21.02.2018 Views

Your Right To Privacy - Minimize Your Digital Footprint - Legal Series

Hacking, snooping and invading are commonplace on the Internet. Your personal information can be seen and shared and your privacy can be violated. Two veteran journalists, authorities on how information is handled in the digital age, have written a definitive guide to minimize your digital footprint, protect your vital information and prevent it from being misused. Jim Bronskill and David McKie argue there are steps each of us can take to keep our important data out of reach while still participating fully in new technologies. They identify the pitfalls we can make and the small moves that will help us avoid them. Their book makes an important contribution in enforcing our right to privacy at a time when governments, special interests and others are trying to watch everything we do. 'Your Right To Privacy' outlines in detail how to keep your information as safe as possible in an age of hacking, sharing and surveillance. This is the definitive guide on how to minimize your digital footprint and protect your privacy in the digital age.

Hacking, snooping and invading are commonplace on the Internet. Your personal information can be seen and shared and your privacy can be violated. Two veteran journalists, authorities on how information is handled in the digital age, have written a definitive guide to minimize your digital footprint, protect your vital information and prevent it from being misused.

Jim Bronskill and David McKie argue there are steps each of us can take to keep our important data out of reach while still participating fully in new technologies. They identify the pitfalls we can make and the small moves that will help us avoid them. Their book makes an important contribution in enforcing our right to privacy at a time when governments, special interests and others are trying to watch everything we do.

'Your Right To Privacy' outlines in detail how to keep your information as safe as possible in an age of hacking, sharing and surveillance. This is the definitive guide on how to minimize your digital footprint and protect your privacy in the digital age.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

“How, then, can citizens who may or may not want to use this technology<br />

ensure that someone is held accountable for its use? How will they be able to<br />

challenge how the information is used, and how will they be able to give any<br />

kind of meaningful consent?” [9]<br />

These questions prompted Canada’s privacy commissioner, whose office is<br />

part of the Global <strong>Privacy</strong> Enforcement Network, to launch what it calls the<br />

Internet of Things 2016 “global privacy sweep.”<br />

For its part, Canada’s privacy office focused on health devices such as<br />

fitness trackers, smart scales, and sleep monitors. [10]<br />

During its sweep, the privacy office looked at “whether users could<br />

understand how their personal information is collected, used, disclosed, and<br />

safeguarded and whether they could easily contact someone if they had any<br />

privacy questions,” said <strong>To</strong>bi Cohen, a spokeswoman for the commissioner.<br />

Officials had a chance to buy gizmos, try them out, and see if the<br />

accompanying privacy communications — the written explanations for users<br />

— were sufficient, she said.<br />

“We examined the online information and other privacy communications<br />

available to the user related to the company behind the devices; we are<br />

contacting manufacturers, retailers and data controllers with specific privacy<br />

questions where necessary and we have sought to replicate the consumer<br />

experience by assessing privacy communications and information available to<br />

the user out of the box through to actual use of the devices.” [11]<br />

The office will publicize its results in the fall of 2016.<br />

1 Frequently Asked Questions, National Do Not Call List, accessed March 2016. lnnte-dncl.gc.ca/faqseng#an_link05<br />

2 “Voter Alarmed by Political Party Canvasser’s Comments,” The Office of the <strong>Privacy</strong> Commissioner<br />

of Canada, accessed March 2016. priv.gc.ca/cf-dc/pa/2006-07/pa_200607_07_e.asp<br />

3 Canada Elections Act, accessed March 2016. documentcloud.org/documents/2691008-Canada-<br />

Elections-Act.html#document/p70/a271905<br />

4 “<strong>Privacy</strong> and Data Security in the Age of Big Data and the Internet of Things,” Julie Brill, US<br />

Federal Trade Commissioner, accessed March 2016.<br />

ftc.gov/system/files/documents/public_statements/904973/160107wagovprivacysummit.pdf<br />

5 The Internet of Things: An introduction to privacy issues with a focus on the retail and home

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!