How to build personal information security system in large data age?

Source: Internet
Author: User
Keywords Personal information Security personal information large data age
Tags analysis application data data collection development enterprises how to information

In the current large data age, facing the increasingly serious personal information security problems, in the in-depth analysis of network search caused by personal information security crisis, on the basis of the following focus on awareness-raising, legislative supervision, technical application Three aspects of the construction of personal information security system concept.

1. Training personal information to protect self-discipline consciousness

Large data age to protect personal information security, not only need the relevant enterprises and departments to strengthen self-discipline, strengthen supervision and management, but also need the public to improve personal information security protection awareness and ability, once found that personal information has been leaked, should actively to the information Management department to lodge a complaint.

At the same time, in order to curb the "human flesh search" generated by the information out of control and the value of chaos, we need to vigorously strengthen the culture of communication and moral training, will protect the privacy of individuals and do not pry into the privacy of others as a social virtue to promote.

2. Increase personal information security legislation supervision

Faced with the rapid development of technology and the exponential growth of information data, the pace of government legislation and regulation must be followed or even surpassed by technology. On the whole, on the one hand, on the basis of the existing laws and regulations, the legislative departments should promulgate the special law of personal information protection as soon as possible, standardize and coordinate the execution of other relevant laws and regulations, and provide the effective legal basis for the supervision Department. On the other hand, learn from other countries ' advanced legislation and regulatory experience, strengthen exchanges and cooperation between Governments, and jointly protect regional and global information security. If the United States attaches great importance to the protection of personal information and privacy, has formulated the "Federal Electronic Communications Privacy Act", "Citizens Network Privacy Protection regulations," and other laws and regulations, the network infringement incidents to punish.

In order to standardize the management standards of personal information security, the first national standard of personal information protection, "Information security technology, public and business service information System Personal Information Protection Guide" was formally implemented on February 1, 2013. This standard provides a clear stipulation for the use and treatment of personal information, protects the citizen's right to know and decides the information, aims at improving the consciousness of personal message protection, standardizing personal information processing behavior, promoting the reasonable use of personal data and protecting the legitimate rights and interests of citizens. But as a guideline standard, its implementation ultimately depends on the cooperation of the relevant industry main body. Therefore, the Government needs to further introduce a coercive effect of the response measures.

3. Improve personal Information security technology application level

In addition to awareness-raising and legislative supervision, the technology application level is also an important point to protect personal information security in the large data age. In the technical field, we should actively encourage the development and innovation of personal information protection technology, speed up the establishment of a unified standard network certification standards system, from the technical level to implement the protection of personal information security.

On the one hand, strengthen the development of personal information security technology under the background of large data. "Traditional information security technology can not be completely copied to the emerging large data fields, cloud computing, Internet of Things, mobile web and other new technologies, the rapid development of large data collection, processing and applications put forward new security challenges." "⑨ Therefore, the need to further increase the large data security key technology research and development of investment, this paper studies the network search and tracking method based on large data, and carries out safety planning, safety assessment, security strengthening and safety maintenance according to the protection ideas of subregion, hierarchy and multi-level, and improves and perfects the existing safety technology. ⑩ improve the level of safety technology products, seize the opportunity to develop safety technology. On the other hand, encourage the development and innovation of personal privacy protection technology. Technical means is an important supplement to legal measures, in view of the various stages of network search using different technologies for privacy protection, from the technical level to protect personal information security. Through the wide application of the privacy protection technology, while maintaining the relative independence and confidentiality of the personal information, the data collection, dissemination and processing are ensured.

(Responsible editor: Mengyishan)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.