Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Behind harassing calls: do we really manage data?

2025-01-15 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > IT Information >

Share

Shulou(Shulou.com)11/24 Report--

A long-time loyal senior member of China Mobile has encountered an unprecedented "data storm" while trying to experience platform marketing by opening small e-commerce stores on mainstream platforms such as Douyin and Tencent. Only one day after the real name registered phone call, he received a large number of "192" phone calls in a short time, mainly about bank promotion of business loans and other related content aimed at business owners.

In the face of the sudden bombardment of information, he asked several questions: what is this virtual number segment called "192"? Why do so many telemarketers suddenly choose to use this number to contact him? Does this mean that his private information has been leaked? How should he deal with and protect his rights and interests?

In fact, the "192" section is the official operating number of China Radio and Television Network Co., Ltd. (China Radio and Television) from May 17, 2022, and then put into 5G commercial use.

It is reported that fraudsters use paragraph "192" to defraud phone calls on a large scale. The most common tactic they use is to impersonate customer service personnel of institutions, claiming that the credit information of the victims is affected, and then induce them to carry out various operations, such as "canceling accounts" or "removing gold bars" to "lower interest rates". For example, Ms. Deng (a pseudonym) was directed to a website disguised as "JD.com", where she was told to deal with illegal credit under her name.

To this end, China Radio and Television has also issued a fraud warning notice for the "192" segment of the phone.

Not only the "192" segment, but also other virtual numbers such as "171", "170", "+ 87" and "+ 58" have a similar situation. they may also be used for various promotional or fraudulent activities, bothering many consumers.

Data Management: the Core of guarding Digital identity

In this digital age, our lives have been closely connected with all kinds of data. "Digital identity" is not only a phone number, but also email, social accounts, shopping records and other personal information. This information forms a "digital us" on the network, which to a large extent determines our experience in the online world.

As a result, everyone has to face a serious problem: how to protect our digital identity?

Generally speaking, in the face of harassing calls, we can adopt the following strategies:

Set up harassment interception: reject harassment text messages and phone calls by setting up operators and anti-harassment features included in Android, Apple and other mobile systems. In addition, if a phone number has been confirmed to be a harassing call, such as 192 1708 3113, 192 3121 6311, 192 2310 0605, 192 3985 3890, 192 9103 5192, 192 2310 0605, 162 6443 4697, it is recommended to manually block / block / block these numbers and inform relatives and friends to avoid further harassment.

Do not respond: if you answer and find that it is a harassing call, it is recommended to hang up immediately, do not communicate too much with each other.

Be vigilant: be especially vigilant against calls from unknown numbers, especially those claiming to win, promote or provide various services, so as to avoid being deceived.

Timely report: when you receive a harassment call, you can report it by calling 12321-the network bad and spam reporting center.

However, whenever we receive harassing calls like "192", we can't help thinking: how do these calls know our contact information? Our data is quickly illegally acquired, traded and used in unknown circumstances, which not only infringes on personal privacy, but also hides a bigger question. That is, how is our digital identity managed and protected in the online world?

The issue of personal privacy is only the tip of the iceberg, and the issue of data management is the big problem.

Data value and Management Dilemma

In 2020, the "opinions of the CPC Central Committee and the State Council on the Construction of a more perfect Market-oriented allocation system and Mechanism of factors" wrote "data" into the central document as a new type of production factor for the first time. Juxtaposed with land, labor, capital, technology and other traditional elements.

In December 2022, the opinions of the CPC Central Committee and the State Council on building a data foundation system to better play the role of data elements clearly pointed out: "fully realize the value of data elements and promote all people to share the development dividend of the digital economy." to provide strong support for deepening innovation-driven, promoting high-quality development, and promoting the modernization of the national governance system and governance capacity. "

Data has become a new factor of production, and its value is comparable to oil, oil and other traditional resources. Invigorating social data resources, empowering national economic work and improving national economic efficiency are all based on data as the result of the comprehensive management of the underlying factors of production in the next era.

But in contrast to its huge value potential, there is a particularly prominent data management mess at present.

From data leakage of individual users' names, phone numbers, addresses, shopping records, to illegal access to enterprise server data, data leakage, privacy violations and other problems emerge one after another, this reflects the non-standard and lack of unified standards of data management. This chaos not only restricts the maximization of data value, but also poses a threat to the national economic security and the privacy rights and interests of the people.

How to ensure the safe and compliant use of data through standardized data management has become an urgent problem to be solved.

Progress in data policy

In order to achieve efficient use and protection of data, it is particularly important to establish a set of perfect data management system. This not only involves the basic links such as data collection, storage, analysis and use, but also how to ensure the security, privacy and compliance of data in these links.

In recent years, China's policy-making in the field of data protection has made great progress. Taking the personal Information Protection Law of the people's Republic of China and the Network Security Law of the people's Republic of China as examples, these laws and regulations provide clear guiding principles for data processing and ensure the security and privacy of personal information. They not only define the definition, processing rules and legal responsibilities of personal information, but also emphasize the legal, legitimate and necessary principles that must be followed in the collection and use of personal information, and give a series of rights to the subject of personal information.

The policy reform in 2023 further strengthened our determination in data management. In March 2023, the CPC Central Committee and the State Council issued the "Plan for the Reform of Party and State institutions". It is clearly proposed to set up a State data Bureau to "undertake the responsibilities of comprehensively promoting the development of the digital economy, organizing and implementing the national big data strategy, promoting the construction of the basic system of data elements, and promoting the layout of digital infrastructure."

Data management is the key to realize the value of data, protect national economic security and people's privacy rights and interests. Only by strengthening data management and standardizing the use of data can we fully ensure the long-term development of the country and the basic rights and interests of the people while comprehensively greeting the data era.

Realistic loopholes and challenges

Policy formulation is just the beginning, and how to ensure that these policies are effectively implemented in practice is a more complex challenge.

In recent years, some incidents of data leakage and abuse have led us to see some loopholes in the implementation of data management.

As the main data collection and user, the Internet platform naturally undertakes the responsibility of data security and personal privacy protection. However, in the process of blindly pursuing economic interests, many platforms only regard data as a "new currency". This short-sighted strategy ignores the compliance management of data, leading to the abuse or disclosure of user data, which not only harms the rights and interests of users, but also poses a serious threat to the long-term reputation and credibility of the platform.

Internet platforms need to ensure their own data security and avoid data leakage and abuse. At the same time, they also need to establish a close cooperative relationship with relevant departments to jointly promote the landing of data management policies. The state can also help Internet platforms better fulfill their responsibilities of data management by strengthening supervision, providing technical support, and promoting the formulation of industry standards.

Data management is a complex system engineering, which requires joint efforts. Only when everyone can assume their own responsibilities, our digital life can be more secure and convenient.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

IT Information

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report