In the big data age, everyone is running naked.

Source: Internet
Author: User
Keywords Personal information large data times units some

"My name is xxx, I am xxx for the disaster area to pray for the people"-Recently, your micro-trust friend Circle has been this message "brush screen"?

After the Ludian earthquake in Yunnan Province, this message was quickly forwarded in the Circle of micro-trust friends, tens of millions of days. But then the situation went downhill: institutions and individuals, including some regional government departments, said that when the recipient forwarded the message and entered personal information, they would be captured by the network to capture the identity, cell phone, micro-letter and residential location.

But then this "rumor" news Again "was the rumor", Tencent and some professionals said that the link and the page does not exist malicious collection of user information, only such a Web page can not get so much personal information. But because the link induces the user to share, the micro-letter has already made the correlation processing to it.

"Rumor" and "be rumor" between, it is evident that people to the loss of personal information panic. However, some information technicians say that people can not live without mobile phones, the network today, personal information has already been exposed in broad daylight: "The Big Data era, everyone in the" naked. ”

Where did our personal information go? Since the large data age personal information can not avoid being learned by others, the legal protection of personal information, it is urgent to put on the agenda.

Information disclosure, corporate organization is "Big Head"

How do you deal with a signed courier after you get the courier?

A lot of people will say, tear off the document, especially let the name, address, personal telephone and other information cannot be spelled out.

While the move is a safeguard for personal information, some in the industry say that personal information is usually already leaked before that.

This May 29, a courier company came to Qingpu Public security bureau Xu Jing Police Station report, said the company a large number of express surface information data leaked, and was called "Billing" of the website for sale. After investigation, QINGPU Public Security Bureau in July 4 cracked the case, to Henan and other place arrested suspects week, such as four people.

"Billing" is a network shopping industry a more well-known web site, the sale of the real courier information. Due to the online purchase credit evaluation must have a real effective express number, many for the "brush drill" to improve the credit rating of the online sellers will come to buy courier documents information. As of the incident, the amount involved amounted to $ more than 5 million.

Up to more than 5 million yuan of express delivery document transaction information, apparently not a collection or small quantities from the courier to buy. According to the suspects confessed, they from August 2013 onwards, through the direct invasion of The courier company's computer system to obtain data in large quantities.

In the "Billing" site was closed, the reporter is still in a number of websites, forums, QQ group to see someone peddling the day's courier documents information. Some industry insiders said that the express company website because of the vulnerability of the hacker invasion is not a case, the system security threshold is not high.

Reporter visit found that the courier companies and outlets of information security management methods are different. A few days ago, reporters visited the Pudong new area on the road to a courier network, computer by hand use, inquiries, such as a single number must enter personal code, such as information. But a courier on the road to a company network, reporters randomly called a courier will open the system.

Not only express company, in recent years, the hotel industry, the electricity business website, the network forum has successively exploded the large-scale personal information divulging event.

"Large-scale personal information events can not be a person to check, it must be through the company, the organization directly to get." After the incident, some of the suspects to tan the personal information of many people to protect themselves almost in vain.

Suggestion: Change the report to the ex ante supervision

At present, the protection of personal information, scattered in a number of regulations and departmental regulations, although the relevant units and institutions to clarify the obligations, but for these enterprises, units in the Personal Information security protection system established, the implementation of the situation, still lack of prior supervision.

The State Post Office recently promulgated the "Delivery service user personal Information Security management provisions" stipulates that postal enterprises, express enterprises should establish and improve the user information security system and measures to protect consumer personal information security. It is recommended that the relevant industries introduce rules and regulations, and urge these measures to be truly implemented.

Who is responsible for the inner demons

To enter a test, you must fill out personal information, children and daughters, must register personal information, car licensing, or must report personal information ... In the enjoyment of public services or participation in public affairs, the public must truthfully fill out personal information as required, which clearly cannot be protected by the public.

Last August, Zhabei Public Security Bureau Network Ann Detachment found that a large number of people on the Internet directly targeted at the September 2013 National Exam candidates for training information. The information object is so accurate that it has the important suspicion of illegally acquiring the citizen's personal information.

Subsequently, the police in Pudong arrested in the Internet to publish these enrollment information of an educational information consulting company legal Representative Xu. According to Xu MoU, his large number of candidates information from the city of another unemployed person Xu So-and-so, by virtue of this information, he has recruited more than 400 candidates.

Xu So-and-So after the claim, he provided the candidate information is the latest most complete, accurate rate is very high, the source is a national examination network registration platform and the National Test Network platform construction and maintenance of Yang somewhere.

Subsequently, Shanghai police in cooperation with the Beijing police, successfully captured Beijing Education Technology Co., Ltd., executive director Yang MoU. Yang MoU admits, the Company undertakes the National Examination Network registration platform and the National test Network exam platform construction and the maintenance work, he took the opportunity to illegally obtain partial national examination examinee personal information, profit 200,000 yuan. Eventually the police seized nearly 1 million personal information involving citizens.

In many information leakage events, often flash "inside ghost" figure. Shanghai cracked Another newborn information disclosure case, the suspect Zhang is responsible for the development, maintenance of the city Health Bureau of the birth system database professionals. The use of job facilitation, he in early 2011 to April 2012, two times a month illegally log in to the database, download the birth of newborn information accumulated up to hundreds of thousands of, the sale of more than 30,000 profit.

It is understood that the database was outsourced by the Health bureau to a data company, but the company LAX management, Zhang can even enter the home database, unsupervised. After the city health system has taken measures to stipulate that the outsourced service must be in the designated health system location for data maintenance, and have a dedicated person accompanied.

"The reason why we dare to fill in the most truthful and comprehensive information is not only necessary for dealing with the relevant affairs, but also the trust of the unit of collecting information." Some members of the public have said that when they handle telecommunications, banking and medical and health services, they often believe that such information can be kept in good custody, and that they will be particularly disturbed when an "inside Ghost" occurs.

Recommendation: "Inner Ghost" crime Unit should also be responsible

Although many of these cases were punished by law, the credibility of the relevant units and enterprises was also affected. These units, enterprises in the recruitment of personnel, outsourcing services, should be clear about the risk of information disclosure, clear protection of information security legal obligations, in the event of information disclosure problems, in addition to the parties to pursue legal liability, enterprises, units themselves should be punished accordingly.

In addition, we should make clear the civil compensation, relief procedure and relief measures of the individuals who are violated by the laws and regulations, otherwise the high cost of the right to defend is not conducive to punishing the relevant units and enterprises through market-oriented means.

Innovative business models should have boundaries

Previously hit a hot forwarding of "My name is xxx, I am xxx for the disaster area to pray for the person" micro-letter link, afterwards proved to be a network marketing behavior.

This has also caused many people to worry: "Although this time it is not intended for personal information, the next time we will not be allowed to enter more detailed information, which leads to disclosure of personal information." ”

Although there is no evidence that this network marketing can take forward the personal information of the forwarding person, but the reporter learned from some professionals: the big Data age, to obtain personal information is not difficult, and has become an important basis for business analysis.

For example, you go into a shopping mall, enjoy free WiFi, "brush" can be discounted at the same time, the mall may be able to obtain your visit time, consumption preferences, etc. or you use the Internet search engine to find a keyword, computer software will be submitted to the cloud system, You will find that many of the pages in the future inlaid with the relevant products you have searched ... Inadvertently, personal information has been leaked.

"There are many business models that are more refined and innovative marketing based on personal information," he said. According to the industry, whether it is a hot forward in the circle of friends, or the sale of discount promotions in the market, the future of innovative business models are related to personal information.

Since the era of information "naked" is impossible, professionals believe that the new business marketing model should be established as soon as possible.

Recommendation: Establish the boundaries of the use of personal information

The amendment to the criminal law of the People's Republic of China (vii), adopted in 2009, added two new charges of "sale, unlawful provision of personal information for citizens" and "crime of illegally acquiring personal information of citizens" in the No. 253 article of Criminal law. But in real life, there are many activities that cannot constitute crime but still carry on with personal information, especially to the business model of continuous innovation, how to make clear personal information how to use legally, how to define personal information infringement, how to investigate tort liability. Precautions should be taken to prevent the misuse of personal information.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.