Li Yong: Legislation confirms that large data is a property
Source: Internet
Author: User
KeywordsBig data confirm Li Yong
Recently, Ctrip "credit card Door" and Huawei server by the U.S. invasion and other events, reflecting the http://www.aliyun.com/zixun/aggregation/13568.html "> Large data technology to financial information security and market risk to bring new challenges, It is characterized by the information abuse of data service providers, the information monitoring of foreign institutions and the increasingly complex data intrusion.
China should adhere to the two principles of development and autonomy for the financial security problems brought about by large data. The threat of large data is ultimately the result of large data at this stage of low levels of development, should be accelerated through the development of large data industry and technical improvement solutions. If this slows down or hinders the application of large data technology, it is unworthy and makes China lag behind other countries in the "Big Data competition". At the same time, a number of information disclosure incidents proved that the use of foreign enterprises and technology to protect financial data, can only be thieves. Only by developing domestic enterprises and autonomous technologies can security be ensured in the whole process of information transmission.
In this regard, measures can be taken from three aspects. First of all, to provide legal basis and basis for maintaining financial security from the angle of data. At present, the property rights of large financial data in China are not clear, the transaction is not smooth, therefore should pass the legislation and so on form, will confirm the big data as one kind of property, and stipulates the Big Data property right how to produce, the transfer and the end, to the hacker attack, the information monitor and so on violates the big Data property rights behavior, establishes the corresponding sentencing and the punishment At the same time, through the establishment of industry standards, setting industry thresholds and other institutional measures to set up financial enterprises and data providers in the data use and algorithm development of national security standards, to guide the financial industry to correctly use large data technology, reduce the corresponding risk.
Second, to support the development of the national information industry, the training of independent data providers and third party data review agencies. By improving their own technology and market competitiveness in the area of hardware and software, they can reduce the reliance on foreign manufacturers and technologies in key areas such as bank data centers, and reduce the risk of being monitored by information and data intrusion. The development of domestic data service providers can break the monopoly of foreign data terminals, reduce the possibility of abuse of information, but also reduce the application cost of large data technology. In addition, in view of the government direct control may interfere with the normal operation of enterprises, the Government can authorize the cultivation of a number of third-party large data review agencies for enterprises and data providers to provide data and algorithms for compliance audits, as accounting firms audit corporate financial information. Large data review bodies and auditors may be assessed by the Government in accordance with specific procedures and granted their business qualifications.
At the same time, the large data technology itself should be used in market regulation to promote the automation of regulation, so that the ex post facto supervision relies on the technology to rely on the early warning of regulatory change. The National Association of Securities Dealers uses the sonar automated regulatory system to monitor insider trading and fraud in the securities market at three times times the original accuracy. Automation supervision can not only reduce costs, but also through real-time index monitoring and risk early warning, in the reckless behavior caused by timely detection and blocking, so as to reduce the actual loss and safeguard the security of China's financial system.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.