The Logic Elucidation and System Construction of Categorical and Hierarchical Data Protection ——Centering on the Recognition and Protection of Important Data
Abstract:With the rise of digital economy and the development of technology,the demand for data protection and utilization is more diversified and the form of data circulation and processing is increasingly complex,so the traditional“uniform”data security protection model is inadequate and the traditional information security protection paradigm can hardly cope with the new data security risks arising from the large-scale data circulation and processing.On the basis of changing the data security protection concept and updating the protection paradigm,the categorical and hierarchical data protection system adopts differentiated and targeted protection measures for data of different importance and risk levels,which can cope with the new data security risks arising from large-scale data circulation and processing,and take into account the both needs of data security protection and data utilization.Taking graded protection of cybersecurity as the convergence and inspiration,drawing on the practical experience of categorical and hierarchical data protection,specify basic principles and key elements of data classification and grading,establishing data categorical and hierarchical standards,and establishing data categorical and hierarchical protection system framework,to give full effect of categorical and hierarchical data protection system to balance data security and utilization and promote the development of digital economy.
袁康, 鄢浩宇. 数据分类分级保护的逻辑厘定与制度构建——以重要数据识别和管控为中心[J]. 中国科技论坛, 2022(7): 167-177.
Yuan Kang, Yan Haoyu. The Logic Elucidation and System Construction of Categorical and Hierarchical Data Protection ——Centering on the Recognition and Protection of Important Data. , 2022(7): 167-177.
[1]马长山.智能互联网时代的法律变革[J].法学研究,2018(4):20-38. [2]余盛峰.全球信息化秩序下的法律革命[J].环球法律评论,2013,35(5):106-118. [3]高宁,刘洋.数字研发系统中结构化与非结构化数据的融合及实现[J].计算机应用,2017,37(S2):241-243. [4]OTTO P N,ANTON A I,BAUMER D L.The choice point dilemma:how data brokers should handle the privacy of personal information[J].IEEE security & privacy magazine,2007,5(5):15-23. [5]KUEMPEL A.The invisible middlemen:critique and call for reform of the data broker industry[J].Northwestern journal of international law & business,2016,36(1):207-234. [6]BAMBAUER D E.Privacy versus security[J].Crim.L.& Criminology,2013,103(3):667-684. [7]European Commission.Impact assessment Accompanying the directive of the European parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data[EB/OL].[2021-09-16].https://www.europarl.europa.eu/cmsdata/59702/att_20130508ATT65856-1873079025799224642.pdf. [8]European Commission.Unleashing the potential of cloud computing in Europe[EB/OL].(2012-09-27)[2021-09-16].https://www.pdpjournals.com/docs/88053.pdf. [9]高富平.数据流通理论——数据资源权利配置的基础[J].中外法学,2019(6):1405-1424. [10]国家互联网信息办公室官网:习近平总书记在网络安全和信息化工作座谈会上的讲话[EB/OL].(2016-04-25)[2021-09-16].http://www.cac.gov.cn/2016-04/25/c_1118731366.htm. [11]许可.数据爬取的正当性及其边界[J].中国法学,2021(2):166-188. [12]中国信息通信研究院安全研究所.大数据安全白皮书(2018年)[R/OL].(2018-07-09)[2021-09-16].http://www.caict.ac.cn/kxyj/qwfb/bps/201807/P020180712523226672500.pdf. [13]刘金瑞.数据安全范式革新及其立法展开[J].环球法律评论,2021(1):5-21. [14]Federal Information Security Management Act of 2002,44 U.S.C,amended by the Federal Information Security Modernization Act of 2014,44 U.S.C.[EB/OL].(2014-12-08)[2021-09-16].https://www.congress.gov/bill/113th-congress/senate-bill/2521/text. [15]观察者网:美国健身APP泄露军事基地信息[EB/OL].(2018-01-29)[2021-09-16].https://baijiahao.baidu.com/s?id=1590915305773868990&wfr=spider&for=pc. [16]韩洪灵,陈帅弟,刘杰,等.数据伦理、国家安全与海外上市:基于滴滴的案例研究[J].财会月刊,2021(15):13-23. [17]吴沈括,崔婷婷.美国受控非密信息管理制度研究[J].中国信息安全,2019(5):87-91. [18]ROSE P.FIRRMA and national security[EB/OL].(2018-08-21)[2021-09-16].https://ssrn.com/abstract=3235564 or http://dx.doi.org/10.2139/ssrn.3235564. [19]洪延青.网络安全国家标准研究项目研究报告:数据安全管理下的数据分类研究[R/OL].(2020-05-15)[2021-09-16].https://mp.weixin.qq.com/s/bzyveak3oC8VGHf4y6sD8A. [20]梅夏英.数据的法律属性及其民法定位[J].中国社会科学,2016(9):164-183,209. [21]许可.数据安全法:定位、立场与制度构造[J].经贸法律评论,2019(3):52-66. [22]黄道丽.《数据安全法(草案)》的立法背景、立法定位与制度设计[J].信息安全与通信保密,2020(8):9-15. [23]刘金瑞.聚焦维护国家安全定位 健全数据安全管理制度——完善《数据安全法(草案)》的若干建议[J].中国信息安全,2020(7):60-63. [24]马海群,张涛.从《数据安全法(草案)》解读我国数据安全保护体系建设[J].数字图书馆论坛,2020(10):44-51. [25]周亚超,左晓栋.我国重要数据识别方法研究[J].网络信息法学研究,2020(2):11-20. [26]刘金瑞.关于《个人信息和重要数据出境安全评估办法(征求意见稿)》的意见建议[J].信息安全与通信保密,2017(6):72-78. [27]SNCHEZ B.The evolution of the reasonable security standard in the US context[EB/OL].(2020-06-04)[2021-08-10].https://iapp.org/news/a/the-evolution-of-reasonable-security-derived-from-ftc-orders-and-state-legal-developments/. [28]洪延青.“以管理为基础的规制”——对网络运营者安全保护义务的重构[J].环球法律评论,2016(4):20-40. [29]望娅露.在落实数据分类分级保护中数据标记方法的现状分析与建议[EB/OL](2021-09-09)[2021-09-14].https://mp.weixin.qq.com/s/_rNkl7ZXFN7Xth5qDPBhHQ. [30]薛亦飒.多层次数据出境体系构建与数据流动自由的实现——以实质性审查制度变革为起点[J].西北民族大学学报(哲学社会科学版),2020(6):64-74.