When dealing with personal information, the actor should follow the principles: the principle of legality; Principle of justice; Principle of necessity; The principle of not over-handling. Personal information generally refers to the personal information of citizens. "Citizen's personal information" refers to all kinds of information recorded by electronic or other means that can identify a specific natural person or reflect the activities of a specific natural person alone or in combination with other information, including name, ID number, communication contact information, address, account password, property status, etc.
Personal information is all kinds of information recorded electronically or in other ways that can identify a specific natural person alone or in combination with other information, including natural person's name, date of birth, ID number, biometric information, address, telephone number, e-mail address, health information, whereabouts information, etc. The privacy information in personal information shall be subject to the provisions on privacy; If there are no provisions, the provisions on the protection of personal information shall apply.
Government's Measures to Improve Network Information Security
First, actively promote the legislation of network information security, and organize the formulation of urgently needed standards such as information security inspection, information security management, communication network security protection, and Internet security access.
The second is to speed up the improvement of the information security review system framework, carry out information security review pilots in a planned way, especially strengthen the information security management of cloud computing services in government departments, and organize the implementation of Internet security access projects of party and government organs and information security inspections in key areas.
The third is to strengthen the systematic construction of information security infrastructure and technical means, further consolidate and upgrade the real-name registration of telephone users, carry out the management of network security environment such as underground black industrial chain, pay special attention to the prevention of viruses such as Trojans and zombies, and further strengthen the monitoring and disposal of cyber attack threats such as phishing websites and mobile malicious programs.