Page 28 - Proceedings of the 2017 ITU Kaleidoscope
P. 28

2017 ITU Kaleidoscope Academic Conference




           data  security  incident  occurs,  personal  information  and   3.4. Closely keep track of data problems in  emerging
           privacy as well as overall social and economic security and   areas
           order, will be endangered. But countries shall not refuse to   Based on big data, emerging technologies like cloud
           eat just for fear of getting choked, and instead, they shall take   computing, Internet of things, artificial intelligence (AI) are
           active measures to cope with data security risks and maintain   rapidly growing, and social and economic development are
           the balance between big data security and development, and   facing some new problems, for example, cross-border data
           treat development as an aim and security as a safeguard. In   transmission, data openness and security  for Internet of
           addition to strategies that promote the development of the big   things,  malicious source of  data in connection  with  AI
           data industry, countries can also give policy, financial and   development and usage. To promote the development of the
           human resource support to big data. In the meanwhile, the   data-driven society, it is necessary to closely keep track of
           relevant legislation that can  clarify different data  security   new data-related problems in emerging technological and
           responsibilities of  individuals,  businesses and the   industrial sectors and actively seek technical, policy and
           government shall be accelerated. And the awareness of data   legal paths of solution, to promote faster development of new
           security for enterprises and individuals can also be cultivated   technologies.
           through the relevant regulations.
                                                                               REFERENCES
           3.3. Put emphasis on the protection of the right to data
                                                              [1] Viktor Mayer-Schönberger, Kenneth Cukier: Big Data:
           Big data development is based on a large amount of data, and   A Revolution That Will Transform How We Live, Work,
           to ensure sustainable sources of data, the right to data must   and Think, translated by Yangyan Sheng, Tao Zhou,
           be protected. As the right to data is a new kind of right which   Zhejiang People’s Publishing House, 2013
           is formed after the advent of the big data era, the right to data   [2] Kaiser Fung, Numbers Rule Your World, translated by
           is not clearly and uniformly defined by international rules or   Yubin Qu, China Renmin University Press, 2013
           national regulations  so far However, major countries and   [3] Hequan Wu, Chances and Challenges in the Age of Big
                                 .
           regions have specified the protection of the right to data. As
           an innovative  move, the  EU  General Data  Protection   Data, Qiushi Journal [J], Feb 2013
           Regulation   has provided for several new types of right, for   [4] Global Big Data Exchange: White Paper of China’s Big
                    7
           example, the right to amend, the right to be forgotten and the   Data Industry in 2016 [R]
           right to data portability. In the future of data-driven society,   [5] David Cameron: Letter to government departments on
           the right to data must be specified and highlighted by way of   opening up data, 2010.
           legislation, and the legal liability  for the infringement of   [6] World Bank: Towards Open Government for Enhanced
           personal data must be implemented. And the varieties of the   the Social Accountability (How to notes) [EB/OL]
           right to data should be further enriched to offer full   (2017-08-
           protection to personal data rights.                    31).http://caribbeanopeninstitute.org/node/98
           First of all, specific laws about the protection of personal   [7] UNCTAD: Data protection regulations and
           information should be made to clarify the basic rights of   international data flows: Implications for trade and
           citizens for their own information, and to standardize the   development [EB/OL] (2017-08-31).
           collection and use of personal information of enterprises.   http://unctad.org/en/PublicationsLibrary/dtlstict2016d
           Secondly, personal information protection in the field of new   1_en.pdf.
           technologies and new business should be enhanced. With the   [8] Chander, Anupam and Le, Uyen P. Data Nationalism
           development of Internet technologies,  new businesses and   [J], Emory Law Journal, 2015,64 (3) PP677-740.
           technologies are continuously being created, and so attention
           should be  paid to the basic  rules of personal information   [9] OECD: Guidelines on the Protection of Privacy and
           protection, as well as the features of new technologies and   Trans-border Flows of Personal
           new businesses. Lastly, international cooperation and dialog   Data.http://www.oecd.org/sti/ieconomy/oecdguideline
           should be reinforced. Member countries shall take an active   sontheprotectionofprivacyandtransborderflowsofperso
           part in  making international  or regional rules of personal   naldata.htm
           information  protection,  and  strengthen  cross-border   [10] ITU: Big Data: Big Today, Normal
           enforcement cooperation in personal information and    Tomorrow.https://www.itu.int/dms_pub/itu-
           privacy protection.                                    t/oth/23/01/T23010000220001PDFE.pdf
                                                              [11] EU: General Data Protection Regulation
                                                                  REGULATION (EU)
                                                                  2016/679.http://ec.europa.eu/justice/data-
                                                                  protection/reform/files/regulation_oj_en.pdf






           7 See http://unctad.org/en/PublicationsLibrary/dtlstict2016d1_en.pdf., last
           visit in Aug 23, 2017.



                                                          – 12 –
   23   24   25   26   27   28   29   30   31   32   33