Notice

This multimedia story format uses video and audio footage. Please make sure your speakers are turned on.

Use the mouse wheel or the arrow keys on your keyboard to navigate between pages.

Swipe to navigate between pages.

Let's go

Data protection and security_25min

Logo https://story.1001wahrheit.de/data-protection-and-security_25min

FOUNDATIONS OF DATA PROTECTION

Goto first page
Address, date of birth, bank account data – a lot of information about you is stored as a matter of course. But what happens when your data is passed on to others? How can you protect your own data?

The term “data protection” does not mean the protection of data itself. “Data protection” wants to protect the people whose data is collected, stored and used. Data protection regulations are laid down in laws. They are designed to prevent people from losing control of their personal data. People should always be able to decide for themselves how their data is used. This is called informational self-determination. 
Goto first page
Close
Before/after view

Before and after comparison
At first glance it is not always clear which data we leave behind on the Internet. However, we often disclose very personal data.

Use the before and after comparison to find out which information is available about Anna-Lena on the Internet.
Goto first page
Data protection starts with the device that is being used. Keep your smartphone, PC or tablet software up to date. You can prevent unauthorized access by using PINs, passwords or fingerprint or face scanners. Anti-virus programs on mobile devices also offer protection.

Goto first page
Close
Virtually all Internet services are password protected against unlawful access. Therefore, it is important to choose a password that reliably protects your data. The video explains how a secure password is structured and why “1234” should not be your password.
Goto first page
A quick e-mail check while you are underway? Public networks are a convenient way to connect to the Internet. However, there are a few things you should be aware of.

Find out more on the next page!
Goto first page

Be careful when using open networks

Open networks in cafés or train stations are fast and convenient, but can be unsafe. Personal data can be accessed via an unsecured connection. E-mails or services that you need to log in to can no longer be used securely.

No Automatic Wi-Fi Connections

Disable automatic Wi-Fi connections when you are out and about. Hackers can modify WLAN networks so that mobile devices can connect to them without your permission. This allows them to read your messages, for example.

Secure Connections

Only use public websites that encrypt communication with SSL connections. You can recognize this by the name "https" before the actual link. These connections prevent, for example, login data from being spied on.

Disable File Sharing

Windows and Mac OS allow you to connect computers in a network. This allows files to be exchanged between them. This is also called “file sharing”. In a public network, however, file sharing can allow strangers to gain access to your personal data. Disable file sharing in your device settings as soon as you browse publicly.

Goto first page
Stay in control and be proactive! You have learned about many possibilities in this module: change the privacy settings of your social networks or protect your devices. Data protection is your right – use it!

You can find a summary of the module in the download section.
Goto first page
Scroll down to continue Swipe to continue
Swipe to continue