Comparative Legal Study on Introduction of Decryption Order to Third Parties

Chohee Bae, Kyung-Lyul Lee
{"title":"Comparative Legal Study on Introduction of Decryption Order to Third Parties","authors":"Chohee Bae, Kyung-Lyul Lee","doi":"10.34222/kdps.2022.14.3.99","DOIUrl":null,"url":null,"abstract":"Even if the investigative agency knows that the crucial information necessary to investigate the crime is stored in the mobile phone, unless the password is released, there is no proper way to confirm or secure it. Although the number of cases requiring forensics that can find the substantive truth of a case using digital forensic technology is rapidly increasing every year, successful decryption of mobile phones is not so common that they are considered a major obstacle to digital forensics success. It is a social problem that the case is buried because the relevant information necessary for the discovery of the substantive truth of an important event is not secured in a timely manner. \nAs a solution, the method of forcing the suspect to release the mobile phone password or requesting their cooperation through the decryption order system can be considered. However, this may excessively infringe on personal privacy and may violate the constitutionally guaranteed privilege to refuse self-incrimination. This is because the violation of the right to refuse to make a statement can be a problem depending on whether it is understood as personal information or a statement according to the characteristics of the mobile phone password. \nTherefore, it was investigated whether the introduction of the decryption order to unlock the password of the mobile phone infringes on the basic rights guaranteed by the Constitution. This is because the degree of protection will vary depending on whether the view of the password is personal information or personal information and whether it is a statement or not, that is, depending on the nature and status of the password. In this case, if it is impossible to force a decryption order on individuals such as criminal suspects due to the fundamental rights guaranteed in the Constitution, we examine whether it is possible to force a decryption order or request cooperation from a third party, a mobile phone manufacturer, to solve this problem. searched for. In particular, third parties and companies were divided into mobile phone manufacturers and information and communication service providers, and reviewed from the perspective of protection and exceptional use of personal information. \nIn principle, personal information is subject to protection under the current law, and exceptional use other than the purpose of collection is specifically stipulated in the “Personal Information Protection Act”. However, since the specific interpretation and application are not necessarily clear, we looked at foreign legislative cases comparatively in relation to the provision of personal information to a third party. Although there are means to acquire, this method of cooperation takes a long time, so it was judged that it is not an appropriate means for securing evidence for digital crimes in the information society. In addition, the introduction of a decryption order to a third party is necessary as a means to secure criminal information not only to domestic companies under judicial jurisdiction but also to global companies abroad. It also struggled to find a harmonious way with an appropriate balance to raise the problem of discrimination.","PeriodicalId":384688,"journal":{"name":"The Korean Association of Criminal Procedure Law","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Korean Association of Criminal Procedure Law","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.34222/kdps.2022.14.3.99","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Even if the investigative agency knows that the crucial information necessary to investigate the crime is stored in the mobile phone, unless the password is released, there is no proper way to confirm or secure it. Although the number of cases requiring forensics that can find the substantive truth of a case using digital forensic technology is rapidly increasing every year, successful decryption of mobile phones is not so common that they are considered a major obstacle to digital forensics success. It is a social problem that the case is buried because the relevant information necessary for the discovery of the substantive truth of an important event is not secured in a timely manner. As a solution, the method of forcing the suspect to release the mobile phone password or requesting their cooperation through the decryption order system can be considered. However, this may excessively infringe on personal privacy and may violate the constitutionally guaranteed privilege to refuse self-incrimination. This is because the violation of the right to refuse to make a statement can be a problem depending on whether it is understood as personal information or a statement according to the characteristics of the mobile phone password. Therefore, it was investigated whether the introduction of the decryption order to unlock the password of the mobile phone infringes on the basic rights guaranteed by the Constitution. This is because the degree of protection will vary depending on whether the view of the password is personal information or personal information and whether it is a statement or not, that is, depending on the nature and status of the password. In this case, if it is impossible to force a decryption order on individuals such as criminal suspects due to the fundamental rights guaranteed in the Constitution, we examine whether it is possible to force a decryption order or request cooperation from a third party, a mobile phone manufacturer, to solve this problem. searched for. In particular, third parties and companies were divided into mobile phone manufacturers and information and communication service providers, and reviewed from the perspective of protection and exceptional use of personal information. In principle, personal information is subject to protection under the current law, and exceptional use other than the purpose of collection is specifically stipulated in the “Personal Information Protection Act”. However, since the specific interpretation and application are not necessarily clear, we looked at foreign legislative cases comparatively in relation to the provision of personal information to a third party. Although there are means to acquire, this method of cooperation takes a long time, so it was judged that it is not an appropriate means for securing evidence for digital crimes in the information society. In addition, the introduction of a decryption order to a third party is necessary as a means to secure criminal information not only to domestic companies under judicial jurisdiction but also to global companies abroad. It also struggled to find a harmonious way with an appropriate balance to raise the problem of discrimination.
第三人引入解密令的比较法学研究
即使调查机关知道调查犯罪所需的关键信息存储在手机中,如果不公开密码,也无法进行确认或保护。尽管需要使用数字取证技术找到案件实质真相的取证案件数量每年都在迅速增加,但成功解密手机的案例并不常见,因此它们被认为是数字取证成功的主要障碍。由于没有及时掌握发现重大事件实质真相所必需的相关信息,导致案件被掩埋,这是一个社会问题。作为解决方案,可以考虑通过解密命令系统强制嫌疑人释放手机密码或要求其配合的方法。然而,这可能过度侵犯个人隐私,并可能违反宪法保障的拒绝自证其罪的特权。这是因为,根据手机密码的特点,是将拒绝陈述权理解为个人信息,还是陈述,都有可能成为问题。因此,对引入解密令解锁手机密码是否侵犯了宪法保障的基本权利进行了研究。这是因为,根据密码的视图是个人信息还是个人信息,是否是声明,也就是说,根据密码的性质和状态,保护的程度会有所不同。在这种情况下,如果由于宪法保障的基本权利,无法对犯罪嫌疑人等个人强制执行解密命令,我们将研究是否有可能强制执行解密命令或要求第三方(手机制造商)合作来解决这一问题。寻找。特别是将第三方和公司分为手机制造商和信息通信服务提供商,并从个人信息的保护和例外使用的角度进行了审查。个人信息原则上受现行法律的保护,除收集目的外的特殊使用在《个人信息保护法》中有明确规定。然而,由于具体的解释和适用并不一定明确,我们比较了国外关于向第三方提供个人信息的立法案例。虽然有获取手段,但这种合作方式需要很长时间,因此,在信息社会中,这种方式不是获取数字犯罪证据的合适方式。此外,为了确保国内法人和海外跨国企业的犯罪信息,有必要向第三方引入解密令。它还努力寻找一种和谐的方式,以适当的平衡来提出歧视问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信