Current location - Loan Platform Complete Network - Big data management - Musk says it will no longer provide Chinese customer data, how to protect personal information security in the information age?
Musk says it will no longer provide Chinese customer data, how to protect personal information security in the information age?

The various privacy issues in the era of big data can be seen to a certain extent as an escalation of the privacy issues in the information age, and the scope and degree of harm has been greatly improved. Musk said no longer provide Chinese customer data, but this does not guarantee the safety of people's information, how to guarantee the security of personal information in the age of information has become a hot topic of discussion, in this regard, should do the following points.

First of all, for personal confidential information, there is no need to provide it to any organization, group or individual, unless it will adversely affect others. China should be resolute in protecting such personal privacy and preventing Big Data from using any potential collection devices to pry and access such information. There are two sources of private information in big data applications, one collected directly and the other obtained through data mining and analysis. Regardless of which kind of private information is used, its analysis, utilization, transmission and circulation should be strictly limited. For the first type of private information, permission should be obtained from the privacy subject at the time of collection. The analysis and use of such private information should not exceed the scope of the privacy subject's authorization. If subsequent use requires exceeding the scope of the authorization or use by another organization, the permission of the subject of the information should be obtained again. For private information obtained through analysis and mining, in addition to reauthorization, the raw data used for analysis should also be included in the scope of personal privacy protection, and the use and transfer of this information should be compared to personal privacy protection.

When we analyze the causes of privacy and security issues in the era of big data, we should consider not only the causes of the technology itself, i.e., the natural attributes of the technology, but also the users of the technology and other external factors, i.e., the social attributes of the technology. In addition, from the perspective of invasion of privacy, there are many behaviors that can lead to invasion of personal privacy with different themes and purposes. But the way they do so is big data technology.

In addition, before using and transmitting information, we should make efforts to check the authenticity and integrity of the information with the subject of the information, which not only improves the accuracy of the results of the analysis of big data, but also reduces a wide range of infringement problems caused by the information. Data processors that do not meet the privacy protection requirements should be refused to provide or transmit personal information data to them. Personal information should be anonymized during processing, application, and transmission. If the findings of Big Data analytics relate to unauthorized personal privacy, do not make unauthorized use of it or sell it until a new authorization has been obtained from the privacy subject and it must be kept in a safe place. After obtaining authorization, it must be anonymized again before it can be used again.