Joke Collection Website - Public benefit messages - The Ministry of Industry and Information Technology will introduce new regulations to rectify excessive claims of app. What rules do you want?

The Ministry of Industry and Information Technology will introduce new regulations to rectify excessive claims of app. What rules do you want?

In order to standardize the right of App to collect and use microphone recordings at will, the Ministry of Industry and Information Technology has issued the minimum necessary evaluation specification for App to collect and use personal information. At the same time, the Ministry of Industry and Information Technology is drafting the Interim Provisions on the Protection and Management of Personal Information of Mobile Internet Applications, drawing a bottom line and a red line to better protect personal information and promote the healthy development of the App market.

The Ministry of Industry and Information Technology said that the Interim Provisions on the Management of Personal Information Protection of Mobile Internet Applications being drafted clarified two basic principles of personal information protection: informed consent and minimum necessity. The principle of informed consent requires users to be informed of personal information processing rules in clear and easy-to-understand language, and users voluntarily express their meaning clearly on the premise of full support. The principle of minimum necessity requires that App's personal information processing activities should be clearly and reasonably controlled, and it is not allowed to engage in personal information processing activities beyond the user's consent or unrelated to the service scenario.

The Vice Minister of the Ministry of Industry and Information Technology pointed out that the Ministry of Industry and Information Technology will further improve the Interim Provisions on the Protection and Management of Personal Information of Mobile Internet Applications and speed up the document distribution process. At the same time, stick to problem orientation and focus on solving problems? Abuse of microphone authority? Read and write albums without the user's consent? Excessive demand for address books? Hide push option? And other hot issues that are strongly reflected by current users, effectively promote the construction of the national App technology testing platform, and form the coverage capacity of testing 6,543,800+0.8 million models throughout the year.

In the Internet of Everything era, Internet users' personal mobile phones, computers, wearable devices and other information devices are all connected to the network. With the continuous collection of personal information, these seemingly scattered data are summarized, mined and analyzed, that is, the commercialization of big data, and almost everyone has become? Invisible man? .

Nowadays, the rapid development of the Internet and the increasingly serious threat of cyber crime have had a certain impact on the global network users. According to a survey conducted by PreciseSecurity.com, a computer security website, 53% of Internet users around the world are more concerned about their online privacy. People are paying more and more attention to network privacy.

Europeans attach the least importance to online privacy. The data shows that developing countries and regions attach the most importance to network privacy, and 82% citizens are worried about their network security. Nigeria ranks first in the world, followed by Egypt, India, Kenya and South Africa.

According to the data of PreciseSecurity.com, the degree of citizens' concern and worry about related network privacy issues is inversely proportional to the degree of national economic development. This explains why some of the most developed countries and regions in the world are at the bottom of the list of online privacy issues. In France, Japan and the United States, 47% of citizens are more concerned about their online privacy.

In Germany, only 26% of citizens are concerned about the above issues, which makes the country the least concerned about online privacy in the world. The main security problem Cybercrime is still the main reason why the world pays more attention to the network security problem. In addition, global citizens also believe that e-commerce companies and other network users are most likely to have an impact on their network security. As people pay more and more attention to network security, their behavior has also changed.

According to relevant data, 45% of Internet users around the world have begun to reject emails from unknown senders. Other common behaviors of Internet users include not visiting some special-looking Internet websites, using anti-virus software, resetting passwords regularly and not using certain network applications. In addition, only 12% users decided to reduce online shopping to ensure their network security.

In addition to the strict control of laws and regulations, our citizens should also have a sense of prevention.

1. Do not illegally collect, use, process or transmit other people's personal information. Do not illegally buy, sell, provide or disclose personal information of others. Any organization or individual who needs to obtain other people's personal information shall obtain and ensure the information security according to law.

Second, it is not easy to leave personal information online. Pay attention to protect your information, and don't disclose personal information including email on the Internet. Even if you must leave personal information, you must first determine whether there are policies and measures to protect the privacy and safety of netizens on the website.

Third, develop good living habits. Properly handle items containing personal real information such as payment documents, courier bills and copies of ID cards, and try to avoid posting personal high-definition selfie photos on social networking sites to protect personal information and avoid being used maliciously.

Fourth, multiple passwords and multiple protections. The mobile phone sets a wake-up password, which does not give information a chance to leak; Try to set different passwords for important applications, and don't set them too simply, so as not to steal all of them after one is stolen.

Five, contact custody should pay attention to. Address book should be avoided as much as possible? Dad? Mom? Save nicknames, etc. , to prevent once the mobile phone is lost, the liar easily pretends to defraud relatives and friends; Pay special attention to strangers when using mobile phones, especially when paying by mobile phones? Peeping at the screen? .

6. Unreliable applications are not downloaded. The openness of Android system gives many rogue software opportunities, so pay attention to screening when installing applications; In addition, we must also ensure that unknown links are not chaotic, unknown QR codes are not scanned indiscriminately, and unknown calls are not answered indiscriminately.

Seven, strange WIFI should stay away. Unfamiliar WIFI is hard to prevent, and it is not easy to connect to an unknown WIFI network; Your own WIFI password should also be changed regularly.

Eight, protection software is indispensable. Install protection software for mobile phones, regularly kill viruses, encrypt private data, and prevent information leakage.