SlideShare a Scribd company logo
When would using a computer be a
crime?
CFA narrowed the scope of
application of the
offence of accessing a computer
with dishonest intent
2
16 May 2019
Section 161 (1) (c) of
Crimes Ordinance (Cap. 200)
• 161 Access to computer with criminal or
dishonest intent
• (1) Any person who obtains access to a computer—
• (a) …
• (b) ...
• (c) with a view to dishonest gain for himself or
another; or
• (d) …
• whether on the same occasion as he obtains such
access or on any future occasion, commits an
offence and is liable on conviction upon indictment
to imprisonment for 5 years
3
Elements
• “obtain access” to
• a ”computer”
• with a view to “dishonest gain”
for himself or another
4
Definition of “Computer” - Secretary for Justice
v Wong Ka Yip Ken [2013] 4 HKLRD 604 (“Wong
Ka Yip Ken case”)
• No definition in the Crimes Ordinance (Cap 200)
• 2014: a man set his smartphone to record a video in
the ladies’ washroom of his office
• found guilty of the section 161 offence
• Court of First Instance considered the definition of
“computer”
• held that the dictionary meaning of “computer” as
“a device for electronic data storage, processing
and retrieval” included smartphone
• Definition of “obtain access” not discussed
5
Excessive usage of the offence
• Police have invoked section 161 for:
• online fraud
• illegal intrusion into computer systems
• clandestine photo-taking using
smartphones in such non-public places as
toilets or changing rooms
• online publication of obscene or
threatening information
• inciting others on the Internet to engage in
illegal acts
6
Excessive usage of the offence (Cont’d)
• 1999:  a technical assistant at Queen Mary Hospital, retrieved
the medical records of the then-Secretary for Justice, Elsie
Leung, and share them with his friends, family, and the media,
•  found guilty of the section 161 offence
• 2014: a man posted on the popular HKGolden forum, calling
for protesters to “paralyse the railway system by gathering on
railway platforms in an attempt to create chaos” during the
pro-democracy Occupy protests
• arrested under the section 161 charge
• 2016: a 22-year-old man posted erotic writing involving rape
• arrested on suspicion of the section 161 charge
7
Definition of “obtain access” - Secretary for
Justice v Cheng Ka-Yee and others (“Cheng Ka
Yee case”)
• Three teachers in a primary school (the “Primary
School”) and a teacher in another primary school (the
“Four”)
• used mobile smartphones and a school’s computer to
leak pictures and copies of the questions of the
admission interview of the Primary School
• charged with s.161(1)(c) of the Crimes Ordinance:
“obtain access to a computer with dishonest or
criminal intent”
8
Cheng Ka-Yee case– Magistrates’ Court’s ruling
• 2016: acquitted by Kowloon City Magistrates’ Court:
• Element: with a view to “dishonest gain”
• not sure if the three who worked in the Primary School
were warned of the confidentiality obligations with
respect to the questions of the admission interview
• prosecution failed to prove the objective limb of the
Ghosh test on “honesty” against the Four
• review application by the prosecution: Magistrate confirmed
decision to acquit
9
Cheng Ka-Yee case– Court of First Instance
[2018] HKCFI 1809
• Element: “obtain access”
• Deputy High Court Judge Pang Chung-ping:
• Considered the definition of “obtain access”
• Refused to convict the Four
10
Cheng Ka-Yee case– Court of First Instance
[2018] HKCFI 1809
• Deputy High Court Judge Pang Chung-ping (Cont’d):
• Prosecution’s legal position that whether or not a person
should be punished depends on the type of devices that the
person used to communicate cannot be reasonably
explained
• The use of communication device was only peripheral to the
criminal or dishonest plan, which could be achieved with or
without the communication device
• using a person’s own mobile smartphones, or use of
computer which is not unauthorized, to leak questions did
not amount to “obtaining access to computer”
11
Cheng Ka-Yee case – Court of First Instance
[2018] HKCFI 1809 (Cont’d)
• Deputy High Court Judge Pang Chung-ping (Cont’d):
• drew a difference between “obtaining access to a
computer” and “using a computer”
• does not support the contention that “obtaining access to
computer” includes using a person’s own smartphone to
communicate, to take photographs or to send messages
• To prove actus reus (the criminal act), the prosecution
must prove “the unauthorized extraction and use of
information” from a computer
12
Cheng Ka-Yee case – Court of Final Appeal
[2019] HKCFA 9
• Department of Justice appealed CFI’s decision
• CFA unanimously dismissed the appeal
• upheld the CFI’s decision that the s.161(1)(c) Charge should
not apply to a person’s own computer when it did not
involve access to another’s computer
13
Cheng Ka-Yee case – Court of Final Appeal
[2019] HKCFA 9 (Cont’d)
• Mr. Justice French NPJ decided (agreed by CJ Ma, Ribeiro
PJ, Fok PJ, Cheung PJ), inter alia:
• as a matter of language, one always “obtain” access to
something to which one did not have access before
• the statutory language is a bit redundant as the verb
“obtain” is a synonym for “access” when used as a verb
• the overlap emphasizes the oddness of applying the
s.161(1)(c) Charge to the use by a person of their own
computer
14
Cheng Ka-Yee case – Court of Final Appeal
[2019] HKCFA 9 (Cont’d)
• Mr. Justice French NPJ decided (agreed by CJ Ma, Ribeiro
PJ, Fok PJ, Cheung PJ), inter alia (Cont’d):
• during the legislative history, the interpretive provision “a
person obtains access to a computer if (and only if) he
causes a computer to perform any function” was deleted;
• the words “(obtaining access) with or without authority” did
not appear in the bill either;
• s.161(1)(c) Charge does not apply to the use by a person
of his or her own computer, not involving access to
another’s computer
15
Cheng Ka-Yee case – Court of Final Appeal
[2019] HKCFA 9 (Cont’d)
• Mr. Justice French NPJ (agreed by CJ Ma, Ribeiro PJ, Fok
PJ, Cheung PJ):
• it is not the function of the Court to adopt a construction
of a statute that advance a desirable public policy;
• the Court seeks to ascertain the purpose of the statute
to inform its construction;
• the Court does not identify a purpose which it thinks
would be beneficial and then construe the statute to fit it
16
What if Wong Ka Yip Ken case is decided after
CFA judgment in Cheng Ka Yee case?
• Facts: A man set his own smartphone to record a video in
the ladies’ washroom of his office
• Analysis: using his own smartphone device to record the
video
• using own device, and it did not involve access to another’s
computer
•  would not satisfy the definition of “obtaining access”
• Cannot prosecute under s.161 of Crimes Ordinance (Cap.
200)
17
What if Wong Ka Yip Ken case is decided after
CFA judgment in Cheng Ka Yee case? (Cont’d)
• Possible alternative charges?
• (1) Outraging public decency? (common law offence)
• may not apply
• Elements:
• “capable of being seen by two or more persons
who are actually present” AND
• “in a place where there was a real possibility that
members of the general public might witness it”
• difficult to prove
18
What if Wong Ka Yip Ken case is decided after
CFA judgment in Cheng Ka Yee case? (Cont’d)
• Possible alternative charges? (Cont’d)
• (2) Disorder in public places? (s.17B, Public Order Ordinance,
Cap. 245)
• may not apply
• Elements:
• act was done in public place
• the victim is put in fear of being so harmed through the
disturbance, and
• an average Hong Kong citizen is likely to be outraged by
such conduct
• female toilet of the company is unlikely a “public place”
19
What if Wong Ka Yip Ken case is decided after
CFA judgment in Cheng Ka Yee case? (Cont’d)
• Possible alternative charges? (Cont’d)
• (3) Loitering causing concern ? (s. 160 Crimes Ordinance, Cap. 200)
• may or may not apply
• Elements:
• offender has been idling, hanging about or remaining
• in or about the vicinity of the common parts of a building
(entrance hall, lobby, toilet, compound, car park, etc.)
• causes any person reasonably to be concerned for his/her
safety or well-being
• depends on whether the female toilet of the company is
considered as a “common part of a building”
• E.g.: whether the toilet is in common use by occupiers of building
20
What if Wong Ka Yip Ken case is decided after
CFA judgment in Cheng Ka Yee case? (Cont’d)
• May 2018: Law Reform Commission’s Review of Sexual
Offences Subcommittee
• proposed the creation of a new offence of “voyeurism” to
criminalise acts of non-consensual observation or visual
recording of another person done for a sexual purpose
• forms of visual recording would include photography, video
recording and the taking of digital images
• The prosecution in Wong Ka Yip Ken case may have to rely on
the proposed new offence of “voyeurism”
21
22

More Related Content

What's hot

File000157
File000157File000157
File000157
Desmond Devendran
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
leslieannpt
 
Cybersex law
Cybersex lawCybersex law
Cybersex law
Ronnel Fernandez
 
Elet5e ch04
Elet5e ch04Elet5e ch04
Elet5e ch04
DeAnna Gossett
 
Internet filtering in schools
Internet filtering in schoolsInternet filtering in schools
Internet filtering in schools
adawidziuk
 
Privacy and the Law in the Oversharing Era
Privacy and the Law in the Oversharing EraPrivacy and the Law in the Oversharing Era
Privacy and the Law in the Oversharing Era
Jason Nathu
 
CYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLECYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLE
InterMediaKT
 
Perspectivesmanage
PerspectivesmanagePerspectivesmanage
Perspectivesmanage
Art Bowker
 
communication decency act
communication decency actcommunication decency act
communication decency act
Aditya Kumar
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
Tgarmon34
 
Right to privacy in India
Right to privacy in IndiaRight to privacy in India
Right to privacy in India
Col Mukteshwar Prasad
 
LWB486 Week 6 Copyright
LWB486 Week 6 CopyrightLWB486 Week 6 Copyright
LWB486 Week 6 Copyright
Peter Black
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime Law
Source Conference
 
Public-Employee Privacy Rights in the Age of Social Media
Public-Employee Privacy Rights in the Age of Social MediaPublic-Employee Privacy Rights in the Age of Social Media
Public-Employee Privacy Rights in the Age of Social Media
Bailey and Wyant PLLC
 
File000098
File000098File000098
File000098
Desmond Devendran
 
Cybercrime
CybercrimeCybercrime
Cybercrime
nayakslideshare
 
Copyright Scenario Cases
Copyright Scenario CasesCopyright Scenario Cases
Copyright Scenario Cases
DCPS
 
Revamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse ActRevamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse Act
David Sweigert
 
Jailbreaking OK'd by Librarian
Jailbreaking OK'd by LibrarianJailbreaking OK'd by Librarian
Jailbreaking OK'd by Librarian
James C. Roberts III
 
Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice Context
Info_Studies_Aberystwyth
 

What's hot (20)

File000157
File000157File000157
File000157
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
Cybersex law
Cybersex lawCybersex law
Cybersex law
 
Elet5e ch04
Elet5e ch04Elet5e ch04
Elet5e ch04
 
Internet filtering in schools
Internet filtering in schoolsInternet filtering in schools
Internet filtering in schools
 
Privacy and the Law in the Oversharing Era
Privacy and the Law in the Oversharing EraPrivacy and the Law in the Oversharing Era
Privacy and the Law in the Oversharing Era
 
CYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLECYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLE
 
Perspectivesmanage
PerspectivesmanagePerspectivesmanage
Perspectivesmanage
 
communication decency act
communication decency actcommunication decency act
communication decency act
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
Right to privacy in India
Right to privacy in IndiaRight to privacy in India
Right to privacy in India
 
LWB486 Week 6 Copyright
LWB486 Week 6 CopyrightLWB486 Week 6 Copyright
LWB486 Week 6 Copyright
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime Law
 
Public-Employee Privacy Rights in the Age of Social Media
Public-Employee Privacy Rights in the Age of Social MediaPublic-Employee Privacy Rights in the Age of Social Media
Public-Employee Privacy Rights in the Age of Social Media
 
File000098
File000098File000098
File000098
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Copyright Scenario Cases
Copyright Scenario CasesCopyright Scenario Cases
Copyright Scenario Cases
 
Revamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse ActRevamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse Act
 
Jailbreaking OK'd by Librarian
Jailbreaking OK'd by LibrarianJailbreaking OK'd by Librarian
Jailbreaking OK'd by Librarian
 
Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice Context
 

Similar to Dominic WAI - When would using a computer be a crime?

A Comparative Study on the Intermediary Liability of Web 2.0 Platforms in C...
A Comparative Study on the Intermediary Liability of Web 2.0 Platforms in C...A Comparative Study on the Intermediary Liability of Web 2.0 Platforms in C...
A Comparative Study on the Intermediary Liability of Web 2.0 Platforms in C...
taonancy
 
File000116
File000116File000116
File000116
Desmond Devendran
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
Charles Mok
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)
GrittyCC
 
Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the Web
Darius Whelan
 
Internet Corporate Responsibility
Internet Corporate ResponsibilityInternet Corporate Responsibility
Internet Corporate Responsibility
Charles Mok
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
Dhurba Mainali
 
Induced infringement
Induced infringementInduced infringement
Induced infringement
Klemchuk LLP
 
Patents That Cannot Be Infringed
Patents That Cannot Be InfringedPatents That Cannot Be Infringed
Patents That Cannot Be Infringed
blewisbell
 
Security Wars
Security WarsSecurity Wars
Security Wars
Ikuo Takahashi
 
November 2011 Patent Group Luncheon
November 2011 Patent Group LuncheonNovember 2011 Patent Group Luncheon
November 2011 Patent Group Luncheon
Woodard, Emhardt, Henry, Reeves & Wagner, LLP
 
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
CODE BLUE
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Charles Mok
 
Fighting Corruption: Changing the Systems and Processes
Fighting Corruption: Changing the Systems and ProcessesFighting Corruption: Changing the Systems and Processes
Fighting Corruption: Changing the Systems and Processes
BillyCheuk
 
search engines and copyrights : How far a fair defense
search engines and copyrights : How far a fair defense search engines and copyrights : How far a fair defense
search engines and copyrights : How far a fair defense
NanubalaDhruvan
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringement
wcudsce
 
INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...
INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...
INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...
Prof. (Dr.) Azimkhan B. Pathan
 
Computer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaComputer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lanka
Vishni Ganepola
 
3170725_Unit-5.pptx
3170725_Unit-5.pptx3170725_Unit-5.pptx
3170725_Unit-5.pptx
YashPatel132112
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shivu1234
 

Similar to Dominic WAI - When would using a computer be a crime? (20)

A Comparative Study on the Intermediary Liability of Web 2.0 Platforms in C...
A Comparative Study on the Intermediary Liability of Web 2.0 Platforms in C...A Comparative Study on the Intermediary Liability of Web 2.0 Platforms in C...
A Comparative Study on the Intermediary Liability of Web 2.0 Platforms in C...
 
File000116
File000116File000116
File000116
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)
 
Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the Web
 
Internet Corporate Responsibility
Internet Corporate ResponsibilityInternet Corporate Responsibility
Internet Corporate Responsibility
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Induced infringement
Induced infringementInduced infringement
Induced infringement
 
Patents That Cannot Be Infringed
Patents That Cannot Be InfringedPatents That Cannot Be Infringed
Patents That Cannot Be Infringed
 
Security Wars
Security WarsSecurity Wars
Security Wars
 
November 2011 Patent Group Luncheon
November 2011 Patent Group LuncheonNovember 2011 Patent Group Luncheon
November 2011 Patent Group Luncheon
 
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
Fighting Corruption: Changing the Systems and Processes
Fighting Corruption: Changing the Systems and ProcessesFighting Corruption: Changing the Systems and Processes
Fighting Corruption: Changing the Systems and Processes
 
search engines and copyrights : How far a fair defense
search engines and copyrights : How far a fair defense search engines and copyrights : How far a fair defense
search engines and copyrights : How far a fair defense
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringement
 
INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...
INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...
INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...
 
Computer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaComputer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lanka
 
3170725_Unit-5.pptx
3170725_Unit-5.pptx3170725_Unit-5.pptx
3170725_Unit-5.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

More from REVULN

Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
REVULN
 
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
REVULN
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
REVULN
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News Media
REVULN
 
Stewart MACKENZIE - The edge of the Internet is becoming the center
Stewart MACKENZIE - The edge of the Internet is becoming the centerStewart MACKENZIE - The edge of the Internet is becoming the center
Stewart MACKENZIE - The edge of the Internet is becoming the center
REVULN
 
Masayuki HATTA - Debunking toxic "Matome sites" in Japan
Masayuki HATTA - Debunking toxic "Matome sites" in JapanMasayuki HATTA - Debunking toxic "Matome sites" in Japan
Masayuki HATTA - Debunking toxic "Matome sites" in Japan
REVULN
 
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
REVULN
 
Rachel BLUNDY - Overview of AFP Fact Check
Rachel BLUNDY - Overview of AFP Fact CheckRachel BLUNDY - Overview of AFP Fact Check
Rachel BLUNDY - Overview of AFP Fact Check
REVULN
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
REVULN
 
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
REVULN
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
REVULN
 
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
REVULN
 

More from REVULN (12)

Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
 
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News Media
 
Stewart MACKENZIE - The edge of the Internet is becoming the center
Stewart MACKENZIE - The edge of the Internet is becoming the centerStewart MACKENZIE - The edge of the Internet is becoming the center
Stewart MACKENZIE - The edge of the Internet is becoming the center
 
Masayuki HATTA - Debunking toxic "Matome sites" in Japan
Masayuki HATTA - Debunking toxic "Matome sites" in JapanMasayuki HATTA - Debunking toxic "Matome sites" in Japan
Masayuki HATTA - Debunking toxic "Matome sites" in Japan
 
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
 
Rachel BLUNDY - Overview of AFP Fact Check
Rachel BLUNDY - Overview of AFP Fact CheckRachel BLUNDY - Overview of AFP Fact Check
Rachel BLUNDY - Overview of AFP Fact Check
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
 
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
 

Recently uploaded

THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptxTHE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
Namrata Chakraborty
 
一比一原版英国伦敦大学亚非学院毕业证(soas毕业证书)如何办理
一比一原版英国伦敦大学亚非学院毕业证(soas毕业证书)如何办理一比一原版英国伦敦大学亚非学院毕业证(soas毕业证书)如何办理
一比一原版英国伦敦大学亚非学院毕业证(soas毕业证书)如何办理
duxss
 
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
qevye
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
15e6o6u
 
Capital Punishment by Saif Javed (LLM)ppt.pptx
Capital Punishment by Saif Javed (LLM)ppt.pptxCapital Punishment by Saif Javed (LLM)ppt.pptx
Capital Punishment by Saif Javed (LLM)ppt.pptx
OmGod1
 
一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理
一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理
一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理
mecyyn
 
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
uhsox
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
abondo3
 
一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理
一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理
一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理
ucoux1
 
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
onduyv
 
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
15e6o6u
 
It's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of InterestIt's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of Interest
Parsons Behle & Latimer
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
Justin Ordoyo
 
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
meboh
 
一比一原版林肯大学毕业证(lincoln毕业证)如何办理
一比一原版林肯大学毕业证(lincoln毕业证)如何办理一比一原版林肯大学毕业证(lincoln毕业证)如何办理
一比一原版林肯大学毕业证(lincoln毕业证)如何办理
fexbqa
 
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
pdeehy
 
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdfPedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
SunsetWestLegalGroup
 
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations DemystifiedSafeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
PROF. PAUL ALLIEU KAMARA
 

Recently uploaded (20)

THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptxTHE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
 
一比一原版英国伦敦大学亚非学院毕业证(soas毕业证书)如何办理
一比一原版英国伦敦大学亚非学院毕业证(soas毕业证书)如何办理一比一原版英国伦敦大学亚非学院毕业证(soas毕业证书)如何办理
一比一原版英国伦敦大学亚非学院毕业证(soas毕业证书)如何办理
 
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
 
Capital Punishment by Saif Javed (LLM)ppt.pptx
Capital Punishment by Saif Javed (LLM)ppt.pptxCapital Punishment by Saif Javed (LLM)ppt.pptx
Capital Punishment by Saif Javed (LLM)ppt.pptx
 
一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理
一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理
一比一原版(trent毕业证书)加拿大特伦特大学毕业证如何办理
 
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
 
一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理
一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理
一比一原版新加坡国立大学毕业证(本硕)nus学位证书如何办理
 
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
 
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
 
It's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of InterestIt's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of Interest
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
 
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
 
一比一原版林肯大学毕业证(lincoln毕业证)如何办理
一比一原版林肯大学毕业证(lincoln毕业证)如何办理一比一原版林肯大学毕业证(lincoln毕业证)如何办理
一比一原版林肯大学毕业证(lincoln毕业证)如何办理
 
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
 
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdfPedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
 
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations DemystifiedSafeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
 

Dominic WAI - When would using a computer be a crime?

  • 1.
  • 2. When would using a computer be a crime? CFA narrowed the scope of application of the offence of accessing a computer with dishonest intent 2 16 May 2019
  • 3. Section 161 (1) (c) of Crimes Ordinance (Cap. 200) • 161 Access to computer with criminal or dishonest intent • (1) Any person who obtains access to a computer— • (a) … • (b) ... • (c) with a view to dishonest gain for himself or another; or • (d) … • whether on the same occasion as he obtains such access or on any future occasion, commits an offence and is liable on conviction upon indictment to imprisonment for 5 years 3
  • 4. Elements • “obtain access” to • a ”computer” • with a view to “dishonest gain” for himself or another 4
  • 5. Definition of “Computer” - Secretary for Justice v Wong Ka Yip Ken [2013] 4 HKLRD 604 (“Wong Ka Yip Ken case”) • No definition in the Crimes Ordinance (Cap 200) • 2014: a man set his smartphone to record a video in the ladies’ washroom of his office • found guilty of the section 161 offence • Court of First Instance considered the definition of “computer” • held that the dictionary meaning of “computer” as “a device for electronic data storage, processing and retrieval” included smartphone • Definition of “obtain access” not discussed 5
  • 6. Excessive usage of the offence • Police have invoked section 161 for: • online fraud • illegal intrusion into computer systems • clandestine photo-taking using smartphones in such non-public places as toilets or changing rooms • online publication of obscene or threatening information • inciting others on the Internet to engage in illegal acts 6
  • 7. Excessive usage of the offence (Cont’d) • 1999:  a technical assistant at Queen Mary Hospital, retrieved the medical records of the then-Secretary for Justice, Elsie Leung, and share them with his friends, family, and the media, •  found guilty of the section 161 offence • 2014: a man posted on the popular HKGolden forum, calling for protesters to “paralyse the railway system by gathering on railway platforms in an attempt to create chaos” during the pro-democracy Occupy protests • arrested under the section 161 charge • 2016: a 22-year-old man posted erotic writing involving rape • arrested on suspicion of the section 161 charge 7
  • 8. Definition of “obtain access” - Secretary for Justice v Cheng Ka-Yee and others (“Cheng Ka Yee case”) • Three teachers in a primary school (the “Primary School”) and a teacher in another primary school (the “Four”) • used mobile smartphones and a school’s computer to leak pictures and copies of the questions of the admission interview of the Primary School • charged with s.161(1)(c) of the Crimes Ordinance: “obtain access to a computer with dishonest or criminal intent” 8
  • 9. Cheng Ka-Yee case– Magistrates’ Court’s ruling • 2016: acquitted by Kowloon City Magistrates’ Court: • Element: with a view to “dishonest gain” • not sure if the three who worked in the Primary School were warned of the confidentiality obligations with respect to the questions of the admission interview • prosecution failed to prove the objective limb of the Ghosh test on “honesty” against the Four • review application by the prosecution: Magistrate confirmed decision to acquit 9
  • 10. Cheng Ka-Yee case– Court of First Instance [2018] HKCFI 1809 • Element: “obtain access” • Deputy High Court Judge Pang Chung-ping: • Considered the definition of “obtain access” • Refused to convict the Four 10
  • 11. Cheng Ka-Yee case– Court of First Instance [2018] HKCFI 1809 • Deputy High Court Judge Pang Chung-ping (Cont’d): • Prosecution’s legal position that whether or not a person should be punished depends on the type of devices that the person used to communicate cannot be reasonably explained • The use of communication device was only peripheral to the criminal or dishonest plan, which could be achieved with or without the communication device • using a person’s own mobile smartphones, or use of computer which is not unauthorized, to leak questions did not amount to “obtaining access to computer” 11
  • 12. Cheng Ka-Yee case – Court of First Instance [2018] HKCFI 1809 (Cont’d) • Deputy High Court Judge Pang Chung-ping (Cont’d): • drew a difference between “obtaining access to a computer” and “using a computer” • does not support the contention that “obtaining access to computer” includes using a person’s own smartphone to communicate, to take photographs or to send messages • To prove actus reus (the criminal act), the prosecution must prove “the unauthorized extraction and use of information” from a computer 12
  • 13. Cheng Ka-Yee case – Court of Final Appeal [2019] HKCFA 9 • Department of Justice appealed CFI’s decision • CFA unanimously dismissed the appeal • upheld the CFI’s decision that the s.161(1)(c) Charge should not apply to a person’s own computer when it did not involve access to another’s computer 13
  • 14. Cheng Ka-Yee case – Court of Final Appeal [2019] HKCFA 9 (Cont’d) • Mr. Justice French NPJ decided (agreed by CJ Ma, Ribeiro PJ, Fok PJ, Cheung PJ), inter alia: • as a matter of language, one always “obtain” access to something to which one did not have access before • the statutory language is a bit redundant as the verb “obtain” is a synonym for “access” when used as a verb • the overlap emphasizes the oddness of applying the s.161(1)(c) Charge to the use by a person of their own computer 14
  • 15. Cheng Ka-Yee case – Court of Final Appeal [2019] HKCFA 9 (Cont’d) • Mr. Justice French NPJ decided (agreed by CJ Ma, Ribeiro PJ, Fok PJ, Cheung PJ), inter alia (Cont’d): • during the legislative history, the interpretive provision “a person obtains access to a computer if (and only if) he causes a computer to perform any function” was deleted; • the words “(obtaining access) with or without authority” did not appear in the bill either; • s.161(1)(c) Charge does not apply to the use by a person of his or her own computer, not involving access to another’s computer 15
  • 16. Cheng Ka-Yee case – Court of Final Appeal [2019] HKCFA 9 (Cont’d) • Mr. Justice French NPJ (agreed by CJ Ma, Ribeiro PJ, Fok PJ, Cheung PJ): • it is not the function of the Court to adopt a construction of a statute that advance a desirable public policy; • the Court seeks to ascertain the purpose of the statute to inform its construction; • the Court does not identify a purpose which it thinks would be beneficial and then construe the statute to fit it 16
  • 17. What if Wong Ka Yip Ken case is decided after CFA judgment in Cheng Ka Yee case? • Facts: A man set his own smartphone to record a video in the ladies’ washroom of his office • Analysis: using his own smartphone device to record the video • using own device, and it did not involve access to another’s computer •  would not satisfy the definition of “obtaining access” • Cannot prosecute under s.161 of Crimes Ordinance (Cap. 200) 17
  • 18. What if Wong Ka Yip Ken case is decided after CFA judgment in Cheng Ka Yee case? (Cont’d) • Possible alternative charges? • (1) Outraging public decency? (common law offence) • may not apply • Elements: • “capable of being seen by two or more persons who are actually present” AND • “in a place where there was a real possibility that members of the general public might witness it” • difficult to prove 18
  • 19. What if Wong Ka Yip Ken case is decided after CFA judgment in Cheng Ka Yee case? (Cont’d) • Possible alternative charges? (Cont’d) • (2) Disorder in public places? (s.17B, Public Order Ordinance, Cap. 245) • may not apply • Elements: • act was done in public place • the victim is put in fear of being so harmed through the disturbance, and • an average Hong Kong citizen is likely to be outraged by such conduct • female toilet of the company is unlikely a “public place” 19
  • 20. What if Wong Ka Yip Ken case is decided after CFA judgment in Cheng Ka Yee case? (Cont’d) • Possible alternative charges? (Cont’d) • (3) Loitering causing concern ? (s. 160 Crimes Ordinance, Cap. 200) • may or may not apply • Elements: • offender has been idling, hanging about or remaining • in or about the vicinity of the common parts of a building (entrance hall, lobby, toilet, compound, car park, etc.) • causes any person reasonably to be concerned for his/her safety or well-being • depends on whether the female toilet of the company is considered as a “common part of a building” • E.g.: whether the toilet is in common use by occupiers of building 20
  • 21. What if Wong Ka Yip Ken case is decided after CFA judgment in Cheng Ka Yee case? (Cont’d) • May 2018: Law Reform Commission’s Review of Sexual Offences Subcommittee • proposed the creation of a new offence of “voyeurism” to criminalise acts of non-consensual observation or visual recording of another person done for a sexual purpose • forms of visual recording would include photography, video recording and the taking of digital images • The prosecution in Wong Ka Yip Ken case may have to rely on the proposed new offence of “voyeurism” 21
  • 22. 22