检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:自正法 ZI Zhengfa(Law School,Chongqing University,Chongqing 404100,China)
机构地区:[1]重庆大学法学院,重庆400044
出 处:《法学论坛》2025年第1期39-51,共13页Legal Forum
基 金:国家社科基金青年项目“脑机接技术应用的社会风险与法律规制研究”(24CFX048);重庆市社会科学规划博士项目“非法实物证据排除的中国模式研究”(2023BS061)的阶段性成果。
摘 要:数字时代的数字技术与证据制度的反思性革新是相对应的,侵入式BCI生成的数据信息对传统证据提出了挑战,对犯罪嫌疑人、被告人采用侵入式BCI所生成的数据信息是否可作为证据,在规范维度几乎处于空白,学理维度则形成了“无证据说”“犯罪嫌疑人、被告人供述和辩解说”“大数据分析报告说”“新型证据说”等不同的学说。从侵入式BCI生成数据信息的运行原理来看,大脑记忆的客观性奠定了其所生成数据信息是可靠的,且多次采集的数据信息具有交互性、有效性、可靠性、真实性和准确性的特征。但由于侵入式BCI本身还存在着很多难以攻克的难题,其中既包括技术本身的难关,也包括有违社会伦理之嫌。鉴于此,有必要构建侵入式BCI生成数据信息作为证据的程序体系,明确其作为证据的前置性程序原则,参照技术侦查的程序条款规范适用流程,并按其所生成的数据信息的多元性,对数据信息分步骤予以归类、审查和认定,排除无证据属性的信息,优先将其作为犯罪嫌疑人、被告人供述和辩解进行审查,再按可能属于其他证据种类予以审查,让数字技术真正服务于证据构造体系。The reflexive innovation of digital technology and evidence systems in the digital age are intertwined. Data information generated by invasive brain-computer interfaces(BCI) poses a challenge to traditional evidence frameworks. Currently, there is little regulation regarding whether data information generated by invasive BCI from criminal suspects and defendants can be used as evidence. The academic dimension has formed different theories, including "no evidence theory", "confession and defense theory", "big data analysis report theory" and "new evidence theory". From the operational principles of invasive BCI, the objectivity of brain memory establishes that the data information it generates is authentic and reliable. And, the data information collected repeatedly presents characteristics of interactivity, validity, reliability, authenticity, and accuracy. However, invasive BCI itself still faces many challenges, including technical difficulties and ethical concerns within society. Given these issues, it is necessary to construct a procedural system for using data information generated by invasive BCI as evidence. This system should clarify the procedural principles required for its use as evidence, drawing on procedural clauses applicable to technical investigations. And, it should categorize, review, and assess the data information step by step based on its diversity, excluding data without evidentiary value. Priority should be given to examining the data as confessions and defenses of the suspects and defendants, and then it should be examined for other potential evidence categories. This way, digital technology can truly serve the construction of an evidence system.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.116.80.77