Notice

This multimedia story format uses video and audio footage. Please make sure your speakers are turned on.

Use the mouse wheel or the arrow keys on your keyboard to navigate between pages.

Swipe to navigate between pages.

Let's go

Data protection and security_45min

Logo https://story.1001wahrheit.de/data-protection-and-security_45min

FOUNDATIONS OF DATA PROTECTION

Goto first page

Address, date of birth, bank account data – a lot of information about you is stored as a matter of course. But what happens when your data is passed on to others? How can you protect your own data?

The term “data protection” does not mean the protection of data itself. “Data protection” wants to protect the people whose data is collected, stored and used. Data protection regulations are laid down in laws. They are designed to prevent people from losing control of their personal data. People should always be able to decide for themselves how their data is used. This is called informational self-determination. 

Goto first page
Close
Before/after view

Before and after comparison

At first glance it is not always clear which data we leave behind on the Internet. However, we often disclose very personal data.

Use the before and after comparison to find out which information is available about Anna-Lena on the Internet.

Goto first page

Data protection starts with the device that is being used. Keep your smartphone, PC or tablet software up to date. You can prevent unauthorized access by using PINs, passwords or fingerprint or face scanners. Anti-virus programs on mobile devices also offer protection.

Goto first page
Close

Virtually all Internet services are password protected against unlawful access. Therefore, it is important to choose a password that reliably protects your data. The video explains how a secure password is structured and why “1234” should not be your password.

Goto first page

A quick e-mail check while you are underway? Public networks are a convenient way to connect to the Internet. However, there are a few things you should be aware of.

Find out more on the next page!

Goto first page

Be careful when using open networks

Open networks in cafés or train stations are fast and convenient, but can be unsafe. Personal data can be accessed via an unsecured connection. E-mails or services that you need to log in to can no longer be used securely.

No Automatic Wi-Fi Connections

Disable automatic Wi-Fi connections when you are out and about. Hackers can modify WLAN networks so that mobile devices can connect to them without your permission. This allows them to read your messages, for example.

Secure Connections

Only use public websites that encrypt communication with SSL connections. You can recognize this by the name "https" before the actual link. These connections prevent, for example, login data from being spied on.

Disable File Sharing

Windows and Mac OS allow you to connect computers in a network. This allows files to be exchanged between them. This is also called “file sharing”. In a public network, however, file sharing can allow strangers to gain access to your personal data. Disable file sharing in your device settings as soon as you browse publicly.

Goto first page

Data protection will continue to affect many areas of our everyday lives in the future. By 2020, the “Internet of Things” will have connected up to fifty billion electronic devices – be it the refrigerator, the navigation device or the automatic vacuum cleaner. The manufacturers of these devices should, according to data protectors, pay attention to users’ privacy in the development and production of their products. This means that users should know exactly which data is collected when and how it is encrypted. The “Privacy by Design” requirement is already taken into account in the general data protection regulation of the EU (GDPR).


Goto first page

Stay in control and be proactive! You have learned about many possibilities in this module: change the privacy settings of your social networks or protect your devices. Data protection is your right – use it!

You can find a summary of the module in the download section.

Goto first page
Scroll down to continue Swipe to continue
Swipe to continue