Information Center

In the era of big data, privacy cannot be managed extensively

  

In the era of big data, personal privacy protection can not be restricted by simple authorization, can not stay in the responsibility of late punishment and extensive thinking, but can realize the fine management of personal information in the whole society.

large

Recently, an express company launched the "privacy list" service, which has almost no customer information. The express can contact the recipient by scanning the code with APP, which is convenient and safe. Today, online shopping has become a common moment in data exploration. This effort to protect personal privacy is crucial for every community member.

Express information leakage is only the tip of the iceberg. More personal privacy is stored in site servers and enterprise databases, which are easy to leak, but lack of protective covers. Many people may have such experience: when opening a software phone, the destination has an impressive home address; Using a search engine, you can automatically fill in the words in your head; Even when browsing the web, the window always recommends not looking at the goods In the big data before the algorithm, people's life trajectory has become no secret. As a tool of computers, mobile phones, in turn, are like staring at our eyes, so many people can't say they are uncomfortable.

Today's life is completely digital, and the form and concept of personal privacy have undergone major changes. If the traditional sense of security, the physical space composed of housing will be able to protect our secrets, then the modern privacy consciousness can be transformed into data, with network cables and routers all over the world. The problem is that privacy comes from the personal life in the transition from the buffer zone to social life. Once the safety of the valve is lost, it will not only disrupt daily life, but even social management may be deceived. I often receive various marketing calls. I know your preferences and situations clearly, and people's interference is more calm. Some telecommunication frauds even lead to social tragedies.

However, in order to promote the transfer of personal information, the information society may be an inevitable form of development. Whether it is sharing economy or cloud computing, in order to make it easier for you and me to live in the economic form and advanced technology, it is only on the basis of extensive sharing of information and data. In other words, only our life details, virtualization, better service and experience can be realized. For example, tourism information can provide a basis for the rational planning of urban traffic, and the evaluation of mobile applications can help developers enhance the user experience. Even when we publish surrounding information and share locations, it becomes a clue for public security departments to track down criminal activities. It is conceivable that when the Internet of Things comes, we will have to give up more surrounding information to enjoy a more efficient and convenient life.

In the development trend, more and more personal information will become glass houses under decoration. We need a more reasonable strategy to protect personal privacy and the comfort of life scenes. The first thing is that you cannot "authorize" the use of a way to turn privacy protection into empty talk. Although every search, every user registration, and every account association may make their lives under other people's spies, most people have no better choice but to follow the flow of information on the train

From this point of view, the protection of personal privacy can not only rely on simple constraint tasks, can not stay in the responsibility of late punishment and extensive thinking, but also realize the fine management of personal information in the whole society. In this regard, laws are required to provide the bottom line for the use of personal information and improve the rules. The latest general principles of the civil law write personal information protection clauses for the first time. In fact, the basic framework for personal information protection is gradually established through systems such as the "negative list". On the other hand, a large number of user data social groups that master government agencies and enterprises should also make good use of new technical means to reduce unnecessary personal information exposure, while establishing traceability of information protection responsibility chain to prevent information disclosure without investigation.

We are in the age of big data. Convenience of life is the best moment. From the perspective of privacy protection, it may be the worst era. In any case, virtualization, digitalization and informatization have reshaped the form of daily life. We can only continue to upgrade "anti-virus software" to defend our lives. As long as we stay awake and stick to our weaknesses, I believe we can build a sense of security in the information glass house.