Workflow
数字财产继承
icon
Search documents
手机号被二次转卖后,前号主信息遭泄露!运营商该担责吗?
Nan Fang Du Shi Bao· 2025-10-21 13:53
Core Points - The article discusses the risks associated with the reuse of mobile phone numbers, particularly regarding unbound online accounts and the potential for identity theft and privacy violations [1][2][3] - It highlights the operational mechanisms of telecom companies in reissuing numbers and the lack of proactive measures to ensure that previous users have unbound their accounts before the numbers are reassigned [6][7] Group 1: Issues with Number Reassignment - The phenomenon of "second number allocation" occurs when telecom companies recycle inactive numbers, which can lead to new users inheriting the digital identities of previous owners [2][6] - There have been incidents where new users accessed accounts of deceased individuals, leading to privacy breaches and unauthorized transactions [2][3] - Telecom operators do not provide a "clean" number to new users, as they do not actively manage the unbinding of accounts associated with recycled numbers [6][14] Group 2: Legal and Regulatory Aspects - Current laws in China recognize the legitimacy of digital assets but lack clear guidelines on the inheritance of online accounts and associated rights [13][14] - Experts suggest that telecom operators should take more responsibility in informing users about the need to unbind accounts before number cancellation [7][14] - The Ministry of Industry and Information Technology has initiated services to facilitate the unbinding of accounts, which have seen significant user engagement [7][10] Group 3: Recommendations for Improvement - Experts recommend extending the silent period for inactive numbers to allow previous owners more time to unbind their accounts [15] - There is a call for telecom companies to implement stricter verification processes before reissuing numbers, ensuring that all associated accounts are cleared [15] - Platforms are encouraged to enhance security measures and reduce reliance on phone number verification, promoting alternative authentication methods [15]