LONDON: BT, the UK's largest home internet provider, will not face government legal action over an online behavioural targeting initiative.
Britain's Crown Prosecution Service (CPS) has announced that it will not prosecute BT and Phorm for conducting a 2006 trial of a technology called Page Sense.
Around 18,000 customers participated without their prior knowledge. The initiative sparked consumer privacy concerns after being made public.
Page Sense worked by scanning the web pages viewed by individual users, and then serving targeted ads based on this behaviour. All data monitored during the trial was anonymised.
BT subsequently said that no laws had been broken by the trial. The broadband provider's relationship with Phorm ended in 2009.
In a statement, the CPS said: "In rare cases ... it may become clear prior to the collection and consideration of all the likely evidence that a prosecution would not be in the public interest.
"We would only take such a decision if we were satisfied that the broad extent of the criminality had been determined and that we could make a fully informed assessment of the public interest. This is such a case."
Institutions from both the public and private sectors have responded to consumer concerns over online behavioural advertising in a variety of ways.
The European Commission is currently updating its data protection laws, and is likely to recommend stricter controls on the use of online data.
"I am a firm believer in the necessity of enhancing individuals' control over their own data," Viviane Reding, the European Union's justice commissioner, said last month.
"Individuals must be informed about which data is collected and for what purposes. They need to know how it might be used by third parties. They must know their rights and which authority to address if those rights are violated."
She added: "They must be told about the risks related to the processing of their personal data so that they don't lose control over their data or that their data is not misused."
Meanwhile, Yahoo recently rolled out an Ad Choices icon, which appears alongside display ads on its pages - and which, the company hopes, will become an industry standard.
Users who click on the icons are given information on the advertiser, and will also be given the opportunity to change their privacy preferences.
Speaking at the 2011 ISBA Conference, Justin Weiss, international privacy director at Yahoo, said: "Data collection in an invisible way is creepy to people. They don't like the idea of it.
"We have to find creative solutions to get at the issue of a lack of transparency."
Data sourced from The Guardian/Daily Telegraph/EU/Warc; additional content by Warc staff, 14 April 2011
Personal Comment: In this case, BT successfully avoids from lawsuit raise some argument by US which not satisfied with the European decision, thus, European Commission is currently updating its data protection laws, and is likely to recommend stricter controls on the use of online data. I agree with Justin Weiss's view, data collection in an invisible way is creepy to people, and all of us does not like that way. We prefer detail and purpose of collection stated clearly before we provide our personal information, because this is our right.Personal Data Protection Act 2010, Principle 2:Purposes of Collection of Personal Data, Personal data shall be held only for one or more specified and lawful purposes (necessary for that purpose, adequate and relevant and not excessive).
Cyberlaw - Personal Data Protection
Wednesday, January 25, 2012
Judge tosses online privacy case
The dismissal of lawsuits brought against Northwest Airlines has online privacy advocates renewing calls for federal privacy legislation.
In a decision dated June 6, U.S. District Court Judge Paul Magnuson ruled that seven consolidated class action lawsuits against Northwest had no merit--in part because the privacy policy posted on the airline's Web site was unenforceable unless plaintiffs claimed to have read it. The plaintiffs had contended that the airline, in giving passenger information to the government in the wake of the Sept. 11, 2001, terrorist attacks, violated laws and its own privacy policy.
"Although Northwest had a privacy policy for information included on the Web site, plaintiffs do not contend that they actually read the privacy policy prior to providing Northwest with their personal information," Magnuson noted. "Thus, plaintiffs' expectation of privacy was low."
Privacy advocates assailed that part of the decision, saying it rendered Web site privacy policies all but unenforceable. "I don't think it's relevant whether or not they actually read the privacy policy first," said Lee Tien, senior staff attorney for the Electronic Frontier Foundation (EFF) in San Francisco. "Think of all the 'fine print' we run into every day--warranties and the like. Rather than focus on what the plaintiffs actually read, we should focus on what Northwest said it would do."
"The rationale the court uses calls into question the assurances of any policy posted on any Web site," said David Sobel, general counsel for the Electronic Privacy Information Center (EPIC) in Washington, D.C.
Northwest shared passenger information with the National Aeronautical and Space Administration (NASA) for its research into improving airline security following the terrorist attacks of Sept. 11, 2001.
According to the plaintiffs, Northwest violated its privacy policy, the Electronic Communications Privacy Act, the Fair Credit Reporting Act and Minnesota's Deceptive Trade Practices Act by giving NASA passenger name records, which include not only passengers' name but also their flight numbers, credit card information, hotel and car rental reservations, and names of traveling companions.
The EFF's Tien and other privacy advocates said the decision illustrated the inadequacy of U.S. privacy law. "This decision is precisely why so many advocates call for consumers to be given a right to sue for privacy breaches," said Ray Everett-Church, chief privacy officer for the ePrivacy Group. "This decision tells companies that promises they make in privacy policies can be ignored because the people who are harmed have little legal basis for complaining."
EPIC's Sobel agreed, saying the decision undermined marketers' claims that industry is capable of regulating itself when it comes to consumers' privacy."The online industry has always made the argument that there's no need for legislation protecting online privacy, that through privacy policies and self-regulation they're able to give people the protections they need," Sobel said. "This decision really underscores the fact that there appears to be no enforceable protection in place."
Personal Comment:
In this case, the data was shared to third party which not really related to the purpose of customer to use the website. Although this is not really fair to customer, but it is related to terrorist attack which can incur a huge damage and loss to a nation, this consideration has to be taken. Northwest Airlines need to improve and modify its privacy details to avoid any conflicts rise between the company and customer on this issue. Personal Data Protection Act 2010, Principle 2:Purposes of Collection of Personal Data, Personal data shall be held only for one or more specified and lawful purposes (necessary for that purpose, adequate and relevant and not excessive). Principle 3:Use of Personal Data. Personal data shall not be held without consent unless:(a)For the purposes to be used at the time of the collection of data,(b)For the purposes directly related to (a).
In a decision dated June 6, U.S. District Court Judge Paul Magnuson ruled that seven consolidated class action lawsuits against Northwest had no merit--in part because the privacy policy posted on the airline's Web site was unenforceable unless plaintiffs claimed to have read it. The plaintiffs had contended that the airline, in giving passenger information to the government in the wake of the Sept. 11, 2001, terrorist attacks, violated laws and its own privacy policy.
"Although Northwest had a privacy policy for information included on the Web site, plaintiffs do not contend that they actually read the privacy policy prior to providing Northwest with their personal information," Magnuson noted. "Thus, plaintiffs' expectation of privacy was low."
Privacy advocates assailed that part of the decision, saying it rendered Web site privacy policies all but unenforceable. "I don't think it's relevant whether or not they actually read the privacy policy first," said Lee Tien, senior staff attorney for the Electronic Frontier Foundation (EFF) in San Francisco. "Think of all the 'fine print' we run into every day--warranties and the like. Rather than focus on what the plaintiffs actually read, we should focus on what Northwest said it would do."
"The rationale the court uses calls into question the assurances of any policy posted on any Web site," said David Sobel, general counsel for the Electronic Privacy Information Center (EPIC) in Washington, D.C.
Northwest shared passenger information with the National Aeronautical and Space Administration (NASA) for its research into improving airline security following the terrorist attacks of Sept. 11, 2001.
According to the plaintiffs, Northwest violated its privacy policy, the Electronic Communications Privacy Act, the Fair Credit Reporting Act and Minnesota's Deceptive Trade Practices Act by giving NASA passenger name records, which include not only passengers' name but also their flight numbers, credit card information, hotel and car rental reservations, and names of traveling companions.
The EFF's Tien and other privacy advocates said the decision illustrated the inadequacy of U.S. privacy law. "This decision is precisely why so many advocates call for consumers to be given a right to sue for privacy breaches," said Ray Everett-Church, chief privacy officer for the ePrivacy Group. "This decision tells companies that promises they make in privacy policies can be ignored because the people who are harmed have little legal basis for complaining."
EPIC's Sobel agreed, saying the decision undermined marketers' claims that industry is capable of regulating itself when it comes to consumers' privacy."The online industry has always made the argument that there's no need for legislation protecting online privacy, that through privacy policies and self-regulation they're able to give people the protections they need," Sobel said. "This decision really underscores the fact that there appears to be no enforceable protection in place."
Personal Comment:
In this case, the data was shared to third party which not really related to the purpose of customer to use the website. Although this is not really fair to customer, but it is related to terrorist attack which can incur a huge damage and loss to a nation, this consideration has to be taken. Northwest Airlines need to improve and modify its privacy details to avoid any conflicts rise between the company and customer on this issue. Personal Data Protection Act 2010, Principle 2:Purposes of Collection of Personal Data, Personal data shall be held only for one or more specified and lawful purposes (necessary for that purpose, adequate and relevant and not excessive). Principle 3:Use of Personal Data. Personal data shall not be held without consent unless:(a)For the purposes to be used at the time of the collection of data,(b)For the purposes directly related to (a).
Children Online Privacy Issues
Iconix Brand Group, Inc., in October 2009, agreed to pay a $250,000 civil penalty to settle Federal Trade Commission charges that it violated the Children’s Online Privacy Protection Act "by knowingly collecting, using, or disclosing personal information from children online without first obtaining their parents’ permission," according to the FTC.
Since 2006, the FTC said, Iconix, which owns youth-oriented brands including Candie's, Bongo, OP and Mudd, "knowingly collected and stored personal information from approximately 1,000 children without first notifying their parents or obtaining parental consent." One of its sites, MyMuddWorld.com, the company "also enabled girls to publicly share personal stories and photos online," the FTC said.
Sony Music, in late 2008, agreed to pay $1 million as part of a settlement to resolve FTC charges that it violated the Children’s Online Privacy Protection Act. The FTC said that through its music fan Web sites, Sony "improperly collected, maintained and disclosed personal information from thousands of children under the age of 13, without their parents’ consent." The $1 million was the "largest penalty ever in a COPPA case," the FTC said.
The privacy protection act, in place since 2000, requires Web sites that collect information from children under age 13 to get consent first from a parent before getting information from a child.
Personal Comment: Companies need to be aware when collecting data from user, they have to avoid collecting data from children who under age 13 or to get permission from their parent before proceed to collection of data. Its important to follow the act that indicates personal data shall be collected fairly and lawfully in PDP Act 2010. PDP Act 2010, Principle 1:Personal Data shall be Collected Fairly and Lawfully. Neither fairly or lawfully is defined. Definition of “unlawful" R v R “…something which is contrary to some law or enactment or is done without lawful justification or excuse.” *House of Lords, 1991
Since 2006, the FTC said, Iconix, which owns youth-oriented brands including Candie's, Bongo, OP and Mudd, "knowingly collected and stored personal information from approximately 1,000 children without first notifying their parents or obtaining parental consent." One of its sites, MyMuddWorld.com, the company "also enabled girls to publicly share personal stories and photos online," the FTC said.
Sony Music, in late 2008, agreed to pay $1 million as part of a settlement to resolve FTC charges that it violated the Children’s Online Privacy Protection Act. The FTC said that through its music fan Web sites, Sony "improperly collected, maintained and disclosed personal information from thousands of children under the age of 13, without their parents’ consent." The $1 million was the "largest penalty ever in a COPPA case," the FTC said.
The privacy protection act, in place since 2000, requires Web sites that collect information from children under age 13 to get consent first from a parent before getting information from a child.
Personal Comment: Companies need to be aware when collecting data from user, they have to avoid collecting data from children who under age 13 or to get permission from their parent before proceed to collection of data. Its important to follow the act that indicates personal data shall be collected fairly and lawfully in PDP Act 2010. PDP Act 2010, Principle 1:Personal Data shall be Collected Fairly and Lawfully. Neither fairly or lawfully is defined. Definition of “unlawful" R v R “…something which is contrary to some law or enactment or is done without lawful justification or excuse.” *House of Lords, 1991
Online Data Retention
Yahoo, which was keeping data about user's Web searches for 13 months, said it would limit most of that data collection to 90 days after an uproar in late 2008. Some say Yahoo's partial deletion of IP (Internet Protocol) address data is still not enough to protect consumers, and called for complete deletion.
Google and Microsoft also agreed to reduce the length of time the companies kept such data, but not as much as Yahoo did. Google agreed to nine months and Microsoft to six months, both down from 18 months. (Msnbc.com is a joint venture of Microsoft and NBC Universal.)
Personal Comment: Retention of user data should not exist longer than necessary for particular purpose, but I think that it depend on the nature of business involved. For example, banking industry will keep the transaction history for customer because there are possibility that customer need to revise their transaction in few months ago or even few years ago. It is a wise step for yahoo, google and microsoft to reduce the period of data retention,it will increase the confidence level of the users in using web. PDP Act 2010, Principle 6:Retention of Personal Data. Data held for any purpose shall not be kept longer than necessary for that purpose.
Google and Microsoft also agreed to reduce the length of time the companies kept such data, but not as much as Yahoo did. Google agreed to nine months and Microsoft to six months, both down from 18 months. (Msnbc.com is a joint venture of Microsoft and NBC Universal.)
Personal Comment: Retention of user data should not exist longer than necessary for particular purpose, but I think that it depend on the nature of business involved. For example, banking industry will keep the transaction history for customer because there are possibility that customer need to revise their transaction in few months ago or even few years ago. It is a wise step for yahoo, google and microsoft to reduce the period of data retention,it will increase the confidence level of the users in using web. PDP Act 2010, Principle 6:Retention of Personal Data. Data held for any purpose shall not be kept longer than necessary for that purpose.
Google's "Cloud Computing" Issue
The controversy over the lack of privacy in the initial release of Google Buzz, a social media program, is but one in a series of privacy issues in recent years that have affected companies doing business online.
Buzz, which is embedded into the popular Gmail e-mail program, is the most recent. Buzz lets Gmail users share photos, Web links, status messages, and and photos on the Picasa photo-sharing site with fellow Google Buzz users. Two days after its Feb. 9 release, reacting to privacy concerns, Google made it easier for users to hide lists of followers and followees, and to block specific people from following a user's Buzz updates. On Feb. 13, Google also said it will now "suggest" people for users to "follow" electronically, rather than telling users to "auto-follow" those who are e-mail and chat contacts.
Among the privacy issues that have been raised in recent years with Google and other companies:
The Electronic Privacy Information has asked the Federal Trade Commission to investigate whether Google's "cloud computing" services, including the Gmail e-mail service, Google Docs and its online photo-sharing service, Picasa, is adequately protecting users' privacy.
The FTC is looking at the privacy and security issues tied to cloud computing — where documents and other data are stored on Web-based servers, in the hands of third parties, as opposed to being on a user's hard drive
Cloud computing is considered the future of data storage for many. "However, the storage of data on remote computers may also raise privacy and security concerns for consumers," wrote FTC attorney David C. Vladeck in a December letter to the commission.
"For example, the ability of cloud computing services to collect and centrally store increasing amounts of consumer data, combined with the ease with which such centrally stored data may be shared with others, create a risk that larger amounts of data may be used by entities in ways not originally intended or understood by consumers," he said.
Personal Comment: In this case, google company should revise their cloud computing services in term of collect and store of consumer data to avoid stored data shared with others. They should lower the risk of miss use of the data provided by consumers by improve the systems. PDP Act 2010, Principle 6:Security of Personal Data. All practicable steps should be taken against unauthorized or accidental access , processing or erasure, alteration, disclosure or destruction of personal data and against accidental loss.
Buzz, which is embedded into the popular Gmail e-mail program, is the most recent. Buzz lets Gmail users share photos, Web links, status messages, and and photos on the Picasa photo-sharing site with fellow Google Buzz users. Two days after its Feb. 9 release, reacting to privacy concerns, Google made it easier for users to hide lists of followers and followees, and to block specific people from following a user's Buzz updates. On Feb. 13, Google also said it will now "suggest" people for users to "follow" electronically, rather than telling users to "auto-follow" those who are e-mail and chat contacts.
Among the privacy issues that have been raised in recent years with Google and other companies:
The Electronic Privacy Information has asked the Federal Trade Commission to investigate whether Google's "cloud computing" services, including the Gmail e-mail service, Google Docs and its online photo-sharing service, Picasa, is adequately protecting users' privacy.
The FTC is looking at the privacy and security issues tied to cloud computing — where documents and other data are stored on Web-based servers, in the hands of third parties, as opposed to being on a user's hard drive
Cloud computing is considered the future of data storage for many. "However, the storage of data on remote computers may also raise privacy and security concerns for consumers," wrote FTC attorney David C. Vladeck in a December letter to the commission.
"For example, the ability of cloud computing services to collect and centrally store increasing amounts of consumer data, combined with the ease with which such centrally stored data may be shared with others, create a risk that larger amounts of data may be used by entities in ways not originally intended or understood by consumers," he said.
Personal Comment: In this case, google company should revise their cloud computing services in term of collect and store of consumer data to avoid stored data shared with others. They should lower the risk of miss use of the data provided by consumers by improve the systems. PDP Act 2010, Principle 6:Security of Personal Data. All practicable steps should be taken against unauthorized or accidental access , processing or erasure, alteration, disclosure or destruction of personal data and against accidental loss.
Leaked Twitter Subpoena Raises Online Privacy Issues
UPDATE: Twitter would not comment on this particular matter, but gave us this statement: “To help users protect their rights, it is our policy to notify our users about law enforcement and governmental requests for their information, unless we are prevented by law from doing so.”
The leaked subpoena sent to Twitter this month by the Suffolk District Attorney’s Office in Boston is causing some hoopla on the web and raising the issue of law enforcement’s access to online personal data.
On Dec. 14, the D.A.’s Office issued a subpoena to Twitter in order to access the account information of two users who tweeted a list of personal information they allegedly obtained by hacking into the Boston Police Patrolmen’s Association. The hackers stole identifying information and Tweeted it to followers. The subpoena requests “available subscriber information, for the account or accounts associated with the following information, including IP address logs for account creation.”
In the subpoena, assistant D.A. Benjamin A. Goldberger requests that the investigation be kept from the Twitter users as to not impede the ongoing probe. But the information was leaked. We reached out to Twitter for comment, but have yet to hear back.
On Dec. 23 one of the accounts under investigation, @p0isAn0N Tweeted, “Haha. Boston PD submitted to Twitter for my information. Lololol? For what? Posting info pulled from public domains? #comeatmebro.”
The D.A.’s office requested details of two Twitter users and also listed the name Guido Fawkes, which is the name but not handle listed for one of the accounts under investigation, as well as the hashtags #BostonPD and #d0xcak3.
One of the accounts being probed is listed in the subpoena as @OccupyBoston, however that account appears to be inactive. It’s likely they meant @Occupy_Boston, which Tweets about the occupy movement. Targeting this account has lead some to speculate that the police are monitoring the online activity of occupy protestors.
Twitter’s website contains an information section for law enforcement. It states that if a subpoena is issued for a user’s information, the company will inform that user before they hand the information to the authorities, unless it is prevented from doing so by court order or statute. According to its site, Twitter was following protocol by informing the user of the subpoena, and, perhaps later providing that user’s information to the Boston D.A. This isn’t the first time Twitter has been reluctant to hand-over user information to law enforcement.
It’s possible Twitter does host some personal information about the owners of the accounts who tweeted the hacked materials. At the very least, it might have IP addresses. However, Twitter doesn’t verify identities or email addresses of its users, so using Twitter for detective work might be more harmful than helpful to an investigation, especially if the subpoena is leaked.
Personal Comment: Twitter should surrender user information of hackers? although the protection of personal data is important, but this case is different, because they commit a computer crime (hacking). I think that Twitter should provide the user information of hackers for the investigation purpose. PDP Act 2010 Principle 4:Disclosure of Personal Data, Personal data shall not be disclosed without consent unless the person is a registered data user under the Act.
The leaked subpoena sent to Twitter this month by the Suffolk District Attorney’s Office in Boston is causing some hoopla on the web and raising the issue of law enforcement’s access to online personal data.
On Dec. 14, the D.A.’s Office issued a subpoena to Twitter in order to access the account information of two users who tweeted a list of personal information they allegedly obtained by hacking into the Boston Police Patrolmen’s Association. The hackers stole identifying information and Tweeted it to followers. The subpoena requests “available subscriber information, for the account or accounts associated with the following information, including IP address logs for account creation.”
In the subpoena, assistant D.A. Benjamin A. Goldberger requests that the investigation be kept from the Twitter users as to not impede the ongoing probe. But the information was leaked. We reached out to Twitter for comment, but have yet to hear back.
On Dec. 23 one of the accounts under investigation, @p0isAn0N Tweeted, “Haha. Boston PD submitted to Twitter for my information. Lololol? For what? Posting info pulled from public domains? #comeatmebro.”
The D.A.’s office requested details of two Twitter users and also listed the name Guido Fawkes, which is the name but not handle listed for one of the accounts under investigation, as well as the hashtags #BostonPD and #d0xcak3.
One of the accounts being probed is listed in the subpoena as @OccupyBoston, however that account appears to be inactive. It’s likely they meant @Occupy_Boston, which Tweets about the occupy movement. Targeting this account has lead some to speculate that the police are monitoring the online activity of occupy protestors.
Twitter’s website contains an information section for law enforcement. It states that if a subpoena is issued for a user’s information, the company will inform that user before they hand the information to the authorities, unless it is prevented from doing so by court order or statute. According to its site, Twitter was following protocol by informing the user of the subpoena, and, perhaps later providing that user’s information to the Boston D.A. This isn’t the first time Twitter has been reluctant to hand-over user information to law enforcement.
It’s possible Twitter does host some personal information about the owners of the accounts who tweeted the hacked materials. At the very least, it might have IP addresses. However, Twitter doesn’t verify identities or email addresses of its users, so using Twitter for detective work might be more harmful than helpful to an investigation, especially if the subpoena is leaked.
Personal Comment: Twitter should surrender user information of hackers? although the protection of personal data is important, but this case is different, because they commit a computer crime (hacking). I think that Twitter should provide the user information of hackers for the investigation purpose. PDP Act 2010 Principle 4:Disclosure of Personal Data, Personal data shall not be disclosed without consent unless the person is a registered data user under the Act.
The Impact On Personal Privacy Through The Use Of Social Networking
In past several years, there have been lots of controversies relating to the online personal privacy. One of the social networking website that had been always under the limelight is the Facebook. In the past 6 years the Facebook had constantly updating their privacy control system. The frequent updates left the users in the middle of confusion state. This is because by the time the user perfectly configured their profile, there will be a newer version with different setting rolled out.
Why the control over information and personal privacy does is very important? Recently a security firm discovered that many large organizations which especially deal in the IT field are harvesting user data from online social networking websites. Not only the organization even a normal person with little technical knowledge can do so.It did happen recently and the collected data was release online in a public torrent website. It’s time to stop and think on what we are putting online. If these people can easily gets their hand on your personal information and use it for their personal gain. What about the stalkers or someone who secretly following your every move?
Not only crime happens but there is also problems related to the personal relationship issue. All these originate from the failure of protecting the flow of information and personal privacy. It leaves an impact on an individual’s personal privacy.
There is a certain amount of impact in personal privacy of an individual through the use of social networking. It either has left positive effect or negative effect on them. In terms business and professional networking the personal privacy proves to be very effective to reach the masses. On the other hand, the relationships and interaction between family, friends and partners can bring some negative impact on the personal privacy. One’s personal privacy will be invaded when others starts interfering and getting information about them.
The online users are sharing certain type of information among other computer users nevertheless their location. This is done via the use of social networking. There is certain information that should not be made in public. These exposures of confidential information can lead the user of the social networking into trouble.
Personal Comment: Social networking of course helps in a lot of ways but the users have to really careful to stay secure and safe. Security is one of the top most concerns of social networking sites that you currently use. This is mainly because the social networking sites allow us to display our personal information such as name, location, and email address. There are some people who always in search of a fake identity. If they get all the information about you on internet, they may use your identity for different type of illegal activities, which may cause you problems in future. It is always advisable to don’t provide your entire identity information online.
Why the control over information and personal privacy does is very important? Recently a security firm discovered that many large organizations which especially deal in the IT field are harvesting user data from online social networking websites. Not only the organization even a normal person with little technical knowledge can do so.It did happen recently and the collected data was release online in a public torrent website. It’s time to stop and think on what we are putting online. If these people can easily gets their hand on your personal information and use it for their personal gain. What about the stalkers or someone who secretly following your every move?
Not only crime happens but there is also problems related to the personal relationship issue. All these originate from the failure of protecting the flow of information and personal privacy. It leaves an impact on an individual’s personal privacy.
There is a certain amount of impact in personal privacy of an individual through the use of social networking. It either has left positive effect or negative effect on them. In terms business and professional networking the personal privacy proves to be very effective to reach the masses. On the other hand, the relationships and interaction between family, friends and partners can bring some negative impact on the personal privacy. One’s personal privacy will be invaded when others starts interfering and getting information about them.
The online users are sharing certain type of information among other computer users nevertheless their location. This is done via the use of social networking. There is certain information that should not be made in public. These exposures of confidential information can lead the user of the social networking into trouble.
Personal Comment: Social networking of course helps in a lot of ways but the users have to really careful to stay secure and safe. Security is one of the top most concerns of social networking sites that you currently use. This is mainly because the social networking sites allow us to display our personal information such as name, location, and email address. There are some people who always in search of a fake identity. If they get all the information about you on internet, they may use your identity for different type of illegal activities, which may cause you problems in future. It is always advisable to don’t provide your entire identity information online.
Subscribe to:
Posts (Atom)