Douyin and Tsinghua University released the "Research Report on Global Data Election Governance" to promote data security and privacy protection with technology

Author:Cover news Time:2022.07.25

In the era of digital economy, data must be circulated to play its economic role, but data circulation has natural risks in terms of security and privacy. How can this contradiction be resolved?

At the Seminar of "Construction of Technical Practice and Law Application for Mutual Trusting Data Environment" held on July 15, Douyin Group's data and privacy legal teams jointly released the "Global Data Element Governance Research Report" and the Tsinghua University Data Governance Research Center The "Report on the Application of Privacy Computing Law" hopes to help the establishment and improvement of the credit protection mechanism of the digital industry through the interpretation of privacy protection computing computing and data protection legal adaptation rules, and to realize technology for data security and privacy protection.

Calculation of privacy protection, also known as privacy calculation and enhancement of privacy, refers to a technical system that realizes data value mining under the premise of providing privacy protection. Privacy protection computing technology can realize the calculation of the data in the encrypted state or non -transparent state to achieve the purpose of the privacy protection of each participant, and it is also the key to promoting the data factor market compliance.

With the development of the data economy, how to coordinate the "security and development" of the data field has become a problem facing the world. Two reports summarize the current development of data governance and regulations in the world's major countries and economic zones, and combine the latest development of privacy protection technology, giving specific protection plans. Liu Taoxiong, dean of the Innovation and Development Research Institute of Tsinghua University, pointed out that in the two links of data collection and transaction, the computing technology of privacy protection can play an important role. That is, when collecting as much as possible, personal information is used to avoid exposing user privacy; enhance technical security during transactions and avoid leakage of data information.

At present, more mature privacy protection computing technologies include federal learning, security multi -party computing, confidential computing (trust implementation environment), differential privacy and homogenic calculations. Lin Xingchen, senior engineer of the National Internet Emergency Center, believes that according to different specific scenarios, specific technical solutions can be built to achieve data transfer under the premise of privacy protection. But he also emphasized that there is no technology at present, which can meet the requirements of general scenes.

It is for this issue that the "Report on the Application of Privacy Equity Law" proposes to organically combine the calculation of privacy protection computing with the data security impact assessment, and jointly build a complete "data protection assessment system". The report pointed out that the calculation of privacy protection computing provides important technical support for the circulation of data elements, but when the data elements involve the processing of personal information, the compliance tools of the data protection impact assessment are also needed to form a joint force of technology and law, realizing the implementation of the law, realizing the realization For more protection of personal information and build the cornerstone of individual trust in the circulation of data elements.

"In the face of a variety of specific data processing scenarios, how should the privacy protection computing technology and the relevant data protection legal rules should be adapted in order to exert the synergy effect, realize the common development of data factors and data security privacy protection? We summarize the results of our past business practice. We also hope that more people can participate in related discussions and jointly promote technology to empower privacy protection and data security. "Tian Shen, the person in charge of the data and privacy legal affairs of Douyin Group.

Cover reporter Guo Wenjuan

- END -

Henan Zhoukou: The fifth phase of the city's "three batches" project construction activities were held

Zhoukou Daily · Zhou Dao client reporter Wang YanOn the morning of July 5th, Henan Province held the fifth three batch project construction activities. In accordance with the unified arrangements o

Four departments: "100 -day action" of gas safety from now on

According to the deployment requirements of the State Council's Safety Commission, the Safety Commission of the State Council, the Ministry of Emergency Management, the Ministry of Housing and Urban -...