Tuesday, May 1, 2018

GDPR checklist for businesses

Remember, your GDPR checklist needs to take into account past and present employees and suppliers as well as customers (and anyone else’s data you’re getting hold of, storing and using).
  1. Know your data. You’ll need to demonstrate an understanding of the types of personal data (for example name, address, email, bank details, photos, IP addresses) and sensitive (or special category) data (for example health details or religious views) you hold, where they’re coming from, where they’re going and how you’re using that data.
  2. Identify whether you’re relying on consent to process personal data. If you are (for example, as part of your marketing), these activities will become more difficult under the GDPR because the consent needs to be clear, specific and explicit. For this reason, you should avoid relying on consent unless absolutely necessary.
  3. Look hard at your security measures and policies. You’ll need to update these to be GDPR-compliant, and if you don’t currently have any, get them in place. Broad use of encryption could be a good way to reduce the likelihood of a big penalty in the event of a breach.
  4. Prepare to meet access requests within a one-month timeframe. Subject Access Rights are changing, and under the GDPR, citizens have the right to access all of their personal data, rectify anything that’s inaccurate and object to processing in certain circumstances, or completely erase all of their personal data that you may hold. Each request carries a time frame and deadline of one month (which can only be extended in mitigating circumstances), from the original date of request.
  5. Train your employees, and report a serious breach within 72 hours. Ensure your employees understand what constitutes a personal data breach and build processes to pick up any red flags. It’s also important that everybody involved in your business is aware of a need to report any mistakes to the DPO or the person or team responsible for data protection compliance, as this is the most common cause of a data breach.
  6. Conduct due-diligence on your supply chain. You should ensure that all suppliers and contractors are GDPR-compliant to avoid being impacted by any breaches and consequent penalties. You’ll also need to ensure you have the right contract terms in place with suppliers (which puts important obligations on them, such as the need to notify you promptly if they have a data breach). See ‘How can I check my suppliers are GDPR-compliant?’ further down.
  7. Create fair processing notices. Under GDPR, you’re required to describe to individuals what you’re doing with their personal data. See ‘Fair processing notices’ below for more information.
  8. Decide whether you need to employ a Data Protection Officer (DPO). Most small businesses will be exempt. However, if your company’s core activities involve ‘regular or systematic’ monitoring of data subjects on a large scale, or which involve processing large volumes of ‘special category data’ (see ‘Is my data sensitive?’ below) you must employ a Data Protection Officer (DPO).

Sunday, December 31, 2017

How to Protect Against Phishing

Phishing scams are usually presented in the form of spam or pop-ups and are often difficult to detect. Once the fraudsters obtain your personal information, they can use it for all types of identity theft, putting your good credit and good name at risk.
Because phishing is one of the most devious forms of identity theft, it is important for you to become familiar with various types of phishing scams as well as to learn how to guard against them.
However, some information security pros now believe that cybercriminals view phishing attacks as a successful (and easy) way of getting into an enterprise to launch more sophisticated attacks. Humans are, after all, increasingly seen as the weakest link and thus the most effective target for criminals looking to infiltrate an enterprise or SME.
  1. Be sensible when it comes to phishing attacks: You can significantly reduce the chance of falling victim to phishing attacks by being sensible and smart while browsing online and checking your emails. For example, as ESET’s Bruce Burrell advises, never click on links, download files or open attachments in emails (or on social media), even if it appears to be from a known, trusted source.
  2. Watch out for shortened links: You should pay particularly close attention to shortened links, especially on social media. Cybercriminals often use these – from Bitly and other shortening services – to trick you into thinking you are clicking a legitimate link, when in fact you’re being inadvertently directed to a fake site.
  3. Does that email look suspicious? Read it again: Plenty of phishing emails are fairly obvious. They will be punctuated with plenty of typos, words in capitals and exclamation marks. They may also have an impersonal greeting – think of those ‘Dear Customer’ or ‘Dear Sir/Madam’ salutations – or feature implausible and generally surprising content.
  4. Be wary of threats and urgent deadlines: Sometimes a reputable company does need you to do something urgently. For example, in 2014, eBay asked its customers to change their passwords quickly after its data breach.
  5. Browse securely with HTTPs: You should always, where possible, use a secure website (indicated by https:// and a security “lock” icon in the browser’s address bar) to browse, and especially when submitting sensitive information online, such as credit card details.


Sunday, December 24, 2017

HIPAA Compliance and Skype

Skype is owned by Microsoft and is part of Office 365. Microsoft does offer a Business Associate Agreement (BAA) for Office 365 which technically covers Skype for Business (but not regular Skype).
However, Skype lacks many controls and features that are actually required for an organization to be HIPAA-compliant, such as access auditing, backups, and breach reporting. This makes it unclear what the usefulness of its being "covered" under Microsoft's BAA really is. Microsoft is really just leaving it up you to determine if the use of Skype is appropriate without taking any steps to ensure that use of Skype really meets all of HIPAA's requirements. Additionally, even though Skype is covered under Microsoft's BAA, the regular, free Skype used by most people is not covered. So, for example, a doctor should under no circumstances have a session with a patient, where that patient is using the regular free Skype program. This patient must use the web browser-based business Skype interface in order to be covered.
Image result for HIPAA Compliance and Skype
When considering if Skype can be used in a HIPAA-compliant manner, there are many relevant items to consider:
  • Encryption: Skype uses AES 265-bit encryption for securing the chat sessions and the voice and video phone calls. This level of encryption is beyond sufficient for encrypting the transmission of ePHI.
  • Wire Tap: It is well known that many countries can "wiretap" Skype communications so that they can record calls, videos, and chats. Changes that Microsoft has made to Skype make it easier for them to wiretap communications, in general, and domestically. it is also well known that the NSA can wiretap Skype video calls.Image result for HIPAA Compliance and Skype
  • HIPAA Requirements: Use of Skype does not:
  • Provide audit trails of usage
  • Provide notifications in case of a breach
  • Offer technical support and frequently dropped calls may cause problems for some organizations (e.g. in terms of emergency access, etc.)
  • Provide archives of chats or video
  • Provide administrative emergency access to previous chat histories
x

Wednesday, September 13, 2017

Create your own Business Website in Minutes!

Create your own Business Website in Minutes! Its Easy and Free! Start now: www.Webbiy.com

Tuesday, November 1, 2016

Wedowo :: Sign up

What is expected from Workers?

1. Go to Wedowo Global

2. Sign up using your gmail address.

3. Do not use fake email.

4. Go to https://www.wedowo.com/tree/index. Put mouse point over your id, wait 5 seconds a pop up window will appear, take a screenshot.


Required proof that task was finished?

1. Username

2. Screenshot taken in step 4 

Sunday, August 28, 2016

FaceBook :: Whaff :: Sign up

What is expected from Workers?

1. Go to goo.gl/bRxU7R

2. Sign up using your Facebook

3. Use invite code: "EP17305" (without quote) and your total balance will be $ 0.50

3. Take a screenshot that is showing $ 0.50 on your account balance


Required proof that task was finished?

1. Username (I will check your Username on my referrals list) 
2. Screenshot that is showing $ 0.50 on your account 

Saturday, August 27, 2016

āĻ—āϞ্āĻĒ-1

āφāĻŽাāϰ āĻŦেāϤāύ ⧍⧍ā§Ļā§Ļā§Ļ āϟাāĻ•া,āĻ•িāύ্āϤু āφāĻŽি āϝে āĻŦাāϏা⧟ āĻĨাāĻ•ি
āĻ“āϟা āĻŦা⧜িāϧাāϰাāϤে (āĻ“āϞ্āĻĄ āĻĄি āĻ“ āĻāϏ āĻāχāϚ)। āĻā§ŸাāϰāĻĒোāϰ্āϟ
āĻāϰ āĻĒূāϰ্āĻŦ āĻĻিāĻ•ে āĻāĻ•āϟা āĻŦিāĻļাāϞ āĻĢ্āϞাāϟ।
āϞোāĻ•ে āĻļুāύে āĻšাāϏে, āĻĒিāĻ›ে āϞোāĻ• āϘুāϏāĻ–োāϰ
āĻŦāϞে। āφāĻŽি āĻšাāϏি, āĻ—্āϰাāĻŽ āĻĨেāĻ•ে āĻāϏেāĻ›িāϞাāĻŽ āĻāĻ•āϟা āĻ•াāϜ
āϜুāϟাāĻŦো āĻŦāϞে। āĻ•িāύ্āϤু āφāĻŽাāĻ•ে āĻ–ুঁāϜে āύি⧟েāĻ›ে
āĻŦিāĻļাāϞ āĻ•োāĻŽ্āĻĒাāύি। āĻŦāĻ›āϰ āĻ–াāύেāĻ• āĻĒāϰ āφāĻŽাāϰ āĻ•াāϜেāϰ
āωāĻĒāϰ āĻ–ুāĻļি āĻšā§Ÿে āĻāχ āĻŦা⧜িāϧাāϰাāϤে āϟ্āϰাāύ্āϏāĻĢাāϰ āĻ•āϰে
āĻĻে⧟। āϏাāĻĨে āĻāχ āĻ…āĻĢিāϏি⧟াāϞ āĻĢ্āϞাāϟ। āĻĒুāϰো āϘāϟāύা
āĻ…āύেāĻ• āĻ•ে āĻŦāϞা āĻšā§Ÿ, āϝাāϰা āĻļুāύে āϤাāϰা āĻ­্āϰু āĻ•ুঁāϚāĻ•া⧟। āĻŦাāĻ•িāϰা
āϘুāϏ āĻ–োāϰ āĻŦāϞে। āϝেāĻĻিāύ āĻāχ āĻŦাāϏা⧟ āĻāϏেāĻ›িāϞাāĻŽ
āϏেāĻĻিāύ āĻļা⧟āϞা āĻ•ে āĻ•োāϞে āϤুāϞে āϘুāϰি⧟েāĻ›িāϞাāĻŽ, āϚুāĻŽু
āĻ–ে⧟েāĻ›িāϞাāĻŽ, āĻŽাāĻāϰাāϤে āĻĻুāϜāύে āĻāĻ•āϏাāĻĨে āύেāϚেāĻ›ি
āĻ–িāĻ• āĻ–িāĻ•।
--------
āϰিāĻšাāύেāϰ āϜāύ্āĻŽ āĻšā§ŸেāĻ›িāϞ āĻŦা⧜িāϧাāϰা āϞেāĻ• āĻ­িāω āĻ•্āϞিāύিāĻ•ে।
āϏāĻŦāϚে⧟ে āωāύ্āύāϤ āϏেāĻŦাāϰ āĻāχ āĻ•্āϞিāύিāĻ•ে āϰিāĻšাāύ
āϏোāύাāϰ āϚাāĻŽুāϚ āĻŽুāĻ–ে āϜāύ্āĻŽেāĻ›িāϞ। āĻŽāϧ্āϝāĻŦিāϤ্āϤেāϰ āĻ•াāĻ›ে
āϏোāύাāϰ āϚাāĻŽুāϚ āĻ…āϧāϰা, āĻŦāĻĄ্āĻĄ āφāĻĻিāĻ•্āώেāϤা। āφāĻŽাāϰ āĻ•াāĻ›ে
āϤা āĻ›িāϞ āύা। āĻĒুāϰো ⧧⧍ āφāύা āϏোāύা āĻĻি⧟ে āĻŦাāύি⧟ে
āύি⧟েāĻ›ি āϏোāύাāϰ āϚাāĻŽুāϚ। āϜāύ্āĻŽেāϰ āĻĒāϰ āϏেāχ āϚাāĻŽুāϚে
āϏাāĻŽাāύ্āϝ āĻŽāϧু āύি⧟ে āϰিāĻšাāύেāϰ āĻŽুāĻ–ে āĻĻি⧟েāĻ›িāϞাāĻŽ। āφāĻŽাāϰ
āϏāύ্āϤাāύ, āϏোāύাāϰ āϚাāĻŽুāϚ āύা āĻšāϞে āϚāϞāĻŦেāχ āύা। āĻšুāĻŽ
āϰিāĻšাāύেāϰ āĻŽা āĻ•āĻ–āύো āĻ“āϰ āĻ›āĻŦি āϤুāϞāϤে āĻĻিāϤ āύা।āĻ•াāϰāύ
āĻ…āϜুāĻšাāϤেāϰ āϏāĻŽাāύ। āĻ•িāύ্āϤু āφāĻŽি āύাāĻ›োāϰāĻŦাāύ্āĻĻা, āϜāύ্āĻŽেāϰ
āĻĒ্āϰāĻĨāĻŽ āĻĻিāύ āĻĨেāĻ•ে āϰিāĻšাāύেāϰ āĻĒ্āϰāĻĨāĻŽ āĻŦāϏা, āĻšাāĻŽাāĻ—ু⧜ি
āĻĻেāĻ“ā§Ÿা, āĻĒ্āϰāĻĨāĻŽ āĻĻাঁāϤ āύি⧟ে āĻšাāϏি, āύিāϜেāϰ āĻĒা⧟ে
āĻĻা⧜াāύো, āĻĒ্āϰāĻĨāĻŽ āĻŽুāĻ–ে āĻ­াāϤ, āĻĒ্āϰāĻĨāĻŽ āϏ্āĻ•ুāϞ, āĻ•āϞেāϜ āϏāĻŦ
āϏāĻŦ āφāĻŽাāϰ āĻ•্āϝাāĻŽেāϰা⧟ āĻŦāύ্āĻĻি āĻ•āϰেāĻ›ি। āĻ…āĻšāĻš āĻš্āϝাঁ āĻļা⧟āϞা
āĻāĻ•āĻĻিāύ āύিāϜেāχ āĻāĻ•āϟা āĻ›āĻŦি āϤুāϞেāĻ›িāϞ āϰিāĻšাāύেāϰ। āϝেāĻĻিāύ
āϰিāĻšাāύ āφāĻŽাāϰ āĻĒিāĻ ে āĻŦāϏেāĻ›িāϞ āφāϰ āφāĻŽি āĻ—āϰুāϰ āĻŽāϤ āĻšā§Ÿে
āĻšাāĻŽ্āĻŦা āĻšাāĻŽ্āĻŦা āĻ•āϰে āĻ“āĻ•ে āύি⧟ে āϘুāϰāĻ›িāϞাāĻŽ। āωāĻĢāĻĢāĻĢ āφāĻŽাāϰ
āĻĻেāĻ–া āϏেāϰা āĻ›āĻŦি āĻ“āϟা। āĻļা⧟āϞা āĻŦāϞāϤো āϧুāϰ āĻ›াāχ, āφāĻŽাāĻ•ে
āĻ–ুāĻļি āĻ•āϰāϤে āĻŽিāĻĨ্āϝা āĻŦāϞāĻ›ো।
-----
āϰিāĻšাāύ āϝāĻ–āύ ⧍ā§Ŧ āĻļে āĻĒা āĻĻিāϞ āϤāĻ–āύ āφāĻŽাāϰ ā§Ģ⧍ āĻŦāĻ›āϰ। āĻāϟা
āύি⧟ে āĻŦেāĻļ āĻāĻ•āϟা āĻšাāϏিāϰ āϰোāϞ āĻĒ⧜ে āĻ—ি⧟েāĻ›িāϞ। āĻŦাāĻŦা
āĻ›েāϞে āĻŦ⧟āϏে āĻĻ্āĻŦিāĻ—ুāύ। āϏেāχ āĻ•্āϞাāϏ āĻĢোāϰেāϰ
āĻ…āĻ™্āĻ•েāϰ āĻŽāϤ। āĻļা⧟āϞা āϏে āĻŦāĻ›āϰ āĻŦেāĻļ āĻ•্āώেāĻĒি⧟েāĻ›িāϞ
āφāĻŽা⧟, āϤāĻŦে āĻŦেāĻļি āĻĻিāύ āĻĒাāϰে āύি। āϰিāĻšাāύ āĻšāĻ াā§Ž āĻāĻ•āϟা
āĻŽে⧟েāĻ•ে āĻŦি⧟ে āĻ•āϰে āύি⧟ে āĻāϞো। āĻļা⧟āϞা
āĻĒ্āϰāϚāύ্āĻĄ āϰেāĻ—ে āĻ—ি⧟েāĻ›িāϞ āϏেāĻĻিāύ। āĻĒাāϰāϞে āϰিāĻšাāύāĻ•ে
āϜ্āϝাāύ্āϤ āĻĒুāϤে āĻĢেāϞāĻŦে। āĻŽāύে āĻ–ুāĻŦ āφāĻĒāϏেāϟ āĻšā§Ÿে
āĻ—েāϞ āĻļা⧟āϞা, āĻ•িāĻ›ুāĻĻিāύ āϤো āĻ–াāĻ“ā§Ÿা, āϘুāĻŽ āĻ›ে⧜েāχ āĻĻিāϞ।
āφāĻŽি āĻŦোāĻাāϞাāĻŽ, āĻ›েāϞে āĻŽাāύুāώ, āĻĒāĻ›āύ্āĻĻ āĻšā§ŸেāĻ›ে,
āĻŦি⧟ে āĻ•āϰেāĻ›ে। āĻ•েāύ āφāĻŽāϰাāĻ“ āϤো āĻāχ āĻ­াāĻŦেāχ
āĻŦি⧟ে āĻ•āϰেāĻ›ি āϤাāχ āύা?? āĻ•িāύ্āϤু āĻļা⧟āϞা āĻŦুāĻāϞো āύা। āϤাāϰ
āωāĻĒāϰ āϰিāĻšাāύেāϰ āĻŦāĻ‰ā§Ÿেāϰ āĻ…āĻŦাāϧ্āϝ āφāϚāϰāύ āĻŦাāϏাāϰ āĻ­িāϤāϰ
āĻŦেāĻļ āĻ–িāϟāĻŽিāϟ āĻĒāϰিāĻŦেāĻļেāϰ āϏৃāώ্āϟি āĻ•āϰāϞো। āϰিāĻšাāύ
āĻāĻ•āĻĻিāύ āĻĒ্āϰāϚāύ্āĻĄ āϰেāĻ—ে āϤাāϰ āϏিāĻĻ্āϧাāύ্āϤ āϜাāύি⧟ে āĻĻিāϞ,
āϏে āĻ āĻŦাāϏা⧟ āĻĨাāĻ•āĻŦে āύা। āĻ…āĻšāĻš āĻš্āϝাঁ āĻāĻ•āϟু āĻŦāϞেāχ āĻĻেāχ
āĻĒāϰে āφāĻŽি āĻ•িāϏ্āϤিāϤে āĻ…āĻĢিāϏ āĻĨেāĻ•ে āĻŦাāϏাāϟা ā§Ž āĻŦāĻ›āϰে
āĻ•িāύে āύি⧟েāĻ›িāϞাāĻŽ। āϏেāχ āϏ্āĻŦāĻĒ্āύেāϰ āĻŦাāϏা⧟ āϰিāĻšাāύ
āĻĨাāĻ•āĻŦে āύা, āϝাāϰ āϏ্āĻŽৃāϤি āϘিেāϰ āĻ āĻŦাāϏা āϏেāχ āĻĨাāĻ•āĻŦে āύা।
āφāĻŽি āĻ“āϰ āĻĒিāĻ  āϚেāĻĒে āĻĻি⧟ে āĻŦāϞāϞাāĻŽ, āϰাāĻ— āĻ•āϰিāϏ āύা।
āϤোāϰা āĻ āĻŦাāϏা⧟ āĻĨাāĻ•, āφāĻŽাāĻĻেāϰ āĻŦāϰং āĻŦৃāĻĻ্āϧাāĻļ্āϰāĻŽ āĻ āĻĻি⧟ে
āĻ†ā§Ÿ। āĻāϟাāχ āϤো āϚাāϚ্āĻ›িāϏ āϤাāχ āύা?? āϰিāĻšাāύ āφāĻŽāϤা āφāĻŽāϤা
āĻ•āϰে āĻ•িāĻ›ু āĻŦāϞāϤে āϚাāχāϞো। āφāĻŽি āĻšেāϏে āĻŦāϞāϞাāĻŽ,
"āĻ•োāĻĨাāĻ•াāϰ āĻŦৃāĻĻ্āϧাāĻļ্āϰāĻŽে āϝেāϤে āĻšāĻŦে?"
āĻ“ āĻŦāϞāϞ, āĻ—ুāϞāĻļাāύে। āĻ…āύেāĻ• āĻ­াāϞ āĻāĻ•āϟা āĻŦৃāĻĻ্āϧাāĻļ্āϰāĻŽ
āφāĻ›ে। āϤোāĻŽāϰা āĻ“āĻ–াāύে āĻ…āύেāĻ• āĻ­াāϞ āĻĨাāĻ•āĻŦে। āφāĻŽি
āĻšেāϏে āφāĻŽাāϰ āϰুāĻŽে āφāϏāϞাāĻŽ,āĻļা⧟āϞা āφāĻŽাāĻ•ে āϜ⧜ি⧟ে
āϧāϰে āĻĄুāĻ•āϰে āĻ•েঁāĻĻে āωāĻ āϞো। āĻ িāĻ• āĻāĻ•āχ āĻ•াāύ্āύা
āĻ•েঁāĻĻেāĻ›িāϞ āϰিāĻšাāύ āϝāĻ–āύ āϜāύ্āĻĄিāϏে āφāĻ•্āϰাāύ্āϤ āĻšā§ŸেāĻ›িāϞ।
āĻ•ি āĻ•াāύ্āύা āϟাāχ āĻ•āϰেāĻ›ে, "āφāĻŽাāϰ āϰিāĻšাāύ āĻ•ে āĻĢিāϰি⧟ে āĻĻাāĻ“"
āĻŦāϞে।
-----
āĻŦāϏুāύ্āϧāϰাāϰ āĻāχ āĻŦৃāĻĻ্āϧাāĻļ্āϰāĻŽে āĻŽোāϟ ā§Ŧā§Š āϜāύ āφāĻļ্āϰিāϤা। āϝাāϰ
āĻŽāϧ্āϝে āφāĻŽāϰা āĻĻুāϜāύ āĻ•āĻŽāĻŦ⧟েāϏি। āĻāχ āĻŦ্āϝাāĻĒাāϰ āϟা āĻ–ুāĻŦ āĻŽāϜা
āϞাāĻ—āϤো, āĻļা⧟āϞা āĻ•ে āĻŦāϞāϤাāĻŽ āĻĻেāĻ– āĻ•ি āĻ•āĻĒাāϞ āĻāϤ
āϜো⧟াāύ āĻŦ⧟āϏে āφāĻŽāϰা āϘāϰ āĻ›া⧜া! āĻļা⧟āϞা āĻŽুāĻ– āĻ•াāϞো
āĻ•āϰে āύিāϤ। āĻ•িāύ্āϤু āĻāĻ•āϟা āĻŽে⧟ে āĻšাāϏāϤো। āĻ“āϰ āύাāĻŽ
āϏাāĻŦিāĻšা।āĻāĻ–াāύে āĻĨাāĻ•ে। āϏāĻŦাāϰ āĻĻেāĻ–াāĻļুāύা āĻ•āϰে।āĻ•াāϰ āĻ•ি
āϞাāĻ—āĻŦে āϏেāχ āĻĻেāĻ–াāĻļুāύা āĻ•āϰে। āϝāĻ–āύ āĻĨেāĻ•ে āφāĻŽāϰা
āĻāϏেāĻ›ি āĻāχ āĻŽে⧟েāϟাāχ āφāĻŽাāĻĻেāϰ āĻĒāϰāĻŽ āĻ•াāĻ›েāϰ āĻšā§Ÿে
āĻ—েāĻ›ে। āĻĒ্āϰা⧟ āĻĻেāĻ–ি āϏাāĻŦিāĻšা āĻļা⧟āϞাāϰ āĻŽাāĻĨা⧟ āϤেāϞ āĻĻি⧟ে
āĻĻে⧟। āφāĻŽি āĻ“āϰ āĻŽাāĻĨা⧟ āĻ—ুāϤা āĻĻি⧟ে āĻŦāϞি āĻ•িāϰে ""āϤোāϰ
āĻāχ āĻŽাāĻ•ে āφāĻŦাāϰ āφāĻŽাāϰ āĻ•াāĻ› āĻĨেāĻ•ে āĻ•ে⧜ে āύিāĻŦি āύা
āϤো?? āĻŦুāĻিāϏ āĻāχ āĻāĻ•āϟাāχ āφāĻŽাāϰ āϏāĻŽ্āĻĒāĻĻ""। āĻ“ āφāĻŽাāϰ
āĻĒেāϟে āĻ—ুāϤা āĻĻি⧟ে āĻŦāϞāϤো, āχāĻšāĻšāĻš āφāĻŽাāϰ āĻ•ি āϏেāχ
āϏাāϧ্āϝ āφāĻ›ে?? āĻŦāϞে āĻ–িāϞ āĻ–িāϞ āĻ•āϰে āĻšাāϏāϤো।
----------
āĻ—ুāύে āĻ—ুāύে āĻĢেāϰ ā§¨ā§Ž āĻŦāĻ›āϰ āĻĒে⧜ি⧟েāĻ›ি। ā§Žā§Ļ āĻāϰ āĻŦু⧜া
āφāĻŽি , āĻŦৃāĻĻ্āϧাāĻļ্āϰāĻŽেāϰ āĻ—্āϰিāϞ āϧāϰে āĻĻা⧜ি⧟ে āφāĻ›ি।
āĻŦāϏুāύ্āϧāϰাāϰ āϏেāχ āĻŦৃāĻĻ্āϧাāĻļ্āϰāĻŽ āĻĨেāĻ•ে ā§Ģ āĻŽাāϏ āĻĒāχ
āĻĒাāϞি⧟েāĻ›ি। āϤাāϰāĻĒāϰ āĻāĻ–াāύে āĻāϏেāĻ›ি, āĻāĻ–āύ āϝেāĻ–াāύে
āφāĻ›ি āϏেāĻ–াāύেāϰ āύাāĻŽ āĻŦāϞāĻŦো āύা।āĻĒাāϞি⧟েāĻ›ি āĻ•াāϰāύ āϰিāĻšাāύ
āĻŽাāĻে āĻŽাāĻে āύ্āϝাāĻ•াāĻŽি āĻĻেāĻ–াāϤো, āĻšাāϰাāĻŽীāϰ āύ্āϝাāĻ•াāĻŽো
āφāĻŽাāϰ āĻĒāĻ›āύ্āĻĻ āĻšāϤো āύা। āĻ“āϰ āĻŽা⧟েāϰ āϏাāĻĨে āĻ•āĻĨা āĻŦāϞে
āϚāϞে āϝেāϤ। āĻĒাāϞি⧟ে āφāϏাāϰ āĻĒāϰ āĻ“āϰা āφāĻŽাāĻ•ে
āĻ–ুāϜেঁāĻ›িāϞ āĻ•িāύা āϜাāύি āύা, āϤāĻŦে āĻ–ুāϜেঁ āύি āĻāϟা āϏিāĻ“āϰ। āĻāχ
ā§¨ā§Ž āĻŦāĻ›āϰে āφāĻŽাāϰ āĻ•াāĻ›ে āĻ•িāĻ›ু āĻŦাāĻ•ী āύেāχ। ⧝ āĻŦāĻ›āϰ
āφāĻ—ে āĻšāĻ াā§Ž āĻļা⧟āϞা āϘুāĻŽি⧟ে āĻ—েāϞ, āĻāϤো āĻĄাāĻ•āϞাāĻŽ
āĻļুāύāϞোāχ āύা, āϘুāĻŽোāύোāϰ āφāĻ—ে āĻļুāϧু āϰিāĻšাāύ āĻ•ে
āĻĄাāĻ•āϞো। āφāĻŽাāϰ āĻŦুāĻ•āϟা āĻ•েঁāĻĒে āωāĻ āϞো,āϚোāĻ–ে
āĻাāĻĒāϏা āĻĻেāĻ–āϞাāĻŽ, āϏাāĻŦিāĻšা āϰোāϜ āφāϏāϤো āφāĻŽাāĻĻেāϰ
āĻĻেāĻ–āϤে। āϰোāĻĻ āĻŦৃāώ্āϟি, āĻā§œ, āĻāĻŽāύ āĻ•োāύ āĻĻিāύ āύেāχ
āϝে āϏে āφāϏেāύি। āĻāĻ•āĻĻিāύ āĻ–ুāĻŦ āϜ্āĻŦāϰ āύি⧟েāĻ“
āĻāϏেāĻ›িāϞ, āĻļা⧟āϞা āĻ–ুāĻŦ āĻŦāĻ•েāĻ›িāϞ āϏেāĻĻিāύ।
āύিāϜেāϰ āϏāύ্āϤাāύ āϝেāĻ–াāύে āĻāϤ āĻŦ⧜ āĻŦেāψāĻŽাāύ
āϏেāĻ–াāύে āĻĒāϰ āϏāύ্āϤাāύেāϰ āĻŽা⧟া⧟ āĻļা⧟āϞা āĻ•েঁāĻĻে āĻĻিāϤ।
āϝেāĻĻিāύ āĻļা⧟āϞা āϘুāĻŽি⧟ে āĻ—েāϞ, āϏাāĻŦিāĻšা ⧍ āĻŦাāϰ āϏেāύ্āϏāϞেāϏ
āĻšā§Ÿে āĻ—ি⧟েāĻ›িāϞ।āϚিā§ŽāĻ•াāϰ āĻ•āϰে āĻ•েঁāĻĻে āϝাāϚ্āĻ›িāϞো,
āĻŽাāϟিāϤে āĻŦāϏে āĻĒা āĻĻাāĻĒি⧟ে āφāĻŽ্āĻŽা āφāĻŽ্āĻŽা āĻŦāϞে
āϚেঁāϚাāϚ্āĻ›িāϞো। āϏāĻŦ āĻ•িāĻ›ু āĻ›ে⧜ে āĻ•āĻŦāϰে āĻļুāĻ‡ā§Ÿে
āĻĻিāϞাāĻŽ āĻļা⧟āϞা āĻ•ে। āĻāϰāĻĒāϰ āĻŽাāĻে āĻŽাāĻে āφāϏāϤো āϏাāĻŦিāĻšা,
āĻ—āĻŽ্āĻ­ীāϰ āĻ­াāĻŦে āĻ•āĻĨা āĻŦāϞāϤো, āĻļা⧟āϞাāϰ āϏāĻŦ āĻ•াāĻĒāϰ āĻ“
āύি⧟ে āĻ—ি⧟েāĻ›িāϞ, āφāĻŽাāϰ āĻ•াāĻ›ে āĻ›িāϞ āĻļুāϧু āϰিāĻšাāύেāϰ
āĻĢāϟো āĻāϞāĻŦাāĻŽ। āĻŦāĻ›āϰ āĻĻু⧟েāĻ• āĻĒāϰে āϟাāύা ā§§ āĻŽাāϏ
āφāϏāϞো āύা āϏাāĻŦিāĻšা, āĻ–ুāĻŦ āϚিāύ্āϤা⧟ āĻĒ⧜ে āĻ—েāϞাāĻŽ। āĻāĻ•āĻĻিāύ
āĻāĻ• āĻ›োāĻ•ā§œা āĻ—োāĻ›েāϰ āĻ›েāϞে āĻāϏে āĻāĻ•āϟা āϚিāĻ ি
āĻĻিāϞ। āφāϰ āĻŦāϞāϞ, āϏাāĻŦিāĻšা āĻŦুāĻŦু āĻĻি⧟েāĻ›ে।
āφāĻŽি āĻŦāϞāϞাāĻŽ āĻ“ āĻ•āχ? āφāϏে āύা āϝে?
āĻ›েāϞেāϟা āĻŽাāĻĨা āύিāϚু āĻ•āϰে āĻŦāϞāϞ, āĻŦুāĻŦু ⧍ā§Ģ āĻĻিāύ āφāĻ—ে
āϰোāĻĄ āĻāĻ•্āϏিāĻĄেāύ্āϟ āĻŽাāϰা āĻ—েāĻ›ে। āĻ“āϰ āϜিāύিāϏāĻĒāϤ্āϰ
āύি⧟ে āϝাāĻ“ā§Ÿাāϰ āϏāĻŽā§Ÿ āĻāχ āϚিāĻ ি āĻĒাāĻ“ā§Ÿা āĻ—েāĻ›ে, āφāϰ āĻāχ
āĻ িāĻ•াāύা। āĻŦāϞেāχ āĻ›েāϞেāϟা āϚāϞে āĻ—েāϞ, āφāĻŽি āĻŦুāĻ•ে āĻšাāϤ
āĻĻি⧟ে āĻ োāϟ āϚেāĻĒে āϧāϰāϞাāĻŽ..... āĻŦাāĻš āϏাāĻŦিāĻšা, āĻŦাāĻš āĻļা⧟āϞা।
āĻŦাāĻš!! āϤোāϰাāĻ“ āφāĻŽা⧟ āĻ›ে⧜ে āϚāϞে āĻ—েāϞি!
-------------
āĻšāĻ াā§Ž āĻāĻ•āϟা āĻ—া⧜িāϰ āĻšāϰ্āύে āϏেāĻĻিāĻ•ে āϤাāĻ•াāϞাāĻŽ। āĻŽাāϰ্āϏিāĻĄিāϜ
āĻŦেāĻž্āϜ। āĻāχāĻ—া⧜িāϟা āφāĻŽাāϰ āϏāĻŦāϚে⧟ে āĻĒāĻ›āύ্āĻĻ, āĻ•āĻ–āύো
āĻ•েāύাāϰ āϏাāĻŽāϰ্āĻĨ্āϝ āĻšā§Ÿāύি, āϤāĻŦে āĻāĻ•ে āĻĻুāϰ āĻĨেāĻ•েāχ
āĻĻেāĻ–āϞেāχ āϚিāύে āĻĢেāϞি। āĻ—া⧜িāϰ āϏাāĻŽāύেāϰ āϏিāϟ āĻĨেāĻ•ে
āĻāĻ•āϟা ⧍ā§Ģ/⧍ā§Ŧ āĻāϰ āĻ›োāĻ•ā§œা āύাāĻŽāϞো। āϚোāĻ–ে āϏিāĻ“āϰ
āĻ—ুāϚ্āĻ›ি āĻāϰ āϏাāύāĻ—্āϞাāϏ,āĻŦ⧜ āĻŦিāϰāĻ•্āϤিāĻ•āϰ āφāĻŽাāϰ āĻ•াāĻ›ে, āϤাāχ
āĻĻেāĻ–āϞেāχ āĻŦুāĻāϤে āĻĒাāϰি।
āĻ›েāϞেāϟা āĻ—া⧜িāϰ āĻĻāϰāϜা āĻ–ুāϞে āĻĻিāϞ। āĻāĻ•āϟা āĻŽাāĻ āĻŦ⧟েāϏি
āϞোāĻ•, āĻĒাāĻž্āϜাāĻŦি āĻĒāϰা, āφāϰ āĻāĻ• āĻŽāĻšিāϞা āĻŦেāϰ āĻšāϞো।
āĻāĻ•āϟু āĻ•াāĻ›ে āφāϏāϤেāχ āĻ–ুāĻŦ āϚিāύāϞাāĻŽ āϞোāĻ•āϟা āĻ•ে...
āĻ—্āϰিāϞ āĻ›ে⧜ে āĻšাāϟা āĻĻিāϞাāĻŽ āϤাāϰ āĻĻিāĻ•ে, āϏাāĻŽāύে āĻ—ি⧟ে
āĻĒাāĻž্āϜাāĻŦিāϰ āĻ•āϞাāϰ āϚিāĻĒে āϧāϰে āĻĻুāϟো āĻĨাāĻĒ্āĻĒāϰ āĻĻেāĻŦ,
āϝেāϟা āφāĻŽাāϰ āφāϰো ā§¨ā§Ž āĻŦāĻ›āϰ āφāĻ—ে āĻĻেāĻ“ā§Ÿা āωāϚিāϤ
āĻ›িāϞ। āφāϰ āĻĒ্āϰāĻļ্āύ āĻ•āϰāĻŦো "āφāϜ āĻ•েāĻŽāύ āϞাāĻ—āĻ›ে āϰে
āϰিāĻšাāύ ?" āφāĻŽি āϜাāύি āĻ“ āφāĻŽাāϰ āĻĨাāĻĒ্āĻĒāϰ āĻ–ে⧟ে āĻ•াāύ্āύা
āĻ•āϰāĻŦে āύা, āĻ“ āĻ•াঁāĻĻāĻŦে āφāĻŽাāϰ āĻĒ্āϰāĻļ্āύ āĻļুāύে। āĻ•িāύ্āϤু āφāĻŽি
āĻ“āĻ•ে āĻ•্āώāĻŽা āĻ•āϰāĻŦো āύা . . .
(āϏংāĻ—ৃāĻšীāϤ)

GDPR checklist for businesses

Remember, your GDPR checklist needs to take into account past and present employees and suppliers as well as customers (and anyone else’s ...