Font Size: a A A

Privacy Laws Under The Network Environment Protection System

Posted on:2012-01-17Degree:MasterType:Thesis
Country:ChinaCandidate:X LuFull Text:PDF
GTID:2166330335956446Subject:Civil and Commercial Law
Abstract/Summary:PDF Full Text Request
As the achievement of the third technological revolution, Internet technology has experienced almost fifty years development. The number of Internet users in the world has exceeded to 20 billion. We may say that we have entered the Network Era, and many daily affairs cannot be done without Internet. It has experienced only decades since China began to promote the Internet technology around the 1990's. However, it grows much faster than any other countries both in its developing speed and influence on the society. According to the "27th China Internet Development Statistics situation report", by December 2010, the number of natives in China has reached 4.57 billion, which increased 7330 million compared with that of 2009. The Internet penetration increased by 5.4% and rose to 34.3%. However, the present circumstance of personal network security in China is still worrying though the government has strengthened the protecting policy on the network security. It is reported that the population of natives attacked by virus or Trojan is 209 million in 2010, accounting for 45.8% of the total number. With the popularization of the Internet, more and more people become the Internet users, at the same time; the network technology has improved rapidly. On the other hand, it poses new challenges in network security. Various affairs proposed by the Internet, such as "XX scandal", "Brother XX", "Sister XX", "manpower search". Although this brings entertainment to people via the Internet and the talk of gossip, but also violated the individual citizens right to privacy in the networked environment (hereinafter referred to as:internet privacy.). In addition, with the development of e-commerce, some network service providers figure for profit by transferring, exploiting or revealing personal information while they fulfill their job responsibilities, which makes great infringements to the victims. Therefore, how to strengthen the protection of network privacy has become urgent for us.This article contents mainly in the following five parts. The first part, Introduction. Introduces the privacy of Internet research background, meaning, the domestic research, the research aims and methods of articles and papers and other innovations possible.The second part of the Introduction to the basic theory, the component is related to several basic network theory of privacy. Including the concept of privacy, characteristics and main content of the concept of Internet privacy and main content. And on this based on Internet privacy and copyright infringement liability for legal analysis of the network were discussed the main privacy infringement, violations of the forms, the principles of tort liability and responsibility of imputation methods and so on.The third part of the conservation status of our network and the privacy of the main problems. This part of the network from the present situation of privacy protection, came to the conclusion:Privacy of our network is not optimistic, and further analysis of the main problems are discussed.The fourth part, the foreign network and the privacy practices of China. The omparative study from the horizontal part, on the foreign network to study the status of privacy protection. Privacy on the foreign network the status of the empirical study of a typical national privacy protection in the network's successful experience, draw some of the Enlightenment.The fifth part, improve the legal protection of network privacy Thoughts civil. Then the current situation on the privacy of our network based on the empirical analysis, combined with the successful experience of foreign countries, the article on the Improvement of Civil Law Protection of Internet Privacy was thinking, made a number of their point of view to be the protection of privacy on our network Benefit.
Keywords/Search Tags:Environment Network, Privacy, Internet Privacy, Legal Protection
PDF Full Text Request
Related items