Online Privacy: Protecting Your Personal Data and Security

Verified

Added on  2022/11/25

|8
|2203
|260
AI Summary
This article discusses the concept of online privacy, including the protection of personal and sensitive data, as well as the challenges and risks associated with online privacy. It explores various techniques and measures to safeguard online privacy, such as using secure passwords, updating software, and utilizing virtual private networks (VPNs). The article also highlights the role of organizations and governments in ensuring data privacy and the differences between privacy laws in Australia and the European Union.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: ONLINE PRIVACY
ONLINE PRIVACY
Name of the Student:
Name of the University:
Author Note:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1ONLINE PRIVACY
Online privacy is security and privacy level of private data published through internet.
It is the term which refers to variety of techniques, technologies and factors that is used for
protecting private and sensitive data, preferences and communications. Online privacy
involves concerns from beginning of broad computer sharing. Online privacy can involve
Personally Identifying Information (PII) or non-PII data like the behaviour of site visitor on
websites. PII is information which could be used for identifying individuals (Davis & James,
2013). The primary concern of online privacy is protection of user data. There exists many
governmental organizations which protect the anonymity and privacy of an individual over
the internet. People can disclose their private data in several ways such as by giving bank or
debit card details to several websites or using social media. Online privacy creates serious
challenges to internet users (Bartsch & Dienlin, 2016). Organizations and internet require
new protocols or rules for protecting the privacy of an individual.
The collective definition which consists of individual privacy, communication privacy
and information privacy is termed as digital privacy. It is used for promoting advocacy in
behalf of consumer and individual privacy rights. The framework to protect private
information in context of online is provided by federal Privacy Act 1988. The law follows
principle-based approach which can be applied in different situations. The act provides
legislative structure to protect data by private Australian organizations. Privacy Act is a
framework which applies to use, collection, destruction and storage of private data.
Organizations following Privacy Act need to operate by following National Policy Principles
(NPPs). Personal information’s disclosure, use and collection are covered by the NPPs. Data
security, identifiers usage, data quality, sensitive data collection are also covered by NPPs
(Baruh, Secinti & Cemalcilar, 2017). Privacy codes must be developed by organizations for
the protection of sensitive information. The main principles related to protection of online
data can be stated as Collection of personal information of data subject is necessary for
Document Page
2ONLINE PRIVACY
functions of organizations, if there is no need of personal information for further purpose, the
organization must destroy that information.
Digital materials possess quite smaller life span than traditional format. Formation of
each digital file consists of series of one and zero bits. These bits are required to be collected
without any damage or loss for ensuring the digital material’s survival. These exists several
threats which attempt to dispute these bits. Files can be corrupted by storing media for a long
time (Davis & James, 2013). Storage media could become out-of-date and would be
unsupportive to contemporary computers. The data bits might be abandoned, maliciously
destroyed, accidentally deleted or ignored. Files stored in shared network without owner or
cloud storage supplier of third-party might be exhausted. Maintaining bit preservation’s
systematic method is a fundamental need for ensuing long digital preservation.
Understanding of technology upon which digital materials depend allows taking of required
action for ensuring their preservation. Digital materials possess the potential in remaining
fluid within time, being damaged, easily altered or being edited (Bergström, 2015). Careful
consideration is required of digital material’s full lifecycle for having end user’s trust in
digital preservation.
Phishing scams and malware attacks are increasing as well as identity theft and data
breaches are now becoming ordinary. There are several ways in reputable websites which can
track, store and collect personal information. Personal data’s use, the manner of securing it
can cause risks to privacy. Suspicious emails are required to be ignored. The system’s
operating system, security software and browser are required to be up-to-date. The privacy
settings of services and websites needs to be updated regularly, especially in social media.
Since information is shared publicly by most websites, changing the browser settings will
ensure that personal data is displayed to fewer people (Jia et al, 2015). Ideally information
should be shared with only trusted people. Blocking browser’s third-party cookies is a good
Document Page
3ONLINE PRIVACY
way for maintaining some anonymity. Blocking cookies ensures that it is hard for the
websites to track information about browsing history. Several websites give the option for
linking accounts. More risk is generated while connecting accounts. So, unlinking of
accounts helps in protecting information (Rastogi & Hendler, 2017). Secured wireless
connection should be used always. It is important to protect systems from unwanted
networks. Built-in firewalls are now available in latest operating systems. Having anti-virus is
also crucial for keeping the system virus free. Combination of password and username is
really important to maintain online security. More secured passwords can be created is by
trying passphrases. Same password and username should be avoided for several websites. It
is risky to use same password for several websites. Cookies should be deleted regularly.
Accounts should be logged out from websites of social media when not in use (Bergström,
2015). Virtual Private Network (VPN) sends all data from a proxy server, so IP address and
user data remains safe. Thus, using VPN can be helpful for preventing cyber-attacks.
Organizations are recruited for noticing what kind of websites are visited by the
people and later on, the information is used for sending advertising to users based on the
browsing history of the websites. Personal information can be divulged in several ways by
using social media. Moreover, information provided on Facebook profile, Google accounts
can be processed automatically for gathering more specific details about users, like religious
views, personality, political views, and substance use (Jang-Jaccard & Nepal, 2014). All the
personal information provided to these social media platforms are stored in cloud storage.
Cloud security is provided for securing the data stored in it. Cloud security’s main focus
should be keeping the data secure. For better cloud security, many essential components can
be followed. Signing up to service provide having strict security policies. Security tools can
be used for identifying the gaps in the security measures of the cloud provider for knowing
the security issues must be addressed. File level’s encryption forms the foundation of all

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4ONLINE PRIVACY
cloud security. Before uploading data to cloud, encryption solutions can be deployed for
encrypting data (Park, 2013). Firewalls can be deployed for protecting the network perimeter.
Isolation of information was not the role of internet, it was designed for
connecting data and making it available. The world of today is full of cyber-attacks and
security threats. The digital communication’s vulnerabilities will be increasing only with the
increment of devices. Various technologies are used for designing new IoT products making
it quite difficult for solving security problems through patching firmware (Rastogi &
Hendler, 2017). There is increase in exposure of many other threats due to use of hardware
from undisclosed vendors by several manufacturers. Higher complexity level is created from
increment of connected devices. It is quite difficult in securing each device within the
network.
No speed or resources is available to the governments for reacting against cybercrime.
Businesses do not possess the incentives in focusing in this matter. User thinks it is their
responsibility for being safe online. However, many of them do not possess the motivation or
knowledge in tackling it. While use of IoT has grown exponentially in last couple of years,
IoT adoption’s scale has composed an insecure surrounding which is more vulnerable for
private data leakage. No concurrence is there about the responsibility of data privacy. Few
users think it is their responsibility, others think this complicated issue is not solved by
businesses or governments (Milanovic, 2015). Several internet users think they should take
responsibility of the security of their own data. Connected users are willing for taking more
precautions against this issue. Few users started avoiding to share their personal information.
Connected users observe data privacy’s value, however it is still a concern which should be
solved by businesses and governments.
Document Page
5ONLINE PRIVACY
Few key differences are there between current privacy law in Australia and European
Union. The legal framework which applies guidelines in collecting and processing private
information of people living in European Union is General Data Protection Regulation
(GDPR). First difference between Australian Data Privacy and GDPR is referring data
breach. Australian Data Privacy Regulations issue few compulsory minimum limitations.
Security resources of a smaller company might not be given importance than compared to
bigger organizations (Svantesson, 2013). Australian Data Privacy Regulations give maximum
30 days for accessing data breach’s evidence and reporting to commissioner, whereas GDPR
provides only 72 hours to complete the same task.
Privacy is quite important as there is always a chance for stealing someone’s private
information through all the services, viruses, applications and scams present on internet. If
right software are used and people can provide safety of their own data, it becomes much
safer and is harder in stealing private data from people. Privacy can be secured and security
can be maintained by considering this information (Pardo & Siemens, 2014). Online privacy
is now a concern all over the world. This is why providers of online service should take
necessary steps for ensuring the standards of privacy to users. Online users should use better
tools for handling privacy for reducing this issue. Policies are also enacted by government for
solving the issue of privacy.
Document Page
6ONLINE PRIVACY
References
Bartsch, M., & Dienlin, T. (2016). Control your Facebook: An analysis of online privacy
literacy. Computers in Human Behavior, 56, 147-154.
Baruh, L., Secinti, E., & Cemalcilar, Z. (2017). Online privacy concerns and privacy
management: A meta-analytical review. Journal of Communication, 67(1), 26-53.
Bergström, A. (2015). Online privacy concerns: A broad approach to understanding the
concerns of different groups for different uses. Computers in Human Behavior, 53,
419-426.
Davis, K., & James, C. (2013). Tweens' conceptions of privacy online: implications for
educators. Learning, Media and Technology, 38(1), 4-25.
Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal
of Computer and System Sciences, 80(5), 973-993.
Jia, H., Wisniewski, P. J., Xu, H., Rosson, M. B., & Carroll, J. M. (2015, February). Risk-
taking as a learning process for shaping teen's online information privacy behaviors.
In Proceedings of the 18th ACM Conference on Computer Supported Cooperative
Work & Social Computing (pp. 583-599). ACM.
Milanovic, M. (2015). Human rights treaties and foreign surveillance: Privacy in the digital
age. Harv. Int'l LJ, 56, 81.
Pardo, A., & Siemens, G. (2014). Ethical and privacy principles for learning analytics.
British Journal of Educational Technology, 45(3), 438-450.
Park, Y. J. (2013). Digital literacy and privacy behavior online. Communication Research,
40(2), 215-236.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7ONLINE PRIVACY
Rastogi, N., & Hendler, J. (2017). WhatsApp security and role of metadata in preserving
privacy. arXiv Prepr. arXiv1701, 6817, 269-275.
Svantesson, D. J. B. (2013). A “layered approach” to the extraterritoriality of data privacy
laws. International Data Privacy Law, 3(4), 278-286.
Zyskind, G., & Nathan, O. (2015, May). Decentralizing privacy: Using blockchain to protect
personal data. In 2015 IEEE Security and Privacy Workshops (pp. 180-184). IEEE.
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]