Internet Terminal Software Service Industry Self-Regulation Convention
Publishing Department China Internet Association:
Publication number:
general provisions
The first is to standardize Internet terminals. Software Services, protect the legitimate rights and interests of Internet users, maintain a fair and harmonious market competition environment, and promote the healthy development of the Internet industry.
The second article is proposed by some members of the China Internet association. industry The self disciplined work committee organizes research and formulation.
The third internet terminal software referred to in this Convention (hereinafter referred to as "terminal software") is provided by Internet enterprises to Internet users, and can be downloaded, installed and run on user terminals (including mobile terminals). terminal It enables users to access various applications such as security services, browsers, instant messaging, Download sharing, image processing, media playback, network TV clients, game entertainment and so on.
The fourth enterprises that provide terminal software services shall abide by relevant laws, regulations and rules of the state, abide by social ethics, abide by the norms of the Internet industry, be honest and trustworthy, operate legally, compete fairly, and safeguard the reputation and interests of the Internet industry.
Fifth, encourage independent innovation, respect and protect the intellectual property rights of terminal software, oppose and resist all kinds of violations, maintain a standardized and orderly development environment, and enhance the competitiveness of China's Internet industry.
The sixth is to advocate fair competition, oppose monopolistic acts such as abusing market dominance, and maintain a fair and orderly competition order.
The seventh article is applicable to the members of the China Internet association and practitioners who have joined the China Internet industry self-regulation convention. It also advocates other enterprises, organizations and individuals to actively abide by it.
The China Internet association implements the dispute and dispute mediation mechanism in the signatories of the Convention.
The second chapter protects the legitimate rights and interests of users.
The eighth is to protect users' personal information security. User personal information includes personal identity information, personal internet communication content, personal internet behavior logs, documents and data created and saved by individuals on the terminal, and other information that can directly or indirectly identify users' personal identities or other personal interests related to users.
Ninth respect users' right to know and right to choose.
(1) when collecting, using and preserving user's personal information, users should be clearly informed, including the purpose and scope of users' collection, use and preservation; users' personal information can not be collected, used and kept without user's consent, and users' personal information should not be collected, used or preserved beyond the purpose and scope. Users' personal information can not be provided to third parties for any reason except in explicit consent or otherwise provided by law.
(two) terminal software installation, operation, upgrading, modification of default settings, etc., should clearly prompt users, not violating the user's wishes to modify the user has confirmed the choice or settings.
(three) terminal software should be prompted in advance, such as execution of system modification, scanning, information collection and data return, and users should choose to continue or stop relevant operations. To provide users with information security from serious threats such as viruses or Trojan horses, a terminal software that provides security services can be directly protected by user protection protocols.
(four) abnormal situations in terminal software can prompt users, but no choice of operations can be made for users. Users who ignore the prompts and choose further operations should respect the user's choice.
(five) the difficulty of unloading the terminal software should not be deliberately increased by means of input verification code or multiple confirmation.
The tenth is to establish and improve the user personal information security protection and management system, take effective technical measures to protect users' personal information security, prevent users from losing personal information, divulging, and prohibit the unauthorized use of user personal information.
The eleventh article shall not set obstacles to users' rational use of their personal information, prohibit deception, and induce users to transfer personal information.
The twelfth is to provide a complete terminal software service for enterprise side system log for third party audit, and the relevant system log should be kept for half a year. {page_break}
The third chapter prohibits mandatory binding.
The thirteenth article does not explicitly prompt users, and with the consent of users, it is forbidden to install Terminal Software on users' computers or other terminals.
The fourteenth prohibits mandatory binding of terminal software.
(1) mandatory bundling is the function of independent two or more terminal software bound together, resulting in the user can not choose independently.
(two) when the terminal software is downloaded or installed, other non directly related functions should be attached. Users should be clearly prompted and provided with obvious ways to use or close the function.
Fifteenth terminal software installation prompt information is clear and complete.
(1) before installing terminal software, users should clearly and clearly inform users of this terminal software function, additional terminal software list, all potential operation and influence on the user system, all user information that needs to be collected and transmitted, and so on, and decide whether to install all or part of the user.
(two) no additional functions that are not specified in the functional description document of this terminal must be installed.
The sixteenth is to allow users to choose whether to uninstall terminal software and provide a general way of unloading. After unloading, terminal software can not save programs, drivers, services or modules without remaining user's consent.
The fourth chapter prohibits software exclusion and malicious interception.
The seventeenth prohibition of malicious rejection. Malicious exclusion refers to a terminal software in the design, installation, operation process, without legitimate reasons, deliberately set aside obstacles to other legitimate terminal software, to prevent users from installing or using other legitimate terminal software.
(1) similar terminal software has equal right to be chosen and market promotion.
(two) the terminal software may conflict with each other due to technical reasons during its operation. We should respect the user's right to choose independently.
(three) it shall not deceive or mislead users in any form or use other legitimate terminal software.
In the process of installation, operation, upgrading and unloading, the eighteenth terminal software should not be malicious or interfere with the normal use of other legitimate terminal software.
Nineteenth, in addition to malicious advertising, no specific information service providers should be intercepted or blocked from legitimate information content and pages.
Malicious advertising includes frequent pop-up messages that interfere with users, and floating ads, pop-up ads, window ads, etc. that do not provide closed mode.
The fifth chapter is against unfair competition.
The twentieth is to advocate fair competition and not to organize users to evaluate other terminal software for the purpose of unfair competition.
The twenty-first organization shall be open, fair and impartial when evaluating the terminal software. The evaluation rules and evaluation methods shall be publicized, and the evaluation results and evaluation data shall be subject to the third party audit. If the evaluated party has any objection to the evaluation result, the evaluation party shall observe the objection processing flow (separately formulated).
The service hints of the twenty-second terminal software should be clear, objective and fair, and no false, exaggerated or misleading language should be used to prompt the language to be in Chinese. {page_break}
The sixth chapter is security software.
The twenty-third safety software referred to in this Convention refers to the terminal software that provides users with services such as system operation security, data security, communication security and system performance optimization, including anti-virus software, security protection software, system optimization tools, etc.
In addition to complying with the provisions of other provisions of this Convention, safety software shall also comply with the provisions of this chapter.
Twenty-fourth, the safety service function that must not abuse the terminal software should be implemented to carry out acts that jeopardize the interests of the state and the public, act of unfair competition, and infringe upon the legitimate rights and interests of other enterprises and users.
Twenty-fifth, when developing system optimization services, we should respect users' independent choice and not make default choices for users.
The twenty-sixth is the establishment of an effective white list mechanism for the terminal software by the China Internet association. The enterprises in the white list should inform each other of the abnormal situation of the terminal software in a timely manner, promptly correct and solve the problem, and ensure the safety of users on the Internet.
The seventh chapter is the implementation of the Convention.
The twenty-seventh self regulatory committee of the China Internet association, as the executive body of this Convention, is responsible for organizing the signing and implementation of this Convention, and timely publicizing relevant policies, laws and regulations to the signatories.
The twenty-eighth signatories should consciously abide by the provisions of this Convention and violate the Convention and cause adverse effects. Any unit or individual has the right to report to the executive body of this Convention. The executive body of this Convention shall, after verification, verification or organizational evaluation, give penalties such as internal warning and public condemnation according to the circumstances.
The twenty-ninth one is to set up an industry mediation committee, establish a terminal software evaluation mechanism and a terminal software dispute settlement mechanism between enterprises, and be implemented by the executive body of this Convention. Specific implementation rules shall be separately specified.
Disputes and disputes between the thirtieth signatory units should be resolved in a negotiated manner based on the principle of mutual understanding and mutual accommodation, maintenance of industry solidarity and overall interests, and mediation of the executive bodies of this Convention. The executive body of this Convention is obliged to organize relevant mediation work as soon as possible through reasonable compliance, and notify the relevant units of the conciliation result. If no settlement can be reached through the mediation of the industry, the relevant administrative departments may make suggestions for handling the matter.
Eighth chapter supplementary provisions
Article thirty-first the Convention shall enter into force after the signature of the legal representative of the initiating unit or the delegated representative and the official seal of the unit. The Internet Society of China shall be released to the public from the date of promulgation, and the trial period shall be one year.
Article thirty-second this Convention follows the principle of "dynamic revision and gradual improvement". After the trial period and the end of the trial, the convention can be amended by the proposal of the executive body of this Convention or by more than 1/3 signatory units of this Convention and with the consent of more than 2/3 signatory units.
The thirty-third article is interpreted by the industry self regulatory committee of the Internet association of China. {page_break}
Enclosure
The list of the first batch of signing units of the Internet terminal software service self-regulation Convention (ranking No. 1)
1. Beijing Sina interconnect Information Service Co., Ltd.
2. Shenzhen Tencent computer system Co., Ltd.
3. Baidu Online Network Technology (Beijing) Co., Ltd
4. Beijing Sogou Technology Development Co., Ltd.
5. Beijing Qihoo Technology Co., Ltd.
6. first video communication media Co., Ltd.
7. excellent technology Co., Ltd.
8. Shanghai Juli Media Technology Co., Ltd.
9. Xinhua Limited by Share Ltd
10. Shenzhen press group Shenzhen News Network
11. Beijing union Technology Co., Ltd.
12. Jiuding interconnection (Beijing) Technology Development Co., Ltd.
13. net gathering elite (Beijing) Information Technology Co., Ltd.
14. Beijing net high network technology Co., Ltd. (Financial Network)
15. Shanghai Ai Rui Market Consulting Co., Ltd.
16. Beijing new net digital information technology Co., Ltd.
17. Beijing Sino search network technology Co., Ltd.
18. China national classics news agency
19. Jiangsu 365 Network Inc
20. Beijing Hua Yang Jun Feng Information Engineering Co., Ltd.
21. Beijing New Oriental remote network technology Co., Ltd.
Twenty-two Taiyuan Ren Ao Network Technology Co., Ltd.
23. Beijing future Zhonghe Technology Development Co., Ltd.
24. starlight interactive (Beijing) Culture Communication Co., Ltd.
25. Beijing Shenzhou Green League Technology Co., Ltd.
26. Beijing Wanfang Data Limited by Share Ltd
27. Sichuan AI Pu Network Co., Ltd.
28. Beijing Xi CI Interactive Information Technology Co., Ltd.
29. Fuzhou Kai Xun Network Technology Co., Ltd.
30. Shanghai Telecom residential broadband network Co., Ltd.
31. Beijing Asia Merchants Online Information Technology Co., Ltd.
32. Beijing twenty-second Century Network Technology Co., Ltd.
33. Beijing light star sky Information Technology Co., Ltd.
34. Beijing treasure Library Online Network Technology Co., Ltd.
35. Beijing blue flood Communication Technology Co., Ltd.
36. Beijing Yi Jie Hua Tong Technology Co., Ltd.
37. Shanghai long tour Network Technology Co., Ltd.
38. Fiat mart, Shenzhen, Agel Ecommerce Ltd
China Internet Association
August 1st, two
- Related reading
Notice Of The Second Meeting Of The Seventh Board Of Directors Of The Orient Group Limited By Share Ltd And The Notice Of Convening The 2011 Provisional Shareholders' Meeting
|- Market quotation | Fujian Changle City: The Key To Win The Textile Industry Lies In Innovation.
- Association dynamics | China Textile Association Of Enterprise Newspaper Association Held Its Annual Meeting In Fujian In October.
- Expo News | China Dongguan International Shoe Exhibition Shoe Machine Helps Buyers Look For Fashion Key
- Market quotation | 四川富順紡織服裝產業園動工
- Today's quotation | Reference Price Of Zhejiang Changxin Light Textile City September 28Th
- Fashion posters | Ruby Lin'S Sweet Portrait
- Today's quotation | September 28Th China Cotton Textile Wholesale Casual Sales Price Report
- Shoe Express | Kaida Sports Strengthen The Development Of Sports Products Business
- Global Perspective | Nike, A Shoe Giant, Was Protested By A Public Park In Tokyo.
- Shoe Express | BBS Group Is About To Launch A New Brand JAA To Enter The High-End Market.
- Can Dongguan Private Placement Rise?
- 人保部開始調研公務員津補貼 將起草相關方案
- Tianlun Tian 2011 Asia Outdoor Products Show Is Full Of Environmental Protection Elements.
- 秋裝價格普漲15% 預計今年成本平均上漲20%
- 50 Thousand The Savings Were Taken Out Of &Nbsp Abroad; The Suspected Card Was Stolen By The Clone Code.
- 泉州童裝轉戰渠道聯營 能否布局國內終端?
- Global Stock Market Prisoner'S Dilemma &Nbsp; A Share
- Exhibitors At Home And Abroad Exhibition Industry &Nbsp; Global Buyers Sharing Leather And Footwear Industry Feast
- No Profit Factor Cotton City Will Remain Depressed Until The Three Quarter.
- CSLF2011: Surpass Yesterday, But Is The Starting Point Of Going Forward.