Workflow
个人信息安全
icon
Search documents
《人脸识别技术应用安全管理办法》6月1日起实施 宾馆客房的私密空间不得安装人脸识别设备(法治聚焦)
Ren Min Ri Bao· 2025-05-29 22:09
Core Points - The implementation of facial recognition technology raises concerns about personal information security, particularly regarding unauthorized collection and misuse of facial data for fraudulent activities [1] - The National Internet Information Office and the Ministry of Public Security have introduced the "Facial Recognition Technology Application Security Management Measures," effective from June 1, which aims to regulate the use of facial recognition technology [2] Group 1 - The new regulations require that facial recognition technology must have specific purposes and sufficient necessity, minimizing the impact on personal rights, and implementing strict protective measures [2] - Organizations must inform individuals about the collection of their facial data and obtain explicit consent, ensuring that data is stored locally and not transmitted over the internet without consent [2] - The regulations establish a non-exclusive verification principle, stating that if other non-facial recognition methods can achieve the same purpose, facial recognition should not be the sole verification method [2] Group 2 - The regulations address the rights of vulnerable groups, stipulating that the processing of facial information for disabled individuals and the elderly must comply with accessibility standards [3] - For minors under the age of fourteen, consent from parents or guardians is required before processing their facial information [3]
台铃电动App违规收集个人信息!客服称或因要求填生日性别
Nan Fang Du Shi Bao· 2025-05-22 14:15
Group 1 - The National Cybersecurity and Information Security Information Notification Center reported that the "Tailin Electric" app (version 3.3.5) has multiple violations regarding the collection and use of personal information [1] - Violations include not listing the rules for collecting and using personal information in a structured manner, declaring permissions unrelated to the app's business functions, and requiring users to provide personal information for unused features [1] - The app was detected between April 16, 2025, and May 15, 2025, with the source being the application market "App Treasure" [1] Group 2 - The official customer service of Tailin Group stated that the requirement for users to fill in their birthday and gender may have led to the violations, and they assured that user privacy would be protected [1] - The "Tailin Intelligent" app, which is a service tool for electric vehicle users, offers features such as smart unlocking, one-click vehicle locating, and card unlocking [2] - Currently, the "Tailin Electric" app cannot be found on application markets, only the "Tailin Intelligent" app (current version 3.3.6) is available, both developed by Tailin Technology Co., Ltd. [1]
网警提醒:这些习惯正在泄露你的个人信息
Xin Lang Cai Jing· 2025-05-15 02:22
"我只是随手点了个链接,结果银行卡被盗刷了......" "明明没告诉别人身份证号,却接到精准推销电话?" 在数字时代,我们的个人信息就像散落的拼图,稍不注意就会被不法分子利用。许多看似常见的日常习 惯,正在悄悄成为信息泄露的"帮凶"!今天,跟随网警的脚步一起来扒一扒那些容易被忽略的"高危行 为",并见招拆招。 警惕!!!这些习惯,可能正在出卖你的隐私 No.1 随意连接公共WiFi 转自:北京日报客户端 危险行为:在咖啡厅、商场等公共场所,看到"免费WiFi"就迫不及待连接。 风险:黑客可通过多种手段窃取你的账号密码、聊天记录,甚至银行卡信息。 正确做法: 尽量使用手机流量或确认WiFi名称(向商家核实信息) 避免在公共网络登录网银等敏感账户 No.2 社交平台"晒生活"不留心 机票二维码可能泄露行程和身份证号 快递单上的电话、地址会被黑产收集 正确做法: 晒图前检查是否暴露敏感信息(如证件、票据) 朋友圈尽量设为"仅好友可见",减少公开曝光 No3 用同一密码注册所有账号 危险行为:各社交软件、邮箱、支付密码、游戏账号......全用同一个密码! 风险:一旦某个平台数据泄露,所有账号都可能被攻击。 危险行 ...
打击“开盒挂人”等网暴行为 司法如何发力
Group 1 - The article highlights the rise of a new form of online violence known as "opening boxes" which involves maliciously disclosing personal information of individuals online [1][2] - The report indicates that the judicial system is actively combating online violence, with a significant number of convictions for crimes related to the infringement of personal information and defamation [2][5] - The involvement of minors in both perpetrating and being victims of online violence is emphasized, showcasing their vulnerability and lack of awareness regarding online safety [1][2][6] Group 2 - A specific case involving a streamer named Fangfang illustrates the severe consequences of online harassment, including threats and the unauthorized sharing of personal information [3][4] - The judicial outcomes for the perpetrators involved in the case demonstrate the legal repercussions for engaging in such online violence, with sentences and fines imposed [5][6] - The article discusses the role of online platforms in managing and preventing the spread of harmful content, stressing the need for higher accountability and proactive measures [7][10] Group 3 - The article outlines the challenges faced by victims in collecting evidence for online violence cases, highlighting the anonymity and rapid spread of information in the digital space [2][6] - Recent judicial guidelines aim to improve the legal framework for addressing online violence, particularly focusing on the protection of minors and the responsibilities of online service providers [6][9] - The need for enhanced education on digital literacy and legal awareness among minors is emphasized to prevent future incidents of online violence [10]
你的手机、账号到底绑定了多少「授权登录」?这篇文章教你一次查清、解绑
3 6 Ke· 2025-05-12 02:01
Core Points - The article discusses the increasing complexity of managing personal information across various internet accounts and the emergence of new standards like Passkey to simplify registration and login processes [1][3] - It highlights the dual nature of third-party account authorization, such as OAuth 2.0, which simplifies user registration but also raises privacy concerns [3][4] - The article emphasizes the importance of understanding and managing authorized logins to protect personal information [4][32] Group 1: Third-Party Authorization Systems - OAuth 2.0 has been widely adopted since its inception in 2006, facilitating services like "Sign in with Apple" and "Sign in with Google" [3][4] - Apple has actively promoted privacy protection through its "Sign in with Apple" feature, which allows users to manage their authorizations transparently [4][5] - Google offers a similar service with "Sign in with Google," providing users with options to manage their authorized apps and services [7][8] Group 2: Privacy Management by Major Companies - Microsoft provides a straightforward management interface for its account authorizations, although its usage scenarios are less extensive compared to Apple and Google [10][11] - Meta (formerly Facebook) maintains a significant presence in social media, allowing users to manage third-party authorizations through its app and website [12][13] - Domestic platforms like QQ and WeChat offer relatively transparent management of third-party authorizations, though the process may not be as user-friendly as that of Apple or Google [14][15] Group 3: Challenges in Authorization Management - WeChat's approach to managing authorizations for mini-programs is less clear, making it difficult for users to manage their data effectively [15][16] - Alipay provides a more intuitive management system for third-party app authorizations compared to WeChat, but still lacks bulk management options [18][20] - Sina Weibo presents significant challenges in managing third-party authorizations, with users unable to view or revoke their authorizations easily [20][22] Group 4: Regulatory Developments - The Ministry of Industry and Information Technology (MIIT) in China has introduced services like "One Certificate to Check 2.0," allowing users to query the number of internet accounts linked to their phone numbers [32][35] - The "Second Number Renewal" service aims to enhance personal information security by allowing users to unlink accounts associated with previous phone numbers [35]
谨防“客服”退款诈骗 保护个人信息安全
Zhong Guo Jing Ji Wang· 2025-03-14 06:38
Core Points - A recent incident involved a woman losing over 40,000 yuan due to credit card fraud after being misled by a fake game customer service representative [1] - The incident highlights the need for consumers to verify the identity of customer service representatives and to be cautious of sharing sensitive information [1][2] - Consumers are advised to use official channels for resolving disputes and to maintain awareness of their account security [2][3] Group 1 - Consumers should carefully verify the identity of customer service representatives, as fraudsters often impersonate game support staff to exploit parents' concerns about their children's gaming expenses [1] - It is crucial to protect personal information and avoid sharing sensitive data such as bank card numbers or passwords with unknown individuals, as legitimate platforms do not request such information [1] - Parents are encouraged to manage their accounts securely by safeguarding their mobile devices and enabling transaction alerts to monitor account activity [1] Group 2 - In case of disputes related to online game charges, parents should remain calm and resolve issues through official customer service channels or legal means, avoiding unofficial contact methods [2] - If any suspicious account activity is detected, immediate action should be taken to freeze the account and report to law enforcement to minimize financial loss [3]