Beijing Daily commented: The next stop of the Internet can no longer sacrifice security for convenience.

The National Network Information Office recently issued a notice on the "Regulations on the Management of Network Data Security" and publicly solicited opinions. In particular, when data processors use biometrics for personal identity authentication, they should evaluate the necessity and safety, and should not take biometrics such as face, gait, fingerprint, iris and voiceprint as the only personal identity authentication method.

With the iterative upgrading of technology, biometric network authentication has become a new trend, but the risks involved are worrying. From fingerprints to faces, from gait to voiceprints, biological features are unique and basic for everyone. Once abused or leaked, the negative impact is immeasurable. Take the face as an example, it is used by businesses for precision marketing and may fall into the hands of fraudsters. Previously, "who stole my face" has caused many disputes, and there have also been embarrassing situations in which consumers wear helmets to see the house and owners wear hats and masks to go home armed. In this sense, it is clear that login authentication cannot be the "only" biometric feature, which is a practical protection of personal privacy and a timely response to the current focus issues.

The Internet was born 52 years ago and connected to China for 27 years. Its biggest label has always been "convenience". Convenient communication, from email to Weibo WeChat, Wan also chatted easily; Shopping is convenient, all major platforms sweep goods around the world, and you can easily place orders without leaving home; Convenient life, online consultation, * * * enjoy the course, and a network cable meets the actual needs. However, through the "prosperity" of the online world, we also see the almost unrestricted development and application of technology and the excessive demand for personal information. If people just touch the net, or transfer some rights without knowing it or for convenience, then now, when "one chopstick will give you a table", when the individual's name, phone number and fingerprint face are clearly marked, it is time to be alert to the negative spillover effect of "convenience".

Today's Internet in China has a huge group of netizens in the world. After the first half of the game, what is the next stop for improving the quality and efficiency of the Internet? The most important thing is to keep the red line of personal privacy protection and no longer sacrifice safety for convenience. In recent years, with the promulgation of civil code, personal information protection law, network security law, data security law and other different levels and different types of laws and regulations, China's data governance rules system has been gradually established and improved, but compared with the rapid application of technology, the system update is always lagging behind. * * * Enjoying the "sequela" of governance caused by the disorderly delivery of bicycles and the "information cocoon room" brought by the popularity of algorithm recommendation all remind us that since the "time difference" in governance is inevitable, it is even more important to see things earlier, think about the problems first and set the rules first.

User data, how to store and transmit it, who has access, at what level, what kind of authorization should be obtained, and what kind of punishment will be imposed if it is violated ... These issues should not only be written on paper, but also be implemented. On the whole, the power of rule of law in China is not strong enough at present. It is necessary to take general problems as the starting point and specific cases as the starting point to really make the law grow "teeth". The severe punishment of "data thieves" is also a necessary reminder for the development of more new technologies and applications, ensuring that information security awareness is integrated into the first-line code.

Network life has long been an important subset of public life, no one wants to build a car behind closed doors, and information is in a "streaking" state. What we can do is to make technology run on a standardized track, so as to benefit society, instead of harassing life.

(Original title: The next stop of the Internet can no longer sacrifice security for convenience)

Source Beijing Daily author Tang Huazhen

Liu Weili, process editor