Facebook, the world’s most popular social network is more than just a platform for keeping in touch with friends and distant relatives. This is the place where most companies, online shops, new rooms and other organization entities market themselves to the world. Recently, Google introduced […]
It should not come as a surprise that our children are into anything technological, that is, PlayStation, X-Box, I-Pod, the Internet and the list goes on because after all these things are of their generation. It is simply in keeping with the norm of every […]
Privacy refers to the right of an individual to determine or chose who, when, how or to what level his/her personal details can be shared. Privacy help users trust online services with their personal information. Yet time and again, internet privacy is always under pressure of being undermined. Promoting strong data privacy measures and ethical data collection methods can protect and foster online privacy.
Privacy is an essential element of our lives-whether online or in the real world. Its helps folks express themselves, preserve their dignity and go about their lives knowing their personal details are safe. However, technological advancement has made information gathering a super easy and inexpensive activity. For instance:
Data storage costs are very low thus encouraging internet users to store their data for a very long time.
- Data proliferation is on the increase due to fast sharing and distribution
- Online search tools have been designed to search for everything including images, sounds, movements, locations and other things making it easier to track anybody and what they do.
- There are sophisticated tools to link, correlate and analyze data in large scale
- Mobile phones have features that keep us connected to the web for easy tracking.
Personal data is currently profitable in many ways. Each day, many people are exchanging information over the internet (whether knowingly or unknowingly). The increase in this data puts many people at risk and exerts even greater challenges on data protection methods.
This is why it’s imperative that there be some form of global privacy protection measures that promote ethical data collection and handling. Such a frame work will foster the concepts of transparency, fairness, participation, legitimacy and accountability.
Global Internet privacy policies
Even though the world refused the internet to be controlled by the UN or any other single entity, some key concerns like personal privacy, intellectual property protection, hate speech, online child safety and regulation of objectionable content have motivated global interactions in an effort to clean up the internet.
Nevertheless, there are no data protection or universal privacy laws that apply across the web. In an attempt to curb the growing privacy concerns, several democracies like the US unite to come up with laws that govern every facet of the internet. This is what some people term “Multistakeholderism.”
Multistakeholderism, like democracy has been found to be lacking in many ways. For instance, it doesn’t clearly define the issues of internet governance or stipulate the paramount values shaping the internet policy. However, there are a few national and international frameworks that have wrapped their tentacles together to come up with a set of key privacy principles. One of these organizations is OECD- Organization for Economic Co-operation and Development created in 2013. Their privacy guidelines are majorly used as a reference point when developing internet privacy policies.
OECD’s principles advocate the following:
- Data quality- the data collected should be complete, accurate and used for the purpose it was intended for without manipulation.
- Collection limitation- collecting personal data should have limits. The process should also be done through a fair or lawful means-of course with the consent from the owner.
- Purpose specification- how personal data will be used should be specified beforehand and limited to that purpose only.
- Use limitation- there should be a limit to how personal data can be used; such information needs not to be disclosed, distributed or used for other purposes without the consent of the owner.
- Security safeguards- personal data should be protected by the best security standards possible
- Openness- a general policy of openness regarding online privacy can help everyone feel secure
- Individual participation- individuals should have right to edit, delete or decide to what extent their details can be shared.
- Accountability-those who collect personal information should comply with the rules in place and are responsible for protecting user data.
Challenges facing global Internet privacy policies
- What data needs protecting
Privacy policies and laws protect personal information. Commonly, personal information is defined as “any information related to an identifiable individual.” However, definitions vary and this makes it challenging to decide what information is considered personal. Furthermore, the ever advancing technology makes protecting personal data a pipe dream.
- Different legal requirements
Privacy laws differ from one country to another. What may be protected in the US may not enjoy the same favor in France and vice versa. To make matters worse, each country defends its laws to be applicable to its people. This makes it very hard to come up with uniform global laws to protect the privacy of all internet users.
The same concern goes for protecting an individual’s data when it crosses borders. There should be some provisions in place for these “special” circumstances. Otherwise, providing maximum security for personal data will be impossible.
- Real meaningful consent
Privacy laws allow corporations or organizations to use personal information after the user has consented to it. Nevertheless, the agreement terms to be signed by the user are usually lengthy and written in legal jargon that makes it impossible for them to know what exactly they are signing for. Users’ need some systems that can allow them to know if their data is being used contrary to the terms of agreement.
Even though there are no global policies protecting user data, many organizations have come up with pretty good laws that can guarantee the safety of internet users. These policies provide standards that can be adopted by many other internet organizations. If internet users find it hard to trust internet, they can hamper its development.
The digital world introduced us to its many benefits and before we could know, it introduced another hand to take from us. Since 2010, many people and companies have suffered a heavy blow as a result of their private details being unveiled to the world. […]
Facebook, Twitter, Instagram and other common social sites are ruling the world. Even if they are not, we can admit their influence is pretty widespread. Regardless of age, people are growing more and more attached to social networking sites. Some use them to keep in […]
Smartphones are the center of our lives. If you phone gets lost or damaged today, chances are high you will lose many deals, or important information. Many of us have a habit of keeping our personal details in our phones because whenever we need such information, the phone will always be nearby. So, if the phone gets infected or stolen, you may be in for a lot of trouble.
Lately, advancement in technology has left many electronic devices in high risk. Malicious parties are always on the lookout for less secure devices to fish out important data from them. It’s therefore imperative that you know some of the simplest ways you can secure device and keep your sensitive data intact.
5 simple steps to keep your smartphone safe and secure
- Use key lock code/PIN
A recent research showed that many people don’t use PINs and key lock codes to secure their smartphones. If it gets lost or left unattended, you give strangers access to all your vital information. This may result in the phone being used to make unwanted calls or to register for illegal services. This could result in you being dragged into federal cases and being penalized for accessing restricted places.
All smartphones allow you to secure them with either a pattern or a PIN. A pattern is a shape you draw on the screen in order to access a phone. This method is simple, faster and hassle free. You can also use a PIN with four or more numbers to restrict access to your device. Avoid using simple numbers like 1234 or 0000. Sometimes even your year of birth is not advisable. Choose something that will be hard to guess.
Screen locks are also helpful but if your SIM card is not secured with a PIN, it can be used in another phone to make unwanted calls. The use of PIN and key lock renders your phone useless to the thief unless they flash its memory and clear it of all your data.
- Protect sensitive data
Passwords, screen locks and PINs prevent your handheld device from being accessed but doesn’t protect your data completely. Smartphones have internal and removable memory slots that can be plugged in a computer and your files read or transferred. Thankfully, there are many types of software that can bar sensitive files from being viewed or copied.
Security software may require a code to be entered for one to read or copy files. The software is free for download and once installed, all your data will be secured. In addition to this type of security, most tech experts advise storing sensitive data on secure online servers.
- Watch your wireless and other hotspots
All smartphones have an option of connecting to Wi-Fi hotspots. This feature helps to save on data usage by allowing you to surf the internet using public Wi-Fis. Make sure the hotspot you are connected on doesn’t allow sending of information across the airwaves. This is big security concern. Always switch of your Wi-Fi when not in use to avoid a malicious party sending infected files to your device.
The most common threat that public hotspot users face is termed the “evil twin” attack. This is where a malicious party sets up a Wi-Fi hotspot that looks exactly like that of a legitimate firm to lure unsuspecting internet lovers to connect to it. Normally, they will ask vital info like your credit card number as a password. You don’t even need to be vigilant to know this is a trap. Steer clear from hotspots that ask personal information.
- Get your apps from trusted sources
Before you even install an app, some phones will let you know if it comes from untrusted source. Apps from untrusted sources can give hackers leeway into your device and this may get you into trouble. Read the comment section first to see if there are serious complains about the app before downloading it.
Stick to applications from Android’s Google Play Store or iPhone’s Apple store if you must download an app.
- Restrict Bluetooth Use
If you are not using your Bluetooth, make sure it’s off. Also, ensure you set your Bluetooth to “allowed devices only” so it doesn’t connect to any other device near you.