STEMM Institute Press
Science, Technology, Engineering, Management and Medicine
Research on Technical Security Vulnerabilities and Legal Regulations in the Storage Link of Personal Information Protection: Based on the Analysis of Classic Data Leakage Incidents
DOI: https://doi.org/10.62517/jel.202614105
Author(s)
Junyu Lai
Affiliation(s)
Guangzhou College of Commerce, Guangzhou, Guangdong, China
Abstract
With the development of the digital economy, personal information has become an important strategic resource. There is a significant "technology-legal gap" between the frequent technical security breaches in the storage section of personal information protection and the lagging legal regulations, leading to an escalation of the risk of large-scale data breaches. Based on an analysis of classic data breaches, this paper systematically reveals the predicaments and root causes caused by this gap. The core of the study is to propose and demonstrate a dynamic compliance framework of "legalization of technical standards + strengthening of liability" : through the two-way interaction of mandatory technical certification systems and stepped punitive damages mechanisms, to drive the transformation of personal information leakage towards proactive prevention. The framework aims to systematically bridge the gap between technical security and legal regulation, providing a critical path for improving the supporting mechanisms for the implementation of the Personal Information Protection Law.
Keywords
Technical Security Vulnerabilities; Data Breach Cases; Storage Section; Legal Regulation
References
[1] Zhao Ruhan, Chen Junxu. A Comparative Study of Cyberspace Governance in China, the United States and Europe: Experience, Challenges and Future Games [J/OL]. New media and society, 1-13 [2025-11-16]. https://link.cnki.net/urlid/CN.20251031.1731.002. [2] Wang Luomei. Research on Cybersecurity Risk Assessment Model in the Internet of Things Era [J]. Information recording materials, 2025, 26 (11) : 203-205. [3] Tai Xiaoning. Application and Research of Computer Network Security and Vulnerability Scanning Technology [J]. Network Security Technology and Application,2025,(10):25-28. [4] Chen Jing. Discussion on Computer Network Security Technology and Preventive Measures in the Era of Big Data [J]. And innovation of science and technology, 2025, (19) : 98-100 + 104. [5] Tan Xin. Application Scenarios and Paths of Artificial Intelligence Technology in Computer Network Security [J]. Paper Equipment and Materials, 2020,54(09):100-102. [6] Zhang Jing, Wu Xiaohui, Wu Mengdie. Computer network security protection technology based on intrusion detection [J]. Journal of electronic design engineering, 2025 (17) : 42-46. [7] You Pengcheng. Research on the Application of Data Encryption in Computer Network Security Protection [J]. Software, 2020,46(07):184-186. [8] Gao Yang. Computer Network Information Security Protection Based on Artificial Intelligence technology [J]. Encyclopedia Knowledge,2025,(21):11-13. [9] Yan Qi. Research on Criminal Law Regulation of Data Crimes in the Digital Economy Era [D]. Shanxi University of Finance and Economics,2025. [10] Xu Huaqing. Data the improvement of the crime of criminal law regulation research [D]. Yantai university, 2025. [11] Chen Kunling, Li Chaoyu. Integrated Application of "Artificial Intelligence +" technology in Information Security [J]. Digital Technology and Applications, 2020,43(05):69-72. [12] Fu Sunyun. Data encryption technology in Computer Network Security protection [J]. Information and Computer, 2020,37(08):93-95. [13] Zhao Bo, Yang Le, Ding Yanqing, et al. Research and status analysis of Data Encryption Storage and Authentication algorithms [J]. Network Security Technology and Application,2025,(04):47-51. [14] Chen Lin. Research on Legal Regulation of Personal Network Information Security Based on Face Recognition [J]. Ezhou university journal, 2025, 32 (02) : 12-15. [15] Ren Yanjun, Ge Xiaoyong. Data crime criminal law regulation of the path optimization analysis [J]. Journal of Beijing institute of police, 2025, (3) : 29-37. [16] Bai Peng, She Junjie, Li Ming, et al. Analysis of Computer Network Security Issues in the Information Age [J]. Digital Technology and Application, 25,43(01):55-57. [17] Zhou Jie. Data Security and Privacy Protection Strategies for Electronic Components in Cloud Computing Environment [J]. Electronic and information technology, 2025, 9 (01) : 4-6 + 9. [18] Ren Hong, Zhao Fan. A Review of security Vulnerability detection techniques for smart contracts [J]. Computer Applications,2024,44(S2):95-100. [19] Wang Sai. Research on Maintenance and Management Measures of Computer Network Security in the Big Data Era [J]. Network Security and Informatization,2024,(10):158-159. [20] Zhu Hao. Analysis of Information Security Issues and Prevention Strategies of Computer Network Technology in the Era of Big Data [J]. Information recording materials, 2024, 25 (09) : 43-45.
Copyright @ 2020-2035 STEMM Institute Press All Rights Reserved