Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Daily News Flash

Daily News Flash

Control Screen Sharing Options

Configure your meeting settings to allow screen sharing only for the host or designated meeting presenters. This prevents unexpected or malicious content from being shared during the meeting, reducing the risk of disruptions or exposure to inappropriate material.

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


May 17, 2023 20:24 (on 5/18/23) |  0 | QR Ready | 1 minute read
Be Mindful of Meeting Recording and Storage

If recording the meeting is necessary, inform all participants in advance and comply with relevant privacy regulations. Store recorded meetings securely and limit access to authorized individuals to maintain confidentiality. This ensures that all topics discussed within the meeting stay within the intended participants.

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


May 17, 2023 20:13 (on 5/18/23) |  1 | QR Ready | 1 minute read
Regularly Monitor Your Accounts

Frequently review your bank and credit card statements to identify any unauthorized transactions. If you notice any suspicious activity, report it to your financial institution immediately. This practice ensures the integrity of your bank statements and helps prevent financial distress.

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


May 17, 2023 20:11 (on 5/18/23) |  0 | QR Ready | 1 minute read
Maintain Privacy in Your Background

When participating in a virtual meeting, it is important to be mindful of your surroundings and avoid inadvertently sharing sensitive or confidential information that may be visible in your video background. Consider adjusting your camera angle or utilizing virtual backgrounds to minimize the risk of unintentional exposure. This practice will also help you maintain a professional appearance in all the meetings you attend.

Got questions? Submit a ticket at [PB8324.3] Data Security...


May 17, 2023 19:59 (on 5/18/23) |  0 | QR Ready | 1 minute read
Protect Your Meeting Invitations

Avoid publicly sharing meeting links or IDs on social media or other public platforms. This puts the confidentiality of your online meeting at risk due to the possibility of intruders getting access to it. Instead, send invitations directly to the intended participants using secure communication channels like email and messaging apps. 

Got questions? Submit a ticket at [PB8324.3] Data Security Support. 


May 17, 2023 18:22 (on 5/18/23) |  0 | QR Ready | 1 minute read
Start a Privacy Discussion

Privacy is vital at all ages, but it's not always something people discuss. Make a point of discussing privacy with your friends and family, especially your children. As soon as they begin using digital gadgets and going online, young people must learn how crucial their privacy is. You may also be able to assist those you know in becoming more confident in understanding internet privacy settings and implementing strong privacy safeguards. And you may find yourself picking up a privacy tip...


May 4, 2023 18:49 (on 5/5/23) |  0 | QR Ready | 1 minute read
Don’t need it? Destroy it

We are constantly surrounded by information about ourselves. If any part of that data ends up somewhere it isn't supposed to, it can be used for identity theft or other malicious purposes. Therefore, before disposing of personal information, make sure to destroy it and wipe data from old devices. The same level of caution should be applied online: be meticulous in deactivating any accounts you no longer require. Additionally, just like with your confidential papers, be mindful of where...


May 4, 2023 18:46 (on 5/5/23) |  0 | QR Ready | 1 minute read
Read Privacy Policies

It's critical to understand how your information will be used before you share it. Check that the privacy policies of the organizations with which you interact are up to date. Only provide your information if you understand and are comfortable with how and where it will be used, as well as with whom it will be shared. A privacy policy should include a variety of information, such as how personal information is gathered and stored, how it will be used, and how to file a complaint. If you...


May 4, 2023 18:42 (on 5/5/23) |  0 | QR Ready | 1 minute read
Monitor Your Footprints in the Web

A digital footprint refers to a record of your online behavior, including social media posts, online transactions, and website visits. Cybercriminals can exploit this information to track your activities, steal your personal data, and even impersonate you on the internet. To protect your digital footprint, it is essential to regularly review your online presence and remove any sensitive information that could be used against you. This entails deleting outdated social media accounts, using...


May 3, 2023 16:19 (on 5/3/23) |  0 | QR Ready | 1 minute read
Avoid Accepting All Cookies

Cookies are small text files that store information about your online activities, such as your browsing history and login details. While cookies can enhance your browsing experience, they can also be exploited by hackers to track your online activity, steal your personal information, and compromise your security. To safeguard yourself from the risks associated with cookies, you can modify your browser settings to reject third-party cookies and only accept cookies from trusted websites....


May 3, 2023 16:08 (on 5/3/23) |  0 | QR Ready | 1 minute read
  • First
  • «
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • »
  • Last


  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi