Data Protection and Security


Surveillance, big data, and data leaks. How do we, as online users, maintain control over our data on the Internet?

Are planning a 25-minute workshop on the subject “Data privacy and security”? Scroll down to find helpful ideas.

You will find specific ideas and example excercises for your workshop participants.


Address, date of birth, bank account data – a lot of information about you is stored as a matter of course. But what happens when your data is passed on to others? How can you protect yourself?

“Data privacy” is different than “data protection”. The former refers to the government’s aim of protecting the people whose data is collected, stored and used. Data privacy regulations are laid down in laws. They are designed to prevent people from losing control of their personal data. People should always be able to decide for themselves how their data is used. This principle is called informational self-determination.


It is not always clear at first glance what data a person leaves behind on the Internet. However, we often disclose very personal data, even though we are not aware of it. For example, when we search the Internet for our disease symptoms.

Have you ever looked yourself up on the internet? What information about you can be found online?


Data privacy starts with the device you’re using. Keep your smartphone, PC, and tablet software up to date at all times. You can prevent unauthorized access by using PINs, passwords, or fingerprint or face scanners. Anti-virus programs on mobile devices also offer protection.

Are all of your gadgets safe? Take a look at how you can make your smartphone or router more secure.


Virtually all Internet services are password protected against unauthorized access. Therefore, it is important to choose a strong password that protects your data reliably. This video explains how a secure password is structured and why you shouldn’t use “1234” as your password.


A quick e-mail check while you’re on the go? Public networks are a convenient way to connect to the Internet. However, there are a few things you should be aware of.

Find out more on the next page!

<strong>Be careful in open networks</strong> <br> Open networks in cafés or train stations are fast and convenient, but can be insecure. Your personal data can be accessed through an insecure connection. As a result, e-mail readers and services that require logon can no longer be used securely. <strong>No automatic WiFi connections</strong> <br> Disable automatic WiFi connections when you are on the go. Hackers can modify WiFi networks so that mobile devices can connect to them without your permission. This allows them to read your messages, for example. <strong>Secure connections</strong> <br> Only use public websites that encrypt communication with SSL. You can recognize this by the protocol <strong>Disable file sharing</strong> <br> Windows and Mac OS allow you to connect computers in a network. This also allows files to be exchanged between them, or “file sharing”. In a public network, however, file sharing can allow strangers to access your personal data. Therefore, disable file sharing in your device settings as soon as you start browsing in public.


Stay in control and be proactive! You have learned about many of the possibilities in this module: change the privacy settings of your social networks and protect your devices. Data privacy is your right – use it!