PRIVACY
PRIVACY
-It is an individual’s right to retain certain information about himself or herself without
disclosure.
Preventing Discrimination
- Individuals should have the right to control who has access to their
personal information and how it's used. This autonomy is fundamental to
personal freedom.
o Third Parties: Such as data brokers who collect and sell data to other entities.
Online Tracking:
Device-Based Tracking:
- GPS and location tracking on smartphones.
Network Surveillance:
Physical Surveillance:
- CCTV cameras.
- Targeted advertising.
- Academic studies.
Privacy laws are designed to protect individuals' personal data and regulate how
organizations collect, store, and use this information.
e. Children’s Online Privacy Protection Act (COPPA): Protects children’s data in the
USA.
*Cloud Computing
- It stores and accesses data and programs on remote servers hosted on the internet
instead of the computer’s hard drive or local server.
* Social Media
- Are communications on the internet through which users share information, ideas,
personal messages, etc.
Security Breaches: The aggregation of personal data makes social media platforms
attractive targets for cybercriminals. Security breaches can expose user data, leading to
identity theft, scams, and other illegal activities.
Third-Party Data Sharing: User data is often shared with third parties, such as
marketers and government agencies, without the user's knowledge or consent. This
practice raises significant privacy concerns.
Misinformation and Fake News: Social media platforms can be used to spread false
information, which can have serious real-world consequences. This issue is compounded
by the algorithms that often show users content they agree with, creating echo
chambers.
Privacy Policies and User Consent: Many users are not fully aware of the privacy
risks involved in oversharing on social media. Lengthy terms of service agreements often
obscure how user data will be used.
Data Confidentiality Issues: Ensuring user data remains private and inaccessible to
unauthorized users. Trust between users and cloud providers is crucial.
Data Loss Issues: Risks of data loss or theft can deter users from trusting cloud
services, especially after any past incidents. Cloud outages also affect trust.
Geographical Data Storage Issues: Data stored in various global locations can lead
to concerns about legal jurisdiction and law enforcement access.
Digital Footprint
- It refers to the trail of data you leave when using the internet.
- It is made when you knowingly share information about yourself online, such as
through social media posts or by filling out online forms.
-It is created without your knowledge, such as data collected by online platforms or
your browser history.
5. Firewall