个人信息保护

Search documents
上市公司金螳螂旗下“金诺小贷”被曝涉嫌违规放贷
Sou Hu Cai Jing· 2025-07-15 05:41
Core Viewpoint - Suzhou Jintenglong Enterprise Group, the parent company of the listed company Jintenglong, is facing allegations of usury and illegal lending through its wholly-owned online micro-lending subsidiary, Guangzhou Jinnuo Internet Micro-loan Co., Ltd. [1] Group 1: Company Overview - Jinnuo Micro-loan was established in March 2016 with a registered capital of 200 million, significantly below the regulatory minimum of 1 billion for online lending companies [1] - The legal representative and chairman of Jinnuo Micro-loan is Zhuang Haihong, who directly holds 5.2% of Jintenglong Enterprise Group [1] - Jinnuo Micro-loan operates several lending apps, including "Xinyongqian" and "Subei Wallet," which are currently in operation [1] Group 2: Business Operations - Jinnuo Micro-loan has registered 18 loan-related trademarks, indicating its focus on lending services [5] - The "Subei Wallet" app has over 100,000 downloads on various platforms, while "Xinyongqian" has several thousand downloads [5] Group 3: Customer Complaints - Users have reported issues with "Subei Wallet," including difficulties in account cancellation and high service fees [7][9] - Complaints also highlight a lack of customer service support, with users unable to reach representatives [10] Group 4: Regulatory Concerns - Allegations have emerged regarding the unauthorized sharing of personal information by Jinnuo Micro-loan's products with multiple loan platforms [15][16] - The company has been linked to other entities that have faced regulatory penalties for illegal lending practices [16] Group 5: Financial Performance - Jintenglong's 2024 annual report indicates a total revenue of 18.329 billion, a year-on-year decline of 9.20%, and a net profit of 544 million, down 46.89% [17] - The company's total assets decreased by 4.83% to 35.289 billion [17]
违法违规收集个人信息!这两家券商APP在列
券商中国· 2025-07-14 12:37
Core Viewpoint - The article highlights the ongoing crackdown by the government on mobile applications that illegally collect and use personal information, emphasizing the importance of protecting citizens' rights in the digital space [1][2]. Group 1: Government Actions - The National Computer Virus Emergency Response Center detected 68 mobile applications that violate personal information collection regulations, including popular apps in gaming, dining, hotel, travel, and finance sectors [2][3]. - Since March, various government bodies have initiated a series of special actions aimed at personal information protection, targeting common service products and everyday scenarios [2][3]. Group 2: Violations Identified - Among the 68 applications, 13 types of violations were reported, with the most common being: 1. Failure to provide users with a way to withdraw consent for personal information collection, affecting 35 applications 2. Lack of appropriate security measures such as encryption and anonymization, impacting 31 applications 3. Privacy policies not clearly outlining the purposes, methods, and scope of personal information collection, involving 30 applications [4]. - Other violations include inadequate notification of privacy policies at the first app launch, using default consent for privacy policies, and failure to provide clear information about the data processor [4]. Group 3: Specific Applications Highlighted - Two financial applications, "CaiDa CaiRiSheng" and "YinTai ZhangYiBao," were specifically named for their violations regarding personal information handling [5][6]. - "CaiDa CaiRiSheng" was found to have issues with not informing users about third-party data sharing and not providing a way to withdraw consent [7][8]. - "YinTai ZhangYiBao" failed to notify users about privacy policies and shared personal information without user consent [9]. Group 4: Ongoing Monitoring - The National Cybersecurity Notification Center reported that out of 64 previously identified problematic applications, 22 still had issues upon retesting, leading to their removal from distribution platforms [11].
5762家酒店自查自纠 来京游客个人信息保护加码
Bei Jing Wan Bao· 2025-07-14 06:58
Group 1 - The core viewpoint of the articles highlights the importance of data security and personal information protection in Beijing's tourism industry, especially with the upcoming peak travel season [1][2] - A total of 5,762 hotels in Beijing are conducting self-inspections and rectifications to ensure a safe travel environment for visitors [1] - The city has identified and rectified issues in 16 accommodation-related applications, ensuring compliance within the set deadlines [2] Group 2 - The Beijing Cultural and Tourism Bureau anticipates that the annual accommodation consumption demand will exceed 100 million person-times due to increased tourist flow [2] - A specific park in Beijing had a vulnerability in its ticketing system that allowed unauthorized access to sensitive customer information, which has since been rectified [1] - The city will also implement offline consumer scenario regulations to prevent the illegal collection and use of personal information in various cultural and tourism venues [1]
国家计算机病毒应急处理中心检测发现68款违法违规收集使用个人信息的移动应用
news flash· 2025-07-11 02:54
Core Viewpoint - The National Computer Virus Emergency Response Center has detected 68 mobile applications that illegally collect and use personal information, in accordance with laws such as the Cybersecurity Law and the Personal Information Protection Law [1] Group 1: Legal Compliance - The detection was conducted based on the requirements of the announcement from the Central Cyberspace Administration, the Ministry of Industry and Information Technology, the Ministry of Public Security, and the State Administration for Market Regulation regarding the 2025 personal information protection initiative [1]
医院刷脸是为落实就医实名制?确有必要?市民反忧个信安全
Nan Fang Du Shi Bao· 2025-07-10 15:34
Core Viewpoint - The implementation of the "Facial Recognition Technology Application Safety Management Measures" in June 2023 establishes core principles for facial information processing, emphasizing "clear purpose, minimum necessity, and strict protection," and prohibits the use of facial recognition as the sole verification method [1][12]. Group 1: Compliance and Public Concerns - A series of investigations by Southern Metropolis Daily and Nandu Big Data Research Institute revealed that some hospitals in Guangzhou are mandating patients to use facial recognition for online registration, raising concerns about compliance with the new regulations [1][7]. - Public sentiment is mixed; while some citizens appreciate the security benefits of facial recognition in preventing identity fraud, others express concerns about the handling of sensitive personal information and the necessity of repeated identity verification [7][8]. Group 2: Policy Background and Guidelines - The requirement for real-name medical services does not inherently necessitate facial recognition, as existing regulations allow for alternative identification methods such as ID cards and social security cards [5][6]. - The National Health Commission has previously stated that medical institutions cannot refuse service based on a patient's refusal to provide facial recognition data, reinforcing the need for multiple identification methods [6][12]. Group 3: Expert Opinions and Recommendations - Experts agree that while facial recognition can enhance security and efficiency in healthcare, it must be implemented with strict safeguards to protect sensitive personal information [9][10]. - Recommendations include ensuring that patients are fully informed and consent to the collection and use of their facial data, as well as implementing robust data protection measures if facial information is stored [11][12].
人脸安全如何守护,个保合规审计怎么做,这场活动干货满满
Nan Fang Du Shi Bao· 2025-07-09 14:13
Group 1 - The event "Personal Information Protection Regulations Policy Promotion Activity" was held in Guangzhou on July 9, focusing on the challenges of personal information protection in the digital age, particularly regarding the safety of facial recognition technology applications [1][3] - The event was guided by the Guangdong Provincial Internet Information Office and co-hosted by various organizations, attracting over a hundred representatives from government agencies, research institutions, enterprises, and social organizations [1][3] - The promotion aims to shift enterprises from "passive compliance" to "active empowerment," enhancing user trust and market competitiveness through regular dissemination of regulations and policies [3] Group 2 - Experts provided detailed interpretations and on-site Q&A regarding the "Personal Information Protection Compliance Audit Management Measures" and the "Facial Recognition Technology Application Safety Management Measures" during the event [3][6] - The importance of adhering to principles of legality, necessity, and minimization in facial recognition technology applications was emphasized, along with the need for companies to conduct personal information protection impact assessments [3][6] - The audit process for personal information protection must maintain independence and objectivity, focusing on the legality and compliance of personal information processing activities [4][6] Group 3 - The event aimed to support the development of Guangdong as a leading region in personal information protection, enhancing the quality of economic and social development [6] - Attendees noted that the event provided valuable action guidelines for understanding the underlying logic and operational pathways of personal information protection work through case analysis and regulatory comparisons [6]
严惩“开盒”,给隐私“上锁”
Ren Min Ri Bao Hai Wai Ban· 2025-07-07 03:17
Core Viewpoint - The phenomenon of "opening boxes" has become a significant issue, involving the illegal collection and public disclosure of personal information, leading to online violence and harassment [1][2][3] Group 1: Definition and Mechanism - "Opening boxes" refers to the illegal gathering and public sharing of sensitive personal information, often for the purpose of inciting online violence or defamation [1] - This practice is seen as a more organized and industrialized evolution of traditional "human flesh search," which relied on crowdsourcing information [2][3] - The ease of accessing personal information has increased due to the established black and gray market for data, making "opening boxes" a low-cost and low-barrier activity [3] Group 2: Impact and Cases - Reports indicate that over 19,500 data leakage incidents were verified in 2023, affecting various industries including finance and e-commerce [4] - The rise of artificial intelligence and smart devices has exacerbated the challenges of personal information protection, as these technologies often collect sensitive data that can be exploited [5] Group 3: Involvement of Minors - A significant proportion of both victims and perpetrators of "opening boxes" are minors, who often lack awareness of the legal consequences of their actions [7][8] - The legal system considers the age and psychological state of minors when addressing "opening boxes," emphasizing education and guidance rather than solely punitive measures [8] Group 4: Regulatory Responses - The National Cyber Administration has taken steps to enhance personal information protection, including the investigation of 82 apps for violating personal data rights [9][10] - Future regulatory actions will focus on various sectors, including smart devices and the illegal sale of personal information through dark web channels [10]
刷脸怎样规范?个保合规审计注意啥?这场政策宣贯活动邀你来
Nan Fang Du Shi Bao· 2025-07-07 03:07
Group 1 - The event focuses on the compliance and regulatory aspects of facial recognition technology and personal information protection [1][2] - The event is organized under the guidance of the Guangdong Provincial Internet Information Office and involves multiple associations and institutions [1] - Key experts from the China Electronic Technology Standardization Institute will provide detailed interpretations of new policies related to facial recognition and personal information protection [1][2] Group 2 - The event schedule includes a leadership speech, expert presentations on specific regulations, an interactive Q&A session, and association exchanges [2] - The presentations will cover the "Facial Recognition Technology Application Safety Management Measures" and the "Personal Information Protection Compliance Audit Management Measures" [2] - The event is set to take place on July 9, with limited seating available for interested participants [1]
工信部规划700号段:给个人信息上“安全锁”
Bei Jing Shang Bao· 2025-07-06 15:57
Core Viewpoint - The Ministry of Industry and Information Technology has launched a pilot program for number protection services, utilizing the 700 number range to enhance user privacy and security in communications [1][4]. Group 1: Issues Addressed - The rise of personal information leaks has led to increased concerns over privacy, with users frequently receiving unsolicited marketing calls and facing risks of fraud due to the misuse of their phone numbers [2]. - The number protection service aims to mitigate these issues by providing users with temporary "privacy numbers" for various scenarios, such as food delivery and ride-hailing, thereby concealing their real phone numbers [2][3]. Group 2: Challenges in Implementation - Despite initial attempts by leading companies in delivery, e-commerce, and ride-hailing to use "intermediate numbers," challenges remain, including user confusion over distinguishing between real and intermediate numbers, which can facilitate fraud [3]. - The lack of unified technical standards and service norms among different stakeholders complicates the implementation of number protection services, leading to potential compatibility issues and service disruptions [3]. Group 3: 700 Number Range Benefits - The introduction of the 700 number range provides a clear distinction from regular phone numbers, allowing users to easily identify calls related to number protection services, thus enhancing their willingness to answer [4]. - The 700 number range is expected to meet the substantial demand for number resources in sectors like delivery and ride-hailing, supporting the long-term development of number protection services [4]. Group 4: Development Strategy - The Ministry of Industry and Information Technology has outlined a systematic approach for the pilot program, including a three-month preparation phase, a three-month transition phase, and a two-year formal pilot phase to ensure smooth implementation [5][6]. - The program emphasizes compliance, risk prevention, and the establishment of clear responsibilities among service providers, telecom operators, and users to protect user rights and enhance service quality [5][6]. Group 5: Future Outlook - The number protection service is anticipated to foster a healthier and safer information communication environment, addressing public concerns over personal information protection and contributing to the growth of new economic activities [6].
公共场所不得“强制刷脸”!北京将开展专项治理
Bei Jing Ri Bao Ke Hu Duan· 2025-07-06 08:15
Core Points - The "Facial Recognition Technology Application Security Management Measures" will be implemented starting June 1, 2025, prohibiting the use of facial recognition as the sole verification method in public places unless necessary [1][2] - The Beijing Municipal Cyberspace Administration will initiate a special governance campaign starting in July to address illegal collection and use of facial recognition information in public spaces [1][2] Group 1: Regulatory Framework - The new regulations require that any institution must not collect facial recognition data through coercion and must provide alternative verification methods if individuals refuse to use facial recognition [2] - Organizations processing facial recognition data for over 100,000 individuals must register with the provincial cyberspace administration [2] Group 2: Public Awareness and Reporting - Public awareness is emphasized, urging individuals to remain vigilant against unnecessary facial recognition usage and report any violations to the cyberspace administration [3] - The Beijing Municipal Cyberspace Administration has received complaints regarding the inability to delete facial recognition data after account cancellation on online platforms [2]