摘要
作为一种音视频欺骗技术,深度伪造技术的高度仿真性、操作便捷性、高速进化性以及人身关联性使其与个人信息保护密不可分,且存在极大的异化风险,如导致科技向善理念失守、侵犯公民人身财产权益、引发公众信任危机、妨害司法公正、危害公共安全。由于当前我国刑法对该行为的规制仍存在个人信息保护缺弱、打击非法使用行为疲软等不足,故应当根据深度伪造技术运用的流程构建“三端共治”模式,即前端对个人生物识别信息进行提级保护、中端治理非法使用行为、末端准确认定下游犯罪,从而有效治理滥用深度伪造技术的犯罪行为,引导科技向善。未来还应当基于“三端共治”模式细化相关规定、增强公民的信息素养,并提高深度伪造检测技术,实现技术与法律的综合治理。
As a voice and video deception technology,the highly-degree simulation,convenient operation,high-speed evolution and personal connection of deepfake technology make itself closely related to the protection of personal information,and there is a great risk of alienation,such as leading to the loss of the principle of Technology for Good,infringing on the personal and property rights and interests of citizens,triggering a public trust crisis,impeding judicial justice,and jeopardizing public security.Due to the current weak criminal law regulations of personal information protection and crackdown on illegal use of deepfake technology in China,it is necessary to build a“Three-terminal Common Governance”model which is based on the flow of deepfake technology,i.e.,the front-terminal on the advanced protection of personal biometric information,the middle-terminal on the management of illegal use,and the end-terminal on the accurate determination of downstream crimes,so as to effectively manage the misuse of deepfake technology.In this way,the illegal use of deepfake technology can be effectively managed,and technology can be guided towards goodness.In the future,we should also refine the relevant regulations based on the“three-terminal common governance”model,enhance the information literacy of citizens,and improve the detection of deepfake,so as to realize the comprehensive governance of technology and law.
作者
肖姗姗
曹娜
Xiao Shanshan;Cao Na(Hunan Normal University,Changsha 410081,China;Chinese Academy of Social Sciences,Beijing 102445,China)
出处
《湖北警官学院学报》
2024年第3期73-85,共13页
Journal of Hubei University of Police
基金
国家社会科学基金青年项目“系统论视域下罪错未成年人专门教育制度研究”(20CF X037)。
关键词
深度伪造技术
个人生物识别信息
侵犯公民个人信息罪
“三端共治”模式
Deepfake Technology
Personal Biometric Information
Crime Against Citizens’Personal Information
"Three-End Co-Management"Model