Monday, January 31, 2011

Boat Authorization Letter

THE PROTECTION OF PRIVACY IN SOCIAL NETWORKS


Today, social networks like Facebook , Tuenti , Sonic , Hi 5 etc. are used by many citizens, regardless of their age and condition. Due to the great facilities of interaction that these applications provided, it is causing an unprecedented level of disclosure of personal information, based on personal profiles that the users generate.
is true that these networks provide a wide range of possibilities and opportunities communication and exchange of all types of information, but it is also true that in the same measure, generate large privacy risks users and third parties with which we are interconnected.

Although a priori, the basis of "community" networks suggests that the publication of personal data would be comparable to share information with friends and when we are face to face, in reality this is not the case and information may be available online for millions of users. We must bear in mind that the personal data we put into social networks, are publicly accessible and comprehensive a manner and on a hitherto unprecedented amounts, including huge quantities of pictures and videos of users. This puts users at risk of losing control over the mode and manner in which third parties access to these dies, they will use the information we provide.
Today, although much improved, there is very little protection against copying of personal data in these profiles (either by network members, and other unauthorized persons and outside the network) and against its use to create personal profiles and re-publish this information elsewhere. It is very difficult and sometimes impossible to completely eliminate certain information once it has been published in internet , even though it has been removed from the original site. It is possible that third parties or the suppliers of network services, keep copies.

We must also know that personal data from profiles, can "leak" out of network when they are indexed by search engines. On the other hand, some providers of social networking services facilitate user data to third parties through "programming interfaces of applications" at that point they would be controlled by such third parties.

An example of secondary uses that have caught the attention of companies, is the practice of HR responsible for some business organizations investigated profiles of candidates for a job or even their own employees. Another example is that of service providers also use the profile information and traffic data to deliver marketing messages custom to users. It is very likely that arise in the future other unexpected and undesirable uses of the information contained in user profiles.

Another risk to the safety and privacy that have already been found, identity fraud is fed by the widespread availability of personal data in user profiles and the profiles suspected piracy by third parties.

is therefore necessary that all users of social networks sensitize us and became aware of the risks that exist in the network and in this line is prudent to recommend that a user of a network should be of consider what personal data will publish and what not, to develop the social profile. Should be aware that after the profile can add pictures, videos, reviews, etc.

In the case of minors should be very clear that they should not disclose either the number of tf. or home. It would even be reasonable to plan for the possibility of using pseudonyms instead of real name. In any case, we must be aware that the use of a pseudonym offers limited protection given that other people can appropriate this nickname.


Also, it is imperative that we respect the privacy of others. In this line, we must be especially careful when posting personal information or photos relating to others without the consent of these. For example, if I do not want to publish photos of the wedding of my son or my grandson's christening, by what right a user who has attended these events, decided without consulting me, hanging pictures on the net.
Finally, it is very important that we configure correctly privacy options applying restrictive practices. In this regard we must think very much what the information in my profile I wish to convey, who can see it, under what conditions, etc. It is also important in day to day, when we comment on the wall, we value what we want to convey and to whom, and above all, it is very important that we have a special care with the photos and videos you wish you hang, and even more if those photos are not ours, because like we have to protect our privacy , we must do the same with that of our friends.
Prior to this post I've been writing about the issue of privacy . Who wants to read them accessible "The privacy and social networks" or "job search and virtual reputation" or "watch virtual reputation" . I am satisfied if after reading it, someone is aware and start taking measures to avoid privacy problems with which we can find if we are not careful.

0 comments:

Post a Comment