Saltar al contingut principal
. Open in a new window.Generalitat's logo
Menu
  • Contact
  • Language: en
    • Català
    • Castellano
Search engine

Search engine

Catalan Data Protection Authority

  • Home
  • Go to “Authority”
    • Director's welcome
    • Advisory Board
    • Go to “Organizations and functions”

      • The Catalan Data Protection Authority
      • Management
      • General Secretary
      • Legal Advice
      • Inspection and Technical Department
      • Coordination of Technology and Security of Information
      • Go to “Organizations and functions”

    • Authority services
    • Data Protection Officer
    • Go to “Regulations”

      • General Data Protection Regulation
      • Regulatory legislation of the Authority
      • National legislation
      • Go to “International legislation”

        • European Union
        • Council of Europe
        • Go to “International legislation”

      • Go to “Provisions adopted by the Authority”

        • Instructions
        • Recommendations
        • Other provisions
        • Go to “Provisions adopted by the Authority”

      • Go to “Regulations”

    • Record of processing activities (Catalan version available). Open in a new window.
    • Data protection notice
    • Annual Report
    • Data protection authorities and other institutions of interest
    • Go to “Authority”

    Imatge 1: Advisory Board
    Imatge 2: Organizations and functions

    Authority

    Go to “Authority”

  • Go to “Rights and obligations”
    • Go to “Know your rights ”

      • Right to information
      • Go to “Informational self-determination Rights ”

        • Right of access
        • Right to rectification
        • Right to erasure (right to be forgotten)
        • Right to object
        • Right to Restriction of Processing
        • Right to data portability
        • Right to object and automated individual decision-making
        • Go to “Informational self-determination Rights ”

      • Right to withdraw consent
      • Right to compensation
      • Exceptions that may limit your rights
      • Right not to receive unsolicited advertisments
      • Go to “Know your rights ”

    • Go to “Claim and complain”

      • Claim
      • Complain
      • Go to “Claim and complain”

    • Promotion of codes of conduct
    • Go to “File controllers obligations”

      • When do you have the obligation to apply the GDPR?
      • Go to “Obligations when processing personal data ”

        • Applying the principles of data protection
        • Identifying the legal basis that allows the processing
        • Informing and being transparent
        • Attending to and facilitating the exercise one’s rights to information-based self-determination . Open in a new window.
        • Appointing and communicating a data protection officer
        • Applying data protection by design and by default
        • Analysing the risks to rights and freedoms
        • Preparing an impact assessment related to data protection
        • Analysing risks and applying security measures
        • Notifying personal data security breaches
        • Regulating the relationship between the data controller and the data processor
        • Registering and publishing processing activities
        • Go to “Obligations when processing personal data ”

      • Go to “File controllers obligations”

    • Schengen Information System
    • Go to “General Data Protection Regulation”

      • Main developments of the GDPR
      • Frequently asked questions
      • Go to “How can controllers and processors adapt to the GDPR before May 2018?”

        • What should controllers and processors do to adapt their activity to the new Regulation?
        • Checklist
        • Go to “How can controllers and processors adapt to the GDPR before May 2018?”

      • Regulation texts
      • Go to “Others documents and tools of interest”

        • Data Protection Impact Assessment Guide
        • RGPD Data Processor Guide
        • European Data Protection Board and Article 29 Data Protection Working Party Guidelines
        • Go to “Others documents and tools of interest”

      • Conferences
      • Go to “General Data Protection Regulation”

    • Go to “Rights and obligations”

    Imatge 1: Know your rights

    Rights and obligations

    Go to “Rights and obligations”

  • Go to “Privacy for the young”
    • Go to “Games”

      • You choose !! (Short version)
      • You choose !! (Long version)
      • Go to “Games”

    • Go to “Privacy for the young”

    Privacy for the young

    Go to “Privacy for the young”

  • Go to “Tools”
    • DPO network
    • Project 'Who are you? Data that talk about you'
    • Go to “Secure Data”

      • Vishing
      • App permissions
      • Smishing
      • Mobile security
      • Facial Recognition
      • Two-factor authentication
      • Phishing
      • Passwords
      • Password managers
      • Sharenting
      • Go to “Secure Data”

    • Tools to download
    • Go to “Resolutions, opinions and reports”

      • Resolutions, opinions and reports search tool
      • Go to “Resolutions, opinions and reports”

    • Go to “Frequently asked questions”

      • Scope of action of the Catalan Data Protection Authority
      • Go to “FAQs for controllers/processors (obligations)”

        • Legal basis
        • Special categories of data
        • Exercise of rights
        • Record of processing
        • The data protection officer
        • International transfers
        • DPIA
        • Risk management
        • Notification of data breaches
        • The data processor
        • Go to “FAQs for controllers/processors (obligations)”

      • Go to “FAQs for data subjects”

        • Consent
        • Rights of data subjects
        • Complaints
        • Education
        • Healthcare
        • Go to “FAQs for data subjects”

      • Definitions
      • Entry into force of the General Data Protection Regulation and the LOPDGDD
      • Go to “Frequently asked questions”

    • Go to “Data Protection Basic Guides ”

      • Go to “APDCAT Guides”

        • Privacy by design and privady by default. A guide for developers
        • Data Protection Guidelines for Schools
        • Data Protection Impact Assessment Guide
        • RGPD Data Processor Guide
        • Go to “APDCAT Guides”

      • European Data Protection Board and Article 29 Working Party Guidelines . Open in a new window.
      • Go to “Data Protection Basic Guides ”

    • Pills of Data Protection
    • Decalogue of Data Protection
    • Go to “Models of exercise of rights”

      • Right of access. Open in a new window.
      • Right to rectification. Open in a new window.
      • Right to erasure (right to be forgotten). Open in a new window.
      • Right to object. Open in a new window.
      • Right to Restriction of Processing. Open in a new window.
      • Right to Data Portability. Open in a new window.
      • Claim. Open in a new window.
      • Complain. Open in a new window.
      • Go to “Models of exercise of rights”

    • Audit reports
    • Research studies
    • Entrepreneurship and career opportunities
    • Artificial intelligence
    • Go to “Tools”

    Imatge 1: Tools to download
    Imatge 2: Resolutions, opinions and reports

    Tools

    Go to “Tools”

  • Go to “Press room”
    • News
    • Training activities and conferences
    • Go to “Media resources”

      • Go to “Videos”

        • Conferences and events
        • Fairs and congresses
        • Campaigns
        • Go to “Videos”

      • Go to “Media resources”

    • Corporate identity
    • Social networks
    • International conferences
    • Contact
    • Go to “Press room”

    Imatge 1: News
    Imatge 2: Training activities and conferences

    Press room

    Go to “Press room”

. Open in a new window.Generalitat's logo

| Catalan Data Protection Authority

  • Home
  • Tools
  • Secure Data
  • Mobile security
securetat mòbil

Over the years, the mobile phone has become another tool for accessing personal information, such as email, bank details, personal profiles on social networks, etc. Our use of it also means that we store personal and work information there.

Mobiles have security vulnerabilities just like computers, so you need to take steps to protect yourself. When using applications and browsing the internet from your mobile device, you must keep both usability and security in mind. You need to be protected.

Highlights

  • Video
  • Mobile security risks
  • Some recommendations

Mobile security risks

Through the mobile phone you can receive cyber-attacks that aim to obtain your data for illicit purposes, such as identity theft, theft of sensitive data and bank credentials, blocking of the phone, blackmail with financial objectives, etc. Among security incidents, you may experience:

• phishing
• smishing
• installation of viruses and spyware or malicious software

Torna amunt TOP

Some recommendations

• Configure the mobile privacy options according to your personal preferences.
• Set an authentication mechanism to unlock it: PIN, pattern, password, etc.
• Use two-factor authentication and strong passwords, with numbers, letters, symbols, upper and lower case letters and a minimum of 8 characters.
• Use encrypted folders to protect your apps and private data. Consider encrypting your device's internal storage if you want to protect it completely. Also remember to encrypt external memory (such as removable SD cards), to prevent its contents from being accessed if it is lost or stolen. You can do all this from the settings of your mobile device.
• Update your software to the latest version. Among other things, the new versions fix detected vulnerabilities.
• Download apps only from trusted stores and services. Some apps may contain malware.
• When you install an app, check the permissions you give the app and ask yourself if it really needs them.
• Back up data to the trusted cloud.
• Activate remote erasure, to be used in case of theft or loss of the mobile phone.
• Watch out for open Wi-Fi networks, because they are a risk. If the connection is not encrypted, they can observe what you do or even be a malicious access point.
• Turn off Wi-Fi and Bluetooth when you don't need them.
• Install a trusted antivirus and scan your device regularly for vulnerabilities.
• Request the IMEI number by dialing *#06# to identify the device in the report, in case of loss or theft. Keep it off your device.
• Immediately block the telephone line with your operator, in case of loss or theft.

Torna amunt TOP

Follow APDCAT's social media:

  • Twitter's icon

How we take care of you

You can contact us through any of the following contact channels

  • Atenció al públic i entitats Atenció al públic i entitats
gencat.cat
  • Legal notice
  • Accessibility
  • Site map