The most stringent data security management methods in the history solicit opinions, PlatON cloud map to provide technical support

The National Internet Information Office and the relevant departments have researched and drafted the "Data Security Management Measures (Draft for Comment)" (hereinafter referred to as "Draft for Comment"), and publicly solicited opinions from the public on May 28 for a period of one month.

This is the most stringent data security management method in domestic history, and the degree of rigor is comparable to the EU GDPR, which has attracted different responses from the society. Some of the technology companies and technology platforms involved have expressed their full support and some have responded silently. But objectively speaking, this means that the state attaches importance to providing institutional guarantees for data security.

In addition, under the imperative trend of protecting privacy, the "Draft for Comment" did not weaken the business model and scale of Internet companies. On the contrary, under the driving and functioning of the market, the available data will be more fully flowed, and the value of the data will be amplified, further promoting data assetization.

Deep section "Draft for Comment" to let the data be mastered by the owner

Nowadays, centralization platforms such as browsers, search engines and social networks provide free news information and social needs for netizens, allowing the latter to pay for the extravagance of privacy and collaborating with advertisers to target advertisements to netizens. While the network allows everyone to access convenience, it also makes personal data less and less controllable.

In this regard, Dr. Zou Chuanwei, chief economist of Platto Cloud, once said: " In order to better protect data privacy, the data should be mastered by the owner. " "Draft for Comment" has a total of rules, data collection, data processing, data security supervision The management and supplementary chapters are five chapters that return data to the data owner through authoritative regulations.

Among them, some key specifications for data collection and data processing are used:

The "Draft for Comment" clearly states that network operators must not force or mislead personal information subjects to agree to collect individuals by default, authorization, and function bundling on the grounds of improving service quality, improving user experience, directional push information, and developing new products. information.

The "Draft for Comment" proposes that network operators use user data and algorithms to push news information, commercial advertisements, etc. (hereinafter referred to as "directional push"), and should clearly indicate the word "fixed push" in an obvious way to provide users with the opportunity to stop receiving targeted push information. The function; when the user chooses to stop receiving the directional push information, the push should be stopped, and the user data and personal information such as the already collected device identification code should be deleted. The "Draft for Comment" takes into account all aspects of data security and requires clear data security owners. Personnel with relevant management work experience and data security expertise, and fulfill the responsibilities of the organization to develop data protection plans and supervise the implementation and organization of data security risk assessment. Although there is no clear provision for violations of the regulations, the powers and responsibilities of the person responsible for safety will contribute to the implementation of the "Draft for Comment" in the future.

Advocating the "Draft for Comment" PlatON cloud map provides full technical support

On the road of maintaining data privacy and security, the favorable provisions of policies and systems are of course “strong backing”, and the technical application and support is the “fundamental guarantee”. As a long-term deep-rooted blockchain and privacy computing technical team, Platon will support the publication of the "Draft for Comment" and provide full technical support for the implementation and promotion.

The "Draft for Comment" emphasizes that the state insists on ensuring equal emphasis on data security and development, encourages research and development of data security protection technologies, actively promotes the development and utilization of data resources, and guarantees the orderly and free flow of data in accordance with the law.

This means that the country is paying more and more attention to the development of data resources, and hopes to realize the data value while ensuring data security.

In the era of digital economy, data has become a core asset of strategic value for enterprises and countries. Data sharing and circulation will become rigid business needs, but the contradiction between privacy protection and efficient data flow is increasingly prominent, which greatly restricts data. The value of a strategic resource is fulfilled.

“Can there be a technology that perfectly answers and solves the following questions: trusted source data, verifiable data quality, priced data sharing, sustainable value ecology, auditable compliance. Legislation guarantees Innovative technology to realize the road of data management is now indispensable. Blockchain technology and cryptography technology are very important and necessary.” Mr. Sun Lilin, founder and CEO of PlatON, recently launched the international peak of “Digital Belt and Road” in 2019. It was pointed out in the forum.

PlatON Cloud Map has been in the industry for many years in the field of privacy computing represented by Secure Multi-party Computing (MPC). In order to allow multi-source heterogeneous data to flow and connect securely under the security of assembleable privacy, Platon is assembled by cryptographic algorithms such as verifiable computing, secure multi-party computing, zero-knowledge proof, homomorphic encryption, and secret sharing. The core of the comprehensive security architecture is to create a distributed network with high performance, scalability and strong privacy protection to support various types of distributed applications and distributed artificial intelligence.

Implement the "Draft for Comment" to achieve privacy protection and data sharing

With the continuous improvement of public safety awareness, privacy protection and its technical application have become a promising blue ocean market. Among them, the field of privacy computing is particularly optimistic.

Overseas, privacy computing has been valued at the beginning of Wall Street, and mainstream Wall Street institutions have long considered how to get the blockchain to the ground. For example, JPMorgan Chase, adopted Ethereum + Quorum (constellation), similar to the privacy problem through the state channel; and Swiss Bank, has always been known to protect the privacy of customer asset information. Of course, China does not lag behind overseas in the field of privacy computing. At present, it has found a technical path of theoretical engineering, and the industry is working together on engineering and systemization to move toward application.

In this context, if the “Draft for Comment” just released is implemented, it will urge Internet companies and big data companies to promote the use and flow of available information under the imperative trend of protecting privacy; on the other hand, promote data security. The development of technology promotes the development of data resources. However, under the guarantee of system and technology, privacy protection and data sharing are effectively paralleled. From data validation, data pricing to data transaction, and realizing data assetization, there is still a long way to go.

PlatON cloud map deep-root blockchain and privacy computing technology, while promoting data coordination computing and shared use, always put privacy protection at the top of the development. In the future, I hope that more organizations or individuals will join the privacy protection camp to defend human privacy and basic power.

For details of the "Data Security Management Measures (Draft for Comment)", please click on the following link: .