ISSN 1008-2204
CN 11-3979/C
WANG Yuan. Personal Information Protection from Perspective of Data Power: Based on the Separation of Personal Information Protection and Privacy Protection[J]. Journal of Beijing University of Aeronautics and Astronautics Social Sciences Edition, 2022, 35(1): 45-57. DOI: 10.13766/j.bhsk.1008-2204.2021.1011
Citation: WANG Yuan. Personal Information Protection from Perspective of Data Power: Based on the Separation of Personal Information Protection and Privacy Protection[J]. Journal of Beijing University of Aeronautics and Astronautics Social Sciences Edition, 2022, 35(1): 45-57. DOI: 10.13766/j.bhsk.1008-2204.2021.1011

Personal Information Protection from Perspective of Data Power: Based on the Separation of Personal Information Protection and Privacy Protection

  • The right to privacy and the right to personal information protection are totally different kind of rights: communicative action draws the boundary of private and public, while information processing behavior is the core of regulating personal information. The former is based on civility rules and requires participants to be equal and voluntary, while the latter relies on fair information practice principles, which aims at the power imbalance between the processors and the information subjects. However, there is a long-term interconnection between these two concepts. That is why the first version of fair information practice principles follows the right protection mode. The right protection path defaults that information processing behavior is legal and legitimate as long as it meets the fair practice standards, which avoids the debate on the good and evil of information processing itself. In order to achieve substantive justice, we should abandon the right-based protection mechanism such as privacy protection, which focuses on giving more rights to information subjects, and replace it with the protection mechanism centered on restricting the data power and algorithm power of information processors. The effect of power constraints can be achieved through three mechanisms: power restriction, power confrontation and integrity guidance.
  • loading

Catalog

    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return