Fortune Telling Collection - Comprehensive fortune-telling - Why does a personal information processor need to transmit a person's information?

Why does a personal information processor need to transmit a person's information?

First, how to deal with the information that the personal information processor needs to retrieve?

Personal information processors need to transfer personal information due to merger, division, revocation and other reasons. , it shall inform the individual of the name and contact information of the recipient.

People's Republic of China (PRC) personal information protection law

Article 22? If the personal information processor needs to transfer personal information due to merger, division, dissolution, bankruptcy and other reasons, it shall inform the name or contact information of the individual recipient. The receiving party shall continue to fulfill its obligations as a personal information processor. If the recipient changes the purpose and method of the original treatment, it shall obtain his consent again in accordance with the provisions of this law.

2. What measures are there to protect personal information and privacy?

1. Don't use unencrypted network in public places, don't install software of unknown origin, and don't scan QR code at will.

2. Don't close the browser directly after logging in to the website. Before closing the browser, click the Logout, Exit or Logout button on the website.

3. Appropriate "seamless browsing", turn off the browser's "user experience plan" and "remember password" functions, and enable "clear history when exiting the browser".

4. Don't trust websites such as name test and fortune telling, and don't enter real name, date of birth and other information on them.

5. Don't participate in activities such as registering gift packages, scanning QR codes to send gifts, and rewarding questionnaires.

6. Don't sell used computers, mobile phone, mobile hard disk, USB flash drive, etc. Give it to second-hand merchants, because it can be easily restored after deleting or restoring factory settings. If you want to delete the information completely, you must format and store the data before overwriting the irrelevant data, and repeat it many times to avoid the restoration of private information. But it is still difficult for most ordinary people, so physical destruction can be absolutely safe.

7. What if the information leak has been leaked? When you receive spam messages, marketing or fraudulent phone calls, you should actively mark them and upload them to the internet, and at the same time join the blacklist of address books. The most harmful thing is telecom fraud, which is hard to prevent. Remember a "three noes": don't be greedy and cheap, don't talk about money, don't make money.