How to manage the online legacy of our deceased family members?
Although it is a sad issue to consider, it is a fact that our ever larger online footprint will once become a legacy someone else must manage. Social media service providers are constantly refining the possibilities concerning the accounts of deceased people, however, personal arrangements and preliminary planning are also gaining importance.
How to protect our computer from ransomware?
Cybercriminals launch targeted attacks, and after the viruses are activated, they demand ransom in return for the owner being able to access the data again.
Children’s photos on the net — How (not) to post about your child
You may be familiar with Facebook’s timeline, where you inevitably bump into cute photos of children. Keeping in mind certain safety considerations and the child’s opinion can best serve the child's interests.
What is the Internet Hotline?
The Internet Hotline is a legal advisory service. We help to quickly remove illegal content found around the Web based on reports.
When and how should we be contacted?
We accept reports in nine categories on this website and by email, even anonymously.
What do we do when we receive a report?
If the content reported is indeed illegal, we call on the editor of the publishing website or the operator of the server hosting the content to delete the parts concerned with the complaint.
Not an administrative procedure, but still effective
The Internet Hotline’s action is not an administrative procedure, but the high number of cases solved goes to show that our procedure is very effective.
Where we do not have competence
There are cases of online infringement where we do not have competence; however, we always inform the persons making reports about where they can get assistance.
How do we manage personal information we receive?
Personal information provided by visitors browsing our website or making reports is always treated in confidence and in accordance with current legislation and do not reveal it third parties.
What makes personal data personal and how does the law protect them?
The Fundamental Law, the Civil and the Criminal Code and the Act on Informational Self-Determination all protect your personal data. This is important to remember, given that even the sharing of a photo may represent a breach of the law if it is done without your consent.
What protection does legislation provide against cyberbullying?
Cyberbullying means online intimidation and/or harassment. It has many forms, but what is common in all of them is that they are committed with malicious intent over the internet using computers or mobile devices.
What is the difference between offline and online bullying in practice?
Offline bullying includes, for example, bullying, teasing and name-calling at school, while online bullying, or cyberbullying, takes place on the internet, through computers and mobile phones.
Why is sexting risky?
Sexting is when someone sends erotic photos/videos taken of himself/herself or sexually explicit text messages to a friend or acquaintance by mobile phone or over the internet.
How is revenge porn addressed by different legal systems?
This phenomenon does not go ignored by law: Hungary has already had its first court case related to revenge porn.
How does online grooming work?
Sometimes you cannot be sure whether the person you interact with over the internet is really who he/she is claiming to be.
What is a secure password in 2017?
First and foremost, a secure password is actually kept confidential, without anybody other than its user knowing it.
What is the point of two-factor authentication?
Two-factor authentication is much more secure than mere password authentication and can now be set up for almost anything.
When to choose online encryption?
You can make conscious decisions to protect your sensitive data online. Financial transactions should only be conducted on websites starting with https and only such sites should be trusted with your personal information.
What are fake profiles?
Creating a fake profile means registering with a name other than one’s own by misusing someone else’s identity or using a fictitious person’s identity.
National Media and Infocommunications Authority
Mailing address: Ostrom u. 23-25 H-1015 Budapest, Hungary