Joke Collection Website - Blessing messages - Can the network police still see the news of withdrawal?

Can the network police still see the news of withdrawal?

The news of the cancellation of the order is invisible to the network police. There is no way for the network security department, that is, the network police, to directly check your chat records. However, when the suspect's computer and mobile phone have been seized by the network security department and the account password is known, professional software can be used to check the evidence and fix it.

First, the concept of WeChat

Wechat is a free application launched by Tencent on 2011,which provides instant messaging service for intelligent terminals. It was created by the product team of Tencent Guangzhou R&D Center led by Zhang Xiaolong. Wechat supports fast sending of free voice messages, videos, pictures and texts across communication operators and operating system platforms. At the same time, you can also share streaming media content and location-based social plug-ins, and use service plug-ins such as "shake", "drift bottle", "circle of friends", "public platform" and "voice notepad". Wechat provides public platform, friends circle, message push and other functions. Users can add friends and pay attention to public platforms by "shaking", "searching for numbers", "people nearby" and scanning QR codes. At the same time, WeChat will share the content with friends and share the wonderful content that users see to WeChat friends circle.

Second, the network police

According to Article 6 of the People's Police Law of the People's Republic of China, the people's police shall perform the duties of "computer information system security supervision and management" according to law. In other words, the people's police engaged in public information network security supervision should be called "network police"

The emergence of network police is the result of the development of network security. Facing the severe network security situation, the network police must undertake the security work of supervising and managing the computer information system, which requires the network police to have higher political quality, professional quality, professional quality, cultural quality and physical quality. Only in this way, the network police can cope with the increasingly rampant cyber crime and be truly competent for the security protection of computer information systems.

Three. Statutory function

According to item 12 of Article 6 of the People's Police Law of the People's Republic of China adopted at the1995th meeting of the Eighth National People's Congress, the people's police of public security organs shall perform the duties of "supervision and management of computer information system security protection" according to law.

According to Article 6 of the Regulations on the Security Protection of Computer Information Systems in People's Republic of China (PRC) (1994) promulgated by the State Council, "The Ministry of Public Security is in charge of the security protection of computer information systems nationwide", Article 17 stipulates: "The public security organs shall exercise the following supervisory powers over the security protection of computer information systems:

(a) to publicize the laws, regulations and rules on the security protection of computer information systems;

(two) to check the security protection of computer information systems;

(3) Managing the prevention and control of computer viruses and other harmful data;

(four) to supervise and inspect the sales activities of special products for computer information system security;

(five) to investigate and deal with illegal and criminal cases that endanger the security of computer information systems;

(six) other duties that should be performed according to law.

Legal basis:

People's Republic of China (PRC) Civil Code

Article 1032 Natural persons have the right to privacy. No organization or individual may infringe upon the privacy rights of others by spying, harassing, exposing or making public.

Privacy is the private space, private activities and private information that natural people live in peace and don't want to be known by others.

Article 103 Unless otherwise provided by law or expressly agreed by the obligee, no organization or individual may commit the following acts:

(a) by telephone, SMS, instant messaging tools, e-mail, leaflets, etc. Disturb the private life of others;

(2) Entering, taking photos or peeping into other people's private spaces such as houses and hotel rooms;

(3) Shooting, peeping, eavesdropping or revealing other people's private activities;

(4) Shooting or peeping at the private parts of others' bodies;

(5) handling other people's private information;

(6) Infringe upon the privacy of others in other ways.

Article 1034 The personal information of natural persons is protected by law.

Personal information is all kinds of information recorded electronically or in other ways that can identify a specific natural person alone or in combination with other information, including natural person's name, date of birth, ID number, biometric information, address, telephone number, e-mail address, health information, whereabouts information, etc.

The privacy information in personal information shall be subject to the provisions on privacy; If there are no provisions, the provisions on the protection of personal information shall apply.

Article 1035 The handling of personal information shall follow the principles of legality, justice and necessity, and shall not be over-handled, and meet the following conditions:

(1) Obtaining the consent of the natural person or his guardian, except as otherwise provided by laws and administrative regulations;

(2) Rules for publicly handling information;

(3) Clearly explain the purpose, mode and scope of information processing;

(four) does not violate the provisions of laws and administrative regulations and the agreement between the two parties.

The processing of personal information includes the collection, storage, use, processing, transmission, provision and disclosure of personal information.