Current location - Recipe Complete Network - Catering industry - Reasons for information leakage
Reasons for information leakage
1, industry supervision is not effective, some staff for personal gain in the highly developed information modern society, a person can not be isolated, people frequently interact with the outside world, resulting in some personal information is always in a state of being leaked. 2, is leaked through the cell phone information. 3, try not to participate in the online survey activities. 4, the lack of a strong legal protection according to the principle of the law of the penalty. 5, the lack of a strong legal protection, the lack of a strong legal protection, the lack of a strong legal protection, the lack of a strong legal protection.

Leakage of citizens' personal information is also a frequent occurrence. In life, once the personal information is leaked, then the ensuing is a variety of trouble, serious and even make citizens suffer huge economic losses. If you find that the personal information is leaked, then what should be done to protect your rights? Details, we together in the following specific understanding.

A reason for the leakage of citizens' personal information

Citizens' information will be frequently leaked, mainly because in the market economy and the information society, citizens' personal information has become an important market resource, that is to say, there is a rigid market demand. This demand is nothing more than the commercial activities of merchants and illegal elements to implement the "downstream" illegal and criminal activities. The former, such as training, real estate, home improvement, insurance, intermediary, catering, etc., it can be said that the more personal information of citizens held by merchants, the more accurate, the range of potential customers will be more and more accurate. Regarding the latter, illegal elements use illegally obtained personal information of citizens to engage in downstream illegal and criminal activities are mainly concentrated in four kinds:

First, the implementation of telecommunications fraud, network fraud and other new, non-contact crime;

Second, the direct implementation of robbery, extortion and other serious violent criminal activities;

Third, the implementation of illegal business competition;

Fourth, the use of various types of "survey companies", "survey companies", "survey companies", "surveys", "survey companies", "surveys", "surveys", "survey companies", "survey companies", "survey companies", and so on. "investigation company" and "private detective" in the name of investigation of marriage, nuisance to the public.

With the source, there is a market, there will naturally be a group of people "drilling holes" to take advantage of the opportunity to profit from the source to obtain information, sold to the market. Because of the low cost of this type of crime, criminals only need a computer, the use of the relevant instant chat tool, you can implement the information trade. Access to citizens' personal information without technical content, the threshold is very low, coupled with the victims often do not know, vigilance is low, rarely reported to the police, resulting in crackdowns after the resurgence of easily.

Second,

citizens' personal information leakage path

1, public **** WiFi

If you select the WiFi automatic connection function in the network settings of the smartphone, you will automatically connect to the public **** place WiFi. The WiFi security feature is weak, so hackers can steal any username and password on the WiFi with just a few simple devices.

2, old cell phones

When you get a new cell phone, many people will resell the old one. Although you will restore the old phone to the "factory default settings", or even format it, but through technical means, professionals can still be the old phone in the text messages, contacts, software and even browsing records, etc., all the recovery, and even the payment account, credit card information may also be restored.

3, social media

Through microblogging, QQ space, posting and other acquaintances to interact, sometimes unconsciously said or labeled each other's names, positions, work units and other real information.

Some of the parents in the circle of friends of the child's photo contains the child's name, school, live in the neighborhood; sun train tickets, boarding passes, but forgot to name, ID card number, two-dimensional code, and so on fuzzy processing.

4, network survey

When surfing the Internet, you will often come across a variety of fill in the survey questionnaire, play a test game, shopping lottery, or apply for free mailing information, apply for a membership card and other activities, generally required to fill in the detailed contact information and home address and other personal information.

5, resume

At present, many people look for work through the online resume, resume personal information is complete, some companies in the interview you will be asked to fill out a so-called "personal information form", which has your family relations, parents, name, personal phone number, address, home address and other personal information. The company also asked you to fill out a so-called "personal information sheet" with your family relationship, parents' names, personal phone number, address, graduation school and even ID card number.

6, all kinds of documents

Courier bills, tickets, boarding passes, shopping tickets, for cell phone card business orders, utility bills these documents can lead to personal information leakage.

7, ID card copies

Banks, telecom operators, various types of test registration, many places need to keep a copy of your ID card, and even some of the typing store, photocopying store to take advantage of the convenience of the temporary existence of photocopying store customer information archives to stay in the background.

Sometimes, it may be due to their own inadvertent leakage of personal information, which, first of all, they have to constantly strengthen their own sense of prevention. But if you find that someone deliberately leaked their information, it may involve illegal, you can through legal channels to protect their legitimate interests.