CONSENT SEARCHES AND SEIZURES IN EENVIRONMENT AND THE CONSEQENCES OF COVERTLY OBTAINED EVIDENCE UNDER CAMEROONIAN LAW

Authors

  • Patricia Asongwe Ngeminang Author

Keywords:

Consent, electronic, Cameroon

Abstract

Given the huge amount of information stored on computers and archived in documentary records, the potential for governmental abuse is deeply troubling. This article evaluates Consent electronic searches and seizures under the Cameroonian law and the consequences of covertly gathered evidence . Information gathered from books, journals, and internet, together with consultation and observations on the subject reveal that advances in technology and the use of lengthy, legalistic privacy policies have too often served to make consent nothing more than illusory. Given that reasonable consent is an essential element for the collection, use and disclosure of personal information,. this article proposes consent should remain central, but flexible to breathe life into the conventional ways in which consent is obtained under Cameroon’s Conventional laws. The alternative standard of macro reasonableness for consensual searches is going to balance the interests of law enforcement against individual liberty and privacy . The article provides a blueprint for a workable, comprehensive mechanism for consent search and seizures in the digital environment.

Downloads

Download data is not yet available.

References

i Easttom C. Computer Crime Investigation and the Law. Oxford University Press (2010) .225-230.

ii Walden, I.) Computer Crimes and Digital Investigations, Oxford: Oxford University Press (2007) at

.112

iii Note section 94 of the Criminal Procedure Code .

iv

Pollitt, M ‘’Digital Evidence in Internet Time’’, in R. Broadhurst (Ed.) Bridging

the Gap: A Global Alliance on Transnational Organised Crime, Hong Kong Police:

Printing Department HKSAR 32. (2003) at1332-325

v

ibid

vi Patricia Asongwe “Cyber security and Challenges of Cyber criminality: Response, Strengths and

Weaknesses of Cameroonian Law” Ph .D Dissertation, University of Yaounde II, (Yaounde, 2017)

at 421

vii The Constitution of 1996 as amended and supplemented by Law No2008/001 of 14 April 2008

viiiDibussi Tande 4”Can Cameroon’s New Criminal Procedure Code Deliver”Justice with a Human

face”? Africa, Cameroon, Justice, (2007)

ix Law No 2005/007 of 27 July 2005 on the Criminal Procedure Code of 2005

x

Section 2

xi BCA/36/78, chief Forbah Mac-Donnal Sama v; The People. Unreported decision of the court of

Bqmenda Court of Appeql on the 4th of January 1979

xii Chimicokpu V. Commissioner of Police 1959 N.R.I.L.R. 1 at page 6

xiii

Asongwe P; supra note 6 at 456

xiv

ibid

xv This is the approach taken in computer crime legislation. See for example, t

xvi ibid

xvii Secton 94 of the Criminal Procedure Code

xviii

Michael Yanou; “ Criminal Law and Procedure in Cameroon.’ Yanou LAW Series 2012 at .225

xix75 L.Ed. 374 (1931)

xx United States V. Office Known as 50 State Distrib., 708 F.2d 1371 (9th Cir.1983), Cert. denied, 79Led

2d677 (1984).

xxi

Yanou M; supra note 18 at .229

xxiiKings v. State ex rel Murdock Acceptance Corporation, 222 So . 2d 395, 398 (1969)

xxiii Yanou M.note 18 at 228

xxiv708 F.2d 1371 (9th Cir.1983), Cert. denied, 79Led 2d677 (1984).

xxv

Dibssi Tande supra note 8

xxviIbid

xxvii

See the principle of vicarious liability. However, this principle will hold only when the investigator

is acting within authority and in course of his duty.

xxviii

Conly C; “Organising For Computer Crimes Investigation and Prosecution” .Washington D.C.

U.S Department of Justice. National institute of Justice (1989) at 166-176

xxix

Asongwe p; supra note 6 at 465

xxx

ibid .

xxxi Ibid at 483

xxxii ibid

xxxiii731 F.2d 1125 (4th Cir. 1994), cert. denied, 86 L Ed2d 130 (1994).

xxxiv Ker v. C. 831 F.2d 1125 (1997) This rule also applies where the marriage is polygamous

xxxvThe provision of maturity varies from one country to another.

xxxvi Arkin S Prevention and Prosecution of computer and Highway technology crimes New York NY

Mathew Bender Books 77, 1(1989). At 120-124

xxxvii Ibid at 125

xxxviii452 U.S.692, 703 (1981)

xxxixJackson, M. Keeping Secret: International Developments to Protect Undisclosed Business

Information and Trade Secretes. In Thomas D and Loader B (Eds.), Cyber Crime: Law Enforcement,

Security and Surveillance in The Information Age New York: Routledge (2000). at 153-173

xl Ibid at 190

xli ibid

xlii Coleman C. Supra note 28 al..155

xliii ibid

xliv774F.2d 402, 407 (1985)

xlv O'Hara. C et al ; Fundamentals of Criminal Investigation 6th ed. ISBN 0-398-05889- (1994) at.345

xlvi

. Grabosky, P. Electronic Crime, New Jersey: Prentice Hall (2006) at 235-236

xlvii Marc D “Why The Police Don’t Care About Computer Crime”Harvard Journal of Law and

Technology .(1997)at 465.

xlviii ibid

xlixKatayer K; ’’Digital architecture as crime control’’.Yale Law Journal, .(2003).at 112- 116

l Casey, G Digital Evidence and Computer Crime . St. Louis, MO: Elsevier Press.Georgia E (2004) at

187-185.

li

Note section 4 of the Criminal Procedure Code

lii

Kerr O “Searches And Seizures In A Digital World” George Washington University Law School

Journal (2006) at 300-302

liii See section 42 of the Cyber Code

liv ibid Section 43

lv Ibid Section 44. (1)

lvi Sarkar, M. C. (2001) Sarkar on Evidence, 15th Ed, Nagpur, Wadhwa & Company,. Vol.I and Vol.II

.Sweet & Maxwell at . 337

lvi Walden, I. (2007) Computer Crimes and Digital Investigations, Oxford: Oxford University

Press.PP.233-236

lvii Yanou M. supra note 18 at 230

lviii ibid

lix ibid

lx Article 3 of the European Convention on Human Rights

lxi Asongwe P supra note 6 at 480

lxii

Section 65 of the Cyber Code outlaws unauthorized and intentional interception computer data,

including electromagnetic emissions, to, from or within a computer system, by technical means.

lxiii See sections 34 and 40 of the Cyber Code

lxiv Kerr O:“Computer Records and the Federal Rules of Evidence” USA Bulletin.

lxv

Asongwe P .supra note 6 at 405-407

lxvi Yanou M ; supra note 18 at 270

lxvii Blume P “Data Protection” International Review of Computer Law Computers & Technology 2nd

ed (1997) at .98

lxvii Ibid See also Ndifiembeu B. A Handboook On The Criminal Procedure Code of the Republic Of

Cameroon unpublished (2006)

Downloads

Published

09-09-2019

How to Cite

CONSENT SEARCHES AND SEIZURES IN EENVIRONMENT AND THE CONSEQENCES OF COVERTLY OBTAINED EVIDENCE UNDER CAMEROONIAN LAW. (2019). Commonwealth Law Review Journal, 5, 437-462. https://journal.thelawbrigade.com/clrj/article/view/386

Similar Articles

1-10 of 30

You may also start an advanced similarity search for this article.