下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、security of personal information under the network environment to explore new issuesabstract: the information age, the networks openness and ease of dissemination of information both contribute to social public opinion, the full realization of civil right to know and the right to speak, but security
2、 of personal information of citizens have also been a great threat to the human flesh search and the blog for personal privacy and a violation of other personal information from a legal point of view to explore and put forward legislative proposals. key words: human flesh search; blog; personal priv
3、acy; personal information security; legislative proposals 90 years from the 20th century onwards, computer internet (internet) the emergence of computer-created high-tech applications as the core of the information age. the help of a computer network intelligence and information dissemination and ex
4、change, convenience and other advantages bring great convenience to peoples lives while also making the past, it seems very difficult for information-gathering work has become easy to them, which makes peoples personal information security is also under considerable threat. brought many new legal is
5、sues. this article far as human flesh search and blog infringement explored. 1 human flesh search personal information involved in security issues the so-called human flesh search refers to the use of the collective strength of internet users everywhere to expose the fact that some kind of original
6、unknown. but the network open so that search results can become public information in an instant, collective thread so that the original secret search behavior overflowing the human flesh taste, and to a strong momentum being the searcher impact. human flesh search first case of the human flesh sear
7、ch pushed to the cusp, on the human flesh search is an infringement of personal information security, whether the convicted, legal experts are also mixed. some experts believe that human flesh search leak citizen name, home address, personal telephone and other basic information, is a serious violat
8、ion of the security of personal information should be human flesh search behavior in criminal law to regulate them. xuzhou city government has taken the lead legislation to ban human flesh search. xuzhou city, computer information system security protection regulations explicitly prohibit or publicl
9、y available online information to others is strictly prohibited dissemination of anothers privacy, or insult, slander, intimidation of others. offenders can be fined up to 5,000 yuan; the circumstances are serious, prevent the computer from the internet or within six months down; for a number of ill
10、egal units, but also could face license revocation or cancellation of network without permission. however, this suggested that, if human flesh search to convict on the supervision by public opinion and freedom of speech there will be constraints. online users suspected of illegal, moral discipline,
11、or have serious problems in people and things, as well as related information published on the web, be judged, if exercised properly, conducive to social progress, and is also conducive to the realization of public interest. in the zhou zhenglong, zhou a long time farming, chia-hsiang lin and other
12、incidents, human flesh search will play a uphold justice, punishing evil and promoting role. only when the human flesh search invasion of his privacy very serious circumstances, causing serious consequences, it should be sanctioned by the penal code. therefore, the persistent ban human flesh search,
13、 in essence, blurring the privacy of information protection and the boundaries between the publics right to know, is not conducive to anti-corruption, is not conducive to the protection of the protection of personal privacy information. the author believes that legislation to do that: (1) the offici
14、als of the property as soon as possible to develop an open declaration of law and security of personal information protection law, as human flesh search reveal all the details of the law, would be a clear human flesh search zuiyufeizui border and limitations. jiangning district, nanjing, the former
15、secretary for housing tubes weeks old farming incident, a smoking extreme 95 cigarette pictures revealed their corruption and bribery, a crime that has a huge amount of property. if the relevant law-making, the officials what the property does not belong to personal privacy information, but it belon
16、gs in this society should be publicly available personal information, the human flesh search incident would become a new form of public opinion. (2) in the current legislation does not reveal all the details before the introduction of comprehensive legislation should be in a timely manner to regulat
17、e human flesh search boundaries, clarify the scope of permitted and prohibited search, to recognize the positive value and meaning, while the real part of the personal privacy of ordinary citizens should be strongly protected. (3) human flesh search if an invasion of privacy to deal with this kind o
18、f defamation and insult provisions of prosecution cases of crime. because human flesh search the reason why hard to investigate, on its online occurs mainly in the responsibility of the main dispersed, difficult to find those responsible, evidence is very costly. if they are libel and insult are the
19、 private prosecution cases of crime, from individuals investigate and collect evidence, then, in the case of hard evidence, human flesh search even if convicted, can not play its due role. 2 blog infringement of personal information involved in security issues in june 2009, china internet network in
20、formation center (cnnic) released the 2008-2009 blog blog behavior of the market and the research report . the report shows that as at the end of june 2009, has a personal blog or personal space the size of users has reached 181 million people, the size of blog space has more than 300 million. chine
21、se blog at great speed from the edge to the completion of the mainstream, grassroots to the elite minority to the masses expansion. however, due to confusion about the nature of the blog, as well as the weak self-discipline, public access to the network through the blog the right to speak at the sam
22、e time, triggering the personal information security problems is also increasing. from nanjing university, associate professor chen fa-tang sue chinese blog site to stop infringement of the china blog first case of, to kristy kathy chow exposure incidents have been suffering from lupus erythematosus
23、, and then to the recent fraud occurred in zhejiang road bridge, online blog leaked the names of students and parents , telephone number, etc. for more information, resulting in fraud to succeed. blog infringement, in particular the right to infringe upon personal privacy and reputation, has become
24、blog copyright infringement hit. many people think that blog as individual small world, with absolute freedom, in the blog, issued only to record their thoughts and expressions of the diary, they are unable to be held accountable. the moral rights in china, the do think the diary is a private space,
25、 ideas recorded in his diary, can not serve as the basis for determining liability, because thinking does not constitute an offense. but the traditional sense of the diary is a self-disclosure, non-disclosure. if you open your diary, or even be published, which no longer belong to the scope of thoug
26、ht, but into areas of behavior. blog is not the individuals private world, but can be read by others in cyberspace. thus, in a blog diary records can not be considered a traditional diary, if the public blog content infringe on privacy of others, or unauthorized disclosure of other information, it c
27、onstitutes illegal infringement shall bear the corresponding legal responsibility. to prevent, reduce blog infringe other peoples personal information security incidents, first of all, it should be in the legislation expressly prohibiting a blog related to matters of law to constrain their developme
28、nt. secondly, strengthening the blog industry self-regulation by the blog, to take on the responsibility to monitor blog content. web site users to apply in the blog when the blog to implement real-name system, the validation system, licensing system and so on, and in the blog writers who upload con
29、tent, the site can search by keyword for content control, such as the search is limited to the relevant keyword, you can refuse to upload. if the site not tried to control the terms of reference, resulting in violations of personal information security blog content, the site shall be jointly and sev
30、erally liable. reposted elsewhere in the paper for free download http:/ 3 e-commerce and online financial services industry related to the personal information security problems with the continuous development of information technology, electronic commerce, called the driving force behind economic g
31、rowth in the 21st century business model, in the national economy an increasingly important role. according to ministry of industry and information technology october 27, 2009 released statistics show that the total number of chinas internet users reached 360 million, e-commerce and online financial
32、 services industry to be a good opportunity for development. however, due to internet banking personal information database security is not assured, network tracking software cookie and all kinds of monitoring software may monitor the user behavior are collected online to others fundus, phishing web site often used disguised as banking, online shopping payment platform in the form of websites to steal the users account and password. in the process of onli
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 事业人员管理考核制度
- 小满科技渠道考核制度
- 火锅服务员考核制度
- 试岗期员工考核制度
- 大师工作室考核制度
- 供销社人事考核制度
- 办公室后勤考核制度
- 账户反洗钱考核制度
- 生物安全管理考核制度
- 建筑公司月度考核制度
- 七下语文《骆驼祥子》考点总结及练习题(附答案)
- (二诊)绵阳市2023级高三第二次诊断考试语文试卷A卷+B卷(含答案)
- 2025年度领导干部任前应知应会党内法规和法律知识考试题库及答案
- 2025上半年湖南省郴州市安仁县事业单位公开招聘工作人员考试试卷
- 强化训练苏科版九年级物理下册《电磁转换》专题练习试题(解析版)
- 慢阻肺全科医学管理
- 江苏省南京市2024年中考物理试卷(含答案)
- 柬埔寨施工合同模板
- (正式版)HGT 22820-2024 化工安全仪表系统工程设计规范
- 射线与物质的相互作用演示文稿
- 雷石无线点歌软件下载
评论
0/150
提交评论