Font Size: a A A

An Empirical Study Of Personal Information Protection In Network Environment

Posted on:2019-03-08Degree:MasterType:Thesis
Country:ChinaCandidate:H L ChenFull Text:PDF
GTID:2416330545958071Subject:Law
Abstract/Summary:PDF Full Text Request
In recent years,the Internet industry has developed rapidly,and the content of information and its influence on daily life are increasingly evident.Internet users in the pleasure of network operators to provide products and services,not need to provide a portion of their personal information,even the need to provide some private personal information for personalized service.But the occurrence of personal information leakage,network users to enjoy products and services at the same time,also gradually noticed that some marketing and fraud phone knew all about his own information.In addition,the mass of information leakage happened frequently,seriously disturb people's peaceful life,threat people property security,disturb the order of social management,the importance of personal information protection the attention from all walks of life.Although the state has been actively promoting legislation to protect the safety of personal information,but there are plenty of personal information leakage and the lagging of legislation of personal information,still makes the protection of personal information becomes a difficult problem in front of the whole society.Apart from the introduction and conclusion,this paper is divided into four parts.Case of the first part is the background and the focus is analysis by Zhu Ye v.baidu company privacy dispute,Wang Jinlong and hanting star hotel management co.,LTD.,the right to privacy dispute,Ren Jiayu jade with baidu company reputation dispute,the three typical network personal information infringement cases,the focus of the analysis of the problem: personal information scoping,personal information rights,personal information protection and utilization.The second part is to define the scope of personal information in network environment,is the first focus on case analysis problem,the first section is a personal information scoping the existence question,mainly has not clearly defined network behavior information,the network behavior whether information has identification can be controversial.The second section is to improve the definition of personal information scope,mainly to improve the definition of personal information scope and to further explain the identification of personal information.The rights of the third part is a personal information security,it is the case analysis,the second focus problem in the first section is a personal information problems existing in the protection of the rights,namely the existing law is not assured,right of personal information,with specific personality right protection of personal information has limitations.Is solving the problem of personal information rights in the second quarter,namely establish personal information rights,protect the rights of personal information,the main content is the right of personal information attributes,and the content of the right of personal information,including the decision,right,correct,the right to delete and usufruct.The fourth part is a personal information protection and utilization,is the case analysis,the third focus problem in the first section is a personal information protection and utilization of problem analysis,namely the personal information collection and utilization of the lack of regulation,the management of information control liability provisions are not clear,for personal information,the lack of clear rules of tort liability.Content in the second quarter is solving the problem of personal information protection and utilization,namely the balance of personal information protection and utilization,the main content has insisted on the principle of paying equal attention to the protection and management,specific regulations regarding the use of the personal information collection,to strengthen the management of information control responsibility,clear personal information infringement responsibility.
Keywords/Search Tags:personal information, Scope definition, Protection of rights, Reasonable use
PDF Full Text Request
Related items