3.1.2.5 Lab - Who Owns Your Data
3.1.2.5 Lab - Who Owns Your Data
3.1.2.5 Lab - Who Owns Your Data
Objectives
Explore the ownership of your data when that data is not stored in a local system.
Part 1: Explore the Terms of Service Policy
Part 2: Do You Know What You Signed Up For?
Background / Scenario
Social media and online storage have become an integral part of many people’s lives. Files, photos, and
videosare shared between friends and family.Online collaboration and meetings are conducted in the
workplace with people who are many miles from each other. The storage of data is no longer limited to just
the devices you access locally. The geographical location of storage devices is no longer a limiting factor for
storing or backing up data at remote locations.
In this lab, you will explore legal agreements required to usevarious online services. You will also explore
some of the ways you can protect your data.
Required Resources
PC or mobile device with Internet access
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 3 www.netacad.com
Lab–Who Owns Your Data?
Yes, I have an account with an online service provider and also I have read the terms and conditions for those
application most of the websites asks us to provide our basic information and verify our information is
correct or not.
The Data Use Policy is a compulsory legal disclosure of how a website operator collects, retains and shares
personally identifiable information. In other words, it's often a list of ways your personal data is not private
and under their control.
b. What are the privacy settings?
Privacy settings are controls available on many social networking and other websites that allow users to limit
who can access your profile and what information visitors can see.
c. What is the security policy?
Security policy is a definition of what it means to be secure for a system, organization or other entity. For an
organization, it addresses the constraints on behavior of its members as well as constraints imposed on
adversaries by mechanisms such as doors, locks, keys and walls.
d. What are your rights regarding your data? Can you request a copy of your data?
You have the right to ask an organization whether or not they are using or storing your personal
information. You can also ask them for copies of your personal information, verbally or in writing. This is
called the right of access and is commonly known as making a subject access request or SAR.
e. What can the provider do with the data you upload?
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 3 www.netacad.com
Lab–Who Owns Your Data?
http://www.legalgenealogist.com/blog/2014/02/24/terms-of-use-change-dropbox/
Review the articles and answer the following questions.
a. What can you do to protect yourself?
Make It Harder for Other People to Get Credit in my Name. Put Passwords on Your Devices. Use Stronger
Passwords. Don't Do Your Online Shopping and Banking at the Local Cafe.
b.. What can you do to safeguard your account and protect your data?
Make It Harder for Other People to Get Credit in Your Name. Put Passwords on Your Devices. Set up Two-Factor
Authentication on Your Financial and Email Accounts. Don't Give Out Personal Information on the Phone or Through Email
or Text.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 3 of 3 www.netacad.com