public:data_protection:instructions

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
public:data_protection:instructions [2020-04-30 08:23] veselypublic:data_protection:instructions [2020-04-30 08:23] (current) vesely
Line 11: Line 11:
 ---- ----
  
-===== Instruction no. – Minimizing computer threats and risks, protection of personal data =====+===== Instruction no. – Minimizing computer threats and risks, protection of personal data =====
  
 **Recommendations for employee for the protection of personal data and minimizing threats and risks when working with computers, in mobile communication, or on networks while working from home.** **Recommendations for employee for the protection of personal data and minimizing threats and risks when working with computers, in mobile communication, or on networks while working from home.**
Line 27: Line 27:
 **Phishing emails usually hide where the links lead.** The hidden path for the link is the first indication of a fraudulent email. **Phishing emails usually hide where the links lead.** The hidden path for the link is the first indication of a fraudulent email.
  
-How do I find out where a link from an email leads? Right-click (NOT LEFT) on the link and select “copy link address” from the menu. Then copy it into Notepad or a file and you will see where the link really leads. Also,** beware of URL shortenings that mask the real link.** \\+How do I find out where a link from an email leads? Right-click (NOT LEFT) on the link and select “copy link address” from the menu. Then copy it into Notepad or a file and you will see where the link really leads. Also,** beware of URL shortenings that mask the real link.**
 ==== Do not confuse your work computer with a private one ==== ==== Do not confuse your work computer with a private one ====
  
Line 36: Line 36:
 **In case you use a work notebook/device, never attempt run or install any unlicensed software.** **In case you use a work notebook/device, never attempt run or install any unlicensed software.**
  
-Knowing that Internet access while working from home does not normally take place through a connection provided by your employer could lead to reduced caution when using the Internet on institutional equipment. Employees could also access sites that are typically characterized by the increased occurrence of various malicious programs - pages they would never access on the employer’s network. This behavior could introduce a malicious program to an otherwise “clean” device, which in turn could pose a serious threat to both the device itself and the information stored on it and to the organization’s information systems later. \\ +Knowing that Internet access while working from home does not normally take place through a connection provided by your employer could lead to reduced caution when using the Internet on institutional equipment. Employees could also access sites that are typically characterized by the increased occurrence of various malicious programs - pages they would never access on the employer’s network. This behavior could introduce a malicious program to an otherwise “clean” device, which in turn could pose a serious threat to both the device itself and the information stored on it and to the organization’s information systems later.\\ 
-**Similarly, increased caution is required when a private computer is used for remote access to the employer’s information system.** \\+**Similarly, increased caution is required when a private computer is used for remote access to the employer’s information system.**
 ==== Avoid using public Wi-Fi networks ==== ==== Avoid using public Wi-Fi networks ====
  
-Personal data and other sensitive information should not be transmitted by a Wi-Fi network in public places without special precautions. \\+Personal data and other sensitive information should not be transmitted by a Wi-Fi network in public places without special precautions.\\
 We strongly recommend not using public Wi-Fi networks and prefer safer connections via mobile data or the use of some form of VPN if applicable. We strongly recommend not using public Wi-Fi networks and prefer safer connections via mobile data or the use of some form of VPN if applicable.
  
-**If you use EDUROAM, be sure that your password is complex enough and is at least 10 characters long.** \\+**If you use EDUROAM, be sure that your password is complex enough and is at least 10 characters long.**
 ==== Be careful when selecting passwords ==== ==== Be careful when selecting passwords ====
  
Line 51: Line 51:
 **Do not use the same passwords at home and at work. Never use the same passwords for different information systems.** **Do not use the same passwords at home and at work. Never use the same passwords for different information systems.**
  
-This recommendation is especially valid for the credentials you use to log in to work remotely. In the event of a successful attack on your home computer, it is usually easy to acquire stored login information from browsers and email clients. An attacker should not be able to log on to the work e-mail using the password for a private e-mail account or access anything else.\\+This recommendation is especially valid for the credentials you use to log in to work remotely. In the event of a successful attack on your home computer, it is usually easy to acquire stored login information from browsers and email clients. An attacker should not be able to log on to the work e-mail using the password for a private e-mail account or access anything else. 
 ==== Do not enable macros in documents ==== ==== Do not enable macros in documents ====
  
Line 61: Line 62:
 ==== Do not underestimate the physical security of computers ==== ==== Do not underestimate the physical security of computers ====
  
-**Even your private computer should require identity verification, e.g. by entering a password** or biometric authentication. \\ +**Even your private computer should require identity verification, e.g. by entering a password** or biometric authentication.\\ 
-**You can greatly mitigate the effects of theft by turning on hard disk encryption.** For most computers, this feature can be turned on or installed for free, and the impact on performance is small. Encryption greatly reduces the risk when a device is lost.\\+**You can greatly mitigate the effects of theft by turning on hard disk encryption.** For most computers, this feature can be turned on or installed for free, and the impact on performance is small. Encryption greatly reduces the risk when a device is lost.
 ==== Follow other practical security measures ==== ==== Follow other practical security measures ====
  
 \\ \\
-Measures should be proportional to the level of risk. Adequate security relating to preventing access of other family members to a device (its content) is also important. This is especially true for children who could unknowingly also be the cause of some of the risks mentioned in this document.\\+Measures should be proportional to the level of risk. Adequate security relating to preventing access of other family members to a device (its content) is also important. This is especially true for children who could unknowingly also be the cause of some of the risks mentioned in this document. 
 ==== When should you contact the IT office? ==== ==== When should you contact the IT office? ====
  
Line 85: Line 87:
   * Personal data may have been changed or modified, but it is not possible to verify that this has occurred.   * Personal data may have been changed or modified, but it is not possible to verify that this has occurred.
  
-Any loss must be reported to the following e-mail address: gdpr@cerge-ei.cz  \\+Any loss must be reported to the following e-mail address: gdpr@cerge-ei.cz
  
 ---- ----
  • /var/www/html/dokuwiki/data/attic/public/data_protection/instructions.1588234987.txt.gz
  • Last modified: 2020-04-30 08:23
  • by vesely