In the world of a data breach, is your data protected?
You may have noticed this when you install a new software application on your device (mobile or PC). The application requires certain permissions, these permissions are associated with storage, personal data, etc. And the user still accepts this permission while ignoring the pop-up screen.
But companies use the data for their commercial benefit and many users do not know about it. Companies mainly use four types of data to enhance their services.
1. Personal Data: Personal data refers to basic customer data such as name, age, mailing address, email address, social media contact information, etc. Companies use these data to learn more about the users that use their services.
2. Engagement Data: The goal is to gather qualified data. This is a descriptive form of information, in which companies target their customers to provide services.
3. Behavioral Data: This is the most commonly used data, in which companies use, what user visits daily while browsing or surfing on the internet, using this the companies provide information related to user interesting topic.
4. Attitudinal Data: By gathering the personal data, descriptive data, and user behavioral data companies review the user’s opinion of what they think about the product are they like it or not.
What Is the Difference Between Data Security and Data Privacy?
While data security and data privacy are similar, they are completely different from one another. Data security is about protecting data against cybercriminals, while data privacy is about how data organizations or individuals legally collect, store and use data.
How companies collect your data?
The companies collect data in several ways from various sources. They are equipped with very advanced techniques and algorithms to access this information. In particular, customer data may be collected in three ways:
1. By directly asking the user.
2. Indirect tracking of the user.
3. Add your own customer data sources as well.
The best business strategy is to utilize all three strategies for good business.
How companies use your data?
1. To improve their relationship with the customer.
2. For enhancing productivity.
3. To deliver better quality products to the user.
4. Use the information within digital marketing.
5. To build a customer base.
Data Privacy Regulation
If companies are using user information then it is also important that the company will take the responsibility to protect our data, Many companies do promises that they will not misuse the user data.
Many data protection regulations were established to prevent the misuse of data against potential customers some of them are :
- GDPR: The General Data Protection Regulation (GDPR) came into effect in May 2018 and has been an essential step in strengthening citizens’ fundamental rights in the current Digital Revolution, and monitoring businesses, and preventing these companies from misusing data for their capital gains which puts the user at risk. The GDPR has been very active and has fined companies like Facebook and Google millions of dollars.
- CCPA: The California Consumer Privacy Act (CCPA) is a Personal Data Protection Act, which came into force in the State of California on January 1, 2020. It restricts how the company uses and collects data.
- PDPB: India’s Personal Data Protection Bill (PDPB), which is currently under the draft, is said to be one of the most comprehensive data protection laws, and in some ways stricter than European Union’s GDPR. If a company in India uses customized advertising and your website is accessible in India, you are required to comply with the PDPB.
HOW PERSONAL INFORMATION IS USED BY SOCIAL MEDIA PLATFORMS THROUGHOUT THE CONSENT PROCESS.
After being sanctioned by courts around the world, social media platforms find that they need the consent of the user to pull something like this. Under this, they create glamour in such a way that the user can neither escape nor obtain the same thing.
Further, even if they do read the terms and conditions of a particular platform as a conscious citizen, it bears them no fruit because they cannot proceed or access the platform without agreeing to these conditions.
Many Social Media Platforms use their consent policy for data information. The companies need to specify which data security and privacy acts and laws affect their users.
The most widely downloaded WhatsApp applications are the biggest example. The goal was to create this app: What you share with your friends and family remains with each other. This means that we will always protect your conversations with end-to-end encryption to prevent WhatsApp from seeing these private messages. However, following the merger of WhatsApp with Facebook, they continue to change their data policy.
Recently WhatsApp announces its new privacy policy according to this: “WhatsApp has made it clear since the announcement of its updated privacy policy that the update is mainly meant for businesses using its messaging platform.
The final clarification brings about what appears to be the difference between “messages with friends and family” and “messages with a business”. It states that the new Privacy Policy applies only to the latter and that the former is unchanged.
- For Whatsapp messages only with friends and family:
- Neither WhatsApp nor Facebook can “see your private messages or hear your calls”. Personal messages are protected by end-to-end encryption and will continue to be so.
- WhatsApp does not share a user’s contacts with Facebook, or any other app.
- WhatsApp cannot see a location you have shared with a friend like that too is protected by end-to-end encryption.
WhatsApp has detailed what will happen to users who don’t accept its new privacy policy in an FAQ on its website. Starting May 15th, its functionality will become more limited, and users will no longer be able to send or read messages from the app.
As it’s not only one platform but there are various social media platforms out there that also breaches data privacy due to this breaching of data, the Indian Government bans several Chinese apps.
Applications were blocked under section 69 A of the Information Technology Act and the relevant provisions of the 2009 IT Rules. Some such applications include Tiktok, PUBG, UC Browser, We Chat, Snack Video, CamScanner, etc.
Conclusion
As an individual, you should know that your information is being set aside and used by a wide range of companies. And make sure you don’t share more than necessary. It is the fundamental right of a person.
Privacy is the fundamental barrier preventing the control and dominance of the state. Without it, the social contract is broken, and individuals cannot acknowledge their democratic rights to participate, to build, to grow, and to think.
We need to understand how privacy is required for our lives, and we need to take measures to prevent others from using our personal information. It is incumbent upon us to control them and use them for the betterment of our future.