5 T1 M" G% O# x. h! C3 S. n法政匯思 7 X6 O# n9 W8 @6 [/ a# g: btvb now,tvbnow,bttvb2015年6月9日tvb now,tvbnow,bttvb) w, k' a7 g4 z1 B( I
2 y4 b) Q# n' o% B公仔箱論壇[1] http://www.legco.gov.hk/yr14-15/chinese/panels/se/papers/se20150602cb2-1560-3-c.pdf ) q0 K2 T( R% c1 Q* m[2] HCMA723/19983 K+ t4 N& o' o$ w$ y* ?0 h( F9 L2 T
[3] HCMA77/2013; T& _2 N1 B' d' O
[4] 判詞第50 段中提到: “There is a very wide range of criminal and dishonest activities which fall within the ambit of s.161. In this day and age, very serious crimes or frauds can be committed by gaining access to other people's computers and uplifting information contained therein. Examples include meddling bank records, transferring large sums of money from one account to another, and stealing secret programmes and data such as customers lists and business records. Such activities can be very serious and obtaining access into computers with such intention or for such purposes is no less grave.”tvboxnow.com# j! t; f8 k8 ?7 B0 D
[5] 蘋果日報2014年12月8日報導:議員質疑只捕不控如恐嚇: http://hk.apple.nextmedia.com/news/art/20141208/18961819tvb now,tvbnow,bttvb0 ^5 w6 e* c. S
& V9 q9 i: o% `公仔箱論壇, b8 V; a: _' J5 H9 l+ Z; B
In the meeting on 2 June 2015 of Legislative Council Panel on Security, Councilor Charles Mok raised inquiries on the scope of applicability of section 161 of Crimes Ordinance (Cap. 200), access to computer with criminal or dishonest intent (“Section 161”). : y$ X$ ?& U3 E/ stvboxnow.com+ H& m* g9 F; m4 j: b4 D
According to LegCo Paper Number (LC Paper No. CB(2)1560/14-15(03))[1], Security Bureau relied on the following two cases to establish that Section 161 aims at combating any acts of using computer with criminal or dishonest intent. . C7 B: j0 N ^/ o公仔箱論壇6 k7 R" B$ A7 A% x0 ^7 U$ v3 E
- HKSAR v Tsun Shui Lun[2] 0 `+ z( z7 B6 \9 V- Secretary for Justice v Wong Ka Yip, Ken[3] 2 [! T9 w, I$ W8 v/ h- ~tvboxnow.comFor the reasons below, the statement made by the Security Bureau is simply a sweeping generalisation.tvboxnow.com* [0 T5 |1 g! [- Q# @8 h3 R$ b
tvboxnow.com& d. ~8 j4 e/ z+ i. v. L; r* x
(I) The first case referred to does not state Section 161 applies to online statements " K$ b8 H8 w5 A# g* O( RIn HKSAR v Tsun Shui Lun, the defendant was charged with an offence under section 161(c) for his unauthorized access into another person’s computer. The Security Bureau quoted paragraph 20 of the judgment which apparently only focuses on authorised access into another person’s computer, rather than online statements.公仔箱論壇8 _1 v5 A; ^* T3 u* j
In fact, the Security Bureau only partially quoted paragraph 20 of Hon Chan CJHC’s judgment. In the remaining part of paragraph 20, the judge named a few acts of unauthorised access into another person’s computer, which includes: d, ^+ \7 f- F" k- R+ k4 NTVBNOW 含有熱門話題,最新最快電視,軟體,遊戲,電影,動漫及日常生活及興趣交流等資訊。- A businessman wants to acquire information about his competitors in order to enable himself to have an advantage over them. ! g5 Y9 h- V+ t! K6 `! P- A disgruntled employee wants to ruin his employer’s business by revealing his employer’s trade secrets to others. ) _- X9 i: [. e. S( i- An ex-employee wants to obtain a list of his former employer’s customers in order to solicit business from them. & D8 T9 d: p7 u E# Y" T7 G0 O6 Y xtvb now,tvbnow,bttvb- A dissatisfied bank officer wants to erase the bank’s records form the computer in order to cause confusion or to irritate the bank’s customers.TVBNOW 含有熱門話題,最新最快電視,軟體,遊戲,電影,動漫及日常生活及興趣交流等資訊。 m" H, ^, |7 o& v" s0 S: i
Hon Chan CJHC when considering sentencing in paragraph 50 of the same judgment also listed some examples of criminal and dishonest activities which fall within the ambit of Section 161. All the examples are related to commercial crimes. [4] However, these examples do not include online statements, which have been frequently prosecuted, and are of an entirely different nature. - \& W. I, l; m. R. ntvboxnow.comTherefore, the statement made by Security Bureau (ie the Judge has clearly indicated that Section 161 aims at combating any acts of using computer with criminal or dishonest intent) is over-generalised, even entirely wrong.2 h' W- b0 s9 u5 }! x
" F" |8 ]" \' q(II) The second case referred to does not reach an conclusion as the Security Bureau claimed 8 x- f6 \3 C4 y9 _! kThe Security Bureau also referred to Security for Justice v Wong Ka Yip, Ken to support the statement that, according to Section 161, once an offender had accessed the computer, and at the material time he had one of the four intents or purposes set out in section 161, he would have contravened the section.* v9 V `4 B* c
4 E7 @, \; T9 j; C. i6 }+ dtvboxnow.comIn fact, this case only confirmed that Section 161 covered acts using smart phone or any other electronic devices to commit the offence. This means that if the device used is not an electronic one, Section 161 will be inapplicable. The Security Bureau cannot (and absolutely should not) extend the judgment limitlessly so as to achieve the conclusion that it wishes to see.3 R! B4 R- l8 S1 w! n M
tvboxnow.com5 v9 V' i( f$ a" h
There are also doubts as to whether it is appropriate to engage Section 161 to deal with this type of indecency cases. Although it is established that Section 161 could be used to prosecute crimes using mobile phones as device, it gives an impression that engaging Section 161 to prosecute is just done out of convenience. # u6 F3 x' T7 htvb now,tvbnow,bttvbCalling for Review of Applicability of Section 161TVBNOW 含有熱門話題,最新最快電視,軟體,遊戲,電影,動漫及日常生活及興趣交流等資訊。! O* ^) O4 L1 s3 Y; V
On the aforesaid, the Security Bureau should review the applicability “access to computer with criminal or dishonest intent” as soon as possible, in order to avoid ill-use of Section 161 in prosecution. Section 161 should not be engaged for the sole reason of “cherry picking the charge which appears easier to secure a conviction”.[5]tvb now,tvbnow,bttvb! v" @9 S. G) G# Z5 r: W n n7 U
C% f3 A$ t3 ~# G% _TVBNOW 含有熱門話題,最新最快電視,軟體,遊戲,電影,動漫及日常生活及興趣交流等資訊。Progressive Lawyers Group3 Z) ~/ i; h( k9 n: }' Q9 T v
9 June 2015tvboxnow.com/ g1 h2 }! M6 Y$ \
; j7 ]- P% P2 |tvboxnow.com[1] http://www.legco.gov.hk/yr14-15/chinese/panels/se/papers/se20150602cb2-1560-3-c.pdf ; E9 Q7 A( V0 s" y p公仔箱論壇[2] HCMA723/1998 6 X, F1 o$ {4 r8 L* _& R[3] HCMA77/201 & y0 g: n* Q( y8 L7 C, K" f5 [tvboxnow.com[4] Paragraph 50 of the judgment states: "There is a very wide range of criminal and dishonest activities which fall within the ambit of s.161. In this day and age, very serious crimes or frauds can be committed by gaining access to other people's computers and uplifting information contained therein. Examples include meddling bank records, transferring large sums of money from one account to another, and stealing secret programmes and data such as customers lists and business records. Such activities can be very serious and obtaining access into computers with such intention or for such purposes is no less grave."tvboxnow.com! k& s {& n0 @/ M
[5] Apple Daily, 8 December 2014, Councilor questioned: arresting but not prosecuting are no different from blackmail: http://hk.apple.nextmedia.com/news/art/20141208/18961819