期刊文献+

数据犯罪的教义学限缩:基于数据使用权法益的证立

Contraction of Doctrines in Data Crimes:Establishing the Doctrine Based on the Right of Data Use
原文传递
导出
摘要 由于法益认知偏差,数据犯罪司法适用出现“膨胀化”现象。应重新检讨现有的数据犯罪法益观:解释论上的内容依附型法益观缺乏实定法依据;数据秩序型法益观及其所衍生的“数据三性”法益内涵,或违背数据流动的物本逻辑基础,或误解了“数据三性”的真实内涵而自相矛盾。相比之下,数据使用权法益指向数据流动最关键环节,具有事实基础,而与计算机犯罪的亲缘性也使其具有规范依据,且相较秩序法益的定性另有限制入罪范围和区分数据犯罪与传统犯罪数据化的理论功能。数据使用权的基本内涵是其相对于“数据法益”的独立性,以及基于权限的等级性、共享的非排他性而引申的两种法益类型:《刑法》第285条第2款获取型数据犯罪体现的是数据专属使用权法益;《刑法》第286条第2款妨害型数据犯罪则体现数据共同使用权法益。基于此细分类型可确定非法获取计算机信息系统数据罪的危险犯属性及对象范围,亦可确定破坏计算机信息系统罪的结果犯属性,并体系化地解释《刑法》第286条第1、2、3款的效果要件。 Due to cognitive deviations in legal interests,the judicial application of data crimes has witnessed an“expansion”.In response,a reevaluation of existing perspectives on data crime legal interests is necessary:the interpretative approach lacks a definite legal basis,and the data order-based legal interests and its derived“three characteristics of data”either violate the essential logic of data flow or misunderstand the true essence of the“three characteristics of data”,leading to internal contradictions.In comparison,the right of data used legal interest points to the most crucial aspect of data flow,grounded on factual foundations.Its affinity with computer crimes provides a normative basis.Moreover,in contrast with the order-based legal interests,it has the theoretical function of restricting the scope of criminalization and distinguishing between data crimes and the dataization of traditional crimes.The fundamental essence of the right of data use lies in its independence from“data legal interests”,and it extends to two types of legal interests based on authority and non-exclusivity derived from sharing:the obtaining-type data crime embodied in Article 285(2)of the Criminal Law reflects the legal interest in exclusive data use,while the obstruction-type data crime in Article 286(2)represents the legal interest in shared data use.This subcategorization enables the determination of the dangerous nature and target scope of the crime of illegally obtaining computer information system data,as well as the result element of the crime of damaging computer information systems,providing a systematic interpretation of the effectiveness criteria in Articles 286(1),(2)and(3)of the Criminal Law.
作者 阎二鹏 马光远 YAN Er-peng;MA Guang-yuan
机构地区 海南大学法学院
出处 《北方法学》 CSSCI 2024年第4期111-126,共16页 Northern Legal Science
基金 2019年国家社会科学基金项目“新型网络犯罪对传统刑事法理论的突破与应对研究”(2019FBX062)的阶段性成果。
关键词 获取型数据犯罪 妨害型数据犯罪 数据使用权法益 the obtaining-type data crime the obstruction-type data crime the right of data use
  • 相关文献

参考文献23

二级参考文献379

共引文献630

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部