Skip to Main Content

Data Privacy: Home

Data privacy basics

Guide author: Library & Information Science student

Alysa Jane Japitana
Student

Email: alysajapitana29@gmail.com

Note: This guide was created as one of the requirements for the LIS subject, Information Literacy.

Data Privacy

Data privacy is a branch of data security concerned with the proper handling of data- consent, notice and regulatory obligations.

The guides provide information on how important data privacy and how to secure important data from hackers. This guide will:

  • Discuss the importance of data privacy
  • Recognize Computer Criminals
  • Identify malicious programs that can damage your computer system
  • Describe ways how to protect data

Data privacy  has always been important. It's why people put locks on filing cabinets and rent safety deposit boxes at their banks. But as more of our data becomes digitized, and we share more information online, data privacy is taking on greater importance.

When data that should be kept private gets in the wrong hands, bad things can happen. A data breach at a government agency can, for example, put top secret information in the hands of an enemy state. A breach at a corporation can put proprietary data in the hands of a competitor. A breach at school could put students' PII in the hands of criminals who could commit identity theft. A breach at a hospital or doctor's office can put PHI in the hands of those who might misuse it.

Computer criminals included employee, outside users, hacker and crackers, carders, organized crime and terrorist.

  • HACKER: create a improve programs and shared those program with fellow hackers. Typically are not criminals.
  • CRACKERS: share programs designed to gain unauthorized access computer systems or disrupt networks. Typically are criminals.
  • CARDERS: specialize in stealing, trading and using stolen credit cards over the internet.

Malicious Programs

Designed to damage or disrupt computer system. 4 most common types of malware are:

VIRUSES

  •     Some of the viruses are harmless while some of it can damaged our systems component.

WORMS

  •     It fill the computer system with self replicating information, clogging the system that is operation are slowed/stopped
  •     Typically find their way into microcomputer through email attached/programs downloaded from internet

TROJAN HORSES

  •     Disguised as something else
  •     Not a viruses, but it carries viruses.

ZOMBIES

  •     Remotely controlled infected computer for malicious purpose.
  •     A collection of zombies computer is known as botnet or robot network

Data Security Measurements

Establish Strong Passwords

This first measure is really easy to put in place. You must put together a combination of capitals, lowercase letters, numbers, and symbols to create a strong password. The more characters you put, the better. With that, you must avoid using your birthday or any personal information and change the password accordingly.

Set up a firewall

In order to protect your network, firewalls are an important initiative to consider. they are a must-have for any company, as they control the internet traffic coming and leaving your business.

Think of antivirus protection

Antivirus and anti-malware are indispensable to protecting your Data. They are designed to prevent, search for, detect and remove viruses but also adware, worms, trojans, and so on.

Updating is important

Your computer must be properly patched and updated. Recent updates allow your Data to be more secured.

Secure every laptop

Laptops are portable so there is a higher risk that they can be stolen. As a consequence, it is important to take more security measures in order to protect all laptops. A simple solution is to encrypt them. In doing so, without the right password, your computer's data is unreadable

Secure Mobile Phones

Mobile phones are even more easily stolen than laptops but they are as valuable for companies. Equally to laptops, phones can be encrypted- you can put a strong password and enable an automatic lock-out. You can also set up a wiping process if the phone is lost or stolen.

Schedule Backups

You can schedule backups to external hard drives or in the cloud in order to keep your data stored safely. The right frequency is weekly but you can do incremental backups every few days. You can also use Wimi, which centralizes your documents. With it, you can then share your documents with your team, your clients, and your partners.

Monitor Steadily

Data, Software, technologies, everything is moving so fast. Keep track of them, keep in touch with news to see what is new on the market.

Be smart with emails and surfing the web

Downloading apps or files, opening emails and clicking on links can infect your computer and your network. Be careful with the sources you find online or you receive. Take every “warning box” seriously.

Educate your employees about Data Security

Prevention is the best way to keep your Data safe. Warned employees will always be more attentive.