One mobile phone to conquer the world: mankind's last chance for gold nuggets
Chapter 44 Into Heaven or Hell?
Chapter 44 Into Heaven or Hell? (4)
Foreign countries will impose heavy penalties on personal privacy leaks. If a business dares to leak consumers' personal information, it will face a felony and a huge fine.In contrast to our own personal information, there are strangers calling and texting you every day, nothing more than selling insurance, houses, financial management, banks, auctions... how do they know your phone number? ?It must have been leaked at some point, maybe you left a phone number at the bank, and the bank leaked it, or maybe the number you left when applying for insurance was betrayed... It's all possible.
Case
United States: Law and self-discipline go hand in hand[29]
As one of the countries with the most developed e-commerce, the United States attaches great importance to the protection of network privacy. As early as 1986, Congress passed the "Federal Electronic Communications Privacy Act", which stipulates that the interception, access or disclosure of stored communication information infringes on individuals. Privacy Circumstances, Exceptions, and Liabilities is an important bill dealing with online privacy protection issues.
On April 2000, 4, the first federal law on Internet privacy in the United States came into effect. This law stipulates that collecting personal information of children under the age of 21 online will be considered illegal and can be fined tens of thousands of dollars.
In June 2000, a committee of members of the US Senate began to clamp down on online advertisers' use of users' private information.The Federal Trade Commission has also begun drafting laws to regulate the collection of personal information by online advertisers.
EU: More emphasis on personal data protection
On October 1995, 10, the European Union passed the "Personal Data Protection Directive", which covers almost all issues dealing with personal data, including the form of personal data processing, the collection, recording, storage, modification, use or Destruction, as well as the collection, recording, search, dissemination, etc. of personal data on the Internet, it stipulates that each member state must adjust or formulate its own personal data protection laws in accordance with the directive to protect the free flow of personal data among member states.
On September 1996, 9, the European Union also passed the "Electronic Communication Data Protection Directive", which is a supplement to the 12 Directive and provides special provisions; in October 1995, the "Private Data Confidentiality Act" related to e-commerce In 1998, the European Commission successively formulated the "General Principles for the Protection of Personal Privacy on the Internet", "Proposals on Invisible and Automatic Personal Data Processing by Software and Hardware on the Internet", and "Personal Data on the Information Highway". "Guidelines for the Protection of Personal Rights in the Process of Collection and Processing" and other relevant laws and regulations provide users and network service providers with clear privacy protection principles, thus effectively establishing a unified legal system for network privacy protection in member countries .
Germany: Electronic payment data protection is valued
Germany is a country with relatively fast Internet development in Europe. As early as 1996, the number of individual users connected online was estimated to have reached 190 million, and 400 million users connected online in workplaces and universities.The rapid development of the Internet industry has made Germany realize that in order to create a safe and effective online transaction environment, a series of laws and regulations are required for appropriate supervision. At the same time, in view of the global nature of the Internet, a transaction medium, these laws and regulations need to have an international basis.
In this context, Germany promulgated the "Information and Communication Services Act" and the "State Media Service Agreement" on August 1997, 8.The former regulates the provision of information products and services over the Internet, and its core includes three new independent laws: the Telecommunications Services Act, the Data Protection Act in Telecommunications Services, and the Signature Act on digital signatures, the latter Provides a legal framework for media services in areas such as freedom of access, fundamental principles of responsibility, transparency of providers, etc.
China: Protection of Personal Information of Telecommunications and Internet Users
The "Regulations on the Protection of Personal Information of Telecommunications and Internet Users (Draft for Comment)" (hereinafter referred to as the "Regulations") issued by the Ministry of Industry and Information Technology clearly states that telecommunications business operators, Internet information service providers and their staff shall not disclose user information, nor sell and illegally providing user information to others, offenders are likely to face a fine of up to 3 yuan, and serious cases will be investigated for criminal responsibility.
The "Regulations" stated that without the consent of users, telecommunications business operators and Internet information service providers shall not collect and use users' personal information.Where telecommunications business operators and Internet information service providers collect and use users' personal information, they shall clearly inform users of the purpose, method and scope of collecting and using information, the period for retaining information, channels for querying and correcting information, and the consequences of refusing to provide information etc.
The "Regulations" stated that telecommunications business operators, Internet information service providers and their staff members who leak, sell or illegally provide user information to others will be ordered by the telecommunications management agency to make corrections within a time limit, give warnings, and may be fined more than 1 yuan. If a fine of less than 3 yuan constitutes a crime, criminal responsibility shall be investigated according to law.
Minefields in your phone: Viruses and privacy
When is a mobile phone a grenade?When you lose your basic awareness of prevention and casually download those seemingly attractive software, pictures, and games on the Internet.It is likely that there is a Trojan horse virus in it.In addition, do not store all private and sensitive files in the mobile phone, and it is best to store them in the cloud, otherwise the mobile phone is easily broken by hackers with rogue software, and those files will be stolen by him.Consumers must have a sense of self-protection and know which codes of conduct can strengthen self-protection.
The biggest problem with mobile phones in the future is viruses.Viruses in mobile phones are the same as viruses in computers, which will bring security and privacy issues.In terms of viruses, there is even such a business model. Seemingly different companies are actually integrated internally. Some people are dedicated to creating and upgrading viruses to create demand, and then other people are responsible for killing viruses.
The mobile phone virus problem will be very serious in the future. For example, because the mobile phone has a virus, the personal information in the mobile phone is hung up on the Internet, for example, the bank deposits disappear inexplicably because the mobile phone has a Trojan horse; Trojan virus interception, monitoring, etc.The social problems that will be brought about by this will be extremely harmful problems, which may cause divorce, affect the relationship between doctors and patients, and destroy the relationship between colleagues in the unit.Especially when using free OTT services, once their codes and systems are open, it is easy to leak, because such virus software is easy to compile, and an engineering undergraduate with a basic level can compile a mobile phone virus software. Then carry out viral transmission to achieve various purposes such as monitoring and spying.
How to deal with many problems that may be caused by mobile phone viruses?First of all, it is necessary to upgrade and improve safety technology, and secondly, it is necessary to have a good business model to create a healthy safety ecological chain; at the same time, there must be government legislation, reasonable law enforcement, and the attention of the whole society through the punishment of typical cases; finally, It is also necessary to improve personal usage habits. Every mobile phone user must have a sense of security, and be able to judge which things cannot be clicked, and which text messages may be scams.Curiosity is a trap.
data
The "2013 Andriod Mobile Phone Market Security Status Report" released by Analysys think tank pointed out that in the second quarter of 2013, the total number of new mobile phone viruses was 20.4, with a quarter-on-quarter growth rate of 119.4%. In the first half of 2013, the total number of viruses increased sharply, and a total of 29.7 viruses were intercepted, which was nearly 2012 times the total in 1.9. Viruses were developing in the direction of multi-platform and multi-system.
Case
2012 mobile phone privacy leak incident[30]
Apple iOS Exposes Another Privacy Security Vulnerability
A security flaw in Apple's iOS software allows app developers to secretly access users' pictures while allowing users to share location information.For users who are used to taking pictures with iPhone, this vulnerability will seriously affect the enthusiasm of users to take pictures with iPhone, worrying that they will become the protagonist of pornographic photos.
"3" party exposed personal information leakage
CCTV's "3" party exposed that Luowei Dun & Bradstreet Company sells user information. The company can provide customers with as many as 15 million personal detailed information data, which can be accurately screened according to various aspects such as region, time, identity, and assets. , which shocked all audiences.This is also the main reason why users' mobile phones continue to receive advertising promotions and fraudulent text messages.In this regard, Tencent Mobile Manager can conduct local interception through cloud intelligent interception, black and white lists, and keywords.
Mobile phone eavesdropping software leads to the disclosure of trade secrets
An article in "Inspection Daily" "How to take responsibility for eavesdropping on business secrets when virus software corrodes mobile phones" has aroused widespread concern among mobile phone users.A lady surnamed Chen said: "Competitor Li sent him a virus link through MMS, and after the virus was installed on his mobile phone, the price of the contract he signed with the partner was tapped by Li and he snatched it up at a lower price." Here comes the order."
Obama's "canvassing" app involved privacy leak
The campaign teams of Obama and Romney all used mobile phone applications to "canvass votes."It is reported that this mobile phone application can summarize the public information such as the name, gender, age and address of registered voters, and help campaign organizers and volunteers accurately locate target voters and go door-to-door to canvass votes. Voter response information can be fed back to the campaign through this program. Headquarters data center, for reference.However, because the mobile phone application can aggregate voters' personal information, some Americans worry that such information will fall into the hands of people with bad intentions, which will bring unnecessary trouble to voters and affect voters' enthusiasm for voting.
Taiwan Li Zongrui Yanzhaomen
Indecent pornographic photos of Taiwanese rich and young Li Zongrui and 60 female artists flowed out on the Internet, but the Taiwanese police intercepted them in many ways, but they are still spreading wildly on the Internet.Although the incident of Li Zongrui's pornographic photos is just an example, it has also aroused the attention of netizens on the protection of personal privacy.At present, mobile phones have become the most convenient terminals for taking pictures and videos, and various privacy leakage problems frequently occur due to the loss of mobile phones. For example, the leakage of pornographic photos between Edison Chen and young models is also caused by the loss of mobile phones.
Data of 870 million mobile phone users in South Korea leaked
(End of this chapter)
Foreign countries will impose heavy penalties on personal privacy leaks. If a business dares to leak consumers' personal information, it will face a felony and a huge fine.In contrast to our own personal information, there are strangers calling and texting you every day, nothing more than selling insurance, houses, financial management, banks, auctions... how do they know your phone number? ?It must have been leaked at some point, maybe you left a phone number at the bank, and the bank leaked it, or maybe the number you left when applying for insurance was betrayed... It's all possible.
Case
United States: Law and self-discipline go hand in hand[29]
As one of the countries with the most developed e-commerce, the United States attaches great importance to the protection of network privacy. As early as 1986, Congress passed the "Federal Electronic Communications Privacy Act", which stipulates that the interception, access or disclosure of stored communication information infringes on individuals. Privacy Circumstances, Exceptions, and Liabilities is an important bill dealing with online privacy protection issues.
On April 2000, 4, the first federal law on Internet privacy in the United States came into effect. This law stipulates that collecting personal information of children under the age of 21 online will be considered illegal and can be fined tens of thousands of dollars.
In June 2000, a committee of members of the US Senate began to clamp down on online advertisers' use of users' private information.The Federal Trade Commission has also begun drafting laws to regulate the collection of personal information by online advertisers.
EU: More emphasis on personal data protection
On October 1995, 10, the European Union passed the "Personal Data Protection Directive", which covers almost all issues dealing with personal data, including the form of personal data processing, the collection, recording, storage, modification, use or Destruction, as well as the collection, recording, search, dissemination, etc. of personal data on the Internet, it stipulates that each member state must adjust or formulate its own personal data protection laws in accordance with the directive to protect the free flow of personal data among member states.
On September 1996, 9, the European Union also passed the "Electronic Communication Data Protection Directive", which is a supplement to the 12 Directive and provides special provisions; in October 1995, the "Private Data Confidentiality Act" related to e-commerce In 1998, the European Commission successively formulated the "General Principles for the Protection of Personal Privacy on the Internet", "Proposals on Invisible and Automatic Personal Data Processing by Software and Hardware on the Internet", and "Personal Data on the Information Highway". "Guidelines for the Protection of Personal Rights in the Process of Collection and Processing" and other relevant laws and regulations provide users and network service providers with clear privacy protection principles, thus effectively establishing a unified legal system for network privacy protection in member countries .
Germany: Electronic payment data protection is valued
Germany is a country with relatively fast Internet development in Europe. As early as 1996, the number of individual users connected online was estimated to have reached 190 million, and 400 million users connected online in workplaces and universities.The rapid development of the Internet industry has made Germany realize that in order to create a safe and effective online transaction environment, a series of laws and regulations are required for appropriate supervision. At the same time, in view of the global nature of the Internet, a transaction medium, these laws and regulations need to have an international basis.
In this context, Germany promulgated the "Information and Communication Services Act" and the "State Media Service Agreement" on August 1997, 8.The former regulates the provision of information products and services over the Internet, and its core includes three new independent laws: the Telecommunications Services Act, the Data Protection Act in Telecommunications Services, and the Signature Act on digital signatures, the latter Provides a legal framework for media services in areas such as freedom of access, fundamental principles of responsibility, transparency of providers, etc.
China: Protection of Personal Information of Telecommunications and Internet Users
The "Regulations on the Protection of Personal Information of Telecommunications and Internet Users (Draft for Comment)" (hereinafter referred to as the "Regulations") issued by the Ministry of Industry and Information Technology clearly states that telecommunications business operators, Internet information service providers and their staff shall not disclose user information, nor sell and illegally providing user information to others, offenders are likely to face a fine of up to 3 yuan, and serious cases will be investigated for criminal responsibility.
The "Regulations" stated that without the consent of users, telecommunications business operators and Internet information service providers shall not collect and use users' personal information.Where telecommunications business operators and Internet information service providers collect and use users' personal information, they shall clearly inform users of the purpose, method and scope of collecting and using information, the period for retaining information, channels for querying and correcting information, and the consequences of refusing to provide information etc.
The "Regulations" stated that telecommunications business operators, Internet information service providers and their staff members who leak, sell or illegally provide user information to others will be ordered by the telecommunications management agency to make corrections within a time limit, give warnings, and may be fined more than 1 yuan. If a fine of less than 3 yuan constitutes a crime, criminal responsibility shall be investigated according to law.
Minefields in your phone: Viruses and privacy
When is a mobile phone a grenade?When you lose your basic awareness of prevention and casually download those seemingly attractive software, pictures, and games on the Internet.It is likely that there is a Trojan horse virus in it.In addition, do not store all private and sensitive files in the mobile phone, and it is best to store them in the cloud, otherwise the mobile phone is easily broken by hackers with rogue software, and those files will be stolen by him.Consumers must have a sense of self-protection and know which codes of conduct can strengthen self-protection.
The biggest problem with mobile phones in the future is viruses.Viruses in mobile phones are the same as viruses in computers, which will bring security and privacy issues.In terms of viruses, there is even such a business model. Seemingly different companies are actually integrated internally. Some people are dedicated to creating and upgrading viruses to create demand, and then other people are responsible for killing viruses.
The mobile phone virus problem will be very serious in the future. For example, because the mobile phone has a virus, the personal information in the mobile phone is hung up on the Internet, for example, the bank deposits disappear inexplicably because the mobile phone has a Trojan horse; Trojan virus interception, monitoring, etc.The social problems that will be brought about by this will be extremely harmful problems, which may cause divorce, affect the relationship between doctors and patients, and destroy the relationship between colleagues in the unit.Especially when using free OTT services, once their codes and systems are open, it is easy to leak, because such virus software is easy to compile, and an engineering undergraduate with a basic level can compile a mobile phone virus software. Then carry out viral transmission to achieve various purposes such as monitoring and spying.
How to deal with many problems that may be caused by mobile phone viruses?First of all, it is necessary to upgrade and improve safety technology, and secondly, it is necessary to have a good business model to create a healthy safety ecological chain; at the same time, there must be government legislation, reasonable law enforcement, and the attention of the whole society through the punishment of typical cases; finally, It is also necessary to improve personal usage habits. Every mobile phone user must have a sense of security, and be able to judge which things cannot be clicked, and which text messages may be scams.Curiosity is a trap.
data
The "2013 Andriod Mobile Phone Market Security Status Report" released by Analysys think tank pointed out that in the second quarter of 2013, the total number of new mobile phone viruses was 20.4, with a quarter-on-quarter growth rate of 119.4%. In the first half of 2013, the total number of viruses increased sharply, and a total of 29.7 viruses were intercepted, which was nearly 2012 times the total in 1.9. Viruses were developing in the direction of multi-platform and multi-system.
Case
2012 mobile phone privacy leak incident[30]
Apple iOS Exposes Another Privacy Security Vulnerability
A security flaw in Apple's iOS software allows app developers to secretly access users' pictures while allowing users to share location information.For users who are used to taking pictures with iPhone, this vulnerability will seriously affect the enthusiasm of users to take pictures with iPhone, worrying that they will become the protagonist of pornographic photos.
"3" party exposed personal information leakage
CCTV's "3" party exposed that Luowei Dun & Bradstreet Company sells user information. The company can provide customers with as many as 15 million personal detailed information data, which can be accurately screened according to various aspects such as region, time, identity, and assets. , which shocked all audiences.This is also the main reason why users' mobile phones continue to receive advertising promotions and fraudulent text messages.In this regard, Tencent Mobile Manager can conduct local interception through cloud intelligent interception, black and white lists, and keywords.
Mobile phone eavesdropping software leads to the disclosure of trade secrets
An article in "Inspection Daily" "How to take responsibility for eavesdropping on business secrets when virus software corrodes mobile phones" has aroused widespread concern among mobile phone users.A lady surnamed Chen said: "Competitor Li sent him a virus link through MMS, and after the virus was installed on his mobile phone, the price of the contract he signed with the partner was tapped by Li and he snatched it up at a lower price." Here comes the order."
Obama's "canvassing" app involved privacy leak
The campaign teams of Obama and Romney all used mobile phone applications to "canvass votes."It is reported that this mobile phone application can summarize the public information such as the name, gender, age and address of registered voters, and help campaign organizers and volunteers accurately locate target voters and go door-to-door to canvass votes. Voter response information can be fed back to the campaign through this program. Headquarters data center, for reference.However, because the mobile phone application can aggregate voters' personal information, some Americans worry that such information will fall into the hands of people with bad intentions, which will bring unnecessary trouble to voters and affect voters' enthusiasm for voting.
Taiwan Li Zongrui Yanzhaomen
Indecent pornographic photos of Taiwanese rich and young Li Zongrui and 60 female artists flowed out on the Internet, but the Taiwanese police intercepted them in many ways, but they are still spreading wildly on the Internet.Although the incident of Li Zongrui's pornographic photos is just an example, it has also aroused the attention of netizens on the protection of personal privacy.At present, mobile phones have become the most convenient terminals for taking pictures and videos, and various privacy leakage problems frequently occur due to the loss of mobile phones. For example, the leakage of pornographic photos between Edison Chen and young models is also caused by the loss of mobile phones.
Data of 870 million mobile phone users in South Korea leaked
(End of this chapter)
You'll Also Like
-
Mastering Lightning from Hogwarts
Chapter 851 11 hours ago -
Online game: Kill me, you will die
Chapter 82 14 hours ago -
The Mountain of Ice and Fire
Chapter 1051 15 hours ago -
Age of Calamity in Swallowed Star
Chapter 488 18 hours ago -
Depressive Screenwriter
Chapter 356 21 hours ago -
Weird Resurrection: From Teddy Bear to Dread Bear!
Chapter 218 21 hours ago -
The most powerful system in the world of fantasy
Chapter 4505 21 hours ago -
Let's start by analyzing the sun
Chapter 1048 21 hours ago -
Naruto: I, Naruto, Start With The Full-Level Shining Fruit
Chapter 122 21 hours ago -
Cultivating Immortality Begins with Rejuvenation
Chapter 153 21 hours ago