Skip to main content

How your personal information becomes public on the internet Part 2

In part 2 of exploring how your actions online translate into your information being stored and used by unknown parties. Here are a few more ways. 

Cookies:  When users visit different Web sites, most of the sites deposit data about the user visit, called "cookies," on the user’s hard drive. Cookies are then used to send pieces of information by the Web server to a user's browser for purposes of identification, authentication, marketing, shopping cart information or browsing history etc. Cookies may include information such as login or registration identification, user preferences, online "shopping cart" information, and so on. The browser saves all the information, and sends it back to the Web server whenever the user returns to the Web site. The Web server may use the cookie to adapt the information, content or format that it sends to the user, or it may preserve tracking of the different pages within the site that the user accesses.
If a user uses the Internet to buy a product or download a service, the user’s details, credit card information or address are all stored in a cookie.  Cookies that are used by websites to advertise products and services are called first-party cookies.
Other cookies, called third-party cookies, transfer data about users to advertising clearinghouses which in turn shares that data with other online marketers.  Many websites have begun to utilize a new type of cookie called a "flash cookie" (sometimes also called a "supercookie") that is more persistent than a regular cookie. 

Fingerprinting: A device fingerprint is the software and hardware settings collected from a computer.  When a computer goes online, it broadcasts these details to other computers that it communicates with. These details can be collected and patched together to form a distinctive "fingerprint" for that specific device. This fingerprint is allocated an identifying number and used in the network to define that specific device to track the computer or mobile device. This is a very useful technique in tracing cyber criminals.

GPS and data capture: Many GPS and location based services companies work all the time to capture locations, draw maps and places of interest the world over thus collecting data about places and intermittently people. In the much recent case of Google Street View case, Google was fined $25,000 for obstructing an FCC investigation into whether Google violated user privacy by collecting Wi-Fi data during its Street View project. The examination involved Google capturing data from its Street View car which provided a photograph of what users were doing at the time. Google initially denied the charge, and then submitted that it was only "fragmented data," before finally confessing that full emails, URLs, and even passwords were captured and stored. Data was only taken from open networks with no security.

a               Websites, Interactive Chat and Social Networks
Domain names: Many internet users own a website for their self or their businesses by booking a Web site address or URL (Uniform Resource Locator), called the domain name.  Domain registrations are public information unless you pay an additional fee to make your domain name private through Domain Registrants and resellers. The Domain ownership is easily searched through tracking the URL’s Whois. Many people or establishments try to keep domain ownership information private for reasons of privacy.
Blogs:  Journals and blogs or newsletters where content is frequently updated to update the clients of the business or group of interested people on the business or personal apprises are called Blogs.  Depending on the blog service used to post the blog, the user’s private information may be available. Generally blog services, through their service agreements and personalized controllable setting allow the amount of information that the user may be able to make public. Comments on the blogs or newsletter can also be controlled by settings in the blog. Blogs record IP addresses and the identity of the person updating the blog or commenting on it can be fairly easily traced.
Social Networks like Facebook, Twitter: The social networks have come under a lot of flak for weak privacy since a lot of user information is available on these servers. Users on Facebook link to people (known and unknown) and share their personal data, pictures, location and details about their activities through the social site leaving quite a few personal security loopholes in the process. Recently a home was robbed in Australia because one of the family members uploaded a picture of cash at home on facebook.

 Financial Transactions and Bill Payments Online
             Online banking:  Online banking is extremely prevalent in the finance and it has moved on to mobile banking as well. Customers are able to check balances,transfer money between accounts, and track transactions online. Using online banking, customers transmit a huge amount of private and sensitive financial and personal data through online website channels. Though most online banking systems use a high degree of encryption technologies and authentication techniques, a lot of information does get stored intermittently in cookies.  


Popular posts from this blog

The Clock is Ticking : BACKWARD FOR WOMEN

Sometimes it is just a customary sound; but a movement that takes us backward; instead of steering us forward.

2017 and 2018 have been the most regressive years in the progress of women. 

Since Trump became the President of the United States of America, a new culture of suppression of women rights has unleashed worldwide.  He has slowly degraded Women Rights by attacking fair pay legislation, defunding reproductive rights and changing the definition of violence against women. His attitude towards women is evident from the way he treats women and his objectification of the whole gender. In response, the women rights movement has revived itself, only to become negative and vicious.

No one wins when we have to fight. It is still a pity that we have to wave flags, march, hoist posters and commemorate each other on this day every year. We should not have to. 

The global economy could be enriched by about $160tn (£120tn) if women earned as much as men. 

No Zaghari-Ratcliffe should have to be in …

How should you deal with Bullies ?

It could be someone you know or someone you barely know. Bullying is the act of directing aggressive, intimidating, or threatening behaviors that are directed at an individual with the intent to cause physical or emotional harm.

Bullying can take on a variety of forms and can be in-person or through the use of electronics and technology, called cyberbullying. While this list isn’t exhaustive, you may be a victim of bullying and/or cyberbullying if someone: Subjects you to verbal taunts aimed to embarrass or humiliate youManipulates you into giving up possessions or money for fear of harm or embarrassmentPushes, shoves, kicks, or otherwise physically harms youSends and/or forwards to others any insulting emails, texts, videos, photos, or social media posts that are derogatory or untrueImpersonates you on social media to embarrass you or share your private informationUses electronic messages (texts, Facebook posts, etc.) with angry or threatening languageWhat can you do?
Bullies are weak p…

Avaya is out of its Chapter 11 Bankruptcy . I remember our first Avaya Project

Those were the days! Being one the largest resellers and specialists for Avaya Customer Interaction Centers and then their Distributors was just another story.

I was going over my old archives and came across the first time we won the Project of the Year Award for delivering the most impossible software and hardware integration of a customer interaction center in 90 crazy days and nights in Doha. I don't think the team slept for more than a year. We wouldn't go back home for days and live in fear of downtime ad infinitum, ad nauseum. The cost per minute of downtime was $60,000.

There were no weekends, there were no vacations. All we knew was to deliver this most important opportunity of our lifetime.

When we did get the time; we would get into monopoly warzones in the employee housing to keep sanity or watch pirated dvds of Prison Break and nonstop  Keifer Sutherland's 24.

It was just a never-ending spiral to build a company, to work so hard to beat a market that had never…