Nowadays, scanning QR code to order meals and downloading apps are often required to grant personal information permission, and excessive collection of personal information on network platforms is quite common. Not long ago, the draft of the personal information protection law was submitted to the Standing Committee of the National People’s Congress for the first time for deliberation. Do you think your information has been over collected?
Recently, China Youth newspaper social survey center joint questionnaire network（ wenjuan.com ）According to a survey of 1971 respondents, 79.2% of the respondents felt that their information had been over collected, and 66.1% of the respondents pointed out that many mobile applications could not be used without authorization, and users could only be forced to accept them. To prevent excessive collection of information, 61.3% of respondents suggested not to fill in or submit personal information, especially sensitive information such as property and biometric identification, and 59.2% suggested reading application rights, user agreements or privacy policies carefully.
79.2% of the respondents felt that their information was over collected
Xiao Xiao (pseudonym), a junior at Communication University of Sichuan, thinks that the more advanced technology is, the more transparent information becomes. For example, scanning the QR code for ordering meals and scanning the code for payment are all the conveniences brought by the development of science and technology to our lives, but there are also great security risks. For example, taking out ordering food will certainly reveal personal location information.
In the survey, 79.2% of the respondents felt that their information was over collected.
Jiang Yan (not his real name), an employee of a consulting company in Chengde City, Hebei Province, said that when installing new apps, it is almost necessary to authorize mobile phone memory, camera and phone permissions, but these permissions are not all necessary. “Once I browsed the website and inquired about orthodontic treatment. I filled in a phone call on a webpage. Within half an hour, someone called me, and then from time to time I would receive relevant calls, which caused me some trouble.”.
What kind of excessive collection of personal information exists in the network platform? 66.1% of the respondents pointed out that many mobile apps could not be used without authorization, and users could only be forced to accept them. 64.4% of respondents pointed out that the platform would open various permissions by default. Others include: unreasonable authorization requirements for users (48.5%), failure to clearly inform users of their purposes when collecting sensitive information (44.2%), and arbitrary use of user information (28.2%).
Jiang Yan said that shopping and payment apps have users’ personal phone numbers, home addresses, bank cards and other information, which are very dangerous if leaked. Some applications can’t use location and phone information without authorization. Many small programs also need users to allow them to obtain relevant account information.
“In many cases, the SMS code needs to be verified on the mobile phone platform. There are also some games that need to enter the ID number. Xiao Xiao felt that the ID number and some mobile phone storage information permissions were often overcollected.
In the survey, respondents felt that mobile phone numbers (60.1%), mail list (53.1%), ID card number (47.6%) and location (46.1%) were collected too much. Others include: user’s personal photos (32.8%), property status (22.4%), SMS (21.9%), biometric identification (15.8%), physiological information (10.5%).
Zhu Wei, deputy director of the communication law research center of China University of political science and law, said that the current excessive collection of personal information has the following situations: firstly, it exceeds the provisions of user agreement; secondly, it goes beyond the purpose of product performance and functionality; for example, flashlight app needs to visit address book; thirdly, it goes beyond legal provisions.
“The more information and data collected, the greater the commercial value. At least, it can use user portraits to do precision marketing, send commercial advertisements, or even use some information as criminal activities.” Zhu Wei said.
61.3% of respondents suggested not to fill in personal information casually
To prevent excessive collection of information, 61.3% of respondents suggested not to fill in and submit personal information, especially sensitive information such as property and biometrics. 59.2% of respondents suggested reading application rights, user agreements or privacy policies carefully. 55.2% suggested strengthening the concept of privacy and actively protecting personal information. 48.6% of respondents suggested that information collection should be strengthened 33.9% of the respondents suggested that they should actively claim their rights and interests through legal channels when their personal information is leaked. 30.4% of the respondents said that they would not scan the QR code of unknown origin or install the app of unknown origin.
Zhu Wei suggested that users should clear their usage records regularly, whether it is PC or mobile phone. If you do not use the network service or app, you should cancel the account, not just delete the app. Secondly, if it is found that someone is abusing their own information and infringing on their own rights and interests, according to the provisions of the network security law, network operators can be required to stop infringement, which is the right of users. At the same time, if it is found that network operators have collected their own wrong information, they also have the right to ask for correction.
“Don’t use WiFi in public areas. Don’t browse unsafe websites.” Xiao Xiao said.
“Personal information involves financial security, that is, personal asset security. Therefore, when the network payment is related to the bank card, if the card is a special card, do not put all the money in this card. For example, if you have 10000 yuan, the related card may have two or three thousand yuan. ” Zhu Wei said: don’t easily click open or conduct a personality test. Don’t authorize an app to get your information in order to vote for others. This kind of voting is meaningless and outweighs the loss. There is a huge risk in giving all the information to others for a vote.
Jiang Yan suggested that we should strengthen the awareness of network security, not arbitrarily authorize some applications and software, and leave as little personal information as possible on the website.
“Don’t reply to the verification code casually. If there is a link, don’t click it easily, because it is likely to install a plug-in on your mobile phone or PC to monitor your behavior. For example, if you open the browser to search for a hospital, you will receive a call from the hospital the next day. At this time, we will feel that the browser platform has leaked its privacy. However, we found that this is not the case in the process of research. Sometimes, it is the user’s mobile phone that accidentally installs this plug-in, and the user’s behavior is monitored and collected, and then in the network black industry The chain will resell your information. ” Zhu said it is also important to install security software and clean plug-ins regularly.
“Phone numbers, schools, etc. are too easy to leak.” Yang Jiaoyu (pseudonym), a junior in the school of government management of Beijing Normal University, suggests that we should be cautious about apps that need to fill in information, pay attention to identify and filter junk software, and do not install and authorize them blindly and without filtering because they are afraid of trouble.
In order to strengthen the protection of personal information and standardize the use of personal information, relevant departments have made a lot of efforts. Since the beginning of this year, the Ministry of industry and information technology has informed the society of five batches of apps (mobile applications) that infringe on the rights and interests of users. In the future, enterprises with outstanding problems, orders and incomplete rectification will be punished strictly according to law.
Among the respondents, 1.9% were born after 00, 23.9% after 90, 53.9% after 80, 13.8% after 70, 5.9% after 60 and 0.6% after others.
China Youth Daily · China Youth Network reporter Wang Pinzhi intern Zhou Ning source: China Youth Daily
November 23, 2020 edition 08