Application Security
09:17 AM

China Tightens Online Gaming Regulations

The Ministry of Culture's Interim Measures for Internet Games in an attempt to protect minors from "unwholesome" content.

China's Ministry of Culture has issued what it calls the "Interim Measures for Internet Games" in an attempt to protect minors from "unwholesome" content.

The rules make up the first official document to deal with China's flourishing online gaming industry and will come into effect as of August 1, 2010. It will apply to social networking games as well as all domestic and imported massive multiplayer online role-playing games (MMORPG), which are wildly popular in China.

The measures were introduced after an unprecedented rise in the number of game players in April. The state administrator, China Internet Network Information Center (CNNIC) reported 105 million users of online games. As of August 1, all players must register with their real name and valid ID. Online game companies must also self-censor their content to bring it in line with the new regulations. Furthermore all imported games will be screened for suitability.

Some observers believe the new regulations are vulnerable to abuse. For instance, there is little to stop a minor using someone else's identity to register a new account. However, the MOC is aware of this and is considering using technology found in every internet café, such as webcams, for visual authentication.

The regulations point out the need to protect children from unsuitable material, officials said. There is also a total ban on minors handling virtual currency, used by many online games, particularly those created by Tencent, the company behind China's most popular instant messaging system, QQ. It is also a top game provider, and derives much of its revenue from selling virtual items as part of its games.

Virtual currency has been very big business in the past, with people spending more and more virtual currency (paid for with real cash) to get the latest and best virtual gaming equipment.

The new rules also try to ban obligatory hostilities between players set by the game administrators, which had been common practice to make the games more exciting. Also under the knife is pop-up advertising designed to entice netizens into playing the games.

At the same time, as regulations tighten in certain areas, they are loosening in others. Gaming licenses can now be obtained at the provincial level, rather than national level, for a maximum of three years. This "decentralization," together with a lower minimum registered capital, will lower the threshold to enter the market, which should be good news for small and mid-size businesses around the country. Previously they had needed permission from the Ministry of Culture in Beijing to enter the lucrative market.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Flash Poll
DevOps’ Impact on Application Security
DevOps’ Impact on Application Security
Managing the interdependency between software and infrastructure is a thorny challenge. Often, it’s a “developers are from Mars, systems engineers are from Venus” situation.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio