The net that face Fen alarm go on a tour of inspection executes the law
Guilty information breaks the law to inform against network address on the net: Www.cyberpolice.cn
The telephone call that wants conduction refund is received after the net is bought, press the other side after how-to operation, the money in bank card was done not have. Similar fraud is not scarce, the near future, ms. Liu encountered such situation:
Ms. Liu was bought in some platform net
A value 100 yuan dress
The personnel that one professes is customer service after tells her
Can give Ms. Liu double refund
After both sides is consultative
With pay treasure to undertake refund is operated
Make money in Ms. Liu,
Await the other side to shut ant to borrow when
The other side breaks couplet suddenly
Of vexed still have another Hangzhou gentleman
His mobile phone is successional
Get the short message of the money that be buckled
The course investigates discovery
Every money is in order to consume a network
The name of game deducts
Original, hangzhou mobile phone of gentleman use apple plays game
Zhang date and pay do not know between treasure
When to sign " avoid secret agreement "
Once Zhang date is embezzled
Can brush directly pay treasure the cash in
Ms. Liu bought platform to buy a thing in the net
Result by sham customer service bilk;
Hangzhou the gentleman has hit a net twice to swim
Was buckled below unwitting circumstance again paragraph
They doubt
Is the other side how does essence of life know his news definitely?
According to relevant orgnaization statistic
Have 49.6% suffer the person that visit to ever was encountered
Excessive the phenomenon that gathers user information
Have 61.2% suffer the person that visit to had been encountered
Concerned enterprise gathers user information compulsively
If be not accepted,cannot use this product
Perhaps accept a service " clause of Xiang Yu the Conqueror "
According to investigation, a few APP of random download
The quickest way is mobile phone number + code of test and verify is landed
Some still supports date of Zhang of small letter, small gain, QQ to undertake disembarkation
However, use the discovery in the process further
Some APP should visit address book
Some APP should visit the place
But, these collect content
The service that provides with APP does not have direct correlation
Long-term since, compulsive, excessive gather individual information, become the development normal state of App it seems that. However, 2019, this kind " cruel grow " the situation will be changed. On January 25, central net letter does waited for 4 ministries and commissions to be released jointly " violate about beginning App to break the law compasses gather use individual information the announcement of special processing " , 4 ministries and commissions will begin special processing inside countrywide limits, to having the person that violate the App operation that violates compasses act, the clue is serious will face suspension relevant business, close down is rectified, business is permitted related revoke or revoke does business charter.
" network safety law " also have a regulation the 41st times " network operation person collect, use individual information ought to follow lawful, proper, necessary principle " , "The individual information that must not gather the service that provides with its to have nothing to do " . But, "Proper, necessary " bounds, "Have nothing to do with the service " how is individual information limitted, do not have specific standard all the time. Accordingly, perfect besides legal laws and regulations beyond, the user also should take seriously somewhat to individual privacy.
The net that face Fen alarm clew
1. asks young associate people place of phone of not credulous refund narrates content, the official customer service that should contact electric business through official approach or pays platform verifies a condition.
2. does not log onto the webpage link with unidentified origin, not optional scanning is not the 2 dimension code that government-owned net issues, financing operation should trade in the government platform undertakes.
3. is used when paying treasure, sign cautiously " avoid secret agreement " , best setting pays a password.
When 4. has network activity, must protect good individual information, not be necessary individual data is not filled.
If 5. is decieved carelessly, arrive in time please mechanism of apanage public security or dial 110 call the police.