The type of information that could be collected and can be classified as either individually identifiable information or Mass undisclosed information.
Individually Identifiable InformationIndividually identifiable information can be defined as information that can be used to identify an individual, that consist of information like name, address, telephone number, credit card number, or email address And other consumer specific information. This information is linked with identifiable information from other sources, or from which other personally identifiable information can easily be found, including, but not limited to, name, address, phone number, fax number, email address, financial profiles, credit card information. And also IP address is associated with Personally Identifiable Information, unless you have affirmatively disclosed this information. The Internet generates an elaborate trail of data every stop a person makes. Pentium III processor identifier chip called Processor Serial Number or PSN, It is a number tied to the individual and used to validate one's identity through a range of interactions with any organization or demographic.
Mass Undisclosed InformationMass undisclosed information" can be defined as information that: a website or third party on its behalf aggregates and categorizes by established geographical areas, such as postal codes and contains non-consumer specific information created from anonymous transactions for use by merchants in better managing their businesses and conducting mass media advertising.
There is a abundant of technologies that are utilized to collect both Classes of information on consumers. One of these tools are called "Cookies" Which is simply a piece of information [computer code] that is saved on your own Computer or your browser. It contains information as to the personal preferences exhibited when visiting a website. As it is impossible to differentiate between Visitors to a Web site, the server will somehow mark the visitor by storing information on them.
While Cookies themselves are not gathering the data, they are used as tracking devices to help people who are collecting information. Any information gathered is associated with the value they keep in any Cookie. A Cookie cannot read hard drive to find out who they are, or there incomes or place of residence, However, that information could end up in a Cookie if you provided it to a site and that site saved it in a Cookie.
Policies to Protect privacyAccountability by organizations for information within their possession Limit the collection of the information.Revelation of personal data to the declared purpose except with the consent of the individual. Organization should retain information only as long as necessary. Information in possession of an organization should be accurate and up-to-date Security should be the Priority Organizations collecting should be transparent in their policy and practice Organizations should allow individuals access and the ability to rectify errors.
Fair information practicesWeb sites would be required to provide consumers notice of what information they collect and how they use it. Web sites would be required to offer consumers choices as to how that information is to be used beyond the use for which the information was provided. Web sites would be required to offer consumers reasonable access to that information and an opportunity to correct inaccuracies. Web sites would be required to take reasonable steps to protect the security and integrity of that information. Websites that collect personal identifying information from children 12 and under need to provide actual notice to the parent and obtain parental consent as follows.
The agency should issue interpretive rules defining fair information practices with greater specificity, taking into account industry-specific differences.
The purpose is to prevent violations of fundamental human rights such as unlawful storage of personal data, or the abuse or unauthorized disclosure of such data.
GDPR Is a Data Science Law for European Bloc:
What is GDPR? GDPR or General Data Protection Regulation is a legislation to secure the rights of the consumers. Its approval was taken in 2016. The European companies nailed on it two years ago. Now, itís likely to come into effect from May 2018.
Privacy Settings to Support Cyber Law by Securing FB Data:
How is it if someone delivers your email address to an unknown? Would you ever take this act granted? Matthew Oczkowski, the head product of the aforesaid consulting firm, harvested the data of 50 million Facebook users.
The state Cyber Cell v Yogesh Pandurang Prabhu:
This case deals with the Section 509 of Indian Penal Code, 1860 and Section 67 and 67A of Information Technology Act, 2000. This case deals with the sending of obscene emails sent by the accused to the complainant.
Email Privacy & Anti-spam Law: Internet email is an electronic system through which messages are transported between systems on the behalf of their users. It is a faithful system in that the mail server delivers a message to the receipt that it is directed to.
Cyber Crime: The word cyber and its relative dot.com are probably the most commonly used terminologies of the modern era. In the information age the rapid development of computers, telecommunications and other technologies has led to the evolution of new forms of trans-national crimes known as cyber crimes.
Data Protection Law In India: Probes into data protection and its Indian perspective ,Data Protection Law In Respect of Information Technology Enabled Services, its significance and challenges citing various instances of the frauds and mishaps - - Swati Sinha
Intellectual theft- an essay on Plagiarism: Plagiarism is an issue of concern among people all around the world. It is a moral, ethical, legal issue which has been plaguing the world for centuries - - Soumo and Suvajit
Online Defamation: The concept of defamation in India is defined under Section 499 of Indian Penal Code. The concept is very old and is backed up by various judicial pronouncements - - Vibhor Verdhan
Does India have a Data Protection law: This article mainly throws light on the absence of Data Protection law in India and its consequences
Breach of Confidentiality and Various Legal Issues: Confidentiality has been defined as the "ensuring that information is accessible only to those authorized to have access" and is one of the cornerstones of information security.
Data Retention Policies: Document retention, especially the retention of electronic data has become a hot topic in the legal industry. In the 21st century business world, companies are creating and storing the electronic document and information at light speed.
Data Protection Act: The Data Protection Act of England is an act that was made after the report of Lindopís Commission that had spoken about the privacy of the citizens of the country of United Kingdom. The data protection act contributes its level best in maintaining the privacy of the citizens of the country
Copyright Infringement in Cyberspace and Network Security: Information Technology is growing faster than any other communication vehicle in the history mankind. Invention of digital technology was the most important revolution in the last century. The influence of digital technology
Data Protection Law in India: The purpose of this article is to throw light upon the laws that are for the protection of data inh India. A comparative and critical analysis with the foreign laws relating to data protection has been made.
Emergence of Knowledge Economy: In an agricultural economy land is the key resource. In an industrial economy natural resources, such as coal and iron ore, and labour are the main resources.
Cyber Crime And Law: contributes an understanding of the effects of negative use of Information technology, and how far the present law in India is successful in dealing with the issue, and what way is the legal structure lagging to curb the crime.
Cyber Terrorism: Cyber terrorism is the premeditated use of disruptive activities, or the threat thereof, in cyber space, with the intention to further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives.
# White Collar Crimes - cyber crimes
# Virtual Worlds-A Real Problem
# Software Licensing Agreement
# Cyber Crime - Issues Threats and Management
# Historical Perspective of Terrorism & Cyber Terrorism
# Offences & Penalties under the IT Act, 2000
# Keyword Trademark Infringement
# Internet Censorship
# Cyber Forensics & Electronic Evidences
# Cyber Torts
# Data Protection and Outsourcing
# Cyber Terrorism - Quick glance
# Cyber Offences - A Technological Termite
# Cyber Crime- success of conviction lack of jurisdiction
# Issue of Jurisdiction in Combating Cyber Crimes
# Prevention of Cyber Crime
How To Submit Your Article:
Follow the Procedure Below To Submit Your Articles
Submit your Article by using our online form
Note* we only accept Original Articles, we will not accept Articles Already Published in other websites.
For Further Details Contact: [email protected]
File Your Copyright - Right Now!
Lawyers in India - Search By City