Joke Collection Website - Blessing messages - Without the consent of the collected person, the network operator shall not provide personal information to others.
Without the consent of the collected person, the network operator shall not provide personal information to others.
Network operators shall not collect personal information irrelevant to the services they provide, and shall not collect and use personal information in violation of the provisions of laws and administrative regulations and the agreement between the two parties, and shall handle the personal information they save in accordance with the provisions of laws and administrative regulations and the agreement with users.
When collecting and using personal information, network operators should follow the principles of legality, fairness and necessity, make public the rules of collection and use, clearly state the purpose, manner and scope of collection and use of information, and obtain the consent of the person being collected.
Network operators should take technical measures and other necessary measures to ensure the safety of personal information collected by them and prevent information from being leaked, damaged or lost. When personal information is leaked, damaged or lost, it shall immediately take remedial measures, inform users in a timely manner according to regulations, and report to relevant competent departments.
How to protect personal information
In view of the main ways of personal information disclosure, we should pay attention to or do the following five aspects to protect personal information:
(1) Protect your personal privacy information such as your ID number, bank card number and password. Don't tell this information to others by email, text message or telephone at will, no matter how reliable you think this person is.
(2) Protect the safety of personal computers and mobile phones. For example, by installing a firewall to prevent intruders from accessing personal computers and mobile phones remotely; Using complex passwords will make it more difficult for hackers to crack them. When you are not using the computer, be sure to turn it off.
(3) Clean up "information garbage" reasonably. Clean up personal privacy before throwing away files containing private information.
(4) Read bank statements, bills and credit card reports carefully to confirm that there are no suspicious transactions.
(5) Pay attention to online shopping: first confirm whether the website is safe, and then enter credit cards and personal information.
The consequences of personal information disclosure are:
1, spam message. Personal information disclosure is vulnerable to spam messages.
2. harassing phone calls.
3. Spam. All kinds of junk mail will bring great trouble to work, and these junk mails are mainly sales promotion mails.
The credit card is overdrawn. After the information is leaked, someone may use this information to apply for a credit card, and then maliciously overdraw the credit card, resulting in the low credit of the parties, which will have an unpredictable impact on future bank loans and mortgages.
5. Criminals cheat. Criminals will use information to defraud relatives around the parties.
Legal basis:
"Network Security Law" Article 40 Network operators shall keep the user information they collect strictly confidential and establish and improve the user information protection system.
- Previous article:What is the function of Industrial Bank SMS password and how to open it?
- Next article:My China Unicom card sent text messages to customer service but there was no reply. Other text messages function normally. With dual SIM cards and dual standby, the other card can send and receive tex
- Related articles
- In what way will the court notify individuals after freezing their bank accounts?
- The difference between communication signal and communication signal
- Does Shanghai Prevention and Control Office want information to be ignored?
- Our family will spend the Spring Festival together this year, and we will toast the New Year's Eve. Please write a paragraph for me.
- What are the methods of bank collection for overdue credit cards?
- Why is Ren'ai Reef not afraid of typhoons?
- When will the 2022 Shandong National Games be held?
- What should I do if I encounter DNS hijacking of operators?
- Is nearby Bao a liar? Keep texting me to pick up the courier. How much is the charge?
- Which online loan is Beijing Zhongguancun Bank?