個人信息網(wǎng)絡(luò)侵權(quán)責(zé)任研究
[Abstract]:Personal information means information associated with a particular person that can be identified individually or against other available data, including, but not limited to, the name, occupation, workplace, work cycle, working mode, contact number of a natural person, Spending power, shopping tendency, operating habits, hobbies and so on. With the rapid development of big data technology, people enjoy the benefits of information exchange and high-speed transmission, but also suffer the personal information leakage which carries personal privacy and personality characteristics, especially in the field of the Internet. Personal information, which can reflect individual representations and help depict individual personality portraits, often plays a crucial role in unfamiliar social situations, as opposed to acquaintances' social situations. Therefore, once personal information with the symbolic meaning of personality is collected, utilized or processed by the lawless elements, it will make the free will of the owner of personal information and the personal and property security of the individual information under threat. Therefore, we must restrict the infringement of personal information right by law. In the current legislation of our country, the extension and connotation of the right to personal information have not been clearly defined, and the legal provisions for the protection of personal information have not yet formed a unified system. In the departmental regulations and judicial interpretation, the imperfection of the legal protection of personal information is more prominent. This article first uses the concept analysis method, carries on the elaboration to the personal information right, then embarks from the network infringement behavior manifestation, carries on the analysis to the network infringement general theory. Combined with the Tort liability Law, the relevant laws and regulations related to the protection of personal information and the relevant provisions of judicial interpretation, this paper makes a theoretical study on the tort liability of personal information network. Secondly, combined with the domestic and foreign legislative status, using the comparative research and literature research method, this paper analyzes the constitutive requirements and liability assumption of personal information network tort liability, in order to identify and regulate the personal information network tort liability. Thirdly, the particularity and problems of tort liability of personal information network are abstracted according to the above theoretical analysis and the phenomenon in practice. Finally, in view of the related difficulties and problems, this paper puts forward the relevant suggestions to improve the protection of personal information network infringement in our country.
【學(xué)位授予單位】:貴州民族大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號】:D923
【相似文獻】
相關(guān)期刊論文 前10條
1 千一;;網(wǎng)絡(luò)侵權(quán)末日何時來到[J];計算機安全;2002年09期
2 李曉嵐;當(dāng)你遭遇網(wǎng)絡(luò)侵權(quán)——運用法律應(yīng)對網(wǎng)絡(luò)侵權(quán)的思考[J];網(wǎng)絡(luò)與信息;2002年11期
3 譚云明;當(dāng)前網(wǎng)絡(luò)侵權(quán)的原因透視和對策分析[J];中南民族大學(xué)學(xué)報(人文社會科學(xué)版);2003年05期
4 王志強;;網(wǎng)絡(luò)侵權(quán)背后的思考[J];信息網(wǎng)絡(luò)安全;2006年12期
5 張樹啟;;淺談大學(xué)生網(wǎng)絡(luò)侵權(quán)問題[J];商業(yè)時代;2007年19期
6 田園;;網(wǎng)絡(luò)侵權(quán)及其對策研究[J];現(xiàn)代情報;2010年05期
7 郭曉偉;;大學(xué)生網(wǎng)絡(luò)侵權(quán)的原因透視和預(yù)防策略[J];科教導(dǎo)刊(中旬刊);2012年12期
8 程菲菲;;探析新時代中網(wǎng)絡(luò)侵權(quán)的法律問題[J];企業(yè)導(dǎo)報;2012年22期
9 劉賓;;網(wǎng)絡(luò)侵權(quán)責(zé)任研究[J];法制與社會;2013年08期
10 馬超;;淺析網(wǎng)絡(luò)侵權(quán)[J];法制博覽(中旬刊);2014年03期
相關(guān)重要報紙文章 前10條
1 北京國理律師事務(wù)所 劉政;新技術(shù)進步,別成為網(wǎng)絡(luò)侵權(quán)的入口[N];中國工商報;2014年
2 洪樂風(fēng);遏制“網(wǎng)絡(luò)侵權(quán)”絕非阻塞言路[N];人民日報;2014年
3 張洋;網(wǎng)絡(luò)侵權(quán)亟須法律懲治[N];人民日報;2014年
4 周童;打擊網(wǎng)絡(luò)侵權(quán)不簡單[N];計算機世界;2006年
5 記者 韓為卿;河南鄭州3天查三起網(wǎng)絡(luò)侵權(quán)案[N];中國新聞出版報;2007年
6 朱勇邋葉明e,
本文編號:2185816
本文鏈接:http://sikaile.net/falvlunwen/minfalunwen/2185816.html