Guangdong Information Has New Regulations: Stealing QQ Accounts Can Be Fined Up To 15,000 RMB_

by 51ipw on 2008-04-17 21:16:39

Today is April Fool's Day. Be careful not to go too far with jokes on the Internet, or you may get into trouble! Starting from today, the "Guangdong Province Computer Information System Security Protection Regulations" will be officially implemented. Sending information under someone else's name, stealing QQ numbers, spreading malicious software and causing serious consequences can result in a maximum fine of 15,000 yuan. It is reported that this regulation is the first of its kind nationwide to protect the legitimate rights and interests of ordinary Internet users, filling the legal gap at the national level.

Guangdong is truly the top information province in the country, with about 37 million Internet users and more than 300,000 websites, both ranking first in the country. However, while the information network is highly developed, this "double-edged sword" also provides convenience for illegal elements. Activities such as stealing others' accounts and passwords, making others' E-MAIL public, spreading computer viruses... are endless. Therefore, the regulations implemented this time will explicitly prohibit a series of such behaviors, including illegally occupying, using, and stealing computer information system resources, stealing, deceiving, and seizing control of computer information systems, disclosing others' electronic mail addresses and other personal information without authorization, stealing others' accounts and passwords, or disclosing them to third parties without authorization, sending information under someone else's name, deliberately making and spreading malicious software and other destructive programs.

Once these behaviors are carried out, the public security organs may issue warnings, confiscate illegal gains if there are any; impose fines of up to 5,000 yuan on individuals, and up to 15,000 yuan on entities; in serious cases, they may also impose penalties such as suspending networking and shutting down machines for up to six months; those who commit crimes will be held criminally responsible according to law.

Regarding the "network disconnection" penalty, Deputy Director Ning Huijun of the Provincial Public Security Department's Cyber Police Corps also stated that currently, only the computers involved in illegal activities can be disconnected from the network, and it is impossible to restrict illegal actors from accessing the Internet through ID registration. This means that illegal actors can change their IP address or go to an Internet cafe to continue their illegal activities.

■ Characteristics of the Regulations

Information Systems Managed in Five Levels

Emergency Response Plans Should Be Formulated for Systems Above Level Two

Graded management is also one of the characteristics of the regulations. According to the importance of computer information systems in national security, economic construction, and social life, as well as the degree of harm caused by damage to national security, social order, public interests, and the legitimate rights and interests of citizens, legal persons, and other organizations, the systems are divided into five levels. Among them, systems that, when damaged, may cause serious harm to the legitimate rights and interests of citizens, legal persons, and other organizations, or may harm social order and public interests but do not harm national security, are classified as level two.

Ning Huijun introduced that operating and using units of computer information systems above level two should formulate emergency response plans for major emergencies; once a major emergency occurs, take response measures according to the plan. The public security organs and national security agencies of governments at or above the prefecture-level city can take measures such as temporarily shutting down machines, suspending networking, and backing up data within 24 hours in urgent situations where major emergencies endanger national security, public safety, and social stability. It is reported that through graded management, some important government websites and financial institution websites can effectively prevent hacker attacks.

For incidents like the "sex photo scandal," the regulations also have provisions. It stipulates that no entity or individual shall use the computer information system to create, spread, or replicate a series of information, including promoting obscenity, pornography, gambling, violence, murder, terrorism; spreading rumors, publishing false information; inciting mass disturbances; teaching criminal acts; insulting or defaming others, etc.