首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 546 毫秒
1.
梅文娟 《现代法学》2014,36(5):128-135
我国刑事诉讼法未就未成年人刑事判决宣告方式做特别规定,这一法律漏洞致使未成年人刑事判决只能适用成年人模式即公开宣告,但公开宣判方式不符合未成年人隐私保护和少年司法矫正之宗旨,因此,急需通过法律修订以填补法律漏洞。修改时,需将未成年人刑事案件判决宣告和判决文书网络公开之法律规定作为一个整体予以考量。为了未成年人隐私保护、公众知情权和司法监督等诸价值之平衡,未成年人刑事判决应当有限公开,即未成年人刑事判决宣告原则上实行不公开主义,无罪判决可申请公开;未成年人刑事判决文书采用隐去未成年人个人信息的网络有限公开模式。  相似文献   

2.
This paper is based on the premise that corrupt uses of public, civic networks ostensibly built and legitimated for their altruistic purposes can be a source of network subversion and corruption. Open, public, civic networks of South Korea seem to be systemic and organizational facilitators of criminality instead of assumptions of criminality being related only to closed, criminal cultures or anomie. We test whether increasing participation in the major social networks of Korean civic life – networks based on geography (common ancestral hometown), family (extended kinship), and education (alumni) – are associated with increasing penchants for self-admitted criminal collusion, in this case, bribery. We argue that due to relational association or within-network favoritism the increase in multiple networks per individual generates increasing social capital of access, information, and trust which may be subverted toward some form of private criminal collusion.  相似文献   

3.
Internet of things (IoT) is changing the way data is collected and processed. The scale and variety of devices, communication networks, and protocols involved in data collection present critical challenges for data processing and analyses. Newer and more sophisticated methods for data integration and aggregation are required to enhance the value of real-time and historical IoT data. Moreover, the pervasive nature of IoT data presents a number of privacy threats because of intermediate data processing steps, including data acquisition, data aggregation, fusion and integration. User profiling and record linkage are well studied topics in online social networks (OSNs); however, these have become more critical in IoT applications where different systems share and integrate data and information. The proposed study aims to discuss the privacy threat of information linkage, technical and legal approaches to address it in a heterogeneous IoT ecosystem. The paper illustrates and explains information linkage during the process of data integration in a smart neighbourhood scenario. Through this work, the authors aim to enable a technical and legal framework to ensure stakeholders awareness and protection of subjects about privacy breaches due to information linkage.  相似文献   

4.
As global digitalisation of information and interconnecting technologies along with new marketing practices and business processes vastly increase the opportunities for data collection, storage, usage and delivery, there is a corresponding increase in consumer expectations of data privacy. These expectations must be met if business organisations are to promote consumer trust and confidence and maintain their overall competitiveness in a global market. It goes without saying that information is the most valuable business asset and “privacy is good business and information can be the basis of bigger business”. The need to protect data privacy has long been recognised and implemented by major trading nations. Surprisingly, Singapore as a financial centre and nation aspiring to be a trusted data hosting hub has been slow in enacting specific data protection laws. The first piece of legislation that has emerged is a light-touch baseline framework applicable to all organisations except the public sector. This article considers the new legislation from the business perspective and the implications for private sector business organisations facing the challenges of compliance.  相似文献   

5.
为应对现代化进程中的社会风险,安抚公众对风险的恐慌情绪,公共空间大规模监控随之诞生,并迅速在现实社会和网络空间中全面运用。公共治理不能取安全保障而舍隐私保护,公共空间大规模监控的运用并非以牺牲隐私权为代价,而是在保障安全法益的同时兼顾隐私法益的保护。在此"既保障安全,又保护隐私"的法理念下,公共空间大规模监控的运用体现了风险治理从个人本位走向社会本位的转变趋势,并促进了个人信息保护从自主支配到有序共享的逻辑转换。为寻求安全保障与隐私保护之间的平衡路径,在公共空间合理运用大规模监控措施,就必须加强信息收集、存储、使用的阶段性控制,建立个人信息合理使用制度,实现个人信息的有序共享。  相似文献   

6.
田刚 《法学论坛》2021,36(2):66-75
《数据安全法(草案)》的发布是数据安全作为独立法益的立法宣示,基于数据安全对个体利益、公共安全和国家安全的重要价值,刑法有必要将其纳入保护范围。现行刑法对数据安全的保护是通过制裁信息犯罪间接实现的,由于刑法视阈下的信息和数据存在着本质性差异,未来刑法必然要建立新的数据犯罪罪名体系,实现数据安全领域刑法保护的大规模扩张。为了避免刑法扩张演化成违背谦抑性的公权力滥用,必须进行"合边界性审视",确保其不会突破刑法自身的边界。由于数据安全法益自身无法通过"法益原则"实现刑法边界划定功能,有必要引入"广义危害性原则",在数据安全领域的刑法保护扩张之前,划定扩张的合理边界。  相似文献   

7.
王维 《政法学刊》2006,23(5):80-84
刑事诉讼中,国家追求的目标是追究和惩罚犯罪,而对被害人来说可能更关注自身受损利益的恢复和补偿。然而,我国的刑事诉讼制度对保障被害人权利方面的立法非常有限,在司法实践中被害人的权利往往得不到保护。应借鉴西方国家维护被害人求偿权的立法和实践,结合我国刑事立法和司法实际,主要从公诉案件被害人的权利救济切入,从立法上完善刑事被害人对犯罪追诉权的法律保护,在司法上完善执行阶段对刑事被害人权利的保护的相关措施。  相似文献   

8.
Data protection and privacy gain social importance as technology and data flows play an ever greater role in shaping social structure. Despite this, understanding of public opinion on these issues is conspicuously lacking. This article is a meta-analysis of public opinion surveys on data protection and privacy focussed on EU citizens. The article firstly considers the understanding and awareness of the legal framework for protection as a solid manifestation of the complex concepts of data protection and privacy. This is followed by a consideration of perceptions of privacy and data protection in relation to other social goals, focussing on the most visible of these contexts–the debate surrounding privacy, data protection and security. The article then considers how citizens perceive the ‘real world’ environment in which data processing takes place, before finally considering the public's perception and evaluation of the operation of framework against environment.  相似文献   

9.
The right to privacy has been developed through judicial practice and has evolved from “the protection of the right to reputation” to “privacy interest” then to “privacy right.” The Civil Code of the People’s Republic of China (2020) clarifies the right to information privacy and the right to personal information as two independent personality rights and establishes a privacy priority protection mechanism for private information in civil law. The comparative efficiency of the right to personal information may mean that the protection of the right to information privacy is weakened or even replaced by the right to personal information. The uncertainty and fragmentation of private information also creates a wide gray space for judicial decisions. The development from traditional privacy right to information privacy right and personal information right is generally positive and shows the active legal response to the protection of private information in multiple ways. However, clarifications and systematization are required to increase the effectiveness of such protections.  相似文献   

10.
张宏 《河北法学》2006,24(9):151-154
由于基因科学迅速发展以及基因技术的广泛使用,对个人基因信息的法律保护问题日显突出.从民法上的隐私权出发,提出基因隐私权的概念,并继而探讨基因隐私权与其他权利,尤其是基因知情权的冲突.通过比较美国与我国对基因隐私权的法律保护,提出了对基因隐私权进行系统法律保护的立法建议.  相似文献   

11.
Public opinion on criminal sentencing and aims of punishment has been surveyed mostly in Western countries. In non-Western countries, especially Islamic societies, little has been published, at least in Western journals, on these issues. In fact, no published study examining public views toward criminal sentences and the aims of punishments in Islamic societies may be located in any major database of Western literature. As a result many questions like the relationship between perceived purpose of criminal punishment and its severity and the interactions between the belief in Islam and its Shari’a (Islamic culture) and punitive attitude to criminality have remained unasked. Therefore, the meaning and motive behind the death penalty and other severe forms of punishment in Islamic countries remains unknown to scholars, whether within or outside these countries. This paper introduces, first, Shari’a sentencing laws and practices in some Islamic societies and then, by drawing on a survey administered in Iran in 2008, tries to show and explain the variations in attitudes to Shari’a criminal laws and different forms of punishment, mostly based on Shari’a, across different genders and professions (judges, lawyers, students, Tulab and police).  相似文献   

12.
Personal information protection and privacy interact in diverse ways, especially in the contemporary information age. Although books and articles have focused on this topic, the new tendencies of worldwide legislation and judicial practice bring challenges, as the legal construction of personal information protection and privacy differs from culture to culture and time to time. In 2017, the General Provisions of the Civil Law of the People's Republic of China (“the General Provisions of the Chinese Civil Code” hereafter)1 (expired) addresses the legal concepts of personal information protection and the right to privacy simultaneously, to which this article refers as the dual model, differing from the one-dimensional mode of privacy protection before. Subsequently, the “The Right to Privacy and the Protection of Personal Information,” a chapter of the newly issued Civil Code of the People's Republic of China's (“the Chinese Civil Code” hereafter), ascertains the dual model and details related provisions. It has been dubbed a landmark ruling of China's personal information protection, greatly boosting the modernization of China's civil system.Despite the many articles that discuss approaches to China's civil protections, little attention has been given to the fundamental question concerning what exactly encompasses the personal information protection and privacy to which these laws refer. Based on the regulations and applicability of the General Provisions of the Chinese Civil Code and the Chinese Civil Code, this paper explores the legal construction of personal information protection and privacy under Chinese legal orders, including the differences, similarities, and interplay between the two rights. By distinguishing the legal value, contents and remedial approaches, this paper concludes that the two rights are distinct but overlap. On one side, personal information protection is elevated to the status of a separate civil right in the legal context of China, rather than part of privacy. On the other side, tailored regulations should be establish according to the criteria of the nature of information, the extent of information processing, and the elements of damage when confronted with overlaps in the two rights in judicial practice. Thus, this paper provides a perspective from which to clarify the approaches to civil protection of personal information and privacy in China and a reference model for enactment of the Chinese Personal Information Protection Law in the future.  相似文献   

13.
14.
The study seeks to analyse the structure and “modus operandi” of crime networks in the Czech Republic′s Vietnamese diaspora. Vietnamese criminality in the country has roots in communist era. After the democratic changes at the end of 80s, it has been representing dynamically developing phenomena, penetrating not only the local Vietnamese emigrant community but the state apparatus as well. Actually, the Vietnamese criminal underground lives in a specific symbiosis with the local Asian emigrant community, where legal and illegal activities are frequently merged together. “Respectable men” who have features of both legal businessmen and criminal bosses are the main actors in these processes. They create parallel power structures in closed worlds of Asian emigrants.  相似文献   

15.
徐跃飞 《时代法学》2006,4(1):44-49
先行行为之作为义务只能是法律义务,不能是道德义务,否则,就会扩大犯罪范围,违反罪刑法定原则。先行行为必须限定一定的条件才负有作为义务。不作为犯罪中的先行行为可以是过失犯罪行为,但不包括故意犯罪行为。正当行为只可能引起道德上或民事上的义务,不能引起刑法上的作为义务。正当行为不能成为不作为犯罪的先行行为,否则,刑法体现的价值是对非法行为的保护。  相似文献   

16.
反公开诉讼中的保护机制探析   总被引:1,自引:0,他引:1  
伏创宇 《时代法学》2009,7(2):63-68
反公开诉讼不同于信息公开诉讼和普通的行政诉讼,其为信息原始提供人反对行政机关的信息公开决定而提起的诉讼。保障隐私权、拥有商业秘密的权利与保障知情权、公共利益是一个硬币的两面,反公开诉讼的目的在于保护第三人的隐私权和拥有商业秘密的权利。现有的《信息公开条例》和《行政诉讼法》已经提供了反公开诉讼的部分法律依据,但有关启动的条件、审查标准和判决种类都缺乏明确的法律规定和司法实践中的经验。对反公开诉讼中的保护机制的探讨有着重要的理论和实践意义。  相似文献   

17.
Although the protection of personal data is harmonized within the EU by Directive 95/46/EC and will be further harmonized by the General Data Protection Regulation (GDPR) in 2018, there are significant differences in the ways in which EU member states implemented the protection of privacy and personal data in national laws, policies, and practices. This paper presents the main findings of a research project that compares the protection of privacy and personal data in eight EU member states: France, Germany, the UK, Ireland, Romania, Italy, Sweden, and the Netherlands. The comparison focuses on five major themes: awareness and trust, government policies for personal data protection, the applicable laws and regulations, implementation of those laws and regulations, and supervision and enforcement.The comparison of privacy and data protection regimes across the EU shows some remarkable findings, revealing which countries are frontrunners and which countries are lagging behind on specific aspects. For instance, the roles of and interplay between governments, civil rights organizations, and data protections authorities vary from country to country. Furthermore, with regard to privacy and data protection there are differences in the intensity and scope of political debates, information campaigns, media attention, and public debate. New concepts like privacy impact assessments, privacy by design, data breach notifications and big data are on the agenda in some but not in all countries. Significant differences exist in (the levels of) enforcement by the different data protection authorities, due to different legal competencies, available budgets and personnel, policies, and cultural factors.  相似文献   

18.
在数据这一新型生产要素中,位置数据的应用日益广泛,不仅"基于位置的服务"雨后春笋般涌现,政府也基于位置数据创新社会治理方式、辅助案件侦破。然而,位置数据获取技术的进步及智能手机(作为现代最主要的定位工具)的普及,使得公民私密生活受到无处不在的位置监控威胁。位置信息的敏感性、位置获取技术的侵入性、公民对位置信息的隐私期待合理性以及位置信息保护的价值,足以让我们反思当前"过度"及不受实质限制的位置信息采集利用行为。位置信息的法律保护需要公法与私法的合力。就公法保护而言,应重视"个人信息自决权",遵守比例原则,创新令状制度;就私法保护而言,应选择恰当的请求权路径、审视数据控制者或处理者的相关义务以及对位置信息的收集利用予以限制。  相似文献   

19.
The Court of Appeal in the recent decision of Google Inc v Judith Vidal Hall1 has made a number of remarkable rulings in the area of privacy. An important aspect of this decision is that it clarified the legal foundation in which an action for unauthorised disclosure of private information is found. However, the decision itself is not without flaws. This paper seeks to analyse potential problems with the action being classified as a tort as well as the scope of misuse of private information being a form of privacy protection.  相似文献   

20.
This paper is a survey on the information practices of Chinesewebsites. Three groups of Chinese commercial websites were selectedand their information practices were analysed and compared withthe generally accepted principles of online information practices.Survey results indicated that Chinese websites collected a vastamount of personal data through various forms. The percentageof websites posting privacy disclosures was comparatively small.For those sites with privacy policy or discrete privacy statement,their information practices did not accord with generally acceptedprinciples of information practices. The paper presents recommendationsfor China to deal with such a legal issue that makes nationalborders meaningless.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号