1. What will happen if the information is leaked? Generally speaking, after receiving a fraudulent phone call, you may disclose some or all information such as your name, address, phone number, ID number and bank card number to the other party. Obviously, it is not advisable to disclose your information in this way. However, this information alone is not enough to suspect you of substantial infringement. They obtain this information in order to further induce or even intimidate you to operate according to their requirements, such as: transferring money to protect your funds, accepting safe account isolation to review funds, logging in to the cottage lottery website for redemption and so on. It is theoretically impossible to steal your account funds directly based on the bank card number, mobile phone number and ID number. However, these fraudulent papers may be further illegally resold by these people, illegally purchased by others to commit other fraud crimes, or used for advertising marketing. Therefore, you may be harassed after a period of time (phone calls and letters are possible).
2. Suggestions on privacy protection. In the fraud with winning the prize as bait, revealing personal information is a common means of fraud, and most victims will fill in this information when logging in to the so-called award-winning website. In fact, for those of you who have never participated in the lottery, just think about it. There are more than 1.3 billion people in the country. How lucky you are to win the lottery, not to mention that the officials who have not participated in the lottery can know this information from the official website. Although as mentioned above, the information you fill in will not bring you direct losses, I suggest you learn some lessons and don't do similar irrational things in the future.
3. Suggestions on fraud prevention. In fact, all kinds of fraud crimes are not full of loopholes, and they can be easily identified with a little care. Moreover, news media and public security organs at all levels are repeatedly promoting anti-fraud knowledge. As long as they pay a little attention at ordinary times, they can learn a lot of useful knowledge. According to this knowledge, it is easy to identify the vast majority of frauds. Therefore, this time, at least as a lesson in future life, we can learn a lesson, and long-term pain is better than short-term pain.
how to prevent the disclosure of personal information
1. Don't fill in the questionnaire. Nowadays, it is very popular to fill out questionnaires. You will meet all kinds of people on the Internet, on the street or on campus to ask you to fill out questionnaires. In this case, we should not fill in the questionnaire, let alone fill in important personal information on the questionnaire, so as to avoid information leakage or even reselling.
2. Don't be greedy for petty gain. There is no such thing as a free lunch, and we often encounter such a situation: you can get a beautiful gift for free by leaving your contact information at the event. However, sometimes the gifts you get have no real value, but you lose important personal information, which takes a small advantage and suffers a big loss.
3. Don't throw away the courier documents at will. With the development of e-commerce, online shopping and express delivery have become a part of most people's lives. After taking out the express items, many people throw the express boxes and express documents into the trash can. In fact, the loss of documents is also the disclosure of personal information.
4. Handle tickets correctly. At present, real-name registration system is applied to train tickets and plane tickets, and their names, ID numbers and other information will be left on the tickets. Therefore, don't throw away your ticket after you leave the station by bus.
5. The contact information is not circulated. In daily life, I will always receive some sales calls inexplicably, and I will take pains to harass and even affect my normal work and rest. In fact, these harassing calls start with the mobile phone number you inadvertently left, so in order to prevent harassing calls from entering your life, don't leave your contact information at will.
6. delete relevant information after printing. Printing shops can bring us a lot of convenience and trouble. When printing in a print shop, most people like to copy the U disk file to the computer and forget to delete it after printing. In this case, if a resume is printed, it is inevitable that personal information will be leaked.
7. Protect personal information on the Internet.
(1) Mobile phones, computers, etc. need to install security software and scan Trojans at least once a day, especially before using important account passwords. Check and kill the virus regularly once a week, and update the security software in time.
(2) Don't install software of unknown origin, don't modify the system files in the mobile phone when using the smart phone, and don't participate in online registration information to get free gifts.
(3) Set a high-security password, preferably different passwords for different websites. In addition, it is best to change the payment passwords for online banking and online shopping regularly.
(4) Try not to use the "remember password" mode, and pay attention to check personal usage records after surfing the Internet.
8. Shopping on regular websites. When viewing information or browsing videos, be sure to go to a regular website. Sometimes installing anti-virus software does not guarantee that the computer will not be infected with viruses. In particular, if you want to buy products involving online payment, you'd better use a regular and secure website, so that the security level is higher.
9. Don't open strange emails. Don't receive or open strange mail. After opening the mailbox, you must not open the mail sent by strangers easily, especially when you see the mail-related links such as prizes or awards. Be more careful not to open the links easily, otherwise your browsing records, even the accounts or passwords of important websites, may be revealed.
I hope the above contents can help you. If you have any other questions, please consult a professional lawyer.
legal basis: "opinions on several issues concerning the application of laws in handling criminal cases such as telecommunication network fraud"
determining the jurisdiction of cases according to law
telecommunication network fraud cases are generally put on file for investigation by the public security organs in the crime place, and it is more appropriate to put on file for investigation by the public security organs in the criminal suspect's residence. If it is more appropriate to file a case for investigation by the public security organ in the criminal suspect's residence, it may be filed for investigation by the public security organ in the criminal suspect's residence. The place of crime includes the place where the crime was committed and the place where the crime result occurred.
"criminal place" includes the location of the website server used in telecommunication network fraud, the location of the website builder and manager, the location of the infringed computer information system or its manager, the location of the computer information system used by the criminal suspect and the victim, the dialing place, sending place, arrival place and receiving place of fraudulent telephone calls, short messages and emails, and the place where fraud is implemented, prepared, started, passed and ended.
"The place where the criminal result occurred" includes the place where the victim was deceived, and the place where the property obtained by fraud was actually obtained, hidden, transferred, used and sold.