Whoever is leaking student information can buy 200 pieces of personal information for 1 yuan | Information | Students

Release time:Apr 14, 2024 02:34 AM

When personal information is used for beauty rating, people in the era of information streaking are once again angry.

Recently, Ma, a graduate of Renmin University of China, was suspected of illegally accessing the school's internal network data during his time at school, collecting personal privacy information of all students, and publicly posting it on the website for appearance rating. At present, the Haidian police in Beijing have lawfully detained Ma, and the case is under further investigation.

When the incident was exposed, the first reaction of Xiao Lin, a student at Renmin University of China, was surprise: "How did he obtain this data? Where did he obtain it?" Along with it came anger and disgust at being offended.

Pengpai News has sorted out 52 judgment documents related to the leakage of personal information of students in the past three years, attempting to explore who is leaking student information, which links have gone wrong, and who should be responsible for it?

Cheap personal information: 1 yuan can buy information for 200 students

These 52 judgments reveal the crimes and punishments related to the leakage of personal information of students.

39 identified the main types of information leakage - personal basic information and school information are the most common types of information leakage, including name, gender, date of birth, school, major, class, etc. In addition, criminals also obtained more sensitive personal information such as ID cards and loan information.

In addition to personal information related to students, the leakage of information from student groups often accompanies the "naked running" of personal information from parents. According to incomplete statistics, 53% of student information leakage cases involve personal information leakage from parents.

And the unit price of these personal information is extremely low. According to the Criminal Judgment of the First Instance of Wang's Infringement of Citizen Personal Information, criminals can buy 180000 pieces of student information for only 1000 yuan, which is equivalent to buying information for 200 people for only 1 yuan.


Whoever is leaking student information can buy 200 pieces of personal information for 1 yuan | Information | Students

After the leakage and combination of different types of personal information, they become the "raw materials" for further infringement by criminals. And these infringements often appear in the form of telecommunications fraud.

In the case tried by the People's Court of Huishan District, Wuxi City, Jiangsu Province in 2020, the defendant Wang Yiheng used personal information and QQ numbers of student parents purchased online in advance, used forged training notices, impersonated their children's identities, and repeatedly deceived the victim of a total of RMB 76120 in money, citing the need to pay training fees. The verdict shows that the defendant Wang Yiheng committed crimes such as fraud and infringement of personal information of citizens, and was sentenced to four years and three months in prison with a fine of 5000 yuan. Among them, those who commit the crime of infringing on the personal information of citizens shall be sentenced to three months' imprisonment and fined 3000 yuan.

By reviewing the sentencing standards of multiple judgments, it can be seen that in the punishment of the crime of infringing on personal information of citizens, various factors such as the volume of information leakage, criminal methods, and criminal purposes will be considered.

Comparing the two judgments, Cai Tao's Criminal Judgment for Infringing Citizen Personal Information in the First Instance and Zhang Xiaodong's Criminal Judgment for Infringing Citizen Personal Information in the First Instance, it can be seen that each defendant was sentenced to 4 years and 9 months of imprisonment, but there was a significant difference in the amount of personal information involved in the case.

The Cai Tao case involves infringing on 16.03 million pieces of personal information of citizens and illegally profiting 38000 yuan; The Zhang Xiaodong case involves the infringement of 279000 pieces of personal information of citizens and illegal profits of 238 US dollars. The court pointed out that due to the use of methods such as intrusion and control of others' computers in the illegal acquisition of personal information by Zhang Xiaodong, the circumstances are particularly serious, and the sentencing is heavier than other similar cases where the amount of personal information leakage and profits of citizens are obtained.

Expert: Enterprises and other units should establish and implement data compliance systems

It is currently unclear how Ma obtained the school's intranet data. In previous cases, many criminals obtained a large amount of personal information of students through the convenience of their positions. At least one-third of the 52 judgment documents are in this type of situation.

A case that has been reported by multiple media outlets is that students from multiple universities in Chengdu suddenly discovered that they were "employed" and that some companies had stolen their identity information for tax evasion. The source of information leakage is that an employee of an insurance company leaked the list of student information they obtained while working.

The above cases all tell us that the vulnerability of student information leakage often lies in the employees who come into contact with the data.


Whoever is leaking student information can buy 200 pieces of personal information for 1 yuan | Information | Students

The responsibility for personal information leakage among students is usually attributed to individuals and does not fall on the company. Among the 52 relevant documents, only two cases are where the company is responsible for personal information leakage, while the other 50 cases are where individuals bear responsibility.

A document ruling that the company is illegal mentions that the legal representative of an education consulting company purchased over 270000 pieces of student information online and hired others to use this information to promote educational software through phone calls, free door-to-door teaching, and other means. The company profited at least 60000 yuan from this. The final court ruled that the company and its responsible persons committed the crime of infringing on the personal information of citizens, and imposed a total fine of 140000 yuan.

In the current incident of information leakage among students at the National People's Congress, Ma Ce, founding partner of Zhejiang Kenting Law Firm, believes that Ma may constitute the crime of infringing on personal information of citizens, while the school generally does not constitute the crime of infringing on personal information of citizens because there is no "criminal agreement" between the school and the students.

"Generally speaking, it is necessary to comprehensively consider whether the criminal act is committed for the benefit of the unit, whether it is carried out in the name of the unit, whether it has been decided by the unit, whether the illegal gains belong to the unit, and whether the unit knows and should know whether the enterprise and other units constitute a crime." Ma Ce sued Pengpai News, but if a school violates its information network security management obligations and refuses to correct after being ordered by regulatory authorities to take corrective measures, resulting in the leakage of personal information of its citizens, it may be convicted and punished for the crime of refusing to fulfill its information network security management obligations.

However, laws and regulations such as the Data Security Law and the Personal Information Protection Law impose necessary legal obligations on operating units. Ma Ce said that enterprises and other units should develop and implement data compliance systems internally, take necessary organizational and security measures, such as setting up an information security department and designating a person in charge of personal information protection. In addition, enterprises and other units should also cultivate employees' awareness of data compliance, clarify the red line for violations, in order to isolate or reduce the probability of criminal involvement among employees.

In large-scale information leakage incidents, Ma Ce suggests that users directly report to the police, especially when personal information is still facing the risk of expanding leakage, and enterprises and other units have an obligation to notify users. "Currently, few enterprises will implement notices, which will undoubtedly affect the timing of users taking protective measures.".

Two women were stabbed to death and reported to have committed a crime 4 days before the follow-up visit for schizophrenia. Suspect of a bloody murder case in a Hong Kong shopping mall appeared in court today. Male | Last Friday | Murder case
Two women were stabbed to death and reported to have committed a crime 4 days before the follow-up visit for schizophrenia. Suspect of a bloody murder case in a Hong Kong shopping mall appeared in court today. Male | Last Friday | Murder case

According to Hong Kong's Wen Wei Po, a bloody knife stabbing case occurred at Hollywood Square in Diamond Hill last Friday. The police arrested a 39 year old man on suspicion of stabbing two young women, one of whom was stabbed over 30 times. The suspect appeared in the Kwun Tong Magistrates Court this morning. The police at the Kwun Tong Magistrate's Court temporarily charged the suspect with two counts of murder last Sunday. The suspect appeared in court this morning at the Kwun Tong Magistrate's Court. Acting Chief Magistrate Zheng Jihang, after listening to the opinions of both the prosecution and defense, decided to postpone the hearing for two weeks until 9:30 am on June 19th, waiting for two psychiatric expert reports to be obtained. The defense did not object. Zheng Jihang approved the application, and the defendant needs to be temporarily detained at Xiaolan Mental Hospital. When the suspect appeared in court, he wore black framed glasses, a light gray shirt, and camouflage green shorts, and was able to answer the judge's questions normally. accordingly

Secretary of the Provincial Party Committee: The focus of Henan's "summer harvest" has shifted to agricultural machinery in the northern region of Henan Province. | Support | Science | Organization | Province | Northern Henan | Summer Harvest | Rush Harvest
Secretary of the Provincial Party Committee: The focus of Henan's "summer harvest" has shifted to agricultural machinery in the northern region of Henan Province. | Support | Science | Organization | Province | Northern Henan | Summer Harvest | Rush Harvest

Currently, the highly anticipated summer harvest work in Henan has shifted its focus to the northern region of Henan. According to the Henan Daily client, on June 4th, Lou Yangsheng, Secretary of the Henan Provincial Party Committee, presided over a special video scheduling meeting on the "Three Summers" work in the province, listened to the situation report, analyzed and judged the situation, and arranged and deployed the next steps of work. Governor Wang Kai made specific arrangements. On the evening of May 31, 2023, in Xiafutou Village, Xuliang Town, Boai County, Jiaozuo, Henan Province, villagers braved light rain in the wheat fields to harvest wheat. Visual China Map Lou Yangsheng pointed out that the current summer harvest battle in the province has entered the decisive stage. Doing a good job in summer harvest in northern Henan Province is related to the summer grain yield and seed safety. We should focus on seizing opportunities and make every effort to organize the wheat harvesting work in the northern Henan region, minimize losses, and protect the interests of farmers to the greatest extent possible. Accurate forecasting is essential

Xinhua All Media+| Welcome home! What innovative technologies are protecting the return journey of Shenzhou 15? Spaceship | Shenzhou | Technology
Xinhua All Media+| Welcome home! What innovative technologies are protecting the return journey of Shenzhou 15? Spaceship | Shenzhou | Technology

On June 4th, the return capsule of the Shenzhou-15 manned spacecraft successfully landed at the Dongfeng landing site. Astronauts Fei Junlong, Deng Qingming, and Zhang Lu all safely and smoothly exited the spacecraft, and the Shenzhou-15 manned flight mission was a complete success. What innovative technologies are there to safeguard the return journey of Shenzhou 15 in this mission? On June 4th, the return capsule of the Shenzhou-15 manned spacecraft successfully landed at the Dongfeng landing site. Xinhua News Agency reporter Lian Zhen photographed that "the sky and the ground" ensure the high-precision return of spacecraft. For the Shenzhou series spacecraft, the return and re-entry GNC technology is directly related to the life safety of astronauts. Taking the success of this return mission as a symbol, China has comprehensively upgraded its GNC system since the Shenzhou-12 manned spacecraft, which features autonomous rapid rendezvous and docking, autonomous adaptive prediction and re-entry return guidance, and has completed a comprehensive update and replacement

The Chinese naval fleet has arrived! Assembly | Navy | Chinese Fleet
The Chinese naval fleet has arrived! Assembly | Navy | Chinese Fleet

At noon today, a Chinese naval fleet consisting of Zhanjiang and Xuchang ships arrived at the assembly area of the "Comodo-2023" multinational maritime joint exercise. It is understood that the assembly anchorage for this exercise is 3 nautical miles long and 1.5 nautical miles wide, capable of anchoring up to 50 ships. Naval vessels from various countries participating in the exercise will also arrive at the anchorage today to complete the assembly of the "Komodo 2023" multinational maritime joint exercise, which is held every two years by the Indonesian Navy. This year is already the fourth edition of the exercise. The exercise will be held from June 5th to 8th in the city of Jakarta, South Sulawesi Province, Indonesia, including the port and sea phases. In the coming days, participating navies from various countries will participate in ship reading style search and rescue exercises, maritime interception and damage management exercises, aerial exercises, and other course objectives exercises

New comment: Donkey like "morale" limit pulls US debt "bomb" fuse hard to dismantle US | debt | morale
New comment: Donkey like "morale" limit pulls US debt "bomb" fuse hard to dismantle US | debt | morale

On the evening of June 1st, the US Senate passed a bill on the federal government's debt ceiling and budget, and the flame of the US debt bomb was temporarily extinguished at the last moment. The two parties in the United States have staged an extreme tug of war over the US debt bomb. Some experts believe that the US debt crisis is the result of the reckless politics promoted by the US dollar hegemony, and the underlying cause of this crisis is the highly polarized political system of the US. Since the end of World War II, the US Congress has adjusted the debt ceiling more than a hundred times. The recurring debt crisis will not only have a catastrophic impact on the US economy and people's livelihoods, but also continuously erode the value of US dollar assets such as government credit and US bonds, bringing significant and far-reaching impacts to the global economic landscape. 【