-
I think privacy leaks can lead to harassment at best. The second is that some people will use the leaked information to forge their identities to carry out various illegal activities, which will bring considerable trouble to the privacy leaker. No matter how big the harm is, it will be a fraud, and it is not the kind of fraud that only knows your ** number, but it is carefully designed, which is difficult to prevent.
For example, if someone uploads the family's ** on the Internet, and the home address and ** information are leaked, then someone can use this information to deceive his child from kindergarten or school.
-
There are often strange calls, and the person on the other end of the line speaks Mandarin with a strong accent to promote their various products. You will receive all kinds of advertising text messages and even unhealthy text messages. There will also be strangers who add you to WeChat one after another, post all kinds of product information in the circle of friends, and so on, ......Therefore, you must protect your important personal information and don't give it to others casually, otherwise you will be very upset.
-
Because they know your personal information, those who hide in the shadows will take the trouble to trick you, deceive you, kidnap you, and lie to you. There is a saying that "open guns are easy to dodge, but hidden arrows are difficult to prevent", and if you are not careful, you may fall into the trap of bad guys.
-
There will be a lot of harassment**, which is annoying, and there may be a call to your family, saying that you are sick or something.
-
Spam SMS is continuous: This is already a very common thing, the latest heard is that the use of cell SMS, the base station can be used as a sending center, to send SMS to mobile users in the coverage area of the base station, this SMS system can send 10,000 messages every ten minutes.
-
Harassment** one after another: Originally only friends, classmates or relatives know**, they will often be called by strangers, some selling insurance, some selling decoration, and some selling baby products.
-
There is no harm to me at all! For a poor bastard like me, important information is nothing but a few more harassments. There is no money and no color, and the bank card is empty, which is really extraordinarily safe!
-
After your personal information is compromised, you can get more than a dozen spam emails a day, and it's also a salesman's main and messy and uncreative advertisement.
-
I've leaked my ID number, bank card number, home address, name or something before, but I was too young at the time, and I don't know if my identity information was registered or something else.
-
I borrowed money from the bank to buy a house last year. During the loan approval process, the bank will check the property address and loan amount by yourself to confirm that you are fully aware of the loan. During the period after submitting the loan application, I will pay special attention every time the **bell rings, for fear of missing the bank**.
While waiting for approval, a ** called, claiming to be from the bank's loan department, and asked me to check the loan information. At that time, I was a little suspicious of the ** number, but it was also a short number arrangement similar to that of an institution, so I said the relevant information in disbelief. The scary thing about this is that the private loan company knew too much about my purchase.
-
Originally, only friends, classmates or relatives knew about **, they would often be called by strangers, some to promote insurance, some to promote decoration, and some to promote baby products.
-
In the Internet era, people are transparent, how can they be private? There is a way not to use the Internet, not to use mobile phones, can it be done?
-
Empirical class, not production.
Legal analysis: The leakage of personal information will lead to more spam messages and harassment**, and it may also use your identity information to maliciously apply for credit cards, start a company, etc. The leakage of personal information can seriously disrupt your private life and even damage your legitimate interests.
Legal basis: Article 44 of the Cybersecurity Law of the People's Republic of China: No individual or organization may steal or obtain personal information by other illegal means, and must not illegally ** or illegally provide personal information to others.
-
Personal information leakage, may lead to unidentified harassment**, as well as short messages, serious, may also encounter fraud, as well as the use of personal ID card to do a series of transactions such as loans, criminals may use your personal information to do what identity, do some bad things, if you commit any crime or what accident, the public security organ or traffic management department may find your head based on identity information.
Legal basis: Article 14 of the Cybersecurity Law of the People's Republic of China provides that all individuals and organizations have the right to report conduct endangering network security to the departments such as for internet information, telecommunications, and public security. The department receiving the report shall promptly handle it in accordance with law; and where it is not the department's duties, it shall be promptly transferred to the department that has the authority to handle it.
Relevant departments shall keep the informant's relevant information confidential and protect the informant's lawful rights and interests.
-
Legal analysis: Personal information leakage will receive a lot of spam text messages and harassment, and will also use your personal information for telecommunications fraud, network fraud, and criminals will also use personal information for extortion. Take care of your personal information.
Legal basis: Civil Code of the People's Republic of China
Article 1034: The personal information of natural persons is protected by law.
Personal information refers to all kinds of information recorded electronically or otherwise that can identify a specific natural person, either alone or in combination with other information, including the natural person's name, date of birth, ID number, biometric information, address, ** number, email address, health information, whereabouts information, etc.
The provisions on privacy are applicable to the private and high-secret information in personal information; Where there are no provisions, the provisions on the protection of personal information shall apply.
Article 1035: The handling of personal information shall follow the principles of legality, propriety, and necessity, and must not be excessively handled, and meet the following requirements:
1) Obtaining the consent of the natural person or their guardian, except as otherwise provided by laws and administrative regulations;
2) Rules for disclosing the handling of information;
3) Clearly indicate the purpose, methods, and scope of the handling of information;
4) Do not violate the provisions of laws, administrative regulations and the agreement between the two parties.
The processing of personal information includes the collection, storage, use, processing, transmission, provision, and disclosure of personal information.
-
Legal analysis: personal information leakage will receive a lot of spam text messages and harassment**, **will also use your personal information to carry out telecommunications fraud, network fraud, criminals will also use personal information for extortion. Take care of your personal information.
Legal basis: Article 1034 of the Civil Model Harassment Code of the People's Republic of China The personal information of natural persons is protected by law.
Personal information refers to all kinds of information recorded electronically or otherwise that can identify a specific natural person, either alone or in combination with other information, including the natural person's name, date of birth, ID number, biometric information, address, ** number, email address, health information, whereabouts information, etc.
For the private information in personal information, the provisions on privacy shall apply; Where there are no provisions, the provisions on the protection of personal information shall apply.
-
It will cause the following hazards:1Identity theft:
Attackers can use the compromised personal information to impersonate the victim to commit fraud, open a bank account, or apply for a loan. 2.Financial Losses:
Attackers can use the leaked personal information to obtain the victim's financial data, commit financial fraud, or transfer funds. 3.Whistleblowers and threats:
Attackers may threaten their victims, extort sensitive information, or use it to commit fraud or malicious extortion. 4.Physical security is at risk
The personal information leaked may include residential addresses and other personal information that allows the attacker to estimate the physical location of the victim and threaten or track the victim in the context of the home or otherwise. 5.Social Engineering Attack:
Attackers can use the leaked personal information to create fake social accounts, impersonate the victim's identity, and defraud information or money. 7.Malicious Activity:
Attackers can use compromised personal information to commit malicious acts, such as spamming, distributing malware, or phishing**.
-
We all know that because of the advent of the Internet, the way of information transmission in today's society is becoming more and more rapid, convenient and extensive.
We all know that because of the advent of the Internet, the way of information transmission in today's society is becoming more and more rapid, convenient and extensive. From a starting point, there is no doubt that this can make our lives more convenient and profitable, but some people with bad intentions have also noticed this, which has led to the widespread leakage of our personal privacy information. Speaking of which, many people may have such an idea, I am not engaged in illegal and criminal things, and if personal information is leaked, it will be leaked, is it possible that there will be any big impact?
If you have such an idea, then you are very wrong, the harm of personal information leakage can be far more serious than you think, let's take a look at the harm of personal information leakage with a lawyer.
1. The visible impact of personal information leakage is that all kinds of harassment information are overwhelming. Spam text messages, harassment**, spam, etc., must have been encountered by everyone, all kinds of sales and all kinds of advertisements can be described as annoying.
2. Fraud incidents are also increasing. If criminals get their hands on your personal information, they can be able to develop a fraud strategy that is tailored to your situation, which is simply overwhelming. In recent years, this kind of fraud has gradually begun to spread, which is enough to see how harmful it is.
3. Criminals will use our personal information to commit crimes. Some criminals will impersonate our identities and then engage in illegal and criminal activities, and I believe that some of us are confused when they receive a police summons or a court summons.
4. Assets are vulnerable to threats. After criminals get hold of our personal information, our bank accounts and credit card accounts are extremely insecure and can easily be stolen by criminals.
Generally speaking, the leakage of personal information is a very dangerous thing, we must be cautious, and remember to protect our personal privacy information.
How to remedy the leakage of personal information is as follows: >>>More
How to remedy the leakage of personal information is as follows: >>>More
Dare to pretend to be in the name of the Public Security Bureau, report your personal information, and then say that there have been frequent fraud cases recently, remind you that an account is not safe, ask you to transfer money, and also tell you a public security consultation**, you will get confirmation as soon as you hit that**, and then you believe it and transfer it.
I think sometimes the way you save the information is not particularly safe, and now it's all over the street, information leakage, what is yours, ten minutes, in addition to the ID number, what address information is actually there, it's all right, and then there is that, at the end, do you have any property in your name, that is, I don't know the specific amount, but I can check it.
First of all, everyone should have a sense of self-information protection, and do not open unclear links from a small aspect, such as knowing how to refuse such bargaining behavior; In addition, the state should advocate the popularization of online legal knowledge, do more legal knowledge publicity, and enhance awareness of information protection. >>>More