• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 4. Legal Threats to Individual P... > Technologies for Legal Privacy Invas...

Technologies for Legal Privacy Invasion

Individuals, businesses, and governments are the main culprits when it comes to legal threats to privacy. But the technology advancements we have seen over the past five years have led us to this current state of affairs. Many things are out of our control, such as direct access to passing laws and developing our own technology, but we can control how we use the technology and reduce some of the risk we face through legal means.

File Sharing

Anyone who has used the Internet is familiar with the concept of file sharing. Application technologies such as Napster have made the concept of file sharing commonplace. Although this technology is perfectly legal, it exposes your computer to other people on the Internet and possible attack. At a more sophisticated level, personal computers give you the ability to share files and printers over a network even without the use of Napster-like technologies. With the advent of technologies such as DSL and cable modems, incorrect configurations can allow your whole hard drive to be shared and captured by anyone on the Internet. The IPSs are not in the business of protecting their customers; they only provide access and leave security and privacy up to the consumer.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint