Information and Communications Technology and Policy

Information and Communications Technology and Policy

Information and Communications Technology and Policy ›› 2021, Vol. 47 ›› Issue (7): 53-.doi: 10.12267/j.issn.2096-5931.2021.07.008

Previous Articles     Next Articles

Privacy preserving computing: the construction of synchronization rules for data flow and data security

ZHAO Jingwu, ZHOU Ruijue #br#   

  1. School of Law, Beihang University, Beijing 102206, China
  • Online:2021-07-15 Published:2021-08-01

Abstract: Under the policy guidance of promoting the market-oriented configuration of data production factors, privacy preserving computing has effectively met the dual needs of data security and effective use of data in the process of national modern governance by virtue of technical advantages such as remote processing of raw data and quantification of privacy protection levels. At this stage when the technology is not yet mature, how to provide an institutional environment for the reasonable development of the technology has become an urgent legal issue to be resolved. After clarifying the legal attributes of the technology to promote the transformation of data security guarantee obligations and the legal relationship of “service user-service provider-data provider”, it is not difficult to find that the regulatory positioning of this technology should be an aggregation of technical standards and legal rules. This technology is embedded in the current data security legislation system as part of the data collaboration mechanism, classified supervision of technology models, and re-identification of risk prevention.

Key words: privacy preserving computing, data security, privacy information, data security obligation