The type of information that could be collected and can be classified as either individually identifiable information or Mass undisclosed information.
Individually Identifiable Information
Individually identifiable information can be defined as information that can be used to identify an individual, that consist of information like name, address, telephone number, credit card number, or email address And other consumer specific information. This information is linked with identifiable information from other sources, or from which other personally identifiable information can easily be found, including, but not limited to, name, address, phone number, fax number, email address, financial profiles, credit card information. And also IP address is associated with Personally Identifiable Information, unless you have affirmatively disclosed this information. The Internet generates an elaborate trail of data every stop a person makes. Pentium III processor identifier chip called Processor Serial Number or PSN, It is a number tied to the individual and used to validate one's identity through a range of interactions with any organization or demographic.Mass Undisclosed Information
Mass undisclosed information" can be defined as information that: a website or third party on its behalf aggregates and categorizes by established geographical areas, such as postal codes and contains non-consumer specific information created from anonymous transactions for use by merchants in better managing their businesses and conducting mass media advertising.There is a abundant of technologies that are utilized to collect both Classes of information on consumers. One of these tools are called "Cookies" Which is simply a piece of information [computer code] that is saved on your own Computer or your browser. It contains information as to the personal preferences exhibited when visiting a website. As it is impossible to differentiate between Visitors to a Web site, the server will somehow mark the visitor by storing information on them.
While Cookies themselves are not gathering the data, they are used as tracking devices to help people who are collecting information. Any information gathered is associated with the value they keep in any Cookie. A Cookie cannot read hard drive to find out who they are, or there incomes or place of residence, However, that information could end up in a Cookie if you provided it to a site and that site saved it in a Cookie.
Policies to Protect privacy
Accountability by organizations for information within their possession Limit the collection of the information.Revelation of personal data to the declared purpose except with the consent of the individual. Organization should retain information only as long as necessary. Information in possession of an organization should be accurate and up-to-date Security should be the Priority Organizations collecting should be transparent in their policy and practice Organizations should allow individuals access and the ability to rectify errors.Fair information practices
Web sites would be required to provide consumers notice of what information they collect and how they use it. Web sites would be required to offer consumers choices as to how that information is to be used beyond the use for which the information was provided. Web sites would be required to offer consumers reasonable access to that information and an opportunity to correct inaccuracies. Web sites would be required to take reasonable steps to protect the security and integrity of that information. Websites that collect personal identifying information from children 12 and under need to provide actual notice to the parent and obtain parental consent as follows.The agency should issue interpretive rules defining fair information practices with greater specificity, taking into account industry-specific differences.
The purpose is to prevent violations of fundamental human rights such as unlawful storage of personal data, or the abuse or unauthorized disclosure of such data.
Authored by Venkararamana B. Ramanathan , Advocate, Bangalore. and can be reached at: [email protected] / Print This Article
Related Articles
GDPR Is a Data Science Law for European Bloc:
What is GDPR? GDPR or General Data Protection Regulation is a
legislation to secure the rights of the consumers. Its approval was
taken in 2016. The European companies nailed on it two years ago.
Now, it’s likely to come into effect from May 2018.
Privacy Settings to Support Cyber Law by Securing FB Data:
How is it if someone delivers your email address to an unknown?
Would you ever take this act granted? Matthew Oczkowski, the head
product of the aforesaid consulting firm, harvested the data of 50
million Facebook users.
The state Cyber Cell v Yogesh Pandurang Prabhu:
This case deals with the Section 509 of Indian Penal Code, 1860 and
Section 67 and 67A of Information Technology Act, 2000. This case
deals with the sending of obscene emails sent by the accused to the
complainant.
Email Privacy & Anti-spam Law: Internet email is an electronic system through which messages are transported between systems on the behalf of their users. It is a faithful system in that the mail server delivers a message to the receipt that it is directed to.
Cyber Crime: The word cyber and its relative dot.com are probably the most commonly used terminologies of the modern era. In the information age the rapid development of computers, telecommunications and other technologies has led to the evolution of new forms of trans-national crimes known as cyber crimes.
Data
Protection Law In India: Probes into data protection and its Indian
perspective ,Data Protection Law In Respect of Information Technology Enabled
Services, its significance and challenges citing various instances of the frauds
and mishaps - - Swati Sinha
Intellectual theft- an essay on Plagiarism: Plagiarism is an issue of
concern among people all around the world. It is a moral, ethical, legal issue
which has been plaguing the world for centuries - - Soumo and Suvajit
Online Defamation: The concept of defamation in India is defined under
Section 499 of Indian Penal Code. The concept is very old and is backed up by
various judicial pronouncements - - Vibhor Verdhan
Does India have a Data Protection law: This article mainly throws light on
the absence of Data Protection law in India and its consequences
Breach of Confidentiality and Various Legal Issues: Confidentiality has been
defined as the "ensuring that information is accessible only to those authorized
to have access" and is one of the cornerstones of information security.
Data Retention Policies: Document retention, especially the retention of
electronic data has become a hot topic in the legal industry. In the 21st
century business world, companies are creating and storing the electronic
document and information at light speed.
Data Protection Act: The Data Protection Act of England is an act that was
made after the report of Lindop’s Commission that had spoken about the privacy
of the citizens of the country of United Kingdom. The data protection act
contributes its level best in maintaining the privacy of the citizens of the
country
Copyright Infringement in Cyberspace and Network Security: Information
Technology is growing faster than any other communication vehicle in the history
mankind. Invention of digital technology was the most important revolution in
the last century. The influence of digital technology
Data Protection Law in India: The purpose of this article is to throw light
upon the laws that are for the protection of data inh India. A comparative and
critical analysis with the foreign laws relating to data protection has been
made.
Emergence of Knowledge Economy: In an agricultural economy land is the key
resource. In an industrial economy natural resources, such as coal and iron ore,
and labour are the main resources.
Cyber Crime And Law: contributes an understanding of the effects of negative
use of Information technology, and how far the present law in India is
successful in dealing with the issue, and what way is the legal structure
lagging to curb the crime.
Cyber Terrorism: Cyber terrorism is the premeditated use of disruptive
activities, or the threat thereof, in cyber space, with the intention to further
social, ideological, religious, political or similar objectives, or to
intimidate any person in furtherance of such objectives.
# White Collar Crimes - cyber crimes
# Virtual Worlds-A Real Problem
# Software Licensing Agreement
# Cyber Crime - Issues Threats and Management
# Historical Perspective of Terrorism & Cyber Terrorism
# Offences & Penalties under the IT Act, 2000
# Keyword Trademark Infringement
# Internet Censorship
# Cyber Forensics & Electronic Evidences
# Cyber Torts
# Data Protection and Outsourcing
# Cyber Terrorism - Quick glance
# Cyber Offences - A Technological Termite
# Cyber Crime- success of conviction lack of jurisdiction
# Issue of Jurisdiction in Combating Cyber Crimes
# Prevention of Cyber Crime
How To Submit Your Article:
Follow the Procedure Below To Submit Your Articles
Submit your Article by using our online form
Click here
Note* we only accept Original Articles, we will not accept
Articles Already Published in other websites.
For Further Details Contact:
[email protected]
Divorce by Mutual Consent in Delhi/NCR
Right Away Call us at Ph no: 9650499965
File Your Copyright - Right Now!
Online Copyright Registration in India Call us at: 9891244487 / or email at: [email protected] |
Lawyers in India - Search By City |
|||
Delhi Chandigarh Allahabad Lucknow Noida Gurgaon Faridabad Jalandhar Vapi |
Mumbai Pune Nagpur Nashik Ahmedabad Surat Indore Agra Jalgaon |
Kolkata Siliguri Durgapur Janjgir Jaipur Ludhiana Dimapur Guwahati Amritsar |
Chennai Jamshedpur Hyderabad Coimbatore Eluru Belgaum Cochin Rajkot Jodhpur |