Doc

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

People respect each other's privacy and the safety of their personal lives.

The true belief by them is


that anybody should not access to their personal data ever. But in the last couple of years with the
technical growth and other modernized methods however have started compromising privacy of
people and reduced the self control ability on their personal data. The prone of getting access over
personal data and informations have a lot of negative results. The rules and regulations over data
protection has recently started because the quantity of processing the personal data has risen in the
last couple of years. The vital infrastructure that is required for the storage and processing of
incredibly large data sets has ushered in the age of big data and sophisticated information
technology, including deep learning models and other contemporary technologies. Huge amounts of
data relating to internet searches, phone calls, and electronic payments are often gathered, kept,
and analyzed by government agencies and enterprises using cutting-edge technical capabilities. But
the idea and worth of privacy are still contentious issues. We'll discuss the many privacy risks that
contemporary technology and digitalization provide as well as how these issues may be solved by
digitalization in a number of ways, such as making things more "confidentiality," "privacy
enhancing," or privacy maintaining.

Information or data that may be related to individual people is referred to as personal information
or data. In addition to your computer's IP address and other relevant metadata, these instances also
include characteristics that are explicitly disclosed, such as a person's age, gender, location, and
religion. Additionally, behavioural data that may be linked to specific individuals, such as that
gathered through social media, may be used to acquire personal information. Information that is
important, sensitive, or necessary for other purposes, such as financial data, military intelligence, or
top-secret matters, can be contrasted with personal information. Though passwords and other data
is used to safeguard the informations are not taken into account in this. The legal definition of
personal data is information that may be used to identify a natural person and his/her behaviour.
This connection can be created in either a referential manner or a non-referential mode. The data
subject may suffer harm in a number of ways if others have unrestricted access to their bank
account, profile, social media account, cloud repository, attributes, and locations. Additionally,
private data is become a valuable commodity. Data protection laws, rules, and governance are
intended to offer fair circumstances for the creation of contracts involving the transfer and exchange
of personal data. These requirements include safeguards against abuse, guarantees of recourse, and
procedures for gauging contract compliance. Asymmetrical information and wide disparities in
access to information are typically the foundation for flexible pricing, price targeting, and gauging, as
well as dynamic negotiations. A fundamental informational mismatch between the principal and the
agent is the basis for choice modelling in marketing, micro-targeting in political campaigns, and
nudging in the execution of policies.

Future and developing technologies could have an even greater influence. Due to the intimate
connection between computers and the brain today, privacy problems would not only apply to a
person's behaviour but also to their thoughts, which might be utilised by others to form opinions.
Additionally, it could be possible to change behaviour with the use of such technology. Therefore, in
light of these changes, more consideration must be given to the grounds for privacy protection. In
order to offer proper protection when brain functions may be altered from the outside, it would be
especially important to reevaluate autonomy. The organisation and structural aspects of information
security and data protection, as well as potential problems and risk scenarios in the digital age, are
all explored. On the result of this, connections between security policies are discovered, and the
Data Protection Policy's place within the aforementioned hierarchical structure is determined. The
classification of appropriate methods and instruments to provide reliable data protection is
proposed, and the relationships between the constituent parts are explained. The essay's last two
sections systematise the major privacy risk concerns of the digital age with a focus on contemporary
technology and offer some suggestions for how to mitigate their negative impact on consumers of e-
services on the global network.

Today, encryption is essential because it allows us to safeguard sensitive data by converting it to


ciphertext, a format that cannot be read without an encryption key. We may utilise encryption for
important business data reasons as well. It is referred to as "encoding." because only those who
have the encryption key can decrypt the data and expose the real information. Because of this,
encryption almost eliminates the ability of hackers or other unauthorised parties to obtain and
misuse the important company data. Because data breaches happen to even the largest
organisations with the highest dangerous impacts along with huge cybersecurity expenditures.
Therefore, it is hard to overstate the value of encryption. Along with this, it's important to maintain
the delicate balance between the use of technology for data collection and the provision of goods,
services, and an abundance of tailored advertisements. These methods encourage the belief
autonomy trap and erode our faith in democratic institutions. The exploitation of personal data to
influence elections throughout the world was made public by the Cambridge Analytica scandal,
which broke in the spring of 2018. It demonstrates how the right to privacy extends far beyond a
person's capacity to manage their personal information and puts a sound democratic system in
jeopardy. Antitrust authorities must investigate the concentration of personal data inside a single
company. The laws governing election propaganda must also specify the categories of private
information that cannot be used in campaigns and will decide if some tactics ought to be outlawed
due to their great propensity for deceit and manipulation.

References :

 Privacy is a Fundamental Human Right -


https://www.lawteacher.net/free-law-essays/constitutional-law/privacy-is-a-fundamental-
human-right-constitutional-law-essay.php
 Human Rights on The Digital Era - https://gradesfixer.com/free-essay-examples/human-
rights-on-the-digital-era/
 Privacy in a digital world - https://techcrunch.com/2019/09/26/privacy-queen-of-human-
rights-in-a-digital-world/

You might also like