The 5 rules of privacy and cybersecurity

Eaton has set out five key rules companies and users should observe regarding concerns related to privacy and cybersecurity.

Nine months after the General Data Protection Regulation (GDPR) entered into force, Eaton has drafted a list of five key rules companies and users should follow to observe third-party privacy and cybersecurity.

These are:

• data values (awareness of the data used online);

• company responsibilities (a notion of the legal framework);

• a life-long marriage – it is worth noting here that data privacy is not the same thing as cybersecurity but they share the same DNA;

• good judgement (delete any apps you no longer use);

• good practices (use secure passwords and do not open emails from unknown or suspicious sources).

If you want to browse the internet securely, make sure you follow these guidelines.

Take a look to our services

Fulfillment
E-Commerce
Data Solutions
IT Services

Contact us

Request an offer or just question us about any of our services
Click Here
What you can read

Take a look to our services

Fulfillment
E-Commerce
Data Solutions
IT Services

Contact us

Request an offer or just question us about any of our services
Click Here
Usamos cookies para personalizar conteúdos e anúncios, para fornecer recursos de mídia social e para analisar o nosso tráfego. Também compartilhamos informações sobre o uso do nosso site com os nossos parceiros de mídia social, publicidade e análises. Melhoramos os nossos produtos e publicidade utilizando o Microsoft Clarity para ver como utiliza o nosso sítio Web. Ao utilizar o nosso sítio, o utilizador concorda que nós e a Microsoft podemos recolher e utilizar estes dados. A nossa política de privacidade contém mais pormenores. View more
Cookies settings
Aceitar
Rejeitar
Politica de Privacidade
Privacy & Cookies policy
Cookie nameActive
Save settings