From elementary school, junior high school, high school to university and even work, many people have come into contact with some classic handwritten newspapers. With the help of handwritten newspapers, we can effectively cultivate our manual and mental abilities. Do you know what kind of handwritten newspapers are of educational significance? The following are the design materials for college students' network security handwritten newspapers that I have compiled for you. I hope they can help you.
"Cybersecurity Law of the People's Republic of China" (Excerpt)
Chapter 4 Network Information Security
Article 40 Network operators shall The user information it collects is kept strictly confidential and a sound user information protection system has been established.
Article 41 When network operators collect and use personal information, they should follow the principles of legality, legitimacy and necessity, disclose the collection and use rules, clearly state the purpose, method and scope of collecting and using information, and With the consent of the person being collected.
Network operators shall not collect personal information unrelated to the services they provide, shall not collect or use personal information in violation of the provisions of laws, administrative regulations and the agreements between the parties, and shall comply with the provisions of laws, administrative regulations and the User's agreement to process the personal information stored by them.
Article 42 Network operators shall not leak, tamper with, or damage the personal information they collect; they shall not provide personal information to others without the consent of the persons being collected. However, this does not apply to cases where a specific individual cannot be identified after processing and cannot be restored.
Network operators should take technical measures and other necessary measures to ensure the security of the personal information they collect and prevent information leakage, damage, and loss. When personal information is leaked, damaged or lost, or is likely to occur, remedial measures should be taken immediately, users should be notified in a timely manner and reported to the relevant competent authorities in accordance with regulations.
Article 43 If an individual discovers that a network operator has collected or used his or her personal information in violation of laws, administrative regulations or the agreement between the two parties, he or she has the right to request the network operator to delete his or her personal information; If the personal information collected and stored by the operator is incorrect, the operator has the right to request the network operator to correct it. Network operators should take measures to delete or correct it.
Article 44: No individual or organization may steal or obtain personal information in other illegal ways, and may not illegally sell or illegally provide personal information to others.
Article 45 Departments and their staff responsible for network security supervision and management in accordance with the law must strictly keep personal information, privacy and business secrets learned in the performance of their duties strictly confidential, and must not disclose, sell or Illegal provision to others.
Article 46 Any individual or organization shall be responsible for their use of the Internet and shall not establish websites used to commit fraud, teach criminal methods, produce or sell prohibited items, controlled items and other illegal and criminal activities , communication groups, and shall not use the Internet to publish information involving the commission of fraud, the production or sale of prohibited items, controlled items, and other illegal and criminal activities.
Article 47 Network operators should strengthen the management of information released by their users. If they discover information that is prohibited from being released or transmitted by laws and administrative regulations, they should immediately stop transmitting the information and take measures such as elimination. Measures should be taken to prevent the spread of information, keep relevant records, and report to relevant authorities.
Article 48: Electronic information sent and application software provided by any individual or organization must not be installed with malicious programs, and must not contain information that is prohibited from being released or transmitted by laws and administrative regulations.
Electronic information transmission service providers and application software download service providers shall perform security management obligations. If they learn that their users have committed the behaviors specified in the preceding paragraph, they shall stop providing services, take disposal measures such as elimination, and preserve relevant information. records and reports to relevant authorities.
Article 49 Network operators should establish a network information security complaint and reporting system, publish information such as complaints and reporting methods, and promptly accept and handle complaints and reports related to network information security.
Network operators shall cooperate with the supervision and inspections carried out by the cybersecurity and informatization departments and relevant departments in accordance with the law.
Article 50: The national cybersecurity and informatization department and relevant departments perform network information security supervision and management responsibilities in accordance with the law. If they discover information that is prohibited from being released or transmitted by laws and administrative regulations, they shall require the network operator to stop the transmission and take measures to eliminate it. and other disposal measures, and keep relevant records; for the above-mentioned information originating from outside the People's Republic of China and other countries, relevant agencies should be notified to take technical measures and other necessary measures to block the spread.
Network safety slogan
1. The Internet is a double-edged sword, and safe use is the key.
2. Traveling through the Internet is a time of great danger and danger, and the benefits of bringing security are endless.
3. Establish network security and share the civilization of the University of Technology; protect the information home and pursue the dream of the University of Technology.
4. Convenience is at your fingertips, safety is in your mind.
5. The network serves all walks of life and ensures security and reform and development.
6. Strengthen data security protection and prevent online fraud and scams.
7. The online identity is trustworthy and the network security is guaranteed.
8. Everyone is involved in cyber security, and “trust” is a blessing to millions of families.
9. The Internet forms a network, and we will never forget each other; be kind and kind, and do good deeds.
10. Internet security ensures national security, and national security ensures people’s security.
11. If the Internet is secure, the world will be safe; if the Internet is lost, the world will be lost.
12. Effectively enhance network security awareness and improve the ability to detect and prevent fraud.
13. Fulfill the responsibilities of network security and enjoy the convenience of the Internet.
14. Build a safe network and enjoy a civilized society.
15. Build a solid foundation for network security and realize the dream of becoming a network power.
16. Establish network security and enjoy network civilization.
17. We share the responsibility for network security and enjoy the Internet life.
18. Combat illegal crimes on the Internet and jointly resist online rumors.
19. Build network security and protect our green home.
20. Improve network security awareness and create a safe network environment.
21. Network security starts with virtue, and a safe network must be practiced vigorously.
22. Use the Internet in a civilized manner to lead fashion, and strengthen security to achieve your dreams.
23. Please fasten your seat belt when taking the Information Express.
24. Surf the Internet safely and grow up healthily. Use the Internet in a civilized manner and let your dreams fly.
25. Network security is more important than Mount Tai, and everyone is responsible for building harmony.
26. Lock up your privacy and keep scammers away from me.
27. Gain more network protection skills and more information security assurance.
28. The Internet creates a happy era and protects green homes safely.
29. Consolidate network security and create a harmonious society.
30. Internet fraud is full of tricks. Do not take advantage of others so that lawbreakers have no chance to take advantage of them.
31. The Internet connects you and me, and security depends on everyone.
32. Let’s work together to build the Chinese dream and work together to build a network power.
33. Fortunately, after ten years of hard work, the Internet lost all its money.
34. Protect the people’s network and build a strong network country.
35. When it comes to everything in the world, An An is the first priority.
36. Protect network security and protect your spiritual home.
37. Weave a safety network and build a happy life.
38. A cyber society is a society governed by law, and cyber police protect cyberspace.
39. Promote honesty and trustworthiness, abandon fraud, and promote network security and credibility.
40. Establish network security awareness and don’t think about nameless benefits.
41. Strengthen awareness of prevention and strictly guard personal information.
42. Many networks form a network, and security is the pulse. Walk with me, virtue is the way.
43. Protect network security and protect your spiritual home.
44. Create a healthy network environment and ensure that netizens can surf the Internet without worries.
45. Cultivate network virtue, think diligently about network, understand network safety, and conduct good network.
46. Network security is about you, me and him.
47. Keep network security in mind and enjoy high-quality resources.
48. The network environment must be purified, and it is up to everyone to prevent fraud.
49. The string of security must be tightened, Internet fraud is a poisonous pie.
50. Network security is about you, me and him.
51. When it comes to everything in the world, An An is the first priority.
52. Network security starts from the heart, and a safe network is practiced in action.
53. Build a safe network and enjoy a civilized society.
54. Establish network security awareness and don’t think about nameless benefits.
55. Promote honesty and trustworthiness, abandon fraud, and promote network security and credibility.
Internet Security Composition
The Internet is an invisible friend that can bring us a lot of knowledge and news. The Internet has many benefits for both work and study. It can search for tourist attractions around the world, and it can also find the knowledge and related information you need. At the same time, the Internet also has some bad aspects, so young people should be more selective when surfing the Internet. Students who use computers to help them study now will definitely become talents useful to the country in the future.
To access the Internet, you must first click adsl to connect to the network. After connecting, click Internet to access the Internet. After surfing the Internet, you have to choose a website. There are several websites I know, such as Sina, Sohu, Yahoo, Baidu, etc. The most suitable website for our young friends is Chuying.com, which is a website that adapts to our thoughts. You can also buy things on eBay, Alibaba and other websites, which provides convenience to people who don't have time to go out to buy things. Moreover, they also implement cash on delivery, so people don't have to worry about the goods being bad.
Teenagers should not spend too long on the Internet. They should take a break while looking at the computer. Use the Internet appropriately, but don’t become addicted. In the process of playing, you must pay attention to your polite words and be responsible for your words. At the same time, do not easily upload your true personal information online, do not casually go out on dates with netizens, and do not casually invite netizens to visit you. I think that while keeping these elements in mind, surfing the Internet will not cause parents to change their faces when talking about the Internet. And we can also safely understand from the Internet that "water can carry a boat, but it can also overturn it." For example, in life, basically every student has a QQ of his or her own. In the beginning, QQ was just a communication tool between people. Slowly, some students began to curse and say dirty words...
During the learning process, everyone will encounter questions that they cannot do, or need to look up information. At this time, we will use Baidu search. At this time, some undesirable elements will take advantage of the situation and pop up some "yellow" spam websites. In this case, we cannot click to enter to prevent bad elements from taking the opportunity to steal our important information, and also to prevent ourselves from going crazy and committing crimes.
When making friends on QQ, we must think twice and choose carefully. Don't add friends randomly, otherwise it will cause unnecessary trouble. There is a living example around me: Once, a little girl met a "friend" online, and soon they became QQ friends. Later, the friend asked her to go to a place to play, and the little girl was happy He agreed and walked out of the house alone. At the end of the day, it turned out that they were some bad elements, completely different from what they said on QQ. Just like that, she was ruthlessly taken away.
Of course, the advantages of the Internet outweigh the disadvantages. Many websites are regular green websites, and there are many websites similar to safety education platforms. These websites can enhance your awareness of prevention and broaden your horizons. Even a lot of study and work are inseparable from the Internet. With the Internet, we can know the outside world without leaving home.
The Internet is like a double-edged sword. If you use it well, you can achieve great things. If you use it poorly, it will put you in danger. Therefore, we must keep our eyes open during use.