Traditional Culture Encyclopedia - Weather forecast - Ink weather in Tianjin

Ink weather in Tianjin

September 15, 20 19 Network Security Conference was held in Tianjin. At the meeting, the relevant departments discussed the illegal application of mobile phones, the prevalence of computer viruses and mobile terminal viruses. Chen Jianmin, executive deputy director of the National Computer Virus Emergency Center, said that there are six major problems in the mobile Internet application and software development kit (SDK), including suspected invasion of personal privacy and high-risk loopholes. A number of apps such as Jinshan Software and Ink Weather were "named".

According to industry experts, in the current Internet service, there is an obvious unequal relationship between service providers and users. Compared with users, service providers have obvious advantages. They preset "default consent" in the service agreement. If users uncheck the consent box, they will not be able to enjoy the service content. Users are in a passive position and lack sufficient autonomy. At the same time, the legal nature of "acquiescence" and the corresponding legal responsibility are not clear. Therefore, many Internet service providers will play "edge ball" and infringe on the rights and interests of users.

In the era of big data, no one knows which data will be the focus of future business development, so having enough data is the top priority. In other words, the more data collected, the greater the marketing value may be. For example, if you install an APP on your mobile phone, there will be a prompt of "whether to allow access to your location", which is to collect the user's activity range and then understand the user's behavior habits.

Relevant Internet companies that have been criticized by name also unanimously stated that they will immediately remove the problematic app for optimization and upgrade. At the same time, by analogy, the risks existing in the protection of users' personal information are completely eliminated. Improve internal management and product design, further standardize the collection, use and service of users' personal information, and protect the legitimate rights and interests of users.