Font Size: a A A

A Study On The Legal Protection Of Privacy In Network Environment

Posted on:2017-03-31Degree:MasterType:Thesis
Country:ChinaCandidate:L WangFull Text:PDF
GTID:2206330485450944Subject:legal
Abstract/Summary:PDF Full Text Request
In recent years, the rapid development of the Internet, every aspect of our lives has been inseparable from the Internet, people rely on the Internet is growing. Openness of the Internet allows us to get a lot of convenience, but it also allows us to open the privacy suffered an unprecedented threat. On the one hand, some people dismal set his sights on the Internet, trying to steal users personal privacy be used to bring their own interests. On the other hand, our own privacy protection awareness is not strong, unknowingly stolen personal privacy of others. How the Internet has brought us benefits, while simultaneously protecting our Internet privacy is not violated by others, this is a major problem in today’s Internet development. Taking as a starting point to privacy, right to privacy on the network discussed in the United States and the European Union combined conservation status of network privacy, privacy protection for our network in terms of the problems were analyzed, and some of the network to improve privacy protection Suggest.In addition to the prologue and epilogue of this article is divided into five parts.The first part is an overview. Privacy and the right to privacy as a starting point, first elaborated the concept and characteristics of privacy and the right to privacy, and leads to network privacy. Because of the network does not define the concept of privacy in terms of legislation, the author uses the traditional method of comparing privacy, combined with the unique characteristics of Internet privacy, trying to carry out a preliminary definition of network privacy, and its characteristics analysis.The second part is the concept of network privacy infringement, characteristics and manifestations. After the concept of network privacy preliminary definition of the author of the network privacy violations that exist on the Internet was analyzed, from a Web site, e-mail, e-commerce, hacker attacks and other aspects of the analysis of network privacy violations, further It describes the characteristics of network privacy violations and a variety of forms.The third part of the foreign-related legislation tort liability of network privacy. First, from the United States to protect the privacy elaborate network status, including the status of the US legislation and industry self-regulation. Then elaborated EU Legislation mode, because the current network privacy protection is still in a preliminary attempt to stage, so that countries mainly through the Legislation of the way to protect the privacy of the network, and strive to achieve a uniform standard.The fourth part is about the present situation of network privacy protection in our country and on the analysis of existing problems. Of network privacy protection in China mainly include two aspects of legislation protection and industry self-discipline. This part discusses our country constitution, civil law, tort liability law and other laws and regulations on traditional privacy and network privacy regulations, the present Internet industry self-discipline, to the analysis of existing problems in the protection of network privacy.The fifth part is the protection of network right of privacy in our country puts forward some perfecting Suggestions. Through the analysis of the status quo of network privacy protection in our country, found the problems of our country, mainly from the aspects of legislation, industry self-discipline, citizens’ legal consciousness itself is analyzed. And by comparing with network privacy protection status quo of abroad, put forward some Suggestions of perfecting our country’s network privacy protection. Specialized legislation of network privacy, implement step by step in order to regulate and supplemented, self-discipline of network privacy protection system.
Keywords/Search Tags:privacy, network privacy, infringement
PDF Full Text Request
Related items