#Myprivacy #Myright: Protect It While You CanIf you ever thought you could run away into the wilderness without being noticed, think again. Right from the time you get up in the morning, picking up your mobile devices, wearing your fitness tracker, and every aspect of your life is connected to an unknown world—a world that decides whether you are noteworthy or play worthy of being tracked. A common man is caught up in a world that is intertwined between your private life, gains of the government through surveillance capitalism and the law of the internet and dark web. This book takes you through a journey that looks at various privacy aspects of your private life and unusual case laws. Laws that have challenged the courts to think beyond the traditional line of thinking. They have also influenced the media who are looking for juicy scoops to make stories more enticing for their viewership/ readership. It further dwells into the idea of Artificial Intelligence, and it will make things even more invasive with the unknown sources and data of an individual that is out there. Finally, the book attempts to answer the question of what should individuals do if they are caught up in a storm of data breaches. Remember, once the information is out on the internet, it is virtually impossible to redact it back. |
Contents
B My Theory with Case Law Example and Analysis | |
What Can Individuals Do to Protect Their Privacy? | |
Opt Out or Request for Deletion II Know Your Rights against Discrimination | |
Install Security Software IV Manage Your Accounts Privacy Activity | |
Back Up All Data VI Encrypt or Tokenise Your Data | |
Use TwoFactor Authentications 2FAs VIII Using a VPN Might Help If Your Countrys Laws Allow It IX Do Not Open Phishing EMails | |
Use Secure WiFi XI Lock Your Laptop and Protect Your Devices XII Understand Privacy Policies | |
Review Your Granted Permissions XIV Limit Your Social Media Accounts XV Secure Your National ID NumberSocial Security Number | |
The Gray Area between Ethics and Privacy? | |
Chapter 9 | |
Chapter 10 | |
What Should People Do to Protect Themselves and Their Close Ones? Chapter 11 | |
Privacy Solutions for Organisations and Individuals A What can organisations do to maintain privacy? | |
The Impact of Breaches II Why a ForwardLooking Data Privacy Policy Is a Must for Organisations? | |
Pain Points for Data Breaches | |
How Can Businesses Maintain Data Security? | |
Learn to Examine Your Digital Footprint XVII Understand the Use of Cookiebot | |
Appendix | |
G Hitech Act Health Information Technology For Economic | |
K eprivacy Regulation | |
Personal Data and Its Importance | |
Q Is Your Business Processing Personal Data? | |
Other editions - View all
Common terms and phrases
activities advertising agencies algorithm anonymised applications apps Article artificial intelligence behaviour biometric blockchain Bluetooth businesses California CCPA cent chatbot communication companies compromised consent consumers cookies court CPRA customers cyberattacks cybersecurity data breach data collection data privacy data privacy laws data processing data protection data subjects Deepfakes disclose e-mail electronic employees encryption ensure entities ethics European Union Facebook federal GDPR Google hackers hacking healthcare data HIPAA identify impact individual’s individuals Internet of Things IoT devices machine learning malware metadata million monitoring organisations password patients penalties people’s personal data personal information privacy policy privacy protection privacy rights pulse oximeters ransomware records request requires RFID right to privacy risk safeguards satellite sensors servers smart cities social media Social Security numbers storage stored surveillance tech giants track user’s users violation vulnerable wearables