Joke Collection Website - Blessing messages - How to report personal privacy leaks online

How to report personal privacy leaks online

You can report by phone, that is, the reporter uses the phone to report to the reporting agency or relevant department responsible for accepting such cases according to the nature of the case clues he has. You can also report to the Internet management department. The China Internet Illegal and Bad Information Reporting Center under the Cyberspace Administration of China will accept and handle reports from the public on illegal and bad information on the Internet.

Reporting method:

(1) Telephone reporting means that the reporter calls the reporting agency or relevant department responsible for handling such cases according to the nature of the case clues he has. report. In order to facilitate whistleblowers to make telephone reports, all departments that have set up reporting agencies or departments responsible for accepting reports have publicly set up special reporting hotlines and have people on duty day and night.

(2) Reporting by letter means that the whistleblower writes the clues he has about the case to the reporting agency or relevant department responsible for accepting such cases for reporting.

(3) Face-to-face reporting means that the whistleblower goes to the relevant reporting agency or relevant responsible department in person and reports to the staff of the reporting agency in person.

(4) The China Internet Illegal and Inappropriate Information Reporting Center under the Cyberspace Administration of China will be dedicated to accepting and handling reports from the public on illegal and harmful information on the Internet. ”

Legal basis: Article 1038 of the "People's Republic of China and Civil Code" Information processors shall not disclose or tamper with the personal information they collect or store; without the consent of the natural person, no information processor shall Illegally provide personal information to others, except where the specific individual cannot be identified after processing and cannot be restored. Information processors shall take technical measures and other necessary measures to ensure the security of the personal information they collect and store and prevent information leakage, tampering, and loss. ; If personal information is or may be leaked, tampered with, or lost, remedial measures must be taken promptly, the natural person shall be notified in accordance with regulations, and the matter shall be reported to the relevant competent authorities.