10 tips to protect yourself in social networks

10 tips to protect yourself in social networks

Some 136,985 Spanish Internet users have been affected by the possible leakage of data uncovered in the Facebook case, according to the Spanish Agency for Data Protection . The social network has also admitted that nearly 87 million accounts have suffered the leak of personal data that allowed the Cambridge Analytica consultant to access the personal information of users and their contacts with the help of the application Thisisyourdigitallife. And “the Facebook case could be repeated,” warns Lucía Caro, an expert lawyer in the law of new technologies at Gaona Abogados . But is it possible to protect personal data and identity?on social networks? This specialist offers its ten tips to achieve this: among them, configure the privacy of networks well and know how to erase our fingerprint .

1. What data do apps and social networks have?

“Setting the privacy of social networks is key to guaranteeing our digital security”

The Facebook case has uncovered the collection of personal data in this social network through the app Thisisyourdigitallife, which had access to the profile of the user and also that of his friends.

European legislation on data protection is also applicable to the giant Facebook, but the consent of the user has been the basis for realizing legitimate access to personal data : the social network Facebook requests the acceptance of its privacy policy to any user who want to join the platform. Review the privacy policy well, since it is at the moment of the acceptance of these terms when we are consenting to our data being treated and stored.

2. Fraudulent apps exist

The access of the applications to our data is limited, and can not cover any treatment or assignments to third parties. If these limits are crossed, as it seems to have happened in the case of Facebook-Cambridge Analytica, you should know that the processing of the data is no longer legitimate.

3. The Facebook case can be repeated

The Cambridge Analytica scandal could be repeated, or repeated without having jumped to the media . Know that it is a likely option, considering how lax the controls are to which these applications are subject.

4. Configure your privacy options

The basis to guarantee the digital security of the person is the full knowledge of what entails access to certain applications, programs, websites, online subscriptions, etc. Privacy policies and cookies policies are everywhere, so if we want to guarantee the security of our data, in the first instance we must understand what we consent to be done with them. The first thing is to understand the treatment that will be given to the data, the purpose and the assignment to third parties .

And, in addition, it is essential to configure privacy in social networks , especially those that make public or share personal information with third parties. The level of privacy offered by digitized products should be a criterion for choosing it.

5. Erase your fingerprint is difficult

“Social networks allow us to erase our profile in a definitive way, but to completely eliminate our fingerprint is not so simple”

Social networks already allow us to permanently delete our profile. On the one hand, there is the deactivation of the profile, which does not entail the suppression of personal data. On the other hand, there is the deletion of the profile , which does suppose the elimination of the protected data of the user from the files of the company.

However, the history of messages with third parties does not disappear , because it would be in the chat of the receiver of the same. And neither are data that has been transferred from the third-party file removed . In this case, the user is responsible for requesting the social networks and the companies to which the data has been assigned their cancellation and final elimination; Doing a complete cleaning is an arduous and difficult task, because in most cases the user does not know who they are.


6. How to protect your digital heritage?

Like the traditional inheritance, the digital inheritance is the legal act by which a person who dies transmits his assets, rights and obligations to another or other people, who are called heirs, with the particularity that this heritage is exclusively the acquired within the technological field.

To protect the digital heritage there are several tools . It can be referred to in the notarial will document, appointing an executor to execute the dispositive acts that we consider in his case, such as deactivation of social networks, assignment of digital goods, etc. Another option is to opt for a company specializing in these services: there are very cheap applications that manage social networks and digital heritage and are responsible for carrying out all the actions that were previously requested and left ready for the case in which a misfortune.

7. Update your programs

Among the most prominent dangers of online browsing are tracking, viruses and phishing , a cybercrime for theft of personal information, such as stealing your computer’s password .

To avoid this, the most effective thing is to keep the programs updated and have a quality antivirus. In addition, you must download applications or programs always from the official site, otherwise they are likely to be infected with viruses.

8. Avoid public Wi-Fi

Browsing through a public Wi-Fi network is better avoided because of the risk involved. But if you connect, it is advisable to do so using a virtual private network.

9. Buy online safely

Also, if you are buying online or you will be given sensitive information, you should always make sure that the web page contains the consonants “https” instead of “http” , since they are pages with a higher security standard.

10. And understand that 100% digital protection does not exist

The full protection in the digital environment is complicated . However, it is possible to minimize the information and the trail that we leave, as well as to prevent and minimize the risks of unwanted attacks by third parties. For this, it is essential to know and adapt to our needs the privacy settings offered by digital products and services; keep the programs and software updated ; provide only the information that is essential; navigate on pages that are secure; and install a good antivirus.

Leave a Reply

Your email address will not be published. Required fields are marked *