HOME
*





Personal Information Protection Law Of The People's Republic Of China
The Personal Information Protection Law of the People's Republic of China (Chinese: 中华人民共和国个人信息保护法; pinyin: ''Zhōnghuá rénmín gònghéguó gèrén xìnxī bǎohù fǎ'') referred to as the Personal Information Protection Law or ("PIPL") protecting personal information rights and interests, standardize personal information handling activities, and promote the rational use of personal information. It also addresses the transfer of personal data outside of China. The PIPL was adopted on August 20, 2021, and is effective November 1, 2021. It is related to, and builds on top of both China's Cybersecurity Law ("CSL") and China's Data Security Law ("DSL"). The PIPL is similar to, and partly based on, the European Union's GDPR. An officiaEnglish versionfor reference only was published on December 29, 2021. History On August 20, 2021, the Standing Committee of the 13th National People's Congress passed the Private Information Protection Law or ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

National People's Congress
The National People's Congress of the People's Republic of China (NPC; ), or simply the National People's Congress, is constitutionally the supreme state authority and the national legislature of the People's Republic of China. With 2,980 members in 2018, it is the largest legislative body in the world. The National People's Congress meets in full session for roughly two weeks each year and votes on important pieces of legislation and personnel assignments among other things, and due to the temporary nature of the plenary sessions, most of NPC's power is delegated to the Standing Committee of the National People's Congress (NPCSC), which consists of about 170 legislators and meets in continuous bi-monthly sessions, when its parent NPC is not in session. As China is an authoritarian state, the NPC has been characterized as a rubber stamp for the Chinese Communist Party (CCP) or as only being able to affect issues of low sensitivity and salience to the Chinese regime. ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Consent
Consent occurs when one person voluntarily agrees to the proposal or desires of another. It is a term of common speech, with specific definitions as used in such fields as the law, medicine, research, and sexual relationships. Consent as understood in specific contexts may differ from its everyday meaning. For example, a person with a mental disorder, a low mental age, or under the legal age of sexual consent may willingly engage in a sexual act that still fails to meet the legal threshold for consent as defined by applicable law. United Nations agencies and initiatives in sex education programs believe that teaching the topic of consent as part of a comprehensive sexuality education is beneficial. Types of consent include implied consent, express consent, informed consent and unanimous consent. Types * An expression of consent is one that is unmistakably stated, rather than implied. It may be given in writing, by speech (orally), or non-verbally, e.g. by a clear gesture ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Do Not Track Legislation
Do Not Track legislation protects users’ right to choose whether or not they want to be tracked by third-party websites. It is often called the online version of " Do Not Call". The legislation is supported by privacy advocates and opposed by advertisers and services that use tracking information to personalize web content. In 2019, Senator Josh Hawley introduced legislation called the Do Not Track Act, which is currently pending. Overview With the development of Internet technology, a large number of people, business entities and organizations heavily interact with each other. For instance, Facebook enables its users to socialize with each other. Google provides e-mail services and entertainment through Gmail and YouTube. Customers pay fees for the services or are exposed to advertisements. While this interaction is processed, users leave a trace of their personal information such as IP address or search history on the internet. Personal information has become a valuable a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Data Portability
Data portability is a concept to protect users from having their data stored in "silos" or "walled gardens" that are incompatible with one another, i.e. closed platforms, thus subjecting them to vendor lock-in and making the creation of data backups or moving accounts between services difficult. Data portability requires common technical standards to facilitate the transfer from one data controller to another, such as the ability to export user data into a user-accessible local file, thus promoting interoperability, as well as facilitate searchability with sophisticated tools such as grep. Data portability applies to personal data. It involves access to the personal data without implying data ownership per se. Development At the global level there are proponents who see the protection of digital data as a human right. Thus, in an emerging civil society draft declaration, one finds mention of the following concepts and statutes: Right to Privacy on the Internet, Right to Digital D ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Human Rights
Human rights are moral principles or normsJames Nickel, with assistance from Thomas Pogge, M.B.E. Smith, and Leif Wenar, 13 December 2013, Stanford Encyclopedia of PhilosophyHuman Rights Retrieved 14 August 2014 for certain standards of human behaviour and are regularly protected in municipal and international law. They are commonly understood as inalienable,The United Nations, Office of the High Commissioner of Human RightsWhat are human rights? Retrieved 14 August 2014 fundamental rights "to which a person is inherently entitled simply because she or he is a human being" and which are "inherent in all human beings",Burns H. Weston, 20 March 2014, Encyclopædia Britannicahuman rights Retrieved 14 August 2014. regardless of their age, ethnic origin, location, language, religion, ethnicity, or any other status. They are applicable everywhere and at every time in the sense of being universal, and they are egalitarian in the sense of being the same for everyone. They are rega ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




EU–US Privacy Shield
The EU–US Privacy Shield was a legal framework for regulating transatlantic exchanges of personal data for commercial purposes between the European Union and the United States. One of its purposes was to enable US companies to more easily receive personal data from EU entities under EU privacy laws meant to protect European Union citizens. The EU–US Privacy Shield went into effect on 12 July 2016 following its approval by the European Commission. It was put in place to replace the International Safe Harbor Privacy Principles, which were declared invalid by the European Court of Justice in October 2015.Vera Jourová, "Commissioner Jourová's remarks on Safe Harbour EU Court of Justice judgement before the Committee on Civil Liberties, Justice and Home Affairs (LIBE)", 26 October 2015 The ECJ declared the EU–US Privacy Shield invalid on 16 July 2020, in the case known as '' Schrems II''. In 2022, leaders of the US and EU announced that a new data transfer framework called the T ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Children's Online Privacy Protection Act
The Children's Online Privacy Protection Act of 1998 (COPPA) is a United States federal law, located at (). The act, effective April 21, 2000, applies to the online collection of personal information by persons or entities under U.S. jurisdiction about children under 13 years of age, including children outside the U.S. if the website or service is U.S.-based. It details what a website operator must include in a privacy policy, when and how to seek verifiable consent from a parent or guardian, and what responsibilities an operator has to protect children's privacy and safety online, including restrictions on the marketing of those under 13. Although children under 13 can legally give out personal information with their parents' permission, many websites—particularly social media sites, but also other sites that collect most personal info—disallow children under 13 from using their services altogether due to the cost and work involved in complying with the law. Backgr ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


California Consumer Privacy Act
The California Consumer Privacy Act (CCPA) is a state statute intended to enhance privacy rights and consumer protection for residents of California, United States. The bill was passed by the California State Legislature and signed into law by Jerry Brown, Governor of California, on June 28, 2018, to amend Part 4 of Division 3 of the California Civil Code.The California Consumer Privacy Act of 2018
Officially called AB-375, the act was introduced by , member of the California State Assembly, and State Senator

Social Credit System
The Social Credit System () is a national credit rating and blacklist being developed by the government of the People's Republic of China. The social credit initiative calls for the establishment of a record system so that businesses, individuals and government institutions can be tracked and evaluated for trustworthiness. There are multiple, different forms of the social credit system being experimented with, while the national regulatory method is based on blacklisting and whitelisting. The program is mainly focused on businesses and is very fragmented, contrary to the popular misconceptions that it is focused on individuals and is a centralized system. The program initiated regional trials in 2009, before launching a national pilot with eight credit scoring firms in 2014. It was first introduced formally by then Chinese Premier Wen Jiabao on 20 October 2011, during one of the State Council Meetings. Managed by the National Development and Reform Commission (NDRC), the Peo ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Impact Assessment
Policy Impact Assessments (IAs) are formal, evidence-based procedures that assess the economic, social, and environmental effects of public policy. They have been incorporated into policy making in the OECD countries and the European Commission. Key types of impact assessments include global assessments (global level), policy impact assessment (policy level), strategic environmental assessment (programme and plan level), and environmental impact assessment (project level). Impact assessments can focus on specific themes, such as social impact assessments and gender impact assessments. IAs can improve legislation by: * Informing policy makers about potential economic, social, and environmental ramifications * Improving transparency so that contributions to sustainability and "better regulation" are disclosed and special interest lobbying is discouraged * Increasing public participation in order to reflect a range of considerations, thereby improving the legitimacy of policies * Cla ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Information Assurance
Information assurance (IA) is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information. Information assurance includes protection of the integrity, availability, authenticity, non-repudiation and confidentiality of user data. IA encompasses not only digital protections but also physical techniques. These protections apply to data in transit, both physical and electronic forms, as well as data at rest . IA is best thought of as a superset of information security (i.e. umbrella term), and as the business outcome of information risk management. Overview Information assurance (IA) is the process of processing, storing, and transmitting the right information to the right people at the right time. IA relates to the business level and strategic risk management of information and related systems, rather than the creation and application of security controls. IA is used to benefit business through the use of information ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Data Localization
Data localization or data residency law requires data about a nation's citizens or residents to be collected, processed, and/or stored inside the country, often before being transferred internationally. Such data is usually transferred only after meeting local privacy or data protection laws, such as giving the user notice of how the information will be used and obtaining their consent. Data localization builds upon the concept of data sovereignty that regulates certain data types by the laws applicable to the data subjects or processors. While data sovereignty may require that records about a nation's citizens or residents follow its personal or financial data processing laws, data localization goes a step further in requiring that initial collection, processing, and storage first occur within the national boundaries. In some cases, data about a nation's citizens or residents must also be deleted from foreign systems before being removed from systems in the data subject's nation. ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]