Font Size: a A A

Legal Research On Personal Information Security In The Age Of Big Data

Posted on:2015-10-29Degree:MasterType:Thesis
Country:ChinaCandidate:X JieFull Text:PDF
GTID:2296330434450213Subject:Law
Abstract/Summary:PDF Full Text Request
The generalization of the Internet and computer technology has opened a people’s history of the collection and use of data. With the development of Internet technology and the popularization and application of new technologies such as cloud computing and the Internet, the data in the world have had an explosive growth which brought the age of big data. With the use of big data technology, the ability of collecting and processing data had a great change. With the characteristics of internet, out personal information, data and privacy was endangered by illegal collection, use and disclosure.The aims of this essay is to make recommendations and ideas for improving China’s protection of personal information under the new technologies by the researching of the large data operation of the handling of personal information, and its characters, and the study on large data operation of the infringement. The thesis describes the current status of the current protection of legislation, the protection of self discipline in our country, and the flaws of both of it. At the same time, the paper describes foreign excellent experiences for the protection of personal information security. Through specific elaboration and analysis, the paper concluded that the best way to protect our personal information, in the age of big date, is to select a combine of self-discipline protection and legal protection. And the paper made specific recommendations for implementation. On the one hand, the thesis concluded that using the role of self-regulation in big data operation, focusing on combination of self-discipline in protection and legal details, increasing self-discipline’s execution and implementation. On the other hand, improve the relevant legislation. Adding more targeted regulation and making up for deficiencies in the protection of the law about the protection to big data operation.
Keywords/Search Tags:Big Data, Big Data Operation, Personal Information, LegislativeProtection, Self-Discipline
PDF Full Text Request
Related items