The National Cyberspace Administration publicly solicits opinions on the governance of online violence and information violence | the Internet | Information

Release time:Apr 14, 2024 02:28 AM

Notice of the State Internet Information Office on Publicly Soliciting Opinions on the Regulations on Cyber Violence Information Governance

In order to effectively strengthen the governance of cyber violence information and create a good network ecology, the State Internet Information Office has drafted the Regulations on Cyberviolence Information Governance in accordance with the Cyber Security Law of the People's Republic of China, the Personal Information Protection Law of the People's Republic of China and other laws and administrative regulations, and now solicits public opinions. The public can provide feedback through the following channels and methods:

1. Log in to the Chinese Government Legal Information Network of the Ministry of Justice of the People's Republic of China and enter the "Legislative Opinion Collection" column on the main menu of the homepage to submit opinions.

2. Send via email to: wbzl@cac.gov.cn .

3. Send your comments by letter to the Network Comprehensive Administration Bureau of the State Internet Information Office, No. 11 Chegongzhuang Street, Xicheng District, Beijing, 100044, and please mark the envelope with the words "Internet Violence Information Governance Regulations for Comments".

The deadline for feedback is August 6, 2023.

Attachment: Regulations on the Governance of Cyber Violence Information

National Internet Information Office

July 7, 2023

Regulations on the Governance of Cyber Violence Information

general provisions

Article 1: In order to strengthen the governance of online violence information, create a good online ecosystem, safeguard the legitimate rights and interests of citizens, and safeguard social public interests, this regulation is formulated in accordance with laws and administrative regulations such as the Cybersecurity Law of the People's Republic of China and the Personal Information Protection Law of the People's Republic of China.

Article 2: The information governance activities of online violence within the territory of the People's Republic of China shall be governed by these regulations.

The term "online violence information" referred to in these regulations refers to illegal and harmful information that is released to individuals through the internet, including insults, insults, rumors, defamation, infringement of privacy, and seriously affecting physical and mental health, such as moral kidnapping, derogatory discrimination, malicious speculation, etc.

Article 3: The national cyberspace information department is responsible for coordinating and coordinating the governance of online violence information and related supervision and management work nationwide.

Local network information departments at all levels are responsible for coordinating the governance of network violence information and related supervision and management work within their respective administrative regions.

Article 4: Encourage relevant industry organizations to strengthen industry self-discipline, supervise and guide network information service providers to strengthen the governance of online violence information, and accept social supervision.

Chapter 2 General Provisions

Article 5: Network information service providers shall fulfill the main responsibility of information content management, establish and improve mechanisms for governance of online violence information, and improve systems for account management, information release review, monitoring and early warning, reporting and assistance, and disposal of online violence information.

Article 6: Network information service providers shall strengthen the management of network user account information, prevent counterfeiting, impersonation, and malicious association of parties involved in network violence incidents from registering or publishing information in violation of regulations, and assist parties in personal account authentication.

Article 7: Network information service providers shall formulate and publicly disclose management rules and platform conventions, clarify the responsibilities that users should bear in producing, copying, publishing, and disseminating information on online violence in user agreements, and fulfill corresponding management responsibilities in accordance with the law and the agreement.

Article 8: Network information service providers shall regularly publish announcements on the governance of online violence information, and report on relevant work in the annual report on the governance of the network information content ecosystem.

When discovering the risk of online violence, network information service providers should promptly disclose the situation of governance work, respond to social concerns, guide netizens to speak rationally, and prevent resistance to online violence.

Chapter 3 Monitoring and Early Warning of Online Violence Information

Article 9 Network information service providers shall establish and improve classification standards for online violence information and a sample library of typical cases. On the basis of distinguishing public opinion supervision and goodwill criticism, they shall clarify and refine the standards for online violence information, and enhance identification accuracy.

Article 10 Network information service providers shall dynamically manage key accounts related to online violence based on historical information releases, violations, reports and complaints, and take timely intervention and restriction measures.

Article 11 Network information service providers shall establish and improve a network violence information warning model, comprehensively consider the categories of events, targeted subjects, number of participants, information content, publication frequency, link scenarios, reporting and complaints, and timely detect and warn of the risks of network violence.

Chapter 4 Disposal of Online Violence Information

Article 12: If a network information service provider discovers online violent information such as insults, slanders, and infringement of privacy, they shall take measures such as deletion, blocking, disconnection of links, and restriction of dissemination. For negative information related to online violence, it shall not be presented in the key links specified in Article 11 of the Regulations on the Governance of the Network Information Content Ecology to prevent the spread and dissemination of online violence information.

Article 13: Network information service providers shall strengthen the management of the content of post comments, and promptly dispose of online violence information published and disseminated through comments, replies, comments, bullet comments, likes, and other means.

Article 14: Network information service providers shall strengthen the management of online community sections and online groups, and shall not collect information on online violence in terms, topics, hyperlinks, groups, post bars, and other links. It is prohibited to create topic sections and group accounts that publish content with poor orientation under the guise of anonymous submission, empty shouting, etc.

The creators and managers of online community sections and groups should fulfill their management responsibilities, regulate the online behavior and information dissemination of members. If users create, copy, publish, or disseminate information about online violence, they should take management measures such as removing from the group in accordance with the law and agreement.

Article 15 Network information service providers shall strengthen the review of live broadcasts and short video content, timely block live broadcasts involving online violence information, and dispose of short videos containing online violence information.

Article 16 Internet news information service units shall adhere to the correct guidance of public opinion, strengthen the verification of the authenticity and legitimacy of information content, and shall not play up and hype online violence events. News information post comments shall be issued after trial.

Article 17: No organization or individual shall use online violence incidents to engage in malicious marketing hype, promote traffic, intentionally deviate from the pace, or cross platform move and splice false information. Network information service providers shall not provide traffic, funding, or other support to accounts, institutions, etc. that spread online violence.

Chapter 5 Protection Mechanism

Article 18: Network information service providers shall establish and improve network violence protection functions, and provide one click closure of stranger private messages, comments, forwarding, and message reminders. When users face the risk of online violence, they should promptly send system information to prompt them to activate one click protection.

Article 19: Network information service providers shall improve the rules for private messages, allowing users to set up to only receive private messages from friends or refuse to receive all private messages according to their own needs. Take technical measures to block the transmission of online violent information through private messages.

Article 20: When network information service providers discover the following situations, they shall promptly assist the parties involved in activating one click protection and effectively strengthen the protection of the parties involved:

The parties involved in online violence involve minors, elderly people, etc;

The party concerned expresses in public that they have suffered from online violence;

Other situations that may result in serious consequences if mandatory intervention measures are not taken in a timely manner.

Article 21: Network information service providers shall set up dedicated fast complaint and reporting entrances for online violence information in prominent locations, open a complaint and reporting hotline for online violence information, and simplify the complaint and reporting procedures.

Network information service providers should timely accept and analyze complaints and reports, as well as relevant supporting materials. For situations that are clearly identified as online violence, they should handle them in accordance with the law and regulations, and provide feedback on the results. For cases that are verified not to be online violence, they should be handled according to the requirements for accepting other types of reports and provide feedback on the results.

Article 22: Network information service providers shall provide users with functions such as one click evidence collection for information on online violence, and improve the convenience of evidence collection. Provide timely and necessary technical support and assistance to protect the rights of users in accordance with laws and regulations, as well as to investigate and collect evidence from judicial organs and relevant departments.

Article 23: Adhere to the principle of being most beneficial to minors and strengthen special and priority protection for minors. Network information service providers should prioritize handling reports of online violence involving minors. If it is found that underage users are at risk of online violence, they should immediately dispose of illegal and irregular information, provide protection and assistance services, and report to relevant departments.

Chapter 6 Supervision, Management and Legal Responsibility

Article 24: The internet information department shall supervise and inspect the implementation of the governance of online violence information by network information service providers in accordance with the law.

Article 25: The Cyberspace Administration, in conjunction with relevant departments, shall establish and improve mechanisms for information sharing, consultation and notification, evidence collection and investigation, case supervision, and other related work, and collaborate to carry out the governance of online violence information.

Article 26: If a network information service provider violates these regulations, they shall be punished in accordance with the provisions of laws and administrative regulations such as the Cybersecurity Law of the People's Republic of China and the Personal Information Protection Law of the People's Republic of China.

If there are no provisions in laws and administrative regulations, the network information departments at all levels shall, in accordance with their responsibilities, issue warnings, circulate notices of criticism, order them to make corrections within a specified time limit, and may also impose fines ranging from 10000 yuan to 100000 yuan; If serious consequences such as citizen's life, health, and safety are caused by untimely disposal, a fine of not less than 100000 yuan but not more than 200000 yuan shall be imposed, and information updates may be ordered to be suspended.

Internet information service providers who initiate or organize online violence or engage in malicious marketing hype through online violence incidents shall be punished severely in accordance with the law.

Article 27: For network institutions that organize or incite the dissemination of information on online violence, network information service providers shall take measures such as warning communication, suspension of commercial profits, restriction of service provision, entry and exit in accordance with the law and regulations.

Article 28: If a network user violates these regulations, the network information service provider shall, in accordance with the law, take measures such as warning reminders, restricting account functions, closing and canceling accounts, etc; Measures such as blacklisting and prohibition of re registration shall be taken for those who first post, frequently post, organize, or incite the release of online violence information.

For those who engage in malicious marketing or illegal profit-making activities through online violence incidents, in addition to the provisions of the preceding paragraph, measures such as clearing new fans and suspending profit-making privileges shall be taken in accordance with the law and agreement.

Network information service providers shall keep relevant records and promptly report to relevant regulatory authorities such as Cyberspace Administration.

Article 29: Those who violate these regulations and cause damage to others shall bear civil liability in accordance with the law; Those who constitute violations of public security management shall be punished for public security management in accordance with the law; If a crime is constituted, criminal responsibility shall be pursued in accordance with the law.

Chapter 7 Supplementary Provisions

Article 30 The State Internet Information Office shall be responsible for the interpretation of these Provisions.

Article 31: These regulations shall come into effect on [date].

Two women were stabbed to death and reported to have committed a crime 4 days before the follow-up visit for schizophrenia. Suspect of a bloody murder case in a Hong Kong shopping mall appeared in court today. Male | Last Friday | Murder case
Two women were stabbed to death and reported to have committed a crime 4 days before the follow-up visit for schizophrenia. Suspect of a bloody murder case in a Hong Kong shopping mall appeared in court today. Male | Last Friday | Murder case

According to Hong Kong's Wen Wei Po, a bloody knife stabbing case occurred at Hollywood Square in Diamond Hill last Friday. The police arrested a 39 year old man on suspicion of stabbing two young women, one of whom was stabbed over 30 times. The suspect appeared in the Kwun Tong Magistrates Court this morning. The police at the Kwun Tong Magistrate's Court temporarily charged the suspect with two counts of murder last Sunday. The suspect appeared in court this morning at the Kwun Tong Magistrate's Court. Acting Chief Magistrate Zheng Jihang, after listening to the opinions of both the prosecution and defense, decided to postpone the hearing for two weeks until 9:30 am on June 19th, waiting for two psychiatric expert reports to be obtained. The defense did not object. Zheng Jihang approved the application, and the defendant needs to be temporarily detained at Xiaolan Mental Hospital. When the suspect appeared in court, he wore black framed glasses, a light gray shirt, and camouflage green shorts, and was able to answer the judge's questions normally. accordingly

Secretary of the Provincial Party Committee: The focus of Henan's "summer harvest" has shifted to agricultural machinery in the northern region of Henan Province. | Support | Science | Organization | Province | Northern Henan | Summer Harvest | Rush Harvest
Secretary of the Provincial Party Committee: The focus of Henan's "summer harvest" has shifted to agricultural machinery in the northern region of Henan Province. | Support | Science | Organization | Province | Northern Henan | Summer Harvest | Rush Harvest

Currently, the highly anticipated summer harvest work in Henan has shifted its focus to the northern region of Henan. According to the Henan Daily client, on June 4th, Lou Yangsheng, Secretary of the Henan Provincial Party Committee, presided over a special video scheduling meeting on the "Three Summers" work in the province, listened to the situation report, analyzed and judged the situation, and arranged and deployed the next steps of work. Governor Wang Kai made specific arrangements. On the evening of May 31, 2023, in Xiafutou Village, Xuliang Town, Boai County, Jiaozuo, Henan Province, villagers braved light rain in the wheat fields to harvest wheat. Visual China Map Lou Yangsheng pointed out that the current summer harvest battle in the province has entered the decisive stage. Doing a good job in summer harvest in northern Henan Province is related to the summer grain yield and seed safety. We should focus on seizing opportunities and make every effort to organize the wheat harvesting work in the northern Henan region, minimize losses, and protect the interests of farmers to the greatest extent possible. Accurate forecasting is essential

Xinhua All Media+| Welcome home! What innovative technologies are protecting the return journey of Shenzhou 15? Spaceship | Shenzhou | Technology
Xinhua All Media+| Welcome home! What innovative technologies are protecting the return journey of Shenzhou 15? Spaceship | Shenzhou | Technology

On June 4th, the return capsule of the Shenzhou-15 manned spacecraft successfully landed at the Dongfeng landing site. Astronauts Fei Junlong, Deng Qingming, and Zhang Lu all safely and smoothly exited the spacecraft, and the Shenzhou-15 manned flight mission was a complete success. What innovative technologies are there to safeguard the return journey of Shenzhou 15 in this mission? On June 4th, the return capsule of the Shenzhou-15 manned spacecraft successfully landed at the Dongfeng landing site. Xinhua News Agency reporter Lian Zhen photographed that "the sky and the ground" ensure the high-precision return of spacecraft. For the Shenzhou series spacecraft, the return and re-entry GNC technology is directly related to the life safety of astronauts. Taking the success of this return mission as a symbol, China has comprehensively upgraded its GNC system since the Shenzhou-12 manned spacecraft, which features autonomous rapid rendezvous and docking, autonomous adaptive prediction and re-entry return guidance, and has completed a comprehensive update and replacement

The Chinese naval fleet has arrived! Assembly | Navy | Chinese Fleet
The Chinese naval fleet has arrived! Assembly | Navy | Chinese Fleet

At noon today, a Chinese naval fleet consisting of Zhanjiang and Xuchang ships arrived at the assembly area of the "Comodo-2023" multinational maritime joint exercise. It is understood that the assembly anchorage for this exercise is 3 nautical miles long and 1.5 nautical miles wide, capable of anchoring up to 50 ships. Naval vessels from various countries participating in the exercise will also arrive at the anchorage today to complete the assembly of the "Komodo 2023" multinational maritime joint exercise, which is held every two years by the Indonesian Navy. This year is already the fourth edition of the exercise. The exercise will be held from June 5th to 8th in the city of Jakarta, South Sulawesi Province, Indonesia, including the port and sea phases. In the coming days, participating navies from various countries will participate in ship reading style search and rescue exercises, maritime interception and damage management exercises, aerial exercises, and other course objectives exercises

New comment: Donkey like "morale" limit pulls US debt "bomb" fuse hard to dismantle US | debt | morale
New comment: Donkey like "morale" limit pulls US debt "bomb" fuse hard to dismantle US | debt | morale

On the evening of June 1st, the US Senate passed a bill on the federal government's debt ceiling and budget, and the flame of the US debt bomb was temporarily extinguished at the last moment. The two parties in the United States have staged an extreme tug of war over the US debt bomb. Some experts believe that the US debt crisis is the result of the reckless politics promoted by the US dollar hegemony, and the underlying cause of this crisis is the highly polarized political system of the US. Since the end of World War II, the US Congress has adjusted the debt ceiling more than a hundred times. The recurring debt crisis will not only have a catastrophic impact on the US economy and people's livelihoods, but also continuously erode the value of US dollar assets such as government credit and US bonds, bringing significant and far-reaching impacts to the global economic landscape. 【