Data Protection Law
Terminology
Data Attacks
Biggest Breaches
Protecting Your Data
100

This regulation, enacted in 2018, protects the data privacy of individuals in the European Union.

What is the General Data Protection Regulation (GDPR)?

100

Information that can be used to identify an individual directly or indirectly, such as a name, email address, Social Security Number or IP address.

What is (sensitive) personally identifiable information (PII)?

100

This type of attack will come from third-party hackers who creates an email or website that looks incredibly genuine. If you log in or click a link without realizing, you can end up giving the hacker your password.

What is a phishing attack?

100

In March 2021, hackers scraped this social media giant and stole 533 million user records including full names, phone numbers, user locations, biographical information, and email addresses. 

What is Facebook?

100

A tool that creates a secure, encrypted connection between your device and the internet.

What is a Virtual Private Network (VPN)?

200

The U.S. law passed in 1996 that protects medical records and personal health information.

What is the Health Insurance Portability and Accountability Act (HIPAA)?

200

This type of unique identifier is used to track individuals on the internet by websites and advertisers.

What is a cookie?

200

In this type of attack, you suddenly get a message stating that all data on your phone or computer is now encrypted, denying you access to your own data. The perpetrator will tell you that they will turn the data back over to you and not release it to the public if you pay a fee.

What is a Ransomware attack?

200

Concert goers may have had their data stolen when this company confirmed in 2024 that hackers stole personal data from customers, including names, addresses, and phone numbers.

What is Ticketmaster?

200

This adds an extra layer of security by requiring a second form of verification (e.g., a code send to your phone) in addition to a password.

What is Two-Factor Authentication (2FA)?

300

This California privacy law gives consumers rights over their personal data and mandates transparency from businesses.

What is the California Consumer Privacy Act (CCPA)?

300

The practice of collecting only the data that is necessary for a specific purpose.

What is data minimization?

300

Cybercriminals can insert or email you this type of malware that can record what you’re typing onto your computer. The data is passed back to the hackers and used to access sensitive data.

What is a Keylogger?

300

In their second breach of 2024, hackers stole data from all of this phone company's customers including approximate locations, phone numbers, and numbers of non-customers. 

What is AT&T?

300

This tool stores and generates strong, unique passwords for each of your accounts to prevent password reuse and enhance security.

What is a Password Manager?

400

The U.S. federal law focused on children's online privacy protection.

What is the Children's Online Privacy Protection Act (COPPA)?

400

The term describing data that no longer contains any identifying information and cannot be reconstructed.

What is anonymization? 

400

This attack takes place when this thing is sent to people with the goal of wiping their computer of all data. This can be harmful to any company, especially those who rely on their data.

What is Malware/Virus?

400

In 2013 hackers breached this company's system and leaked customer info from over 3 billion accounts in what is still the biggest data breach ever.

What is Yahoo?

400

Tools like VeraCrypt or BitLocker are examples of software that provides this type of protection, which can make data unreadable without a password or key. 

What is Encryption?

500

This regulatory body investigates privacy claims such as unfair or deceptive acts & practices.

What is the Federal Trade Commission? 

500

Information that can be used to identify an individual based on their intrinsic physical or behavioral traits. This includes DNA, fingerprints, handwriting, and so on.

What is biometric data?

500

This attack tends to only target larger companies and is often a form of protest. Attackers will make it impossible for those at work to sign into the system. If sites are unreachable due to all the traffic from the attack, customers are unable to access the company’s services.  

What is Distributed Denial-of-Service (DDoS)?

500

On November 24, 2014, the hacker group "Guardians of Peace" leaked confidential data from Sony, demanding that Sony withdraw this then-upcoming film.

What is "The Interview"

500

Regularly updating all software, including privacy tools, using strong, unique passwords for each account, and limiting permissions for apps and devices are all examples of this general principle for building a robust defense for your digital privacy.

Data Privacy Best Practices