Submitted:
19 February 2024
Posted:
19 February 2024
You are already at the latest version
Abstract
Keywords:
1. Foreword
1.1. Research background
1.2. Purpose and significance of the study
2. The basic concept of data protection
2.1. Definition of data protection
2.2. The importance of data protection
2.3. Basic principles of data protection
3. The legal framework for data protection
3.1. Overview of China’s data protection legal system
3.2. Overview of the international data protection legal system
3.3. The development trend of the legal framework for data protection
4. Strengthen the research on data protection technology
4.1. Research status of the legal boundary of data protection
4.2. Main contents of the research on the legal boundary of data protection
4.3. Methods and techniques of legal boundary research of data protection
5. Research significance of the legal boundaries of data protection
5.1. The guiding role of the legal boundary research of data protection on the practice of data protection in China
5.2. The influence of the legal boundary of data protection on the international legal system of data protection
5.3. The promoting role of data protection legal boundary research on the development of China’s data industry
6. Challenges and prospects of the legal boundary research on data Protection
6.1. Challenges of the legal boundary research of data protection
6.2. The future prospect of the legal boundary research of data protection
7. The conclusion
References
- Guo Feng, Huang Xiaoyi. The Internet Contract and the Construction of International Rules in cyberspace [J]. Information Security in China, 2020 (1): 30-33.
- Guo Chengzhi. Inspection and assumption of the personal data protection framework in China [J]. Journal of Tianjin Sino-German University of Applied Technology, 2020 (2): 119-123.
- Guo Wenqiang. On the legal positioning and protection path of data [J]. Journal of Mudanjiang University, 2018,27 (12): 54-56 + 60.
- Zhang Liping, Zhang Ying. Personal information security protection under the background of Big Data: Research on Legal Prevention [J]. Modern Commerce and Industry, 2018,39 (16): 126-127.
- Gu Liping, Fan Shu. Data ownership and use boundaries study [J]. Scientific Research Information Technology and Application, 2018,9 (3): 34-39.
- Peng-Ningbo. Review of domestic data privacy protection studies [J]. Library, 2021 (11): 69-75.
- Wang Xudong, Ye Shuiyong, Zhu Bing, et al. Research and application of data security protection technology in the process of data governance [J]. Journal of State Grid Technical College, 2019,22 (1): 46-50.
- Ruan Huiling. Research on the legal protection of personal data [J]. Legal system and Society, 2018 (23): 225-226.
- Anonymous. Journal of Modern Communication University of China [J]. Modern Communication (Journal of Communication University of China), 2020,42 (11): 2.
- Xu Hanming, Sun Yixiao, Wu Yunmin. Research on the legal protection of data property rights [J]. Comparison of economic and social systems, 2020 (4): 183-191.
- Li Huaisheng. Criminal law boundaries of data openness [J]. Information Security in China, 2018 (12): 105-106.
- Xiang Liling, Gao Qianyun. Analysis of the characteristics, basic attributes and contents of personal data rights in the era of big data [J]. Information Theory and Practice, 2018,41 (9): 45-50 + 36.
- Li Liangwei. The feasibility analysis of data right confirmation was conducted by referring to the intellectual property legislation model [J]. Henan Science and Technology, 2021,40 (32): 154-158.
- Ren Ying. Turn to data legislation: from data rights entry to data legal interests protection [J]. Politics and Law, 2020 (6): 135-147.
- Li Yuan. Research on the basic principles of legal protection of personal information in the Era of Big Data [J]. Legal system and Society, 2020 (23): 10-11.
- Miri. Research on the legal control of data acquisition and operation on privacy impact [J]. Journal of Southeast University (Philosophy and Social Sciences edition), 2018,20 (S2): 96-99.
- Yang Bo, Dai Rui, Chen Wu. Research on data security and backup technology in electric power communication system [J]. Automation Technology and Applications, 2018,37 (6): 36-41 + 59.
- Cheng Lin, Huang Guangyu, Wang Zheng, et al. Research on big data pricing mechanism and transaction mode based on blockchain [J]. National circulation economy, 2019 (22): 132-135.
- Zuo Weimin. Towards Big Data legal research [J]. Legal Studies, 2018,40 (4): 139-150.
- Li Yongming, Dai Minmin. Research on the right attribute and legal protection of big data products [J]. Journal of Zhejiang University (Humanities and Social Sciences edition), 2020,50 (2): 26-37.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).