|
|
Legal Interest Protection of Data Security in China: Overseas Experience and Legislation |
CAI Shi-lin1,2 |
1. School of Humanities and Arts, China University of Mining and Technology, Xuzhou, Jiangsu, 221116; 2. School of Safety Engineering, China University of Mining and Technology, Xuzhou, Jiangsu, 221116 |
|
|
Abstract Data, the core element for all emerging technologies to evolve from concept to commercialization, is certainly a focus in legislation for all countries across the world. The legal interests of data security include the confidentiality, integrity and usefulness of data. They not only guide criminal legislation and judicature, but also become an important reason to prove that data security requires independent protection. Studying the three typical foreign legislative protection models, we find that they all, in essence, take the independent criminal law protection of data as the legislative motivation, and constantly specify types of data crimes despite differences in form. In comparison, China’s criminal law has many problems regarding the legislation of data security: the legislative concept is outdated, still clinging to the protection system centered on the security of “computer information system”; there are obvious loopholes in punishment, as a consequence the regulations regarding data crimes are neither comprehensive nor coordinated; the confusion in judicial application constitutes obstacles in the legal application of criminal charges. In the future, China’s criminal legislation should be based on the technical characteristics of data and the content of data security legal interests, specifying types of data crime. Besides, we should build an independent and comprehensive regulatory system of criminal law from four perspectives of invasion, destruction, acquisition, and supervisory administration.
|
Received: 17 May 2022
|
|
|
|
|
[1] Spyridon Samonas.The CIA Strikes Back: Redefining Confidentiality, Integrity and Availability in Security[J].Journal of Information System Security,2020,(3):21-45. [2] Dholakia Zwick.Whose Identity Is It Anyway? Consumer Representation in the Age of Database Marketing[J]. Journal of Macromarketing,2004,(1):31-43. [3] 李源粒.网络数据安全与公民个人信息保护的刑法完善[J].中国政法大学学报,2015,(4):64-78+159 [4] Orin S.Kerr.Vagueness Challenges to the Computer Fraud and Abuse Act[J].Minnesota Law Review,2010,(3):485-508. [5] 王华伟. 数据刑法保护的比较考察与体系建构[J].比较法研究,2021,(5):135-151. [6] 孙道萃. 移动智能终端网络安全的刑法应对——从个案样本切入[J].政治与法律,2015,(11):73-87. [7] 杨志琼. 非法获取计算机信息系统数据罪“口袋化”的实证分析及其处理路径[J].法学评论,2018,(6):163-174. [8] 陈兴良. 规范刑法学[M].北京:中国人民大学出版社,2008.925. [9] 皮勇. 论我国《刑法修正案(七)》中的网络犯罪立法[J].山东警察学院学报,2009,(2):15-20. [10] Pike E.R.Defending Data:Toward Ethical Protections and Comprehensive Data Governance[J].Emory Law Journal,2019,(4):687-690. [11] 李源粒.大数据时代数据犯罪的制裁思路[J].中国社会科学,2014,(10):100-120+207. [12] 俞海松. 网络犯罪二十讲[M].北京:法律出版社,2021.30. [13] 刘仁文. 社会治理中的刑事法治新课题[M].北京:中国社会科学出版社,2021.138. [14] 陈兴良. 虚拟财产的刑法属性及其保护路径[J].中国法学,2017,(2):146-172. [15] 刘明祥. 窃取网络虚拟财产行为的定性研究[J].法学,2016,(1):151-160. [16] JD Work.Evaluating Commercial Cyber Intelligence Act-ivity[J].International Journal of Intelligence and Counter-Intelligence,2020,(3):1-8. [17] 孙道萃. 大数据法益刑法保护的检视与展望[J].中南大学学报(社会科学版),2017,(1):58-64. [18] 皮勇. 网络犯罪比较研究[M].北京:中国人民公安大学出版社,2005.100. [19] 石奎. 窃取、收买、非法提供信用卡信息罪的刑法分析[J].吉首大学学报(社会科学版),2014,(4):96-101. [20] 高富平. 数据流通理论数据资源权利配置的基础[J].中外法学,2019,(6):1405-1424. [21] 刘艳红. 积极预防性刑法观的中国实践发展——以《刑法修正案(十一)》为视角的分析[J].比较法研究,2021,(1):62-75. [22] 张明楷. 增设新罪的观念——对积极刑法观的支持[J].现代法学,2020,(5):150-166. [23] 苏桑妮. 从数据载体到数据信息:数据安全法益本体之回归[J].西南政法大学学报,2020,(6):97-108. [24] 劳东燕. 个人数据的刑法保护模式[J].比较法研究,2020,(5):35-50. [25] 杨洸. 数字媒体时代的数据滥用:成因、影响与对策[J].中国出版,2020,(12):3-8. |
|
|
|