Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/55052
題名: 我國與美國聯邦對身分竊用法律之比較研究
A comparative study on the identity theft related laws and practices of Taiwan (R.O.C.) and U.S.A
作者: 徐子文
Hsu, Tzu Wen Daniel
貢獻者: 陳起行
Chen, Chi Shing
徐子文
Hsu, Tzu Wen Daniel
關鍵詞: 身分竊用
身分竊盜
身分詐欺
冒用身分
個人資料保護
電腦犯罪
Identity Theft
Identity Fraud
Privacy
Personal Data Protection
Cyber Crime
日期: 2012
上傳時間: 30-Oct-2012
摘要: 因為資通訊科技之普及發達,提升經濟、社會活動的便捷性並豐富人們的生活品質,但一面兩刃,它同時也蘊藏了新興犯罪的機會,對經濟、社會活動之正常運作帶來威脅。其中,身分資料偷竊及身分冒用(以下簡稱「身分竊用」),已然成為資訊社會時代嚴重的新興犯罪之一。「身分竊用」一般俗稱為「身分竊盜」,其係由英文原文identity theft直譯而來。其實身分無從竊盜起,英文原文的identity theft其實也是簡稱,完整的意義是identity theft and assumption,係指行為人未經授權擅用他人用已表彰其身分的證明或資訊,從而冒用他人之身分,遂行各式活動。本研究為求接近其實際文意內涵,在本研究中將其譯為「身分竊用」。\n同為自由開放和高度科技化之社會,美國法律制度和社會機制環境雖與我多有不同,但其面對相同問題時的所受之影響和相對處理方式,或可為我國在處理同類問題時之參考。美國在身分竊用之相關法律,自從1970年代以降,至少制定20件以上的相關法律。先是從個人金融隱私權的保護著手,如在1970年制定《公平信用報告法》(FCRA)、1974年所制定的《隱私權法》(Privacy Act)。1998年則進一步制定通過《身分竊用嚇阻法》(Identity Theft and Assumption Deterrence Act),明文規範「身分竊用」為刑事犯罪行為。《身分竊用嚇阻法》最重要價值是確認了身分被竊用的人也是犯罪被害者,相較於之前只有因犯罪者使用身分竊用手法而被詐騙失去財務的人才被認為是受害者 ,有了很大的進步。而之後的法律制定和實務處理即朝向個人資料保護、身分竊用預防和損害抑制,以及執法訴追等方向前進。\n本研究以身分識別理論為起點,探討身分竊用在現代資訊社會中之角色和因身分識別資料被竊取冒用所發生之行為對個人社會和經濟的影響,蒐集美國聯邦自1970代迄今所制定和處理身分竊用相關之法律並予以摘錄分類,最後比較兩國對身分竊用問題處理之異同,並嘗試提出借鏡調和應用的建議。本研究蒐集整理,並將其群組為四種類型。分別是:(一)身分竊用罪法群;(二)個人身分證之相關法群;(三)消費者信用報告法群,以及(四)個人資料保護法群。\n本研究發現,我國和美國雖然均面臨到身分竊用的問題,但因為國情和制度的不同,所受到的影響程度和所採取對應問題的方式也因此不同。例如:我國和美國在對個人識別號碼的態度和處理不同,美國是盡量打破個人利用單一獨特(unique)號碼進行識別的機制,而我國則是大量的使用。在個人身分證明文件上,我國較為統一,美國則較為分散,迄今尚未有全國統一性的身分識別證。在個人識別資料庫的建置和運用上,我國相對集中,美國重分散。我國對個人資料的保護是遵循歐盟模式,採取從上而下立法的方式。相反的,美國在個人資料保護作為上比較傾向建置一個結合法規、命令和自我管理的架構,而非由政府制訂的單一法規,係採由下而上模式。我國現在使用的國民身分證和身分證號在實體世界所建構的通用身分識別體系,因為個人資料庫雖分散但可集中連線查詢管理的特性,其在身分竊用防制機制的優勢因此建立。美國在對抗身分竊用問題所採取的方式雖因為國情和歷史的不同而和我國有相當程度的差異,但其在犯罪嚇阻控制上特別注意建立執法機關的查緝能力、訴追工具和司法機關量刑裁判的嚇阻效益,仍值得我國學習。本研究對於「美國聯邦量刑委員會」在其《量刑基準》上針對身分竊用罪的量刑考量及該委員會如此設計之源由稍有描述,或可為後續研究或實務參考之用。
Identity theft is a form of stealing someone`s identity in which someone pretends to be someone else by assuming that person`s identity, typically in order to access resources or obtain credit and other benefits in that person`s name. The first victim of identity theft is the person whose identity has been assumed by the identity thief and this person can suffer adverse consequences if they are held accountable for the perpetrator`s actions. The other victims are those who were defrauded by identity theft tactics. Along with the prevalence of information and communication technology, identity theft is becoming a great threat to common people and even to national security.\nThis study has collected more than 20 pieces of U.S.A. federal acts and statutes that related to combating identity theft problems. This study then categorizes then into 4 groups, namely 1) identity theft criminalization; 2) national personal identification system; 3) consumer credit report; and 4) personal data protection. In the mean time, this study also collected related laws and Taiwan (R.O.C.) for comparison.\nThe government organization structures and legal systems between U.S.A. and Taiwan (R.O.C.) are very different, though the common goal of fighting identity theft is the same; the measures are quite different as well. In short, in terms of laws and personal identification system, the U.S.A. is more decentralized while in Taiwan (R.O.C.) it is more centralized. Taiwan (R.O.C.) has a national-wide and unified personal identification system that put it in a better position to respond and mitigate to identity theft impacts. On the other hand, from the law enforceability aspect, the study finds the U.S.A. provides better tools to law enforcement agencies and prosecutors to bring the offenders to justice in court and the judges have relatively more clear guidelines for case consideration and sentence.
參考文獻: 壹、中文部分\n專書\n1. Lawrence M. Fredman著,楊佳陵譯,《美國法導論-美國法律與司法制度概述》(American Law: an introduction),商周出版,2004年3月。\n2. 林超駿等作,《英美法常用名詞解析》,新學林出版社,2008年8月。\n3. 林鈺雄,《新刑法總則》,二版,台北:元照出版社,2009年9月。\n4. 黃仲夫,《刑法精義》,修訂新版,台北:元照出版社,2009年9月。\n5. 《美國公平信用報告法》,財團法人金融聯合徵信中心譯,,2006年12月。\n6. 《銀行法法令彙編(增修訂第七版)》,台灣金融研訓院,民國2009年1月。\n學位論文\n1. 鍾葦怡,《論詐欺罪之「詐術」》,國立政治大學法律學研究所碩士學位論文,2011年1月。\n2. 郭詠華,《現代行國家下的個人身分及其識別—百年來的台灣個人資料法社會史》,國立台灣大學法律學院法律學系碩士學位論文,2010年7月。\n3. 陳妍沂,《美國財務資訊隱私權保護規定之研究》,國立政治大學法學院碩士在職專班碩士學位論文,2008年5月。\n4. 馬興平,《論資訊隱私權的保護-從釋字第603號解釋出發》,國立中正大學法律所碩士論文,2008年。\n5. 馮聖中,「論金融服務與消費者保護之法律問題」,南台科技大學,財經法律研究所碩士論文,2007年。\n6. 郭志剛,《詐欺罪之研究—以電腦詐欺及廢除牽連犯、連續犯之修法為題》國立政治大學法律學研究所碩士學位論文,2007年7月。\n期刊文章\n1. 葉奇鑫、李相臣,「淺談個人資料保護法民事賠償責任及數位鑑識相關問題」,《司法新聲》,第101期,2012年一月,頁33-49。\n2. 楊崇森,「美國刑法之原理與運用」,《軍法專刊》,第57卷第3期,2011年6月,頁39-89。\n3. 吳兆琰,「美國 anti-phishing 法制策略簡介」,《台灣電腦網路危機處理暨協調中心(TWCERT/CC)電子報》,2011年1月號。\n4. 廖有祿、江芝迎,「冒用人頭資料犯罪及相關防制對策」,《刑事政策與犯罪研究論文集(12)》,法務部編印,2009年12月。\n5. 閩庆飞、季绍波、仲秋雁,「身分盗用的发展及其治理和研究趋势」,大连理工学院《公共管理学报》,第四卷,第一期, 2007年一月。\n6. 王志誠,「美國金融隱私權法制之發展」,《台灣金融財務季刊》,第7輯第1期,2006年3月,頁71-90。\n7. 陈立峰,「浅议身分盗用犯罪问题」,《江西公安专科学校学报》,第6期总第98期, 2005年11月。\n8. 黃昭元,「無指紋則無身分證?換發國民身分證與強制全民捺指紋的憲法爭議分析」,《民主、人權、國家-蘇俊雄教授七秩華祝壽論文集」》,2005 年 9 月。\n9. 劉佐國,「我國個人資料隱私權益之保護—論『電腦處理個人資料保護法』之立法與修法過程」,《律師雜誌》,第 307 期,2004年一月,42-51 頁。\n10. 孙晓云、骆宁,「FACT Act:美国消费信贷法的最新里程碑」, 《数字财富》,2004第5期。\n11. 「個人資料保護在台灣:誰的事務」,《國家政策季刊》,第2 卷第1 期,行政院研究發展考核委員會出版發行, 2003年3月,頁53-70。\n12. 「個人資料保護之研究—以個人資訊自決權為中心」,《司法研究年報》,第二十一輯第十七篇,司法院印行, 2001年。\n13. 劉靜怡等,「戶籍資料運用、個人資料保護與身分辨識之研究:戶政資訊系統與相關制度建置之研究」,中央研究院資訊科學研究所,2001年2月。\n14. 陳起行,「隱私權法理之探討-以美國法為中心」,《政大法學評論》,2000年12月,頁297-341。\n15. 吳景芳,「美國之聯邦量刑改革法」,刑事政策與犯罪研究論文集(三),法務部犯罪研究中心編印,2000 年 11 月。\n網站資料庫\n1. 司法院法學資料檢索系統 (http://jirs.judicial.gov.tw/)\n2. 法源法律網 (http://www.lawbank.com.tw/)\n\n貳、英文部分\n期刊文章\n1. HOOFNAGLE, Chris J., "IDENTITY THEFT: MAKING THE KNOWN UNKNOWNS KNOWN", Harvard Journal of Law & Technology, Volume 21, Number 1, Fall 2007\n2. MOYE, Stacey, “Fair and Accurate Credit Transactions Act-More Protection for Consumers”, The Information Management Journal, May/June 2006\n3. SLEWE, Ton; HOOGENBOOM, Mark, "Who Will Rob You on the Digital Highway", Communications of the ACM, May 2004\n4. GORDON, Gary R.; WILLOX, Norman Jr., “Identity Fraud: A Critical National and Global Threat ”, A Joint Project of the Economic Crime Institute of Utica College and LexisNexis, a Division of Reed Elsevier Inc., October 2003\n5. WILLOX, Norman Jr.; REGAN, Thomas, “Identity Fraud: Providing a Solution”, Journal of Economic Crime Management , March 2002\n6. LOPUCKI L M. “Human Identification Theory and Identity Theft Problem”. Texas Law Review, 2001 \n7. CLARKE R. “Human Identification in Information Systems: Management Challenges and Public Policy Issues”, Information Technology & People, 1994\n研究報告及專書\n1. "Protecting Consumer Privacy in an Era of Rapid Change: Recommendations For Businesses and Policymakers", Federal Trade Commission, March 2012\n2. FINKLEE, Kristin M., “Identity Theft: Trends and Issue”, CRS Report for Congress (R40599), Congressional Research Service, Library of Congress, February 2012.\n3. “United States Attorneys` Manual”, Office of United States Attorneys, U.S. Department of Justice, 2012\n4. “2011 Federal Sentencing Guidelines Manual”, United States Sentencing Commission, November 2011\n5. "Report to Congress: Mandatory Minimum Penalties in the Federal Criminal Justice System", United States Sentencing Commission, October 2011\n6. "2010 Consumer Sentinel Network Data Book", Federal Trade Commission, March 2011\n7. “40 Years of Experience with the Fair Credit Reporting Act: An FTC Staff Report with Summary of Interpretations”, Federal Trade Commission, July 2011\n8. "Report to Congress: Regarding Federal Mandatory Minimum Sentencing Penalties", United States Sentencing Commission, July 2009\n9. “Online ID Theft: Changing the Game - Protecting Personal Information On The Internet”, Microsoft Corp., September 2008\n10. TATELMAN, Todd B., "The REAL ID Act of 2005: Legal, Regulatory, and Implementation Issues", CRS Report for Congress (RL 34430), Congressional Research Service, Library of Congress, April 2008.\n11. SWENDIMAN, Kathleen S., “The Social Security Number: Legal Developments Affecting Its Collection, Disclosure, and Confidentiality”, CRS Report for Congress (RL 30318), Congressional Research Service, Library of Congress, February 2008.\n12. "2006 Identity Theft Survey Report", for Federal Trade Commission, Synovate, November 2007\n13. "Data Breaches Are Frequent, but Evidence of Resulting Identity Theft Is Limited; However, the Full Extent Is Unknown" (GAO-07-737), United States Government Accountability Office, June 2007\n14. “Social Security Numbers: Use is Widespread and Protection Could be Improved”, (GAO-07-1023T), Government Accountability Office, June 2007.\n15. “A Guide to Preventing Identity Theft”, Info-Tech Research Group, 2005\n16. “Putting an End to Account-Hijacking Identity Theft”, Federal Deposit Insurance Corporation, December 14, 2004\n17. PURDY, Andy, et al, "Identity Theft Final Report", Economic Crimes Policy Team, United States Sentencing Commission, December 1999\n18. “Identity Fraud: Information on Prevalence, Cost, and Internet Impact is Limited”, Briefing Report to Congressional Requesters, United States General Accounting Office, GAO/GGD-98-100BR, May 1998.\n網站資料庫\n1. Identity Theft: Outline of Federal Statutes and Bibliography of Select Resources, LLRX – Law and technology resources for legal professionals, (http://www.llrx.com/features/idtheftguide.htm)\n2. US Federal Trade Commission: Fighting Back Against Identity Theft (http://www.ftc.gov/bcp/edu/microsites/idtheft/)\n3. US Department of Justice: Identity Theft and Identity Fraud (http://www.justice.gov/criminal/fraud/websites/idtheft.html)\n4. US Department of Homeland Security: Secure Driver`s Licenses (http://www.dhs.gov/files/programs/secure-drivers-licenses.shtm)\n5. Federal Bureau of Investigation (FBI) — Identity Theft (http://www.fbi.gov/about-us/investigate/cyber/identity_theft)\n6. Federal Deposit Insurance Corporation (FDIC): Identity Theft (http://www.fdic.gov/consumers/consumer/alerts/theft.html)\n7. US Government Printing Office: CODE OF FEDERAL REGULATIONS (http://www.gpo.gov/fdsys/browse/collectionCfr.action?collectionCode=CFR)\n8. United States Sentencing Commission (http://www.ussc.gov)\n9. United States Attorneys` Manual, U.S. Department of Justice. (http://www.justice.gov/usao/eousa/foia_reading_room/usam/)\n10. Federal Jury Instructions Resource Page, Federal Evidence Review (http://federalevidence.com/evidence-resources/federal-jury-instructions)\n11. Identity theft is a crime: Resources from the Government (http://www.idtheft.gov/)\n12. IT Law Wiki (http://itlaw.wikia.com/wiki/)\n13. Cornell University Law School: Legal Information Institute: United States Codes (U.S.C.) (http://www.law.cornell.edu/uscode/text)\n14. Westlaw (http://www.westlaw.com)\n15. Electronic Privacy Information Center (EPIC) - National ID and the REAL ID Act (http://epic.org/privacy/id_cards/)\n16. Identity Theft Resource Center (http://www.idtheftcenter.org/)\n17. Roger Clarke`s Identity Home-Page (http://www.rogerclarke.com/ID/) \n18. Wikipedia: Identity Theft (http://en.wikipedia.org/wiki/Identity_theft)
描述: 碩士
國立政治大學
法學院碩士在職專班
98961209
101
資料來源: http://thesis.lib.nccu.edu.tw/record/#G0098961209
資料類型: thesis
Appears in Collections:學位論文

Files in This Item:
File SizeFormat
120901.pdf3.75 MBAdobe PDF2View/Open
Show full item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.