Font Size: a A A

Chinese Legislation Of Cyber Information Security

Posted on:2016-01-13Degree:MasterType:Thesis
Country:ChinaCandidate:S S ZhangFull Text:PDF
GTID:2296330479490684Subject:International Law
Abstract/Summary:PDF Full Text Request
The National People’s Congress Standing Committee report points out Internet safety law should be formulated in March 2015. Internet information security is the key point. But the existing theory and legislation need to be deepen because that the category of Internet is narrow, the definition of information is not very clear safety standards are different, national strategy few reflects in the legislation and new type of physics and information are lack of protection.Based on the basic theory of Internet information security, the article expands the definition of internet, preliminary clears up the semanteme, characteristics, legal attribute, scope and nature and analyses the particularity of internet information by using internet security factors. Finally, on the basis of analysing the essence and standards of safety, establishing the model of internet information security.In accordance with the basic theory of this article, it introduces, analyses and compares the legislation of China, foreign countries and international organizations. Paying attention on protecting internet information, internet facilities, users and management authorities from the national strategy, security mechanism and legislative status. I analyse representative laws and regulations in developed nations and distinctive international practices. Exploring the different train to protect the Internet information security from strategic perspective. Hope for putting forward useful suggestions to Chinese internet information legislative protection.Combining with the above, I put forward some legislative suggestions which may be accepted starting from the basic theory in jurisprudence and new situations and some macroscopic thinking which may be beneficial to internet information security.
Keywords/Search Tags:cyber security legislation, cyber information factor, cyber power strategy
PDF Full Text Request
Related items