Monday, April 23, 2012

Adversary regarding Privacy

By Paul Fray


Mobile phones are an essential part of the lives of men and women in many communities around the world. It is the most common way of communication and has taken on a lot more functions due to technological improvements of the 21st century. It is now in a position to not only send text messages but additionally multi media items, like recordings, video files, pictures, yet others. These are discussed, uploaded and sent to other folks for various purposes. This is on its own fine but in a globalized realm of technology wherein cyber offences are a reality there is a difficulty. A person often saves and stores a significant amount of personal information in their mobile. This is simply not always secure.

The digital age has also given birth to technology and also talent which are keen on hacking into gadgets. This means info stored inside them could be accessed, ripped off and illegitimately spread via the message network or internet. This gravely ignores a person's right to privacy.

This kind of right is available to protect information on a person which he/she does not need to make public or would otherwise demean and also defame their good name. The issue is when these kinds of material which pertains to a person is digitally saved in his or her cell phones and such will be taken with out their agreement or misused after procuring with permission.

In can be said that the cell phone is a medium by which ones level of privacy, is limited, diminished and even misplaced. It can be argued that it is the most potent and common method of undermining a persons privacy. However the same can be said of any function of communications.

Almost every system that allows for interaction can be a target for individuals who would want to break the privateness of individuals. Customers of today must be very aware to counter this danger. As the cell phone becomes the primary tool regarding interaction, it should be utilized with extreme care unless one inadvertently reveals his or her level of privacy to forms of attack.




About the Author:



No comments:

Post a Comment

Related Posts Plugin for WordPress, Blogger...