Joke Collection Website - Public benefit messages - Is it risky to go to the bank to take photos with your mobile phone?

Is it risky to go to the bank to take photos with your mobile phone?

The situation you describe is generally risk-free. However, in order to prevent citizens' personal information from being stolen by others in daily life, the police reminded: 1, and the ID card should not be photographed by strangers at will. When using a copy of the ID card, the purpose should be stated on the copy. 2, in a strange place, try not to connect unfamiliar-,in case the mobile phone is implanted into a Trojan horse to get the content of the mobile phone. 3. Don't turn on the privacy function when installing all kinds of A phones. 4. If the content of the received short message involves the website address, try not to click it if you are not sure of the sender of the short message. 5. Properly handle documents such as express orders and tickets, and don't throw them away at will. 6. In the process of online shopping, set the payment password and mobile phone verification to prevent network information from being stolen.

Is it illegal to take pictures in the bank?

In financial places, photos and videos are not allowed at will, mainly to protect business secrets and security issues.

Compared with other intellectual property rights (patents, trademarks, copyrights, etc.). ), trade secrets have the following characteristics:

1, not for publicity

First, the premise of trade secrets is that they are not known to the public, while other intellectual property rights are open, and even patent rights should be made public to a considerable extent.

2. Non-exclusivity

Second, trade secrets are a relative right. The exclusiveness of trade secrets is not absolute or exclusive. Other people who have obtained business secrets of the same content by legal means have the same status as the first person. The owner of a trade secret can neither prevent the person who developed and mastered the information before him from using or transferring the information, nor prevent the person who developed and mastered the information after him from using or transferring the information.

3. Related interests

Third, it can make operators gain benefits, gain competitive advantages, or have potential commercial benefits.

4. Terminology protection

Fourth, the term of protection of trade secrets is not legal, and it depends on the confidentiality measures of the obligee and the disclosure of this secret by others. A technical secret may last for a long time because of the effective security measures of the right holder and the application value of the technology itself, far exceeding the protection period of the patented technology.

As long as the person takes one of the following measures, it is considered that confidentiality measures have been taken:

(1) Whether confidentiality rules and regulations have been established;

(2) Whether it has signed a confidentiality agreement or put forward confidentiality requirements with the other party or employees;

(3) Whether appropriate management or vigilance measures have been taken in special areas involving trade secrets;

(4) Other targeted and reasonable security measures taken to prevent leaks. Generally speaking, reasonable protection measures include:

1, the operator has established a confidentiality system, and relevant information is clearly classified as confidential.

2. Operators have not formulated a confidentiality system, but explicitly require that certain information be kept confidential. For example, the carrier of this information is clearly marked with the word "confidential".

3. The operator has established a confidentiality system. Although it is not clear whether the information is confidential, according to its confidentiality system, the information is confidential.

4. When disclosing and providing this information to others, the operator explicitly requires confidentiality in relevant contracts or other documents.

5. The operator cooperates with others to develop or entrusts others to develop a new technology, and explicitly requires the confidentiality of the developed technology in the development contract or entrustment contract.

6. In addition, some information can indicate that it belongs to trade secrets according to its attributes, and the obligee does not need to take other confidentiality measures. For example, software developers encrypt the software they develop and make decryption software at the same time.

Such encryption and decryption measures naturally belong to the business secrets of software developers. As long as the developer controls the decryption software, it means that security measures have been taken and no other security measures are needed.