Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Daily News Flash

Daily News Flash

Be Vigilant Against Suspicious Friend Requests

Exercise caution when accepting social media friend requests. Only accept requests from people you know and trust. Be wary of unfamiliar or suspicious profiles, as they may be fake accounts created for phishing or scamming purposes. Scrutinize the profile for authenticity, look for mutual connections, evaluate any accompanying messages, and conduct online searches if needed. Decline requests from unknown individuals and prioritize connections with trusted friends and family...


June 1, 2023 21:04 (on 6/2/23) |  0 | QR Ready | 1 minute read
Use Your Bank's Official App

Use the official mobile app provided by your bank to ensure secure access to your accounts. Avoid downloading banking apps from third-party sources or untrusted app stores, as they may compromise your account. It minimizes the risk of fraud and protects your sensitive financial information. Always verify the app's legitimacy and download it directly from the official app store associated with your device's operating system.

Got questions? Submit a ticket at [PB8324.3] Data Security...


June 1, 2023 21:03 (on 6/2/23) |  0 | QR Ready | 1 minute read
Secure Banking: Vigilance for Transaction Safety

To maintain transaction security, keep an eye on your online banking accounts frequently. Examine bank statements for any irregularities that might indicate fraud. Check the validity of each transaction and immediately report any suspicious charges or withdrawals. This will allow the bank to investigate the situation, protect your account, and, if necessary, recover any lost funds.

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


June 1, 2023 21:03 (on 6/2/23) |  0 | QR Ready | 1 minute read
Steer Clear of Unknown Websites

Be cautious when visiting new websites shared online, even if they're from friends or unknown sources. Some websites may have drive-by download attacks that can harm your devices and data. These attacks can infect your computer just by clicking on the website's link, without the need to click on anything else. To stay safe, avoid visiting unfamiliar websites and stick to well-known and trusted ones. This reduces the risk of compromising your system and ensures the safety of your...


June 1, 2023 21:02 (on 6/2/23) |  0 | QR Ready | 1 minute read
Tread Cautiously with Voice-Activated Assistants

To maintain confidentiality, it is important to be careful when using voice-activated assistants or smart speakers near your workstation. These devices can inadvertently record and store conversations, potentially including sensitive information, without your awareness. As responsible employees, it is crucial to be aware of the risks involved with these technologies. To protect company data and personal privacy, it is advisable to either keep these devices away from your workstation or...


June 1, 2023 21:02 (on 6/2/23) |  0 | QR Ready | 1 minute read
Safeguard your Scans

QR codes are widely used, but it's crucial to be aware of security risks and take necessary precautions. Stay safe by being cautious of unfamiliar QR codes, verifying their source, and visually inspecting them for any changes. Use trusted QR code scanner apps, disable automatic scanning, and be cautious of URL redirects. Only provide sensitive information through QR codes if it's from a trusted source. Keep your devices updated, trust your instincts, and follow these guidelines to enhance...


June 1, 2023 21:01 (on 6/2/23) |  0 | QR Ready | 1 minute read
Data Defense at the Phone Repair Fence

When visiting a cell phone repair service, it is important to consider the security of your personal information. First, back up your data and then wipe your device clean of any sensitive information. Select a robust screen lock and disable biometric authentication. Additionally, choose a reputable repair facility with good customer reviews and ensure you have a privacy agreement in place to protect your data. During the repair process, it is important to stay vigilant and closely monitor...


May 30, 2023 21:53 (on 5/31/23) |  0 | QR Ready | 1 minute read
Erase the Trace, Shield Your Digital Space

Clearing the cache and browsing history is an important step in keeping your online information safe. When you use the internet, your browser saves things such as your favorite websites, login details, and the websites you visit. If someone gains access to this information, they could potentially use it to harm you. By regularly clearing your cache and browsing history, you delete this sensitive data, making it more difficult for others to access your personal information. It's a simple...


May 30, 2023 21:03 (on 5/31/23) |  0 | QR Ready | 1 minute read
Prioritize Security at Printing and Photocopy Shops

ID printing and photocopy shops offer services such as printing identification cards and making copies of valuable documents. However, they also pose a security threat. Therefore, when visiting such shops, it is important to prioritize security. Only share the documents that are necessary and be vigilant while doing so. Additionally, take steps to protect your belongings. Avoid discussing sensitive information in public, ensure safe handling practices, securely store copies, and properly...


May 30, 2023 20:25 (on 5/31/23) |  0 | QR Ready | 1 minute read
Research Device Security

The Internet of Things (IoT) refers to a network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and connectivity capabilities that enable them to connect and exchange data over the Internet. Before purchasing one of these devices, research the manufacturer's reputation for security. Choose devices from reputable companies that prioritize security and regularly provide updates and patches. Read reviews and look for any reported security...


May 17, 2023 20:47 (on 5/18/23) |  0 | QR Ready | 1 minute read
  • First
  • «
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • »
  • Last


  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi