In the prevention and control of the epidemic, new technologies such as artificial intelligence and big data have crossed the sea, showing their own magic power and building a smart defense line. However, technology is a double-edged sword. For the need of prevention and control, some government departments, public institutions and enterprises have collected a large number of personal information of citizens, including some privacy information. However, there are gaps in relevant supporting systems, which aggravate the risk of information disclosure. In fact, during the epidemic period, citizen information leakage happened occasionally, which caused people's concern.
In recent years, the legislation in the field of personal information protection has made great progress, but with the rapid development of new technology, there are still some deficiencies in the legislative level. With the situation of epidemic prevention and control becoming better and better, the information management during the resumption period is conducive to the proper handling of citizens' information after the end of the epidemic, as well as the long-term protection of citizens' personal information in China. We should perfect the policy framework of information protection, seek the possible balance between personal life, business interests and social governance, take protecting personal rights and interests and promoting information circulation as the criterion, find the balance point of information utilization and security, and start from the following aspects.
First, promote the public authority to establish the concept of citizens' personal information protection. In the early stage of epidemic prevention and control, due to the needs of rapid control of epidemic transmission, administrative efficiency and social public interest, some processing methods are more convenient, deterrent, but ignore the protection of personal information. In response, the central network information office issued a notice to support the joint defense and joint control with big data, requiring that the personal information necessary for the collection of joint defense and joint control should adhere to the principle of minimum scope, and the institutions that collect or master personal information should be responsible for the security protection of personal information. The administrative organ should attach importance to the interest and method of interest measurement of information utilization, focus on the result of interest measurement, give consideration to the protection and utilization of information, and realize the goal of maximizing information efficiency on the premise of protecting human dignity. Public power organs should also build a model of classified management and screening of citizens' information. According to the relevance of information and personal dignity, the protection status required by information, information collection channels, etc., they should provide different types of information with different intensity and ways of protection, and decide which information is authorized to be used once, which information is authorized to flow freely and which information is authorized to be used once What information needs to be protected. Public authorities can set up a positive list of information that should be collected to balance the needs of epidemic prevention and control management and the protection of citizens' information. With the epidemic situation getting better, personal information protection should be paid more attention to, and the collected citizen information should be handled properly after the epidemic. In addition, it is necessary to build a traceable chain of responsibility for information protection to prevent information leakage.
Second, strengthen the industry self-discipline of Internet enterprises. Many Internet enterprises have designed small programs for the convenience of the public in response to the epidemic, which is worthy of recognition. However, some Internet enterprises have over collected personal information and even leaked relevant information. In addition to the Internet enterprises, many supermarkets, pharmacies, public transport and subway also hold a large number of detailed personal information. The notice of the central network information office clearly states that, except for the institutions authorized by the health department of the State Council, no other unit or individual shall collect and use personal information without the consent of the collected person on the grounds of epidemic prevention and control and disease prevention and control, and shall not use the data for other purposes. Enterprises must obtain the consent of consumers to collect and use personal information and follow the principles of legality, legitimacy and necessity. In addition, enterprises should also embed privacy protection into product design and business model, the purpose of user centered, fully respect users' privacy and choice, and provide more user-friendly services for users' data security.
Third, with the help of blockchain and other new technologies, information security and orderly sharing can be realized. Blockchain is a decentralized distributed ledger technology, which has the characteristics of transparency, credibility, tamper proof, traceability and high reliability. Combined with the consensus mechanism, encryption mechanism, point-to-point network and other technologies of blockchain technology, we can build an information management scheme based on blockchain, achieve information sharing through access control mechanism, and encrypt sensitive information in the data cloud to improve information security. In addition, relevant authorities and enterprises should constantly fill in technological loopholes, carry out technological development, make good use of new technological means and reduce unnecessary exposure of personal information.
Fourth, cultivate citizens' personal information literacy in the era of big data. During the epidemic, some people believed and forwarded rumors, causing panic; others were leaked and harassed; others were exposed to other people's information and punished. This shows that the information literacy of our citizens needs to be improved. Information literacy requires citizens not only to be able to distinguish the true and false information, but also to have a certain understanding of their information rights and obligations. The Internet is a hodgepodge. It's hard to distinguish the true and false information. Citizens should pay more attention to the information of authoritative media and think critically about the source, identity, content basis and data source of information.
Information security attack and defense war is a long-term game, in the foreseeable future, no one can do nothing to rest assured. The government, enterprises, technology and users must make concerted efforts to build a four in one defense system by combining multiple approaches and punishments.