2011年1月8日星期六

On the Internet, they know you are a dog. _ Famous

unbridled collect user privacy 3Q wars battle with the smugglers, the Shanghai Bar Association have organized a symposium.����In the meeting, senior network, Harvard Berkman Center fellow maoxianghui revealed that, over the past few years, Tencent and 360 is responsible for a number of violations of the Privacy Act, his understanding, Tencent about 17, relating to property, business and social issues, so he himself always rejected the use of the two companies ' software. In a large Internet companies engaged in security work of Zhang ping, who concluded that the more pessimistic, he told the press that IT times "-made software never take privacy seriously, think of what needs to be user privacy immediately. "That said, still use a large number of Zhang Ping-made software," in this overall context, have nothing, as long as no Trojans are available. "Another Internet industry his, who told reporters," I understand, their daily operation records, QQ know Baidu certainly know, Taobao also know many, sogou almost all know. From improving applications and services, obtained the user habits, I was recognized for privacy, but many software are beyond this scope.����"According to Zhang ping, currently a large number of domestic software has networking features, they often will give the user's computer on a unique tag, even if it is clear the common browser cache, cookies, and still be accurate positioning to you, and users surfing records, computer use habits, combined for analysis, they can serve ads more precisely. Zhang ping believes this is the last two years, the domestic Internet enterprises have introduced various input method. "In non-Latin countries, the input method is one of the netizens prerequisite software. User-entered text is directly associated with the user habits, grab back analysis, the enterprise will be able to know what users want to be required for the enterprise to the next step in the action. "Zhang ping told reporters. "If enterprises in obtaining data, only the program analysis, enterprise managers cannot be authentic for direct queries to the user's personal information, may be I can also accept, but now I know most of the system, user ID numbers are not open to all, this is obviously a problem.����"Overseas software is not" clean "but abroad compare to software fared no where to go, especially in the field of mobile Internet. Recently the Wall Street Journal on current iPhone and Android Smartphone use 101 mainstream Smartphone Games and common procedures conducted a test.����The user's knowledge, 56 applications will users of mobile phones globally unique device identification number is sent to other companies, 47 applications through various methods to reveal users geographical location, 5 application user's age, gender and other personal information to third parties. Wall Street this survey test report, the reporter found recently in iPhone is booming in the game "fury of the bird," the mobile identification number, user Facebook, Twitter account name, password, and geographic location, etc. are sent to Google, electronics and art company (ElectronicArtsInc.) is responsible for sales of games Chillingo and Flurry mobile market research companies.����However Chillingo to the Wall Street Journal asserts that information collected is not used for advertising, and will not be disclosed to third parties.����Domestic regulatory supervision both serious deficiencies, in the interview, Zhang ping and his numerous have mentioned that the domestic laws and regulations related to privacy of imperfect and lag, is the Internet and General software industry aggressively collect important user privacy. Zhang ping, the spirit of the Internet is shared, however in the sharing of process, inevitable user privacy information will also be the monetary conditions. But at present there is no authority to define exactly what is privacy, this also causes the enterprise cannot clearly knows, what information is available, and which is never touched. "A perspective, the relevant legislation is very small, less far cannot overwrite the current scope of mass information. Finally, what to do, completely rely on corporate conscience. "But his growth with" savage "those four words to describe the domestic Internet and General status of the software industry. "For example, to install software on mobile phones Andorid, will prompt the user for the software may be used to what information. Careful to compare Sina micro-Bo and different version, you'll find it hopes to obtain the type of information the user is also increasing. "In Korea disclosure privacy to jail AO Central neighborhood information security technology (Shanghai) co., Ltd. Lin Sheng agent to reporters on Korea regarding privacy protection.����AO-European neighbor is a security service for Korea investment enterprises in China. In 2001, Korea development launched the dissemination of information and communication, communication application, as well as information of Network Protection Act, which expressly mentioned the enterprise must obtain the consent of the individual in order to use the citizen's name, social security number, phone number, address, zip code, and other information. Korea Government from 2002, the Government launched the network's extensive Web site. By the end of 2006, Korea Congress adopted the promotion of the use of information communication network and personal information protection law, further strengthening the network real-name system.����Currently, Korea, click-through rate of more than 10 million Web sites and communication operators, are saved with a lot of user real information. In accordance with the relevant regulations, Korea enterprise in the use of personal information before the prior consent of the user. Violation of requirement to the responsible person may be sentenced to imprisonment.����But in Korea it once happened in similar cases, two major telecom carrier SK Telecom and LG Telecom have since adopted allow for disclosure of user privacy, custody not result in user privacy disclosure, which was fine and had ceased. As far as the right to introduce Lin sheng, Korea recently for privacy protection has developed a more stringent regulations, and is currently awaiting approval by Congress. "As a foreigner, a Chinese Internet enterprise developmentFaster, but at the same time, many of which behavior is what I don't understand that they need for user privacy are really endless. "Lin Sheng right also specifically referred to the reporter should pay attention to Web site registration agreement and the software use agreement, he said whether China or other countries, there are basically will provide user information to third parties, but will be definitive Korea enterprise terms and instructions to obtain your personal information without the user's consent shall not be provided to third parties.����But the Chinese enterprises basically only referred to as long as the third-party commitment to confidentiality, the enterprise can transmit personal information, and does not inform the user in advance. Users need to be conscientious privacy Zhang ping told the press IT times, users ignore is also a lack of privacy. In addition to the software, now is the "Live onInternet" (live on the Internet), the user on the Internet of any action, have put their own personal privacy leaks out. For instance, online shopping, registered applications filled out a variety of single, chat, SNS friends, play games, and even send and receive e-mail, and so on. "I found that many sites all sorts of names so that users fill out the ID numbers, many users will not care to fill in. "His also told reporters that there are already many enterprises launched-phone software has to scan the user address book functionality," just a few hundred K of small applications can put your address book to sweep a again, just in case they want to do evil, you are too simple. "Famous bloggers Moonlight blog in 2007, wrote a piece of the Internet age how to protect your privacy on the article, the article mentions some privacy protection measures to the present situation continues to be effective. He believes it is essential that do not submit personal information in the site. "Your privacy are often themselves inadvertently leaked, and therefore not easily on the Web site to submit his or her own personal information, in addition to the Bank website, famous e-commerce Web site, other Web sites do not submit your real information".����In addition the use of secure passwords, computer security is the user must do. But once you find that your privacy is compromised, and immediately delete to log on to the Web site, or contact the other site administrator and ask them to delete personal information.����At the same time, it would be desirable to notice Baidu and Google requires that itoklahoma injury lawyer
s search engine cache information is also removed. Journalists in contact with Zhang ping, found that the Internet did not find him QQ or MSN Instant Messaging information, such as any, he admitted that this is the result of his own deliberate protection. "I registered in the Web site, do not write this information, we need to fill in names, birthdays, phone numbers and address information, such as a title. "The boundaries of reporter?��s privacy? recently a phone software very red, named KikMessenger, it is a" simple to extreme "cross platform chat software. It cannot send photos, cannot send attachments, you can describe with monotone. But its advantage is simple, quick and easy to use. Let itlos angeles tax lawyer grow like virus outbreaks is one of the reasons, it scans the user's address book on your phone, and tell you who have already downloaded the Kik. Yes, Yes, it scans the user's address book, and the domestic present similar products m chat, chat has also appeared as soon as possible.����See this description, the reporter has cold feet, and the guts to try this software, or I phone address book more than 2600 friends might unduly disturb. Of course, the press also recognized that, even if rejected KikMessenger, own inevitably still use more compromised privacy software. If these privacy is used to improve services or to the developer to provide a certain return, I can accept.����As my own Gmail mailbox of those ads, although never to click on, but won't complain.����But the problem now is that the enterprise will jump to that information, all, and God knows they have used their doing, plus the corresponding regulations of fuzzy, related enterprises more unscrupulous. Reporters still difficult to understand for those who love LBS (location information) service for mobile phone users, on his own initiative, submit your own always located exposure on the Internet will benefit? when you enjoy the software and site free dinner, remember that it may be your own privacy, return, and not really free, natural or praises for their free, there is no need for those businesses into a pair of big make-up oftax attorney irs the good is like.

没有评论:

发表评论