Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

‫‪Why we all are ignoring such a great danger that no one can bear its‬‬

‫‪consequences‬‬

‫اتنے عظیم خطرے کو نظر انداز کرنا کہ جس کا نتیجہ برداشت کرنا کسی کے بس کی بات نہیں‬

‫نتائج ‪Consequences‬‬

‫ہم کبھی اتنے اہم نقطے کے بارے میں اس حد تک سست نہیں تھے‬

‫‪This is the growing worry everybody as the technology increases. Intrestingly, it is everyone is aware of it‬‬
‫‪but in real, no one is taking actual step to counter it.‬‬

‫‪This ones responsible for it don’t want this thread‬‬

‫ٹیکنالوجی کی پیشرفتگی کے ساتھ سہولیات تو بڑھ رہے ہیں لیکن سہولت کے ساتھ دن بدن خطرہ بھی اتنا ہی بڑھ رہا ہے۔‬
‫جن کی وجہ سے خطرہ بڑھ رہا ہے وہ اس‬
‫خطرے کے بادل جیسے جیسے ٹیکنالوجی ترقی کر رہی ہے‪ ،‬ویسے ویسے یہ خطرہ بڑھتا جا ریا ہے۔ مزے کی بات ہےکہ‪ ،‬کم‬
‫یا زیادہ‪ ،‬لیکن اس بارے میں جانتے سب ہیں لیکن افسوس کی بات ہے کہ کرتے کچھ نہیں۔‬
‫جن کی وجہ سے یہ معاملہ بڑھ رہا وہ اس کو کم ہوتا نہیں دیکھنا چاہتے۔ ان کا سارا کاروبار چلتا ہی اسی کے ساتھ ہے۔ لیکن سب‬
‫سے بڑا مسلئہ یہ ہے کہ جن کو یہ مسئلہ درپیش ہے اور جن کو اس کو کنٹرول کرنا چاہیے ان کی توجہ اس طرف سے بھٹکائے‬
‫رکھنے کے لئے باقاعدہ کوشش جاری رہتی ہے۔‬
‫گاڑی میں سفر کرتے اگر کوئی ہامرے موبائل کی سکرین کی طرف دیکھے بھی تو وہ ہمیں گراں گزرتا ہے۔ لیکن دوسری طرف‬
‫ہمارا سارا سب سے اہم پرسنل ڈیٹا ڈیٹا اکانومی کے دور میں‬

‫‪Data oriented‬‬

‫کمپنیوں کے لئے ننگا پڑا ہوا ہے۔ اور مزے کی بات ہے ہمیں پتہ ہے کہ اس سے ہمیں شدید خطرہ موجود ہے اور اکثر نقصانات‬
‫بھی اٹھا تے رہتے ہیں‪ ،‬لیکن دکھ کی بات ہے کہ تھوڑی سی مڈروفیت نے ہمیں کوئی بھی اقدام کرنے سے روک رکھا ہے۔‬

‫‪Privacy paradox? Why we are unable to do‬‬


‫‪so? Why we fail to maintain our privacy‬‬
‫?‪online‬‬
‫‪‬‬ ‫‪In 2018—there were 7 billion IoT devices in 2018‬‬
‫‪‬‬ ‫‪In 2019—the number of active IoT devices reached 26.66 billion‬‬
‫‪‬‬ ‫‪Every second—127 new IoT devices are connected to the web‬‬
‫‪‬‬ ‫‪During 2020—experts estimate the installation of 31 billion IoT devices‬‬
‫‪‬‬ ‫‪By 2021—35 billion IoT devices will be installed worldwide‬‬
‫‪‬‬ ‫‪By 2025—more than 75 IoT devices billion will be connected to the web‬‬

‫اتنی بڑی مارکیٹ ہونے کے باوجود بھی دیٹا پرکیکشن کے لئے کام نہیں کیا جاتا۔ نا بڑی بڑی کمپنیوں کی طرف سے اور نا ہی‬
‫انفرادی طور پر۔‬
‫بڑی کمپنیاں تو ڈیٹا کو استعمال کر کے اس سے فائدہ اٹھاتی ہیں لیکن ہم انفرادی طور پر اپنے ڈیٹا کی حفاظت کیون نہیں کر‬
‫پاتے؟ اس کی چیدہ چیدہ وجوہات درج ذیل ہیں۔‬

(https://www.theguardian.com/commentisfree/2019/may/05/privacy-paradox-why-do-people-keep-
using-tech-firms-data-facebook-scandal )

For a long time, people attributed the privacy paradox to the fact that most users of Facebook didn’t
actually understand the ways their personal information was being appropriated and used.

Which personal data is at risk? Why?


 Names: Your full name, your maiden name, and your mother’s maiden name
 Personal ID numbers: Your social security number, driver’s license number, passport
number, patient ID number, taxpayer ID number, credit account number, or financial
account number
 Addresses: Your street address and email address
 Biometrics: Retina scans, fingerprints, facial geometry, or voice signatures
 Vehicle ID or title numbers
 Phone numbers
 Technology asset information: Media Access Control (MAC) or Internet Protocol (IP)
addresses that are tied to a certain individual

While this list may seem exhaustive, it doesn’t cover all the personal information you need to protect.
You also need to worry about what you post (and what others post about you) on social media and
other sharing sites, because these things serve as clues to your true identity when combined with the PII
in the previous list

Identity theft occurs when someone gains access to your personal information and pretends to be you
online. Individuals who have accessed your personal data can retrieve your login information for various
websites or commit cyber crimes such as tax fraud, all while posing as you

What Can Be Done With My Data?

A complete data set on an individual can fetch a pretty penny, completely legally, too. There are
now companies known as “data brokers” that collect and maintain data on millions of people,
which they analyze, package, and sell without the user’s knowledge or permission. Data brokers
collect and sell information to other companies for many reasons, including targeted advertising,
credit risk assessment, and direct marketing. Luckily, this data is usually anonymized, and does
not contain PII.

Data protection law: are they actually


protecting us?
The extent to which your data is legally protected varies depending on where you are. Even within one
country – the US, for example – your right to privacy may change depending on the region in which you
operate.

The European Union has enacted legislation across all its member states, although individual countries
have developed their own standards on top of this. The General Data Protection Regulation law (GDPR)
is at the heart of the EU’s privacy controls.

Are companies following data protection laws?


Actually they donot protect our data. They have developed a system and given choice to every
every individual to main their online data prvacy. But the process is complicated and very lengthy.
individuals lacking time to read, every online agreement for joining a website or an app, just accept it,
without realizing that access they have given as per the agreement.

Maybe informed consent was practical two decades ago, but it is a fantasy today. In a constant
stream of online interactions, especially on the small screens that now account for the majority of
usage, it is unrealistic to read through privacy policies. And people simply don’t.

There’s a lot of good in the GDPR, but it is not the right model for America.

We need an American answer—a more common law approach adaptable to changes in


technology—to enable data-driven knowledge and innovation while laying out guardrails to
protect privacy.

What we should? Why hiring an app or


service is evitable/necessary?
Snowden, Equifax, and Cambridge Analytica provide three conspicuous reasons to take action.

This information Big Bang is doubling the volume of digital information in the world every two
years. The data explosion that has put privacy and security in the spotlight will accelerate. Most
recent proposals for privacy legislation aim at slices of the issues this explosion presents.
As the data universe keeps expanding, more and more of it falls outside the various specific laws
on the books.

The fundamental need for baseline privacy legislation in America is to ensure that individuals
can trust that data about them will be used, stored, and shared in ways that are consistent with
their interests and the circumstances in which it was collected.

Manage your privacy risk by keeping your existing controls as effective and efficient as possible
to withstand a complex privacy risk environment. Place the focus of testing on spotting
employee mistakes and weeding out any gaps in the process. By keeping your systems in line
with current regulations, once a shift does occur you will be in a better place to make
adjustments quickly. No matter what the changes in privacy may contain, be completely
transparent with your customers around the intended use of their data.

‫ہماری ایُ اس سارے پراسس کو سادہ کرکے پیش کرتی‬


‫ہے اور آپ کو اپنے ڈیٹا پر کنٹرول واپس دیتی ہے‬

You might also like