Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Awareness

Cyber security related awareness

I Sent It With Confidentiality

Whether you're sharing files with colleagues or clients, ensuring that data remains confidential is paramount. Here are some practical steps to take when sending sensitive files:

1. Verify the Recipient's Identity: Before sending any sensitive files, take a moment to verify the recipient's identity. Double-check their name or email address to ensure that you're sending the files to the right person. This simple step can help prevent accidental data leaks.

2. Stay Attentive...


March 15, 2024 10:39 (on 3/15/24) |  0 | QR Ready | 1 minute read
Block the Online Heist!

The convenience of online transactions has revolutionized the way we handle our finances. However, with this convenience comes a growing threat: online money fraud. Cybercriminals are exploiting the popularity of digital transactions through tactics like phishing and malware, posing a significant risk to individuals and businesses alike. The internet's global reach and inadequate regulations make it challenging to catch these criminals, highlighting the need for strong cybersecurity...


March 8, 2024 10:30 (on 3/8/24) |  0 | QR Ready | 2 minutes read
Keep IDs with you; Avoid losing them

In today's digital age, where identity theft and cyber threats loom large, safeguarding your digital identity is paramount. Your identification credentials hold the key to accessing sensitive information, and losing control of them can have severe consequences. Whether it's your driver's license, passport, or employee ID, taking proactive steps to protect these credentials is essential in maintaining the integrity of your digital identity.

Here are some crucial steps to help you...


February 29, 2024 13:12 (on 2/29/24) |  0 | QR Ready | 2 minutes read
The Backup Note

In today's digital age, data is the lifeblood of businesses and individuals alike. From cherished memories captured in photos to critical business documents, the loss of data can be catastrophic. That's where the 3-2-1 backup rule comes into play. Let's explore this and why it's essential for ensuring the safety and integrity of your valuable information.

Maintain Three Copies:

The first principle of the 3-2-1 backup rule is simple yet crucial: always maintain...


February 21, 2024 10:52 (on 2/21/24) |  2 | QR Ready | 2 minutes read
Data Detox: Reclaim Your Privacy

In today's digital age, maintaining control over our online data is paramount. With concerns surrounding privacy and security on the rise, users need to understand their rights and options. One fundamental step towards safeguarding your personal information is deleting accounts on platforms you no longer trust or wish to engage with. You can do the following steps if you wish to perform a data detox:

  • Direct Deletion
    • Look for the "Delete Account" option in your account...
      February 16, 2024 07:58 (on 2/15/24) |  0 | QR Ready | 1 minute read
Hack Attack: Protecting Your Accounts

Account hacking is a serious threat in today's digital age. Knowing what steps to take when your account is compromised can help mitigate damage and regain control swiftly. Here are some recommendations that you can take when put in the situation.

  • Stay Calm: Take a deep breath and stay calm. Panic can cloud judgment and hinder your ability to address the situation effectively.
  • Assess the Damage: Determine the extent of the breach. Check for any unauthorized...
    February 9, 2024 09:09 (on 2/9/24) |  0 | QR Ready | 1 minute read
Steer Clear of Unreliable Sources

Amidst the recent turmoil surrounding the removal of the GCash app from the Google Play Store, exercise caution during this temporary downtime. Refrain from obtaining the app from unreliable sources, as such actions may provide cybercriminals with an opportunity to exploit and harvest your sensitive information. Moreover, downloading from untrusted sources comes with the following risks:

  • Malware: Applications acquired from untrusted sources may harbor malware,...
    February 1, 2024 10:26 (on 2/1/24) |  0 | QR Ready | 1 minute read
Creating Secure Passwords: Why Longer is Better

It is crucial to use passwords that are long and intricate to ensure the security of your online accounts. Today, hackers use sophisticated password-cracking programs that can try thousands of password combinations every second, making it much easier for them to break into your account. If your password is simple and easy to guess, it may take only a few seconds for these programs to crack. 

To prevent such unauthorized access, it is recommended to use strong passwords that are...


January 26, 2024 11:19 (on 1/26/24) |  0 | QR Ready | 1 minute read
Secure Your Digital Presence: Review Device Sessions on Your Cloudstaff Google Account

In today's interconnected digital world, safeguarding your personal information is paramount. One crucial way to ensure the security of your data is by frequently reviewing the device sessions on your Cloudstaff Google Account. This proactive approach serves as an alert mechanism, providing valuable insights into the devices that have accessed your account. By consistently monitoring the list of active sessions, you empower yourself to quickly identify any unauthorized or suspicious...


January 17, 2024 13:40 (on 1/17/24) |  0 | QR Ready | 2 minutes read
Mastering Secrecy with Google's Privacy Checkup

Google Privacy Checkup stands out as a valuable tool for effortless management of online presence, providing you with the means to review, control, and customize various aspects of your digital identity within the Google ecosystem. Accessible through https://myaccount.google.com/, this feature empowers you to enhance your privacy and security in the vast online landscape.

  1. App Permissions Review:
    • Control and...
      January 11, 2024 09:49 (on 1/11/24) |  0 | QR Ready | 1 minute read
  • First
  • «
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • »
  • Last


  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi