With new technologies and the massive use of social media, the conventional information that identifies a person has become obsolete. With the increased use of the Internet as a means of communication and the Afghanistan Mobile Database increase in time and means of access, the loss of privacy continues to be the main concern of the vast majority of users in this environment, from social media to cloud services , aggravated by the events of the Snowden case or the controversy of the NSA.
It is important to understand that the security measures that a user must adopt mitigate the impact and occurrence of various computer attacks such as intrusions, malicious code, information theft, etc., but they do not have the same effectiveness when protecting the privacy of the person in certain scenarios. With respect to “traditional” protection mechanisms, a security solution protects the user from various malicious codes, a firewall from intrusions, double authentication from attacks that could compromise the password, and so on.
Additionally, a person may minimize the risks of identity theft or impersonation by adopting privacy controls on their personal profiles; but you will not be able to prevent family members, friends or interest groups from revealing, without bad faith, unwanted information about said person. This can occur by indicating direct data or obtained through social communication patterns (belonging to interest groups, companies, information monitoring, etc.)
However, in the event that the user’s data is stored in a system whose use depends on the acceptance of privacy policies, it is the service provider itself who can make a specific use of said information, therefore, it is require other measures to increase privacy. In this context, a fundamental aspect is to carefully read the contract for the use of the services and programs that are used. It is important to consider that when a person accepts these types of contracts, they are? explicitly accepting all the points that are detailed there regardless of whether they were read or not. As a general rule, the type of contracts used by cloud service providers are closed clauses, and not open negotiation between the parties.
Likewise, the country in which the server that stores the information resides is also a critical aspect that can influence the security and privacy of such information. Each country has a different regulatory framework regarding the protection of personal data in computer environments, therefore, stricter legislation may favor the level of data protection. However, a less rigorous legal system or the absence of a specific rule could negatively affect the privacy of information. In general terms, if the data is stored outside the space of the European Community it would be considered as an international transfer of data, and therefore, adequate legal guarantees may be required
Considering the applicable law in Spain, regardless of the type of service or provider, the client remains the data controller.
Despite the great technicality of security measures to combat cyber-crime, awareness continues to be the most effective preventive weapon.
From BIP we recommend reviewing the information classification and treatment strategy, as well as the authentication and access control measures. In this way, when hiring a cloud service, you should not only focus on the Brother Cell Phone List clauses of the contract, but also on adapting the security policies that are delegated due to the contracted service.
Finally, a piece of advice, when carrying out any electronic operation, it is advisable to behave as if it were face-to-face, and to know that if something is signed or written, it will not be on wet paper but in a more durable medium than stone.