Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Daily News Flash

Daily News Flash

It’s Everyone’s Responsibility

To ensure the utmost protection of our company's data on personal devices, it is crucial to follow these steps with absolute determination: thoroughly understand the rules, regularly update and secure devices, keep work and personal activities separate, actively participate in cybersecurity training and awareness, and exercise caution when using work-related apps. By adhering to these steps, we can guarantee the safety of our data and confidently use personal devices at work.

Got...


October 1, 2023 18:46 (on 10/2/23) |  1 | QR Ready | 1 minute read
Clean Desk, Safe Space

Enforcing a 'clean-desk' policy and ensuring that documents, computers, and passwords are never left unattended in your office or home are essential measures for protecting sensitive information. By doing so, you can significantly reduce the risk of unauthorized access or duplication and feel more confident in the safety of your information.

Got questions? Submit a ticket at [PB8324.3] Data Security Support.


October 1, 2023 18:45 (on 10/2/23) |  1 | QR Ready | 1 minute read
Personal Information Must be Secretly Secured

It's crucial to be vigilant about the information you share on social media. Avoid revealing personal details such as your favorite car, your spouse's name, or your kids' birthdates, as this makes it easier for cybercriminals to hack into your accounts and steal your sensitive data. Remember, online privacy is not just your responsibility but also your duty as a responsible digital citizen. So, think twice before sharing anything online, and never trust strangers on the internet!

Got...


October 1, 2023 18:44 (on 10/2/23) |  1 | QR Ready | 1 minute read
Being Updated is Being Secured

It's crucial to keep your computer and devices up to date. If you're using personal devices for work, make sure to enable automatic updates for the latest security and software enhancements. Additionally, after every update, double-check your privacy settings to ensure they align with your preferences, as updates may reset them to their default settings. Don't take any chances with your security and privacy; always stay proactive and vigilant.

Got questions? Submit a ticket at...


October 1, 2023 18:43 (on 10/2/23) |  0 | QR Ready | 1 minute read
Avoid Trusting Easily

Verifying the caller's identity by having them confirm unique details or actions is absolutely vital. This is the most effective way to boost trust and ensure the safety of your personal information. Remember to share as little information as possible to protect yourself against potential data breaches. In other words, less information means more security. So, always be assertive about safeguarding your data and privacy.

Got questions? Submit a ticket at [PB8324.3] Data Security...


October 1, 2023 18:43 (on 10/2/23) |  0 | QR Ready | 1 minute read
Multi-Factor Authentication, Activate it Now!

Password theft is an all-too-frequent method employed by cybercriminals. However, multi-factor authentication vastly improves security by adding an additional layer of defense. With multi-factor authentication, not even a hacker who has acquired your password can access your account. Your online security and data are fortified by multi-factor authentication, making it a powerful and formidable defense mechanism.

Got questions? Submit a ticket at [PB8324.3] Data Security Support.


October 1, 2023 18:42 (on 10/2/23) |  1 | QR Ready | 1 minute read
Fool-Proof Backup Technique

It is crucial to protect your vital data by strictly adhering to the 3-2-1 rule. Make sure to maintain three copies of your data, including the original files, and store them on two different types of media. Additionally, always keep one copy offsite to safeguard against data loss due to various threats and ensure data recovery during emergencies. It is imperative to regularly update and verify your backups for reliability, securing your work, and ensuring business continuity.

Got...


October 1, 2023 18:42 (on 10/2/23) |  0 | QR Ready | 1 minute read
Holistic Device Security

Given the increasing importance of digital security, ensuring the safety of your mobile device should be a top priority. Below are some key tips that we highly recommend your employees follow in order to protect their devices: Use strong passwords, keep software up to date, download apps exclusively from trusted sources, avoid rooting or jailbreaking, use a VPN when connected to public Wi-Fi, be on the lookout for suspicious activity, report lost or stolen devices immediately, and encrypt...


October 1, 2023 18:41 (on 10/2/23) |  3 | QR Ready | 1 minute read
Personal Information is an Asset

When performing sensitive tasks such as banking or shopping, it's crucial to be cautious. Use a secure network and your own device, and avoid using other people's phones, public Wi-Fi, or shared computers to protect your data from potential theft. Additionally, refrain from storing sensitive information on your device unless it's securely encrypted within a designated file. Stay safe!

Got questions? Submit a ticket at [PB8324.3] Data Security Support.


October 1, 2023 18:41 (on 10/2/23) |  0 | QR Ready | 1 minute read
Beware of Attachment-Downloading Links

In light of the recent ransomware attack in PhilHealth, it is crucial to prioritize the cybersecurity awareness of our organization. Did you know that some links from phishing emails contain malware that can be automatically deployed once clicked? Stay vigilant by being aware of any unexpected emails, especially those with attachments or links, and ensure they are legitimate before clicking. 

Read for more information:...


September 24, 2023 16:13 (on 9/24/23) |  0 | QR Ready | 1 minute read
  • First
  • «
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • »
  • Last


  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi