INTERNT PRIVACY
Internet privacy
Internet
privacy
involves the right or mandate of personal privacy concerning the storing,
repurposing, provision to third parties, and displaying of information
pertaining to oneself via of the Internet. Internet privacy is a subset of data
privacy. Privacy concerns have been articulated from the beginnings of large
scale computer sharing.
Privacy
can entail either Personally Identifying Information (PII) or non-PII
information such as a site visitor's behavior on a website. PII refers to any
information that can be used to identify an individual. For example, age and
physical address alone could identify who an individual is without explicitly
disclosing their name, as these two factors are unique enough to typically
identify a specific person.
Some
experts such as Steve Rambam, a private investigator specializing in Internet
privacy cases, believe that privacy no longer exists; saying, "Privacy is
dead – get over it". In fact, it has been suggested that the "appeal
of online services is to broadcast personal information on purpose." On
the other hand, in his essay The Value of Privacy, security expert Bruce
Schneier says, "Privacy protects us from abuses by those in power, even if
we're doing nothing wrong at the time of surveillance."
Levels
of privacy
Internet
and digital privacy are viewed differently from traditional expectations of
privacy. Internet privacy is primarily concerned with protecting user
information. Law Professor Jerry Kang explains that the term privacy expresses
space, decision, and information. In terms of space, individuals have an
expectation that their physical spaces (i.e. homes, cars) not be intruded.
Privacy within the realm of decision is best illustrated by the landmark case Roe
v. Wade. Lastly, information privacy is in regards to the collection of
user information from a variety of sources, which produces great discussion.
The
1997 Information Infrastructure Task Force (IITF) created under President
Clinton defined information privacy as "an individual's claim to control
the terms under which personal information--information identifiable to the
individual--is acquired, disclosed, and used." At the end of the 1990s,
with the rise of the Internet, it became clear that the internet and companies
would need to abide by new rules to protect individual's privacy. With the rise
of the internet and mobile networks the salience of internet privacy is a daily
concern for users.
People
with only a casual concern for Internet privacy need not achieve total anonymity.
Internet users may protect their privacy through controlled disclosure of
personal information. The revelation of IP addresses,
non-personally-identifiable profiling, and similar information might become
acceptable trade-offs for the convenience that users could otherwise lose using
the workarounds needed to suppress such details rigorously. On the other hand,
some people desire much stronger privacy. In that case, they may try to achieve
Internet anonymity to ensure privacy — use of the Internet without
giving any third parties the ability to link the Internet activities to
personally-identifiable information of the Internet user. In order to keep
their information private, people need to be careful with what they submit to
and look at online. When filling out forms and buying merchandise, that becomes
tracked and because the information was not private, some companies are now
sending Internet users spam and advertising on similar products.
There
are also several governmental organizations that protect individual's privacy
and anonymity on the Internet, to a point. In an article presented by the FTC,
in October 2011, a number of pointers were brought to attention that helps an
individual internet user avoid possible identity theft and other cyber-attacks.
Preventing or limiting the usage of Social Security numbers online, being wary
and respectful of emails including spam messages, being mindful of personal
financial details, creating and managing strong passwords, and intelligent
web-browsing behaviours are recommended, among others.
Posting
things on the Internet can be harmful or in danger of malicious attack. Some
information posted on the Internet is permanent, depending on the terms of
service, and privacy policies of particular services offered online. This can
include comments written on blogs, pictures, and Internet sites, such as Facebook and Twitter. It is
absorbed into cyberspace and once it is posted, anyone can potentially find it
and access it. Some employers may research a potential employee by searching
online for the details of their online behaviours, possibly affecting the
outcome of the success of the candidate.
No comments