Workflow
个人信息保护
icon
Search documents
国家网络安全通报中心:34款移动应用存在违法违规收集使用个人信息情况
Xin Lang Cai Jing· 2025-10-10 09:04
Core Viewpoint - The National Cybersecurity Notification Center reported that 34 mobile applications were found to illegally collect and use personal information, violating laws such as the Cybersecurity Law and the Personal Information Protection Law [1][2][3]. Group 1: Violations in Personal Information Collection - 17 mobile applications failed to specify the purpose, method, and scope of personal information collection [1][5]. - 1 mobile application did not inform users of the purpose when requesting permission to collect personal information [2]. - 1 mobile application did not inform users of the purpose when collecting sensitive personal information [3]. - 4 mobile applications began collecting personal information before obtaining user consent [4]. - 17 mobile applications collected personal information beyond the scope authorized by users [5]. Group 2: Inadequate User Information and Consent - 1 mobile application had a personal information protection policy that described the need to collect personal information beyond what was necessary for its functions [6]. - 4 mobile applications declared permissions to collect personal information that exceeded what was necessary for their functions [7]. - 2 mobile applications collected personal information beyond what was necessary for their functions [8]. - 3 mobile applications collected personal information more frequently than necessary for their functions [9][10]. - 3 mobile applications required users to enable permissions not needed for the current function [11]. Group 3: User Rights and Misleading Practices - 4 mobile applications forced users to provide unnecessary personal information [12]. - 3 mobile applications did not provide users with a channel for complaints regarding personal information [13]. - 1 mobile application did not offer a specific way for users to correct or supplement their personal information [14]. - 2 mobile applications set unreasonable conditions or additional requirements in the account cancellation process [15]. - 2 mobile applications engaged in misleading or deceptive advertising practices [16].
公安部计算机信息系统安全产品质量监督检验中心检测发现34款违法违规收集使用个人信息的移动应用
Huan Qiu Wang· 2025-10-10 09:04
Core Points - The article highlights the detection of 34 mobile applications that violate personal information protection laws, as mandated by the Cybersecurity Law and the Personal Information Protection Law [1][2][3][4][5][6][7][8][9][10][11][12][13][14] Group 1: Violations of Personal Information Collection - 17 mobile applications failed to list the purposes, methods, and scope of personal information collection [1] - 1 mobile application did not inform users of the purpose when requesting permission to collect personal information [2] - 1 mobile application did not inform users of the purpose when collecting sensitive personal information [3] - 4 mobile applications began collecting personal information before obtaining user consent [4] - 17 mobile applications collected personal information beyond the scope authorized by users [5] Group 2: Inadequate Information Policies - 1 mobile application described the need to collect personal information beyond what is necessary for its functions [6] - 4 mobile applications declared the collection of personal information permissions that exceeded necessary functional requirements [7] - 2 mobile applications collected personal information beyond the necessary functional scope [8] - 3 mobile applications collected personal information more frequently than necessary for their functions [9] Group 3: User Consent and Rights Issues - 3 mobile applications required users to enable permissions not needed for current functions [9] - 4 mobile applications forced users to provide unnecessary personal information [10] - 3 mobile applications did not provide users with complaint channels regarding personal information [11] - 1 mobile application did not offer users a way to correct or supplement their personal information [11] - 2 mobile applications set unreasonable conditions for account cancellation [12] Group 4: Misleading Advertising - 2 mobile applications engaged in misleading or deceptive advertising practices [13]
华夏基金:“双十一”将至,网购时代如何防诈?
Xin Lang Ji Jin· 2025-10-10 03:19
Core Points - The article discusses the launch of a series of activities aimed at promoting the high-quality development of public funds in Beijing, emphasizing the importance of enhancing Beijing's role as a national financial management center [1] - It highlights the increasing prevalence of delivery-related scams, where fraudsters exploit the popularity of online shopping and delivery services to deceive individuals [3][4] - The article outlines various tactics used by scammers, including "ghost packages," fake messages, and fraudulent after-sales claims, which are designed to lure victims into providing personal information or transferring money [5][6][7] Group 1: Scamming Tactics - "Ghost packages" are used as a tool for scams, where individuals receive unsolicited packages that lead to fraudulent activities [5] - Fake messages often claim issues with deliveries, enticing victims to click links or provide sensitive information [6] - After-sales scams involve low-quality products that prompt victims to engage with fraudulent customer service, leading to further deception [7] Group 2: Prevention Tips - The article provides four key standards to identify potential scams, such as checking for purchase records, evaluating package contents, scrutinizing sender information, and being cautious of enticing QR codes [10][11][12][13] - It emphasizes the importance of protecting personal information to prevent scams, suggesting practices like obscuring sensitive details on packages and being cautious with app permissions [15][16]
莫让山寨订票App大行其道
Zhong Guo Jing Ji Wang· 2025-10-09 06:57
Core Viewpoint - The rise of counterfeit ticket booking apps during peak travel seasons poses significant risks to consumers, leading to financial losses and market disorder, necessitating urgent regulatory action [1][2] Group 1: Issues with Counterfeit Apps - Counterfeit ticket booking apps mimic official platforms, making it difficult for users to distinguish between legitimate and fraudulent services [1] - Users face issues such as extra charges, bundled insurance sales, inability to obtain tickets, and difficulties in refunds, resulting in economic losses [1] - The presence of these counterfeit apps in app stores, despite high complaint volumes, indicates a failure in platform oversight and review processes [1] Group 2: Consumer Awareness and Responsibility - Consumers must enhance their fraud awareness and only download apps from official app stores or websites to avoid scams [2] - It is crucial for consumers to avoid clicking on unknown links or scanning unverified QR codes, as well as to refrain from sharing personal and financial information [2] Group 3: Regulatory and Technical Measures - A combined approach of regulatory enforcement and technological solutions is necessary to eliminate the sources of counterfeit apps [2] - Collaboration among market regulation, cybersecurity, and law enforcement agencies is essential for effective enforcement and information sharing to combat illegal activities [2] - Strengthening preemptive, ongoing, and post-incident regulatory measures will increase the costs of illegal operations, making it harder for counterfeit ticket apps to thrive [2]
黄金周消费避坑!网上租车、订酒店时,当心这些“数字陷阱”
Nan Fang Du Shi Bao· 2025-10-02 13:29
Core Points - The rise of digital consumption methods such as credit-free car rentals and online hotel bookings has led to the emergence of "digital traps" for consumers [1] - The Guangzhou Internet Court has analyzed cases related to these digital services, highlighting the need for clearer service agreements and consumer protections [4] Group 1: Case Analysis - In a case involving credit-free car rental, a user was charged 6000 yuan without consent after an accident, leading to a court ruling that the rental platform must refund the amount due to lack of contractual basis for the charge [2][3] - The court emphasized the importance of clearly defining the conditions and processes for deductions in service agreements to protect consumer rights [4] - A second case involved a consumer who purchased a Gucci belt online, which was later deemed counterfeit by a third-party platform. The court ruled in favor of the seller, affirming the legitimacy of the product based on provided documentation [5][7][8] Group 2: Personal Information Protection - A case regarding the sharing of personal information by a hotel booking app highlighted the risks of cross-border data transmission without proper consent, leading to a ruling against the company for infringing on consumer rights [10][11] - The court's decision underscored the necessity for transparency in personal data handling and the requirement for explicit consent from users for any data processing beyond contractual obligations [13] - This case marks a significant precedent in the enforcement of the Personal Information Protection Law, emphasizing the need for companies to enhance consumer awareness regarding data privacy [13]
使用公共Wi-Fi需谨慎!假期网络安全指南请查收
Qi Lu Wan Bao· 2025-10-02 05:25
Group 1: Public Wi-Fi Security - Public Wi-Fi poses significant risks including data eavesdropping, where hackers can easily intercept unencrypted network data to obtain sensitive information such as account credentials and chat logs [2] - Hackers can create fake hotspots that mimic legitimate networks, leading users to unknowingly connect and expose their data [3] - There is a risk of direct attacks on devices connected to the same network, potentially resulting in the installation of malware or ransomware [5] Group 2: Personal Information Protection - The risk of information leakage can lead to targeted scams, where criminals exploit personal details to impersonate legitimate entities for fraud [13] - Identity theft can occur when personal information such as ID numbers and photos are misused for illegal activities [15] - Leaked credentials from one site can be used to attempt unauthorized access to other important accounts, a practice known as credential stuffing [17] Group 3: Weak Passwords and Password Reuse Risks - Weak passwords are easily guessable, with common patterns like "123456" or personal information being particularly vulnerable to attacks [34] - Strong passwords should be at least 12 characters long and include a mix of uppercase letters, lowercase letters, numbers, and special characters [34] Group 4: Data Backup Awareness - The loss of data can have severe emotional and financial impacts, including the permanent loss of cherished memories and critical business documents [34][36] - It is recommended to maintain three copies of important data, stored on two different media types, with at least one copy kept offsite [39][41][43] Group 5: Youth Internet Addiction - Internet addiction can lead to various health issues, including vision problems, sleep disturbances, and emotional challenges such as anxiety and depression [45] - Excessive internet use can negatively impact academic performance and lead to disengagement from educational pursuits [46] - Parents are encouraged to communicate openly with their children about internet use and establish reasonable screen time limits [48]
深圳发布新规,腾讯、华为等签下承诺书
21世纪经济报道· 2025-09-29 10:27
Core Viewpoint - The article discusses the newly released "Shenzhen Plan" which includes 15 clear guidelines aimed at enhancing personal information protection, reflecting a shift towards stricter compliance for companies handling personal data [1][4]. Summary by Sections Privacy Policy Standards - The guidelines require application distribution platforms and apps to provide easily accessible and long-term effective privacy policies, which must include rules for personal information processing, user rights, and complaint channels. Special rules must be established for handling minors' personal information [1][2]. User Consent Management - Operators must inform users about personal information processing in a prominent manner, prohibiting default selections or bundled authorizations. Sensitive personal information requires "separate consent," and users must have effective means to withdraw consent [2][4]. Data Processing Compliance - Operators are mandated to adhere to the principles of "minimum and necessary" data processing, prohibiting blanket authorizations and frequent pop-up requests. Personalized recommendations must offer non-targeted options or easy refusal methods. Generative AI services are restricted from indiscriminately collecting or retaining personal information, and any training data involving personal information must comply with legal standards [2][4]. User Rights Protection - Operators are required to inform users of their rights to access, copy, correct, delete, and restrict processing of their personal information. User requests must be processed within 15 working days without artificial barriers [2][4]. Multi-Party Governance Framework - The initiative aims to establish a multi-party governance framework for personal information protection, involving government regulation, corporate autonomy, industry self-discipline, and social oversight. Key application software distribution platforms have signed a compliance commitment to enhance personal information protection [4][5]. Ongoing Efforts and Future Directions - Shenzhen's efforts include exploring a "law enforcement + service" model, transitioning from punitive measures to proactive legal education and rectification. The city plans to continuously improve long-term mechanisms for personal information protection and enhance collaborative enforcement capabilities [5].
民生银行济南天桥支行积极开展个人信息保护宣传教育活动
Qi Lu Wan Bao· 2025-09-29 07:11
Group 1 - The importance of personal information security is increasingly recognized in the digital age, prompting Minsheng Bank's Jinan Tianqiao Branch to actively promote awareness and protection measures [1][2] - The branch employs a multi-faceted promotional approach, combining online and offline methods to educate consumers about personal information protection [1] - Online efforts include using platforms like WeChat and mobile banking apps to simplify complex information security concepts for consumers [1] Group 2 - Offline initiatives involve one-on-one education for customers visiting the branch, emphasizing the importance of safeguarding personal items and not sharing sensitive information [1][2] - Staff also distribute informational brochures in local communities, highlighting key points of the Personal Information Protection Law and analyzing prevalent fraud tactics [2] - The branch aims to continuously improve its information protection processes and innovate financial knowledge dissemination to enhance consumer protection and contribute to a stable financial environment [2]
腾讯华为等6企签署个人信息保护承诺书,严格审核App上架
Xin Lang Ke Ji· 2025-09-29 06:16
Core Points - Major companies including Tencent, Huawei, and OPPO signed a compliance operation commitment to enhance personal information protection [1][2] - The commitment includes strict adherence to app listing review standards and responsibilities for managing personal information [1] - The initiative aims to improve privacy policies, user consent management, data processing compliance, and user rights protection [2] Group 1: Compliance Commitment - Six key application distribution platform companies committed to strict enforcement of app listing review standards and legal responsibilities [1] - The commitment emphasizes the importance of managing personal information collection and usage in compliance with the Personal Information Protection Law [1] Group 2: Privacy Policy and User Consent - Applications must provide accessible and long-term effective privacy policies, detailing personal information processing rules and user rights [2] - Operators are required to inform users about personal information processing in a clear manner, prohibiting default selections for consent [2] Group 3: Data Processing and User Rights - Operators must adhere to the principles of data minimization and necessity, avoiding blanket authorizations and frequent pop-up requests [2] - Users should be informed of their rights to access, copy, correct, delete, and restrict processing of their personal information, with a response time of 15 working days for requests [2]
腾讯、华为、荣耀、OPPO,在深圳签下“个人信息”承诺书
Core Viewpoint - The "Shenzhen Plan" introduces 15 clear guidelines for personal information protection, emphasizing privacy policy standardization, user consent management, data processing compliance, and user rights protection [2][3][4] Group 1: Privacy Policy Standardization - Application distribution platforms and apps must provide easily accessible and long-term effective privacy policies, including personal information processing rules, user rights, and complaint channels [2] - Specific rules must be outlined for the handling of minors' personal information [2] Group 2: User Consent Management - Operators must inform users of personal information processing in a prominent manner, prohibiting default selections or bundled authorizations [3] - Sensitive personal information requires "separate consent," and users must have effective means to withdraw consent [3] Group 3: Data Processing Compliance - Operators must adhere to the principles of "minimum and necessary" data processing, avoiding blanket authorizations and frequent pop-up requests [3] - Personalized recommendations must offer non-targeted options or easy refusal methods, and generative AI services must not misuse personal information [3] Group 4: User Rights Protection - Operators are required to inform users of their rights to access, copy, correct, delete, and restrict processing of their personal information, with a commitment to respond to user requests within 15 working days [3] - Barriers to exercising these rights must not be artificially created [3] Group 5: Industry Commitment and Regulatory Framework - Six major application software distribution platform representatives signed a compliance operation commitment to strengthen personal information protection [4] - Since 2021, significant laws such as the Data Security Law and Personal Information Protection Law have been enacted, establishing a solid legal foundation for data security and personal information protection [4] - The Shenzhen Municipal Cyberspace Administration has been actively promoting a multi-governance model involving government regulation, corporate autonomy, industry self-discipline, and social oversight [4][5]