Contact us
[email protected] | |
3275638434 | |
Paper Publishing WeChat |
Useful Links
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Article
Author(s)
Liu Yang, Zhang Jiahui, and Sun Kaiyang
Full-Text PDF XML 1641 Views
DOI:10.17265/1548-7709/2022.01.002
Affiliation(s)
School of Marine Law and Humanities,Dalian Ocean University, Dalian, China
ABSTRACT
COVID-19 has swept the whole our country andthe world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since January 24, and China has carried out intensive epidemic control. It is criticalfor effectively responding to COVID-19 to collect, collate and analyze people’s personal data. What’s more, obtaining identity information, travel records and health information of confirmed cases, suspected cases and close contacts has become a crucial step in epidemic investigation. All regions have made full use of big data to carry out personnel screening,travel records analysis and other related work in epidemic prevention and control, effectively improving the efficiency of epidemic prevention and control. However, data leakage, personnel privacy data exposure, and personal attack frequentlyoccurred in the process of personnel travel records analysis and epidemic prevention and control.It evenhappened in the WeChat group to forward a person’s name, phone number, address, ID number and other sensitive information. It brought discrimination, telephone and SMS harassment to the parties, which caused great harm to individuals. Based on these, lack ofinformation security and data security awareness and other issues were exposed.Therefore, while big data has been widely concerned and applied, attention should be paid to protecting personal privacy. It is urgent to pay more attention to data privacy and information securityin order to effectively protect the legitimate rights of the people. Therefore, measures can be taken to achieve this goal, such as improving the relevant legal system, strengthening technical means to enhance the supervision and management of information security and data protection.
KEYWORDS
Information security, data privacy, epidemic prevention and control, personal privacy protection.
Cite this paper
References