Skip to main content

How Private is your data? How is it used and propagated?


Privacy and data protection have become extremely important topics in the internet domain in the last few years. This has primarily been due to the fact that customer information stored and used has led to concerns about the
  1. a.     Manner in which this information is collected
  2. b.     Manner in which this information is analyzed to predict profiling and trends
  3. c.     Multiple fallouts of the propagation of private data across internet for use by corporations, governments and internet organizations.
  4. d.     Unprecedented evolution of technology and its usage in our environment
  5. e.     Incapacity of the Legal framework to keep up with and understand the technological advances


The year 2011 was a turning point for issues involving storage, repurposing, usage and propagation of information collected from the users of the internet. Information Security, privacy and compliance have become important issues for Governments, Corporations and individuals. 2011 saw companies like Facebook and Google battling over issues surrounding privacy policies to concerns over what information your mobile phone actually knows about you. However, technology keeps evolving, and privacy issues are sure to follow.


Privacy can involve Personally Identifying Information (PII) or non-PII information such as a user’s behavior on a website. Data about age and physical address alone could identify who an individual is without explicitly disclosing their name, as these two factors are distinctive enough to identify a definite person. The disclosure of IP addresses, non-personally-identifiable profiling, and similar data might become adequate exchanges for the accessibility that users could otherwise lose with the alternatives needed to suppress such details scrupulously.
The IP addresses passed with interactions through the Internet are no longer unique to a specific end-user device. Due to a shortage of IP addresses, some Internet Service Providers (ISP’s) are adopting a practice called Network Address Translation (NAT) to assign and manage IP addresses. When NAT is used, the IP address passed with a communication to its destination (and perhaps documented at the destination point) is different from the IP address that the ISP assigns to the consumer on the “private” side of its network. The public- facing IP address is therefore shared by many users. Therefore associating the public-facing IP address with the unique private address information that the service provider assigns to its users can be further complicating the situation.
An HTTP cookie is data stored on a user's computer that assists in programmed access to websites, or other information required in intricate web programs. Cookies are also used for user-tracking by storing singular web usage history data. The creation of cookies envisioned that only the website that distributed cookies to user  systems could retrieve them so that only data relevant to the usage of that site be collected.  In practice programmers can evade this constraint leading to:
·          inclusion of a personally-identifiable tag in a browser to facilitate web profiling of the user of that computer,  stealing information from the cookies by cross-site scripting or other techniques
Then there is the PIE (Persistent Identification Element). PIEs unlike cookies cannot be easily deleted or detected and can reinstate any deleted cookie. PIEs also hold a sufficient amount more data than a cookie can. These are used to transmit browsing habits on the go and make a user experience more personalized.

The information posted on the Internet is long-lasting. This includes comments written on blogs, pictures, and Internet sites, such as Facebook and Twitter. It is propagated into the cyberspace and once it is posted, anyone can discover it, read it, reuse it and propagate it.
The Privacy Act prohibits the disclosure of personal information, no matter how this information is gathered. The consumers’ control and knowledge applied to on the internet come under two categories- purchasing and surfing. The legal protection law for individual privacy in the United States has been passed fairly recently, and limits the protection of data. Data collection methods have raised concerns about consumer privacy. The FTC, in their efforts to ensure success, has developed principles that would protect consumers and the information they choose to display. The USA PATRIOT Act was put in to effect in reaction to the 9/11 Terrorist attacks. To prevent terrorism in the United States by keeping an eye on communication around the country, the Government felt that terrorism could be diminished. This Act gives the Government powers to disregard privacy concerns of the citizens in the face of national security concerns.
Electronic Communications Privacy Act (ECPA) lays the precincts for law enforcement having access to personal electronic communiqué and electronic records like emails, documents, pictures etc. With the immense growth in the use of computers, many people store copious data on servers that can be visible to many parties in the infrastructure business. The ECPA protects this material from being accessed by law administration. The exclusions to this law allows the ISP to view private e-mail if the sender is suspected of attempting to damage the internet system or attempting to harm another use,  the ISP can  reveal information from a message if the sender or recipient allows disclosure or in the event of a court order or law enforcement’s subpoena.
Most case law holds that employees do not have a reasonable expectation of privacy with respect to work related electronic communications. A federal court held that employees can affirm the existence of attorney-client privilege with respect to communications on company laptops.Courts have acknowledged that an employee has a right to privacy in his workplace computer. However, the Court also found that an employer can consent to any illegal searches and seizures. 
In the recent Google Spy case, where Google mobile cars were running software to collect personal data over unencrypted networks for analysis; the company was fined and asked to cease collecting, storing and using information that has not been directly provided to them with user consent. 

Popular posts from this blog

The Clock is Ticking : BACKWARD FOR WOMEN

Sometimes it is just a customary sound; but a movement that takes us backward; instead of steering us forward.

2017 and 2018 have been the most regressive years in the progress of women. 

Since Trump became the President of the United States of America, a new culture of suppression of women rights has unleashed worldwide.  He has slowly degraded Women Rights by attacking fair pay legislation, defunding reproductive rights and changing the definition of violence against women. His attitude towards women is evident from the way he treats women and his objectification of the whole gender. In response, the women rights movement has revived itself, only to become negative and vicious.

No one wins when we have to fight. It is still a pity that we have to wave flags, march, hoist posters and commemorate each other on this day every year. We should not have to. 




The global economy could be enriched by about $160tn (£120tn) if women earned as much as men. 

No Zaghari-Ratcliffe should have to be in …

How should you deal with Bullies ?

It could be someone you know or someone you barely know. Bullying is the act of directing aggressive, intimidating, or threatening behaviors that are directed at an individual with the intent to cause physical or emotional harm.



Bullying can take on a variety of forms and can be in-person or through the use of electronics and technology, called cyberbullying. While this list isn’t exhaustive, you may be a victim of bullying and/or cyberbullying if someone: Subjects you to verbal taunts aimed to embarrass or humiliate youManipulates you into giving up possessions or money for fear of harm or embarrassmentPushes, shoves, kicks, or otherwise physically harms youSends and/or forwards to others any insulting emails, texts, videos, photos, or social media posts that are derogatory or untrueImpersonates you on social media to embarrass you or share your private informationUses electronic messages (texts, Facebook posts, etc.) with angry or threatening languageWhat can you do?
Bullies are weak p…

Avaya is out of its Chapter 11 Bankruptcy . I remember our first Avaya Project

Those were the days! Being one the largest resellers and specialists for Avaya Customer Interaction Centers and then their Distributors was just another story.

I was going over my old archives and came across the first time we won the Project of the Year Award for delivering the most impossible software and hardware integration of a customer interaction center in 90 crazy days and nights in Doha. I don't think the team slept for more than a year. We wouldn't go back home for days and live in fear of downtime ad infinitum, ad nauseum. The cost per minute of downtime was $60,000.

There were no weekends, there were no vacations. All we knew was to deliver this most important opportunity of our lifetime.

When we did get the time; we would get into monopoly warzones in the employee housing to keep sanity or watch pirated dvds of Prison Break and nonstop  Keifer Sutherland's 24.

It was just a never-ending spiral to build a company, to work so hard to beat a market that had never…