月旦知識庫
 
  1. 熱門:
 
首頁 臺灣期刊   法律   公行政治   醫事相關   財經   社會學   教育   其他 大陸期刊   核心   重要期刊 DOI文章
國立臺灣大學法學論叢 本站僅提供期刊文獻檢索。
  【月旦知識庫】是否收錄該篇全文,敬請【登入】查詢為準。
最新【購點活動】


篇名
刑事偵查程序中加密檔案的解密
並列篇名
The Decryption of Encrypted Files in Criminal Procedure
作者 李榮耕
中文摘要
電腦在現代生活中扮演著不可或缺的角色,大量的資訊也因而以數位的型態交換,或儲存於各式的載體中。是以,如何確保檔案的安全,確保檔案不被他人所接觸,就有其實際需求。檔案的加密技術的普遍使用,也就應運而生。不過,犯罪份子也同時使用了此一技術,隱匿犯罪事證,大大地增加偵查上的困難。在討論及分析後可以知道,可能性理論無法完整地解釋隱私的意涵,不能因為技術上難以破解,就認為人們加密後的檔案可以主張隱私權。再者,加密後的檔案無法類比為上鎖的容器,因為人們並不是看不到加密後檔案的內容,只是無法了解其意思而已。相比較之下,檔案的加密更類似於翻譯以外國語言進行的交談,使用警犬嗅聞,或是拼湊軋碎的文件。從結論上來說,我們認為人們不會僅僅因為將檔案加密而當然能夠就其內容主張合理隱私期待。在合法取得加密檔案後,檔案的解密沒有令狀程序的適用,執法官員可以逕自破解,不需要事先獲有法官的授權。
英文摘要
Computers have become an integral and essential part of our daily lives. A huge amount of digital data is exchanged among devices and stored in various storage types. With this increased reliance on technology comes the growing concern for data security and privacy. In this digital age, where personal and sensitive information is constantly being transmitted and stored, it becomes imperative to protect this data from unauthorized access. One way to achieve this is through the use of encryption technology. Encryption is the process of converting plain text into a code to prevent unauthorized access. This technology is widely used to secure data, but unfortunately, it can also be exploited by criminals to hide illegal activities and information. This makes it even more challenging for law enforcement agencies to carry out criminal investigations. While encryption provides a certain level of security, it does not automatically grant individuals privacy rights. In fact, the use of probability theory is not a suitable explanation for privacy. Encrypted files should not be equated with locked containers such as rooms or suitcases. The contents of encrypted files may be visible, but their meaning may not be understandable. Decrypting encrypted files is similar to interpreting a conversation in a foreign language or searching bags with sniffer dogs. Moreover, encrypting files does not provide absolute privacy protection. Law enforcement agencies are allowed to decrypt encrypted files that have been legally obtained, without obtaining a warrant in advance. In conclusion, while encryption technology is an effective tool for securing data, it does not provide complete privacy protection. It is important for individuals to be aware of the limitations and to adopt a multi-layered approach to data security and privacy. This may include using encryption technology, implementing strong passwords, and regularly updating software to stay ahead of potential security threats.
起訖頁 1031-1084
關鍵詞 隱私加密解密破解合理隱私期待搜索令狀原則privacyencryptiondecryptioncrackreasonable expectation of privacysearchwarrant requirement
刊名 國立臺灣大學法學論叢  
期數 202311 (52:s期)
出版單位 國立臺灣大學法律學系
該期刊-上一篇 德日遠距醫療的規範與實踐:兼論對我國之借鑑
該期刊-下一篇 論穩定幣之法制
 

新書閱讀



最新影音


優惠活動




讀者服務專線:+886-2-23756688 傳真:+886-2-23318496
地址:臺北市館前路28 號 7 樓 客服信箱
Copyright © 元照出版 All rights reserved. 版權所有,禁止轉貼節錄