laitimes

"Cross-boundary" big data chaos is frequent, how should users' personal privacy be protected?

(Reporter Chen Zhou) Careful mobile phone fans may find the following situation from time to time in recent years: after searching and browsing multiple similar products on the shopping platform, open the platform again, whether it is the home page recommendation or the recommendation page below the product, showing the same kind of goods that have been browsed before; more puzzling is that when using social platforms and reading platforms, these products such as "dog skin plaster" appear again in the advertising space!

In the face of big data and algorithms that have long been "out of bounds", many netizens can't help but ask at this time: In the end, do you still let people have "privacy"?

The Cyberspace Administration of China has issued policies to protect personal privacy

For the algorithm's transgression, Ma Huateng, chairman of the board of directors of Tencent, said that the data cannot be arbitrarily opened up directly. Because in the platform, a large number of all of them are communication and social behavior data between people and people, if the data can be arbitrarily opened, for the company's business department or for external customers, it will bring disastrous consequences.

However, fortunately, the relevant departments have officially taken a shot at this chaos in recent days. According to the People's Daily, the State Internet Information Office and other four departments jointly issued the "Provisions on the Recommendation and Management of Internet Information Service Algorithms" in response to problems caused by the irrational application of algorithms such as algorithm discrimination, "big data killing", and inducing addiction, to establish rules and regulations for the healthy development of algorithm recommendation norms and clear boundaries.

"Cross-boundary" big data chaos is frequent, how should users' personal privacy be protected?

In recent years, China has continuously strengthened the construction of network data security laws and regulations, and looking back at 2021, two laws and one regulation have been issued and implemented in this regard: on September 1, 2021, the Data Security Law and the Regulations on the Security Protection of Critical Information Infrastructure were officially implemented; on November 1, 2021, the Personal Information Protection Law was officially implemented.

Operators spare no effort to protect the privacy and security of users

Misuse of algorithms is tantamount to indirectly violating the user's personal privacy. As Ma Yuanying, a lawyer at Beijing Mingqian Law Firm, said: Because cyberspace is virtual, highly open, and easily disseminated, online privacy infringements have caused great damage to victims, and victims often face the dilemma of difficult to determine the subject, difficult to eliminate the impact, and difficult to recover losses when protecting their rights.

Fortunately, in terms of protecting user privacy, telecom operators can be described as unambiguous.

At the 4th China International Import Expo held in 2021, China Telecom showcased the industry's first quantum security call product "5G Quantum Encrypted Call", which greatly improved the security of existing information systems.

From 2021, China Mobile will create a new type of security gateway product with "number for man, card as key" through super SIM, providing safe and convenient network access authentication services for the system and protecting the security of core data assets.

In 2021, China Unicom also actively focused on the field of "big security", launched SIM MeSign products, and has obtained the national commercial cryptography product certification.

User privacy protection requires continuous follow-up by all parties

In addition to operators, Internet platforms involve a large number of users' private data.

In this regard, Wang Xiaoxia, general manager of legal compliance of Tencent Big Data, said that a cross-departmental, cross-business, and cross-system data and privacy protection team should be built to fully protect the rights and interests of users through scientific and standardized security management processes and a sound security technology system, realize user control over personal information, and create a safe and reliable online environment for users.

"Cross-boundary" big data chaos is frequent, how should users' personal privacy be protected?

Lawyers in the industry suggest that Internet platforms should be required to assume more responsibility for personal privacy protection. At the same time, on the basis of the Personal Information Protection Law, the Internet information departments shall formulate and issue clearer detailed rules for the administration of Internet platforms, so as to strengthen supervision and clarify the responsibilities and corresponding penalties that Internet platforms should bear in the field of online privacy protection.

In addition, Internet users, as protected individuals, should develop good Internet habits and promptly remove the content involving personal privacy on the terminal; when encountering suspected information leakage, they should immediately report to the relevant departments and take up the legal weapon to protect their rights.

A short comment in the recent CCTV "Evening News" is worth recalling: people can't feel that what they dare not do offline is dare to do online. China has the world's largest network users, but also the formation of the world's most considerable network economic system, we must put the development of the Internet into the law to follow, there is a law to follow, the law must be strict, the law must be investigated, with the awareness of the construction of the pipe network according to law, to cultivate a network ecology that seeks benefits and avoids harm, is vibrant and thriving.

Read on