论文部分内容阅读
近年来,计算机网络保密违法案件一直占各类违反保密法律法规案件的绝大多数。对于计算机网络保密违法案件,电子取证已成为界定案件性质、分清主次责任、确定处理标准的最核心的要素。对此,有关部门做了大量复杂、细致的工作,总结出针对计算机、移动存储介质、服务器等电子设备取证的工作流程和规范,明确了电子取证技术核查报告的要素和体例。然而,这些仅仅局限在经验的总结上,还没有上升到法律规制的高度。由于缺乏对保密违法案件电子取证的法律规制,取证的程序还不够规范,取证的标准
In recent years, computer network security breaches have always accounted for the vast majority of cases that violate confidential laws and regulations. For computer network confidentiality violations, electronic evidence has become the defining case of the nature of the primary responsibility to distinguish between the primary criteria to determine the processing elements. In response, the relevant departments have done a great deal of complicated and meticulous work, summed up the work flow and norms for computer equipment, mobile storage media, servers and other electronic equipment forensics, and defined the elements and methods of electronic forensic technology verification report. However, these are only limited to the summary of experience and have not yet risen to the height of legal regulation. Due to the lack of laws and regulations on electronic evidence collection in confidential and illegal cases, the procedures for obtaining evidence are not yet standardized and the standards of evidence collection