"Cloud Backup" era mobile phone address book should be entrusted to who custody?

Source: Internet
Author: User
Keywords Mobile phone Address Book mobile phone users cloud Backup selection security

Recently, mobile phone address book backup and based on mobile phone address book acquaintances free chat software more and more, for example, friends record, spark, micro-letter, rice Chat, Grand Kiki, QQ Address Book, QQ Sync Assistant, Aliyun mobile phone, Huawei Cloud mobile phone, millet mobile phone, these software are playing to protect the user Address Book Privacy security, prevent Address book loss, Do not upload the user address Book and other slogans, but users are still worried about the 2009 3 15 party A large number of mobile phone user information was sold news of their own.

So, in the end, we should give the phone address book who custody?

Mobile Address Book is the most important privacy of users

Mobile phone directory is the most important mobile phone users of the privacy and virtual property. If the QQ number and so on is also a more virtual user relationship, then the relationship between mobile communication is more practical, which includes relatives, friends, classmates, colleagues, partners ...

Mobile phone loss may be distressed by the user is not a mobile phone, but the phone store a large number of Address book information and text messages, photos and other virtual assets. So if the mobile phone address Book can be uploaded to the network to save, can be in the phone in case of loss and damage, and then recover from the network to the new phone. This is also a variety of mobile phone address book software to provide users with the main services.

In addition, also based on mobile phone address list of various types of Kik instant chat tools have sprung up, the main "free" and acquaintances to communicate, omit the message fee. And the software will also call the phone address Book, and before the call to inform users do not violate user privacy.

Phone Address Book backup and call no security standards

However, 2009 years 3 15 party, a large number of mobile phone user data was illegally sold, resulting in user privacy leaks so that more and more mobile phone users worry about their own numbers and information has been betrayed. In fact, when users fill in the purchase of a house, buy a car and the website mobile phone number registration, the user's mobile phone number and other information are illegally sold.

Usually many users have received various types of spam messages and sales calls, but also because your mobile phone number has been sold. The reasons for the sale of mobile phone users ' information are mainly due to the lack of industry laws and regulations, and the punishment for violating user's privacy crime is not big enough. Coupled with the user forensics difficulties, resulting in the sale of mobile phone user information has been repeatedly exposed but still can not be banned.

Now all kinds of mobile phone backup software, Kik software and mobile phone address Book This is the most private information to deal with, but currently on the Address Book backup and call no clear laws and regulations, there is no security standards, users can not be assured that the phone address book to the enterprise.

Experts for mobile phone users to support three strokes:

In this respect, mobile phone security experts to remind users to choose Mobile phone Address Book backup and class Kik software needs to grasp the following three standards:

The first one: choose the products that have been developed by the big companies with Word-of-mouth. The user privacy protection good big company, has the good reputation in the profession, does not take the user's privacy sale profit, does not do harm the user benefit the matter.

Article II: Choose the ability and experience to maintain a large number of user information and virtual property security companies. Cloud Backup Although the mobile phone address book upload to the network, but the protection of the server is not hacker attacks, information is not disclosed, this is the need for capacity and experience, to choose the ability and experience of the enterprise.

Third: Choose not to be quick, do the enterprise has the bottom line, not rogue company. Some small companies and no bottom line enterprises, has always been duplicity, the user choice and the right to know has always been ignored, and under the pressure of profit is likely to take mobile phone user privacy surgery, and users are difficult to find. Therefore, must not choose those who violate the interests of users "record" of the enterprise research and development products.


Finally, call on the mobile Internet industry authorities and the legislature, as soon as possible to improve the use of cloud Backup and class Kik software norms and security rules, while the user privacy violations of the situation legislation to prevent the moral bottom line of the company to steal the privacy of mobile phone users for commercial purposes.

(Responsible editor: Lu Guang)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.