Internet Privacy By Joel Bryner
The Right to Internet Privacy The right to Internet privacy, like the right to common privacy, is the lawful privilege that an individual has to their own confidentiality; the only difference is the right to Internet privacy, as the name suggests, is the right to privacy you have on the Internet.
Risks of Internet Privacy Breach Identity Theft – A form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. 1 Spyware – A type of malware that can be installed on computers and collects little bits of information at a time about users without their knowledge. 2 Social Network Services – Social online communities that allow individuals to share various comments, information, videos and photos with one another. 3
Identity Theft Identity theft often occurs because of the irresponsibility of an individual with his or her personal information on the Internet.
Spyware Spyware is usually accidentally downloaded by unsuspecting individuals by visiting untrustworthy websites.
Social Network Services Social network services are a breeding ground for identity theft targets and cyber bullying. The sharing of embarrassing photos, videos and information about an unconsenting individual is a prime example of a breach of Internet privacy.
The Main Cause of Internet Privacy Breach The leading cause of Internet privacy breach is the irresponsibility of the Internet’s users. When people use the Internet irresponsibly and are uninformed about the security and privacy risks of doing so, they are giving up their right to Internet Privacy.
The Future of Internet Privacy With the ever-increasing spyware updates on the Internet we cannot currently stop Internet privacy breach without the use of ever-increasing anti-spyware updates. Maybe a more automatic protection against Internet privacy breach lays in the future, but for now it is left in the hands of the Internet’s individual users.
Bibliography