• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    The Standard Of Hacker Conviction And Sentencing Has Been Determined.

    2011/8/30 8:30:00 33

    Hacker'S Conviction And Sentencing Standard

    The Supreme People's court and the Supreme People's Procuratorate jointly issued the 29 day.

    Interpretation of some issues concerning the application of law in handling criminal cases endangering computer information system security

    "

    The eleven judicial interpretations came into effect on September 1, 2011.


    Judicial interpretation deals with the conviction involved in the crime of endangering computer information systems.

    Sentencing standard

    The unit crime, joint crime, terminology definition and other issues further clarify the applicable standards of relevant criminal cases.

    重點內容包括:明確了非法獲取計算機信息系統數據、非法控制計算機信息系統罪,提供侵入、非法控制計算機信息系統程序、工具罪,破壞計算機信息系統罪等犯罪的定罪量刑標準;規定了對明知是非法獲取計算機信息系統數據犯罪所獲取的數據、非法控制計算機信息系統犯罪所獲取的計算機信息系統控制權,而予以轉移、收購、代為銷售或者以其他方法掩飾、隱瞞的行為,以掩飾、隱瞞犯罪所得罪追究刑事責任;明確了對以單位名義或者單位形式實施危害計算機信息系統安全犯罪的行為,應當追究直接負責的主管人員和其他直接責任人員的刑事責任;規定了危害計算機信息系統安全共同犯罪的具體情形和處理原則;明確了“國家事務、國防建設、尖端科學技術領域的計算機信息系統”、“專門用于侵入、非法控制計算機信息系統的程序、工具”、“計算機病毒

    The specific scope and procedures of such destructive procedures are defined; the connotation and denotation of "computer information system", "computer system", "authentication information", "economic loss" and other related terms are defined.


    Answer questions and answer questions


    Two high: cut off the interests chain of network crime from the source


    The head of the "two high" research room answered the reporter's questions on the judicial interpretation.


    Q: what are the considerations in the interpretation process?


    A: in order to ensure that the contents of the interpretation are scientific and reasonable, and to adapt to the development of the situation and meet the needs of judicial practice, we have focused on the following points in the drafting process.


    First, scientifically and rationally determine the standard of conviction and sentencing for crimes of endangering computer information system.

    In order to provide a standard of conviction and sentencing for judicial practice, many provisions in the interpretation relate to quantity or amount.

    Based on the severe attack on the crime of endangering the safety of computer information system, based on judicial practice, we implemented the criminal policy of Combining Leniency with severity, and made corresponding provisions on the quantity and quantity standards.


    Second, focus on cutting off the profit chain that endangering the computer information system security crime. The relevant provisions of the interpretation clearly define the criminal liability of various acts such as making hacker tools, selling hacker tools, illegally obtaining data, illegally controlling computer information systems, reselling illegally acquired data, and reselling the control rights of computer information systems that are not controlled by law, which is beneficial to cut off the interests chain from the source.

    contain

    Crime of endangering computer information system security

    spread

    and

    Flooding


    Q: how do we deal with the disguise and concealment of computer information system data and control actions?


    Answer: "interpretation" stipulates that it is illegal to obtain data from computer information system data crime, illegally control the control of computer information system acquired by computer information system crime, and to pfer, purchase, sell on behalf of, or disguise or conceal in other ways, so as to conceal and conceal the conviction and punishment of a crime.


     

     

    • Related reading

    Students Start School &Nbsp; Down Season Clothing Sales.

    Instant news
    |
    2011/8/29 16:41:00
    44

    讓高端無縫內衣更時尚

    Instant news
    |
    2011/8/29 15:26:00
    40

    Upgrading And Upgrading Of Traditional Textile And Garment Industry

    Instant news
    |
    2011/8/29 9:30:00
    47

    This Year, China'S Top 500 Private Enterprises PEAK List.

    Instant news
    |
    2011/8/27 16:39:00
    44

    Group Buying Website Is Accused Of Burning Money: Venture Capital Is A Big Enemy.

    Instant news
    |
    2011/8/27 10:06:00
    41
    Read the next article

    Industry Concern: Let Super Imitation Cotton Effectively Create Benefits

    In August 16th, the national science and technology supporting technology project organized by the chemical fiber industry technology innovation strategic alliance, "the super cotton imitation synthetic fiber and its textile industrialization technology development" was launched in Beijing. The leadership of the Ministry of science and technology made an in-depth and detailed explanation of the project implementation management method.

    主站蜘蛛池模板: 欧美日韩在大午夜爽爽影院| 97超级碰碰碰碰久久久久| 苏玥马强百文择| 日韩国产中文字幕| 国产成人无码AⅤ片在线观看| 亚洲国产视频一区| 3d动漫wxxxx在线播放| 欧美日韩国产在线人成| 国产精品盗摄一区二区在线| 亚洲欧美在线观看首页| 91亚洲va在线天线va天堂va国产| 欧美精品一区二区精品久久| 国产麻豆天美果冻无码视频| 亚洲最大综合网| 怡红院成人在线| 曰皮全部过程视频免费国产30分钟 | 欧洲国产成人精品91铁牛tv| 国产精品多p对白交换绿帽| 亚洲啪啪av无码片| 欧美人与物videos另| 曰韩无码无遮挡A级毛片| 国产亚洲美女精品久久久久| 久久亚洲国产成人精品无码区 | 被猛男cao尿了| 护士在办公室里被躁视频| 午夜性色一区二区三区不卡视频 | aⅴ在线免费观看| 污污小视频在线观看| 国产精品高清一区二区三区| 亚洲免费在线观看| 国产妇乱子伦视频免费| 日本一本一道波多野结衣| 四虎影视在线观看永久地址| 一本色综合久久| 没带罩子让他玩儿了一天| 国产精品天天看| 久久精品99香蕉国产| 网站视频大片www| 大JI巴好深好爽又大又粗视频| 亚洲日产韩国一二三四区| 黄色网站在线观看视频|