Page 269 - CA_Blue( J )_Class9
P. 269
3. Getting somebody’s asset information
4. Accessing others’ social media profiles without their permission
To protect data privacy, we must deploy some protective measures, which are as follows:
1. Install a firewall.
2. Always take backups of the data and have recovery functions at the ready.
3. Install strong antivirus software.
4. Install a data discovery and classification tool, such as “Netwrix Data Classification.”
5. Apply a data loss prevention system that will monitor the sensitive data being removed or copied and also
create a record of those who are using the data to keep unauthorised users from getting access..
11.2.2 Data Protection on the Internet
The internet is a gigantic computer network that connects different computers across the Earth. Using the different
facilities of the Internet, we can do many things. Some of them are as follows:
1. Using the internet, we can buy or sell almost anything.
2. Online transactions directly from the bank
3. Play online games
4. Search and share any type of information on any topic
5. Access to the latest news
6. Send and receive messages, pictures and files by using different social networking sites, blogs and emails.
7. E-Learning helps us gain educational qualifications.
While the internet offers many benefits, it also has a darker side. There are online monetary transactions and
social networking sites that contain personal information. Cyber criminals are able to steal that information and
accounts and use them for malicious purposes.
This led to the important idea of “Data Protection Act”. This act was implemented in 1998 and it was designed to
guard private data kept on servers, workstations, and personal computers or in structured record-keeping systems.
The 8 guiding principles of the Act are:
Fair and Lawful
Purposes
Adequacy
Accuracy
Data Protection Act
Retention
Rights
Security
International transfers
Though the government has made different laws and acts against cyber criminals, that is not enough to protect our
personal data unless we are careful. From our side, we may have some options, such as:
1. Friends and relatives should never know our passwords. Also, we should have very strong passwords which
should be a combination of alphanumeric character sets and at least 2 to 3 special characters such as @,
underscore (_), $, etc.
2. We should be careful of what we are sharing on the social media platforms such as Facebook, Twitter, etc.
Computing and Ethics 267

