Beruflich Dokumente
Kultur Dokumente
Asia-Pacific Region
Gregor Urbas
Australian Institute of Criminology
Note
This is a revised version of a background paper prepared for the First Asia
Cybercrime Summit held at the Centre for Criminology at the University of Hong
Kong during 2526 April 2001 (see http://www.hku.hk/crime/). The research was
based on legislation and secondary materials available to the Australian Institute of
Criminology at the time of writing, which may not include recent amendments in
some jurisdictions.
Contents
1 Introduction ............................................................................................................ 5
2 The Importance of Adequate Legislation to Address Cybercrime ............................. 6
3 Comparative Analysis of Legislative Cybercrime Provisions in
the Asia-Pacific Region ........................................................................................... 11
4 Significant Developments in Cybercrime Enforcement in the
Asia-Pacific Region ................................................................................................. 23
5 Conclusion............................................................................................................. 25
References ................................................................................................................... 26
Abbreviations
AIC
Art.
article
Cap.
Capital
CDPC
HITEC
IIPA
IPR
section
TCP/IP
UNAFEI
UNESCO
USTR
WIPO
WTO
1 Introduction
Grabosky and Smith (1998) identify the following categories of crime emerging in the
digital age: illegal telecommunications interception; electronic vandalism or terrorism;
theft of communications services; telecommunications and associated intellectual
property piracy; electronic distribution of pornography; electronic fraud; electronic
funds transfer crime; and money laundering. While many of these categories of crime
can be prosecuted under a combination of existing criminal, commercial and intellectual
property laws, it is clear that additional legislation is often required in order to deal with
certain kinds of computer-related illegalities. These crimes are becoming increasingly
referred to as cybercrimes.
What is Cybercrime?
While there is no universally accepted general definition of cybercrime, much less
national legislation explicitly employing the term,1 it can be seen that cybercrime
comprises two overlapping domains. The first is illegal activities directed at or
perpetrated through the use of computers. This can include theft of computers, wilful
damage to computers or computer systems, unlawful access to or interference with the
operation of computers, transmitting offensive or illegal content using computers, and
committing fraud or other offences through the use of computers (Sieber 1998; United
States Department of Justice 2000; Grabosky, Smith & Dempsey 2001).
A related area is the protection of information. This has been a concern of legal systems
from well before the introduction of modern technologies of mass communication, but
is clearly brought into focus by the development of global computer-based information
networks such as the World Wide Web and the Internet (Tan 2000).2 Principal legal
measures related to the protection of information from unlawful use, distribution or
exploitation include intellectual property laws, privacy laws, laws relating to secrecy and
national security, and laws relating to unfair commercial advantage.
New laws introduced in Malaysia in 1997 covering computer crimes, copyright, telemedicine and digital signatures were
promoted by the Malaysian Governments Multimedia Super Corridor as a package of cyberlaws (http://www.mdc.com.my/
msc.comm/html/cyberights01.html). In India, Chapter X of the Information Technology Act 2000 establishes the Cyber
Regulations Appellate Tribunal: Ministry of Law, Justice and Company Affairs (Legislative Department), accessible through
Ministry of Information Technology web site at http://www.mit.gov.in/itbillmain.htm. The Australian Parliament is currently
considering the Cybercrime Bill 2000 (introduced 27 June 2001); see http://www.aph.gov.au/legis.htm.
The terms Internet and World Wide Web are often used synonymously in public discussion, but there is a technical
difference: the TCP/IP protocol that forms the Internet is amenable to various uses, only one of which is the Web. Other uses
are email, video and audio streaming, real-time chat services and so on (see Tan 2000, note 26).
Adequacy of Legislation
Countries can be initially categorised according to whether they have:
(i)
(ii)
Oxford v Moss (1978) 68 Cr App R 183; Stewart (1988) 41 CCC (3d) 481; Rank Film Distributors Ltd v Video Information
Centre [1981] 2 All ER 76; compare Attorney-General of Hong Kong v Daniel Chan Nai-Keung [1987] 1 WLR 1339.
Historical Context
Though geographically proximate, the countries of the Asia-Pacific region have
enormously different historical backgrounds, which inevitably influence their respective
legal systems. Most retain some elements of indigenous laws and customs, overlaid by
laws imposed during periods of colonisation (including English, French and Spanish
legal systems), and some have also modelled their laws in accordance with broader
political philosophies such as communism (Heath 1998).
Social Context
Observance of legal norms cannot be divorced from social context. In all countries, laws
will be more readily obeyed (with less need for punitive enforcement) if they accord
with established social standards. Moreover, social norms can help to define the
boundaries of legality. In contract law, for example, terms may be implied according to
established business practice. The degree of candour expected in commercial
negotiations may also vary, so that what is business-like in one place may be seen as
fraudulent or misleading in another.
Political Context
Law enforcement and political context are interrelated. Laws passed by many
parliaments inevitably reflect political programs or involve a compromise between
various political interests, and political considerations are often involved in the way in
which these laws are enforced. Moreover, it has been pointed out that a sharp
distinction between law and policy does not exist in China. Stated government policy
can have exactly the same effect as formally enacted legislation (Clarke 1999, p. 33).
This is very different from the common law tradition according to which acts of
government may be challenged if beyond legislative power or ultra vires.
Another difference arises in the balance between public and private enforcement of legal
rights. Private enforcement of intellectual property rights in China is difficult within
existing legal structures (Clarke 1999). In Australia, by contrast, private civil litigation is
the usual way of resolving intellectual property disputes, while police and public
prosecution involvement is infrequent (Urbas 2000).
Levels of Criminality
There is also considerable divergence in the levels of activity in the region that might be
described as cybercrime. Korea, Japan, the Philippines and Taiwan have reported high
levels of computer hacking and damage from computer viruses (Infowar 2001). In
Vietnam, with only 0.1 per 100 of the population subscribing to Internet services, this is
so far less of a problem (Vietnam Post 2001).
Similar divergence in relation to estimated copyright piracy levels and associated trade
losses are observable in most recent available figures compiled by the International
Intellectual Property Alliance (IIPA) in association with United States Trade
Representative (USTR) classifications of intellectual property protection measures in
various countries (Table 1).
Table 1: Estimated copyright piracy levels (and estimated trade losses in
US$millions), 19982000
Motion pictures
1999
2000
1998
Records and m
usic
music
1998 1999 2000
Busin
ess applications
Business
1999
2000
1998
Enter
Enterttainment software
1999
2000
1998
90%
90%
90%
(120.0) (120.0) (120.0)
Taiwan
10%
20%
30%
(15.0) (20.0) (30.0)
Korea
20%
20%
20%
(20.0) (20.0) (20.0)
Philippin
es 65%
Philippines
65%
70%
(18.0) (18.0) (25.0)
Thailand
50%
55%
60%
(19.0) (21.0) (24.0)
Malaysia
80%
85%
80%
(40.0) (42.0) (41.0)
Singapore
25%
25%
NA
(8.0)
(8.0)
India
80%
80%
60%
(66.0) (66.0) (47.0)
Indon
esia
Indonesia
NA
90%
90%
(25.0) (25.0)
Vietn
am
ietnam
100% 100% 100%
(5.0)
(5.0)
(7.0)
95%
91%
93%
(808.4)
(NA) (658.7)
59%
54%
53%
(112.1) (97.6) (127.3)
64%
NA
52%
(115.7) (118.9) (102.3)
77%
NA
66%
(25.4) (26.7) (28.2)
82%
81%
78%
(39.4) (66.5) (47.0)
73%
71%
66%
(63.8) (76.8) (96.0)
52%
51%
NA
(47.4) (50.3)
65%
61%
63%
(158.0) (160.3) (195.2)
NA
85%
87%
(33.2) (32.9)
97%
98%
98%
(8.3) (10.5) (13.5)
95%
95%
99%
(1,420.1) (1,382.5)
(NA)
65%
68%
90%
(103.2) (115.7) (319.3)
65%
63%
90%
(122.1) (119.5) (157.0)
90%
89%
98%
(24.7)
(23.8) (41.0)
92%
95%
98%
(93.5) (116.3) (130.5)
99%
99%
98%
(135.2) (164.0)
(NA)
73%
65%
NA
(65.2)
(52.3)
84%
86%
80%
(36.8)
(42.8)
(NA)
NA
92%
99%
(80.4)
(NA)
98%
96%
NA
(22.5)
(20.1)
Chin
a
China
Source: International Intellectual Property Alliance (compiled from figures released 1 May 2000 and 16 February 2001). See also specific country reports: http://
www.iipa.com/html/reports_by_country.html, and the Software and Information Industry Associations Report on Global Software Piracy 2000, which estimates 1999
revenue losses from software piracy in the Asia-Pacific at approximately US$2.8 billion (http://www.spa.org/piracy).
Legislative Reform
A recent report on cybercrime laws in 52 countries assesses the following Asia-Pacific
countries as having updated their laws in relation to the prosecution of cybercrime:
Australia, China, Japan, Malaysia and the Philippines. New Zealand and Vietnam are
assessed as being in the process of developing such laws (McConnell International
2000). The basis used for comparison was a list of:
10 different types of cybercrime in four categories: data-related crimes including
interception, modification, and theft; network-related crimes, including interference
and sabotage; crimes of access, including hacking and virus distribution; and associated
computer-related crimes, including aiding and abetting cyber criminals, computer
fraud, and computer forgery.
(McConnell International 2000)
However, the McConnell International report itself notes that such crimes are not
treated uniformly across countries, or even in some instances within countries (such as
Australia, which has both Federal and State laws in relation to computer access), and
that penalty levels vary widely.
The analysis presented in the following chapter, which is based on the somewhat
different Council of Europe classification of computer and computer-related offences,
highlights the range of penalty levels applicable to cybercrime and intellectual property
offences within the Asia-Pacific region. Needless to say, comparison of laws across
jurisdictions must always be treated with caution, due partly to the difficulty of
obtaining legislation in reliable translation, and partly to the inherently idiosyncratic
ways in which legislative provisions are drafted, promulgated, interpreted and enforced
in differing legal systems. In addition, there is great variability in the degree to which
penalties approaching the maximum available in legislation are imposed, and the range
of sentencing options available to courts beyond those stated in the relevant offence
provisions. With these reservations expressed, however, it is hoped that the comparative
analysis presented will contribute to a clearer picture of legislative responses to
cybercrime in the Asia-Pacific region.
10
11
Chin
a
China
Illegal
interception
Dat
a
Data
interf
erence
interference
System
Misuse of
interf
erence de
vices
interference
devices
Computer
-related off
ences
Computer-related
offences
Computer
Computer-- Computer
Computer-- Computer
related
related
child
forger
fraud
orgeryy
pornography
Ancillar
Ancillaryy liability
Regulations on Protecting the Safety of Computer Information (Order No. 147 of the State Council of the Peoples Republic of China, 18 February 1994)
Computer Information Network and Internet Security, Protection and Management Regulations (State Council approval 11 December 1997, promulgated
30 December 1997)
1994 Regulations
Warnings may be given, fines imposed and illegal income confiscated in cases of deliberate input of
computer virus or selling special safety protection products without permission.
1997 Regulations
Prohibition of use of Internet to:
harm national security, disclose state secrets, conduct illegal activity etc. (Art. 4), punishable by
relevant State regulations (Art. 19);
transmit information inciting illegality or overthrow of the Government etc. (Art. 5), punishable
by warnings, confiscation of illegal income, and fines of not more than 5,000 RMB for individuals
or 15,000 RMB for Internet service providing units (Art. 20).
Prohibition of activities harming the security of computer information networks including:
Crimes
Telecommun- Crimes Ordinance
Cap. 200
Ordinance ications
Ordinance
extending definition of criminal
Cap. 200
s161
(5 yrs
max.)
Taiwan
Japan
12
Cap. 106
s27A (fine
of $20,000)
See
Computer
Software
Protection
Regulations
Crimes
Theft
Control of
See
Crimes
Ordinance Ordinance Obscene and Copyright Ordinance
Cap. 210 Indecent
Ordinance Cap. 200
s19 (10 yrs Articles Ord. Cap. 39
s56 (accessories)
39,
Cap.390
max. for
Prevention s159A (conspiracy)
s21 (3 yrs
false
of Copyright s159G (attempts)
accounting max. and
Piracy
by falsifying fine of
Ordinance
Cap. 200
s85 (life
damage to property to include
misuse of a computer i.e. unauthorised imprisonfunction, altering, erasing or adding any ment for
program or data
falsification
Theft Ordinance
of bank
Cap. 210
computer
extending burglary
records)
Cap.200: ss59,60,63
(10 yrs max. or life imprisonment if
property intentionally destroyed so as to
endanger life)
Cap.210: s11
(14 yrs max. for burglary defined to
include unlawful interference with
computer)
computer
records
$1million)
Cap. 544
s161
s161(5 yrs s246
max. or
(5 yrs
fine to
max.)
50,000)
Copyright
Amendment
Act 1985
Korea
Information Communication Act (No. 5986 of 1999) [and Computer Program Protection Act (No.3920 of 1986)]
Ar
t.28 Impairing dat
a etc.
Art.28
data
(5 yrs max. or fine to 50 million won)
Ar
t.29 Impairing protectiv
e measures
Art.29
protective
(3 yrs max. or fine to 30 million won)
Ar
t.30 Un
authorised disclosure
Art.30
Unauthorised
(1 yr max. or fine to 10 million won)
Ar
t.30 Breach of other regulations
Art.30
(Fine to 5 million won)
Philippin
es
Philippines
s250
making attempts
etc. punishable
Table 2 (cont)
Computer and dat
a off
ences
data
offences
Illegal
access
Thailand
Illegal
interception
Dat
a
Data
interf
erence
interference
Computer
-related off
ences
Computer-related
offences
System
Misuse of
interf
erence de
vices
interference
devices
Computer
Computer-- Computer
Computer-- Computer
related
related
child
forger
fraud
orgeryy
pornography
Ancillar
Ancillaryy liability
Malaysia
ss3,4
Un
authorised access
Unauthorised
(5 yrs max. and/or fine
to RM 50,000; 10 yrs
max. and/or fine to
RM 150,000 if with
intention to commit
offence)
s5
Un
authorised modif
ication
Unauthorised
modification
(7 yrs max. and/or fine to
RM 100,000; 10 yrs max.
and/or fine to RM 150,000
if with intention of
causing injury)
s6
authorised disclosure of
Unauthorised
Un
access code
(3 yrs max. and/or fine to
RM 25,000)
See Comm-
unications
and
Multimedia
Act 1998
See
Copyright
Act 1997
Singapore
s7
Abetments and
attempts
punishable as
per offence
s10
Abetments and
attempts
punishable as
offences
Information Technology Act 2000 (No.21 of 2000) also incorporating computer-related amendments to the Indian Penal Code (No.45 of 1860)
s43 Un
authorised access, dam
age etc. (Damages not exceeding one crore rupees)
Unauthorised
damage
See s63B
s63B,
s65 Tampering with computer source documents (3yrs max. and/or fine to two lakh = 200,000 rupees)
Copyright
s66 Hacking with computer system (3yrs max. and/or fine to two lakh rupees)
Act 1957
s67 Pu
blishing obscen
e inf
orm
ation in electronic fform
orm (5 yrs max. and fine to one lakh rupees; 10 yrs max.
Publishing
obscene
inform
ormation
and fine to two lakh rupees for second or subsequent conviction)
s70 Un
authorised access to protected computer system (10 yrs max. and unspecified fine)
Unauthorised
India
Indon
esia
Indonesia
NA
Australia*
Ne
w Zealand
New
State and
Territory
Criminal
Legislation
See
Copyright
Act 1968
(Cwlth)
s85
ences by
Offences
Off
companies
Responsible
officer of
company
may be
held liable
s4B deals
with
penalties
for
corporations
Amendments to the Crimes Act relating to unauthorised access and damage to computers (including hacking) are currently before the New Zealand
Parliament: Crimes Amendment Bill (No.6).
Vietn
am
ietnam
Cambodia
Laos
No specific computer crime laws, but directives posted during 2000 prohibit Internet publication of material considered to be violent, criminal, unstable,
pornographic etc., with unspecified penalties including warnings, fines, expulsion, education or prosecution.
* Commonwealth only: Australian States and Territories have their own computer crime and other criminal legislation.
Sources:
13
Computer Offences
The legislative approach of very few countries in the Asia-Pacific region fits neatly
within the Council of Europes classifications. However, in some cases it is possible to
identify separate offences (and penalties) in relation to illegal access, interception,
interference, misuse and so on. Hong Kong, Malaysia and Singapore arguably have the
most fine-grained discrimination of computer offences, while jurisdictions such as
China, Taiwan and the Philippines tend towards more general offence descriptions (for
example, the Philippines hacking or cracking offence).
Computer-related Offences
Only some of the Asia-Pacific jurisdictions incorporate specific fraud and forgery
offences into their main computer crime legislation. An example is section 246-2 of
Japans Computer Crime Act, which relates to intentionally obtaining a profit by
introducing false information or wrong instructions into any computer system used in
the course of business transactions.5 However, fraud and forgery can be prosecuted
under the commercial and criminal laws of most jurisdictions whether committed using
a computer or by more traditional paper-based means. Much the same is true for child
pornography and similar offensive-content measures. While few jurisdictions have such
provisions in their main computer crime legislation (India is an exception), such
publication may be punishable under existing obscenity or content-classification laws.
Finally, offences relating to copyright are to be found in intellectual property laws rather
than computer crime legislation in most countries (an exception being the Philippines
piracy offence).
Ancillary Liability
14
Recognising the highly specialised knowledge and skills required for investigation and
evidence gathering in relation to cybercrime, some countries have moved towards setting
up specialised computer crime units within their law enforcement agencies. Examples
include:
the HITEC (HI-tech crime Technical Expert Center) established to act as a cyber
police force by the National Police Agency of Japan (http://www.npa.go.jp/
hightech/jyu_prog/pro_eng.htm); and
the Korean National Police Agencys Cyber Terrorism Response Center and
recently announced General Investigation Center of Computer Crimes under the
Prosecutor-Generals Office (Lee 2000).
Computer crime and intellectual property piracy may constitute predicate offences
under some jurisdictions legislation directed towards organised crime and money
laundering. This approach is based the United States Racketeer-Influenced and Corrupt
Organizations statute enacted in 1970, which has been a model for some legislative
developments in the Asia-Pacific (for example, the Philippines).
Forfeiture/Restitution
Apart from the imposition of terms of imprisonment and fines, courts are empowered
under some computer crime legislation to order forfeiture of equipment used and/or
assets acquired, or to require restitution to victims. In Taiwan there is a statutory
maximum for damages that can be awarded to injured persons under the Computer
Processing Personal Information Protection Law. In the Philippines, maximum penalties
imposed for hacking or cracking under the Electronic Commerce Act are commensurate
to the damage incurred.
Undercover Surveillance/Search and Seizure
Standard search and seizure powers for the investigation of criminal offences may not
extend to the investigation of computer data or the interception and covert surveillance
of electronic transmissions such as email. Some computer crimes legislation expands the
range of investigatory powers available to law enforcement agencies.
International Agreements
15
on Crime and Justice.6 At a more regional level, the Asia and Far East Institute of the
United Nations (UNAFEI) recently conducted a workshop consisting of four panel
discussions on:
the relationships between law enforcement agencies and the computer and
Internet industries.7
16
More information is available from the United Nations web site: http://www.un.org/english.
See, for example, in Australia: Crimes (Overseas) Act 1964 (Cwlth), Criminal Investigation (Extraterritorial Offences) Act 1987
(Cwlth), Extradition Act 1987 and Mutual Assistance in Criminal Matters Act 1987 (Cwlth) at http://www.austlii.edu.au.
Chin
a
China
Tradem
arks
rademarks
Designs
Patent Law
Trademark Law
Ar
t.63
Art.63
(Unspecified
criminal liability
for serious
infringement)
Ar
t.38, 40
Art.38,
(Unspecified
criminal liability
for serious
infringement)
Copyright
(including
Utility Models
in some
jurisdictions)
Designs and
utility models
are included
as patentable
inventioncreations under
the Patent Law
See Patent Law
Circuit
(including
moral rights
in some
jurisdictions)
Copyright Law
(in force from
1 June 1991)
and Copyright
Regulations (in
force from July
1994) [includes
computer
software]
Ar
t.46
Art.46
(3-7 yrs for serious
infringements
plus compensation
to owners)
Ancillar
Ancillaryy liability
layouts
pro
visions
provisions
Computer
hardware design
may be
patentable under
the Patent Law
(software is
expressly
excluded:
Art.25(2))
See Patent Law
Cap. 514
Cap. 43
(to be replaced
by Cap. 559
559)
Registered
Designs
Ordinance
Cap. 522
Copyright
Ordinance
Layout-Design
(Topography) of
Cap. 528
Integrated
Prevention of
Circuits
Copyright Piracy Ordinance
Cap. 445
Ordinance
Cap. 544
(relating to optical
disc piracy)
s141
s86
s85
Cap.528,
(No criminal
ss118-120
(2 yrs max. for
(7 yrs max. and
(2 yrs max. for
penalties for
falsification of
fine of $50,000
falsification of
(8 yrs max. and
infringement)
register etc.; no
for falsification of register etc.; no fine of $500,000)
Cap.544,
criminal penalties register etc.; no
criminal
ss3-4, 21-22
for infringement) criminal penalties penalties
for infringement) for infringement) (2 yrs max. and
fine of $500,000
on first conviction,
or 4 yrs max. and
$1 million
thereafter)
Copyright (Suspension
of Amendments)
Ordinance 2001
(No. 13 of 2001,
commenced 1 April
2001).
17
Table 3 (cont)
Taiwan
Japan
Patents
Tradem
arks
rademarks
Designs
Copyright
Circuit
layouts
Patent Law
Trademark Law
Copyright Law
(in force
Jan 1994)
(in force
Dec 1993,
amended 1 Jan
1998)
Integrated
Circuit LayoutDesign
Protection Law
Infringement
invention patents:
(fine to
NT$600,000);
utility model
patents:
(2 yrs max. and/
or fine to
NT$150,000)
Ar
t.62
Art.62
Infringement
(3 yrs max. and/
or fine to
NT$200,000)
Patent Law of
Trademark Law
1959
of 1957
(includes
computer
software)
See Patent Law
new design
patents:
(1 yr max. and/
or fine to
NT$60,000)
in force Feb
1996)
(Constructive
damages to
NT$5 million,
but no criminal
punishment)
Circuit Layout of
Semi-conductor
Integrated
Circuit Act of
1985
ss196-204
(5 yrs max. with
labour or fine to
5 million)
Korea
Patent Law
ss78-85
(5 yrs max. with
labour or fine to
5 million)
Trademark Law
Ar
t.113, 119
Art.113,
(3 yrs max. with
labour or fine to
3 million)
[Circumvention
devices:
Ar
t.120bis
-Ar
Art.120bis
(1 yr max. or fine
to 1 million)]
Ar
t.51-56
Art.51-56
(3 yrs max. or
fine to
1 million)
Design Law
Copyright Act
(No.951 of
1961)
amended 1997
[and Utility
(No.3816 of
1986)
[andComputer
Semi-conductor
Integrated
Circuits Lay-Out
Design Act
ss69-77
[ss56-64]
(3 yrs max. with
labour or fine to
3 million)
Model Law
(No.952 of
1961) revised
1 July 2001]
Ar
t.225-232
Ar
t.93-98
Ar
t.82-89
Art.225-232
Art.93-98
Art.82-89
t.18]
(7 yrs max. or fine (7 yrs max. or fine [Ar
[Art.18]
to 100 million
to 100 million
(7 yrs max. or
won; 300 million won; 300 million fine to
won for a
won for a
100 million won;
corporation)
corporation)
300 million
won for a
corporation)
Philippin
es
Philippines
Program
Protection Act
(No.3920 of
1986)]
Ar
t.98-101
Art.98-101
(3 yrs max. or fine
to 3 million won)
Ar
t.46(1)
[Ar
Art.46(1)
(3 yrs max. or fine
to 3 million won)]
Dual liability
provisions under
each of Japans
intellectual property
laws make a legal
entity also liable for
infringements
committed by an
officer, employee,
representative or
servant of the
entity: see e.g. s201
Patent Law
(No.4526 of
1992) revised
1999
Ar
t.45-49
Art.45-49
(3 yrs max. and/
or 50 million
won)
Dual liability
provisions under
Korean intellectual
property laws make
a legal entity also
liable for
infringements
committed by an
officer, employee,
representative or
servant of the
entity:
Ar
t.230 Patent Law
Art.230
Ar
t.97 Trademark
Art.97
Law
Ar
t.87 Design Law
Art.87
Ancillar
Ancillaryy liability
pro
visions
provisions
[No specific
present law, but
may be
patentable
invention under
Intellectual
Property Code
Intellectual
Property Code]
18
Table 3 (cont)
Patents
Thailand
Patent Act
B.E.2522 (1979),
amended
B.E.2535 (1992),
B.E.2542 (1999)
ss81-88
(3 yrs max. or fine
to 400,000 baht)
Malaysia
Tradem
arks
rademarks
Designs
Copyright
ss107-116
ss27-30, 52, 69
(4 yrs max. or fine (Direct infringement: fine from 20,000 baht to 200,000
to 400,000 baht) baht; max. 4 yrs and/or fine from 100,000 baht to
800,000 baht if offence committed for commercial
purpose)
ss31, 70
(Indirect infringement: fine from 10,000 to 100,000
baht; max. 2 yrs and/or fine from 50,000 to 400,000
baht if offence committed for commercial purpose)
s73
(Penalty doubled for any 2nd offence committed within
5 yrs of discharge of 1st offence penalty)
Copyright Act
1987, Copyright
(Amendment)
Acts 1990, 1996,
1997, 2000.
s41
(5 yrs max. and
fine to 10,000
ringgit per
infringing copy;
10 yrs max for
second or later
offence)
Note also Optical Discs Bill 2000 including criminal penalties.
Singapore
India
No criminal
penalties for
infringement
No criminal
penalties for
infringement
Ancillar
Ancillaryy liability
pro
visions
provisions
Circuit
layouts
Layout-Designs
of Integrated
Circuits Act
2000
No criminal
penalties for
infringement
s41(4)
Responsible officer
of company may be
held liable
Copyright Act
Cap.63
1987 (Cap.63
Cap.63,
ss76-95
[infringement]
(6 months to 3 yrs
max. and fine from
Rs50,000 to
Rs.2 million)
Designs Act
Copyright Act
1911 (subject to 1957 (as amended
revision under
by Copyright Act
Designs Bill
1994 No.38 of
2000)
1994) [includes
computer
software]
ss63, 63A
[infringement]
(6 months to 3 yrs
max. and fine from
Rs50,000 to
Rs.2 million)
s63B [infringing
computer programs]
(3 yrs max. and
fine to Rs.2 million)
s69 Off
ences by
Offences
companies
Responsible officer
of company may
be held liable
19
Table 3 (cont)
Patents
Indon
esia
Indonesia
Australia*
Designs
Copyright
Circuit
layouts
Patents Law
Trademark Law
Patents Act
1990
Trademarks Act
1995
Ancillar
Ancillaryy liability
pro
visions
provisions
Integrated
(No.6 of 1989)
(No.19 of 1992) Law
(No.6 of 1982)
Circuits Law
Note: Amendments to the above intellectual property laws are currently before the Indonesian
Parliament, which is also due to discuss drafts on trade secrets, industrial designs and circuit
layouts. Proposed criminal penalties are as follow.
Ar
t.91-96
Ar
t.74
Ar
t.55
Ar
t.131-133
Ar
t.42
Art.91-96
Art.74
Art.55
Art.131-133
Art.42
(1-7 yrs and fines (2-7 yrs and fines (2-7 yrs and fines (5-7 yrs and fines (2-7 yrs and fines
from Rp10 million from Rp45 million from Rp45 million from Rp150 million from Rp45 million
to Rp300 million) to Rp300 million) to Rp300 million) to Rp300 million) to Rp300 million)
No criminal
penalties for
infringement
Ne
w
New
Zealand
Tradem
arks
rademarks
ss145-149
No criminal
(2 yrs max. and/or penalties for
fines to $55,000) infringement
No criminal
No criminal
penalties for
penalties for
infringement but infringement
max. fine of
$30,000 or
$100,000 for a
corporation under
ss16, 40 of the
force from
4 Mar 2001)
s132
No criminal
(5 yrs max and/or penalties for
fines to $60,500; infringement
fine increases to
$93,500 for
infringement by
conversion from
analog to digital
copy: s132(6AA)
s132(6AA))
(Cwlth) a
corporation may be
fined up to 5 times
the maximum fine
applicable to an
individual.
Copyright Act
1994
Layout Designs
Act 1994
ss131, 198
(3 months max.
or fine of $5,000
per infringing
copy to a max.
of $50,000)
No criminal
penalties for
infringement
s133
Officers of body
corporate may be
liable for
infringement by the
corporation.
Cambodia
Laos
Ordinance on
the Protection
of Industrial
Property Rights
or falsely applying
a trademark
Ordinance on
Trademarks
(197/HDBT, Dec
1982))
Ordinance on
Industrial
Designs
Ordinance on
Copyright
Protection
relating to the Judiciary and Criminal Law and Procedure applicable in Cambodia during the Transitional Period, but
no penalties are prescribed. Draft Patent and Design Act, Marks Protection Act and Copyright and Related Works Act
were drafted in 1996.
Decree 104 issued in 1987 recognises the need to protect intellectual property rights in Laos, but is not in itself
substantial legislation for enforcement.
* Commonwealth only: Australian States and Territories have no intellectual property legislation.
Main source: CCH Asia 1998
20
Offence Classification
The classification of intellectual property laws into those dealing with patents,
trademarks, designs, copyright and (in some jurisdictions) computer circuit layouts is
fairly standard. However, the legislation of some jurisdictions combines a number of
these categories (for example, China, Taiwan, the Philippines), while others have specific
laws for additional categories such as utility models (Japan, Korea). Moreover, not all
intellectual property statutes make infringement an offence (in Australia, for example,
only the Trademarks Act and Copyright Act have such offence provisions).
Computer Software
Few Asia-Pacific jurisdictions have laws explicitly relating to optical disc piracy. An
exception is Hong Kongs Prevention of Copyright Piracy Ordinance, which prohibits
the manufacture of optical discs without a valid licence, punishable by a fine of
$500,000 and imprisonment for two years on a first conviction, and $1,000,000 or four
years on a subsequent conviction (Cap. 544, section 21).
Circumvention of Technological Protection Measures
International agreements for the protection of industrial and intellectual property date
back over 100 years. Table 4 indicates membership within the Asia-Pacific region of the
main instruments administered by the World Intellectual Property Organisation
(WIPO), United Nations Educational, Scientific and Cultural Organisation
21
22
Applies from
July 1997
Hong Kong
Aug 1996
July 1931
March 1949
Sept 1998
Oct 1998
New Zealand
Vietnam
Cambodia
Laos
April 1928
April 1928
Sept 1997
April 1928
* to comply by 2001
Dec 1950
Oct 1925
Australia
Dec 1998
India
Indonesia
Feb 1995
Singapore
Dec 1998
July 1931
Oct 1990
Aug 1951
Jan 1989
Philippines
Malaysia
May 1980
Sept 1965
Korea
July 1899
Applies from
July 1997
Oct1992
Berne Convention
for the Protection
of Literary and
Artistic Works
1886
Thailand
July 1899
Japan
Taiwan
March 1985
China
Paris Convention
for the Protection
of Industrial
Property 1883
Sept 1992
Sept 1984
Oct 1989
Rome Convention
for the Protection
of Producers of
Phonograms etc.
1961
Jan 1995
July 1995
July 1976
June 1984
Aug 1972
Dec 1979
May 1975
Dec 1990
Jan 1989
Dec 1989
July 1980
March 1979
April 1975
June 1980
Convention
Establishing the
World Intellectual
Property
Organisation
1970 (WIPO)
March 1993
Dec 1992
March 1980
Sept 1997
Dec 1998
Feb 1995
Aug 1984
Oct 1978
Applies from
July 1997
Jan 1994
Patent
Cooperation
Treaty
(Washington,
1970)
Aug 1954
Aug 1953
Feb 1969
[Nov 1977]
Oct 1957
[Jan 1988]
Aug 1955
July 1987
Jan 1956
[July 1977]
July 1992
Universal
Copyright
Convention
(Geneva 1952)
[as revised at
Paris, 1971]
Aug 1976
June 1974
Feb 1975
Oct 1987
Oct 1978
Applies from
July 1997
April 1993
Geneva
Phonograms
Convention
1971
Jan 1998
Sept 1997
Oct 1999
Trademark
Law Treaty
(Geneva, 1994)
Jan 1995*
Jan 1995*
Jan 1995*
Jan 1995*
Jan 1995*
Jan 1995*
Jan 1995
Jan 1995*
Jan 1995*
Jan 1995*
Jan 1995*
In progress
Agreement on
Trade-related
Aspects of
Intellectual
Property Rights
1994 (TRIPS)
Ratified
Ratified
WIPO
Copyright
Treaty
1996
(not yet
in force)
4 Significant Developments in
Cybercrime Enforcement in the AsiaPacific Region
During 20002001, several significant developments have occurred within the AsiaPacific region by way of cybercrime activity, prosecution and legislative reform. Some
highlights follow.
pornography; and
23
24
5 Conclusion
Cybercrime legislation in the Asia-Pacific region is still in the very early stages of
development and exhibits wide variation in terms of legislative approach, overlap with
general criminal, commercial and intellectual property law, and differentiation between
offences and penalty levels. This variation is not surprising given the vastly different
historical, social and political contexts within which these laws have evolved, and the
differing levels of technological development within the region.
However, it is an inescapable fact that cybercrime knows no national borders and, as a
result, defences against the threats increasingly posed to computer and information
infrastructures can only be as strong as the weaker links in the chain. It is therefore
important for each jurisdiction to continually assess the adequacy of its cybercrime laws
and, where deficiencies can be identified, to reform those laws appropriately. While
there is no single model to be emulated in this process, guidance can be gained from
legislation in force in jurisdictions with longer experience of the threat and prosecution
of cybercrime, and also from concerted international efforts such as the Council of
Europes Draft Convention on Cybercrime. By offering a preliminary comparative analysis
of computer offence provisions against the Council of Europe classification and of
related intellectual property laws, it is hoped that this paper will contribute to greater
cohesion and effectiveness of legislative responses to cybercrime in the Asia-Pacific
region.
25
References
Associated Press 2000, Philippine President signs law to punish computer crimes, New York
Times,15 June 2000, Technology section.
CCH Asia 1998, Doing Business in Asia, looseleaf service, CCH Asia PTE Limited, Hong Kong.
Clarke, D. 1999, Private enforcement of intellectual property rights in China, in Intellectual Property
Rights in China: Evolving Business and Legal Frameworks, vol. 10, no. 2, National Bureau of
Research Analysis, Seattle.
Council of Europe 2001, Draft Convention on Cybercrime (Final Draft and Explanatory Note), European
Committee on Crime Problems and Committee of Experts on Crime in Cyber-Space, Strasbourg,
29 June 2001; see http://conventions.coe.int/treaty/EN/projets/projets.htm (visited 20 August
2001).
Grabosky, P.N. 2000, The Mushrooming of Cybercrime, Symposium on Rule of Law in the Global
Village, Panel on the Challenge of Borderless Crime, 1214 December 2000, Palermo; see http://
www.odccp.org/palermo/convmain.html.
Grabosky, P.N. & Smith, R.G. 1998, Crime in the Digital Age: Controlling Telecommunications and
Cyberspace Illegalities, Transaction Publishers/Federation Press, New Brunswick, New Jersey.
Grabosky, P.N., Smith, R.G. & Dempsey, G. 2001, Electronic Theft: Unlawful Acquisition in Cyberspace,
Cambridge University Press, Cambridge.
Heath, C. 1998, Intellectual Property Rights in Asia: Projects, Programmes and Developments, Max Planck
Institute for Foreign and International Patent, Copyright and Competition Law; see http://
www.intellecprop.mpg.de/Online-Publikationen/Heath-Ipeaover.htm (visited 20 August 2001).
Infowar 2001, Viruses web page; see http://www.info-sec.com/viruses/viruses_1.shtml (visited 20
August 2001).
International Intellectual Property Alliance 2001, anti-piracy web site; see http://www.IIPA.com (visited
20 August 2001).
Lee Joo-hee 2000, Law enforcement officers step up efforts to tame cybercrime, The Korea Herald, 17
November 2000.
McConnell International 2000, Cyber Crimeand Punishment? Archaic Laws Threaten Global Information,
online report; see http://www.mcconnellinternational.com/services/CyberCrime.pdf (visited
20 August 2001).
Microsoft Corporation 2001, Microsoft intensifies worldwide campaign against Internet piracy and
criminal counterfeiting, media release, 2 April 2001; see http://www.microsoft.com/presspass/
press/2001/apr01/04-02InternetCrimePR.asp (visited 20 August 2001).
Model Criminal Code Officers Committee 2001, Model Criminal Code, Chapter 4: Damage and
Computer Offences and Amendment to Chapter 2: Jurisdiction, Model Criminal Code Officers
Committee of the Standing Committee of Attorneys-General Australia; see http://www.law.gov.au/
publications/Model_Criminal_Code/index.htm (visited 20 August 2001).
Sieber, U. 1998, Legal Aspects of Computer-Related Crime in the Information Society, Comcrime Study
prepared for the European Commission, Version 1.0, January.
Software and Information Industry Association 2001, Report on Global Software Piracy 2000; see http://
www.spa.org/piracy (visited 20 August 2001).
26
Tan, K.H. 2000, Prosecuting foreign-based computer crime: International law and technology collide,
Symposium on Rule of Law in the Global Village, Panel on the Challenge of Borderless Crime,
1214 December 2000, Palermo; see http://www.odccp.org/palermo/convmain.html.
United States Department of Justice 2000, The Electronic Frontier: Unlawful Conduct Involving the Use of
the Internet, Report of the Presidents Working Group on Unlawful Conduct on the Internet,
March 2000; see http://www.usdoj.gov/criminal/cybercrime/unlawful.htm (visited 20 August
2001).
Urbas, G. 2000, Public enforcement of intellectual property rights, Trends and Issues in Crime and
Criminal Justice, no. 177, Australian Institute of Criminology, Canberra.
Vietnam Post 2001, Vietnam Internet after 3 years of development, Vietnam Post, 5 January; see http://
home.vnn.vn/vnpost/bao_2001/so1/english/index_content.html (visited 10 January 2001).
Weir, S. 2001, Cybercrime high on penalty hit-list, The Adelaide Advertiser, 3 July.
White House. 2000, International Crime Threat Assessment, Report of a United States Government
interagency working group in support of and pursuant to the Presidents International Crime
Control Strategy; see http://www.fas.org/irp/threat/pub45270index.html (visited 20 August 2001).
Zhongguo Xinwen She 2000, China passes Internet security law, China Online, 29 December 2000; see
http://www.chinaonline.com/issues/internet_policy/NewsArchive/Secure/2000/December/
C00122805.asp (visited 20 August 2001).
27