Information Security Tips (January, 2019) - Data Privacy in an Era of Compliance
資訊安全貼士(2019年1月號) - 合規時代的資料私隱保障
Ref. No : ICTO-I-2019-013Posted by :JeffWai/UMAC
Department :ICTOPosted Date : 11/01/2019
Category :
Bulletin
公告



English

“Compliance” means conforming to laws, regulations, standards and other requirements.

Nowadays, Internet is essential for everyday life. However, do you know Internet contains large amount of data about you? Whenever you play a game, online shopping, browse websites, or use any of numerous apps, your activity and some of your personal information may be collected and shared.

Similarly, our daily work may require us to collect, process, and store the personal information of others. Whenever we handle such information, we need to think about how we want our own information treated and treating other people's data with the same care and respect.

Tips for protecting your personal data:
  • Know what you are sharing. Check the privacy settings on all of your social media accounts. Some of them may include a wizard to guide you walk through the settings. Always be cautious about what you post publicly;
  • Guard your date of birth and telephone number. These are key pieces of information used for identity and account verification, and you should not share them publicly. If an online service or site asks you to share this critical information, you should consider whether the necessity and the security level of the site;
  • Be aware of phishing email and fake website. Your personal information may be phished! (Reference: How can I identify a phishing, fake email and websites?)

Tips for protecting the information, identity, and privacy of others:
  • Know what laws, policies and guidelines are applicable. They govern how to collects, processes, stores, and deletes the personal data of constituents; (Reference: Personal Data Protection Act, Macao, Privacy Policy, UM and Guidelines for Handling Confidential Information, UM)
  • Use the data only for its intended purpose. If you need to use data for another reason, always check the above policies and guideline first;
  • Do keep constituents' personal information confidential and limit access to the data;
  • Destroy or de-identify private information when you no longer need it.

Reference
Other Information Security Tips
Should you have any enquiries, please feel free to contact our Help Desk.

ICTO Help Desk
Location : Room 2085, 2/F, Central Teaching Building (E5) (eMap)
Telephone : 8822 8600
Email : icto.helpdesk@um.edu.mo

Information and Communication Technology Office