Abstract:Compared with the traditional management regulation,cyberspace tends to be a more cooperative and multiple form of governance.Personal information protection implies both information protection and freedom,with the law being the lowest requirement and authority guarantee.China should try to form the integrate law which is dominated by public law means,whilst they pay attention to all kinds of choices on the market.China should not neglect the encouragement of social norms including individual commitment and industry self-discipline.In addition to these,they must also carry out the comprehensive and entire life cycle design by certifications,exam the signs or technology measures and organization measures following the dynamic technology development so as to develop the systematic construction of personal information protection and promote the coordinate development of personal information protection and data economy.
[1]SAMUELSON P.Privacy as intellectual property[J].Stanford law review,2000,52 (5):1132. [2]BIBAS S A.A contractual approach to data privacy[J].Harvard journal of law and public police,1994,17 (2):591-592. [3]郭瑜.个人数据保护法研究[M].北京:北京大学出版社,2012. [4]WALDMAN A E.Privacy,notice,and design[J].Stanford technology law review,2018,21 (1):104. [5]劳伦斯·莱斯格.代码2.0:网络空间中的法律[M].李旭,沈伟伟,译.北京:清华大学出版社,2018. [6]LESSIG L.The law of the horse:what cyber law might teach[J].Harvard law review,1999,113 (2):501. [7]李雨峰,邓思迪.互联网平台侵害知识产权的新治理模式——迈向一种多元治理[J].重庆大学学报 (社会科学版),2021 (2):161. [8]周汉华.探索激励相容的个人数据治理之道——中国个人信息保护法的立法方向[J].法学研究,2018 (2):6. [9]COHEN J E.DRM and privacy[J].Berkeley technology law journal,2003,18 (2):603. [10]RUBINSTEIN I S,GOOD N.Privacy by design:a counterfactual analysis of google and facebook privacy incidents[J].Berkeley technology law journal,2013,28 (3):1333. [11]齐爱民,张哲.识别与再识别:个人信息的概念界定与立法选择[J].重庆大学学报 (社会科学版),2018 (2):126. [12]MULLIGAN D K,KING J.Bridging the gap between privacy and design[J].University pennsylvania journal constitutional law,2012,14 (4):1002. [13]EVERSON E.Privacy by design:taking ctrl of big data[J].Cleveland state law review,2016,65 (1):27. [14]PARDAU S L,EDWARDS B.The FTC,the unfairness doctrine,and privacy by design:new legal frontiers in cybersecurity[J].Journal business and technology law,2017,12 (12):265. [15]林洁琼. “数据坟墓”第一案!德国柏林数据保护机构因 “数据坟墓”开出1450万欧元的巨额罚单[EB/OL]. (2019-11-10)[2021-02-18].https://mp.weixin.qq.com/s/Iz0zsI37sUxJsNpzwv-dEQ. [16]LEVIN A.Privacy by design by regulation:the case study of ontario[J].Canadian journal of comparative and contemporary law,2018 (4):140. [17]丁晓东.个人信息权利的反思与重塑——论个人信息保护的适用前提与法益基础[J].中外法学,2020 (2):339. [18]丁晓东.个人信息私法保护的困境与出路[J].法学研究,2018 (6):205. [19]莫里斯·E·斯图克,艾伦·P·格鲁内斯.大数据与竞争政策[M].兰磊,译.北京:法律出版社,2019. [20]张新宝. “普遍免费”+“个别付费”:个人信息保护的一个新思维[J].比较法研究,2018 (5):6. [21]ELVY S A.Paying for privacy and the personal data economy[J].Columbia law review,2017,117 (6):1369. [22]SMITH B L.The third industrial revolution:policy making for the internet[J].Columbia science and technology law review,2002 (3):18. [23]谢青.日本的个人信息保护法制及启示[J].政治与法律,2006 (6):156. [24]Federal Trade Commission. Protecting consumer privacy in era of rapid change:recommendations for businesses and policymakers[EB/OL].(2021-03-26)[2021-06-25].https://www.ftc.gov/sites/default/files/documents/reports/federal-trade-commission-report-protecting-consumer-privacy-era-rapid-change-recommendations/120326privacyreport.pdf. [25]北京奇虎科技有限公司与腾讯科技 (深圳)有限公司不正当竞争纠纷二审判决书[Z]. (2013)民三终字第5号. [26]黄细江.涉企业数据竞争行为的法律规制[J].知识产权,2021 (2):58. [27]JASMONTAITE L,KAMARA I,FORTUNA G Z,et al.Data protection by design and by default:framing guiding principles into legal obligations in the GDPR[J].European data protection law review,2018,4 (2):178. [28]MARCUS D J.The data breach dilemma:proactive solutions for protecting consumers'personal information[J].68 duke law journal,2018,68 (3):593. [29]弓永钦.个人信息保护问题研究:基于跨境电子商务[M].北京:人民日报出版社,2018.