Do you use cloud storage to store your own photos or files? As of this March, the number of domestic personal cloud users have more than 351 million people, including Baidu Cloud and Tencent Micro-disk users have broken billion, respectively, up to 134 million people and 124 million people. Who will protect the privacy of the personal data uploaded to the cloud? If there is no strict privacy laws to regulate, personal information once leaked, would bring huge security risks to citizens ' lives.
How personal privacy in the cloud guarantees
Cloud storage is an emerging information storage solution that allows users to transfer photos and videos to a disk, anytime, anywhere, from a mobile terminal, such as a smartphone or tablet, to a network, and can be easily retrieved by a page or computer client in other places where there is a network. However, the problem is that the data uploaded by users are not all encrypted, and for unencrypted files, administrators can view and delete them directly from the server platform. This kind of management model with "subjective initiative" can cause serious consequences in the event of an administrator violating professional ethics.
In addition, if the service providers stop operating, users in the cloud of personal privacy how to be protected? Now the major personal cloud service providers are scrambling to upgrade the network disk capacity, to seize market share, but can not avoid the problem is that the provision of cloud services in the annual funds invested in more than 500 million yuan, so huge capital injection, If there is no good business profit model, it is inevitable that the future, if the service providers due to losses and other causes of bankruptcy shutdown services, user data retention and data security will go?
If the user's mobile terminal or client username and password are compromised or illegally stolen, the user's privacy data security on the server will be difficult to guarantee. This means that the more information users upload to the cloud, the more personal privacy, the greater the risk of information security.
Industry regulatory standards need to be established
From the original nano-plate, rice plate and speed plate to the 115 network plate, cool disk to Baidu network disk, 360 network disk, the industry started from 2005, to now has entered a high-speed development phase, but the protection of personal privacy has not been unified industry regulatory standards, more concerned about the occupation of the market, enclosure building laboratories.
There are three models for the protection of network privacy in the world, the first one is the model of industry self-discipline, which is based on the United States, its core concept is: industry self-discipline, reduce legal restrictions, encourage and promote the development of Internet industry, reduce the pressure of network service providers; The second is the Technology protection model, The user privacy protection of the hope of the user, through some privacy software to protect themselves; The third is the legislation model, with the EU as the representative, advocated by the State through legislation to establish a legal network privacy protection of the basic principles and specific legal provisions, systems, On this basis, the corresponding judicial or administrative relief measures are established.
For users, in the use of the network disk upload information, should consider the comprehensive strength of the service provider, if necessary, the software dual protection, if it is very important or top-secret files, can not rely entirely on the cloud to backup, so as to avoid data loss after the service provider stopped operation. In addition, if users find personal privacy in the online disclosure, should promptly contact operators, the loss to a minimum.
Laws and regulations in general to be refined
At present, the level of privacy protection of personal network is comparatively low in our country. In 2000, the NPC Standing Committee made the decision on strengthening the protection of network information, in which the provisions relating to personal network privacy are mainly as follows: National protection can identify the personal identity of citizens and the electronic information involving the personal privacy of citizens. The personal electronic information collected by the network service provider and other enterprise institutions and their staff in the business activities must be kept in strict confidentiality and shall not be disclosed, tampered with, destroyed, sold or illegally provided to others. Network service providers and other enterprise institutions shall take technical and other necessary measures to ensure information security and prevent the disclosure, destruction and loss of personal electronic information collected by citizens in the business activities. Where information is disclosed, destroyed or lost, immediate remedial action shall be taken. In 2012, the State Council issued "on the promotion of information development and practical protection of the security of several views", the Ministry of Industry and Information technology in 2013 published the "Telecommunications and Internet users personal information protection provisions." However, our country does not have a special network privacy protection Law, under the realistic conditions, we need to make clear the scope of citizen information security, the right content of personal network privacy and the legal usage of citizen's personal information in the form of law, and ensure the management and protection duty of personal information managers.
Throughout the world, the EU's personal data protection has been an international model, and in 1995 the European Council issued the directive on personal protection and the free flow of such data, which is the most important legislation on data protection in the European Union, which regards information privacy as a fundamental human right. The EU Council adopted the Electronic Communications Data Protection Directive in 1996 as a supplemental and special provision to the EU Data Protection directive. The Private Data Privacy Act of 1998 on Electronic commerce has also entered into force. 1999, the European Commission has formulated the "General principles of Privacy rights protection on the Internet", "on the network software, hardware, invisible and automated personal data processing," "information on the highway personal data collection, the process of personal Rights protection Guide" and other relevant laws and regulations, For users and network service providers to provide a clear basis for the protection of privacy principles, so that in the Member States to effectively establish a network of privacy protection of the unified Law and regulation system.
There are also many notable places in the United States on Internet privacy protection. The United States combines the Constitution, federal and state regulations and industry self-discipline rules to provide a more comprehensive protection of the privacy of the Internet. The privacy law, enacted in 1974, is the Basic Law of privacy protection, so far, the United States does not have a comprehensive code to protect the privacy of personal information, but the federal and state governments of various types of privacy and security regulations, are sufficient to protect the corresponding personal information responsibility. Among them, the most important regulations are the Electronic Communications Privacy Act of 1986. In addition to this Act, Congress has enacted a series of laws to protect the privacy of information, such as the Freedom of Information Act, the Financial Privacy Act, the Children's Online Privacy Protection Act.
Extended Reading
Personal cloud storage Market is promising
Cloud storage has become a trend for future storage development. With the 4G network promotion, large data era, the user experience greatly enhanced, mobile interconnected multiple-screen terminal needs, personal cloud storage market prospects.
At present, domestic personal cloud manufacturers to gain market share, through the differentiation of competition routes, relying on their own advantages of deep User Service to enhance the user experience. For example: Baidu Cloud Disk phone back function will become the future flagship and attract more users. Tencent micro-disk with QQ offline download and file sharing to create their own differentiated services. Thunder fast transmission relies on its own video download innate advantages, through offline downloading, fast upload and wireless space sharing, collection and other functions to attract users. With the continuous development of cloud technology, cloud application, cloud call application, private cloud application, Cloud game application, Cloud Education application, Cloud meeting application, cloud Social application will gradually enter the public life.