19th week-Safety and Security-1
19th week-Safety and Security-1
Providing security of places that containing personal data
If personal data is stored on paper media or on devices located in the territory of the data controllers, physical security measures must be taken against threats such as theft or loss of these devices and papers. Likewise, it is important to protect the physical environments containing personal data against external risks (fire, flood, etc.) with appropriate methods and to control the entry/exit to these environments.
πππClick Read more
18th week-The systems life cycle-2
Monitoring Personal Data Security
The systems of data controllers are mostly exposed to both internal and external attacks, cybercrime or malicious software, and despite various symptoms, this situation cannot be noticed for a long time and it may be late for intervention.
πππ Click
TECHNICAL MEASURES RELATED TO PERSONAL DATA SECURITY
Ensuring Cyber Security
The view that complete security can be achieved with the use of a single cyber security product to ensure personal data security is not always true. Because threats are expanding their spheres of influence by changing their size and nature day by day.
πππClick Read more
Python can operate with numbers using the usual mathematical operators, and some special operators, too.
πππClick Read more
HARDWARE–THE SYSTEM UNITS 1
Management of Relations with Data Processors
Some data controllers receive services from data processors to meet their information technology needs. Data controllers should make sure that the data processors provide at least as much security as their own personal data while receiving services. Because data processors are also responsible for ensuring the security of personal data, together with the data controller.
πππClick Read more
INTRODUCTION TO COMPUTERS 2
CLEAN OUT THE DUST
10 Steps to Cyber Security
πππClick Read more
INTRODUCTION TO COMPUTERS 1
DETAILS
What is a Computer?
HOW COMPUTERS WORK
TYPES OF COMPUTERS
THE HISTORY OF COMPUTERS
Reducing personal data as much as possible
Personal data should be correct and up to date when necessary, must be kept as required for the purpose they are processed.
However, in particular the data responsible for a long time, the data responsible for collecting a large amount of personal data, a part of these personal data is not correctly accurate with time and it can become data that has not served any purpose.
πππClick Read more
Determination of Data Security Policies and Procedures
The preparation of a good policy regarding personal data security will ensure that the risks in this context can be determined in advance and that measures will be taken consistently.
Correct and consistent policies and procedures to be determined regarding personal data security should be integrated into the work and operation of the data controller. When the policies and procedures cannot be prepared in a good and timely manner by the data controllers, when the problematic areas cannot be determined or when the existing security measures cannot be used, the personal data security level cannot be adequately provided.
πππClick Read more