Joke Collection Website - Blessing messages - How to protect your personal information?

How to protect your personal information?

Question 1: How to protect personal online information In fact, when you go online, especially when you need to send some information containing personal privacy, it is easy to leave your own traces on the network you pass. If these clues are unfortunately intercepted and used by hackers, it will be a big trouble-although the probability is relatively low, you should always be more careful in the face of today's disorderly network. Especially now, with the rapid development of e-commerce, many netizens have opened accounts in e-banks. With their own electronic wallets, they should be more cautious when surfing the internet. Below, I will give you some suggestions to protect the security of personal information on the Internet. 1. Reject cookie-cookie are files created and sent by some websites, which store some personal information of Internet users, such as their identities and preferences when visiting websites. If you are uneasy about cookies that record personal information, you can make the necessary settings in your browser, ask the browser to remind you before accepting cookies, or reject them directly. According to the general explanation, cookies will be automatically deleted from the computer when the user closes the browser, that is, Internet Explorer. However, I found that many cookies break the rules and stay on the hard disk-in fact, some cookies are designed to stay on our computers so as to serve their owners at any time. For example, sometimes, when a user logs into a website, he will receive a welcome message and tell the user the number of times he logged into the website. Most of these strange things are because Kutcher is playing tricks. Cookie, a rather clever thing, is quietly increasing on the hard disk, which is always not a good thing. Firstly, some cookies contain our personal data. Secondly, the possibility of some malicious cookies cannot be ruled out. Therefore, we need to be vigilant against them. -The way to adjust Cookie settings in the browser is to select Tools *Internet option; Click the Custom Level button in the Security tab; Find the settings about Cookie in the security settings dialog box that opens, and then select Disable or Prompt. In fact, in this dialog box, we can also set other security options to further improve the security of surfing the Internet. 2. Clean the browser cache frequently-the browser cache will keep many records of our surfing the Internet, including the Cookie mentioned above. Cleaning them often helps to protect personal data. Cleaning the browser cache is no trouble. Simply select Tools *Internet option, and then click the Delete File button in the Internet Temporary Files option on the General tab to delete the information saved in the browser cache. 3. Set up restricted websites-We often learn from some newspapers and magazines that some hacker websites or other websites will maliciously steal user information. After knowing the basic information of such websites, if we want to prevent our family members (such as children) from getting into trouble when they accidentally bump into such networks, we can blacklist these websites in the browser, so that the browser can automatically reject some unfavorable instructions sent by these websites. The solution is: select Tools *Internet option, and click the restricted site icon in the "Please specify security settings for Web content in different areas" option in the security tab; Click the site button to the right of the restricted site to add the address of the site to be restricted. -Setting restricted websites can only limit the access of some malicious websites to us to a certain extent ... ";

Question 2: How to protect the security of personal information? Just make sure that things like credit cards and bank cards are not lent out, otherwise they will be stolen and credit problems will come. I have been using Industrial Bank's credit card, and I will receive a text message when the card moves, which is quite reassuring.

Question 3: How can we ensure the security of personal information and how should we protect it? Recently, many news reports have leaked personal information, and people pay more and more attention to the protection of personal information. I personally think that apart from strengthening the protection of personal information by legislation in this respect. We should also start from ourselves and strengthen the awareness of personal information protection. Usually, when you take public transportation such as subway and bus, there are some short films about this knowledge. After searching online, Gu 'an has a professional FLAS movie about information security, including personal information security, which is very interesting and practical. If you are interested, you can search ~

Question 4: There is no way to protect your personal information. ...

Now * * * organs, industry and commerce, taxation and telecommunications will all disclose your information. Some companies also brush their mobile phones at intervals.

Question 5: How to protect personal privacy 1. Don't submit personal information on the website. This is very important. Your privacy is usually leaked by yourself unintentionally, so don't submit your information on the website easily. Except for bank websites and famous e-commerce websites, other websites should not submit their true information. For example, a few years ago, you may have entered your personal information on the rogue website 5460 alumni record. Today, you will find that your personal information has been copied to at least four or five websites for people to search and query. Therefore, it is inappropriate to submit your real information on websites or community systems. 2. publish an article and think twice before you act. Posting and blogging on the Internet. Don't write some private information just because your blog visitors are few, no one will pay attention to it. Once an article is published, it cannot be taken back. It will be archived, reprinted and even spread to many websites you never know, and the tentacles of search engines will find any corner of the Internet. Therefore, you must think twice before writing an article. If you don't want some people to see your article, don't read it. 3. Use a secure password. If you have to save your own information (such as email, personal diary, etc.). ), you must use a secure password to protect it. The so-called security password is usually a password with a length of more than 6 digits and composed of letters and numbers, which is not easy to guess. 4. The security of personal computers. The computer you use should have enough security settings, install the latest operating system patches, enable the firewall, install anti-virus software, and don't visit any phishing websites. To ensure that personal computers are not hacked. If the intrusion is abnormal, you should disconnect the network cable at the first time, and then carry out inspection and maintenance. There are also some tips on how to check whether your personal privacy has been leaked. 1, regularly use Baidu and Google to search your real name. Pay attention to the contents of the first three pages to see if there is any private information related to you. 2. Regularly use Baidu and Google to search for name+personal information (such as personal work unit, school, address, telephone number, etc.). ). Through this combined query, you can know your information leakage more accurately. What should I do if my privacy is leaked? 1. If it is a web page created by yourself or the information filled in, you can directly log in to the website to delete it. 2. If it is posted on a third-party website, please contact the webmaster of the other party by email or telephone and ask him to delete personal privacy information. After these operations, you can delete the personal privacy information that has been indexed on the website. However, it should be noted that Baidu and Google's webpage snapshots will still retain this information for a period of time (usually several months), so it is best to inform Baidu and Google to ask them to delete the privacy information in the search engine cache.

Question 6: How do we protect personal information? Yes, we should develop good living habits in our daily life, properly handle items containing personal real information, such as payment receipts, courier bills, copies of ID cards, try to avoid posting personal high-definition photos on social networking sites, and protect personal information from malicious use. It is best to intercept fraudulent short messages intelligently through security software such as Tencent Mobile Manager; If you accidentally click on the link, the mobile phone housekeeper will give a risk warning and inform the user that the website is a malicious website and it is not recommended to visit it; If you continue to operate, the mobile phone housekeeper can also kill the Trojan virus behind the link, see through every trap set by the scammer and effectively protect it to avoid privacy leakage and property loss.

Question 7: How to protect personal information security? There are also companies that suddenly inform you that you have won the prize and ask you to pay a certain handling fee before receiving the prize, and you don't even know what kind of prize-winning activities you participated in. None of this is surprising. What's more, you can find your ID number, home address, home phone number, etc. On the Internet, the price is 10 cents. What is even more frightening is that the money in your credit card and medical insurance card has been overdrawn and withdrawn, your housing provident fund account has been cancelled, and the provident fund management agency has even produced proof that you are dead. In a word, there are two ways to leak information. One is that we fill it out voluntarily and then sell it to unscrupulous businessmen for profit. For example, in order to apply for a bank card, we must fill in all kinds of information according to the requirements of the bank. After obtaining the information, the bank or its employees disclosed our information to the insurance company intentionally or unintentionally for some purpose, so we received a disturbing sales call from the insurance company. The second is network leakage. According to CCTV reports, a virus named "Top Fox Stutters" can easily invade our computers, monitor our computer operations and record them, so as to obtain our online account password and easily withdraw the deposits in our accounts. A more complicated virus can even invade our computer, automatically manipulate the computer and open any folder on our computer, so our computer becomes a plucked "broiler". Personal information is very important, and others are not allowed to violate it at will. However, China's current legislation is not enough to protect personal information security. At present, the biggest measure to protect personal information security in China is the newly adopted Criminal Law Amendment (VII), which stipulates that state organs, financial, telecommunications, medical and other institutions will be punished if they sell or illegally provide personal information to others after obtaining personal information, and if they steal or illegally obtain personal information by other means, they will also be punished. However, the effect of this kind of punishment after the event is limited. To protect information security, we must put an end to this kind of behavior from the source. It is a common practice in other countries or regions to establish a personal information security management organization. For example, in France, the State Information Management Committee is responsible for managing the security of personal information, while in Hong Kong, the Personal Data (Privacy) Office is responsible for this matter. There is no such institution in China, so the management is chaotic. Strict information collection and registration system is very important to protect information. In France, the collection of personal information must be approved by the State Information Management Committee, and it is forbidden to collect personal information without permission. When the collection of personal information is approved, the applicant must sign and promise to use personal information only for the application. For example, people who apply for banking business may not use their information for insurance business or other business, and if they use it for other business, they will be severely punished by the regulatory authorities. When an applicant collects information from an individual, the law requires that the information collector must sign the information form and promise that he will protect the private information of the individual from being leaked. If he breaks his promise, he must compensate the individual. In addition, when citizens apply for telephone calls, telecom operators are not allowed to send them as long as they declare that they do not accept advertisements and spam messages. Facing the network era, the state must attach importance to the protection of network information. Network information stealing is different from real stealing. Trojan horse programs can almost steal personal information. In order to ensure the security of network information, the state must strengthen the anti-network theft system, otherwise, no one dares to use modern trading equipment like online banking. Of course, it is also very important to educate citizens about information security when protecting personal information security. It is said that in the United States, there is a clear reminder on the waste paper box of banks: "Personal information theft is very serious, please pay attention to protection." In Hong Kong, * * * often holds lectures on personal information security to raise citizens' awareness of self-information protection. In places where confidence and safety are easy to leak, there are obvious signs to remind citizens to pay attention to information protection. If information is leaked and illegally used by others, foreign metropolises will impose heavy penalties and reduce the illegal rate by increasing the illegal cost. France imposed a fine of 300,000 euros on those who caused others' reputations or other damages by disclosing private information. In the United States, a similar situation may lead to a fine of $6,543,800+0,000. Not only that, the person who leaks information also needs to bear tort liability, and the person who causes damage to it bears civil compensation liability. It is inevitable that people who violate the criminal law will go to jail. In this way, in foreign countries, the criminal, civil and administrative responsibilities of information security are intertwined, forming relatively strict relief measures afterwards. In contrast, China's information protection only stipulates criminal responsibility, which is far from meeting the actual needs. In the case that relevant systems have been established abroad, there is "";

Question 8: How to protect personal information security? At present, when inquiring about personal credit reports, others can also inquire about credit reports through their own authorization, and they need to show the relevant materials for inquiry, such as the inspector's ID card, inquiry power of attorney, notarial certificate, etc. , and pay special attention to the use of identity cards. Experts suggest that when providing a copy of ID card, citizens should indicate the purpose of the copy of ID card, and write "Only for ... Reproduction is invalid" directly after the name, and add a horizontal line after writing, so that no other content can be added before and after. The written words deliberately cross the copied words, and if necessary, a red handprint or seal can be attached, which makes it difficult for others to copy and reuse.

Question 9: Now is the information society, and personal information is becoming more and more important. How can we improve the protection of personal information? Just use the internet. Besides, if you use high-ranking people, they will not be easily attacked.