Study on the Behavioral Logic of Personal Information Protection in the View of Constitution

Article Preview

Abstract:

This paper follows the personal information and constitution, the right basic of personal protection, personal information protection status in our country and the logic of that constitution protects personal information sequentially, and then the approach adoption and basic idea of our citizen personal information protection are raised in the constitutional vision. The legal right measure is confirmed as the most basic principles of legislation, enforcement and judicial protection act by using right analysis method. Researched that the standards is citizen personal information act logic which is protected by country are power and balance of rights.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 971-973)

Pages:

1768-1771

Citation:

Online since:

June 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Allen Anita l, Privacy-as-Date Control: Conceptual, Practical, and Moral Limits of the Paradigm, Conn. L. Rev. 32(2000).

Google Scholar

[2] Bennett Colin J, Computers, Personal Data, And Theories of Technology: Comparative Approaches to Privacy Protection in the 1990s, Science, Technology, & Human Values 16(1991).

DOI: 10.1177/016224399101600103

Google Scholar

[3] David L. Hudson, The Right to Privacy, Chelsea House, (2009).

Google Scholar

[4] James P. Nehf, Recognizing the Societal Value in Information Privacy, Washington Law Review, vol. 78(2003).

Google Scholar

[4] REN Jian-dong, Something about problems in the protection of networkresources: technology, law and morality, Journal of Beijing University of Posts Telecommunications, vol. 7(2), pp.1-5, (2005).

Google Scholar

[5] Zhao Bingzhi. Yu Zhigang, Computer Crimes and the Legislative and Theoretical Responses thereto, Chinese Legal Science, vol. 1, pp.148-163, (2001).

Google Scholar

[6] CHEN Li, Constructing a Coupling Mechanism for the Technique Standard of Network Security and the Law Norms, Journal of Fujian Public Safety College, vol. 3, pp.86-89, (2006).

Google Scholar

[7] ZHAO Hong-bin, Research on the system structure of network safety standard and its countermeasure, Information Technology, vol. 28(6), pp.93-97, (2004).

Google Scholar

[8] JI Run-bo, Analyses of actualities and countermeasures of network security in china, Agriculture Network Information, vol. 2, pp.28-30, (2005).

Google Scholar

[9] Wu Yanbo; Xiang Dawei, Threats and protecting strategies of network security, Journal of Hubei Public Security College, vol. 6, pp.79-81, (2004).

Google Scholar