First, the police check WeChat. If a case is involved, you must file a case to view the chat history of WeChat. Chat records can be restored if they have been backed up. If the public security bureau wants to check, it should be able to contact the operator to retrieve the chat record data.
Second, infringement of the right to privacy on the Internet:
1. Save or collect personal data for unreasonable purposes or purposes without the user's permission. The working principle of computer system determines the possibility and inevitability of automatic storage of some information. This part of the automatically saved information should be deleted in time without affecting the normal operation of the network. Saving or collecting personal information for unreasonable purposes without permission will constitute an invasion of user privacy.
2. Improper disclosure or intentional dissemination of personal information. Legal access to personal information, but unreasonable use of personal information without permission, or abuse of personal information beyond the scope of permission, is an infringement of privacy control.
3. Tampering with personal information or disclosing wrong information without authorization. Network operators should ensure the objectivity and accuracy of personal information, and the right of privacy determines that network users have the right to inquire about the information collected by network operators and correct the wrong information.
4. Illegally open other people's emails and illegally enter the private online information field. Although cyberspace is a kind of virtual space, the personal information in it must not be invaded, snooped or peeped.
Legal basis:
Article 20 of the Law of the People's Republic of China on Resident Identity Cards shall be given administrative sanctions according to the seriousness of the case if the people's police commit any of the following acts; If the case constitutes a crime, criminal responsibility shall be investigated according to law:
(a) taking advantage of the convenience of making, issuing and checking resident identity cards to accept other people's property or seek other benefits;
(2) illegally changing the citizen's identity number, or posting information on the resident's identity card other than the matters specified in the first paragraph of Article 3 of this Law, or deliberately posting false information;
(3) Failing to issue resident identity cards within the statutory time limit without justifiable reasons;
(four) in violation of the provisions of the inspection, seizure of identity cards, against the legitimate rights and interests of citizens;
(five) the disclosure of personal information of citizens obtained by making, distributing, inspecting and detaining resident identity cards, which infringes upon the legitimate rights and interests of citizens.
Derivative problem:
What is the solution to personal information disclosure?
(1) Change account number. After personal information is leaked, you should change your account as soon as possible. Because the network is very developed now, if you don't change the account after the information is leaked, all kinds of information registered under this account will flow out continuously. Therefore, once the source of the leak is found, it is necessary to immediately stop using the account and cut off the source of the leak from the source.
(2) Change important passwords. Nowadays, people can't live without the Internet. Once personal information is leaked, it involves a wide range. Especially for people who like online shopping, personal information is often associated with important information such as bank account number and password. Therefore, once personal information is leaked, important passwords should be changed immediately to avoid economic losses.
(3) report the case. Once personal information is leaked, you should call the police. The purpose of reporting a case is to protect one's own rights and interests, and the other is to file a case. Once more people encounter similar situations to yours, they can deal with them together. This can not only protect your privacy, but also avoid more economic losses.
(4) Lawyers sue. If important personal information is lost and you know how to lose it or have many clues, you can consult relevant laws and regulations with professional lawyers. If the lawyer gives a positive answer, he can use legal weapons to safeguard his rights and interests.
(5) Collect evidence. After the information is leaked, it is easy to receive all kinds of emails and phone calls from all over the world. At this time, you should pay attention and write down useful information such as the phone number or email address of the other party. Perhaps this information is trivial, but once collected, it can not only help you defend your rights, but also help more people.