Review and Path Optimization of the Application of “Informed Consent” Rules in Personal Data Protection
Abstract
The institutional design of the individual-centered “informed consent” rules ignores the standardization requirements for data processing at the social level. The neglect of data processors leads to vague regulations on their behavioral guidelines, the data processors are evasive in terms of notification content, and present the form of information in an impersonal way. Also, digital technology has become a convenient tool for evading or even violating the law, which will create obstacles to the application of rules and may even deviate from the original intention of legislation. In the application process of the “informed consent” rules, data processors should first respect the individual, provide sufficient and accurate notification and ensure the validity of the data subject’s consent. Individuals should pay attention to their important role in the implementation of the law and promote the implementation of the “informed consent” rule. In addition, differentiation and application of opt-in and opt-out mechanisms, as well as a correct understanding of exceptions to the “informed consent” rule will help balance the relationship between individual data protection and the social processing of data.
Keywords
Full Text:
PDFReferences
Baek, Y. M., Kim, E., & Bae, Y. (2014). My privacy is okay, but theirs is endangered: Why comparative optimism matters in online privacy concerns. Computers in Human Behavior, 34(2), 48-56.
Barocas, S., & Nissenbaum, H. (2014). Big data’s end run around procedural privacy protections. Communications of the ACM, 57(11), 32.
Calo, M. R. (2012). Against notice skepticism in privacy (and elsewhere). Notre Dame Law Review, 87(3), 1027-1033.
Cao, D. (2019). Research on my country’s social media privacy policy text and personal information protection level. (Master’s thesis, China University of Political Science and Law).
Fan, H. Q., & Zeng, Z. (2016). Research on privacy policy statements of search engine companies: Taking Baidu and Google as examples. Journal of Chongqing University of Posts and Telecommunications (Social Science Edition), 4, 58.
Feng, K. (2020). Inspection and reflection on the personal information ‘opt-out’ mechanism. Global Law Review, 4.
Huang, Q. (2014). Research on the relationship between information asymmetry and market efficiency. (Doctoral dissertation, Shandong University).
Lewis, S. D., Colvard, R. G., & Adams, C. N. (2008). A comparison of the readability of privacy statements of banks, credit counseling companies, and check cashing companies. Journal of Organizational Culture, Communications and Conflict, 12, 23-28.
Li, Y. (2014). On the protection of consumers’ personal information: Focusing on consent after notification. Theoretical Monthly, 8, 124-128.
Li, Z. R., Tian, Y. C., Zhang, W. Z., & Liu, Y. (2020). Research on privacy policy of China mobile applications. Cyberspace Security, 6, 63.
Long, H. Y. (2019). Research on personal information protection on my country’s websites: Analysis of privacy policies based on 97 websites. (Master’s thesis, Chongqing University).
Maier-Schoenberg, V., & Cukier, K. (2013). The era of big data: Big changes in life, work and thinking. (Y. Y. Sheng & T. Zhou, Trans.). Zhejiang, China: Zhejiang People’s Publishing House. (Original work published 2013).
Shao, G. S., Xue, F. W., Zheng, Y. Y., & Zheng, Y. (2018). Research on the personal information protection level of my country’s websites: An empirical analysis of 500 websites in my country based on the “Network Security Law.” News Reporter, 3, 63.
Steinfeld, N. (2016). I agree to the terms and conditions: (How) do users read privacy policy online? An eye-tracking experiment. Computers in Human Behavior, 55, 992-1000.
Tan, Y. G., & Qian, X. P. (2006). Recommendations for improving the privacy protection policy of my country’s websites. Modern Intelligence, 1, 216.
Weber, J. W. (2008). The impact of e-commerce privacy policy statements on consumer willingness to disclose personal information. Dissertations and Theses-Gradworks, 78-89.
Zhu, H., Zhang, M. G., & Lu, Y. H. (2018). An empirical study on social media users’ intention to read privacy policies. Journal of Information Science, 4, 370.
Zhu, Y. (2017). Research on my country’s mobile app privacy protection policy: Analysis based on 96 mobile application apps. Journal of Jinan University (Philosophy and Social Sciences Edition), 12, 111.
DOI: http://dx.doi.org/10.3968/13333
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 Higher Education of Social Science
This work is licensed under a Creative Commons Attribution 4.0 International License.
Please send your manuscripts to hess@cscanada.net,or hess@cscanada.org for consideration. We look forward to receiving your work.
Articles published in Higher Education of Social Science are licensed under Creative Commons Attribution 4.0 (CC-BY).
HIGHER EDUCATION OF SOCIAL SCIENCE Editorial Office
Address: 1055 Rue Lucien-L'Allier, Unit #772, Montreal, QC H3G 3C4, Canada.
Telephone: 1-514-558 6138
Website: Http://www.cscanada.net Http://www.cscanada.org
E-mail: caooc@hotmail.com; office@cscanada.net
Copyright © 2010 Canadian Research & Development Center of Sciences and Cultures