Workflow
闲置智能设备处理不当可能泄密 国家安全部重要提示
Yang Shi Xin Wen·2025-05-17 01:28

Core Viewpoint - The rapid advancement of technology has led to an increasing turnover of smart devices, raising concerns about the proper disposal of old devices that may contain sensitive personal information, which poses significant security risks [1][2]. Group 1: Data Security Risks - Many people mistakenly believe that manually deleting information and restoring devices to factory settings ensures safety; however, deleted data can still be recovered from storage chips, leading to potential data breaches [2]. - Nearly half of the idle smart devices in China have issues with data residue or incomplete data erasure due to economic incentives, high technical barriers for data wiping, and a lack of awareness regarding data protection [2]. Group 2: Improper Disposal Consequences - Incidents of personal information leaks due to improper disposal of idle smart devices have been on the rise, with discarded devices potentially becoming sources of sensitive data for malicious actors [3]. - Discarding damaged devices poses the highest risk, as even non-functional devices may still have recoverable data on their mainboards and chips [3]. - In the secondary market for idle devices, some individuals and companies may engage in deceptive practices to reduce costs, such as misreporting device types or smuggling devices containing un-erased sensitive data, increasing the risk of data leaks [3]. - Certain smart devices can be remotely tracked and activated even when turned off, making them potential tools for surveillance if they have been compromised [3]. Group 3: Recommendations for Safe Disposal - National security agencies advise that idle smart devices should be treated with caution, emphasizing that they are not ordinary waste and require specific preventive measures during disposal [4]. - Users should avoid storing or processing sensitive information on internet-connected devices and regularly clear memory and fix system vulnerabilities to enhance security [4]. - Before replacing devices, users should thoroughly delete all data and consider overwriting it with non-sensitive information to minimize recovery risks [4]. - It is crucial to log out of all applications, delete login records, and disable privacy settings before selling, donating, or discarding old devices [4].