透過您的圖書館登入
IP:18.218.135.221
  • 期刊

電磁紀錄無權取得行為之刑法規範

A Study of Penal Provisions for Obtaining Unauthorized Electronic Records

摘要


傳統上,由於對竊盜罪採取狹義解釋,使得無法對在未剝奪持有下取得無體性電磁紀錄之行為論以竊盜罪。有鑑於此,立法者決定擴張竊盜罪範圍,使之能涵蓋電磁紀錄之無權取得行為,而在一九九七年十一月正式通過刑法第三百二十三條電磁紀錄竊盜罪。然而,這項立法已經被今年六月剛通過的刑法第三百五十九條無故取得、更動電磁紀錄罪所取代。從此可知,立法者希望能制定新的刑法來保護電磁紀錄,以防止被無權取得。本文主要目的即是在研究與電磁紀錄無權取得有關新舊立法例之解釋與適用上問題,並試圖指出新舊立法例之變化軌跡。 本文之第二部分主要在檢討舊電磁紀錄竊盜罪之性質與功能,並討論在資訊時代有價值電磁紀錄與資訊如何受到妥善的保護。接著,本文檢討竊盜罪中三個構成要件運用於電磁紀錄取得行為上所產生之困難,藉以說明電磁紀錄竊盜罪之立法由於構成要件結構上錯誤,使得電磁紀錄竊盜罪之立法並無法為電磁紀錄提供足夠之保護。第三部分將介紹以電腦保護為出發點之刑法第三百五十九條。除了說明本罪所保護之新法益之性質,還將從事構成要件之解釋與適用之討論。至於本文第四部分則是在討論其他與電磁紀錄無權取得行為有關之刑罰規範。最後,本文將簡略說明研究成果與一些在網際網路與刑法問題上個人思考。

並列摘要


The typical narrow interpretation of theft makes it difficult to prosecute the person who obtains intangible electronic records without taking them away. Recognizing this problem, the Legislature decided to broaden the scope of theft offense to include the obtaining of electronic records. Accordingly, the ”theft of electronic records” offense under Article 323 came into force in December 1997. However, the enactment was replaced by the ”unauthorized acquisition und modification” offense under Article 359 in June 2003. Congress has chosen to treat acquisition of computer data crimes as distinct offenses rather than simply amend existing law to incorporate new technologies. The Legislators have also revealed a strong policy of protection through a new provision. The primary purpose of this Article is to contribute to the discussions on the old and new legislations. Part Ⅱ of this Article explores the nature and function of the ”theft of electronic records” offense under Article 323. This part presents significant questions as to how valuable computer data and information can be best protected in an information age. Besides, three requirements of theft offense that are particularly problematic in the context of theft of computer data are discussed. This part demonstrates the ”theft of electronic records” offense is structurally flawed. This part also argues that the legislation does not provide sufficient protection for computer data. Part Ⅲ of this Article introduces the new legislation of Article 359 which is premised solely on computer-specific consideration. Part Ⅳ focuses on other types of offenses associated with or involving the act of obtaining computer data. Finally, the Article concludes with a summery of the conclusions and some reflections on the relationship between the internet and criminal law.

被引用紀錄


陸峻岳(2011)。刑法第三百六十條干擾電腦或相關設備罪 —立法問題的研究—〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/CYCU.2011.00058
林依雯(2017)。論營業秘密法上之刑事責任──以營業秘密法第十三條之一為中心〔碩士論文,國立臺灣大學〕。華藝線上圖書館。https://doi.org/10.6342/NTU201702709
廖奕淳(2016)。我國營業秘密保護之困境與突破〔碩士論文,國立臺灣大學〕。華藝線上圖書館。https://doi.org/10.6342/NTU201602626
陳彥蓉(2016)。從英美法財產犯罪的流變重新思考使用竊盜—以共享經濟為例〔碩士論文,國立臺灣大學〕。華藝線上圖書館。https://doi.org/10.6342/NTU201602399
林晉源(2015)。論刑法第三百五十八條入侵電腦罪〔碩士論文,國立臺灣大學〕。華藝線上圖書館。https://doi.org/10.6342/NTU.2015.02478

延伸閱讀