Pervasive online frauds expose multiple loopholes

Updated: 2016-09-09 07:47

By Li Yang(China Daily)

  Comments() Print Mail Large Medium  Small

Pervasive online frauds expose multiple loopholes

Police officers make a list of bank cards seized in a telecommunication fraud case in Xuchang, Henan province, in January. NIU YUAN/CHINA DAILY

Fraud, like theft, is as old as human history. But in this internet age when information, especially personal information, flows freely fraudsters have become more "skillful". The more technology advances, the easier it becomes for fraudsters to cheat people. For example, a fraudster can send a message to tens of thousands of people at the same time with a single click of the mouse.

But were it not for Xu Yuyu, a college-bound student in Linyi, Shandong province who died recently of a cardiac attack after losing her tuition fees of about $1,500 to a phone fraud, and the attention that her poor family drew, the case would have gone unnoticed like many other small cases that go unreported.

Chinese people lose hundreds of millions of yuan in telecom frauds every year. And some towns in China have become infamous for phone scam gangs.

In fact, Tsinghua University reportedly started conducting security tests on newcomers from this year to prevent potential frauds from enrolling in the institution. Students have to answer about 500 questions on telecom fraud, transportation issues and fire prevention, before they can be admitted. But ironically, while all the anti-fraud measures were being put in place, police said last week that a teacher of the university had lost millions of yuan to a phone scam.

So subjecting students to a "scam test" is not enough-we also need legal measures to tackle telecom frauds.

China has more than 700 million internet users, the largest in the world. Yet while all countries with large populations of internet users implemented a law on personal information protection in the previous decade, China still does not have such a law, let alone legislation on self-regulation of the online industry when it comes to personal information security.

Previous Page 1 2 Next Page

0