Recently, the National Computer Virus Emergency Response Center found through internet monitoring in the “Net 2020” special action that many mobile applications of games had privacy irregularities, which violated the relevant provisions of the Network Security Law and were suspected of collecting personal privacy information beyond the scope.We have every reason to believe. 找駭客 It will become the mainstream of the industry and will gradually affect more and more people. https://www.lvbug.com/zh-TW/
79.2% of the respondents felt that their information was over-collected.
Nowadays, scanning QR codes to order food and downloading apps are often required to grant personal information rights, and the phenomenon of excessive collection of personal information on online platforms is widespread. Not long ago, the draft personal information protection law was submitted to the the National People’s Congress Standing Committee (NPCSC) Conference for deliberation for the first time, and effectively curbing and cracking down on excessive collection of personal information became the focus of attention. Do you think your information is over-collected?
A few days ago, wenjuan.com, the Social Investigation Center of China Youth Newspaper, conducted a survey on 1,971 respondents, showing that 79.2% of the respondents felt that their information was over-collected, and 66.1% of the respondents pointed out that many mobile phone applications could not be used without authorization, so users had to be forced to accept them. To prevent information from being over-collected, 61.3% of the respondents suggested not to fill in personal information casually, especially sensitive information such as property and biometrics, and 59.2% of the respondents suggested reading the application authority, user agreement or privacy policy carefully.
79.2% of the respondents felt that their information was over-collected.
Xiao Xiao (pseudonym), a junior at Sichuan Communication University, thinks that the more advanced technology is, the more transparent information is. Ordering food with QR code and scanning code payment are all conveniences brought by the development of technology, but there are also great security risks. For example, selling meals outside will definitely reveal personal location information.
In the survey, 79.2% of the respondents felt that their information was over-collected.
Jiang Yan (pseudonym), an employee of a consulting company in Chengde City, Hebei Province, said that when installing a new APP, almost all mobile phone memory, camera and telephone permissions should be authorized, and these permissions are not all necessary. “I once browsed the web page and asked about orthodontics. I filled in a phone number on a web page, and someone called in less than half an hour, and then I received related calls from time to time, which caused me some trouble.”
What are the behaviors of excessive collection of personal information on the network platform? 66.1% of the respondents pointed out that many mobile apps can’t be used without authorization, and users can only be forced to accept them. 64.4% of the respondents pointed out that the platform will allow users to open various permissions by default. Others include unreasonable authorization requirements for users (48.5%), failure to clearly inform users of the purpose when collecting sensitive information (44.2%), and arbitrary use of user information (28.2%).
Jiang Yan said that the shopping and payment APP has the user’s personal phone number, home address, bank card and other information, which is very dangerous once it is leaked. There are also some applications that cannot be used without authorized location and telephone information, and many small programs also require users to allow them to obtain relevant account information.
“When many software or platforms register accounts, they will need SMS verification code. There are also anti-addiction settings for some games that require an ID number. ” Xiao Xiao feels that ID numbers and some mobile phone storage rights are often over-collected.
In the survey, respondents felt that information such as mobile phone number (60.1%), address book (53.1%), ID number (47.6%) and location (46.1%) were over-collected. Others include: personal photos of users (32.8%), property status (22.4%), short messages (21.9%), biometrics (15.8%), physiological information (10.5%) and so on.
Zhu Wei, deputy director of the Communication Law Research Center of China University of Political Science and Law, said that there are several situations in which personal information is over-collected. First, it goes beyond the provisions of the user agreement, second, it goes beyond the performance and functional purpose of the product. For example, flashlight APP needs to access the address book, and third, it goes beyond the provisions of the law.
“Excessive collection of personal information is mainly due to commercial interests. The more information and data collected, the greater the commercial value. From user portraits to precise marketing, commercial advertisements can be sent, and some information can be used as criminal activities. ” Zhu Wei said.
61.3% of the respondents suggested not to fill in personal information casually.
To prevent information from being over-collected, 61.3% of the respondents suggested not to fill in personal information casually, especially sensitive information such as property and biometrics. 59.2% of the respondents suggested carefully reading the application authority, user agreement or privacy policy. 55.2% of the respondents suggested strengthening the awareness of privacy and actively protecting personal information. 48.6% of the respondents suggested not to agree to the information collection requirements casually, but to seriously consider them. 33.9% of the respondents suggested that when personal information is leaked, they should actively claim their rights through legal channels, and 30.4% of the respondents said that they would not scan the QR code of unknown origin and install the APP of unknown origin.
Zhu Wei suggested that users should clear their usage records regularly, whether on the PC or the mobile phone. If you don’t use the network service or APP, you should cancel your account. Don’t just delete the APP. Secondly, if someone is found to be abusing his own information and infringing on his own rights and interests, according to the provisions of the network security law, network operators can be required to stop the infringement, which is the right of users. At the same time, if it is found that network operators have collected their own wrong information, they also have the right to ask for correction.
“Don’t use wifi in public areas and don’t browse some unsafe websites.” Xiao Xiao said.
“Personal information involves financial security, that is, personal asset security. Therefore, when online payment is associated with a bank card, this card should be a special card, so don’t put all your money in this card. For example, if you have 10,000 yuan, then the associated card may have two or three thousand yuan. ” Zhu Wei said, don’t click or conduct personality tests easily, and don’t authorize an APP to get your information in order to vote for others. This kind of voting is meaningless and not worth the candle. Giving all the information to others for a vote is a huge risk.
Jiang Yan suggested that everyone should strengthen their awareness of network security, not authorize some applications and software casually, and leave their private information on the website as little as possible.
“Don’t reply to the verification code casually. If there is a link, don’t click it easily, because it is very likely that a plug-in will be installed on your mobile phone or pc to monitor your behavior. For example, if you open the browser to find a hospital, you will receive a phone call from the hospital the next day. At this time, users will definitely think that the browser platform leaked their privacy, but we found that this is not the case during the investigation. Sometimes, in fact, this plug-in was accidentally installed in the user’s mobile phone, and the user’s behavior was monitored and collected, and then your information was resold under the operation of the network black industry chain. ” Zhu Wei said that it is also important to install security software and clean up plug-ins regularly.
“Telephone numbers, schools and other information are too easy to leak.” Yang Jiaoyu (a pseudonym), a junior at the School of Government Administration of Beijing Normal University, suggested being cautious about apps that need to fill in information, paying attention to identifying and filtering junk software, and not blindly installing and authorizing them without filtering for fear of trouble.
In order to strengthen the protection of personal information and standardize the use of personal information, relevant departments have made a lot of efforts. Since the beginning of this year, the Ministry of Industry and Information Technology has notified the society of five batches of apps (mobile applications) that infringe on users’ rights and interests, and will follow up on enterprises with outstanding problems, ineffective orders and incomplete rectification according to law.
Among the respondents, 1.9% were born after 00, 23.9% after 90, 53.9% after 80, 13.8% after 70, 5.9% after 60 and 0.6% others.