:::

詳目顯示

回上一頁
題名:電磁紀錄無權取得行為之刑法規範
書刊名:國立中正大學法學集刊
作者:蔡蕙芳 引用關係
作者(外文):Tsai, Hui-fang
出版日期:2003
卷期:13
頁次:頁97-196
主題關鍵詞:電磁紀錄電腦資料電腦資訊無體財產竊盜罪不法所有之意圖不法利益之意圖營業秘密電腦程式軟體個人資料敏感性資訊網路連線遊戲智慧財產權犯罪未獲授權之資料存取Electronic recordsComputer dataComputer informationIntangible propertyTheft offenseIntent to deprive possessionIntent to deprive valueTrade secretProgram softwarePersonal dataSensitive informationWeb gamesOffenses against intellectual propertyUnauthorized access
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(5) 博士論文(1) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:5
  • 共同引用共同引用:135
  • 點閱點閱:28
傳統上,由於對竊盜罪採取狹義解釋,使得無法對在未剝奪持有下取得無體性電磁紀錄之行為論以竊盜罪。有鑑於此,立法者決定擴張竊盜罪範園,使之能涵蓋電磁紀錄之無權取得行為,而在一九九七年十一月正式通過刑法第三百二十三條電磁紀錄竊盜罪。然而,這項立法已經被今年六月剛通過的刑法第三百五十九條無故取得、更動電磁紀錄罪所取代。從此可知,立法者希望能制定新的刑法來保護電磁紀錄,以防止被無權取得。本文主要目的即是在研究與電磁紀錄無權取得有關新舊立法例之解釋與適用上問題,並試圖指出新舊立法例之變化軌跡。 本文之第二部分主要在檢討舊電磁紀錄竊盜罪之性質與功能,並討論在資訊時代有價值電磁紀錄與資訊如何受到妥善的保護。接著,本文檢討竊盜罪中三個構成要件運用於電磁紀錄取得行為上所產生之困難,藉以說明電磁紀錄竊盜罪之立法由於構成要件結構上錯誤,使得電磁紀錄竊盜罪之立法並無法為電磁紀錄提供足夠之保護。第三部分將介紹以電腦保護為出發點之刑法第三百五十九條。除了說明本罪所保護之新法益之性質,還將從事構成要件之解釋典適用之討論。至於本文第四部分則是在討論其他典電磁紀錄無權取得行為有關之刑罰規範。最後,本文將簡略說明研究成果與一些在網際網路與刑法問題上個人思考。
The typical narrow interpretation of theft makes it difficult to prosecute the person who obtains intangible electronic records without taking them away. Recognizing this problem, the Legislature decided to broaden the scope of theft offense to include the obtaining of electronic records. Accordingly, the “theft of electronic records" offense under Article 323 came into force in December 1997. However, the enactment was replaced by the “unauthorized acquisition und modification" offense under Article 359 in June 2003. Congress has chosen to treat acquisition of computer data crimes as distinct offenses rather than simply amend existing law to incorporate new technologies. The Legislators have also revealed a strong policy of protection through a new provision. The primary purpose of this Article is to contribute to the discussions on the old and new legislations. Part II of this Article explores the nature and function of the “theft of electronic records" offense under Article 323. This part presents significant questions as to how valuable computer data and information can be best protected in an information age. Besides, three requirements of theft offense that are particularly problematic in the context of theft of computer data are discussed. This part demonstrates the “theft of electronic records" offense is structurally flawed. This part also argues that the legislation does not provide sufficient protection for computer data. Part III of this Article introduces the new legislation of Article 359 which is premised solely on computer-specific consideration. Part IV focuses on other types of offenses associated with or involving the act of obtaining computer data. Finally, the Article concludes with a summery of the conclusions and some reflections on the relationship between the internet and criminal law.
期刊論文
1.黃惠婷(20030400)。竊盜罪之所有意圖。臺灣本土法學雜誌,45,132-136。  延伸查詢new window
2.Nimmer, Raymond T.、Krauthaus, Patricia Ann(1992)。Information as a Commodity: New Imperatives of Commercial Law。Law and Contemporary Problems,55(3),103-130。  new window
3.Sokolik, Stanley L.(1980)。Computer Crime: The Need for Deterrent Legislation。Computer/Law Journal,2,353-383。  new window
4.Branscomb, Anne W.(1990)。Rogue Computer Programs and Computer Rogues: Tailoring the Punishment to Fit the Crime。Rutgers Computer & Technology Law Journal,16(1),1-61。  new window
5.Flaming, Todd H.(1993)。The National Stolen Property Act and Computer Files: A New Form of Property, a New Form of Theft。U Chi L Sch Roundtable,255,286-287。  new window
6.Hancock, Douglas H.(1997)。To What Extent Should Computer Related Crimes Be the Subject of Specific Legislative Attention?。Alb. L. J. Sci. & Tech.,12,97-105。  new window
7.Moohr, Geraldine Szott(2000)。Federal Criminal Fraud and the Development of Intangible Property Rights in Information。U. L. Rev.,111,683。  new window
8.Goodman, Marc D.、Brenner, Susan W.(2002)。The Emerging Consensus on Criminal Conduct in Cyberspace。UCLA J. L. Tech。  new window
9.Lipton, Jacqueline(1999)。Property Offences into the 21st Century。The Journal of Information, Law and Technology,1。  new window
10.Sieber, Ulrich(1992)。Computerkriminalität und andere Delikte im Bereich der Informationstechnik。ZStW,104-125。  new window
11.Heubel(1984)。Grundprobleme des Diebstahl Tatbestandes。Jus,445。  new window
12.Haft, Fritjof(1986)。Das Zweite Gesetz zur Bekämpfung der Wirtschaftskriminalität (2. WiKG)。NStZ,87,6。  new window
13.Lipton, Jacqueline(2001)。Protecting Valuable Commercial Information in the Digital Age: Law, Policy, and Practice。J. Tech. L. & Pol'y,6(1),1+3-4。  new window
14.林東茂(19980300)。詐欺罪的財產損害。中央警察大學法學論集,3,199-209。new window  延伸查詢new window
15.林東茂(19990400)。詐欺或竊盜--一個案例的檢討。刑事法雜誌,43(2),44-61。new window  延伸查詢new window
圖書
1.梁恆昌(199406)。刑法實例研究。五南圖書。  延伸查詢new window
2.Tröndle, Herbert、Fischer, Thomas(1999)。Strafgesetzbuch und Nebengesetze。München。  new window
3.Lenckner, Theodor(1981)。Computerkriminalität und Vermögensdelikte。Heidelberg:Karlsruhe。  new window
4.甘添貴(19990900)。體系刑法各論。甘添貴。  延伸查詢new window
5.Schönke, Adorf、Schröder, Horst(1999)。Strafgesetzbuch。München。  new window
6.Wasik, Martin(1991)。Crime and the Computer。Oxford:Clarendon Press。  new window
7.Wertheim, Margaret、薛絢(1999)。空間地圖:從但丁的空間到網路的空間。臺北:商務印書館。  延伸查詢new window
8.Gumsey, John(1996)。Copyright Theft。London:Asilib。  new window
9.Hull, John(1998)。Commercial Secrecy: Law and Practice。London:Sweet & Maxwell。  new window
10.Sieber, Ulrich(1992)。The International Emergence of Criminal Information Law。Köln:Berlin:Bonn:München:Carl Heymanns。  new window
11.Nimmer, Raymond T.(1997)。The Law of Computer Technology: Rights, Licenses, Liabilities。Boston:Warren Gorham Lamont。  new window
12.Reed, Chris(1993)。Computer Law。London:Blackstone。  new window
13.Sookman, Barry(1989)。Computer Law: Acquiring and Protecting Information Technology。Toronto:Carswell。  new window
14.Lackner, Karl(1995)。Strafgesetzbuch mit Erläuterungen。München。  new window
15.蔡墩銘(1993)。最高法院刑事判決研究。  延伸查詢new window
16.立法院秘書處(199602)。營業秘密法案--法律案專輯。立法院秘書處。  延伸查詢new window
17.許文義(199101)。個人資料保護法論。三民書局。  延伸查詢new window
18.于志剛(200101)。計算機犯罪疑難問題司法對策。吉林人民出版社。  延伸查詢new window
19.王澤鑑(200202)。民法物權。  延伸查詢new window
20.謝在全(1997)。民法物權論。  延伸查詢new window
21.Dressler, J.(1995)。Understanding criminal law。Lexis Pub。  new window
22.Hartmut, Schultz(1992)。Computerkriminalität。München。  new window
23.Lackner, Karl、Kühl, Kristian(1999)。Strafgesetzbuch, mit Erläuterungen。München。  new window
24.韓忠謨、吳景芳(200009)。刑法各論。臺北市:三民。  延伸查詢new window
25.蔡墩銘(1999)。刑法爭議問題研究。五南圖書出版有限公司。new window  延伸查詢new window
26.徐玉玲、徐火明(1993)。營業秘密的保護。台北:三民書局。  延伸查詢new window
27.謝銘洋、古清華、丁中原、張凱娜(1996)。營業秘密法解讀。月旦出版社股份有限公司。  延伸查詢new window
28.謝銘洋、陳家駿、馮震宇、陳逸南、蔡明誠(200103)。著作權法解讀。臺北:元照出版社。  延伸查詢new window
29.法務部保護司(198708)。電腦犯罪問題研討論實錄。法務通訊雜誌社。  延伸查詢new window
30.甘添貴(2000)。體系刑法各論第2卷--侵害個人非專屬法益之犯罪。臺北:甘添貴。  延伸查詢new window
31.林山田(2002)。刑法各罪論。臺北:林山田:臺大法學院圖書部。  延伸查詢new window
32.張清溪、許嘉棟、劉鶯釧、吳聰敏(1995)。經濟學:理論與實際。臺北:翰蘆圖書出版有限公司。  延伸查詢new window
33.馮震宇(19980000)。了解營業秘密法:營業秘密法的理論與實務。臺北:永然文化。new window  延伸查詢new window
34.林山田(2002)。刑法各罪論。林山田。  延伸查詢new window
35.黃榮堅(2000)。刑罰的極限。元照。  延伸查詢new window
36.謝銘洋(2001)。智慧財產權之基礎理論。台北:翰蘆。new window  延伸查詢new window
37.Sieber, U.(1980)。Computerkriminalität und Strafrecht。Berlin。  new window
38.Dreher, E.、Trondle, H.(1995)。Strafgesetzbuch und Nebengesetze。München。  new window
圖書論文
1.李茂生(199805)。資本、資訊與電腦犯罪。權力、主體與刑事法--法邊緣的論述。  延伸查詢new window
2.林東茂(199902)。詐欺罪的財產損害。刑法爭議問題研究。五南圖書出版有限公司。  延伸查詢new window
3.張麗卿(199902)。竊盗與搶奪的界線。刑法爭議問題研究。五南圖書出版有限公司。  延伸查詢new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
無相關點閱
 
QR Code
QRCODE