38 App violations were notified of the specifics
38 App violations were notified of the specifics, with the expansion of the connotation of the data, face information, health information, financial accounts, whereabouts and trajectories, etc., are also increasingly being collected, this information because of the close relationship with the privacy of the 38 App violations were notified of the specifics.
38 App violations were notified of the specifics 1According to the Ministry of Industry and Information Technology WeChat public news, the Ministry of Industry and Information Technology issued a report on the APP over the scope of the request for permissions, excessive collection of users' personal information and other issues, "look back". 38 violations of the APP was notified, involving over the scope of the request for permissions, excessive collection of users' personal information and other issues. The company's website has been updated with the latest information on the latest developments in the industry.
Is it normal for software to ask for permissions in the background?
Zhao Shuai, head of privacy and security operations at QIAN Pangu, said that in terms of personal information protection, the operating system's permissions are designed to limit the behavior of the app's collection and use of personal information, so that the user can take the initiative to control whether the app can collect a specific type of personal information, such as contacts, geographic location, etc. The app can be used to collect personal information, but it can also be used to collect personal data. The behavior of background invocation of permissions is reasonable in specific scenarios, such as the scenario where we use the phone to navigate, and although we switch to the background, we are still using the app; there are also some scenarios that are non-essential, such as when we switch the app to the background, and do not use the app to provide services for the time being, so the background invocation of permissions in this case may be out of the range of the normal needs.
Qu Zilong, founder of the civilian Internet security organization Network Sharp Knife, believes that, from a technical point of view, the number of invocations actually does not directly illustrate the problem, or what it actually does in the application scenarios in order to confirm compliance.
38 App violations were notified specifics 2Install flashlight program, to provide geographic location information; download text editor APP, need to obtain access to address book permissions; walk into the sales office, in the absence of knowledge, face information may be recorded ...... big data era, people enjoy the convenience of data, but also by the Some of the excessive collection of personal information behavior plagued.
Not long ago, the thirtieth meeting of the Standing Committee of the thirteenth National People's Congress considered and passed the "Chinese People's **** and the State Personal Information Protection Law" (hereinafter referred to as "Personal Information Protection Law"), and will be formally implemented on November 1st.
The "consent" is hard to refuse
No authorization can't be used, and the permissions don't match the functional needs of the APP
After investigating hundreds of thousands of APPs, a team from Renmin University found that the "consent" is a very important part of the process, and it is a very important part of the process.
After investigating hundreds of thousands of APPs, a team at Renmin University of China found that there are more than 30 different types of permissions for APPs, but many of them don't match the needs of APPs to realize their functions.
What's the point of APP requiring so many permissions? If you look closely at the terms of the user privacy agreement, almost without exception, it is mentioned that some of the information collected will be used for commercial purposes, such as pushing personalized information, advertising, etc. This is also the potential commercial value of personal information.
Worried about the information being used in violation of the law, when installing some APP, Mr. Wang in Chaoyang District, Beijing, had wanted to refuse certain authorizations, but he found that he could not use it without agreeing to authorization. "Once authorized, where did my personal information go?" Mr. Wang was confused. Meanwhile, most of the text of the permission application is lengthy and complicated. There have been statistics that most of the content of the APP pass privacy clauses are more than 10,000 words. After reading them, many people just click "Agree" when they are too busy to read them.
A developer said that after obtaining access, the background can even determine what the people behind the data do, where they go. Protecting the '"we"' of virtual space data usually relies on self-discipline on the part of the collector. However, if the security "wall" of some enterprises is not strong, it may cause information leakage. An even greater risk is that some data collectors may even engage in the "business" of data exchange, where data may be illegally utilized after a few transfers.
In recent years, there have been media reports of online platforms selling personal information at marked-up prices. For example, a story about 170,000 pieces of "face data" being sold publicly has attracted widespread attention.
The use of information to analyze personal characteristics and provide a precise portrait of the user is conducive to improving the consumer experience, but it can also lead to "big data" and other violations of consumer rights. A study by Fudan University on online dating found that a certain brand of cell phone users are more likely to be comfortable with the vehicle driver to take orders, the proportion is much higher than that of other brands of cell phone users. There are also netizens who reflect that there is a considerable difference in price when they browse the same brand of the same goods online with their friends at the same time.
In addition, with the expansion of the connotation of data, face information, health information, financial accounts, whereabouts trajectory, etc. are also increasingly being collected, and this information is more sensitive because it is closely related to privacy. Experts say that the norms for collecting and handling sensitive personal information should be stricter.