Position: Home page » Virtual » Criminal law game virtual currency

Criminal law game virtual currency

Publish: 2021-05-27 03:44:00
1.

It is illegal to issue virtual currency privately

According to Article 29 of the regulations of the people's Republic of China on the administration of RMB, no unit or indivial is allowed to print or sell token tickets to replace RMB in circulation on the market

In addition, the "emergency notice of the State Council Office for rectifying unhealthy tendencies in the instry, the State Economic and Trade Commission and the people's Bank of China on prohibiting the issuance and use of various token certificates (cards)" also strictly prohibited similar issues

extended data

virtual currency refers to non real currency. Well known virtual currencies, such as online currency of Internet company, q-coin of Tencent company, q-point and voucher of Shanda company, micro currency launched by Sina (used for micro games, Sina reading, etc.), chivalrous Yuanbao (used for chivalrous road game), silver grain (used for bixue Qingtian game), and popular digital currencies in 2013 include bitcoin, Laite coin, infinite coin, quark coin, zeta coin, etc Barbecue coins, pennies (Internet), invisible gold bars, red coins, prime coins. At present, hundreds of digital currencies are issued all over the world. Popular in the circle & quot; The legend of "bitcoin, Wright silver, infinite copper, pennies aluminum"

market formation

the Internet has led to the emergence of a new market, which is a virtual market based on cyberspace. The Internet provides a lot of communication places for consumers, and also provides business market for enterprises. Enterprises must change from proct centered to service centered to customer centered. With the development of computer artificial intelligence technology and database technology, enterprises can conveniently collect customers' information, understand customers' needs in time, change business strategies and grasp economic arteries in real time

With the rapid development of computer and network communication technology, the application of Internet technology has graally penetrated into various fields of human activities, and the unlimited business opportunities that it contains make businesses turn their eyes to e-commerce. E-commerce is penetrating into all aspects of social and economic life at a speed that people can hardly imagine

the traditional finance is also closely watching this irresistible trend of global economic integration and networking. As a result, value-added services take art as the selling point and can be regarded as commodities; The sword in the game is not a brand-new financial services business philosophy - e-finance came into being

from the historical development process, to understand e-finance, we must start from the electronic finance and e-commerce. The so-called e-financialization means that financial enterprises adopt modern communication, computer, network and other information technology means in addition to Internet technology to improve the work efficiency of traditional financial service business, rece operating costs, realize the automation of financial business processing, informatization of financial enterprise management and scientific decision-making, and provide customers with faster and more convenient services, And then enhance the financial enterprise is the behavior of market competitive advantage

e-finance is a transcendence of financial electronization. Different from the electronic finance, the main technical basis of e-finance operation is the increasingly perfect Internet technology. Due to the characteristics of global connectivity, openness, quickness and low marginal cost of Internet technology, e-finance strengthens the restructuring and innovation of financial services business based on Internet technology, so that customers are free from the restrictions of business hours and places, and enjoy all kinds of high-quality and low-cost services provided by financial enterprises anytime and anywhere

with the development of Internet, the form of money is becoming more virtual, and there is an electronic money that only exists in the form of electronic signal

reference source: Network: virtual currency

2.

According to the news on February 10, 2018, on September 4, 2017, seven ministries and commissions of the people's Republic of China issued the notice on preventing the financing risk of token issuance, which regulates the issuance of tokens. In the notice, the nature of all kinds of tokens and "virtual currency" is clearly defined: it is not issued by the monetary authority, and it has no monetary attributes such as legal compensation and mandatory, It does not have the same legal status as currency and cannot and should not be used as currency in the market. Nevertheless, it is undeniable that all kinds of "virtual currency" still have a certain property value and are part of the property of the holder. So, how to identify the nature of the theft of such tokens

In order to protect the legitimate rights and interests of "virtual token" holders, the author intends to discuss such issues through a relevant news report and relevant cases

stealing bitcoin

recently, a news report said that Haidian police in Beijing cracked a case of destroying computer information system. The suspect Zhong used his administrator's authority to modify the company's computer applications and steal 100 bitcoins. Before he could sell the stolen money, Zhong was arrested by the police. At present, Zhong was detained for the crime of destroying computer information system

it can be seen from the report that the police detained the perpetrator for stealing bitcoin on suspicion of damaging the computer information system. The crime of destroying the computer information system stipulated in Article 286 of the criminal law of our country refers to the act of deleting, modifying, adding or interfering with the functions of the computer information system in violation of the provisions of the state, resulting in the abnormal operation of the computer information system and serious consequences, or deleting, modifying or interfering with the data and application programs stored, processed or transmitted in the computer information system Modifying or adding operations with serious consequences, or deliberately making or spreading destructive programs such as computer viruses, which affect the normal operation of the computer system with serious consequences

In the author's opinion, this crime is one of the crimes of impairing social management order in Chapter 6 of the criminal law, that is, the legal interest protected by this crime is actually the public order of our society, not the property interests of the digital currency holders, which in fact denies the property value of digital currency, It is only protected as a data or system function in a computer system. The author thinks that there is some irrationality in this way

first of all, in the notice on the prevention of bitcoin risk issued in 2013, it is mentioned that bitcoin is not a real currency because it is not issued by the monetary authority and does not have such monetary attributes as legal compensation and compulsion. Bitcoin has four main characteristics: no centralized issuers, limited amount, no geographical restrictions and anonymity. Because it belongs to a specific virtual commodity in nature The notice also clearly mentioned that bitcoin does not have the same legal status as currency and should not be used as currency in the market. However, as a virtual commodity, the property value behind bitcoin cannot be ignored

Secondly, Article 127 of the general provisions of the civil law, which came into effect on October 1 last year, stipulates that if the law has provisions on the protection of data and network virtual property, such provisions shall prevail. Although only the protection of the network virtual property has made the principle provisions, but it can not be denied that this shows our country's attitude towards the protection of the network virtual property. Although there is no special law for the protection of data and network virtual property in China, from the perspective of the general provisions of civil law, it is predicted that there will be relevant legislation in the future

finally, from the relevant cases, we can also see the recognition of the property attribute of virtual currency such as bitcoin in China's judicial practice. In April and may 2013, Liu premeditated to set up a bitcoin trading platform, so he recruited Jin and Huang (both sentenced) to jointly set up a "bitcoin" trading platform. During this period, Liu, Huang, Jin, Jin and the defendant he, in addition to other acts of directly stealing customers' funds, also frequently cashed RMB by selling customers' bitcoins, and transferred 120 bitcoins from the website. Finally, the court convicted and punished the defendant for fraud, and the bitcoin transferred by the defendant was also included in the property loss of the victim. Therefore, from the judicial cases, we can also get the recognition of the property attributes of virtual currency such as bitcoin

based on the above reasons, the author thinks that it may be unreasonable to regulate the theft of virtual currency only as the crime of damaging computer information system. We should face up to the hidden property value and consider the application of the crime of infringing property in China's criminal law. Only in this way can we effectively protect the legitimate rights and property of digital currency holders in China


3. In the current judicial environment, the network virtual property should not be included in the category of "property" in the crime of theft stipulated in Article 264 of the criminal law. The theft of network virtual property is not recognized as theft. If it constitutes other crimes, it shall be punished according to other crimes, such as the crime of illegally obtaining computer information system data
from the perspective of China's criminal law, "property" as a crime of theft is not only limited to physical property, but also intangible property, such as electricity, gas and so on. Both tangible and intangible objects have common characteristics, that is, the general public agree that they have value, and the value can be objectively measured
as for the meaning of online virtual property, the notice of the Ministry of culture and the Ministry of Commerce on strengthening the management of online game virtual currency, which was implemented on June 4, 2009, defines online game virtual currency: it is issued by online game operation enterprises, and game users use legal currency to purchase it directly or indirectly in a certain proportion, which exists outside the game program, It is a virtual exchange tool, which is stored in the server provided by online game operators in the form of electromagnetic recording and expressed in specific digital units. Online game virtual currency is used to exchange the online game services provided by the issuing enterprise within a specified scope and within a specified time. It is expressed in the form of prepaid recharge card, prepaid amount or points, but does not include the game props obtained in the game activities
from the above definition, we can see that the network virtual property has the following obvious characteristics: value specificity, a certain network virtual property can only exist in the game running on a specific server, can not be placed in other games, without a specific game, there is no value; The existence of its economic value depends on whether the players subjectively believe that it has use value and whether it can actually achieve transactions between different players in the same game; The value difference is different for different players, but it has no value for non players
from the perspective of China's criminal law, "property" as a crime of theft is not only limited to physical property, but also intangible property, such as electricity, gas and so on. But no matter they are tangible or intangible, they all have common characteristics, that is, the general public agree that they have value, and the value can be objectively measured. In contrast, the network virtual property is obviously different from the "property" in the criminal law of our country, which does not conform to the concept of public and private property in the general sense of public cognition. The legal attribute of network virtual property is actually computer information system data, a virtual exchange tool, which can not be the object of theft< In addition, according to the principle of a legally prescribed punishment for a specified crime, only those who are prescribed as crimes by law can be treated as crimes, while those who are not prescribed as objects of crimes by law cannot be treated as objects of crimes. At present, China's criminal law and previous judicial interpretations on larceny have made clear provisions on "public and private property", but the network virtual property has not been interpreted as the object of larceny
from the definition and attributes of network virtual property, the essence of the legal attribute of network virtual property is electromagnetic records, that is, electronic data. The act of stealing network virtual property is fully in line with the constitution of the crime of illegally obtaining computer information system data stipulated in article 285 of the criminal law. The application of this crime is enough to objectively and comprehensively evaluate the nature of the act< It is difficult to identify the value of network virtual property
■ judicial observation
as for how to identify the value of network virtual property, there is no unified and universally recognized calculation standard in the theoretical and judicial circles
first of all, the current judicial interpretation does not stipulate how to determine the value of network virtual property, and there is no clear basis for its determination in judicial practice, so there will be disputes in determining its value anyway; Secondly, in the objective sense, network virtual property itself has no value, and its value can only be determined when players trade, which is difficult to be identified from an objective point of view; Thirdly, the value of network virtual property can only exist in a specific server and a specific player, which is separated from a specific server and lost the so-called value. There are different values for different players, so it is difficult to have a unified calculation standard; Finally, it is not objective to identify the value according to the repair cost or expected income paid by the server operator e to theft
therefore, defining the act of stealing network virtual property as theft will bring a series of problems to the determination of the amount. In the absence of a unified and objective calculation method of the amount and the determination of the crime of illegally obtaining computer information system data, it is not appropriate to interpret network virtual property as "property" in theft
from the perspective of overseas criminal legislation and justice, it is rare to treat the theft of network virtual property as theft. The theoretical circle and judicial practice of Italian criminal law do not recognize that the act of stealing virtual property constitutes the crime of theft stipulated in Italian criminal code. It follows the principle of style interpretation and forbids to expand the interpretation of "property", including information data. As for the infringement of network virtual property, the Italian criminal code has set up a section after the traditional crime. Although there are cases in the criminal judicial practice of Japan that determine the crime of using electronic computer to defraud virtual property, it stipulates the special crime of "using electronic computer to defraud" after the traditional crime of fraud. The general theory of Japanese criminal law also believes that the fictitious property does not belong to the crime object of theft stipulated in the Japanese criminal code
in 2003, the criminal code of Taiwan deleted the provision that electromagnetic records were set as movable property in 1997, and the provisions on stealing electromagnetic records are applicable to computer crimes such as obtaining computer information system data
in conclusion, according to the special nature of network virtual property, it does not have the property attribute in the sense of criminal law. Based on the principle of legality, the theft of network virtual property can not be regarded as theft, but can be punished as the crime of illegally obtaining computer information system data.
4. For example, the game currency used in online games, in fact, is recharged with real currency, or the game reward (game equipment or level) you get for spending a lot of time and energy in the game. In a sense, it condenses your labor and forms the income of labor, so when others violate your virtual currency in the game, That is, it constitutes a crime
in the form of game fraud, game account theft, etc
5.

The 60 kinds of illegal virtual currencies are as follows (ranking in no particular order):

1 ~ 10: MBI, m3, Diablo, Asian currency, star currency, Jinyuan shopping alliance e-currency, Changjiang international virtual currency, five element currency, micro media e-currency, bonus point currency

11 ~ 20: virtual gold coin, HGC, central coin, LFG, Sri, huiai coin, nautical coin, CPF, Yifen, K coin

21 ~ 30: R coin, Baichuan coin, kbao, Zhongfu Tongbao, Hongtong coin, Raines electronic currency, global BlackRock No.1 financial currency, Glasberg, BCI, m coin

31 ~ 40: Wing coin, ev coin, performance coin, FIS, u coin, ES, zangbao net performance coin, huiai e-coin, Jianye disk e-coin and subsidy coin

41 ~ 50: hftag, Kaixin compound currency, kuailine virtual currency, Shihua currency, ente currency, CPM, carat currency, supreme currency, Wuhua union virtual currency, Meisheng E

51 ~ 60: Chinese currency, Mimi virtual currency, FIS, world Yunlian cloud currency, Liwu currency, Vicat currency, mark currency, kindness currency, Wuji currency, ATC

extended materials:

well known virtual currencies, such as network currency of network company, Q currency of Tencent company, Q point and voucher of Shanda company, micro currency launched by Sina (used for micro game, Sina reading, etc.), chivalrous Yuanbao (used for chivalrous road game), and Wenyin (used for bixue Qingtian game)

the popular digital currencies in 2013 are bitcoin, Leyte coin, infinite coin, quark coin, zeta coin, BBQ coin, pennies (Internet), invisible gold bar, red coin and prime currency

At present, there are more than 100 kinds of digital currency in the world. Popular in the circle & quot; The legend of "bitcoin, Wright silver, infinite copper, pennies aluminum"

according to the notice and announcement issued by the people's Bank of China and other departments, virtual currency is not issued by the monetary authority, does not have legal compensation and mandatory monetary attributes, is not a real currency, does not have the same legal status as currency, cannot and should not be used as currency in the market circulation, and citizens' investment and transaction of virtual currency are not protected by law

6. Although I don't know much about games, some people can make money by playing games, and it's not illegal or professional.
7.

The scope of network virtual property is a new term with the development of Internet, especially online games. The crime of infringing network virtual property is the crime of infringing virtual property, The most common form is to steal network virtual property by secret means

before discussing the nature of theft of network virtual property, we should first make an accurate definition of the scope of "network virtual property" (hereinafter referred to as virtual property). Virtual property is divided into broad virtual property and narrow virtual property. Broad virtual property refers to all the exclusive data that exist in a specific network virtual space, have real transaction value or do not have transaction value and are called by the holder at any time. From the current technology development, including ID account, free and charged e-mail, QQ number, Netease bubble currency (used to buy free SMS), virtual currency, virtual equipment and so on. In a narrow sense, virtual property refers to the virtual property in online games. That is to say, it refers to the data and parameters which are stored on the server through various means, such as "treasure", "pet", "weapon", "level" and "Duan", and which are called, created or added to the game by the player at any time in the online game space environment based on the online game and recorded under the ID account controlled by the online game player

the narrow sense of virtual property only refers to the virtual property in online games, but the network virtual space is not limited to the world of online games. Therefore, we take a broad sense of virtual property in this paper. We believe that virtual property should be "virtual" rather than real property. It must exist in the virtual world and have substantial content in the virtual world, not just a substitute for the real world. Such as Dangdang, Taobao and other online shopping currency, these currencies are only an extension of the real world, it does not have the virtual property, the property does not belong to the virtual property. Another example is that the electronic funds in Internet banking are only records of real property. Even if the database recording real property collapses e to force majeure, the real property will not be damaged, and these electronic funds can not become virtual property. But for QQ and e-mail, although they are similar to the real mailbox and letters, their functions are far from comparable to the real mailbox and letters. For example, they contain network photo album, network hard disk, virtual space and so on. Therefore, we think that QQ and e-mail can become virtual property. According to the different ways of obtaining, virtual property can be divided into three categories:

the first category is the high-level account (ID) of online games or forums, QQ number with better number and e-mail. Network users can improve their level in the network community through their own continuous network community activities, so that they have a greater range of freedom and authority in the network virtual community. This kind of virtual property can be obtained free of charge from the network service providers, such as QQ number. The early five digit and six digit QQ numbers are not obtained by means of compensation, but because such resources meet the needs of network users or represent a certain high level, they are pursued by network users, resulting in the emergence of real trading behavior. Now the better QQ numbers in the nine or ten digits need to be paid from the network service providers

the second category is the virtual currency issued and sold by Internet service providers for online consumption, such as game points. This kind of virtual property generally needs to be purchased from network service providers

the third category is the "property" obtained by Internet users according to established rules when they enjoy certain network services, such as items, equipment, pets in online game settings, or other people's network virtual currency, thus becoming their own virtual property. This kind of virtual property is usually "practiced" by players in the game, and may also be purchased by network service providers or other players

Second, the nature of the act of stealing virtual property in China's judicial practice

1

There are two situations: one is stealing others' virtual property and selling it off; The other is to steal other people's virtual property for their own use. In both cases, the virtual property interacts with the real world. Stealing the victim's virtual property is essentially equivalent to stealing other people's real property. The virtual property is just the manifestation of real economic value. The virtual property has the nature of real world property. In the former case, the purpose of illegal possession is obvious, It should be regarded as theft. There are two prices in the behavior, one is the victim's purchase price, the other is the actor's selling price. How to determine the specific, the following line to explore

in the latter case, the perpetrator steals other people's virtual property and does not sell it off, but keeps it for his own use. In this case, it is difficult to determine the purpose of the perpetrator's illegal possession. In our opinion, we can refer to the interpretation of the Supreme People's court and the Supreme People's Procuratorate on Several Issues concerning the specific application of law in handling theft cases (hereinafter referred to as the interpretation of theft) on December 11, 1992. According to the interpretation, those who drive a car illegally, sell or keep it for the purpose of illegal possession shall be regarded as theft. Therefore, we believe that if there is evidence to prove that the perpetrator of stealing others' virtual property is for the purpose of illegal possession, does not return it, and does not want to return it in the future, it should also be considered as theft. However, if there is no sufficient evidence to prove that the perpetrator is for the purpose of illegal possession, the perpetrator is only for entertainment purposes or other malicious purposes, such as revenge to steal other people's virtual property, this kind of behavior is only a use behavior, not for the purpose of illegal possession, generally should not be recognized as theft According to the interpretation on theft, those who drive a car for pleasure and abandon it for many times, thus seriously disturbing the work and proction order and causing serious losses, can be punished as the crime of disturbing social order; Occasionally driving a car for pleasure, if the circumstances are minor, may not be considered a crime and shall be ordered to compensate for the losses. Here, "interpretation of theft" does not identify the above two acts as theft, the reason is the same

2. Steal the virtual property which is not purchased by others with real money but has property value

for example, the five or six digit QQ number applied for free from the network service provider, or the items and equipment that players can "practice" in the game, which can be sold at a clear price on the network. There are two situations: one is to steal others' virtual property and sell it off; The other is to steal other people's virtual property and keep it by oneself. In the former act, although the virtual property is not purchased by the victim with real currency, its virtual property can be sold into real currency. The infringement of the victim's virtual property is actually equal to the infringement of his real property. Moreover, the actor who has sold the virtual property has actually made profits and illegally occupied other people's property, which should be recognized as theft

in the latter behavior, because the virtual property is not purchased by the victim with real currency, although the virtual property can be sold into real currency, the theft of other people's virtual property is for their own use, and has not been sold, so the virtual property has no interaction and meaningful connection with the real world, The nature of the property in the real world is not reflected. It belongs to the behavior in the virtual space, especially the behavior of stealing the virtual property from the network service provider. The actor can not control the virtual property completely, and the network service provider does not lose the control of the virtual property. We think that the criminal law should not intervene, It should not be regarded as theft

Third, how to determine the amount of theft of virtual property. For the case of stealing virtual property, it is the key to determine the amount of theft. For the valuation of virtual property, many people have put forward such methods: to determine by calculating the social necessary labor time; Or by the player proof, according to the player's input cost calculation; Or according to the black market transaction price to determine; Or pricing by game operators; Or replace it with the original barter; Or the establishment of a unified transfer trading platform, to transfer over a period of time to determine the average price

it is very difficult to evaluate the virtual property, and these methods are not feasible. First of all, the value of virtual property does not follow the law of value and cannot be calculated by the social necessary labor time; Secondly, according to the input cost of players, it varies from person to person. The amount of the same virtual property will vary greatly, which violates the principle of justice in the application of criminal law; Third, the black market transaction is not open and the price is changeable, so it is absurd to use the non-public and inaccurate information as the basis; Fourth, it is obviously inappropriate for operators to play the role of Price Bureau, so they have the al identities of athletes and referees; Fifthly, the tradability of virtual property is incomplete, so the valuation of "barter" or "establishing a unified transfer trading platform" is not operable

then, how to determine the amount of stolen virtual property? It can be divided into three situations:

1. For the virtual property with a certain transaction price, because the virtual property has the property of "property", its price is objective and reliable, and the amount of theft should undoubtedly be determined according to the transaction price. If stealing the virtual property secretly in the network environment constitutes the crime of theft, the amount of theft should be determined according to the amount of loss of the virtual property in real life. The corresponding amount of virtual property in real life can be determined by the actual transaction price of the virtual property in real life. The amount of theft is closely related to the property loss of the victim. After all, only the public and private property infringed by criminal acts in real life is the object to be protected by criminal law. For example, in the case of Shanghai Huangpu District People's Procuratorate suing Meng and he for cyber theft, the amount of property represented by the stolen q-coin and game point card can be calculated by using the exchange price agreed in the contract between the victim Maoli company, Tencent company and Netease company, which can accurately reflect the property losses suffered by Maoli company. At present, there is no clear stipulation on how to calculate the amount of theft of q-coin and game point card. The indictment is not calculated according to the selling price of q-coin and game point card recognized on the Internet, but according to the price actually paid by Maoli company when purchasing, which is reasonable

2. For the virtual property that has not been traded, such as the virtual property that players "practice" in the game, because the game process does not proce value, it should be paid according to the amount of profit made by the defendant after theft

8. For suspected fraud, it is suggested to dial 110 or report to the public security organ in time, and the public security organ shall file a case for investigation and investigate the legal responsibility of the perpetrator.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750