Skip to main content

How do I protect my data?

 According to Alexander Auzan , it is necessary to protect personal data without rejection, through global digital platforms. These are, in particular, car sharing, rental, classifieds, online hypermarkets and other aggregators. On the one hand, digital platforms must actively compete with each other for users. On the other hand, it is to build ecosystems from applications and services.

Platforms should have simple and completely transparent user agreements that outline all data protection measures and how they are used. Agreements are drafted in accordance with uniform standards, and their compliance is monitored by the digital ombudsman. In parallel, it is necessary to improve legislation in the field of personal data protection, to increase fines for their leakage.


It is necessary to work with the users themselves: to increase their digital literacy, to provide the right to be forgotten - that is, the removal of information about oneself on websites and in online applications.

The Computer Systems Analyst will collaborate with personnel and management staff to clarify, prioritize and design alternatives. 

Boris Glazkov , on the other hand, believes that the best way to protect data is decentralization: not online platforms, but a variety of local services. This fits with the principle of "do not store eggs in one basket." But the problem is that all data has an entry and exit endpoint. For example, a smartphone, where we store data and access to all services used.


A possible solution is a kind of consent platform. A person should have not only the right to be forgotten, but also to consent. First, he can consent to the use of his data, and then withdraw it at any time. The state can act as an operator.

Comments

Popular posts from this blog

Cloud-based DDoS Protection

Don’t let the DDoS attack interrupt your business operation for reputational and financial loss. Use cloud-based denial of service protection to prevent getting hacked. Denial-of-service attack definition Anyone with bad intentions can hire a hacking service for a targeted attack. Malware tools are accessible, easy to use, and effective. Not just large companies, but cybercriminals are looking for any size vulnerable victims, including personal blogs, e-commerce shops, small to medium businesses. One type of attack is particularly dangerous and increasingly common. It is called distributed denial of service attack, or DDoS for short. In a DDoS attack, a set of compromised, distributed systems –could be servers, home computers, Internet-of-Things devices, anything connected to the internet– is used to overwhelm a targeted system with a flood of requests, to the point in which the attacked system gets saturated enough to refuse to work. Since the flood comes from many scattered

What are the English proficiency levels?

 The classification used by language courses - basic, intermediate and advanced - is not exactly related to the levels of English proficiency that are based on the categorization of the European Common Framework or Framework. This guide considers the international standard ranking, which divides the degree of knowledge of the language into: See more:  Amazon Saheli Quiz Answers A1 (beginner) A2 (basic) B1 (intermediate) B2 (post-intermediate) C1 (advanced) C2 (proficient) Before you make any assessment, no matter how much you have prepared for it, pre-tests are recommended to find out where you would be classified if you took the test at that time. If your rating is below B2, in little or nothing a proficiency certificate will help you. Although many foreign universities consider the B1 level sufficient, the classes are already so complex even for those who have a perfect level of understanding of English, imagine for those who do not speak the language. Professionally speaking, below

What are the benefits of purchasing a SaaS model?

 Knowing what SaaS is and deploying this technology in your business will establish quite a differentiator . After all, companies that host their cloud services can increase the degree of efficiency applied to the processes, improving the results obtained.  So, do you want to know the other benefits that this service model provides? Just keep following this post! 1. More accurate software licensing costs Software licensing costs are often among the main factors that contribute to the weight of the IT sector in a company's budget. Therefore, reducing this expense (or making it more precise) is an objective that is part of the daily life of any IT manager. In this sense, SaaS is considered one of the best alternatives on the market. With SaaS, the company pays only for the number of active licenses. This dramatically eliminates spending on software licenses that are not in use. With this, the company can prepare itself in advance in case of projects or major structural changes. The s