{"id":87,"date":"2019-07-08T09:06:13","date_gmt":"2019-07-08T09:06:13","guid":{"rendered":"http:\/\/ksoftglobal.com\/blog\/?p=87"},"modified":"2019-07-08T09:06:13","modified_gmt":"2019-07-08T09:06:13","slug":"technology-and-privacy","status":"publish","type":"post","link":"https:\/\/ksoftglobal.com\/blog\/technology-and-privacy\/","title":{"rendered":"Technology and Privacy"},"content":{"rendered":"<p style=\"text-align: justify;\">Privacy concern has become an everyday discussion in Tech world these days. It can be about the government spying on its people or the companies stealing the data for selling or to use it for their benefits. Technology integration with our lives is increasing as we are becoming more comfortable with it and hence more data is available for the tech owners. Equifax data breach, Facebook data breach, and many other such incidences have already shaken the world and made the user more privacy sensitive. Recently, Amazon was found to be keeping the Alexa data even if the user has deleted it from their personal device.<\/p>\n<p><a href=\"http:\/\/ksoftglobal.com\/blog\/wp-content\/uploads\/2019\/07\/shutterstock_791823313.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-88\" src=\"http:\/\/ksoftglobal.com\/blog\/wp-content\/uploads\/2019\/07\/shutterstock_791823313.jpg\" alt=\"\" width=\"4354\" height=\"2561\" srcset=\"https:\/\/ksoftglobal.com\/blog\/wp-content\/uploads\/2019\/07\/shutterstock_791823313.jpg 4354w, https:\/\/ksoftglobal.com\/blog\/wp-content\/uploads\/2019\/07\/shutterstock_791823313-300x176.jpg 300w, https:\/\/ksoftglobal.com\/blog\/wp-content\/uploads\/2019\/07\/shutterstock_791823313-768x452.jpg 768w, https:\/\/ksoftglobal.com\/blog\/wp-content\/uploads\/2019\/07\/shutterstock_791823313-1024x602.jpg 1024w\" sizes=\"(max-width: 4354px) 100vw, 4354px\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">But what exactly is privacy? One can define privacy in the tech world as \u201cRestricted access\/ Limited control\u201d. In this kind of privacy, some people are allowed access while some are not. Most of the people today are on social media. Whenever people sign-up on such a platform, they have to share some minimum amount of information. Some social media platforms use this data to come up with push suggestions such as friends and family suggestions, products and market suggestions, etc.<\/p>\n<p style=\"text-align: justify;\">There are many groups of people who are paying other companies to get hands on your data. Some want to know your contact information to connect with you for selling some product while some are using your choice and preferences to send you product suggestions. While some are straight away trying to scam you by getting hands-on bank information or credit card information etc. WikiLeaks founder Julian Assange has said that \u201cInternet is the greatest spying machine the world has ever seen\u201d.<\/p>\n<p style=\"text-align: justify;\">With technologies like IoT, the number of connected devices is increasing day by day and hence the amount of data that these companies have is also increasing. And obviously, one cannot straight away opt-out; he has to stay with the technology. This creates an immense need to control data privacy. Every government needs to work on the privacy laws and come up with new regulations which can truly secure the users.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Privacy concern has become an everyday discussion in Tech world these days. It can be about the government spying on its people or the companies stealing the data for selling or to use it for their benefits. Technology integration with our lives is increasing as we are becoming more comfortable with it and hence more <a href=\"https:\/\/ksoftglobal.com\/blog\/technology-and-privacy\/\" rel=\"nofollow\"><span class=\"sr-only\">Read more about Technology and Privacy<\/span>[&hellip;]<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/ksoftglobal.com\/blog\/wp-json\/wp\/v2\/posts\/87"}],"collection":[{"href":"https:\/\/ksoftglobal.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ksoftglobal.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ksoftglobal.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ksoftglobal.com\/blog\/wp-json\/wp\/v2\/comments?post=87"}],"version-history":[{"count":1,"href":"https:\/\/ksoftglobal.com\/blog\/wp-json\/wp\/v2\/posts\/87\/revisions"}],"predecessor-version":[{"id":89,"href":"https:\/\/ksoftglobal.com\/blog\/wp-json\/wp\/v2\/posts\/87\/revisions\/89"}],"wp:attachment":[{"href":"https:\/\/ksoftglobal.com\/blog\/wp-json\/wp\/v2\/media?parent=87"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ksoftglobal.com\/blog\/wp-json\/wp\/v2\/categories?post=87"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ksoftglobal.com\/blog\/wp-json\/wp\/v2\/tags?post=87"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}