Joke Collection Website - Public benefit messages - How to prevent mobile phones from revealing personal information?

How to prevent mobile phones from revealing personal information?

The methods to prevent personal information from being leaked by mobile phones are as follows:

1, put an end to carelessness and luck. Nowadays, many people can only use mobile phones, but they don't know much about the information data of mobile phone memory cards being destroyed, the hidden dangers of mobile phone information security and technical loopholes. Therefore, it is necessary to put an end to paralysis and luck, strengthen study, effectively recognize all kinds of security risks in the process of using mobile phones, recognize the ways and means of leaking personal information by mobile phones, fully realize the serious consequences of mobile phone leakage, and let mobile phones "sound the alarm bell" to prevent leakage;

2, master the safety knowledge. For special people, special places and special content, special mobile phone management methods should be used. For secret-related personnel, such as military personnel and confidential personnel, it is necessary to formulate a strict mobile phone management and use system, or distribute special mobile phones with strong confidentiality, so that special planes can be used exclusively. For confidential places, mobile phone security equipment should be set up in accordance with the confidentiality provisions. Don't carry and use mobile phones in confidential places, and don't use mobile phones to record, video, photograph and transmit confidential content;

At the same time, don't easily answer and receive phone calls, short messages, multimedia messages and emails from strangers. If necessary, turn off the mobile phone and completely cut off the power supply of the mobile phone to prevent being implanted with viruses or Trojans. Don't set the phone to log in automatically, and enter the password every time you log in. We should make full use of the pattern and password lock function of the mobile phone to prevent others from unlocking the screen and peeping into personal privacy. Smartphone users should cancel the login status of their mobile phone accounts in time after using network services. It is also necessary to delete possible sensitive information regularly and timely;

3. Strictly abide by the confidentiality provisions. Confidentiality clause not only plays an inestimable role in protecting enterprise data, business secrets and even national security, but also helps to protect personal privacy. To this end, we must earnestly abide by the confidentiality provisions, especially do not store or process important confidential information in mobile phones, and put an end to the occurrence of leaks from the source. It is necessary to avoid revealing relevant important information in letters, WeChat and emails. Don't store sensitive information such as the work unit and position of the core personnel in the mobile phone. Abbreviations or codes can also be used to avoid the complete exposure of important and sensitive information;

4. Download the software on the regular platform. When downloading software, smartphone users should log on to the official platform to avoid downloading in the forum. Don't use unknown software, don't browse bad web pages. Insist on repairing mobile phones in regular mobile phone operators to prevent being implanted with virus programs. When installing the software, be sure to check the permission list requested by the software in detail, and be especially vigilant when sensitive permissions appear. If the software requires an address book, short message, etc. unrelated to the service. , or install a reader program but require access to the camera, you should be alert to whether there is a trap;

5. Strictly control the system authority. Mobile phone users should establish risk awareness and try to avoid granting access to personal privacy and network to suspicious programs at the same time. Functions that are not usually used or rarely used, such as Bluetooth, infrared, mobile phone positioning, high-definition camera, etc. , should be turned off or stopped, so as to prevent the mobile phone from being attacked remotely or searched by viruses, and then turned on when these functions are needed. When using the external network, only use the network you know and trust, and don't send important personal information easily;

6. Completely delete unnecessary information. When the user deletes or formats the information in the mobile phone storage medium, the information is not really erased, but the main boot area information is deleted, its control structure is modified, and it is marked as rewritable. When new information is stored, the original information can be overwritten, but when it is not overwritten, as long as it is not destroyed for physical reasons, the information remains in the storage medium and can be recovered. Therefore, when changing a mobile phone or deleting related information, you can choose mobile phone software with data shredding function, or after formatting the mobile phone, repeatedly store a large number of useless data such as movies, junk files and pictures in the memory of the mobile phone, and then delete these information repeatedly, so that invalid information fills the space of the mobile phone repeatedly, completely covering the original information, which increases the difficulty of data recovery. In addition, old mobile phones should not be transferred or sold at will, and should be physically destroyed to avoid the risk of revealing privacy.

Legal basis: Article 253rd one of the Criminal Law of People's Republic of China (PRC).

The crime of infringing citizens' personal information violates the relevant provisions of the state and sells or provides citizens' personal information to others. If the circumstances are serious, he shall be sentenced to fixed-term imprisonment of not more than three years or criminal detention, and shall also or only be fined; If the circumstances are especially serious, he shall be sentenced to fixed-term imprisonment of not less than three years but not more than seven years and shall also be fined.

Whoever, in violation of the relevant provisions of the state, sells or provides others with personal information of citizens obtained in the course of performing their duties or providing services shall be given a heavier punishment in accordance with the provisions of the preceding paragraph.

Whoever steals or illegally obtains citizens' personal information by other means shall be punished in accordance with the provisions of the first paragraph.

Where a unit commits the crimes mentioned in the preceding three paragraphs, it shall be fined, and the persons who are directly in charge and other persons who are directly responsible shall be punished in accordance with the provisions of the preceding three paragraphs.