Joke Collection Website - Blessing messages - What are the consequences of information leakage?

What are the consequences of information leakage?

1. What are the consequences of information leakage?

1, information disclosure will lead to the following consequences:

(1) spam messages. Personal information disclosure is vulnerable to spam messages;

(2) harassing phone calls;

(3) Spam. All kinds of junk mail will bring great trouble to work, which is mainly sales promotion mail;

(4) Credit card overdraft. After the information is leaked, someone may use this information to apply for a credit card, and then maliciously overdraw the credit card, resulting in the low credit of the parties, which will have an unpredictable impact on future bank loans and mortgages.

2. Legal basis: Article 1034 of the Civil Code of People's Republic of China (PRC).

Personal information of natural persons is protected by law.

Personal information is all kinds of information recorded electronically or in other ways that can identify a specific natural person alone or in combination with other information, including natural person's name, date of birth, ID number, biometric information, address, telephone number, e-mail address, health information, whereabouts information, etc.

The privacy information in personal information shall be subject to the provisions on privacy; If there are no provisions, the provisions on the protection of personal information shall apply.

Article 1035

The handling of personal information shall follow the principles of legality, justice and necessity, and shall not be over-handled, and meet the following conditions:

(1) Obtaining the consent of the natural person or his guardian, except as otherwise provided by laws and administrative regulations;

(2) Rules for publicly handling information;

(3) Clearly explain the purpose, mode and scope of information processing;

(four) does not violate the provisions of laws and administrative regulations and the agreement between the two parties.

The processing of personal information includes the collection, storage, use, processing, transmission, provision and disclosure of personal information.

Second, how to deal with the disclosure of personal information

Personal information disclosure, processing methods are as follows:

1. When citizens find that personal information has been leaked, they can ask the network service provider or infringer to delete the leaked private information;

2. You can report to relevant law enforcement departments, local public security organs, consumer associations or departments that manage the Internet;

3, can use legal weapons to safeguard their legitimate rights and interests, if necessary, ask the infringer to compensate for the losses or apologize.