Skip to main content

Your Privacy Rights

The Privacy Act prohibits the disclosure of personal information, no matter how this information is gathered. The consumers’ control and knowledge applied to on the internet come under two categories- purchasing and surfing. The legal protection law for individual privacy in the United States has been passed fairly recently, and limits the protection of data. Data collection methods have raised concerns about consumer privacy. The FTC, in their efforts to ensure success, has developed principles that would protect consumers and the information they choose to display. The USA PATRIOT Act was put in to effect in reaction to the 9/11 Terrorist attacks. To prevent terrorism in the United States by keeping an eye on communication around the country, the Government felt that terrorism could be diminished. This Act gives the Government powers to disregard privacy concerns of the citizens in the face of national security concerns.
Electronic Communications Privacy Act (ECPA) lays the precincts for law enforcement having access to personal electronic communiqué and electronic records like emails, documents, pictures etc. With the immense growth in the use of computers, many people store copious data on servers that can be visible to many parties in the infrastructure business. The ECPA protects this material from being accessed by law administration. The exclusions to this law allows the ISP to view private e-mail if the sender is suspected of attempting to damage the internet system or attempting to harm another use,  the ISP can  reveal information from a message if the sender or recipient allows disclosure or in the event of a court order or law enforcement’s subpoena.
The Electronic Communications Privacy Act (ECPA) makes it illegal under certain conditions for anyone to read or disclose the content of any electronic communication (18 USC § 2511).
However, below are some exceptions to ECPA
a.            The ISP may view private e-mails of its subscribers if it doubts the sender is endeavoring to damage the system or damage another user. However, arbitrary monitoring of e-mail is normally forbidden.
b.            The ISP may lawfully view and reveal private e-mail if either the disseminator or the receiver of the message consents to the scrutiny or revelation. Many ISPs require a consent agreement from subscribers when signing up for the service.
c.             If the e-mail server and software is owned  or hosted by an employer, the employer may examine the contents of employee e-mail on the system. Therefore, any e-mail sent from a business location, device or using a host server owned by the employer or paid for by the employer is probably not private. Several court cases have determined that employers have a right to monitor e-mail messages of their employees.
d.            ISP’s may be required to disclose personal information in response to a court order or a subpoena.  A subpoena may be obtained by law enforcement or as part of a civil lawsuit.  A subpoena as part of a private civil lawsuit, defamation or a divorce case may disclose more personal information.
The USA PATRIOT as amended in 2006, makes it easier for the government to access records about online activity of the subscribers.  In an effort to increase the speed in which records are acquired, the Act eliminates much of process required to acquire private data. 6
In the case of U.S. v. Warshak (December 14, 2010), the Sixth Circuit Court of Appeals ruled that although an ISP has access to private e-mail, the government must obtain a search warrant before seizing such e-mail.  The decision is particularly significant to the degree that it could incentivize Congress to reassess the federal statutes that, in some cases, do allow warrantless searches of e-mail.
Online discussion and message boards are also list servers. These can be open or closed boards for discussion groups and sometimes the privacy policy for these boards allow inspection and disclosure of all the content posted. Message notifications or summaries are posted as emails to the participants and most of the boards archive the discussions.
In Feb 2012, the US Government signed a covenant to put some new guidelines in place to regulate the information that can be asked and received from people on the Internet. These new regulations are a “privacy bill of rights.” And corporations are expected to change their privacy policies to ensure that personal information of their customers will only be used for purposes that that be specifically agreed to by the user. 
The National Telecommunications and Information Administration in partnership with several privacy activist groups are working to develop “codes of conduct” for companies who collect personal information.
This document lays out seven rights.
a. Individual control. The companies have to provide easy to understand policies on what data they are collecting and how they will use this data.
b. The individual has the right to transparency and knowing the exact reason as to why the data is being collected at all.
c. The corporations cannot decide to use the data as they wish for another purpose other than what has been communicated to the individual.
d. Adequate security for customer data needs to be provided.
e. Individuals have rights to edit their data and therefore should have acess to all their date for editing and keeping current.
f. Corporations are only allowed to collect the data they need. They are not allowed to collect any incidental data.
g. Corporations are accountable to individuals for lost and misplaced data.
As privacy management develops in terms of improvements in efficacy and the growing intricacy of the challenges establishments face; accountability is evolving as a essential element of handling personal information. In specific terms all regulators and executives are looking at corporations to be more accountable for their actions. On a corporate level, accountability is taking form in:
• Implementation of Privacy by Design (PbD) and Privacy by ReDesign (PbRD)
• Redefinition of the role of the privacy professionals
• Acceptance the concept of BCR (Binding Corporate Rules)
• Cultivating internal monitoring, with the use of data loss prevention (DLP) tools
Governments are adopting steps to legalize the use of personal information and industry forums are exploring self-regulation to ensure that their interests are served before they have to succumb to greater restrictions, should they not assume responsibility on privacy. In 2011 in the European Union (EU), the European Commission (EC) modified its Electronic Communication Directive to give customers more control over their individual data. EU data protection rules and the new EC directive requires EU member states to induce electronic publishers to get consent from users before tracking their online behavior through cookies or other methods.

Popular posts from this blog

The Clock is Ticking : BACKWARD FOR WOMEN

Sometimes it is just a customary sound; but a movement that takes us backward; instead of steering us forward.

2017 and 2018 have been the most regressive years in the progress of women. 

Since Trump became the President of the United States of America, a new culture of suppression of women rights has unleashed worldwide.  He has slowly degraded Women Rights by attacking fair pay legislation, defunding reproductive rights and changing the definition of violence against women. His attitude towards women is evident from the way he treats women and his objectification of the whole gender. In response, the women rights movement has revived itself, only to become negative and vicious.

No one wins when we have to fight. It is still a pity that we have to wave flags, march, hoist posters and commemorate each other on this day every year. We should not have to. 

The global economy could be enriched by about $160tn (£120tn) if women earned as much as men. 

No Zaghari-Ratcliffe should have to be in …

How should you deal with Bullies ?

It could be someone you know or someone you barely know. Bullying is the act of directing aggressive, intimidating, or threatening behaviors that are directed at an individual with the intent to cause physical or emotional harm.

Bullying can take on a variety of forms and can be in-person or through the use of electronics and technology, called cyberbullying. While this list isn’t exhaustive, you may be a victim of bullying and/or cyberbullying if someone: Subjects you to verbal taunts aimed to embarrass or humiliate youManipulates you into giving up possessions or money for fear of harm or embarrassmentPushes, shoves, kicks, or otherwise physically harms youSends and/or forwards to others any insulting emails, texts, videos, photos, or social media posts that are derogatory or untrueImpersonates you on social media to embarrass you or share your private informationUses electronic messages (texts, Facebook posts, etc.) with angry or threatening languageWhat can you do?
Bullies are weak p…

Avaya is out of its Chapter 11 Bankruptcy . I remember our first Avaya Project

Those were the days! Being one the largest resellers and specialists for Avaya Customer Interaction Centers and then their Distributors was just another story.

I was going over my old archives and came across the first time we won the Project of the Year Award for delivering the most impossible software and hardware integration of a customer interaction center in 90 crazy days and nights in Doha. I don't think the team slept for more than a year. We wouldn't go back home for days and live in fear of downtime ad infinitum, ad nauseum. The cost per minute of downtime was $60,000.

There were no weekends, there were no vacations. All we knew was to deliver this most important opportunity of our lifetime.

When we did get the time; we would get into monopoly warzones in the employee housing to keep sanity or watch pirated dvds of Prison Break and nonstop  Keifer Sutherland's 24.

It was just a never-ending spiral to build a company, to work so hard to beat a market that had never…