共查询到19条相似文献,搜索用时 171 毫秒
1.
王融 《信息安全与通信保密》2021,(2)
制定个人信息保护法需要平衡数据创新应用与个人利益保护两种利益。这两种利益并非二元对立、非此即彼,从长远来看,个人信息保护法的制定能够为数字经济产业的健康发展带来充分利好。制定个人信息保护法的工作应以我国实际国情和现有法律制度为基础,以落实个人权利保护与促进数字经济发展为目标,通过进一步完善个人信息定义、明确个人信息处理的合法性基础等方式,勾勒中国方案,贡献中国智慧。 相似文献
2.
赵淑钰 《信息通信技术与政策》2018,(6):34-37
欧盟《通用数据保护条例》(以下简称GDPR)对于数据主体的权利进行了系统、全面的规定,但同时也规定了这些权利适用的例外情形。本文通过对GDPR数据主体权利例外规定的梳理和分析,探究其中的价值考量与选择,以对我国个人信息保护立法和实践工作提供参考。 相似文献
3.
人工智能的发展对数据有较高的依赖度。因个人信息保护立法的加严,对于人工智能产业获取优质数据带来了一定负面影响。在这一背景下,人工智能发展不仅要进行持续技术研发,还需通过数据合规手段提高数据处理的合法性水平。具体而言,可将“数据可用不可见”作为促进人工智能数据合规的突破口,通过数据分类分级夯实人工智能数据合规水平,在执法和司法实践中探索宽窄适中的个人信息范围,并不断通过多种手段对人工智能行业数据处理者利用个人信息的行为给予更充分制度保障。 相似文献
4.
5.
6.
杨婕 《信息通信技术与政策》2018,(6):23-27
为应对大数据时代背景下的个人信息保护困境与挑战,全球个人信息保护立法进程快速推进。随着信息技术的快速发展、经济利益的驱动,以及制度内因和客观外因结合,导致侵犯公民个人信息的现象日益凸显,我国个人信息保护形势严峻。本文从立法、政府、企业以及个人等4个层面出发进行思考,建议全方位地构建我国个人信息保护制度设计,以推动和完善我国的个人信息保护工作。 相似文献
7.
8.
分析当前个人信息保护面临的严峻形势,研究国内外个人信息保护立法、政策发展趋势和特点,研判我国个人信息保护政策法规环境,给出个人信息保护标准体系架构和发展方向。 相似文献
9.
李睿 《信息安全与通信保密》2014,(10):36-39
<正>大数据时代,信息抓取是重要的信息获取方式,但是也让个人信息陷入"裸奔"的尴尬境地。由于我国缺少个人隐私保护的法律传统,对信息抓取技术的法律规制应当在隐私权保护基础法律框架下进行,具体来说应当进一步扩大隐私权客体的范围,明确信息抓取的范围和边界,赋予用户对个人信息的主导权,并注重通过行业自律的方式加强网络环境下用户的隐私权保护。所谓信息抓取是将非结构化的信息抓取出来保 相似文献
10.
11.
Pierre Trudel 《电信纪事》2006,61(7-8):950-974
Actualization of legal approaches are needed to protect effectively the right of privacy. In network environments, data circulates and it is persistent. Trying to prevent misuse by hindering circulation is less and less effective. Legal framework must be reframed in order to improve guarantees of quality of information used to take decisions about individuals. In network universe, information is persistent and circulating. Trying to prevent information circulation just in case that it would be misused is a costly and inefficient approach. Privacy protection is weakened by faulty targeting of privacy law based on approaches prevailing in the 1970s and 1980s. Those approaches deny that it is legitimate for some information to circulate in public spaces, but do not provide effective protection for information truly relevant to privacy. The risk of ending up with a set of rules incompatible with the requirements of government seems sufficiently serious to justify assessment of the current legal framework and approaches that could increase its effectiveness. Given the inflexibility resulting from inappropriate interpretations, both government officials and legislators have had to resort to expedients, such as consent management and legislation establishing exceptions, thereby weakening protection for personal information. Worse, by paying little attention to effective enforcement of privacy legislation in situations where there is great risk of violation, we have failed to strengthen regulations against practices that truly invade privacy. Effective modernization of privacy legislation requires a critical rereading of the legislation’s foundations and how it has been enforced. This demands a lucid evaluation of the contexts in which information circulates. We will only weaken privacy rights if we take refuge in a faint-hearted defence of formal mechanisms inherited from earlier times. If we take that approach, we will increase the risk of ending up with ever more illusory protection. 相似文献
12.
13.
随着计算机软件产业的蓬勃兴起,世界上许多国家尝试通过法律来规范和保护软件的知识产权,中国也制定了相关的法律和条例来保护软件版权,并且把软件正版化知识产权保护提到了议事日程。加大软件版权的保护力度、推进使用正板软件、营造健康规范的市场环境,是实施知识产权战略、促进软件产业发展的重要工作。 相似文献
14.
15.
征信机构在征集、利用个人信用信息的过程中,由于对个人信息的披露易给个人权益造成损害。如何避免个人隐私受到侵犯,是个人征信建设必须要考虑的问题。文中在分析信用立法较完善国家的经验的基础上,对我国征信过程中个人信用信息隐私权的立法提出建议。 相似文献
16.
王文宇 《信息安全与通信保密》2021,(2):21-28
个人信息因其自身携带隐私特性,与每个个体息息相关.个人信息保护不当,影响公众权益、企业利益以及社会秩序.在互联网、大数据、5G万物互联的时代,个人信息被广泛收集和使用,必须妥善解决个人信息保护问题,才能保障整个数据产业健康发展.而现有的个人信息保护方法或技术,不足以应对新形势下的保护诉求.基于数据运营安全的个人信息保护... 相似文献
17.
Wireless Personal Communications - In wireless network, MIMO (multiple inputs multiple output) is an advance antenna in which multiple antennas are employed at basis and target terminals. The... 相似文献
18.
《Spectrum, IEEE》2003,40(5):23-25
Copyright owners concerned that digital technology can allow consumers to quickly make perfect copies of their works have increasingly considered adopting technology to limit that capability-technology that often limits viewing or hearing those works as well. The current fights over digital copyright are basically struggles over two questions. One is: how should the law protect copyright owners who control access to their works with measures such as encryption? The other asks whether you should be held liable for copyright violations if you make a product that can evade those control measures-but that also has legitimate uses. Answers to these questions are now emerging, if fitfully and confusingly, from a host of lawsuits, legislation, and business developments. Those answers will have far-reaching effects on everything from how we purchase music, movies, and other cultural works; what we can do with them after we buy them; and how future consumer electronics products are designed. 相似文献
19.
Currently most existing entity authentication protocols can not guarantee anonymity against compromised verifier in semi-honest model. To solve the question, this paper puts forward a shared certificate entity authentication model, by which some qualities for anonymous entity authentication in semi-honest situation are suggested reasonably. On basis of our proposed model, this paper designs two anonymous entity authentication protocols including an anonymous shared certificate bi-entity authentication protocol and an anonymous shared certificate multi-entity authentication protocol. In proposed protocols it is only single certificate that is used to verify identity correctly and anonymously for legitimate users who has different identity secret. Any compromised verifier has capability to verify correctly whether the user identity is legitimate or not, but it is difficult for it to judge which legitimate user has been verified and distinguish who the verifying user is in particular, therefore attacker does not learn any useful information from legitimate user by spying upon the information of public channel or compromising the certificate. So the security requirements of anonymous entity authentication are achieved successfully, meanwhile the proposed model is more feasibly and effective than zero knowledge protocol in practical applications. 相似文献