I do not work for RU and the CIS in particular, which means it is clean before the law. Do not poke me in the Criminal Code, I know him perfectly and do not break. Such is the code of criminal procedure in our country, which it does not consider a violation of 272/273, if it has not caused harm to the Russian Federation. Thus, I disclaim the responsibility of what I have said here, and also do not bear any responsibility for the actions caused after reading this article. And in general - I tied up. I am kind, kindly and cherish.
1. Creation, distribution or use of computer programs or other computer information that are known to be used for unauthorized destruction, blocking, modifying, copying computer information or neutralizing computer information protection tools, is punished by restriction of freedom for up to four years, or by forced labor for four years, or imprisonment for the same period with a fine of up to two hundred thousand rubles, or in the amount of wages or other income for a period of up to eighteen months.
2. Deeds stipulated by the first part of this article, committed by a group of persons in a preliminary conspiracy or organized group or a person using their official position, as well as causing major damage or committed out of mercenary interest, - shall be punished with restriction of liberty for up to four years, or forced works for up to five years with the deprivation of the right to occupy certain positions or engage in certain activities for a period of up to three years or without it, or imprisonment for a period of up to five years with a fine in the amount of one hundred thousand to two hundred thousand rubles, or in the amount of wages or other income of the convict for a period of two to three years or without such and with the deprivation of the right to hold certain positions or engage in certain activities for up to three years or not.
3. Deeds provided for in the first or second part of this article, if they have entailed grave consequences or created a threat of their occurrence, shall be punished with imprisonment for up to seven years.
Computer information refers to information (messages, data) presented in the form of electrical signals, regardless of the means of storing, processing and transmitting them.
By malicious programs, in the sense of a commented article, are meant programs specifically (deliberately) created to disrupt the normal functioning of computer programs. Under the normal operation refers to the execution of operations for which these programs are intended, which is defined in the documentation for the program.Link
The use of a malicious program or malicious computer information should be understood as their immediate release, reproduction, distribution, and other actions for their introduction into economic circulation (including in a modified form) committed for the purpose of unauthorized destruction, blocking, modification or copying of information. disruption of computer devices or their network. For example, the use of a malicious program is its input (installation) into the computer's memory.
This composition is formal and does not require the occurrence of any consequences, criminal liability arises as a result of the creation of the program, regardless of whether this program is used or not. In the sense of a commented article, the availability of source texts of virus programs is already the basis for prosecution.
Under the use of malicious programs refers to their use (by any person ), in which their harmful properties are activated.Link
On the subjective side, the crime envisaged by Part 1 of the article being commented on can only be committed with direct intent, since this article determines that the creation of malicious programs knowingly for the creator of a program should lead to unauthorized destruction, blocking, modification or copying of information, disruption of work COMPUTER.Link
The use or distribution of malicious programs can also be carried out only intentionally, as in accordance with Part 2 of Art. 24 of the Criminal Code, an act committed by negligence is recognized as a crime only if it is specifically provided for by the corresponding article of the Special Part of the Criminal Code.
Part 2 of the article being commented on, in contrast to part 1, provides for the occurrence of serious consequences due to negligence as a qualifying attribute.
The content of these qualifying signs corresponds to the content of similar signs of previously considered elements of crimesLink
On the subjective side, a crime can be committed both by negligence in the form of levity, and with indirect intent in the form of indifference to possible consequences. When establishing a direct intent in the actions of the perpetrator, the crime is subject to qualification depending on the goal that the perpetrator set for himself, and when the consequences came, to which he sought to achieve, and depending on the consequences that followed. In this case, the actions under Art. 273 of the Criminal Code, are only a way to achieve the goal. The perfect act is subject to qualification for the totality of the crimes committed.Link
Malware development is available only to qualified programmers who, by virtue of their professional training, must foresee the possible consequences of using these programs.
In accordance with article 274 of the Criminal Code of the Russian Federation, criminal liability is incurred for violating the rules for the use of the means of storing, processing or transmitting computer information and information and telecommunication networks.Link
The considered crime will be completed from the moment of creation, use or distribution of such programs or information that create the threat of the consequences specified in the law, regardless of whether these consequences actually occurred or not . At the same time, the perpetrator must be aware that the programs created or used by him will knowingly lead to the socially dangerous consequences specified in the law. Motive and purpose do not affect the qualification of the crime.Link
However, the use of malicious computer programs for personal needs (for example, to destroy their own computer information) is not punishable.
Distribution of programs is the provision of access to a computer program reproduced in any material form, including by network and other means, as well as by selling, renting, renting, lending for any of these purposes. One of the most typical ways of spreading malicious programs is to place them on various sites and pages of the Internet.Link
This composition is formal and does not require the occurrence of any consequences, criminal liability arises as a result of the creation, use or distribution of the program, regardless of whether this has resulted in any socially dangerous consequences. In the sense of a commented article, the availability of source texts of virus programs is already the basis for prosecution.Link
Responsibility comes for any action provided by the disposition, alternatively. For example, someone may be responsible for creating a malicious program, another for using it, and a third for distributing malware.
Creating programs is an activity aimed at developing, preparing programs capable of unauthorized destruction, blocking, modifying, copying of computer information or neutralizing computer information protection tools.Link
Art. 273 of the Criminal Code establishes liability for illegal actions with computer programs recorded not only on machine, but also on other media, including on paper. This is due to the fact that the process of creating a computer program often begins with the writing of its text followed by its introduction into the computer or without it. With this in mind, the availability of source texts of malicious computer programs is already the basis for being held accountable under Art. 273 of the Criminal Code.
The Civil Code of the Russian Federation defines a computer program as “an objectively presented set of data and commands intended for the operation of computers and other computer devices in order to obtain a certain result, including the preparatory materials obtained during the development of a computer program and the audiovisual displays generated by it "Link
A form of committing this crime can only be an action expressed in the form of creating computer malware, making changes to existing programs, as well as using or distributing such programs. The distribution of engine media with such programs is fully covered by the notion of “use”.Link
The subject of this crime can be any sane person who has reached the age of 16.Link
If the creation, use or distribution of malicious software acts as a method of committing another intentional crime, then the deed must be qualified for a combination of crimes. For example, in cases where a malicious program is created or used to eliminate the means of individual protection of a computer program established by the copyright holder, responsibility arises for the relevant parts of articles 146 and 273 of the Criminal Code of the Russian Federation.Link
In the event that the perpetrator of using or distributing malicious programs deliberately destroyed or damaged computer equipment, which caused significant damage to the victim, his behavior constitutes the totality of crimes provided for in Articles 167 and 273 of the Criminal Code of the Russian Federation.
LeakedSource (leak aggregator, which collected Vkontakte, Mail.ru, Rambler, Last.fm, Linkedin, Dropbox, Myspace and many other resources leaked to the Internet and provided access to passwords of victims of leaks to anyone who would pay for them) Claims California law does not apply to the company because it is based outside of the United States.Link
1. Intentional unlawful destruction or modification of information protected by law, stored on electronic media, contained in an information system or transmitted via telecommunications networks, as well as entering deliberately false information into an information system, if this resulted in a significant violation of the rights and legitimate interests of citizens or organizations or protected the law of the interests of society or the state, ...
1. Creating a computer program, software product or making changes to an existing program or software product for the purpose of unlawfully destroying, blocking, modifying, copying, using information stored on electronic media contained in an information system or transmitted over telecommunications networks, computer malfunction, subscriber device, computer program, information system or telecommunications networks, as well as intentional use and (or) distribution such a program or software product ...
1. Intentional actions (inaction) aimed at disrupting the operation of an information system or telecommunications networks ...
1. Swing , - are punished with a fine against p'yatiot to thousand neopodkuvuvanih minimum_v revenues are immense or by robots with robots on lines up to two rocks, or to those who have succeeded on those lines themselves.Link
2. Those same days, reapply abo after the serpent group of the serpentine group, or stink of sneak at the bottom, mean to Skoda, - be punished for the next five years.
Source: https://habr.com/ru/post/357256/
All Articles