信息通信技术与政策

信息通信技术与政策

信息通信技术与政策 ›› 2021, Vol. 47 ›› Issue (7): 66-75.doi: 10.12267/j.issn.2096-5931.2021.07.010

上一篇    下一篇

隐私计算定向广告应用的法律边界

The legal boundaries of targeting advertising applications for privacy preserving computing

梁灯   

  1. 广东君信律师事务所,广州 510080
  • 出版日期:2021-07-15 发布日期:2021-08-01
  • 作者简介:
    梁灯:广东君信律师事务所合伙人,华南理工大学法学院(知识产权学院)、华南师范大学法学院兼职硕士研究生导师,执业及研究方向为网络法、数据合规、公司治理等

LIANG Deng#br#   

  1. Kingson Law Firm,Guangzhou 510080,China
  • Online:2021-07-15 Published:2021-08-01

摘要: 目标用户可见是定向广告运作的基础。在发现、追踪目标用户的过程中所使用、形成的用户画像并非都是具指向性的标识化数据,以隐私计算技术刻画用户画像是一个标签化而非标识化的过程。标签化的用户画像首先要求对数据进行隐身化处理,另外用户画像的刻画非由一方主体利用本地数据完成,画像形成是多方数据协同处理的结果。以隐私计算进行多方协同处理的技术分为中心化计算模式和分布式计算模式。使用不同隐私计算技术处理的不同类型、不同风险级别的个人信息,在不同场景下的合法性条件不同,法律的任务是为此确立相应的标准。

关键词: 隐私计算, 定向广告, 个人信息, 法律

Abstract: Target user visibility is the basis of targeting advertising operation. The user profiles used and formed in the process of finding and tracking target users are not all identifiable data, and depicting user profiles with privacy computing technology is a process of labeling rather than identification. Tagged user profiles firstly require the data to be stealthed. In addition, the depiction of user profiles is not completed by one party subject using local data, and the formation of profiles is the result of multi-party data collaborative processing. There are two kinds of technologies for multi-party collaborative processing based on privacy computing: one is centralized computing mode, and the other is distributed computing mode. Different types and risk levels of personal information processed by different privacy computing technologies have different legitimacy conditions in different scenarios. The task of law is to establish corresponding standards.

Key words: privacy preserving computing, targeting advertising, personal information, law