We're hiring
The Definition of Privacy

79 % of EU citizens access the internet every day. Using their computer or mobile device to surf the web, users generate vast amounts of data that could give outsiders a peak into their most personal preferences, habits, political views and more.

 

We live in the information age fueled by data. While harnessing this data can allow for enormous innovation and service improvements for businesses and consumers alike, it also harbors immense risk for the anonymity, privacy and security of individuals and their data.

 

In the first part of this series, we will take a closer look at the meaning of privacy in the digital age and its importance.

Privacy: a definition

The Cambridge dictionary defines privacy as a person’s right „to keep their personal matters and relationships secret“. Privacy is a long-held value in Western democracies and is based on the tenet that certain private matters of individuals should be free and independent of government or outside influence.

 

Researchers suggest that privacy is a multi-faceted construct. Rosenberg (1992) proposed a widely cited concept that distinguishes between

 

  • territorial privacy (protecting a person’s physical surroundings)
  • personal privacy (protecting a person from outside interference)
  • informational privacy (controlling whether and how personal data is gathered, stored, processed, or selectively disseminated)

 

Another much-regarded multi-dimensional conceptualization of privacy was put forth by BusinessWeek (1998) and Osorio (2001) which define the term as a user’s control in terms of property, autonomy and seclusion.

 

  • property means users can freely give away part of privacy of their data in exchange for getting a benefit in return (e.g. free service usage)
  • autonomy entails a user’s right and ability to authorize third parties to gather, store, process or selectively disseminate their data
  • seclusion understands a person’s general right of freedom from intrusion.

 

Privacy and the Internet: Paying with personal data for ‘free’ services?

In the digital age and online context, it is primarily the mentioned informational/data privacy that comes into the spotlight. Data privacy entails that a user himself/herself has full control over their personally identifiable information (PII).

 

Nowadays, internet usage, mobile devices and IoT-enabled devices with sensors allow for data generation and collection at previously unforeseeable levels. Social media platforms have established the model of monetizing user data in exchange for offering users “free“ service.

 

As a result, most user data is not stored with users but large social media and online service platforms. Pooled in data lakes, companies gather, structure and analyze user data with the help of artificial intelligence (AI) algorithms in order to derive new insights for cost optimization, marketing opportunities and more.

GDPR & CCPA: Replacing trust with clear guidelines

Privacy becomes a major user concern, as most of their data is stored with profit-oriented companies who may not have their users best interests at heart. Data privacy is dependent on the intersection of control and trust. Users therefore need to trust these companies that they will safely store and manage this data within its designated use and neither sell this data to third parties nor allow it to be compromised by hacks from malicious actors. However, a recent boost in data regulation has started to replace trust with clear laws and guidelines for companies managing user data.

 

As regulators realize the importance and sensitive nature of user data, they have enforced strict frameworks like the GDPR in Europe or California Consumer Privacy Act (CCPA). These frameworks seek to guarantee user privacy by forcing companies to reveal the details and type of data (what), the reasons (why), the ways in which (how) and the purpose for (what for) as well as methods of storage they use for gathering and storing user data.

 

Companies may only gather the data required for a specific, granted purpose and aren’t allowed to reuse it for purposes other than authorized by users. The GDPR goes one step further and dictates that upon request a company must provide a user with the entirety of his user data on record (“right of access“) and delete all of these records upon request (“right to be forgotten“).

 

When a student enters University, he knows his University will track his class performance that could give insight to various elements as his ambition, intelligence, reliability and more. Yet, as the student knows that the University would face enormous legal liability and sanctions for selling or transferring such data to third parties, he can trust his University to keep the data within its designated use. A penalty system can be a good mechanism to enforce trust by aligning the users and the data-controlling entity’s interests.

 

Users have become more worried and concerned about data privacy in recent months. While they may willingly share personal information with their friends and contacts on social media, they will wildly oppose companies using or sharing their data. When Facebook announced in January 2021, it would force WhatsApp users to share their data with Facebook (or deactivate their WhatsApp account), a public outcry followed.

The ‘I’ve got nothing to hide — argument’ and four reasons why it’s invalid

If being asked about privacy, a common argument is the „I have nothing to hide. Why should I care?“, saying their person and data would not be important or relevant enough for anyone to track and analyze. The ‘I’ve got nothing to hide — argument’ is a big and dangerous fallacy for various reasons:

 

  1. This argument mistakenly suggests that privacy is something only criminals desire
    Many things we prefer to do in private like singing in the car, going to the toilet or entrusting ourselves to family and friends, even if they are not wrong or illegal. Fences and curtains are ways to ensure a certain level of privacy, not indicators of criminal behavior.
  2. Surveillance is illegal
    First of all, an individual doesn’t have to be a person of public interest to fall victim to surveillance. Technological means allow governments or foreign agents to execute mass surveillance which is always illegal and breaches our right for privacy. Surveillance is only legitimate if there is valid concern for wrongdoing of a person and a court order for surveillance has legally been obtained.
  3. Privacy prevents common threats
    Identity theft, discrimination based on personal information, harassment, manipulation, and many other threats can result from privacy invasion. Many people often forget that lots of little snippets of information about one can be combined into a big picture that reveals much more about oneself than one would think possible.
    In fact, according to an MIT analysis “just four fairly vague pieces of information, such as dates and locations of four purchases, are enough to identify 90 percent of the people in a dataset that tracks three months of credit card transactions by 1.1 million users.”
  4. Per standard, people’s lives should be private and free from intrusion
    Individuals must place enormous trust in the people conducting surveillance, which is often times executed by algorithms that are clearly fallible and lack moral conscience. Scientific studies have shown for decades that our behavior and actions change under surveillance, hence our lives are altered. There are parts and areas of our lives that should be hidden, and nobody has to know about — just by what they are.

 

Sources

  • Business Week (1998), A Little Net Privacy, Please, 16 March, available at: www.businessweek. com/
  • Osorio, C. (2001), “A new framework for the analysis of solutions for privacy-enhanced Internet commerce”, eJETA: The eJournal for Electronic Commerce Tools and Applications, Vol. 1 №1, pp. 1–8.
  • Rosenberg, R. (1992), The Social Impact of Computers, Academic Press, New York, NY.

RESEARCH BLOG

Lets have a look at our other
interesting blog posts

Cybersecurity Upgrade: Cryptix Joins Forces with Hacken

Cryptix and Hacken have teamed up to offer our clients a slate of next-level cybersecurity services. See what we’re offering and how we can help you protect your digital assets. Read more

#PlayToWin: Cryptix Partners with Finaport Zug Open 2023

See what Gold Sponsors Cryptix and Cryptix Security have planned for the weeklong tennis tournament, and what Web3 and championship tennis have in common. Read more

Cryptix at Crypto Valley Conference 2023: Story and Pics

Cryptix AG had a great two days at Crypto Valley 2023, where it served as a Gold Partner, hosted a masterclass on crypto security, and networked with other industry leaders. See full story and pics. Read more

Cryptix C-Suite Promotions Underscore Company Growth and Maturity

See what these new promotions say about Cryptix as a firm and what they mean for the company's future. Read more

Cryptix Mentors New Startup Talent at WW3M Hackathon in Vienna

See how Cryptix utilized Vienna hackathon to mentor - and also learn from - the next wave of Web 3 innovators. Read more

Artificial Intelligence Responsibly: Best Use Cases for ChatGPT

See how to limit your exposure to data risks and misleading information, and get the most out of your ChatGPT experience. Read more

Cryptix AG is home to first CCSS auditor in EU and Switzerland

Cryptix Group became the first company in the EU and Switzerland with a CryptoCurrency Security Standard (CCSS) auditor on staff. Read more

Cryptix AG makes strategic investment in SMAPE Capital

New partnership reflects the two organizations' shared values and vision. Read more

Why financial literacy is more important than ever

Users have more options for banking and financial service providers than ever before, while having a much larger and broader choice of assets to invest in. Read more

Going Back in History: How Banking and Financial Services Evolved

25 years ago, your banker knew you personally (and you knew them). Then the internet came around. Read more

Investor platform Equito launches crowdfunding solution

Cryptix announced that it has received regulatory approval to launch of Equito – a fully regulated, all-in-one investor platform designed to unlock new financing channels for European start-ups and SMEs. Read more

It’s 2022, why Are We still Lacking Financial Literacy?

Financial literacy of the general population is lacking. This is a common finding in research studies and surveys. Yet individuals need to take responsibility for their personal finances. Read more

Cryptix launches what is likely to be the most future-proof apprenticeship in Switzerland

Zug, 13.04.2022 - From August 2022, venture builder Cryptix AG will train apprentices, making it one of the few companies in Switzerland that offers young people the chance... Read more

The concept of Zero Trust and why you should consider implementing it

Cyberattacks have increased in size, frequency and sophistication, causing on average $4.24mn in costs. The rise of cloud computing, the remote workforce following... Read more

Cryptix launches new venture with the MiFiD II investment licence

Switzerland, 30 August 2021: Switzerland-based fintech venture builder Cryptix has unveiled its latest venture, Equito, at Crypto Valley's flagship event, the CV Summit. Read more

Cryptix Group Forms a Successful Joint Venture

It is a coup that had been planned for some time. By involving a group of investors, Bernhard Koch made his Digital Asset Exchange Blocktrade an even stronger part of his emerging ecosystem of Fintech companies. Read more

10 Things You Don’t Want to Hear About Founding a Startup, But Need to

Enough about romanticized growth stories and myths of overnight success! Having been involved in a number of ventures, here’s a no-nonsense breakdown of what founding a start-up inevitably entails. Read more

The difference between Incubator, Accelerator and Venture Builder

“Something about start-ups and unicorns.” While it is true that accelerators, incubators and venture builders all are committed to support startups, they differ in their services and the goals they pursue. Read more

Cybersecurity Prevention for Small Budgets: Holistic Strategies

In our latest article, our cybersecurity expert Alexandre Horvath shows how even small and medium-sized companies can build cybersecure environments - without breaking the budget. Read more

e-Vaccination Certificates: Could Blockchain be the cure?

Currently one of the hottest topics and certainly one we leave to the experts: COVID vaccinations. However, when it comes to potential blockchain solutions for eVaccination certificates, we can't stay quiet. Read more

Anonymity does not equal privacy

Being anonymous: A fairy-tale?! The third part of our privacy series is dedicated to the concepts of anonymity, pseudonymity and security. Read more

Foreword Bernhard Koch: The value of privacy and the lack thereof in modern times

Privacy is the cornerstone of freedom and liberty. In business, as in our personal lives, there are things we want to keep confidential by all means. Read more

Let us support you to
get started with digital payment!

CONTACT

Get in touch

[contact-form-7 id="2562" title="Anfragen"]