SlideShare a Scribd company logo
Keep security in mind!
Be careful what information you share through apps
Don’t share business information
Information
Overload
Cybersecurity awareness training datahops.com
What is
Data Privacy?
Personal Data is information that can be
How is the information being Collected?
How is the information being used?
How is the information being stored ?
How is the information being retrieved?
How is the information being Disclosed
How is the information being erased?
Collection:
Use:
Retention:
Retrieval:
Disclosure:
Disposal:
linked to a particular person
Cybersecurity awareness training datahops.com
Know Your rights and obligations
Protect Sensitive Data
● Don’t store protected data on your computer .
● Encrypt sensitive data before storing or transmitting
● Delete sensitive data files when they are no longer needed.
Safeguarding
Data.
Cybersecurity awareness training datahops.com
Never disclose confidential information or
credentials via email, chat, text messages, in
person or over the phone to unknown parties.
SHARE RESPONSIBLY
Cybersecurity awareness training datahops.com
BE CAREFUL WHAT YOU SHARE!

More Related Content

Similar to FREE A4 Cyber Security Awareness Posters-Data Privacy

Cybersecurity ,Protecting Your Digital Identity.pptx
Cybersecurity ,Protecting Your Digital Identity.pptxCybersecurity ,Protecting Your Digital Identity.pptx
Cybersecurity ,Protecting Your Digital Identity.pptx
Jahanvi B
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
Courion Corporation
 
Physician Office Presentation
Physician Office PresentationPhysician Office Presentation
Physician Office Presentation
franbodh
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
Ken Holmes
 
Law Firm & Legal Department Security & Practice In The Real World
Law Firm & Legal Department Security & Practice In The Real WorldLaw Firm & Legal Department Security & Practice In The Real World
Law Firm & Legal Department Security & Practice In The Real World
Richard Harbridge
 
Intro to Information Security.ppt
Intro to Information Security.pptIntro to Information Security.ppt
Intro to Information Security.ppt
AnuraagAwasthi3
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
BarakaMuyengi
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
gppcpa
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
Karel Van Isacker
 
Identity theft
Identity theftIdentity theft
Identity theft
SARASWATHI S
 
FREE A4 Cyber Security Posters-Data Protection-GDPR
FREE A4 Cyber Security Posters-Data Protection-GDPRFREE A4 Cyber Security Posters-Data Protection-GDPR
FREE A4 Cyber Security Posters-Data Protection-GDPR
Data Hops
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalists
antoniokisembo
 
CyberFirst-Navigators-Lesson-1-presentation.pptx
CyberFirst-Navigators-Lesson-1-presentation.pptxCyberFirst-Navigators-Lesson-1-presentation.pptx
CyberFirst-Navigators-Lesson-1-presentation.pptx
neyoge6666
 
techalpha07
techalpha07techalpha07
Internet Security at Work Presentation
Internet Security at Work PresentationInternet Security at Work Presentation
Internet Security at Work Presentation
redbackacademy
 
Online security and privacy Netiquettesh
Online security and privacy NetiquetteshOnline security and privacy Netiquettesh
Online security and privacy Netiquettesh
anmol326996
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
Ujjwal Acharya
 
cybersecurity
cybersecurity cybersecurity
cybersecurity
AkshaySajith3
 

Similar to FREE A4 Cyber Security Awareness Posters-Data Privacy (20)

Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Cybersecurity ,Protecting Your Digital Identity.pptx
Cybersecurity ,Protecting Your Digital Identity.pptxCybersecurity ,Protecting Your Digital Identity.pptx
Cybersecurity ,Protecting Your Digital Identity.pptx
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Physician Office Presentation
Physician Office PresentationPhysician Office Presentation
Physician Office Presentation
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Law Firm & Legal Department Security & Practice In The Real World
Law Firm & Legal Department Security & Practice In The Real WorldLaw Firm & Legal Department Security & Practice In The Real World
Law Firm & Legal Department Security & Practice In The Real World
 
Intro to Information Security.ppt
Intro to Information Security.pptIntro to Information Security.ppt
Intro to Information Security.ppt
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Identity theft
Identity theftIdentity theft
Identity theft
 
FREE A4 Cyber Security Posters-Data Protection-GDPR
FREE A4 Cyber Security Posters-Data Protection-GDPRFREE A4 Cyber Security Posters-Data Protection-GDPR
FREE A4 Cyber Security Posters-Data Protection-GDPR
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalists
 
CyberFirst-Navigators-Lesson-1-presentation.pptx
CyberFirst-Navigators-Lesson-1-presentation.pptxCyberFirst-Navigators-Lesson-1-presentation.pptx
CyberFirst-Navigators-Lesson-1-presentation.pptx
 
techalpha07
techalpha07techalpha07
techalpha07
 
Internet Security at Work Presentation
Internet Security at Work PresentationInternet Security at Work Presentation
Internet Security at Work Presentation
 
Online security and privacy Netiquettesh
Online security and privacy NetiquetteshOnline security and privacy Netiquettesh
Online security and privacy Netiquettesh
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
cybersecurity
cybersecurity cybersecurity
cybersecurity
 

More from Data Hops

FREE A4 cyber Security awareness Posters-Data Protection -GDPR
FREE A4 cyber Security awareness  Posters-Data Protection -GDPRFREE A4 cyber Security awareness  Posters-Data Protection -GDPR
FREE A4 cyber Security awareness Posters-Data Protection -GDPR
Data Hops
 
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPRFREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Removable Device
FREE A4  Cyber Security Awareness Posters-Removable DeviceFREE A4  Cyber Security Awareness Posters-Removable Device
FREE A4 Cyber Security Awareness Posters-Removable Device
Data Hops
 
Free Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-MalwareFree Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-Malware
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-PhishingFREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-Phishing
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social EngineeringFREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social Engineering
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Device Security
FREE A4 Cyber Security Awareness Posters-Device SecurityFREE A4 Cyber Security Awareness Posters-Device Security
FREE A4 Cyber Security Awareness Posters-Device Security
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-PasswordsFREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-Passwords
Data Hops
 
Free Digital Signage Cybersecurity Screensavers Part 1
Free  Digital Signage Cybersecurity Screensavers Part 1Free  Digital Signage Cybersecurity Screensavers Part 1
Free Digital Signage Cybersecurity Screensavers Part 1
Data Hops
 
Free A4 Cyber Security Awareness Training Posters Part 11
Free A4 Cyber Security Awareness Training Posters Part 11Free A4 Cyber Security Awareness Training Posters Part 11
Free A4 Cyber Security Awareness Training Posters Part 11
Data Hops
 
A4 Cybersecurity Awareness Posters Part 9
A4 Cybersecurity Awareness Posters Part 9A4 Cybersecurity Awareness Posters Part 9
A4 Cybersecurity Awareness Posters Part 9
Data Hops
 
A4 Cybersecurity Awareness Posters Part 7
A4 Cybersecurity Awareness Posters Part 7A4 Cybersecurity Awareness Posters Part 7
A4 Cybersecurity Awareness Posters Part 7
Data Hops
 
A4 Cybersecurity Awareness Posters Part 6
A4 Cybersecurity Awareness Posters Part 6A4 Cybersecurity Awareness Posters Part 6
A4 Cybersecurity Awareness Posters Part 6
Data Hops
 
A4 Cybersecurity Awareness Posters Part 5
A4 Cybersecurity Awareness Posters Part 5A4 Cybersecurity Awareness Posters Part 5
A4 Cybersecurity Awareness Posters Part 5
Data Hops
 
Cybersecurity Password Safety A4 Flash Cards.pdf
Cybersecurity Password Safety  A4 Flash Cards.pdfCybersecurity Password Safety  A4 Flash Cards.pdf
Cybersecurity Password Safety A4 Flash Cards.pdf
Data Hops
 
Cybersecurity Remote Working a4 printable Flash Cards.pdf
 Cybersecurity Remote Working  a4 printable Flash Cards.pdf Cybersecurity Remote Working  a4 printable Flash Cards.pdf
Cybersecurity Remote Working a4 printable Flash Cards.pdf
Data Hops
 
Phishing Alert
Phishing AlertPhishing Alert
Phishing Alert
Data Hops
 

More from Data Hops (17)

FREE A4 cyber Security awareness Posters-Data Protection -GDPR
FREE A4 cyber Security awareness  Posters-Data Protection -GDPRFREE A4 cyber Security awareness  Posters-Data Protection -GDPR
FREE A4 cyber Security awareness Posters-Data Protection -GDPR
 
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPRFREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
 
FREE A4 Cyber Security Awareness Posters-Removable Device
FREE A4  Cyber Security Awareness Posters-Removable DeviceFREE A4  Cyber Security Awareness Posters-Removable Device
FREE A4 Cyber Security Awareness Posters-Removable Device
 
Free Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-MalwareFree Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-Malware
 
FREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-PhishingFREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-Phishing
 
FREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social EngineeringFREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social Engineering
 
FREE A4 Cyber Security Awareness Posters-Device Security
FREE A4 Cyber Security Awareness Posters-Device SecurityFREE A4 Cyber Security Awareness Posters-Device Security
FREE A4 Cyber Security Awareness Posters-Device Security
 
FREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-PasswordsFREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-Passwords
 
Free Digital Signage Cybersecurity Screensavers Part 1
Free  Digital Signage Cybersecurity Screensavers Part 1Free  Digital Signage Cybersecurity Screensavers Part 1
Free Digital Signage Cybersecurity Screensavers Part 1
 
Free A4 Cyber Security Awareness Training Posters Part 11
Free A4 Cyber Security Awareness Training Posters Part 11Free A4 Cyber Security Awareness Training Posters Part 11
Free A4 Cyber Security Awareness Training Posters Part 11
 
A4 Cybersecurity Awareness Posters Part 9
A4 Cybersecurity Awareness Posters Part 9A4 Cybersecurity Awareness Posters Part 9
A4 Cybersecurity Awareness Posters Part 9
 
A4 Cybersecurity Awareness Posters Part 7
A4 Cybersecurity Awareness Posters Part 7A4 Cybersecurity Awareness Posters Part 7
A4 Cybersecurity Awareness Posters Part 7
 
A4 Cybersecurity Awareness Posters Part 6
A4 Cybersecurity Awareness Posters Part 6A4 Cybersecurity Awareness Posters Part 6
A4 Cybersecurity Awareness Posters Part 6
 
A4 Cybersecurity Awareness Posters Part 5
A4 Cybersecurity Awareness Posters Part 5A4 Cybersecurity Awareness Posters Part 5
A4 Cybersecurity Awareness Posters Part 5
 
Cybersecurity Password Safety A4 Flash Cards.pdf
Cybersecurity Password Safety  A4 Flash Cards.pdfCybersecurity Password Safety  A4 Flash Cards.pdf
Cybersecurity Password Safety A4 Flash Cards.pdf
 
Cybersecurity Remote Working a4 printable Flash Cards.pdf
 Cybersecurity Remote Working  a4 printable Flash Cards.pdf Cybersecurity Remote Working  a4 printable Flash Cards.pdf
Cybersecurity Remote Working a4 printable Flash Cards.pdf
 
Phishing Alert
Phishing AlertPhishing Alert
Phishing Alert
 

Recently uploaded

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...
QADay
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
QADay
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 

Recently uploaded (20)

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 

FREE A4 Cyber Security Awareness Posters-Data Privacy

  • 1. Keep security in mind! Be careful what information you share through apps Don’t share business information Information Overload Cybersecurity awareness training datahops.com
  • 2. What is Data Privacy? Personal Data is information that can be How is the information being Collected? How is the information being used? How is the information being stored ? How is the information being retrieved? How is the information being Disclosed How is the information being erased? Collection: Use: Retention: Retrieval: Disclosure: Disposal: linked to a particular person Cybersecurity awareness training datahops.com Know Your rights and obligations
  • 3. Protect Sensitive Data ● Don’t store protected data on your computer . ● Encrypt sensitive data before storing or transmitting ● Delete sensitive data files when they are no longer needed. Safeguarding Data. Cybersecurity awareness training datahops.com
  • 4. Never disclose confidential information or credentials via email, chat, text messages, in person or over the phone to unknown parties. SHARE RESPONSIBLY Cybersecurity awareness training datahops.com BE CAREFUL WHAT YOU SHARE!