Share the QR code < / P > < p > with wechat scanning code to friends and circle of friends < / P > < p > tianyancha app shows that recently, Shanghai Xiaopeng Automobile Sales Service Co., Ltd. was fined 100000 yuan by Xuhui District market supervision and Administration Bureau p> < p > the reason for punishment is that the party concerned purchased 22 camera devices with face recognition function and installed them in its stores, so as to count the number of people entering the stores and analyze the proportion of men and women, age, etc. From January to June this year, 431623 face photos were collected and uploaded. This behavior violates the law on the protection of consumers' rights and interests without the consent of consumers and without explicitly informing consumers of the purpose of collection and use p> < p > relevant laws and regulations < / P > < p > < / P > < p > [app forces face recognition? Can't cancel the account? The country is going to do it] < / P > < p > chinanews.com client Beijing, November 14 (reporter Wu Tao) at present, personal privacy information leakage on the network occurs from time to time. App often forces users to authorize or not, they can't use it, and even "they can't enter their own community without face recognition" In the future, there will be rules to deal with these matters p> < p > on the 14th, the state network information office issued a notice on the public solicitation of opinions on the regulations on the administration of network data security (Draft for comments) (hereinafter referred to as the draft for comments), which plans to strengthen the construction of data security protection capacity, ensure the orderly and free flow of data according to law, and promote the rational and effective utilization of data according to law p> < p > how to deal with personal information p> < p > the exposure draft points out that data processors shall not refuse to provide services or interfere with the normal use of services because individuals refuse to provide information other than personal information necessary for services p> < p > the picture is from the screenshot of the regulations on the administration of network data security (Draft for comments) p> < p > the exposure draft also points out that the consent to process personal information shall be applied to individuals according to the type of service, and general terms shall not be used to obtain consent; The processing of sensitive personal information such as personal biometrics, religious beliefs, specific identities, medical and health care, financial accounts and whereabouts shall be subject to the individual's separate consent p>
"When dealing with the personal information of minors under the age of 14, they shall obtain the consent of their guardians; they shall not force individuals to agree to deal with their personal information on the grounds of improving service quality, improving user experience and developing new products; they shall not obtain individual consent by means of misleading, fraud and coercion; they shall not be lured by binding different types of services, batch application for consent, etc Guide and force individuals to agree to batch personal information; It is not allowed to frequently ask for consent or interfere with the normal use of the service after an individual clearly expresses his disagreement. " p> < p > in addition, when the user requests to terminate the service or log off the account, the data processor shall delete the personal information or anonymize it within 15 working days p> < p > it is worth noting that previously, there were apps or community properties that forced users to recognize faces. The exposure draft pointed out that if data processors use biometrics for personal identity authentication, they should conduct risk assessment on the necessity and security, and shall not use biometrics such as face, gait, fingerprint, iris and voiceprint as the only way of personal identity authentication, so as to force individuals to agree to collect their personal biometric information p> < p > enterprises can't do these things < / P > < p > in addition to formulating personal information processing rules, the exposure draft also makes various requirements for data processors, pointing out that no individual or organization shall illegally sell or provide data to others when carrying out data processing activities; No data shall be obtained by stealing or other illegal means; It shall not infringe upon the reputation, privacy, copyright and other legitimate rights and interests of others p> < p > "any individual or organization who knows or should know that others are engaged in the activities mentioned in the preceding paragraph shall not provide them with technical support, tools, procedures, advertising promotion, payment and settlement and other services." p> < p > the data processor shall protect the data from disclosure, theft, tampering, damage, loss and illegal use, deal with data security incidents, prevent illegal and criminal activities against and use of data, and maintain the integrity, confidentiality and availability of data p> < p > "in case of data security incidents such as leakage, damage and loss of important data or personal information of more than 100000 people, the data processor shall also report the basic information of the incident to the network information department at the municipal level divided into districts and relevant competent departments within eight hours of the security incident, including the amount, type, possible impact, disposal measures taken or planned, etc." The exposure draft points out that p> < p > < / P > < p > in addition, the exposure draft regulates some "crawlers" on the network. If automatic tools access and collect data in violation of laws, administrative regulations or industry self-discipline conventions, affect the normal function of network services, or infringe on the legitimate rights and interests of others' intellectual property rights, the data processor shall stop accessing and collecting data and take corresponding remedial measures p> < p > < / P > < p > [the supreme law specifies that the abuse of face recognition in business premises belongs to infringement] < / P > < p > businesses collect face information for data analysis without the consent of consumers, and the property forces face recognition as the only verification method for the owner's access... There is a new basis for solving these disputes. The provisions of the Supreme People's Court on Several Issues concerning the application of law in the trial of civil cases related to the use of face recognition technology to deal with personal information was announced on the 28th, which clearly stipulates the abuse of face recognition technology in business premises and the "face brushing" of residential areas p>