Is your data slipping off your security cordon?
Hop in and enjoy this journey on understanding the relevance of Data Protection and best practices in Data Protection.
We hope Data Dave has taught you enough to give you a solid start.
I'm sure you would like to learn more about Data Handling and Protection. Go ahead! Select the button below.
Otherwise close the browser and come back another time to continue your training.
CONTINUEAll the best!
Manual data collection:
Data is collected manually through handwritten forms. This poor fellow here has written his entire life story in this credit card application.
Electronic data collection:
Data is more commonly collected electronically. All those online forms people fill get stored somewhere.
And displayed on this unprotected and open laptop screen, for example.
Amateurs...
I'm Sue, a Data Controller. I decide how the data will be lawfully managed, changed, updated and protected. And on minimum wage, you can bet your birth date I won't be tempted to fiddle around... too much.
Hi, I'm Alan, your friendly and "responsible" Data Processor. Can you believe that these guys trust me with your Social Security number? Anyway I'm the guy who works with your data. I manage it, I update it, and I change it if needed.
You learned who a Data Controller is and a Data Processor is. You also learned that leaving customer information lying around isn't good practice.
Even though SafeBase had a foolproof firewall installed, their users could still send attachments, including sensitive database files with customer information.
Doing something as simple as restricting email attachments to a few designated employees covered a major loophole that many companies overlook to this day.
Hacking: One of the most recognized but least commonly understood methods of data breach. Involves people exploiting weaknesses in computer software and hardware to access confidential data.
Database Theft: This type of breach involves people within companies selling customer databases to unscrupulous individuals.
Social Engineering: When a malicious outsider manipulates employees or individuals and gets them to divulge confidential information, we have a data breach. Phishing attacks are good examples of such attempts.