论非法获取计算机信息系统数据罪
发布时间:2018-03-17 23:31
本文选题:侵入行为 切入点:经济损失 出处:《西南大学》2014年硕士论文 论文类型:学位论文
【摘要】:随着互联网的快速发展,非法获取计算机信息系统数据罪呈现出犯罪成本低,但社会危害性严重、犯罪行为的手段具有明显性又具有隐蔽性、犯罪目的更多倾向于牟利等特点。由于非法获取他人计算机系统数据行为的不断出现,2009年刑法典以修正案的形式在第285条增加第2款非法获取计算机信息系统数据罪,在一定程度上弥补了刑法条文的缺陷,对规制网络犯罪有重要意义,但该条文在适用方面仍存在许多问题。尔后2011年最高法针对危害计算机信息系统安全的行为出台司法解释,对危害计算机信息系统安全的行为的定罪与量刑做出具体规定。但对于侵入行为的界定、经济损失的认定以及评估、单位主体是否应该作为本罪的主体等没有做出明确的规定。 本文主要对非法获取计算机信息系统数据罪的行为、对象、主体进行分析。关于“行为”,本文主要分析“违反国家规定”、“侵入行为”、“获取行为”以及行为之“情节严重”。其中违反国家规定的范围是违背全国人大、我国刑法典以及行政法规关于计算机信息系统管理的各项规定。侵入行为除了三种典型的侵入方式以外,在司法实践中又出现了新的方式。获取行为不同于本罪罪名中“非法获取”行为。而情节严重作为本罪行为定罪量刑的重要依据,其中涉及到经济损失的范围与认定。经济损失的范围为本罪行为导致的直接经济损失与部分间接损失,认定方面具体将经济损失分为三类,强调经济损失应该是网络入侵或者破坏行为造成的信息系统本身的损害或者是系统中数据的损失而导致的不可逆的、可用经济标准来衡量的损失。 本罪的对象是计算机信息系统中存储、处理、传输的数据。其中计算机信息系统与计算机系统属于同一概念,手机系统是计算机系统中的一种。而数据是计算机信息系统中存储、处理、传输的代码、程序、文档等任何电子信息资料,其包括了网页浏览中留下的痕迹、在下载软件中留下的下载记录以及计算机中存储、处理、传输的个人信息、商业信息等。而在犯罪主体方面,对责任年龄与单位主体问题进行讨论。责任年龄问题的争议是本罪的刑事责任年龄是否应该降低,从未成年人犯罪特征、未成年人犯罪刑事政策、我国最近的立法、修法以及网络使用现状来看,都不应将刑事责任年龄降低。单位主体的争议问题是单位是否应该作为本罪主体,从互联网络发展的现状以及本罪的特点来看,单位都应作为本罪犯罪主体,按双罚制处以罚金刑。 随着2009年《刑修七》以及2011年《解释》的出台,对本罪在定罪量刑方面做了一定程度的完善,但仍存在不足之处,需要进一步的完善和修改。本文提出增加单位犯罪主体;建立经济损失的评估标准,对经济损失的认定与评估应以遵循实际损失为原则,在评估中可根据经济损失的不同类型采用不同的评估标准。
[Abstract]:With the rapid development of the Internet, the crime of illegally obtaining data from computer information system presents a low cost, but the social harm is serious, and the means of criminal behavior are obvious and hidden. Due to the continuous emergence of illegal acquisition of computer system data of others, in 2009 the Criminal Code added paragraph 2 of Section 2 of the Criminal Code in the form of an amendment in the form of an amendment to the crime of illegally obtaining data from a computer information system. To a certain extent, it has made up for the defects of the criminal law provisions, which is of great significance to the regulation of cybercrime. However, there are still many problems in the application of this provision. Later, in 2011, the Supreme Law issued a judicial explanation for acts endangering the security of computer information systems. The conviction and sentencing of the act endangering the security of computer information system are specified, but the definition of intrusive act, the identification and evaluation of economic loss, and whether the unit subject should be the subject of this crime are not clearly stipulated. This article mainly deals with the behavior and object of the crime of illegally obtaining data from computer information system. With regard to "acts", this article mainly analyzes "violations of state regulations", "acts of invasion", "acquisition acts" and the "serious circumstances" of the acts, in which the scope of violation of state regulations is contrary to the National people's Congress, The provisions of the Criminal Code and administrative regulations on the management of computer information systems. In addition to three typical intrusions, In the judicial practice, there are new ways. The acquisition behavior is different from the "illegal acquisition" behavior in this crime, and the serious circumstances are the important basis for the conviction and sentencing of the crime. The scope of economic loss is the direct economic loss and part of indirect loss caused by this crime. It is emphasized that the economic loss should be the irreversible loss caused by the information system itself caused by the network intrusion or destruction or the loss of the data in the system, which can be measured by the economic standard. The object of this crime is the data stored, processed and transmitted in the computer information system, in which the computer information system and the computer system belong to the same concept. Mobile phone system is a kind of computer system. And data is any electronic information material such as code, program, document and so on stored, processed and transmitted in computer information system. The download records left in the download software, as well as the personal information stored, processed and transmitted in the computer, the business information, etc., and in respect of the subject of the crime, The dispute over the age of responsibility is whether the age of criminal responsibility should be reduced, from the characteristics of juvenile delinquency, the criminal policy of juvenile delinquency, the recent legislation of our country, The revision of the law and the current situation of the use of the Internet should not lower the age of criminal responsibility. The dispute over the subject of the unit is whether the unit should be the subject of this crime, from the current situation of the development of the Internet and the characteristics of this crime. The unit should be regarded as the subject of the crime, according to the double penalty system to impose a fine. With the introduction of "Criminal Amendment Seven" on 2009 and "explanation" on 2011, this crime has been improved to a certain extent in the aspect of conviction and sentencing, but there are still some deficiencies, which need to be further improved and modified. In order to establish the evaluation standard of economic loss, the identification and evaluation of economic loss should follow the principle of actual loss, and different evaluation criteria can be adopted according to different types of economic loss.
【学位授予单位】:西南大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:D924.3
【参考文献】
相关期刊论文 前10条
1 周文;欧洲委员会控制网络犯罪公约与国际刑法的新发展[J];法学评论;2002年03期
2 皮勇;;新刑事诉讼法实施后我国网络犯罪相关刑事程序立法的新发展[J];法学评论;2012年06期
3 余斌;;网络犯罪的法律适用及管辖问题研究[J];公民与法(法学版);2012年12期
4 孙玉荣;;非法获取计算机信息系统数据罪若干问题探讨[J];北京联合大学学报(人文社会科学版);2013年02期
5 皮勇;;我国网络犯罪刑法立法研究——兼论我国刑法修正案(七)中的网络犯罪立法[J];河北法学;2009年06期
6 杨彩霞;;国际反网络犯罪立法及其对我国的启示——以《网络犯罪公约》为中心[J];时代法学;2008年03期
7 李勇;;非法获取计算机信息系统数据罪认定中的两个难题[J];中国检察官;2012年08期
8 孙贵新;杨睿;;普通计算机数据安全研究[J];科教文汇(下旬刊);2007年01期
9 周强华;;非法获取计算机信息系统数据罪的若干思考[J];学理论;2011年34期
10 杨金彪;杨俊杰;;计算机犯罪的刑事法规制[J];北京人民警察学院学报;2012年05期
,本文编号:1627015
本文链接:https://www.wllwen.com/falvlunwen/xingfalunwen/1627015.html