Personal Information Protection Law Implementation Date
Personal Information Protection Law Implementation Date, as of June 2021, the overall size of China's Internet users more than 1 billion, personal information protection has become one of the most concerned about the most direct and most realistic interests of the general public. Personal information protection law implementation date.
Personal Information Protection Law Implementation Date1The Personal Information Protection Law will be formally implemented on November 1, the law and the Civil Code, the Cybersecurity Law, the Data Security Law, the E-commerce Law, the Law on the Protection of Consumers' Rights and Interests, and other laws will be *** with the same weaving into a consumer personal information "protection network". The CCA recently issued an article urging operators to effectively implement the relevant provisions of the Personal Information Protection Law and take necessary measures to protect the security of consumers' personal information. This is the first time in the history of the world that we have seen a new generation of people who are not aware of their own personal information, but who are not aware of their own personal information.
The convenience and potential risks of facial recognition
Sensitive personal information, generally including biometrics, religious beliefs, specific identities, medical and health, financial accounts, whereabouts and trajectories, and personal information of minors under the age of fourteen.
In recent years, face recognition, as an important application of artificial intelligence, has brought great convenience to social life.
Facial unlocking of cell phones can reduce the time wasted due to the input of passwords, through face recognition in and out of buildings and neighborhoods not only saves the physical card but also avoids the trouble of replacing the card due to loss of the card, and replacing the cell phone software payment with face recognition not only saves a series of manual operations but also brings a more enjoyable experience, similar scenes also include face recognition through the gate, face check-in hotels, and so on. In the community, scenic spots, shopping malls, office buildings and other public **** scene, face recognition technology quietly on the line, undoubtedly to the public's daily life and work to bring great convenience.
At the same time, the application of face recognition brought about by the protection of personal information is also increasingly prominent.
This year's CCTV 315 Evening Party mentioned that some companies are equipped with face recognition cameras at the entrance, which can accurately capture consumer face information without their knowledge. Such as a bathroom brand in the country's thousands of stores installed with facial recognition cameras, consumers as long as into one of the stores, in the case of unknowing, will be captured by the camera and automatically generate a number, and then the customer to go to which store, went to a few times, the bathroom brand will know how to offer and reception, the staff know very well.
"Face Recognition Application Public Research Report (2020)" shows that more than 90% of the respondents have used face recognition technology, 60% of the respondents believe that the technology has a tendency to abuse. In the actual production and business activities, some operators abuse face recognition technology to infringe on the legitimate rights and interests of natural persons frequent events, serious damage to the personality rights and interests of natural persons, infringement of their personal, property and other legitimate rights and interests, and undermine the social order, urgently need to be regulated.
Face information belongs to sensitive personal information in the biometric information, is the biometric information in the social attributes of the strongest, the most easy to collect personal information, has the uniqueness and unchangeability, once the leakage will be on the personal and property safety of individuals caused great harm, and may even threaten the security of the public ****.
Consumers should actively exercise the right to withdraw consent
This year's National People's Congress, how to vigorously promote the development of the digital economy in the process of data use, good management of data, protection of personal information of citizens and other data security issues, became the focus of many representatives. The focus of attention of the members of the Committee. A number of representatives and members of the norms and management of face recognition technology advice.
The National Committee of the Chinese People's Political Consultative Conference, Shanghai Information Security Industry Association, the president of the talk Jianfeng pointed out that convenient is not the same as safe, any kind of technology should be applied to the scene, the enterprise can not be in the name of convenience, in exchange for the abuse of the market interests of the bottomless line.
Many representatives and members believe that the collection, storage, use and processing of data throughout the process of standardization; to increase remediation efforts to urge enterprises to implement the obligation to protect personal information, and crack down on violations of personal privacy and information security. There is also the view that the face of the collection of the use of the scene and the issuance of collection licenses, after obtaining a license, the enterprise can be in the specified scene face collection.
The upcoming implementation of the Personal Information Protection Act mentions that the handling of sensitive personal information should be strictly limited, and that neighborhoods and places of business should not force owners or consumers to perform face recognition.
District property, business premises will face recognition as the only verification of access to the lack of sufficient necessity, it is also difficult to take strict measures to protect, should provide other alternative verification methods for owners or consumers to choose. The operator should not be able to illegally collect consumers' face recognition information for commercial purposes.
CCA reminds consumers that in order to make the Personal Information Protection Law more effective, they should study the law carefully and use it actively. After accepting the terms of personal information or providing personal information to the operator, consumers should also pay attention to whether the terms of personal information of the operator have been revised, whether the operator has the ability to protect the security of personal information, and whether the operator has unlawful processing of personal information behavior. When consumers do not agree with the operator's continued processing of their personal information, they should actively exercise their right to withdraw their consent and request the operator to stop processing or delete their personal information in a timely manner.
Personal information, especially sensitive personal information, is related to the human dignity of each person, and strengthening the legal protection of personal information is in line with the expectations of the people.
Personal information protection law implementation date 2
In the era of information technology, everyone enjoys the information dividend, the kind of fast, convenient is unimaginable in the past, but also the future can not be predicted. Each app is a small world, all for different people to bring different convenience. app applications far and wide, y embedded in a variety of application scenarios, so that the cell phone to the internal alienation of the people's "new organs", outward evolution of the people and the external world of "router "
These are the first time I've ever seen a mobile phone.
The needle is not sharp at both ends, and the cane is not sweet at both ends. Private, over the scope of the collection of personal information, frequent applications, excessive request for user privileges, XiYiYan not notice, along the customary, become a common disease of many App and stubborn disease, although repeatedly under the heavy medicine is still difficult to get up. "From childhood to adulthood, have told the most lies, is 'agree to App privacy terms'" this witty network paragraph, which reflects the public on the App infringement of the flood of 'helplessness and confusion. A media survey showed that 92.8% of the respondents had experienced information abuse, 89.2% of the respondents had received harassing advertisements, and 75.9% of the respondents had received fraudulent calls or text messages. Personal information was leaked by the harm, by no means suffered "letter harassment" so simple, if the string of fraud prevention is not taut, a minute to fall into the risk of fraud trap.
Personal information protection law came into being, the general public is the most concerned, the most direct, the most realistic interests of the issue, for personal information to build a solid protective embankment for new technologies, new applications for the betterment of society to lay the cornerstone. The law establishes principles, clarifies boundaries, eliminates disputes, and provides a basis for governance in accordance with the law. For example, clarifying that the handling of personal information should follow the principles of lawfulness, legitimacy, necessity and good faith is very relevant and operational. Many enterprises have over-claimed and over-collected personal information, but they can't pass this "sieve". For example, a flashlight app that accesses a user's address book is non-essential and unacceptable in every respect.
The life of the law is in its implementation. Personal information protection law enacted, an important step in the rule of law, but to win the trust of the people, the line of long, but also through the effectiveness of the judiciary to fully sustain. After the Personal Information Protection Law is formally implemented, the education of the law should be followed quickly. For personal information collectors, processors, learn the law to know what can and can not be, to reduce the unit or enterprise illegal risk; for personal information producers, owners, usually learn more about the law, in case of trouble there is a way to protect their legitimate rights and interests to have the bottom line. Increase the popularization of the law, so that the law into the masses around, into the hearts of the masses, especially into those key areas, key enterprises, to send the law to the door. From the past performance point of view, online shopping, medical, real estate, education, etc. are personal information leakage disaster areas, legal education to "special care".
According to the China Internet Network Information Center statistical report, as of June 2021, the overall size of China's Internet users more than 1 billion, the number of websites and the number of App more than 4.22 million and 3.02 million respectively. In the age of informationization, the protection of personal information has become one of the most concerned, most direct and most realistic interests of the general public. Targeted provisions on personalized push, big data kills familiarization and other criticized realities make people look forward to the implementation of the personal information protection law. For individual citizens, how to truly realize "my information I do" has become the focus of attention.
According to a survey, 77.8% of users "seldom or never" read the privacy agreement when installing an app, and in the 150 apps surveyed, nearly 30% of the apps created barriers to deliberately hiding and inducing users to skim the privacy agreement, and the degree of acceptance of the privacy agreement by respondents was at a low level. is at a low level. The neglected terms of user service agreements and privacy policies often facilitate the collection of personal information in violation of the law or in excess of the law.
With the implementation of the Personal Information Protection Act, this situation of "products pretending to tell you what they know, and users pretending to read and agree to it" is expected to change dramatically.
"Where personal information is processed on the basis of an individual's consent, that consent shall be given voluntarily and explicitly by the individual on the basis of a fully informed consent," "the individual shall have the right to withdraw that consent," "the individual shall be entitled to withdraw that consent," "the individual shall not be entitled to withdraw that consent on the basis of the individual's lack of consent. A processor of personal information shall not refuse to provide products or services on the grounds that an individual does not consent to the processing of his/her personal information or withdraws his/her consent." ...... When stipulating the core rule of "notification-consent", the Personal Information Protection Law specifically clarifies that individuals shall be informed of the reasons for the processing of their personal information.
"The protection of personal information has long been a weak link, but at the same time is a big project involving more than 1.4 billion people, relying on the government, relying on the organization to protect is not enough, and more is to allow each citizen to raise the legal weapon, to protect personal information about the individual." Wu Ritu, a member of the Standing Committee of the National People's Congress (NPC), said that it is necessary to vigorously promote the propaganda of the law, so that everyone is fully aware of the rights and obligations of individuals in information protection.
"Individuals should enhance their personal information protection literacy, and not easily hand over their personal information to apps that come from unknown sources," Permit, executive director of the Digital Economy and Legal Innovation Research Center at the University of International Business and Economics, reminded, adding that individuals can actively exercise the right to access, copy, and correct as stipulated in the personal information protection law, Deletion right and a series of rights, timely understanding, grasp their own personal information collection and processing.