How to handle the transfer of children to their parents' accounts, and what procedures and materials are needed?

The transfer of children's online parents' accounts belongs to the situation of relying on relatives to settle down; N Settle down by relatives: n 1) Couples depend on them. N required materials: household registration book, marriage certificate, and proof of unemployed non-agricultural household registration. N2) Children take refuge in their parents. N required materials: household registration book, birth certificate or proof of the relationship between father (mother) and son (daughter), etc. Adult children who take refuge with their parents must issue unmarried certificates. N3) Parents take refuge in their children. Men over 55 years of age, women over 50 years of age and no children around, can take refuge in their children.

N required materials: household registration book, proof of the relationship between father (mother) and son (daughter), and proof of no children around issued by the police station where the household registration is located. N4) Minors whose parents died and took refuge in their grandparents. N required materials: household registration book, death certificate or orphan certificate issued by local police station and civil affairs department.

N5) Abandoned babies and orphans adopted by non-lineal relatives and orphans adopted by social welfare institutions according to legal procedures approved by civil affairs departments. N required materials: household registration book, adoption certificate, foster care agreement and notarial certificate of notary office must be issued.

Teach you a way to prevent identity information from leaking: when registering on some small websites or unknown websites, carefully fill in real personal information. Some small websites are vulnerable to hackers because of weak security measures, which leads to the disclosure of registered user information. At the same time, the staff management system of these small websites is not perfect, which may lead to the staff leaking user information to criminals.

Regularly kill Trojans on mobile phones and computers. Mobile phones and computers may be infected with Trojans during use, and these Trojans will send the information in the mobile phone or computer to the location designated by the writer. Therefore, we need to regularly use security tools to kill viruses on mobile phones and computers in parallel. At the same time, we should develop good online habits: do not install software of unknown origin, do not open dangerous links, and do not browse illegal websites.

Pay attention to uploading ID photos. When uploading your ID card, add words indicating the purpose to the photo. When we need to upload ID photos for password retrieval, payment tool authentication and online credit card application, we must be cautious and adhere to the principle of "don't upload if you can". When uploading a photo, you must add a text watermark to explain the purpose of the photo. The watermark should overlap with the text of the ID card to a certain extent, not all in the blank space.