Joke Collection Website - Public benefit messages - Is pat's real name authentication safe?
Is pat's real name authentication safe?
Legal basis: Civil Code of People's Republic of China (PRC).
Article 1032 Natural persons have the right to privacy. No organization or individual may infringe upon the privacy rights of others by spying, harassing, exposing or making public.
Privacy is the private space, private activities and private information that natural people live in peace and don't want to be known by others.
Article 103 Unless otherwise provided by law or expressly agreed by the obligee, no organization or individual may commit the following acts:
(a) by telephone, SMS, instant messaging tools, e-mail, leaflets, etc. Disturb the private life of others;
(2) Entering, taking photos or peeping into other people's private spaces such as houses and hotel rooms;
(3) Shooting, peeping, eavesdropping or revealing other people's private activities;
(4) Shooting or peeping at the private parts of others' bodies;
(5) handling other people's private information;
(6) Infringe upon the privacy of others in other ways.
Article 1034 The personal information of natural persons is protected by law.
Personal information is all kinds of information recorded electronically or in other ways that can identify a specific natural person alone or in combination with other information, including natural person's name, date of birth, ID number, biometric information, address, telephone number, e-mail address, health information, whereabouts information, etc.
The privacy information in personal information shall be subject to the provisions on privacy; If there are no provisions, the provisions on the protection of personal information shall apply.
Article 1035 The handling of personal information shall follow the principles of legality, justice and necessity, and shall not be over-handled, and meet the following conditions:
(1) Obtaining the consent of the natural person or his guardian, except as otherwise provided by laws and administrative regulations;
(2) Rules for publicly handling information;
(3) Clearly explain the purpose, mode and scope of information processing;
(four) does not violate the provisions of laws and administrative regulations and the agreement between the two parties.
The processing of personal information includes the collection, storage, use, processing, transmission, provision and disclosure of personal information.
Article 1036 An actor shall not bear civil liability in any of the following circumstances when handling personal information:
(1) Acts reasonably carried out within the scope agreed by natural persons or their guardians;
(2) Reasonably handling information voluntarily disclosed by natural persons or other information that has been disclosed according to law, except that natural persons explicitly refuse or handle the information that infringes upon their vital interests;
(3) Other acts that are reasonably carried out to safeguard public interests or the legitimate rights and interests of natural persons.
Article 1037 A natural person may inquire or copy his personal information from an information processing institution according to law. If the information is found to be incorrect, the party has the right to raise objections, request timely correction and take other necessary measures.
If a natural person finds that the information processor's handling of his personal information violates laws, administrative regulations or the agreement of both parties, he has the right to request the information processor to delete it in time.
Article 1038 Information processors shall not disclose or tamper with their personal information collected and stored; Without the consent of the natural person, the personal information of the natural person shall not be illegally provided to others, except that the specific individual cannot be identified and cannot be recovered after processing.
Information processors should take technical measures and other necessary measures to ensure the safety of personal information collected and stored by them and prevent information from being leaked, tampered with or lost; If personal information is leaked, tampered with or lost, it shall take remedial measures in time, notify the natural person in accordance with the regulations, and report to the relevant competent department.
- Related articles
- Thank you banquet invitation
- The official announcement copy of 520 and his first love getting back together
- What happened between Zhao Benshan and Fan Wei?
- How to register a micro signal without a mobile phone number?
- Remittance SMS of Finance Bureau
- How to reply to the SMS sent by iphone 1 1 secondary card?
- Is there any hint about Xiaomi's privacy message?
- Did the financing purchase audit die in 2 hours?
- Why did Wang Nan send a suite to athletes who won gold and silver medals in table tennis at the Tokyo Olympic Games?
- How does Citibank return the credit card?