“Privacy For Websites” Presented by Mrs Drudeisha Madhub (The Commissionner) p Tel: +230 212 2218 Helpdesk: +230 203 90 76 Website:

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Are you being a safe and successful digital citizen? E-safety
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
The Internet.
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Internet safety By Lydia Snowden.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
HIPAA PRIVACY AND SECURITY AWARENESS.
Digital Literacy Tour Google/iKeepSafe/YouTube Presenter Introduction Davina Pruitt-Mentle, Ph.D. Ed Tech Policy, Research and Outreach.
Staying Safe Online Keep your Information Secure.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Emtel 4G LTE NETWORK. “ The DPO Regulatory Perspective about Cloud Solutions” Presented by Mrs Drudeisha Madhub (The Commissionner )
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Internet Safety & Security Tips for Parents Dorothy Grant Elementary School, April 2015.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Protecting Students on the School Computer Network Enfield High School.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
Access : connection to the Internet account : an arrangement you have with a company or Internet provider to use a service they provide. browse : to look.
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Laws and Rules That Govern Internet Safety Ashley Martin.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Policies and Security for Internet Access
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
E-Safety for parents and carers Highfield Community Primary School.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Tech Tuesday: Facebook 101 People’s Resource Center January 26, 2016.
E-Safety Parent Talk Helping to keep your children safe online.
They Need You - to encourage them to make good choices. - to teach them about how to stay safe. - to help them to recognise scams. - to encourage good.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Welcome to our E – Safety Open Evening.
Personal spaces.
Ways to protect yourself against hackers
How to build a good reputation online
Unit 11 Communication & Collaboration
GDPR Overview Gydeline – October 2017
GDPR Overview Gydeline – October 2017
Cyberspace Risks and Defenses
Social Media and Networking for a University
General Data Protection Regulation
Presentation transcript:

“Privacy For Websites” Presented by Mrs Drudeisha Madhub (The Commissionner) p Tel: Helpdesk: Website: Address: 5th Floor, Happy House Ltd, Port Louis

The Data Protection Act The Data Protection Act 2004 was proclaimed in its entirety on the 16th of February 2009, except for section 17(5). In addition, the Data Protection Regulations 2009 (GN 22/09) were enacted to cater for registration fees for data controllers, other prescribed fees, the registration form for data controllers and the request for access to personal data form which represents the form to be used by data subjects (living individuals), for requesting access to their personal data from data controllers. 23 rd April 2015

Privacy Assessment : Web Application Privacy Assessment is seen as a valuable tool for businesses and governments which take privacy seriously. This web application will enable public and private bodies to make informed choices. It will often be the case that a privacy enhancing solution will be no more difficult or more costly to implement than an intrusive one, if the option is identified sufficiently. However, this should not be the motivation since we are here dealing with the human right to privacy. 23 rd April 2015

Privacy Assessments Protection of privacy is more than simply avoiding a breach of the law. It involves striving for something better. Privacy Impact Assessments and Privacy Compliance Assessments are new techniques which are increasingly being used internationally to better manage privacy risks. Others include audits, privacy seals and associated self-regulatory initiatives and privacy enhancing technologies. Each builds on the bedrock of the enforceable privacy rights for citizens and consumers enshrined in law. 23 rd April 2015

Privacy Assessments These assessments are being encouraged as a means by which business and government can proactively identify and avoid privacy problems. Internationally, these assessments play an important part of a policy approach to build trust and confidence in-business and these processes are recommended as part of any new Public Key Infrastructure system, for example. 23 rd April 2015

Privacy Assessments This Privacy Assessment has been categorised into two parts namely: ◦ Privacy Compliance Assessment ◦ Privacy Impact Assessment The purpose of both these assessments is to provide a systematic process that evaluates a proposal in terms of its impact upon privacy and identify the potential effects that the proposal may have upon personal privacy and further examine how any detrimental effects on privacy might be lessened. 23 rd April 2015

Privacy By Design Privacy by design is an approach to projects that promotes privacy and data protection compliance from the start. Unfortunately, these issues are often bolted on as an after-thought or ignored altogether. It helps organisations comply with their obligations under the legislation. 23 rd April 2015

Privacy By Design The Data Protection Office encourages organisations to ensure that privacy and data protection is a key consideration in the early stages of any project, and then throughout its lifecycle. For example when: building new IT systems for storing or accessing personal data; developing legislation, policy or strategies that have privacy implications; embarking on a data sharing initiative; or using data for new purposes. 23 rd April 2015

Privacy By Design We would like to see more organisations integrating core privacy considerations into existing project management and risk management methodologies and policies. 23 rd April 2015

Benefits of taking a ‘privacy by design’ approach Taking a privacy by design approach is an essential tool in minimising privacy risks and building trust. Designing projects, processes, products or systems with privacy in mind at the outset can lead to benefits which include: Potential problems are identified at an early stage, when addressing them will often be simpler and less costly. 23 rd April 2015

Benefits of taking a ‘privacy by design’ approach Increased awareness of privacy and data protection across an organisation. Organisations are more likely to meet their legal obligations and less likely to breach the Data Protection Act. Actions are less likely to be privacy intrusive and have a negative impact on individuals. 23 rd April 2015

Privacy on the Web Your personal privacy on the Web might be less secure than you think. Web browsing habits are tracked via cookies, search engines routinely change their privacy policies, and there are always challenges to Web privacy by both private and public organizations. 23 rd April 2015

Privacy on the Web 1. Avoid Unnecessary Forms A good Web safety rule of thumb is to avoid filling out forms that require personal information in order to keep anything from being entered into public, searchable record, also known as Web results. You can use “BugMeNot” to avoid filling out unnecessary forms that ask for too much personal information for example. A good Web safety rule of thumb is to avoid filling out forms that require personal information in order to keep anything from being entered into public, searchable record, also known as Web results. You can use “BugMeNot” to avoid filling out unnecessary forms that ask for too much personal information for example. 2. Clean Your Search History Most Web browsers keep track of every single Web site you type into the address bar. This Web history should be periodically cleared out not only for privacy's sake. Most Web browsers keep track of every single Web site you type into the address bar. This Web history should be periodically cleared out not only for privacy's sake. 23 rd April 2015

Privacy on the Web 3. Log Out Of Search Engines Most search engines these days require you to create an account and log in to access the full array of their services, including search results. In order to best protect your privacy, it's always a good idea to log out of your account after executing your Web searches. Most search engines these days require you to create an account and log in to access the full array of their services, including search results. In order to best protect your privacy, it's always a good idea to log out of your account after executing your Web searches. 4. Watch Your Downloads Be extremely cautious when downloading anything (software, books, music, videos, etc.) from the Web. This is a good idea for privacy advocates, but it's also a great way to keep your computer from freezing up and malfunctioning. Be very cautious when choosing what to download from the Web; some programs include adware that will report your surfing habits back to a third-party company that will then use that information to send you ads and unwanted s, otherwise known as spam. Be extremely cautious when downloading anything (software, books, music, videos, etc.) from the Web. This is a good idea for privacy advocates, but it's also a great way to keep your computer from freezing up and malfunctioning. Be very cautious when choosing what to download from the Web; some programs include adware that will report your surfing habits back to a third-party company that will then use that information to send you ads and unwanted s, otherwise known as spam. 23 rd April 2015

Privacy on the Web 5. Use Common Sense This is pretty self-explanatory: don't go to places on the Web that you would be embarrassed to have your wife, husband, children, or employer see. This is a very low-tech way to protect your Web privacy, and yet, out of all the methods on this list, might be the one that is most effective. This is pretty self-explanatory: don't go to places on the Web that you would be embarrassed to have your wife, husband, children, or employer see. This is a very low-tech way to protect your Web privacy, and yet, out of all the methods on this list, might be the one that is most effective. 6. Guard Your Private Information Before sharing anything online - on a blog, website, message board, or social networking site - be sure it's not something you would mind sharing in real life, off the Web. Don't share information that could identify you in public, especially if you are a minor. Keep identifying details, like user names, passwords, first and last names, addresses, and phone numbers, to yourself. Your address should be kept as private as possible, because an address can be used to track other identifying information. Before sharing anything online - on a blog, website, message board, or social networking site - be sure it's not something you would mind sharing in real life, off the Web. Don't share information that could identify you in public, especially if you are a minor. Keep identifying details, like user names, passwords, first and last names, addresses, and phone numbers, to yourself. Your address should be kept as private as possible, because an address can be used to track other identifying information.. 23 rd April 2015

Privacy on the Web 7. Use Caution When Using Social Media Social networking sites such as Facebook are extremely popular, and for good reason: they make it possible for people to connect with each other all over the world. It's important to make sure that your privacy settings are set appropriately and that what you share on social networking sites would not reveal anything of a personal or financial nature. Social networking sites such as Facebook are extremely popular, and for good reason: they make it possible for people to connect with each other all over the world. It's important to make sure that your privacy settings are set appropriately and that what you share on social networking sites would not reveal anything of a personal or financial nature. 8. Watch Out For Scams Think carefully before following links, opening files, or watching videos sent to you by friends or organizations. Watch for signs that these might not be for real: these include misspellings, lack of secure encryption (no HTTPS in the URL), and improper grammar. Think carefully before following links, opening files, or watching videos sent to you by friends or organizations. Watch for signs that these might not be for real: these include misspellings, lack of secure encryption (no HTTPS in the URL), and improper grammar. 23 rd April 2015

Privacy on the Web 9. Protect Your System Keeping your computer safe from harmful content on the Web is simple with a few precautions, such as a firewall, appropriate updates to your existing software programs (this ensures that all security protocols are kept up to date), and antivirus programs. Keeping your computer safe from harmful content on the Web is simple with a few precautions, such as a firewall, appropriate updates to your existing software programs (this ensures that all security protocols are kept up to date), and antivirus programs. 10. Monitor Your Online Reputation Have you ever Googled yourself? You might be surprised (or shocked!) to see what is out there on the Web. You can control much of what is out there on the Web with the precautions laid out here, as well as keeping track of what is found about you in at least three different search engines on a regular basis. Have you ever Googled yourself? You might be surprised (or shocked!) to see what is out there on the Web. You can control much of what is out there on the Web with the precautions laid out here, as well as keeping track of what is found about you in at least three different search engines on a regular basis. 23 rd April 2015

Guideline - Data Protection Act rd April 2015 Vol. 6 - Privacy Impact Assessment

Guideline - Data Protection Act rd April 2015 Vol. 7 - Guidelines on Privacy Enhancing Technologies

Conclusion I commend all organisations to employ privacy assessments for significant new initiatives involving the handling of personal information. Achieving and maintaining public trust in electronic service is a key challenge for e-government and e-commerce. Failure to give informed consideration to privacy issues when embarking on new projects could be an expensive mistake. A Privacy Assessment report will fill a gap in the knowledge of decision makers and enable them fully to get to grips with the issues at the right time - before decisions are taken. 23 rd April 2015

Thank you for your kind attention "Thank you for your kind attention"