摘要
在网络因素作用下,个人信息的效用可通过再利用活动得到分级与多层发挥,但该活动也给信息安全带来了风险。文章结合我国特有的网络治理模式并借鉴美欧实践经验,立足于分处前端与后端控制地位的再利用者对个人信息双向共享的实情,以信息安全的基本要素——完整性、可靠性、保密性、可控性等为起点衍生出若干规则。我国应通过立法以这些规则统一约束前后端再利用者,从而促使其采取合理技术措施降低风险;同时为满足信息安全的可用性要求,限制部分规则。在限制时,立法者宜考虑两端再利用者在相关控制系统中所处地位的不对等性,作区分式的安排。
Influenced by network factors, the use of personal information can be graded and brought into multi-level play by re-utilization activities, which can also bring risk to information security. In combination with the specific network governance mode in China and by reference to the practical experiences of the USA and European countries, this paper derives several rules based on the actual conditions that the re-utilization personnel in the front-end and back-end control position share personal information bi-di- reetionally, and taking the basic elements of information security such as integrity, reliability, confidentiality and controllability as the starting point. China should, through legislation, use these rules to unify and constrain the re-utifization personnel in the front- end and back-end position so as to urge them to take reasonable technical measures to reduce risk ; and at the same time restrict some rules to meet the usability requirement of information security. During the restriction process, the legislators should make dif- ferent regulations in consideration of the asymmetry of the status of the re-utilization personnel in the 2 positions in the relevant con- trol system.
出处
《情报理论与实践》
CSSCI
北大核心
2013年第12期26-29,38,共5页
Information Studies:Theory & Application
基金
国家社会科学基金西部项目课题"网络环境下个人信息安全危机与法律规制对策研究"的成果
项目编号:12XFX021
关键词
个人信息
信息利用
信息安全
立法
personal information
information utilization
information security
legislation