Internet Security Your Personal Information is Big Business

When George Eastman invented the camera in 1888, he also created new concerns about privacy and security. Just two years later, in 1890 Warren and Brandeis published their seminal article in the Harvard Law Review addressing issues relating to privacy, which originated from instantaneous photographs and newspaper companies invade the boundaries of privacy.

"Recent inventions and business methods call attention to the next step to be taken for the protection of the person and to ensure that the individual what Judge Cooley calls the right" to be let alone”

The right "to be let alone" ...

Although the authors were referring specifically to the introduction of the camera, their words hold true today. The very technologies that provide more freedom have the same ability to destroy and enslave if they are not respected.

The massive growth of Internet and e-commerce has dramatically increased the amount of personal information collected about individuals. As you browse exercise routine online transactions, so let yourself behind a digital trail of personal information.

Many Internet Service Providers, search engine companies and web-based companies monitor users as they surf the Internet. They record what sites they visit, time and length of these visits, which keywords are used and the purchase made. When collected and combined with other demographic or psycho-graphic data, an extremely detailed profile can be created. These profiles have become an important currency in electronic commerce where advertisers and marketers use the data to predict a user's preferences, interests, needs and possible future purchase.

Protect your privacy

The Internet has been a shift, and consumers are to regain control over their personal information. Many tools are available to protect your personal information. Generally they can be divided into two types, those which protect your identity, and those who help you negotiate with a website over what personal information will be shared. Several companies offer software called anonymizer, some free, allowing you to create a fake online name and make you anonymous. Infomediaries, a new and relatively untested technology, so you can decide what personal information is shared at each site you visit. The infomediary is an independent, third party resource for protection of privacy and identity on the Internet. Anonymous reposting are organizations that send your e-mail to the recipient after removing all information that can be traced back to you.

In addition to using software or third party organizations to keep your information secure, there are other strategies you can use to help protect your privacy.

Always read a web sites privacy policy before submitting any information, especially financial or medical information.

Use a disposable email address when providing contact information to unknown parties, to enter contests or select-in to subscribe.

Be discreet. Do not provide personal information unless it is absolutely necessary.

Use email encryption, especially for sensitive messages.

Regularly changing your password to access your email account (s).

See privacy seals of organizations like TRUSTe, BBBOnline, and WebTrust. These seals tell you that the site has adopted appropriate privacy policies and ensuring visitors that they use a site they can trust.

Every day most of us give away information about ourselves, sometimes consciously and sometimes not so conscious. You are your best privacy protector. Be informed and use the available tools to keep personal information personal.

Disclaimer - Micro 2000 Tech Tip is a free service providing information only. While we use reasonable care to see that this information is correct, we can not guarantee it for accuracy, completeness or fitness for a particular purpose. Micro 2000, Inc. is not responsible for damages of any kind in connection with the use or misuse of this information.

Micro 2000 Inc has been helping to solve day-to-day challenges that IT departments face in order to keep their businesses operational as well as profitable for over 14 years. Its primary goal is to put the customer first - through feature-rich, easy to use IT tools that help IT administrators manage their jobs more effectively.