Monday, October 22, 2012

Privacy Concerns

  The article that I have chosen regarding privacy concerns is based on the recent popularity of smartphone technologies and their potential privacy issues.  The article summarizes how applications and GPS can create an issue for users.  The reason I chose this article is because it not only identifies potential privacy risks and concerns, but gives suggestions on how to mitigate these threats.  The article is called: "10 Steps To Smartphone Privacy", written by Eric Zeman on February 19, 2012.

  The opening paragraph summarizes how the smartphone has changed how we gain and use information.  The smartphone has applications that can point you in the right direction, find anything you desire, and keep you in constant touch with personal updates.  The three general ways, I have seen, that can help protect you can be divided into physical control of your device (something that many don't think of regarding privacy), careful selection of your applications you download (yes reading the User Agreement), and adjusting settings in your phone to ensure you control what is available for companies to see.

  The physical control of your device is often overlooked regarding privacy.  In the event that your smartphone is stolen and/or lost, you want to limit or eliminate the data that can be gained by someone who has access.  The first suggestion is to lock your phone, use a alphanumeric code and a screen lock (Zeman, 2012).  The nest item I found very useful is to download a "Find My Phone" or similar application that allows users to track or even wipe their phone in the even it is lost (Zeman, 2012).  The other two suggestions were common sense but also probably overlooked, control who let use it (Zeman, 2012)

  The downloading of applications where the user may be providing data that they unknowingly gave permission to give.  Careful attention to the "Permissions" part of the Agreement is crucial in determining what you are giving up (Zeman, 2012).  A good idea is to research the application and wait awhile to see if any user issues arise.

  The last suggestion was to ensure that you keep your phone up to date (Zeman, 2012).  The controlling of the data is important to your privacy.  Ensure you adjust the available settings within each application.  Additionally, there are settings in your phone that can assist in your transmission of data.  The article suggests turning off location assessment on any applications that use GPS to identify your location (Zeman, 2012).  I think this is important because the broadcast of your every location can not only be a violation of privacy.  An example of this was with a co-worker that was unable to purchase his fiancee's engagement ring because, unbeknownst to him, his phone updated on Facebook when he went to the jewelry shop.

  I found this article very useful as well as informative.  It reminds us that, although we live a world buzzing with technology, sometimes physical control and common sense have to be looked at as well.  The most fascinating fact I found is that we do have control over the security and privacy concerns.  I think as company's become more and more competitive in this economy, they could become more brazen with their applications, searching anywhere for an edge.  Smartphones require smart users.
 
Reference:

Zeman, Eric (2012).  10 steps to smartphone privacy.  Retrieved on October 22, 2012 from:  http://www.informationweek.com/security/mobile/10-steps-to-smartphone-privacy/232601089