Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Guidelines for Safe and Cyber-Safe Application Downloads
Go back 

As a responsible employee, it's important to ensure that the applications you download are safe and do not put company data at risk. Cyber threats like malware, spyware, and data breaches often come from unsafe downloads. 

Follow these simple guidelines to protect yourself and the company:

General Safe Downloading Practices

  • Download Only from Official Sources – Always get applications from official app stores or vendor websites (e.g., Microsoft, Google Play, Apple App Store).
  • Avoid Cracked or Pirated Software – These often come with malware that can steal company data.
  • Check Website URLs Carefully – Fake sites mimic real ones. If unsure, type the URL manually instead of clicking links.
  • Read Reviews and Ratings – Check user feedback before downloading apps, especially lesser-known ones.
  • Update Regularly – Always install updates to patch security vulnerabilities.
  • Use Company-Approved Software – If unsure, ask IT or follow company guidelines on allowed applications
  • Think Before You Click – Be cautious of pop-ups or prompts asking you to install unknown software.

Trusted Sources for Common App Categories:

  1. Messaging & Communication
    • Microsoft Teams (https://www.microsoft.com/en/microsoft-teams)
    • Zoom (https://zoom.us)
    • Slack (https://slack.com)
    • Google Meet (https://meet.google.com) 
  2.  Productivity & Office Tools
    • Microsoft Office 365 (https://www.office.com)
    • Google Workspace (https://workspace.google.com)
    • Notion (https://www.notion.so) 
  3. Cloud Storage & File Sharing
    • Google Drive (https://drive.google.com)
    • Dropbox (https://www.dropbox.com)
    • OneDrive (https://www.microsoft.com/onedrive) 
  4. Project Management & Collaboration
    • Asana (https://asana.com)
    • Trello (https://trello.com)
    • Jira (https://www.atlassian.com/software/jira) 

Avoid downloading from:

  • Torrents or file-sharing sites (e.g., The Pirate Bay, 1337x)
  • Free software sites that are not well-known (e.g., Softonic, CNET Downloads)
  • Suspicious pop-up ads claiming “Your system is outdated! Download now!”
  • Unofficial APK or EXE download sites
  • Free third-party messaging apps that are not encrypted or require excessive permissions.

If you accidentally end up on a suspicious site — DO NOT DOWNLOAD ANYTHING. Instead, go directly to the official website or consult Data Security Team for guidance.

Your actions matter! By following these safe downloading practices, you help protect company data and ensure a secure work environment.


John Cedric
Created: February 24 2025 | Updated: on 2/24/25

  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi