Protect your
personal data
Prepared by Gabrielė Govoruchinaitė
STORE
A spokesperson at the ICO (Information
Commissioner’s Office, an independent authority set up to
uphold information rights in the public interest) advises
that you “store any documents carrying your personal
details, such as your passport, driving licence, bank
statements and utility bills in a safe place”.
SHRED
Shred or destroy personal items you are throwing
away, such as bills, receipts or bank statements, that show
your name, address or other personal details.
SEND SAFELY
If you have to post personal documents, ask the post
office for advice on the most secure method.
CHANGE PASSWORDS
Use different passwords and PINs for different accounts
and take extra care when using public computers to access your
personal information.
DON'T SHARE
Always think about who you are giving your
information to. Be cautious about providing any personal
details to unsolicited callers by phone, fax, post, email or in
person, unless you are sure they person is who they say
they are. If you are suspicious, ring the organisation back
on an advertised number or visit their website.
STOP SPYWARE
“Buy a good anti-virus, firewall and anti-spam
software package to protect your computer against viruses
and any spyware software which can be used to obtain
personal details.” says our expert.
PROTECT YOUR TEXTS
An app called TigerText allows text-message senders
to set a time limit from one minute to 30 days after which
the text disappears from the company’s servers on which it
is stored and therefore from the senders’ and recipients’
phones.
DESTROY DATA
Researchers at the University of Washington are
developing a technology called Vanish that makes
electronic data ‘self-destruct’ after a specified period of
time. Instead of relying on Google, Facebook or Hotmail to
delete the date on their servers, Vanish does the job.
GO OFFSHORE
Some companies, such as Connectinprivate.com,
offer ‘anonymous and non-traceable offshore browsing’ for
£5 a month. It’s done via a virtual private network, or VPN,
which connects to the internet on your behalf so web
services think you’re located in Canada, for example,
rather than London. The VPN knows where you are, but in
keeping with Canadian law, keeps no log of your activity.
UPDATE YOUR BROWSER
Microsoft plans to increase privacy options in the
upcoming version of its Web browser Internet Explorer 9
(IE9), including the ability to prevent tracking by third-
party websites.
THANK YOU FOR YOUR ATTENTION


More Related Content

PDF
List 10 Points to Ensure your Digital Privacy!
PPTX
How using Tor Browser + VPN can save you $1000 and more!
PPT
Cyber security
PPTX
The Dark Web
PPT
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
PPTX
The Dark Web by Kenneth Yu
PPTX
Dark wed
PPTX
Why use private proxy presentation
List 10 Points to Ensure your Digital Privacy!
How using Tor Browser + VPN can save you $1000 and more!
Cyber security
The Dark Web
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
The Dark Web by Kenneth Yu
Dark wed
Why use private proxy presentation

What's hot (6)

PPT
Darkweb
PPTX
Deepweb and darkweb vinodkumar ancha
PDF
Can Someone Trace ME Through My IP Address ?
PPTX
Dark web presentation
PPTX
Dark web by Claudine Impas
PPTX
The Dark Web
Darkweb
Deepweb and darkweb vinodkumar ancha
Can Someone Trace ME Through My IP Address ?
Dark web presentation
Dark web by Claudine Impas
The Dark Web
Ad

Similar to Protect your personal data II (20)

PPTX
Internet Safety & Privacy
PDF
Final%20 presentation
PDF
Cyber security macau
PPT
Privacy on the Internet
PPTX
Judy Taylour's Digital Privacy Day 2014 Presentation
PDF
Lect 08 computer security and privacy 2 4 q
PPTX
Digital Security and safety for journalists
PPTX
Online privacy
PPTX
Cyber ethics cbse class xi
PPTX
Online privacy
PDF
NCSAM 2012 Privacy
PDF
Honeypot Projects are Everywhere
PPTX
A Basic Guide to Safe Surfing on the Internet
DOCX
travel Safely
PPTX
Cyber security
PPTX
The Social Safety Guide
PPTX
Managing Your Digital Footprint presentation for #5Rights Youth Leadership Gr...
PPTX
Smartphone apps
PPTX
Privacy Primer
PDF
Digital Security for Journalists
Internet Safety & Privacy
Final%20 presentation
Cyber security macau
Privacy on the Internet
Judy Taylour's Digital Privacy Day 2014 Presentation
Lect 08 computer security and privacy 2 4 q
Digital Security and safety for journalists
Online privacy
Cyber ethics cbse class xi
Online privacy
NCSAM 2012 Privacy
Honeypot Projects are Everywhere
A Basic Guide to Safe Surfing on the Internet
travel Safely
Cyber security
The Social Safety Guide
Managing Your Digital Footprint presentation for #5Rights Youth Leadership Gr...
Smartphone apps
Privacy Primer
Digital Security for Journalists
Ad

More from Apostolos Syropoulos (20)

PDF
A Presentation of Braga. It was made by students of school
PPTX
A short presentation of Italy made by students of a school in Cosimo, Sicily,...
PPTX
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
PDF
A gentle introduction to Artificial Intelligence
PPTX
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
PPTX
Το Ορφανοτροφείο Θηλέων Ξάνθης
PPTX
Το Αρχαιολογικό Μουσείο Αβδήρων
PPTX
Ταφικά έθιμα στα αρχαία Άβδηρα
PPTX
Το ορφανοτροφείο της Ξάνθης
PPTX
Μικρασιατική κατατστροφή - Μέρος 3
PPTX
Μικρασιατική κατατστροφή - Μέρος 2
PPTX
Αφιέρωμα στη Μικρά Ασία
PPTX
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
PDF
How to Convert Units of Measure
PDF
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing mathematical tex...
PDF
Inflected Forms of Nouns and Adjectives
PDF
Learning Simple Phrases in Greek
PDF
Computational Thinking and...the Greek Alphabet
PPTX
Το Αποτύπωμα του 1821 στον Τόπο μου
PDF
Παγκόσμια ημέρα της σταθεράς π=3,14...
A Presentation of Braga. It was made by students of school
A short presentation of Italy made by students of a school in Cosimo, Sicily,...
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
A gentle introduction to Artificial Intelligence
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
Το Ορφανοτροφείο Θηλέων Ξάνθης
Το Αρχαιολογικό Μουσείο Αβδήρων
Ταφικά έθιμα στα αρχαία Άβδηρα
Το ορφανοτροφείο της Ξάνθης
Μικρασιατική κατατστροφή - Μέρος 3
Μικρασιατική κατατστροφή - Μέρος 2
Αφιέρωμα στη Μικρά Ασία
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
How to Convert Units of Measure
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing mathematical tex...
Inflected Forms of Nouns and Adjectives
Learning Simple Phrases in Greek
Computational Thinking and...the Greek Alphabet
Το Αποτύπωμα του 1821 στον Τόπο μου
Παγκόσμια ημέρα της σταθεράς π=3,14...

Recently uploaded (20)

PDF
Containerization lab dddddddddddddddmanual.pdf
PPT
12 Things That Make People Trust a Website Instantly
PDF
Understand the Gitlab_presentation_task.pdf
PDF
Course Overview and Agenda cloud security
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PPTX
The-Importance-of-School-Sanitation.pptx
DOCX
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PPTX
Reading as a good Form of Recreation
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PPTX
AI_Cyberattack_Solutions AI AI AI AI .pptx
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PDF
The Evolution of Traditional to New Media .pdf
PPTX
t_and_OpenAI_Combined_two_pressentations
PDF
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
PPTX
TITLE DEFENSE entitle the impact of social media on education
PPTX
Mathew Digital SEO Checklist Guidlines 2025
Containerization lab dddddddddddddddmanual.pdf
12 Things That Make People Trust a Website Instantly
Understand the Gitlab_presentation_task.pdf
Course Overview and Agenda cloud security
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
The-Importance-of-School-Sanitation.pptx
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
Reading as a good Form of Recreation
Layers_of_the_Earth_Grade7.pptx class by
AI_Cyberattack_Solutions AI AI AI AI .pptx
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
Uptota Investor Deck - Where Africa Meets Blockchain
Alethe Consulting Corporate Profile and Solution Aproach
The Evolution of Traditional to New Media .pdf
t_and_OpenAI_Combined_two_pressentations
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
TITLE DEFENSE entitle the impact of social media on education
Mathew Digital SEO Checklist Guidlines 2025

Protect your personal data II

  • 1. Protect your personal data Prepared by Gabrielė Govoruchinaitė
  • 2. STORE A spokesperson at the ICO (Information Commissioner’s Office, an independent authority set up to uphold information rights in the public interest) advises that you “store any documents carrying your personal details, such as your passport, driving licence, bank statements and utility bills in a safe place”.
  • 3. SHRED Shred or destroy personal items you are throwing away, such as bills, receipts or bank statements, that show your name, address or other personal details.
  • 4. SEND SAFELY If you have to post personal documents, ask the post office for advice on the most secure method.
  • 5. CHANGE PASSWORDS Use different passwords and PINs for different accounts and take extra care when using public computers to access your personal information.
  • 6. DON'T SHARE Always think about who you are giving your information to. Be cautious about providing any personal details to unsolicited callers by phone, fax, post, email or in person, unless you are sure they person is who they say they are. If you are suspicious, ring the organisation back on an advertised number or visit their website.
  • 7. STOP SPYWARE “Buy a good anti-virus, firewall and anti-spam software package to protect your computer against viruses and any spyware software which can be used to obtain personal details.” says our expert.
  • 8. PROTECT YOUR TEXTS An app called TigerText allows text-message senders to set a time limit from one minute to 30 days after which the text disappears from the company’s servers on which it is stored and therefore from the senders’ and recipients’ phones.
  • 9. DESTROY DATA Researchers at the University of Washington are developing a technology called Vanish that makes electronic data ‘self-destruct’ after a specified period of time. Instead of relying on Google, Facebook or Hotmail to delete the date on their servers, Vanish does the job.
  • 10. GO OFFSHORE Some companies, such as Connectinprivate.com, offer ‘anonymous and non-traceable offshore browsing’ for £5 a month. It’s done via a virtual private network, or VPN, which connects to the internet on your behalf so web services think you’re located in Canada, for example, rather than London. The VPN knows where you are, but in keeping with Canadian law, keeps no log of your activity.
  • 11. UPDATE YOUR BROWSER Microsoft plans to increase privacy options in the upcoming version of its Web browser Internet Explorer 9 (IE9), including the ability to prevent tracking by third- party websites.
  • 12. THANK YOU FOR YOUR ATTENTION 