0% found this document useful (0 votes)
19 views28 pages

Lec11 - Data Privacy and Protection

This document discusses data privacy and protection best practices. It covers key data protection laws like GDPR and CCPA, individual rights to personal data, roles of data controllers and processors, and cybersecurity best practices. GDPR establishes comprehensive regulations for processing personal data of EU residents. CCPA grants Californians rights over their personal data held by businesses. Regular software updates and security patches are important to defend against online threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views28 pages

Lec11 - Data Privacy and Protection

This document discusses data privacy and protection best practices. It covers key data protection laws like GDPR and CCPA, individual rights to personal data, roles of data controllers and processors, and cybersecurity best practices. GDPR establishes comprehensive regulations for processing personal data of EU residents. CCPA grants Californians rights over their personal data held by businesses. Regular software updates and security patches are important to defend against online threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

Data Privacy and Protection

Digital Literacy – section 001

Sediqa Safa

Jan, 2024
Expected Outcomes

o GDPR and Other Data Protection Laws


o Protecting Personal Information Online
o Cybersecurity Best Practices
GDPR and Other Data Protection Laws

o Collection, use and sharing of personal information to third parties


without notice or consent of consumers is a concern. 137 out of 194
countries had put in place legislation to secure the protection of data
and privacy.

o Understanding these rights, roles, and additional data protection laws is


crucial for organizations and individuals to navigate the complex
landscape of data privacy and ensure compliance with the relevant
regulations.
GDPR and Other Data Protection Laws

o The General Data Protection Regulation (GDPR) stands as a


comprehensive legal framework enacted by the European Union to
fortify the rights and privacy of individuals in the processing of their
personal data. Enforced in May 2018, GDPR applies not only to entities
within the EU but also to organizations worldwide that handle the
personal data of EU residents.
Cont.

o Key Elements: Territorial Scope, Rights of Individuals, Accountability and


Compliance.

o Key Principles:

o 1. Lawful Processing: is a foundational principle of GDPR, dictating that


the processing of personal data must have a legal basis. Organizations
are required to identify and justify a lawful basis for each type of
processing activity.
Cont.

o Purpose Limitation: mandates that personal data should be collected


for specified, explicit, and legitimate purposes. Organizations must
clearly define the purpose of data processing at the time of collection
and refrain from using the data for unrelated activities.

o Data Minimization: underscores the principle of collecting only the


personal data that is necessary for the intended purpose. Organizations
are encouraged to limit the scope and volume of data processed to
what is directly relevant and essential.
Examples of GDPR Usage
o E-commerce and Online Services:
o E-commerce platforms and online services that collect and process
customer data must adhere to GDPR. For example, an online retailer
needs to obtain explicit consent before storing customer information
and must provide a clear mechanism for users to access or delete
their data.

o Social Media Platforms:


o Social media platforms, which often deal with vast amounts of
personal data, are subject to GDPR. Users have the right to control
their data, understand how it is used, and request the deletion of
their information. Social media companies must comply with these
regulations.
Individual Rights under GDPR

o Right to Access: also known as data subject access, grants individuals


the right to obtain confirmation from a data controller regarding
whether their personal data is being processed. If so, the individual has
the right to access that data along with additional information.

o Implications:
o Individuals can request details on the purposes of data processing,
the categories of personal data involved, the recipients of the data,
and the duration of data retention.
Cont.
o Right to Rectify: allows individuals to request the correction of inaccurate or
incomplete personal data held by a data controller.

o Implications:
o Individuals can ensure that their personal data is accurate and up-to-
date, preventing the dissemination of incorrect information.

o Right to Erase (Right to be Forgotten): empowers individuals to request the


deletion or removal of their personal data when certain conditions are met.

o Implications:
o Individuals can request the removal of personal data, especially if the data
is no longer necessary for the purpose for which it was collected, if consent
is withdrawn, or if there are legitimate grounds for objection.
Data Controller and Processor Roles

o Data Controller: an entity that determines the purposes and means of


processing personal data. This entity is responsible for complying with
data protection regulations and ensuring that the processing activities
align with legal requirements.

o Responsibilities:
o Define the purposes of data processing.
o Ensure that processing activities comply with the law.
o Implement measures to safeguard individuals' rights and data
security.
Cont.

o Data Processor: an entity that processes personal data on behalf of the


data controller. Processors act under the authority of the controller and
must adhere to contractual obligations and legal requirements.

o Responsibilities:
o Process data only as instructed by the data controller.
o Implement security measures to protect personal data.
o Assist the data controller in meeting regulatory obligations.
Other Data Protection Laws

o CCPA (California Consumer Privacy Act):

o Scope:
o Enacted in California, CCPA grants California residents specific rights
regarding their personal information held by businesses.

o Key Aspects:
o Right to know what personal information is collected.
o Right to access and request deletion of personal information.
o Right to opt-out of the sale of personal information.
Cont.

o HIPAA (Health Insurance Portability and Accountability Act):

o Scope:
o HIPAA is a U.S. federal law that sets standards for the privacy and
security of protected health information (PHI).

o Key Aspects:
o Safeguards and standards for the protection of PHI.
o Privacy rules governing the use and disclosure of health information.
o Security rules requiring the implementation of safeguards to protect
electronic PHI.
Protecting Personal Information Online
o Privacy Settings on Social Media:

o Adjusting and maximizing privacy settings on popular social media


platforms to control the visibility of personal information.

o Key Considerations:
o Profile Visibility: Adjusting settings to control who can view the user's
profile and personal information.
o Post Privacy: Understanding and customizing post visibility to limit
access to specific audiences.
o Third-Party Apps: Managing permissions granted to third-party
applications connected to social media accounts.
o Tagging and Geolocation: Controlling who can tag the user and whether
geolocation information is shared.
Cont.
o Secure Communication Tools

o End-to-End Encryption: (E2EE) is a security measure that ensures that


only the sender and the intended recipient can read the messages,
preventing interception by intermediaries or malicious actors.
o Importance: Protects sensitive information from unauthorized access,
providing a secure channel for communication..
o Encrypted Email Services: Services that offer robust encryption features.
(Gmail, proton mail, etc.)
o Secure Messaging Apps: with encryption protocols for private
conversations. (Signal, WhatsApp, Telegram, etc.)
o Secure Video Conferencing: Choosing platforms that prioritize security
measures during video meetings. (Zoom, Google Meet, etc.)
Cont.
o Phishing Awareness:

o Phishing Emails and Educating Users:


o Email Spoofing: attackers can forge the sender's email to appear legitimate.
o Fake Websites: links to deceptive websites that mimic legitimate platforms.
o Urgency Tactics: Create a sense of urgency to prompt quick and
uninformed actions.
o Request for Personal Information: Request sensitive information like
passwords, credit card details, or Social Security numbers.

o Educational Tips: Check Sender Information, Hover Over Links, Be Cautious


with Attachments.
Cont.
o Verification Practices:

o Verify the Legitimacy of Communications:


o Email Verification: Verify the legitimacy of emails by cross-checking with
known contact information.
o Two-Factor Authentication (2FA): To add an extra layer of security to
accounts.
o Contacting Companies Directly: Through official channels to verify any
requests for personal information.

o Educational Tips: Use Official Channels, Independently Confirm, Educate on


Common Tactics.
Cont.

o VPN for Enhanced Privacy:

o Introduction to VPN: A Virtual Private Network (VPN) is a tool that establishes


a secure, encrypted connection over the internet, providing users with
privacy and anonymity.

o Protecting Online Activities:


o Example: When using public Wi-Fi networks (e.g., in cafes or airports), a VPN
encrypts the data transmitted, preventing potential eavesdropping by
malicious actors and safeguarding sensitive information.
Cont.

o Benefits of VPN:
o Anonymous Browsing:
o Example: masks the user's IP address, making it more challenging to
track their online activities, preventing the collection of personal
information for targeted advertising.
o Secure Data Transmission: sensitive data, such as login credentials or
financial information

o Considerations for VPN Usage:


o Choosing Reputable VPN Providers
o Understanding Terms of Service.
Cybersecurity Best Practices
o To defend against online threats.

o Key Points:

o 1. Regular Software Updates:


o Patch Vulnerabilities:
o Definition: Regular updates play a critical role in patching vulnerabilities
present in software, operating systems, and applications.
o Significance: Vulnerabilities are potential entry points for cyber threats.
Patching them helps close these openings and strengthens the overall
security posture.
o Example: Suppose there's a widely used web browser that has a known
vulnerability allowing attackers to execute arbitrary code. Regular updates
from the browser's developer include patches that fix this vulnerability,
preventing potential exploitation.
Cont.

o Security Patches:
o Inclusion in Updates: Updates often include security patches specifically
designed to address and fix known vulnerabilities.
o Timely Application: Apply updates promptly to ensure that the latest
security patches are implemented and protect against emerging
threats.
o Example: An operating system provider releases a monthly update that
includes security patches addressing identified vulnerabilities. One of the
patches is specifically designed to fix a weakness in the system's
authentication process, enhancing overall security.
Cont.

o Automated Updates:
o Efficiency and Timeliness
o Reducing Human Error: Automation minimizes the risk of human
oversight, ensuring that devices receive necessary security
enhancements in a timely manner.
o Example: A user enables automated updates on their antivirus software.
As soon as a new virus definition or security patch is released by the
antivirus provider, the user's software automatically downloads and
installs the update without requiring manual intervention.
Cont.

o 2. Firewalls and Antivirus Software:

o Introduction to Essential Tools for Prevention and Detection:


o Firewalls:
o Role in Network Security: Firewalls act as a barrier between a trusted
internal network and untrusted external networks, monitoring and
controlling traffic based on predetermined security rules.
o Preventing Unauthorized Access:
o Example: Imagine a company's network as a fortress. The firewall is like the
gatekeeper, allowing only authorized personnel (data packets) to enter or
exit while blocking unauthorized access attempts.
o Monitoring Traffic:
o Example: If a user tries to access a restricted website, the firewall analyzes
the request and either permits or denies access based on predefined
security policies.
Cont.

o Antivirus Software:

o Detecting, Blocking, and Removing Malware:


o Example: Consider a scenario where a user receives an email with a malicious
attachment. Antivirus software scans the attachment, detects the malware,
blocks its execution, and removes the threat, protecting the user's device.
o Regular Scans and Updates:
o Example: Antivirus programs routinely scan files and update their virus
databases to recognize new threats. This proactive approach ensures ongoing
protection against evolving malware.
o Quarantine Functionality:
o Example: When a potential threat is detected, antivirus software may
quarantine the infected file, preventing it from causing harm while allowing the
user to take appropriate action.
Cont.

o Employee Training and Awareness:


o Creating a Cybersecurity-Aware Workforce
o Recognizing Security Incidents
o Simulated Phishing Exercises

o Data Encryption for Enhanced Data Security:


o Data in Transmission: safeguards data during transmission, protecting it
from unauthorized interception.
o Data at Rest: encrypting stored data, adding an extra layer of security
against unauthorized access.
o End-to-End Encryption: for secure communication.
Cont.

o Algorithmic Thinking for Enhanced Security:

o Definition: Algorithmic thinking involves breaking down complex problems


into step-by-step procedures or algorithms. In the context of cybersecurity, it
aids in identifying vulnerabilities and developing effective security measures.

o Application in Security Measures:


o Example: Encourage users to think algorithmically when assessing their
digital environment. This includes systematically evaluating potential
security risks, recognizing patterns of cyber threats, and devising
proactive strategies to mitigate them.
Cont.

o Debugging Cybersecurity Practices (Enhanced Protection):

o Definition: In the realm of cybersecurity, debugging involves identifying and


resolving errors, vulnerabilities, or weaknesses in digital systems or practices.

o Importance in Cybersecurity:
o Example: Teach users to "debug" their digital practices by regularly
assessing and refining their cybersecurity measures. This includes
identifying weak passwords, patching software vulnerabilities, and
addressing potential points of entry for cyber threats.
Any Questions, Suggestions, or
Comments?

Darulaman Road

Kabul, Afghanistan

Main +93(0)729863447

auaf.edu.af

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy