01 logo

Hot spot of the week | Information security in 315; excessive loan marketing infringes on information security; 2021 National Green data Center list; 2022 "Qinglang" operation

Recently, the State Internet Information Office once again solicited opinions on the regulations on the Network Protection of minors (draft for soliciting opinions).

By Ron BurrowsPublished 2 years ago 5 min read
8

The State Internet Information Office, in conjunction with the Ministry of Justice, in accordance with the newly revised Law of the people's Republic of China on the Protection of minors, the Law of the people's Republic of China on the Protection of personal Information and other laws and public feedback, the regulations on Network Protection of minors (draft for soliciting opinions) have been revised and improved, and opinions have been solicited publicly again.

Click to read the details: [notice of the State Cyber Information Office on the regulations on the Network Protection of minors (draft for soliciting opinions) for public consultation again]

?

On March 14, the Bank of China Insurance Regulatory Commission issued a warning on the risks induced by excessive lending marketing, referring to excessive collection of personal information and infringing on consumers' right to personal information security. When carrying out related business or cooperative business, some financial institutions and Internet platforms do not protect consumers' personal information in place, such as obtaining authorization by default consent, general authorization, etc.; use personal information for purposes other than credit card business and consumer credit business without consumer consent or against consumers' will; improper access to external information of consumers. The above acts of excessive collection or use of consumers' personal information infringe upon consumers' right to personal information security. Remind consumers to raise their awareness of protecting their legitimate rights and interests in the process of consumption.

?

The Ministry of Industry and Information Technology and other six departments have released a list of national green data centers for 2021, including 44 national green data centers for 2021, in order to speed up energy conservation and energy efficiency improvement of data centers, guide data centers to take an efficient, low-carbon, intensive and circular green development path, and help achieve carbon peak and carbon neutralization goals.

Click to read the details: [the Ministry of Industry and Information Technology and other six departments announced the list of national green data centers in 2021]

?

On March 17, the Information Office of the State Council held a press conference on the 2022 "Qinglang" series of special actions to introduce the 2022 "Qinglang" series of special actions. The "Qinglang" series of special actions in 2022 will highlight netizens' concerns, prescribe the right medicine to the case, and give more prominence to the effect orientation, including 10 key tasks: cracking down on Internet rumors, tackling the disorder of information content in MCN institutions, rectifying the chaos in the field of webcast and short videos, rectifying the chaos of application information services, standardizing the communication order, comprehensively improving the algorithm, and rectifying the network environment during the Spring Festival. Rectify the network environment of summer minors. In addition, the "Qinglang Internet user account Operation Special rectification Action" and the "Qinglang crackdown on traffic fraud, black public relations, and network water army" launched last year will continue to be carried out in depth this year, and will still be included in the key work of the "Qinglang" special operation, which must achieve solid results.

?

The Ministry of Industry and Information Technology released the key points of automobile standardization this year. The main points of the work mentioned, "improve the guidelines for the construction of the standard system in key areas such as new energy vehicles and intelligent network-connected vehicles, study and formulate the intelligent network-connected automobile test equipment standard system, and speed up the construction of the automobile chip standard system." In the field of intelligent network connection automobile, "carry out the pilot project of online upgrade management of automobile software, organize the trial verification of standards such as information security management system, and complete the review and approval of mandatory national standards such as software upgrade, vehicle information security and self-driving data recording system." "accelerate the formulation of key security standards such as information security engineering, emergency response, general data requirements, on-board diagnostic interfaces, digital certificates and password applications, and further strengthen the construction of intelligent network-connected automobile information security and network security system."

?

On March 18, the General Office of the Ministry of Education and the General Office of the Ministry of Industry and Information Technology officially issued the Circular of the General Office of the Ministry of Education on the publication of the list of the first batch of characteristic demonstration software colleges. It defines the first batch of characteristic demonstration software colleges (33 characteristic demonstration software colleges and 68 cooperative enterprises).

Read the original text:

Https://www.miit.gov.cn/jgsj/xxjsfzs/gzdt/art/2022/art_b9bdc5162fa441a0bcf9b9e18e0c4cbb.html

According to the announcement of the National Standards of the people's Republic of China (No. 2 of 2022) issued by the State Administration of Market Supervision and Administration and the State Standardization Administration on March 9, 2022, the four national standards under the jurisdiction of the National Information Security Standardization Technology Committee were officially issued. The specific list is as follows:

Hot? Point]

On March 15, the "March 15" party of CCTV once again exposed many illegal chaos, and the network information security and the information security of children's interactive products became the focus of attention. In the field of information security, these include: manipulation of search results; "free WiFi" App hidden traps; software download platform high-speed download hidden tricks; browsing the web to reveal mobile phone numbers, causing harassment calls; low-equipped children's smartwatches into "walking voyeurs". These chaotic phenomena highlight the current development of the digital economy, information security and personal privacy issues have become great challenges.

Click to read details: [information security in 315: search results are manipulated; "free WiFi" trap; high-speed download tricks; web browsing harassing phone calls; children's watches become "walking voyeurs"]

[OK? Move]

On the eve of the "March 15" International Consumer Rights and interests Day, the Ministry of Industry and Information Technology carried out the rectification of App infringing upon users' rights and interests "looking back", organizing third-party testing institutions to focus on memory cleaning and mobile phone optimization App that were reported by previous users, and spot-tested the APP that found problems last year, and found that 14 App (see attachment for details) still have problems.

?

In response to the irregularities in the field of information and communications reported by CCTV on March 15, the Ministry of Industry and Information Technology immediately organized careful verification, and strictly investigated and dealt with the problems of deceiving users into downloading malicious App in the name of free Wi-Fi, forced bundling and downloading of application software platforms, harassing phone calls, and the safety protection of smart children's watches in accordance with the requirements of relevant laws and regulations. In the next step, the Ministry of Industry and Information Technology will continue to strengthen the pro

cybersecurity
8

About the Creator

Ron Burrows

Reader insights

Be the first to share your insights about this piece.

How does it work?

Add your insights

Comments

There are no comments for this story

Be the first to respond and start the conversation.

Sign in to comment

    Find us on social media

    Miscellaneous links

    • Explore
    • Contact
    • Privacy Policy
    • Terms of Use
    • Support

    © 2024 Creatd, Inc. All Rights Reserved.