Saif Samir Saeed Data Privacy CSC 101 - Introductio Nto Computer Science Section 09 Dr. Dhrgham Al Kafaf / / Dr. Adil Ghidan April 15, 2023

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

Saif Samir

Saeed

Data
Privacy
CSC 101 –
Introductio
n to
Computer
Science

Section 09

Dr.
Dhrgham
Al Kafaf / /
Dr. Adil
Ghidan

April 15,
2023
1
Saeed

Data Privacy

The ability to control when, how, and how much personal information about oneself is shared with

or conveyed to others is known as data privacy. One's name, address, phone number, or online or offline

conduct are examples of personal information. Many online users desire to regulate or limit specific sorts of

personal data collecting, much as someone might want to keep certain people out of a private chat.

Over time, as the use of the internet has grown, so has the significance of data privacy. In order to

deliver services, websites, software, and social media platforms frequently need to gather and preserve

personal data about users. However, some platforms and applications could go beyond what consumers had

anticipated in terms of data gathering and utilization, giving users less privacy than they had anticipated.

Other platforms and apps might not put enough protections in place for the data they gather, which could

lead to a data breach that violates user privacy.

In many countries, the right to privacy is seen as a basic human right, and data protection regulations

are in place to defend that right. Data privacy is crucial because people need to feel confident that their

personal information will be treated carefully if they are going to engage in online activity. Data protection

procedures are used by businesses to show their clients and users that they can be trusted with their personal

information.

Data Privacy

Data Privacy
2
Saeed
If personal information is not kept private or if individuals are unable to regulate how their information is

used, it may be exploited in a variety of ways, including the following:

 Personal information can be used by criminals to trick or harass people.

 Without the user's approval, entities may sell personal information to advertisers or other third

parties, which could lead to users receiving unwanted marketing or advertising.

 The ability to express oneself freely may be limited if one's actions are followed and watched,

particularly in countries with authoritarian governments.

Any of these results may be damaging to an individual. These outcomes for a firm could result in

penalties, sanctions, and other legal repercussions in addition to doing irreparable damage to its brand.

Along with the negative effects on the actual world, many people and nations believe that privacy has

intrinsic worth and is a human right essential to a free society, much as the right to free expression.

Governments all across the world have begun passing rules governing what kinds of data can be

gathered on users, how that data can be used, and how data should be stored and secured as technological

Data Privacy
advancements have boosted data collecting and surveillance capabilities. The following are some of the most

significant regulatory privacy regimes to understand:

Data Privacy
3
Saeed
 The General Data Protection Regulation (GDPR) establishes rules for the collection, storage, and

processing of personal information of citizens of the European Union (EU). It also grants individuals

control over their personal information, including the right to have their personal information erased.

 National data protection regulations: A lot of nations, including Canada, Japan, Australia, Singapore,

and others, have thorough data protection regulations in place. Some of them, like the UK's Data

Protection Act and Brazil's General Law for the Protection of Personal Data, are extremely

comparable to the GDPR.

 The California Consumer Privacy Act (CCPA): Provides consumers the ability to regulate their

personal data, including the right to request that companies not sell their personal data, and mandates

that consumers be informed of what personal data is gathered.

In some nations, there are also industry-specific privacy regulations. For instance, the Health Insurance

Portability and Accountability Act (HIPAA) in the United States regulates how personal healthcare data

should be treated.

Data Privacy
Many privacy advocates argue that  people still do not have sufficient authority regarding how others

have access to their personal information. Future legislation governing data privacy may be enacted by

governments all over the world.

the basis for many of the current data protection laws. A set of rules for data gathering and use is

known as the Fair Information Practices. An advisory council to the U.S. Department of Health, Education,

and Welfare initially suggested these recommendations in 1973. In its Guidelines on the Protection of

Data Privacy
4
Saeed
Privacy and Transborder Flows of Personal Data, the worldwide Organization for Economic Cooperation and

Development (OECD) later approved them.

Fair Information Practices are as follows:

 Limitations on collection: There should be restrictions on the amount of personal data that can be

gathered.

 Data integrity: When personal information is gathered, it should be relevant to the reason for which it

is being used and accurate. It should be made clear how personal data will be used.

 Use restriction: Data shouldn't be utilized for anything besides what was intended.

 security measures Data must be protected.

 Openness: The gathering and use of personal data shouldn't be concealed from users.

Data Privacy

 Individual involvement: A person's rights include the right to know who is in possession of their

personal information, the right to have that information disclosed to them, the right to know the

reasons why a request for their information is denied, and the right to have that information updated.

Data Privacy
5
Saeed

What are some of the challenges users face


when protecting their online privacy?

Online tracking: Online user behavior is frequently monitored.

Although most nations require websites to inform users of cookie usage,

consumers may not be aware of the extent to which cookies are

monitoring their activity. Cookies frequently record a user's activities.

Data loss of control: People may not be aware of how their data

is shared outside of the websites with which they engage online, and they may not have control over what

happens to their data as a result of the widespread usage of so many online services.

Data Privacy

Lack of transparency: When using web applications, users frequently have to enter personal

information such as their name, email address, phone number, or location. However, the privacy policies for

those programs may be complex and challenging to comprehend.

Social media: Using social media platforms makes it simpler than ever to find individuals online, and

posts on these sites sometimes provide more private data than users are aware of. Furthermore, social

networking sites frequently gather more data than their users are aware of.

Data Privacy
6
Saeed
Cybercrime: Numerous attackers attempt to steal information from users in order to conduct fraud,

compromise security systems, or sell the data on black markets to individuals or organizations that would use

it for nefarious ends. Others seek to infiltrate internal systems of businesses that house personal data. Some

attackers try to fool consumers into disclosing personal information using phishing assaults.

Online Data loss of Lack of


Social media Cybercrime
tracking control transparency

What are some of the challenges businesses face when


protecting user privacy?

Data Privacy

i. Communication: Organizations occasionally fail to explain to their users what

personal data they are gathering and how they plan to use it.

ii. Cyber crime: Attackers who commit cybercrime target both individual users and

businesses who gather and keep user data. Additionally, the attack surface grows as

more components of a firm are connected to the Internet.

Data Privacy
7
Saeed
iii. Data breaches: Attackers are constantly improving the methods they use to cause

these breaches, which can result in a serious breach of user privacy if personal

information is exposed.

iv. Insider threats: If data is not effectively protected, internal staff members or

contractors may access it inappropriately.

The challenge Communication Cyber crime Data breaches Insider threats

The cause Explanation failure Just like real crime Cyber crime Data protection

failure

Data Privacy

What are some of the most important


technologies for data privacy?

 Information can be hidden by being encrypted such that it seems to be random data. The information

can only be decrypted by parties that have the encryption key.

Data Privacy
8
Saeed
 Only individuals who are permitted can access systems and data thanks to access control. To prevent

sensitive data from leaving the network, access control and data loss prevention (DLP) can be used

together.

 One of the most crucial technologies for common people is two-factor authentication since it makes

it much more difficult for attackers to access user accounts without authorization.

These are only a few of the modern technologies that can safeguard user privacy and keep data more

secure. Technology by itself, meanwhile, is insufficient to safeguard data privacy.

The data harvested from our personal devices, along with our trail of electronic transactions and data

from other sources, now provides the foundation for some of the world’s largest companies.

Data Privacy

As digital technologies penetrate consumers’ lives further and become increasingly powerful means

for firms’ data collection and use, fresh privacy concerns emerge.

In conclusion, data privacy is just like real privacy when it comes to our everyday life so we should

guard it and demand companies that has it to securely protect from outside threats otherwise, we would be

exposed.

Data Privacy
9
Saeed

Works Cited

Pentland, H. R. (2022, 02 25). The New Rules of Data Privacy. Retrieved from hbr.org:

https://hbr.org/2022/02/the-new-rules-of-data-privacy

Sara Quach, P. T. (2022, 03 05). Digital technologies: tensions in privacy and data | SpringerLink. Retrieved

from link.springer.com: https://link.springer.com/article/10.1007/s11747-022-00845-y

What is data privacy? (n.d.). Retrieved from cloudfare.com:

https://www.cloudflare.com/en-gb/learning/privacy/what-is-data-privacy/

Data Privacy
10
Saeed

Data Privacy

You might also like