Laws and regulations governing cybersecurity
Wymagania zaliczenia
7. Privacy and security in ICT, data protection in cyberspace
7.3. SUMMARY / MAIN OUTPUTS FROM THE CHAPTER
ℹ️
- All applications, whether used in any computer system, web services and especially social media, collect a considerable amount of information about their users. They do not need this information for their operation, but it allows both the ISP in question to provide a service “for free” and to “target” or modify the services it offers. Information that is not necessary by default for the direct functionality of individual services includes, for example, information of a personal nature (name, surname, email address, telephone number, address, etc.), sensitive nature (e.g. information about the computer operating system used, versions individual applications, cookies, etc.), location data (GPS coordinates, information about Wi-Fi, GPRS, etc.), operational data, etc.
- Digital footprints, based on whether or not they can be influenced by a user, can generally be divided into footprints that can be influenced (active) and those that cannot (passive).
- In the world of ICT, one rule applies: whenever you upload, transfer, mediate or put anything into cyberspace, it stays there “forever”. Passive footprints most often arise from the interaction of one computer system with another computer system or from the functionality of a computer system (and associated software). Examples of such traces may be information from the operating system (such as Windows error messages or system information), or other information and data that are stored based on the system’s functionality without having to be transmitted (such as a computer system that has never been connected to any network or other computer system). To say completely uncompromisingly that these footprints cannot be influenced would not be entirely correct. If a user is sufficiently experienced, he/she is able to change, mask or suppress a number of “passive” digital footprints (e.g. by a simple anonymous mode of the web browser that turns off cookies). However, a user’s movement on the Internet can be monitored in a variety of ways.
- An active digital footprint that can be influenced represents all information that a user voluntarily transfers about himself/herself to another person (whether natural or legal, or even ISP). Transferring may include a number of activities, such as sending an email, adding a post to a discussion, forum, publishing any media (photo, video, audio, etc.) on social media, etc. The term also includes a registration and use of all conceivable services within cyberspace [e.g. operating systems, emails (including freemail), social media, dating, P2P networks, chats, blogs, bulletin boards, websites, cloud services, data storages , etc.].
🗝️
KEY WORDS TO REMEMBER
- Digital footprint
- Passive digital footprint
- Active digital footprint
- EULA
❓
KNOWLEDGE CHECK
QUESTIONS
- Define the term “digital footprint”.
- How do digital footprints differ from each other?
- What elements does a passive digital footprint consist of?
- Who is LIR?
- What information about a user does an IP address carry?
- What is the EULA?