laitimes

How does the world of the Internet protect personal privacy? Civilian police and legal experts to answer

With the rapid development of the Internet, while enjoying the portable services brought by the network, I believe that everyone has experienced a package of authorization, compulsory consent, big data "killing" and other violations of personal privacy, and our personal information is basically running on the Internet. So how to protect personal privacy in the Internet world?

How does the world of the Internet protect personal privacy? Civilian police and legal experts to answer

Recently, the sixth phase of the Zhongyuan Science Popularization Talk, sponsored by the Henan Provincial Association for Science and Technology and undertaken by Dahe Network, invited the police of the Legal Brigade of the Jinshui Branch of the Zhengzhou Municipal Public Security Bureau, Zeng Qingxiu, a public lawyer of the Zhengzhou Municipal Public Security Bureau, and Liu Xinran of the School of Civil and Commercial Economic Law of Henan University of Economics and Law to be guests in the studio to discuss how to protect personal privacy in the Internet era.

What are the common acts of infringing on the personal information of netizens? What should I do if my personal information is leaked?

Infringement of citizens' personal information can be simply summarized in two categories: one is that you obtain it when you have no right to obtain it; the other is that you obtain it legally, but you use the information you obtain to carry out illegal and criminal activities.

When you keep getting spam, spam, unidentified links, and frequent harassing phone calls, it proves that your information has been compromised. In severe cases, the balance of the bank account will disappear, and even inexplicably bear the debt.

If the information is leaked, it is best to change the account and cut off the source of the leak from the source. If property is involved, it is necessary to freeze the account quickly, stop the loss in time, and choose to call the police. Do not reply to strange calls, do not click unknown links, do not answer the pie that falls from the sky, and do not be greedy and cheap. To set a mixed password to prevent hackers from "crashing into the library", you must not use such "silly white sweet" passwords as "6 digits after the ID number", "name + birthday" and so on.

The most important point is that it is recommended to apply for 2 telephone cards, and the mobile phone number bound to the payment function is adjusted to airplane mode at night or directly shut down to avoid the theft of money during sleep. The other card can keep in touch with family and work at any time. We have handled similar cases, after obtaining the victim's mobile phone, bank card and other information, the criminal suspect will generally choose to commit the crime at 2 to 4 a.m., use the device to send a verification code to the victim's mobile phone, and at the same time use the "sniffing" technology to obtain the victim's verification code, steal the victim's money, so that the victim in the sweet sleep, the money is gone.

In recent years, terms such as backdoors and hackers have been seen in the news, how can personal information be leaked unconsciously in daily life?

At present, there are six main ways to leak personal information:

First, artificially reselling information, for example, in order to open up the market, criminals will purchase or use other means to illegally obtain citizens' personal information from personal information processors through various channels in order to open up the market and criminal elements to carry out legal criminal activities;

The second is the leakage of mobile phones, such as the loss of mobile phones, the replacement of old mobile phones, etc.;

Third, the personal computer is infected by the virus;

Fourth, there are loopholes in the website where you log in, and you have not downloaded mini programs through regular channels or official websites, or clicked on unknown links;

Fifth, important documents and personal information are lost or stolen. For example, your express packaging box is discarded at will, the hospital diagnosis and treatment card that has been consumed is not properly kept, and the ID card is lost, etc., and some small details in life may also cause personal information leakage;

Sixth, handling various businesses, children apply for cram classes, interest classes, fill in various street questionnaires, etc., will cause personal information leakage.

In life, we can receive a variety of harassing calls every day, there are sales of real estate decoration, there are online game recommendations, there are stock fund investment, etc., whenever we question how to get their own personal information, the other party is fragmented, immediately hang up the phone, but the harassment calls are still endless. After the promulgation of the Personal Information Protection Law, are there any norms for such behavior, and through what channels can citizens pursue responsibility? How is evidence gathered?

Article 60 of the Personal Information Protection Law clearly stipulates that the State Internet Information Department is responsible for coordinating personal information protection efforts and related supervision and management efforts.

Article 65 provides: Any organization or individual has the right to make complaints or reports on illegal personal information handling activities to departments performing personal information protection duties.

Then, when we encounter information harassment, we can complain and report to the Internet information department. If it involves violations of the Public Security Administration Punishment Law, or is suspected of committing a crime, the relevant administrative departments will promptly transfer them to the public security organs for handling in accordance with the law in accordance with the provisions of Article 64 of the new law, and citizens may also directly report to the police.

Of course, we need to write down the other party's phone, email, bank card information, transfer records, etc., and then fully cooperate with the Internet information department or public security organs to investigate and collect evidence.

Should individuals be liable for illegal crimes or legal litigation disputes arising from the leakage of personal information, such as being loaned or guaranteed? How should I protect my rights and interests?

The criminal law's crackdown on criminal acts is subjective and objective, that is, to constitute a crime, it is necessary to have both the subjective fault of the crime and the commission of the criminal act. If the individual does not have subjective fault, but only because the personal information is leaked and causes some consequences, then the individual whose information is leaked is neither the subjective fault of the crime nor the criminal act is committed, and the individual is not liable. If the civil dispute such as the loan or guarantee is caused by the information leakage, the situation is relatively complicated, depending on the specific situation, if the individual is not at fault for the information leakage, he should generally not be liable.

How to effectively protect personal information?

1. In daily life, when handling various businesses and filling out various forms and questionnaires, it is necessary to maintain a certain degree of vigilance and pay careful attention to the purpose and use rules of personal information in the terms of the contract. Because according to the newly promulgated "Personal Information Protection Law", personal information processors must collect and process citizens' personal information in accordance with the "legitimate and necessary |" Principles, and to clearly indicate the purpose, method, scope of personal information processing, must not be confused to fill in what to fill in;

2. Express delivery labels, invalid diagnosis and treatment cards, various payment documents, copies of ID cards, train tickets, boarding passes, old mobile phones, old computers, etc. should be properly kept, and destroyed in time when there is no preservation value;

3. Circle of friends, qq space, etc., beware of inadvertently leaking personal information;

4. Standardize the use of mobile phones and computers, attach importance to security settings, install security software, do not log on to unknown websites, do not click on unknown links, and do not rub free wifi;

5, shopping, try to avoid leaving contact information, less participation in website activities, leave information free gift activities do not participate, copies to note, etc., always remain vigilant, reduce the risk of leakage, strengthen self-protection. (Wang Shuangfei, Jiang Yulu, Li Siyu, Moderator/Li Tong, Photo/Intern Fan Yuchen)

Read on