期刊文献+

从国家行为角度探讨构建信息网络安全审查制度 被引量:3

Discussion on Establishing Information Network Security Review System as a State Action
下载PDF
导出
摘要 提出在世贸规则认可的"安全例外"原则下构建信息网络安全审查制度。信息网络安全审查决策属于国家行为,豁免于行政复议和司法审查,为国家处理信息网络领域国家安全事件提供决策平台和实施手段。国内关于构建信息网络安全审查制度的观点很少认识到信息网络安全审查国家行为属性,将其混同于信息安全产品强制认证制度或者设备检测等一般性制度,降低了信息网络安全审查制度的地位和作用。 Information network security review is pro-posed based on "security exception" principle recog-nized by WTO. Information network security review is attributed to the state actions, exempt from the admin-istrative review and judicial review, and provides plat-form for countries to deal with the national security events in the field of information networks. In China some viewpoints on information network security rarely recognize that the behavior of information network security review is attributed to state acts, confusing with information security product compulsory certification system or device testing, which reduces the effect of information network security review system.
作者 许长帅
出处 《现代电信科技》 2014年第10期10-13,共4页 Modern Science & Technology of Telecommunications
关键词 信息网络 安全例外 豁免 审查 information network security exception exemption review
  • 相关文献

同被引文献45

  • 1刘金瑞.数据安全范式革新及其立法展开[J].环球法律评论,2021(1):5-21. 被引量:68
  • 2张洋,郑会燕.网络安全审查乃顺势而为[OB-EL].人民网.http://politics.people.com.cn/n/2014/0523/c1001-25053486.html.2015-04-22.
  • 3U.S. House of Representatives. Investigative Report on the U. S. National Security Issues Posed by Chinese Tel ecommunieations Companies H uawei and ZTE[R]. 112th Congress, 2012;5.
  • 4GAO. information security: Cyber Threats and Vulnerabilities Place Federal Systems at RiskeRS. GAO-09- 661T, 2009 : 2.
  • 5Scott Charney, Eric T. Werner. Cyber Supply Chain Risk Management: Toward a Global Vision of Transparency and Trust[R]. Microsoft,2011:1.
  • 6John Rollins, Anna C. Henning. Comprehensive National Cyber Security Initiative: Legal Authorities and policy Considerations[R]. Congressional Research Service, 2009 : 5.
  • 7GAO. IT Supply Chain National Security-Related Agencies Need to Better Address Risks[R]. USA, 2012:6.
  • 8Helen Peck. Drivers of supply chain vulnerability: an integrated framework[J]. International Journal of Physical Distribution & Logistics Management, 2005, (4).
  • 9GAO. IT supply chain:National Security-Related Agencies Need to Better Address Risks[R]. USA,2012:5.
  • 10National policy on certification and accreditation of national security telecommunications and information sys- tems,NSTISSP No. 6,1994.

引证文献3

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部