APP is superintended into information of privacy leak heavy disaster area urgently standard

APP is superintended into information of privacy leak heavy disaster area urgently standard

Summary: The interest is gotten and privacy protects the balance between, it is the way that platform improves hard, also be the key that superintendency branch needs to intervene.

Clear of trainee Liu of Zhao Bi of our newspaper reporter reports

A lot of people had had such experience: An information about fitness is searched on mobile phone APP, classics regular meeting receives all sorts of advertisement about product of gymnastical knowledge, fitness to push later send...

A few days ago, media test says, after undertaking with small letter the character chats, small letter " handpick " the advertisement content in commendatory fair number article and closely related chatting content, doubt is like be pushed accurately to send ad. Subsequently, response of small letter respect says, did not detect user chatting record, but of the user click what behavior may affect pertinent information to appear.

In fact, what apply as the swift and violent development of IT, big data is arisen, algorithm recommends brought news custom-built change, information branch is numerous change had gotten applied more extensively. Also make the masses ceaseless think, the information that APP gathers, how be used?

APP is excessive it is difficult to collect information dividing line affirmatory

In fact, APP gathers information not fresh. With this media coverage small letter spirit is pushed definitely send for exemple, mention small letter to use a Liu Ming to planning to go to Japan among them Osaka travels. His family sends the cut of airline ticket of aviation of a piece of age to pursue through small letter. After 8 minutes, date of public of a small letter turns the bottom ad of article, appeared Dalian arrives the advertisement of age aviation airline ticket of Osaka.

Small letter expresses, the logic that advertisement puts in is to be based on user attribute, advertisement advocate the target crowd that can choose their set. The ad that because this appears very easily,the user gets " apropos " the coincidence circumstance of likeness of the chatting content with oneself, content that browse.

Besides small letter, clean out treasure, head even a lot of users of Gu Ge ever had mirrorred him to just be searched chat merely even allude some product, push relevantly send came very quickly, and still appear repeatedly from different platform, of meantime effect sex mix quickly of the Gao Zhen of accuracy surprising.

Zhao Zhanling of solicitor of office of attorney of Beijing annals continuous heavy rain's lawyer is being accepted " China produces classics news " the say when the reporter is interviewed, small letter oneself does monitoring to chat the possibility of this kind of thing is very little, because of to its character, the risk is too big, not was necessary to take this kind of kind, have a lot of however other and lawful the means that collects user individual information or privacy.

"I think this is a kind of behavior that hits edge ball, be disagreement regulation. " Shanghai 100 million amount to attorney office solicitor lawyer of Dong Yi wisdom is right " China produces classics news " the reporter says: "At present to gathering information limit unsharpness still, and our country lacks what unite more clearly to superintend a standard. And our country lacks what unite more clearly to superintend a standard..

Tecent is made public for many times before this express, small letter not keep the chatting record of any users, chatting content stores only go up in the terminal unit such as the mobile phone of the user, computer, won't use any chatting content of the user at big data analysis.

Controller of dog of search of input method software also expresses, the literal content that the user inputs in use clavier process, individual is sensitive information, won't be used or upload high in the clouds.

But user information really prediction of a person's luck in a given year, to this, zhao Zhanling says: "This incident appears this kind of circumstance is a kind of coincidence only likely, also be certain and other operator amasses user chatting record illegally likely, then essence of life is pushed definitely send ad. Then essence of life is pushed definitely send ad..

The reporter still understands, excessive the method that gathers user information has a variety of. The most general case, occasionally on join a certain communal WiFi divulges his information likely go out, the netizen ever exploded makings, wiFi bougie can scan the MAC address that gets peripheral, match the information such as the mobile phone date, record that browse then, be united in wedlock with tripartite data again, if pay data, situation to wait, can be used to to the preference of the user make detailed analysis.

Zhao Zhanling points out, to the user the collection of information ought to follow proper, lawful, necessary principle, what collect individual information to ought to serve relevant couplet with what what offer, insist to use a principle quite the least, is not the limits that enlarges distensible individual information arbitrarily. But because lack specific decision criteria to necessary principle at present, a lot of operator exist to enlarge the range that gathers information in order to improve a service for origin really in bringing about practice.

In big data times, communicate and be being used of big data is each industry development is inevitable, if where individual privacy and data are current between search a balance to nod, also be more serious problem. Say of Dong Yi wisdom: "The interest is gotten and privacy protects the balance between, it is the way that platform improves hard, also be the key that superintendency branch needs to intervene. Also be the key that superintendency branch needs to intervene..

Normative information is superintended reasonable use information

In national level, net letter does in the center of the beginning of the year this year, industry letter ministry, the Ministry of Public Security, market superintends total bureau 4 branches are released jointly " violate about beginning App to break the law compasses gather use individual information the announcement of special processing " , put forward to want to administer App to violate in annual key compasses the phenomenon that collects privacy.

At the beginning of March, country " APP breaks the law violate compasses collect use individual information to evaluate a guideline oneself " come out formally, right " safety of information of individual of information security technology is normative " in of establish about the lawful sex, smallest change, accredit agrees, the exception that agree, sensitive information bright show agree, of the basic principle such as privacy policy refine further; Together with the heavy fist exposure of 15 evening parties of 3 · , all circles force forms resultant force, what be normative individual information jointly is reasonable collect and use offer strict safeguard and monitoring.

Fourth channel division tells famous Internet essayist " China produces classics news " reporter: "We cannot because in recent years frequent data safety problem and give up eating for fear of choking-refrain from doing sth necessary for fear of a slight risk, abandoned the application that logarithm occupies, the trend closes; We also cannot see the prospect that data application brings because of pure ground, and have abuse incontinently to data, bring data crisis. Bring data crisis..

"A lot of moment, public panic comes from at ' opaque ' , and rather than ' be used ' . Relevant perhaps enterprise should tell our state clearly citizen: Stem from national security or the country develops, we can be collected through Internet, use citizen information (this is transparent inform) . But we are responsible the information privacy that has protected you with ability, and collect the information that come to won't be divulged 2 times (this protects) for privacy. If had done both,do not conflict. " Dingdao division complement says.

A series of privacy information is divulged the where the wind and the waves are highest that incident introduced to protection of user individual information public opinion again, a lot of users feel to this have a headache, often meet when having individual information authorization " overcorrect " , speak of gather information " turn pale at the only mention of sth terrible " overall refuses, and cause adverse effect. In fact, try to individual information reasonable use, the advantage of generation is beyond measure.

With peak of cacique of Chinese Shenzhen IT was met last year in March on, the province of Tecent side Yunnan that Tecent author Ma Huateng puts forward makes " You Yunna of a mobile phone " the project is exemple, it is OK that this project can use a mobile phone all information whole travel, data and those who complain is opaque, slaughter the travel such as the guest to resemble a canal to rise in disorder, the tourist can give a mark. The help administers travel chaos to resemble, increase information diaphaneity. To this, ding Daoshi expresses, the tourist is opposite through the mobile phone relevant scene area or dining-room undertakes evaluating, if these data are used by orgnaization of the enterprise of tripartite, sale, it is a disaster to the user undoubtedly. But if will be use by Tecent and government sector, promote travel the experience with respect to can real ground, consolidate processing scene division.

Baidu author plum Yan Hong has said: "We take the protective issue of privacy issue and data seriously very much, in the past among a few years, china also more and more realize this problem, and the construction that also strengthening relevant legal laws and regulations all the time. But in this process, we should be abided by of course a series of principle, if we think to be met with this data,let possessory be benefited, and the data that the user also is willing to let you use him, we can use, this is a our basic method. This is a our basic method..

Look in Ding Daoshi, to the enterprise, how should data ensure the content that involves two aspects in the security that uses process from beginning to end: It is technical level, each are big the company promotes through technical research and development defend, let all data can give by need to use unapt outside discharge, it is at the same time in the open collaboration with tripartite, the safety that also should ensure data through relevant mechanism and system is used; 2 it is management and operation level, the education to employee, groom and management wants promotion, block the problem of likelihood happening up as far as possible from the person's level on.

APP is superintended into information of privacy leak heavy disaster area urgently standardAPP is superintended into information of privacy leak heavy disaster area urgently standard

China produces classics news

The mark reader of economic success personage

News assorted cold dishes savours China

News Collection, experience&Taste China.

APP is superintended into information of privacy leak heavy disaster area urgently standard

Subscription: Cien_offical

APP is superintended into information of privacy leak heavy disaster area urgently standardAPP is superintended into information of privacy leak heavy disaster area urgently standard

Tell about, you are in the story that produces classics a gleam of

APP is superintended into information of privacy leak heavy disaster area urgently standard
未经允许不得转载:News » APP is superintended into information of privacy leak heavy disaster area urgently standard