What Role Do Cookies and Privacy Policies Play in Data Breach? (Part-3)

GENERAL DATA PROTECTION REGULATION

According to the General Data Protection Regulation, there will be only one way for all businesses operating in Europe to comply with all data protection regulations starting in May 2018.

Stronger rules on data protection mean,

  • Individuals have more influence over their personal information.
  • A level playing field benefits companies.

The GDPR establishes seven guidelines for the lawful processing of personal data. The collection, arrangement, structuring, storage, modification, consultation, usage, contact, mixture, limitation, erasure, or destruction of personal data are all examples of processing. As a result, the seven values are as follows:

  1. Lawfulness, fairness, and transparency
  2. Purpose limitation
  3. Data minimization
  4. Accuracy
  5. Storage limitation
  6. Integrity and confidentiality(security)
  7. Accountability

Principles are the center of the GDPR; they guide regulations and compliant processing.

Europe’s General Data Protection Regulation (GDPR) suggested a realistic alternative that is similar to this (GDPR). It would only happen if a technical company creates software that does not monitor users by default and offers them the option to “opt-out.” Instead, the consumer could willingly “opt-in” to be monitored in order to receive targeted advertising. As a result, privacy is the default setting. A mishmash of mentioned methods with GDPR directives may also be a viable solution. Even if users “opt in” for surveillance, they should be given the name and contact information for the organisation that is tracking them, as well as the option to “opt out.” A price for the users’ personal data, if they ask for it, may be a design that protects the user’s privacy.

CONCLUSION

Cookies allow others to see your information. When people Google how to take data from cookies, they will learn how to do so. Several videos and websites will assist in the extraction of knowledge. People sometimes disregard privacy policies because they are lengthy. Many applications will take advantage of it because people embrace it without even looking at it. Normal people can protect themselves from hackers by using private servers like FreedomBox. In Europe, there are also rules that assist citizens in gaining control of their data and preventing it from being leaked. We should be protected from these dangers, and we should not allow strangers into our private lives without our permission.

What Role Do Cookies and Privacy Policies Play in Data Breach? (Part-2)

PRIVACY POLICY

Many technologically advanced people, too, simply click-past excruciatingly long and complicated privacy policies because they see no other choice. A price for the users’ personal data, if they ask for it, may be a design in which the user’s privacy is prioritised.

Every app has a lengthy policy known as the privacy policy, which is something we should pay attention to. We support the policy without ever reading it. But, do we really need the location service for a simple gaming app? Even the well-known WPS Office app asks for location permission? Or does an app like Hotstar need microphone permission?

“It uses the microphone on your smartphone to record audio samples (including ambient sounds) and generate encrypted fingerprint files of those audio samples in real-time,” according to Hotstar’s privacy policy. To recognise and recognise your television viewing habits, the fingerprint files are compared to a database of documented fingerprints of television networks and television content.” Even if this were true, the microphone might be used to record private audio clips or gain access to our personal information.

Another question that arises is, “Which operating system is more stable, IOS or ANDROID?” When we examine Apple’s operating system, we will see that it is a closed system. It does not make its source code available to software developers, and Apple device owners are unable to change it. Hackers would have a tough time finding any bugs in IOS-powered devices as a result of this. Android smartphones, on the other hand, have open-source code, allowing owners to tinker with the device’s operating system. For its software, it grants all permissions to the app developers.

WAYS TO BE SAFE

There are a variety of ways that people can protect themselves from such dangers. One such example is ‘FreedomBox.’

FreedomBox is a private server system that allows everyone to host their own internet services, such as a VPN, a personal website, file sharing, secure messengers, a VoIP server, a Meta search engine, and more. It’s made to keep you safe. By putting you in charge of your online operation and records, FreedomBox instils liberty in the internet.

Other simple tips by which we can stay safe from cookies are:

  • Clean or delete cookies: The first and most basic move is to clear your browsing history and uninstall all cookies after each session. Cookies can be deleted and all temporary internet files can be cleared with software like SecureClean.
  • Modifying Browser settings: If you have any knowledge about cookies, you can adjust your browser settings accordingly. Safari and Firefox allow you to have more control over your data.
  • Use Add-Ons: Add-Ons allow us to handle cookies more precisely and choose who we want to share our online data with.
  • Share with moderation: To be secure, don’t use personal information where cookies can be used.
  • Protect: Using some anti-virus programme is the safest way to protect yourself.

What Role Do Cookies and Privacy Policies Play in Data Breach? (Part-1)

In today’s world, where many technological advancements are occurring, there are certain aspects about which we must be cautious. Hackers aren’t just people who steal your information; they can even keep an eye and ear on you. Many businesses, or should we say applications, are engaged in such nefarious practices.

Your sensitive information can be extracted and used in a variety of ways. It is important for everyone to understand how our personal data can be taken from the internet and how we can protect ourselves from it.

INTRODUCTION

“Our website needs cookies to provide you with the best experience,” we’ve all seen this pop up almost every time we use the browser. We’ll presume you’re okay with receiving all cookies if you continue without adjusting your settings.” Otherwise, we are redirected to the previous page if we do not press proceed. These cookies are designed to store a small amount of data unique to a specific client and website, and they can be accessed by either the web server or the client device. Although the cookies do not contain your password, they do contain a hash that is identical to it. When you visit the website, it is compared to a hash stored on the server, which is essentially the same as your password.

COOKIES

There are two types of cookies-

  1. Session cookies- E-commerce sites use session cookies to keep track of what you put in your shopping cart. Those are just temporary, and they disappear as soon as you close your browser.
  2. Persistent cookies- It allow websites to remember details such as log-in credentials or account information. However, there is a risk that any of those cookies could end up in the wrong hands.

Third-party cookies pose a greater risk. For the most part, they’re generated by sites that aren’t the same as the web pages people are actually browsing, so they’re linked to ads on that website. Even if the user does not visit the connection, if there are about ten ads on the tab, it will generate ten cookies. It also allows users to monitor a person’s browsing history on all of their ad-supported sites around the internet.

In 2013, Edward Snowden reported that The New York Times articles explaining “How the NSA was using Google cookies to pinpoint hacking targets” included cookies as well. Dave Winer, a New York-based American software developer, has also expressed his concerns about how Facebook can monitor anyone’s whereabouts on the internet after logging in without their permission.

Cookies make it possible to:

  • Persistent shopping carts and customer log-in
  • Wish lists
  • Suggestions for Products
  • Custom user interface (for example, “Welcome back, Steve”)
  • Keeping track of the customer’s address and payment details.

This information can’t only be used by advertisers to aim targeted advertising at us; it also poses a danger to us if it’s misused by the government. At the time, our own well-being was being compromised by ardent supporters of the government through data that we might not have discovered in any situation. Surveillance becomes much more dangerous as a result of this.

Stay tuned for Part-2!