First of all, there is no need to provide personal confidential information to any organization, group or individual unless it will adversely affect others. China should resolutely protect the privacy of such individuals and prevent Big Data from snooping and obtaining such information by using any potential collection equipment. In the process of big data application, there are two sources of private information, one is direct collection, and the other is obtained through data mining analysis. No matter what kind of private information is used, its analysis, utilization, transmission and circulation should be strictly restricted. For the first kind of personal privacy information, the permission of the privacy subject should be obtained when collecting it. The analysis and utilization of this kind of privacy information should not exceed the scope of authorization of the privacy subject. If the subsequent use needs to exceed the authorized scope or be used by other organizations, the permission of the information subject should be obtained again. For the private information obtained through analysis and mining, in addition to re-authorization, the original data used for analysis should also be included in the scope of personal privacy protection, and the use and transmission of this part of information should be compared with personal privacy protection.
When we analyze the reasons of privacy security in the era of big data, we should not only consider the reasons of technology itself, that is, the natural attributes of technology, but also consider external factors such as users of technology, that is, the social attributes of technology. In addition, from the perspective of invasion of privacy, there are many behaviors that will lead to invasion of personal privacy, with different themes and purposes. But the way they do this is big data technology.
In addition, before using and transmitting information, efforts should be made to check the authenticity and integrity of the information with the information subject, which can not only improve the accuracy of big data analysis results, but also reduce all kinds of infringement problems caused by information. Data processing institutions that do not meet the requirements of privacy protection shall refuse to provide or transmit personal information data to them. Personal privacy information should be anonymous during processing, application and transmission. If the conclusion of big data analysis involves unauthorized personal privacy, please do not use or sell it without authorization before obtaining new authorization from the privacy subject, and be sure to keep it properly. Once authorized, it must be anonymous again before it can be used again.