What happens when information is exposed? What are the consequences of an information breach

Updated on technology 2024-05-02
22 answers
  1. Anonymous users2024-02-08

    What happens to information exposure? On the one hand, the information such as home address, name, ID card, private information is exposed, and on the other hand, the information of contacts and friends is also exposed, which will cause harassment and certain economic losses.

  2. Anonymous users2024-02-07

    Has an impact on your life and violates your privacy.

  3. Anonymous users2024-02-06

    If my information is exposed, it will have a great impact on my future life, and it is very likely that I will give you a **, and so on.

  4. Anonymous users2024-02-05

    It will be used by others to do bad things, and it will also be harassed, so if the private information is exposed, it is recommended to report to the police in time.

  5. Anonymous users2024-02-04

    Hello, this will lead to your information can be used by people who see it, especially your ID information, if others know it, you can use your ID registration software.

  6. Anonymous users2024-02-03

    If it's enough, there will be a lot of people who will call you, usually to sell** and family**.

  7. Anonymous users2024-02-02

    There are bad people who will use your identity information to do bad things.

  8. Anonymous users2024-02-01

    What happens if you are exposed? The consequences are unimaginable.

  9. Anonymous users2024-01-31

    1. What are the consequences of information leakage?

    1. Information leakage will lead to the following consequences:

    1) Spam text messages. Personal information leakage is susceptible to spam text messages;

    2) Harassment**;

    3) Spam. All kinds of spam will bring a lot of trouble to work, and these spam emails are mainly promotional emails;

    4) The credit card is overdrawn. After the information is leaked, someone may use this information to apply for a credit card, and then maliciously overdraft the credit card, which will cause the party's credit to be low, and have an unpredictable impact on future bank loans, housing loans, etc.

    2. Legal basis: Article 1034 of the Civil Code of the People's Republic of China.

    The personal information of natural persons is protected by law.

    Personal information refers to all kinds of information recorded electronically or otherwise that can identify a specific natural person, either alone or in combination with other information, including the natural person's name, date of birth, ID number, biometric information, address, ** number, email address, health information, whereabouts information, etc.

    For the private information in personal information, the provisions on privacy shall apply; Where there are no provisions, the provisions on the protection of personal information shall apply.

    Article 1035.

    The handling of personal information shall comply with the principles of legality, legitimacy, and necessity, and must not be excessively handled, and meet the following requirements:

    1) Obtaining the consent of the natural person or their guardian, except as otherwise provided by laws and administrative regulations;

    2) Rules for disclosing the handling of information;

    3) Clearly indicate the purpose, methods, and scope of the handling of information;

    4) Do not violate the provisions of laws, administrative regulations and the agreement between the two parties.

    The processing of personal information includes the collection, storage, use, processing, transmission, provision, and disclosure of personal information.

    II. How to deal with the leakage of personal information.

    Personal information leakage shall be handled as follows:

    2. Report to the relevant law enforcement departments, local public security organs, consumer associations or departments that manage the Internet;

    3. You can use the law to protect your legitimate rights and interests, and if necessary, require the infringer to compensate for losses or apologize.

  10. Anonymous users2024-01-30

    Leaking your real name and mobile phone number online can be harmful, as follows:

    1. Harassment**: often receive strangers**. Including sales of insurance, products**, real estate information, etc. Even if you block harassment**, there will be strangers indirectly**.

    Second, there is a sales message: when the number is leaked, you will often receive ** information. No matter how the owner blacklists the number, there will be strange spam messages from different channels. Most of the information is about selling the product.

    3. Receiving spam: Email messages often appear on Apple phones with iOS system. Spam is sent randomly to a specified number at regular intervals at sending stations, which is usually caused by a leaked number.

    Fourth, the fraudulent call: due to the leakage of information (including personal privacy information such as numbers and real names), many fraudulent calls are called, and the fraudsters will deceive the owner's trust through different ways and **, and then let the owner transfer money to the designated bank.

    5. Credit card overdraft calls impersonating banks: Many fraudsters will call the owner by impersonating the bank because they only know the owner's name and number, and defraud the owner of the property under the pretext of credit card overdraft.

    6. Personal reputation is damaged for no reason: due to information leakage, some people register some credit institutions in the name of the owner through network information, and the dishonest behavior of the information thief will affect the personal reputation of the owner.

    Encyclopedia - Personal Information Leakage.

  11. Anonymous users2024-01-29

    Often receive fraud**, be careful that personal information has been leaked I believe that many people have experienced fraud**, such as the other party called, saying that you won the jackpot, you need your personal information and pay a part of the courier fee or deposit to receive, how do such fraudsters get our information, in fact, it is not difficult, there are many black interest chains, if you do not protect your personal information, then it is very easy, our personal information will be stolen, Others will be sold to fraudsters at a low price.

    Many of them are virus, so we must be more careful when filling in personal information online, after all, there are many means, one will be stolen if you are not careful, and some information is stolen and the money in the bank card will be lost, so you must be more cautious.

  12. Anonymous users2024-01-28

    Mobile phones often receive all kinds of harassing text messages, often receive strangers' ** sales items, etc., may have leaked personal information.

  13. Anonymous users2024-01-27

    I often receive scams or sales pitches, and there is a steady stream of spam and advertising text messages, which means that personal information has been leaked. Because when answering unfamiliar sales pitches, the other party can accurately say their own information.

  14. Anonymous users2024-01-26

    The following phenomena indicate that personal information has been leaked: 1. Someone beats you, you don't know him, but he knows all your information, which means that your personal information has been leaked. 2. I often receive harassment from selling things**.

    3. Receiving abnormal transaction SMS from the bank that is not my own behavior. 4. The email will receive more than a dozen spam emails based on sales every day.

  15. Anonymous users2024-01-25

    I often receive calls from strangers, either to sell a house or insurance or to go to school, and the frequency of calls is very high, so it is possible that personal information has been leaked.

  16. Anonymous users2024-01-24

    Strange text messages, strange **, etc. Sometimes I will receive inexplicable text messages, and I will also receive scams**, which is information leakage.

  17. Anonymous users2024-01-23

    With the rapid development of network technology information, there is a leakage of personal information in various documents, copies of ID cards, social networks, network surveys (public WiFi), personal resumes, mobile phone applications, etc.

  18. Anonymous users2024-01-22

    There are often unknown people calling you and also know some of your personal information, such as name, home address, etc. For these unknowns, we must be vigilant against being deceived.

  19. Anonymous users2024-01-21

    Mobile phones always receive text messages and advertisements from unknown numbers. I often receive some inexplicable, sales pitches. Your bank card has been stolen, your communication software has been stolen by others, etc.

  20. Anonymous users2024-01-20

    The other party's behavior is an act of extortion.

    The crime of extortion refers to the use of threats or coercion against the victim to forcibly demand public or private property for the purpose of illegal possession.

    The criteria for determining the amount of the crime of extortion are as follows:

    1. The extortion of public or private property is "relatively large", starting from 2,000 to 5,000 RMB;

    2. Extortion of public or private property is "huge", starting from 30,000 to 100,000 RMB;

    3. The "amount of extortion of public or private property is particularly huge", starting from 300,000 to 500,000 yuan.

    Where the amount of this crime is relatively large or extortion is repeated multiple times, a sentence of up to 3 years imprisonment, short-term detention or controlled release is to be given, and/or a fine; where the amount is huge or there are other serious circumstances, a sentence of between 3 and 10 years imprisonment and a concurrent fine is to be given; where the amount is especially huge or there are other especially serious circumstances, a sentence of 10 or more years imprisonment and a concurrent fine is to be given.

    This is a criminal offence.

    Ask me if I don't give her money, will she mess with my privacy, and how long he can keep my privacy.

    Question, then I didn't give him money, I chatted with her on QQ, he deleted me, what should I do now, I'm afraid that he will mess with my privacy.

    The act is illegal and criminal and is within the jurisdiction of the public security organs.

  21. Anonymous users2024-01-19

    Legal analysis: 1. Spam text messages, harassment**, and spam are endless.

    2. Fraudulent card overdraft arrears.

    3. Cases and accidents occur frequently. Criminals may use personal information to commit criminal activities. For example, if personal information is used for telecommunication fraud and network fraud, criminals will also use personal information for extortion.

    Legal basis: Article 1034 of the Civil Code of the People's Republic of China: The personal information of natural persons is protected by law.

    Personal information is a variety of information that can be recorded electronically or in other ways to identify a specific natural person, either alone or in combination with other information, including the name, date of birth, ID number, biometric information, address, ** number, e-mail address, health information, whereabouts information, etc.

    For the private information in personal information, the provisions on privacy shall apply; Where there are no provisions, the provisions on the protection of personal information in the Tangerine Banquet section shall apply.

  22. Anonymous users2024-01-18

    Report. If personal information is leaked, you should report it to the police. The purpose of reporting a case is to protect one's own rights and interests, and the other is to file a record.

    Once more people are in a situation similar to yours, you can deal with it together. This not only protects your privacy, but also avoids more financial losses. Lawyer sues.

    If important personal information is lost, and you know how it was lost or there are many clues, then you can consult a professional lawyer about the relevant laws and regulations. If the lawyer gives a positive answer, he can use the law to protect his rights and interests.

    Article 111 of the Civil Code provides that the personal information of natural persons is protected by law. Where any organization or individual needs to obtain the personal information of others, it shall obtain it in accordance with law and ensure that the information security is indicated, and must not illegally collect, use, process, or transmit the personal information of others, and must not illegally buy, sell, provide, or disclose the personal information of others.

Related questions
35 answers2024-05-02

Recently, a network security expert came out to speak, and our favorite way to take pictures with scissor hands has been on the hot search for fingerprint unlocking security that will endanger our mobile phone, which is also a very sad thing. Now even taking a photo and posing for what kind of pose you have to be controlled by information security, you say sad is not sad. >>>More

18 answers2024-05-02

Mainly genetics, eye habits can lead to myopia, etc., are all rumors.

15 answers2024-05-02

You look at the properties to see what policy is causing the warning, and then disable it in the local user policy. >>>More

6 answers2024-05-02

Formatting, the best low grid.

4 answers2024-05-02

This would constitute a crime of false accusation and would be punishable by law.