Current location - Education and Training Encyclopedia - Resume - What are the realistic factors of personal information disclosure?
What are the realistic factors of personal information disclosure?
First, the realistic factors of personal information disclosure

1. Watch out for phishing websites when shopping online. When logging in to the shopping website, you should verify whether the website domain name is correct, and carefully click on the payment link sent by the merchant from the instant messaging tool to prevent falling into the phishing scam.

2. Properly handle documents containing personal information, such as express orders, air tickets and shopping receipts. Discarded materials containing personal information must be properly disposed of. If you throw it away carelessly, it may fall into the hands of criminals, resulting in the disclosure of personal information.

3. The purpose should be indicated on the copy of ID card. When providing a copy of the ID card, it is necessary to indicate "This copy is only used for ×××× purposes, and other purposes are invalid" and the date in the area containing the identity information. Clear the copier cache after copying is completed.

4. Resume only provides necessary information. Don't fill in specific information in your resume, especially your home address and ID number.

5. Don't disclose personal information in Weibo or group chat. In Weibo, qq space, post bars, forums and other social networks, it is necessary to avoid exposing or labeling real identity information as much as possible.

6. Be careful when taking photos on WeChat. Be careful when taking pictures. Don't take photos containing personal information. Share photos by creating groups.

7. Carefully participate in online survey activities. Before participating in such activities, you should choose a website with reliable reputation, carefully check the real situation of the other party, and don't fill in it rashly, which will lead to the disclosure of personal information.

8. Free wifi is easy to reveal privacy. When using wireless wifi to log in to online banking or Alipay, you can access it through a special app client. In order to protect your personal information, it is best to set the wifi connection to manual.

Second, how to deal with information leakers?

Both the disseminator and the user of information have the responsibility.

Since the establishment of the National Network Information Office, the new regulation of "Ten Wechat Articles" was issued in 20 14, which clearly stipulated the personal information protection responsibilities of instant messaging tool service providers: operators such as qq and Wechat must protect user information and citizens' personal privacy, consciously accept social supervision, and promptly handle illegal and bad information reported by the public. "The regulatory authorities will continue to adhere to the protection of personal information according to law, and individuals should also raise their awareness and take the initiative to defend their rights." Yang Chunyan suggested that the general public should further raise their awareness of personal information protection and try not to provide their personal information at will.

In fact, the rampant "black market" of information trading has made consumers pay a heavy price. "Among the purchasers of personal information, there are many illegal precious metal transactions and private lending companies, which have great social risks." Xu Feng, a partner of Shanghai Huarong Law Firm, said. At present, the reporter found in qq group, WeChat and some e-commerce platforms that many "black markets" of personal information still exist. Liu Chunquan believes that user information disclosure involves a number of illegal subjects, including banks as the source, Internet platforms as communication channels, and disseminators and users of information. "For commercial banks and Internet companies in a monopoly position, strictly preventing customer data leakage from internal control has no obvious benefits for themselves, and they often shirk their responsibilities under various excuses."

When residents encounter spam messages or harassing phone calls, they can adopt "inversion of burden of proof", that is, enterprises that use customer data to engage in telephone sales need to prove that the information was obtained through legal channels. "Websites that allow personal privacy information to be traded and sold for free have also gained traffic and profits through the illegal information market and should also be punished."

According to the above information, online platforms often need our real-name authentication, which is the cause of personal information disclosure. In addition, shopping online and filling in your ID card will expose your personal information. If your own information is not exposed for your own reasons, then the behavior of others is a crime of infringing on personal privacy and will be punished accordingly.

Legal basis:

People's Republic of China (PRC) Civil Code

Article 1034 The personal information of natural persons is protected by law.

Personal information is all kinds of information recorded electronically or in other ways that can identify a specific natural person alone or in combination with other information, including natural person's name, date of birth, ID number, biometric information, address, telephone number, e-mail address, health information, whereabouts information, etc.

The privacy information in personal information shall be subject to the provisions on privacy; If there are no provisions, the provisions on the protection of personal information shall apply.

Article 1035 The handling of personal information shall follow the principles of legality, justice and necessity, and shall not be over-handled, and meet the following conditions:

(1) Obtaining the consent of the natural person or his guardian, except as otherwise provided by laws and administrative regulations;

(2) Rules for publicly handling information;

(3) Clearly explain the purpose, mode and scope of information processing;

(four) does not violate the provisions of laws and administrative regulations and the agreement between the two parties.

The processing of personal information includes the collection, storage, use, processing, transmission, provision and disclosure of personal information.