The abuse of new technologies represented by facial recognition must be regulated with “strong medicine” | New Technology_Sina Finance_Sina.com



[ad_1]

Who can best represent the rising power of China’s economy? The selection of the ten best economic figures of the year in 2020 is already underway. Who is your TOP10 business leader?[点击投票]


  Facial information has been repeatedly lost, strengthening the defense line is urgent

According to media reports, recently, an 80-year-old man in Xi’an, Shaanxi received a call claiming to be a public security officer in Beijing, claiming that he was suspected of money laundering, demanding that he transfer 2.38 million yuan to a so-called “secure account” and instructed him to use a remote control. The control software completes the facial recognition authentication and then transfers the money. The old man realized that he had been deceived and called the police, the case is solved.

In essence, this case is still a traditional telecommunications fraud, that is, the fraudster manipulated the victim to transfer money using wire fraud. But the difference is that the scammers use the very popular facial recognition method.

As we all know, mobile bank transfers can be configured with security verification links, such as fingerprints, faces, digital passwords, or pattern passwords, etc. This is originally to make funds more secure, but has been misused by some scammers. In the past, scammers framed the victim’s password and operated the transfer themselves, or instructed the victim to transfer to the bank window or ATM. However, after the bank increased the transfer confirmation and delayed the payment link, the scammer’s chances of success were greatly reduced. The “password” to manipulate the face can be transferred in real time, which can reduce the “excessive branches”. The aforementioned deluded seniors simply “blink” and “move” when necessary because they don’t know what facial recognition is, and they help the scammer submit a “password”.

A number of cases of loss of property related to facial recognition have caused anxiety in people about the security of information, especially the security of immutable biological information such as fingerprints and faces. Not long ago, more than a dozen homeowners in Nanning, Guangxi, trusted an agency to sell their homes. After they went out of their way to verify the real estate information without his knowledge, the houses were inexplicably transferred to other people. Now, although the case has been solved, the shadow it brought to the people may be difficult to dispel for a while.

The abuse of new technologies that facial recognition represents and the excessive collection of personal information must be regulated with “strong medicine”.

Today, stakeholders have a clear understanding of the harm from abuse of facial recognition technology, and relevant policies and laws are constantly improving. For example, the Cybersecurity Law stipulates that network operators must follow the principles of legality, fairness and necessity in the collection and use of personal information. , Public standards for collection and use, clearly stating the purpose, method and scope of the collection and use of the information, and with the consent of the person being collected. However, some regulations and limitations are still relatively strict. In some cases and practices, there is still a “lack of specific reference and basis”.

At the information usage level, facial information collectors often do not explain usage rules and scope to users, and subsequent storage and other links lack effective measures, or even have the ability to withstand risks. related. In this sense, the supervisory authority should regulate the excessive collection of personal information from the source, clarify the subjects that can collect personal information, supervise the process of use and circulation and, at the same time, focus on exploring the remedy mechanism. and stop loss after leak of personal information.

In March this year, the State Administration for Market Regulation and the National Administration for Standardization issued the “Information Security Technology Personal Information Security Specification”, which clearly requires that personal biometric information be notified by separate on the purpose, method and scope of use. Previously, Nanjing, Jiangsu required many sales offices to remove facial recognition systems, and some cities also planned to legislate to protect personal information such as faces. These are positive signs regulating the excessive collection of personal information. It is hoped that the relevant defense lines can be built as soon as possible.

Liu Bing

【Editor: Zhang Kaixin】

Massive information, accurate interpretation, all in the Sina Finance APP

Editor in charge: Qi Qiqi

[ad_2]