NZBusiness+Management - June 2018

(Grace) #1

M 20 | management.co.nz | JUNE 2018


Is there any privacy left?


WITH THE LATESTCambridge
Analytica controversy regarding user
data, the conversation about digital
privacy is again invading the public
conversation sphere. With every new
security breach, and even with the
introduction of new technologies that
offer convenience, the debate over
how to best protect one’s sensitive
information rages on. But what if the
real question is whether privacy even
exists anymore? Author David Houle
argues that the concept of privacy has
changed over time, and that we’ve
already traded all rights to privacy for
the access to technology and the benefits
and conveniences offered by it.
Andinmanyways,hemaybe
right. Truthfully told, it’s not just the
information that we are putting out
thereintothedigitalworldforall(or
most)tosee,companiesarebeginning
to implement biometric data to identify
people, according to reports. The most
commonsofarisfacialrecognition
software,butthisbegsthequestionof
how far away we are from seeing more
sophisticated technologies that require
more personal information.
Further,thehugeexpansioninthe
InternetofThings(IoT)hasvirtually
guaranteed that almost all relevant
information in our life is tracked.
Ourbodyperformanceistrackedby
fitness-centered wearable devices. Our
homes are becoming ‘smart homes,’
with sensors that can do everything
from unlock for approved people
to monitor energy use. Even our
refrigerators can tell us when to go and
what we need from the grocery store.
While this information isn’t generally
available to the public, issues of data
ownership and parameters for use
are one area of concern. The other
question is, with all of this data, is
there any aspect of our lives that can’t
be hacked at any moment? Is there any
waytoprotectyourself?
Luckily, this issue is gaining traction
on a global scale. The International
Covenant on Civil and Political


  • Devices: Ensure that there are
    passwords on your digital devices
    themselves, turn GPS off if you are
    able to, enable automatic updates,
    disable remote access settings, keep
    your software updated and secure.
    Baby monitors and smart TVs are
    especially vulnerable, so be aware of
    their security settings.

  • Network: Restrict file sharing, enable
    firewall protections, turn off your
    devices’ Network Discovery options
    (or enable Stealth Mode), employ a
    VPN, add “https” to URLs, keep your
    router’s firmware updated, hide your
    network so that users need the SSID
    to log onto it.

  • Files: Encrypt all information, hide
    ID information such as birth dates
    and hometowns, etc., and shred
    any hard copy documents with
    identifying information.
    While the march of technological
    progress cannot be stopped, privacy
    concerns will always be a part of
    modern life. It is best to embrace
    the tools and knowledge we have to
    protect what we can. And in areas
    where we can influence policy and
    practice regarding our information, we
    should always ensure that our voice is
    heard. M


Sarah Pearce KUCRTQHGUUKQPCNURGCMGT
DWUKPGUUEQCEJUQEKCNUVTCVGIKUVCPFVJG
author of Online Reputation: Your Most
Valuable Asset in a Digital Age.

Rights is dedicated to the protection
of privacy. There are a number of
regional and national organisations and
non-profits that are vested in securing
privacy for citizens around the world.
Another variable to consider is the
role that technology can play in not
just eroding our privacy, but also
protecting it. One prime example of
this is blockchain. By now, most people
understand that blockchain is related
to cryptocurrencies, but it can have
a far broader basis for application.
Essentially, it can work as a ledger that
tracks many types of transactions, and
its decentralised architecture ensures
that private data stays safe.
However, these are elements that are
beyond the control of most individuals,
leading to the question of whether or
not there is much you can do to protect
yourself. And in a nutshell there is –
you must remain vigilant always. There
are a million and one specific things
you can do to keep your data safe, well
safer, anyway, but they tend to focus on
several key aspects.


  • Passwords and Accounts: Keep them
    updated, unique, long, and without
    any identifying information. Use
    two-factor authentication or add an
    additional PIN to the account when
    possible. If you can create a password
    that doesn’t make sense, but can still
    be remembered, that is ideal. If you
    must write it down, keep it in a secure
    location that is not near the device.


With all of the data our devices collect about us, is there any aspect of our lives that can’t be
hacked at any moment? So how do you protect yourself, asks Sarah Pearce.

LIFE ONLINE

Free download pdf