Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Preparation is in the Bag!

In today's digital age, the importance of staying alert and cautious in the realm of cybersecurity cannot be overstated. With the constant evolution of technology, hackers are perpetually honing their skills and seeking opportunities to exploit vulnerabilities, divert your attention, and employ deceitful tactics to gain unauthorized access to your sensitive information. To safeguard your digital assets and personal data, it is imperative to maintain a heightened level of awareness in various scenarios:

  • Software Updates: Cybersecurity vulnerabilities are often discovered and patched through software updates. However, this is also a time when cybercriminals are on high alert. They may use fake update notifications or infiltrate legitimate updates to implant malware. Always verify the source of updates and ensure they are from reputable providers.
  • Financial Peaks: During financial peaks, such as tax season or major sales events, hackers see an opportunity to steal financial data, commit identity theft, or engage in phishing attacks. Be cautious when receiving emails or messages related to financial transactions, and verify the authenticity of any requests for financial information.
  • Weekends and Holidays: Cybercriminals often target individuals when they are more relaxed and less vigilant, such as on weekends and holidays. Be extra cautious during these times, especially if you receive unexpected emails, texts, or messages requesting sensitive information or urgent action.
  • Deceptive Tricks: Cybercriminals are skilled in the art of deception. They may impersonate trusted entities, use social engineering techniques, or employ convincing phishing emails to trick you into revealing personal information or login credentials. Always verify the authenticity of requests, especially if they seem urgent or unusual.


Caitlin Joyce (CaitlinG) Galanza | Awareness
Created: September 13 2023 | Updated: on 9/13/23
Comments


  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi