Fifth Blog - Key Privacy and Anonymity Issue
Blog # 5 - Key Privacy and Anonymity Issues
By: Nicole Bernal Marcial
According to slideshare, internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail either Personally Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website. PII refers to any information that can be used to identify an individual. For example, age and physical address alone could identify who an individual is without explicitly disclosing their name, as these two factors are unique enough to typically identify a specific person.
Privacy is the key that unlocks the aspects of yourself that are most intimate and personal, that make you most you, and most vulnerable. Your naked body. Your sexual history and fantasies. Your past, present and possible future diseases. Your fears, your losses, your failures. The worst thing you have ever done, said, and thought. Your inadequacies, your mistakes, your traumas. The moment in which you have felt most ashamed. That family relation you wish you didn’t have. Your most drunken night.
When you give that key, your privacy, to someone who loves you, it will allow you to enjoy closeness, and they will use it to benefit you. Part of what it means to be close to someone is sharing what makes you vulnerable, giving them the power to hurt you, and trusting that person never to take advantage of the privileged position granted by intimacy. People who love you might use your date of birth to organise a surprise birthday party for you; they’ll make a note of your tastes to find you the perfect gift; they’ll take into account your darkest fears to keep you safe from the things that scare you. Not everyone will use access to your personal life in your interest, however. Fraudsters might use your date of birth to impersonate you while they commit a crime; companies might use your tastes to lure you into a bad deal; enemies might use your darkest fears to threaten and extort you. People who don’t have your best interest at heart will exploit your data to further their own agenda. Privacy matters because the lack of it gives others power over you.
You might think you have nothing to hide, nothing to fear. You are wrong unless you are an exhibitionist with masochistic desires of suffering identity theft, discrimination, joblessness, public humiliation and totalitarianism, among other misfortunes. You have plenty to hide, plenty to fear, and the fact that you don’t go around publishing your passwords or giving copies of your home keys to strangers attests to that.
When you give that key, your privacy, to someone who loves you, it will allow you to enjoy closeness, and they will use it to benefit you. Part of what it means to be close to someone is sharing what makes you vulnerable, giving them the power to hurt you, and trusting that person never to take advantage of the privileged position granted by intimacy. People who love you might use your date of birth to organise a surprise birthday party for you; they’ll make a note of your tastes to find you the perfect gift; they’ll take into account your darkest fears to keep you safe from the things that scare you. Not everyone will use access to your personal life in your interest, however. Fraudsters might use your date of birth to impersonate you while they commit a crime; companies might use your tastes to lure you into a bad deal; enemies might use your darkest fears to threaten and extort you. People who don’t have your best interest at heart will exploit your data to further their own agenda. Privacy matters because the lack of it gives others power over you.
You might think you have nothing to hide, nothing to fear. You are wrong unless you are an exhibitionist with masochistic desires of suffering identity theft, discrimination, joblessness, public humiliation and totalitarianism, among other misfortunes. You have plenty to hide, plenty to fear, and the fact that you don’t go around publishing your passwords or giving copies of your home keys to strangers attests to that.
One of the key privacy and anonymity issue is about data encryption. There are two fundamental forms of data encryption, the Cryptography and the Encryption. Cryptography is a science of encoding messages and a key tool for ensuring confidentiality, integrity, authenticity of electronic messages and online business transactions. Only sender and intended receiver can understand the messages. Encryption is the process of converting electronic messages into a form understood only by the intended recipients. Under data Encryption is the variable value applied using an algorithm to encrypt or decrypt text called Encryption Key. It has two types of key systems, one is the public key system that uses two keys to encode and decode messages and the private key system that uses a single key to both encode and decode messages. Another key privacy and anonymity issue is about government electronic surveillance. The laws about the electronic surveillance that was stated are Federal Wiretap Act, Electronic Communications Privacy Act of 1986 (ECPA), Foreign Intelligence Surveillance Act of 1978 (FISA), Executive Order 12333, Communications Assistance for Law Enforcement Act (CALEA) and USA Patriot Act of 2001.
Another key privacy and anonymity issue is about identity theft. The identity theft is a theft of key pieces of personal information to gain access to a person’s financial accounts. Information includes: name, address, date of birth, Social Security number, Passport number, Driver license number, and Mother’s maiden name. It is one of the fastest growing forms of fraud in the United States due to lack of initiative in informing people whose data was stolen. It can be done by phishing and spyware. Identity Theft and Assumption Deterrence Act of 1998 was passed to fight fraud. Another key privacy and anonymity issue is about consumer profiling. Companies openly collect personal information about internet users but some companies don’t protect and respect customer information resulting to lose their business and some become defendants in class action lawsuits stemming from privacy violations. Opponents of consumer profiling are also concerned that personal data is being gathered and sold to other companies without the permission of consumers who provide the data. After the data has been collected, consumers have no way of knowing how it is used or who is using it. Using a web site in gathering consumer’s profiles, it may be stored on a user’s hard drive known as cookies. There are other means of collecting data while a consumer is surfing the Web. The three types are GET data which is the trail that a consumer take when they browse the web, POST data which is an information typed into blank fields, and Click stream data which us the history of the information of what the user sought and viewed.
Other marketers are using Personalization software to optimize the number, frequency, and mixture of their ad placements. These are its types: the Rules-based which ties business rules to customer-provided preferences, Collaborative-filtering which offers recommendations based on the types of products purchased, Demographic filtering which collects click-stream data with personal demographical data and the Contextual commerce which associates product promotions with specific content a user may be receiving. Another key privacy and anonymity issue is about need to treat customer data responsibly. When dealing with consumer data, strong measures are required to avoid customer relationship problems. A widely accepted approach to treating consumer responsibly is for a company to adopt the Fair Information Practices and the 1980 OECD privacy guidelines. Under these guidelines, an organization collects only personal information that is necessary to deliver its product or service. The company ensures that the information is carefully protected and accessible only by those with a need to know, and that consumers can review their own data and make corrections. The company informs customers if it intends to use customer information for research or marketing, and it provides a means for them to opt out. Another key privacy and anonymity issue is about workplace monitoring. This is for the employers for them to monitor workers. 78% of major U.S. firms record and review employee communications and activities like phone calls, e-mails, internet connections, computer files and videotaping. The Fourth Amendment cannot be used to limit how a private employer treats its employees because public-sector employees have far greater privacy rights than in the private industry. Also, privacy advocate want federal legislation to keep employers from infringing upon privacy rights of employees. Another key privacy and anonymity issue is about spamming. Spamming is the sending of many copies of the same messages in an attempt to force a large number of people to read a message they would otherwise choose not to receive. The Controlling the Assault of Non-Solicited Pornography and Marketing (CANSPAM) says it is legal to spam but spammers cannot disguise their identity, there must be a label in the message specifying that the e-mail is an ad or solicitation, and they must include a way for recipients to indicate they do not want future mass mailings. Last key privacy and anonymity issue is about advanced surveillance techniques. This key privacy is about Camera surveillance which U.S. cities plan to expand surveillance systems, Facial recognition software which identifies criminal suspects and other undesirable characters and yields mixed results and Global Positioning System (GPS) chips which are placed in many devices and precisely locate users.
Another key privacy and anonymity issue is about identity theft. The identity theft is a theft of key pieces of personal information to gain access to a person’s financial accounts. Information includes: name, address, date of birth, Social Security number, Passport number, Driver license number, and Mother’s maiden name. It is one of the fastest growing forms of fraud in the United States due to lack of initiative in informing people whose data was stolen. It can be done by phishing and spyware. Identity Theft and Assumption Deterrence Act of 1998 was passed to fight fraud. Another key privacy and anonymity issue is about consumer profiling. Companies openly collect personal information about internet users but some companies don’t protect and respect customer information resulting to lose their business and some become defendants in class action lawsuits stemming from privacy violations. Opponents of consumer profiling are also concerned that personal data is being gathered and sold to other companies without the permission of consumers who provide the data. After the data has been collected, consumers have no way of knowing how it is used or who is using it. Using a web site in gathering consumer’s profiles, it may be stored on a user’s hard drive known as cookies. There are other means of collecting data while a consumer is surfing the Web. The three types are GET data which is the trail that a consumer take when they browse the web, POST data which is an information typed into blank fields, and Click stream data which us the history of the information of what the user sought and viewed.
Other marketers are using Personalization software to optimize the number, frequency, and mixture of their ad placements. These are its types: the Rules-based which ties business rules to customer-provided preferences, Collaborative-filtering which offers recommendations based on the types of products purchased, Demographic filtering which collects click-stream data with personal demographical data and the Contextual commerce which associates product promotions with specific content a user may be receiving. Another key privacy and anonymity issue is about need to treat customer data responsibly. When dealing with consumer data, strong measures are required to avoid customer relationship problems. A widely accepted approach to treating consumer responsibly is for a company to adopt the Fair Information Practices and the 1980 OECD privacy guidelines. Under these guidelines, an organization collects only personal information that is necessary to deliver its product or service. The company ensures that the information is carefully protected and accessible only by those with a need to know, and that consumers can review their own data and make corrections. The company informs customers if it intends to use customer information for research or marketing, and it provides a means for them to opt out. Another key privacy and anonymity issue is about workplace monitoring. This is for the employers for them to monitor workers. 78% of major U.S. firms record and review employee communications and activities like phone calls, e-mails, internet connections, computer files and videotaping. The Fourth Amendment cannot be used to limit how a private employer treats its employees because public-sector employees have far greater privacy rights than in the private industry. Also, privacy advocate want federal legislation to keep employers from infringing upon privacy rights of employees. Another key privacy and anonymity issue is about spamming. Spamming is the sending of many copies of the same messages in an attempt to force a large number of people to read a message they would otherwise choose not to receive. The Controlling the Assault of Non-Solicited Pornography and Marketing (CANSPAM) says it is legal to spam but spammers cannot disguise their identity, there must be a label in the message specifying that the e-mail is an ad or solicitation, and they must include a way for recipients to indicate they do not want future mass mailings. Last key privacy and anonymity issue is about advanced surveillance techniques. This key privacy is about Camera surveillance which U.S. cities plan to expand surveillance systems, Facial recognition software which identifies criminal suspects and other undesirable characters and yields mixed results and Global Positioning System (GPS) chips which are placed in many devices and precisely locate users.
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiivXlDcOe2o8Xo5Am_pZPAoUZe9QCcp7AquDu6eJIrzwSIBR_bSLQAXRpe-fbGjVQrvRXRZnogljS10Zi24-w0CdwP4Vfhw08v_UTqyuS10n-cub7GkLE67msPN5WkLJOnjATGLoPSiFrz/s200/download.png)
In my opinion, it is important to have privacy protection but the use of information technology in business requires the balancing of the needs of those who use information about individuals against the rights and desires of those individuals whose information may be used.
It is okay for you that someone knows your password on your cellphone or Social Media Account?
In my opinion, it depends upon how much you trust the person. I know my little sister's email passwords and have them stored in my password manager. That way when she forgets them I can look them up. However, very rarely does anyone. ever need to know your password to anything. No one you don't personally know needs to ever know your personal passwords. So, I wouldn't give my password to someone who was just asking for it without having a reason that I needed to give it to them, and that certainly doesn't include them just asking for it. Giving your personal password is too dangerous.
In my opinion, it depends upon how much you trust the person. I know my little sister's email passwords and have them stored in my password manager. That way when she forgets them I can look them up. However, very rarely does anyone. ever need to know your password to anything. No one you don't personally know needs to ever know your personal passwords. So, I wouldn't give my password to someone who was just asking for it without having a reason that I needed to give it to them, and that certainly doesn't include them just asking for it. Giving your personal password is too dangerous.
Comments
Post a Comment