Effect of cybercrime laws on protecting citizens and businesses in the United Arab Emirates (UAE)

The purpose of this paper is to explore the extent to which cybercrime laws protect citizens and businesses in the United Arab Emirates (UAE). Pertinent questions over the lax regulatory environment and incomprehensible cybersecurity policies have influenced the discussions.,This paper will first offer a global outlook of cybersecurity laws and legislation. The global outlook will present the basis for examining best practices that the UAE could emulate. The paper will then examine the legislative landscape of cyber laws in the UAE, including cross-country comparisons. The comparisons are critical, as the country’s cybercrime laws are in their infancy phase.,The UAE has taken decisive and proactive measures to deter the threat of cybercrimes and cyberattacks. The UAE strategy comprehensive strategy has been effective in protecting the economy and populations from the adverse effects of cybercrimes. The success lies in the enactment of comprehensive and streamlines laws and regulations with harsher penalties. The stringent legal measures, including longer jail terms, stiffer fines and deportation of foreigners, have ensured robust deterrence to cybercriminals.,The analysis has shown that the UAE has a higher score of preparedness against cybercrimes and cyberattacks. The UAE has specifically crafted a broader and effective legislative framework of cybercrime laws. Although the UAE has comprehensive cybercrime laws, the remarkable level of technological advances in the country makes citizens and businesses lucrative targets. The UAE now has the burden of doubling down its legal efforts to deter emerging cybersecurity risks.

[1]  UAE‘s Strategy Towards Most Cyber Resilient Nation , 2019, International Journal of Innovative Technology and Exploring Engineering.

[2]  Joyce Hakmeh Cybercrime Legislation in the GCC Countries: Fit for Purpose? , 2018 .

[3]  Amala V. Rajan,et al.  UAE cybercrime law and cybercrimes — An analysis , 2017, 2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security).

[4]  Oren Soffer,et al.  To Post or not to Post? , 2017 .

[5]  Peter Brophy,et al.  Developments in the UK , 2002 .

[6]  Abdulla Al Neaimi,et al.  A CRITICAL ANALYSIS OF THE EFFECTIVENESS OF CYBER SECURITY DEFENSES IN UAE GOVERNMENT AGENCIES , 2014 .