Somebody is checked, somebody appears on the market, big data industry is experienced " glacial fire is double day " . On March 25, inc. of science and technology of daily and interactive network serves as Zhejiang of company of service of domestic data intelligence to land A formally do poineering work board. And be in before long before, those who have data of on 100 million resume is artful amount to science and technology (Beijing) limited company is investigated lawfully by public security mechanism, include a company downstage inside entire staff is taken away entirely by public security mechanism.
Amount to science and technology opportunely of information of resume of huge to hold user exculpatory
Ave of Haidian of Beijing Haidian area inside hall of square of international of the 8 steel in date, amount to office of Beijing of company of science and technology to be in floor gate to already was affixed opportunely a paper strip for sealing. This company public phone shows now unmanned already receive listen, reporter of the first finance and economics calls this company property of the steel in belonging to is informed, amount to science and technology to already was given orders to stick a paper strip for sealing by public security opportunely.
Show according to publishing a material, amount to science and technology opportunely so-called have China's biggest resume database, its are main data origin is " Qiao Dazhao " . And have below Qiao Dazhao banner " love is companionate " , " resume time machine " wait for many 10 invite applications for a job inside relevant product.
Be asked about in the public information before when whether can having legal hidden trouble, liu Bo ever showed one of its father, "We analyse resume to medium job is experienced and teach experience change circumstance only, this is belonged to but by the individual society news of know, we all made the other news in resume desensitization processing. Amount to all products plan concepts opportunely information of mature esteem individual, protect individual privacy. And we are gotten this a series of information are to pass HR or hunt head is obtained secondhand, amount to the resume that does not contact an individual directly opportunely. Amount to the resume that does not contact an individual directly opportunely..
The bounds of citizen individual information
Rose to be carried out formally on May 1, 2018 " safety of information of individual of information security technology is normative " (next weighing " standard " ) in right " the individual is sensitive information " reach " the individual is ordinary information " the standard undertook limitting.
Individual information includes full name, give biology of number of unripe date, identity document, individual to identify communication of information, address, communication to contact means, communication contrail of the information of code of name of record and content, Zhang, property, information that sign a letter, track, ; Sensitive information includes the individual identity document number, individual biology identifies date of Zhang of information, bank, communication information of information of contrail of the information of record and content, property, information that sign a letter, track, accommodation, healthy physiology, trade information, 14.
In addition, " standard " also use to individual information make specific provision, when if become,gathering user individual information directly, need has specific individual authorization; And when information of indirect collection individual, the accredit that should understand individual information to offer information processing of square acquired individual agrees with limits, include to use an end, individual information main body whether accredit agrees to make over, share, public exposure.
Is getting huge user resume big data are service or network black produce?
According to national network the letter does " digital China construction develops a report (2017) " show, predict production value of market of Chinese big data will exceed -727379968 2020. A Lian is all " 2018 networks black ash produces processing to study a report " estimation, dimensions of industry of safety of our country network was many yuan 450 2017, and black ash is produced already amounted to nearly one billion two hundred and fifteen million seven hundred and fifty-two thousand one hundred and ninety-two yuan of dimensions. Whole of Chinese network safety carries smooth state, but user information is divulged, network hacker is blackmailed and the problem such as communication information bilk still appears often, use Internet technology to undertake pilfer, bilk, extortionate wait for case of of all kinds illegal crime to happen often, the black ash that derives around Internet produces an industry to spreading quickly. To be not a technology kind for the user, very difficult oneself each goes putting out all and potential " postern " , more need prevents from system and legal end.
As we have learned, amount to data author Wang Chengyu opportunely the Ceng She before this is much have crime, include blame of crime of fraud of larceny, contract, blackmail to wait among them. A when announced 2016 in net of Chinese judge copy clerk " Wang Chengyu and in protect couplet and investment (Beijing) dispute of limited company labor 2 careful are civil judgment " show, wang Chengyu ever used a Zhou Yujie, Zhou Chengyu, Zhou Chengyu. Network data shows Wang Chengyu to violate criminal record for many times in ten years of existence before May 2011.
The lawyer is commented on
" law of safety of network of People's Republic of China " the 22nd, 41, wait 42 times to all be opposite with 44 get citizen individual information and offer citizen individual information to have clear regulation to other, the requirement gets the person that get classics of beard of citizen individual information to be collected to agree, must not provide individual information to other, be like: "Any individuals and organization do not get filch to perhaps get individual information with other and illegal means, must not sell illegally or provide individual information illegally to other. Must not sell illegally or provide individual information illegally to other..
The consciousness that the citizen asks individual information is protected increases with each passing day, the right nots allow to encroach. Intercept and capture citizen individual information illegally and use at the commercial pattern of commercial use, put in huge legal risk.