0% found this document useful (0 votes)
25 views

PRIVACY

The document discusses the importance of privacy in the digital age, highlighting the need for protection against identity theft, discrimination, and the control individuals have over their personal information. It outlines various methods of data collection surveillance by governments, corporations, and third parties, as well as the challenges posed by social media and cloud computing. Additionally, it reviews key privacy laws like GDPR and CCPA, and offers strategies for protecting personal information and managing digital footprints.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

PRIVACY

The document discusses the importance of privacy in the digital age, highlighting the need for protection against identity theft, discrimination, and the control individuals have over their personal information. It outlines various methods of data collection surveillance by governments, corporations, and third parties, as well as the challenges posed by social media and cloud computing. Additionally, it reviews key privacy laws like GDPR and CCPA, and offers strategies for protecting personal information and managing digital footprints.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

PRIVACY

-It is an individual’s right to retain certain information about himself or herself without
disclosure.

I. Importance of Privacy in Digital Age

 Protection from Identity Theft

- Helps safeguard personal data from malicious actors.

 Preventing Discrimination

- Personal data can be misused to unfairly treat individuals in various


areas. By maintaining privacy, we help prevent such misuse.

 Control Over Personal Information

- Individuals should have the right to control who has access to their
personal information and how it's used. This autonomy is fundamental to
personal freedom.

II. Data collection surveillance


- involves the continuous or periodic gathering of data from individuals, devices,
or systems. This data can include personal information, behavioral patterns,
location data, and more. It is often conducted by:

o Governments: For national security, law enforcement, or public safety.

o Corporations: For marketing, product development, or customer analytics.

o Third Parties: Such as data brokers who collect and sell data to other entities.

Methods of Data Collection Surveillance

Surveillance relies on various technologies and techniques to collect data:

Online Tracking:

- Cookies and tracking pixels on websites.

- Social media monitoring.

- Search engine activity tracking.

Device-Based Tracking:
- GPS and location tracking on smartphones.

- Wearable devices (e.g., fitness trackers).

- Smart home devices (e.g., voice assistants).

Network Surveillance:

- Internet service providers (ISPs) monitoring online activity.

- Metadata collection (e.g., call logs, message timestamps).

Physical Surveillance:

- CCTV cameras.

- Facial recognition systems.

- License plate readers.

Purpose of Data Collection Surveillance

A. Government and Law Enforcement:

- Preventing crime and terrorism.

- Monitoring public spaces for safety.

- Investigating illegal activities.

B. Corporate and Commercial Use:

- Targeted advertising.

- Improving user experience.

- Market research and trend analysis.

C. Research and Development:

- Academic studies.

- Technological innovation (e.g., AI training).

III. Privacy Laws

Privacy laws are designed to protect individuals' personal data and regulate how
organizations collect, store, and use this information.

a. General Data Protection Regulation (GDPR)


- Requires consent for data collection.

- Grants individuals rights (e.g., access, rectification, erasure).

- Mandates data breach notifications.

- Imposes heavy fines for non-compliance (up to 4% of global revenue).

b. California Consumer Privacy Act (CCPA)

- Gives consumers the right to know what data is collected.

- Allows consumers to opt out of data sales.

- Provides rights to access and delete personal data.

c. Personal Information Protection and Electronic Documents Act (PIPEDA)

- Requires consent for data collection.

- Limits data use to specified purposes.

- Provides individuals with access to their data.

d. Health Insurance Portability and Accountability Act (HIPAA): Protects health


information in the USA.

e. Children’s Online Privacy Protection Act (COPPA): Protects children’s data in the
USA.

IV. PRIVACY CHALLENGES IN SOCIAL MEDIA AND CLOUD COMPUTING

*Cloud Computing

- It stores and accesses data and programs on remote servers hosted on the internet
instead of the computer’s hard drive or local server.

* Social Media

- Are communications on the internet through which users share information, ideas,
personal messages, etc.

A. Privacy Challenges in Social Media


 Data Collection and Profiling: Social media companies collect vast amounts of personal
data, including names, emails, birthdates, interests, and locations. This data is used to build
detailed profiles of users, which can be leveraged for targeted advertising.

 Security Breaches: The aggregation of personal data makes social media platforms
attractive targets for cybercriminals. Security breaches can expose user data, leading to
identity theft, scams, and other illegal activities.

 Third-Party Data Sharing: User data is often shared with third parties, such as
marketers and government agencies, without the user's knowledge or consent. This
practice raises significant privacy concerns.

 Misinformation and Fake News: Social media platforms can be used to spread false
information, which can have serious real-world consequences. This issue is compounded
by the algorithms that often show users content they agree with, creating echo
chambers.

 Cyberbullying and Harassment: Social media can be a breeding ground for


cyberbullying and harassment, which can have severe negative effects on users' mental
health.

 Privacy Policies and User Consent: Many users are not fully aware of the privacy
risks involved in oversharing on social media. Lengthy terms of service agreements often
obscure how user data will be used.

B. Privacy Challenges in Cloud Computing

 Data Confidentiality Issues: Ensuring user data remains private and inaccessible to
unauthorized users. Trust between users and cloud providers is crucial.

 Data Loss Issues: Risks of data loss or theft can deter users from trusting cloud
services, especially after any past incidents. Cloud outages also affect trust.

 Geographical Data Storage Issues: Data stored in various global locations can lead
to concerns about legal jurisdiction and law enforcement access.

 Multi-Tenancy Security Issues: Sharing resources among multiple users can


expose customers to risks if an attacker exploits shared infrastructure.

 Transparency Issues: Cloud providers need to clearly communicate their security


policies and readiness to gain user trust. Information must be accessible and
understandable.

V. PROTECTING PERSONAL INFORMATION AND DIGITAL FOOTPRINTS

Digital Footprint
- It refers to the trail of data you leave when using the internet.

2 Types of Digital Footprint

1. Active Digital Footprint

- It is made when you knowingly share information about yourself online, such as
through social media posts or by filling out online forms.

2. Passive Digital Footprint

-It is created without your knowledge, such as data collected by online platforms or
your browser history.

 WAYS TO PROTECT PERSONAL INFORMATION AND DIGITAL FOOTPRINTS

1. Use Strong, Unique Passwords

2. Monitor Privacy Settings

3. Keep Software Updated

4. Think Before You Click

5. Firewall

You might also like