News

The harm of face information leakage

With the wider application of face recognition system, more and more industries use face recognition technology. At the same time, the problem of personal privacy is also seriously challenged.

Password leaked, can reset, face information is exposed, can’t change? Maybe you don’t realize that once face information is leaked, it will be leaked for life.

The legislation of face information protection is backward

Although the laws and regulations related to the protection of personal information are constantly refined, governments have gradually attached great importance to the legislative work. For example, it puts forward enhanced requirements for face information and other biometric information protection; Or, clearly include personal biometric information into the scope of personal information; It is also stipulated that the collection and processing of personal information of a natural person should follow the principles of legality, legitimacy and necessity, and obtain the consent of the natural person or his guardian, and the adoptee still has the right to withdraw after consent; There are even national legislation to manage the installation of acquisition equipment. The installation of image acquisition and personal identification equipment in public places should comply with the relevant provisions of the state.

Methods of daily face information protection

However, legislation still lags behind the application speed of technology and the collection of immoral face information. Under the existing conditions, as an individual, we should also take precautions in daily life

1. Don’t use face changing software for entertainment.

2. Try to avoid opening all kinds of channels for face payment.

3. Read the software service agreement and privacy policy carefully.

4. Don’t share your face information in public channels.

5. Avoid face recognition on various apps and e-commerce platforms.

6. For users who upload face photos and fill in identity information and bank card information, it is recommended to select multiple verification methods as far as possible while opening face verification, so as to reduce the risk of single face verification. If any personal information security problem is found, it should be reported to relevant departments in time.

7. Take anti face recognition measures in public.

8. Avoid privacy information of face information at the Internet platform level implemented by security management technology.

Some of the privacy information leakage, tampering and loss events, such as face information, are subjective factors of network operators, while others are hackers using network technology to illegally invade the data system of network operators, steal information, tamper with data, resulting in data damage and loss. Network operators shall take technical measures to ensure the safety of personal information collected and stored.


Post time: May-21-2021