Position: Home page » Virtual » Is it illegal to steal game virtual currency

Is it illegal to steal game virtual currency

Publish: 2021-04-21 09:00:06
1.

It is illegal to issue virtual currency privately

According to Article 29 of the regulations of the people's Republic of China on the administration of RMB, no unit or indivial is allowed to print or sell token tickets to replace RMB in circulation on the market

In addition, the "emergency notice of the State Council Office for rectifying unhealthy tendencies in the instry, the State Economic and Trade Commission and the people's Bank of China on prohibiting the issuance and use of various token certificates (cards)" also strictly prohibited similar issues

extended data

virtual currency refers to non real currency. Well known virtual currencies, such as online currency of Internet company, q-coin of Tencent company, q-point and voucher of Shanda company, micro currency launched by Sina (used for micro games, Sina reading, etc.), chivalrous Yuanbao (used for chivalrous road game), silver grain (used for bixue Qingtian game), and popular digital currencies in 2013 include bitcoin, Laite coin, infinite coin, quark coin, zeta coin, etc Barbecue coins, pennies (Internet), invisible gold bars, red coins, prime coins. At present, hundreds of digital currencies are issued all over the world. Popular in the circle & quot; The legend of "bitcoin, Wright silver, infinite copper, pennies aluminum"

market formation

the Internet has led to the emergence of a new market, which is a virtual market based on cyberspace. The Internet provides a lot of communication places for consumers, and also provides business market for enterprises. Enterprises must change from proct centered to service centered to customer centered. With the development of computer artificial intelligence technology and database technology, enterprises can conveniently collect customers' information, understand customers' needs in time, change business strategies and grasp economic arteries in real time

With the rapid development of computer and network communication technology, the application of Internet technology has graally penetrated into various fields of human activities, and the unlimited business opportunities that it contains make businesses turn their eyes to e-commerce. E-commerce is penetrating into all aspects of social and economic life at a speed that people can hardly imagine

the traditional finance is also closely watching this irresistible trend of global economic integration and networking. As a result, value-added services take art as the selling point and can be regarded as commodities; The sword in the game is not a brand-new financial services business philosophy - e-finance came into being

from the historical development process, to understand e-finance, we must start from the electronic finance and e-commerce. The so-called e-financialization means that financial enterprises adopt modern communication, computer, network and other information technology means in addition to Internet technology to improve the work efficiency of traditional financial service business, rece operating costs, realize the automation of financial business processing, informatization of financial enterprise management and scientific decision-making, and provide customers with faster and more convenient services, And then enhance the financial enterprise is the behavior of market competitive advantage

e-finance is a transcendence of financial electronization. Different from the electronic finance, the main technical basis of e-finance operation is the increasingly perfect Internet technology. Due to the characteristics of global connectivity, openness, quickness and low marginal cost of Internet technology, e-finance strengthens the restructuring and innovation of financial services business based on Internet technology, so that customers are free from the restrictions of business hours and places, and enjoy all kinds of high-quality and low-cost services provided by financial enterprises anytime and anywhere

with the development of Internet, the form of money is becoming more virtual, and there is an electronic money that only exists in the form of electronic signal

reference source: Network: virtual currency

2.

According to the news on February 10, 2018, on September 4, 2017, seven ministries and commissions of the people's Republic of China issued the notice on preventing the financing risk of token issuance, which regulates the issuance of tokens. In the notice, the nature of all kinds of tokens and "virtual currency" is clearly defined: it is not issued by the monetary authority, and it has no monetary attributes such as legal compensation and mandatory, It does not have the same legal status as currency and cannot and should not be used as currency in the market. Nevertheless, it is undeniable that all kinds of "virtual currency" still have a certain property value and are part of the property of the holder. So, how to identify the nature of the theft of such tokens

In order to protect the legitimate rights and interests of "virtual token" holders, the author intends to discuss such issues through a relevant news report and relevant cases

stealing bitcoin

recently, a news report said that Haidian police in Beijing cracked a case of destroying computer information system. The suspect Zhong used his administrator's authority to modify the company's computer applications and steal 100 bitcoins. Before he could sell the stolen money, Zhong was arrested by the police. At present, Zhong was detained for the crime of destroying computer information system

it can be seen from the report that the police detained the perpetrator for stealing bitcoin on suspicion of damaging the computer information system. The crime of destroying the computer information system stipulated in Article 286 of the criminal law of our country refers to the act of deleting, modifying, adding or interfering with the functions of the computer information system in violation of the provisions of the state, resulting in the abnormal operation of the computer information system and serious consequences, or deleting, modifying or interfering with the data and application programs stored, processed or transmitted in the computer information system Modifying or adding operations with serious consequences, or deliberately making or spreading destructive programs such as computer viruses, which affect the normal operation of the computer system with serious consequences

In the author's opinion, this crime is one of the crimes of impairing social management order in Chapter 6 of the criminal law, that is, the legal interest protected by this crime is actually the public order of our society, not the property interests of the digital currency holders, which in fact denies the property value of digital currency, It is only protected as a data or system function in a computer system. The author thinks that there is some irrationality in this way

first of all, in the notice on the prevention of bitcoin risk issued in 2013, it is mentioned that bitcoin is not a real currency because it is not issued by the monetary authority and does not have such monetary attributes as legal compensation and compulsion. Bitcoin has four main characteristics: no centralized issuers, limited amount, no geographical restrictions and anonymity. Because it belongs to a specific virtual commodity in nature The notice also clearly mentioned that bitcoin does not have the same legal status as currency and should not be used as currency in the market. However, as a virtual commodity, the property value behind bitcoin cannot be ignored

Secondly, Article 127 of the general provisions of the civil law, which came into effect on October 1 last year, stipulates that if the law has provisions on the protection of data and network virtual property, such provisions shall prevail. Although only the protection of the network virtual property has made the principle provisions, but it can not be denied that this shows our country's attitude towards the protection of the network virtual property. Although there is no special law for the protection of data and network virtual property in China, from the perspective of the general provisions of civil law, it is predicted that there will be relevant legislation in the future

finally, from the relevant cases, we can also see the recognition of the property attribute of virtual currency such as bitcoin in China's judicial practice. In April and may 2013, Liu premeditated to set up a bitcoin trading platform, so he recruited Jin and Huang (both sentenced) to jointly set up a "bitcoin" trading platform. During this period, Liu, Huang, Jin, Jin and the defendant he, in addition to other acts of directly stealing customers' funds, also frequently cashed RMB by selling customers' bitcoins, and transferred 120 bitcoins from the website. Finally, the court convicted and punished the defendant for fraud, and the bitcoin transferred by the defendant was also included in the property loss of the victim. Therefore, from the judicial cases, we can also get the recognition of the property attributes of virtual currency such as bitcoin

based on the above reasons, the author thinks that it may be unreasonable to regulate the theft of virtual currency only as the crime of damaging computer information system. We should face up to the hidden property value and consider the application of the crime of infringing property in China's criminal law. Only in this way can we effectively protect the legitimate rights and property of digital currency holders in China


3. In the current judicial environment, the network virtual property should not be included in the category of "property" in the crime of theft stipulated in Article 264 of the criminal law. The theft of network virtual property is not recognized as theft. If it constitutes other crimes, it shall be punished according to other crimes, such as the crime of illegally obtaining computer information system data
from the perspective of China's criminal law, "property" as a crime of theft is not only limited to physical property, but also intangible property, such as electricity, gas and so on. Both tangible and intangible objects have common characteristics, that is, the general public agree that they have value, and the value can be objectively measured
as for the meaning of online virtual property, the notice of the Ministry of culture and the Ministry of Commerce on strengthening the management of online game virtual currency, which was implemented on June 4, 2009, defines online game virtual currency: it is issued by online game operation enterprises, and game users use legal currency to purchase it directly or indirectly in a certain proportion, which exists outside the game program, It is a virtual exchange tool, which is stored in the server provided by online game operators in the form of electromagnetic recording and expressed in specific digital units. Online game virtual currency is used to exchange the online game services provided by the issuing enterprise within a specified scope and within a specified time. It is expressed in the form of prepaid recharge card, prepaid amount or points, but does not include the game props obtained in the game activities
from the above definition, we can see that the network virtual property has the following obvious characteristics: value specificity, a certain network virtual property can only exist in the game running on a specific server, can not be placed in other games, without a specific game, there is no value; The existence of its economic value depends on whether the players subjectively believe that it has use value and whether it can actually achieve transactions between different players in the same game; The value difference is different for different players, but it has no value for non players
from the perspective of China's criminal law, "property" as a crime of theft is not only limited to physical property, but also intangible property, such as electricity, gas and so on. But no matter they are tangible or intangible, they all have common characteristics, that is, the general public agree that they have value, and the value can be objectively measured. In contrast, the network virtual property is obviously different from the "property" in the criminal law of our country, which does not conform to the concept of public and private property in the general sense of public cognition. The legal attribute of network virtual property is actually computer information system data, a virtual exchange tool, which can not be the object of theft< In addition, according to the principle of a legally prescribed punishment for a specified crime, only those who are prescribed as crimes by law can be treated as crimes, while those who are not prescribed as objects of crimes by law cannot be treated as objects of crimes. At present, China's criminal law and previous judicial interpretations on larceny have made clear provisions on "public and private property", but the network virtual property has not been interpreted as the object of larceny
from the definition and attributes of network virtual property, the essence of the legal attribute of network virtual property is electromagnetic records, that is, electronic data. The act of stealing network virtual property is fully in line with the constitution of the crime of illegally obtaining computer information system data stipulated in article 285 of the criminal law. The application of this crime is enough to objectively and comprehensively evaluate the nature of the act< It is difficult to identify the value of network virtual property
■ judicial observation
as for how to identify the value of network virtual property, there is no unified and universally recognized calculation standard in the theoretical and judicial circles
first of all, the current judicial interpretation does not stipulate how to determine the value of network virtual property, and there is no clear basis for its determination in judicial practice, so there will be disputes in determining its value anyway; Secondly, in the objective sense, network virtual property itself has no value, and its value can only be determined when players trade, which is difficult to be identified from an objective point of view; Thirdly, the value of network virtual property can only exist in a specific server and a specific player, which is separated from a specific server and lost the so-called value. There are different values for different players, so it is difficult to have a unified calculation standard; Finally, it is not objective to identify the value according to the repair cost or expected income paid by the server operator e to theft
therefore, defining the act of stealing network virtual property as theft will bring a series of problems to the determination of the amount. In the absence of a unified and objective calculation method of the amount and the determination of the crime of illegally obtaining computer information system data, it is not appropriate to interpret network virtual property as "property" in theft
from the perspective of overseas criminal legislation and justice, it is rare to treat the theft of network virtual property as theft. The theoretical circle and judicial practice of Italian criminal law do not recognize that the act of stealing virtual property constitutes the crime of theft stipulated in Italian criminal code. It follows the principle of style interpretation and forbids to expand the interpretation of "property", including information data. As for the infringement of network virtual property, the Italian criminal code has set up a section after the traditional crime. Although there are cases in the criminal judicial practice of Japan that determine the crime of using electronic computer to defraud virtual property, it stipulates the special crime of "using electronic computer to defraud" after the traditional crime of fraud. The general theory of Japanese criminal law also believes that the fictitious property does not belong to the crime object of theft stipulated in the Japanese criminal code
in 2003, the criminal code of Taiwan deleted the provision that electromagnetic records were set as movable property in 1997, and the provisions on stealing electromagnetic records are applicable to computer crimes such as obtaining computer information system data
in conclusion, according to the special nature of network virtual property, it does not have the property attribute in the sense of criminal law. Based on the principle of legality, the theft of network virtual property can not be regarded as theft, but can be punished as the crime of illegally obtaining computer information system data.
4. Virtual currency, represented by bitcoin, is legal in China. It is defined as a special Internet commodity. People can buy and sell it freely at their own risk. But it is illegal to carry out pyramid schemes under the guise of bitcoin. Now to create a virtual currency trading platform, we must record the website and implement real name authentication for users. Bitcoin is legal in most countries around the world, except that some small countries explicitly ban it

since 203, the more popular virtual currencies are bitcoin, Wright coin, Fuyuan coin, doggy coin, dark coin, reborn coin and so on.
5. First, virtual currency, such as bitcoin, or some game and network currencies, such as QB and some game gold coins, are all personal legal property. As long as an indivial legally obtains them, they will be protected
Second, transactions prohibited by the state, especially speculation and trading of the virtual currency are prohibited in China. However, banning trading does not mean that the virtual coin itself is illegal or worthless
for example, bitcoin, which China refuses to recognize as any regional chain block currency, also forbids trading and services, does not mean that bitcoin itself has no value. In the international trading system, bitcoin is recognized in some regions, And there is a corresponding value scale
when someone steals bitcoin or swindles bitcoin, the state will still treat it as theft or fraud, and the amount needs to be approved< At present, the transaction and pricing of virtual currency are prohibited in China, but the value and holding of virtual currency itself are not prohibited. As long as the currency is not defined as illegal, it is legal.
similarly, game currency is also recognized as legal property, but its transaction is prohibited by the state, which does not affect the corresponding legal liability caused by the infringement of virtual currency
6.

Relevant legal knowledge

interpretation of the Supreme People's Court on Several Issues concerning the specific application of law in the trial of cases disturbing the management order of the telecommunications market

Article 8: anyone who embezzles another person's public information network account number or password to access the Internet, causing a large amount of loss of other people's telecommunications charges, shall be convicted and punished with the crime of theft in accordance with Article 264 of the criminal law

Article 264 of the criminal law of the people's Republic of China [theft] Whoever steals public or private property in a relatively large amount, or repeatedly steals, burglaries, burglaries with lethal weapons or pickpockets shall be sentenced to fixed-term imprisonment of not more than three years, criminal detention or public surveillance and shall also, or shall only, be fined; If the amount is huge or if there are other serious circumstances, he shall be sentenced to fixed-term imprisonment of not less than three years but not more than 10 years and shall also be fined

If the amount is especially huge or if there are other especially serious circumstances, he shall be sentenced to fixed-term imprisonment of not less than 10 years or life imprisonment, and shall also be fined or be sentenced to confiscation of property

extended data:

identification standard

I. The "large amount" of personal theft of public and private property starts from 1000 yuan to 3000 yuan

Second, the amount of personal theft of public and private property is huge, starting from 30000 yuan to 100000 yuan

Third, the amount of personal theft of public and private property is particularly huge, starting from 300000 yuan to 500000 yuan

the higher people's courts and people's procuratorates of all provinces, autonomous regions and municipalities directly under the central government may, according to the local economic development situation and taking into account the social security situation, determine the specific amount standard to be implemented in the region within the amount range specified in the preceding paragraph, and report it to the Supreme People's court and the Supreme People's Procuratorate for approval




7. There are laws for virtual things, but generally no one is free to investigate their responsibility. First, there are too few people who can cheat them. Even if they can cheat them, they can't change them into RMB. Second, it's hard to catch them. How can they catch you, let alone show the people's responsibility? Third, no one is free to report the case, but it's still illegal, but no one is willing to investigate, And now China's law is not perfect, full of loopholes, drill holes, this is the so-called
8. Breaking the law is two different things, just like a person driving without a license collides with another car, which is not the full responsibility of the person driving without a license, because a car crash is one thing and driving without a license is another. That is to say, it is one thing to steal numbers, and people who open private services should also bear legal responsibility.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750