Safety & Security
**Physical Safety**
1. **Electrocution:**
- *Causes:*
- Contact between liquid substances and electronic devices: Keep liquids away from
electrical equipment.
- Open cables: Ensure that cables are entirely insulated and packed, and use circuit
breakers or fuses to prevent electrical overload.
- *Prevention:*
- Keep liquids away from electrical equipment.
- Ensure insulated and packed cables.
- Use circuit breakers and fuses.
2. **Fire:**
- *Causes:*
- Socket overload: Ensure enough plug sockets, don't plug too many devices into the
same socket, and don't leave devices plugged in and unattended.
- Overheated equipment: Proper ventilation, keep flammable materials away, regular
equipment checks, use fire extinguishers, turn off or unplug devices when away.
- *Prevention:*
- Avoid socket overload.
- Ensure proper ventilation.
- Regularly check equipment.
- Use fire extinguishers in emergencies.
3. **Trailing Cables:**
- *Causes:*
- Unorganized/insecure cables: Use cable ties, keep cables packed, use wireless
devices where possible, regularly inspect cables.
- *Prevention:*
- Use cable ties.
- Keep cables organized.
- Use wireless devices.
- Regularly inspect cables.
4. **Heavy Falling Equipment:**
- *Causes:*
- Improperly secured equipment: Ensure equipment is properly secured and stable.
- Equipment on unstable surfaces: Keep equipment away from edges, regularly
inspect equipment and locations.
- *Prevention:*
- Ensure proper equipment securing.
- Keep equipment away from edges.
- Regularly inspect equipment.
**Data Protection**
**Principles of the Data Protection Act:**
1. Data processed lawfully, fairly, and transparently with clear consent.
2. Data collected for specific, explicit, and legitimate purposes.
3. Collect and retain minimum personal data necessary.
4. Data accuracy and regular updates.
5. Data not kept longer than necessary, securely deleted when not needed.
6. Organizations must protect personal data against unauthorized processing, loss,
destruction, or damage.
**Why Data Protection Legislation:**
- Protecting Individual Rights.
- Preventing Misuse of Personal Data.
- Promoting Trust.
- Encouraging Responsible Data Handling.
- Enabling Data Subject Rights.
**Threats that can be Avoided:**
- Identity theft.
- Privacy breaches.
- Misuse of information.
- Data sold to third-party companies.
- Individuals held to ransom over personal data.
- Personal data used to commit physical crimes.
**How to Avoid Inappropriate Data Disclosure:**
- Keep personal data confidential.
- Use privacy settings on websites.
- Strong passwords.
- Limit access to authorized individuals.
- Think before posting.
**eSafety**
**The Need for eSafety:**
- Awareness of not sharing personal information freely.
- Know how to act online to create a safe environment.
- Identify and avoid online scams, phishing, and fraudulent websites.
- Protect digital reputation.
- Control privacy settings on social media.
- Avoid explicit or harmful content online.
- Engage in online gaming responsibly.
- Protect devices from malware and online threats.
**Safety Suggestions:**
- Use trusted websites.
- Utilize age-appropriate search engines.
- Never reveal personal information.
- Be aware of email dangers.
- Block and report unwanted content on social media.
- Be cautious about meeting online contacts face-to-face.
- Do not distribute inappropriate content.
- Parents should be aware of online activities.
**Protection of Data**
**Threats to Data:**
- Hacking.
- Phishing.
- Pharming.
- Smishing.
- Vishing.
- Viruses and malware.
- Card fraud.
**Protection Techniques:**
1. **Biometrics:**
- Use of physical or behavioral traits for access control.
2. **Digital Certificate:**
- Attests to a website's reliability and veracity.
3. **Secure Socket Layer (SSL):**
- Ensures secure communication between a client and server.
4. **Encryption:**
- Protects data on various platforms.
5. **Firewall:**
- Monitors and manages network traffic.
6. **Two-factor Authentication:**
- Requests two forms of identification.
7. **User ID and Password:**
- Standard authentication technique.
- Use secure passwords, change them frequently.
*Note: Font changed to Calibri.*