6 Asenaku
6 Asenaku
6 Asenaku
Activity 6.9
➢ What do you think about privacy in general? Is it really important?
➢ In this digital world, what do you mean by digital privacy? Give concrete examples?
Digital Privacy is the protection of personally identifiable or business identifiable information that is collected from
respondents through information collection activities or from other sources.
It is a collective definition that encompasses three sub-related categories; information privacy, communication privacy, and
individual privacy It is often used in contexts that promote advocacy on behalf of individual and consumer privacy rights in
digital spheres, and is typically used in opposition to the business practices of many e marketers/businesses/companies to
collect and use such information and data.
6.3.1. Information Privacy
Activity 6.10
➢ What do you think that private information like passwords, PIN numbers, will be guarded or shared with the public?
Why?
In the context of digital privacy, information privacy is the notion that individuals should have the freedom, or right, to
determine how their digital information, mainly that pertaining to personally identifiable information, is collected and used.
Every country has various laws that dictate how
information may be collected and used by companies. Some of those laws are written to give agency to the preferences of
individuals/consumers in how their data is used. In other places, like
in the United States, privacy law is argued by some to be less developed in this regard, For example, some legislation, or lack
of, allows companies to self-regulate their collection and dissemination practices of consumer information.
6.3.2. Communication Privacy
Activity 6.11
➢ Do you think communication privacy is the only one who is accessing the message will be the sender’s intended receiver?
If your answer is yes, why?
In the context of digital privacy, communication privacy is the notion that individuals should have the freedom, or right, to
communicate information digitally with the expectation that their communications are secure; meaning that messages and
communications will only be accessible to the sender’s original intended recipient. However, communications can be
intercepted or
delivered to other recipients without the sender’s knowledge, in a multitude of ways.
Communications can be intercepted directly through various hacking methods; this is expanded upon further below.
Communications can also be delivered to recipients unbeknownst to the sender due to false assumptions made regarding the
platform or medium which was used to send information. An example of this is a failure to read a company’s privacy policy
regarding communications on their platform could lead one to assume their communication is protected when it is in fact not.
https://wachemo-elearning.net/courses/introduction-to-emerging-technologies/lessons/chapter-6-7/topic/6-3-digital-privacy/ 1/2
1/12/23, 3:52 PM 6.3. Digital privacy – Wachemo University e-Learning Platform
Previous Topic
Back to Lesson
https://wachemo-elearning.net/courses/introduction-to-emerging-technologies/lessons/chapter-6-7/topic/6-3-digital-privacy/ 2/2