{"id":197537,"date":"2023-04-19T12:04:47","date_gmt":"2023-04-19T10:04:47","guid":{"rendered":"https:\/\/www.ucly.fr\/?page_id=197537"},"modified":"2026-03-13T10:56:28","modified_gmt":"2026-03-13T09:56:28","slug":"cybercrime","status":"publish","type":"page","link":"https:\/\/www.ucly.fr\/en\/cybercrime\/","title":{"rendered":"<strong>Cybercrime<\/strong>"},"content":{"rendered":"<p>Have you ever wondered what would happen if your personal data was stolen? Not only your friends\u2019 contacts, but also your bank account details? Can we steal data? This module centres on the challenges that the use of computer technology and the Internet create for the substantive criminal law.&nbsp;<\/p><p>Criminal law is primarily rooted in national legal systems; accordingly, this course concentrates on offences and principles of liability under English criminal law, while situating them within their broader international context. Given that cybercrime transcends national borders, many of the key themes are examined with reference to the international frameworks governing this field, in particular the&nbsp;Convention on Cybercrime, the&nbsp;UN Cybercrime Convention, and&nbsp;Directive 2013\/40\/EU. Students will also have the opportunity to explore a different jurisdiction of their choice through the mid-term assessment. In some seminars, options are given to also look at French criminal law.<\/p>","protected":false},"excerpt":{"rendered":"<p>Have you ever wondered what would happen if your personal data was stolen? Not only your friends\u2019 contacts, but also your bank account details? [&hellip;]<\/p>\n","protected":false},"author":151,"featured_media":0,"parent":0,"menu_order":8,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-197537","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybercrime - UCLy<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ucly.fr\/en\/cybercrime\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercrime - UCLy\" \/>\n<meta property=\"og:description\" content=\"Have you ever wondered what would happen if your personal data was stolen? Not only your friends\u2019 contacts, but also your bank account details? [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ucly.fr\/en\/cybercrime\/\" \/>\n<meta property=\"og:site_name\" content=\"UCLy\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-13T09:56:28+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ucly.fr\/en\/cybercrime\/\",\"url\":\"https:\/\/www.ucly.fr\/en\/cybercrime\/\",\"name\":\"Cybercrime - UCLy\",\"isPartOf\":{\"@id\":\"https:\/\/www.ucly.fr\/en\/#website\"},\"datePublished\":\"2023-04-19T10:04:47+00:00\",\"dateModified\":\"2026-03-13T09:56:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ucly.fr\/en\/cybercrime\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ucly.fr\/en\/cybercrime\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ucly.fr\/en\/cybercrime\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.ucly.fr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercrime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ucly.fr\/en\/#website\",\"url\":\"https:\/\/www.ucly.fr\/en\/\",\"name\":\"UCLy\",\"description\":\"Un site utilisant WordPress\",\"publisher\":{\"@id\":\"https:\/\/www.ucly.fr\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ucly.fr\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ucly.fr\/en\/#organization\",\"name\":\"UCLy\",\"url\":\"https:\/\/www.ucly.fr\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ucly.fr\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ucly.fr\/wp-content\/uploads\/2025\/06\/logo-150ans-blanc.svg\",\"contentUrl\":\"https:\/\/www.ucly.fr\/wp-content\/uploads\/2025\/06\/logo-150ans-blanc.svg\",\"caption\":\"UCLy\"},\"image\":{\"@id\":\"https:\/\/www.ucly.fr\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercrime - UCLy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ucly.fr\/en\/cybercrime\/","og_locale":"en_US","og_type":"article","og_title":"Cybercrime - UCLy","og_description":"Have you ever wondered what would happen if your personal data was stolen? Not only your friends\u2019 contacts, but also your bank account details? [&hellip;]","og_url":"https:\/\/www.ucly.fr\/en\/cybercrime\/","og_site_name":"UCLy","article_modified_time":"2026-03-13T09:56:28+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ucly.fr\/en\/cybercrime\/","url":"https:\/\/www.ucly.fr\/en\/cybercrime\/","name":"Cybercrime - UCLy","isPartOf":{"@id":"https:\/\/www.ucly.fr\/en\/#website"},"datePublished":"2023-04-19T10:04:47+00:00","dateModified":"2026-03-13T09:56:28+00:00","breadcrumb":{"@id":"https:\/\/www.ucly.fr\/en\/cybercrime\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ucly.fr\/en\/cybercrime\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ucly.fr\/en\/cybercrime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.ucly.fr\/en\/"},{"@type":"ListItem","position":2,"name":"Cybercrime"}]},{"@type":"WebSite","@id":"https:\/\/www.ucly.fr\/en\/#website","url":"https:\/\/www.ucly.fr\/en\/","name":"UCLy","description":"Un site utilisant WordPress","publisher":{"@id":"https:\/\/www.ucly.fr\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ucly.fr\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ucly.fr\/en\/#organization","name":"UCLy","url":"https:\/\/www.ucly.fr\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ucly.fr\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ucly.fr\/wp-content\/uploads\/2025\/06\/logo-150ans-blanc.svg","contentUrl":"https:\/\/www.ucly.fr\/wp-content\/uploads\/2025\/06\/logo-150ans-blanc.svg","caption":"UCLy"},"image":{"@id":"https:\/\/www.ucly.fr\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.ucly.fr\/en\/wp-json\/wp\/v2\/pages\/197537","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ucly.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ucly.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ucly.fr\/en\/wp-json\/wp\/v2\/users\/151"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ucly.fr\/en\/wp-json\/wp\/v2\/comments?post=197537"}],"version-history":[{"count":2,"href":"https:\/\/www.ucly.fr\/en\/wp-json\/wp\/v2\/pages\/197537\/revisions"}],"predecessor-version":[{"id":432135,"href":"https:\/\/www.ucly.fr\/en\/wp-json\/wp\/v2\/pages\/197537\/revisions\/432135"}],"wp:attachment":[{"href":"https:\/\/www.ucly.fr\/en\/wp-json\/wp\/v2\/media?parent=197537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}