?
Guangzhou case ● the 27th period
Small letter is much leave
Friend of one key transmit encircles content
The friend encircles absoluteness @ good friend to remind examine
Small letter of a rogue " outside hang "
Be used by small business " baleful sale "
Many user friends are encircled already " fall into enemy hands "
The rubbish information such as a large number of advertisement is flush
This is likely one the name is " hold as expected " scampish APP is in do mischief. Illegal element makes small letter for seek interest " outside hang " sell small business " baleful sale " , break through safeguard of small letter safety without accredit, dominate the data that transmits between end of client of small letter mobile phone and server end, carry out illegal control to small letter then.
So, whether should small letter bring into the computer information system that criminal law protects? The behavior of illegal element whether invade in order to offer, blame of program of system of information of illegal control computer, tool punish? Walk into today's Guangzhou case together please.
Basic details of a case
Software of Tecent small letter (abbreviation small letter) it is bureau of classics nation copyright is registered, by Tecent science and technology (Shenzhen) limited company enjoys all of computer science department of Tecent of city of limited company, Shenzhen copyright, can offer the free application program that instant communication serves.
Began in January 2015, zhang Mou of the accused person, Liu Mou stems from the purpose of obtain illegal profit, in did not register the legal firm, circumstance that perhaps agrees without authorization of company of Tecent of obligee of small letter product to fall, development goes " hold as expected " , " play smoothly " computer software. Among them appraisal of classics of two computers software, can undertake test and verify through to load hind and server and download dynamic library file, to small letter client of IOS mobile phone carries an interface to undertake modification, revise reach the data that transmits between end of client of mobile phone of control small letter and server end, realize the function that does not have on official small letter then. If speech transmit gives a friend (official edition does not have this function) , small letter is much leave (a mobile phone can open client of two small letters to carry at the same time) , friend of one key transmit encircles content (character, picture, small video all can) , the friend is encircled. More its upgrade edition " play smoothly " added one key cutout newly " corpse pink " function.
Interface of * software function
Hind server of hire of Zhang Mou of the accused person, Liu Mou, establish the propagandist website of afore-mentioned computer software, carry on software introduces and join in the project such as the representative, have conduct propaganda and wholesale sale to agent and consumer afore-mentioned software, basically enrol account of merchant bank, Bank of China to receive the illegal sale income of afore-mentioned software with its under one's name, accumulative total of illegal sale gain is in RMB 200 thousand yuan of above. The sale customer service that the accused person bilks some to basically be in charge of software works, assist Zhang Mou of the accused person, Liu Mou to sell afore-mentioned software.
* crime suspect founds " hold as expected " website
Controversy focus
"Small letter " the computer information system that whether should bring into criminal law to protect?
Juridical result
Guangzhou city sea court of bead division people entered a judgement on June 30, 2017:
? Zhang Mou of the accused person, Liu Mou makes offer invade, blame of program of system of information of illegal control computer, tool, sentence a set term of imprisonment 3 years, probation 5 years, punish golden RMB 100 thousand yuan.
? The accused person bilks some to make offer invade, blame of program of system of information of illegal control computer, tool, sentence a set term of imprisonment one year 6 months, probation 2 years (probation test deadline is calculated since the day with firm court decision) , punish golden RMB 10 thousand yuan.
After first instance adjudicates, the accused person did not appeal, case already become effective.
Judge view
Advocate careful judge Zhou Zhengyuan
Front courtyard of punishment of sea bead court thes president of a law court
The computer information system that criminal law protects, it is to point to the system that has function of automatic processing data, include equipment of the computer, network, communication equipment, automation to control equipment to wait. Data and function of applied process processing, right information undertakes collection, the processing such as treatment, it is the core important condition that criminal law limits computer information system. Small letter has data processing and information to collect, treatment, memory, transmit wait for a function, and small letter is tremendous to the consequence of nowadays Internet, enter people deeply already in the life, belong to the computer information system that criminal law protects.
Zhang Mou of the accused person, Liu Mou uses the computer knowledge of oneself, on foundation of small letter source code, innovate without any technologies, the exclusive identifier that uses a program through revising small letter product to be used at identifying malic operating system realizes small letter thereby many function; To small letter the executable file of the product undertakes modification operating, embedded Dylib (dynamic library) , hook undertakes to relevant function function when small letter is carried out (link up with is replaced) , realize pair of small letters thereby many, the breakthrough that circle of one key transmit, friend reminds the function of small letter restricted such as the good friend without limit.
Its behavior offerred convenience condition for the baleful sale of a few small business not only, was to play havoc with small letter more the environment mixed the platform zoology of this one gregarious software to disturb a network badly the normal order of fictitious world, great also the legal economy interest that harmed network software to develop business and operation business, destroyed the order of normal and fair competition of network software market, have certain society to endanger a gender, all form offer invade, blame of program of system of information of illegal control computer, tool, should grant to penalize.
How to maintain the computer information system that criminal law protects?
The times of main carrier and form is with PC system in mainstream computer IT, the limitation of oneself of legislation of be confined to, legislation protects criminal law " computer information system " crime still stays in " PC system " below this one specific technology setting. However, wait for the development of mobile terminal as smartphone and flat computer, the current situation that the deepness network that afore-mentioned legislative concepts and thinking had not accorded with instantly computer, mobile interconnection turns. With of all kinds smartphone APP of process of tripartite application is the application that mobile client of the representing carries, the promotion of blue tooth technology makes protect to criminal law " computer information system " undertake logical explanation has suitabiltiy and foresight very much.
Evaluate the computer information system that criminal law protects, should press the following two important document will maintain:
? Whether to have data and function of applied process processing, whether undertake collection to information, the processing such as treatment.
? Apply whether generally, whether to agree with socialistic morality viewpoint of value, whether to use hard civil or administrative measure compasses is made.
Specific and character, above all, "Computer information system " should be in a certain area, a certain industry, have relatively general application, already thorough great majority the person's life. Next, "Computer information system " the socialistic morality viewpoint of value that ought to accord with fair, justice, do not contain reach " yellow " , " bet " , " poison " the content that wait for insalubrious society custom or endangers social stability or function. Finally, right " computer information system " it is certain to endanger behavior to ought to be had " quantity " , namely administration and civil method suffer be restricted, except outside using penal method, do not have other better social processing technique.
Tall courtyard of selected already Guangdong releases this * case " Internet of 2017 year experience 10 big case " .
Origin | Sea bead court
Write person Zhou Zhengyuan
Picture | The network is integrated
Editor | Mao Shuainan&Dalin
Date of Zhang of small letter public: Gzcourt