Starting today (August 1), the "Cyber Violence Information Governance Regulations" will come into effect. The "Regulations" clarify that network information service providers should refine the standard rules for classifying cyber violence information under the guidance of the national cyberspace department and relevant departments of the State Council. , establish and improve online violence information feature database and typical case sample database and other measures to strengthen the identification and monitoring of online violence information. So, what are the specific requirements? What role can it play? Expert Interpretation ↓
Refined Standard Rules for Classifying Internet Violence Information
Internet violence information referred to in the "Regulations" refers to the concentrated release of information to individuals through the Internet in the form of text, images, audio, video, etc., containing insults, insults, rumors, slander, and incitement Illegal and harmful information such as hatred, coercion, invasion of privacy, accusations, ridicule, belittling and discrimination that affect physical and mental health.
Establish and improve the online violence information early warning model
The "Regulations" propose that network information service providers should establish and improve the online violence information early warning model, comprehensive event categories, targets, number of participants, information content, release frequency, link scenarios, reports and complaints, etc. Factors, timely detection and early warning of cyber violence information risks.
Zhao Jingwu, associate professor at Beihang University Law School: Because the platform operator is not a law enforcement agency, it is difficult to effectively screen some obscure online violence information. Through some classification standards, feature libraries, and technologies such as artificial intelligence and big data, Legal and governance mechanisms can urge and promote platforms to more effectively identify and monitor some special information for online violence.
The "Regulations" require that if network information service providers discover that there is a risk of cyber violence information, they should promptly respond to social concerns, guide users to interact civilly and express rationally, and promptly adopt dynamic verification of real identity information, pop-up prompts, and violation of regulations for abnormal accounts. Warnings, traffic restrictions and other measures; if it is discovered that the number of browsing, searches, comments and reports of relevant information content has increased significantly, it should also be reported to the relevant departments in a timely manner.
Liu Xiaochun, Director of the Internet Law Research Center of the University of Chinese Academy of Social Sciences: Our regulatory agencies have accumulated a lot of experience in preventing cyber violence and can effectively identify and accurately manage cyber violence in advance without causing harm due to large-scale spread.
Establish and improve the user account credit management system
Experts pointed out that the form of cyber violence information may not necessarily be violent abuse, attacks and other behaviors. Some may adopt very covert methods, but the damage caused to the parties involved is also huge. Therefore, the "Cyber Violence Information Governance Regulations" implemented this time not only require network information service providers to formulate classification standards for cyber violence information, but also require that management rules and platform conventions be formulated and disclosed.
The "Regulations" propose that network information service providers that provide users with information release, instant messaging and other services must authenticate users' true identity information in accordance with the law. If users do not provide true identity information, network information service providers shall not provide relevant services for them.
Liu Xiaochun, Director of the Internet Rule of Law Research Center of the University of Chinese Academy of Social Sciences: Building a multi-subject collaborative governance mechanism before, during and after the event can provide more comprehensive protection to the parties than post-event governance and protect them from harm. The same is true for intervention in the event.
The "Regulations" require that network information service providers should establish and improve user account credit management systems, record violations of laws and regulations involving online violence information into user credit records, and reduce account credit levels or blacklist them in accordance with the law and contract, and accordingly Restrict account functions or stop providing related services.
Zhao Jingwu, associate professor at Beihang University Law School: Establishing and improving an account credit management mechanism can serve as a good deterrent and at the same time leave traces of cyber violence information. Because in practice, some people often pretend to be close relatives of the perpetrators and victims, and use these names to increase the popularity of their accounts through traffic.By establishing such a mechanism, everyone can control the flow of cyber violence information from the entire process, while preventing everyone from engaging in cyber violence at will.
Improve the online violence information protection function and improve the private message rules
When encountering online violence, what specific measures are included in the "Internet Violence Information Governance Regulations" to protect the rights and interests of users?
The "Regulations" propose that network information service providers should establish and improve online violence information protection functions, and provide users with convenient settings to block unknown users or specific users, the visibility of personal information, prohibiting reprinting or commenting on personal information, and other online violent information protection options. .
Internet information service providers should improve private message rules, provide users with convenient settings to only receive private messages from friends or refuse to receive all private messages, and other online violent information protection options, and are encouraged to provide functions such as intelligently blocking private messages or customizing private message blocking words.
Liu Xiaochun, director of the Internet Law Research Center of the University of Chinese Academy of Social Sciences: The regulations actually give users the ability to make a lot of personalized settings, such as comment range or private message areas, allowing users to block specific users and determine their own information. Publish the visible range, including one-click anti-cyber violence, and put yourself in an environment without interference. For private messages, you can also set up the receiving settings, who can be received and who cannot be received, settings such as whitelist and blacklist.
The "Regulations" propose that network information service providers discover that the risk of online violence involves infringement of the legitimate rights and interests of users such as minors, the elderly, and the disabled; infringement of users' personal privacy; if measures are not taken in a timely manner, the user may be harmed personally, In cases of serious consequences such as property damage, users should be provided with guidance on cyber violence information protection and protection and rescue services, assist in initiating protective measures, and report to relevant departments such as the Internet Information and Public Security Bureau.
In addition, the "Regulations" also require network information service providers to promptly preserve evidence related to online violence and promptly accept and handle complaints and reports.
A multi-department collaborative working mechanism effectively supervises cyber violence
The "Cyber Violence Information Governance Regulations" implemented this time clearly stipulates that the cyberspace department, together with the public security, culture and tourism, radio and television and other relevant departments, will strictly control cyber violence against network information service providers in accordance with the law. Supervise and inspect information governance to achieve comprehensive management of cyber violence.
The "Regulations" propose that the cyberspace department, together with the public security, culture and tourism, radio and television and other relevant departments, establish and improve working mechanisms for information sharing, consultation and reporting, evidence collection and verification, and case supervision, to coordinate the management of online violence information.
The public security organs shall promptly review the illegal and criminal clues related to cyberviolence information transferred by the Internet information, culture and tourism, radio and television and other departments, and promptly file and investigate cases that meet the conditions for filing a case.
Zhao Jingwu, associate professor at Beihang University School of Law: This multi-department collaborative working mechanism can more effectively prevent and control vicious cyber violence incidents controlled by gray and black Internet products from multiple regulatory channels, and is also in line with the sources of persistence mentioned in the "Regulations" The governance principles of prevention, combination of prevention and control, treating both symptoms and root causes, and collaborative governance.
(CCTV news client)