Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Daily News Flash

Daily News Flash

Avoid Sharing Too Much On Social Media

Many individuals are unaware that all criminals need to target you, your loved ones, and your belongings—both online and offline—is personal information from social media posts. This information serves as the basis for attacks carried out by online criminals. We must avoid sharing sensitive information, which includes full names, postal addresses, birthdays, information about children, holidays, and locations.

Got questions? Submit a ticket at [PB8324.3] Data Security Support.


February 26, 2023 18:37 (on 2/27/23) |  0 | QR Ready | 1 minute read
Avoid Auto-Connecting to Bluetooth and Wi-Fi

Make sure your device doesn't automatically seek and connect to Bluetooth or open wireless networks. This makes it possible for online criminals to remotely access your device and obtain crucial data. Moreover, this can lead to unauthorized access and Bluetooth attacks. These networks can be used by attackers to steal your personal information, intercept your internet traffic, or even take over your device. Disable these functions to give yourself the option of connecting to a secure...


February 26, 2023 18:29 (on 2/27/23) |  0 | QR Ready | 1 minute read
Sort Your Data Accordingly

Mixing personal and company information can lead to a cybersecurity attack. If you combine company data such as customer records or financial information with personal details like social security numbers, credit card data, or medical records - and fail to secure this information adequately - it could result in a data breach. This, in turn, could lead to financial losses, identity theft, harm to one's reputation, and legal troubles. It's crucial to keep personal and business information...


February 26, 2023 17:52 (on 2/27/23) |  0 | QR Ready | 1 minute read
Safeguard Private Information

If your work involves accessing sensitive information, it is crucial to take all necessary precautions to protect it. All sensitive data must be kept in pre-approved networks to ensure proper control and monitoring. Avoid storing confidential information on your computer's hard drive or in unauthorized cloud storage accounts. It is also recommended to refrain from sending sensitive information via email, group chat, or personal devices. It is best recommended to share it personally or...


February 26, 2023 17:36 (on 2/27/23) |  0 | QR Ready | 1 minute read
Always Watch Your Six

Working from anywhere has numerous benefits, but it also poses a serious security risk. If you decide to leave the house to work in a public area, you should be aware of who can see your laptop screen. Additionally, when working in public, you should avoid talking about private company matters. Doing so could result in the leakage of sensitive information, including personal and financial data, or confidential business information. This information may be exploited for ransom, fraud,...


February 26, 2023 17:30 (on 2/27/23) |  0 | QR Ready | 1 minute read
Working Remotely Also Poses Risks

Due to their portability, laptops are relatively easy to steal. You should always keep your laptop close and bring it with you when working in a public setting. When traveling, it is best to keep your electronics in your carry-on bag rather than in your checked luggage. This advice also applies to external hard drives and USB flash drives, which are both types of data storage. It can be challenging to determine with certainty what potentially sensitive information was on a lost or stolen...


February 26, 2023 17:20 (on 2/27/23) |  0 | QR Ready | 1 minute read
Wherever You Are, Lock Your Device

It's easy to let your guard down when working in the comfort of your own home or office. To prevent inadvertent data loss or leakage, you should still maintain the habit of locking your computer when you're not using it. All it takes is a moment of carelessness for a family member, co-worker, or malicious individual to accidentally or intentionally cause damage or access critical information they are not authorized to see.


Got questions? Submit a ticket at [PB8324.3] Data...


February 26, 2023 17:11 (on 2/27/23) |  0 | QR Ready | 1 minute read
Never Install Untrusted Software

Installing an untrusted app on a company device can have serious repercussions, such as data loss, malware infestations, unstable systems, policy violations, and legal troubles. It is essential to adhere to corporate rules and regulations and only download trustworthy software for use on your provided workstations. If you require software for your work, please contact the Data Security Team to verify its security before installation.


Got questions? Submit a ticket at [PB8324.3]...


February 26, 2023 16:52 (on 2/27/23) |  1 | QR Ready | 1 minute read
Cyber Criminals Can Invade Social Media Platforms

Cybercriminals also use social media platforms to perform their attacks. To ensure our safety, we must be on the lookout for social media fraud such as solicitations for personal information or phony freebies. These frauds can result in identity theft or monetary loss. Always think twice and don’t click on links that look malicious from an untrusted sender.


Got questions? Submit a ticket at [PB8324.3] Data Security Support.


February 26, 2023 16:34 (on 2/27/23) |  0 | QR Ready | 1 minute read
Create Unique Passwords for Each Account

It's important to protect your passwords. If you suspect that your password has been compromised, change it immediately. Your password may be compromised if you experience multiple sign-in failures on your account, if someone else accesses another account that uses the same or a similar password, or if you notice any unusual activity on your account. If your password has been compromised, all the data associated with it may also be compromised. It's crucial to change your password if you...


February 15, 2023 21:30 (on 2/16/23) |  0 | QR Ready | 1 minute read
  • First
  • «
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • »
  • Last


  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi