信息通信技术与政策

信息通信技术与政策

信息通信技术与政策 ›› 2021, Vol. 47 ›› Issue (7): 53-.doi: 10.12267/j.issn.2096-5931.2021.07.008

上一篇    下一篇

隐私计算技术:数据流动与数据安全的协同保护规则构建*

Privacy preserving computing: the construction of synchronization rules for data flow and data security

赵精武,周瑞珏   

  1. 北京航空航天大学法学院,北京 102206
  • 出版日期:2021-07-15 发布日期:2021-08-01
  • 作者简介:
    赵精武:北京航空航天大学法学院助理教授,工业与信息化法治战略与管理重点实验室办公室主任,主要从事网络安全法、电信法等领域的研究工作
    周瑞珏:北京航空航天大学法学院博士研究生,主要从事网络安全法、电子商务法等领域的研究工作
  • 基金资助:
    国家社会科学基金重大项目(No. 16ZDA075)、国家重点研发计划项目(No. 2018YFC0830301)资助

ZHAO Jingwu, ZHOU Ruijue #br#   

  1. School of Law, Beihang University, Beijing 102206, China
  • Online:2021-07-15 Published:2021-08-01

摘要: 在推进数据生产要素市场化配置的政策导向下,隐私计算技术凭借异地处理原始数据、量化隐私保护水平等技术优势有效满足了国家现代化治理过程中对于数据安全保障和数据有效使用的双重需求。在该技术尚不成熟的当下,如何为该项技术提供良性发展的制度环境成为亟需解决的法律议题。在明确该技术促进数据安全保障义务转型的法律属性和“ 服务使用方-服务提供商-数据提供方” 的法律关系后,不难发现该技术的监管定位应当是技术标准与法律规则的聚合,即将该项技术以数据协作机制组成部分、技术模式分类监管和再识别风险预防等路径嵌入至现行数据安全立法体系。

关键词: 隐私计算, 数据安全, 隐私信息, 数据安全保障义务

Abstract: Under the policy guidance of promoting the market-oriented configuration of data production factors, privacy preserving computing has effectively met the dual needs of data security and effective use of data in the process of national modern governance by virtue of technical advantages such as remote processing of raw data and quantification of privacy protection levels. At this stage when the technology is not yet mature, how to provide an institutional environment for the reasonable development of the technology has become an urgent legal issue to be resolved. After clarifying the legal attributes of the technology to promote the transformation of data security guarantee obligations and the legal relationship of “service user-service provider-data provider”, it is not difficult to find that the regulatory positioning of this technology should be an aggregation of technical standards and legal rules. This technology is embedded in the current data security legislation system as part of the data collaboration mechanism, classified supervision of technology models, and re-identification of risk prevention.

Key words: privacy preserving computing, data security, privacy information, data security obligation