻴﺎﺳﻴﺔ‪،‬ﺍ‪‬ﻠﺪ ‪ ، 2‬ﺍﻟﻌﺪﺩ‪ ، 2‬ﺟﺎﻣﻌﺔ ﻣﻮﻟﻮﺩ ﻣﻌﻤﺮﻱ‪ -‬ﺗﻴﺰﻱ ﻭﺯﻭ‪ ،‬ﺍﳉﺰﺍﺋﺮ‪./11/15 ،‬‬
‫‪ ‬ﺣﺪﻱ ﻧﺴﻴﻤﺔ‪ :‬ﺟﺮﺍﺋﻢ ﺍﳌﺴﺎﺱ ﺑﺄﻧﻈﻤﺔ ﺍﳌﻌﺎﳉﺔ ﺍﻵﻟﻴﺔ ﻟﻠﻤﻌﻄﻴﺎﺕ‪ ،‬ﻣﺬﻛﺮﺓ ﻟﻨﻴﻞ ﺷﻬﺎﺩﺓ ﺍﳌﺎﺟﺴﺘﲑ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳉﻨﺎﺋﻲ‪ ،‬ﻛﻠﻴﺔ‬
‫ﺍﳊﻘﻮﻕ‪ ،‬ﺟﺎﻣﻌﺔ ﻭﻫﺮﺍﻥ‪ ،‬ﺍﳉﺰﺍﺋﺮ‪.2014/2013 ،‬‬
‫‪ ‬ﺧﺎﻟﺪ ﳑﺪﻭﺡ ﺇﺑﺮﺍﻫﻴﻢ‪ :‬ﺃﻣﻦ ﺍﳉﺮﳝﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‪ ،‬ﺍﻟﺪﺍﺭ ﺍﳉﺎﻣﻌﻴﺔ‪ ،‬ﻣﺼﺮ‪.2008 ،‬‬
‫‪59‬‬
‫ﻓﺘﻴﺤﺔ ﺑﻮﻫﺮﻳﻦ‬

،‫ ﻣﺼﺮ‬،‫ ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ‬،‫ ﺍﻟﺘﺰﺍﻡ ﺍﻟﺸﺎﻫﺪ ﻭﺍﻹﻋﻼﻡ ﰲ ﺍﳉﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ ﺩﺭﺍﺳﺔ ﻣﻘﺎﺭﻧﺔ‬:‫ ﺩﻫﻼﱄ ﻋﺒﺪ ﺍﻹﻟﻪ ﺃﲪﺪ‬
.1997
،‫ ﻣﺼﺮ‬،‫ ﺍﻟﻄﺒﻌﺔ ﺍﻟﺜﺎﻧﻴﺔ‬،‫ ﺩﺍﺭ ﺍﻟﻨﻬﻀﺔ ﺍﻟﻌﺮﺑﻴﺔ‬،‫ﺎ ﻋﻠﻰ ﻗﺎﻧﻮﻥ ﺍﻟﻌﻘﻮﺑﺎﺕ‬‫ ﺛﻮﺭﺓ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﻧﻌﻜﺎﺳﺎ‬: ‫ ﳏﻤﺪ ﺳﺎﻣﻲ ﺍﻟﺸﻮﺍ‬
.‫ﻁ‬.‫ﺱ‬.‫ﺏ‬
http://www.univ- (‫ﺍﳋﻂ‬ ‫)ﻋﻠﻰ‬ ‫ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‬ ‫ﺍﳉﺮﳝﺔ‬ :‫ﺑﻮﻧﻌﺎﺭﺓ‬ ‫ ﻳﺎﲰﻴﻨﺔ‬
‫ﺍﻻﻃﻼﻉ‬ ‫ﺗﺎﺭﻳﺦ‬ emir.dz/download/madjala-oussoul/39bounara-yasmina.pdf.
2018/9/15
 Liang jianshez : griminalité informatique, rapport de stage de
l’informatique, école national des l’informatiques et des bibiotheque, France,
1999.
PARKER Donn: finding computer crime a new frame work for protecting
information, wetly, Canada, 1998.

60

You might also like