The hottest user privacy becomes the focus, Intern

  • Detail

User privacy has become the focus. Internet innovation does not forget privacy protection. The debate about 360 secure browser's suspected user privacy caused by the square week war is attracting the attention of the competent authorities

at the press conference on the operation of the industrial communication industry in the first three quarters of this year held by the Ministry of industry and information technology on October 25, Zhang Feng, director of the communication development department of the Ministry of industry and information technology, said in response to the question of Shanghai Oriental satellite TV about Qihoo 360 stealing users' privacy that the Ministry of industry and information technology was investigating the matter of Qihoo 360. If it was confirmed that there were violations of laws and regulations, the Ministry of industry and information technology would seriously deal with it according to law. At the same time, the Ministry of industry and information technology will further guide and urge Internet enterprises to strengthen self-discipline, jointly abide by and constantly improve industry rules, focus on innovation, rational competition, promote the healthy development of the industry, and provide users with better services

this is the first statement of the Ministry of industry and information technology on the uproar of the square week war in the past month. The intervention of the competent department makes Qihoo 360 once again become the focus of the debate when the basket moves the test product into the high-temperature area or low-temperature area to stop fighting against privacy when users' privacy impact

the upgraded war of words

the Fang Zhou war began on October 9. Fang Zhouzi, the anti-counterfeiting fighter, raised a series of questions on Sohu Weibo about the fundamental insecurity of 360 secure browser and Qihoo 360's peeping user privacy, and suggested that Sima Nan, an independent scholar and social commentator, should be cautious. In the next few days, Fang Zhouzi sent several microblogs questioning 360, including misleading users to install 360 browsers, peeping into users' privacy, and the lack of security measures on the server

in the face of Fang Zhouzi's many doubts, Qihoo 360 responded to Fang Zhouzi's questions one by one through its specially made rumor refutation station on October 12, saying that it was a complete fake to question 360 with a rumor article fabricated by its competitors

in this regard, Fang Zhouzi published a long microblog, denying that he had been bribed by any enterprise, accusing Qihoo 360 of obvious hard injuries and fatal errors in its previous response, and believed that the serial number problem of 360 browser and the fact that it sent non saved plug-ins to the user's computer every five minutes were enough to prove that 360 browser did control the user's client behavior

since then, the war of words between Fang Zhouzi and 360 has also risen to resort to the law to solve the problem. On October 25, Qihoo 360 said that it had filed a lawsuit against Fang Zhouzi for reputation infringement, and Fang Zhouzi also said in his microblog that it had filed a lawsuit against Qihoo 360 for spreading rumors to damage its reputation

user privacy has become the focus

there are many wars of words on Weibo. The development of this square week war to the point of causing the investigation of the Ministry of industry and information technology is mostly due to user privacy issues

insiders pointed out that 360 company was exposed by Fang Zhouzi and many friends in this war of words about security issues, privacy disclosure, attacks on competitors and other acts. If they are true, they are suspected of violating several provisions of the Ministry of industry and information technology order No. 20 of 2011 "Several Provisions on regulating the order of the Internet information service market"

although there is no clear definition of the right to privacy at the legal level in China, the issue of user privacy has been paid attention to by government departments and relevant enterprises

with the rapid development of new technology 20.0, new business and the in-depth promotion of informatization, the problem of Internet security has become increasingly prominent. Leaders of the Ministry of industry and information technology have repeatedly said that we should effectively strengthen network and information security management to provide a solid guarantee for the sustainable and healthy development of Internet. Industry management departments should speed up the improvement of relevant laws and regulations, strictly implement the main body of enterprises, strengthen the governance of the Internet environment, resolutely curb the spread of all kinds of harmful and harmful information, and effectively ensure the safety of users' personal information

Ma Huateng, CEO of Tencent, said at the China Internet Conference that there are great hidden dangers in Internet security. The specific investigation report shows that about 85% of the apps in the app store of Android system leak privacy to varying degrees. We are firmly opposed to taking advantage of security in the name of users

Qihoo 360 recently held a communication meeting on the theft of user privacy by 360 secure browser. Zhou Hongyu, chairman of Qihoo 360, said that the company had sent the 360 security browser to the inspection agency of the Ministry of industry and information technology, hoping to prove that the product had no problem with user privacy with the help of a third-party agency

Li Liang, senior public relations director of Qihoo 360, said that Qihoo 360 hopes to produce a result as soon as possible about the investigation of the Ministry of industry and information technology. Is there a problem with the 360 browser. Qihoo360 is the largest Internet security company in China, and has the security license qualification of computer information system issued by the public security system. It is believed that the Ministry of industry and information technology has a special authority to intervene in the investigation, and finally can get the authoritative investigation results

there are many technical experts who doubt that 360's product submission for inspection is still an important decision. In addition to the difficulty of staff placement, it is meaningless to only submit the client program for inspection. Through the link, the behavior of the product in the cloud is not controlled by the user, and it is too easy to do bad things

on October 30, Analysys International held a forum with the theme of where is the road to network safety. Wan Tao, the founder of the Internet deterrence defense laboratory and a security expert, said that youyou's query was not groundless. Cloud represents the concentration of resources. Once the protection is unfavorable, hackers can more easily obtain a large number of users' privacy data through the network. Wan Tao suggested that security manufacturers should participate in the action of desktop open source code, and let third-party technical experts and programmers conduct transparent evaluation, so that security software can truly win the trust of users and avoid falling into a war of words

disruptive innovation does not forget privacy protection

qihoo360 is regarded as the representative of disruptive innovation. However, in the view of some industry insiders, disruptive innovation is only one step away from evil innovation

in Qihoo 360's view, robots is a contract between search engines and stations, not an industry standard, nor has legal effect. If robots is recognized as a legal provision, it will be used as a competitive tool, which may lead to the separation and monopoly of Internet resources and hinder the development of Internet. Therefore, the search business launched by 360 did not follow the robots protocol

in the view of some webmasters, 360 search's disregard for robots protocol has brought varying degrees of impact to them

chenjunchao, founder of Winfrey finance, is also very concerned about 360's disregard for the robots agreement, and hopes that the Ministry of industry and information technology can restrict the crawling behavior of 360 search. Because high-frequency crawling and ignoring the crawling of robots undoubtedly increase the workload and pressure of station maintenance

in the search field, the privacy problem of companies is almost inevitable. For example, the privacy problem of Google has been particularly prominent in recent years. Including the bad Google Buzz (many users object to its integration with Gmail), and Google Street View cars shoot passers-by at will without the consent of others

at the beginning of this year, apple, Google, Microsoft, Amazon, HP and rim agreed to formulate their privacy control policies in accordance with California laws. According to the signed agreement, users can read the relevant privacy policy before downloading the application, rather than being informed afterwards. The agreement also requires the six companies to disclose to users the types, methods and sharing parties of information they collect

it is understood that since the incompatibility between Qihoo 360 and Tencent in the 3Q war in 2010, which seriously infringed the interests of ordinary users, the Ministry of industry and information technology has accelerated the pace of establishing regulations to protect the legitimate rights and interests of users and maintain a fair and orderly Internet market order. At the end of 2011, the promulgation of Decree No. 20 "Several Provisions on regulating the order of the Internet information service market" made it clear that violations of the rights and interests of ordinary users and other Internet information service providers are prohibited, and provided a standard for the definition and standardization of the behavior of Internet enterprises

some experts pointed out that innovation is the vitality of Internet, but in the process of innovation, we should always pay attention to the protection of user privacy

■ link

China's relevant provisions on user privacy

Several Provisions on regulating the order of the Internet Information Service Market:

(reviewed and approved at the 22nd ministerial meeting of the Ministry of industry and information technology on December 7, 2011, and implemented since March 15, 2012)

Article 11. Internet information service providers shall not collect information related to users without the consent of users Information that can identify users alone or in combination with other information (hereinafter referred to as users' personal information) shall not provide users' personal information to others, except as otherwise provided by laws and administrative regulations

if the Internet information service provider collects the user's personal information with the consent of the user, it shall clearly inform the user of the way, content and purpose of collecting and processing the user's personal information, and shall not collect information other than that necessary for the provision of services, and shall not use the user's personal information for purposes other than the provision of services

Article 12. Internet information service providers shall properly keep users' personal information; When the user's personal information in custody is leaked or may be leaked, remedial measures shall be taken immediately; If serious consequences are caused or may be caused, it shall immediately report to the Telecommunications Authority that has granted its Internet information service license or filed, and cooperate with the relevant departments in the investigation and handling

Article 13. Internet information service providers shall strengthen system security protection, safeguard the security of users' uploaded information according to law, and ensure users' use, modification and deletion of uploaded information

Copyright © 2011 JIN SHI