Font Size: a A A

The Legal Protection Of Personal-information Under The Background Of Smart City

Posted on:2014-04-01Degree:MasterType:Thesis
Country:ChinaCandidate:K WangFull Text:PDF
GTID:2266330422463939Subject:Law
Abstract/Summary:PDF Full Text Request
This article is for legal protection of information security issues in the context ofsmart city explore. From the security of the personal information, this paper proposes aviable personal information safe mode-behavior. And then, according to thecharacteristics of the smart city, pointed out that the multi-level dozens of personalinformation security violations. On this basis, in the wisdom of the city, in order toprotect the security of personal information, you must create a separate local laws andregulations to restrain the behavior of each subject, and the most important way inwhich the personal information was leaked RFID applications require the introductionof special regulations to regulate.In accordance with the above logic, the structure is divided into the followingsections:The first part, to investigate the security of personal information and its protection.First of all, the concept of security of personal information Discriminate, cleardifferences between contact and information security, privacy, the right to information,come to explore specific areas of the security of personal information. Secondly, in theareas on the security of personal information, get rid of the endless debate about itsnature, proposed to act as the center of the security of personal information protectionmode, and given reasons.The second part of the analysis of the security of personal information in thecontext of smart city. The first is a brief description of the smart city, and analysis of itstechnical characteristics and impact. This on the basis of analysis the security ofpersonal information against three categories,10kinds of behavior; these ten actsfurther dimension to the subject typed.The third part, to explore the problem to be solved-smart city the context of thelegal protection of personal information security. The previous analysis, sorting methodfor the resolution of this issue and deal with the problem of object; this part, thefollowing structure: first solve the problem of scientific and technological level to discuss and identify shortcomings, followed clarify the level of legal protectionapplications structure, with a focus on the interpretation of the two laws, the contents ofthe file-the local legislative nature regulations on the Protection of personalinformation Security; RFID tag specific regulations.
Keywords/Search Tags:Personal Information, Information Security, Behavior, Right of Privacy Legal Protection
PDF Full Text Request
Related items