:::

詳目顯示

回上一頁
題名:通訊隱私與刑法規制--論「通訊保障及監察法」的刑事責任
書刊名:東吳法律學報
作者:許恒達 引用關係
作者(外文):Hsu, Heng-da
出版日期:2010
卷期:21:3
頁次:頁109-159
主題關鍵詞:通訊監察合理隱私期待通訊隱私侵入電腦秘密利益虛偽朋友Communication surveillanceReasonable expectation of privacyCommunications privacyComputer intrusionSecret interestFalse friend
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(9) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:9
  • 共同引用共同引用:155
  • 點閱點閱:73
科技持續發展的今天,新興的法律管制領域愈益增加。「通訊行動」的保護,在科技時代尤為重要的法律議題。我國早於1999年增訂通訊保障及監察法,採用美國法取向「隱私保護」的立法架構,同時創設「違法通訊監察」與「洩露監察資料」的刑事責任,然而,這種仿傚美國法的刑事制裁,如何能與我國法的體例相契合,即為應予深究的問題。筆者將在本文中,借鏡美國與德國的立法現況與實務意見,深入研究通保法刑法規範的解釋方法,並設法將其刑責融入我國刑法法益保護體系。本文將分為五個主題說明相關疑義:(1)如何設計通訊隱私的刑法保護架構、(2)如何類型化通訊隱私的保護客體、(3)如何定性通訊監察行為、(4)洩露與交付行為的可罰性界限,以及如何解釋通保法中的除罪事由。
The technological advance and improvement lead to many new legal issues. The protection of ”communication activities” is one of the most important topics. By adopting the main conception of ”privacy protection” in American legislation, Taiwan has already enacted the Communication Security and Surveillance Act (CSSA) in 1999. Under CSSA, the unlawful surveillance and disclosure of communication privacy are punishable. However, whether CSSA's penalties could be suitable for Taiwan's legal system which is influenced by Germany's theories would be a core point to be concentrated. The author will explore these problems in view of American and German criminal law and practice. The following discussion in this article will be divided into five main topics: (1)How can we build a criminal law’s structure to protect communication privacy? (2)What kind of communication activities should be legally protected? (3)Which invasion of communications privacy are punishable? (4)What kind of conduct could be deemed as ”disclosure of communication privacy”? (5)How can we interpret the exculpation grounds regulated in CSSA?
期刊論文
1.蔡榮耕(20080400)。Matrix駭客任務:刑法第358條入侵電腦罪。科技法學評論,5(1),103-134。new window  延伸查詢new window
2.楊雲驊(20080100)。新修正通訊保障及監察法評析--以「法官保留」及「證據禁止」為中心。檢察新論,3,161-176。new window  延伸查詢new window
3.Kerr, Orin S.(2003)。Cybercrime’s Scope: Interpreting “Access” and “Authorization” in Computer Misuse Statutes。N.Y.U. L. REV.,78,1596。  new window
4.李茂生(20040200)。刑法新修妨害電腦使用罪章芻議。臺灣本土法學雜誌,55,243-256。  延伸查詢new window
5.許恒達(20090600)。論違法通訊監察罪之行為主體--法益取向的解釋觀點。月旦法學,169,168-185。new window  延伸查詢new window
6.Kerr, O. S.(2009)。The case for the third-party doctrine。Michigan Law Review,117,561-601。  new window
7.李震山(20070900)。挪動通訊保障與通訊監察天平上的法碼--釋字第六三一號解釋評析。臺灣本土法學雜誌,98,283-291。  延伸查詢new window
8.李茂生(20040100)。刑法新修妨害電腦使用罪章芻議。臺灣本土法學雜誌,54,235-247。  延伸查詢new window
9.楊雲驊(20020200)。證據使用禁止在個案上的判斷過程--以電話分機聆聽案為例。東吳法律學報,13(2),61-102。new window  延伸查詢new window
10.林鈺雄(20080400)。論通訊之監察--評析歐洲人權法院相關裁判之發展與影響。東吳法律學報,19(4),109-152。new window  延伸查詢new window
11.蔡聖偉(20010400)。妨害秘密罪章的新紀元。月旦法學,71,96-107。new window  延伸查詢new window
12.蔡聖偉(20010300)。妨害秘密罪章的新紀元。月旦法學,70,151-162。new window  延伸查詢new window
13.李茂生(19990800)。刑法秘密罪章新修條文評釋。月旦法學,51,93-114。new window  延伸查詢new window
14.黃翰義(20061000)。從目的論及體系論檢討我國通訊保障及監察法關於通訊監察之程序適用及其主體適格之限制--兼評最高法院94年度臺上字第5802號刑事判決。軍法專刊,52(5),108-129。new window  延伸查詢new window
15.王皇玉(2008)。論通訊保障及監察法第二四條與刑法第三一五條之一的適用疑義—兼評最高法院九十四年台上字第五八○二號判決、高等法院台南分院九十一年上訴字第一一五三號判決與九十四年上更字第五九二號判決。月旦法學雜誌,第160期,249-264。new window  延伸查詢new window
16.王皇玉(2009)。刑法對隱私權的保障—以刑法第315條之1為中心。台灣法學雜誌,第122期,37-39。  延伸查詢new window
17.李佳玟(2008)。在場人錄音之證據能力(上)。台灣法學雜誌,第116期,102-106。  延伸查詢new window
18.李佳玟(2008)。在場人錄音之證據能力(中)。台灣法學雜誌,第117期,126-139。  延伸查詢new window
19.李萬明(2008)。昨日法制與今日科技—通訊保障及監察法於網路監察客體適用之探討。法學新論,第2期,87-116。new window  延伸查詢new window
20.吳巡龍(2006)。得通訊一方同意竊聽錄音之證據能力。月旦法學雜誌,第136期,233-245。  延伸查詢new window
21.Patricia L. Ballia(2004)。The Future of Internet Surveillance Law。Geo. Wash. L. Rev,72,1375。  new window
22.Patricia L. Bellia(2005)。Spyware and the Limits of Surveillance Law。Berkeley Tech. L. J.,20,1283。  new window
23.Sherry Colb(2002)。What is Search? Two Conceptual Flows in Fourth Amendment Doctrine and Some Hints of a Remedy。Stan. L. Rev.,55,119。  new window
24.Donald L. Doernberg(253)。Can You Hear Me Now?”: Expectations of Privacy, False Friends, and the Perils of Speaking under the Supreme Corut’s Fourth Amendement Jurisprudence。Ind. L. Rev.,39,253。  new window
25.Stefan Ernst(2003)。Hacker und Computerviren im Strafrecht。NJW 2003,S. 3233 ff。  new window
26.Stefan Ernst(2007)。Das neue Computerstrafrecht。NJW 2007,S. 2661 ff。  new window
27.Hans-Ulrich Evers(1996)。Unbefugtes“Abhören i.S. §§298/353d StGB und die Rechtmäßigkeit der bisherigen staatlichen Abhörpraxis。ZRP 1970,S. 147 ff。  new window
28.Susan Freiwald(2004)。Online Surveillance: Remembering the Lessons of the Wiretap Act。Ala. L. Rev.,56,9。  new window
29.Susan Freiwald(2007)。First Principles of Communications Privacy。Stan. Tech. L. Rev.,3。  new window
30.Susan Freiwald、Patricia L. Bellia(2007)。The Fourth Amendment Status of Stored E-Mail: The Law Professors’ Brief in Warshak v. United States。U.S.F. L. Rev.,41,559。  new window
31.Freiherr von Gravenreuth(1989)。Computerviren, Hacker, Datenspione, Crasher und Cracker – Überblick und rechtliche Einordnung。NStZ 1989,S. 201 ff。  new window
32.adine Gröseling、FrankMichael Höfinger(2007)。Hacking und Computerspionage–Auswirkungen des 41。StrÄndG zur Bekämpfung der Computerkriminaltiät, MMR 2007,S. 549 ff。  new window
33.William C. Heffernan(2001)。Fourth Amendment Privacy Interests。J. Crim. L. & Crim.,92,1。  new window
34.Stephen E. Henderson(2004)。Nothing New under the Sun? A Technologically Rational Doctrine of Fourth Amendment Search。Mercer L. Rev.,56,507。  new window
35.Walter Kargl(2005)。Zur Differenz zwischen Wort und Bild im Bereich des strafrechtlichen Persönlichkeitsschutzes。ZStW 117,S. 324 ff。  new window
36.Orin K. Kerr(2007)。Four Models of Fourth Amendment Protection。Stan. L. Rev.,60,503。  new window
37.Orin K. Kerr(2004)。Privacy & the USA Patriot Act Surveillance Law: Reshaping the Framework。Geo. Wash. L. Rev.,72,1208。  new window
38.Achal Oza(2008)。Amend the ECPA: Fourth Amendment Protection Erodes as E-Mails Get。B.U. L. Rev.,88,1043。  new window
39.James J. Tomkovicz(2003)。Technology and the Threshold of the Fourth Amendment: A Tale of Two Futures。Miss. L.J.,72,317。  new window
40.Wilkins, Richard G.(1987)。Defining the Reasonable Expectation of Privacy: An Emerging Tripartite Analysis。Vanderbilt Law Review,40,1077-1087。  new window
41.Bernd Wölfl(2000)。Rechtfertigungsgründe bei der Verletzung der Vertraulichkeit des Wortes。Jura 2000,S. 231 ff。  new window
圖書
1.Freund(2003)。Münchener Kommentar zum Strafgesetzbuch。  new window
2.Hilgendorf, Eric、Frank, Thomas、Valerius, Brian(2005)。Computer- und Internetstrafrecht。Berlin。  new window
3.Lackner, Karl、Kühl, Kristian(2007)。Strafgesetzbuch。München:C. H. Beck。  new window
4.Solove, Daniel J.、Rotenberg, Marc、Schwartz, Paul M.(2006)。Information Privacy Law。Aspen Publishers。  new window
5.王兆鵬(2006)。刑事訴訟講義。元照出版公司。  延伸查詢new window
6.黃榮堅(2006)。基礎刑法學。臺北:元照。  延伸查詢new window
7.林鈺雄(200709)。刑事訴訟法。臺北:林鈺雄:元照。  延伸查詢new window
8.Roxin, Claus(2006)。Strafrecht: Allgemeiner Teil (Bd. I): Grundlagen, der Aufbau der Verbrechenslehre。C. H. Beck。  new window
9.王兆鵬(2007)。美國刑事訴訟法。臺北:王兆鵬。new window  延伸查詢new window
10.林山田(2005)。刑法各罪論。林山田。  延伸查詢new window
11.林東茂(2007)。刑法綜覽。一品文化。  延伸查詢new window
12.甘添貴(2004)。體系刑法各論,第一卷,修訂版。  延伸查詢new window
13.林山田(2008)。刑法總論。台北:元照。  延伸查詢new window
14.RALPH D. CLIFFORD(2006)。CYBERCRIME: THE INVESTIGATION,PROSECUTION AND DEFENSE OF A COMPUTER-RELATED CRIME (2d ed.)。  new window
15.WAYNE R. LAFAVE, JEROLD H. ISRAEL、NANCY J. KING(2004)。PRINCIPLES OF CRIMINAL PROCEDURE: INVESTIGATION。  new window
16.Johannes Wessels、Michael Hettinger(2007)。Strafrecht Besonderer Teil, Band 1, 31. Aufl。Heidelberg。  new window
17.Wessels, Johannes、Hillenkamp, Thomas(2007)。Strafrecht Besonderer Teil。Heidelberg。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
QR Code
QRCODE