Font Size: a A A

Personal Information Protection Of Legal Research

Posted on:2014-06-27Degree:MasterType:Thesis
Country:ChinaCandidate:Q ChiFull Text:PDF
GTID:2256330425469330Subject:Legal theory
Abstract/Summary:PDF Full Text Request
With the development of information technology, it is increasingly easier to collect,handle and use personal information. This dramatically changes the relationship amongpeople. Without meeting, communication and transaction activities in every hour andmoment are conducted over the Internet by means of collection, storage and disseminationof information. This change is dependent on one hand makes people of all kinds ofinformation collection, exchange, processing and storage of gradually increasing; on theother hand, resulting in the collection of personal information and the illegal sale ofimagination emerge in an endless stream, causing a serious threat to the security ofpersonal information. It has brought to significant attention from the related departments ofthe government both at home and abroad and judicial circles, academia and enterprises tothe protection of personal information, including people’s right to know and participate,and to the promotion of information security in the trading process. The so-called watercan carry the boat, can also sink it. If personal information is abused, it will cause seriousharm to people’s personal safety and property security. This makes the paper has a certaintheoretical research value and practical significance.This paper consists of four parts, mainly about the concept and characteristics ofpersonal information, the value and importance, meanwhile study deeply about the currentsituation and shortcomings of China’s current systems, and then find related reasons in thecase of analysis of specific issues and defects; finally find relevant countermeasures andsuggestions. This paper also discusses how to develop and utilize it legally as well asprotecting personal information not to be infringed, to make full use of its value and adaptto market-oriented operation.The first chapter is mainly on the basic concepts of information and personalinformation. The difference between personal information and relate concepts. On thebasic characteristics of personal information are analyzed in detail and introduce the basicconnotation and extension.The second chapter introduces and analyzes the mature experience of the personalinformation protection in developed countries and Hong Kong and Taiwan region, andfrom the eight principles of organization of international economic cooperation. Throughthe comparison of the EU and the United States of America mode of industryself-regulation model these advanced results, find out the personal information protectionlegislation mode suitable for our country.The third chapter mainly elaborated our country present stage of the personalinformation collection, storage, processing and the main problems existing in. China’scurrent personal information acquisition method is relatively backward, legal and technicalsupervision does not reach the designated position, make illegal and illegal gatheringfrequent phenomenon. Storage and processing of personal information in our country level is not high, still reasonable e-commerce has not been fully effective play. Because of thelack of rational protection of personal information to make our country’s personalinformation at a disadvantage in the international exchanges and cooperationThe fourth chapter puts forward the related legal measures for the protection ofpersonal information in China, promoting China’s personal information development andutilization methods. In addition, the personal information protection exceptions exist. Weshould balance the citizen individual information security and public security in the rightorder.
Keywords/Search Tags:Personal Information, Legal Protection, Value-added Utilization
PDF Full Text Request
Related items