Joke Collection Website - Public benefit messages - When you watch Tik Tok, will texting reveal the content of the message?

When you watch Tik Tok, will texting reveal the content of the message?

Maybe.

Related cases are as follows: Tik Tok and WeChat Reading were convicted of infringing users' personal information. On July 30, Beijing Internet Court made a first-instance judgment, and found that both Tik Tok and WeChat reading app infringed on users' personal information. Two cases have also become typical cases after the promulgation of the Civil Code of People's Republic of China (PRC), which embodies the protection of citizens' personal information rights and interests in the Internet age by the Civil Code. In the case of Ling Moumou, the plaintiff Ling Moumou used his mobile phone number to register and log in to the App, and was recommended a large number of "people who may know". There are no other contacts in the mobile phone address book except himself, including classmates and friends who have not been in contact for many years. Ling Moumou believed that Tik Tok App illegally obtained his personal information and privacy, which constituted infringement, and sued Beijing Micro Broadcasting Vision Technology Co., Ltd. (hereinafter referred to as Micro Broadcasting Vision Company), the operator of Tik Tok App, to the Beijing Internet Court. On July 30, the Beijing Internet Court pronounced the case in the first instance, and found that the App handled its personal information without Ling's consent, which constituted infringement.

Personal privacy protection: 1. Don't reveal personal real information casually. When using various online accounts, except for the inevitable "real name authentication", don't fill in your real name and real information casually in your personal data-try not to take photos on personal blogs and social networking sites and expose your real and private information. Besides real name, age, date of birth and ID number, even personal hobbies are private information. )

2. Don't save important information on computers and mobile phones, and try not to use network disks and cloud storage to avoid information being stolen. You can save data to the mobile hard disk, and the mobile hard disk that stores important data is not borrowed or plugged into a public computer casually. Update anti-virus and security software on computers and mobile phones in time, kill viruses irregularly, and clean up garbage and traces in time after using computers and mobile phones. (Network disk and cloud storage are convenient, but there is a risk of leakage. Important documents, private information and trade secrets, and internal documents of the company shall not be stored in the network disk and cloud storage. )

Nowadays, smartphones have cameras, and both the front and rear cameras are at risk of being stolen by hackers-especially when using wireless networks. If you don't often make video calls and take photos, it is recommended to cover the camera with a nice sticker and uncover it when taking photos and video chatting. You can touch the back of the sticker with your finger to reduce the stickiness of the sticker, and then stick it on your mobile phone, so that it won't be uncovered. Unplug the camera on the computer as long as it is not used. )

4. Change the password of the network account from time to time. Password setting should not be too simple, not less than 8 digits (it is best to set a few digits when the website requires the most, whether it is 14, 16 or 20 digits, until it is full; Use letters, characters and numbers as needed, letters are case sensitive). Don't use birthday and mobile phone number as passwords, and don't use common passwords on different accounts. Be sure to turn on and use login protection on online accounts, such as verification code and SMS verification code, as well as mobile phone tokens and micro shields.