Protecting personal data Flashcards
What does ‘Malware’ stand for?
Malicious Software
Malware refers to software designed to disrupt, damage, or gain unauthorized access to computer systems.
What are the 3 common types of malware?
- Browser
- File infector
- Macro virus
These types of malware can affect different aspects of computer operation and user experience.
Who holds personal data about you?
Various organizations such as your school, doctor, and email provider
Other organizations may include banks, insurance companies, and social media platforms.
What information does Google typically hold about you if you use its services?
- Your name
- Birthday
- Contact names and addresses
- Calendar
- Mobile devices used
- All your emails
- Web addresses typed
- Sites searched or bookmarked
- Images viewed
You can check what data Google holds about you on Google Dashboard.
Can anyone legally hold data about you?
No
There are rules and regulations about collecting and holding personal data.
What must an organization do to legally hold personal data about you?
Register with the Information Commissioner’s Office (ICO.org.uk)
This ensures the organization complies with data protection regulations.
What are the General Data Protection Regulations (GDPR)?
An EU ruling specifying rules about collecting and holding data
Formerly known as the Data Protection Act.
What are some key rules specified by the GDPR?
- Data must be accurate and up to date
- You have a right to see what data is held about you
- Data must be protected from unauthorized access
GDPR aims to protect individuals’ personal data and privacy.
What is identity theft?
The unauthorized use of someone’s personal data to impersonate them
Criminals can use stolen data to apply for jobs, loans, or bank accounts.
What can criminals do if they have your personal information?
- Apply for a job
- Open a bank account
- Take out a loan
They can use your name, address, birthdate, and other personal information.
What are data harvesting tools?
Tools that gather information about individuals using legal and freely available methods
These can include social media profiles and email addresses.
What should you do to protect your identity on social media?
- Turn location sharing OFF when posting photos
- Don’t include personal data in your profile
- Avoid password clues in comments or photos
These actions help minimize risks related to identity theft.
What precautions should you take regarding your social media friends?
Don’t add people to your network unless you know and trust them
This helps protect your privacy and personal information.
What does ‘shoulder surfing’ refer to?
The act of someone watching you input your passwords and PINs
It’s essential to protect your passwords from casual viewers and hidden cameras.