Joke Collection Website - Blessing messages - How to deal with people who go to areas where telecom fraud is serious?
How to deal with people who go to areas where telecom fraud is serious?
Editor's Note: The Law of People's Republic of China (PRC) on Combating Telecommunication Network Fraud was passed at the 36th meeting of the 13th NPC Standing Committee on September 2, 2022, and will come into force on February 1 2022. There are 50 articles in Chapter 7 of the Anti-Telecommunication Network Fraud Law, of which the public security organ 18 is arranged as follows for your key study:
Chapter I General Provisions
1. Anti-telecommunication network fraud is led by public security organs, and relevant departments such as finance, telecommunications, network information, and market supervision perform the main responsibilities of supervision according to their duties and are responsible for anti-telecommunication network fraud in their respective fields. (art 6, para. 3)
Chapter II Telecommunication Governance
2. Telecom operators and Internet service providers shall take technical measures to identify and block illegal equipment and software from accessing the network, and report to the public security organs and relevant industry authorities. (art 14, para. 2)
Chapter III Financial Governance
3. The People's Bank of China will co-ordinate the establishment of a unified anti-money laundering monitoring system across banking financial institutions and non-bank payment institutions, and improve the anti-money laundering suspicious transaction reporting system together with the public security department of the State Council. (Article 18, paragraph 12)
4. The public security department of the State Council shall, jointly with the relevant departments, establish and improve the system of instant inquiry, emergency stop payment, quick freezing, timely unfreezing and return of funds involved in telecommunication network fraud, and clarify the relevant conditions, procedures and relief measures. If the public security organ decides to take the above measures according to law, banking financial institutions and non-bank payment institutions shall cooperate. (Article 20)
Chapter IV Internet Governance
5. Internet service providers shall, according to the requirements of public security organs and telecommunications authorities, check the relevant Internet accounts registered with the calling cards involved and the abnormal calling cards involved in fraud, and take measures such as correcting within a time limit, restricting functions, suspending use, closing accounts and prohibiting re-registration according to the risk situation. (art 22, para. 2)
6. Public security, telecommunications, Internet information and other departments, telecom operators and Internet service providers should strengthen the key monitoring and timely disposal of fraudulent applications downloaded and disseminated by means other than the distribution platform. (art 23, para. 3)
7. If the public security organ handles the case of telecommunication network fraud and obtains evidence according to law, the Internet service provider shall provide technical support and assistance in time. Internet service providers shall, when monitoring fraud-related information and activities in accordance with the provisions of this Law, hand over clues and risk information to public security, finance, telecommunications, internet information and other departments in accordance with the relevant provisions of the state and according to the types and degrees of fraud-related risks. The relevant departments shall establish and improve the feedback mechanism and inform the transfer unit of relevant information in a timely manner. (Article 26)
Chapter V Comprehensive Measures
8. The public security organs should establish and improve the working mechanism to combat and control telecommunication network fraud, strengthen the construction of specialized teams and technologies, and closely cooperate with local public security organs to effectively punish telecommunication network fraud activities according to law. When a public security organ receives a report of telecommunication network fraud or discovers telecommunication network fraud, it shall file a case for investigation in accordance with the provisions of the Criminal Procedure Law of People's Republic of China (PRC). (Article 27)
9. When handling telecommunication network fraud cases, public security organs should also verify the sources of personal information used in the crime and investigate the responsibilities of relevant personnel and units according to law. (Article 29)
10. No unit or individual may illegally buy, sell, lease or lend telephone cards, Internet of Things cards, telecommunication lines, short message ports, bank accounts, payment accounts, Internet accounts, etc. , and shall not provide real-name verification assistance; Do not open the above-mentioned cards, accounts, account numbers, etc. By impersonating another person's identity or fictional agency relationship. Units, individuals and related organizers identified by public security organs at or above the municipal level in districts who commit the acts mentioned in the preceding paragraph, as well as those who have been subjected to criminal punishment for engaging in telecommunication network fraud activities or related crimes, can be recorded in credit records in accordance with the relevant provisions of the state, and can take measures such as restricting their cards, accounts, account numbers and other functions, stopping counter business, suspending new business, and restricting access to the network. If there is any objection to the above identification and measures, a complaint may be filed, and the relevant departments shall establish and improve the complaint channels, credit repair and relief systems. The specific measures shall be formulated by the public security department of the State Council jointly with the relevant competent departments. (Article 31)
1 1. the State Council public security departments, financial management departments, telecommunications authorities and national network information departments should be responsible for the construction of counter-measures in their own industries, promote the sharing of sample information and data related to telecommunication network fraud, strengthen the cross-verification of fraudulent user information, and establish a mechanism for monitoring, identifying, dynamically blocking and disposing of fraudulent abnormal information and activities. (Article 32)
12. The public security organ shall organize banking financial institutions, non-bank payment institutions, telecom operators, Internet service providers, etc. Establish an early warning and dissuasion system with the departments of finance, telecommunications, network information, etc., and take corresponding dissuasion measures in time for potential victims found in early warning. For telecommunication network fraud cases, it is necessary to strengthen the recovery of losses, improve the fund disposal system involved, and return the legitimate property of the victims in time. If the victims who have suffered great difficulties in life meet the relevant national conditions for assistance, the relevant parties shall give assistance in accordance with the regulations. (Article 34)
13. With the decision or approval of the anti-telecommunication network fraud agency in the State Council, public security, finance, telecommunications and other departments can take necessary temporary risk prevention measures in specific areas where telecommunication network fraud is serious in accordance with relevant state regulations. (Article 35)
14. The entry-exit administration can decide not to leave the country for those who go to areas with serious telecommunication network fraud activities and are suspected of major telecommunication network fraud activities. For those who have received criminal punishment for engaging in telecommunication network fraud activities, the public security organs at or above the municipal level may, according to the crime situation and the need to prevent recidivism, decide not to leave the country within six months to three years from the date when the punishment is completed, and notify the entry-exit management agencies to implement it. (Article 36)
15. The public security departments and foreign affairs departments in the State Council will strengthen international law enforcement and judicial cooperation, establish effective cooperation mechanisms with relevant countries, regions and international organizations, and improve the cooperation level in information exchange, investigation and evidence collection, investigation and arrest, and recovery of losses through international police cooperation, so as to effectively crack down on and curb cross-border telecommunication network fraud activities. (Article 37)
Chapter VI Legal Liability
16. those who organize, plan, implement, participate in or provide assistance for telecommunication network fraud activities, which constitutes a crime, shall be investigated for criminal responsibility according to law. If the act mentioned in the preceding paragraph does not constitute a crime, the public security organ shall detain it for more than ten days and less than fifteen days; If the illegal income is confiscated, a fine of not less than one time but not more than ten times the illegal income shall be imposed. If there is no illegal income or the illegal income is less than 1 10,000 yuan, a fine of less than110,000 yuan shall be imposed. (Article 38)
17. Those who violate the provisions of the first paragraph of Article 14 and Article 25 of this Law shall have their illegal income confiscated, and the public security organ or the relevant competent department shall impose a fine of not less than one time but not more than ten times the illegal income; If there is no illegal income or the illegal income is less than 50,000 yuan, a fine of less than 500,000 yuan shall be imposed; If the circumstances are serious, the public security organ shall impose a detention of not more than fifteen days. (Article 42)
Article 14 Paragraph 1 No unit or individual may illegally manufacture, trade, provide or use the following equipment and software:
(1) Phone cards are inserted into equipment in batches;
(2) Equipment and software with functions such as changing calling number, virtual dialing, and illegal access of Internet telephone to public telecommunication network.
(3) Automatic switching system for batch accounts and network addresses, which receives and provides a platform for SMS verification and voice verification in batch;
(4) Other equipment and software used to commit telecommunication network fraud and other illegal crimes.
Article 25 Paragraph 1 No unit or individual may provide the following support or assistance for others to commit telecommunication network fraud:
(1) Selling or providing personal information;
(2) Helping others to launder money through virtual currency transactions;
(3) Other acts of providing support or assistance for telecommunication network fraud activities.
18. In violation of the provisions of the first paragraph of Article 31 of this Law, the illegal income shall be confiscated and the public security organ shall impose a fine of not less than one time but not more than ten times the illegal income; There is no illegal income or the illegal income is less than 20 thousand yuan, and a fine of 200 thousand yuan is imposed; If the circumstances are serious, they shall be detained for not more than fifteen days. (Article 44)
Article 31 Paragraph 1 No unit or individual may illegally buy, sell, lease or lend telephone cards, Internet of Things cards, telecommunication lines, short message ports, bank accounts, payment accounts, internet accounts, etc. , and shall not provide real-name verification assistance; Do not open the above-mentioned cards, accounts, account numbers, etc. By impersonating another person's identity or fictional agency relationship.
- Related articles
- Tomb-Sweeping Day's grave-sweeping poems.
- Software Jumeiyoupin always displays Xiaomei to prompt that the current network is abnormal. Please refresh the error code 2 1004 later.
- What is an automated testing tool?
- The ICCID of China Telecom's IOT card (that is, the 20 digits behind the Sim card) has been cut off. Can I read the ICCID information in the card through my mobile phone?
- How to import Lenovo A350 SMS into USB flash drive
- What are the most touching good morning greetings for couples
- Recruit financial short messages to remind consumers of their consumption purposes.
- How to chat after breaking up? I want to get back together with my ex.
- ICBC sent a text message saying that the savings card is about to expire, so it should be fine, isn't the certificate expired?
- How does Apple 4s intercept SMS?