SlideShare a Scribd company logo
1 of 38
Download to read offline
Computer crime law
in Hong Kong
why it matters and what’s next?
Charles Mok
Legislative Councillor (IT)
2019-4-9 Sharing @ PolyU COMP
Legal Aspects And Ethics Of Computing
2
3
The Interception of Communications
and Surveillance Ordinance (ICSO)
provides a statutory regime for the authorisation
and regulation of interception of
communications and covert surveillance
conducted by law enforcement agencies to
prevent or detect serious crime and protect
public security.
The Commissioner on Interception of
Communications and Surveillance is an
independent oversight authority, appointed by
the CE on the recommendation of the Chief
Justice.
4
Post-Snowden:
Concern over
government
surveillance via
user data
requests without
court warrant
5Source: Hong Kong Transparency Report, JMSC HKU
6Source: Hong Kong Transparency Report, JMSC HKU
7
Personal Data
(Privacy)
Ordinance
the Crimes Ordinance
(Cap. 200)
Section 161
access to computer with
criminal or dishonest intent
8
What is the
s161
created for
originally?
How is the
s161 being
used?
What are the
problems
with how it is
used?
CFA’s
ruling:
Now
what?
9
https://www.elegislation.gov.hk
161. Access to computer with criminal or dishonest intent
(1)Any person who obtains access to a computer—
(a) with intent to commit an offence;
(b) with a dishonest intent to deceive;
(c) with a view to dishonest gain for himself or another; or
(d) with a dishonest intent to cause loss to another,
whether on the same occasion as he obtains such access or on any future
occasion, commits an offence and is liable on conviction upon indictment to
imprisonment for 5 years.
What was
the original
purpose?
After a study began in 1988,
s.161 came into operation in 1993
- pre-Internet age
- No social media, no smartphone and mobile
devices
Computer fraud was becoming an emerging area of
crime
10
“
...the new offence of access to a
computer with criminal or dishonest
intent" aimed at penalising "access to a
computer for acts preparatory
but falling short of the
commission of a fraud.
--- then Secretary for Security, during the resumed
debate on the Second Reading of the Bill (1992)
11
How about now?
12
Application of s.161 has
become much wider, and
exceeded the original
purpose of the law
S.161 turned into
a catch-all for
the prosecution
More than 100 people were charged
every year in the past 5 years by this law.
⊙ Online fraud
⊙ Illegal access to a computer system
⊙ Sending / receiving confidential info
⊙ Taking upskirt photos/videos
⊙ DDoS attack
⊙ Posting threatening messages online
or inciting to “siege” LegCo
13
s.161 is applied to charge any case
involving a ‘computer’
Usually as an alternative charge
14
15
What are
“computers”?
HKSAR v Tsun Shui Lun [1999]
- A technical assistant to a radiologist at QM Hospital
released the medical records of the Secretary for
Justice to the press without her consent, claiming
the public’s right to know
- The case sparked public concern over privacy
- Tsun was charged with s.161 access to a computer
with a dishonest intent, sentenced to 6 months
imprisonment after trial in the magistracy
- “It is the intent or purpose of the offender at the
time of access which must be looked at, not his
intent or purpose at some later stage”
The
application
of s.161 in
court cases
16
HKSAR v Tsun Shui Lun [1999]
- Significance: meaning of ‘gain’ under section 161
- not confined to financial or proprietary benefits
- covers intangible benefits and can be transient
- Applicable as long as a person anticipates a benefit
or advantage even it cannot be used
The
application
of s.161 in
court cases
17
Security for Justice v Wong Ka Yip [2013]
- Wong was acquitted of s.161, obtaining access to
computer with view to dishonest gain (taking
videos of a colleague in the ladies’ toilet)
- The appeal was held, finding him guilty as charged
- The dictionary meaning of “computer” included
Wong’s smartphone: definition of “computer” as a
device for electronic data storage, processing and
retrieval
- Significance: established the smartphone could
perform all the functions of a computer and was a
“computer” in s.161
The
application
of s.161 in
court cases
18
Same behaviour,
different consequences?
E.g. Taking/sending photo of stolen
exam paper using a smartphone =
Access to computer with criminal or
dishonest intent
What if the person used a
film camera or copied by hand?
19
Number of cases related
to s.161 skyrocketed as
law enforcement had to
deal with more
computer-related
crimes
20
S.161 &
Online
Speech
21
⊙ Section 161 has a lower standard for prosecution
than the more substantial offences such as “illegal
gathering,” “criminal intimidation,” or “assaulting
police.”
⊙ In recent years, activists had been arrested for
online remarks
⊙ Usually sentenced to community service or
rehabilitation centre
⊙ Has the s.161 been applied selectively to repress
political activists’ speech on the Internet?
Is it fair for the
prosecution to apply the
law beyond the original
purpose and even
against online political
speech?
22
23
24
Example in the Occupy Central movement
Tong Wai-leung, 20-year-old defendant,
uploading the personal data of a police officer
and that of his family onto the internet, then
claiming that someone had been directed to
assault said family members.
- arrested for “criminal intimidation”
- Tong pleaded guilty to obtaining access to
a computer with criminal intent.
at least 19 people have been
arrested for comments
made online from June 2014
to August 2016.
one could be found guilty merely by having an
“intention” of committing a crime while using a
computer
Thoughtcrime?
25
Requesting the government to disclose details about the use of s.161 in LegCo
26
24 April 2013
5 Nov 2014
Online petition campaign
in 2014 calling for the
stop of abuse and
reviewing the scope of
s.161
More than 5000 people
supported
27
28
Civil society
groups
expressed
concerns
over the
scope of s.161
Government defended the
prosecution’s use of s.161 in
my motion debate calling for review
(2015)
- Necessary to address rising
computer crimes
- There is no inconsistency
- Critics misinterpreted the law
Taking the easiest charge
as catch-all in the
prosecution?
29
30
“
31
...The text of the provision, including the words
“obtain” and “access”, suggested an
unauthorised use of a computer, and did not sit
easily with the use by a person of their own
device....All in all, the text, context, and purpose
in this case pointed towards construing
s.161(1)(c) of the CO so that it does not extend
to the use of the offender’s own computer.
---Mr Justice French NPJ (Court of Final Appeal)
4 April 2019
The primary
school
teachers &
exam papers
case
32
33
The Court of
Final Appeal
ruled the
existing s.161
did not apply
to a person’s
own phone
or computer.
34
35
What’s next?
36
More discussion over cyber
crime in the coming years
Specific offence against
upskirt photo/video taking?
Citizen’s freedom and
rights must be protected
37
Thanks!
Stay in touch:
charlesmok@charlesmok.hk
Twitter @charlesmok
www.charlesmok.hk
facebook.com/charlesmokoffice
38

More Related Content

What's hot

DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIADEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIABenedict Ishabakaki
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime actCP-Union
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality reportJonan Momo
 
Cyber defamation and cyber smearing
Cyber defamation and cyber smearingCyber defamation and cyber smearing
Cyber defamation and cyber smearingAnuradha Chauhan
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaUniversitas Pembangunan Panca Budi
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Jautkarshjani
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012Jim Ayson
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptgagan deep
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaMaxwell Ranasinghe
 
Cyber Law
Cyber LawCyber Law
Cyber Lawihah
 
Revamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse ActRevamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse ActDavid Sweigert
 

What's hot (20)

DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIADEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Cybersex law
Cybersex lawCybersex law
Cybersex law
 
Cyber defamtion
Cyber defamtionCyber defamtion
Cyber defamtion
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber defamation and cyber smearing
Cyber defamation and cyber smearingCyber defamation and cyber smearing
Cyber defamation and cyber smearing
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
Theory Cyberspace
Theory CyberspaceTheory Cyberspace
Theory Cyberspace
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Revamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse ActRevamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse Act
 

Similar to Computer Crime Law in Hong Kong: Scope of S161 and Future Direction

communication decency act
communication decency actcommunication decency act
communication decency actAditya Kumar
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)GrittyCC
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacych samaram
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislationTgarmon34
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-finalAldrin SuperGo
 
Dominic WAI - When would using a computer be a crime?
Dominic WAI - When would using a computer be a crime?Dominic WAI - When would using a computer be a crime?
Dominic WAI - When would using a computer be a crime?REVULN
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxOlusegun Mosugu
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwkamalbhatt9229
 
Volonino ppt 01
Volonino ppt 01Volonino ppt 01
Volonino ppt 01lbadeniji
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement toolsMarkDennielMontiano
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesDrSamsonChepuri1
 
The Law and Aaron Swartz: Could it happen in Singapore?
The Law and Aaron Swartz: Could it happen in Singapore?The Law and Aaron Swartz: Could it happen in Singapore?
The Law and Aaron Swartz: Could it happen in Singapore?Benjamin Ang
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1MohsinMughal28
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 

Similar to Computer Crime Law in Hong Kong: Scope of S161 and Future Direction (20)

communication decency act
communication decency actcommunication decency act
communication decency act
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacy
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 
Dominic WAI - When would using a computer be a crime?
Dominic WAI - When would using a computer be a crime?Dominic WAI - When would using a computer be a crime?
Dominic WAI - When would using a computer be a crime?
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
4482LawEthics.ppt
4482LawEthics.ppt4482LawEthics.ppt
4482LawEthics.ppt
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Volonino ppt 01
Volonino ppt 01Volonino ppt 01
Volonino ppt 01
 
Security Wars
Security WarsSecurity Wars
Security Wars
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
 
The Law and Aaron Swartz: Could it happen in Singapore?
The Law and Aaron Swartz: Could it happen in Singapore?The Law and Aaron Swartz: Could it happen in Singapore?
The Law and Aaron Swartz: Could it happen in Singapore?
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 

More from Charles Mok

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet Charles Mok
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong KongCharles Mok
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionCharles Mok
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇Charles Mok
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationCharles Mok
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfCharles Mok
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyCharles Mok
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsCharles Mok
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital RepressionCharles Mok
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and EthicsCharles Mok
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇Charles Mok
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdfCharles Mok
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCharles Mok
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdfCharles Mok
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldCharles Mok
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsCharles Mok
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and IdentityCharles Mok
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckCharles Mok
 

More from Charles Mok (20)

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 

Recently uploaded

如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxmarielouisetulaytay
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxAdityasinhRana4
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 
Role and Responsibilities of Mediator and Approach
Role and Responsibilities of Mediator and ApproachRole and Responsibilities of Mediator and Approach
Role and Responsibilities of Mediator and Approach2020000445musaib
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 
The Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptxThe Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptxNeeteshKumar71
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书SD DS
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 

Recently uploaded (20)

如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptx
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 
Role and Responsibilities of Mediator and Approach
Role and Responsibilities of Mediator and ApproachRole and Responsibilities of Mediator and Approach
Role and Responsibilities of Mediator and Approach
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 
The Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptxThe Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptx
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 

Computer Crime Law in Hong Kong: Scope of S161 and Future Direction

  • 1. Computer crime law in Hong Kong why it matters and what’s next? Charles Mok Legislative Councillor (IT) 2019-4-9 Sharing @ PolyU COMP Legal Aspects And Ethics Of Computing
  • 2. 2
  • 3. 3 The Interception of Communications and Surveillance Ordinance (ICSO) provides a statutory regime for the authorisation and regulation of interception of communications and covert surveillance conducted by law enforcement agencies to prevent or detect serious crime and protect public security. The Commissioner on Interception of Communications and Surveillance is an independent oversight authority, appointed by the CE on the recommendation of the Chief Justice.
  • 5. 5Source: Hong Kong Transparency Report, JMSC HKU
  • 6. 6Source: Hong Kong Transparency Report, JMSC HKU
  • 8. the Crimes Ordinance (Cap. 200) Section 161 access to computer with criminal or dishonest intent 8 What is the s161 created for originally? How is the s161 being used? What are the problems with how it is used? CFA’s ruling: Now what?
  • 9. 9 https://www.elegislation.gov.hk 161. Access to computer with criminal or dishonest intent (1)Any person who obtains access to a computer— (a) with intent to commit an offence; (b) with a dishonest intent to deceive; (c) with a view to dishonest gain for himself or another; or (d) with a dishonest intent to cause loss to another, whether on the same occasion as he obtains such access or on any future occasion, commits an offence and is liable on conviction upon indictment to imprisonment for 5 years.
  • 10. What was the original purpose? After a study began in 1988, s.161 came into operation in 1993 - pre-Internet age - No social media, no smartphone and mobile devices Computer fraud was becoming an emerging area of crime 10
  • 11. “ ...the new offence of access to a computer with criminal or dishonest intent" aimed at penalising "access to a computer for acts preparatory but falling short of the commission of a fraud. --- then Secretary for Security, during the resumed debate on the Second Reading of the Bill (1992) 11
  • 12. How about now? 12 Application of s.161 has become much wider, and exceeded the original purpose of the law
  • 13. S.161 turned into a catch-all for the prosecution More than 100 people were charged every year in the past 5 years by this law. ⊙ Online fraud ⊙ Illegal access to a computer system ⊙ Sending / receiving confidential info ⊙ Taking upskirt photos/videos ⊙ DDoS attack ⊙ Posting threatening messages online or inciting to “siege” LegCo 13
  • 14. s.161 is applied to charge any case involving a ‘computer’ Usually as an alternative charge 14
  • 16. HKSAR v Tsun Shui Lun [1999] - A technical assistant to a radiologist at QM Hospital released the medical records of the Secretary for Justice to the press without her consent, claiming the public’s right to know - The case sparked public concern over privacy - Tsun was charged with s.161 access to a computer with a dishonest intent, sentenced to 6 months imprisonment after trial in the magistracy - “It is the intent or purpose of the offender at the time of access which must be looked at, not his intent or purpose at some later stage” The application of s.161 in court cases 16
  • 17. HKSAR v Tsun Shui Lun [1999] - Significance: meaning of ‘gain’ under section 161 - not confined to financial or proprietary benefits - covers intangible benefits and can be transient - Applicable as long as a person anticipates a benefit or advantage even it cannot be used The application of s.161 in court cases 17
  • 18. Security for Justice v Wong Ka Yip [2013] - Wong was acquitted of s.161, obtaining access to computer with view to dishonest gain (taking videos of a colleague in the ladies’ toilet) - The appeal was held, finding him guilty as charged - The dictionary meaning of “computer” included Wong’s smartphone: definition of “computer” as a device for electronic data storage, processing and retrieval - Significance: established the smartphone could perform all the functions of a computer and was a “computer” in s.161 The application of s.161 in court cases 18
  • 19. Same behaviour, different consequences? E.g. Taking/sending photo of stolen exam paper using a smartphone = Access to computer with criminal or dishonest intent What if the person used a film camera or copied by hand? 19
  • 20. Number of cases related to s.161 skyrocketed as law enforcement had to deal with more computer-related crimes 20
  • 21. S.161 & Online Speech 21 ⊙ Section 161 has a lower standard for prosecution than the more substantial offences such as “illegal gathering,” “criminal intimidation,” or “assaulting police.” ⊙ In recent years, activists had been arrested for online remarks ⊙ Usually sentenced to community service or rehabilitation centre ⊙ Has the s.161 been applied selectively to repress political activists’ speech on the Internet?
  • 22. Is it fair for the prosecution to apply the law beyond the original purpose and even against online political speech? 22
  • 23. 23
  • 24. 24 Example in the Occupy Central movement Tong Wai-leung, 20-year-old defendant, uploading the personal data of a police officer and that of his family onto the internet, then claiming that someone had been directed to assault said family members. - arrested for “criminal intimidation” - Tong pleaded guilty to obtaining access to a computer with criminal intent.
  • 25. at least 19 people have been arrested for comments made online from June 2014 to August 2016. one could be found guilty merely by having an “intention” of committing a crime while using a computer Thoughtcrime? 25
  • 26. Requesting the government to disclose details about the use of s.161 in LegCo 26 24 April 2013 5 Nov 2014
  • 27. Online petition campaign in 2014 calling for the stop of abuse and reviewing the scope of s.161 More than 5000 people supported 27
  • 29. Government defended the prosecution’s use of s.161 in my motion debate calling for review (2015) - Necessary to address rising computer crimes - There is no inconsistency - Critics misinterpreted the law Taking the easiest charge as catch-all in the prosecution? 29
  • 30. 30
  • 31. “ 31 ...The text of the provision, including the words “obtain” and “access”, suggested an unauthorised use of a computer, and did not sit easily with the use by a person of their own device....All in all, the text, context, and purpose in this case pointed towards construing s.161(1)(c) of the CO so that it does not extend to the use of the offender’s own computer. ---Mr Justice French NPJ (Court of Final Appeal) 4 April 2019
  • 33. 33
  • 34. The Court of Final Appeal ruled the existing s.161 did not apply to a person’s own phone or computer. 34
  • 35. 35
  • 36. What’s next? 36 More discussion over cyber crime in the coming years Specific offence against upskirt photo/video taking? Citizen’s freedom and rights must be protected
  • 37. 37
  • 38. Thanks! Stay in touch: charlesmok@charlesmok.hk Twitter @charlesmok www.charlesmok.hk facebook.com/charlesmokoffice 38