:::

詳目顯示

回上一頁
題名:Matrix駭客任務:刑法第358條入侵電腦罪
書刊名:科技法學評論
作者:蔡榮耕
作者(外文):Tsai, Rong-geng
出版日期:2008
卷期:5:1
頁次:頁103-134
主題關鍵詞:電腦犯罪入侵電腦刑法第358條聯邦電腦詐欺及濫用法無權使用電腦越權使用電腦Computer crimeIntrusion of computerArticle 358 of criminal lawThe computer fraud and abuse act of 1986Access a computer without authorizationOr exceeding authorized access
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(6) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:6
  • 共同引用共同引用:0
  • 點閱點閱:264
刑法第358條並沒有定義什麼是電腦。不過,這應該是正確的作法,因為實務可以因而有較大的彈性,以因應未來的科技發展。即便是要在法條中明文電腦的意義,也應該參考美國聯邦電腦詐欺及濫用防制法(CFAA)的規定,採取較為開放的定義。本文也建議刑法第358條的構成要件行為應修正為「無故入侵」電腦即為已足。至於「無故輸入他人帳號密碼」、「破解使用電腦之保護措施」或「利用電腦系統之漏洞」應屬蛇足的規定。「無故入侵」的解釋,可以參考美國聯邦電腦詐欺及濫用防制法(CFAA)中,關於「無(越)權使用」的規定及相關判決。
It is accurate for the legislature not to define what a computer is in article 358 because the absence of the definition makes it flexible for the law enforcement to respond the rapid technology development. The legislature ought to visit CFAA even thought it wants to give a definition. This article suggests that actus reus requirements of the current article 358 are improper. It is unnecessary to narrow down the actus reus requirement to inputting other's account and password, hacking the protecting measure of a computer, and making use of the hole of computer system. The proper actus reus requirement should be "accessing a computer without authorization, or exceeding authorized access." When interpreting and applying, we could refer to CFAA and the judicial decisions thereof.
期刊論文
1.Kerr, Orin S.(2003)。Cybercrime’s Scope: Interpreting “Access” and “Authorization” in Computer Misuse Statutes。N.Y.U. L. REV.,78,1596。  new window
2.柯耀程(2003)。刑法新增「電腦網路犯罪規範」立法評論。月旦法學教室,11,117-129。  延伸查詢new window
3.李茂生(20040100)。刑法新修妨害電腦使用罪章芻議。臺灣本土法學雜誌,54,235-247。  延伸查詢new window
4.Bellia, Patricia L.(2001)。Chasing Bits Across Borders。U. Chi. Legal F.,35。  new window
5.Bellia, Patricia L.(2004)。Defending Cyberproperty。N.Y.U. L. REV.,79,2164。  new window
6.Brenner, Susan W.(2001)。State Cybercrime Legislation in the United States: A Survey。RICH. J.L. &TECH.,7,28。  new window
7.Sinrod, Eric J.、Reilly, William P.(2000)。Cyber-Crimes: A Practical Approach to the Application of Federal Computer Crime Laws。SANTA CLARA COMPUTER & HIGH TECH. L. J.,16,177。  new window
研究報告
1.(2005)。MCAFEE VIRTUAL CRIMINOLOGY REPORT。  new window
圖書
1.甘添貴(1999)。體系刑法各論。臺北:瑞興圖書。  延伸查詢new window
2.KERR, ORIN S.(2006)。COMPUTER CRIME LAW。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE