Joke Collection Website - Blessing messages - How to protect personal information security?

How to protect personal information security?

1. Personal information processors can take measures to protect information security, including:

(1) Formulate internal management system and operating procedures;

(2) Classified management of personal information; Take corresponding encryption, etc.

2. Legal basis: People's Republic of China (PRC) (China) Personal Information Protection Law.

Article 51? Personal information processors shall take the following measures according to the processing purpose, processing mode, type, impact on personal rights and interests and possible security risks of personal information, ensure that personal information processing activities comply with the provisions of laws and administrative regulations, and prevent unauthorized access, disclosure, tampering and loss of personal information:

(1) Formulate internal management system and operating procedures;

(2) Classified management of personal information;

(3) Take corresponding security technical measures such as encryption and de-identification;

(4) Reasonably determine the operation authority of personal information processing, and regularly conduct safety education and training for employees;

(five) to formulate and organize the implementation of emergency plans for personal information security incidents;

(6) Other measures prescribed by laws and administrative regulations.

Second, how to deal with the disclosure of personal information

1. We should collect relevant evidence and clues. After personal information is leaked, we should collect some strange phone calls and emails, and the collected information is conducive to our rights protection. After giving the evidence to law enforcement, you can not only help yourself, but also help others.

2. Personal information disclosure, if it causes serious consequences, we can choose to report it to law enforcement departments. Stealing other people's personal information and selling it or other illegal acts, if the circumstances are serious, will constitute a criminal offence, and then the public security organs must investigate. Therefore, when our personal information is leaked, we have to protect our legitimate rights and interests through relevant law enforcement departments. Another advantage of reporting a case is to file it with law enforcement agencies to prevent more similar situations from happening.