Application Security
6/25/2010
09:17 AM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

China Tightens Online Gaming Regulations

The Ministry of Culture's Interim Measures for Internet Games in an attempt to protect minors from "unwholesome" content.

China's Ministry of Culture has issued what it calls the "Interim Measures for Internet Games" in an attempt to protect minors from "unwholesome" content.

The rules make up the first official document to deal with China's flourishing online gaming industry and will come into effect as of August 1, 2010. It will apply to social networking games as well as all domestic and imported massive multiplayer online role-playing games (MMORPG), which are wildly popular in China.

The measures were introduced after an unprecedented rise in the number of game players in April. The state administrator, China Internet Network Information Center (CNNIC) reported 105 million users of online games. As of August 1, all players must register with their real name and valid ID. Online game companies must also self-censor their content to bring it in line with the new regulations. Furthermore all imported games will be screened for suitability.

Some observers believe the new regulations are vulnerable to abuse. For instance, there is little to stop a minor using someone else's identity to register a new account. However, the MOC is aware of this and is considering using technology found in every internet café, such as webcams, for visual authentication.

The regulations point out the need to protect children from unsuitable material, officials said. There is also a total ban on minors handling virtual currency, used by many online games, particularly those created by Tencent, the company behind China's most popular instant messaging system, QQ. It is also a top game provider, and derives much of its revenue from selling virtual items as part of its games.

Virtual currency has been very big business in the past, with people spending more and more virtual currency (paid for with real cash) to get the latest and best virtual gaming equipment.

The new rules also try to ban obligatory hostilities between players set by the game administrators, which had been common practice to make the games more exciting. Also under the knife is pop-up advertising designed to entice netizens into playing the games.

At the same time, as regulations tighten in certain areas, they are loosening in others. Gaming licenses can now be obtained at the provincial level, rather than national level, for a maximum of three years. This "decentralization," together with a lower minimum registered capital, will lower the threshold to enter the market, which should be good news for small and mid-size businesses around the country. Previously they had needed permission from the Ministry of Culture in Beijing to enter the lucrative market.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-3154
Published: 2014-04-17
DistUpgrade/DistUpgradeViewKDE.py in Update Manager before 1:0.87.31.1, 1:0.134.x before 1:0.134.11.1, 1:0.142.x before 1:0.142.23.1, 1:0.150.x before 1:0.150.5.1, and 1:0.152.x before 1:0.152.25.5 does not properly create temporary files, which allows local users to obtain the XAUTHORITY file conte...

CVE-2013-2143
Published: 2014-04-17
The users controller in Katello 1.5.0-14 and earlier, and Red Hat Satellite, does not check authorization for the update_roles action, which allows remote authenticated users to gain privileges by setting a user account to an administrator account.

CVE-2014-0036
Published: 2014-04-17
The rbovirt gem before 0.0.24 for Ruby uses the rest-client gem with SSL verification disabled, which allows remote attackers to conduct man-in-the-middle attacks via unspecified vectors.

CVE-2014-0054
Published: 2014-04-17
The Jaxb2RootElementHttpMessageConverter in Spring MVC in Spring Framework before 3.2.8 and 4.0.0 before 4.0.2 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External ...

CVE-2014-0071
Published: 2014-04-17
PackStack in Red Hat OpenStack 4.0 does not enforce the default security groups when deployed to Neutron, which allows remote attackers to bypass intended access restrictions and make unauthorized connections.

Best of the Web