Data Protection / Privacy
Home > 
Data Protection / Privacy
< back
Result: Item(s)
Sharing a Home Computer
It is common to have a home computer shared by everyone in the family or by a number of students. Here are some tips that can help to protect a shared computer.
Control Access to Critical Information
You shall always grant access rights to your information on a need-to-know basis. Otherwise you face the security risks.
Observing UEMO
To contain the problem of unsolicited electronic messages, the Unsolicited Electronic Messages Ordinance ('UEMO') and the Unsolicited Electronic Messages Regulation ('UEMR') have been enacted in 2007. The UEMO regulates the sending of 'commercial electronic messages' with a 'Hong Kong link'.
Preventing Data Theft
At any time of day or night, a huge amount of data is being stored, retrieved and transferred in the average company or organisation. As a responsible user, you must know how to protect your data and prevent data theft from mobile devices.
Making Regular Backups
When you modify or remove important data on your computer, make sure that the data is backup.
Protecting Your Computer Assets
Your computer facilities are an important asset of your company; they also contain valuable information for you. Take the step to protect these assets.
Securing Company Data
The popular tools and technologies of modern daily life, like mobile phones, webmail, instant messaging services, removable storage media, and wireless access to the Internet, have given everyone the ability to easily carry and handle large amounts of data.
Handling Personal Information
Handle your personal information carefully while surfing the Internet.
Encrypting Your Data
Encryption is a process for scrambling and transforming data from an easily readable and understandable format (such as Plain Text) into an unintelligible format that seems to be useless and not readily understandable (known as Cipher Text).
Protecting Your Privacy
Many websites, like e-shopping sites, Internet community sites, and social networking sites collect your personal information. It is easy to give away too much personal information online without really meaning to. Check a site's privacy statement and how they use your personal information and how they handle your account and password.
Protecting against Phishing Attacks
Do not follow URL links from un-trusted sources or emails such as spam emails to avoid being re-directed to malicious websites by malicious links looking seemingly legitimate.
Avoiding Phone Fraud
Criminals also use the phone, and especially Internet phone systems, to trick people.
Protecting Your Notebook
You have to protect your notebook computer from stealing.
Safe Online Social Networking
Online social networking is the interaction with external websites or service based on participant contributions to the content. It has gained enormous popularity, especially among young people.
Using Blog Safely
A blog is a convenient place to write and publish an online dairy, and share views with cyber friends. However, be aware that the information you post on blogs will be read by anybody, including criminals who might make use of that personal information, if any for malicious purpose.
Handling Cyber-bullying
Cyber-Bullying generally refers to those acts of bullying that occur in the communication platforms implemented with information technology.
Using Instant Messaging Safely
The following tips are designed for end-users using Instant Messaging as regular communication tool.
Securing Your New PC
Don't forget to implement necessary security measures when you set up your new PC at home. Just taking a new computer out of the box and connecting it to the Internet is not safe. You are exposing your PC to a number of security risks, such as virus and malicious codes infection, spam emails, denial of service attacks, disclosure of personal or sensitive information and so on.
Disposal of Computing Devices
This section provides information on data deletion, and the proper way of disposing computers or storage media in order to prevent unwanted disclosure of information.
Information Security in Electronic Services
Electronic Services (e-Service) are the attainment and delivery of services through electronic media. E-commerce is also put under this category.
Data Breach
Data breach is a security incident in which data are accessed, altered, erased, stolen or leaked from a system without the consent of the system’s owner.