Recently, county of a kind of jade produced a model one case " hole dad case "
The id card that does a daughter to use dry dad, mobile phone gets stuck
The net was borrowed 30 thousand multivariate
Bring about dry dad to be chased after debt phone is annoyed
Of hole dad dry female because offend " criminal law " be detained by criminal
(the graph occupies a network)
Recently, some comes to Yuan Mou to public security bureau of county of a kind of jade
A unit composed of several groups of area of responsibility of field of make one's rounds of punishment detect group calls the police the dry daughter that weighs oneself cheated her!
Is this after all how one and the same?
Original, be in early in June 2017, yuan is such-and-such the telephone number of the Id open that uses oneself to be protected, this phone card gave some uses some dry daughter Peng Mou.
During using this phone to get stuck, peng Mou is in some Yuan Mou took the id card with such-and-such Yuan when some amuse oneself, this made Peng such-and-such see " gain profit " business chance, satisfy him have the aid of the phone card with the such-and-such Yuan in the hand and Id, to some network leasehold platform application adds up to two sums 30 thousand multivariate loan.
Loan is obtained batch after coming down, peng is such-and-such use this money at oneself consume.
August 2018, leasehold platform found this network Yuan is such-and-such, yuan such-and-such immediately calls the police to police.
On August 10, guilty suspect Peng Mou some (female, 24 years old, start article county person) because be suspected of crime of fraud by police of county of a kind of jade lawfully criminal is detained, the case is among further investigation cognizance.
The society is dangerous
Admit " female " want discretion!
Daily gentleman hints in this friendship:
Do not leak individual information easily!
Come! Act according to designedly on " prevent cheat little knowledge " --
How be on guard " inside ghost " cover your individual news
The choice shops to rely on chart website on 01 nets
The process is bought in the net in, individual information is divulged is a lot of users by the main reason of bilk.
Commodity of commonly used low becomes illegal member bait, release false information, scanning of prevail on consumer is embedded the 2 dimension code of virus, thereby purloin user information and gold; Return somebody to buy client material from the net, with " refund " wait for, coax user offers full name, bank to block the message such as date, Id date; Some cheater still made mix the false with the genuine " fishing website " , set hole step by step, diddle user is principal information. . . . . .
The 02 note that contain individual information do not drop about chaos is put
The receipt of business of ticket of express sheet, plane, train ticket, insurance policy, conduction bank. . . . . . These bill often appear in the life, it is important to included very much individual inevitably information.
It is with express sheet exemple, full name, address, unit, phone, the goods that buys even, show on a piece of little express sheet without involuntary discharge of urine, the individual of 99% is important information can by the person of have ulterior motives reductive get.
And the receipt of bank conduction business, shop little ticket is first-class still included a bank to block bugle call even, trade the amount important information that involves personal property, if be used by illegal element, cause a loss more easily.
Pay on 03 nets need to notice safety
Current, pay on the net, the bank on the net already became important applying, also have a lot of safe hidden trouble.
Exist on the network " fishing website " , illegal element can get user bank to block Zhang date and password in network tiring-room; After the user downloaded the software of embedded and baleful program, the money in mobile phone purse will be imperceptible prediction of a person's luck in a given year; Trojan virus can hide in mobile phone tiring-room or camouflage becomes other software, account of bank of purloin of wait for one's chance and password, hijack even pay a short message, block the bank the gold loot inside one sky.
In addition, public WiFi safety defends the function compares weakness, the hacker needs to depend on a few simple equipment only, but any user names on purloin WiFi and password, even net silver, pay Zhang the of all kinds information such as date and password.
04 beware secondhand the mobile phone divulges information
Public data shows, our country has on 100 million mobile phones every year to be washed out. Secondhand the mobile phone becomes information to divulge " heavy disaster area " .
According to investigation, should spend on a few yuan only or about a hundred yuan, let a mobile phone can easy to doly in " sleep deeply " data " renascent " . Some are bought secondhand the pedlar of the mobile phone exploits this one loophole, "Buy in and sell at a profit " individual information, with money of a few wool price bales vending machine advocate mobile phone date, address book, pay treasure Zhang the information such as date. Once individual information by filch, safety of person of belongings down to gets ensuring hard.
05 do not leave important individual message at will
Kind groom the orgnaization, intermediary orgnaization, metropolis when decorating the conduction business such as the company leaves the message such as means of individual full name, connection, do not meet alertly a bit by the person illegal buy in and sell at a profit.
Regular meeting of the classics when getting online comes up against all sorts of filling in to investigate questionnaire, play test little game, shopping lottery, or application mails freely the activity such as card of member of data, application, general requirement fills in to contact the individual information such as means and home address in detail.
Media of 06 use socialization should notice to protect privacy
Now, when using small letter, QQ to wait, a few people say those who give his not can self-consciously or tag the information such as unit of the full name of other, post, job.
Still a few people often encircle ground of the train ticket that basks in his, boarding check, go on a journey to wait in the friend.
Additional, when the parent issues the child's picture or literal record on the net, casual an appearance that revealed the child and full name, illegal element can use these information to undertake bilk, kidnap wait.
Utility must mention expressly when the certificate such as 07 Id copies
Dweller Id involves the respect of general affairs of rights and interests such as life of politics, economy, society to be used extensively in manage of common run by the local people. And do not say Id to missing meeting works to the individual and live bring a lot of inconvenience, the photocopy of the certificate such as only only id card is used by the person of have ulterior motives, also put in huge safety hidden danger.
2016, somewhere public security bureau reports a case to the security authorities with respect to what received a lady, the villa that weighs oneself was sold below the circumstance that is without know the inside story. The discovery after police investigation, after this lady gives intermediary Id photocopy, intermediary forged original to give the room with her photocopy again cheated.
2011, mr Zhou him discovery of Zhejiang is ineffable " card be doinged " bills due is close 50 thousand. Original, old schoolmate took his Id photocopy to handle 6 pieces of credit card in much home bank, capital and accrual overdrew 3 years in time nearly 50 thousand yuan.
As the rapid development of Internet, it is driving social progress not only, the job that returns us, life brought huge to facilitate. Enjoying these advantage when us while, however oversight the divulge and brings to us harm of individual information. Correct its germ, because the protection of data main body is undeserved,be, brought about what all trades and professions divulges incident to emerge in endlessly.
Our individual regards the privacy that generates data as main body, also answer to understand the right that oneself should enjoy adequately, take the privacy protection of oneself seriously, do not give its person an opportunity that can be exploited to sbs advantage.