Application Security
6/25/2010
09:17 AM
Connect Directly
RSS
E-Mail
50%
50%

China Tightens Online Gaming Regulations

The Ministry of Culture's Interim Measures for Internet Games in an attempt to protect minors from "unwholesome" content.

China's Ministry of Culture has issued what it calls the "Interim Measures for Internet Games" in an attempt to protect minors from "unwholesome" content.

The rules make up the first official document to deal with China's flourishing online gaming industry and will come into effect as of August 1, 2010. It will apply to social networking games as well as all domestic and imported massive multiplayer online role-playing games (MMORPG), which are wildly popular in China.

The measures were introduced after an unprecedented rise in the number of game players in April. The state administrator, China Internet Network Information Center (CNNIC) reported 105 million users of online games. As of August 1, all players must register with their real name and valid ID. Online game companies must also self-censor their content to bring it in line with the new regulations. Furthermore all imported games will be screened for suitability.

Some observers believe the new regulations are vulnerable to abuse. For instance, there is little to stop a minor using someone else's identity to register a new account. However, the MOC is aware of this and is considering using technology found in every internet café, such as webcams, for visual authentication.

The regulations point out the need to protect children from unsuitable material, officials said. There is also a total ban on minors handling virtual currency, used by many online games, particularly those created by Tencent, the company behind China's most popular instant messaging system, QQ. It is also a top game provider, and derives much of its revenue from selling virtual items as part of its games.

Virtual currency has been very big business in the past, with people spending more and more virtual currency (paid for with real cash) to get the latest and best virtual gaming equipment.

The new rules also try to ban obligatory hostilities between players set by the game administrators, which had been common practice to make the games more exciting. Also under the knife is pop-up advertising designed to entice netizens into playing the games.

At the same time, as regulations tighten in certain areas, they are loosening in others. Gaming licenses can now be obtained at the provincial level, rather than national level, for a maximum of three years. This "decentralization," together with a lower minimum registered capital, will lower the threshold to enter the market, which should be good news for small and mid-size businesses around the country. Previously they had needed permission from the Ministry of Culture in Beijing to enter the lucrative market.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
DevOps’ Impact on Application Security
DevOps’ Impact on Application Security
Managing the interdependency between software and infrastructure is a thorny challenge. Often, it’s a “developers are from Mars, systems engineers are from Venus” situation.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0972
Published: 2014-08-01
The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write ...

CVE-2014-2627
Published: 2014-08-01
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.

CVE-2014-3009
Published: 2014-08-01
The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.0 through 11.0 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 does not properly handle FRAME elements, which makes it easier for remote authenticated users to conduct ph...

CVE-2014-3302
Published: 2014-08-01
user.php in Cisco WebEx Meetings Server 1.5(.1.131) and earlier does not properly implement the token timer for authenticated encryption, which allows remote attackers to obtain sensitive information via a crafted URL, aka Bug ID CSCuj81708.

CVE-2014-3534
Published: 2014-08-01
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a c...

Best of the Web
Dark Reading Radio