Joke Collection Website - Blessing messages - Without the consent of the collected person, the network operator shall not provide personal information to others.

Without the consent of the collected person, the network operator shall not provide personal information to others.

Network operators shall not disclose, tamper with or destroy the personal information they collect; Personal information shall not be provided to others without the consent of the person being collected. Except for information that cannot identify a specific individual after processing and cannot be recovered.

Network operators shall not collect personal information irrelevant to the services they provide, and shall not collect and use personal information in violation of the provisions of laws and administrative regulations and the agreement between the two parties, and shall handle the personal information they save in accordance with the provisions of laws and administrative regulations and the agreement with users.

When collecting and using personal information, network operators should follow the principles of legality, fairness and necessity, make public the rules of collection and use, clearly state the purpose, manner and scope of collection and use of information, and obtain the consent of the person being collected.

Network operators should take technical measures and other necessary measures to ensure the safety of personal information collected by them and prevent information from being leaked, damaged or lost. When personal information is leaked, damaged or lost, it shall immediately take remedial measures, inform users in a timely manner according to regulations, and report to relevant competent departments.

How to protect personal information

In view of the main ways of personal information disclosure, we should pay attention to or do the following five aspects to protect personal information:

(1) Protect your personal privacy information such as your ID number, bank card number and password. Don't tell this information to others by email, text message or telephone at will, no matter how reliable you think this person is.

(2) Protect the safety of personal computers and mobile phones. For example, by installing a firewall to prevent intruders from accessing personal computers and mobile phones remotely; Using complex passwords will make it more difficult for hackers to crack them. When you are not using the computer, be sure to turn it off.

(3) Clean up "information garbage" reasonably. Clean up personal privacy before throwing away files containing private information.

(4) Read bank statements, bills and credit card reports carefully to confirm that there are no suspicious transactions.

(5) Pay attention to online shopping: first confirm whether the website is safe, and then enter credit cards and personal information.

The consequences of personal information disclosure are:

1, spam message. Personal information disclosure is vulnerable to spam messages.

2. harassing phone calls.

3. Spam. All kinds of junk mail will bring great trouble to work, and these junk mails are mainly sales promotion mails.

The credit card is overdrawn. After the information is leaked, someone may use this information to apply for a credit card, and then maliciously overdraw the credit card, resulting in the low credit of the parties, which will have an unpredictable impact on future bank loans and mortgages.

5. Criminals cheat. Criminals will use information to defraud relatives around the parties.

Legal basis:

"Network Security Law" Article 40 Network operators shall keep the user information they collect strictly confidential and establish and improve the user information protection system.