From Illusion To Reality: Up Personal On Computing Privacy

Evelyn de Souza

Computing Privacy

We are under an illusion around cloud computing privacy. Without a doubt the benefits are incredible. However, cloud impacts personal user privacy and potentially exposes their private data in ways they may not have anticipated. Given that users don’t usually read the terms of service and privacy policies, it is unclear how many users are actually aware of the risks.

Cloud usage has soared both for business and personal use. And, while security and privacy concerns around cloud computing for enterprises have risen to the fore and are being addressed, we don’t see the same level of attention around cloud for personal usage. Cloud providers offer a broad array of services for personal use that span online storage, online desktop and web applications. People are flocking to these services for entertainment, new ways of communicating and sharing information and the convenience they offer and with tremendous upside. However, users may be under an illusion about the levels of privacy that they are afforded with cloud usage.

Losing Control

Sometimes users may not even realize that the services they are using are cloud-based especially those who are not technology savvy and where the service does not have a name that may imply that. And, many may not recognize that the underlying concept of cloud is that of multiple users sharing computing resources. When users post their data and files on centrally hosted servers they lose a degree of control over those files such as who might have access to it, how they gets replicated, or even after a user has terminated their service, whether their data is deleted. Additionally, centrally stored data can be easily shared with others, creating the risk of third parties accessing the data and of that data being used in ways that users had not planned.

Computing Privacy

Just as enterprises have recognized that data is not a one-size-fits-all category, users need to apply that same categorization for their personal data. There is no one single approach that will fit every user and users will need to consider the tiers or categories that their data falls under according to their own sensitivities. For Instance, songs and movie files may not need to same level of protection as banking information or backups of other personal files.

Users should ensure that the data which is most sensitive or private, should be hosted with a reputable provider that has mature privacy and security practices. This information can often be gleaned online under the support section. The good news is that an increasing number of providers are looking to differentiate themselves on their security and customer data handling practices. Also ensure that you are connecting securely, that your information is encrypted securely and that you don’t link or daisy chain accounts for your most private or critical data.

Celebrity Hacks

Many users assume that nobody else would be interested in their personal photographs or movie files and that it’s only the photos of celebrities that get hacked into. You’d be surprised. Data brokers or marketers who increasingly want to understand your interests and lifestyle could find these a treasure trove. The recent spate of personal photos ranging from women breastfeeding to wedding photos that sparked someone’s interest and that have gone viral on the Internet is evidence of how personal data can fast become a part of the public realm.

As of 2012, two-thirds of American users were using webmail, storing data online or using cloud applications. That number is sure to have risen significantly across the globe as the Internet becomes ubiquitous in developing countries. Rather than live under an illusion, it’s important we start to develop stronger standards around the protection and privacy of our personal data.

By Evelyn De Souza

Garry Connolly

What’s Behind Smart Devices? A Data Centre, Of Course

Smart TV's, Smart Phones, What’s Behind Smart Devices? It’s not difficult to be “smart” these days. We wake up in the morning and check our ...
Patrick Joggerst

Session Border Control as a Service: Faster, More Secure and Dramatically Less Complex Enterprise Communications

Session Border Control as a Service As businesses are increasingly moving to cloud-based unified communications (UC) for improved collaboration and productivity, they must also ensure ...
Oussama El Hilali

Hybrid or Multi-cloud? Picking the Right Organizational IT Strategy

Hybrid or Multi-cloud? Picking the Right Cloud Strategy Discussions around cloud migration are no longer about whether an organization should move to the cloud, but ...
David Gevorkian

How to Apply Website Accessibility in UX and How to Achieve Better User Experience

Design Tweaks: Apply Website Accessibility in UX In this current digital age, websites have become more complex because of the introduction of various aesthetic designs ...
Cloud Image Migration

The Best Web Migration Should Be Invisible to Your Customers

How you approach a migration of your assets to the AWS Cloud is important to getting it right When the British-bank TSB decided to migrate ...
Fahim Kahn

The 5 Biggest Hybrid Cloud Management Challenges—And How to Overcome Them

Hybrid Cloud Management Challenges The benefits of the cloud—reduced costs, greater IT flexibility, and more—are well-established. But now many organizations are moving to hybrid cloud ...
Mark Kirstein

Episode 6: Cloud Migration: Why It’s More Important Than Ever

The Importance of Cloud Migration Moving fully to the cloud is still a concern for many companies, but with millions of employees working from home, ...
Atman Rathod

UX Design in the Age of DevOps: Transformation Through Collaboration

UX Design in the Age of DevOps DevOps is popular among modern IT strategists because it leaves no scope for lapses in the development process ...
Patrick Joggerst

Why Platforms Matter as UCaaS Adoption Continues to Soar

UCaaS Adoption Continues to Soar Industry analysts agree – the unified communications-as-a-Service (UCaaS) market will continue to grow by leaps and bounds in 2020 and ...
Or Lenchner

Destination IPPN: why the travel sector must harness a global IP proxy network

Destination IPPN While massive growth in the travel sector has been predicted, the digital environment has also massively upped competition amongst service providers, keen to ...