Joke Collection Website - Blessing messages - Is it illegal to post other people’s private information online?

Is it illegal to post other people’s private information online?

Legal subjectivity:

1. Is it illegal to leak other people’s privacy online?

It is illegal to leak other people’s privacy online, causing the victim or his close relatives to become mentally disordered, self-harm, or commit suicide. If there are serious consequences, etc., it will constitute a crime and criminal liability can be pursued.

Article 2 of the "Interpretation of the Supreme People's Court and the Supreme People's Procuratorate on Several Issues concerning the Application of Law in the Handling of Criminal Cases Using Information Networks to Commit Defamation" states that any person who uses information networks to defame others under any of the following circumstances shall be deemed It is the "serious circumstance" stipulated in the first paragraph of Article 246 of the "Criminal Law":

(1) The same defamatory information is actually clicked, viewed more than 5,000 times, or forwarded more than 5,000 times More than 500 times;

(2) Causing serious consequences such as mental disorder, self-mutilation, suicide, etc. to the victim or his close relatives;

(3) Having been punished for defamation within two years Administrative punishment and defamation of others;

(4) Other serious circumstances.

2. Infringement of the privacy of others

Article 1032 of the "People's Republic of China and the Civil Code" stipulates that natural persons enjoy the right to privacy. No organization or individual may infringe on the privacy rights of others through spying, intrusion, leakage, disclosure, etc.

Privacy is the peace of private life of natural persons and the private space, private activities and private information that a natural person does not want to know about others.

Article 1033. Except with the explicit consent of the right holder, no organization or individual may carry out the following acts:

(1) Using text messages, phone calls, or instant messaging tools Intruding on others’ private lives and peace through such methods as emails, flyers, etc.;

(2) Entering, peeping into, and photographing other people’s homes, hotel rooms, and other private spaces;

(3) Photographing , recording, publicizing, peeping on, and eavesdropping on other people’s private activities;

(4) Photographing and peeping on other people’s private parts of the body;

(5) Collecting and processing other people’s private information;

(6) Violating the privacy rights of others in other ways.

3. How to protect personal privacy on the Internet

1. Do not submit personal information on the website. This is crucial. Your privacy is usually leaked by yourself unintentionally. Therefore, do not submit your information easily on websites. In addition to bank websites and famous e-commerce websites, do not submit your true identity on other websites. Information; For example, a few years ago you may have entered your personal information on the rogue website 5460. Today you will find that your personal information has been copied to at least four or five websites for search and query. Therefore, it is inappropriate to submit your true information on websites or community systems.

2. Think twice before publishing an article. Post posts and blogs on the Internet. Don’t write some private information just because your blog has few visitors and no one will notice it. Once an article is published, it cannot be taken back. The article will be archived, reprinted, and even Spread to many websites that you never know, and the tentacles of search engines will find every corner of the Internet. Therefore, you must think twice before writing an article. If you don’t want certain people to see your article, Then don't publish it, because sooner or later the article will be seen by others.

3. Use a secure password. If you must save your own information on the Internet (such as emails, private diaries, etc.), you must use a secure password to protect it. The so-called secure password is usually more than 6 characters in length and contains letters and numbers. Passwords that are difficult to guess.

4. Personal computer security.

The computer you use must have adequate security settings, apply the latest operating system patches, enable firewalls, install anti-virus software, and do not visit any phishing websites, etc. to ensure that your personal computer is not hacked. If an abnormal situation of intrusion is found, the network cable should be disconnected as soon as possible, and then detected and repaired. The law is objective:

Article 252 of the "Criminal Law" Whoever conceals, destroys or illegally opens other people's letters and infringes upon citizens' right to freedom of communication shall, if the circumstances are serious, be sentenced to fixed-term imprisonment of not more than one year or criminal detention. Article 253 Postal workers who open, conceal, or destroy mail or telegrams without permission shall be sentenced to fixed-term imprisonment of not more than two years or criminal detention. Anyone who commits the crime in the preceding paragraph and steals property shall be convicted and severely punished in accordance with the provisions of Article 264 of this Law.