摘要
With the development of the internet, the right to be forgotten recognized by the EU has gradually entered the research field of Chinese academia. Since then, Chinese scholars have analyzed the necessity and feasibility and also the possible ways in which the right to be forgotten might be safeguarded. However, the argument of the right to be forgotten and its path deserve to be further discussed. The right to be forgotten is not a solution to the violation of personal information in China because our domestic systems and practices have allowed individuals to delete online information and the construction of the forgotten right with the right of personal information as the core may hinder the development of the Internet. This article suggests that the introduction of the right to be forgotten should follow China’s national conditions and should be constructed with privacy as the core in the system design, and the content should further clarify personal data. The subjects of data should be differentiated in specific implementation and the scope of application should encompass the criminal field.
With the development of the internet, the right to be forgotten recognized by the EU has gradually entered the research field of Chinese academia. Since then, Chinese scholars have analyzed the necessity and feasibility and also the possible ways in which the right to be forgotten might be safeguarded. However, the argument of the right to be forgotten and its path deserve to be further discussed. The right to be forgotten is not a solution to the violation of personal information in China because our domestic systems and practices have allowed individuals to delete online information and the construction of the forgotten right with the right of personal information as the core may hinder the development of the Internet. This article suggests that the introduction of the right to be forgotten should follow China's national conditions and should be constructed with privacy as the core in the system design, and the content should further clarify personal data. The subjects of data should be differentiated in specific implementation and the scope of application should encompass the criminal field.