CONSENT SEARCHES AND SEIZURES IN EENVIRONMENT AND THE CONSEQENCES OF COVERTLY OBTAINED EVIDENCE UNDER CAMEROONIAN LAW
Keywords:
Consent, electronic, CameroonAbstract
Given the huge amount of information stored on computers and archived in documentary records, the potential for governmental abuse is deeply troubling. This article evaluates Consent electronic searches and seizures under the Cameroonian law and the consequences of covertly gathered evidence . Information gathered from books, journals, and internet, together with consultation and observations on the subject reveal that advances in technology and the use of lengthy, legalistic privacy policies have too often served to make consent nothing more than illusory. Given that reasonable consent is an essential element for the collection, use and disclosure of personal information,. this article proposes consent should remain central, but flexible to breathe life into the conventional ways in which consent is obtained under Cameroon’s Conventional laws. The alternative standard of macro reasonableness for consensual searches is going to balance the interests of law enforcement against individual liberty and privacy . The article provides a blueprint for a workable, comprehensive mechanism for consent search and seizures in the digital environment.
Downloads
References
i Easttom C. Computer Crime Investigation and the Law. Oxford University Press (2010) .225-230.
ii Walden, I.) Computer Crimes and Digital Investigations, Oxford: Oxford University Press (2007) at
.112
iii Note section 94 of the Criminal Procedure Code .
iv
Pollitt, M ‘’Digital Evidence in Internet Time’’, in R. Broadhurst (Ed.) Bridging
the Gap: A Global Alliance on Transnational Organised Crime, Hong Kong Police:
Printing Department HKSAR 32. (2003) at1332-325
v
ibid
vi Patricia Asongwe “Cyber security and Challenges of Cyber criminality: Response, Strengths and
Weaknesses of Cameroonian Law” Ph .D Dissertation, University of Yaounde II, (Yaounde, 2017)
at 421
vii The Constitution of 1996 as amended and supplemented by Law No2008/001 of 14 April 2008
viiiDibussi Tande 4”Can Cameroon’s New Criminal Procedure Code Deliver”Justice with a Human
face”? Africa, Cameroon, Justice, (2007)
ix Law No 2005/007 of 27 July 2005 on the Criminal Procedure Code of 2005
x
Section 2
xi BCA/36/78, chief Forbah Mac-Donnal Sama v; The People. Unreported decision of the court of
Bqmenda Court of Appeql on the 4th of January 1979
xii Chimicokpu V. Commissioner of Police 1959 N.R.I.L.R. 1 at page 6
xiii
Asongwe P; supra note 6 at 456
xiv
ibid
xv This is the approach taken in computer crime legislation. See for example, t
xvi ibid
xvii Secton 94 of the Criminal Procedure Code
xviii
Michael Yanou; “ Criminal Law and Procedure in Cameroon.’ Yanou LAW Series 2012 at .225
xix75 L.Ed. 374 (1931)
xx United States V. Office Known as 50 State Distrib., 708 F.2d 1371 (9th Cir.1983), Cert. denied, 79Led
2d677 (1984).
xxi
Yanou M; supra note 18 at .229
xxiiKings v. State ex rel Murdock Acceptance Corporation, 222 So . 2d 395, 398 (1969)
xxiii Yanou M.note 18 at 228
xxiv708 F.2d 1371 (9th Cir.1983), Cert. denied, 79Led 2d677 (1984).
xxv
Dibssi Tande supra note 8
xxviIbid
xxvii
See the principle of vicarious liability. However, this principle will hold only when the investigator
is acting within authority and in course of his duty.
xxviii
Conly C; “Organising For Computer Crimes Investigation and Prosecution” .Washington D.C.
U.S Department of Justice. National institute of Justice (1989) at 166-176
xxix
Asongwe p; supra note 6 at 465
xxx
ibid .
xxxi Ibid at 483
xxxii ibid
xxxiii731 F.2d 1125 (4th Cir. 1994), cert. denied, 86 L Ed2d 130 (1994).
xxxiv Ker v. C. 831 F.2d 1125 (1997) This rule also applies where the marriage is polygamous
xxxvThe provision of maturity varies from one country to another.
xxxvi Arkin S Prevention and Prosecution of computer and Highway technology crimes New York NY
Mathew Bender Books 77, 1(1989). At 120-124
xxxvii Ibid at 125
xxxviii452 U.S.692, 703 (1981)
xxxixJackson, M. Keeping Secret: International Developments to Protect Undisclosed Business
Information and Trade Secretes. In Thomas D and Loader B (Eds.), Cyber Crime: Law Enforcement,
Security and Surveillance in The Information Age New York: Routledge (2000). at 153-173
xl Ibid at 190
xli ibid
xlii Coleman C. Supra note 28 al..155
xliii ibid
xliv774F.2d 402, 407 (1985)
xlv O'Hara. C et al ; Fundamentals of Criminal Investigation 6th ed. ISBN 0-398-05889- (1994) at.345
xlvi
. Grabosky, P. Electronic Crime, New Jersey: Prentice Hall (2006) at 235-236
xlvii Marc D “Why The Police Don’t Care About Computer Crime”Harvard Journal of Law and
Technology .(1997)at 465.
xlviii ibid
xlixKatayer K; ’’Digital architecture as crime control’’.Yale Law Journal, .(2003).at 112- 116
l Casey, G Digital Evidence and Computer Crime . St. Louis, MO: Elsevier Press.Georgia E (2004) at
187-185.
li
Note section 4 of the Criminal Procedure Code
lii
Kerr O “Searches And Seizures In A Digital World” George Washington University Law School
Journal (2006) at 300-302
liii See section 42 of the Cyber Code
liv ibid Section 43
lv Ibid Section 44. (1)
lvi Sarkar, M. C. (2001) Sarkar on Evidence, 15th Ed, Nagpur, Wadhwa & Company,. Vol.I and Vol.II
.Sweet & Maxwell at . 337
lvi Walden, I. (2007) Computer Crimes and Digital Investigations, Oxford: Oxford University
Press.PP.233-236
lvii Yanou M. supra note 18 at 230
lviii ibid
lix ibid
lx Article 3 of the European Convention on Human Rights
lxi Asongwe P supra note 6 at 480
lxii
Section 65 of the Cyber Code outlaws unauthorized and intentional interception computer data,
including electromagnetic emissions, to, from or within a computer system, by technical means.
lxiii See sections 34 and 40 of the Cyber Code
lxiv Kerr O:“Computer Records and the Federal Rules of Evidence” USA Bulletin.
lxv
Asongwe P .supra note 6 at 405-407
lxvi Yanou M ; supra note 18 at 270
lxvii Blume P “Data Protection” International Review of Computer Law Computers & Technology 2nd
ed (1997) at .98
lxvii Ibid See also Ndifiembeu B. A Handboook On The Criminal Procedure Code of the Republic Of
Cameroon unpublished (2006)
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
License Terms
Ownership and Licensing:
Authors of research papers submitted to any journal published by The Law Brigade Publishers retain the copyright of their work while granting the journal specific rights. Authors maintain ownership of the copyright and grant the journal the right of first publication. Simultaneously, authors agree to license their research papers under the Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) License.
License Permissions:
Under the CC BY-SA 4.0 License, others are permitted to share and adapt the work, even for commercial purposes, provided that appropriate attribution is given to the authors, and acknowledgment is made of the initial publication by The Law Brigade Publishers. This license encourages the broad dissemination and reuse of research papers while ensuring that the original work is properly credited.
Additional Distribution Arrangements:
Authors are free to enter into separate, non-exclusive contractual arrangements for distributing the published version of the work (e.g., posting it to institutional repositories or publishing it in books), provided that the original publication by The Law Brigade Publishers is acknowledged.
Online Posting:
Authors are encouraged to share their work online (e.g., in institutional repositories or on personal websites) both prior to submission and after publication. This practice can facilitate productive exchanges and increase the visibility and citation of the work.
Responsibility and Liability:
Authors are responsible for ensuring that their submitted research papers do not infringe on the copyright, privacy, or other rights of third parties. The Law Brigade Publishers disclaims any liability for any copyright infringement or violation of third-party rights within the submitted research papers.