Module 2 – Protecting personal data & privacy

Online world gives an unlimited access to the information, but it might also cause the leakage of personal data. In order to preserve privacy basic rules should be respected. These rules are based on media literacy.

Media literacy guides the researcher through the responsible way of internet usage. One of the key elements is the respect of personal identity. Taking photos during the event keeps the memories but can violate someone’s privacy. Before the event make sure to collect the agreement from the participants to  have their photos taken. Keep in mind that if the participants are under 18 y.o. , the parent’s permission or the permission of the official representative is needed. This topic is extremely sensible while taking group photos. Based on the privacy law, community members can ask to blur their photo or to delete the photo. This right should be respected. 

If the data leakage took place, it is always possible to request the erosion of information and to apply for the reimbursement if the rights were violated. 

EU information rules ensure the safety of your own information at whatever point they are gathered – for instance, when you purchase something on the web, you can request the information about the operation. These standards apply to providers that offer services in the EU, like Facebook or Amazon, at whatever point these organizations solicitation or re-utilize the individual information of people in the EU. 


By the end of this topic, you will be able to:

  • Protect your data
  • Anonymize your data to keep privacy

REFERENCES – Data protection and online privacy


Explorer level

In order to keep control over information keep an eye on your passwords and use a key generator to make sure that all your passwords are unique. Log out of social media every time you use public computers to make sure that no one is able to have access to your personal data.Don’t follow suspicious links that are sent to your email. 

 One of the ways to minimize data traction by third-parties is to browse in the Incognito mode in your browser. This mode helps to minimize the information shared with searching engines.  


Read more

Expert level

Suspicious links threaten the profiles and can cause a potential digital assault, explicitly a phishing. The objective of a phishing assault is to utilize email to trick the user to follow the link and as a result to get private information. Phishing is considerably more focused to the individual client or business. The suspicious connections in these messages are quite often masked to engage with the user via web search tools that individuals utilize each day. In spite of the fact that cybercriminals have gotten progressively more refined, there are approaches to spot suspicious connections and protect your digital privacy.


Read more