:::

詳目顯示

回上一頁
題名:初探遠端電腦搜索
書刊名:東吳法律學報
作者:李榮耕 引用關係
作者(外文):Li, Rong-geng
出版日期:2018
卷期:29:3
頁次:頁49-87
主題關鍵詞:遠端電腦搜索搜索扣押合理隱私期待通訊監察Remote computer searchSearchSeizureReasonable expectation of privacyCommunication surveillance
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(6) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:6
  • 共同引用共同引用:99
  • 點閱點閱:79
在現今年代,電腦及網際網路在人們的生活中扮演了極為重要的角色,不幸的是,其也成為了不法份子的犯罪工具。為了抗制越來越多的網路(電腦)犯罪,偵查實務上有了遠端電腦搜索的運用。對於這種類型的犯罪來說,遠端電腦搜索有其實際上的需要,在歐美許多國家都已經採用,歐盟理事會也採積極鼓勵的立場。由於人們對於儲存在電腦內的檔案,得主張合理隱私期待,所以遠端電腦搜索構成了搜索。此外,透過這樣的強制處分,取得目標電腦內檔案的複本,也構成了扣押。然而遠端電腦搜索,不屬於通訊監察。不過,遠端電腦搜索對於權利的侵害程度,遠大於傳統的搜索扣押,且有類似於通訊監察的地方。是故,在形成相關規範時,除了應遵循刑事訴訟法中搜索扣押的條文外,通訊保障及監察法中性質適合者,也可參考借鏡。
Internet plays a very important role in people's daily life. In order to respond cybercrimes and computer crimes which are more and more common, the government employs remote computer searches in criminal investigation. Remote computer search is necessary to the investigation because of the features of those crimes. Many countries in America and Europe have adopted remote computer search as an investigative method. In addition, the Council of the European Union encourages member states to use remote computer search to combat cybercrimes. People have reasonable expectations of privacy in the files and information stored in their computers. Therefore, the conduct of remote computer search constitutes the search within the meaning of the Code of Criminal Procedure. Moreover, copying files constitutes seizure. Remote computer search, however, is not communication surveillance. The intrusion of rights results from remote computer search is much more than from searches and seizure, and is similar with communication. Therefore, the regulations governing remote computer search should be in line with the Code of Criminal Procedure and the Communication Security and Surveillance Act.
期刊論文
1.李榮耕(20080300)。I am Listening to You--釋字第六三一號解釋、令狀原則及修正後通訊保障及監察法。臺灣本土法學雜誌,104,47-60。  延伸查詢new window
2.李榮耕(20120900)。電磁紀錄的搜索與扣押。國立臺灣大學法學論叢,41(3),1055-1116。new window  延伸查詢new window
3.李榮耕(20120400)。特定明確原則與機動性通訊監察。政大法學評論,126,105-153。new window  延伸查詢new window
4.謝碩駿(20150300)。警察機關的駭客任務--論線上搜索在警察法領域內實施的法律問題。臺北大學法學論叢,93,1-78。new window  延伸查詢new window
5.李震山(20070900)。挪動通訊保障與通訊監察天平上的法碼--釋字第六三一號解釋評析。臺灣本土法學雜誌,98,283-291。  延伸查詢new window
6.張麗卿(20140600)。通訊保障及監察法之修正與評析。月旦法學,229,25-45。new window  延伸查詢new window
7.李榮耕(20150900)。科技定位監控與犯罪偵查:兼論美國近年GPS追蹤法制及實務之發展。國立臺灣大學法學論叢,44(3),871-969。new window  延伸查詢new window
8.黃惠婷(20130400)。附帶搜索--評最高法院九十八年度臺上字第三一○號。刑事法雜誌,57(2),81-107。new window  延伸查詢new window
9.溫祖德(20150400)。行動電話內數位資訊與附帶搜索--以美國聯邦最高法院見解之變遷為主。月旦法學,239,198-220。new window  延伸查詢new window
10.李榮耕(20090400)。個人資料外洩及個資外洩通知條款的立法芻議。東吳法律學報,20(4),251-291。new window  延伸查詢new window
11.蔡榮耕(20080400)。I am Listening to You--釋字第六三一號解釋、令狀原則及修正後通訊保障及監察法。臺灣本土法學雜誌,105,43-56。  延伸查詢new window
12.李榮耕(20161200)。數位資料及附帶搜索--以行動電話內的資訊為例。臺北大學法學論叢,100,245-322。new window  延伸查詢new window
13.陳瑞仁(2001)。搜索票應記載及得記載事項。司法週刊,1043。  延伸查詢new window
14.Soghoian, Christopher(2010)。Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era。J. Telcomm. & High Tech. L.,8,359。  new window
15.Dix, George E.(1982)。Means of Executing Searches and Seizures as Fourth Amendment Issues。Minn. L. Rev.,67,89。  new window
16.Vaudrey, Ginger(20040101)。The Technology of National Security。Law Tech.,1。  new window
17.Goldsmith, Jack L.(2001)。The Internet and the Legitimacy of Remote Cross-Border Searches。U. Chi. Legal F.,2001,103。  new window
18.Kerr, Orin S.(2003)。The Problem of Perspective in Internet Law。Geo. L. J.,91,357。  new window
19.Brenner, Susan W.、Frederiksen, Barbara A.(2002)。Computer Searches and Seizures: Some Unresolved Issues。Mich. Telecomm. & Tech. L. Rev.,8,39。  new window
20.Brenner, Susan W.、Schwerha, Joseph J. IV(2002)。Transnational Evidence Gathering and Local Prosecution of International Cybercrime。The John Marshall journal of computer & information law,20(3),347-395。  new window
21.Brenner, Susan W.(2007)。"At Light Speed": Attribution and Response to Cybercrime/Terrorism/Warfare。J. Crim. L. & Criminology,97,379。  new window
22.Brenner, Susan W.(2012)。Fourth Amendment Future: Remote Computer Searches and the Use of Virtual Force。Miss. L. J.,81,1229。  new window
23.Brenner, Susan W.(2012)。Law, Dissonance, and Remote Computer Searches。N.C. J. L. & Tech.,41,43。  new window
24.Brenner, Susan W.(2002)。The Privacy Privilege: Law Enforcement, Technology, and the Constitution。J. Tech. L. & Pol'y,7,123。  new window
25.Brenner, Susan W.(2004)。Toward a Criminal Law for Cyberspace: Distributed Security。B. U. J. Sci. & Tech. L.,10,1。  new window
26.Clancy, Thomas L.(2002)。The Effect of Technology on Fourth Amendment Analysis and Individual Rights。Miss. L. J.,72,1。  new window
27.MacDonnell, Timothy C.(2010)。Orwellian Ramifications: The Contraband Exception to the Fourth Amendment。U. Mem. L. Rev.,41。  new window
28.Bunyan, Tony(2009)。EU Agrees Rules for Remote Computer Access by Police Forces--But Fails, as Usual, to Mention--the Security and Intelligence Agencies。Statewatch J.,19。  new window
29.Abel, Wiebke、Schafer, Burkhard(20090502)。The German "Federal Trojan"--Challenges Between law and Technology。TEUTAS L. & TECH.。  new window
30.陳運財(20041000)。違法證據排除法則之回顧與展望。月旦法學,113,27-50。new window  延伸查詢new window
31.何賴傑(20120900)。論德國刑事程序「線上搜索」與涉及電子郵件之強制處分。月旦法學,208,230-244。new window  延伸查詢new window
32.李榮耕(20120600)。通訊監察中之最小侵害原則。臺北大學法學論叢,82,205-244。new window  延伸查詢new window
圖書
1.林俊益(2013)。刑事訴訟法概論。新學林出版股份有限公司。  延伸查詢new window
2.林永謀(2006)。刑事訴訟法釋論。臺北:林永謀。  延伸查詢new window
3.陳樸生(1999)。刑事訴訟法實務。陳樸生。  延伸查詢new window
4.黃朝義(2013)。刑事訴訟法。新學林出版股份有限公司。  延伸查詢new window
5.陳運財(2000)。通訊之監察。學林。  延伸查詢new window
6.林鈺雄(2013)。刑事訴訟法。臺北:林鈺雄。  延伸查詢new window
7.許育典(2013)。憲法。元照出版社。  延伸查詢new window
其他
1.Cha, Ariana Eunjung(20030519)。A Tempting Offer for Russian Pair,https://www.washingtonpost.com/archive/politics/2003/05/19/atempting-offer-for-russian-pair/2c6a5407-8378-4939-8491-038efab2c5fb/?utm_term=.d4c534186d09。  new window
2.Krebs, Brian(20090702)。PC Invader Costs Ky. County 415,000,http://voices.washingtonpost.com/securityfix/2009/07/an_odyssey_of_fraud_part_ii.html。  new window
3.Council of the European Union(2008)。Draft Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime,http://register.consilium.europa.eu/pdf/en/08/st15/st15569.en08.pdf,(No. 15569/08)。  new window
4.McCullagh, Declan(20120522)。FBI Quietly Forms Secretive Net-surveillance Unit,http://news.cnet.com/8301-1009_3-57439734-83/fbi-quietlyforms-secretive-net-surveillance-unit/。  new window
5.(20081201)。EU to Search out Cyber Criminals,http://news.bbc.co.uk/2/hi/technology/7758127.stm。  new window
6.Graham, Flora(20090105)。Police 'Encouraged' to Hack More,http://news.bbc.co.Uk/2/hi/7812353.stm。  new window
7.Hentoff, Nat(20020502)。The FBI's Magic Lantern,http://www.villagevoice.eom/2002-05-28/news/the-fbi-s-magic-lantern/l/。  new window
8.Kulish, Nicholas(20111014)。Germans Condemn Police Use of Spyware,http://www.nytimes.com/2011/10/15/world/europe/uproar-in-germany-on-police-use-of-surveillance-software.html。  new window
9.Brenner, Susan W.(20091026)。Copying as Search and Seizure,http://cyb3rcrim3.blogspot.com/2009/10/copying-as-search-and-seizure.html。  new window
10.U.S. Depft of Justice, Nat'l Inst, of Justice(2007)。Investigations Involving the Internet and Computer Networks,https://www.ncjrs.gov/pdffiles1/nij/210798.pdf。  new window
圖書論文
1.王兆鵬(2004)。重新定義高科技時代下的搜索。新刑訴.新思維。王兆鵬。  延伸查詢new window
2.王兆鵬(2000)。論附帶搜索。搜索扣押與刑事被告的憲法權利。王兆鵬。new window  延伸查詢new window
3.王兆鵬(2000)。證據排除法則的相關問題。搜索扣押與刑事被告的憲法權利。王兆鵬。new window  延伸查詢new window
4.王兆鵬(2004)。論夜間搜索之准許。當事人進行主義之刑事訴訟。王兆鵬。  延伸查詢new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關書籍
 
無相關著作
 
無相關點閱
 
QR Code
QRCODE