protect your personal data ii

12
Protect your personal data Prepared by Gabrielė Govoruchinaitė

Upload: apostolos-syropoulos

Post on 13-Apr-2017

3 views

Category:

Internet


0 download

TRANSCRIPT

Page 1: Protect your personal data II

Protect your personal dataPrepared by Gabrielė Govoruchinaitė

Page 2: Protect your personal data II

STORE

A spokesperson at the ICO (Information Commissioner’s Office, an independent authority set up to uphold information rights in the public interest) advises that you “store any documents carrying your personal details, such as your passport, driving licence, bank statements and utility bills in a safe place”.

Page 3: Protect your personal data II

SHRED

Shred or destroy personal items you are throwing away, such as bills, receipts or bank statements, that show your name, address or other personal details.

Page 4: Protect your personal data II

SEND SAFELY

If you have to post personal documents, ask the post office for advice on the most secure method.

Page 5: Protect your personal data II

CHANGE PASSWORDS

Use different passwords and PINs for different accounts and take extra care when using public computers to access your personal information.

Page 6: Protect your personal data II

DON'T SHARE

Always think about who you are giving your information to. Be cautious about providing any personal details to unsolicited callers by phone, fax, post, email or in person, unless you are sure they person is who they say they are. If you are suspicious, ring the organisation back on an advertised number or visit their website.

Page 7: Protect your personal data II

STOP SPYWARE

“Buy a good anti-virus, firewall and anti-spam software package to protect your computer against viruses and any spyware software which can be used to obtain personal details.” says our expert.

Page 8: Protect your personal data II

PROTECT YOUR TEXTS

An app called TigerText allows text-message senders to set a time limit from one minute to 30 days after which the text disappears from the company’s servers on which it is stored and therefore from the senders’ and recipients’ phones.

Page 9: Protect your personal data II

DESTROY DATA

Researchers at the University of Washington are developing a technology called Vanish that makes electronic data ‘self-destruct’ after a specified period of time. Instead of relying on Google, Facebook or Hotmail to delete the date on their servers, Vanish does the job.

Page 10: Protect your personal data II

GO OFFSHORE

Some companies, such as Connectinprivate.com, offer ‘anonymous and non-traceable offshore browsing’ for £5 a month. It’s done via a virtual private network, or VPN, which connects to the internet on your behalf so web services think you’re located in Canada, for example, rather than London. The VPN knows where you are, but in keeping with Canadian law, keeps no log of your activity.

Page 11: Protect your personal data II

UPDATE YOUR BROWSER

Microsoft plans to increase privacy options in the upcoming version of its Web browser Internet Explorer 9 (IE9), including the ability to prevent tracking by third-party websites.

Page 12: Protect your personal data II

THANK YOU FOR YOUR ATTENTION