(two) to establish and improve the user information security protection mechanism, the collection and use of personal information of users should follow the principles of legality, justice and necessity, clearly explain the purpose, method and scope of collecting and using information, and obtain the consent of users.
(3) Establish and improve the information content audit management mechanism, and take warning, function restriction, suspension of updating, account closure and other disposal measures as appropriate for those who publish illegal information content, keep records and report to the relevant competent authorities.
(4) Protect users' right to know and choose during installation or use according to law. Please do not turn on the functions of collecting geographical location, reading address book, using camera and enabling recording. , do not open functions unrelated to business, and do not bundle and install unrelated applications without the explicit consent of users.
(five) respect and protect intellectual property rights, and shall not make or publish applications that infringe the intellectual property rights of others.
(six) record the user log information and keep it for sixty days.
(seven) to review the authenticity, security and legality of application providers, establish a credit management system, and file with the Internet information offices of provinces, autonomous regions and municipalities directly under the central government.
(eight) to urge application providers to protect user information, provide a complete explanation for the application to obtain and use user information, and show it to users.
(nine) to urge the application providers to publish legal information content, establish and improve the safety audit mechanism, and equip professionals suitable for the service scale.
(ten) to urge the application providers to publish legal applications, and to respect and protect the intellectual property rights of the application providers.
Legal basis: Regulations on the Management of Mobile Internet Application Information Services
Seventh mobile Internet application providers shall strictly implement the responsibility of information security management and perform the following obligations according to law:
(a) according to the principle of "real name in the background, voluntary at the front desk", based on the real identity information such as mobile phone number, the registered users are authenticated.
(two) to establish and improve the user information security protection mechanism, the collection and use of personal information of users should follow the principles of legality, justice and necessity, clearly explain the purpose, method and scope of collecting and using information, and obtain the consent of users.
(3) Establish and improve the information content audit management mechanism, and take warning, function restriction, suspension of updating, account closure and other disposal measures as appropriate for those who publish illegal information content, keep records and report to the relevant competent authorities.
(4) Protect users' right to know and choose during installation or use according to law. Please do not turn on the functions of collecting geographical location, reading address book, using camera and enabling recording. , do not open functions unrelated to business, and do not bundle and install unrelated applications without the explicit consent of users.
(five) respect and protect intellectual property rights, and shall not make or publish applications that infringe the intellectual property rights of others.
(six) record the user log information and keep it for sixty days.
Article 8 Internet application store service providers shall perform the following management responsibilities for application providers:
(1) Examining the authenticity, security and legality of application providers, establishing a credit management system, and filing with the Internet information offices of provinces, autonomous regions and municipalities directly under the Central Government.
(2) Urge application providers to protect user information, provide complete explanations for applications to obtain and use user information, and present them to users.
(three) to urge the application providers to publish legal information content, establish and improve the safety audit mechanism, and equip professionals suitable for the service scale.
(4) Urging application providers to release legal applications and respecting and protecting the intellectual property rights of application providers.
For application providers who violate the provisions of the preceding paragraph, measures such as warning, suspension of publishing and removal of applications shall be taken as appropriate, and records shall be kept and reported to the relevant competent authorities.