Telephone harassment has repeatedly asked me to buy exercises for nurses. How do I know my exam information?

The information was leaked by others.

At present, the disclosure of personal information mainly has the following ways:

1. Use Internet search engines to search personal information, collect it into a book, and sell it to people who need to buy it at a certain price;

2. Hotel accommodation, insurance companies, leasing companies, bank accreditation, telecommunications, mobile, China Unicom, real estate, postal departments and other departments and places that need real-name registration of identity documents, and individual personnel use the registration convenience to disclose personal information of customers;

3. Individual illegal typing shops and copying shops use the convenience of copying and typing to archive personal information, bind it into volumes and sell it to the outside world;

4. Stealing other people's personal information in the name of various "questionnaires". They claim that as long as you fill in the detailed contact information, income and credit card information on the "questionnaire" and conduct a simple "tick" survey, you can get prizes of different awards, so as to induce people to fill in personal information;

5. Fill in the name, home address and contact information on the front and back of the lottery, which may lead to the disclosure of personal information;

6. When purchasing electronic products, vehicles and other items, personal information is used by people who fill out informal "after-sales service forms" in existing enterprises;

7. Supermarkets and shopping malls will disclose the mass information obtained when they apply for membership cards free of charge by mailing them to the masses by individuals.

At present, crimes against personal information have become a gray industrial chain. In this chain, there are leak source groups specializing in personal information collection, including some internal users with legal authority, who actively leak information through QQ, Internet, email, mobile storage and other channels. It also includes some hackers, who obtain database information of enterprises or individuals through attacks; There is a group of middlemen who buy data and information from leaked sources. They buy data from leaked sources according to various illegal demands, sell data to people in need as intermediaries, buy and sell as intermediaries, and enjoy and disseminate various databases. There are also user groups who buy personal information from intermediaries and commit various crimes. They are groups that actually use personal information to infringe on personal interests. According to incomplete statistics, after obtaining personal information, these people will use personal information to engage in five types of illegal and criminal activities:

1. New non-contact crimes such as telecom fraud and online fraud.

2 direct implementation of robbery, extortion and other serious violent criminal activities.

3. Implement illegal business competition. Under the guise of information consultation and business consultation, criminals use illegally obtained personal information of citizens to buy off customers and suppress competitors.

4. Illegal interference in civil litigation. Criminals use the purchased personal information of citizens to intervene in civil litigation such as marriage disputes, property inheritance and debt disputes. It has caused great trouble to people's normal life.

5. Disturb the people. After obtaining citizens' personal information, criminals harass people's lives through online human flesh search and information exposure.