Virtual goods or money transfer stolen money
It is illegal to issue virtual currency privately
According to Article 29 of the regulations of the people's Republic of China on the administration of RMB, no unit or indivial is allowed to print or sell token tickets to replace RMB in circulation on the market In addition, the "emergency notice of the State Council Office for rectifying unhealthy tendencies in the instry, the State Economic and Trade Commission and the people's Bank of China on prohibiting the issuance and use of various token certificates (cards)" also strictly prohibited similar issues
extended data
virtual currency refers to non real currency. Well known virtual currencies, such as online currency of Internet company, q-coin of Tencent company, q-point and voucher of Shanda company, micro currency launched by Sina (used for micro games, Sina reading, etc.), chivalrous Yuanbao (used for chivalrous road game), silver grain (used for bixue Qingtian game), and popular digital currencies in 2013 include bitcoin, Laite coin, infinite coin, quark coin, zeta coin, etc Barbecue coins, pennies (Internet), invisible gold bars, red coins, prime coins. At present, hundreds of digital currencies are issued all over the world. Popular in the circle & quot; The legend of "bitcoin, Wright silver, infinite copper, pennies aluminum"
market formation
the Internet has led to the emergence of a new market, which is a virtual market based on cyberspace. The Internet provides a lot of communication places for consumers, and also provides business market for enterprises. Enterprises must change from proct centered to service centered to customer centered. With the development of computer artificial intelligence technology and database technology, enterprises can conveniently collect customers' information, understand customers' needs in time, change business strategies and grasp economic arteries in real time
With the rapid development of computer and network communication technology, the application of Internet technology has graally penetrated into various fields of human activities, and the unlimited business opportunities that it contains make businesses turn their eyes to e-commerce. E-commerce is penetrating into all aspects of social and economic life at a speed that people can hardly imaginethe traditional finance is also closely watching this irresistible trend of global economic integration and networking. As a result, value-added services take art as the selling point and can be regarded as commodities; The sword in the game is not a brand-new financial services business philosophy - e-finance came into being
from the historical development process, to understand e-finance, we must start from the electronic finance and e-commerce. The so-called e-financialization means that financial enterprises adopt modern communication, computer, network and other information technology means in addition to Internet technology to improve the work efficiency of traditional financial service business, rece operating costs, realize the automation of financial business processing, informatization of financial enterprise management and scientific decision-making, and provide customers with faster and more convenient services, And then enhance the financial enterprise is the behavior of market competitive advantage
e-finance is a transcendence of financial electronization. Different from the electronic finance, the main technical basis of e-finance operation is the increasingly perfect Internet technology. Due to the characteristics of global connectivity, openness, quickness and low marginal cost of Internet technology, e-finance strengthens the restructuring and innovation of financial services business based on Internet technology, so that customers are free from the restrictions of business hours and places, and enjoy all kinds of high-quality and low-cost services provided by financial enterprises anytime and anywhere
with the development of Internet, the form of money is becoming more virtual, and there is an electronic money that only exists in the form of electronic signal
reference source: Network: virtual currency
According to the news on February 10, 2018, on September 4, 2017, seven ministries and commissions of the people's Republic of China issued the notice on preventing the financing risk of token issuance, which regulates the issuance of tokens. In the notice, the nature of all kinds of tokens and "virtual currency" is clearly defined: it is not issued by the monetary authority, and it has no monetary attributes such as legal compensation and mandatory, It does not have the same legal status as currency and cannot and should not be used as currency in the market. Nevertheless, it is undeniable that all kinds of "virtual currency" still have a certain property value and are part of the property of the holder. So, how to identify the nature of the theft of such tokens
In order to protect the legitimate rights and interests of "virtual token" holders, the author intends to discuss such issues through a relevant news report and relevant casesstealing bitcoin
recently, a news report said that Haidian police in Beijing cracked a case of destroying computer information system. The suspect Zhong used his administrator's authority to modify the company's computer applications and steal 100 bitcoins. Before he could sell the stolen money, Zhong was arrested by the police. At present, Zhong was detained for the crime of destroying computer information system
it can be seen from the report that the police detained the perpetrator for stealing bitcoin on suspicion of damaging the computer information system. The crime of destroying the computer information system stipulated in Article 286 of the criminal law of our country refers to the act of deleting, modifying, adding or interfering with the functions of the computer information system in violation of the provisions of the state, resulting in the abnormal operation of the computer information system and serious consequences, or deleting, modifying or interfering with the data and application programs stored, processed or transmitted in the computer information system Modifying or adding operations with serious consequences, or deliberately making or spreading destructive programs such as computer viruses, which affect the normal operation of the computer system with serious consequences
In the author's opinion, this crime is one of the crimes of impairing social management order in Chapter 6 of the criminal law, that is, the legal interest protected by this crime is actually the public order of our society, not the property interests of the digital currency holders, which in fact denies the property value of digital currency, It is only protected as a data or system function in a computer system. The author thinks that there is some irrationality in this wayfirst of all, in the notice on the prevention of bitcoin risk issued in 2013, it is mentioned that bitcoin is not a real currency because it is not issued by the monetary authority and does not have such monetary attributes as legal compensation and compulsion. Bitcoin has four main characteristics: no centralized issuers, limited amount, no geographical restrictions and anonymity. Because it belongs to a specific virtual commodity in nature The notice also clearly mentioned that bitcoin does not have the same legal status as currency and should not be used as currency in the market. However, as a virtual commodity, the property value behind bitcoin cannot be ignored
Secondly, Article 127 of the general provisions of the civil law, which came into effect on October 1 last year, stipulates that if the law has provisions on the protection of data and network virtual property, such provisions shall prevail. Although only the protection of the network virtual property has made the principle provisions, but it can not be denied that this shows our country's attitude towards the protection of the network virtual property. Although there is no special law for the protection of data and network virtual property in China, from the perspective of the general provisions of civil law, it is predicted that there will be relevant legislation in the futurefinally, from the relevant cases, we can also see the recognition of the property attribute of virtual currency such as bitcoin in China's judicial practice. In April and may 2013, Liu premeditated to set up a bitcoin trading platform, so he recruited Jin and Huang (both sentenced) to jointly set up a "bitcoin" trading platform. During this period, Liu, Huang, Jin, Jin and the defendant he, in addition to other acts of directly stealing customers' funds, also frequently cashed RMB by selling customers' bitcoins, and transferred 120 bitcoins from the website. Finally, the court convicted and punished the defendant for fraud, and the bitcoin transferred by the defendant was also included in the property loss of the victim. Therefore, from the judicial cases, we can also get the recognition of the property attributes of virtual currency such as bitcoin
based on the above reasons, the author thinks that it may be unreasonable to regulate the theft of virtual currency only as the crime of damaging computer information system. We should face up to the hidden property value and consider the application of the crime of infringing property in China's criminal law. Only in this way can we effectively protect the legitimate rights and property of digital currency holders in China
I wanted to buy money to make a profit, but I didn't want the issuing party to become a pyramid selling organization, suspected of breaking the law and committing crimes; All participating funds will be collected. At this time, whether the money can be recovered has become the most concerned problem of the buyer. The crime of organizing and leading pyramid selling activities is established, and the relationship of accomplice is usually established between the upper and lower levels of pyramid selling activities; All the money raised is usually regarded as illegal income. After being cheated into joining, they recommend others to join and get tokens and cash back, and the profits will usually be recovered as illegal income. So if you are cheated into joining an organization, can you recover the "entry fee" you paid
First, recovery does not necessarily mean confiscation, but restitution Second, the scope of recovery: illegal income within the scope of crime Third, the calculation of "illegal income"
who returns the money: Calculation of "illegal income"
according to Article 64 of the criminal law, only "illegal income" should be recovered and refunded. Illegal income, literally, refers to the property obtained through illegal activities (including but not limited to crimes). The second provision of the Supreme People's Procuratorate "the regulations on the management of property in criminal cases involving the people's Procuratorate" stipulates that the property involved includes the illegal gains and the fruits of the suspect, the property used for the crime, the prohibited goods illegally held and other property and fruits related to the case. p> According to the above provisions, the crime of illegal income is divided into two categories according to the basis of illegal income:
(1) the illegal income in the crime of obtaining interests; Such as theft, corruption, bribery of stolen goods, property, etc
(2) the crime of operating interest, such as the crime of usuryit can be seen that illegal income not only includes the property obtained through illegal and criminal activities (i.e., original illegal income, profit type), but also includes the possible natural and legal fruits of these properties and the property interests (i.e., derived illegal income, profit type) obtained from the operation of the property. For the former, the activities that generate income are illegal; Income is the object or result of illegal behavior. For the latter, the activities that generate income are legal; Only the principal used to generate income is suspected to be illegal
the above two types of illegal gains are generated in different ways, and their recovery calculation methods are also different. For the illegal income of the crime of obtaining interests, the illegal property itself is the amount of illegal income; As for the illegal income of the crime of business interests, the normal business interests should be dected. For example, in the crime of usury, the illegal income usually refers to the income from interest rate difference, not the total amount of the loan
In terms of norms, the attitude of the law is also very clear: in the reply of the Supreme People's Court on how to determine the "amount of illegal income" in the trial of criminal cases involving the proction and sale of fake and shoddy goods in 1995, it is pointed out that the "amount of illegal income" stipulated in the decision of the Standing Committee of the National People's Congress on punishing the crime of procing and selling fake and shoddy goods refers to the amount of illegal income from the proction and sale of fake and shoddy goods The amount of profit from selling fake and inferior procts. In the literal sense, the "illegal income" here should be dected from the corresponding cost In judicial practice, it is generally believed that the amount of procts actually purchased is the amount of legitimate business and should be dected; In the case of providing services without actual procts (for example, manpower input in illegal medical practice), the corresponding costs will not be dectedin the crime of organizing and leading pyramid selling activities, there are cases of "Capitation" returning to "online". According to Article 8 of the measures for the determination of illegal income from administrative penalty cases by the administrative department for Instry and Commerce (No. 37 order of the State Administration for Instry and Commerce), the illegal income from pyramid selling activities such as touting and defrauding entry fees shall be calculated according to the total income of the parties concerned
it can be seen that the "tap" paid to the online is not the income of the parties at this level in the MLM organization; It is the income of online, which should be dected and counted into the amount of illegal income of online. After the illegal income collected as online, it should be returned to offline in time according to the above
the above is today's sharing, thanks to the readers
case 1 recently, the court of Jinjiang District of Cheng sentenced Yang Xiaolong, a "cyber thief", to eight months' imprisonment for theft. Yang Xiaolong has repeatedly stolen the virtual currency in seven online game recharge accounts of a company in Cheng, and used the virtual currency to buy game cards to sell money, making an illegal profit of more than 1300 yuan
case 2: in a previous case of QQ number theft decided by Shenzhen intermediate people's court, the prosecutor initiated a public prosecution in accordance with the crime of theft. However, the judge held that QQ number has not been regarded as a property right in China's law, so it did not support the determination of theft and sentenced the defendant to the crime of obstructing freedom of communication
in case 3, ring the two periods of September 29, 2004 and August to October, 2004, many players in the online game "Dahua Xiyou II" (Netease operation) found their equipment stolen one after another. On November 9, 2004, Netease reported the case to the Internet Supervision Department of Guangzhou Public Security Bureau, and the police arrested the suspect while concting offline transactions. On December 25, 2005, Tianhe District Court of Guangzhou city declared him guilty of theft and fined him 5000 yuan. The defendant refused and appealed. At the end of March 2006, the second instance of Guangzhou intermediate people's court decided to reject the appeal and maintain the original judgment
in case 4, from March to July 2005, the defendants Zeng and Yang sold the cracked QQ number to others. The two defendants sold more than 160 QQ numbers and got more than 70000 yuan of stolen money. On November 28, 2005, Shenzhen Nanshan procuratorate sued Zeng and Yang for theft to Shenzhen Nanshan District People's court. Nanshan District People's court held a trial on December 9, 2005, and made a judgment on January 13, 2006. The two defendants were sentenced to six months' detention for the crime of infringing freedom of communication
is virtual property protected by law
no matter Tencent q-coin or Sina u-coin, they are just data symbols used to represent certain goods or services provided by an Internet manufacturer. So far, no bank has been involved in the launch of this "network virtual currency". Because there is some competition between manufacturers, their "network virtual currency" system is often independent of each other. Therefore, "network virtual currency" can not circulate in real society like RMB. In addition, the "network virtual currency" is only a kind of delivery voucher, and almost all manufacturers that launch the "network virtual currency" do not provide the service of "network virtual currency" cashing back. The two-way or even multi-directional circulation is the basis of money being able to act as a general equivalent. The characteristic of "one-way circulation" determines that "network virtual currency" cannot act as a general equivalent. Unless we can freely and legally convert this "delivery voucher" into real cash or electronic currency. Therefore, it is only a virtual property, not a real property, and can not be the object of legal protection in China
online virtual property theft, which is characterized by stealing and selling online game accounts of major online game companies, Tencent QQ coins and game equipment, is expanding and upgrading. This not only seriously damages the legitimate rights and interests of users, but also poses a great threat to the normal operation of Internet enterprises. Therefore, the case of network virtual property theft can be classified as theft, the victim can report the situation to the public security department, but there must be two kinds of proof to file a case: one is that the victim must prove that he really owns the virtual property, the other is that there is evidence to prove that his virtual property is really stolen. If two kinds of proof are available, and the suspect is found, he can be convicted. Because, at present, the National People's Congress has not legislated on this, and this kind of case belongs to special theft, that is, this kind of crime can be punished as theft
there are mainly three views on the legal attribute of network virtual property in the theoretical and judicial circles, namely, the theory of property rights, the theory of intellectual property rights and the theory of creditor's rights. Although the network virtual property is different from the general property, but in my opinion, it is intangible property. Article 75 of China's general principles of civil law clearly stipulates that "citizens' personal property includes citizens' lawful income, houses, savings, daily necessities, cultural relics, books and materials, trees, livestock, means of proction and other lawful property that are permitted by law to be owned by citizens."“ "Other legal property" can be interpreted broadly, and network virtual property such as q-coin and virtual weapons can be classified as "other legal property" because of their basic properties. Citizen's property includes both tangible and intangible. Network virtual property should be one of intangible assets. Q-coin can be purchased directly from game developers, or obtained from the virtual currency market, so it has the property of general commodity. But whether it is creditor's rights or property rights, or intellectual property rights, this issue is the root of the current judicial and academic disputes. Virtual property is a kind of property with legal significance, which should be protected by law. As a kind of intangible property, virtual property has its own unique attributes and characteristics, which is different from the traditional tangible property and intangible property. The protection of virtual property should not be included in the category of real right or creditor's right mechanically, so it is necessary to protect it by separate legislation. The acquisition of virtual property needs to pay the corresponding time, energy and money, which has the characteristics of virtual space, tradability, value and time limit. In the network virtual space and time limit, it reflects the property value of virtual property, and shows the actual material interests in real life. It is precisely because of the transaction and value of the virtual property, as well as the paid nature of the acquisition, that the virtual property has the property nature. On the other hand, virtual property can also be possessed, used, benefited and disposed, and become the object of legal relationship. Therefore, virtual property should be protected by property law. Can theft of virtual property be punished as theft? At present, there are many kinds of currencies in the virtual market, such as Tencent Q currency, internet currency, Netease bubble currency, Sina u currency, Warcraft currency, Paradise currency, Shanda counting, etc. Take Q coin as an example, the number of users provided by Tencent is more than 200 million. Instry insiders estimate that the domestic Internet has a virtual money market scale of several billion yuan per year. Although the virtual currency market has a large scale, but the virtual currency stolen, "Filing" still has no legal basis? Virtual currency itself has no other transaction function, so it can be said that virtual currency is not a property right recognized by law. However, with the unlimited issuance of q-coin and the constant limited consumption of virtual procts, it will lead to the relative surplus of q-coin and the inflation of virtual world. At present, it is urgent to standardize the order of the virtual currency market, instead of blindly "Filing" protection, so that the public feel that the virtual currency is equivalent to RMB. When the network virtual property is stolen and cheated, we can also use the criminal law to punish criminals. At present, the court for the crime of network virtual property, some to be punished by theft, some to violate the freedom of communication to be punished. One of the reasons for different approaches is the lack of unified qualitative analysis of network virtual property. If we define the network virtual property as a kind of property, these problems can also be effectively solved. For example, some people steal virtual property or cheat for the purpose of illegal possession. If the amount of theft or fraud reaches the standard of "large amount", their behavior can be defined as theft or fraud. Of course, when the actor steals the network virtual property, his intrusion into the computer system and other means may also violate the crime of destroying the computer information system and other crimes. The combination of means and purpose constitutes an implicated crime, which can be dealt with again. What is q-coin Tencent q-coin is a virtual currency that can be paid uniformly on Tencent website. The face values of q-coin are 1 yuan, 2 yuan, 5 yuan, 10 yuan and 20 yuan respectively. For the q-coin obtained by users using the application method of dialing voice call, the expression form of 1 yuan face value q-coin is a 12 digit number string, and the expression form of 2 yuan, 5 yuan, 10 yuan and 20 yuan q-coin is a 14 digit number string starting with 2, 5, 1 and 8 respectively. The applied q-coin can purchase a series of related services on Tencent website, and input the corresponding q-coin amount according to the corresponding prompt when purchasing. At present, q-coin card can be used to apply for QQ bank number, purchase QQ beautiful number, QQ member service, QQ dating, QQ greeting card and other services. According to Tencent, a series of wonderful personalized value-added services will be launched later. Zhao Yiyong (judge of Zhengzhou high tech Instrial Development Zone, master of law): Disputes between players and thieves and between players and operators caused by the theft of virtual property. Once the virtual property is stolen, it is often difficult for users to find the thief, or it is difficult to provide evidence although they can find it. Therefore, once the virtual property is stolen, they often ask the operator for assistance and provide evidence, and most of them directly resort to the court on the ground that the operator does not fulfill its security obligations. From a technical point of view, game operators have the ability to help players save historical data and prevent data loss; From a legal point of view, game operators are also obliged to save historical data, prevent data loss and reproce game data e to charging players. Because the relationship between users and game operators is a service contract, according to the basic principles of China's "contract law", if the user's loss is caused by the game operators' failure to fulfill their ty of care, or major defects in program technology, then the game operators should bear the liability for breach of contract, including compensation for losses, restitution, and continued performance. If the game operator has no fault and the loss is caused by the infringement of a third party, it should directly claim to the infringer
legislation of virtual property protection suggests that in the absence of legislation on virtual property protection in China, network enterprises should apply the form of instry self-discipline to protect the interests of users. At the same time, we should speed up the formulation of relevant legislation or judicial interpretation. The specific measures include: (1) giving virtual property a legal status from the level of judicial interpretation 2 Add criminal legislation to protect computer data 3 Standardize the order of virtual property transactions, and ensure the security of virtual property transactions. It is suggested that the best way to deal with virtual property is through legal means
is "virtual consumption points recharge card", which is a form of money payment in the form of cash exchange for virtual points (points) according to the regulations of the service company, and through the consumption of virtual points (points) to enjoy the service of the company
2. Mobile / Unicom / telecom / PHS rechargeable card
rechargeable card is a kind of stored value card, which is provided by specific businesses. Including mobile phone recharge card, game point card, traffic card, etc. It plays the role of currency exchange and circulation in the transaction process
3. IP phone card
IP phone card is a kind of automatic password accounting long-distance direct dial telephone service developed by using advanced IP technology, which has the characteristics of low price, good call quality and wide access range. At present, it has been opened in all provinces and cities in China and most countries and regions in the world (excluding maritime satellite telephone). Users can dial more than 200 countries and regions and most cities in China from the public network fixed al audio telephone (except public telephone). Compared with the traditional long-distance direct dial telephone, it has obvious price advantage and is more convenient and flexible to use
4. Network software
network software generally refers to the system's network operating system, network communication protocol and application level special software that provides network services
5. Website proct
website proct is a kind of concept, and the essence of website proct is to treat website from the perspective of proct. Website procts are different from software procts, service procts and instrial procts. Website proct is a kind of information proct. Providing information, service or the combination of the two in the form of website is its main form of expression
virtual goods are goods that have no physical nature and cannot be selected for logistics transportation by default when they are published online. Virtual goods or virtual social services that can be traded by virtual currency or real currency
commodities include physical commodities and virtual commodities, and virtual commodities include digital commodities and non digital commodities. Virtual goods refer to the digital procts and services in the e-commerce market, which have no physical nature. They are virtual goods or virtual social services that can be traded by virtual currency or real currency and cannot be selected for logistics transportation by default when they are published on the Internet. Virtual commodities mainly include computer software, stock market and financial information, news, books, magazines, music videos, TV programs, search, virtual virtual virtual machine, virtual cloud disk, virtual CD-ROM drive, APP virtual applications, virtual commodities, some procts and online services in online games
the above virtual resources do not violate the law
According to the market database of digital currencies in the UK, there are 10 kinds of digital currencies with "bitcoin" in their names. It's OK to call it bitcoin. But now the mainstream of the transaction is bitcoin, accounting for 33.92%
source: all digital currency quotes
1
2. Hardware interrupt processing
3. Program service request<
let's introce the functions of each part one by one:
(1) self check and initialization
this part is responsible for starting the computer. There are three specific parts. The first part is used to detect the hardware part when the computer is just powered on, also known as power on self check (post). The function is to check whether the computer is in good condition, such as whether the memory is faulty. The second part is initialization, including creating interrupt vectors, setting registers, initializing and detecting some external devices, etc. the most important part is BIOS settings, mainly for some parameters of hardware settings. When the computer starts up, these parameters will be read and compared with the actual hardware settings. If they are not consistent, the start of the system will be affected
the last part is bootloader, which is used to boot DOS or other operating systems. BIOS first reads the boot record from the beginning sector of the floppy disk or hard disk. If the boot record is not found, it will show that there is no boot device on the display. If the boot record is found, the control of the computer will be transferred to the boot record, and the operating system will be loaded into the computer by the boot record. After the computer starts successfully, this part of the BIOS task is completed< (2) program service processing and hardware interrupt processing are two independent parts, but they are closely related in use
program service handler is mainly for application and operating system services, which are mainly related to input