Secondly, the police check Weibo. If a case is involved, the case must be filed before they can check WeChat chat records. "The police check Weibo. If a case is involved, they must file a case before they can check WeChat chat records."
2. Infringement of online privacy:
1. Saving and collecting personal information for unreasonable use or purposes without the user’s permission. The working principle of a computer system determines the possibility and necessity of certain information being automatically saved. This part of automatically saved information should be deleted in time if it does not affect the normal operation of the network. Saving or collecting personal information for unreasonable purposes without permission constitutes a violation of user privacy.
2. Improper disclosure or intentional dissemination of personal information. Legally obtaining personal information but using it unreasonably without permission, or misusing it beyond the permitted scope, constitutes an infringement of privacy rights.
3. Tampering with personal information or disclosing wrong information without authorization. Network operators should ensure the objectivity and accuracy of personal information. Privacy rights determine that network users have the right to query the information collected by network operators and correct incorrect information.
4. Illegal disclosure of other people’s email addresses and illegal access to private network information areas. Although cyberspace is a virtual space, the personal information present in it cannot be intruded, spied on or detected.
Legal basis:
Article 20 of the "Law of the People's Republic of China on National Resident Identity Cards" If a people's policeman commits any of the following acts, he shall be punished in accordance with the law according to the seriousness of the case. Administrative sanctions; if a crime is constituted, criminal liability shall be pursued in accordance with the law:
(1) Take advantage of the convenience of making, issuing, querying, and verifying resident ID cards. Accepting other people’s property or seeking other benefits;
(2) Illegally changing the citizen’s identity number, or publishing information on the resident identity card other than the items specified in Article 3, Paragraph 1 of this Law, or deliberately publishing false information Information;
(3) Failure to renew the resident identity card within the legal period without justifiable reasons;
(4) Violation of the regulations on inspection and confiscation of resident identity cards, infringement of the legality of citizens . Resident ID cards, infringing upon citizens' legitimate rights and interests;
(5) Leaking citizens' personal information obtained through the production, issuance, inspection, and seizure of resident identity cards, infringing on citizens' legitimate rights and interests.
Derived questions:
How to solve the problem of personal information leakage?
(1) Change account. After personal information is leaked, you should change your account as soon as possible. Because the Internet is now very developed, if the account is not changed after the information is leaked, all kinds of information logged in under this account will continue to flow out. Therefore, once the source of the leak is discovered, you should immediately stop using the account and cut off the source of the leak.
(2) Change important passwords. Nowadays, people’s lives are inseparable from the Internet. Once personal information is leaked, it will be serious. Especially for people who like to shop online, personal information is often linked to important information such as bank account numbers and passwords. Therefore, once personal information is leaked, important passwords should be changed immediately to avoid financial losses.
(3) Report. Once personal information is leaked, the police should be reported promptly. The purpose of reporting a crime is to protect your own rights and interests, and also for filing. Once there are more people in a similar situation to yours, it can be dealt with together. This will not only protect your privacy, but also avoid more economic losses.
(4) Lawyer sues. If your important personal information is lost and you know how to report the loss or have many clues, you can consult a professional lawyer about relevant laws and regulations. If the lawyer gives a positive answer, you can use legal weapons to protect your rights and interests.
(5) Collect evidence. After information is leaked, it is easy to receive all kinds of emails and phone calls from all over the world. You should pay attention at this time and write down useful information such as the other party's phone number or email address. Maybe this information is trivial, but once collected, it can not only help you safeguard your rights, but may also help more people.