As the leader of a global privacy team, I promote privacy best practices every day, and I always welcome the opportunity to talk about the importance of privacy to individuals and organizations. Did you know that January 28 is Data Privacy Day? The annual celebration is becoming more popular and helps serve as a reminder that privacy matters each and every day.
Everyone has a role to play when it comes to privacy because everyone has personal data—whether it is their own personal data or the personal data of others. Poor privacy practices can lead to unwanted access to and misuse of personal data. This can result in harm and mistrust. Everyone should have a reasonable degree of privacy knowledge to help reduce these risks.
Here are some quick tips to keep in mind.
Privacy is about more than just sensitive details
When I ask people who don’t work in privacy what they think privacy programs and laws protect, they often refer to health information, tax records or bank accounts. While all of those are correct, personal data includes many other types of information such as a resume uploaded to a job site, use of a fitness or games app, internet search and browsing history and social media activity, including photos, likes and comments. It is important to be aware of the many types of personal data you may share throughout the day in many different environments, whether online or in person.
Bad security practices can put your privacy at risk
You have likely heard this guidance before, but it’s worth repeating. Don’t use common, easily guessed passwords, the same password for many (or all) websites, or share passwords with others—even people you may know and trust. Why? If your account is compromised on one site, then it opens the door for unauthorized access to your other accounts with a shared password. The same holds true for writing passwords down or storing them in text form on your phone. You should also pay attention to your surroundings, such as sharing sensitive information on the phone in a public area or sharing more information than you need to complete the task. When you handle personal data with care, you reduce the risk of the information being compromised.
Browser beware
Pay close attention to the websites you visit, even those that might not expressly ask for any personal information. If you don’t see a privacy notice on the site, that may be a sign that the website owner has not focused on privacy compliance. Be thoughtful about what personal information you share on the internet and consider whether you are sharing in a section of the website open to the public (such as a chatroom) or privately (such as through a secured form). You’ve likely seen cookie notices asking you to confirm or accept a website’s use of cookies to proceed. Take time to review the options presented to you, as they often determine how the site stores and uses your data.
While individuals can take steps, such as the tips above, to protect their personal information, organizations collecting and using personal information have privacy obligations they must meet. Failure to comply with global privacy laws and reasonable privacy practices puts those organizations at risk for fines, penalties and reputational damage.
Learn more
To learn more about privacy, risk and how companies like Red Hat manage their privacy compliance obligations, check out this episode of Security Detail where I share my perspective.
Technology will continue to evolve and this will lead to even greater privacy implications. Companies and individuals must remain vigilant about taking appropriate measures to protect personal information. You play a critical role in protecting the privacy of information that may be important to you, your friends and loved ones, or your employer. Keeping privacy top of mind is a great way to play your part.
Über den Autor
Clarence Clayton is Senior Manager of the Global Privacy Team at Red Hat. He has been with the company since 2013 and leads a team responsible for the management, implementation and growth of Red Hat’s Global Privacy Program and helping ensure the company complies with global data privacy laws. He is a Certified Information Privacy Manager (CIPM), Certified Data Privacy Solutions Engineer (CDPSE) and Project Management Professional (PMP). With over twenty years of experience in Business Systems Analysis and Program Management, he has a demonstrated track record of success across various industries including Technology Services, Consulting and Government.
Clarence thrives on challenges and always strives to bring a positive and infectious energy to any endeavor. He is a founding member and former Chair of B.U.I.L.D., a Red Hat Diversity, Equity and Inclusion community. He led the Program Management Office supporting Red Hat’s acquisition by IBM and was a 2019 winner of the General H. Hugh Shelton Chairman’s Award, one of Red Hat’s highest honors. In his spare time, Clarence is a news, politics and pop culture junkie, passionate about genealogy, and an avid college basketball and tennis fan.
Mehr davon
Nach Thema durchsuchen
Automatisierung
Das Neueste zum Thema IT-Automatisierung für Technologien, Teams und Umgebungen
Künstliche Intelligenz
Erfahren Sie das Neueste von den Plattformen, die es Kunden ermöglichen, KI-Workloads beliebig auszuführen
Open Hybrid Cloud
Erfahren Sie, wie wir eine flexiblere Zukunft mit Hybrid Clouds schaffen.
Sicherheit
Erfahren Sie, wie wir Risiken in verschiedenen Umgebungen und Technologien reduzieren
Edge Computing
Erfahren Sie das Neueste von den Plattformen, die die Operations am Edge vereinfachen
Infrastruktur
Erfahren Sie das Neueste von der weltweit führenden Linux-Plattform für Unternehmen
Anwendungen
Entdecken Sie unsere Lösungen für komplexe Herausforderungen bei Anwendungen
Original Shows
Interessantes von den Experten, die die Technologien in Unternehmen mitgestalten
Produkte
- Red Hat Enterprise Linux
- Red Hat OpenShift
- Red Hat Ansible Automation Platform
- Cloud-Services
- Alle Produkte anzeigen
Tools
- Training & Zertifizierung
- Eigenes Konto
- Kundensupport
- Für Entwickler
- Partner finden
- Red Hat Ecosystem Catalog
- Mehrwert von Red Hat berechnen
- Dokumentation
Testen, kaufen und verkaufen
Kommunizieren
Über Red Hat
Als weltweit größter Anbieter von Open-Source-Software-Lösungen für Unternehmen stellen wir Linux-, Cloud-, Container- und Kubernetes-Technologien bereit. Wir bieten robuste Lösungen, die es Unternehmen erleichtern, plattform- und umgebungsübergreifend zu arbeiten – vom Rechenzentrum bis zum Netzwerkrand.
Wählen Sie eine Sprache
Red Hat legal and privacy links
- Über Red Hat
- Jobs bei Red Hat
- Veranstaltungen
- Standorte
- Red Hat kontaktieren
- Red Hat Blog
- Diversität, Gleichberechtigung und Inklusion
- Cool Stuff Store
- Red Hat Summit