Can I take a screen name casually?Be careful, there may be illegal involvement!

Mondo Social Updated on 2024-01-28

In this era of 5G surfing, both men and women, young and old, will socialize, entertain and shop on the Internet, and Internet user account information such as screen names and avatars have become an important identity for us on the Internet. Who hasn't had a few "Jianghu titles" these years, butCan you really take a screen name casually?What are the rules that should be followed for Internet user account information?Let's find out!

Provisions on Internet user account information

For Internet users

Where the registration or use of account information by individual internet users contains professional information, it shall beConsistent with the individual's real professional information.

2.Internet institutional users shall register and use account informationConsistent with the name of the institution, logo, etcIt is consistent with the nature of the institution, the scope of business and the type of industry to which it belongs.

Accounts that are registered to engage in Internet news information services, online publishing services, or the production of information content in fields such as the economy, education, medical and health, and justice should be registeredProvide corresponding administrative licenses or service qualifications, practice qualifications and other materials.

4.No counterfeiting, counterfeiting, fabricationThe names and logos of political parties, party, government, and military organs, enterprises and institutions, people's organizations, and social organizations.

5.No counterfeiting, counterfeiting, fabricationThe name and logo of the country (region) and international organization.

6.No counterfeiting, counterfeiting, fabricationThe names and logos of news**, newspapers and periodicals, radio and television organizations, news agencies, etc., or the unauthorized use of names and logos with news attributes such as "news" and "reports".

7.No counterfeiting, counterfeiting, or malicious associationGeographical names and logos of important spaces such as national administrative regions, institutional locations, and landmark buildings.

8.It must not be for the purpose of harming the public interest or seeking improper benefitsDeliberately entrained***mailbox, **, etc., or use homophonic, homophonic, similar words, numbers, symbols and letters, etc.

9.It must not contain unworthy or exaggerated statementsand other content that may deceive or mislead the public.

10.No, you cannotContains other content prohibited by laws, administrative regulations, and relevant state provisions.

For Information Service Providers

Sound and soundDynamic verification system for account informationWhere it is found that it does not comply with these provisions, it shall suspend the provision of services and notify users to make corrections within a set period of time;and where corrections are refused, the provision of services shall be terminated.

2.Protect and handle personal information in Internet user account information in accordance with lawWe will also take measures to prevent unauthorized access, leakage, falsification, and loss of personal information.

If it is discovered that Internet users' registration or use of account information violates laws, administrative regulations, or the above provisions, it shall:It is to be taken in accordance with the law and the contractWarning and reminder, correction within a time limit, restriction of account functions, suspension of use, closure of account, prohibition of re-registration and other measuresKeep relevant recordsand promptly report to the relevant departments such as for internet information.

Sound and soundInternet user account credit management systemMake credit assessments related to account information an important reference index for account credit management, and provide corresponding services on this basis.

Set up conveniently in a prominent locationComplaint and report portalAnnounce the methods of complaints and reports, improve mechanisms for acceptance, screening, disposal, and feedback, and clarify the handling process and feedback time limitHandle complaints and reports from users and the public in a timely manner.

Illegal Internet user accounts

1.Pretending to be a staff member of a state agency or a police officer

Relevant laws and regulations provide that those who pretend to be employees of state organs to deceive and deceive shall be punishedfixed-term imprisonment of not more than three years, short-term detention, controlled release, or deprivation of political rightsï¼›where the circumstances are serious, it is to be punishedBetween three years and less than ten yearsPrison. Those who pretend to be people's police to swindle and deceive are to be given a heavier punishment in accordance with provisions.

2.Pretending to be a soldier to swindle

According to the relevant laws, those who pretend to be military personnel to deceive and deceive shall be punishedLess than three yearsfixed-term imprisonment, criminal detention, surveillance or deprivation of political rights;where the circumstances are serious, it is to be punishedBetween three years and less than ten yearsPrison.

3.Infringing on the reputation and honor of heroes and martyrs

Relevant legal provisionsInsulting, defamatory, or otherwiseWhere the reputation or honor of heroes and martyrs is violated, harming the public interest, and the circumstances are serious, punishment is givenLess than three yearsfixed-term imprisonment, criminal detention, surveillance or deprivation of political rights;

4.Committing fraud

Relevant laws and regulations provide that where the amount of public or private property is defrauded, the amount is relatively large, it is to be punishedLess than three yearsfixed-term imprisonment, short-term detention or controlled release, and/or a fine;where the amount is huge or there are other serious circumstances, it is to be givenBetween three years and less than ten yearsfixed-term imprisonment and a fine;where the amount is especially huge or there are other especially serious circumstances, it is to be givenMore than ten yearsfixed-term imprisonment or life imprisonment and a concurrent fine or confiscation of property. Where the Criminal Law provides otherwise, follow those provisions.

The Internet is not a place outside the law, if you encounter the above-mentioned behaviors that endanger network security on the InternetPlease actively report to the departments of internet information, telecommunications, public security, etc.

More legal issues,It is recommended that you join the legal protection networkConsult the legal counsel of the legal insurance network to help you comprehensively analyze the pros and cons, learn more legal information, obtain professional legal guidance, and reduce the damage to your rights and interests.

*From the Internet, invaded and deleted.

Related Pages