| With the vigorous development of information economy, it not only in the national economy plays a more and more important role, has become an important breakthrough in our country rising strategy, but along with the information technology innovation, "cloud computing", "big data" and other emerging technologies and their use of technology to the right of personal information protection brings the hitherto unknown challenge. "Cloud computing" which has a modern information service technology, penetration in the imperceptibly has deep into our life.It can be said that cloud computing era, relying on the network data transmission, calculation,in this storage technology, personal information as to connect to the Internet and consumer or an important element of personal information right, will be directly exposed to the cloud service providers, indirect exposure to other possible to obtain personal information of people, this new technology continues to protect personal information to make challenges, China has yet to formulate a uniform law of personal information protection, then make a modern and forward-looking of personal information right method is very necessary. In this paper, from the theoretical basis of the legal attribute of personal information right and the protection of the rights of law, sources and discusses the nature of the right of personal information. And given the right to personal information in many ways and privacy have great relevance, more part of the state on the protection of personal information will be used as examples of personal information privacy protection, but according to the theory of civil law, the right of personal information and privacy although there are many contacts, but the difference is very obvious,and will regard there are many disadvantages of protection for the right of privacy, this paperon the two kinds of rights and probing into the community, and to explore the personal information protection strategy; combination of technical development background, this paper summarizes the characteristics of infringement of personal information and the cloud computing background, and point by point expenditure, the urgency and necessity of the right of personal information protection under this background and form; the world has some developed countries and regions for the legislation of personal information protection, the legislation modes of continental law system and common law of the two legal systems each take a representative comparison, the experience provides reference for our personal information protection legislation and the deficiency of. In addition, from the administrative act and administrative legislation angle, make some suggestions on the protection of personal information, and in the industry self-discipline, personal consciousness, legislation and other aspects of the protection of personal information as fully as possible suggestions. |