期刊文献+

云数据隐私侵权风险与矫正策略 被引量:13

Cloudy Data Privacy: Infringement Risks and Corrective Strategies
下载PDF
导出
摘要 云数据自云端形成至完全销毁的完整生命周期中,时刻面临着云服务商和公权机关侵害数据保密权、支配权、知情权等诸多风险。通过构建云环境标准体系、云隐私影响评估制度、云数据隐私法律保护框架、云服务协议的数据隐私保护条款、侵权赔偿幅度与专门监督制度等,矫正恶意侵权人利益驱动与规则缺失联合作用导致的机会成本过低的畸形状态,寻求云环境高效运转与保护云数据隐私之间的动态平衡。 During the intact life cycle from its formation in the cloud to thorough destruction,cloud data always face many risks of infringements upon data’s confidentiality,dominating right and the right to know by cloud service providers and regulators.By corrective strategies of building standard series for cloud environment,establishing the system of cloud privacy impact assessment,setting up the legal framework for the protection of cloud data privacy,constructing well-defined data privacy protection provisions in the cloud service agreement,setting out the infringement compensation limit and improving the specialized supervision system of protecting cloud data privacy,we can change the abnormal situation of comparatively lower opportunity costs and find a dynamic balance between the efficient operation of cloud environment and the cogent protection of cloud data privacy.
作者 蒋洁
出处 《情报杂志》 CSSCI 北大核心 2012年第7期157-162,共6页 Journal of Intelligence
基金 教育部人文社会科学青年项目"网络服务提供者的侵权认定与责任承担研究"(编号:11YJC820044) 江苏省法学会青年项目"网络平台参与者的民事侵权问题研究"(编号:SFH2011C01)
关键词 云环境 数据隐私 风险 矫正策略 cloud environment data privacy risks corrective strategies
  • 相关文献

参考文献34

  • 1Lyons D. Today's Forecast: Cloudy [ N ]. Newsweek. 2008-11 -1.
  • 2Centre for Economics and Business Research. The Cloud Divi- dend: Part One: The Economic Benefits of Cloud Computing to Business and the Wider EMEA Economy: France, Germany, It- aiy, Spain and the UK[R]. London: CEBR, 2010:8-13.
  • 3Etro F. The Economic Impact of Cloud Computing on Business Creation, Employment and Output in Europe[J]. Review of Business and Economics, 2009(4) : 17-45.
  • 4McLaughlin L. Cloud Computing Survey[J]. CIO Magazine, 2010(11) : 21-25.
  • 5Australian Privacy Foundation. Policy Statement re Cloud Com- puting[ EB/OL ]. 12012-04-11 ]. http://www, privacy, org. an/Papers/CloudComp-0911, html.
  • 6Cavoukian J A. Privacy in the Clouds: A White Paper on Priva- cy and Digital Identity [ EB/OL]. [2012 -04 - 11 ]. http:// www. ipc. on. ca/images/Resources/privacyintheclouds, pdf.
  • 7G-ellman R. Cloud Computing and Privacy[EB/OL].[2012-04 -11 ]. http://www, worldprivacyforum, org/pdf/WPF Cloud_ PrivacyReport. pdf.
  • 8Electronic Privacy Information Centre. Resources on Cloud Computingl[B/OL].[ 2012-04 - 11 ]. http://epic, org/priva- cy/cioudcomputing.
  • 9Microsoft. Privacy in the Cloud Computing Era - A Microsoft Perspective Trustworthy Computing[ EB/OL]. [ 2012-04-11 ]. http://downloadmicrosoft, com/download/3/9/l/3912E.37E- 5D'/A - 4775 - 13677 - B7C2BAF10807/cloud _ privacy _ wp _ 102809. pdf.
  • 10Harris L. Perils in the Privacy Cloud[N]. ABC News. 2009-9 -15.

二级参考文献5

共引文献14

同被引文献156

引证文献13

二级引证文献101

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部