Data Privacy Day 2016: Respecting Privacy, Safeguarding Data and Enabling Trust

Posted by:

Data Privacy Day, held on January 28, creates awareness about the importance of privacy and protecting personal information. Above all, this day raises awareness of data protection best practices. Data Privacy Day promotes the development of tools that allow individuals to control their personally identifiable information. This day is an extension of the European Data Protection Day. Data Protection Day commemorates the Jan. 28, 1981, signing of Convention 108, the first legally binding treaty on privacy and data protection.

The National Cyber Security Alliance (NCSA), a nonprofit, public-private partnership, spearheads Data Privacy Day. The NCSA is dedicated to promoting a safer, more secure and more trusted Internet. This day is the signature event in the NSCA’s privacy awareness and education effort. Year-round, NCSA educates consumers on how they can own their online presence. In addition, NCSA shows organizations how privacy is good for business. NCSA’s privacy awareness campaign is an integral component of STOP. THINK. CONNECT. ‒ the global online safety, security and privacy campaign.

Here are a few tips from the National Cyber Security Alliance to help safeguard your data and maintain your privacy.

Share with Care

  • What you post can last a lifetime: Before you post something online, think about who will see what you post, and how it will be received, now and in the future.
  • Own your online presence: Set the privacy and security settings on web services and devices to your comfort level for information sharing. It’s ok to limit how and with whom you share information.
  • Be aware of what’s being shared: Be aware that when you share a post, picture or video online, you may also be revealing information about others. Be thoughtful when and how you share information about others.
  • Post only about others as you have them post about you: The golden rule applies online as well.

Personal Information Is Like Money. Value It. Protect It.

  • Think before you act: Be wary of communications that implore you to act immediately, offer something that sounds too good to be true or ask for personal information.
  • Get two steps ahead: To prevent unauthorized access, turn on two-step verification or multi-factor authentication wherever offered.

Information provided by, powered by the National Cyber Security Alliance.


About the Author:

Trofholz Technologies is a Woman-Owned; Veteran-Owned Small Business located in Sacramento, California, just a short drive from downtown. Since 2002, Trofholz has developed a solid performance reputation securing critical infrastructures by successfully completing multiple large, enterprise systems for federal clients across the nation and overseas. This federal experience provides our local California state and commercial clients with a small business vendor that has large scale experience. We specialize in Physical Security, Information Security, and related IT Services. Our team ensures that we meet all regulatory compliance and mission ready requirements to protect critical infrastructure assets. With a dedication to quality, Trofholz is devoted to maintaining and constantly improving our ISO 9001:2015 Certification and customer satisfaction.
  Related Posts