期刊文献+
共找到5,697篇文章
< 1 2 250 >
每页显示 20 50 100
On the“News Exception”in Personal Information Protection
1
作者 张文亮 刘雨祺 LI Donglin 《The Journal of Human Rights》 2024年第1期89-110,共22页
Protection of personal information is a significant issue in the construction of legal systems in various countries in the information age.Introducing a balanced approach for protecting personal information is an impo... Protection of personal information is a significant issue in the construction of legal systems in various countries in the information age.Introducing a balanced approach for protecting personal information is an important goal of basic human rights protection and data legislation.Personal information protection involves comprehensive considerations among various values,and the balanced structure between personal information rights and other rights systems has become the key to legislation on personal information protection.The“news exception”is a prominent example representing the balanced structure of personal information protection.As a societal instrument,news not only pursues commercial value but also advocates freedom of expression and public value.There exists a natural tension between news and personal information protection.The“news exception”of the balanced structure has become a fundamental requirement and important connotation for constructing a system for protecting personal information.The balanced structure of the“news exception”requires a reasonable definition of the concept and purpose of news,and both the self-discipline within the news industry and the judicial intervention are necessary factors.China has preliminarily completed the top-level legislative design of personal information protection through laws such as the Civil Code of the People’s Republic of China(PRC)and the Personal Information Protection Law of the People’s Republic of China.However,the balanced mechanism of the“news exception”has not yet been fully established in China.A“news exception”based on the ideas of balance and the improvement of the institutional system is the fundamental principle for the development of China’s personal information protection system. 展开更多
关键词 personal information news exception Civil Code of the PRC
下载PDF
The Dynamic System Theory of Legal Protection for Personal Information Rights Infringement
2
作者 莫杨燊 NI Weis 《The Journal of Human Rights》 2024年第1期143-172,共30页
The advent of the big data era has presented unprecedented challenges to remedies for personal information infringement in areas such as damage assessment,proof of causation,determination of illegality,fault assessmen... The advent of the big data era has presented unprecedented challenges to remedies for personal information infringement in areas such as damage assessment,proof of causation,determination of illegality,fault assessment,and liability.Traditional tort law is unable to provide a robust response for these challenges,which severely hinders human rights protection in the digital society.The dynamic system theory represents a third path between fixed constitutive elements and general clauses.It both overcomes the rigidity of the“allor-nothing”legal effect evaluation mechanism of the“element-effect”model and avoids the uncertainty of the general clause model.It can effectively enhance the flexibility of the legal system in responding to social changes.In light of this,it is necessary to construct a dynamic foundational evaluation framework for personal information infringement under the guidance of the dynamic system theory.By relying on the dynamic interplay effect of various foundational evaluation elements,this framework can achieve a flexible evaluation of the constitutive elements of liability and the legal effects of liability for personal information infringement.Through this approach,the crisis of personal information infringement in the era of big data can be mitigated,and the realization of personal information rights as digital human rights can be promoted. 展开更多
关键词 personal information digital human rights dynamic system theory constitutive elements of torts LIABILITY
下载PDF
A Method to Improve the Accuracy of Personal Information Detection
3
作者 Chih-Chieh Chiu Chu-Sing Yang Ce-Kuen Shieh 《Journal of Computer and Communications》 2023年第6期131-141,共11页
It is necessary to confirm the personal data factors and the rules of verification before conducting personal data detection. So that the detection method can be written in the subsequent implementation of the automat... It is necessary to confirm the personal data factors and the rules of verification before conducting personal data detection. So that the detection method can be written in the subsequent implementation of the automatic detection tool. This paper will conduct experiments on common personal data factor rules, including domestic personal identity numbers and credit card numbers with checksums. We use ChatGPT to test the accuracy of identifying personal information like ID card identification numbers or credit card numbers. And then use personal data correlation to reduce the time for personal data identification. Although the number of personal information factors found has decreased, it has had a better effect on the actual manual personal data identification. The result shows that it saves about 45% of the calculation time, and the execution efficiency of the accuracy is also improved with the original method by about 22%, which is about 2.2 times higher than the general method. Therefore, the method proposed in this paper can accurately and effectively find out the leftover personal information in the enterprise. . 展开更多
关键词 Data Leakage PRIVACY personal information Factors
下载PDF
Why The Constitution Should Protect Personal Credit Information?——An Approach of Right Argumentation
4
作者 李艺 SU Yilon 《The Journal of Human Rights》 2023年第2期328-346,共19页
Protecting personal credit information through constitutional rights is not only essemtial for individuals to defend against infringements on their personal credit information rights and interests by public power in t... Protecting personal credit information through constitutional rights is not only essemtial for individuals to defend against infringements on their personal credit information rights and interests by public power in the social credit system,but also a requirement for unified legislation on social credit to explore the basis for constitutional norms.In the era of the credit economy,personal credit information has become a vital resource for realizing personal autonomy.Along with the increase in the state’s supervision and control of personal credit,the realization of the autonomous value in the interests related to personal credit information has also set more obligations for the state.Therefore,interests related to personal credit information should be regarded as a constitutional right.Because of its significant economic interest and value,the right to personal credit information should be classified as a constitutional property right.As a constitutional property right,the right to personal credit information can not only help protect people’s economic interests,but also achieve the goal of safeguarding their personality interests. 展开更多
关键词 right to personal credit information constitutional rights social and economic rights property rights
下载PDF
On the “Reasonable” Handling of Personal Information Disclosed According to the Law
5
作者 赵艺 杨洁 SU Yilong 《The Journal of Human Rights》 2023年第1期182-211,共30页
The model for protection of personal information dis-closed according to the law has changed from indirect protection to direct protection.The indirect protection model for traditional repu-tation rights and privacy r... The model for protection of personal information dis-closed according to the law has changed from indirect protection to direct protection.The indirect protection model for traditional repu-tation rights and privacy rights was not enough to meet the practical needs of governance.However;due to the ambiguity in the application of the“reasonable”processing requirements,the direct protection model centered on Article 27 of the Personal Information Protection Law also is not enough to effectively respond to practical disputes.The essence of the problem is to resolve the tension between informa-tion circulation and risk control and reshape the legal order for the protection of personal information disclosed according to the law.The determination of“reasonable”should be centered on the scenario theory and holism interpretation and carried out by using the interpre-tation technique of the dynamic system under Article 998 of the Civil Code.With the support of scenario-based discussions and comparative propositions,the crawling and tag extraction of personal information.disclosed according to the law should be considered as reasonable processing;profiling and automated decision-making should not be covered in the scope of reasonable processing,in principle;for behav-iors such as correlation analysis,elements like information subject,identifiability and sensitivity should be comprehensively considered to draw open and inclusive conclusions in individual cases. 展开更多
关键词 personal information that has been disclosed legal disclosure of personal information reasonable scope holism theory dynamic system
下载PDF
Research on Residents’Willingness to Protect Privacy in the Context of the Personal Information Protection Law:A Survey Based on Foshan Residents’Data
6
作者 Xiying Huang Qizhao Xie +5 位作者 Xunxun Jiang Zhihang Zhou Xiao Zhang Yiyuan Cheng Yu’nan Wang Chien Chi Chu 《Journal of Sustainable Business and Economics》 2023年第3期37-54,共18页
The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel... The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security. 展开更多
关键词 personal information Protection Law Privacy security Privacy protection will
下载PDF
Experimentation with Personal Identifiable Information 被引量:3
7
作者 Sabah Al-Fedaghi Abdul Aziz Rashid Al-Azmi 《Intelligent Information Management》 2012年第4期123-133,共11页
In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individua... In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individual’s perception of privacy. A “gradation” of sensitivity of PII can be used in many applications, such as deciding the security level that controls access to data and developing a measure of trust when self-disclosing PII. This paper experiments with a theoretical analysis of PII sensitivity, defines its scope, and puts forward possible methodologies of gradation. A technique is proposed that can be used to develop a classification scheme of personal information depending on types of PII. Some PII expresses relationships among persons, some specifies aspects and features of a person, and some describes relationships with nonhuman objects. Results suggest that decomposing PII into privacy-based portions helps in factoring out non-PII information and focusing on a proprietor’s related information. The results also produce a visual map of the privacy sphere that can be used in approximating the sensitivity of different territories of privacy-related text. Such a map uncovers aspects of the proprietor, the proprietor’s relationship to social and physical entities, and the relationships he or she has with others. 展开更多
关键词 personal Identifiable information PUBLIC POLICY Issues PRIVACY Sensitivity
下载PDF
Decentralized Mobile SNS Architecture and Its Personal Information Management Mechanism 被引量:2
8
作者 LIU Zhihan YUAN Quan LIU Lu 《China Communications》 SCIE CSCD 2016年第2期189-199,共11页
Mobile SNS popular topics of mobile is one of the most Internet. In order to fulfill the user demand for self-maintained independent social network and ensure the privacy of their personal information and resources, t... Mobile SNS popular topics of mobile is one of the most Internet. In order to fulfill the user demand for self-maintained independent social network and ensure the privacy of their personal information and resources, the paper proposes system architecture of decentralized mobile SNS.In the temporary scenarios, the system makes use of the existent specification of FOAF (Friend- of-a-Friend) to describe users' personal information and act as a certificate to be identified by SNS sites. Ticket-based Access Authorization System (TAAS) is provided to grant permission to acquire resources on personal portal. Meanwhile, the mechanism and algorithm are devised for user profile complete deletion when users are going to quit the service for the temporary scenarios. 展开更多
关键词 mobile SNS DECENTRALIZED temporaryscenarios personal information management access authorization privacy protection
下载PDF
Developing a Comprehensive Regime for Personal Information Protection in Networked Chinese Public Sectors
9
作者 Xiaomi An Shuyang Sun Wenlin Bai Bin Zhang Xiaoyu Huang Hepu Deng 《Management Studies》 2015年第1期13-20,共8页
With the increasing sharing and reuse of personal information resources for better public services, the effective protection and management of personal information as organizational and individual assets as well as so... With the increasing sharing and reuse of personal information resources for better public services, the effective protection and management of personal information as organizational and individual assets as well as social resources are becoming more and more important in networked Chinese public sectors. Existing studies of personal information protection in China is mainly conducted from the legal perspective with a focus on the development of appropriate legislation and policies at the national level. There is little research on how specific legislation and polices can actually be implemented in an effective manner and what impacts such legislation and policies have on individuals, organizations, and the society. To adequately address this issue, this study investigates the legal requirements for personal information protection based on the relevant laws, regulations, and standards in China. It proposes a comprehensive regime for personal information protection in the networked public sectors in China. Such a regime takes the advantages of existing discipline-based approaches, legal requirements, and control mechanisms for personal information protection. It can be used to facilitate the provision of public services in the networked Chinese public sectors through the adequate protection of personal information and the effective management of personal information. 展开更多
关键词 information resources management personal information personal information protection public sector networked environment China
下载PDF
Perspectives for Sharing Personal Information on Online Social Networks
10
作者 Chi Kin Chan Johanna Virkki 《Social Networking》 2014年第1期41-49,共9页
The goal of this research was to study how people feel about sharing personal information on social networks. The research was done by interviews;50 people were interviewed, mostly from China's Mainland, Hong Kong... The goal of this research was to study how people feel about sharing personal information on social networks. The research was done by interviews;50 people were interviewed, mostly from China's Mainland, Hong Kong, and Finland. This paper presents the included 12 questions and discusses the collected answers. It was discovered, e.g., that 38 out of the 50 answerers use social media every day and share versatile personal information on the Internet. Half of the answerers also share information about other people on the Internet. It was also discovered that compared to male answerers, the female answerers were more active in sharing information about other people. There was a significant variety in opinions: what should be the age limit for sharing personal information online, while 22 out of the 50 answerers felt that there is no need for an age limit at all. According to the answers, only a few people use social media for making new friends. Instead, an important reason for using social media is that their existing friends are using. An interesting finding was that the answerers see the Internet as a part of the real world;the privacy that you have on the Internet is the privacy that you have in the real world. 展开更多
关键词 information SHARING SOCIAL Media SOCIAL Networks personal information PRIVACY
下载PDF
The Model Selection of Personal Information Protection in Criminal Procedures
11
作者 吴桐 SU Yilong(Translated) 《The Journal of Human Rights》 2022年第3期462-482,共21页
In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to ac... In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to access data possess no attributes of independent litigation right.The theory of the independent right to personal information lacks a legitimate basis and should not be used as the protection model for personal information in criminal proceedings.Given the particularity of interest measurement and the individuality and negativity of human rights in criminal procedures,the protection of personal information in the criminal procedure should be aimed at the risk of transformation from collective general information to private sensitive information.Specifically,it is the right of personal information not to be excessively collected.Accordingly,the personal information protection should be included in the scope of criminal procedures by the conceptual interpretation of the informational privacy,i.e.,the dependency protection model.In this regard,the criminal proceeding should appropriately introduce the basic principles of personal information protection and the limited general forensic to deal with the impact and challenge of emerging right claim on the criminal justice system. 展开更多
关键词 personal information basic rights personal information Protection Law dependency protection
下载PDF
The Public Law Construction of Government Agencies’Obligations to Disclose When Handling Personal Information in the Digital Age
12
作者 喻文光 郑子璇 SHEN Jinjun(Translated) 《The Journal of Human Rights》 2022年第3期439-461,共23页
The protection of personal information plays an extremely important role in the construction of digital government.The duty to inform is a prerequisite core obligation that the government should fulfill in processing ... The protection of personal information plays an extremely important role in the construction of digital government.The duty to inform is a prerequisite core obligation that the government should fulfill in processing personal information,a concrete expression of the right to self-determination of personal information,and a prerequisite for the right to protection of personal information that works as a fundamental right to defense the intrusion from the government,as well as a procedural regulatory tool to restrain the government’s information power and prevent the risk of infringement.As the rules on the processing of personal information and the duty to inform have both the nature of public law,the government’s processing of personal information is also public law in nature,especially because of the constitutional value and power control function of the duty to inform,the construction of a system for the duty to inform cannot be copied from the rules applicable to private subjects,but should be tailored to the public law characteristics of the government’s processing of personal information,overcoming the shortcomings of the current rough and fragmented legislation,and set up a systematic regulation based on the public law in term of the legal subject,procedure,content,consequences of obligation violations and legal protection. 展开更多
关键词 protection of personal information government’s processing of personal information duty to inform theoretical basis system construction
下载PDF
Deep Bimodal Fusion Approach for Apparent Personality Analysis
13
作者 Saman Riaz Ali Arshad +1 位作者 Shahab S.Band Amir Mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第4期2301-2312,共12页
Personality distinguishes individuals’ patterns of feeling, thinking,and behaving. Predicting personality from small video series is an excitingresearch area in computer vision. The majority of the existing research ... Personality distinguishes individuals’ patterns of feeling, thinking,and behaving. Predicting personality from small video series is an excitingresearch area in computer vision. The majority of the existing research concludespreliminary results to get immense knowledge from visual and Audio(sound) modality. To overcome the deficiency, we proposed the Deep BimodalFusion (DBF) approach to predict five traits of personality-agreeableness,extraversion, openness, conscientiousness and neuroticism. In the proposedframework, regarding visual modality, the modified convolution neural networks(CNN), more specifically Descriptor Aggregator Model (DAN) areused to attain significant visual modality. The proposed model extracts audiorepresentations for greater efficiency to construct the long short-termmemory(LSTM) for the audio modality. Moreover, employing modality-based neuralnetworks allows this framework to independently determine the traits beforecombining them with weighted fusion to achieve a conclusive prediction of thegiven traits. The proposed approach attains the optimal mean accuracy score,which is 0.9183. It is achieved based on the average of five personality traitsand is thus better than previously proposed frameworks. 展开更多
关键词 Apparent personality analysis deep bimodal fusion convolutional neural network long short-term memory bimodal information fusion approach
下载PDF
服装个性化定制中信息技术的应用与展望 被引量:2
14
作者 王静 王小艺 +1 位作者 兰翠芹 许继平 《丝绸》 CAS CSCD 北大核心 2024年第1期96-108,共13页
随着人们个性化需求的不断增加,服装个性化定制已成为时尚发展趋势之一。信息技术在推动服装个性化定制发展中扮演着重要的角色,可以收集和处理用户的个性化信息,并将其转化为具体的设计和生产方案。文章首先对服装产业信息技术的研究... 随着人们个性化需求的不断增加,服装个性化定制已成为时尚发展趋势之一。信息技术在推动服装个性化定制发展中扮演着重要的角色,可以收集和处理用户的个性化信息,并将其转化为具体的设计和生产方案。文章首先对服装产业信息技术的研究进展进行总结,阐述新一代信息技术在服装产业的应用情况;其次分析了信息技术在服装个性化定制领域的应用现状,按照定制流程分别总结信息技术在提高生产效率、降低成本和满足用户需求方面的优势及不足;最后根据目前服装个性化定制在数据共享、协同设计和柔性生产等方面的需求,从建模技术和系统平台构建两个方面对服装个性化定制发展进行展望。 展开更多
关键词 服装产业 信息技术 个性化定制 用户需求 个性化设计与推荐 智能生产
下载PDF
《个人信息保护法》视角下的隐私保护方法设计研究:隐私告知及其对隐私不确定性的影响 被引量:2
15
作者 刘百灵 李洁 +1 位作者 易明 李玉海 《中国图书馆学报》 北大核心 2024年第3期47-66,共20页
要确保社会稳定和数字经济高质量发展,加强移动应用(App)的个人信息保护至关重要。本文以2021年11月施行的《中华人民共和国个人信息保护法》作为缓解用户对个人信息被收集、使用与保护的不确定性的突破口,展开隐私保护方法设计研究。... 要确保社会稳定和数字经济高质量发展,加强移动应用(App)的个人信息保护至关重要。本文以2021年11月施行的《中华人民共和国个人信息保护法》作为缓解用户对个人信息被收集、使用与保护的不确定性的突破口,展开隐私保护方法设计研究。总结归纳《个人信息保护法》中App服务商需要告知用户的隐私相关信息,理解用户对这些隐私相关信息的偏好,据此提出并设计App下载阶段面向用户的隐私告知方法,并通过基于插图的实验方法展开三项研究,系统探究用户在App下载阶段感知的隐私不确定性,以及隐私告知对用户隐私不确定性和App下载意愿的影响机理。研究发现,在中国App应用中,用户普遍存在隐私不确定性,且用户感知的隐私不确定性具有情境依赖性,即在信息敏感度更高的移动应用环境下,用户感知的隐私不确定性更高。本文提出的隐私告知能够有效缓解用户感知的隐私不确定性,并且显著缓解隐私不确定性对App下载意愿的负向影响。 展开更多
关键词 个人信息保护 隐私不确定性 隐私告知 隐私保护
下载PDF
A Personalized Adverse Drug Reaction Early Warning Method Based on Contextual Ontology and Rules Learning
16
作者 Haixia Zheng Wei Wei 《Journal of Software Engineering and Applications》 2023年第11期605-621,共17页
Background: The fatality of adverse drug reactions (ADR) has become one of the major causes of the non-natural disease deaths globally, with the issue of drug safety emerging as a common topic of concern. Objective: T... Background: The fatality of adverse drug reactions (ADR) has become one of the major causes of the non-natural disease deaths globally, with the issue of drug safety emerging as a common topic of concern. Objective: The personalized ADR early warning method, based on contextual ontology and rule learning, proposed in this study aims to provide a reference method for personalized health and medical information services. Methods: First, the patient data is formalized, and the user contextual ontology is constructed, reflecting the characteristics of the patient population. The concept of ontology rule learning is then proposed, which is to mine the rules contained in the data set through machine learning to improve the efficiency and scientificity of ontology rule generation. Based on the contextual ontology of ADR, the high-level context information is identified and predicted by means of reasoning, so the occurrence of the specific adverse reaction in patients from different populations is extracted. Results: Finally, using diabetes drugs as an example, contextual information is identified and predicted through reasoning, to mine the occurrence of specific adverse reactions in different patient populations, and realize personalized medication decision-making and early warning of ADR. 展开更多
关键词 Health information Services personalIZED Contextual Ontology Drug Adverse Reaction Early Warning REASONING
下载PDF
AI人机交互用户个性化推荐中隐私信息披露影响因素研究 被引量:3
17
作者 郝乐 《情报理论与实践》 北大核心 2024年第7期69-80,共12页
[目的/意义]以ChatGPT为代表的生成式人工智能的发展为人机交互带来颠覆性影响,也为数据安全与个人信息保护带来更大的冲击与挑战。对AI人机交互用户个性化推荐中隐私信息披露及个人信息保护问题的研究将具有重要的实践价值与意义。[方... [目的/意义]以ChatGPT为代表的生成式人工智能的发展为人机交互带来颠覆性影响,也为数据安全与个人信息保护带来更大的冲击与挑战。对AI人机交互用户个性化推荐中隐私信息披露及个人信息保护问题的研究将具有重要的实践价值与意义。[方法/过程]文章通过对15名AI人机交互平台用户进行深度访谈,运用扎根理论研究方法进行编码分析,识别AI人机交互用户个性化推荐中隐私信息披露所涉及的个人信息类型和敏感信息类型,并对用户的隐私意识和影响用户隐私信息披露意愿的客观因素进行分析,进而提出加强隐私信息披露风险规制及个人信息安全保障的对策建议。[结果/结论]基于编码结果,将AI人机交互用户个性化推荐中隐私信息披露的影响因素归纳为用户因素、平台因素、社会环境因素、隐私权衡因素4个维度,以此建构理论分析模型,并作为强化AI人机交互用户个性化推荐中隐私信息披露风险规制及个人信息保护的重要指引。 展开更多
关键词 AI人机交互 个性化推荐 隐私信息披露 个人信息保护 影响因素
下载PDF
迈向信任的算法个性化推荐——“一键关闭”的法律反思 被引量:2
18
作者 林嘉 罗寰昕 《编辑之友》 北大核心 2024年第3期79-88,共10页
个性化推荐主要面临威胁人类主体自主性、“信息茧房”与“回音室”效应、大数据“杀熟”方面的质疑。“一键关闭”功能因能够实现隐私个人控制、促进信息自由流通和预防价格歧视而被推崇。然而,用户往往缺少隐私自治能力,个性化推荐造... 个性化推荐主要面临威胁人类主体自主性、“信息茧房”与“回音室”效应、大数据“杀熟”方面的质疑。“一键关闭”功能因能够实现隐私个人控制、促进信息自由流通和预防价格歧视而被推崇。然而,用户往往缺少隐私自治能力,个性化推荐造成群体极化之前首先具有议程凝聚、促进交往的价值,以关闭个性化推荐来解决价格歧视存在目标和手段的错位。“一键关闭”不仅难以符合规制预期,其自身还存在可操作度低和所承载公共价值模糊的弊端。个性化推荐的治理应以算法向善为方向,通过打造以信任为中心的透明可解释、用户交互友好的算法推荐,发挥个性化推荐的公共价值,增进社会福利。 展开更多
关键词 个性化推荐 算法规制 可信算法 隐私个人控制 “信息茧房”
下载PDF
敏感个人信息保护视阈下平台企业数据合规制度要论 被引量:4
19
作者 邹开亮 王馨笛 《北京科技大学学报(社会科学版)》 2024年第2期87-93,共7页
敏感个人信息承载了更高的人格尊严,需要法律对其倾斜保护;平台企业履行数据合规义务,是保护敏感个人信息的关键所在。我国平台企业数据合规制度仍然存在着敏感个人信息数据处理风险评估制度难以落地、敏感个人信息数据处理的外部监管... 敏感个人信息承载了更高的人格尊严,需要法律对其倾斜保护;平台企业履行数据合规义务,是保护敏感个人信息的关键所在。我国平台企业数据合规制度仍然存在着敏感个人信息数据处理风险评估制度难以落地、敏感个人信息数据处理的外部监管制度设计不足、平台企业数据违规的行政责任失之过轻等问题,为完善平台企业数据合规制度以切实保护敏感个人信息,应健全基于敏感个人信息保护的数据风险评估制度。同时确立综合的专职性平台企业数据合规监管机构,严格平台企业数据违规的法律责任。 展开更多
关键词 敏感个人信息 数据合规 比例原则
下载PDF
数字经济时代个人信息法律保护的困境与思考 被引量:1
20
作者 刘志 董翌 《大连大学学报》 2024年第1期74-81,共8页
随着数字经济的不断发展,公民个人信息遭到泄露等不法侵害屡有发生。我国立法在个人信息保护领域有所欠缺,相关部门对其监管不到位,公民维权困难。此外,由于个人信息权属界定不明,个人信息热点问题在立法上回应较为模糊,以及现行相关法... 随着数字经济的不断发展,公民个人信息遭到泄露等不法侵害屡有发生。我国立法在个人信息保护领域有所欠缺,相关部门对其监管不到位,公民维权困难。此外,由于个人信息权属界定不明,个人信息热点问题在立法上回应较为模糊,以及现行相关法律的救济手段尚不足以完全解决纠纷,影响了实践中个人信息的保护效果。为此我国迫切需要细化并完善个人信息保护法律,并加强对个人信息处理全过程的监管,进而构建具有多样化的救济渠道,为保护公众的个人信息合法权益提供法律保障。 展开更多
关键词 数字经济 个人信息 个人信息侵权 个人信息权益
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部