首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The recently passed European Directive on the Protection of Personal Data aims to harmonize European data protection law at a higher level of protection than exists now. It represents a European consensus on a standard for personal privacy and a model for countries without data protection laws. The protracted process for agreement and ratification, however, has produced a document with many derogations and ambiguities, reflecting the wider moves towards 'subsidiarity' within the European Union. Of concern to North America is the stipulation that transborder data flow may not be permitted unless the receiving country can demonstrate an 'adequate' level of protection. While the process through which this provision will be interpreted and applied is so far found to be complicated and unclear, nevertheless European authorities will be reluctant to tolerate 'data havens,' a fact that should concern North American business that relies on the unimpeded flows of personal data from and to Europe. Neither Canada nor the United States can claim 'adequate' data protection according to the European standard. However, Canadian efforts through the Canadian Standards Association and the Federal Information Highway Advisory Council signal an attempt to fashion a more comprehensive policy framework for privacy than the more incremental and reactive approach of the United States. This divergence is explained by key cultural, economic, and political factors within Canada, which have caused a different reaction to the extraterritorial effects of the European Union's Data Protection Directive.  相似文献   

2.
Europe's proposed Data Protection Regulation is expected to make data protection impact assessment (DPIA) mandatory, a development that could impact hundreds of thousands of organizations (both governmental and private sector) in Europe, as well as non-European entities offering their wares and services there. This article reviews the DPIA provisions outlined in the new regulation. For the nuts and bolts of a privacy impact assessment (PIA) methodology, Europe could select features from the PIA methodologies used in Australia, Canada, Ireland, New Zealand, the United Kingdom, and the United States, the countries with the most experience in PIA. A European Commission (EC)-funded project, called PIAF, reviewed these various methodologies and proposed an “optimized” PIA for Europe (and elsewhere) based on the best practices of the aforementioned countries. Based on these best practices, this article outlines a 16-step PIA process. It argues that while some organizations may regard a PIA as a hassle, in fact, a PIA offers many benefits, as spotlighted in the article.  相似文献   

3.
The widespread use of the computer and the rapid growth of telecommunications technology have sparked debate on the privacy implications of computerized records. Regulations and government programs implemented in response to public pressure for greater protection of records could significantly affect the information system manager and any individual who has personal data recorded in a computerized file. This article considers the implications of possible privacy policy initiatives in the United States in light of Swedish experience.  相似文献   

4.
随着智慧医疗的不断发展与普及,RFID作为其重要技术所引发的安全与隐私问题越来越突出,但目前国内缺乏针对具体安全与隐私威胁的保护方案。首先从一般到特殊分析智慧医疗中RFID安全与隐私风险,然后分析了RFID技术中的伦理及法律,最后比较目前RFID安全防护技术的优缺点与美国、欧盟等国际上对RFID安全与隐私的保障实践。得出RFID安全与隐私全生命周期保护模型SRCE,并对模型中的各个阶段进行了详细说明,可作为政府、医院或相关部门开展 RFID安全与隐私保护的参考和借鉴。  相似文献   

5.
穆兴天  马文华 《情报杂志》2021,40(4):126-131
[目的/意义]大数据时代,美国情报机构监视恐怖嫌疑分子数据作为维护美国国家安全的重要方面,效果显著。然而,实践中出现"国家安全"和"个人数据安全""个人隐私权"相冲突的问题,对之研究具有重要的镜鉴价值。[方法/过程]以美国《涉外情报监控法》第702条为研究样本,实证分析了个人隐私被侵犯的原因,如即情报搜集工作监督不严、问责不力等。规范分析了平衡"国家安全"和"个人数据安全""个人隐私权"之间的法律对策。[结果/结论]研究认为,设立情报监督机构,规制数据使用目的和范围,加大问责力度是平衡国家安全和公民个人数据隐私权的积极面向。  相似文献   

6.
网络隐私第三方认证机制初探   总被引:4,自引:1,他引:3  
研究表明,由于担心个人信息得不到有效的保护,人们对使用基于互联网的各种服务心存疑虑,严重影响到电子商务的发展.旨在给电子商务的发展营造宽松的发展环境,在网络隐私法律框架之外,以美国为代表的国家产生了基于市场运作的网络隐私第三方认证.为了减少网络用户担心隐私遭到侵犯的不安全感,不少网站加入网络隐私认证计划.本文介绍了网络隐私第三方认证运行机制,以及在保护个人隐私方面存在的不足之处,并提出完善第三方认证机制的策略,以期对我国的个人信息保护提供新的思路.  相似文献   

7.
Whether the Internet Protocol address should be seen as personal data or not remains a contested issue with regard to information privacy. This article explores the question by looking at the technical attributes of the Internet Protocol address, European Union (EU) and U.S. case law, and how the EU's advisory data protection body, the Article 29 Working Party, and some of the world's most influential information and communication technology (ICT) companies consider the IP address. The notion of contextual integrity is then used to show that information privacy regulation must stipulate concrete technical mandates instead of guiding principles, contrary to the ideal of technology neutrality in Internet regulation.  相似文献   

8.
陈昊  李文立 《科研管理》2018,39(6):48-56
人们在享受移动设备和服务的同时往往忽视信息保护,从而导致隐私泄露等信息安全问题。本研究整合保护动机理论和预期后悔理论,探讨驱动个人保护动机产生的认知和情绪要素。采用问卷调查法收集240份有效样本,并通过结构方程模型进行检验。结果表明隐私关注是保护动机产生的重要影响要素,担忧情绪部分中介隐私关注与保护动机之间的关系;而感知规避能力与保护动机之间的关系被预期后悔情绪完全中介。  相似文献   

9.
IntroductionGeneral Data Protection Regulation (GDPR) focuses on important elements of data ethics, including protecting people’s privacy, accountability and transparency. According to the GDPR, certain public institutions are obliged to appoint a Data Protection Officer (DPO). However, there is little publicly available data from national EU surveys on DPOs. This study aimed to examine the scope of work, type of work, and education of DPOs in institutions in Croatia.Materials and methodsDuring 2020-2021, this cross-sectional study surveyed DPOs appointed in Croatia. The survey had 35 items. The questions referred to their appointment, work methods, number and type of cases handled by DPOs, the sources of information they use, their experience and education, level of work independence, contacts with ethics committees, problems experienced, knowledge, suggestions for improvement of their work, changes caused by the GDPR, and sociodemographic information.ResultsOut of 5671 invited DPOs, 732 (13%) participated in the study. The majority (91%) indicated that they could perform their job independently; they did not have prior experience in data protection before being appointed as DPOs (54%) and that they need additional education in data protection (82%).ConclusionsMost DPOs indicated that they had none or minimal prior experience in data protection when they were appointed as DPO, that they would benefit from further education on data protection, and exhibited insufficient knowledge on basic concepts of personal data protection. Requirements for DPO appointments should be clarified; mandatory education and certification of DPOs could be introduced and DPOs encouraged to engage in continuous education.  相似文献   

10.
储节旺  李安 《现代情报》2016,36(11):21-26
大数据浪潮在全球范围内呈愈演愈烈的趋势。既有的隐私乱象在灵活多变的大数据影响下,会受到更多的挑战,但同时,大数据也为个人隐私的妥善处理与保护带来了多种可能,危机与机遇并存。全文从新的视角出发,运用哲学的思维,采取以定性论述为主,定量建模为辅的方法,重新探讨信息的时效性,并针对现有的隐私问题逐一进行探究,并分别提出相应的对策。隐私问题不仅关乎个人,更关乎国家,良好的隐私意识和智慧保护技术都将保证现有的隐私问题最终得以妥善解决。  相似文献   

11.
Ethics and Information Technology - Contemporary privacy theories and European discussions about data protection employ the notion of ‘personal information’ to designate their areas of...  相似文献   

12.
基于全球城市科技创新竞争力指标体系和1006个50万人以上城市样本数据,利用统计分析、地理探测器等方法深入分析中国城市科技创新竞争力的总体特征和驱动因素,并与全球、美国、欧盟、巴西、印度、俄罗斯进行对比分析,得出如下结论:一是中国头部城市科技创新竞争力已经呈现突围态势,但整体处于全球中等偏下水平;二是中国城市科技创新竞争力的空间分异程度基本与全球平均水平持平,首位度高于美国、欧盟;三是全球联系、社会包容、经济活力、环境韧性是影响中国城市科技创新竞争力的主导因素;四是在提升中国城市科技创新竞争力方面,经济活力和社会包容之间的相互促进作用相对最强,而经济活力和环境韧性相对最弱。  相似文献   

13.
The paper has three parts. First, a survey and analysis is given ofthe structure of individual rights in the recent EU Directive ondata protection. It is argued that at the core of this structure isan unexplicated notion of what the data subject can `reasonablyexpect' concerning the further processing of information about himor herself. In the second part of the paper it is argued thattheories of privacy popular among philosophers are not able to shed much light on the issues treated in the Directive, whichare, arguably, among the central problems pertaining to theprotection of individual rights in the information society. Inthe third part of the paper, some suggestions are made for a richerphilosophical theory of data protection and privacy. It is arguedthat this account is better suited to the task of characterizingthe central issues raised by the Directive.  相似文献   

14.
Browsing the Web gives one the heady feeling of walking without footprints in cyberspace. Yet data surveillance can be both ubiquitous and transparent to the user. Can those who browse the Web protect their privacy? And does it matter if they cannot? I offer answers to these questions from the American legal tradition. The American legal tradition focuses on a right to privacy, rather than a need for data protection. To answer these questions I begin by delineating the differences among privacy, security, and anonymity. I then discuss what information is transferred during Web browsing. I describe some of the available technology for privacy protection, including public and private key cryptography and Web proxies. I then describe the American tradition of privacy in common, statutory, and constitutional law. With the support of this tradition, I close by arguing that although privacy in Web browsing has no current legal protection in the United States, the right to privacy in the analogue equivalents has been recognized in the American legal tradition.  相似文献   

15.
个人数据是用来直接或间接识别自然人情况的数据资料,个人数据构成个人隐私的重要内容。政府机关必须通过法定程序与方式收集涉及个人隐私的信息,并注意保护当事人的隐私权利。我国应借鉴美国的立法保护模式,既要制定《政府信息公开法》,又要制定《隐私权法》。  相似文献   

16.
Browsing the Web gives one the heady feeling of walking without footprints in cyberspace. Yet data surveillance can be both ubiquitous and transparent to the user. Can those who browse the Web protect their privacy? And does it matter if they cannot? I offer answers to these questions from the American legal tradition. The American legal tradition focuses on a right to privacy, rather than a need for data protection. To answer these questions I begin by delineating the differences among privacy, security, and anonymity. I then discuss what information is transferred during Web browsing. I describe some of the available technology for privacy protection, including public and private key cryptography and Web proxies. I then describe the American tradition of privacy in common, statutory, and constitutional law. With the support of this tradition, I close by arguing that although privacy in Web browsing has no current legal protection in the United States, the right to privacy in the analogue equivalents has been recognized in the American legal tradition.  相似文献   

17.
We use the legal framework of captive audience to examine the Federal Trade Commission 2012 privacy guidelines as applied to mobile marketing. We define captive audiences as audiences without functional opt-out mechanisms to avoid situations of coercive communication. By analyzing the current mobile marketing ecosystem, we show that the Federal Trade Commission's privacy guidelines inspired by the Canadian “privacy by design” paradigm fall short of protecting consumers against invasive mobile marketing in at least three respects: (a) The guidelines overlook how, in the context of data monopolies, the combination of location and personal history data threatens autonomy of choice; (b) the guidelines focus exclusively on user control over data sharing, while ignoring control over communicative interaction; and (c) the reliance on market mechanisms to produce improved privacy policies may actually increase opt-out costs for consumers. We conclude by discussing two concrete proposals for improvement: a “home mode” for mobile privacy and target-specific privacy contract negotiation.  相似文献   

18.
摘 要:植物新品种保护制度是农业知识产权中最重要的一项制度之一,研究影响植物新品种保护制度变迁的供求因素具有重大意义。本文在梳理植物新品种保护制度的历史演变与发展现状基础上,总结国际植物新品种保护联盟(UPOV)不同时期植物新品种保护制度的发展特征,进一步从制度变迁视角分析美国、日本、欧洲植物新品种保护制度的发展经验。研究发现,农业生产要素和植物新品种相对价格的变动引致植物新品种保护制度的产生;育种技术进步和新品种市场规模的扩大推动政府对新品种保护制度不断改革完善;美国和日本、欧洲的法律渊源不同,但各国法律和新品种规范性行为准则的改变促使政府对新品种保护制度不断调整;政府对新品种保护制度的设计成本和制度安排实施的预期成本越低,越有利于新品种保护制度的推行。基于此,本文提出中国植物新品种保护制度建设应适应农业发展、主动保证科技型种业企业规模发展的需要,提高法律位阶、有效完善品种鉴定与检测认证的法规体系,落实司法保护、加大种业知识产权法定范围内惩罚性赔偿等政策启示。  相似文献   

19.
祝阳  李欣恬 《情报杂志》2021,40(1):165-170
[目的/意义]大数据时代将人类社会带入了数据利用的黄金时代,与此相伴的个人隐私安全问题,成为数据价值开发及政府数据开放的瓶颈。文章旨在解决大数据时代的个人数据隐私安全问题,充分保障公民隐私权。[方法/过程]在已有研究基础上,梳理大数据发展对个人隐私的挑战并分析产生影响的原因;按个人信息敏感程度与数据生命周期两个维度,构建大数据时代个人数据隐私安全保护的分析框架;从技术、政府、信息业者、公民四个方面,分析各环节应当采取的针对性保护措施。[结果/结论]不同类型的个人数据的信息敏感度及信息价值不同,在数据生命周期的各个阶段,需要采取差异化的保护策略。  相似文献   

20.
基于欧洲电信标准化协会中5G标准必要专利相关数据,从5G标准必要专利披露数量、地理位置分布、技术领域分布3个方面比较分析中国与美国、欧盟、日本和韩国等国家或地区之间的差异。研究发现,(1)中国5G标准必要专利披露数位居第一,但是5G技术涉及标准数量与欧盟相比仍有差距;(2)中国5G标准必要专利地理位置布局以本国为主,市场分布不广;(3)中国的5G技术优势主要集中在无线通信网络、信息传输等方面,美国、欧盟等国家或地区的技术优势不仅包括无线通信、信息传输等领域,还涵盖了传感器、芯片等关键技术。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号