Font Size: a A A

A Report On E-C Translation Of Cybersecurity Law

Posted on:2019-10-20Degree:MasterType:Thesis
Country:ChinaCandidate:L F ZhangFull Text:PDF
GTID:2405330548482218Subject:Translation
Abstract/Summary:PDF Full Text Request
In recent years,network data security has become an increasingly vital consideration with development of network technology.All governments and corporations take actions to avoid data breach.However,there is no sound network data breach-related laws in China and most published ones are policies or regulations,which remains to be further improved in legal force and application.Cybersecurity Requirements for Specific Industries,excerpted from third chapter of Cybersecurity Law,mainly introduced six cybersecurity concerning laws and regulations,including Gramm-Leach-Bliley Act Safeguards Rule for financial institutions,Red Flags Rule for information for certain creditors and financial institutions,Payment Card Industry Data Security Standard for credit and debit card information and Health Information Portability and Accountability Act Security Rule for certain health-related information.Under the guide of grammatical metaphor theory from systemic-functional grammar,this translation practice is analyzed from ideational metaphor and interpersonal metaphor respectively.Ideational metaphor focuses on the word features in law text,thus the transformation of part of speech strategy,including verbalization,nominalization,adjectivization and adverbialization,is put forward so as to recover the packed information,improve the naturalness and smoothness of the translated text and match the Chinese language expression habit.Interpersonally,mood and modality are analyzed.Specifically,it is suggested that we should consider the possibility,willingness or obligation of modal verbs,analyze three(low,medium and high)different modal values carefully and choose appropriate mood based on the principle of more imperative and declarative sentences but less interrogative sentences.Currently,there are many books and articles on how to enhance cybersecurity from technology but little laws and regulations.By translating this excerpt,personally the author want to enrich relative cybersecurity requirements for specific industries.
Keywords/Search Tags:Cybersecurity Law, Data Breach, Grammatical Metaphor, Law Text
PDF Full Text Request
Related items