Joke Collection Website - Public benefit messages - With real-name authentication in online games, will ID card information be leaked?

With real-name authentication in online games, will ID card information be leaked?

Real-name authentication of netizens generally does not reveal ID card information, but there is a risk of ID card information being leaked. In order to actively respond to national policies, it has become common for netizens to register with their real names. Almost all software and games, large and small, require real-name authentication or authorization from real-name social software such as WeChat and QQ. Most people have the experience of receiving harassing phone calls or text messages. Of course, there are also news about criminals using other people’s ID information to get loans. As a result, personal information security has become a common concern for everyone. If the platform uses a real-name authentication service provider authorized by the public security department and actively signs a confidentiality agreement, the risk of personal information being leaked is relatively small; on the contrary, if the platform uses a real-name authentication service provider that is not authorized by the public security agency and does not sign a confidentiality agreement, Authentication service providers, then user information will face huge risks of leakage. During the real-name authentication process, the two parties that can receive user information are the software platform and the authentication service provider, and may also be intercepted by unknown third parties. Therefore, it is recommended that when choosing a software platform, you must pay attention to whether it is formal and legal, and whether it provides a legally binding personal information confidentiality agreement. You must carefully read the personal information confidentiality agreement to protect your own interests, and do not act hastily because of the large number of words in the agreement. When installing software and online games, download and install them from regular channels. Try not to install games and software that are less secure or have not passed security testing. Pay attention to the scope of granted permissions, and carefully select permissions such as address book information, geographical location, memos, etc. when granting platform permissions. This can effectively prevent information leakage. In fact, the value of the user's personal contact information and the contact information of other people in the social circle is greater than the value of the ID card information. With the implementation of the real-name authentication policy for netizens, personal information security policies should also follow suit. Each online platform has the responsibility and obligation to protect user information. Users can use the law to protect their rights if their information is leaked.