Lec11 - Data Privacy and Protection
Lec11 - Data Privacy and Protection
Sediqa Safa
Jan, 2024
Expected Outcomes
o Key Principles:
o Implications:
o Individuals can request details on the purposes of data processing,
the categories of personal data involved, the recipients of the data,
and the duration of data retention.
Cont.
o Right to Rectify: allows individuals to request the correction of inaccurate or
incomplete personal data held by a data controller.
o Implications:
o Individuals can ensure that their personal data is accurate and up-to-
date, preventing the dissemination of incorrect information.
o Implications:
o Individuals can request the removal of personal data, especially if the data
is no longer necessary for the purpose for which it was collected, if consent
is withdrawn, or if there are legitimate grounds for objection.
Data Controller and Processor Roles
o Responsibilities:
o Define the purposes of data processing.
o Ensure that processing activities comply with the law.
o Implement measures to safeguard individuals' rights and data
security.
Cont.
o Responsibilities:
o Process data only as instructed by the data controller.
o Implement security measures to protect personal data.
o Assist the data controller in meeting regulatory obligations.
Other Data Protection Laws
o Scope:
o Enacted in California, CCPA grants California residents specific rights
regarding their personal information held by businesses.
o Key Aspects:
o Right to know what personal information is collected.
o Right to access and request deletion of personal information.
o Right to opt-out of the sale of personal information.
Cont.
o Scope:
o HIPAA is a U.S. federal law that sets standards for the privacy and
security of protected health information (PHI).
o Key Aspects:
o Safeguards and standards for the protection of PHI.
o Privacy rules governing the use and disclosure of health information.
o Security rules requiring the implementation of safeguards to protect
electronic PHI.
Protecting Personal Information Online
o Privacy Settings on Social Media:
o Key Considerations:
o Profile Visibility: Adjusting settings to control who can view the user's
profile and personal information.
o Post Privacy: Understanding and customizing post visibility to limit
access to specific audiences.
o Third-Party Apps: Managing permissions granted to third-party
applications connected to social media accounts.
o Tagging and Geolocation: Controlling who can tag the user and whether
geolocation information is shared.
Cont.
o Secure Communication Tools
o Benefits of VPN:
o Anonymous Browsing:
o Example: masks the user's IP address, making it more challenging to
track their online activities, preventing the collection of personal
information for targeted advertising.
o Secure Data Transmission: sensitive data, such as login credentials or
financial information
o Key Points:
o Security Patches:
o Inclusion in Updates: Updates often include security patches specifically
designed to address and fix known vulnerabilities.
o Timely Application: Apply updates promptly to ensure that the latest
security patches are implemented and protect against emerging
threats.
o Example: An operating system provider releases a monthly update that
includes security patches addressing identified vulnerabilities. One of the
patches is specifically designed to fix a weakness in the system's
authentication process, enhancing overall security.
Cont.
o Automated Updates:
o Efficiency and Timeliness
o Reducing Human Error: Automation minimizes the risk of human
oversight, ensuring that devices receive necessary security
enhancements in a timely manner.
o Example: A user enables automated updates on their antivirus software.
As soon as a new virus definition or security patch is released by the
antivirus provider, the user's software automatically downloads and
installs the update without requiring manual intervention.
Cont.
o Antivirus Software:
o Importance in Cybersecurity:
o Example: Teach users to "debug" their digital practices by regularly
assessing and refining their cybersecurity measures. This includes
identifying weak passwords, patching software vulnerabilities, and
addressing potential points of entry for cyber threats.
Any Questions, Suggestions, or
Comments?
Darulaman Road
Kabul, Afghanistan
Main +93(0)729863447
auaf.edu.af