
Internet Privacy: A Lawyer’s Guide To Online Privacy (Part 2)
1. Avoid torrent or piracy web sites
He...he…yes. There is something called ET (Entertainment Theft) and by show of hands please, how many here are thankful for pirate bay for making campus worth it? Aye?... Just me then? Ah. Ok.
Here is what I will say about Entertainment Theft. Do not be the one breaching creator’s rights on pirate bay and torrent, downloading pirated movies and music on to your phone or laptop. Because the same way the pirates stole and brought goods and information to you is the same way they will steal your information and sell it to someone else. Are we together?
2. Install an antivirus security suite
It is normally a no brainer for laptops and desktops. However, mobile device will also benefit from enhanced antivirus protection as a last line of defense. The software will notify you when you are about to click on malware links or suspicious content.
3. Rethink your social media presence
Find a sweet spot between your need to keep up with news and to catch up with friends through social media on one hand and also ensure that you do not compromise your own security and privacy. A tweak your privacy settings will give you control as to the levels of access to your information that you give out.
4. Use caution when connecting to public Wi-Fi
The free Wi-Fi offered at coffee shops, public libraries, airports, and hotels is a nice convenience. It allows us to get our work done on the go. But public Wi-Fi also comes with risks and, if you’re connecting to such a system, you need to be cautious.
The key problem with public Wi-Fi is that it can be easy for prying eyes to access any information you send and receive while online. When you’re accessing public Wi-Fi, then, avoid doing anything that involves sensitive information, like entering your bank account password or credit card information. And never send personal information in email messages. If you do, strangers might be able to easily intercept that information.
5. HTTPS everywhere
Need to connect to your bank, credit union, or credit card provider? Make sure to check the web address in the top of your browser. If it doesn’t start with “https,” don’t log in.
The “https” in front of a web address means that a website is secure and uses encrypted data. If a site’s address starts with “http” instead — no “s” — that means the site is not secure. It could be easier for hackers to access and steal personal information or track your online activity if you are visiting unsecured sites.
The good news is that HTTPS protocol is now standard. The web addresses of your bank, credit card provider, and other financial institutions should all start with it. If you log onto your bank and you don’t see ”https”? Do not open your account, and do not use the site to pay bills or transfer money.
6. Opt out of personalized ads from Google
It can be unsettling: You’re planning a trip to Miami, so you spend an hour online searching hotels, restaurants, and museums. Suddenly, ads from various airlines show up on your home screen, promising reduced flights to the city.
This is an example of personalized ads, and they’re a reminder of just how closely ad networks, such as the major one run by Google, track your online activity.
If you’d like a bit more privacy, you can instruct Google to stop displaying personalized ads. If you do this, you’ll still see ads when browsing online, but they won’t be related to anything in your search history. To edit your Google settings, log into your Gmail, proceed to “Personal Info & Privacy” box and follow the selection process.
-
The Fin-Tech Take Over
What exactly is Fin-Tech? Banks have gone head to head, outdoing each other with innovation. It s... -
What In The World Is ChatGPT?
(And why should you care?) Of course you have interacted with bots before. For example, when ... -
Tech Lingo For Lawyers
You know how someone throws in some Tech word in a conversation and in that one short moment you dec... -
The Subtle Balance And Trade-Offs In Cyber Security (Part 2)
Last week we looked at the cyber trade-offs that businesses have to make as they enter online market... -
The Subtle Balance And Trade-Offs In Cyber Security (Part 1)
Tradeoffs. That sounds familiar, but you can’t quite place it. Never mind, I’ll dive right into it. ... -
How To Craft A Winning Innovation Strategy
Where do we start? Yes, of course we have to start somewhere. Lawyers may lead the pack in more a... -
How Far Can Lawyers Go In Adopting Legal Tech?
The legal profession has historically been considered a conservative field and as a result, lawyers ... -
Drafting Bug Bounty (Ethical Hacking) Agreements
Where does the Lawyer come in? The relationship between a corporate like Safaricom and an individ... -
Data Controller Vs. Data Processor
The Data Protection Act requires that all Data Controllers and Processors be registered. The Act ... -
Ethical Hacking (Bug Bounty Hunting): What Does It Mean?
New word alert: Bug Bounty Hunting = Ethical Hacking. Last week, I was invited to a Tech Conferen... -
Internet Privacy: A Lawyer’s Guide To Online Privacy (Part 1)
Did you know that most Internet Service Providers (ISPs) are tracking, storing and mining your onlin...