What about hackers stealing personal information?

Reporting a case to the public security organ can safeguard one's rights and interests, or it can be put on file. Pay attention after personal information is leaked, and write down useful information such as the phone number or address of the other party to help the police solve the case. Perhaps this information is trivial, but once collected, it can not only help you defend your rights, but also help more people. If important personal information is lost, and you know how it was lost or have many clues, you can consult relevant laws and regulations from professional lawyers and claim compensation through litigation. Personal information is often associated with bank account numbers and passwords, so once personal information is leaked, important passwords should be changed immediately to avoid economic losses. When personal information is leaked, victims should know how to protect their legitimate rights and interests, which can be achieved in the following three ways:

1. When citizens find that personal information has been leaked, they can ask the network service provider or infringer to delete the leaked private information;

2. You can report to the relevant law enforcement departments, local public security organs, consumer associations or Internet authorities, submit the report information, and safeguard your legitimate rights and interests;

3. You can protect your related rights and interests through legal channels. According to the relevant provisions of the Consumer Protection Law and the Tort Liability Law, victims can use legal weapons to safeguard their legitimate rights and interests, and when necessary, they can ask the infringer to compensate for losses or apologize.

Individuals should be vigilant, don't leave personal information on the network platform at will, and enhance their awareness of rights protection to prevent personal information from being stolen.

Elements for determining the crime of infringing citizens' personal information;

(1) Subject qualification;

(2) The object of the crime belongs to the personal information collected by the unit in performing its functions and powers or public service functions;

(3) objectively carrying out the act of selling or illegally providing;

(four) in violation of state regulations;

(5) If the circumstances are serious;

(6) The perpetrator intentionally.

Legal basis:

Tort Liability Law of People's Republic of China (PRC)

Thirty-sixth network users and network service providers who use the network to infringe upon the civil rights and interests of others shall bear the tort liability. If a network user uses the network service to commit infringement, the infringed party has the right to notify the network service provider to take necessary measures such as deleting, shielding and disconnecting the link. If the network service provider fails to take necessary measures in time after receiving the notice, it shall be jointly and severally liable with the network users for the enlarged part of the damage. If the network service provider knows that the network users use their network services to infringe upon the civil rights and interests of others and fails to take necessary measures, it shall bear joint liability with the network users.