Technology 5 min read

Why Data Privacy Matters Even More in an IoT World

In a world of ever-increasing interconnectivity, how do we maintain and protect personal privacy? Or do we simply sacrifice private data for accessibility?

Immersion Imagery | Shutterstock.com

Immersion Imagery | Shutterstock.com

Despite their page on data protection, Google repeatedly comes under fire every year for privacy breaches. Earlier this year, the Silicon Valley tech giant was fined $57 million for violating EU’s new GDPR laws.

Is loss of privacy and control the price we pay for interconnectivity?

The Devil is in the Terms of Service Details

When accessing a new app or service, most of us just click and go when we come to the “Terms of Service” section. Many tech users are familiar with the basics of ToS agreements, so we figure most are standard. As the adage goes, “The devil is in the details.”

With Google specifically, their ToS allows for many activities some would consider breaches of privacy. In 2014, Google claimed that it had a right to even sensitive data if it flows on an open network. But that’s not all.

Now, scrapped AI plans presented significant privacy concerns, too. Google can track online spending activities, as well as real-world purchases. Google even mistakenly locked out Google Docs users for supposedly “violating ToS.”

How much control do you have over the information you are putting in a Google, and are you tacitly giving Google the right to use that information? After all, is a Google Doc any different from a tweet or Instagram post?

image of people holding up shields for internet privacy for article Why Data Privacy Matters Even More in an IoT World
Google Privacy via Google.com

Protecting Privacy in an Interconnected World

Data protection and privacy in an Internet of Things environment seem like conflicting objectives. The lines between what we share on Instagram and Twitter vs. a private email to someone are clear to us. But to companies and computer algorithms, data may be data, personal or otherwise.

This dense, but worthwhile article from the National Institute of Standards and Technology blog highlights why security and privacy both matter in an IoT future. The constant data breaches of user information are obviously problematic. More insidious breaches include when Uber paid a group of hackers not to reveal sensitive info of 57 million people.

There are real economic ramifications for insecure data and ambivalence toward privacy. Beyond economic, tech, and data-driven concerns, a lack of privacy has measured effects on people psychologically, too.

The Hidden Mental and Emotional Costs of Digital Privacy Vacuums

Shame is a powerful tool. It can cost high profile actors to lose their roles in a popular Netflix series. The effects of shame can cause women or any victim to stay silent for decades about egregious abuses of power. But guilt is such a powerful tool that is has evolved into a new concept wielded by abusers, vigilantes, and do-gooders alike.

Shame conditioning extends to illicit activities as a way to deter damaging or potentially dangerous behavior. But it also seems to include activities some people would prefer to keep private such as plucking their eyebrows or their browser history.

Glenn Greenwald’s TED Talk on why privacy matters tackle this subject head-on. He starts by saying that proponents of mass surveillance argue that “only people engaged in bad acts have a reason to want to hide and to care about their privacy.” He elaborates that this binary worldview robs people of the freedom to be themselves.

Greenwald aims Google CEO Eric Schmidt when he references a 2009 interview in which Schmidt said something unsettling.

“If you’re doing something that you don’t want people to know [about], maybe you shouldn’t be doing it in the first place.He further pokes at Schmidt referencing this CNET article to display the inherent problems with that mentality toward privacy.

Social media can be curated, but some use it as a diary or just a tool to connect with others. It can also be a safe space where we can workshop our feelings or beliefs. At what point can statuses posted to only your Facebook friends be shared publicly due to the content of the status?

Answer Me These Questions Three

In another TED Talk, Stuart Lacey examined privacy in the context of monetization. He references location tracking, pulling up a completely accurate map and timeline of a day he spent in New York City, along with photos he took. He posits three questions:

  • One: Are you being robbed?
  • Two: Are you missing out?
  • Three: Are you being paid?

To put things in context, Samsung TVs were shipped with active webcams with the intent that the webcam needed to be ready for when you wanted to use it. They prioritized monetary gains at the threat of user privacy.

When companies are rightfully critiqued for this, often times their answer is to produce convoluted explanations such as the iTunes ToS as displayed in this nifty webcomic. This all amounts to companies not treating user privacy as an essential issue.

What Can We Do to Protect Our Privacy?

For Google specifically, you can turn off search and location history. You can also control how you interact with Google ads regarding personalization. Chrome plugins like HTTPS Everywhere can help bolster your device security.

But beyond VPNs, proxies, and ad hoc solutions, we, as consumers, cannot solve the issue of privacy in the digital age. Companies like Google, Facebook, and Equifax must enact their security measures to protect our data.

You can email, fax, and call your local government officials, too. Petitioning for greater accountability of companies to their users is definitely within the bounds of lawmakers and Congresspeople. 

Read More: New Study Shows That Data Privacy Is Dead

First AI Web Content Optimization Platform Just for Writers

Found this article interesting?

Let Juliet Childers know how much you appreciate this article by clicking the heart icon and by sharing this article on social media.


Profile Image

Juliet Childers

Content Specialist and EDGY OG with a (mostly) healthy obsession with video games. She covers Industry buzz including VR/AR, content marketing, cybersecurity, AI, and many more.

Comments (0)
Most Recent most recent
You
111
share Scroll to top

Link Copied Successfully

Sign in

Sign in to access your personalized homepage, follow authors and topics you love, and clap for stories that matter to you.

Sign in with Google Sign in with Facebook

By using our site you agree to our privacy policy.