Page 269 - CA_Blue( J )_Class9
P. 269

3.  Getting somebody’s asset information
                 4.  Accessing others’ social media profiles without their permission
                 To protect data privacy, we must deploy some protective measures, which are as follows:
                 1.   Install a firewall.
                 2.   Always take backups of the data and have recovery functions at the ready.
                 3.   Install strong antivirus software.
                 4.   Install a data discovery and classification tool, such as “Netwrix Data Classification.”
                 5.   Apply a data loss prevention system that will monitor the sensitive data being removed or copied and also
                    create a record of those who are using the data to keep unauthorised users from getting access..

                 11.2.2 Data Protection on the Internet
                 The internet is a gigantic computer network that connects different computers across the Earth. Using the different
                 facilities of the Internet, we can do many things. Some of them are as follows:
                 1.  Using the internet, we can buy or sell almost anything.
                 2.  Online transactions directly from the bank
                 3.  Play online games
                 4.  Search and share any type of information on any topic
                 5.  Access to the latest news
                 6.  Send and receive messages, pictures and files by using different social networking sites, blogs and emails.
                 7.  E-Learning helps us gain educational qualifications.
                 While the internet offers many benefits, it also has a darker side. There are online monetary transactions and
                 social networking sites that contain personal information. Cyber criminals are able to steal that information and
                 accounts and use them for malicious purposes.
                 This led to the important idea of “Data Protection Act”. This act was implemented in 1998 and it was designed to
                 guard private data kept on servers, workstations, and personal computers or in structured record-keeping systems.
                 The 8 guiding principles of the Act are:
                                                                          Fair and Lawful

                                                                            Purposes

                                                                            Adequacy

                                                                            Accuracy
                                           Data Protection Act
                                                                            Retention

                                                                              Rights

                                                                             Security

                                                                      International transfers

                 Though the government has made different laws and acts against cyber criminals, that is not enough to protect our
                 personal data unless we are careful. From our side, we may have some options, such as:
                 1.  Friends and relatives should never know our passwords. Also, we should have very strong passwords which
                    should be a combination of alphanumeric character sets and at least 2 to 3 special characters such as @,
                    underscore (_), $, etc.
                 2.  We should be careful of what we are sharing on the social media platforms such as Facebook, Twitter, etc.


                                                                                           Computing and Ethics  267
   264   265   266   267   268   269   270   271   272   273   274