![]() ![]() ![]() However, personal meetings come with their fair share of risks that might far outweigh the benefits. It also helps to weed out an imposter and ensure you know who information is going to or coming from. The major benefit of a face-to-face meeting is there’s no need for a third-party application. Arguably, one of the safest ways is to meet in person. There are various methods by which you can communicate with your source. Every facet needs to be covered by everyone. This involves everything from data storage to communication via safe devices. This way, you can minimize the risk of a breach of information. As you learn, be sure to educate colleagues, sources, and any other potential leaks. There’s no point in taking extensive measures on your end if they are careless and blow it all with an unencrypted email or casual text message.Įvery step you take to protect you and your source needs to be mimicked by them. Educate your sourcesĪside from utilizing common sense, you need to ensure that your sources are as educated as you are when it comes to privacy. It’s good to always know what you’re up against and have awareness of the tools available to help you. When you need to make payments, always use cash or prepaid credit cards, or even consider Bitcoin.įinally, make sure you keep up to date with technological advances. And don’t meet in places where there’s going to be a lot of security cameras. When it comes to meeting, don’t use public transportation as this can be easily tracked. We’ll go into more detail about various forms of contact later, but it’s worth stating the basics from the get-go. It’s simply not worth the risk.Īside from recording data, common sense should be used in other situations. ![]() The same goes for keeping notes on a laptop, on your cellphone, or in the cloud. That said, when you examine your everyday habits, you might be surprised at how many small mistakes you make.įor example, if you scribble notes on a piece of paper pertaining to any tiny details about your source or information passed between you, then you may be putting both parties at risk. Use common senseįirst and foremost, you need to use common sense, which may seem glaringly obvious. This article will walk you through 16 key steps you can take to protect yourself, your sources, and your information. When combined together, they can greatly reduce the risk of information being discovered by prying eyes. These range from simply utilizing common sense to employing some of the most up-to-date technologies. However, there are steps you can take to protect yourself, your sources, and the information you share. Today, privacy seems like a thing of the past. ![]() Safeguarding data and protecting undisclosed sources are part of the job. For journalists, this is particularly true, and the compromise of sensitive data can have a potentially disastrous impact. However, for many individuals, seeing certain pieces of information fall into the wrong hands can have much broader implications. For some, maintaining privacy is simply a matter of preference, and breach of information doesn’t necessarily have negative consequences. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |