Is 99 mine real name authentication safe
No
according to Article 7 of the regulations on the management of mobile Internet application information services, mobile Internet application providers shall strictly implement the information security management responsibility and perform the following obligations according to law: according to the principle of "real name in the background and voluntary in the front", they shall authenticate the registered users based on the real identity information such as mobile phone number. To establish and improve the user information security protection mechanism, the collection and use of user's personal information shall follow the principles of legality, legitimacy and necessity, clearly indicate the purpose, method and scope of the collection and use of information, and obtain the consent of the user
establish and improve the information content audit management mechanism, take warning, limiting function, suspending update, closing account number and other disposal measures, keep records and report to relevant competent departments for those who publish illegal information content. The user's right to know and choice in the process of installation or use shall be protected according to law. Without the express and consent of the user, the functions of collecting geographical location, reading address book, using camera, enabling recording, etc. shall not be turned on, the functions unrelated to service shall not be turned on, and the unrelated applications shall not be bundled and installed
extended materials:
relevant requirements of mobile Internet application information service:
1. Internet application store service providers and mobile Internet application providers shall sign service agreements to clarify the rights and obligations of both parties and jointly abide by laws, regulations and platform conventions
2. Mobile Internet application providers and Internet application store service providers should cooperate with the supervision and inspection carried out by relevant departments according to law, consciously accept social supervision, set up convenient complaint and report entry, and timely handle public complaints and reports
The national Internet information office is responsible for the supervision, management and law enforcement of the information content of mobile Internet applications. The local Internet Information Office shall be responsible for the supervision, management and law enforcement of the information content of mobile Internet applications within its administrative region according to its tiesThe risk of real name authentication certainly exists. On the one hand, it is possible to disclose one's personal information. On the other hand, it is possible to steal one's property by illegal means in case of a black heart platform
however, in today's society, whether it is the Internet or outside the network, real name authentication has become a necessary requirement for travel business, whether it is travel ticket purchase, driving or staying in a hotel, it may also be handling any certificate, buying a house and so on, which are inseparable from personal real name information, and the society is graally developing into the direction of honest life and honest work
real name authentication is a double-edged sword, which has both advantages and disadvantages. Therefore, in the face of numerous online transactions, we should maintain our vigilance, and ensure that we fully understand the reputation of the platform before engaging in any platform transactions, so as to ensure the privacy and security of our identity information as far as possible
extended data
real name authentication helps to determine identity, let businesses and customers understand and communicate with each other, is concive to the development of online shopping mall, and avoids some criminals cheating consumers on the network
in the era of developed network marketing, real name authentication also brings hidden danger of information exposure, which leads to continuous marketing calls. For example, many instry communication websites require real name authentication, and there is demand when there is supply. Many marketing advertisers take advantage of the situation and use real name authentication member information for business activities, so we must be careful when choosing real name authentication