Workflow
个人信息安全
icon
Search documents
遭遇“强制刷脸”该如何应对?人脸识别新规明起施行
Huan Qiu Wang Zi Xun· 2025-05-31 14:14
Core Viewpoint - The increasing application of facial recognition technology in various sectors raises significant concerns regarding personal information security, prompting the introduction of regulatory measures to ensure safe usage [1][12]. Group 1: Regulatory Framework - The "Facial Recognition Technology Application Security Management Measures" will take effect on June 1, aiming to standardize the use of facial recognition technology and protect personal information [1][12]. - Organizations must obtain explicit consent from individuals before processing their facial information, allowing individuals the right to withdraw consent easily [2][5]. - For entities processing facial information of over 100,000 individuals, a registration requirement is established, mandating submission of relevant materials to local internet information departments within 30 working days [2]. Group 2: Special Provisions for Vulnerable Groups - The regulation includes specific provisions for vulnerable groups, such as the elderly and disabled, ensuring that their facial information is processed in compliance with accessibility standards and the principle of minimal necessity [7][3]. - In cases where individuals do not consent to facial recognition, alternative and reasonable identity verification methods must be provided [5][4]. Group 3: Public Space Regulations - The regulation stipulates that facial recognition devices in public spaces must be necessary for public safety, with clearly defined areas for information collection and prominent signage [11][10]. - The installation of facial recognition devices is prohibited in private spaces within public venues, such as hotel rooms and restrooms [11]. Group 4: Risks and Awareness - The unique and permanent nature of facial information poses significant risks if leaked, potentially endangering personal and public safety [12][14]. - Individuals are encouraged to enhance their awareness of facial information security, being cautious about sharing personal images and videos, and regularly reviewing privacy settings on applications [14][16].
63款违法违规App被通报 厦门银行喜马拉雅等登榜
Zhong Guo Jing Ji Wang· 2025-05-30 03:36
Group 1 - The National Cybersecurity Incident Response Center detected 63 mobile applications that illegally collect and use personal information [1] - The "Xiamen Bank Enterprise Banking" app (version 8.0.0) failed to clearly inform users about its privacy policy and the handling of personal information [1] - The "Ximalaya" app (version 6.1.1.01) did not adequately disclose the purposes, methods, and scope of personal information collection [2] Group 2 - The previous report identified 65 problematic mobile applications, with 16 still having issues upon retesting, leading to their removal from distribution platforms [2] - Xiamen Bank, established in 1996, is the first city commercial bank in mainland China with Taiwanese capital and is listed with stock code 601187.SH [2] - The largest shareholder of Xiamen Bank is the Xiamen Municipal Finance Bureau, holding 19.18%, while the second largest is Fubon Financial Holding from Taiwan, holding 18.03% [2] Group 3 - Ximalaya, founded in 2012, is a popular online audio sharing platform that offers a wide range of audio content for users of all ages, totaling 340 million audio pieces across 101 categories [3]
《人脸识别技术应用安全管理办法》6月1日起实施 宾馆客房的私密空间不得安装人脸识别设备(法治聚焦)
Ren Min Ri Bao· 2025-05-29 22:09
Core Points - The implementation of facial recognition technology raises concerns about personal information security, particularly regarding unauthorized collection and misuse of facial data for fraudulent activities [1] - The National Internet Information Office and the Ministry of Public Security have introduced the "Facial Recognition Technology Application Security Management Measures," effective from June 1, which aims to regulate the use of facial recognition technology [2] Group 1 - The new regulations require that facial recognition technology must have specific purposes and sufficient necessity, minimizing the impact on personal rights, and implementing strict protective measures [2] - Organizations must inform individuals about the collection of their facial data and obtain explicit consent, ensuring that data is stored locally and not transmitted over the internet without consent [2] - The regulations establish a non-exclusive verification principle, stating that if other non-facial recognition methods can achieve the same purpose, facial recognition should not be the sole verification method [2] Group 2 - The regulations address the rights of vulnerable groups, stipulating that the processing of facial information for disabled individuals and the elderly must comply with accessibility standards [3] - For minors under the age of fourteen, consent from parents or guardians is required before processing their facial information [3]
台铃电动App违规收集个人信息!客服称或因要求填生日性别
Nan Fang Du Shi Bao· 2025-05-22 14:15
Group 1 - The National Cybersecurity and Information Security Information Notification Center reported that the "Tailin Electric" app (version 3.3.5) has multiple violations regarding the collection and use of personal information [1] - Violations include not listing the rules for collecting and using personal information in a structured manner, declaring permissions unrelated to the app's business functions, and requiring users to provide personal information for unused features [1] - The app was detected between April 16, 2025, and May 15, 2025, with the source being the application market "App Treasure" [1] Group 2 - The official customer service of Tailin Group stated that the requirement for users to fill in their birthday and gender may have led to the violations, and they assured that user privacy would be protected [1] - The "Tailin Intelligent" app, which is a service tool for electric vehicle users, offers features such as smart unlocking, one-click vehicle locating, and card unlocking [2] - Currently, the "Tailin Electric" app cannot be found on application markets, only the "Tailin Intelligent" app (current version 3.3.6) is available, both developed by Tailin Technology Co., Ltd. [1]
打击“开盒挂人”等网暴行为 司法如何发力
Group 1 - The article highlights the rise of a new form of online violence known as "opening boxes" which involves maliciously disclosing personal information of individuals online [1][2] - The report indicates that the judicial system is actively combating online violence, with a significant number of convictions for crimes related to the infringement of personal information and defamation [2][5] - The involvement of minors in both perpetrating and being victims of online violence is emphasized, showcasing their vulnerability and lack of awareness regarding online safety [1][2][6] Group 2 - A specific case involving a streamer named Fangfang illustrates the severe consequences of online harassment, including threats and the unauthorized sharing of personal information [3][4] - The judicial outcomes for the perpetrators involved in the case demonstrate the legal repercussions for engaging in such online violence, with sentences and fines imposed [5][6] - The article discusses the role of online platforms in managing and preventing the spread of harmful content, stressing the need for higher accountability and proactive measures [7][10] Group 3 - The article outlines the challenges faced by victims in collecting evidence for online violence cases, highlighting the anonymity and rapid spread of information in the digital space [2][6] - Recent judicial guidelines aim to improve the legal framework for addressing online violence, particularly focusing on the protection of minors and the responsibilities of online service providers [6][9] - The need for enhanced education on digital literacy and legal awareness among minors is emphasized to prevent future incidents of online violence [10]
你的手机、账号到底绑定了多少「授权登录」?这篇文章教你一次查清、解绑
3 6 Ke· 2025-05-12 02:01
Core Points - The article discusses the increasing complexity of managing personal information across various internet accounts and the emergence of new standards like Passkey to simplify registration and login processes [1][3] - It highlights the dual nature of third-party account authorization, such as OAuth 2.0, which simplifies user registration but also raises privacy concerns [3][4] - The article emphasizes the importance of understanding and managing authorized logins to protect personal information [4][32] Group 1: Third-Party Authorization Systems - OAuth 2.0 has been widely adopted since its inception in 2006, facilitating services like "Sign in with Apple" and "Sign in with Google" [3][4] - Apple has actively promoted privacy protection through its "Sign in with Apple" feature, which allows users to manage their authorizations transparently [4][5] - Google offers a similar service with "Sign in with Google," providing users with options to manage their authorized apps and services [7][8] Group 2: Privacy Management by Major Companies - Microsoft provides a straightforward management interface for its account authorizations, although its usage scenarios are less extensive compared to Apple and Google [10][11] - Meta (formerly Facebook) maintains a significant presence in social media, allowing users to manage third-party authorizations through its app and website [12][13] - Domestic platforms like QQ and WeChat offer relatively transparent management of third-party authorizations, though the process may not be as user-friendly as that of Apple or Google [14][15] Group 3: Challenges in Authorization Management - WeChat's approach to managing authorizations for mini-programs is less clear, making it difficult for users to manage their data effectively [15][16] - Alipay provides a more intuitive management system for third-party app authorizations compared to WeChat, but still lacks bulk management options [18][20] - Sina Weibo presents significant challenges in managing third-party authorizations, with users unable to view or revoke their authorizations easily [20][22] Group 4: Regulatory Developments - The Ministry of Industry and Information Technology (MIIT) in China has introduced services like "One Certificate to Check 2.0," allowing users to query the number of internet accounts linked to their phone numbers [32][35] - The "Second Number Renewal" service aims to enhance personal information security by allowing users to unlink accounts associated with previous phone numbers [35]
谨防“客服”退款诈骗 保护个人信息安全
Zhong Guo Jing Ji Wang· 2025-03-14 06:38
Core Points - A recent incident involved a woman losing over 40,000 yuan due to credit card fraud after being misled by a fake game customer service representative [1] - The incident highlights the need for consumers to verify the identity of customer service representatives and to be cautious of sharing sensitive information [1][2] - Consumers are advised to use official channels for resolving disputes and to maintain awareness of their account security [2][3] Group 1 - Consumers should carefully verify the identity of customer service representatives, as fraudsters often impersonate game support staff to exploit parents' concerns about their children's gaming expenses [1] - It is crucial to protect personal information and avoid sharing sensitive data such as bank card numbers or passwords with unknown individuals, as legitimate platforms do not request such information [1] - Parents are encouraged to manage their accounts securely by safeguarding their mobile devices and enabling transaction alerts to monitor account activity [1] Group 2 - In case of disputes related to online game charges, parents should remain calm and resolve issues through official customer service channels or legal means, avoiding unofficial contact methods [2] - If any suspicious account activity is detected, immediate action should be taken to freeze the account and report to law enforcement to minimize financial loss [3]