1. After the call is answered, the 110 caller will usually call the nearby police station or transfer it directly;
2. The police at the police station will ask the caller Detailed address, and then rush to the scene within 5 minutes;
3. After arriving at the scene, there will usually be two to three police officers, and the caller will ask or understand the situation of the caller in detail;
4. When necessary, the person who calls the police will make a record and ask the police to sign it;
5. The police will generally leave the contact information of the person who called the police. At the same time, the person who called the police also has the right to ask the police for his phone number. , you can contact us in time if there are other situations; after the case is cleared, the police will inform you of the closing situation.
Procedures for dealing with online violence:
1. Collect evidence clues. After information is leaked, it is easy to receive all kinds of emails and phone calls from all over the world. You should pay attention at this time and write down useful information such as the other party's phone number or email address. This information may be trivial, but once collected, it will not only help you protect your rights, but may also help more people;
2. Report to the relevant departments. Once personal information is leaked, complaints can be reported to the public security department, Internet management department, industrial and commercial department, consumer association, industry management department and relevant institutions. The purpose of reporting is to protect your own rights and interests, and also for filing. Once more people encounter similar situations, they can be dealt with together. According to the relevant provisions of the "Criminal Law", selling or providing citizens' personal information to others, and illegally obtaining citizens' personal information, if the circumstances are serious, may be suspected of criminal offenses, and the public security organs can intervene in the investigation;
3. Remind relatives and friends around you Beware of being scammed. After personal information is leaked, not only can this information be used to steal accounts, but it is even possible to deceive relatives and friends around you. Therefore, once information is leaked or the contact tool account is lost, you must notify relatives and friends as soon as possible and ask them to take precautions to avoid being deceived;
4. Entrust a lawyer to protect your rights. If a person's important information is lost and he knows how to report the loss or has many clues, he can consult a professional lawyer about relevant laws and regulations. If the lawyer gives a positive answer, he can use legal weapons to protect his rights and interests. If it is leaked during the consumption process, you can also use legal means to require the infringer to apologize, eliminate the impact, restore reputation, compensate for losses, etc. according to the Civil Law, Consumer Rights Protection Law, etc.
To sum up, the specific handling of online violence must be carried out in strict accordance with the procedures and requirements stipulated in the above-mentioned laws. In particular, victims can protect their legal rights through legal channels by calling the police. Rights and interests, and the final disposition needs to be determined by the judicial authorities based on the actual circumstances of the case.
Legal basis:
Article 194 of the "Code of the People's Republic of China"
Network users and network service providers use the network Anyone who infringes upon the rights and interests of others shall bear tort liability. If the law provides otherwise, such provisions shall prevail.
Article 1195
If a network user uses network services to commit infringing acts, the rights holder has the right to notify the network service provider to take necessary measures such as deletion, blocking, and disconnection of links. The notification should include prima facie evidence of infringement and the true identity of the rights holder.
After receiving the notice, the network service provider shall forward the notice to the relevant network users in a timely manner and take necessary measures based on the preliminary evidence of the infringement and the type of service; if the necessary measures are not taken in a timely manner, the damage will be extended. Some network users bear joint liability for damages.
If wrong notification causes losses to network users or network service providers, the rights holder shall bear infringement liability. If the law provides otherwise, such provisions shall prevail.
Article 196
After receiving the forwarded notice, network users may submit a non-infringement statement to the network service provider. The statement should include prima facie evidence of the absence of infringement and the true identity of the network user.
After receiving the statement, the network service provider shall forward the statement to the rights notifier and inform him or her that he or she may file a complaint with the relevant department or file a lawsuit with the People's Court. If the network service provider fails to receive notice of a complaint or lawsuit from the right holder within a reasonable period of time for forwarding the statement to the right holder, it shall terminate the measures taken in a timely manner.