Saltar al contingut principal
. Open in a new window.Generalitat's logo
Menu
  • Contact
  • Language: en
    • Català
    • Castellano
Search engine

Search engine

Catalan Data Protection Authority

  • Home
  • Go to “ Authority”
    • Director's welcome
    • Advisory Board
    • Go to “ Organizations and functions”

      • The Catalan Data Protection Authority
      • Management
      • General Secretary
      • Legal Advice
      • Inspection and Technical Department
      • Coordination of Technology and Security of Information
      • Go to “ Organizations and functions”

    • Authority services
    • Data Protection Officer
    • Go to “ Regulations”

      • General Data Protection Regulation
      • Regulatory legislation of the Authority
      • Go to “ Provisions adopted by the Authority”

        • Instructions
        • Recommendations
        • Other provisions
        • Go to “ Provisions adopted by the Authority”

      • National legislation
      • Go to “ International legislation”

        • European Union
        • Council of Europe
        • Go to “ International legislation”

      • Go to “ Regulations”

    • Record of processing activities (Catalan version available). Open in a new window.
    • Data protection notice
    • Annual Report
    • Data protection authorities and other institutions of interest
    • Go to “ Authority”

    Imatge 1: Advisory Board
    Imatge 2: Organizations and functions

    Authority

    Go to “ Authority”

  • Go to “ Rights and obligations”
    • Go to “ Rights”

      • Right to be informed
      • Go to “ Informational self-determination Rights ”

        • Right of access
        • Right to rectification
        • Right to erasure (right to be forgotten)
        • Right to object
        • Right to Restriction of Processing
        • Right to Data Portability
        • Right not to be subject to a decision based solely on automated processing
        • Go to “ Informational self-determination Rights ”

      • Right to withdraw consent
      • Right to compensation
      • Rights limitations
      • How not to receive unsolicited advertisments
      • Go to “ Rights”

    • Go to “ Claim and complain”

      • Claim
      • Complain
      • Go to “ Claim and complain”

    • Go to “ File controllers obligations”

      • Application of data protection legislation
      • Go to “ Obligations”

        • Principles of data protection
        • Inform
        • Legal basis for processing
        • Informational self-determination rights. Open in a new window.
        • Records of processing activities
        • Data protection by design and by default
        • Data Protection Impact Assessment
        • Data Protection Officer (DPO)
        • Security measures
        • Notification of personal data breaches
        • Relations with the data processor
        • Go to “ Obligations”

      • Go to “ File controllers obligations”

    • Schengen Information System
    • Go to “ General Data Protection Regulation”

      • Main developments of the GDPR
      • Frequently asked questions
      • Go to “ How can controllers and processors adapt to the GDPR before May 2018?”

        • What should controllers and processors do to adapt their activity to the new Regulation?
        • Checklist
        • Go to “ How can controllers and processors adapt to the GDPR before May 2018?”

      • Regulation texts
      • Go to “ Others documents and tools of interest”

        • Data Protection Impact Assessment Guide
        • RGPD Data Processor Guide
        • European Data Protection Board and Article 29 Data Protection Working Party Guidelines
        • Informative materials of the European Commission
        • Go to “ Others documents and tools of interest”

      • Conferences
      • Go to “ General Data Protection Regulation”

    • Go to “ Rights and obligations”

    Imatge 1: Rights

    Rights and obligations

    Go to “ Rights and obligations”

  • Go to “ Privacy for the young”
    • Go to “ Games”

      • You choose !! (Short version)
      • You choose !! (Long version)
      • NICK & DATA
      • Go to “ Games”

    • Go to “ Privacy for the young”

    Privacy for the young

    Go to “ Privacy for the young”

  • Go to “ Tools”
    • DPO network
    • Project 'Who are you? Data that talk about you'
    • Go to “ Secure Data”

      • Mobile security
      • Facial Recognition
      • Two-factor authentication
      • Phishing
      • Passwords
      • Password managers
      • Sharenting
      • Go to “ Secure Data”

    • Go to “ Tools to download”

      • Data protection impact assessment tool
      • Go to “ Tools to download”

    • Go to “ Resolutions, opinions and reports”

      • Resolutions, opinions and reports search tool
      • Go to “ Resolutions, opinions and reports”

    • Go to “ Frequently asked questions”

      • Scope of action of the Catalan Data Protection Authority
      • Go to “ FAQs for controllers/processors (obligations)”

        • Legal basis
        • Special categories of data
        • Exercise of rights
        • Record of processing
        • The data protection officer
        • International transfers
        • DPIA
        • Risk management
        • Notification of data breaches
        • The data processor
        • Go to “ FAQs for controllers/processors (obligations)”

      • Go to “ FAQs for data subjects”

        • Consent
        • Rights of data subjects
        • Complaints
        • Education
        • Healthcare
        • Go to “ FAQs for data subjects”

      • Definitions
      • Entry into force of the General Data Protection Regulation and the LOPDGDD
      • Go to “ Frequently asked questions”

    • Go to “ Data Protection Basic Guides ”

      • Go to “ APDCAT Guides”

        • Privacy by design and privady by default. A guide for developers
        • Data Protection Guidelines for Schools
        • Data Protection Impact Assessment Guide
        • RGPD Data Processor Guide
        • Go to “ APDCAT Guides”

      • European Data Protection Board and Article 29 Working Party Guidelines . Open in a new window.
      • Go to “ Data Protection Basic Guides ”

    • Pills of Data Protection
    • Decalogue of Data Protection
    • Go to “ Models of exercise of rights”

      • Right of access. Open in a new window.
      • Right to rectification. Open in a new window.
      • Right to erasure (right to be forgotten). Open in a new window.
      • Right to object. Open in a new window.
      • Right to Restriction of Processing. Open in a new window.
      • Right to Data Portability. Open in a new window.
      • Claim. Open in a new window.
      • Complain. Open in a new window.
      • Go to “ Models of exercise of rights”

    • Audit reports
    • Entrepreneurship
    • Artificial intelligence
    • Go to “ Tools”

    Imatge 1: Tools to download
    Imatge 2: Resolutions, opinions and reports

    Tools

    Go to “ Tools”

  • Go to “ Press room”
    • News
    • Training activities and conferences
    • Go to “ Media resources”

      • Go to “ Videos”

        • Conferences and events
        • Fairs and congresses
        • Campaigns
        • Go to “ Videos”

      • Go to “ Media resources”

    • Corporate identity
    • Social networks
    • International conferences
    • Contact
    • Go to “ Press room”

    Imatge 1: News
    Imatge 2: Training activities and conferences

    Press room

    Go to “ Press room”

. Open in a new window.Generalitat's logo

| Catalan Data Protection Authority

  • Home
  • Tools
  • Secure Data
  • Mobile security
securetat mòbil

Over the years, the mobile phone has become another tool for accessing personal information, such as email, bank details, personal profiles on social networks, etc. Our use of it also means that we store personal and work information there.

Mobiles have security vulnerabilities just like computers, so you need to take steps to protect yourself. When using applications and browsing the internet from your mobile device, you must keep both usability and security in mind. You need to be protected.

Highlights

  • Video
  • Mobile security risks
  • Some recommendations

Mobile security risks

Through the mobile phone you can receive cyber-attacks that aim to obtain your data for illicit purposes, such as identity theft, theft of sensitive data and bank credentials, blocking of the phone, blackmail with financial objectives, etc. Among security incidents, you may experience:

• phishing
• smishing
• installation of viruses and spyware or malicious software

Torna amunt TOP

Some recommendations

• Configure the mobile privacy options according to your personal preferences.
• Set an authentication mechanism to unlock it: PIN, pattern, password, etc.
• Use two-factor authentication and strong passwords, with numbers, letters, symbols, upper and lower case letters and a minimum of 8 characters.
• Use encrypted folders to protect your apps and private data. Consider encrypting your device's internal storage if you want to protect it completely. Also remember to encrypt external memory (such as removable SD cards), to prevent its contents from being accessed if it is lost or stolen. You can do all this from the settings of your mobile device.
• Update your software to the latest version. Among other things, the new versions fix detected vulnerabilities.
• Download apps only from trusted stores and services. Some apps may contain malware.
• When you install an app, check the permissions you give the app and ask yourself if it really needs them.
• Back up data to the trusted cloud.
• Activate remote erasure, to be used in case of theft or loss of the mobile phone.
• Watch out for open Wi-Fi networks, because they are a risk. If the connection is not encrypted, they can observe what you do or even be a malicious access point.
• Turn off Wi-Fi and Bluetooth when you don't need them.
• Install a trusted antivirus and scan your device regularly for vulnerabilities.
• Request the IMEI number by dialing *#06# to identify the device in the report, in case of loss or theft. Keep it off your device.
• Immediately block the telephone line with your operator, in case of loss or theft.

Torna amunt TOP

Follow APDCAT's social media:

  • Twitter's icon

How we take care of you

You can contact us through any of the following contact channels

  • Atenció al públic i entitats Atenció al públic i entitats
gencat.cat
  • Legal notice
  • Cookies policy
  • Accessibility
  • Site map