Big Data, LBS, friends Circle, guess you like ... These features and terminology that we often see on the Internet are based on the reading of user data, in fact, we are talking about the "theft of user privacy", only read the user's behavior, in order to "guess you like", only to track the location of users "LBS", Only collecting users ' data to analyze the so-called "big Data" is based on the user's personal information generated.
Personal information about the user, some of the reading is to better the user interested in the display of things in front of the user, and improve the user experience, while some of the reading has been deducted "steal", "surveillance" and other violations of the legal bottom of the hat, and how to reconcile the balance between the two to become an Internet enterprise, Reluctant to talk about.
User privacy in the spotlight
Liu
The word "stealing user's privacy" is not unfamiliar to netizens, it seems that "stealing user's privacy" has become a common means for internet companies to crack down on rivals, especially social networking sites, and the theft of personal information from users has reached blatant proportions.
Especially in the mobile internet today, people's social use of mobile terminals, such as micro-letters, Weibo, everyone and foreign Facebook, Google +, linkde in and so on, has become dependent on the degree, It has attracted users to actively upload their own information and geographic location in their social networks.
At the start of the year, two of cases of personal information collected by social networking sites have been watched abroad, and the US private social network, PATH, has paid 800,000 of dollars to federal regulators to settle allegations of improper collection of personal information from users. The United States Court of Appeals for the Nineth Circuit upheld the decision by the Northern California district Court to violate Facebook's privacy by 3.6 million of users.
Some analysts believe that in the United States, the relevant laws are so perfect, social networking sites to users of personal information theft is still unscrupulous, not to mention in the relevant laws and regulations are still imperfect domestic.
And in the last year online QQ Circle, in the beginning of the line because users can use it to find a long time did not contact the primary school students, as well as the former girlfriend, can even automatically organize groups for users, even users themselves are difficult to identify a friend by net name, and QQ Circle know who is who, and clearly grouped, so that users of this recognition function of the powerful, Feel shocked and frightened.
The recent "micro-letter three-point positioning method" to really make users feel creepy, it is understood that the so-called "micro-letter three-point positioning method" is through the micro-letter "Nearby people" function, continuous transformation 3 times above the location, supplemented by electronic map, can locate other micro-trust users where. Social positioning has caused panic among users.
And the use of mobile social tools, according to the location of the crime of murder, in May this year, a gangster using micro-letters to view the function of the nearby, master a 23-Year-old girl's geographical location and appearance, followed and killed the case shocked society, but this is not a coincidence, The use of social tools to track the geographical location, causing users to be violated cases occur.
With the rapid development of mobile internet, social software is built with the ability to find people around the location, in addition, navigation, sharing, even games, will open the application is to ask "whether to allow the use of geographical location", providing geographical information has become the standard mobile applications.
Obviously, the disclosure of user privacy is not only a kind of information theft, but also to the user's personal property security exposure, for the relevant management department, it is time to take a certain management system, clean up the user's personal information security is not leaked.