Font Size: a A A

On Civil Law Protection Of Privacy Right In Network Environment

Posted on:2015-09-20Degree:MasterType:Thesis
Country:ChinaCandidate:X PanFull Text:PDF
GTID:2176330422481121Subject:Law
Abstract/Summary:PDF Full Text Request
Since the third technological revolution of science and technology, in the late20thcentury, the rapid development of information technology beyond people’s expectations.Popularization and development of the network is changing all aspects of economic, social,life, exchanges and other people’s traditional way of life. Development of networktechnology, is a double-edged sword from the outset, to bring the public convenience atthe same time, online privacy infringement issues highlighted, public life becomes moreand more transparent, people no privacy. Network infringement greatly reduced theprotection of imminent personal freedom, online privacy. I talk about the origins fromprivacy to explore the relationship between privacy and internet privacy, internet privacyto explore in depth the meaning, the basic content, scope, principles, characteristics, andfinally put forward their views on online privacy protection.The text about20000words, is divided into four chapters, by comparison with thetraditional privacy of internet privacy origin, content, principles, characteristics, protectedmode and other issues in-depth research, and put forward some suggestions to improve.The first chapter, internet privacy origin. First, this chapter for the privacy of originin-depth discussion, to explore the nature of privacy, internet privacy to pave the way forbetter research. Secondly, the chapter Section traditional privacy and online privacymade a comparative analysis found that the difference between contact.The second chapter, the connotation and characteristics of internet privacy. First, thischapter describes the traditional meaning of privacy, by comparing the proposed contentnetwork privacy. Secondly, the analysis and comparison of both concepts and basicranges. Finally, the chapter based on the basis of traditional privacy adapt to thedevelopment of the times, for internet privacy in the information age presents new featuresare summarized: First, a wider range of network protection and tendency to expand. Thesecond is more focused on online privacy and control the use of personal data. Third, theeconomic value of the network tends to be more privacy. Fourth, the network presentsnew features privacy infringement. The third chapter, content and network privacy protection principles. First, this chapterin accordance with the traditional elements of privacy, the basic content network privacyextended research, different from the traditional network privacy privacy proposed basicelements: First, Internet privacy right. The second is a network privacy options. Third,control over online privacy. Fourth, network privacy claims. Fifth, Internet Privacycompensation claims. Second, learn the basic principles of the foreign network privacyprotection to the United States, Britain, Japan and the Organization for EconomicCooperation and Development, for example: First British " Data Protection Act" EightPrinciples. Second, the U.S. FTC ’s four principles. Third, Japan Coexistence. Fourth, theEight Principles for Economic Cooperation and Development (OECD).The fourth chapter, internet privacy protection mode. First, the chapter on privacyprotection mode network are discussed, focusing on the analysis of the U.S. and EUprivacy model two networks: one in the United States as the representative of industryself-driven mode; Second, as the representative of the European Union legal regulationled model. Secondly, combined with China ’s reality presents our network privacyprotection measures: First, establish a sound network privacy protection laws andregulations. The second is to strengthen the industry self-regulation, the establishment ofappropriate certification, oversight organizations. Three to improve the technical level,the use of technical protection. Four involved in international cooperation with the world.
Keywords/Search Tags:Internet privacy, contents, principle, characteristics, protection
PDF Full Text Request
Related items