Page 28 - Proceedings of the 2017 ITU Kaleidoscope
P. 28
2017 ITU Kaleidoscope Academic Conference
data security incident occurs, personal information and 3.4. Closely keep track of data problems in emerging
privacy as well as overall social and economic security and areas
order, will be endangered. But countries shall not refuse to Based on big data, emerging technologies like cloud
eat just for fear of getting choked, and instead, they shall take computing, Internet of things, artificial intelligence (AI) are
active measures to cope with data security risks and maintain rapidly growing, and social and economic development are
the balance between big data security and development, and facing some new problems, for example, cross-border data
treat development as an aim and security as a safeguard. In transmission, data openness and security for Internet of
addition to strategies that promote the development of the big things, malicious source of data in connection with AI
data industry, countries can also give policy, financial and development and usage. To promote the development of the
human resource support to big data. In the meanwhile, the data-driven society, it is necessary to closely keep track of
relevant legislation that can clarify different data security new data-related problems in emerging technological and
responsibilities of individuals, businesses and the industrial sectors and actively seek technical, policy and
government shall be accelerated. And the awareness of data legal paths of solution, to promote faster development of new
security for enterprises and individuals can also be cultivated technologies.
through the relevant regulations.
REFERENCES
3.3. Put emphasis on the protection of the right to data
[1] Viktor Mayer-Schönberger, Kenneth Cukier: Big Data:
Big data development is based on a large amount of data, and A Revolution That Will Transform How We Live, Work,
to ensure sustainable sources of data, the right to data must and Think, translated by Yangyan Sheng, Tao Zhou,
be protected. As the right to data is a new kind of right which Zhejiang People’s Publishing House, 2013
is formed after the advent of the big data era, the right to data [2] Kaiser Fung, Numbers Rule Your World, translated by
is not clearly and uniformly defined by international rules or Yubin Qu, China Renmin University Press, 2013
national regulations so far However, major countries and [3] Hequan Wu, Chances and Challenges in the Age of Big
.
regions have specified the protection of the right to data. As
an innovative move, the EU General Data Protection Data, Qiushi Journal [J], Feb 2013
Regulation has provided for several new types of right, for [4] Global Big Data Exchange: White Paper of China’s Big
7
example, the right to amend, the right to be forgotten and the Data Industry in 2016 [R]
right to data portability. In the future of data-driven society, [5] David Cameron: Letter to government departments on
the right to data must be specified and highlighted by way of opening up data, 2010.
legislation, and the legal liability for the infringement of [6] World Bank: Towards Open Government for Enhanced
personal data must be implemented. And the varieties of the the Social Accountability (How to notes) [EB/OL]
right to data should be further enriched to offer full (2017-08-
protection to personal data rights. 31).http://caribbeanopeninstitute.org/node/98
First of all, specific laws about the protection of personal [7] UNCTAD: Data protection regulations and
information should be made to clarify the basic rights of international data flows: Implications for trade and
citizens for their own information, and to standardize the development [EB/OL] (2017-08-31).
collection and use of personal information of enterprises. http://unctad.org/en/PublicationsLibrary/dtlstict2016d
Secondly, personal information protection in the field of new 1_en.pdf.
technologies and new business should be enhanced. With the [8] Chander, Anupam and Le, Uyen P. Data Nationalism
development of Internet technologies, new businesses and [J], Emory Law Journal, 2015,64 (3) PP677-740.
technologies are continuously being created, and so attention
should be paid to the basic rules of personal information [9] OECD: Guidelines on the Protection of Privacy and
protection, as well as the features of new technologies and Trans-border Flows of Personal
new businesses. Lastly, international cooperation and dialog Data.http://www.oecd.org/sti/ieconomy/oecdguideline
should be reinforced. Member countries shall take an active sontheprotectionofprivacyandtransborderflowsofperso
part in making international or regional rules of personal naldata.htm
information protection, and strengthen cross-border [10] ITU: Big Data: Big Today, Normal
enforcement cooperation in personal information and Tomorrow.https://www.itu.int/dms_pub/itu-
privacy protection. t/oth/23/01/T23010000220001PDFE.pdf
[11] EU: General Data Protection Regulation
REGULATION (EU)
2016/679.http://ec.europa.eu/justice/data-
protection/reform/files/regulation_oj_en.pdf
7 See http://unctad.org/en/PublicationsLibrary/dtlstict2016d1_en.pdf., last
visit in Aug 23, 2017.
– 12 –