Traditional Culture Encyclopedia - Hotel reservation - How often does the Public Security Bureau delete hotel records?

How often does the Public Security Bureau delete hotel records?

The record of opening a room is kept permanently, and the management system of the Public Security Bureau cannot be cleared. The hotel scans the guest ID card and inputs the information, and then uploads it to the database of the Public Security Bureau for the public security bureau to inquire and monitor. Even if you find your ID card, you can't delete the check-in record.

Legal analysis: the record of opening a house is kept permanently, and the management system of the Public Security Bureau cannot be removed. The hotel scans the guest ID card and inputs the information, and then uploads it to the database of the Public Security Bureau for the public security bureau to inquire and monitor. Even if you find your ID card, you can't delete the check-in record. With the emergence of a large number of new technologies, ID cards can contain biometric information, such as iris scanning recognition or fingerprint recognition. Identity card is a document used to prove the identity of the holder, which is mostly issued to citizens by governments of various countries or regions. It will be used as a tool to prove everyone's unique citizenship. Hotel management system and data security: 1. Strictly control housing prices. Different house prices must have different discount authorizations, and they can be monitored and checked in the form of statements. 2. All cashier entries can only be written off in red, and the current record cannot be modified, which is in line with financial practice; 3. Each function has strict authority control to ensure that all kinds of data are not watched and operated by people who have no right to ask. 4. Hotel management system has two architectures: C and B. The product of B architecture is to put the server on the Internet, and users can use the system by browsing the web pages. All data of the B-architecture hotel, including guest check-in information and hotel financial data, will be saved through the Internet server. 5. If the server is attacked, there is a risk of data being stolen. Just like the hotel management system used by the hotel in the event of "opening information leakage", it is a product of B architecture. C architecture is C (client server) architecture. Hotels install servers locally, and other machines connect to the servers in the form of installing clients to realize data synchronization.

Legal basis: Article 29 of the Law of People's Republic of China (PRC) on the Protection of Consumers' Rights and Interests (Amendment) shall follow the principles of legality, justness and necessity when collecting and using consumers' personal information, and clearly state the purpose, method and scope of collecting and using information. With the consent of consumers, operators shall disclose their collection and use rules, and shall not violate the provisions of laws and regulations and the agreements between the two parties.