<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Personal information &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/personal-information/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Wed, 16 Jun 2021 16:19:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>Protecting personal information requires special law support</title>
		<link>https://en.spress.net/protecting-personal-information-requires-special-law-support/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 16:19:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[law]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[Protecting]]></category>
		<category><![CDATA[requires]]></category>
		<category><![CDATA[special]]></category>
		<category><![CDATA[Support]]></category>
		<guid isPermaLink="false">https://en.spress.net/protecting-personal-information-requires-special-law-support/</guid>

					<description><![CDATA[On May 21, the Cyberspace Administration of China issued a notice on 105 apps that illegally collect and use personal information on its official website. Many of the apps that people know and use in their daily lives are due to Illegal acquisition, excessive collection, excessive claims, etc. The reason for the infringement of personal [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>On May 21, the Cyberspace Administration of China issued a notice on 105 apps that illegally collect and use personal information on its official website. Many of the apps that people know and use in their daily lives are due to<strong> Illegal acquisition, excessive collection, excessive claims, etc.</strong> The reason for the infringement of personal information appears on this list.</p>
<p> <img fifu-featured="1" decoding="async" class="content-picture" src="https://inews.gtimg.com/newsapp_bt/0/13550777379/1000"> Short video apps notified This is not the first time that the relevant national authorities have notified the app to collect and use personal information in violation of laws and regulations. On the 1st and 10th of this month, the State Cyberspace Administration of China reported 33 and 84 apps of different categories with the same problems. For a long time, the special management of the illegal collection and use of personal information by apps has been one of the focuses of the daily work of multiple departments. In the era of big data, personal information is the most important information asset.<strong> Any market entity that owns information assets, even if it does not use the data for software development and operation, can still profit from it only through authorized use or sale of the information.</strong> It can be said that in the information age, rich and specific information samples are precious capital and resources. <strong> The development of big data is the general trend of science and technology, and it is natural not to waste food due to choking, but the trouble that big data brings to people is just like a throat.</strong> Therefore, while enjoying the technological dividends brought by big data, people have never stopped the debate about &#8220;data for good&#8221; or &#8220;data for evil&#8221;. But in fact, there is no such thing as &#8220;good&#8221; or &#8220;evil&#8221; in the data itself.<strong> The &#8220;good&#8221; and &#8220;evil&#8221; of data technology products are purely the &#8220;productization&#8221; of the values ​​and ethics of data product developers.</strong> To correct the &#8220;evil&#8221; orientation of products, it is necessary to restrict these products and trace back to the developer&#8217;s responsibility, so as to stop evil and promote good. The development of the digital economy is inseparable from the reasonable and legal use of personal information. &#8220;Data for good&#8221; is the result of the reasonable and legal use of personal information. Facts have proved that &#8220;data for good&#8221; will not be realized automatically.<strong> Any &#8220;good&#8221; development is the result of laws and regulations, and the result of effective supervision by regulatory agencies.</strong> <img decoding="async" class="content-picture" src="https://inews.gtimg.com/newsapp_bt/0/13563455915/1000"> The content of this official notification is only the issue of the illegal collection and use of personal information by the App. However, how to deal with the personal information collected through illegal methods does not appear in the official notification. The cross-border fraud calls that people generally receive, and the precise advertising pushes they receive from social tools, all use personal information that has been collected and stored in the database. Whether these massive amounts of data can be stored encrypted, never leaked, and strictly used, as stated by the market subject to which the App belongs, is usually impossible to verify. In this regard, in addition to<strong> Continue to strengthen market supervision of apps</strong> In addition to<strong> Strengthen coordination on laws and regulations</strong> , Systematize the &#8220;Civil Code&#8221; and other legal systems related to citizens&#8217; personal information rights and interests, block the gaps between laws, and prevent &#8220;evil&#8221; apps from exploiting legal loopholes. In the era of big data, individual citizens have certain technical difficulties to protect personal information. This difficulty is reflected in the asymmetry between App users and App developers in terms of technology and other market resources. This also means that<strong> The most effective way to protect personal information is still the due diligence of the market supervision department, and the &#8220;Personal Information Protection Law&#8221; that is still under formulation also needs to be implemented as soon as possible.</strong> <strong> Hot video recommendation</strong> more content attention&#8221;<strong> Bright Times</strong> &#8220;<strong> WeChat video account</strong> Source: Guangming Net Editor in charge: Wang Yuanfang Editor: Zhang Xueyu Wu Yaqi</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23904</post-id>	</item>
		<item>
		<title>Don&#8217;t play with customer data</title>
		<link>https://en.spress.net/dont-play-with-customer-data/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 03 Jun 2021 01:10:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[administration]]></category>
		<category><![CDATA[Bank]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Debt]]></category>
		<category><![CDATA[dont]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Incident]]></category>
		<category><![CDATA[Information system]]></category>
		<category><![CDATA[Institutions]]></category>
		<category><![CDATA[Joke]]></category>
		<category><![CDATA[KYC]]></category>
		<category><![CDATA[mind]]></category>
		<category><![CDATA[Operational]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[play]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Resources]]></category>
		<category><![CDATA[safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Warning]]></category>
		<guid isPermaLink="false">https://en.spress.net/dont-play-with-customer-data/</guid>

					<description><![CDATA[Data is an extremely valuable economic resource, many businesses and fields depend on it. In the banking sector (NH), customer data is many times more important, because it is not only basic personal information, but also the status of customers&#8217; assets, balances, and cash flows. . Security so that customer data is not exposed (breach) [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Data is an extremely valuable economic resource, many businesses and fields depend on it. In the banking sector (NH), customer data is many times more important, because it is not only basic personal information, but also the status of customers&#8217; assets, balances, and cash flows. . Security so that customer data is not exposed (breach) is one of the top concerns of these financial institutions, so banks have to invest a lot of effort and money.</strong><br />
<span id="more-20177"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_31_318_39021011/cbfbeec36e8087dede91.jpg" width="625" height="886"> </p>
<p> <strong> A wake-up call about SMALL governance</strong> Recently, on social networks in Vietnam, a computer screen shot of a famous artist&#8217;s NH account statement related to the incident has attracted a lot of public opinion. Although NH has admitted that its employees spread the word, this is a wake-up call for those working in the banking sector, as well as the leaders of these organizations. In the era of information technology, customer data security can be said to be the most important for banks. Previously, the prestige of the banks was in the solidity of the safes, which were dug deep in the tunnels, through many layers of thick steel doors, resistant to fire and explosion and even earthquakes. Today it is the NH&#8217;s security system. Because most assets and liabilities are stored in the form of numbers, lines of data. The disclosure of customer data is often considered an accident of the security system, due to unintentional human error, or due to an external attack. But security risks do not only come from information technology systems. There are three places where security risks arise, that is from a governance perspective in relation to processes, monitoring, information systems, and operations. The above incident shows an error in the operation of the staff, related to the management of the bank. Normally, when signing a work contract, in the contract terms, of course, there must be things that employees must not do, not to mention the business ethics of the industry. And so this is not entirely the fault of the staff, NH is also responsible for regular training, as well as supervision. The consequences of customer data being disclosed are serious on several levels. For example, the bank must be responsible for the damages incurred because the customer account is attacked individually, or the entire information system of the bank is the prey of hackers. Equally important damage is the reputation of NH. As a customer, no one wants to send money or do business with NH but &#8220;house&#8221; is loose. The more important partners are not. <strong> NH is also confused</strong> Customer data in banks is the survival of banks. Security is the new generation of &#8220;safes&#8221;, and the prestige lies in the system, as well as the consciousness and skills of the key holders. In the matter of customer data, banks also have a big confusion between needing a lot of customer data (KYC), security and customer privacy (privacy). Banks themselves also need a lot of KYC, not only to manage risks, but also to develop services to provide to customers, especially cross-selling and value-added services. State regulatory agencies also require banks to perform KYC, mainly for the purpose of anti-money laundering and illegal activities. But when customer data increases, integration from many sources, many systems with heterogeneous standards or formats, is a huge challenge for NH&#8217;s information system. Because the more sources, the more &#8220;entrances&#8221; there are more exposed points, many places can be hacked. The collection of customer data is also met with a certain reaction from them because of privacy. In many developed countries, such as Europe with the General Data Protection Regulation 2016/679 aka GDPR, there is a huge shift from service providers in general and the sector. NH in particular. There are data, currently NH wants to collect the consent of customers. In short, customer data in banks is the survival of banks. The security is a new generation &#8220;safe&#8221; form, and the prestige lies in the system, as well as the consciousness and skills of the key holders. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_31_318_39021011/e43dcc34db7632286b67.jpg" width="625" height="468"> <strong> Domestic banks need to pay attention</strong> In terms of customer data security risks, domestic banks compete with each other in technology and there is almost no big difference between banks in the same group, for example, large banks have enough resources to Get the best system. Even later banks have an advantage because technology costs decrease over time. The problem for data security, therefore, mainly lies in the management system of the bank, as well as in the daily operation. In administration, besides processes and monitoring systems, leaders&#8217; awareness of security issues is extremely important. Not only investing properly for the information technology system, leaders must always closely monitor this issue, considering this as their important task. Therefore, there is a need for consistent direction and coordination between the banks&#8217; departments, considering this as the core activity of the bank. In the course of daily operations, it is the awareness and skills of the employees. Periodic and continuous training is absolutely necessary for all employees, especially functions and positions of authority. If the employee is aware of the seriousness of the disclosure of the customer&#8217;s account, no employee would dare to act so impulsively, not to mention, besides internal handling, it may also be involved in legal regulations .</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20177</post-id>	</item>
		<item>
		<title>Raise awareness of personal data protection</title>
		<link>https://en.spress.net/raise-awareness-of-personal-data-protection/</link>
		
		<dc:creator><![CDATA[Đặng Ngọc]]></dc:creator>
		<pubDate>Sat, 22 May 2021 05:58:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Advanced]]></category>
		<category><![CDATA[Awareness]]></category>
		<category><![CDATA[Beauty salon]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Collect]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[dentistry]]></category>
		<category><![CDATA[Dismantled]]></category>
		<category><![CDATA[Electric]]></category>
		<category><![CDATA[Electrical company]]></category>
		<category><![CDATA[Illegal]]></category>
		<category><![CDATA[line]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[Police Department]]></category>
		<category><![CDATA[protect]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[Purchase]]></category>
		<category><![CDATA[raise]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Store goods]]></category>
		<category><![CDATA[usurp]]></category>
		<guid isPermaLink="false">https://en.spress.net/raise-awareness-of-personal-data-protection/</guid>

					<description><![CDATA[The Department of Cybersecurity and High-Tech Crime Prevention of the Ministry of Public Security has just dismantled a large-scale data collection, appropriation, and trading line in Vietnam. Accordingly, the subjects in this line have illegally collected, appropriated, bought, sold and used nearly 1.3 thousand GB of data containing billions of information about individuals and organizations [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The Department of Cybersecurity and High-Tech Crime Prevention of the Ministry of Public Security has just dismantled a large-scale data collection, appropriation, and trading line in Vietnam.</p>
<p> Accordingly, the subjects in this line have illegally collected, appropriated, bought, sold and used nearly 1.3 thousand GB of data containing billions of information about individuals and organizations nationwide. The dismantling of the above-mentioned large-scale data collection, appropriation and trading line shows the efforts of the police sector in strictly dealing with the theft and illegal use of personal data for handling. according to the provisions of law, creating a deterrent; and at the same time prevent cybercriminals from taking advantage of this information to commit fraud, appropriate property and limit the use of personal information to send spam messages, make &#8220;terrible&#8221; calls. dad&#8221; advertising&#8230; It is worth noting that the personal information being traded in the above line is the customers of the banks; power companies, finance, securities, insurance; electronics and fashion stores; services: spa, dental, beauty salon&#8230; There is even a list of parents, students, household registration, phone subscribers&#8230; Thereby showing that, in order to obtain the personal data of users, in addition to the sophisticated tricks of the perpetrators, there is also the subjectivity and neglect of many people in the security of personal information. Currently, many people are willing to provide personal information (name, address, phone number, email &#8230;) to participate in promotions, sweepstakes, purchase online&#8230; helping the subjects steal information easily. Therefore, in addition to the investigation and handling of the subjects who steal and illegally use personal information, in order to protect themselves, each individual must raise the awareness of protecting personal data, do not provide information easily, avoid becoming a victim of fraudsters or being bothered by unwanted messages and phone calls.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17269</post-id>	</item>
		<item>
		<title>Seriously implement a right policy</title>
		<link>https://en.spress.net/seriously-implement-a-right-policy/</link>
		
		<dc:creator><![CDATA[ÐÔNG Á]]></dc:creator>
		<pubDate>Thu, 20 May 2021 00:32:31 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Card]]></category>
		<category><![CDATA[Chip mount]]></category>
		<category><![CDATA[Citizen]]></category>
		<category><![CDATA[Distorted]]></category>
		<category><![CDATA[Estonian]]></category>
		<category><![CDATA[ID]]></category>
		<category><![CDATA[ID card]]></category>
		<category><![CDATA[Identification]]></category>
		<category><![CDATA[Identity card]]></category>
		<category><![CDATA[implement]]></category>
		<category><![CDATA[Papers]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[QR code]]></category>
		<category><![CDATA[Respectable]]></category>
		<category><![CDATA[Undertakings]]></category>
		<guid isPermaLink="false">https://en.spress.net/seriously-implement-a-right-policy/</guid>

					<description><![CDATA[Over the past time, functional agencies in provinces and cities across the country have been actively implementing the issuance and exchange of citizen identification cards (CCCDs) with electronic chips, in order to achieve the goal by January 1. From 7-2021, 50 million cards will be issued. Police of Thanh Xuan district (Hanoi) carry out procedures [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Over the past time, functional agencies in provinces and cities across the country have been actively implementing the issuance and exchange of citizen identification cards (CCCDs) with electronic chips, in order to achieve the goal by January 1. From 7-2021, 50 million cards will be issued.</strong><br />
<span id="more-16359"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_14_38796629/5ea9924d8c0f65513c1e.jpg" width="625" height="390"> </p>
<p> <em> Police of Thanh Xuan district (Hanoi) carry out procedures to issue citizen identification cards with chips for people. Photo: DANG ANH</em> Over the past time, functional agencies in provinces and cities across the country have been actively implementing the issuance and exchange of citizen identification cards (CCCDs) with electronic chips, in order to achieve the goal by January 1. From 7-2021, 50 million cards will be issued. CCCD cards with electronic chips are considered an inevitable trend, in order to keep up with the current 4.0 technology trend along with the State&#8217;s efforts in reducing administrative procedures, contributing to the drastic reform of management. , creating favorable conditions, helping people to carry out administrative procedures and civil transactions&#8230; However, instead of supporting a right policy, some subjects sought to oppose and take advantage of them. social networks to attack, distort, and give false information to confuse public opinion about the issuance and change of CCCD&#8230; On September 3, 2020, the Prime Minister signed Decision No. 1368/QD-TTg approving the investment policy of production projects, granting and managing citizen identity, which defines the objectives of the project. The project is: Building a unified CCCD database nationwide, collecting and managing CCCD registration data automatically on information technology infrastructure to help store, retrieve, share, find information quickly and conveniently; improve the efficiency of state management of CCCD, create favorable conditions for citizens while carrying out administrative procedures and civil transactions; towards building e-Government, creating a breakthrough in socio-economic development of the whole country; contribute effectively to the fight against crime&#8230; If compared with the current ID card and CCCD, we will see that the chip-mounted CCCD has outstanding advantages. Specifically, each card is integrated with 20 residential data fields related to each individual with many accompanying applications such as: digital signature application, biometric application, one-time password application, lowering public key layer,&#8230; thereby allowing users to connect to public and private services quickly and conveniently. Not only that, the chip-mounted CCCD is manufactured using modern technology, is flexible in changing and adding personal information, has high security, helps to identify and identify accurately, so it minimizes the risk. theft or forgery to use for dark purposes. Now with the new CCCD when making transactions, individuals will not need to carry many documents (for example household registration, birth certificate, marriage registration, &#8230;) because this information is already available. stored and integrated in the card. Thanks to that, everyone has the conditions to make transactions quickly and conveniently, reducing travel time and costs for backing up and notarizing documents&#8230; Therefore, it can be affirmed that the CCCD card with a chip is a step forward in applying science and technology to state management activities, helping administrative reform effectively. This is also an important basis contributing to the realization of the goal of building an e-Government that the Party and State are setting, and the people are the beneficiaries. Not to mention, in the context of the strong development of the 4th industrial revolution, when the trend of digital transformation takes place in all fields, it becomes even more necessary to make CCCD cards with electronic chips. , contributing to the country&#8217;s quick access to the development trend in the world. In fact, the use of a chip-mounted CCCD card is the optimal choice in many countries. Statistics from the authorities show that there are about 70 countries using this card, even some countries have used CCCD chips since the 90s of the last century. Along with the development of science and technology, chip cards are increasingly effective in social life. In Estonia (Etonia), since 2002, the country has been using a chip-based CCCD card for people called ID Kaart to replace traditional identification documents. Since then, the Kaart ID has been used by people in this country to identify identities, health checks, vote elections, business registration, &#8230; as well as perform other electronic transactions. Not to mention, ID Kaart can also replace passports when people travel within the country, as well as to EU countries (European Union &#8211; European Union). Continuing to upgrade to increase security and maximize use efficiency, in September 2018, Estonian authorities put into application the Smart-ID digital identification system (providing and verifying digital identity). digital identity) using a chip that uses 384-bit ECC public key encryption and a QR Code (quick response code) for the Kaart ID. This country has set a target that by 2025 the number of e-citizens will reach 10 million, 8 times higher than the current population. Similar to Estonia, Argentina&#8217;s (Argentine) chip CCCD card named DNI integrates a lot of personal information, including credit account information. Or the CCCD card of Malaysia (Malaysia) is MyKad which integrates personal information such as passport, driver&#8217;s license, health information, &#8230; and also has the functions of electronic wallet, access ATM card access, mobile applications and PKI (for electronic transactions). Every Malaysian citizen is issued a MyKad card, but it is divided into three groups, including: MyPR (Malaysian permanent resident), MyKas (short-term resident of Malaysia) and MyKid (Malaysian citizen under 12 years old) year old). In many other countries, the CCCD chip card also integrates information related to the driver&#8217;s license (such as in Germany, Turkey, Argentina&#8230;), thereby helping to significantly reduce traffic violations; or people can use the CCCD chip in public, administrative and social services (such as in Japan, Korea,&#8230;). Grasping that inevitable trend, based on the existing conditions in terms of human resources, material resources and science &#8211; technology, in 2021, the issuance of CCCD card with official chip will be implemented synchronously by Vietnam on a large scale. country. In order to effectively implement this policy, propaganda has been promoted in the mass media. The functional agencies actively went to the villages and hamlets to mobilize people to make cards. In some agencies, units, schools, the issuance and replacement of CCCD cards is done on the spot. In localities, registered people have been given timed tickets, helping to reduce travel and waiting time. Even in some areas, the police in charge of the area also texted, went to each house to urge the card making. In many places, card making is done 24 hours a day to create the best conditions for people, especially those who are busy working during office hours, working in shifts, so time is tight&#8230; However, with the available dark purpose, the desire to restrain the development of Vietnam, the hostile forces and a number of organizations and individuals with a lack of goodwill immediately considered the implementation of the chip-based CCCD card. an opportunity to conduct countermeasures. With a hostile and extreme attitude, some subjects immediately posted misleading information and images. They blatantly claim that the installation of chips on CCCD cards is for the State to strengthen control over people, people lose their freedoms and have their privacy violated. Even blatantly slandered with the issuance of CCCD cards this time, people turned into &#8220;herd animals&#8221;, or compared &#8220;in some advanced countries, electronic chips are often attached to prisoners to serve prison sentences. stay at home&#8221;, thereby loudly saying that this is a sign of loss of &#8220;democracy and human rights&#8221;, calling on people not to cooperate with authorities, not to make CCCD cards with chips. Notably, some people because of lack of information and ignorance have rushed to believe and follow, continue to spread misinformation, malicious rumors, thereby arousing suspicion, confusion, Doubt in public opinion&#8230; It must be said that, whether intentionally distorting or unconsciously, such acts have hindered the implementation of a correct policy of the State. In order to promptly correct the above negative manifestations, in the past time, some individuals who have reported falsely about making CCCD cards with chips have been handled in accordance with the law. As at the end of last April, the police of Dak Lak province summoned Bui Thi Thanh T. (Hoa Thang commune, Buon Ma Thuot city) for posting incorrect comments about the job of CCCD. At the police station, T. admitted his work was against the law, so he deleted the comment and pledged not to repeat the offense. This is an example that people have to be very vigilant, if they don&#8217;t want to abet law violations, they need to be alert to inaccurate information, especially information of a deductive and fabricated nature. unfounded. Every citizen should always be aware and believe that the Vietnamese Party and State always strives for the legitimate rights and interests of the people. Article 3 of the Constitution (added and amended in 2013) affirms: “The State ensures and promotes the people&#8217;s right to mastery; recognize, respect, protect and guarantee human and citizen rights; realize the goal of rich people, strong country, democracy, justice and civilization, where everyone has a prosperous, free and happy life and has conditions for comprehensive development. This principle has always been consistently expressed in all lines and guidelines of the Party, and policies and laws of the State. Attaching electronic chips to CCCD cards, too, is a policy in line with the development trend of the country, the provisions of the law, and ensuring the information security of all people. The electronic chip on the CCCD card is not for locating, not infringing on the freedom of movement and privacy of each individual. When the card is lost, due to the identification control mechanism, personal information is not disclosed, only the cardholder can activate and use it. With a clear awareness of this issue, each individual will have the right behavior, believe and seriously implement the policy of the State. It is also a practical way to protect individual and community interests and contribute to the country&#8217;s socio-economic development.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16359</post-id>	</item>
		<item>
		<title>Launching 5-layer protection solution, attack prevention for digital transformation</title>
		<link>https://en.spress.net/launching-5-layer-protection-solution-attack-prevention-for-digital-transformation/</link>
		
		<dc:creator><![CDATA[Thanh Hà]]></dc:creator>
		<pubDate>Wed, 19 May 2021 12:25:13 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[5layer]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Bkav]]></category>
		<category><![CDATA[Bkav 2021]]></category>
		<category><![CDATA[Bkav Endpoint]]></category>
		<category><![CDATA[Bkav Endpoint 2021]]></category>
		<category><![CDATA[Bkav Pro 2021]]></category>
		<category><![CDATA[Bkav Technology Group]]></category>
		<category><![CDATA[Convert]]></category>
		<category><![CDATA[debut]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Launching]]></category>
		<category><![CDATA[Malware Mã]]></category>
		<category><![CDATA[Network connections]]></category>
		<category><![CDATA[New version]]></category>
		<category><![CDATA[Operating system]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[Prevention]]></category>
		<category><![CDATA[Product sets]]></category>
		<category><![CDATA[protect]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[solution]]></category>
		<category><![CDATA[transformation]]></category>
		<category><![CDATA[Unnecessary]]></category>
		<category><![CDATA[Vu Ngoc Son]]></category>
		<guid isPermaLink="false">https://en.spress.net/launching-5-layer-protection-solution-attack-prevention-for-digital-transformation/</guid>

					<description><![CDATA[Bkav Technology Group this morning (May 11) launched a suite of Bkav 2021 solutions with 5-layer protection technology, attack prevention and control for digital transformation. Bkav&#8217;s suite of application technology solutions with 5 layers of protection. The product set includes antivirus software Bkav Pro 2021 for individual users and Bkav Endpoint 2021 for agencies and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Bkav Technology Group this morning (May 11) launched a suite of Bkav 2021 solutions with 5-layer protection technology, attack prevention and control for digital transformation.</strong><br />
<span id="more-16156"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_8_38803011/5b5d6bf475b69ce8c5a7.jpg" width="625" height="375"> </p>
<p> Bkav&#8217;s suite of application technology solutions with 5 layers of protection. The product set includes antivirus software Bkav Pro 2021 for individual users and Bkav Endpoint 2021 for agencies and businesses. This set of solutions is applied artificial intelligence (AI) to kill viruses even without updating the identification pattern, especially integrating a series of new technologies to protect personal information and user data. Specifically, the set of AI application solutions aims to create a 5-layer protection system including: The network layer is responsible for protecting and monitoring all incoming and outgoing network connections; operating system layer to monitor and detect operating system vulnerabilities; the data layer is responsible for protecting and monitoring changes to data or system configuration; application layer that monitors the behavior and vulnerabilities of applications; The user layer helps ensure enforcement of information security policies. According to Mr. Vu Ngoc Son, Vice President in charge of anti-malware of Bkav, the new version of AI technology applied in Bkav 2021 can identify malicious code up to 99.9% as well as reduce the ability to &#8220;catch&#8221;. clean files down to approximately 0%. This new technology also optimizes performance 144% more than the previous 2020 version. The business version of Bkav Endpoint also provides reporting statistics in the form of a visual Dashboard, helping businesses get an overall picture of the periodic protection situation by week, month, and year, including the number of scanned files. , number of files are malicious code, number of controlled connections, number of dangerous connections blocked, rate of infected malware types, number of times to prevent data encryption, spy attacks, number of holes OS vulnerabilities&#8230; Customers who already have a license will be automatically upgraded to the new version for free from May 11, 2021.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16156</post-id>	</item>
		<item>
		<title>Japan establishes new government agency, promotes digital application</title>
		<link>https://en.spress.net/japan-establishes-new-government-agency-promotes-digital-application/</link>
		
		<dc:creator><![CDATA[Phương Hoa (TTXVN/Vietnam+)]]></dc:creator>
		<pubDate>Mon, 17 May 2021 07:59:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Advanced]]></category>
		<category><![CDATA[AGENCY]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Central authority]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[Engineer]]></category>
		<category><![CDATA[establishes]]></category>
		<category><![CDATA[Goverment]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Government agencies]]></category>
		<category><![CDATA[hope]]></category>
		<category><![CDATA[Increase]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[Japan s National Assembly]]></category>
		<category><![CDATA[law]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[Prime Minister]]></category>
		<category><![CDATA[Prime Minister of Japan]]></category>
		<category><![CDATA[Promote]]></category>
		<category><![CDATA[promotes]]></category>
		<category><![CDATA[Stamp]]></category>
		<category><![CDATA[SUGA]]></category>
		<category><![CDATA[Suga Yoshihide]]></category>
		<guid isPermaLink="false">https://en.spress.net/japan-establishes-new-government-agency-promotes-digital-application/</guid>

					<description><![CDATA[Prime Minister Suga Yoshihide&#8217;s government hopes that with this agency, Japan will increase the application of digital at central and local agencies to improve service quality. Japanese Prime Minister Suga Yoshihide speaks at the National Assembly. (Photo: Kyodo) Congress Japan on May 12 passed a law that will create a new government agency next September, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Prime Minister Suga Yoshihide&#8217;s government hopes that with this agency, Japan will increase the application of digital at central and local agencies to improve service quality.</strong><br />
<span id="more-15366"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_293_38815517/84404c7c523ebb60e22f.jpg" width="625" height="404"> </p>
<p> <em> Japanese Prime Minister Suga Yoshihide speaks at the National Assembly. (Photo: Kyodo)</em> Congress <strong> Japan</strong> on May 12 passed a law that will create a new government agency next September, with the function of promoting <strong> digital apps</strong> . The new agency will have about 500 people, of which 120 include information technology engineers. Under the new law, the government will remove personal seals (also known as hanko) from official documents and allow the use of <strong> digital data</strong> instead of paper documents. Prime Minister Suga Yoshihide&#8217;s government hopes that with this agency, Japan will increase the application of digital at central and local agencies to improve service quality. Under the new law, Japan will upgrade computer systems at central and local agencies, and enact a nationwide general law to protect personal information. Increased exchange of personal information can cause data leaks and other risks, so the digital application law will also provide privacy protections. Prime Minister Suga&#8217;s government has given high priority to digital reform as Japan seeks to strengthen administrative reform through the use of information technology.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15366</post-id>	</item>
		<item>
		<title>What information should not be shared on social networks?</title>
		<link>https://en.spress.net/what-information-should-not-be-shared-on-social-networks/</link>
		
		<dc:creator><![CDATA[Khánh Linh]]></dc:creator>
		<pubDate>Wed, 12 May 2021 21:26:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Baby boomers]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Contact]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[In space]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[networks]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[Potential]]></category>
		<category><![CDATA[Private]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Root]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[shared]]></category>
		<category><![CDATA[social]]></category>
		<category><![CDATA[Social Network]]></category>
		<category><![CDATA[Survey]]></category>
		<category><![CDATA[Take advantage]]></category>
		<category><![CDATA[User]]></category>
		<guid isPermaLink="false">https://en.spress.net/what-information-should-not-be-shared-on-social-networks/</guid>

					<description><![CDATA[The more information you share, the easier it is for cybercriminals to collect data. This poses the risk of network attacks targeting the privacy of users. Users need to be cautious before providing personal information on social networks. According to Kaspersky&#8217;s &#8220;Building our place in the digital reputation economy&#8221;, social media users in Southeast Asia [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The more information you share, the easier it is for cybercriminals to collect data. This poses the risk of network attacks targeting the privacy of users.</strong><br />
<span id="more-13505"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_309_38809575/94598b8877cb9e95c7da.jpg" width="625" height="351"> </p>
<p> <em> Users need to be cautious before providing personal information on social networks. </em> According to Kaspersky&#8217;s &#8220;Building our place in the digital reputation economy&#8221;, social media users in Southeast Asia have become more aware of online risks. Netizens in Southeast Asia do not want to share identity information, family directly, where they live and work on their personal pages. Up to 76% of survey participants do not want to upload financial information online. This percentage is highest among Baby Boomers (people born two decades after World War II), accounting for 85%. Gen Z &#8211; the youngest generation &#8211; is the group with the lowest rate at 68%. Judging by the current tendency of young people to be more open to sharing information on cyberspace, Kaspersky believes that this is the main driver of the development of electronic payments in the region. However, this also poses a risk when young users do not pay much attention to information security. To best ensure privacy on social networks, especially financial information and personal data, Kaspersky has made a number of recommendations to users. The first is not to publish travel information, not to disclose too much personal information such as date of birth or workplace in the profile section. You should also not post your home address or phone number on any public forum. Second, you should check automatic positioning settings in posts, don&#8217;t share location publicly if it&#8217;s not absolutely necessary. Third, you should not participate in the quiz that appears on social networks. Usually, these games silently extract personal information with simple questions. That is the information commonly used in security questions. If you provide too much, hackers can use them to break into online accounts. Fourth, be wary of the contest or winning information, because they pose the risk of disguising fraud. If you share it on social media, you could inadvertently spread malicious code or pave the way for the disclosure of sensitive data. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_309_38809575/dbeeadffb1bd58e301ac.jpg" width="625" height="474"> Hackers can take advantage of security holes on mobile devices to steal information. Artwork: BS <strong> Raise awareness about mobile device security</strong> According to a Kaspersky report, 71% of survey respondents in Southeast Asia use passwords to protect their mobile devices. However, just over half of them check and change privacy settings regularly and have internet security software installed on their devices. In order to keep financial information and personal data on your device safe, you need to take note of the following recommendations. Specifically, the most basic security method is to lock your phone with a password that is difficult to guess and update the system regularly. You absolutely do not jailbreak or root your phone. This can pave the way for hackers to enter the system and install malicious code. You should only use licensed and verified apps and games on reputable app stores. An application capable of remotely erasing data is also recommended, making it easy to erase information in case your phone is stolen.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13505</post-id>	</item>
		<item>
		<title>Residents have monthly electricity estimation tools</title>
		<link>https://en.spress.net/residents-have-monthly-electricity-estimation-tools/</link>
		
		<dc:creator><![CDATA[Toàn Thắng]]></dc:creator>
		<pubDate>Mon, 03 May 2021 12:05:05 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Algorithm]]></category>
		<category><![CDATA[automatic]]></category>
		<category><![CDATA[Based]]></category>
		<category><![CDATA[Consume]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Dryer]]></category>
		<category><![CDATA[Electric stove]]></category>
		<category><![CDATA[Electrical equipment]]></category>
		<category><![CDATA[Electrical Power]]></category>
		<category><![CDATA[electricity]]></category>
		<category><![CDATA[Estimate]]></category>
		<category><![CDATA[estimation]]></category>
		<category><![CDATA[Family]]></category>
		<category><![CDATA[Lights]]></category>
		<category><![CDATA[Monthly]]></category>
		<category><![CDATA[Oven mitts]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[residents]]></category>
		<category><![CDATA[Species]]></category>
		<category><![CDATA[tools]]></category>
		<category><![CDATA[Vietnam Electricity Corporation]]></category>
		<guid isPermaLink="false">https://en.spress.net/residents-have-monthly-electricity-estimation-tools/</guid>

					<description><![CDATA[In May 2021, Vietnam Electricity (EVN) will focus on completing and launching a tool to help households easily estimate monthly electricity consumption based on electricity usage habits and characteristics. hostilities of electrical equipment in the customer&#8217;s home. This is information shared by Mr. Nguyen Quoc Dung, Head of EVN&#8217;s Business Department with reporters of the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In May 2021, Vietnam Electricity (EVN) will focus on completing and launching a tool to help households easily estimate monthly electricity consumption based on electricity usage habits and characteristics. hostilities of electrical equipment in the customer&#8217;s home.</strong><br />
<span id="more-11287"></span> This is information shared by Mr. Nguyen Quoc Dung, Head of EVN&#8217;s Business Department with reporters of the Government Electronic Newspaper, on the morning of April 26.</p>
<p> EVN stated that electricity customers can access to use this tool at its website: Accordingly, electricity users need to enter some basic personal information such as full name, customer code, city area; type of house (apartment or private house), number of people living in family, &#8230; <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_146_38638016/7108407076309f6ec621.jpg" width="625" height="413"> <em> EVN&#8217;s business and customer service have made strong progress. Photo: VGP </em> Entering this background information needs to be accurate, realistic, to ensure the tool can best estimate power consumption. Next, also on the website, customers will provide information about the quantity and type of household electrical appliances in use, including: Basic equipment (such as electric cookers, refrigerators, lights &#8230;) , appliances that consume large amounts of electricity (such as air conditioners, clothes dryers, ovens &#8230;). Along with that, providing data on the frequency, level, and habits of using these devices. Based on customer data provided, the tool will automatically estimate the amount of electricity consumed by each electrical equipment each month. This tool also shows the device &#8220;consumes&#8221; the most electricity in each household in the month, helping customers adjust their electricity usage habits so that they are efficient and economical. The tool&#8217;s algorithms also automatically update and analyze the temperature in the locality where the customer lives to calculate. The amount of electricity consumed by an electrical appliance in a household may vary between months and seasons of the year. In particular, the tool is designed with a friendly interface, making it easy for customers to use and experience. EVN said that this tool is currently being deployed to integrate into websites and customer care applications of Power Corporations. This information is very useful to customers using electricity, and also shows the great efforts of EVN in business and customer service, especially in making public, transparent and increasingly transparent. It is more convenient for customers to control their electricity consumption and household electricity bill, especially during the hot dry season.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11287</post-id>	</item>
		<item>
		<title>Apple&#8217;s AirDrop feature isn&#8217;t safe</title>
		<link>https://en.spress.net/apples-airdrop-feature-isnt-safe/</link>
		
		<dc:creator><![CDATA[B.Châu (t/h)]]></dc:creator>
		<pubDate>Sun, 02 May 2021 23:45:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[AirDrop]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[apples]]></category>
		<category><![CDATA[Breaking down]]></category>
		<category><![CDATA[Feature]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[Ipad]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[isnt]]></category>
		<category><![CDATA[Leakage]]></category>
		<category><![CDATA[MAC]]></category>
		<category><![CDATA[MacBook]]></category>
		<category><![CDATA[OS X Yosemite]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[Phonebook]]></category>
		<category><![CDATA[safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technical University of Darmstadt]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Windows Phone]]></category>
		<guid isPermaLink="false">https://en.spress.net/apples-airdrop-feature-isnt-safe/</guid>

					<description><![CDATA[Security experts warn that users of Apple iPhone, iPad or Macbook may leak personal information due to vulnerabilities in the AirDrop feature. Privacy warning is issued by experts at Technical University of Darmstadt (Germany) regarding Apple&#8217;s AirDrop data transmission feature. AirDrop is very useful for Apple ecosystem users but is being warned of being insecure. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Security experts warn that users of Apple iPhone, iPad or Macbook may leak personal information due to vulnerabilities in the AirDrop feature.</strong><br />
<span id="more-11163"></span> Privacy warning is issued by experts at Technical University of Darmstadt (Germany) regarding Apple&#8217;s AirDrop data transmission feature.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_5_38638799/a5daa9648e2667783e37.jpg" width="625" height="417"> <em> AirDrop is very useful for Apple ecosystem users but is being warned of being insecure.</em> Experts said, AirDrop allows users to share files with Apple devices in contacts. During the process of verifying the connection between devices, AirDrop uses a &#8220;mutual authentication mechanism&#8221; to compare the user&#8217;s phone number and email with the entries in the other device&#8217;s phonebook. Basically, data exchanged via AirDrop is encrypted by Apple, but this security mechanism is assessed by experts as relatively weak. In fact, Apple just scrambles the phone numbers and email addresses exchanged in the process of transmitting through AirDrop. This security mechanism can be easily circumvented using simple techniques like brute-force attacks. Also according to security experts at Technical University of Darmstadt (Germany), the above vulnerability was discovered in May 2019 and has been notified to Apple, but Apple still has no specific patch. to fix the problem. Airdrop is a feature that comes pre-installed on iPhone, iPad or Mac (depending on the version of the operating system). Helps iOS, Mac devices connect together and can easily share files wirelessly with each other very quickly without affecting the quality of the file. Airdrop has been integrated on iPhone, iPod, iPad devices using iOS 7 or higher. Macbook from 2012 with OS X Yosemite (10.0) higher (except Mac Pro mid-2012). In addition, AirDrop cannot be used with other operating systems (Android phones, Windows Phone phones &#8230;).</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11163</post-id>	</item>
		<item>
		<title>More than half of Australian businesses were attacked by hackers</title>
		<link>https://en.spress.net/more-than-half-of-australian-businesses-were-attacked-by-hackers/</link>
		
		<dc:creator><![CDATA[Việt Nga/VOV-Australia]]></dc:creator>
		<pubDate>Sun, 02 May 2021 12:33:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[As usual]]></category>
		<category><![CDATA[attacked]]></category>
		<category><![CDATA[Australia]]></category>
		<category><![CDATA[Australian]]></category>
		<category><![CDATA[Australian Parliament]]></category>
		<category><![CDATA[businesses]]></category>
		<category><![CDATA[Claim money]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[Entity]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[In space]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[It is illegal]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[unlock]]></category>
		<category><![CDATA[Useful]]></category>
		<guid isPermaLink="false">https://en.spress.net/more-than-half-of-australian-businesses-were-attacked-by-hackers/</guid>

					<description><![CDATA[A recent report showed that in the past 1 year only half of businesses in Australia were attacked by hackers. A new report released by a company specializing in cybersecurity Mimecast said that 64% of local businesses in Australia were attacked by hackers with malware last year alone, a 48% increase from the previous year. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A recent report showed that in the past 1 year only half of businesses in Australia were attacked by hackers.</strong><br />
<span id="more-11035"></span> A new report released by a company specializing in cybersecurity Mimecast said that 64% of local businesses in Australia were attacked by hackers with malware last year alone, a 48% increase from the previous year. years earlier. This fact happened when in the last year, because of the Covid-19 translation, many companies switched to working online</p>
<p> Experts say that in each attack, typically hackers will attack networks or systems, steal personal or sensitive information and then demand ransom to return or unlock them. that information. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_65_38643050/39d0b9be9efc77a22eed.jpg" width="625" height="346"> Although experts say that companies should not pay a ransom to hackers because this action helps to foster legal violations, according to Mimecast statistics, 54% of the companies have paid the ransom. Of these, 76% of the companies got their data back, while 24% couldn&#8217;t get it back. Prior to this report, since last year, many entities including major Australian companies have reported being attacked by hackers. The recent victim is Nine Network Television, which makes some programs unable to broadcast as usual. Previously, the Australian National Assembly&#8217;s computer network was also attacked a number of times. In response to this situation, Australia&#8217;s Cybersecurity Center issued recommendations and procedures to instruct entities on how to secure cyber security. At the same time, experts believe that regular software updates as well as the use of multi-factor authentication are also useful measures for security in a cyberspace environment./.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11035</post-id>	</item>
		<item>
		<title>EVN is about to release its monthly electricity estimation tool</title>
		<link>https://en.spress.net/evn-is-about-to-release-its-monthly-electricity-estimation-tool/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Sat, 01 May 2021 18:43:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Algorithm]]></category>
		<category><![CDATA[automatic]]></category>
		<category><![CDATA[Based]]></category>
		<category><![CDATA[Consume]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Dryer]]></category>
		<category><![CDATA[Electric stove]]></category>
		<category><![CDATA[Electrical equipment]]></category>
		<category><![CDATA[Electrical Power]]></category>
		<category><![CDATA[electricity]]></category>
		<category><![CDATA[Estimate]]></category>
		<category><![CDATA[estimation]]></category>
		<category><![CDATA[EVN]]></category>
		<category><![CDATA[Family]]></category>
		<category><![CDATA[Lights]]></category>
		<category><![CDATA[Monthly]]></category>
		<category><![CDATA[Oven mitts]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[release]]></category>
		<category><![CDATA[Species]]></category>
		<category><![CDATA[Tool]]></category>
		<category><![CDATA[tools]]></category>
		<category><![CDATA[Vietnam Electricity Corporation]]></category>
		<guid isPermaLink="false">https://en.spress.net/evn-is-about-to-release-its-monthly-electricity-estimation-tool/</guid>

					<description><![CDATA[Vietnam Electricity (EVN) is about to launch a tool to help households easily estimate their monthly electricity consumption based on their customers&#8217; habits of using electricity and electrical equipment characteristics. Vietnam Electricity (EVN) said that it is integrating the tool to estimate the monthly electricity consumption of households into websites and customer care applications of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Vietnam Electricity (EVN) is about to launch a tool to help households easily estimate their monthly electricity consumption based on their customers&#8217; habits of using electricity and electrical equipment characteristics.</strong><br />
<span id="more-10851"></span> Vietnam Electricity (EVN) said that it is integrating the tool to estimate the monthly electricity consumption of households into websites and customer care applications of power corporations in Vietnam. group.</p>
<p> To use this tool, customers can access the website: https://uoctinhdiennang.evn.com.vn/, then enter some basic personal information such as full name, customer code, city area; type of house (apartment or private house), number of people living in family, &#8230; Input information needs to be accurate, in accordance with reality, to ensure that the tool can estimate power consumption with the best accuracy. Next, the customer will provide information about the quantity and type of household electrical appliances in use, including: Basic equipment (such as electric stove, refrigerator, lights &#8230;), consumer appliances. consume a lot of electricity (such as air conditioner, clothes dryer, oven &#8230;). Along with that, provide data on the frequency, level, and habits of using these devices. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_365_38640988/493480b4a7f64ea817e7.jpg" width="625" height="403"> <em> Interface of monthly power estimate tool</em> Based on customer data provided, the tool will automatically estimate the amount of electricity consumed by each electrical equipment each month. In addition to estimating the amount of electricity consumption per month, the tool also has the device &#8220;consumes&#8221; the most electricity in each household in the month, helping customers adjust their electricity usage habits so that they are efficient and economical. The tool&#8217;s algorithm will automatically update and analyze the local temperature where the customer lives to calculate. The amount of electricity consumed in the household will have a difference between months and seasons in the year. This tool is designed with a friendly interface, making it easy for customers to use and experience. This information is very useful to customers using electricity, and also shows the great efforts of EVN in business and customer service, especially in making public, transparent and increasingly transparent. It is more convenient for customers to control their electricity consumption and household electricity bill, especially during the hot dry season. <strong> HA</strong> Warning of counterfeiting EVN brand name to scam unsecured loans</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">10851</post-id>	</item>
		<item>
		<title>EVN launches a tool to estimate monthly household electricity consumption</title>
		<link>https://en.spress.net/evn-launches-a-tool-to-estimate-monthly-household-electricity-consumption/</link>
		
		<dc:creator><![CDATA[Đức Duy (Vietnam+)]]></dc:creator>
		<pubDate>Sat, 01 May 2021 02:15:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Algorithm]]></category>
		<category><![CDATA[automatic]]></category>
		<category><![CDATA[Based]]></category>
		<category><![CDATA[Based on]]></category>
		<category><![CDATA[Consume]]></category>
		<category><![CDATA[Consumption]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Dryer]]></category>
		<category><![CDATA[Electric stove]]></category>
		<category><![CDATA[Electrical equipment]]></category>
		<category><![CDATA[Electrical Power]]></category>
		<category><![CDATA[electricity]]></category>
		<category><![CDATA[Estimate]]></category>
		<category><![CDATA[EVN]]></category>
		<category><![CDATA[Family]]></category>
		<category><![CDATA[Household]]></category>
		<category><![CDATA[launches]]></category>
		<category><![CDATA[Lights]]></category>
		<category><![CDATA[Monthly]]></category>
		<category><![CDATA[Oven mitts]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[Tool]]></category>
		<category><![CDATA[tools]]></category>
		<category><![CDATA[Vietnam Electricity Corporation]]></category>
		<guid isPermaLink="false">https://en.spress.net/evn-launches-a-tool-to-estimate-monthly-household-electricity-consumption/</guid>

					<description><![CDATA[Based on customer data provided, EVN&#8217;s development tool will automatically estimate the amount of electricity consumed by each electrical equipment on a monthly basis. The tool will automatically estimate the amount of electricity consumed by each electrical device each month. (Photo: evn.com.vn) Vietnam Electricity Corporation ( EVN ) developed a tool to help households estimate [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Based on customer data provided, EVN&#8217;s development tool will automatically estimate the amount of electricity consumed by each electrical equipment on a monthly basis.</strong><br />
<span id="more-10717"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_293_38636581/f375afa088e261bc38f3.jpg" width="625" height="403"> </p>
<p> <em> The tool will automatically estimate the amount of electricity consumed by each electrical device each month. (Photo: evn.com.vn)</em> Vietnam Electricity Corporation (<strong> EVN</strong> ) developed a tool to help households estimate their monthly electricity consumption based on their electricity usage habits and household electrical equipment characteristics. Accordingly, customers can access to use this tool at the website: Customers need to enter some basic personal information: full name, customer code, city area; type of house (apartment or private house), number of people living in family &#8230; Entering the background information as above should be accurate, according to reality, to ensure the tool can estimate the most accurate power consumption. Next, also on the website, customers will provide information about the quantity and type of household electrical appliances in use, including: Basic equipment (such as electric cookers, refrigerators, lights &#8230;) , equipment that consumes a lot of electricity (such as air conditioners, clothes dryers, ovens &#8230;). Along with that, provide data on the frequency, level, and habits of using these devices. Based on customer data provided, the tool will automatically estimate the amount of electricity consumed by each electrical equipment each month. This tool also shows the device that consumes the most electricity in each household in the month, helping customers to adjust their electricity usage habits effectively and economically. The tool&#8217;s algorithms also automatically update and analyze the temperature in the locality where the customer lives to calculate. Quantity <strong> electric used</strong> There may be differences in the difference between months and seasons of the year for a household electrical appliance. “Currently, this tool is being deployed to integrate into websites and customer care applications of the Power Corporations in the corporation,” added the representative of EVN./.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">10717</post-id>	</item>
		<item>
		<title>Warning: Android and iOS users need to immediately change the password for this app!</title>
		<link>https://en.spress.net/warning-android-and-ios-users-need-to-immediately-change-the-password-for-this-app/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Sun, 25 Apr 2021 02:49:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[Brian Krebs]]></category>
		<category><![CDATA[Change]]></category>
		<category><![CDATA[Credit]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[Enforcement agency]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[immediately]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[Leakage]]></category>
		<category><![CDATA[License plate]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[Public sale]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Third party]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Warning]]></category>
		<guid isPermaLink="false">https://en.spress.net/warning-android-and-ios-users-need-to-immediately-change-the-password-for-this-app/</guid>

					<description><![CDATA[If you are already using this app, quickly change your password immediately. WTAE-TV reported that a popular mobile parking assistance application called ParkMobile has leaked data, allowing hackers to access personal information related to the 21 million customers of the application. On the KrebsOnSecurity blog, cybersecurity expert Brian Krebs issued a warning about the leaked [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>If you are already using this app, quickly change your password immediately.</strong><br />
<span id="more-8140"></span> WTAE-TV reported that a popular mobile parking assistance application called ParkMobile has leaked data, allowing hackers to access personal information related to the 21 million customers of the application.</p>
<p> On the KrebsOnSecurity blog, cybersecurity expert Brian Krebs issued a warning about the leaked data, including the application user&#8217;s email address, phone number, license plate number, customer birth date, and email address. and password. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_329_38593874/5d49ebf6ceb427ea7ea5.jpg" width="625" height="416"> <em> (Photo: Seacoast Online)</em> Information about the data breach was first discovered by the threat intelligence firm Gemini Advisory based in New York City (USA). “Gemini Advisory shared an image showing that my personal data was publicly available on a crime forum, including my ParkMobile account information in screenshots, along with information about the data. stolen. The data contains email addresses and phone numbers, as well as license plates for four different vehicles that I have used in the past 10 years, ”said cybersecurity expert Brian Krebs. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_329_38593874/5811e8aecdec24b27dfd.jpg" width="625" height="416"> <em> (Photo: ParkMobile)</em> On March 26, ParkMobile notified users that they had discovered &#8220;a cybersecurity incident related to a vulnerability in the third party software we use.&#8221; &#8220;We immediately launched an investigation with the assistance of a leading cybersecurity company to resolve the incident. We have also notified the appropriate law enforcement authorities. The investigation is still ongoing and we cannot provide details at this time, &#8220;said ParkMobile. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_329_38593874/a0351d8a38c8d19688d9.jpg" width="625" height="416"> <em> (Photo: ParkMobile)</em> According to ParkMobile, no user&#8217;s credit card information was stolen. “Our investigation indicated that no sensitive data or credit card information that we encrypted, was affected. We will continue to maintain the security and monitor our systems closely, ”the statement said. According to cybersecurity expert Brian Krebs, if you are already using ParkMobile, quickly change your password. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_329_38593874/221a9ea5bbe752b90bf6.jpg" width="625" height="416"> <em> (Artwork: Shutterstock)</em> In the event that this password is used by you with other accounts as well, you should change everything to limit the likelihood of an attack, although it may take a while to complete.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8140</post-id>	</item>
		<item>
		<title>A close-up of the new chip-mounted citizen&#8217;s identity card: Colorful, more compact and modern</title>
		<link>https://en.spress.net/a-close-up-of-the-new-chip-mounted-citizens-identity-card-colorful-more-compact-and-modern/</link>
		
		<dc:creator><![CDATA[Sơn Trần - Ảnh: TGDĐ]]></dc:creator>
		<pubDate>Fri, 23 Apr 2021 13:06:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[ATM card]]></category>
		<category><![CDATA[Backside]]></category>
		<category><![CDATA[Broken corner]]></category>
		<category><![CDATA[Card]]></category>
		<category><![CDATA[chipmounted]]></category>
		<category><![CDATA[Citizen]]></category>
		<category><![CDATA[citizens]]></category>
		<category><![CDATA[Clean]]></category>
		<category><![CDATA[Close]]></category>
		<category><![CDATA[Closeup]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[color]]></category>
		<category><![CDATA[colorful]]></category>
		<category><![CDATA[Compact]]></category>
		<category><![CDATA[Edge]]></category>
		<category><![CDATA[Fingerprint]]></category>
		<category><![CDATA[ID card]]></category>
		<category><![CDATA[Identity]]></category>
		<category><![CDATA[Identity card]]></category>
		<category><![CDATA[Install the chip]]></category>
		<category><![CDATA[Layout]]></category>
		<category><![CDATA[Lively]]></category>
		<category><![CDATA[Modern]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[QR code]]></category>
		<category><![CDATA[shape]]></category>
		<category><![CDATA[Size]]></category>
		<guid isPermaLink="false">https://en.spress.net/a-close-up-of-the-new-chip-mounted-citizens-identity-card-colorful-more-compact-and-modern/</guid>

					<description><![CDATA[Wondering what the size, color, shape of the citizen ID card with a chip is? What will my new citizen&#8217;s ID card look like? The color of the chip-mounted CCCD card is somewhat more vivid. Cards have two main colors are blue and light yellow. The two sides of the card have traditional motifs, beautifully [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Wondering what the size, color, shape of the citizen ID card with a chip is?</strong><br />
<span id="more-6683"></span> <strong> What will my new citizen&#8217;s ID card look like?</strong> </p>
<p> The color of the chip-mounted CCCD card is somewhat more vivid. Cards have two main colors are blue and light yellow. The two sides of the card have traditional motifs, beautifully imprinted. In the middle of the card is a very sharp map of Vietnam drawn. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_20_105_38584797/b9dc5dd4799690c8c987.jpg" width="625" height="351"> <em> The new CCCD card has more vivid colors than the old card.</em> On the front side of the card includes basic personal information such as: photo card, identification number, first and last name, date of birth, gender, nationality, country of origin, place of residence. The most obvious change is the CCCD card with English attached. In addition, on the CCCD card also appears the QR code. When scanning this code, we will be able to look up personal information of ourselves such as old ID number, new ID number &#8230; So, in case it&#8217;s not necessary, people should cover this part of the code to avoid your important information being stolen. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_20_105_38584797/9ae976e152a3bbfde2b2.jpg" width="625" height="351"> <em> The QR code on the new CCCD card is a change from the old card.</em> The back of the CCCD card has the most obvious change in the layout as well as the above content. The old information still retained are identification features, card issuance time, fingerprints and red seal of the competent authority. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_20_105_38584797/5d05b40d904f7911205e.jpg" width="625" height="351"> <em> The back of the card has a clear change in content and layout.</em> The first difference is that the barcode printed on the old CCCD card header has now been replaced with a sequence of characters including both letters and numbers. This is also information that you should cover up. Besides, the position of the fingerprint has also been moved from the left edge (in the CCCD card, old ID card) to the right edge (in the new CCCD card). <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_20_105_38584797/aeb3b8bb9cf975a72ce8.jpg" width="625" height="351"> <em> The position of fingerprints has a change between the old and new versions.</em> The highlight on this year&#8217;s CCCD card is the chip attached to the back. This chip has a color, shape and size quite similar to the one on the phone sim card we often use. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_20_105_38584797/41275d2f796d9033c97c.jpg" width="625" height="351"> <em> The chip on the new CCCD card.</em> <strong> The size of the new CCCD card has similarities with many current hard cards</strong> In terms of shape, the new CCCD card will still have a rectangular design with 4 rounded corners, helping to limit the broken corner of the card when stored in the wallet. Thiet is quite similar to ATM cards of banks or membership cards of supermarkets. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_20_105_38584797/84109c18b85a5104084b.jpg" width="625" height="351"> <em> The CCCD card is shaped similar to an ATM card and other commonly used hardware cards.</em> If you often have trouble with the slightly larger size of an old 9-digit ID card, it will be resolved on the new CCCD card. The new card will measure 83.6 x 53.98 mm. In a way that is easier to understand, &#8220;it&#8221; will be the size of an ATM card. <strong> The convenience of the new CCCD card</strong> The first handy point that we can see from a chip-mounted CCCD card is that &#8220;its sister&#8221; will be more durable. Compared with the old ID paper material, the plastic material on the CCCD card with chips will provide a longer life time. Besides, conditions such as torn, mysterious marks on the card &#8230; will no longer appear on this new card. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_20_105_38584797/bcb8b9b09df274ac2de3.jpg" width="625" height="351"> <em> The new CCCD card is more compact than the old ID card.</em> The compact size on the new CCCD card is also a huge plus. If in the past, users often had to &#8220;headache&#8221; when searching for an empty compartment to store the old ID card, with this new CCCD card, you no longer have to worry about the above problem. This chip-mounted CCCD is almost able to fit in the usual card holders in today&#8217;s wallets. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_20_105_38584797/d091d099f4db1d8544ca.jpg" width="625" height="351"> <em> You can put your card in your wallet a lot easier.</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6683</post-id>	</item>
		<item>
		<title>What information does the chip-mounted citizen ID contain? Lost what to do?</title>
		<link>https://en.spress.net/what-information-does-the-chip-mounted-citizen-id-contain-lost-what-to-do/</link>
		
		<dc:creator><![CDATA[LA (Tổng hợp)]]></dc:creator>
		<pubDate>Wed, 21 Apr 2021 20:04:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Barcode]]></category>
		<category><![CDATA[Card]]></category>
		<category><![CDATA[chip]]></category>
		<category><![CDATA[chipmounted]]></category>
		<category><![CDATA[Citizen]]></category>
		<category><![CDATA[Contain]]></category>
		<category><![CDATA[Crumpled]]></category>
		<category><![CDATA[Fingerprint]]></category>
		<category><![CDATA[Go Vap district police]]></category>
		<category><![CDATA[ID card]]></category>
		<category><![CDATA[Identification]]></category>
		<category><![CDATA[Identity card]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[Install the chip]]></category>
		<category><![CDATA[lost]]></category>
		<category><![CDATA[Need to use]]></category>
		<category><![CDATA[Papers]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[Police]]></category>
		<category><![CDATA[QR code]]></category>
		<category><![CDATA[Readers]]></category>
		<category><![CDATA[Retinal]]></category>
		<guid isPermaLink="false">https://en.spress.net/what-information-does-the-chip-mounted-citizen-id-contain-lost-what-to-do/</guid>

					<description><![CDATA[According to the goals of the Ministry of Public Security, as of July 1, 2021, nearly half of the Vietnamese population will use chip-mounted Citizen Identification Card, replacing ID card or Barcode Citizen ID. Fingerprinting for people at the Go Vap District Police. Photo: Thanh Chung &#8211; VNA What information does the chip-mounted citizen ID [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>According to the goals of the Ministry of Public Security, as of July 1, 2021, nearly half of the Vietnamese population will use chip-mounted Citizen Identification Card, replacing ID card or Barcode Citizen ID.</strong><br />
<span id="more-5719"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_19_324_38569498/46b989e2bca055fe0cb1.jpg" width="625" height="421"> </p>
<p> <em> Fingerprinting for people at the Go Vap District Police. Photo: Thanh Chung &#8211; VNA </em> <strong> What information does the chip-mounted citizen ID contain?</strong> The biggest difference of chip-mounted Citizen Identification compared to other types of identification such as Identity Card or Barcode Citizen Identification is the chip located on the back of the card. The chip contains information about the identity of each citizen, such as: Full name; date of birth; home town; fingerprint, retina, image, identification features &#8230; At the same time, in the near future, the chip on the citizen&#8217;s ID card also contains information related to insurance, banking, driver&#8217;s license &#8230; of the user. use. In addition to the chip, the new model Citizen ID card also has a QR code on the front of the card. When scanning this code will display information about the name of the issuer, the old ID number (In the case where the 9-digit ID card was used), the issuer will no longer have to bring it The identity card number of the identity card with A4 paper is very easily crumpled as it is nowadays. <strong> Is losing a citizen&#8217;s ID with a chip &#8220;dangerous&#8221;?</strong> As mentioned above, the citizen&#8217;s ID with chip shows a lot of personal information of the grantee, and also integrates many other specialized information about insurance, banking &#8230; Therefore, many people expressed worry that if you accidentally lose this ID card, or have your card stolen, will your personal information be easily leaked out &#8230; In fact, only authorities are equipped with specialized chip readers to extract information. Therefore, people can be completely assured that, if the identity of the chip-mounted citizen is lost, the person who finds it is difficult to read the information of the lost person that the chip on the card is keeping. Unlike chips, QR codes are easily scanned, just using an App on a smartphone. However, the QR code does not contain too much information that needs &#8220;security&#8221; as on the chip. On the contrary, the fact that the ID card attached to a chip stores a lot of information will help people later when they go to do administrative procedures, make transactions with banks, real estate, insurance, apply to study for their children &#8230;, No need to bring a variety of papers, just use this card.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5719</post-id>	</item>
	</channel>
</rss>