Media: Small and micro consumption scenarios cannot become blind spots for information protection. One cup of milk tea generates 87 pieces of data. Information security | consumption | information

Release time:Apr 13, 2024 22:18 PM

Buying a cup of milk tea may not be a big deal, but it reflects the issues of consumer behavior and information security in certain scenarios, which should be given sufficient attention. How to strip sensitive information from massive personal information and make good use of other available information is of great significance for the development of the information industry, balancing the relationship between technology and information application and user rights, and improving people's lives and consumption experience.

According to a report from Pengpai News Network, the Shanghai Cyberspace Administration recently found that a well-known chain milk tea brand can generate 87 pieces of data for every order received. As of March this year, it has accumulated over 10 billion pieces of data, including 670 million sensitive personal information such as consumer names, phone numbers, and shipping address latitude. On June 16th, Shanghai launched the "Bright Sword Pujiang · Consumer Personal Information Rights Protection Special Law Enforcement Action", focusing on key consumption areas such as restaurants and parking QR codes, and carrying out centralized rectification of illegal behaviors such as "excessive collection, forced collection, inducement, and illegal use" of personal information.

Buying one cup of milk tea generated 87 data points, which surprised the public. Among these data information, some are core sensitive information that the public is very concerned about, such as name, phone number, address latitude and longitude, etc. In addition, there is also a lot of information that appears to have no obvious harm to individuals but has commercial value for market research and predicting consumption trends in related industries, such as consumption records, taste preferences, IP addresses, phone models, etc.

In recent years, life services in many cities have become increasingly intelligent, with online operations and QR code transactions visible everywhere. From downloading and using apps in app stores, to ordering and paying for meals in restaurants, parking and fees, it can even be said that wherever there is a usage scenario for mobile phones, there may be phenomena such as excessive claims, forced attention, and technological capture of user information. The defense line for protecting personal information is facing increasingly severe challenges.

The excessive collection and illegal use of personal information is primarily due to the unequal status of both parties involved in the transaction or service. In situations where there is "no agreement or authorization to proceed to the next step", "no location information provided, no ordering", and other "voluntary" situations, excessive claims and other actions become shameless; Secondly, the widespread use of professional technical means has led the public into a situation of "naked running" of personal information without realizing it; At the same time, commercial impulses have made collecting and selling personal information a business. Some companies use technological means to illegally steal personal information, while others resell the collected personal information to third-party data agencies. In addition, many ordinary people are not sensitive to personal information security issues, which to some extent provides opportunities for those with ulterior motives to take advantage of.

The harm of running naked with personal information is serious. In recent years, there have been numerous cases of accurate profiling based on personal consumption habits and other factors, which have led to telecommunications fraud, online violence, and harassment of information. More seriously, it may also pose a potential threat to the personal safety of citizens and even national security.

The case of buying one cup of milk tea and generating 87 pieces of data reminds us that even the smallest amount of electronic transactions may be related to data security issues. We need to gather broader consensus and jointly face and explore measures to address it.

At present, China's Cybersecurity Law, Data Security Law, and Personal Information Protection Law have made authoritative regulations on personal information protection, and have also provided clear responses to some key issues. For example, in the collection of personal information, the principles of "informed, consent, and minimum necessity" have been established. However, the technology and refinement of personal information collection are gradually improving. How can relevant laws and regulations be quickly followed up and more accurately regulated? The prospects and practical needs for the resource and commercial application of personal information are becoming increasingly apparent. How can the protection and utilization of personal information be "each with its own advantages and disadvantages"?

In the long run, the protection of personal information is not to isolate information data from the Internet economy, but to explore how to achieve win-win information protection and utilization on the basis of necessity, rationality and compliance. In the era of big data and informatization, various types of basic information are important resources, and commercial applications are also a trend. How to strip sensitive information from massive personal information and make good use of other available information is of great significance for the development of the information industry, balancing the relationship between technology and information application and user rights, and improving people's lives and consumption experience. Recently, the China Consumer Association proposed that it would carry out special supervision work nationwide on issues such as compulsory attention to official account and excessive claims for rights. Such measures are more beneficial.

Buying a cup of milk tea may not be a big deal, but it reflects the issues of consumer behavior and information security in certain scenarios, which should be given sufficient attention. When the "nerve endings" of social and economic life are also facing personal information security risks, it is very important to implement governance concepts and measures from the macro level to the micro level. It is our common expectation to pay attention to personal information protection in small and micro consumption scenarios, just like focusing on data security on big platforms, and not to let it become a breakthrough point for personal information defense lines to be torn apart at will.

Two women were stabbed to death and reported to have committed a crime 4 days before the follow-up visit for schizophrenia. Suspect of a bloody murder case in a Hong Kong shopping mall appeared in court today. Male | Last Friday | Murder case
Two women were stabbed to death and reported to have committed a crime 4 days before the follow-up visit for schizophrenia. Suspect of a bloody murder case in a Hong Kong shopping mall appeared in court today. Male | Last Friday | Murder case

According to Hong Kong's Wen Wei Po, a bloody knife stabbing case occurred at Hollywood Square in Diamond Hill last Friday. The police arrested a 39 year old man on suspicion of stabbing two young women, one of whom was stabbed over 30 times. The suspect appeared in the Kwun Tong Magistrates Court this morning. The police at the Kwun Tong Magistrate's Court temporarily charged the suspect with two counts of murder last Sunday. The suspect appeared in court this morning at the Kwun Tong Magistrate's Court. Acting Chief Magistrate Zheng Jihang, after listening to the opinions of both the prosecution and defense, decided to postpone the hearing for two weeks until 9:30 am on June 19th, waiting for two psychiatric expert reports to be obtained. The defense did not object. Zheng Jihang approved the application, and the defendant needs to be temporarily detained at Xiaolan Mental Hospital. When the suspect appeared in court, he wore black framed glasses, a light gray shirt, and camouflage green shorts, and was able to answer the judge's questions normally. accordingly

Secretary of the Provincial Party Committee: The focus of Henan's "summer harvest" has shifted to agricultural machinery in the northern region of Henan Province. | Support | Science | Organization | Province | Northern Henan | Summer Harvest | Rush Harvest
Secretary of the Provincial Party Committee: The focus of Henan's "summer harvest" has shifted to agricultural machinery in the northern region of Henan Province. | Support | Science | Organization | Province | Northern Henan | Summer Harvest | Rush Harvest

Currently, the highly anticipated summer harvest work in Henan has shifted its focus to the northern region of Henan. According to the Henan Daily client, on June 4th, Lou Yangsheng, Secretary of the Henan Provincial Party Committee, presided over a special video scheduling meeting on the "Three Summers" work in the province, listened to the situation report, analyzed and judged the situation, and arranged and deployed the next steps of work. Governor Wang Kai made specific arrangements. On the evening of May 31, 2023, in Xiafutou Village, Xuliang Town, Boai County, Jiaozuo, Henan Province, villagers braved light rain in the wheat fields to harvest wheat. Visual China Map Lou Yangsheng pointed out that the current summer harvest battle in the province has entered the decisive stage. Doing a good job in summer harvest in northern Henan Province is related to the summer grain yield and seed safety. We should focus on seizing opportunities and make every effort to organize the wheat harvesting work in the northern Henan region, minimize losses, and protect the interests of farmers to the greatest extent possible. Accurate forecasting is essential

Xinhua All Media+| Welcome home! What innovative technologies are protecting the return journey of Shenzhou 15? Spaceship | Shenzhou | Technology
Xinhua All Media+| Welcome home! What innovative technologies are protecting the return journey of Shenzhou 15? Spaceship | Shenzhou | Technology

On June 4th, the return capsule of the Shenzhou-15 manned spacecraft successfully landed at the Dongfeng landing site. Astronauts Fei Junlong, Deng Qingming, and Zhang Lu all safely and smoothly exited the spacecraft, and the Shenzhou-15 manned flight mission was a complete success. What innovative technologies are there to safeguard the return journey of Shenzhou 15 in this mission? On June 4th, the return capsule of the Shenzhou-15 manned spacecraft successfully landed at the Dongfeng landing site. Xinhua News Agency reporter Lian Zhen photographed that "the sky and the ground" ensure the high-precision return of spacecraft. For the Shenzhou series spacecraft, the return and re-entry GNC technology is directly related to the life safety of astronauts. Taking the success of this return mission as a symbol, China has comprehensively upgraded its GNC system since the Shenzhou-12 manned spacecraft, which features autonomous rapid rendezvous and docking, autonomous adaptive prediction and re-entry return guidance, and has completed a comprehensive update and replacement

The Chinese naval fleet has arrived! Assembly | Navy | Chinese Fleet
The Chinese naval fleet has arrived! Assembly | Navy | Chinese Fleet

At noon today, a Chinese naval fleet consisting of Zhanjiang and Xuchang ships arrived at the assembly area of the "Comodo-2023" multinational maritime joint exercise. It is understood that the assembly anchorage for this exercise is 3 nautical miles long and 1.5 nautical miles wide, capable of anchoring up to 50 ships. Naval vessels from various countries participating in the exercise will also arrive at the anchorage today to complete the assembly of the "Komodo 2023" multinational maritime joint exercise, which is held every two years by the Indonesian Navy. This year is already the fourth edition of the exercise. The exercise will be held from June 5th to 8th in the city of Jakarta, South Sulawesi Province, Indonesia, including the port and sea phases. In the coming days, participating navies from various countries will participate in ship reading style search and rescue exercises, maritime interception and damage management exercises, aerial exercises, and other course objectives exercises

New comment: Donkey like "morale" limit pulls US debt "bomb" fuse hard to dismantle US | debt | morale
New comment: Donkey like "morale" limit pulls US debt "bomb" fuse hard to dismantle US | debt | morale

On the evening of June 1st, the US Senate passed a bill on the federal government's debt ceiling and budget, and the flame of the US debt bomb was temporarily extinguished at the last moment. The two parties in the United States have staged an extreme tug of war over the US debt bomb. Some experts believe that the US debt crisis is the result of the reckless politics promoted by the US dollar hegemony, and the underlying cause of this crisis is the highly polarized political system of the US. Since the end of World War II, the US Congress has adjusted the debt ceiling more than a hundred times. The recurring debt crisis will not only have a catastrophic impact on the US economy and people's livelihoods, but also continuously erode the value of US dollar assets such as government credit and US bonds, bringing significant and far-reaching impacts to the global economic landscape. 【