Presentation is loading. Please wait.

Presentation is loading. Please wait.

“Privacy For Websites” Presented by Mrs Drudeisha Madhub (The Commissionner) p Tel: +230 212 2218 Helpdesk: +230 203 90 76 Website:

Similar presentations


Presentation on theme: "“Privacy For Websites” Presented by Mrs Drudeisha Madhub (The Commissionner) p Tel: +230 212 2218 Helpdesk: +230 203 90 76 Website:"— Presentation transcript:

1 “Privacy For Websites” Presented by Mrs Drudeisha Madhub (The Commissionner) Email: p mo-dpo@govmu.org Tel: +230 212 2218 Helpdesk: +230 203 90 76 Website: http://dataprotection.govmu.org Address: 5th Floor, Happy House Ltd, Port Louis

2 The Data Protection Act The Data Protection Act 2004 was proclaimed in its entirety on the 16th of February 2009, except for section 17(5). In addition, the Data Protection Regulations 2009 (GN 22/09) were enacted to cater for registration fees for data controllers, other prescribed fees, the registration form for data controllers and the request for access to personal data form which represents the form to be used by data subjects (living individuals), for requesting access to their personal data from data controllers. 23 rd April 2015

3 Privacy Assessment : Web Application Privacy Assessment is seen as a valuable tool for businesses and governments which take privacy seriously. This web application will enable public and private bodies to make informed choices. It will often be the case that a privacy enhancing solution will be no more difficult or more costly to implement than an intrusive one, if the option is identified sufficiently. However, this should not be the motivation since we are here dealing with the human right to privacy. 23 rd April 2015

4 Privacy Assessments Protection of privacy is more than simply avoiding a breach of the law. It involves striving for something better. Privacy Impact Assessments and Privacy Compliance Assessments are new techniques which are increasingly being used internationally to better manage privacy risks. Others include audits, privacy seals and associated self-regulatory initiatives and privacy enhancing technologies. Each builds on the bedrock of the enforceable privacy rights for citizens and consumers enshrined in law. 23 rd April 2015

5 Privacy Assessments These assessments are being encouraged as a means by which business and government can proactively identify and avoid privacy problems. Internationally, these assessments play an important part of a policy approach to build trust and confidence in-business and these processes are recommended as part of any new Public Key Infrastructure system, for example. 23 rd April 2015

6 Privacy Assessments This Privacy Assessment has been categorised into two parts namely: ◦ Privacy Compliance Assessment ◦ Privacy Impact Assessment The purpose of both these assessments is to provide a systematic process that evaluates a proposal in terms of its impact upon privacy and identify the potential effects that the proposal may have upon personal privacy and further examine how any detrimental effects on privacy might be lessened. 23 rd April 2015

7 Privacy By Design Privacy by design is an approach to projects that promotes privacy and data protection compliance from the start. Unfortunately, these issues are often bolted on as an after-thought or ignored altogether. It helps organisations comply with their obligations under the legislation. 23 rd April 2015

8 Privacy By Design The Data Protection Office encourages organisations to ensure that privacy and data protection is a key consideration in the early stages of any project, and then throughout its lifecycle. For example when: building new IT systems for storing or accessing personal data; developing legislation, policy or strategies that have privacy implications; embarking on a data sharing initiative; or using data for new purposes. 23 rd April 2015

9 Privacy By Design We would like to see more organisations integrating core privacy considerations into existing project management and risk management methodologies and policies. 23 rd April 2015

10 Benefits of taking a ‘privacy by design’ approach Taking a privacy by design approach is an essential tool in minimising privacy risks and building trust. Designing projects, processes, products or systems with privacy in mind at the outset can lead to benefits which include: Potential problems are identified at an early stage, when addressing them will often be simpler and less costly. 23 rd April 2015

11 Benefits of taking a ‘privacy by design’ approach Increased awareness of privacy and data protection across an organisation. Organisations are more likely to meet their legal obligations and less likely to breach the Data Protection Act. Actions are less likely to be privacy intrusive and have a negative impact on individuals. 23 rd April 2015

12 Privacy on the Web Your personal privacy on the Web might be less secure than you think. Web browsing habits are tracked via cookies, search engines routinely change their privacy policies, and there are always challenges to Web privacy by both private and public organizations. 23 rd April 2015

13 Privacy on the Web 1. Avoid Unnecessary Forms A good Web safety rule of thumb is to avoid filling out forms that require personal information in order to keep anything from being entered into public, searchable record, also known as Web results. You can use “BugMeNot” to avoid filling out unnecessary forms that ask for too much personal information for example. A good Web safety rule of thumb is to avoid filling out forms that require personal information in order to keep anything from being entered into public, searchable record, also known as Web results. You can use “BugMeNot” to avoid filling out unnecessary forms that ask for too much personal information for example. 2. Clean Your Search History Most Web browsers keep track of every single Web site you type into the address bar. This Web history should be periodically cleared out not only for privacy's sake. Most Web browsers keep track of every single Web site you type into the address bar. This Web history should be periodically cleared out not only for privacy's sake. 23 rd April 2015

14 Privacy on the Web 3. Log Out Of Search Engines Most search engines these days require you to create an account and log in to access the full array of their services, including search results. In order to best protect your privacy, it's always a good idea to log out of your account after executing your Web searches. Most search engines these days require you to create an account and log in to access the full array of their services, including search results. In order to best protect your privacy, it's always a good idea to log out of your account after executing your Web searches. 4. Watch Your Downloads Be extremely cautious when downloading anything (software, books, music, videos, etc.) from the Web. This is a good idea for privacy advocates, but it's also a great way to keep your computer from freezing up and malfunctioning. Be very cautious when choosing what to download from the Web; some programs include adware that will report your surfing habits back to a third-party company that will then use that information to send you ads and unwanted emails, otherwise known as spam. Be extremely cautious when downloading anything (software, books, music, videos, etc.) from the Web. This is a good idea for privacy advocates, but it's also a great way to keep your computer from freezing up and malfunctioning. Be very cautious when choosing what to download from the Web; some programs include adware that will report your surfing habits back to a third-party company that will then use that information to send you ads and unwanted emails, otherwise known as spam. 23 rd April 2015

15 Privacy on the Web 5. Use Common Sense This is pretty self-explanatory: don't go to places on the Web that you would be embarrassed to have your wife, husband, children, or employer see. This is a very low-tech way to protect your Web privacy, and yet, out of all the methods on this list, might be the one that is most effective. This is pretty self-explanatory: don't go to places on the Web that you would be embarrassed to have your wife, husband, children, or employer see. This is a very low-tech way to protect your Web privacy, and yet, out of all the methods on this list, might be the one that is most effective. 6. Guard Your Private Information Before sharing anything online - on a blog, website, message board, or social networking site - be sure it's not something you would mind sharing in real life, off the Web. Don't share information that could identify you in public, especially if you are a minor. Keep identifying details, like user names, passwords, first and last names, addresses, and phone numbers, to yourself. Your email address should be kept as private as possible, because an email address can be used to track other identifying information. Before sharing anything online - on a blog, website, message board, or social networking site - be sure it's not something you would mind sharing in real life, off the Web. Don't share information that could identify you in public, especially if you are a minor. Keep identifying details, like user names, passwords, first and last names, addresses, and phone numbers, to yourself. Your email address should be kept as private as possible, because an email address can be used to track other identifying information.. 23 rd April 2015

16 Privacy on the Web 7. Use Caution When Using Social Media Social networking sites such as Facebook are extremely popular, and for good reason: they make it possible for people to connect with each other all over the world. It's important to make sure that your privacy settings are set appropriately and that what you share on social networking sites would not reveal anything of a personal or financial nature. Social networking sites such as Facebook are extremely popular, and for good reason: they make it possible for people to connect with each other all over the world. It's important to make sure that your privacy settings are set appropriately and that what you share on social networking sites would not reveal anything of a personal or financial nature. 8. Watch Out For Scams Think carefully before following links, opening files, or watching videos sent to you by friends or organizations. Watch for signs that these might not be for real: these include misspellings, lack of secure encryption (no HTTPS in the URL), and improper grammar. Think carefully before following links, opening files, or watching videos sent to you by friends or organizations. Watch for signs that these might not be for real: these include misspellings, lack of secure encryption (no HTTPS in the URL), and improper grammar. 23 rd April 2015

17 Privacy on the Web 9. Protect Your System Keeping your computer safe from harmful content on the Web is simple with a few precautions, such as a firewall, appropriate updates to your existing software programs (this ensures that all security protocols are kept up to date), and antivirus programs. Keeping your computer safe from harmful content on the Web is simple with a few precautions, such as a firewall, appropriate updates to your existing software programs (this ensures that all security protocols are kept up to date), and antivirus programs. 10. Monitor Your Online Reputation Have you ever Googled yourself? You might be surprised (or shocked!) to see what is out there on the Web. You can control much of what is out there on the Web with the precautions laid out here, as well as keeping track of what is found about you in at least three different search engines on a regular basis. Have you ever Googled yourself? You might be surprised (or shocked!) to see what is out there on the Web. You can control much of what is out there on the Web with the precautions laid out here, as well as keeping track of what is found about you in at least three different search engines on a regular basis. 23 rd April 2015

18 Guideline - Data Protection Act 2004 23 rd April 2015 Vol. 6 - Privacy Impact Assessment

19 Guideline - Data Protection Act 2004 23 rd April 2015 Vol. 7 - Guidelines on Privacy Enhancing Technologies

20 Conclusion I commend all organisations to employ privacy assessments for significant new initiatives involving the handling of personal information. Achieving and maintaining public trust in electronic service is a key challenge for e-government and e-commerce. Failure to give informed consideration to privacy issues when embarking on new projects could be an expensive mistake. A Privacy Assessment report will fill a gap in the knowledge of decision makers and enable them fully to get to grips with the issues at the right time - before decisions are taken. 23 rd April 2015

21 Thank you for your kind attention "Thank you for your kind attention"


Download ppt "“Privacy For Websites” Presented by Mrs Drudeisha Madhub (The Commissionner) p Tel: +230 212 2218 Helpdesk: +230 203 90 76 Website:"

Similar presentations


Ads by Google