Recently, Internet tycoon Zhou Hongyi’s words have caused deep uneasiness among netizens. Some software will turn on the user’s camera, or turn on the microphone to record, and find some keywords to try to match the user’s interests the next day, he said. In fact, this is not a problem encountered by Zhou Hongyi alone, nor even a new one. As early as two years ago, some users found that when they opened a browser, the mobile phone camera automatically raised. Even some netizens reported that they didn’t even use their mobile phones. When they went to bed at night, they found that the camera of the mobile phone was raised. It was simply “the night of terror”.
Zhou Hongyi’s “Tucao” make complaints about App’s excessive claim and user privacy leakage. At the beginning of the Internet, people said: on the Internet, no one knows you are a dog. This widespread statement shows the public’s sense of novelty and infinite expectation for the Internet. But today, a more realistic statement might be: the Internet knows you better than you do. < / P > < p > maybe you even forget that you searched for a product yesterday, but today, the e-commerce platform will remind you in a conspicuous position: don’t forget to buy it. Maybe you just accidentally searched for the name of a stock, but soon, the sales calls from securities companies and stock recommendation services may be pouring in. Your preferences, needs and concerns can be seen at a glance on the Internet. Of course, there is no point in condemning blindly. The network world is made up of data bricks and tiles. Every human action on the Internet can be accurately recorded in the form of data. The only difference is whether there is anyone to explore and make use of this “case record”. If Internet enterprises want to provide services, they are bound to obtain some user information, which is the basis for the development of the industry. However, the more user information an enterprise collects, the greater the user value it obtains. Therefore, almost all Internet applications tend to collect user information as much as possible. Therefore, the real problem lies in how to define the boundary between Internet application and user information? How to balance the relationship between the development of Internet enterprises and the protection of personal privacy? < / P > < p > if this is a “tug of war”, then Internet users are obviously on the weak side. In November 2018, an evaluation report released by China Consumer Association showed that among 100 apps, as many as 91 apps were suspected of “crossing the border”, that is, excessive collection of user personal information existed. Not long ago, the Ministry of industry and information technology released the list of the third batch of apps that infringed on the rights and interests of users in 2020. Among the 58 apps named, almost all of them collected personal information privately or excessively claimed rights. In the special governance work of illegal collection and use of personal information of APP jointly carried out by the central network information office and other four departments, more than 12000 pieces of effective information reported by netizens, involving more than 2300 apps, were received in only one year in 2019. Therefore, it is necessary for the competent authorities to “step in”, legislate prudently, strictly enforce the law, standardize, supervise and guide the development of the industry. In fact, the protection of network personal information is a new problem facing the whole world, and there is no mature experience to follow. In this aspect of legislative exploration, China can be said to be in the forefront of the world. In addition to the “network security law” and “e-commerce law” and other important laws, the “Civil Code” which has just been deliberated and passed this year also involves many aspects of personal information protection and network service standards. For example, the civil code clearly stipulates that the information processor shall not divulge or tamper with the personal information collected and stored by him; without the consent of a natural person, he shall not illegally provide his personal information to others, except for those who cannot identify specific individuals after processing and cannot be recovered. < / P > < p > in addition, the promulgation of standards and norms such as the personal information security specification of information security technology and the identification method of app’s illegal collection and use of personal information has also further refined the behavior boundary of Internet enterprises, and made more clear provisions on the problems of excessive claim for rights and improper use of personal information in Internet applications. < / P > < p > since this year, the Ministry of industry and information technology has informed the list of three batches of apps that infringe on the rights and interests of users and interviewed relevant enterprises for many times. However, as Zheng Ning, director of the law department of the school of cultural industry management, Communication University of China, said: “if the Ministry of industry and information technology only punishes according to the regulations of relevant departments, it can only give a warning and impose a certain amount of fine (usually less than 30000 yuan), which is very low cost for violators.” As a reference, in January 2019, Google was fined a hefty 50 million euro for violating the EU’s general data protection regulation (gdpr). < / P > < p > only by making the law grow “teeth”, increasing the cost of illegal business, and infringing on the rights and interests of users, can enterprises feel “pain”. We must let Internet giants understand that it is not a trivial matter to collect and utilize user information at will. < p > < p > in addition, the leakage of network individuals also has strong concealment. Robin Li once had “Chinese people willing to use privacy for convenience”, once controversial. However, the premise of “willing to trade privacy for convenience” is that some people choose and know how to choose. However, for ordinary users who do not have professional knowledge, they may not know whether their information has been leaked and how to disclose it. Even if the fraud call comes to the door, they still don’t know where the fault is and how to choose. While some apps are not authorized to use, users have no choice at all. < / P > < p > therefore, self-discipline of the industry itself is also very important. For example, we might as well discuss and negotiate with industry members in the form of industry associations to find a balance between the interests of the industry and the interests of users. Through the advice and supervision of professionals, help enterprises establish data protection mechanism. In the aspect of information protection, we should encourage the survival of the fittest in the industry. After all, the development of an industry cannot be based on stealing and abusing user information. As soon as possible to find a reasonable use of user information development road, but also as soon as possible to find the healthy development of the industry.