Joke Collection Website - Public benefit messages - How to protect personal information?
How to protect personal information?
At the national level:
In the United States, telephone companies or post offices can sell users' telephone numbers and home address information to relevant demanders (such as advertisers), but at the same time, there are pre-existing legal binding clauses, that is, citizens can avoid telephone harassment by applying for the "No Telephone" service of the US Federal Trade Commission, and once they violate it, they will be fined $65,438+$0,654,38+$0,000 for each call; In Japan, there are five laws related to the Personal Information Protection Law, which effectively regulate the sale of personal information. In Germany, there are not only the Federal Data Protection Law and the Prevention of Abuse of Personal Data Processing Law at the national level, but also the State Data Protection Law at the state level, which comprehensively protects citizens' personal information; In France, in addition to introducing strict laws and regulations to severely punish unauthorized collection and use of private information, * * * has also set up the National Information Management Committee to supervise the abuse of personal information.
Personally:
First, properly keep personal information, especially information carriers such as bank cards and mobile phones, carefully fill in personal information when registering online and verifying real names, and do not disclose personal privacy information such as ID number, payment account number and mobile phone number at will; The second is to develop a good habit of changing passwords regularly. For important accounts (such as common mailboxes, online payment, chat accounts, etc.). ), the password must be set separately, never use more than one code, and it is best to set the password as a more complicated combination of numbers, letters and so on; Third, carry out anti-virus on mobile phones and computers regularly, especially those who often browse websites of unknown sources; Fourth, don't connect to free WiFi at will, don't click on unknown links in short messages and scan unknown QR codes, and don't trust the so-called refund, loan capital verification, judicial investigation, commodity refund, point redemption, winning tax rebate and other information in telephone, SMS, QQ and WeChat.
Question 2: How to protect personal information on the Internet? In fact, when surfing the Internet, especially when you need to send some information containing personal privacy, it is easy to leave your own traces on the passing network. If these clues are unfortunately intercepted and used by hackers, it will be in big trouble-although the probability is relatively low, you should always be more careful in the face of today's disorderly network. Especially now, with the rapid development of e-commerce, many netizens have opened accounts in e-banks. With their own electronic wallets, they should be more cautious when surfing the Internet. Below, I will give you some suggestions to protect the security of personal information on the Internet. 1. Reject cookies——cookies are files created and sent by some websites, which store some personal information of Internet users, such as their identities and preferences when visiting websites. If you are uneasy about this Cookie that records personal information, you can make the necessary settings in the browser, ask the browser to remind you before accepting the Cookie, or simply refuse it. According to the general explanation, when the user closes the browser, that is, Internet Explorer, cookies will be automatically deleted from the computer. However, I found that many cookies will be left on the hard disk in violation of regulations-in fact, some cookies are intended to stay on our computers so as to serve the host at any time. For example, sometimes, when a user logs into a website, he will receive a welcome message telling the user how many times he has logged into the website. Most of these strange things happen because cookie is playing tricks. Cookie, a rather clever thing, is quietly increasing on the hard disk, which is always not a good thing. First of all, some cookies contain our personal data. Secondly, the possibility of some malicious cookies is not ruled out. Therefore, we need to be vigilant against them. -The way to adjust Cookie settings in the browser is: select Tools * Internet Options; Click the Custom Level button in the Security tab; Find the settings about Cookie in the security settings dialog box that opens, and then select Disable or Prompt. In fact, in this dialog box, we can also set other security options to further improve the security of surfing the Internet. 2. Clean the browser cache frequently-the browser cache will keep many records of our surfing the Internet, including the Cookie mentioned above. Cleaning them often helps to protect personal data. Cleaning the browser cache is no trouble at all. Simply select Tools *Internet option, and then click the Delete File button in the Internet Temporary Files option on the General tab to delete the information saved in the browser cache. 3. Set up restricted websites-We often learn from some newspapers and magazines that some hacker websites or other websites will maliciously steal user information. Knowing the basic information of such websites, if we want to prevent ourselves from being trapped when our family members, such as children, accidentally bump into such networks, we can blacklist these websites in the browser and let the browser automatically reject some unfavorable instructions sent by these websites. The solution is: Select Tools * Internet Options, and click the restricted site icon in the "Please specify security settings for Web content in different areas" option on the security tab; Click the site button to the right of the restricted site to add the address of the site to be restricted. -Setting restricted sites can only restrict some malicious sites from accessing us to a certain extent ... >>
Question 3: How to strengthen the protection of personal information? 1, led by the information security management department, prepares the national plan for promoting personal information security, establishes the corresponding working mechanism, formulates basic principles and relevant policies, and promotes the formulation of standards, norms and procedures. Strengthen communication and coordination among functional departments of * * *, integrate resources needed for personal information security, and manage, organize and guide domestic personal information security work as a whole.
2. Organize domestic experts to discuss personal information security. Establish project funds (natural sciences, humanities and social sciences, etc.). ) Support the theoretical, technical and practical research on personal information security, and put forward suggestions and countermeasures for personal information security risks in the application of new generation information technology.
3. Seriously sum up the mature experience at home and abroad, organize international and domestic seminars, and exchange and learn about management, standards, regulations and practices. To promote the experience summary to the whole country, support, guide and encourage all localities and industries to establish corresponding working institutions in their own regions and industries, and promote personal information security.
4. While encouraging all localities and industries to promote the standardization of personal information security, gradually promote the national standardization of personal information security.
5, support and encourage qualified and basic areas to carry out personal information security assessment, and gradually promote the construction of a unified certification system. Give full play to the role of local governments and promote the establishment of personal information protection mechanisms in various places. Support and give full play to the role of industry associations, support, guide and encourage industries to standardize market behavior, implement industry self-discipline, and actively promote personal information security.
6. Strengthen the training of personal information protection personnel, especially the training and qualification certification of evaluators.
Question 4: How to protect personal information security? As long as you ensure that things like credit cards and bank cards are not lent out, otherwise they will be stolen, and credit problems will come. I have been using Industrial Bank's credit card, and I will receive a text message when the card moves, which is quite reassuring.
Question 5: How to ensure the security of personal information and how to protect it? Recently, many news reports have leaked personal information, and people pay more and more attention to the protection of personal information. Personally, I think that apart from legislating in this respect to strengthen the protection of personal information. We should also start from ourselves and strengthen the awareness of personal information protection. Usually, there will be some short films about this knowledge when you take public transportation such as subway and bus. I searched online, and Gu 'an has a professional FLAS film about information security, including personal information security, which is very interesting and practical. If you are interested, you can search ~
Question 6: How to protect citizens' personal privacy? 1. Don't submit personal information on the website. This is very important. Your privacy is usually leaked by yourself unintentionally, so don't submit your information on the website easily. Except for bank websites and famous e-commerce websites, other websites should not submit their own real information. For example, a few years ago, you may have entered your personal information on the rogue website 5460 alumni record. Today, you will find that your personal information has been copied to at least four or five websites for people to search and query. Therefore, it is inappropriate to submit your real information on websites or community systems. 2. publish an article and think twice before you act. Posting and blogging on the Internet. Don't write some personal information just because your blog has few visitors and no one will pay attention. Once an article is published, it cannot be taken back. It will be archived, reprinted and even spread to many websites you never know, and the tentacles of search engines will find any corner of the Internet. Therefore, you must think twice before you write an article. If you don't want some people to see your article, don't. 3. Use a secure password. If you have to save your own information (such as e-mail, personal diary, etc.). ) on the network, then you must use a secure password to protect it. The so-called security password is usually a password with a length of more than 6 digits and consisting of letters and numbers that are not easy to guess. 4. The security of personal computers. The computer you use should have enough security settings, put on the latest operating system patch, enable the firewall, install anti-virus software, and don't visit any phishing websites. To ensure that personal computers are not hacked. If the intrusion is abnormal, the network cable should be disconnected at the first time, and then it should be detected and repaired. There are also some tips on how to check whether personal privacy has been leaked. 1, regularly use Baidu and Google to search your real name. Focus on the first three pages to see if there is any personal information about you. 2. Regularly use Baidu and Google to search for name+personal information (such as personal work unit, school, address, telephone number, etc.). ). Through this combined query, you can know your information leakage more accurately. What if the privacy is leaked? 1. If it's a web page created by yourself or information filled in, just log in to the website and delete it. 2. If it is posted on a third-party website, contact the webmaster of the other party by email or telephone and ask him to delete personal privacy information. After these operations, you can delete the personal privacy information that has been indexed on the website, but it should be noted that Baidu and Google's webpage snapshots will still retain this information for a period of time (usually several months), so it is best to inform Baidu and Google and ask them to delete the privacy information in the search engine cache.
Question 7: How to protect personal information in the era of big data? * * * It is the first case in China that the secret department destroyed the express bill. In this "era of big data", when people use social media, online search and online shopping, they leave a lot of personal information on the Internet and offline. Once these personal information is maliciously collected, sorted out or even leaked, it will have disastrous consequences on a large scale. Therefore, in the era of "big data", the right to privacy has developed from personal privacy in the traditional sense to comprehensive protection of personal information; The invasion of citizens' privacy has also developed from individual case infringement to malicious screening and utilization of massive citizens' personal information by unscrupulous enterprises and institutions. It's just a case that the murderer threw the courier to the door. And some courier company personnel publicly sell express orders online, which has become a black industrial chain. Therefore, citizens' personal information should also be protected from private rights to public law; From individual litigation to the strict regulation and supervision of enterprises and institutions with citizen information by administrative organs.
Question 8: How to better protect personal information? Hello, the disclosure of personal information is generally inevitable, but what we can do is to avoid this information about us as little as possible. At the media meeting of the NPC and CPPCC held on the evening of the 3rd, Ma introduced seven suggestions that he will put forward at this NPC session. Ma said that it is urgent to strengthen the security protection of personal information in the big data environment. On the mobile phone, we can use Teng Xun mobile phone housekeeper to protect the security of the mobile phone, and others can also be protected by private space and software lock. Tencent mobile phone housekeeper-advanced tools-private space and Tencent mobile phone housekeeper-advanced tools-software lock can all be used.
Question 9: How to protect personal information? Yes, we should develop good living habits in our daily life, properly handle items containing personal real information, such as receipts, express orders, copies of ID cards, and try to avoid posting personal high-definition photos on social networking sites, so as to protect personal information and avoid being used maliciously. It is best to intercept fraudulent short messages intelligently through security software such as Tencent Mobile Manager; If you accidentally click on the link, the mobile phone housekeeper will give a risk warning and inform the user that the website is a malicious website and it is not recommended to visit it; If you continue to operate, the mobile phone housekeeper can also kill the Trojan virus behind the link, see through every trap set by the scammer and effectively protect it to avoid privacy leakage and property loss.
- Previous article:Jinhua Provident Fund Loan Policy 223
- Next article:How to distinguish the quality of vitamin E
- Related articles
- Enterprises entrust a third party to recruit written examinations, usually with a few days' notice in advance.
- How does ios send animal faces via SMS?
- How to set up oppo mobile phone voice broadcast
- Game friends returning from the end tour bless short messages.
- Xiaomi Mix2 dual card dual standby bug?
- How to treat mass New Year message?
- How to activate the SMS function?
- What are the sentences that mean to be safe when it rains?
- Health Tips for Disease Prevention and Control in Shandong Province Emergency Tips for Disease Prevention and Control in Shandong Province
- Magic Mirumo Mirumo Directory and Guardian Sweetheart Directory.