The maximum sentence for buying and selling personal information is seven years.

According to Article 4 of the Law of the People's Republic of China on the Protection of Personal Information, the interpretation of personal information is as follows:Personal information is all kinds of information related to an identified or identifiable natural person recorded in an electronic or other way, excluding information that has been anonymized. In plain English, personal information includes information that identifies a natural person, such as identity card number, photograph, fingerprints, facial recognition information, blood type, and biometric information, cell phone number, home address, household address, and family relationships.

Family relationships, workplaces, relationships, marriages, habits, purchases, and so on, regardless of whether the information is recorded on paper or on electronic devices, are all personal information.

Nowadays, due to the ease of communication, personal information leaks out, and very often, this personal information is secretly sold by some insiders to unscrupulous people to make a profit, and these unscrupulous people will take this personal information to do the illegal activities.

Take me for example, 14 years when I bought a house in Jinko, since the purchase of the house, less than half a month, the whole Kaiju District of the second-hand agent, and do the loan of people, every day to call me, first of all, these second-hand agent, they call is to ask me to sell the house, said they are a certain housing agency, to understand that I have purchased a set of houses, clouds, these people not only know that I bought a set of houses, but also to know that I have a lot of information, but also to know that I have a lot of information. know all the information about my purchase, but also know my cell phone number, as well as my type of household, specific location, in that building, a few floors, a few numbers, I wondered, where did they get my purchase information and personal information, finally one day, I received a second-hand housing agency called, the caller is a friend of mine, he is also to do this, I asked him where he was to get my purchase information and personal information. I asked him where he got my home purchase information and personal information, he said that their boss through a specialized channel to buy, as for what kind of channel, he said he was not sure. I think, this information must be Jinke Group internal people sell out, otherwise, it will not lead to the whole Kaiju second-hand agents hand a, so detailed information, just after the second-hand agents on my phone bombardment, followed by renovation companies, one after another called to ask me, the house renovation did not, these renovation company people, know my name, know the location of my house, household number and The company's name, the location of my house, the house number and the type of household, can be said to know it like the back of their hand.

These personal information leaks fast, simply jaw-dropping, and for example, I registered an account in the Tencent micro-securities, is to go in and log in, good guy, it was those fraudsters stared at, for ten years in a row, every two days on the phone to me, said they are what the securities company, to recommend me a few potential stocks, can quickly make money that kind of phone call, I know that is a fraudulent phone call. Fraud phone, I do not know, they are how to get my personal information, life about such information leakage, really countless, the country should have been legislation to crack down on, for example, I bought a motorcycle in 11 years, and immediately got my personal information by telecom fraudsters, posing as a staff member of the Chongqing Municipal Bureau of Finance, to do for me to the motorcycle subsidies to the countryside, in fact, I have been back to the town for the motorcycle related to the countryside, and I have to go back to the town for the motorcycle to the countryside. Town for the motorcycle to the countryside of the relevant matters, waiting to play the money, this time the liar manipulated a mouthful of Cantonese accent, said their own is the Chongqing Finance Bureau, let me go to the bank teller to insert the bank card, and then according to his instructions to operate, these scammers other things I don't admire them, I admire him how he can so quickly get my personal data.

In my personal opinion, for these criminals who buy and sell other people's personal information, the death penalty is cheap for them, if they can be sentenced to death by a thousand cuts, five horses and a body, that's the only way to get rid of it!

Personal information includes

A personal identification information

Personal identification information, including your identity card number, location of your household registration, biometrics information, face recognition information and fingerprints information, height and weight, etc., once obtained by criminals, or using your This information is used to forge ID cards and other fraud, or to impersonate you to carry out online lending, etc., or to register a company with this information to carry out fraudulent loans or marriage dating fraud and other criminal activities.

Two, shopping information

Shopping information, including what kind of items you bought on those sites, etc., once this information is leaked, telecom fraudsters, either intimidating threats to you, saying that there are prohibited items in your parcel, so that you cooperate with the investigation, and then let you one to go to the hotel, are not allowed to tell their family and friends, according to their Requirements to transfer the money into the security account that the scammers said, or these scammers posing as customer service, said you buy goods have quality problems, to give you a refund, let you add the scammers WeChat, and then tricked you to download the fraudulent software, or fraudulent authentication code, to your money away, the scammers' tricks are endless.

Three, marriage and family information

Marriage and family information, mainly including your relationship information, or hotel room record, or marriage partner's information, the information once leaked, the fraudster will often be the victims of extortion, intimidation and threat, etc., to cheat the victim's property.

Four, enjoy the government subsidies and welfare insurance information

On the government subsidies and welfare information leaks, the fraudster will pose as a government employee, cheating the victim of money, a variety of means, especially to be vigilant.

Fifth, out of track information

Out of track or travel information once leaked, often the fraudster will pose as an epidemic prevention personnel, falsely claiming that you are the next closest contact, etc., to intimidate you threat, and then cheated you out of your belongings.

Six, bank card and social software electronic account information

Bank card and payment software or social software account information leakage, easy to lead to the crooks set of property, or fraud, fraud and other illegal crimes.

Six, work information

Work information, that is, where you work, specific jobs and some more confidential information, once leaked, by the fraudster to take advantage of, or is posing as your leadership, or is posing as you personally, to your colleagues to implement fraud.

Seven, medical information

Medical information leaks often receive fraudsters for your condition of the sales call, in fact, selling drugs are fake, these fraudsters purpose is to cheat money.

Personal information mainly includes personal identification information, face recognition, fingerprints, biological information, travel, hotel accommodation, marriage and family, dating and love, enjoying the benefits of government subsidies, home purchase, car purchase, shopping, work, medical, bank card, communication and social networking software accounts and other information.