Technology is scratching even the smallest itches of our ordinary lives, creating new opportunities for economic empowerment, entrepreneurship, education, health care, civic and social engagement. However, as it turns into a fixture in our lives, we are becoming more vulnerable to cyber criminals. Tech giants are racing into the future with artificial intelligence and our data is increasing their pace. In a bid to stay more relevant, we are gradually giving up to technology and jeopardizing our fundamental right to privacy.
As you stare at your screen and scroll through it, your finger and cursor movements may be tracked. This sounds paranoid, but is exactly why we should be aware of where and how we share information with the devices we use. As tech becomes more integrated with our lives, it also becomes more intrusive. Many users fail to understand that it is our right to prevent someone we don’t trust from having power and control over our life and personal data.
Anti-hackers are weaponizing the same tech to protect sensitive data to circumvent invasion of privacy, because with expanded tools and systems to access data, it is equally important to keep this information secure. They find ways to break into the system like a hacker would and then reverse-engineer solutions to prevent those hackers from being able to do the same. Technology can be used to secure data by leveraging more robust methods of processing, storing and correlating data. It can also help us reclaim some privacy in our digital space. For example, encryption tools can let only the sender and receiver access information. Users can use extensions or add-ons to customize their browser to force connections over the encrypted HTTPS protocol wherever it has been implemented by a website, giving users enhanced privacy while browsing. Some extensions can also be used to block invasive trackers by third-party tracking cookies which are mostly embedded within ads to track our web usage. Secure VPNs can be used to hide IP address. Chip cards make cloning almost impossible and secure payment mechanism. Payments data can also be protected through tokenization which hides and replaces by card number with a token. Special algorithms create token number & make the stored data meaningless to hackers.
We are solely responsible for our presence in the digital world. However, in this hyper-connected world, given the use cases of commercial data and combinations of government and commercial data, we cannot isolate ourselves from it or delete our digital footprint. We need digital guards to protect information from abuse or misuse. The use of anonymizing technology can allow multiple data holders use data and limit abuses. Cryptography techniques like homomorphic encryption when applied appropriately, allow users to send personal data in encrypted form and can also process it in the encrypted form. Only the owner can decrypt data without revealing any personal data to the data processor.
These are emerging technologies that can fend against privacy breach by existing technologies. However, with only a few technologies available as digital safeguards, it is time organisations become more accountable and adopt measures for preserving data integrity and confidentiality. Until then, individuals should be allowed to give and withdraw their consent to data sharing. They should be allowed to withdraw themselves from the clutches of those who invade their privacy. Present technological solutions do not offer foolproof ways to prevent people from oversharing their information. So you, the owner of the information, is the only soldier battling for protecting your privacy.