LESSON 11: PERSONAL PROTECTION AND DATA PROTECTION

 The objectives of this lesson were:

• Know and know how to apply the security measures that guarantee physical and mental integrity in the use of digital technology.

• Know how to protect yourself on the Web.

• Identify the factors to take into account to protect health from working with digital technology.

• Learn cybersecurity by playing.


In this class we talked about what does our mobile device contain, reflected in whether we invest enough time in device security or not, or users being aware of the vulnerability of the information. The main control measures are:

- Device access: Unlock code, facial recognition, visual pattern, fingerprint.

- Shared data: Bluetooth, manage location.

- Remote in case of theft or loss.

- External memory.


Then, it is also important to make security patches and updates, since there is a very common thing called Malware, which is a malicious program that seeks to obtain personal data and money. So, it is important to have an antivirus and Malware Detection Tool. In relation to security on our devices, it is recommendable to encrypt the information. Then, for maintaining information safe, it is important to do temporarily some backups, for this is recommended to use an external disk, to it through synchronized cloud storage (OneDrive, Dropbox, etc.). There is more information to configure the devices in: Information Security Office, Spanish Agency for Data Protection. The main recommendations are:

- Create profiles responsibly (protect information and personal data).

- Participate in the network in a respectful way.

- Periodically review the digital identity.

- Browse the Internet more safely, clearing history and cookies, signing off, configuring and reviewing browser privacy options, not connecting to public Wi-Fi networks, using social networks with privacy, configuring profiles protecting personal data, using proper passwords or not disclosing personal information of others.

- Activate passwords, review the information accessed by apps and that transferred to third parties, turn off BlueTooth, or activate geolocation only when you need it. 

The importance to preserve email and messaging services from unwanted access:

- Management of email accounts.

- Do not open questionable emails.

- Don't download images by default.


1. The fundamental aspects to take into account for good health at work are:

• The posture: To avoid headaches and minor back injuries that can be aggravated if

the posture is prolonged over time.

• Furniture and other elements: Adjust the table, chair and properly arrange the

workspace.

• Lighting and noise: Take care of lighting, avoid reflections on data display screens.

Work in a noise-free space to avoid stress and mental fatigue.

• Attitude: Have a good attitude at work.


2. Recommendations for the healthy use of the computer.


3. The job

• The dimensions of the table (Between 160 and 180 cm long).

• The customizationand order of the workspace.

• The characteristics of the different equipment that we are going to use (size of the screens, connectivity of the devices, types of keyboards, etc.).

• The wiring is conveniently collected, or hidden under gutters in order to avoid falls.

• Enough length.

• Sufficient number of light sockets available.


4. Ergonomics and Lighting.


5. Attitude at work.


Comentarios

Entradas populares de este blog

LESSON 8: NETIQUETTE

LESSON 9: JCLIC (FOURTH & FIFTH DAY)