0% found this document useful (0 votes)
34 views

1, Sec. 2) - This Comprehensive Privacy Law Also Established A National Privacy

The document provides tips for securing personal data in 6 areas: 1) Securing devices and networks through anti-malware, firewalls, and wireless network passwords. 2) Protecting mobile data by enabling remote wiping, backing up data, and locking devices. 3) Protecting identity with secure unique passwords and protecting identification numbers. 4) Protecting credit by signing debit cards as credit and being wary of online shopping. 5) Securing social media by limiting shared information, blocking suspicious users, and checking privacy settings. 6) Protecting online data by avoiding sensitive transactions on public WiFi, signing out of accounts, and avoiding untrustworthy downloads.

Uploaded by

ANON
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views

1, Sec. 2) - This Comprehensive Privacy Law Also Established A National Privacy

The document provides tips for securing personal data in 6 areas: 1) Securing devices and networks through anti-malware, firewalls, and wireless network passwords. 2) Protecting mobile data by enabling remote wiping, backing up data, and locking devices. 3) Protecting identity with secure unique passwords and protecting identification numbers. 4) Protecting credit by signing debit cards as credit and being wary of online shopping. 5) Securing social media by limiting shared information, blocking suspicious users, and checking privacy settings. 6) Protecting online data by avoiding sensitive transactions on public WiFi, signing out of accounts, and avoiding untrustworthy downloads.

Uploaded by

ANON
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

SECURING OUR DATA

According to study, around 2.5 quintillion bytes of data are created daily.
We now live in an age where digital data is part of our daily lives — part of our
personalities and identities. Given this fact, there is a real need to change the
way organizations and people handle data and workflows to ensure the
protection of private and personal information.
Here in the Philippines, year 2012, the country passed the Data Privacy
Act 2012, comprehensive and strict privacy legislation “to protect the
fundamental human right of privacy, of communication while ensuring free flow
of information to promote innovation and growth.” (Republic Act. No. 10173, Ch.
1, Sec. 2). This comprehensive privacy law also established a National Privacy
Commission that enforces and oversees it and is endowed with rulemaking
power. On September 9, 2016, the final implementing rules and
regulations came into force, adding specificity to the Privacy Act.
Personal information refers to any information, whether recorded in a
material form or not, from which the identity of an individual is apparent or can
be reasonably and directly ascertained by the entity holding the information, or
when put together with other information would directly and certainly identify an
individual. Keeping your passwords, financial, and other personal information
safe and protected from outside intruders has long been a priority of businesses,
but it's increasingly critical for consumers and individuals to heed data protection
advice and use sound practices to keep your sensitive personal information safe
and secure. There's an abundance of information out there for consumers,
families, and individuals on protecting passwords, adequately protecting desktop
computers, laptops, and mobile devices from hackers, malware, and other
threats, and best practices for using the Internet safely.
How to secure data?

1. SECURING YOUR DEVICES AND NETWORKS


ANTI-MALWARE PROTECTION IS A MUST – “scammers are sneaky:
sometimes malware is clearly disguised as an email from a friend, or a useful
website.” Anti-malware protection is essential for laying a foundation of security
for your devices. The best way to avoid getting infected is to run a good anti-
virus protection program, do periodic scans for spyware, avoid clicking on
suspicious email links or websites.
SECURE YOUR WIRELESS NETWORK AT YOUR HOME OR BUSINESS - A
valuable tip for both small business owners and individuals or families, it's
always recommended to secure your wireless network with a password. This
prevents unauthorized individuals within proximity to hijack your wireless
network. Even if they're merely attempting to get free Wi-Fi access, you don't
want to inadvertently share private information with other people who are using
your network without permission. "If you have a Wi-Fi network for your
workplace, make sure it is secure, encrypted, and hidden. To hide your Wi-Fi
network, set up your wireless access point or router so it does not broadcast the
network name, known as the Service Set Identifier (SSID). 
TURN OFF YOUR COMPUTER - When you're finished using your computer or
laptop, power it off. Leaving computing devices on, and most often, connected to
the Internet, opens the door for rogue attacks. "Leaving your computer
connected to the Internet when it’s not in use gives scammers 24/7 access to
install malware and commit cybercrimes.
USE A FIREWALL - Firewalls assist in blocking dangerous programs, viruses or
spyware before they infiltrate your system. 

2. DATA PROTECTION TIPS FOR MOBILE DEVICES

ENABLE REMOTE LOCATION AND DEVICE-WIPING - If your gadget is lost or


stolen, tracking apps can tell you exactly where your phone is. These apps also
let you wipe sensitive information remotely. If your phone does end up landing in
the wrong hands, you can at least make sure they don't get your information.
DON'T FORGET TO BACKUP YOUR MOBILE DEVICE DATA - Another data
protection strategy that's often overlooked for mobile devices is the need to back
up your data from your mobile device in addition to your desktop computer's or
laptop's data. 
LOCK YOUR SMARTPHONE AND TABLET DEVICES - Practically everyone has
a smartphone, tablet, or both these days. All it takes is a single mishap where
your device slips out of your pocket or briefcase at a restaurant or on public
transportation, and your data could wind up in the hands of someone who will
use it maliciously. You can take steps to protect your data in the event of a lost
or stolen device, however, beginning with locking your device. When your device
is locked, a thief must crack your password before gaining access to your apps or
personal information, adding a layer of protection. 
DISABLE BLUETOOTH WHEN YOU'RE NOT USING IT - Bluetooth technology
has offered incredible conveniences to the mobile world, but it also opens the
door for vulnerabilities. Most threats exploiting Bluetooth connectivity are
dependent on the active Bluetooth connection, and while they aren't typically
devastating or dangerous, they're certainly inconvenient and can be serious

3. PROTECTING YOUR IDENTITY


USE SECURE PASSWORDS - Passwords are easily cracked by hackers,
particularly if you don't use sound password-creation practices. The best
passwords contain uppercase and lowercase letters, numbers, and special
characters. The shorter and less complex your password is, the quicker it is for
cyber criminals to come up with the correct combination of characters in your
password.
DON'T USE THE SAME PASSWORD FOR MORE THAN ONE ACCOUNT OR
SERVICE - A password manager seems like an even better idea when you
consider the fact that you should never use the same password for more than
one account or service. Think about it: If a hacker cracks your password on one
website, they suddenly have cracked your password for a dozen more. But
remembering the slew of passwords the average person would need to recall to
access the many accounts and services most people have these days is no
simple feat, unless you have a photographic memory.
WATCH OUT FOR THEFT OF YOUR GOVERNMENT-ISSUED
IDENTIFICATION NUMBERS - Thieves don't always go after credit and debit
cards; sometimes, they steal important government-issued identification
numbers, such as driver's license numbers or Social Security numbers in attempt
to assume another individual's identity. 

4. PROTECTING YOUR CREDIT

SIGN WHEN USING DEBIT CARDS, DON'T ENTER YOUR PIN - When
possible, ask cashiers to process your debit card as a credit card transaction. Not
all retail stores allow this (it results in a small processing fee to be paid by the
retailer), but most do. It's often simpler just to enter your PIN, but it also makes it
easier for thieves to steal all the information they need to make unauthorized
purchases using your card.
BE CAREFUL SHOPPING ONLINE, FOR PERSONAL AND BUSINESS
PURCHASES - Shop on familiar websites, because shopping online is one of the
easiest ways to get your credit card number stolen, some experts suggest
maintaining a separate, low-balance credit card specifically for online purchases.
"Online shopping security is a concern for everyone who makes purchases on the
Internet, but it is also an important issue for business leaders — and not just
those in the retail sector. Firms also go shopping online, and their employees
frequently make business purchases on the company credit card.

5. PROTECTING YOUR DATA ON SOCIAL NETWORKING

DON'T SHARE TOO MUCH INFORMATION ON SOCIAL NETWORKING


PLATFORMS - Social networking has become a way of life for many individuals,
but sharing too much personal information on your social media profiles can be
dangerous.
BLOCK SUSPICIOUS OR SHADY USERS ON FACEBOOK - For users you don't
know outside of Facebook who befriend you and then make you uncomfortable
by asking repeated, personal questions or pressure you to meet them offline,
blocking them is a viable option.
CHECK YOUR PRIVACY SETTINGS REGULARLY - Privacy options are always
changing on social networking platforms, so be sure to check your personal
settings regularly and make adjustments as needed. 
KNOW WHO YOUR FRIENDS ARE - Don't accept random friend requests on
Facebook from people you don't know. "Some of the fun is creating a large pool of friends
from many aspects of your life. That doesn’t mean all friends are created equal.

6. PROTECTING YOUR DATA ONLINE

AVOID SENSITIVE TRANSACTIONS ON PUBLIC WI-FI - Working at the local


coffee shop may have some appeal, but relying on a public Wi-Fi connection
means your data is interceptable by outsiders. Avoid conducting banking
transactions and sending other sensitive information over a public Wi-Fi network.
DON'T FORGET TO SIGN OUT - Signing in to online services are necessary
when you need to access your personal accounts, but many users forget to sign
out when they're finished using a service. "But when using public computers like
in a cybercafe or library, remember that you may still be signed into any services
you’ve been using even after you close the browser. So, when using a public
computer, be sure to sign out by clicking on your account photo or email address
in the top right corner and selecting Sign out.
DON'T DOWNLOAD FILES FROM UNTRUSTWORTHY WEBSITES - Websites
like peer-to-peer file-sharing platforms are not only illegal, but they're often rife
with malware. Avoid downloading files from any website that you don't trust
completely.

You might also like