Privacy, Confidentiality and Anonymity in the digital world

 

twitter-2012-negative-logo-5C6C1F1521-seeklogo.com.png

Twitter Privacy policy:

It is not possible to ensure that total privacy and integrity of users’ information is done but Twitter offer a large amount of option for the user on how their personal data is used.

Physical Privacy:

  • Twitter makes use of your location so that they can better personalise the content you see on their site making it more relevant to the user.
  • Twitter does not require the user’s profile picture to be an actual picture of the user.
  • A user’s location must be added during account creation but they user can choose not to display this specific location on their profile page. This specific location can only be accessed by Twitter or their partners.
  • A user can choose to not allow other users to tag them in photos.

Mental Privacy:

  • Twitter tailors’ content to the user based on what is relevant to the user. The user has the choice to opt out of this so that the content is not tailored to them.
  • Twitter never forces a user to give any information that they do not feel comfortable giving them.
  • Twitter associate’s devices that users’ login on with thier account for purposes such as authentication, security and personalization.
  • Twitter allows users to use their Twitter data to see which advertisers included them in tailored audience ads. You can also see information that Twitter has inferred like the user’s age range, gender, language and interests.

Decisional Privacy:

  • Users can choose to receive direct messages from anyone or just people that they are currently following.
  • Users can delete their account at any time removing their profile and information from the site.
  • A user can control when and where they may see sensitive content on the site.
  • Twitter asks users to allow access to the user’s contacts so that they can try find if your contacts are on the site and recommends them to you as friends.
  • A user has the choice to block or mute other Twitter accounts.

Informational Privacy:

  • Twitter are open about the data they collect and share through their services.
  • Twitter does not require a user to use their real name as their account name.
  • A user’s information will only be revealed if it is required by law or an important government legal process.
  • Twitter makes use of cookies to collect additional website usage data and to operate their services.
  • Twitter gathers log data about what content someone views or interacts with even if they person has not created an account.

 

For more information about Twitter’s privacy policy it is available at: https://twitter.com/en/privacy

 

Security methods/tools that secure WordPress.com Blogs

WordPress.com takes its users personal data very seriously and its protection is a priority for them.

They encrypt all sites created including custom domains hosted on their site, this is extremely important to them to the point they do not offer an option to turn off the encryption. They make use of an SSL certificate for the sites. Encryption allows only authorised users to access data and also shows that the data has not been opened or altered in any way before getting to the person.

They run firewalls to alert them of any attempts by any unauthorised attempts to gain access to any WordPress.com accounts.WordPress monitors any suspicious activity taken place on their site. The firewall will prevent any unauthorised access to the site’s private data. Their site has protection against any DDos attack that might happen. A DDos attack or distributed denial of service is an attack when the website is flooded with information and requests which eventually make the website go down.

A honeypot could be used to secure the blog as attackers will be tricked into attacking the honeypot system and not the actual system that contains the blog and all its private data can be kept safe from the attackers.

They also give methods that the user can put into place to help secure their data. They suggest that users implement a two step authentication allowing for an extra level of security because the person that is trying to get your data is more than likely not able to get a hold of your smartphone.

Another suggestion is to use a strong password that is new and different than any other passwords you have used for other accounts. This makes your account harder to get into and if another one of your accounts gets breached they do not then have the password for all your other accounts on the internet.

If a user has good wireless security on their network they use this will help stop anyone from accessing information through your network itself.

For more information:

https://en.support.wordpress.com/security/