Joke Collection Website - Public benefit messages - How to protect personal information?
How to protect personal information?
Cyber security law
Fortieth network operators should keep the user information they collect strictly confidential, and establish and improve the user information protection system.
Article 4 1: When collecting and using personal information, network operators shall follow the principles of legality, justness and necessity, make public the rules of collection and use, clearly state the purpose, manner and scope of collection and use of information, and obtain the consent of the collected person.
Network operators shall not collect personal information irrelevant to the services they provide, and shall not collect and use personal information in violation of the provisions of laws and administrative regulations and the agreement between the two parties, and shall handle the personal information they save in accordance with the provisions of laws and administrative regulations and the agreement with users.
Forty-second network operators shall not disclose, tamper with or destroy the personal information they collect; Personal information shall not be provided to others without the consent of the person being collected. However, unless the specific individual cannot be identified after processing and cannot be recovered.
Network operators should take technical measures and other necessary measures to ensure the safety of personal information collected by them and prevent information from being leaked, damaged or lost. When personal information is leaked, damaged or lost, it shall immediately take remedial measures, inform users in a timely manner according to regulations, and report to relevant competent departments.
Article 44 No individual or organization may steal or otherwise obtain personal information, or illegally sell or provide personal information to others.
In recent years, China has not only promulgated the relevant measures of personal information disclosure, but also has certain provisions on network protection. The article also emphasizes how to protect personal information in the general principles of civil law. In fact, as readers, we should know how to protect personal information.
- Related articles
- I applied for Minsheng Credit Card online. I have to go to the face-to-face meeting after receiving the text message, and I also went to the face-to-face meeting. Why can't I find the progress on the
- What are the greetings to customers?
- The latest version of Netease Cloud Music cannot be installed.
- What if the tenant doesn't pay the property fee?
- Sentences about regretting not going to school well after entering society
- Send short messages to other people's mobile phones through the internet.
- Has the epidemic situation in Xingyang, Zhengzhou been unblocked?
- How much is the joining fee for spicy duckling?
- Does it cost money to send text messages with QQ?
- What are you texting girls about?