Problem statement
Web privacy is a critical issue that concerns all internet users, more likely to affect the frequent cyber freaks. The internet giants believe that even more people need to get access to the web as it helps them in many ways in their daily lives, business transactions etc. However government surveillance of e-mail contents considered a necessity for security reasons raises questions over user privacy. As a result, there is an ongoing debate between rights of ‘individual internet users against government’s obligation to counter terrorism’.
Stakeholders
Besides the general internet users, the web service providers, the people associated with e-commerce, online social-networking businesses and users are all influenced as well influence the role of web
Web site policies
Some of the most significant website policies include the following.
- Accessibility Policy
- Linking Policy
- Browser Policy
- Security Protocols to Protect Information
- Information Quality Guidelines
- Schedule for Publishing Information to the Website
- Freedom of Information
- Policy for Oral Histories
- No Fear Act
Current proposals for government regulations
The National Security Agency (NSA) is the authority that carries out the scrutiny and recording of the elements in the emails. These rights have been bestowed on this body by the court and therefore NSA can lawfully access actual contents in the mails of any such person who is suspected to have corresponded to the terrorists overseas . Besides this, the other departments responsible for maintain cyber-security includes the NIPC (National Information Protection Centre), Federal Bureau of Investigation, Information Infrastructure Task force, Institute of Telecommunication Science and so on.
A number of regulations to ensure web privacy have been framed such as the Electronic Communications Privacy Act- 1986, Public Law 99-508-1986, US Patriot Act, Foreign Intelligence Surveillance Act, DHS Einstein Program and the National Security Presidential Directive 54.
Recent Abuses to Web Privacy
Netscape Communicator, which is one of the newest upgrades of the Internet browser, was infected by a bug that gave away the information between the site and the cookie file. It includes sensitive information such as credit card numbers and login passwords. However, the bug could not find entry to the user’s hard drive and the bug has been removed now. Nevertheless, it was a serious case of the violation of web privacy and cookie security.
Another recent example is that of the hacking of the Facebook page of none other than Mark Zuckerberg himself, by a Palestinian programmer. Though there were no harmful intentions behind this act it un-surfaced the vulnerabilities of one of the most popular social networking sites in the present times .
Technical and Privacy Policy Protections
Every Internet browser is created differently comprising of a unique set of advantages and loopholes. There have been some significant advances in web content standards for security and other page features recently. Therefore, the latest and the most developed browsers are made available to the users for upgraded security. The powerful 128-bit SSL (Secure Socket Level) encryption is the most recent technology recommended for safe browsing.
There are numerous such general practices to be provided by the website owners that can enhance visitor protection. These may include the following.
- Excluding hyperlinks to third-party websites.
- Allowing anonymous access to the visitors i.e. the visitors can navigate through the webpage without having to disclose their personal information.
- Disabling automatic collection of personal information. Cookies can be used for storing personal information or linking the cookies to the personal data of the visitors.
- Specification of intended purpose for data collection i.e. the personal information about the visitors which is collected needs to be that which has been volunteered freely by the user without generating any information from other sources as well as indicating the purpose to the user clearly.
- Visitor information must be kept confidential at all costs. Adequate care must be taken to protect the data from unlawful access and manipulation. Also, the employers and data processors who have direct access to the visitor’s personal information must respect their privacy and confidentiality.
- The privacy policies must be framed in compliance with the privacy acts of the states.
Data encryption is one of the basic features of IT security. Good encryption uses very robust secret codes which is impossible to crack, to protect your data and prevent any chances of intrusion. Encryption infrastructure may include in addition to infomediary services, specialized services like the following.
- Running all connections through a securely encrypted tunnel(Secure tunnelling)
- Anonymous dial up
- Anonymous web publishing
Spyware software included with applications of install (games, utilities) has the primary purpose to silently spy or check on the online habits of the employee, track other details and provide feedback to the company eg. Active X, Java and Javascript. Hence employees in order to protect their privacy need to surf with spywares turned off. To find whether the browser supports those languages Browser Spyware can also be used .
Cookies are used by companies to track websites visited, loaded pages and hence are a threat to privacy. Cookie eater applications help in restoring employee privacy but it may create other problems like trouble accessing desired websites .
Infomediary services help to conceal identity of the user as these products that act as proxy between user and the sites that he visits. These provide cookie interception. For example, SeigeSoft’s SiegeServer .
Conclusion
Internet is one of the biggest facilitators for man in the present times. However, the rampant privacy breaches pose a severe threat to the trust and functionality of the system. In an equally advanced pace the innovations have taken place that have helped to ensure adequate safety and security to the users. The users must be well-informed and updated about the latest developments and must keep their systems advanced and protected to avoid undue problems.
The virtue ethics approach can be best applied here to bring about harmony amongst internet users and service providers. It is important for businessmen to gain information about the consumers. While the internet can provide a wealth of information on the same, it is equally necessary to respect visitor privacy. Depending on the user preferences and the needs of the businesses an understandable and flexible approach need to be followed so as to protect the interests of both.
Bibliography
Career Colleges Ontario. (2011). Student Transcript Electronic Protection Service. Retrieved from https://steps.oacc.on.ca
Cassidy, J. (2013, August 20). SNOWDEN’S LEGACY: A PUBLIC DEBATE ABOUT ONLINE PRIVACY. The New Yorker.
Christian Science Monitor. (2013). Brookyn Daily Eagle. Retrieved August 24, 2013, from http://www.brooklyneagle.com/
Cookies and Internet Privacy. (2010). Retrieved from Cookie Central: http://www.cookiecentral.com/
Electronic Privacy Information Center. (n.d.). Cybersecurity Privacy Practical Implications. Retrieved from epic.org: http://epic.org/privacy/cybersecurity/
Larson, K. (2000). A Guide to Internet Security and Privacy. Retrieved August 25, 2013, from http://www.sossi.org/
McCandlish, S. (2002, April 9). EFF's Top 12 Ways to Protect Your Online Privacy. Retrieved from Electronic Frontier Foundation: https://www.eff.org
USA Social Security Administration. (n.d.). Website Policies & Other Important Information. Retrieved from Official Social Security Website: http://www.ssa.gov/