Font Size: a A A

The Citizen Right Of Privacy Protection Under Network Real-name System

Posted on:2014-06-16Degree:MasterType:Thesis
Country:ChinaCandidate:J MaFull Text:PDF
GTID:2256330401975865Subject:Civil and commercial law
Abstract/Summary:PDF Full Text Request
Along with the change of the national network management system, the real-name system has becomea kind of management mode in our country at present under the network environment, and viewed bymanagement for effective network management tools. Because the network real-name system to achievethe user behavior in the network is directly related to the person’s true identity, discrimination based onvirtual network traces, the locking behavior subject, so there is the risk of privacy infringement. Theimplementation of the real-name system, the relevant government departments or network service providerhas the right to preserve a part of citizens need to submit personal information, network user activities andregistration on the network of personal information can be recorded, if not improve the personalinformation protection mechanism, personal data will be in danger at any time by the public. Therefore,how to protect the privacy of citizens in the real-name system, it is an urgent problem to be solved. It is inthis background, conducting research in this field, in order to protect China’s Internet real-name systemunder the privacy right of citizens to provide some theoretical reference.This addition to the introduction and conclusion, is divided into five parts:The first part introduces the basic theory of the right of privacy under the network real-name system.First introduced the connotation of network real-name system for the new things, and analyzes thenecessity from two aspects according to the facts and legal basis of the existence of. Secondly, thedefinition of privacy, privacy and network privacy three closely and related concepts. Once again, thecombination of the two, analyses the meaning and characteristics of network real-name system under theprivacy. Finally, discusses the relationship between the Internet real-name system and privacy protection intwo both coordination and conflict with each other.The second part of the classification, from the different stages of the data transfer process of invasionof privacy mode analysis, introduced the network users, network services, network equipment supplier oftort.The third part introduces three typical cases--South Korea, the United States of America "female dogfeces," case "the most ironic privacy infringement case" and the "death blog" incident, the real-name system to protect the privacy infringement analysis.The fourth part analyzes the present situation of our country’s network privacy tort real-name system,mainly reflected in the following aspects: the awareness of the protection of network privacy infringement;self-discipline; the level of legal system is not perfect; government supervision is not enough; networktechnology. The status quo is not optimistic.The fifth part according to the present situation of our country’s network privacy tort real-name system,puts forward relevant protection suggestions: network users should strengthen ego to protect consciousness;strengthen the network industry self-discipline; from three aspects of legislation, law enforcement, judiciallegal system; strengthen government supervision; actively use advanced network technology, development.This paper discusses the privacy infringement of network real-name system, and puts forward somesuggestions, hoping to study in this field to opinions effect, in-depth study of leading scholars.
Keywords/Search Tags:the network real-name system, right of privacy, the protection of the right of privacy
PDF Full Text Request
Related items