Merge pull request #209 from Lissy93/addition/watermark-documents

Adds recomendation to watermark digitial documents
This commit is contained in:
Alicia Sykes 2022-10-29 22:32:38 +01:00 committed by GitHub
commit 290eda7f5b
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 4 additions and 1 deletions

View File

@ -458,6 +458,7 @@ Strong authentication, encrypted devices, patched software and anonymous web bro
--- | --- | ---
**Destroy Sensitive Documents** | Recommended | Instead of disposing of paperwork in the trash, you should first shred it, or take steps to redact any personally identifiable information. This will help protect you from identity theft, reduce the chance of blackmail and keep confidential data confidential
**Opt-Out of Public Records** | Recommended | People search websites (such as [WhitePages](https://www.whitepages.com), [Spokeo](https://www.spokeo.com) and [Radaris](https://radaris.com)) list public records, including: full name, date of birth, address, and phone number. Some sites go further, showing place of work, previous addresses, criminal records and photos. This is bad for privacy, and can make you a target for fraud. It is recommended to contact these sites, and opt-out from these listings. Methods for doing so range considerably between countries and states, see [Personal Data Removal Workbook](https://inteltechniques.com/data/workbook.pdf) by Michael Bazzell or [Word Privacy Forum Opt-Out Guide](https://www.worldprivacyforum.org/2015/08/consumer-tips-top-ten-opt-outs/) or The LifeWire [Remove Personal Information Guide](https://www.lifewire.com/remove-personal-information-from-internet-3482691) to get started
**Watermark Documents** | Recommended | If you're required to send a digital copy of any personal documents, consider adding a watermark indicating the name of the recipient and date. This way if that document is leaked in the future, it will be less useful to identity thieves, and you'll easily be able to determine the source of the breach.
**Don't Reveal Info on Inbound Calls** | Recommended | Only share sensitive personal data on outbound calls/ communications that you have initiated. Ensure the phone number is correct, and listen for anything that doesn't sound right. If a company phones you, and asks any questions, hang up and phone them back on their official number
**Stay Alert** | Recommended | Stay aware of your surroundings. Whenever you step into a new environment, take a moment to assess potential risks. Listen to your instincts, when approached by an unknown individual. Ensure you are not being followed, when you approach your home address. Understand basic self-defense principle, and know how to put them into practice to defend yourself, if needed
**Secure Perimeter** | Recommended | Maintain physical and structural integrity to all locations where devices with personal info are stored, and ensure steps have been put in place to stop any unauthorized access. Minimize external access: doors, windows, vents. Maintain locking devices responsibly: Keep keys safe, don't use guessable combinations, have multiple locks, change locks after a breach or potential risk. Consider intrusion detection systems, such as alarms and closed circuit monitoring. Make sure walls are structurally sound, and if there is a drop ceiling, ensure walls continue up into the ceiling. When inside - don't trust door chain lock and cover door peep hole
@ -537,4 +538,6 @@ Get in touch 📬
Topp Contributors 👥
[![Contributors](https://raw.githubusercontent.com/Lissy93/personal-security-checklist/master/.github/CONTRIBUTORS.svg)](/ATTRIBUTIONS.md)
<a href="/ATTRIBUTIONS.md" title="View all Contributors">
<img width="680" src="https://raw.githubusercontent.com/Lissy93/personal-security-checklist/master/.github/CONTRIBUTORS.svg" alt="Contributors" />
</a>