破坏计算机信息系统罪

  • 网络Crime of Destroying Computer Information Systems;offences of destroying computer information systems
破坏计算机信息系统罪破坏计算机信息系统罪
  1. 盗窃QQ号的行为应该如何定性:在刑法意义上,盗窃QQ号行为构成的到底是盗窃罪、破坏计算机信息系统罪、还是侵犯通信自由罪。

    Theft of QQ . how the qualitative behavior ? : The sense of criminal law . theft QQ , constitutes in the end is theft , damage of Computer Information System , or the crime of violation of freedom of communication .

  2. 《破坏计算机信息系统罪》条文的疏漏与完善

    Omission and Improvement for Provision about Crime of Destroying Computer Information System

  3. 同时,对破坏计算机信息系统罪与相关犯罪的的牵连问题提出了处理原则。

    And puts forward a principle to solve interrelating problems between the crime of destroying computerized information system and the crimes concerned .

  4. 着重论述了破坏计算机信息系统罪客观方面立法的不完善之处,并提出建议;

    This article emphatically expounds the imperfect points of objective legislation about the crime of destroying computerized information system and puts forward aproposal ;

  5. 在司法解释方面,建议出台破坏计算机信息系统罪中后果严重以及侵犯著作权罪中复制发行的细化评定标准等等。

    In the judicial interpretation aspect , I suggested established the detailed appraisal standard of the " serious consequences ", the reproduce and distribute in crime against copyright .

  6. 我国目前的法律法规中,只有《刑法》第286、287条明确规定了计算机犯罪,主要有非法侵入计算机信息系统罪和破坏计算机信息系统罪。

    Computer crimes prescribed by article 286 and article 287 in Criminal Law mainly include the crime of hacking into the computer Information System , crime of destroying Information System .

  7. 根据我国刑法规定,计算机犯罪包含两个罪名,即非法侵入计算机信息系统罪和破坏计算机信息系统罪。

    According to our Criminal Law , there are two charges included in computer crime , namely charge of illegally invading the computer information system and charge of destroying computer information system .

  8. 第三部分我国刑法中的计算机犯罪本文主要阐述了我国刑法第285条规定的非法侵入计算机信息系统罪和第286条规定的破坏计算机信息系统罪。

    The third section : This thesis discusses mainly crime of illegal invading computer information system and crime of destroying computer information system prescribed in clause 285 and 286 of Chinese Criminal Law .

  9. 第四部分论述了非法侵入计算机信息系统罪、破坏计算机信息系统罪和利用计算机实施的金融诈骗、盗窃、贪污等犯罪的认定问题。

    Part IV explains the limits of the following crimes : the unlawfully invading the computer information system crime , the disrupting computer information system and the crimes of using computer to commit financial fraud , theft , embezzlement etc.

  10. 在司法实践中,对于侵犯虚拟财产的行为或以盗窃罪加以认定,或以侵犯通信自由罪加以认定,或以破坏计算机信息系统罪加以认定。

    In judicial practice , for infringement of the behavior of the virtual property theft to be identified , or the crime of violation of freedom of communication to be identified , or the crime of destruction of computer information systems to be identified .