<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">bricslawjournal</journal-id><journal-title-group><journal-title xml:lang="en">BRICS Law Journal</journal-title><trans-title-group xml:lang="ru"><trans-title>Юридический журнал БРИКС</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">2409-9058</issn><issn pub-type="epub">2412-2343</issn><publisher><publisher-name>Publishing House V.Ема</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.21684/2412-2343-2023-10-1-88-108</article-id><article-id custom-type="elpub" pub-id-type="custom">bricslawjournal-767</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>ARTICLE</subject></subj-group></article-categories><title-group><article-title>The Features of the Use of Information Technologies in Criminal Proceedings in the BRICS Countries</article-title><trans-title-group xml:lang="ru"><trans-title></trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="western" xml:lang="en"><surname>Dmitrieva</surname><given-names>A.</given-names></name></name-alternatives><bio xml:lang="en"><p>Anna Dmitrieva (Chelyabinsk, Russia) – Head, Department of Criminal andPenitentiary Law, Criminology</p><p>87 Lenina Ave., Chelyabinsk, 454080</p></bio><email xlink:type="simple">dmitrievaaa@susu.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="western" xml:lang="en"><surname>Alshdaifat</surname><given-names>Sh.</given-names></name></name-alternatives><bio xml:lang="en"><p>Shadi Alshdaifat (Sharjah, UAE) – Associate Professor of Public International Law, College of Law</p></bio><email xlink:type="simple">salshdaifat@sharjah.ac.ae</email><xref ref-type="aff" rid="aff-2"/></contrib><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="western" xml:lang="en"><surname>Pastukhov</surname><given-names>P.</given-names></name></name-alternatives><bio xml:lang="en"><p>Pavel Pastukhov (Perm, Russia) – Professor of Criminal Procedure and Criminalistics; Professor of Public Law, Faculty of Extra BudgetaryEducation</p><p>Bukireva St., Perm, 614990</p></bio><email xlink:type="simple">pps64@mail.ru</email><xref ref-type="aff" rid="aff-3"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="en">South Ural State University (National Research University)<country>Russian Federation</country></aff></aff-alternatives><aff-alternatives id="aff-2"><aff xml:lang="en">University of Sharjah<country>United Arab Emirates</country></aff></aff-alternatives><aff-alternatives id="aff-3"><aff xml:lang="en">Perm Institute of the Federal Penal Service<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2023</year></pub-date><pub-date pub-type="epub"><day>19</day><month>04</month><year>2023</year></pub-date><volume>10</volume><issue>1</issue><fpage>88</fpage><lpage>108</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Dmitrieva A., Alshdaifat S., Pastukhov P., 2023</copyright-statement><copyright-year>2023</copyright-year><copyright-holder xml:lang="ru">Dmitrieva A., Alshdaifat S., Pastukhov P.</copyright-holder><copyright-holder xml:lang="en">Dmitrieva A., Alshdaifat S., Pastukhov P.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://www.bricslawjournal.com/jour/article/view/767">https://www.bricslawjournal.com/jour/article/view/767</self-uri><abstract><p>This article analyzes the information and technological advancements made by the BRICS countries in the field of criminal proceedings, specifically in the process of gathering evidence in criminal investigations. The relevance of the research topic is explained by the widespread proliferation of computer-related crimes and other crimes committed using computer technologies. With the increase in cybercrime, the number of digital traces left behind by criminal activity is also increasing. This calls for the development of a new approach for detecting, recording, erasing and investigating these digital traces. Given the transnational and cross-border nature of cybercrime, it is necessary to pursue a policy of interaction among the law enforcement agencies of the BRICS countries in order to effectively provide legal assistance in criminal cases, preserve the electronic data obtained from users of information and telecommunications systems and transfer the data to interested countries upon request. This will aid in the formation of a regulatory framework for the information technology sector that meets modern challenges and requirements. Additionally, it is critical to borrow best practices in order to harmonize the criminal and criminal procedure legislation of the BRICS countries, as coordinated activities will ensure closer cooperation between the countries in the socio-economic and cultural spheres, allowing for the achievement of greater results in these areas. Furthermore, the article demonstrates a new approach to the study of the comparative legal nature of the various legal systems in the BRICS countries. The conclusion reached is that the harmonization of criminal procedure systems essentially comes down to the detection of electronic data, the recording of that data in electronic form, the storage of case materials and the submission of those materials to the court in electronic form. The legal consolidation of these steps will make it possible to introduce electronic document management, thereby enabling the optimization of criminal procedure activities, the objective recording of evidentiary information and the assurance of savings in material and procedural costs associated with criminal proceedings.</p></abstract><kwd-group xml:lang="en"><kwd>BRICS</kwd><kwd>criminal procedure</kwd><kwd>information technology</kwd><kwd>information technology</kwd><kwd>harmonization of legislation</kwd><kwd>electronic document management</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Akcali Gur B. Cybersecurity, European Digital Sovereignty and the 5G Rollout Crisis, 46 Computer Law &amp; Security Review (Article 105736) (2022). https://doi.org/10.1016/j.clsr.2022.105736</mixed-citation><mixed-citation xml:lang="en">Akcali Gur B. Cybersecurity, European Digital Sovereignty and the 5G Rollout Crisis, 46 Computer Law &amp; Security Review (Article 105736) (2022). https://doi.org/10.1016/j.clsr.2022.105736</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Begishev I.R. Limits of Criminal Law Regulation of Robotics, 12(3) Vestnik of Saint Petersburg University. Law 522 (2021). https://doi.org/10.21638/spbu14.2021.303</mixed-citation><mixed-citation xml:lang="en">Begishev I.R. Limits of Criminal Law Regulation of Robotics, 12(3) Vestnik of Saint Petersburg University. Law 522 (2021). https://doi.org/10.21638/spbu14.2021.303</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Bokovnya A.Yu. et al. Analysis of Russian Judicial Practice in Cases of Information Security, 13(12) International Journal of Engineering Research and Technology (Article 4602) (2020).</mixed-citation><mixed-citation xml:lang="en">Bokovnya A.Yu. et al. Analysis of Russian Judicial Practice in Cases of Information Security, 13(12) International Journal of Engineering Research and Technology (Article 4602) (2020).</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Chen X. &amp; Gao X. Analysing the EU’s Collective Securitisation Moves Towards China, 2(20) Asia Europe Journal 195 (2022). https://doi.org/10.1007/s10308-021-00640-4</mixed-citation><mixed-citation xml:lang="en">Chen X. &amp; Gao X. Analysing the EU’s Collective Securitisation Moves Towards China, 2(20) Asia Europe Journal 195 (2022). https://doi.org/10.1007/s10308-021-00640-4</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Chen Yu. Legal Rules for the Use of Electronic Search and Arrest Data, 36(5) Modern Law 111 (2014).</mixed-citation><mixed-citation xml:lang="en">Chen Yu. Legal Rules for the Use of Electronic Search and Arrest Data, 36(5) Modern Law 111 (2014).</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Dai Sh. &amp; Liu J. Guidelines for the Study of Electronic Evidence (2014).</mixed-citation><mixed-citation xml:lang="en">Dai Sh. &amp; Liu J. Guidelines for the Study of Electronic Evidence (2014).</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Fan Ch. &amp; Li S. On the Rules of Using Electronic Evidence in Criminal Proceedings in China (2016).</mixed-citation><mixed-citation xml:lang="en">Fan Ch. &amp; Li S. On the Rules of Using Electronic Evidence in Criminal Proceedings in China (2016).</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Fonseca R.S. &amp; van Wyk J.-A. Cybersecurity in South Africa: Status, Governance, and Prospects, 4 Routledge Companion to Global Cyber-Security Strategy 591 (2021). https://doi.org/10.4324/9780429399718-50</mixed-citation><mixed-citation xml:lang="en">Fonseca R.S. &amp; van Wyk J.-A. Cybersecurity in South Africa: Status, Governance, and Prospects, 4 Routledge Companion to Global Cyber-Security Strategy 591 (2021). https://doi.org/10.4324/9780429399718-50</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Gorian E. Genesis of Data Security Mechanism in China: The Next Step to Data Nationalism, 8(2) China and WTO Review 255 (2022). https://doi.org/10.14330/cwr.2022.8.2.02</mixed-citation><mixed-citation xml:lang="en">Gorian E. Genesis of Data Security Mechanism in China: The Next Step to Data Nationalism, 8(2) China and WTO Review 255 (2022). https://doi.org/10.14330/cwr.2022.8.2.02</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Shutova A.A. et al. Legal Measures for Crimes in the Field of Cryptocurrency Billing, 7(25) Utopia y Praxis Latinoamericana 270 (2020).</mixed-citation><mixed-citation xml:lang="en">Shutova A.A. et al. Legal Measures for Crimes in the Field of Cryptocurrency Billing, 7(25) Utopia y Praxis Latinoamericana 270 (2020).</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Townsend B. The Lawful Sharing of Health Research Data in South Africa and Beyond, 1(31) Information and Communications Technology Law 17 (2022). https:// doi.org/10.1080/13600834.2021.1918905</mixed-citation><mixed-citation xml:lang="en">Townsend B. The Lawful Sharing of Health Research Data in South Africa and Beyond, 1(31) Information and Communications Technology Law 17 (2022). https:// doi.org/10.1080/13600834.2021.1918905</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Yuan I. Problems of Considering Evidence under the New CPC of the People’s Republic of China, 3 Socio-Political Sciences 137 (2017).</mixed-citation><mixed-citation xml:lang="en">Yuan I. Problems of Considering Evidence under the New CPC of the People’s Republic of China, 3 Socio-Political Sciences 137 (2017).</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
