close

undefined


There is an urgent need to strengthen oversight of third party applications.

Sooner or later, as with self-driving cars, it is only a matter of time before big data leaks. In each big Internet companies, Facebook appear to be unlucky, 50 million user data were leaked really is too big, so almost all the world's media has carried on the attention to this matter, if zuckerberg through the typical crisis pr event, it will be a new legend.

Facebook the big data were leaked may make some Internet companies breath a sigh of relief, because many Internet companies will appear big data leaks, but enterprise well-knownness, reveal information quantity compared with Facebook, does not concern by the media, or is not the world media, such as in June 2017, the republican national committee, the contractor DeepRobotAnalytics configuration database, lead to 1.1 terabytes of data, contains over 198 million American voters name, date of birth, home address, phone number, registration details, such as information leakage.

It is not unusual for our residents to have a good understanding of the information leakage, and they will soon receive information about various training institutions and examination services. After the bank, the securities company formalities registration information, various loan, allocation, the telephone of the transaction also come to the point. Obviously, that means your message has been leaked.

The world of the Internet is very complex, and the technology can be exploited by lawless people. For example, when the technology is constantly upgraded and perfected, it can't prevent the production of malicious external hanging. No matter how the software company sets up the encryption, it will be cracked and then "Shared" on the market. We know that our information is leaked, but we can't know where the information comes from, whether it is technology or law, and it can't protect the user's information from being leaked.

If we do not provide personal information Internet companies, these companies will be eloquent, because trade is the behavior of both sides, you love I wish I can be completed, the company only for users who provide detailed personal information, for those who are not willing to provide detailed personal information, the company will be considered malicious behavior such as registration, disrupt the order, and will not be accepted. In this case, we can only submit the detailed personal information required by these enterprises, otherwise we can't enjoy the service, so the personal information is obtained by the Internet company. Also, based on the Internet the company's third party applications, also requires the user to open all your information, otherwise you won't enjoy the services provided by third party applications, and personal information was obtained more institutions.

Both direct use of the Internet platform and third-party applications in the Internet platform, we don't know these companies to after data, we will really do something, but we know in the Internet age, personal information is the "Internet +" enterprises realize the important tool of cash. Under the background of the age and the rapid development of technology, the protection of personal information we have been in a state of numbness, no matter how we protect personal information, personal information or will they all kinds of leakage, thus from private to public.

Nowadays, even after the event held accountable, we have no way to stop already leaks of user information, the current can do can only be gradually reduce information channels, in order to prevent the user information into a state of uncontrollable. Although third-party applications is not the main body of information disclosure, and in the increasingly open Internet environment, almost all the Internet platform introducing third-party applications to increase user viscosity, it also the protection of users' information caused a certain pressure, so a large number of third-party applications for supervision, auditing, to avoid such as Facebook and other personal information leakage caused by third party applications, the Internet companies and regulators need to increase the work.

First, the regulatory authorities need to introduce policies that require Internet platform companies to strengthen regulation, and the second is to require third-party applications to restrict personal information.

Second, the Internet platform need to strict audit of third party platform, to does not conform to the requirements of third party applications will never allow, to upgrade after the violation of third party applications will be pulled from the shelves, beware of third party applications do hurt themselves and platform credibility. Internet platform to monitor the application of the third party applications to user data, if there is not in conformity with the requirements, while refused to provide the data by warning, restrict, shelves, such as handling, protect the security of the user data.

Third, in order to realize the user to monitor their own data, each user has the right to know personal information was obtained, by which companies, platform in addition to the legal requirements departments such as public security bureau, everyone has the right to require organizations to delete, can not keep their own data, facilitate individual users to protect their information as well.

Fourth, third party applications company need self-discipline, it's not easy to do, otherwise the application is easy to be at a loss, so it also requires a third party application of continuous innovation, in accordance with the requirements of the national policy, platform and conditions according to user's requirements, the application of reasonable design.

arrow
arrow
    文章標籤
    財經
    全站熱搜

    The compounding 發表在 痞客邦 留言(0) 人氣()