According to Article 4 of the "Personal Information Protection Law of the People's Republic of China", the interpretation of personal information is: personal information is recorded electronically or in other ways and is related to an identified or identifiable natural person. All kinds of information, excluding anonymized information. In a straightforward sense, personal information includes the identity information of natural persons, such as ID number, photo, fingerprint, facial recognition information, blood type, and personal biometric information, mobile phone number, home address, household registration location, and family relationships. , work unit, love experience, marital relationship, living habits, shopping and consumption information, etc., whether this information is recorded on paper or electronic devices, it is all personal information.
In today's society, due to the convenience of communication, personal information is leaked. Many times, this personal information is secretly sold to criminals by insiders of certain units in order to make profits. These criminals obtain This personal information will then be used to do illegal activities.
Take me for example. I bought a house in Jinke in 2014. Since I bought the house, in less than half a month, all second-hand housing agencies and loans in Kaizhou District People call me every day. First of all, these second-hand housing agencies. When they call, they ask me if the house is for sale. They say that they are from a certain housing agency and learned that I have purchased a new house, and so on. These people not only knew all my information about buying a house, but also knew my mobile phone number, my apartment type, specific location, which building, which floor, and which number. I was confused, where did they get me? House purchase information and personal information. Finally one day, I received another call from a second-hand housing agency. The caller was a friend of mine who also did this. I asked him where he got it from. He said that the house purchase information and personal information were purchased by their boss through special channels. As for which channel, he could not tell. I think this information must have been sold by someone within Jinke Group. Otherwise, second-hand housing agencies in Kaizhou would not have a copy of it. With such detailed information, the second-hand housing agency would bombard me with phone calls. After the bombing, decoration companies came next. One after another, they called me to ask if the house had been decorated. The people in these decoration companies knew my name, the location of my house, the house number and the floor plan. They knew it like the back of their hand.
The speed with which this personal information was leaked is simply shocking. Another example is that I registered an account at Tencent Micro Securities and just logged in. Oh my god, I was targeted by fraudsters. For ten consecutive years, they called me every two days, telling me which securities company they were from and that they wanted to recommend some potential stocks that could make me money quickly. I knew this was a scam call as soon as I heard it. I don’t know how they got my personal information. There are countless such information leaks in life. The country should have legislated to crack down hard. For example, I bought a motorcycle in 2011 and was immediately scammed by telecommunications. The elements obtained my personal information and pretended to be a staff member of the Chongqing Municipal Finance Bureau to apply for a subsidy for motorcycles to the countryside. In fact, I had already returned to town to handle matters related to motorcycles to the countryside and was waiting to receive the money. At this time, the scammer spoke with a Cantonese accent and said that he was from the Chongqing Finance Bureau. He asked me to go to the bank teller machine to insert the bank card and then follow his instructions. I don’t admire these scammers for other things, but I admire them. How could he get my personal information so quickly.
From my personal point of view, for these criminals who buy and sell other people's personal information, the death penalty is an advantage for them. It would be relieved if they could be sentenced to death by a thousand cuts and quartered!
Personal information includes
1. Personal identity information
Personal identity information, including your ID number, residence location, biometric information, and facial recognition information Fingerprint information, height and weight, etc., once obtained by criminals, they may use your information to forge ID cards to commit fraud, or pretend to be you for online loans, or use your information to register companies and conduct fraudulent loans. Or criminal activities such as marriage and dating fraud.
2. Shopping information
Shopping information, including what items you purchased on those websites, etc. Once this information is leaked, telecom fraudsters will either intimidate or threaten you. There are prohibited items in your package. You are asked to cooperate with the investigation, and then you are asked to go to the hotel alone. You are not allowed to tell your family and friends. According to their requirements, the money is transferred to the safe account mentioned by the scammer. Or these scammers pretend to be customer service and say that it is If the goods you purchased have quality problems, they will give you a refund, ask you to add the scammer's WeChat account, and then trick you into downloading fraudulent software, or trick you into giving you a verification code to steal your money. Scammers have endless tricks.
3. Marriage and family information
Marriage and family information mainly includes your relationship information, hotel room booking records, or marriage partner information. Once this information is leaked, Scammers often use extortion, intimidation, and threats to defraud victims of their property.
4. Information on enjoying government subsidies and welfare insurance
Concerning the leakage of government subsidies and welfare information, scammers will pretend to be government workers and defraud victims of money using various methods. You must be especially vigilant. .
5. Outing track information
Once the business trip track or travel information is leaked, scammers will often pretend to be epidemic prevention personnel, falsely claiming that you are a sub-close contact, etc., and target you. Threatening and then defrauding you of your property.
6. Electronic account information such as bank cards and social software
Leakage of bank card and payment software or social software account information can easily lead to fraudsters obtaining property or using it fraudulently , to commit fraud and other illegal crimes.
6. Work information
Work information is where you work, your specific job position and some more confidential information. Once leaked, it can be used by scammers or impersonate your boss. , or pretend to be you and defraud your colleagues.
7. Medical information
When medical information is leaked, you will often receive sales calls from scammers targeting your condition. In fact, the medicines sold are all fake. The purpose of these scammers is to defraud money. .
Personal information mainly includes personal identity information, face recognition, fingerprints, biometric information, business trips, hotel accommodation, marriage and family, making friends and relationships, enjoying government subsidies and benefits, purchasing houses, cars, shopping, work, and medical care , bank cards, communication and social software accounts and other information.