Protect Your Privacy on the Internet

Protect Your Privacy on the Internet

Protecting our privacy online is essential to avoid identity theft and fraud. Apart from these risks, there is also personal information about you that is confidential and that you do not want to disclose to others. 

It is surprisingly easy to unintentionally give your personal information to other people online, especially in an email, on social networking sites, or on company websites. 

In addition, some organizations keep information about you in their databases to enable you to transact with them. These include government departments, financial institutions such as banks, construction companies, insurance companies, retailers and search engines. 

All these entities are subject to the Personal Data Protection Act, but you still need to be careful about the use of your data.

The Risks are as Follows

  • Identity theft.
  • Blackmail / extortion.
  • Defamation.
  • Unwanted sales and marketing.
  • People who have knowledge of your activities and actions to act against you.
  • Employers who use your personal data and private information to exploit you.

How Your Privacy Is Breached

  • Unencrypted email and most website interactions can be tracked, including your employer and your ISSN (Internet Service Provider).
  • An illegal phishing email can get you to click on a link on a fake website that will collect your personal or financial information.
  • With voice phishing where scammers call you to collect your private or financial information. (Vishing) 
  • Using unsecured Wi-Fi networks (at home/office and outdoors).
  • Using unencrypted connections for sensitive communications.
  • Not using secure websites when making banking transactions or online payments, including purchases.
  • Not using strong passwords, changing passwords regularly, not using passwords or disclosing passwords to others.  
  • Not using a secure email account.
  • Using a business e-mail account for e-mail, which you will also use for your personal transactions and conversations.
  • Staying logged in to a website or e-mail account when another device, such as a computer / smartphone / tablet, will be used.
  • Via spyware and viruses, including those that log your keystrokes to determine your online activity. (keylogger)
  • Via physical keystroke loggers connected to the keyboard cable.
  • Not securely storing personal or financial documents.
  • Not destroying unwanted personal or financial documents. 
  • Easy to trust and believe in people.

Things to do to Protect Your Privacy

  • Always make sure that effective and up-to-date anti virus / anti spyware and firewall are running.
  • In a public or work environment, physically check your computer, especially for any unusual devices that might be plugged into the keyboard cable.
  • Use secure websites when shopping or banking online. 
  • Log out from secure websites when you complete your transaction, just closing the page may not automatically log out of the site.
  • You should prefer to use strong passwords, change your passwords regularly, and be careful not to share them with others.
  • Avoid using your work email address for personal use. Instead, have a private email address of your own.
  • Make sure the Wi-Fi network you use in your home and office is secure. 
  • Store personal and financial documents securely.
  • Destroy unwanted personal or financial documents. 
  • Set clear rules for children about when and how they can reveal their personal data.
  • Be careful who you disclose your personal information to. 
  • If possible, avoid using your real name online.
  • Beware of anyone trying to befriend you online, including email and social media, dating sites.
  • Be wary of disclosing your private information on a business or personal website.
  • For websites that request an email address to sign up, use a disposable, anonymous webmail account.

Additional İnfo

Pursuant to the Personal Data Protection Act and other relevant regulations, you have the right to legally request a copy of all personal data an organization holds about you. 

Things to Consider When Looking for an IT Lawyer

An IT lawyer, who is an expert in his field, is expected to deal with all kinds of lawsuits and legal proceedings and produce solutions, the subject of which is information technologies. In the legal processes, especially the crime of entering the information system, the crime of blocking, disrupting and destroying the information system, the crime of using prohibited programs and the abuse of credit card, as well as the crimes committed through Facebook, twitter, instagram, whatsapp or other social media tools, the work of the informatics lawyer enters the fields.

Performing an important defense function with the development of information and internet technologies, IT attorneyship is a highly technical job that requires constant updating and development.

LEGAL SUPPORT

To make an appointment, you can reach us via the phone below during working hours or send an e-mail to the address below.

Weekdays: 09:00 – 21:00
Saturday: 10:00 – 18:00
E-mail: [email protected]

Content Protection by DMCA.com

Bir yanıt yazın

E-posta adresiniz yayınlanmayacak. Gerekli alanlar * ile işaretlenmişlerdir