What Role Do Cookies and Privacy Policies Play in Data Breach? (Part-3)

GENERAL DATA PROTECTION REGULATION

According to the General Data Protection Regulation, there will be only one way for all businesses operating in Europe to comply with all data protection regulations starting in May 2018.

Stronger rules on data protection mean,

  • Individuals have more influence over their personal information.
  • A level playing field benefits companies.

The GDPR establishes seven guidelines for the lawful processing of personal data. The collection, arrangement, structuring, storage, modification, consultation, usage, contact, mixture, limitation, erasure, or destruction of personal data are all examples of processing. As a result, the seven values are as follows:

  1. Lawfulness, fairness, and transparency
  2. Purpose limitation
  3. Data minimization
  4. Accuracy
  5. Storage limitation
  6. Integrity and confidentiality(security)
  7. Accountability

Principles are the center of the GDPR; they guide regulations and compliant processing.

Europe’s General Data Protection Regulation (GDPR) suggested a realistic alternative that is similar to this (GDPR). It would only happen if a technical company creates software that does not monitor users by default and offers them the option to “opt-out.” Instead, the consumer could willingly “opt-in” to be monitored in order to receive targeted advertising. As a result, privacy is the default setting. A mishmash of mentioned methods with GDPR directives may also be a viable solution. Even if users “opt in” for surveillance, they should be given the name and contact information for the organisation that is tracking them, as well as the option to “opt out.” A price for the users’ personal data, if they ask for it, may be a design that protects the user’s privacy.

CONCLUSION

Cookies allow others to see your information. When people Google how to take data from cookies, they will learn how to do so. Several videos and websites will assist in the extraction of knowledge. People sometimes disregard privacy policies because they are lengthy. Many applications will take advantage of it because people embrace it without even looking at it. Normal people can protect themselves from hackers by using private servers like FreedomBox. In Europe, there are also rules that assist citizens in gaining control of their data and preventing it from being leaked. We should be protected from these dangers, and we should not allow strangers into our private lives without our permission.

What Role Do Cookies and Privacy Policies Play in Data Breach? (Part-2)

PRIVACY POLICY

Many technologically advanced people, too, simply click-past excruciatingly long and complicated privacy policies because they see no other choice. A price for the users’ personal data, if they ask for it, may be a design in which the user’s privacy is prioritised.

Every app has a lengthy policy known as the privacy policy, which is something we should pay attention to. We support the policy without ever reading it. But, do we really need the location service for a simple gaming app? Even the well-known WPS Office app asks for location permission? Or does an app like Hotstar need microphone permission?

“It uses the microphone on your smartphone to record audio samples (including ambient sounds) and generate encrypted fingerprint files of those audio samples in real-time,” according to Hotstar’s privacy policy. To recognise and recognise your television viewing habits, the fingerprint files are compared to a database of documented fingerprints of television networks and television content.” Even if this were true, the microphone might be used to record private audio clips or gain access to our personal information.

Another question that arises is, “Which operating system is more stable, IOS or ANDROID?” When we examine Apple’s operating system, we will see that it is a closed system. It does not make its source code available to software developers, and Apple device owners are unable to change it. Hackers would have a tough time finding any bugs in IOS-powered devices as a result of this. Android smartphones, on the other hand, have open-source code, allowing owners to tinker with the device’s operating system. For its software, it grants all permissions to the app developers.

WAYS TO BE SAFE

There are a variety of ways that people can protect themselves from such dangers. One such example is ‘FreedomBox.’

FreedomBox is a private server system that allows everyone to host their own internet services, such as a VPN, a personal website, file sharing, secure messengers, a VoIP server, a Meta search engine, and more. It’s made to keep you safe. By putting you in charge of your online operation and records, FreedomBox instils liberty in the internet.

Other simple tips by which we can stay safe from cookies are:

  • Clean or delete cookies: The first and most basic move is to clear your browsing history and uninstall all cookies after each session. Cookies can be deleted and all temporary internet files can be cleared with software like SecureClean.
  • Modifying Browser settings: If you have any knowledge about cookies, you can adjust your browser settings accordingly. Safari and Firefox allow you to have more control over your data.
  • Use Add-Ons: Add-Ons allow us to handle cookies more precisely and choose who we want to share our online data with.
  • Share with moderation: To be secure, don’t use personal information where cookies can be used.
  • Protect: Using some anti-virus programme is the safest way to protect yourself.