• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    Internet Terminal Software Service Industry Self-Regulation Convention

    2011/8/8 9:00:00 53

    Internet Terminal Autonomy

       Publishing Department China Internet Association:


    Publication number:


    general provisions


    The first is to standardize Internet terminals. Software Services, protect the legitimate rights and interests of Internet users, maintain a fair and harmonious market competition environment, and promote the healthy development of the Internet industry.


    The second article is proposed by some members of the China Internet association. industry The self disciplined work committee organizes research and formulation.


    The third internet terminal software referred to in this Convention (hereinafter referred to as "terminal software") is provided by Internet enterprises to Internet users, and can be downloaded, installed and run on user terminals (including mobile terminals). terminal It enables users to access various applications such as security services, browsers, instant messaging, Download sharing, image processing, media playback, network TV clients, game entertainment and so on.


    The fourth enterprises that provide terminal software services shall abide by relevant laws, regulations and rules of the state, abide by social ethics, abide by the norms of the Internet industry, be honest and trustworthy, operate legally, compete fairly, and safeguard the reputation and interests of the Internet industry.


    Fifth, encourage independent innovation, respect and protect the intellectual property rights of terminal software, oppose and resist all kinds of violations, maintain a standardized and orderly development environment, and enhance the competitiveness of China's Internet industry.


    The sixth is to advocate fair competition, oppose monopolistic acts such as abusing market dominance, and maintain a fair and orderly competition order.


    The seventh article is applicable to the members of the China Internet association and practitioners who have joined the China Internet industry self-regulation convention. It also advocates other enterprises, organizations and individuals to actively abide by it.


    The China Internet association implements the dispute and dispute mediation mechanism in the signatories of the Convention.


       The second chapter protects the legitimate rights and interests of users.


    The eighth is to protect users' personal information security. User personal information includes personal identity information, personal internet communication content, personal internet behavior logs, documents and data created and saved by individuals on the terminal, and other information that can directly or indirectly identify users' personal identities or other personal interests related to users.


    Ninth respect users' right to know and right to choose.


    (1) when collecting, using and preserving user's personal information, users should be clearly informed, including the purpose and scope of users' collection, use and preservation; users' personal information can not be collected, used and kept without user's consent, and users' personal information should not be collected, used or preserved beyond the purpose and scope. Users' personal information can not be provided to third parties for any reason except in explicit consent or otherwise provided by law.


    (two) terminal software installation, operation, upgrading, modification of default settings, etc., should clearly prompt users, not violating the user's wishes to modify the user has confirmed the choice or settings.


    (three) terminal software should be prompted in advance, such as execution of system modification, scanning, information collection and data return, and users should choose to continue or stop relevant operations. To provide users with information security from serious threats such as viruses or Trojan horses, a terminal software that provides security services can be directly protected by user protection protocols.


    (four) abnormal situations in terminal software can prompt users, but no choice of operations can be made for users. Users who ignore the prompts and choose further operations should respect the user's choice.


    (five) the difficulty of unloading the terminal software should not be deliberately increased by means of input verification code or multiple confirmation.


    The tenth is to establish and improve the user personal information security protection and management system, take effective technical measures to protect users' personal information security, prevent users from losing personal information, divulging, and prohibit the unauthorized use of user personal information.


    The eleventh article shall not set obstacles to users' rational use of their personal information, prohibit deception, and induce users to transfer personal information.


    The twelfth is to provide a complete terminal software service for enterprise side system log for third party audit, and the relevant system log should be kept for half a year. {page_break}


       The third chapter prohibits mandatory binding.


    The thirteenth article does not explicitly prompt users, and with the consent of users, it is forbidden to install Terminal Software on users' computers or other terminals.


    The fourteenth prohibits mandatory binding of terminal software.


    (1) mandatory bundling is the function of independent two or more terminal software bound together, resulting in the user can not choose independently.


    (two) when the terminal software is downloaded or installed, other non directly related functions should be attached. Users should be clearly prompted and provided with obvious ways to use or close the function.


    Fifteenth terminal software installation prompt information is clear and complete.


    (1) before installing terminal software, users should clearly and clearly inform users of this terminal software function, additional terminal software list, all potential operation and influence on the user system, all user information that needs to be collected and transmitted, and so on, and decide whether to install all or part of the user.


    (two) no additional functions that are not specified in the functional description document of this terminal must be installed.


    The sixteenth is to allow users to choose whether to uninstall terminal software and provide a general way of unloading. After unloading, terminal software can not save programs, drivers, services or modules without remaining user's consent.


       The fourth chapter prohibits software exclusion and malicious interception.


    The seventeenth prohibition of malicious rejection. Malicious exclusion refers to a terminal software in the design, installation, operation process, without legitimate reasons, deliberately set aside obstacles to other legitimate terminal software, to prevent users from installing or using other legitimate terminal software.


    (1) similar terminal software has equal right to be chosen and market promotion.


    (two) the terminal software may conflict with each other due to technical reasons during its operation. We should respect the user's right to choose independently.


    (three) it shall not deceive or mislead users in any form or use other legitimate terminal software.


    In the process of installation, operation, upgrading and unloading, the eighteenth terminal software should not be malicious or interfere with the normal use of other legitimate terminal software.


    Nineteenth, in addition to malicious advertising, no specific information service providers should be intercepted or blocked from legitimate information content and pages.


    Malicious advertising includes frequent pop-up messages that interfere with users, and floating ads, pop-up ads, window ads, etc. that do not provide closed mode.


       The fifth chapter is against unfair competition.


    The twentieth is to advocate fair competition and not to organize users to evaluate other terminal software for the purpose of unfair competition.


    The twenty-first organization shall be open, fair and impartial when evaluating the terminal software. The evaluation rules and evaluation methods shall be publicized, and the evaluation results and evaluation data shall be subject to the third party audit. If the evaluated party has any objection to the evaluation result, the evaluation party shall observe the objection processing flow (separately formulated).


    The service hints of the twenty-second terminal software should be clear, objective and fair, and no false, exaggerated or misleading language should be used to prompt the language to be in Chinese. {page_break}


       The sixth chapter is security software.


    The twenty-third safety software referred to in this Convention refers to the terminal software that provides users with services such as system operation security, data security, communication security and system performance optimization, including anti-virus software, security protection software, system optimization tools, etc.


    In addition to complying with the provisions of other provisions of this Convention, safety software shall also comply with the provisions of this chapter.


    Twenty-fourth, the safety service function that must not abuse the terminal software should be implemented to carry out acts that jeopardize the interests of the state and the public, act of unfair competition, and infringe upon the legitimate rights and interests of other enterprises and users.


    Twenty-fifth, when developing system optimization services, we should respect users' independent choice and not make default choices for users.


    The twenty-sixth is the establishment of an effective white list mechanism for the terminal software by the China Internet association. The enterprises in the white list should inform each other of the abnormal situation of the terminal software in a timely manner, promptly correct and solve the problem, and ensure the safety of users on the Internet.


      The seventh chapter is the implementation of the Convention.


    The twenty-seventh self regulatory committee of the China Internet association, as the executive body of this Convention, is responsible for organizing the signing and implementation of this Convention, and timely publicizing relevant policies, laws and regulations to the signatories.


    The twenty-eighth signatories should consciously abide by the provisions of this Convention and violate the Convention and cause adverse effects. Any unit or individual has the right to report to the executive body of this Convention. The executive body of this Convention shall, after verification, verification or organizational evaluation, give penalties such as internal warning and public condemnation according to the circumstances.


    The twenty-ninth one is to set up an industry mediation committee, establish a terminal software evaluation mechanism and a terminal software dispute settlement mechanism between enterprises, and be implemented by the executive body of this Convention. Specific implementation rules shall be separately specified.


    Disputes and disputes between the thirtieth signatory units should be resolved in a negotiated manner based on the principle of mutual understanding and mutual accommodation, maintenance of industry solidarity and overall interests, and mediation of the executive bodies of this Convention. The executive body of this Convention is obliged to organize relevant mediation work as soon as possible through reasonable compliance, and notify the relevant units of the conciliation result. If no settlement can be reached through the mediation of the industry, the relevant administrative departments may make suggestions for handling the matter.


       Eighth chapter supplementary provisions


    Article thirty-first the Convention shall enter into force after the signature of the legal representative of the initiating unit or the delegated representative and the official seal of the unit. The Internet Society of China shall be released to the public from the date of promulgation, and the trial period shall be one year.


    Article thirty-second this Convention follows the principle of "dynamic revision and gradual improvement". After the trial period and the end of the trial, the convention can be amended by the proposal of the executive body of this Convention or by more than 1/3 signatory units of this Convention and with the consent of more than 2/3 signatory units.


    The thirty-third article is interpreted by the industry self regulatory committee of the Internet association of China. {page_break}


       Enclosure


      The list of the first batch of signing units of the Internet terminal software service self-regulation Convention (ranking No. 1)


    1. Beijing Sina interconnect Information Service Co., Ltd.


    2. Shenzhen Tencent computer system Co., Ltd.


    3. Baidu Online Network Technology (Beijing) Co., Ltd


    4. Beijing Sogou Technology Development Co., Ltd.


    5. Beijing Qihoo Technology Co., Ltd.


    6. first video communication media Co., Ltd.


    7. excellent technology Co., Ltd.


    8. Shanghai Juli Media Technology Co., Ltd.


    9. Xinhua Limited by Share Ltd


    10. Shenzhen press group Shenzhen News Network


    11. Beijing union Technology Co., Ltd.


    12. Jiuding interconnection (Beijing) Technology Development Co., Ltd.


    13. net gathering elite (Beijing) Information Technology Co., Ltd.


    14. Beijing net high network technology Co., Ltd. (Financial Network)


    15. Shanghai Ai Rui Market Consulting Co., Ltd.


    16. Beijing new net digital information technology Co., Ltd.


    17. Beijing Sino search network technology Co., Ltd.


    18. China national classics news agency


    19. Jiangsu 365 Network Inc


    20. Beijing Hua Yang Jun Feng Information Engineering Co., Ltd.


    21. Beijing New Oriental remote network technology Co., Ltd.


      Twenty-two Taiyuan Ren Ao Network Technology Co., Ltd.


    23. Beijing future Zhonghe Technology Development Co., Ltd.


    24. starlight interactive (Beijing) Culture Communication Co., Ltd.


    25. Beijing Shenzhou Green League Technology Co., Ltd.


    26. Beijing Wanfang Data Limited by Share Ltd


    27. Sichuan AI Pu Network Co., Ltd.


    28. Beijing Xi CI Interactive Information Technology Co., Ltd.


    29. Fuzhou Kai Xun Network Technology Co., Ltd.


    30. Shanghai Telecom residential broadband network Co., Ltd.


    31. Beijing Asia Merchants Online Information Technology Co., Ltd.


    32. Beijing twenty-second Century Network Technology Co., Ltd.


    33. Beijing light star sky Information Technology Co., Ltd.


    34. Beijing treasure Library Online Network Technology Co., Ltd.


    35. Beijing blue flood Communication Technology Co., Ltd.


    36. Beijing Yi Jie Hua Tong Technology Co., Ltd.


    37. Shanghai long tour Network Technology Co., Ltd.


    38. Fiat mart, Shenzhen, Agel Ecommerce Ltd


    China Internet Association
    August 1st, two
    • Related reading

    Notice Of The Second Meeting Of The Seventh Board Of Directors Of The Orient Group Limited By Share Ltd And The Notice Of Convening The 2011 Provisional Shareholders' Meeting

    Law lecture hall
    |
    2011/8/3 9:39:00
    65

    政策轉暖預期遭遇寒流

    Law lecture hall
    |
    2011/7/30 8:58:00
    37

    Can Fiscal Policy Restart High Growth?

    Law lecture hall
    |
    2011/7/29 9:17:00
    48

    Canadian Consumer Product Safety Law Implements &Nbsp; Affects China'S Clothing Export.

    Law lecture hall
    |
    2011/7/27 9:22:00
    40

    Fujian Will Introduce Local Standards For Tourist Soles

    Law lecture hall
    |
    2011/7/23 11:43:00
    50
    Read the next article

    Spinning And Clothing Industry: Downstream Demand Driven Upstream Innovation

    In fact, textile and apparel supply chain management involves suppliers, manufacturers, distributors, retailers, Internet of things and consumer terminal services. Many factors related to this topic have aroused widespread concern in the textile and garment industry. Especially in the current complex and changeable economic situation, as a supplier, who will decide your choice?

    主站蜘蛛池模板: 99无码熟妇丰满人妻啪啪| 国产精品综合一区二区三区| 国产福利一区二区三区在线观看| 可播放的欧美男男videos| 久久久久香蕉视频| 里番acg全彩| 日产精品卡2卡三卡乱码网址| 国产精品东北一极毛片| 亚洲五月丁香综合视频| chinese真实露脸hotmilf| 男女xx00动态图120秒| 女人被男人躁到呻吟的| 免看**毛片一片成人不卡| a级成人毛片久久| 波多野结衣痴汉| 国产精品视频公开费视频| 亚洲国产aⅴ成人精品无吗| 四虎精品视频在线永久免费观看| 樱桃视频直播在线观看免费 | 国产色视频免费| 亚洲成av人片在线看片| 99精品国产在热久久| 欧美老熟妇乱大交xxxxx| 国产精品毛片大码女人| 亚洲av中文无码乱人伦在线观看| 麻豆工作室传媒| 扒美女内裤摸她的机机| 免费福利小视频| 中国老熟妇自拍HD发布| 色妞www精品视频一级下载| 成人黄18免费视频| 免费人成在线观看视频高潮| 99re热久久这里只有精品6| 欧美人与物videos另类xxxxx| 国产成人免费在线| 九九热精品视频| 色妞色视频一区二区三区四区| 开始疼痛的小小花蕾3| 亚洲精品线在线观看| 亚洲情综合五月天| 日本免费色视频|