Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

China Tightens Online Gaming Regulations

The Ministry of Culture's Interim Measures for Internet Games in an attempt to protect minors from "unwholesome" content.

China's Ministry of Culture has issued what it calls the "Interim Measures for Internet Games" in an attempt to protect minors from "unwholesome" content.

The rules make up the first official document to deal with China's flourishing online gaming industry and will come into effect as of August 1, 2010. It will apply to social networking games as well as all domestic and imported massive multiplayer online role-playing games (MMORPG), which are wildly popular in China.

The measures were introduced after an unprecedented rise in the number of game players in April. The state administrator, China Internet Network Information Center (CNNIC) reported 105 million users of online games. As of August 1, all players must register with their real name and valid ID. Online game companies must also self-censor their content to bring it in line with the new regulations. Furthermore all imported games will be screened for suitability.

Some observers believe the new regulations are vulnerable to abuse. For instance, there is little to stop a minor using someone else's identity to register a new account. However, the MOC is aware of this and is considering using technology found in every internet café, such as webcams, for visual authentication.

The regulations point out the need to protect children from unsuitable material, officials said. There is also a total ban on minors handling virtual currency, used by many online games, particularly those created by Tencent, the company behind China's most popular instant messaging system, QQ. It is also a top game provider, and derives much of its revenue from selling virtual items as part of its games.

Virtual currency has been very big business in the past, with people spending more and more virtual currency (paid for with real cash) to get the latest and best virtual gaming equipment.

The new rules also try to ban obligatory hostilities between players set by the game administrators, which had been common practice to make the games more exciting. Also under the knife is pop-up advertising designed to entice netizens into playing the games.

At the same time, as regulations tighten in certain areas, they are loosening in others. Gaming licenses can now be obtained at the provincial level, rather than national level, for a maximum of three years. This "decentralization," together with a lower minimum registered capital, will lower the threshold to enter the market, which should be good news for small and mid-size businesses around the country. Previously they had needed permission from the Ministry of Culture in Beijing to enter the lucrative market.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-29370
PUBLISHED: 2021-04-13
A UXSS was discovered in the Thanos-Soft Cheetah Browser in Android 1.2.0 due to the inadequate filter of the intent scheme. This resulted in Cross-site scripting on the cheetah browser in any website.
CVE-2021-3460
PUBLISHED: 2021-04-13
The Motorola MH702x devices, prior to version 2.0.0.301, do not properly verify the server certificate during communication with the support server which could lead to the communication channel being accessible by an attacker.
CVE-2021-3462
PUBLISHED: 2021-04-13
A privilege escalation vulnerability in Lenovo Power Management Driver for Windows 10, prior to version 1.67.17.54, that could allow unauthorized access to the driver's device object.
CVE-2021-3463
PUBLISHED: 2021-04-13
A null pointer dereference vulnerability in Lenovo Power Management Driver for Windows 10, prior to version 1.67.17.54, that could cause systems to experience a blue screen error.
CVE-2021-3471
PUBLISHED: 2021-04-13
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.