You are on page 1of 2

People respect each other's privacy and the safety of their personal lives.

The true belief by them is


that anybody should not access to their personal data ever. But in the last couple of years with the
technical growth and other modernized methods however have started compromising privacy of
people and reduced the self control ability on their personal data. The prone of getting access over
personal data and informations have a lot of negative results. The rules and regulations over data
protection has recently started because the quantity of processing the personal data has risen in the
last couple of years. The vital infrastructure that is required for the storage and processing of
incredibly large data sets has ushered in the age of big data and sophisticated information
technology, including deep learning models and other contemporary technologies. Government
agencies and commercial organisations often use cutting-edge technical abilities to collect, store,
and search enormous volumes of data related to internet searches , phone conversations and
electronic payments. The concept and value of privacy, however are still hotly debated topics. We'll
outline the distinct privacy threats that modern technology and digitalization provide as well as how
digitalization may perhaps resolve these problems in many aspects like "privacy-sensitive," "privacy
enhancing," or "privacy respecting."

Personal information or data is information or data that may be linked to specific persons. These
examples include features that are expressly expressed, such as a person's age, gender, location, and
religion, as well as your computer's IP address or other related metadata. Additionally, personal
information may be collected in the form of behavioural data that may be connected to people such
as that obtained through social media. Also personal informations can be contrasted with
information that is valued, sensitive, or essential for other reasons, such as financial information,
military intelligence, or top-secret topics. Though passwords and other data is used to safeguard the
informations are not taken into account in this. The legal definition of personal data is information
that may be used to identify a natural person and his/her behaviour. This connection can be created
in either a referential manner or a non-referential mode. The data subject may suffer harm in a
number of ways if others have unrestricted access to their bank account, profile, social media
account, cloud repository, attributes, and locations. Also , personal information has become a
commodity. Providing fair conditions for the design of contracts involving the transfer and exchange
of personal data is the aim of data protection laws, regulations, and governance. These conditions
include checks and balances, redress assurances, and methods to monitor contract compliance.
Flexible pricing, price targeting, and gauging, as well as dynamic negotiations, are frequently built on
the foundation of asymmetrical information and considerable variations in access to information.
Choice modelling in marketing, micro-targeting in political campaigns, and nudging in policy
implementation all make use of a basic informational imbalance between the principal and the
agent. People's moral autonomy and human dignity may be violated if their privacy is violated
because they may be exposed to outside influences that affect their decisions and cause them to
make decisions they otherwise would not have made. People who are subjected to mass surveillance
make judgments frequently, methodically, and continually because they are aware that others are
observing them.

Future and developing technologies could have an even greater influence. Due to the intimate
connection between computers and the brain today, privacy problems would not only apply to a
person's behaviour but also to their thoughts, which might be utilised by others to form opinions.
Additionally, it could be possible to change behaviour with the use of such technology. Therefore, in
light of these changes, more consideration must be given to the grounds for privacy protection. In
order to offer proper protection when brain functions may be altered from the outside, it would be
especially important to reevaluate autonomy. The organisation and structural aspects of information
security and data protection, as well as potential problems and risk scenarios in the digital age, are
all explored. On the result of this, connections between security policies are discovered, and the
Data Protection Policy's place within the aforementioned hierarchical structure is determined. The
classification of appropriate methods and instruments to provide reliable data protection is
proposed, and the relationships between the constituent parts are explained. The essay's last two
sections systematise the major privacy risk concerns of the digital age with a focus on contemporary
technology and offer some suggestions for how to mitigate their negative impact on consumers of e-
services on the global network.

Today, encryption is essential because it allows us to safeguard sensitive data by converting it to


ciphertext, a format that cannot be read without an encryption key. We may utilise encryption for
important business data reasons as well. It is referred to as "encoding." because only those who
have the encryption key can decrypt the data and expose the real information. Because of this,
encryption almost eliminates the ability of hackers or other unauthorised parties to obtain and
misuse the important company data. Because data breaches happen to even the largest
organisations with the highest dangerous impacts along with huge cybersecurity expenditures. So, it
is impossible to emphasise the importance of encryption. The delicate balance between the use of
technologies for collecting personal information in order to give goods, services, and so many
targeted adverts must also be kept in mind along with this. These techniques foster a belief
autonomy trap and weaken our confidence in democratic systems. The Cambridge Analytica scandal,
which broke in the spring of 2018, exposed the use of personal data to sway elections in many
countries. It shows that the right to privacy goes far beyond an individual's ability to control their
personal information and endangers the very existence of a sound democratic system. Antitrust
regulators will need to look into the concentration of personal data inside a single firm. The
regulations on election propaganda will also need to clarify the categories of private information
that are prohibited from being used in campaigns and determine whether some strategies should be
prohibited owing to their extraordinary capacity for persuasion and manipulation.

References :

 Privacy is a Fundamental Human Right -


https://www.lawteacher.net/free-law-essays/constitutional-law/privacy-is-a-fundamental-
human-right-constitutional-law-essay.php
 Human Rights on The Digital Era - https://gradesfixer.com/free-essay-examples/human-
rights-on-the-digital-era/
 Privacy in a digital world - https://techcrunch.com/2019/09/26/privacy-queen-of-human-
rights-in-a-digital-world/

You might also like