Close Menu
    Facebook X (Twitter) Instagram LinkedIn
    Facebook X (Twitter) Instagram LinkedIn
    TechCodeyTechCodey
    Subscribe
    • Technology

      Ghibli Art 2.0: Where Digital Innovation Meets Market Demand

      Apr 2, 2025

      Massive $1.5 Billion Ethereum Theft Shocks Bybit Users

      Feb 24, 2025

      Grok 3: Beyond the Hype – A Deeper Dive into xAI’s Latest Creation

      Feb 18, 2025

      DeepSeek AI vs. Industry Giants: A Game-Changer in the AI Race

      Jan 30, 2025

      Instagram to Inspire Users with a Template Featuring like TikTok

      Apr 27, 2022
    • Startups

      Artisan AI: The “Stop Hiring Humans” Agent Secures Funding to Revolutionize Work

      Apr 9, 2025

      Ghibli Art 2.0: Where Digital Innovation Meets Market Demand

      Apr 2, 2025

      Athar Packaging Solutions: Pioneering a Circular Economy Revolution

      Mar 24, 2025

      Shop Circle Secures $60 Million to Power AI-Driven B2B Revolution

      Feb 27, 2025

      Uniphore is Opening the Conversation of Every Enterprise that Values

      May 1, 2022
    • Inspirational Stories

      Journey of PRAFULL BILLORE From Discontinued MBA Student to Famous MBA CHAIWALA

      Apr 25, 2022

      Put your best foot forward with Neeman’s eco-friendly shoes

      Apr 22, 2022

      How Raghunandan Kamath founded Naturals Ice Cream

      Apr 17, 2022

      How Smita aims to provide high-quality drinking water by purifying sewage to produce clean water

      Apr 7, 2022

      How Nina Lekhi Bagged “Baggit” and Got Success in Her Life

      Mar 29, 2022
    • Lifestyle
      1. Health
      2. Fashion
      3. View All

      9 Yoga Poses for Back Pain, Tension, and Stiffness Relief

      Apr 21, 2022

      5 Ways to Keep Yourself Mentally Fit

      Apr 15, 2022

      Do you also feel tired? Then there is a solution

      Apr 10, 2022

      The Impact of Mental Health Awareness in Tech: Pros and Cons

      Mar 22, 2022

      How MyGlamm, a D2C Beauty Brand become Unicorn Startup

      Mar 15, 2022

      Best Essential Skincare Products For Different Skin Types

      Mar 7, 2022

      The impact of new fashion trends over our personality

      Feb 24, 2022

      Best Fashion Trends to Look Out for Spring/Summer 2022

      Jan 12, 2022

      9 Yoga Poses for Back Pain, Tension, and Stiffness Relief

      Apr 21, 2022

      5 Ways to Keep Yourself Mentally Fit

      Apr 15, 2022

      Do you also feel tired? Then there is a solution

      Apr 10, 2022

      Best Practices of Employee Rewards and Recognition

      Apr 4, 2022
    • Auto

      Ola Electric’s Market Debut: A Rocky Start, Promising Future

      Aug 9, 2024

      Do You Think Hatchback Cars is Overtaking by SUVs?

      Apr 21, 2022

      Tata Motors Launches New Electric Car “CURVV”: Everything You Should Know About

      Apr 6, 2022

      Toyota exhibit their all-new Electric Concept Innova Crysta MPV in Jakarta

      Mar 31, 2022

      OLA Electric Company Invest In Israeli Tech Battery Firm Storedot

      Mar 23, 2022
    TechCodeyTechCodey
    Home | Data Privacy? It’s Easy If You Do It Smart
    Technology

    Data Privacy? It’s Easy If You Do It Smart

    Priyansh Sahu By Priyansh SahuMar 21, 2021Updated:Dec 26, 2021No Comments6 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Data Privacy
    Share
    Facebook Twitter LinkedIn Pinterest Email
    In the world of a data breach, is your data protected?

    You may have noticed this when you install a new software application on your device (mobile or PC). The application requires certain permissions, these permissions are associated with storage, personal data, etc. And the user still accepts this permission while ignoring the pop-up screen.

    But companies use the data for their commercial benefit and many users do not know about it. Companies mainly use four types of data to enhance their services.

    1. Personal Data: Personal data refers to basic customer data such as name, age, mailing address, email address, social media contact information, etc. Companies use these data to learn more about the users that use their services.

    2. Engagement Data: The goal is to gather qualified data. This is a descriptive form of information, in which companies target their customers to provide services.

    3. Behavioral Data: This is the most commonly used data, in which companies use, what user visits daily while browsing or surfing on the internet, using this the companies provide information related to user interesting topic.

    4. Attitudinal Data: By gathering the personal data, descriptive data, and user behavioral data companies review the user’s opinion of what they think about the product are they like it or not.

    privacy
    • What Is the Difference Between Data Security and Data Privacy?

    While data security and data privacy are similar, they are completely different from one another. Data security is about protecting data against cybercriminals, while data privacy is about how data organizations or individuals legally collect, store and use data.

    • How companies collect your data?

    The companies collect data in several ways from various sources. They are equipped with very advanced techniques and algorithms to access this information. In particular, customer data may be collected in three ways:

    1. By directly asking the user.

    2. Indirect tracking of the user.

    3. Add your own customer data sources as well.

    The best business strategy is to utilize all three strategies for good business.

    • How companies use your data?

    1. To improve their relationship with the customer.

    2. For enhancing productivity.

    3. To deliver better quality products to the user.

    4. Use the information within digital marketing.

    5. To build a customer base. 

    • Data Privacy Regulation

    If companies are using user information then it is also important that the company will take the responsibility to protect our data, Many companies do promises that they will not misuse the user data.  

    Many data protection regulations were established to prevent the misuse of data against potential customers some of them are :

    • GDPR: The General Data Protection Regulation (GDPR) came into effect in May 2018 and has been an essential step in strengthening citizens’ fundamental rights in the current Digital Revolution, and monitoring businesses, and preventing these companies from misusing data for their capital gains which puts the user at risk. The GDPR has been very active and has fined companies like Facebook and Google millions of dollars.
    • CCPA: The California Consumer Privacy Act (CCPA) is a Personal Data Protection Act, which came into force in the State of California on January 1, 2020. It restricts how the company uses and collects data.
    • PDPB: India’s Personal Data Protection Bill (PDPB), which is currently under the draft, is said to be one of the most comprehensive data protection laws, and in some ways stricter than European Union’s GDPR. If a company in India uses customized advertising and your website is accessible in India, you are required to comply with the PDPB.
    privacy1
    • HOW PERSONAL INFORMATION IS USED BY SOCIAL MEDIA PLATFORMS THROUGHOUT THE CONSENT PROCESS.

    After being sanctioned by courts around the world, social media platforms find that they need the consent of the user to pull something like this. Under this, they create glamour in such a way that the user can neither escape nor obtain the same thing. 

    Further, even if they do read the terms and conditions of a particular platform as a conscious citizen, it bears them no fruit because they cannot proceed or access the platform without agreeing to these conditions.

    Many Social Media Platforms use their consent policy for data information. The companies need to specify which data security and privacy acts and laws affect their users. 

    The most widely downloaded WhatsApp applications are the biggest example. The goal was to create this app: What you share with your friends and family remains with each other. This means that we will always protect your conversations with end-to-end encryption to prevent WhatsApp from seeing these private messages. However, following the merger of WhatsApp with Facebook, they continue to change their data policy.

    Recently WhatsApp announces its new privacy policy according to this: “WhatsApp has made it clear since the announcement of its updated privacy policy that the update is mainly meant for businesses using its messaging platform. 

    The final clarification brings about what appears to be the difference between “messages with friends and family” and “messages with a business”. It states that the new Privacy Policy applies only to the latter and that the former is unchanged.

    • For Whatsapp messages only with friends and family:
      • Neither WhatsApp nor Facebook can “see your private messages or hear your calls”. Personal messages are protected by end-to-end encryption and will continue to be so.
      • WhatsApp does not share a user’s contacts with Facebook, or any other app.
      • WhatsApp cannot see a location you have shared with a friend like that too is protected by end-to-end encryption.

    WhatsApp has detailed what will happen to users who don’t accept its new privacy policy in an FAQ on its website. Starting May 15th, its functionality will become more limited, and users will no longer be able to send or read messages from the app.

    As it’s not only one platform but there are various social media platforms out there that also breaches data privacy due to this breaching of data, the Indian Government bans several Chinese apps.

    Applications were blocked under section 69 A of the Information Technology Act and the relevant provisions of the 2009 IT Rules. Some such applications include Tiktok, PUBG, UC Browser, We Chat, Snack Video, CamScanner, etc.

    • Conclusion

    As an individual, you should know that your information is being set aside and used by a wide range of companies. And make sure you don’t share more than necessary. It is the fundamental right of a person. 

    Privacy is the fundamental barrier preventing the control and dominance of the state. Without it, the social contract is broken, and individuals cannot acknowledge their democratic rights to participate, to build, to grow, and to think.

    We need to understand how privacy is required for our lives, and we need to take measures to prevent others from using our personal information. It is incumbent upon us to control them and use them for the betterment of our future.

    Data Privacy Data Privacy Policy Data Security
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleThe Evolution of Indian Startup Ecosystem
    Next Article Top 10 Most Innovative Gadgets in 2022
    Priyansh Sahu
    • Website

    Related Posts

    Ghibli Art 2.0: Where Digital Innovation Meets Market Demand

    Apr 2, 2025

    Massive $1.5 Billion Ethereum Theft Shocks Bybit Users

    Feb 24, 2025

    Grok 3: Beyond the Hype – A Deeper Dive into xAI’s Latest Creation

    Feb 18, 2025
    Leave A Reply Cancel Reply

    Trending Post

    Artisan AI: The “Stop Hiring Humans” Agent Secures Funding to Revolutionize Work

    Apr 9, 2025

    Ghibli Art 2.0: Where Digital Innovation Meets Market Demand

    Apr 2, 2025

    Athar Packaging Solutions: Pioneering a Circular Economy Revolution

    Mar 24, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Recent Posts
    • Artisan AI: The “Stop Hiring Humans” Agent Secures Funding to Revolutionize Work
    • Ghibli Art 2.0: Where Digital Innovation Meets Market Demand
    • Athar Packaging Solutions: Pioneering a Circular Economy Revolution
    • Shop Circle Secures $60 Million to Power AI-Driven B2B Revolution
    • Massive $1.5 Billion Ethereum Theft Shocks Bybit Users
    Facebook X (Twitter) Instagram LinkedIn
    • About Us
    • Contact Us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    © 2025 TechCodey. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.