My data are mine

Posted by admin in Entries | Tagged , | Leave a comment

Alba was 6, but when I saw her opening the word processor told me he wanted to write a letter to Santa Claus. New generations come to the machines when they want to communicate. Do not know if that’s good or bad, but just so and so far, seems unlikely to change.

Communicating involves transferring data from one person to another and it should be noted that one thing is knowing how to use the computer or mobile phone and another to know how to control the consequences that entails transfer of data for privacy.

I think in this aspect some young people are so naive as Alba. Almost all are.

And is that very few people have heard of data mining (data mining) or the commercial management of the customers (CRM), but are inherent in the data transfer (within and outside the Internet).

In fact it is a technology with two faces, one positive and that most people do not care, in principle, specialized companies dealing in the wake of computerized data that we leave, on the Internet, commercial card purchases , credit, etc. to develop a profile of our personality.

In principle it is not bad at all for someone select the type of advertising that they send us and so we avoid the hassle of receiving even more publicity about things that interest us at all, but of course if my profile, deduce facts pertaining to my privacy (guess right or not) to me if I’m worried because it can affect my image at work, my friends, when I go to the bank, etc..

Education is needed privacy, but the simple people, who never appears in the press but has friends, work, insurance contracts, bank loans requested, send a resume, etc..

The consequences are, as already said, in the personal sphere, especially young people, but keep in mind that young people are hired in companies and in many cases they are sitting in front of a computer with the almost no awareness of the consequences of neglect can lead to privacy.

In companies are constantly working with data, many of them personal. Our country is in force of Law 15/99 of December 13, Protection of data is actually an adaptation (more or less stringent) of Directive 95/46/EC, but almost nobody knows these rules and less still applies.

However, we should realize that there are some threats to privacy that are real, some arriving as mentioned above, the application and careless surrender of our personal data, but others come naturally from the massive use of Internet.

It is thought that infection by virus is solved with a simple formatting the hard drive but few take into account the technology of viruses in the network has evolved in such a way that are intended to demonstrate and being felt only when it is too later. There is also talk of “hackers” but it is thought that in our computer will not see anything important. However there is no awareness that today the “hacker” does is use our humble computer as a platform to attack other websites. Keep in mind that Internet viruses spread so quickly today because behind that “infection” is no longer a “hacker” craftsman of “before”. Now the infection spreads through computers that are constantly connected to the lnternet, as are most of the companies, which are used as part of spreading the virus. As you can imagine a machine does not detect whether your computer has important data or not. It just infects.
The European Commission launched a few years ago a document listing the data Cybermarketing techniques can easily discover, by combining data that is captured or recklessly give. Among them are:

A. – The country where you live on the Internet or company
2. – The Internet domain you belong
3. – The area of ​​the business activity
. 4 – The turnover and the volume of the company
5. – The role and job of the Internet user in the company
6. – The Internet access provider
7. – The type of websites you visit or

And if anyone still thinks that it is very difficult for someone to enter your computer by connecting to the Internet, there are some addresses that will love, such as the National Commission on Informatics and Freedoms. In http://www.cnil.fr/es/index.htm find them (in Castilian) as follows in his footsteps on the Internet. Do not miss the “challenges”.

I do not want to give the impression that we are helpless. Not true. Mechanisms are both technological and legal defense to protect us reasonably and is a matter of becoming aware that we leave the world we live is so and that it is best that we adapt to the reality of the information society.

Deja un comentario

Tu dirección de correo electrónico no será publicada. Los campos necesarios están marcados *

*

Puedes usar las siguientes etiquetas y atributos HTML: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>