M 20 | management.co.nz | JUNE 2018
Is there any privacy left?
WITH THE LATESTCambridge
Analytica controversy regarding user
data, the conversation about digital
privacy is again invading the public
conversation sphere. With every new
security breach, and even with the
introduction of new technologies that
offer convenience, the debate over
how to best protect one’s sensitive
information rages on. But what if the
real question is whether privacy even
exists anymore? Author David Houle
argues that the concept of privacy has
changed over time, and that we’ve
already traded all rights to privacy for
the access to technology and the benefits
and conveniences offered by it.
Andinmanyways,hemaybe
right. Truthfully told, it’s not just the
information that we are putting out
thereintothedigitalworldforall(or
most)tosee,companiesarebeginning
to implement biometric data to identify
people, according to reports. The most
commonsofarisfacialrecognition
software,butthisbegsthequestionof
how far away we are from seeing more
sophisticated technologies that require
more personal information.
Further,thehugeexpansioninthe
InternetofThings(IoT)hasvirtually
guaranteed that almost all relevant
information in our life is tracked.
Ourbodyperformanceistrackedby
fitness-centered wearable devices. Our
homes are becoming ‘smart homes,’
with sensors that can do everything
from unlock for approved people
to monitor energy use. Even our
refrigerators can tell us when to go and
what we need from the grocery store.
While this information isn’t generally
available to the public, issues of data
ownership and parameters for use
are one area of concern. The other
question is, with all of this data, is
there any aspect of our lives that can’t
be hacked at any moment? Is there any
waytoprotectyourself?
Luckily, this issue is gaining traction
on a global scale. The International
Covenant on Civil and Political
- Devices: Ensure that there are
passwords on your digital devices
themselves, turn GPS off if you are
able to, enable automatic updates,
disable remote access settings, keep
your software updated and secure.
Baby monitors and smart TVs are
especially vulnerable, so be aware of
their security settings. - Network: Restrict file sharing, enable
firewall protections, turn off your
devices’ Network Discovery options
(or enable Stealth Mode), employ a
VPN, add “https” to URLs, keep your
router’s firmware updated, hide your
network so that users need the SSID
to log onto it. - Files: Encrypt all information, hide
ID information such as birth dates
and hometowns, etc., and shred
any hard copy documents with
identifying information.
While the march of technological
progress cannot be stopped, privacy
concerns will always be a part of
modern life. It is best to embrace
the tools and knowledge we have to
protect what we can. And in areas
where we can influence policy and
practice regarding our information, we
should always ensure that our voice is
heard. M
Sarah Pearce KUCRTQHGUUKQPCNURGCMGT
DWUKPGUUEQCEJUQEKCNUVTCVGIKUVCPFVJG
author of Online Reputation: Your Most
Valuable Asset in a Digital Age.
Rights is dedicated to the protection
of privacy. There are a number of
regional and national organisations and
non-profits that are vested in securing
privacy for citizens around the world.
Another variable to consider is the
role that technology can play in not
just eroding our privacy, but also
protecting it. One prime example of
this is blockchain. By now, most people
understand that blockchain is related
to cryptocurrencies, but it can have
a far broader basis for application.
Essentially, it can work as a ledger that
tracks many types of transactions, and
its decentralised architecture ensures
that private data stays safe.
However, these are elements that are
beyond the control of most individuals,
leading to the question of whether or
not there is much you can do to protect
yourself. And in a nutshell there is –
you must remain vigilant always. There
are a million and one specific things
you can do to keep your data safe, well
safer, anyway, but they tend to focus on
several key aspects.
- Passwords and Accounts: Keep them
updated, unique, long, and without
any identifying information. Use
two-factor authentication or add an
additional PIN to the account when
possible. If you can create a password
that doesn’t make sense, but can still
be remembered, that is ideal. If you
must write it down, keep it in a secure
location that is not near the device.
With all of the data our devices collect about us, is there any aspect of our lives that can’t be
hacked at any moment? So how do you protect yourself, asks Sarah Pearce.
LIFE ONLINE