China News Service, Beijing, June 27 (Reporter Liu Yuying) The Cyberspace Administration of China issued the "Regulations on the Management of Internet User Account Information" on the 27th, which will take effect on August 1, 2022.

  In recent years, with the rapid development of various Internet information services, Internet user account information reflects the user's individual characteristics, facilitates online communication, and has become an important carrier for hundreds of millions of netizens to show themselves.

However, at the same time, through registration, use of account information, fabrication and dissemination of false information, cyber violence and other acts have occurred from time to time, endangering national security and social public interests, and infringing upon the legitimate rights and interests of citizens, legal persons and other organizations.

  The "Regulations" make it clear that the national network information department is responsible for the supervision and management of Internet user account information across the country.

Local network information departments are responsible for the supervision and management of Internet user account information within their respective administrative regions according to their duties.

  The "Regulations" clarify that the registration and use of account information by individual Internet users, including occupational information, shall be consistent with the personal real occupational information; the registration and use of account information by Internet institutional users shall be consistent with the name and logo of the institution.

Information on the attribution of Internet protocol addresses of Internet user accounts within a reasonable range shall be displayed on the account information page, so as to facilitate the public's supervision for the public interest.

  The "Regulations" clarified the norms for account information management, requiring Internet information service providers to fulfill the main responsibility for account information management, and to equip professionals and technical capabilities commensurate with the scale of services; establish, improve and strictly implement real identity information authentication and account information verification. , information content security, ecological governance, emergency response, personal information protection and other management systems.

(Finish)

Keywords: