Font Size: a A A

The Privacy Right Under The Internet Age

Posted on:2014-07-25Degree:MasterType:Thesis
Country:ChinaCandidate:L ShiFull Text:PDF
GTID:2296330425978748Subject:Constitution and Administrative Law
Abstract/Summary:PDF Full Text Request
The rapid development of the Internet has greatly changed the way of our life.Even if you stay at home, you can also learn about the changes in the world. the Internet Constantly invade the most intimate aspects of our personal lives, though it provides us a number of convenience.It is a true portrayal that we are living in a transparent society where everyone’s personal privacy is disappearing. This article basing on national conditions and learning from foreign experience,analysis the related issues of the network privacy, appropriating measures for the protection of the network privacy. The article is divided into five main sections:Chapter I start from a brief introduction to the traditional concept of privacy. This part analyze and summarize the academic world on the notion of network privacy network privacy point of view, again based on the introduction and analysis of network privacy compared with the characteristics of the traditional privacy. And content network privacy should specifically include consent rights, the right to security, the right to information, control over, and options.The second chapter focuses on the behavior of violations of the privacy. In this paper, the main classification criteria, the main violations of the privacy acts are divided into personal, commercial organizations and government three categories. The main case without their authorization to publish another’s privacy, violations of hackers, network hardware and software developers, Internet service providers, tort, professional snoop business, workplace violations, as well as the government’s infringementThe third chapter introduces the model and experience of the foreign network privacy protection. Introduces the United States on behalf of the industry self-regulation mode and EU Legislation of mode, based on analysis of the pros and cons of each of the two modes, which leads to the product of the two modes of conflict-"safe harbor model." Generation of safe harbor mode of conflict resolution to resolve international network privacy protection mode provides a solution to the path, and promote the international protection of the network privacy.Chapter IV is based on national conditions, mainly from the two parts of the legislative protection and industry development to introduce our current network privacy protection. The first part introduces the current laws and regulations on the protection of the network privacy, pointed out that the lack of protection of our existing legislation. Conservation status of the status of some of the major development of the Internet, self-discipline as well as our current network of industry organizations to analyze Privacy plight of our network and inadequate.Chapter V discusses our network privacy protection countermeasures, and learn from foreign experience, and based on China’s national conditions on the basis of proposed legislation system and network privacy protection mode, supplemented by industry self-protection legislation to protect the network Privacy is an international trend, and industry self-regulation is also A than essential network privacy means at this stage, this stage both should have focused on the. The same time, it should be noted that the network privacy aspects of other factors, such as raising the awareness of personal protection, the development of network technology, provides the technology to protect and strengthen the network moral propaganda.
Keywords/Search Tags:Right to privacy, network privacy, industry self-regulation, Legislation regulation
PDF Full Text Request
Related items