More than 750 APPs have been exposed in 5 years, and the information in the mobile phone cannot be ignored

Author:Henan Daily Client Time:2022.07.09

Made in Tianjin Branch Fang Jinyang

Xinhua News Agency, Tianjin, July 8th. On the 6th, the National Computer Virus Emergency Treatment Center once again exposed a number of illegal apps, which aroused the attention of netizens.

In June 2017, the "Cyber ​​Security Law of the People's Republic of China" was officially implemented. In August of the same year, the National Computer Virus Emergency Treatment Center exposed the first batch of problems APPs. So far, a total of 751 issues were notified.

In the reported violations of laws and regulations, suspected of collecting personal privacy information for over -range collection has become the highest proportion. Illegal and illegal APP covers games, office, ticket tickets, banks, learning, health, short videos and other fields.

Zhang Xin, the relevant person in charge of the National Computer Virus Emergency Treatment Center, said that in the first 10 issues, the APPs were mostly suspected of "binding malicious advertising plug -ins", "serious interference with the normal use of mobile phones", "gambling", "malignant deduction" and so on. Since the 11th issue, the suspected violation of privacy has gradually increased.

"All privacy permissions that have not been explicitly applied to users" is the most common privacy and unsatisfactory behavior. As high as 451 APPs, this problem has occurred, accounting for about 60%. For example, banks such as "Minsheng Bank" and other banking APPs such as "Tongcheng Tourism" are on the list. In the recent report, 13 APPs such as "Baidu News" were also exposed.

The means of collecting user information illegally include "starting the collection before the acquisition of the user's consent", "to solicit user consent with default selection of privacy policies, etc." "The authorization of the application is not corresponding to the privacy clause", "Provide individuals to third parties to the third party Information is not anonymous "and so on. The reporter found that similar violations have appeared more than 210 times in the report, and APPs such as the 36th "Jianghuai Automobile", the 43rd "Easy Purchase", and the 44th "58 City" were exposed.

Personal information acceptance channels have also become "severe disaster areas." For example, apps such as "scallops listening" and other apps "promise to accept personal information security complaints, report time limit for more than 15 working days", "Beauty Makeup" and other apps such as "not established and published personal information security complaints and report channels". Similar illegal acts appeared more than 140 times in the report.

Relevant departments have repeatedly rectified the APP to leak personal information. Why are there still violations?

It is reported that the illegal APP will be rectified and removed. However, Yuan Kang, deputy dean of the Wuhan University Network Governance Research Institute, believes that the act of illegal collection of personal information in APP still has a certain concealment.

Chen Xuhui, president of the Massive Information Research Institute, believes that the "application market" as an important platform has not played a role, and it is disappeared for some apps to collect personal information in violation of regulations, which brings difficulties in law enforcement of regulatory authorities.

Yuan Kang believes that some apps are authorized in the initial agreement to share user data with third parties, which is equivalent to allowing users to give up the right to review the transfer of personal information in the future. This lays hidden dangers for personal information leaks at the data sharing level.

Many users are difficult to determine the necessary information and sensitive information when authorizing personal information, or they do not care about the protection of personal information for the pursuit of convenience. "Because of the rejection of granting permissions, it is unavailable. The user generally feel numb or even ignores many apps to obtain personal information permissions." Chen Xuhui said.

The reporter found that some apps often choose to use high -level personal information without necessary. For example, biological information such as face, sound lines, fingerprints, and iris begins to be used in mobile payment and other fields, which is closely related to personal financial security.

"This has led to a large -scale abuse of personal biological information such as face recognition." Said Zuo Xiaodong, deputy dean of the China Institute of Information Security, said that more personal information may face the risk of leakage in the future, and the scene will be more complicated.

Chen Xuhui and others have called to strengthen the industry's self -discipline. In addition to the data collection level, it is also necessary to refine the technical levels of data collection, processing, and flowing to prevent enterprises from playing "wipe balls", resulting in leakage user original information in the flow.

With the gradual expansion of application scenarios, Zuo Xiaodong believes that my country urgently needs to set up a special information protection agency to undertake the reports of the masses and respond to the concerns of the masses in a timely manner. , Eliminate its breeding soil.

Chen Xuhui and others suggest that the relevant departments have further increased their enforcement efforts, so that enterprises have awe of the protection of personal privacy protection. At the same time, they have carried out publicity of law popularization and enhance the public's personal information protection awareness. (Reporter Wang Jinghuai, Liu Weizhen)

- END -

Improve environmental hygiene and promote the normal cleaning of the community, they are acting →

Basically finished the car shed, I went to the green land to help.There is dust he...

Strive to run a good school at the door of the masses

Strive to run a good school at the door of the masses——Reamed Autonomous Region ...