电子数据的技术性鉴真

谢登科

电子数据的技术性鉴真

Technical Authentication of Electronic Evidence


    期刊名称:《法学研究》
    期刊年份:
    作者:谢登科
    单位:
    中文关键词:电子数据;鉴真;完整性校验;数字签名;区块链存证
    英文关键词:electronic evidence; authentication; integrity check; digital signature; block-chain record
    中文摘要:
    电子数据鉴真是信息时代重要的证据问题。我国司法机关在实践中尝试将完整性校验、可信时间戳、数字签名、区块链存证等信息技术应用于电子数据鉴真。这既源于传统的“保管链证明”和“独特性确认”鉴真方法无法完全适应电子数据的虚拟性、可分离性、海量性等特征,也源于证据鉴真方法的开放性所提供的制度空间和在线诉讼推广适用所产生的内在需求。技术性鉴真并非简单地将信息技术应用于电子数据鉴真,其也会带来电子数据鉴真方法和规则的改变。技术性鉴真在价值功能、鉴真标准等方面与传统鉴真方法并无区别,但在内在机理、证明责任、程序保障等方面存在较大差异,因此有必要在整合现有制度的基础上构建电子数据技术性鉴真规则。技术性鉴真有其适用边界,其主要适用于电子数据“单独提取”模式,在“转化收集”模式中的适用具有限制性,在“一体收集”模式中的适用则具有阶段性;技术性鉴真方法可与传统鉴真方法交叉适用,但也存在独立适用的发展态势;技术性鉴真仅能解决电子数据的形式真实性问题,而无法保障其实质真实性。在电子数据技术性鉴真中,应保障诉讼主体的平等参与和有效对抗。
    英文摘要:
    Authentication of electronic evidence is an important evidentiary issue in the age of information. In practice, information technologies such as integrity check value, trusted time-stamp, digital signature, and block-chain record are applied by judicial authorities in China in the authentication of electronic evidence. This is the result of the inability of traditional authentication methods, such as "chain of custody" and "uniqueness identification", to effectively adapt themselves to the massive and virtual electronic evidence, as well as the institutional space created by the openness of the evidence authentication method system and the intrinsic demand created by the rapid development of online litigation. Technical authentication is not simply the application of information technologies to authentication of electronic evidence. It will bring about changes in the methods and rules of authentication of electronic evidence. Technical authentication methods and traditional authentication methods are not different in basic function and standard, but differ greatly in internal mechanism, burden of proof and procedural protection system. It is necessary to establish the rules of technical authentication for electronic evidence on the basis of integrating existing evidence rules. Technical authentication has its theoretical boundaries of application. It is mainly applicable to electronic evidence, but not the storage medium of electronic evidence. It can be applied alternately with traditional authentication, but there is a developing trend towards its independent application. It could solve the problem of only the formal, but not the substantive, authenticity of electronic evidence. In addition, it's necessary to protect equal participation and the right to confrontation of litigants in authenticating electronic evidence by technical methods.
    全文阅读:  点击下载

相关文章!
  • 中国数据跨境调取路径探析——以

    特定情况下的数据跨境调取需要在传统的司法互助协定方式基础上补充其他路径。中国在坚持以双边司法互助协定和互惠原则为主要方式的基

  • 折中主义与理想主义之辩——评西

    美国西蒙尼德斯教授在新著的《全球冲突法立法:国际比较研究》一书中,提出晚近国际私法背离了萨维尼理论所追求的理想主义,呈现折中主义

  • 离岸信托避税规制的域外经验及

    作为信托的类型之一,离岸信托是指根据外国法律设立的信托。在信托本身固有的灵活机制之上,离岸信托充分利用了离岸管辖区的税收优势,成