• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    The Standard Of Hacker Conviction And Sentencing Has Been Determined.

    2011/8/30 8:30:00 33

    Hacker'S Conviction And Sentencing Standard

    The Supreme People's court and the Supreme People's Procuratorate jointly issued the 29 day.

    Interpretation of some issues concerning the application of law in handling criminal cases endangering computer information system security

    "

    The eleven judicial interpretations came into effect on September 1, 2011.


    Judicial interpretation deals with the conviction involved in the crime of endangering computer information systems.

    Sentencing standard

    The unit crime, joint crime, terminology definition and other issues further clarify the applicable standards of relevant criminal cases.

    重點內容包括:明確了非法獲取計算機信息系統數據、非法控制計算機信息系統罪,提供侵入、非法控制計算機信息系統程序、工具罪,破壞計算機信息系統罪等犯罪的定罪量刑標準;規定了對明知是非法獲取計算機信息系統數據犯罪所獲取的數據、非法控制計算機信息系統犯罪所獲取的計算機信息系統控制權,而予以轉移、收購、代為銷售或者以其他方法掩飾、隱瞞的行為,以掩飾、隱瞞犯罪所得罪追究刑事責任;明確了對以單位名義或者單位形式實施危害計算機信息系統安全犯罪的行為,應當追究直接負責的主管人員和其他直接責任人員的刑事責任;規定了危害計算機信息系統安全共同犯罪的具體情形和處理原則;明確了“國家事務、國防建設、尖端科學技術領域的計算機信息系統”、“專門用于侵入、非法控制計算機信息系統的程序、工具”、“計算機病毒

    The specific scope and procedures of such destructive procedures are defined; the connotation and denotation of "computer information system", "computer system", "authentication information", "economic loss" and other related terms are defined.


    Answer questions and answer questions


    Two high: cut off the interests chain of network crime from the source


    The head of the "two high" research room answered the reporter's questions on the judicial interpretation.


    Q: what are the considerations in the interpretation process?


    A: in order to ensure that the contents of the interpretation are scientific and reasonable, and to adapt to the development of the situation and meet the needs of judicial practice, we have focused on the following points in the drafting process.


    First, scientifically and rationally determine the standard of conviction and sentencing for crimes of endangering computer information system.

    In order to provide a standard of conviction and sentencing for judicial practice, many provisions in the interpretation relate to quantity or amount.

    Based on the severe attack on the crime of endangering the safety of computer information system, based on judicial practice, we implemented the criminal policy of Combining Leniency with severity, and made corresponding provisions on the quantity and quantity standards.


    Second, focus on cutting off the profit chain that endangering the computer information system security crime. The relevant provisions of the interpretation clearly define the criminal liability of various acts such as making hacker tools, selling hacker tools, illegally obtaining data, illegally controlling computer information systems, reselling illegally acquired data, and reselling the control rights of computer information systems that are not controlled by law, which is beneficial to cut off the interests chain from the source.

    contain

    Crime of endangering computer information system security

    spread

    and

    Flooding


    Q: how do we deal with the disguise and concealment of computer information system data and control actions?


    Answer: "interpretation" stipulates that it is illegal to obtain data from computer information system data crime, illegally control the control of computer information system acquired by computer information system crime, and to pfer, purchase, sell on behalf of, or disguise or conceal in other ways, so as to conceal and conceal the conviction and punishment of a crime.


     

     

    • Related reading

    Students Start School &Nbsp; Down Season Clothing Sales.

    Instant news
    |
    2011/8/29 16:41:00
    44

    讓高端無縫內衣更時尚

    Instant news
    |
    2011/8/29 15:26:00
    40

    Upgrading And Upgrading Of Traditional Textile And Garment Industry

    Instant news
    |
    2011/8/29 9:30:00
    47

    This Year, China'S Top 500 Private Enterprises PEAK List.

    Instant news
    |
    2011/8/27 16:39:00
    44

    Group Buying Website Is Accused Of Burning Money: Venture Capital Is A Big Enemy.

    Instant news
    |
    2011/8/27 10:06:00
    41
    Read the next article

    Industry Concern: Let Super Imitation Cotton Effectively Create Benefits

    In August 16th, the national science and technology supporting technology project organized by the chemical fiber industry technology innovation strategic alliance, "the super cotton imitation synthetic fiber and its textile industrialization technology development" was launched in Beijing. The leadership of the Ministry of science and technology made an in-depth and detailed explanation of the project implementation management method.

    主站蜘蛛池模板: 日本在线xxxx| 午夜a成v人电影| 忘忧草日本在线播放www| 狠狠综合久久久久综合网| 91精品国产入口| 久久国产加勒比精品无码| 六月婷婷综合网| 国产欧美久久一区二区| 成人H动漫精品一区二区| 欧美人与动zozo欧美人z0| 色偷偷亚洲男人天堂| 91福利视频网站| 两个人日本WWW免费版| 亚洲日本一区二区一本一道| 国产亚洲人成网站在线观看| 夜夜高潮夜夜爽夜夜爱爱一区| 日韩精品无码专区免费播放| 狠狠色狠狠色综合日日不卡| 黄色毛片免费观看| 999福利视频| 中文字幕人成乱码熟女| 亚洲欧洲另类春色校园网站| 啊v在线免费观看| 完全免费在线视频| 美女范冰冰hdxxxx| chinesehd国产刺激对白| 一区二区三区视频网站| 久久乐国产精品亚洲综合| 全部免费国产潢色一级| 国产精品白丝喷水在线观看| 性xxxx18免费观看视频| 日韩激情无码免费毛片| 欧美日韩亚洲综合| 男人j桶进女人p无遮挡动态图二三 | 人妻av无码一区二区三区| 国产一区在线播放| 国产成人精品a视频| 国产精品9999久久久久| 国产香蕉精品视频在| 奇米影视四色中文字幕| 差差漫画页面登录在线看|