Starting today (August 1), the "Cyber ​​Violence Information Governance Regulations" will come into effect. The "Regulations" clarify that network information service providers should refine the standard rules for classifying cyber violence information under the guidance of the n

entertainment 1082℃

Starting today (August 1), the "Cyber ​​Violence Information Governance Regulations" will come into effect. The "Regulations" clarify that network information service providers should refine the standard rules for classifying cyber violence information under the guidance of the national cyberspace department and relevant departments of the State Council. , establish and improve online violence information feature database and typical case sample database and other measures to strengthen the identification and monitoring of online violence information. So, what are the specific requirements? What role can it play? Expert Interpretation ↓

refines the standard rules for classifying online violence information

The so-called online violence information in the "Regulations" refers to the centralized release of information to individuals through the Internet in the form of text, images, audio, video, etc., containing insults, abuse, rumors and slander, Illegal and harmful information that incites hatred, intimidation, invasion of privacy, accusations, ridicule, belittling and discrimination that affects physical and mental health.

Establish and improve the online violence information early warning model

The "Regulations" propose that network information service providers should establish and improve the online violence information early warning model, comprehensive event categories, targets, number of participants, information content, release frequency, link scenarios, reports and complaints, etc. Factors, timely detection and early warning of cyber violence information risks.

Starting today (August 1), the 'Cyber ​​Violence Information Governance Regulations' will come into effect. The 'Regulations' clarify that network information service providers should refine the standard rules for classifying cyber violence information under the guidance of the n - Lujuba

Zhao Jingwu, associate professor at Beihang University Law School: Because the platform operator is not a law enforcement agency, it is difficult to effectively screen some obscure cyber violence information. Through some classification standards, feature libraries, and technologies such as artificial intelligence and big data, Legal and governance mechanisms can urge and promote platforms to more effectively identify and monitor some special information for online violence.

The "Regulations" require that if network information service providers discover that there is a risk of online violent information, they should respond to social concerns in a timely manner, guide users to interact civilly and express rationally, and promptly adopt dynamic verification of real identity information, pop-up prompts, and violation of regulations for abnormal accounts. Warnings, traffic restrictions and other measures; if it is discovered that the number of browsing, searches, comments and reports of relevant information content has increased significantly, it should also be reported to the relevant departments in a timely manner.

Starting today (August 1), the 'Cyber ​​Violence Information Governance Regulations' will come into effect. The 'Regulations' clarify that network information service providers should refine the standard rules for classifying cyber violence information under the guidance of the n - Lujuba

Liu Xiaochun, Director of the Internet Legal Research Center of the University of Chinese Academy of Social Sciences: Our regulatory agencies have accumulated a lot of experience in preventing cyber violence and can effectively identify and accurately manage cyber violence in advance without causing harm due to large-scale spread.

| Establish and improve the user account credit management system

Experts point out that the form of cyber violence information may not necessarily be violent abuse, attacks and other behaviors. Some may adopt very covert methods, but the harm caused to the parties involved is also huge. Therefore, the "Cyber ​​Violence Information Governance Regulations" implemented this time not only require network information service providers to formulate classification standards for cyber violence information, but also require that management rules and platform conventions be formulated and disclosed.

The "Regulations" propose that network information service providers that provide users with information release, instant messaging and other services must authenticate users' true identity information in accordance with the law. If users do not provide true identity information, network information service providers shall not provide relevant services for them.

Liu Xiaochun, Director of the Internet Rule of Law Research Center of the University of Chinese Academy of Social Sciences: Building a multi-subject collaborative governance mechanism before, during and after the event can provide more comprehensive protection to the parties than post-event governance and protect them from harm. The same is true for intervention in the event.

The "Regulations" require that network information service providers should establish and improve user account credit management systems, record violations of laws and regulations involving online violence information into user credit records, reduce account credit levels or blacklist them in accordance with the law and contract, and accordingly Restrict account functions or stop providing related services.

Starting today (August 1), the 'Cyber ​​Violence Information Governance Regulations' will come into effect. The 'Regulations' clarify that network information service providers should refine the standard rules for classifying cyber violence information under the guidance of the n - Lujuba

Zhao Jingwu, associate professor at Beihang University School of Law: Establishing and improving an account credit management mechanism can serve as a good deterrent and at the same time leave traces of cyber violence information. Because in practice, some people often pretend to be close relatives of the perpetrators and victims, and use these names to increase the popularity of their accounts through traffic.By establishing such a mechanism, everyone can control the flow of cyber violence information from the entire process, while preventing everyone from engaging in cyber violence at will.

  improves the online violence information protection function and improves private message rules

 When encountering online violence, what specific measures are included in the "Internet Violence Information Governance Regulations" to protect the rights and interests of users?

The "Regulations" propose that network information service providers should establish and improve online violence information protection functions, and provide users with convenient settings to block unknown users or specific users, the visible range of information posted by themselves, prohibiting reprinting or commenting on information posted by themselves, and other online violence information protection options. .

Internet information service providers should improve private message rules, provide users with convenient settings to only receive private messages from friends or refuse to receive all private messages, and other online violent information protection options, and are encouraged to provide functions such as intelligently blocking private messages or customizing private message blocking words.

Starting today (August 1), the 'Cyber ​​Violence Information Governance Regulations' will come into effect. The 'Regulations' clarify that network information service providers should refine the standard rules for classifying cyber violence information under the guidance of the n - Lujuba

Liu Xiaochun, Director of the Internet Law Research Center of the University of Chinese Academy of Social Sciences: The regulations actually give users the ability to make a lot of personalized settings, such as comment range or private message areas, allowing users to block specific users and determine their own information. Publish the visible range, including one-click anti-cyber violence, and put yourself in an environment without interference. For private messages, you can also set up the receiving settings, who can be received and who cannot be received, settings such as whitelist and blacklist.

The "Regulations" propose that network information service providers discover that network violence information risks involve infringement of the legitimate rights and interests of users such as minors, the elderly, and the disabled; infringement of users' personal privacy; if measures are not taken in a timely manner, users may be personally, In cases of serious consequences such as property damage, users should be provided with guidance on cyber violence information protection and protection and rescue services, assist in initiating protective measures, and report to relevant departments such as the Internet Information and Public Security Bureau.

In addition, the "Regulations" also require network information service providers to promptly preserve evidence related to online violence and promptly accept and handle complaints and reports.

multi-department collaborative working mechanism to effectively supervise cyber violence

The "Cyber ​​Violence Information Governance Regulations" implemented this time clearly state that the cyberspace department, together with the public security, culture and tourism, radio and television and other relevant departments, will regulate the network of network information service providers in accordance with the law. Supervise and inspect the governance of violent information to achieve comprehensive governance of online violence.

The "Regulations" propose that the cyberspace department, together with the public security, culture and tourism, radio and television and other relevant departments, establish and improve working mechanisms for information sharing, consultation and reporting, evidence collection and verification, and case supervision, to coordinate the management of online violence information.

The public security organs shall promptly review the illegal and criminal clues related to cyber violence information transferred by the Internet information, culture and tourism, radio and television and other departments, and timely file and investigate those that meet the conditions for filing a case.

Starting today (August 1), the 'Cyber ​​Violence Information Governance Regulations' will come into effect. The 'Regulations' clarify that network information service providers should refine the standard rules for classifying cyber violence information under the guidance of the n - Lujuba

Zhao Jingwu, associate professor at Beihang University Law School: This multi-department collaborative working mechanism can more effectively prevent and control vicious cyber violence incidents manipulated by gray and black products on the Internet from multiple regulatory paths, and is also in line with the sources of persistence mentioned in the "Regulations" The governance principles of prevention, combination of prevention and control, treating both symptoms and root causes, and collaborative governance.

Tags: entertainment