You have to protect your data both at work and at home. It might be compromised not so much because of technical faults, but users themselves. According to the “Security Trends 2015” report, as much as 81% end users do not follow security procedures. Deloitte reports that as many as 58% respondents fell victim to what they considered misuse of their personal data.


Major IT risks that might lead to businesses losing their data, including personal data, are computer system breach, piracy, internet espionage, or system sabotage. In order to choose the right security measures, you need to specify the system, resource volume, and data sensitivity level. The next stage is selecting authorisation levels.


The key is your login and password, which you shouldn’t share with anyone. Business emails should be encrypted, and the files should be backed up once work has been finished. We should only disclose business information outside work. It’s also good practice put tape over you webcam and not use your private email or non-verified storage devices. It’s also recommended to keep your monitor at an angle preventing others from seeing files you’ve opened on your computer.


Employees should pay particular attention to document workflow at their company. You should never leave documents in a printer or a photocopier unattended, or on your desk after you finish work. All documents with personal data should be destroyed in a shredder, not thrown out to a bin. Protecting personal data in an organisation is not only about sharing just the information necessary to complete a job, e.g. you shouldn’t provide explanation of an absence on an absence list.


Taking care of personal data security applies to all personnel, regardless of their position within an organisation. Some organisations have already introduced standard contractual clauses on data protection. You can also request your employer to provide personal data protection training for our position.


dr Agnieszka Stępień, dr Paweł Biały - Personal Data Security Institute

  • email encryption
  • regularly changed access passwords
  • backups
  • putting tape over webcams
  • document access supervision
Veeam backup logo
Grey Wizard cyberbezpieczeństwo logo
Instytut Bezpieczeństa Danych Osobowych logo
Transparent Data logo


Schedule a visit at a convenient time for you. Learn about our standards and comprehensive approach to the security of your data and applications!


We’ve prepared an educational path around the Data Center 2 to let our current and future customers, as well as partners see how the data center which meets the highest security standards is operated. Come and see for yourself how much we can do for you!



Due to our security policy it is possible to schedule a visit at Data Center 2 not earlier as 7 days after request.


Each person requesting a visit will receive an email with information about our facility security requirements and regulations, which should be signed before the educational path around the Data Center.


Persons who fail to comply with these formalities will not be able to take an educational tour.


I hereby agree to the processing of my personal data by Sp. z o.o. to complete the submitted request in accordance with the Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 - also known as the General Data Protection Regulation (GDRP). The providing of the personal data is voluntary, however it is necessary for processing the request.
I hereby agree to receive marketing information by email from about its products and services, promotions and events in accordance with the Act of 18 July 2002 – on provision of digital services (Journal of Laws 2017, item 1219 with subsequent amendments). The providing of the personal data is voluntary.

The data controller is Sp. z o.o. ( with a registered office at A. Kręglewskiego 11, Poznań 61-248.