Covid-19FeaturedGuest Post

How much data sharing is too much?

2 Mins read

Above: Illustration by contact210/DepositPhotos.

Safety and security are essential elements that everyone must adopt in 2021. This is, of course, in addition to wearing masks, maintaining social distances and sanitising.
But you should be aware of the potential problems that arise when your personal information becomes more accessible.
Contact tracing during the Covid-19 pandemic is an essential process to identify persons who have been in contact with someone identified with the virus.

What is contact tracing?
Contact tracing is a process that captures and records personal identifiable information to distinguish one individual from another. It  enables health authorities to inform you about an interaction with a positive Covid-19 person as well as helping them to locate you for quarantine procedures.
Although it is a beneficial system, you must understand the security and safety implications of this procedure.
Your data is captured in various ways. You enter details on forms. You give your ID (or driver’s permit) card to a company representative. You may have a mobile app enabled.

Should you be concerned about your personal information?
Your personal information is now in the public domain. Below is a list of data from your IDs that can be can be photographed and written down. In addition, you also provide your phone number and vehicle registration number.

• Full name
• Signature
• Photo
• Residential address
• Date of birth
• Place of birth
• Eye colour
• Skin colour
• Height
• Driver permit number
• Identification number
• National Insurance number

You must be continuously vigilant as this information is accessible by anyone. Opportunists can use these details to target, identify and locate individuals. They can create online accounts with your details. They can access your secure accounts over the phone if you use any of the details as passwords or as account verifications.

What details do you use to verify who you are?

Being aware is the first step. Understanding the implications of having your data accessible is the second step. The third step is to ensure that your data will not compromise your safety and security.
To limit my personal information, I will only indicate my first name, Jason!

About the author

Jason is an electrical & computer engineer and member of the IET. his career spans industries covering power, construction, automation and process at various levels from field engineer to design engineer to managerial positions. One of his many interests is in the understanding and use of key factors (business, engineering, labour, health & safety) in driving decisions to automate systems in small, medium and large-scale industries.

Currently this focus is on small and medium industries transitioning into Industry 4.0 and the industrial Internet of Things as a mechanism for developing and accelerating innovative systems.

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
FeaturedOpinion

Parasram: Nothing to be done about data exposure

1 Mins read
You can change your password but you can’t really change user names and you can’t get a new ID card number.
FeaturedNews Briefs

Updated: Are you in the TSTT data dump? Find out here...

2 Mins read
Search for your name or other text using this index by Quantum-Chaos.
FeaturedOpinion

What does the TSTT breach mean for customers?

2 Mins read
The sheer number of affected customers and the types of data involved make this breach significant.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Inline Feedbacks
View all comments
×
FeaturedOpinion

Digital transformation must emphasise both data security and data protection

0
Share your perspective in the comments!x
()
x