摘要(Abstract):
With the rapid development of the Internet and information technology,cyber information security has become closely related to both national and individual rights and interests.However,hackers'behaviors and certain states'behaviors of violating other states'national and individual security information
关键词(KeyWords):
Abstract:
Keywords:
基金项目(Foundation):
作者(Author): 张新宝;Wang Hao;
Email:
参考文献(References):
- 1 Zhou Xi,On the Legal Significance of“Cloud Computing”and Legal Countermeasure to Cyber Information Security,23(4)Journal of Chongqing University of Posts and Telecommunications(Social Science Edition)39,39(2011).
- 2 LI DECHENG,ON THE CYBER PRIVACY PROTECTION SYSTEM,at 34-40(Founder of China Publishing House,2001).Other methods also include the abuse of cookies and abuse of surveillance software.
- 3 Li Na,“Prism Event”Exposes Privacy Crisis in the Era of“Big Data”,31(18)Science and Technology Review 9,9(2013).
- 4 Zhou Qi,The Influence of the“Prism Event”on the United States and International Society,7Chinese Cadres Tribune 37,37(2013).
- 5 GUO YU,ON THE PERSONAL DATA PROTECTION LAW,at 246(Peking University Press,2012).
- 6 Yin Jianguo,The Enlightenment of the United States'Cyber Information Security Governance Mechanism for China,2 Studies in Law and Business 138,138-146(2013).
- 7 ZHAO SHUIZHONG,WHO HAVE INVADED YOUR CYBER PRIVACY,at 249-253(Electronic Industry Press,2004);see also ZHANG XINBAO,THE LEGAL PROTECTION OF THE RIGHT TO PRIVACY,at 144-147(The Mass Press,2004).
- 8 Xiao An,Three Angles of Snowden Event,13 World Knowledge 28,28-29(2013.)
- 9 Gu Huaxiang and An Na,Comparation of Foreign Network Security Measurements by Law and Its Revelation,2 Journal of Shanghai University of Political Science and Law(The Rule of Law Forum)112,115(2011).
- 10 The Convention on Cybercrime drawn up by the Council of Europe opened for signature on 23December 2001 and entered into force on 1 July 2004.See Zhou Wen,The New Development and International Criminal Law,3 Law Review 79,79-87(2002).
- 11 Song Yuping,Globalization and Globalization Governance-On the Convention on Cybercrime,1 Social Sciences in Xinjiang 84,84-91(2013).
- 12 Ma Minhu and Zhao Chan,The Review of European Union Information Security Law Frame,26(11)Hebei Law Science 152,152-156(2008).
- 13 Zhang Hengshan,On the Contents and Means of Cyber Control in the United Kingdom,3 Journal of Chongqing Technology and Business University Social Science Edition 16,16-20(2010).
- 14 Yang Junzuo,The Governance Model of the Contents of Cyber Information in Developed Countries,4Jurist1 30,130-137;Jiang Yaoping,Li Yijun and Wang Haiwei,Comparative Research on Strategic Planning National Cyber Information Security,1 Manage Science 66,66-71(2004);and Pi Yong,On the Cyber-Terrorism Crime and Its Countermeasure,Z1 Wuhan University Journal(Humanity Sciences)582,582-586(2004).
- 15 The General Assembly of the United Nations,Developments in the Field of Information and Telecommunications in the Context of International Security(A/RES/53/70),4 January 1999.
- 16 THE INTERNATIONAL CODE OF CONDUCT FOR INFORMATION SECURITY,THE MINISTRY OF FOREIGN AFFAIRS OF THE PEOPLE's REPUBLIC OF CHINA,at http://www.fmprc.gov.cn/mfa_chn/ziliao_611306/tytj_611312/zcwj_611316/t858317.shtml(Last visited on 21 October,2013).
- 17 Li Zhenshan,On the Several Legal Issues of Cyber Information Security,1 Network Security Technology and Application 49,49-51(2010).
- 18 From the perspective of domestic laws,VII of the Amendment VII to the Criminal Law of the People's Republic of China states tha,t“an Article is inserted after Article 253 of the Criminal Law as Article253 (A):“Where any staff member of a state organ or an entity in such a field as finance,telecommunications,transportation,education or medical treatment,in violation of the state provisions,sells or illegally provides personal information on citizens,which is obtained during the organ's or entity's performance of duties or provision of services,to others shall,if the circumstances are serious,be sentenced to fixed-term imprisonment not more than three years or criminal detention,and/or be fined.Whoever illegally obtains the aforesaid information by stealing or any other means shall,if the circumstances are serious,be punished under the preceding paragraph.Where any entity commits either of the crimes as described in the preceding two paragraphs,it shall be fined,and the direct liable person in charge and other directly liable persons shall be punished under the applicable paragraph.”In addition,the 30th Session of the Standing Committee of the Eleventh National People's Congress on December 28,2012,the Decision of the Standing Committee of the National People's Congress on Strengthening Information Protection on Networks was adopted.
- 19 Xu Liping,Prism Event Demonstrates the Necessity of Establishing the Great Wall for the Internet,19 Communications World 11,11(2013).
- 20 Cong Peiying,The Enlightenment of International Cyber Security Co-operation for China,4 Journal of Guangdong University of Foreign Studies 76,76-79(2012).
- 21 Liu Fan,The Development of International Laws and Regulations on Anti-terrorist and Financing,1Wuhan University Journal 12,12-15(2013).
- 22 Yu Xiaoqiu,The Tendency and Features of Global Cyber Information Security,2 Contemporary International Relations 23,23-27(2002).
- 23 Shen Yi,Protecting Safety by Strength or Achieving Safety by Governance?—Two Cyber Safety Strategies and China's Choice,3 Foreign Affairs Review 140,140-148(2013).
- 24 WANG TIEYA,INTERNATIONAL LAW,at 37-41(Law Press,1995).
- 25 ON THE LEGAL ISSUES OF TRANSNATIONAL CORPORATION,at 410-424(Yu Jinsong ed.,Law Press,2008).
- 26 See Article 17 of the International Covenant on Civil and Political Rights and PROJECT GROUP OF INTERNATIONAL HUMAN RIGHTS LAW COURSE,THE COURSE OF INTERNATIONAL HUMAN RIGHTS,at 203-204(China University of Political Science and Law Press,2002).
- 27 ZHAO SHUIZHONG,WHO INVADE YOU CYBER PRIVACY,at 294(Electronic Industry Press,2004).
- 28 An important way to achieve the value of international law is to strengthen international co-operation.See GAO LANJUN,ON THE VALUE OF INTERNATIONAL LAW,at 165-175(Wuhan University Press,2006).
- 29 ZHU WENQI AND LI QIANG,INTERNATIONAL TREATY LAW,at 353-366(China Renmin University Press,2008).
- 30 For example,there are stipulation in the International Covenant on Civil and Political Rights on“private life”,supra note 26,199-205.
- 31 The convention can clarify national liability forms.At present,the Articles on Responsibility of States for Internationally Wrongful Acts is still in the phase of draft.The convention can borrow the stipulations in the Articles on Responsibility of States for Internationally Wrongful Acts,and clarify national liability forms,such as apology and damages.
- 32 Supra note 25,409.
- 33 CHEN YONGMEI,ON THE LEGAL ISSUES OF THE TRADE POLICY REVIEW MECHANISM(China Procuratorial Press,2009).