Personal Data Security | Data Security for Everyone
The concepts of hacking — data stealing and hacking — cyber crime, which have become a daily routine, now frequently remind us of the importance of the concept of data security. Cyber Security, which has become one of the most popular concepts of today, although it reflects on society with positive behaviors, unfortunately it also presents a negative evolution to people.
What is Personal Data Security?
Personal data security at the international level covers general principles to ensure security and confidentiality in the collection, processing, storage and use of individuals’ personal information. Personal data security is shaped around standards and legal regulations developed to protect individuals’ private lives, defend their data against unauthorized access, and secure the right to process information in a secure environment.
Key concepts and practices related to personal data security internationally include:
GDPR (General Data Protection Regulation):
GDPR, implemented in the European Union, provides a general framework for the processing and protection of personal data. This regulation is designed to give individuals more control over their data use and impose certain obligations on companies.
Personal Data Definition:
At the international level, personal data refers to data that directly or indirectly identifies individuals and contains information about these individuals. It includes directly identifying information such as name, surname, address, telephone number, as well as more specific information such as online tracking data, genetic data and biometric data.
Information Security Standards:
International standards guide organizations and companies to securely process and store personal data. Standards such as ISO/IEC 27001 aim to establish and maintain information security management systems.
Informed Consent and Consent:
Personal data security relies on individuals providing informed consent and assent. This is important to ensure that data collection and processing processes are transparent and fair.
Data Owner Rights:
International standards support individuals to have greater control over their personal data. This includes data subject rights such as the right of access, the right to rectification, the right to erasure.
Data Security and Breach Notification:
Personal data security includes implementing data security measures and responding quickly and effectively in the event of a possible security breach. Additionally, in the event of such a breach, notification to the relevant parties may be required.
International Cooperation and Transfer Limitations:
International transfers of personal data are subject to certain rules to ensure compatibility and the level of data protection between different countries. Regulations such as GDPR govern the secure transfer of personal data between countries.
Personal data security is a comprehensive framework developed based on these basic principles to ensure the security of data of individuals and companies, protect privacy and take measures against unauthorized access. In this regard, complying with relevant legal regulations and standards helps organizations and individuals strengthen personal data security.
What is Personal Data?
Our personal data is simply;
our date of birth,
If we have a middle name — Surname before marriage (may be important data)
Identity Number — Passport Number
Identity Information — Serial Number, etc. (High Security)
Degree Relative Information (Relatives — relatives’ information)
Close Friend Information (An important data in some cases)
Home Address Information
Personally Identifiable Information (Height, Weight, Hair Color, Skin Color, Tattoo, Body Scar, etc.)
Personal Phone Number
Personal E-Mail Address (E-mail address used on mobile devices or personal computers)
Bank Information (Bank name and salary information, invoice information, account information, etc.)
Voice Recording — Log Recording — IP Addresses — Mobile Device Features
Personal data has many headings and subheadings.
To use a more descriptive expression, we can say that the concept of personal data is a concept that covers all data regarding the sociological, cultural and life of the person. Information such as data about the vehicle you use, the university you graduated from, the market you shop at, the brand of coffee you drink can be examples of your personal data.
How Can We Protect Personal Data?
We use our personal data on many platforms and in daily life. For example, E-Commerce platforms, job search process, socialization, mobile applications, business and education, grocery shopping, cargo, etc.
We can give a simple explanation of the two most important topics of protecting our personal data: the first is individual security measures, and the other is corporate — company — tool-based security measures.
Corporate Security Measures
Corporate security measures are a subject that needs to be examined in detail and under many headings, so we will continue with individual security measures.
Individual Security Measures
I will provide you with bullet points on how we can protect our personal data.
Choose passwords that are as strong as possible and do not provide too much personal information on the platforms. For example, as a recommendation, do not fill in optional form information. Do not provide unnecessary information and be careful about the platforms you subscribe to.
Choose platforms with SSL security. Many browsers now warn you about platforms with HTTP internet connection, but make sure that the link you click on is HTTPS and green.
Examine websites and applications. You can review the comments, the website’s about us articles, contact page, payment infrastructure (payu, etc, .. ) and company — company — commercial name information.
You should check your accounts and memberships regularly. You should make sure that any memberships you do not use are deleted.
You should be careful about social media. You should pay attention to people you do not know and to your account’s privacy settings, message settings, and connection requests. We recommend that your account be private.
You should be more careful about open and unsecured Wi-Fi networks.
You should keep the computer and mobile device software you use up to date. You can use official antivirus software.
You can use double-factor authentication and data encryption. You can store your data with an external disk or USB type storage method, or you can choose to protect it with a method without an internet connection.
You should be careful about the applications you subscribe to. Applications request many permissions from you on your device. You should be careful about applications that are outdated and that you do not use.
You should be careful against e-mail attacks and the e-mails sent to you. You should act consciously and, if necessary, contact official institutions as a priority.
You should be careful when sharing photos, selfies and location information. You should be careful about your WI-FI names, full address information, and the information you share on social media.
You should be careful not to share or use your personal e-mail information or even your personal mobile phone number or personal account information as much as possible.
Such precautions you will take will ensure that you use your data as safely as possible, but it will not be possible to say that it is risk-free to prevent your data from being stolen. The platforms you are a member of, the applications you use, and the websites may be attacked and many data leaks and data losses may occur.
If the platform you are a member of is attacked, you can contact the platform administrators. Then, respectively,
Two-Step Verification (2FA):
Two-step verification requires you to not only use a password to log into your account, but also another verification method (e.g. SMS code, mobile app verification). This ensures that your account has an additional layer of security.
Approving Trusted Devices:
Use the feature to identify and approve devices accessing your account. In this way, you can only log in to your account from devices you know and trust.
Update Your Account Information:
If your username, password or other account information has been affected as a result of the attack, change your password immediately. Be careful to use a strong, unique password.
Review Security Notices:
If the site has sent you a notification about a security breach, review the notification carefully. Follow the security measures offered by the site.
Check Privacy Settings:
Check the site’s privacy settings for account privacy and security. You can make your account more secure by updating these settings.
Beware of Email and Suspicious Messages:
Beware of emails that arrive after the attack, especially suspicious or unexpected emails. Be careful not to open these emails or examine their content.
Precautions Against Identity Theft:
If you are concerned about your personal information as a result of an attack, consider the precautions that can be taken against identity theft. Checking your credit reports regularly can help with this.
Keep Security Software Updated:
Regularly update antivirus and security software on your computer. This can make your computer more protected against malware.
Be Careful on Social Media:
If you find information about the attack on social media, get confirmation from official sources to verify this information. Be wary of misleading information circulating on social media.
Take Stronger Security Measures:
Take stronger security measures to minimize future security risks. You can add additional layers of security, such as using two-factor authentication.
Know Your Privacy Rights:
Learn your rights regarding how you can protect your personal data and make requests, according to the relevant legal regulations.
Monitoring Account Activities:
By checking your account activity regularly, you can increase your chances of spotting any activity or login you don’t recognize.
Links and Addresses to Read About Useful and Personal Data;