Joke Collection Website - Public benefit messages - How to inquire about criminal information?

How to inquire about criminal information?

Personal criminal records belong to personal privacy and are not open to any public.

Personal information protection is realized through database security technology, core data is encrypted and stored, mass data leakage is prevented through database firewall, mass personal data is anonymized through data desensitization, and traceability is realized through digital watermarking.

Operators of key information infrastructure and personal information processors who handle personal information to the amount specified by the State Network Information Department shall store the personal information collected and generated in People's Republic of China (PRC) in China. If it is really necessary to provide it overseas, it shall pass the safety assessment organized by the national network information department; Where laws, administrative regulations and the provisions of the national network information department do not require security assessment, those provisions shall prevail.

Personal information should be handled in accordance with the principles of legality, legitimacy, necessity and honesty, and personal information should not be handled by misleading, fraud or coercion.

Article 29 of the Law of People's Republic of China (PRC) on the Protection of Personal Information requires individuals to separately agree to handle sensitive personal information. Where laws and administrative regulations stipulate that written consent shall be obtained for handling personal sensitive information, such provisions shall prevail.

Article 34 In order to perform their statutory duties, state organs shall handle personal information in accordance with the authority and procedures prescribed by laws and administrative regulations, and shall not exceed the scope and limits necessary for performing their statutory duties.

Article 51 A personal information processor shall take the following measures according to the processing purpose, processing mode, type, impact on personal rights and interests and possible security risks of personal information, to ensure that personal information processing activities comply with the provisions of laws and administrative regulations, and to prevent personal information from being obtained, disclosed, tampered with and lost without authorization:

(a) to formulate internal management systems and operating procedures;

(two) the implementation of classified management of personal information;

(3) Take corresponding security technical measures such as encryption and unmarking;

(four) reasonably determine the operating authority of personal information processing, and regularly carry out safety education and training for employees;

(five) to formulate and organize the implementation of emergency plans for personal information security incidents;

(6) Other measures prescribed by laws and administrative regulations.