1, spam messages, harassing phone calls, and spam messages. This has become a very common thing. After the disclosure of personal information, the mailbox can receive more than a dozen junk mails every day, mainly for sales promotion, as well as disorderly and uninspiring advertisements, and may often be called by strangers, including insurance promotion, decoration promotion and baby products promotion.
2. Pretending to run a card to overdraw debts. Some people cheat the bank's credit online by purchasing personal information, copying ID cards, handling all kinds of bank credit cards, maliciously overdrawing consumption, etc., and then the bank may directly send overdue reminders to the owner of the ID card;
3. Cases and accidents fall from the sky. Criminals may use personal information to carry out criminal activities, may be summoned by the police, or may be summoned by the court to appear in court;
The money in the account is missing. Some criminals get their ID cards, then report the loss of their bank accounts or credit card accounts, then reissue their cards and set their passwords. Without a bank card, the money inside may be gone;
5. Personal reputation is damaged for no reason. After the disclosure of personal information, all the bad things done by others in the name of others are attributed to their names. Even if they are painstakingly innocent in the end, their personal reputation is damaged.
legal ground
people's republic of china network security law
Forty-eighth electronic information sent by any individual or organization and application software provided by any organization shall not contain malicious programs, and shall not contain information prohibited by laws and administrative regulations from being published or disseminated.
Electronic information sending service providers and application software downloading service providers shall fulfill their security management obligations. If it is known that its users have the acts specified in the preceding paragraph, it shall stop providing services, take measures such as elimination, keep relevant records, and report to the relevant competent departments. Forty-ninth network operators should establish a network information security complaint reporting system, publish information such as complaints and reports, and promptly accept and handle network information security complaints and reports.
Network operators shall cooperate with the supervision and inspection carried out by the network information department and relevant departments according to law.