During the industrial era, a citizen’s identity was limited to all official documents : passports, wills, marriage certificates, deeds concerning the purchase of the house, etc. (chapter 7, no 6). Now, thousands of pieces of a citizen’s life are scattered across several government and commercial websites, without adequately protecting the following private information :
- the full name, address and telephone number ;
- the social security number ;
- photos on Facebook ;
- the email ;
- the list of products purchased with the credit card ;
- serial numbers of purchased electronic devices ;
- subscriptions to magazines and newspapers ;
- the list of friends or donations ;
- the IP address assigned to each user to enter the Web (which keeps track of the trace) ;
- international recognition of wireless communication tools, etc.
Personal identification tools used by developers are cookies, data mining, robots that search the Web, etc. With such purpose, new invasions of privacy : targeted telemarketing, junk mail, algorithms suggesting what we buy and data marketing companies who sell our personal information to others.
During the industrial era, a citizen’s identity was limited to all official documents : passports, wills, marriage certificates, deeds concerning the purchase of the house, etc. (chapter 7, no 6). Now, thousands of pieces of a citizen’s life are scattered across several government and commercial websites, without adequately protecting the following private information :
- the full name, address and telephone number ;
- the social security number ;
- photos on Facebook ;
- the email ;
- the list of products purchased with the credit card ;
- serial numbers of purchased electronic devices ;
- subscriptions to magazines and newspapers ;
- the list of friends or donations ;
- the IP address assigned to each user to enter the Web (which keeps track of the trace) ;
- international recognition of wireless communication tools, etc.
Personal identification tools used by developers are cookies, data mining, robots that search the Web, etc. With such purpose, new invasions of privacy : targeted telemarketing, junk mail, algorithms suggesting what we buy and data marketing companies who sell our personal information to others.
Leave A Comment