全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2017 

网络监控法之现代化与中国进路
The Modernization of Cyber Surveillance Law and China′s Route

DOI: 10.15896/j.xjtuskxb.201702009

Keywords: 网络监控法律,法律现代化,安全优先,隐私
cyber surveillance law
,law modernization,security priority,privacy

Full-Text   Cite this paper   Add to My Lib

Abstract:

随着法理念向“安全优先,兼顾隐私和产业利益”更新,全球范围内的网络监控法律正经历现代化的范式革命,其动因和发展趋势对中国网络监控法的现代化具有重要意义。网络监控法的现代化是理论、技术、社会和经济等因素共同推动的结果;各国选择法治化模式,明确通讯业者的协助义务和政府责任,以优先保障安全利益。中国面临着与世界同步的安全威胁,但是网络监控法现代化程度相对不足,需要通过法治化路径确立专门统一的网络监控法律体系,一方面需要明确通讯业者的协助义务,建立宽严有别的授权制度,以保障网络监控能力和国家安全;另一方面需要引入对网络监控的司法监督等国际通行准则,以兼顾隐私和通讯自由。
With the legal concept renewing to be "security priority, balancing privacy and industry interests", the modernization paradigm revolution of cyber surveillance law worldwide is triggering. Its motivation and development trend are of great significance to the modernization of China′s cyber surveillance law. The modernization of cyber surveillance law is promoted simultaneously by theoretical, technical, social and economic factors; countries choose the rule of law model, and clarify the carrier′s assistance obligations and government responsibility to firstly assure security interests. China confronts the security threats sync with the world, but the modernization of China′s cyber surveillance law is inadequate. Therefore, this paper suggests that China should establish a unified and special cyber surveillance system by rule of law:for one thing, China′s legislation should specialize the assistance obligations of communication operator and establish the wide-strict authorization system in order to assure the cyber surveillance capabilities and national security; for another, China′s legislation should assimilate the judicial supervision for cyber surveillance corresponding with international accepted norms in order to protect the privacy and the freedom of communication

References

[1]  [1]CASMAN B S. The Right to Privacy in Light of the Patriot Act and Social Contract Theory[D]. Las Vegas:University of Nevada, 2011:21.
[2]  [2]WILLIAM J B. The Ethics of Computer Network Attack[J]. Parameters, 2001(31):4-7.
[3]  [5]MCGUIRE M R. Putting the ′Cyber′ into Cyberterrorism:Re-reading Technological Risk in a Hyperconnected World[M]. New York:SpringerNew York, 2014:63-83.
[4]  [6]朱永彪.国际网络恐怖主义研究[M].北京:中国社会科学出版社, 2014:80-84.
[5]  [11]VAGLE J L. Furtive Encryption:Power, Trust, and the Constitutional Cost of Collective Surveillance[J]. Indiana Law Journal, 2015 (1):121-130.
[6]  [7]乔治?巴萨拉.技术发展简史[M].周广发,译. 上海:复旦大学出版社, 2000:120.
[7]  [8]BRENNER S W. Cyberterrorism:How Real is the Threat?[J]. Media Asia, 2002 (3):149-154.
[8]  [21]SHACKELFORD S. Human Rights and Cybersecurity Due Diligence:A Comparative Study[J]. University of Michigan Journal of Law Reform, 2017(7):16-23.
[9]  [22]王?h. 试论网络数据本地化立法的正当性[J]. 西安交通大学学报(社会科学版), 2016(1):54-61.
[10]  [12]SCHWARTZ P M. Reviving Telecommunications Surveillance Law[J]. The University of Chicago Law Review, 2008, 75(1):287-315.
[11]  [13]GRADY M F, PARISI F. The Law and Economics of Cybersecurity:An Introduction[J]. Social Science Electronic Publishing, 2004 (3):17-20.
[12]  [3]蔡文之.网络:21世纪的权力与挑战[M].上海:上海人民出版社,2007:95-99.
[13]  [4]劳伦斯?莱斯格.代码[M]. 李旭,译. 北京:中信出版社,2004:4.
[14]  [9]马民虎,王新雷.试论商用密码管制法之动态国家利益观[J]. 信息网络安全, 2009(3):47-49.
[15]  [10]DEMPSEY J. Is Law Enforcement Going Dark Because of Encryption?[N/OL].[2016-04-10]. <a href="http://www.connexions.org/CxLibrary/CX18715.htm">http://www.connexions.org/CxLibrary/CX18715.htm</a>.
[16]  [14]王新雷.  英网络监控立法建立双锁授权机制[N].法制日报,2015-11-17 (10).
[17]  [17]艾永明. 中国法律现代化的几个问题[J]. 社会科学, 2005(11):52-59.
[18]  [18]霍布豪斯.自由主义[M].朱曾汶,译.北京:商务印书馆,1996:70.
[19]  [19]马民虎, 李江鸿. 我国信息安全法的法理念探析[J]. 西安交通大学学报(社会科学版), 2007(3):74-80.
[20]  [20]KULESZA J. USA Cyber Surveillance and EU Personal Data Reform:PRISM′s Silver Lining?[J]. Groningen Journal of International Law, 2014 (2):73-89.
[21]  [15]DIFFIE W, LANDAU S. Privacy on the Line:the Politics of Wiretapping and Encryption[M]. Cambridge:MIT press, 2010:326.
[22]  [16]The European Union Agency for Network and Information Security. Securing Personal Data in the Context of Data Retention:Analysis and Recommendation[R/OL]. [2016-08-20]. <a href="https://www.enisa.europa.eu/publications/securing-personal-data-in-the-context-of-data-retention">https://www.enisa.europa.eu/publications/securing-personal-data-in-the-context-of-data-retention</a>.   

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133