What are some examples of personal information being compromised that can have serious consequences?

Updated on society 2024-03-21
26 answers
  1. Anonymous users2024-02-07

    Dare to pretend to be in the name of the Public Security Bureau, report your personal information, and then say that there have been frequent fraud cases recently, remind you that an account is not safe, ask you to transfer money, and also tell you a public security consultation**, you will get confirmation as soon as you hit that**, and then you believe it and transfer it. ‍‍

  2. Anonymous users2024-02-06

    Someone buys your personal information, gets your ID card, defrauds the bank of credit online, applies for all kinds of credit cards from the bank, maliciously overdrafts consumption, and then the bank may directly send the arrears of the demand note to the owner of the ID card. ‍‍

  3. Anonymous users2024-02-05

    There are also some criminals who get a copy of your ID card, then report the loss of your bank account or credit card account, and then reissue your card, and then set a password, if you don't use the card for a long time, the money in it may have disappeared. ‍‍

  4. Anonymous users2024-02-04

    Originally, "good things don't go out, bad things spread thousands of miles", and all the bad things that others did in your name are attributed to your name, even if you bother to be innocent in the end, but no matter what, your personal reputation has been damaged. ‍‍

  5. Anonymous users2024-02-03

    Criminals may use your personal information to do some bad things, if you commit a crime or an accident, the public security organs or traffic management department may find your head based on the identity information, you may still think that this is where to go! ‍‍

  6. Anonymous users2024-02-02

    Originally, only friends, classmates or relatives knew about **, they would often be called by strangers, some to promote insurance, some to promote decoration, and some to promote baby products. If you don't look for them, they will come to the door automatically. ‍‍

  7. Anonymous users2024-02-01

    After the personal information is leaked, the email address of the colleague can receive more than a dozen spam emails every day, which is also mainly salesmanship, and it is also a messy and uncreative advertisement. ‍‍

  8. Anonymous users2024-01-31

    Because they know your personal information, make up some sensational news, and even know which of your friends, classmates or relatives they know, and they can also report their names and employers, and unscrupulous companies come to your door to scam you. ‍‍

  9. Anonymous users2024-01-30

    Two years ago, a relative lost his ID card and did not have time to report the loss, and after a period of time, he received a reminder from the bank and was loaned 100,000 yuan.

  10. Anonymous users2024-01-29

    When I bought a house, my identity information was leaked, and more than a dozen renovation companies kept calling me, and my mobile phone was about to be blown up. ‍‍

  11. Anonymous users2024-01-28

    Your colleague hacks into your notebook and reports to your boss what you're thinking in your personal diary, and you get fired from the company 1 hour later.

  12. Anonymous users2024-01-27

    Legal Analysis: A constant stream of spam text messages. 2. Harassment is one after another.

    3. Spam is rampant. 4. Fraudulent card overdraft arrears. 5. The accident fell from the sky.

    6. Unscrupulous companies come to defraud. 7. Pretending to be a public security officer to request a transfer. 8. Traps and abduction take advantage of the situation to enter.

    9. The money in the account is missing. 10. The reputation of a person has been ruined for no reason.

    Legal basis: Article 253-1 of the Criminal Law of the People's Republic of China Where relevant state provisions are violated by providing citizens' personal information to others, where the circumstances are serious, a sentence of up to three years imprisonment or short-term detention is to be given, and/or a fine; where the circumstances are especially serious, the sentence is between three and seven years imprisonment and a concurrent fine.

  13. Anonymous users2024-01-26

    Legal Analysis: Harm of Personal Information Leakage: 1. Spam SMS; 2. Harassment**; 3. Spam; 4. Applying for a card in a false name or overdrawing arrears; 5. Case accidents; 6. Fraud.

    After being leaked, you can: 1. Replace it; 2. Change important passwords; 3. Report the case; 4. Lawyer prosecution; 5. Collect evidence; 6. Unimportant information can be ignored.

    Legal basis: Provisions on the Protection of Personal Information of Telecommunications and Internet Users

    Article 4: "Users' personal information" as used in these Provisions refers to information collected by telecommunications operators and internet information service providers in the course of providing services, such as users' names, dates of birth, ID numbers, addresses, ** numbers, and passwords, that can identify users, either alone or in combination with other information, as well as information such as the time and place when users use services.

    Article 5: Telecommunications operators and internet information service providers shall follow the principles of legality, propriety, and necessity in the collection and use of users' personal information in the course of providing services.

    Article 6: Telecommunications operators and internet information service providers are responsible for the security of users' personal information that they collect and use in the course of providing services.

  14. Anonymous users2024-01-25

    Legal analysis: The consequences of personal information leakage are: 1. Spam text messages.

    Personal information leakage is susceptible to spam text messages. 2. Harassment**; 3. Spam;

    All kinds of spam can bring a lot of trouble to work, and these spam emails are mainly promotional emails. 4. The credit card is overdrawn. After the information is leaked, someone may use this information to apply for a credit card, and then maliciously overdraft the credit card, which will cause the party's credit to be low, and have an unpredictable impact on future bank loans, housing loans, etc.

    5. Criminals defraud. Criminals will use the information to defraud the loved ones around the person.

    Legal basis: Article 111 of the Civil Code of the People's Republic of China The personal information of natural persons is protected by law. Where any organization or individual needs to obtain the personal information of others, it shall obtain it in accordance with law and ensure the security of the information, and must not illegally collect, use, process, or transmit the personal information of others, and must not illegally buy, sell, provide, or disclose the personal information of others.

  15. Anonymous users2024-01-24

    Often receive fraud**, be careful that personal information has been leaked I believe that many people have experienced fraud**, such as the other party called, saying that you won the jackpot, you need your personal information and pay a part of the courier fee or deposit to receive, how do such fraudsters get our information, in fact, it is not difficult, there are many black interest chains, if you do not protect your personal information, then it is very easy, our personal information will be stolen, Others will be sold to fraudsters at a low price.

    Many of them are virus, so we must be more careful when filling in personal information online, after all, there are many means, one will be stolen if you are not careful, and some information is stolen and the money in the bank card will be lost, so you must be more cautious.

  16. Anonymous users2024-01-23

    Mobile phones often receive all kinds of harassing text messages, often receive strangers' ** sales items, etc., may have leaked personal information.

  17. Anonymous users2024-01-22

    I often receive scams or sales pitches, and there is a steady stream of spam and advertising text messages, which means that personal information has been leaked. Because when answering unfamiliar sales pitches, the other party can accurately say their own information.

  18. Anonymous users2024-01-21

    The following phenomena indicate that personal information has been leaked: 1. Someone beats you, you don't know him, but he knows all your information, which means that your personal information has been leaked. 2. I often receive harassment from selling things**.

    3. Receiving abnormal transaction SMS from the bank that is not my own behavior. 4. The email will receive more than a dozen spam emails based on sales every day.

  19. Anonymous users2024-01-20

    I often receive calls from strangers, either to sell a house or insurance or to go to school, and the frequency of calls is very high, so it is possible that personal information has been leaked.

  20. Anonymous users2024-01-19

    Strange text messages, strange **, etc. Sometimes I will receive inexplicable text messages, and I will also receive scams**, which is information leakage.

  21. Anonymous users2024-01-18

    With the rapid development of network technology information, there is a leakage of personal information in various documents, copies of ID cards, social networks, network surveys (public WiFi), personal resumes, mobile phone applications, etc.

  22. Anonymous users2024-01-17

    There are often unknown people calling you and also know some of your personal information, such as name, home address, etc. For these unknowns, we must be vigilant against being deceived.

  23. Anonymous users2024-01-16

    Mobile phones always receive text messages and advertisements from unknown numbers. I often receive some inexplicable, sales pitches. Your bank card has been stolen, your communication software has been stolen by others, etc.

  24. Anonymous users2024-01-15

    The other party's behavior is an act of extortion.

    The crime of extortion refers to the use of threats or coercion against the victim to forcibly demand public or private property for the purpose of illegal possession.

    The criteria for determining the amount of the crime of extortion are as follows:

    1. The extortion of public or private property is "relatively large", starting from 2,000 to 5,000 RMB;

    2. Extortion of public or private property is "huge", starting from 30,000 to 100,000 RMB;

    3. The "amount of extortion of public or private property is particularly huge", starting from 300,000 to 500,000 yuan.

    Where the amount of this crime is relatively large or extortion is repeated multiple times, a sentence of up to 3 years imprisonment, short-term detention or controlled release is to be given, and/or a fine; where the amount is huge or there are other serious circumstances, a sentence of between 3 and 10 years imprisonment and a concurrent fine is to be given; where the amount is especially huge or there are other especially serious circumstances, a sentence of 10 or more years imprisonment and a concurrent fine is to be given.

    This is a criminal offence.

    Ask me if I don't give her money, will she mess with my privacy, and how long he can keep my privacy.

    Question, then I didn't give him money, I chatted with her on QQ, he deleted me, what should I do now, I'm afraid that he will mess with my privacy.

    The act is illegal and criminal and is within the jurisdiction of the public security organs.

  25. Anonymous users2024-01-14

    As a result, personal identity information, personal property information, personal commonly used device information, personal education and work information, facial features, personal location information, etc., are all exposed, and users have become "transparent people".

    2. Information is sold and is vulnerable to illegal infringement.

    It's not over after the leak. Perhaps, a personal information transaction industry chain has been formed: sellers and network companies collect and package them to sales companies with the help of software.

    Then, all kinds of real estate closed agents, loan intermediaries and other ** sales began to bombard you indiscriminately.

    3. There is a risk of being "killed by big data".

    According to the survey results of big data "ripeness" released by the Beijing Consumers Association on March 27, the vast majority of respondents believe that big data "killing" is widespread, and half of the respondents said that they have encountered "ripeness", and consumer platforms such as online shopping platforms, state-sensitive ** tourism and online car-hailing are "hard-hit areas".

    The investigation found that 2 experiencers booked a hotel through Fliggy at the same time and found that the old users were high and did not enjoy the discount. Behind the "big data killing" is the privacy of users "running naked".

  26. Anonymous users2024-01-13

    The consequences of personal information leakage are severe. The main hazards are:

    1. Spam text messages.

    2. Harassment**;

    3. Spam;

    4. The credit Wang Pai Wei card was overdrawn.

    5. Get into a lawsuit.

    6. Trap training criminals to defraud.

    7. The account was stolen by phishing**.

    On the basis of article 253-1 of the Criminal Law, violating relevant state provisions by providing citizens' personal information to others** or to others, and the circumstances are serious, is to be sentenced to up to three years imprisonment or short-term detention, and/or a fine; where the circumstances are especially serious, the sentence is between three and seven years imprisonment and a concurrent fine.

    Where relevant state provisions are violated by providing citizens' personal information obtained in the course of performing duties or providing services, or providing it to others, a heavier punishment is to be given in accordance with the provisions of the preceding paragraph.

    Where citizens' personal information is stolen or illegally obtained by other means, He Lead is to be punished in accordance with the provisions of the first paragraph.

    Where a unit commits the crimes in the preceding three paragraphs, the unit is to be fined, and the directly responsible managers and other directly responsible personnel are to be punished in accordance with the provisions of those paragraphs.

Related questions
10 answers2024-03-21

I do see a lot of beautiful girls who are not only beautiful but also very cute.

26 answers2024-03-21

With the development of anime and games, more and more people like the characters in the second dimension. In the early years, many people liked to play cosplay, but at that time, the characters looked at it with secular prejudices, and many people said that they couldn't understand these cosplay people, thinking that they were weird and weird. NopeWith the development of the times, people have become more tolerant of this, and more and more people have begun to appreciate cosplay. >>>More

13 answers2024-03-21

During the Spring Festival last year, my nephew, who was in kindergarten, bragged to the whole family about his great arithmetic: You just have to solve the problem, and I can figure it out. We said some addition and subtraction within ten, and the little guy got it all right, and then put on an unbeatable appearance, and his father gave him a problem in order to frustrate his arrogance. >>>More

16 answers2024-03-21

My friend did encounter a more supernatural thing, that is, he was drunk and actually told some stories about a dead man and other life.

14 answers2024-03-21

At the time of baking, milk carton baking powder is mixed with flour, or vinegar and baking soda are mixed, and then the "volcanic effect" occurs, and the process undergoes a double displacement or metathesis reaction. The reaction process between vinegar and baking soda is roughly as follows: HC2H3O2(AQ) +NaHCO3(AQ) NAC2H3O2(AQ) +H2O(AQ) +CO2(G).