1. If a personal information processor infringes on the rights and interests of personal information, the personal information processor shall be liable for compensation.
2. Generally, compensation shall be made according to actual losses or gains.
3. Legal basis: Article 69 of the Personal Information Protection Law of People's Republic of China (PRC) stipulates that if the personal information processing infringes on the rights and interests of personal information, and the personal information processor cannot prove that he is innocent, he shall bear tort liability such as damages.
The liability for damages stipulated in the preceding paragraph shall be determined according to the losses suffered by individuals or the interests gained by personal information processors; If it is difficult to determine the losses suffered by individuals and the benefits gained by personal information processors, the amount of compensation shall be determined according to the actual situation.
Second, how to prevent the disclosure of personal information
1. About the express bill. It is such a delight to have friends coming so far. When we receive the package, we need to properly keep or handle the package to avoid the disclosure of personal information on the package. The same is true for tickets, shopping receipts and so on. Everyone has their own personal information, which needs to be handled in time.
2. Online shopping. When logging in to an online shopping website, verify whether the domain name of the website is correct. Don't just install or click on shady software. When a link is sent to your information window and you need to fill in your bank account number and password, you need to be careful again and again to prevent phishing websites.
3. Software leakage. Whether it is a chat tool or registration information, it will involve your personal information. Don't underestimate this information, thinking that you can't see it if you set it to prohibit outsiders from viewing others. Now, you can log in through authorization. Once you authorize, your information will no longer be a secret. Access to mobile phone software cannot be easily allowed. Once the software has obtained the corresponding permissions, reading the address book, text messages and emails, all your information and even your friends' information can easily be taken away by others. Mobile phone systems or software often have synchronization function, which seems very convenient, but in fact there are great security risks.
4. Authentication leaks. Many websites need to upload their ID cards or the reverse of their certificates as the basis for real-name authentication, but not all websites can achieve information security, especially some places that need to send ID cards and scan bank cards at the same time. They have called the customer service of the bank, and they are not sure what unexpected security problems will appear after having these two.
From the above analysis, we know that according to the provisions of the Personal Information Protection Law of People's Republic of China (PRC), the infringer shall be liable for compensation if the personal information rights and interests are infringed. The amount of compensation is determined according to the loss suffered by the individual or the benefit gained by the personal information processor. If you need legal help, readers can consult.