SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
When would using a computer be a
crime?
CFA narrowed the scope of
application of the
offence of accessing a computer
with dishonest intent
2
16 May 2019
Section 161 (1) (c) of
Crimes Ordinance (Cap. 200)
• 161 Access to computer with criminal or
dishonest intent
• (1) Any person who obtains access to a computer—
• (a) …
• (b) ...
• (c) with a view to dishonest gain for himself or
another; or
• (d) …
• whether on the same occasion as he obtains such
access or on any future occasion, commits an
offence and is liable on conviction upon indictment
to imprisonment for 5 years
3
Elements
• “obtain access” to
• a ”computer”
• with a view to “dishonest gain”
for himself or another
4
Definition of “Computer” - Secretary for Justice
v Wong Ka Yip Ken [2013] 4 HKLRD 604 (“Wong
Ka Yip Ken case”)
• No definition in the Crimes Ordinance (Cap 200)
• 2014: a man set his smartphone to record a video in
the ladies’ washroom of his office
• found guilty of the section 161 offence
• Court of First Instance considered the definition of
“computer”
• held that the dictionary meaning of “computer” as
“a device for electronic data storage, processing
and retrieval” included smartphone
• Definition of “obtain access” not discussed
5
Excessive usage of the offence
• Police have invoked section 161 for:
• online fraud
• illegal intrusion into computer systems
• clandestine photo-taking using
smartphones in such non-public places as
toilets or changing rooms
• online publication of obscene or
threatening information
• inciting others on the Internet to engage in
illegal acts
6
Excessive usage of the offence (Cont’d)
• 1999:  a technical assistant at Queen Mary Hospital, retrieved
the medical records of the then-Secretary for Justice, Elsie
Leung, and share them with his friends, family, and the media,
•  found guilty of the section 161 offence
• 2014: a man posted on the popular HKGolden forum, calling
for protesters to “paralyse the railway system by gathering on
railway platforms in an attempt to create chaos” during the
pro-democracy Occupy protests
• arrested under the section 161 charge
• 2016: a 22-year-old man posted erotic writing involving rape
• arrested on suspicion of the section 161 charge
7
Definition of “obtain access” - Secretary for
Justice v Cheng Ka-Yee and others (“Cheng Ka
Yee case”)
• Three teachers in a primary school (the “Primary
School”) and a teacher in another primary school (the
“Four”)
• used mobile smartphones and a school’s computer to
leak pictures and copies of the questions of the
admission interview of the Primary School
• charged with s.161(1)(c) of the Crimes Ordinance:
“obtain access to a computer with dishonest or
criminal intent”
8
Cheng Ka-Yee case– Magistrates’ Court’s ruling
• 2016: acquitted by Kowloon City Magistrates’ Court:
• Element: with a view to “dishonest gain”
• not sure if the three who worked in the Primary School
were warned of the confidentiality obligations with
respect to the questions of the admission interview
• prosecution failed to prove the objective limb of the
Ghosh test on “honesty” against the Four
• review application by the prosecution: Magistrate confirmed
decision to acquit
9
Cheng Ka-Yee case– Court of First Instance
[2018] HKCFI 1809
• Element: “obtain access”
• Deputy High Court Judge Pang Chung-ping:
• Considered the definition of “obtain access”
• Refused to convict the Four
10
Cheng Ka-Yee case– Court of First Instance
[2018] HKCFI 1809
• Deputy High Court Judge Pang Chung-ping (Cont’d):
• Prosecution’s legal position that whether or not a person
should be punished depends on the type of devices that the
person used to communicate cannot be reasonably
explained
• The use of communication device was only peripheral to the
criminal or dishonest plan, which could be achieved with or
without the communication device
• using a person’s own mobile smartphones, or use of
computer which is not unauthorized, to leak questions did
not amount to “obtaining access to computer”
11
Cheng Ka-Yee case – Court of First Instance
[2018] HKCFI 1809 (Cont’d)
• Deputy High Court Judge Pang Chung-ping (Cont’d):
• drew a difference between “obtaining access to a
computer” and “using a computer”
• does not support the contention that “obtaining access to
computer” includes using a person’s own smartphone to
communicate, to take photographs or to send messages
• To prove actus reus (the criminal act), the prosecution
must prove “the unauthorized extraction and use of
information” from a computer
12
Cheng Ka-Yee case – Court of Final Appeal
[2019] HKCFA 9
• Department of Justice appealed CFI’s decision
• CFA unanimously dismissed the appeal
• upheld the CFI’s decision that the s.161(1)(c) Charge should
not apply to a person’s own computer when it did not
involve access to another’s computer
13
Cheng Ka-Yee case – Court of Final Appeal
[2019] HKCFA 9 (Cont’d)
• Mr. Justice French NPJ decided (agreed by CJ Ma, Ribeiro
PJ, Fok PJ, Cheung PJ), inter alia:
• as a matter of language, one always “obtain” access to
something to which one did not have access before
• the statutory language is a bit redundant as the verb
“obtain” is a synonym for “access” when used as a verb
• the overlap emphasizes the oddness of applying the
s.161(1)(c) Charge to the use by a person of their own
computer
14
Cheng Ka-Yee case – Court of Final Appeal
[2019] HKCFA 9 (Cont’d)
• Mr. Justice French NPJ decided (agreed by CJ Ma, Ribeiro
PJ, Fok PJ, Cheung PJ), inter alia (Cont’d):
• during the legislative history, the interpretive provision “a
person obtains access to a computer if (and only if) he
causes a computer to perform any function” was deleted;
• the words “(obtaining access) with or without authority” did
not appear in the bill either;
• s.161(1)(c) Charge does not apply to the use by a person
of his or her own computer, not involving access to
another’s computer
15
Cheng Ka-Yee case – Court of Final Appeal
[2019] HKCFA 9 (Cont’d)
• Mr. Justice French NPJ (agreed by CJ Ma, Ribeiro PJ, Fok
PJ, Cheung PJ):
• it is not the function of the Court to adopt a construction
of a statute that advance a desirable public policy;
• the Court seeks to ascertain the purpose of the statute
to inform its construction;
• the Court does not identify a purpose which it thinks
would be beneficial and then construe the statute to fit it
16
What if Wong Ka Yip Ken case is decided after
CFA judgment in Cheng Ka Yee case?
• Facts: A man set his own smartphone to record a video in
the ladies’ washroom of his office
• Analysis: using his own smartphone device to record the
video
• using own device, and it did not involve access to another’s
computer
•  would not satisfy the definition of “obtaining access”
• Cannot prosecute under s.161 of Crimes Ordinance (Cap.
200)
17
What if Wong Ka Yip Ken case is decided after
CFA judgment in Cheng Ka Yee case? (Cont’d)
• Possible alternative charges?
• (1) Outraging public decency? (common law offence)
• may not apply
• Elements:
• “capable of being seen by two or more persons
who are actually present” AND
• “in a place where there was a real possibility that
members of the general public might witness it”
• difficult to prove
18
What if Wong Ka Yip Ken case is decided after
CFA judgment in Cheng Ka Yee case? (Cont’d)
• Possible alternative charges? (Cont’d)
• (2) Disorder in public places? (s.17B, Public Order Ordinance,
Cap. 245)
• may not apply
• Elements:
• act was done in public place
• the victim is put in fear of being so harmed through the
disturbance, and
• an average Hong Kong citizen is likely to be outraged by
such conduct
• female toilet of the company is unlikely a “public place”
19
What if Wong Ka Yip Ken case is decided after
CFA judgment in Cheng Ka Yee case? (Cont’d)
• Possible alternative charges? (Cont’d)
• (3) Loitering causing concern ? (s. 160 Crimes Ordinance, Cap. 200)
• may or may not apply
• Elements:
• offender has been idling, hanging about or remaining
• in or about the vicinity of the common parts of a building
(entrance hall, lobby, toilet, compound, car park, etc.)
• causes any person reasonably to be concerned for his/her
safety or well-being
• depends on whether the female toilet of the company is
considered as a “common part of a building”
• E.g.: whether the toilet is in common use by occupiers of building
20
What if Wong Ka Yip Ken case is decided after
CFA judgment in Cheng Ka Yee case? (Cont’d)
• May 2018: Law Reform Commission’s Review of Sexual
Offences Subcommittee
• proposed the creation of a new offence of “voyeurism” to
criminalise acts of non-consensual observation or visual
recording of another person done for a sexual purpose
• forms of visual recording would include photography, video
recording and the taking of digital images
• The prosecution in Wong Ka Yip Ken case may have to rely on
the proposed new offence of “voyeurism”
21
22

Contenu connexe

Tendances

Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]leslieannpt
 
Internet filtering in schools
Internet filtering in schoolsInternet filtering in schools
Internet filtering in schoolsadawidziuk
 
Privacy and the Law in the Oversharing Era
Privacy and the Law in the Oversharing EraPrivacy and the Law in the Oversharing Era
Privacy and the Law in the Oversharing EraJason Nathu
 
CYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLECYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLEInterMediaKT
 
Perspectivesmanage
PerspectivesmanagePerspectivesmanage
PerspectivesmanageArt Bowker
 
communication decency act
communication decency actcommunication decency act
communication decency actAditya Kumar
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislationTgarmon34
 
LWB486 Week 6 Copyright
LWB486 Week 6 CopyrightLWB486 Week 6 Copyright
LWB486 Week 6 CopyrightPeter Black
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawSource Conference
 
Public-Employee Privacy Rights in the Age of Social Media
Public-Employee Privacy Rights in the Age of Social MediaPublic-Employee Privacy Rights in the Age of Social Media
Public-Employee Privacy Rights in the Age of Social MediaBailey and Wyant PLLC
 
Copyright Scenario Cases
Copyright Scenario CasesCopyright Scenario Cases
Copyright Scenario CasesDCPS
 
Revamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse ActRevamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse ActDavid Sweigert
 
Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextInfo_Studies_Aberystwyth
 

Tendances (20)

File000157
File000157File000157
File000157
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
Cybersex law
Cybersex lawCybersex law
Cybersex law
 
Elet5e ch04
Elet5e ch04Elet5e ch04
Elet5e ch04
 
Internet filtering in schools
Internet filtering in schoolsInternet filtering in schools
Internet filtering in schools
 
Privacy and the Law in the Oversharing Era
Privacy and the Law in the Oversharing EraPrivacy and the Law in the Oversharing Era
Privacy and the Law in the Oversharing Era
 
CYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLECYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLE
 
Perspectivesmanage
PerspectivesmanagePerspectivesmanage
Perspectivesmanage
 
communication decency act
communication decency actcommunication decency act
communication decency act
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
Right to privacy in India
Right to privacy in IndiaRight to privacy in India
Right to privacy in India
 
LWB486 Week 6 Copyright
LWB486 Week 6 CopyrightLWB486 Week 6 Copyright
LWB486 Week 6 Copyright
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime Law
 
Public-Employee Privacy Rights in the Age of Social Media
Public-Employee Privacy Rights in the Age of Social MediaPublic-Employee Privacy Rights in the Age of Social Media
Public-Employee Privacy Rights in the Age of Social Media
 
File000098
File000098File000098
File000098
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Copyright Scenario Cases
Copyright Scenario CasesCopyright Scenario Cases
Copyright Scenario Cases
 
Revamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse ActRevamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse Act
 
Jailbreaking OK'd by Librarian
Jailbreaking OK'd by LibrarianJailbreaking OK'd by Librarian
Jailbreaking OK'd by Librarian
 
Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice Context
 

Similaire à Dominic WAI - When would using a computer be a crime?

A Comparative Study on the Intermediary Liability of Web 2.0 Platforms in C...
A Comparative Study on the Intermediary Liability of Web 2.0 Platforms in C...A Comparative Study on the Intermediary Liability of Web 2.0 Platforms in C...
A Comparative Study on the Intermediary Liability of Web 2.0 Platforms in C...taonancy
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong KongCharles Mok
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)GrittyCC
 
Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebDarius Whelan
 
Internet Corporate Responsibility
Internet Corporate ResponsibilityInternet Corporate Responsibility
Internet Corporate ResponsibilityCharles Mok
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
 
Induced infringement
Induced infringementInduced infringement
Induced infringementKlemchuk LLP
 
Patents That Cannot Be Infringed
Patents That Cannot Be InfringedPatents That Cannot Be Infringed
Patents That Cannot Be Infringedblewisbell
 
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...CODE BLUE
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCharles Mok
 
Fighting Corruption: Changing the Systems and Processes
Fighting Corruption: Changing the Systems and ProcessesFighting Corruption: Changing the Systems and Processes
Fighting Corruption: Changing the Systems and ProcessesBillyCheuk
 
search engines and copyrights : How far a fair defense
search engines and copyrights : How far a fair defense search engines and copyrights : How far a fair defense
search engines and copyrights : How far a fair defense NanubalaDhruvan
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringementwcudsce
 
INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...
INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...
INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...Prof. (Dr.) Azimkhan B. Pathan
 
Computer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaComputer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaVishni Ganepola
 

Similaire à Dominic WAI - When would using a computer be a crime? (20)

A Comparative Study on the Intermediary Liability of Web 2.0 Platforms in C...
A Comparative Study on the Intermediary Liability of Web 2.0 Platforms in C...A Comparative Study on the Intermediary Liability of Web 2.0 Platforms in C...
A Comparative Study on the Intermediary Liability of Web 2.0 Platforms in C...
 
File000116
File000116File000116
File000116
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)
 
Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the Web
 
Internet Corporate Responsibility
Internet Corporate ResponsibilityInternet Corporate Responsibility
Internet Corporate Responsibility
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Induced infringement
Induced infringementInduced infringement
Induced infringement
 
Patents That Cannot Be Infringed
Patents That Cannot Be InfringedPatents That Cannot Be Infringed
Patents That Cannot Be Infringed
 
Security Wars
Security WarsSecurity Wars
Security Wars
 
November 2011 Patent Group Luncheon
November 2011 Patent Group LuncheonNovember 2011 Patent Group Luncheon
November 2011 Patent Group Luncheon
 
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
Fighting Corruption: Changing the Systems and Processes
Fighting Corruption: Changing the Systems and ProcessesFighting Corruption: Changing the Systems and Processes
Fighting Corruption: Changing the Systems and Processes
 
search engines and copyrights : How far a fair defense
search engines and copyrights : How far a fair defense search engines and copyrights : How far a fair defense
search engines and copyrights : How far a fair defense
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringement
 
INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...
INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...
INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...
 
Computer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaComputer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lanka
 
3170725_Unit-5.pptx
3170725_Unit-5.pptx3170725_Unit-5.pptx
3170725_Unit-5.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Plus de REVULN

Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...REVULN
 
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...REVULN
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismREVULN
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaREVULN
 
Stewart MACKENZIE - The edge of the Internet is becoming the center
Stewart MACKENZIE - The edge of the Internet is becoming the centerStewart MACKENZIE - The edge of the Internet is becoming the center
Stewart MACKENZIE - The edge of the Internet is becoming the centerREVULN
 
Masayuki HATTA - Debunking toxic "Matome sites" in Japan
Masayuki HATTA - Debunking toxic "Matome sites" in JapanMasayuki HATTA - Debunking toxic "Matome sites" in Japan
Masayuki HATTA - Debunking toxic "Matome sites" in JapanREVULN
 
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...REVULN
 
Rachel BLUNDY - Overview of AFP Fact Check
Rachel BLUNDY - Overview of AFP Fact CheckRachel BLUNDY - Overview of AFP Fact Check
Rachel BLUNDY - Overview of AFP Fact CheckREVULN
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...REVULN
 
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...REVULN
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
 
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...REVULN
 

Plus de REVULN (12)

Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
 
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News Media
 
Stewart MACKENZIE - The edge of the Internet is becoming the center
Stewart MACKENZIE - The edge of the Internet is becoming the centerStewart MACKENZIE - The edge of the Internet is becoming the center
Stewart MACKENZIE - The edge of the Internet is becoming the center
 
Masayuki HATTA - Debunking toxic "Matome sites" in Japan
Masayuki HATTA - Debunking toxic "Matome sites" in JapanMasayuki HATTA - Debunking toxic "Matome sites" in Japan
Masayuki HATTA - Debunking toxic "Matome sites" in Japan
 
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
 
Rachel BLUNDY - Overview of AFP Fact Check
Rachel BLUNDY - Overview of AFP Fact CheckRachel BLUNDY - Overview of AFP Fact Check
Rachel BLUNDY - Overview of AFP Fact Check
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
 
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
 

Dernier

Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
Guide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxGuide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxjennysansano2
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfssuser3e15612
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSRoshniSingh312153
 
Presentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointPresentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointMohdYousuf40
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesAre There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesChesley Lawyer
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxAdityasinhRana4
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeMelvinPernez2
 

Dernier (20)

Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
Guide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxGuide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docx
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
 
Presentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointPresentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal point
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesAre There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptx
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil Code
 

Dominic WAI - When would using a computer be a crime?

  • 1.
  • 2. When would using a computer be a crime? CFA narrowed the scope of application of the offence of accessing a computer with dishonest intent 2 16 May 2019
  • 3. Section 161 (1) (c) of Crimes Ordinance (Cap. 200) • 161 Access to computer with criminal or dishonest intent • (1) Any person who obtains access to a computer— • (a) … • (b) ... • (c) with a view to dishonest gain for himself or another; or • (d) … • whether on the same occasion as he obtains such access or on any future occasion, commits an offence and is liable on conviction upon indictment to imprisonment for 5 years 3
  • 4. Elements • “obtain access” to • a ”computer” • with a view to “dishonest gain” for himself or another 4
  • 5. Definition of “Computer” - Secretary for Justice v Wong Ka Yip Ken [2013] 4 HKLRD 604 (“Wong Ka Yip Ken case”) • No definition in the Crimes Ordinance (Cap 200) • 2014: a man set his smartphone to record a video in the ladies’ washroom of his office • found guilty of the section 161 offence • Court of First Instance considered the definition of “computer” • held that the dictionary meaning of “computer” as “a device for electronic data storage, processing and retrieval” included smartphone • Definition of “obtain access” not discussed 5
  • 6. Excessive usage of the offence • Police have invoked section 161 for: • online fraud • illegal intrusion into computer systems • clandestine photo-taking using smartphones in such non-public places as toilets or changing rooms • online publication of obscene or threatening information • inciting others on the Internet to engage in illegal acts 6
  • 7. Excessive usage of the offence (Cont’d) • 1999:  a technical assistant at Queen Mary Hospital, retrieved the medical records of the then-Secretary for Justice, Elsie Leung, and share them with his friends, family, and the media, •  found guilty of the section 161 offence • 2014: a man posted on the popular HKGolden forum, calling for protesters to “paralyse the railway system by gathering on railway platforms in an attempt to create chaos” during the pro-democracy Occupy protests • arrested under the section 161 charge • 2016: a 22-year-old man posted erotic writing involving rape • arrested on suspicion of the section 161 charge 7
  • 8. Definition of “obtain access” - Secretary for Justice v Cheng Ka-Yee and others (“Cheng Ka Yee case”) • Three teachers in a primary school (the “Primary School”) and a teacher in another primary school (the “Four”) • used mobile smartphones and a school’s computer to leak pictures and copies of the questions of the admission interview of the Primary School • charged with s.161(1)(c) of the Crimes Ordinance: “obtain access to a computer with dishonest or criminal intent” 8
  • 9. Cheng Ka-Yee case– Magistrates’ Court’s ruling • 2016: acquitted by Kowloon City Magistrates’ Court: • Element: with a view to “dishonest gain” • not sure if the three who worked in the Primary School were warned of the confidentiality obligations with respect to the questions of the admission interview • prosecution failed to prove the objective limb of the Ghosh test on “honesty” against the Four • review application by the prosecution: Magistrate confirmed decision to acquit 9
  • 10. Cheng Ka-Yee case– Court of First Instance [2018] HKCFI 1809 • Element: “obtain access” • Deputy High Court Judge Pang Chung-ping: • Considered the definition of “obtain access” • Refused to convict the Four 10
  • 11. Cheng Ka-Yee case– Court of First Instance [2018] HKCFI 1809 • Deputy High Court Judge Pang Chung-ping (Cont’d): • Prosecution’s legal position that whether or not a person should be punished depends on the type of devices that the person used to communicate cannot be reasonably explained • The use of communication device was only peripheral to the criminal or dishonest plan, which could be achieved with or without the communication device • using a person’s own mobile smartphones, or use of computer which is not unauthorized, to leak questions did not amount to “obtaining access to computer” 11
  • 12. Cheng Ka-Yee case – Court of First Instance [2018] HKCFI 1809 (Cont’d) • Deputy High Court Judge Pang Chung-ping (Cont’d): • drew a difference between “obtaining access to a computer” and “using a computer” • does not support the contention that “obtaining access to computer” includes using a person’s own smartphone to communicate, to take photographs or to send messages • To prove actus reus (the criminal act), the prosecution must prove “the unauthorized extraction and use of information” from a computer 12
  • 13. Cheng Ka-Yee case – Court of Final Appeal [2019] HKCFA 9 • Department of Justice appealed CFI’s decision • CFA unanimously dismissed the appeal • upheld the CFI’s decision that the s.161(1)(c) Charge should not apply to a person’s own computer when it did not involve access to another’s computer 13
  • 14. Cheng Ka-Yee case – Court of Final Appeal [2019] HKCFA 9 (Cont’d) • Mr. Justice French NPJ decided (agreed by CJ Ma, Ribeiro PJ, Fok PJ, Cheung PJ), inter alia: • as a matter of language, one always “obtain” access to something to which one did not have access before • the statutory language is a bit redundant as the verb “obtain” is a synonym for “access” when used as a verb • the overlap emphasizes the oddness of applying the s.161(1)(c) Charge to the use by a person of their own computer 14
  • 15. Cheng Ka-Yee case – Court of Final Appeal [2019] HKCFA 9 (Cont’d) • Mr. Justice French NPJ decided (agreed by CJ Ma, Ribeiro PJ, Fok PJ, Cheung PJ), inter alia (Cont’d): • during the legislative history, the interpretive provision “a person obtains access to a computer if (and only if) he causes a computer to perform any function” was deleted; • the words “(obtaining access) with or without authority” did not appear in the bill either; • s.161(1)(c) Charge does not apply to the use by a person of his or her own computer, not involving access to another’s computer 15
  • 16. Cheng Ka-Yee case – Court of Final Appeal [2019] HKCFA 9 (Cont’d) • Mr. Justice French NPJ (agreed by CJ Ma, Ribeiro PJ, Fok PJ, Cheung PJ): • it is not the function of the Court to adopt a construction of a statute that advance a desirable public policy; • the Court seeks to ascertain the purpose of the statute to inform its construction; • the Court does not identify a purpose which it thinks would be beneficial and then construe the statute to fit it 16
  • 17. What if Wong Ka Yip Ken case is decided after CFA judgment in Cheng Ka Yee case? • Facts: A man set his own smartphone to record a video in the ladies’ washroom of his office • Analysis: using his own smartphone device to record the video • using own device, and it did not involve access to another’s computer •  would not satisfy the definition of “obtaining access” • Cannot prosecute under s.161 of Crimes Ordinance (Cap. 200) 17
  • 18. What if Wong Ka Yip Ken case is decided after CFA judgment in Cheng Ka Yee case? (Cont’d) • Possible alternative charges? • (1) Outraging public decency? (common law offence) • may not apply • Elements: • “capable of being seen by two or more persons who are actually present” AND • “in a place where there was a real possibility that members of the general public might witness it” • difficult to prove 18
  • 19. What if Wong Ka Yip Ken case is decided after CFA judgment in Cheng Ka Yee case? (Cont’d) • Possible alternative charges? (Cont’d) • (2) Disorder in public places? (s.17B, Public Order Ordinance, Cap. 245) • may not apply • Elements: • act was done in public place • the victim is put in fear of being so harmed through the disturbance, and • an average Hong Kong citizen is likely to be outraged by such conduct • female toilet of the company is unlikely a “public place” 19
  • 20. What if Wong Ka Yip Ken case is decided after CFA judgment in Cheng Ka Yee case? (Cont’d) • Possible alternative charges? (Cont’d) • (3) Loitering causing concern ? (s. 160 Crimes Ordinance, Cap. 200) • may or may not apply • Elements: • offender has been idling, hanging about or remaining • in or about the vicinity of the common parts of a building (entrance hall, lobby, toilet, compound, car park, etc.) • causes any person reasonably to be concerned for his/her safety or well-being • depends on whether the female toilet of the company is considered as a “common part of a building” • E.g.: whether the toilet is in common use by occupiers of building 20
  • 21. What if Wong Ka Yip Ken case is decided after CFA judgment in Cheng Ka Yee case? (Cont’d) • May 2018: Law Reform Commission’s Review of Sexual Offences Subcommittee • proposed the creation of a new offence of “voyeurism” to criminalise acts of non-consensual observation or visual recording of another person done for a sexual purpose • forms of visual recording would include photography, video recording and the taking of digital images • The prosecution in Wong Ka Yip Ken case may have to rely on the proposed new offence of “voyeurism” 21
  • 22. 22