User information is sold in the media: is it good to clear the relationship?

category:Global
 User information is sold in the media: is it good to clear the relationship?


The names mentioned in the news report of the Beijing News were given aliases, and some specific cases did not correspond to the name of the reservation platform. However, in the video report of 4 minutes and half of the allotted distribution, the name of the US delegation was outspoken. Text and video contrast, can not help but feel that the US group take away the protection of users personal information is really bad! The reaction of the US delegation was quite quick, and the response was made immediately. In addition to thanking the media and user supervision, it also said that relevant information has been launched to verify the investigation and report to the police. Then the front turn, emphasize one of the most important things that we have always seen information security. Many departments of the company have set up a security committee, and have strengthened many lines of defense in the business and technical process. Then argue that because takeaway distribution chain is long, involving platforms, businesses, three party distribution and other links, there may be illegal elements in which to get information. In the end, we always insist on the principle of strict punishment and resolute attack on such events. Together with the public security organs, we will fully combat the wrongful behavior of stealing and selling the information of the users, and do our best to protect the information security of each user. We must admit that the response of the US delegation is beautiful, sincere, and well placed. Although it has made an excuse for itself, it is not offensive. However, in contrast with the Beijing news report, it is easy to see that the US team has almost lost its responsibilities to others under the cover up of its public relations skills. It means that I have paid much attention to the security of the users information and made a lot of efforts, but because of this, I can only rely on the public security organs to help the public security organs in addition to the business and the three party distribution. Ha ha, it is really a fine tongue and unassailable. But slowly, lets think about the statement of the US delegation. The US delegation said that the takeaway distribution chain involves businesses, three party distribution and many other links, which seems to be powerless. But dont forget that businesses and distribution are actually subject to the US platform. Is it a business that you want to attract? If you have a problem like this, can you leave it to your business? The Beijing News reporters can find that businesses can crawl and sell users information by using small skills. Can you also say that you cant find them as if nothing happened? If so, what is the responsibility of information security for users? Even if it is true that the third party distributor sells the user information, you can not be able to grasp the clues by the undercover telephone marketing group, like the Beijing News reporter, and then dig out which merchant or distribution staff to do it. Is the security organ prosecuted for punishment? Whats more, it is not a piece of cake that most of the distribution members of the US group, or by your own close contact, are directly controlled. It is memorable that in the early April to stop dropping out of the Wuxi market in the battle, the United States group of Suzhou 200 dispatcher to increase Wuxi, can do so, does not just explain the mission to the distribution of the mastery of the distribution staff? Unfortunately, we only saw a photo of the user order from the distributor in the new Beijing news report, but we didnt see the news reports of the distribution staff who had handled it. The effort and effectiveness of interest. Is it so hard to find out the distribution staff to sell user information? I believe I read the phenomenon that users received a harassment call in a certain area of the new Beijing news report, and it will naturally come to mind that the distribution staff in the region have problems. If the US group APP is open and focused on prompting users to report such a phenomenon, I believe that users who are not up to telephone harassment will also actively cooperate with them. Besides, should the US regiment always manage its own employees? In November last year, the Jiangcheng District Procuratorate in Yangjiang, Guangdong Province, brought an indictment to one of the defendants and blue. One of them was the director of Yangjiang regional sales of mutual sincerity information technology company before the crime, and the mutual sincerity information was the legal entity that was registered after the merger of the original United States group network and the public comments, that is, the US group network in the legal sense. In a nutshell, Fang wants to get the information of the Yangjiang and Guangzhou regions US business owners, so that blue one passes the US groups account password, landings the companys internal network Pangu, Apollo system, and uses its own program to obtain a large number of personal information in the system, and steal the sensitivity of the name, contact mode and address. Information. Fortunately, due to the relatively short time of the incident, the two had not yet been able to sell or transfer, which was controlled by the police. We want to think, even the regional sales managers have illegally obtained and sold user information, but also let people believe that the US regiment is highly valued to protect user information. The new Beijing News reporter learned from a user information dealer that the data he sold would be updated every day at noon. The data are extracted by the personnel of the system and updated about 40 thousand pieces a day. If the US delegation really has done something in protecting users information, what is the most presumptuous way for employees whose positions are most likely to be suspected? In the process of purchasing customer data for the acquisition of investigative reports by the Beijing News reporters, those sellers were not low-key in obscurity, but somewhat careless on the contrary. I think if the mission really pays attention to the information security of the user, it should not be difficult to find the people and things that resell the information of the users, and then find the source. On the contrary, it was not a difficult thing to see the United States, so I couldnt help wondering whether the US group had really arranged for people to do this, or even if someone was doing it, the way and the work effect was very problematic, even a temporary guest of the new Beijing News reporter did not get the job. As a takeaway platform, you should pay more attention to the protection of users information than others. Since the new Beijing News reporter in order to write a survey report, can not be afraid of trouble in the bottom of the QQ and WeChat telephone sales group to get clues, contact with the seller to get more detailed information, then why, as a takeout platform itself, does not actively use this method to combat the phenomenon of selling and reselling user information? Do you lack these hands, or is it too difficult to do? Reporters did not expose their identity, nor did they do anything special to do. They did all the work that could be done. It can be said, what the reporters did, what the US regiment really wanted to do was not difficult to do. If the group is really responsible for the security of the users information as he said, what reason can not be made by the Beijing News reporter? The US delegation has been vocal about how much information they attach to user information security, but in fact, even these basic tasks are not being done. Therefore, we should not just listen to the beautiful words of the US regiment, not only to observe its words, but also to watch them, and not be deceived by good manners. The day before yesterday, there was a news report that Bill Gate regretted his bad attitude to the congressmen at Microsofts hearing 20 years ago, unlike todays Facebook Zuckerberg, or Microsoft would not be the same. On the contrary, the US delegations response to the Beijing news report is like the real story of Xiao Zai. However, the United States should understand that users are not all stupid. Even if someone is confused for a while, they will eventually wake up. The source of this article: Red Net Author: Zhongyuan fisherman editor: Ji Ke _b6492 Since the new Beijing News reporter in order to write a survey report, can not be afraid of trouble in the bottom of the QQ and WeChat telephone sales group to get clues, contact with the seller to get more detailed information, then why, as a takeout platform itself, does not actively use this method to combat the phenomenon of selling and reselling user information? Do you lack these hands, or is it too difficult to do? Reporters did not expose their identity, nor did they do anything special to do. They did all the work that could be done. It can be said, what the reporters did, what the US regiment really wanted to do was not difficult to do. If the group is really responsible for the security of the users information as he said, what reason can not be made by the Beijing News reporter? The US delegation has been vocal about how much information they attach to user information security, but in fact, even these basic tasks are not being done. Therefore, we should not just listen to the beautiful words of the US regiment, not only to observe its words, but also to watch them, and not be deceived by good manners. The day before yesterday, there was a news report that Bill Gate regretted his bad attitude to the congressmen at Microsofts hearing 20 years ago, unlike todays Facebook Zuckerberg, or Microsoft would not be the same. On the contrary, the US delegations response to the Beijing news report is like the real story of Xiao Zai. However, the United States should understand that users are not all stupid. Even if someone is confused for a while, they will eventually wake up.