Saif Samir Saeed Data Privacy CSC 101 - Introductio Nto Computer Science Section 09 Dr. Dhrgham Al Kafaf / / Dr. Adil Ghidan April 15, 2023
Saif Samir Saeed Data Privacy CSC 101 - Introductio Nto Computer Science Section 09 Dr. Dhrgham Al Kafaf / / Dr. Adil Ghidan April 15, 2023
Saif Samir Saeed Data Privacy CSC 101 - Introductio Nto Computer Science Section 09 Dr. Dhrgham Al Kafaf / / Dr. Adil Ghidan April 15, 2023
Saeed
Data
Privacy
CSC 101 –
Introductio
n to
Computer
Science
Section 09
Dr.
Dhrgham
Al Kafaf / /
Dr. Adil
Ghidan
April 15,
2023
1
Saeed
Data Privacy
The ability to control when, how, and how much personal information about oneself is shared with
or conveyed to others is known as data privacy. One's name, address, phone number, or online or offline
conduct are examples of personal information. Many online users desire to regulate or limit specific sorts of
personal data collecting, much as someone might want to keep certain people out of a private chat.
Over time, as the use of the internet has grown, so has the significance of data privacy. In order to
deliver services, websites, software, and social media platforms frequently need to gather and preserve
personal data about users. However, some platforms and applications could go beyond what consumers had
anticipated in terms of data gathering and utilization, giving users less privacy than they had anticipated.
Other platforms and apps might not put enough protections in place for the data they gather, which could
In many countries, the right to privacy is seen as a basic human right, and data protection regulations
are in place to defend that right. Data privacy is crucial because people need to feel confident that their
personal information will be treated carefully if they are going to engage in online activity. Data protection
procedures are used by businesses to show their clients and users that they can be trusted with their personal
information.
Data Privacy
Data Privacy
2
Saeed
If personal information is not kept private or if individuals are unable to regulate how their information is
Without the user's approval, entities may sell personal information to advertisers or other third
The ability to express oneself freely may be limited if one's actions are followed and watched,
Any of these results may be damaging to an individual. These outcomes for a firm could result in
penalties, sanctions, and other legal repercussions in addition to doing irreparable damage to its brand.
Along with the negative effects on the actual world, many people and nations believe that privacy has
intrinsic worth and is a human right essential to a free society, much as the right to free expression.
Governments all across the world have begun passing rules governing what kinds of data can be
gathered on users, how that data can be used, and how data should be stored and secured as technological
Data Privacy
advancements have boosted data collecting and surveillance capabilities. The following are some of the most
Data Privacy
3
Saeed
The General Data Protection Regulation (GDPR) establishes rules for the collection, storage, and
processing of personal information of citizens of the European Union (EU). It also grants individuals
control over their personal information, including the right to have their personal information erased.
National data protection regulations: A lot of nations, including Canada, Japan, Australia, Singapore,
and others, have thorough data protection regulations in place. Some of them, like the UK's Data
Protection Act and Brazil's General Law for the Protection of Personal Data, are extremely
The California Consumer Privacy Act (CCPA): Provides consumers the ability to regulate their
personal data, including the right to request that companies not sell their personal data, and mandates
In some nations, there are also industry-specific privacy regulations. For instance, the Health Insurance
Portability and Accountability Act (HIPAA) in the United States regulates how personal healthcare data
should be treated.
Data Privacy
Many privacy advocates argue that people still do not have sufficient authority regarding how others
have access to their personal information. Future legislation governing data privacy may be enacted by
the basis for many of the current data protection laws. A set of rules for data gathering and use is
known as the Fair Information Practices. An advisory council to the U.S. Department of Health, Education,
and Welfare initially suggested these recommendations in 1973. In its Guidelines on the Protection of
Data Privacy
4
Saeed
Privacy and Transborder Flows of Personal Data, the worldwide Organization for Economic Cooperation and
Limitations on collection: There should be restrictions on the amount of personal data that can be
gathered.
Data integrity: When personal information is gathered, it should be relevant to the reason for which it
is being used and accurate. It should be made clear how personal data will be used.
Use restriction: Data shouldn't be utilized for anything besides what was intended.
Openness: The gathering and use of personal data shouldn't be concealed from users.
Data Privacy
Individual involvement: A person's rights include the right to know who is in possession of their
personal information, the right to have that information disclosed to them, the right to know the
reasons why a request for their information is denied, and the right to have that information updated.
Data Privacy
5
Saeed
Data loss of control: People may not be aware of how their data
is shared outside of the websites with which they engage online, and they may not have control over what
happens to their data as a result of the widespread usage of so many online services.
Data Privacy
Lack of transparency: When using web applications, users frequently have to enter personal
information such as their name, email address, phone number, or location. However, the privacy policies for
Social media: Using social media platforms makes it simpler than ever to find individuals online, and
posts on these sites sometimes provide more private data than users are aware of. Furthermore, social
networking sites frequently gather more data than their users are aware of.
Data Privacy
6
Saeed
Cybercrime: Numerous attackers attempt to steal information from users in order to conduct fraud,
compromise security systems, or sell the data on black markets to individuals or organizations that would use
it for nefarious ends. Others seek to infiltrate internal systems of businesses that house personal data. Some
attackers try to fool consumers into disclosing personal information using phishing assaults.
Data Privacy
personal data they are gathering and how they plan to use it.
ii. Cyber crime: Attackers who commit cybercrime target both individual users and
businesses who gather and keep user data. Additionally, the attack surface grows as
Data Privacy
7
Saeed
iii. Data breaches: Attackers are constantly improving the methods they use to cause
these breaches, which can result in a serious breach of user privacy if personal
information is exposed.
iv. Insider threats: If data is not effectively protected, internal staff members or
The cause Explanation failure Just like real crime Cyber crime Data protection
failure
Data Privacy
Information can be hidden by being encrypted such that it seems to be random data. The information
Data Privacy
8
Saeed
Only individuals who are permitted can access systems and data thanks to access control. To prevent
sensitive data from leaving the network, access control and data loss prevention (DLP) can be used
together.
One of the most crucial technologies for common people is two-factor authentication since it makes
it much more difficult for attackers to access user accounts without authorization.
These are only a few of the modern technologies that can safeguard user privacy and keep data more
The data harvested from our personal devices, along with our trail of electronic transactions and data
from other sources, now provides the foundation for some of the world’s largest companies.
Data Privacy
As digital technologies penetrate consumers’ lives further and become increasingly powerful means
for firms’ data collection and use, fresh privacy concerns emerge.
In conclusion, data privacy is just like real privacy when it comes to our everyday life so we should
guard it and demand companies that has it to securely protect from outside threats otherwise, we would be
exposed.
Data Privacy
9
Saeed
Works Cited
Pentland, H. R. (2022, 02 25). The New Rules of Data Privacy. Retrieved from hbr.org:
https://hbr.org/2022/02/the-new-rules-of-data-privacy
Sara Quach, P. T. (2022, 03 05). Digital technologies: tensions in privacy and data | SpringerLink. Retrieved
https://www.cloudflare.com/en-gb/learning/privacy/what-is-data-privacy/
Data Privacy
10
Saeed
Data Privacy