Online Privacy Report: Australian Context, Laws, and User Safety

Verified

Added on  2023/04/21

|9
|1935
|200
Report
AI Summary
This report comprehensively addresses the multifaceted aspects of online privacy, encompassing digital privacy, and its specific context within Australia. It delves into the critical issues surrounding digital materials, particularly concerning digital library preservation and the challenges of hardware and software obsolescence. The report provides practical options for ensuring digital privacy, including two-factor authentication, privacy settings, and secure connections. It also examines measures to protect users on platforms like Facebook, Google, and iCloud, such as data encryption and software updates. Furthermore, the report explores the varying levels of privacy required by different individuals based on their online activities, and it highlights the laws designed to safeguard online privacy. A functional comparison between current privacy laws in the European Union and Australia is also presented. The conclusion emphasizes the ongoing challenges to online privacy and the importance of individual responsibility in protecting personal information in the digital realm.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: ONLINE PRIVACY
Online Privacy
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1ONLINE PRIVACY
Table of Contents
Introduction................................................................................................................................2
Privacy, digital privacy and digital privacy in Australia........................................................2
Issues of concern raised around digital materials..................................................................3
Options to consider ensuring digital privacy.........................................................................4
Measures to ensure users are protected on platforms like Facebook, Google and iCloud.....4
Ensuring same or different level of privacy for people..........................................................5
Laws to protect privacy..........................................................................................................5
Understanding the privacy of self..........................................................................................5
Functional comparison between current privacy law in the European Union and in the
Australia.................................................................................................................................6
Conclusion..................................................................................................................................6
References..................................................................................................................................7
Document Page
2ONLINE PRIVACY
Introduction
Online or internet privacy is defined as the security level that builds up over the data
or information about an individual that is published via the internet (Bergström, 2015). It is a
bigger term that is referred to use number of factors or techniques as well as Technologies
that is used for protecting the sensitive, intricate and private data for the communication and
preferences so that they do not be the doorway to access the personal accounts of people
without authorisation.
Privacy, digital privacy and digital privacy in Australia
Privacy in a broader term defines the mechanism a person or an individual adopt to
seclude them or protect the information from people they do not want to. an individual can
always be selective about the information they want express to other people and the
boundaries and content of this information remains to the owner (Thomson, Yuki & Ito,
2015).
Online or digital privacy on the other hand is the way by which the private and
confidential information about a person or an individual is hidden from other internet users to
see or have access to. These informational absolutely private and not everybody has the
access to them. With the advancement of technology there has been many ways to maintain
privacy of data and information of a person; however, there also ways where these can be
violated.
Online or digital privacy according to Australia means for some set rules and theories
that Australian constituency has set up in accordance to the maintenance of ethical standards
in handling and accessing data and information or private online information about an
Document Page
3ONLINE PRIVACY
individual or even for an organisation (Lwin, Wirtz & Stanaland, 2016). There are several
legislative measures that are explained through the ACS codes of ethics and these codes of
ethics have a proper way of clarifying in what way the privacy of a person shall be protected
by different individuals and also through protecting self.
Issues of concern raised around digital materials
In the latest digital era, one of the most important concern and issues that has been
raised around the digital materials are the digital library preservation that has been found
through the research and development for several reasons. These digital libraries have seen
the transformation from being research and experimental projects to become the integral part
of infrastructure for research as well as teaching (Trepte et al., 2015). With prompt
acceptance of digital technologies in the establishment and improvement of the digital
libraries has made the three primary motivations for people to invest in the digital
preservation research program development. In the recent times, there have been increased
concerns about the digital preservation regarding the hardware and software obsolescence.
Since information technology is having a rapid change and it has been evolving into new
generations of software and hardware, the previous generation of software and hardware
tends to get displaced.
This means that well digital objects are copied from one storage media and transfer to
the other that can be implication in retrieving interpreting or even rendering this object
because the incompatibilities would be present between the different storage media systems
and retrieval of those objects would be much difficult (Shaughnessy et al., 2017). Therefore
there is an issue regarding the digital preservation from the aspect of both maintenance of the
accurate than original set of Information and the ability of retrieval and recreation of the same
byte stream using the future technology.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4ONLINE PRIVACY
Options to consider ensuring digital privacy
The technological world right now needs a person to protect themselves and have
total online privacy. There are several ways in which a person can protect their privacy on the
internet and they can be listed as follows:
Using up two factor authentication
Update privacy settings on all social media networks account in use
Blocking of the third party cookies on the web browsers to maintain
anonymity while online
Linking accounts as the vulnerability of creating mode is therefore it is better
that unlinking all the accounts in news from the web browser is a good way to
help protecting information.
Using of secure connections, firewalls and antivirus services
Using stronger password combinations for maintaining security online with
the use of several alphanumeric characters as well as special symbols
Deleting cookies as much as possible while surfing the websites through a web
browser
Measures to ensure users are protected on platforms like Facebook, Google and
iCloud
there are various ways in which a person can protect their privacy and ensure that they
are protected on social media networks like Facebook, Google and iCloud (Jia et al., 2015).
The following are few listed ways in which a person can ensure absolute online privacy:
Data encryption
Protection via anti-malware
Document Page
5ONLINE PRIVACY
Software update automation
Using a firewall
Disabling files and other media sharing options except when needed
Deleting old files from the cloud backup
Telugu of the privacy settings immediately after setting up
Ensuring same or different level of privacy for people
Online privacy can be of various types and so is the invasion of privacy claims.
Reportedly there are four chief kinds of invasion of privacy claims and all of them are related
to online invasion of privacy. Thus, different people appearing on different online activities
need different kind of online security as there are in need of different levels of protection for
their privacy.
Laws to protect privacy
Since online privacy protection has been a big issue there are laws to protect online
privacy entrusted the phone by various constitutions of different countries. With the
emergence of latest technological advancements, the unauthorised access of intricate online
data and information has the potential to make the hackers completely ruin an individual's
social, personal and financial lives. This is the reason why there are laws to protect online
privacy (Agosto & Abbas, 2017).
Understanding the privacy of self
It is absolutely necessary that every individual should be there on responsibility of
protecting their privacy. Every individual should be responsible in understanding in which
way we should provide information about their lives to the entire world via Internet. it is
Document Page
6ONLINE PRIVACY
required that every individual understand the way in which the information is being accessed,
collected or used online in any other form.
Functional comparison between current privacy law in the European Union and
in the Australia
Both the privacy regulation laws of European Union an Australian data privacy are
moving in the same direction but they still exist some sort of key differences that is in dire
need of clarification in defining the terms "serious harm", notifications about briefs and
timeframes, as well as the application that are of business size and reporting requirements
(Jordaan & Van Heerden, 2017). While referring to a data breach the privacy act of European
Union define the word "serious harm"; however, the Australian law defines this phenomenon
as serial, emotional, psychological, financial, physical or reputational harm.
Conclusion
Therefore in conclusion, it can be said that online privacy and their protection is being
challenged every now and then and it is the responsibility of every individual to take
responsibility of maintaining privacy while sharing information over the online portals. This
has been found through the above report online privacy described in details with reference to
digital privacy and its propagation in Australia, the issues of concern that a raised against
around digital materials, the options that is considered for ensuring digital privacy, the
measures that ensure uses a protected all platforms like Facebook, Google and iCloud, the
different level of privacy for different people, the laws that protect the privacy and
understands the privacy of individuals and the functional comparison between the current
privacy law and the European Union and Australia.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7ONLINE PRIVACY
References
Agosto, D. E., & Abbas, J. (2017). “Don’t be dumb—that’s the rule I try to live by”: A closer
look at older teens’ online privacy and safety attitudes. New Media & Society, 19(3),
347-365.
Bergström, A. (2015). Online privacy concerns: A broad approach to understanding the
concerns of different groups for different uses. Computers in Human Behavior, 53,
419-426.
Jia, H., Wisniewski, P. J., Xu, H., Rosson, M. B., & Carroll, J. M. (2015, February). Risk-
taking as a Learning Process for Shaping Teen's Online Information Privacy
Behaviors. In Proceedings of the 18th ACM Conference on Computer Supported
Cooperative Work & Social Computing (pp. 583-599). ACM.
Jordaan, Y., & Van Heerden, G. (2017). Online privacy-related predictors of Facebook usage
intensity. Computers in Human Behavior, 70, 90-96.
Lwin, M. O., Wirtz, J., & Stanaland, A. J. (2016). The privacy dyad: Antecedents of
promotion-and prevention-focused online privacy behaviors and the mediating role of
trust and privacy concern. Internet Research, 26(4), 919-941.
Shaughnessy, K., Rocheleau, J. N., Kamalou, S., & Moscovitch, D. A. (2017). The Effects of
Social Anxiety and Online Privacy Concern on Individual Differences in Internet-
Based Interaction Anxiety and Communication Preferences. Cyberpsychology,
Behavior, and Social Networking, 20(4), 212-217.
Document Page
8ONLINE PRIVACY
Thomson, R., Yuki, M., & Ito, N. (2015). A socio-ecological approach to national differences
in online privacy concern: The role of relational mobility and trust. Computers in
Human Behavior, 51, 285-292.
Trepte, S., Teutsch, D., Masur, P. K., Eicher, C., Fischer, M., Hennhöfer, A., & Lind, F.
(2015). Do people know about privacy and data protection strategies? Towards the
“Online Privacy Literacy Scale”(OPLIS). In Reforming European data protection
law (pp. 333-365). Springer, Dordrecht.
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]