Skip to main content
Business LibreTexts

3.4: Privacy with Social Media and Internet

  • Page ID
    113017
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)

    ( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\id}{\mathrm{id}}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\kernel}{\mathrm{null}\,}\)

    \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\)

    \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\)

    \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    \( \newcommand{\vectorA}[1]{\vec{#1}}      % arrow\)

    \( \newcommand{\vectorAt}[1]{\vec{\text{#1}}}      % arrow\)

    \( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vectorC}[1]{\textbf{#1}} \)

    \( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)

    \( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)

    \( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)

    \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)

    "Information Security (InfoSec) - Online Privacy - With Padlock" by Cloud Income is licensed under CC BY 2.0.

    Alt Text: Blue lock on a dark blue background

    Privacy on social media and the internet is a critical concern in today's digital age. With the vast amount of personal information shared online, protecting privacy has become increasingly challenging. Social media platforms, websites, and online services collect and store data about users, which can be used for various purposes, including targeted advertising, data analytics, and even malicious activities.

    3.4.1 Data Collection and Usage

    Social media platforms like Facebook, Twitter, Instagram, and LinkedIn collect extensive data on their users. This includes personal details, browsing history, location data, and interaction patterns. These platforms use algorithms to analyze this data and provide personalized content and advertisements. For instance, Facebook uses user data to target ads based on interests and behaviors, enhancing ad relevance but raising privacy concerns.

    3.4.2 Risks of Data Breaches

    "Research Data Management" by jannekestaaks is licensed under CC BY-NC 2.0.

    Alt Text: The word “Data” on wooden blocks

    Data breaches pose significant risks to online privacy. When social media platforms or websites are hacked, sensitive user information can be exposed. For example, the 2018 Cambridge Analytica scandal revealed how Facebook data of millions of users was harvested without consent for political advertising. Such breaches can lead to identity theft, financial loss, and reputational damage.

    3.4.3 Privacy Settings and Controls

    Most social media platforms offer privacy settings that allow users to control who can see their information and how it is used. Users can adjust settings to limit the visibility of their posts, manage friend lists, and control data sharing with third-party apps. For example, Instagram users can set their profiles to private, ensuring that only approved followers can view their content.

    3.4.4 Legal and Regulatory Frameworks

    General Data Protection Regulation (GDPR)

    The General Data Protection Regulation (GDPR) is one of the most comprehensive privacy laws globally, enacted by the European Union in 2018. GDPR applies to all organizations that process the personal data of EU residents, regardless of where the organization is located. Key provisions of GDPR include:

    • Consent: Organizations must obtain explicit consent from individuals before collecting their data.
    • Right to Access: Individuals have the right to access their personal data and know how it is being used.
    • Right to Erasure: Also known as the "right to be forgotten," individuals can request the deletion of their personal data.
    • Data Portability: Individuals can transfer their data from one service provider to another.
    • Breach Notification: Organizations must notify authorities and affected individuals within 72 hours of a data breach

    California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is a state-level privacy law that came into effect in 2020. It grants California residents specific rights regarding their personal information, including:

    • Right to Know: Individuals can request information about the personal data collected, sold, and disclosed by businesses.
    • Right to Delete: Individuals can request the deletion of their personal data.
    • Right to Opt-Out: Individuals can opt out of the sale of their personal data.
    • Non-Discrimination: Businesses cannot discriminate against individuals who exercise their privacy rights

    Personal Information Protection and Electronic Documents Act (PIPEDA)

    PIPEDA is Canada’s federal privacy law that governs how private sector organizations handle personal information in the course of commercial activities. Key elements of PIPEDA include:

    • Accountability: Organizations must appoint a privacy officer responsible for compliance.
    • Identifying Purposes: Organizations must identify the purposes for collecting personal information.
    • Limiting Collection: Organizations should only collect information necessary for the identified purposes.
    • Safeguards: Personal information must be protected by appropriate security measures.

    Children’s Online Privacy Protection Act (COPPA)

    COPPA is a U.S. federal law designed to protect the privacy of children under the age of 13. Key provisions include:

    • Parental Consent: Websites and online services must obtain verifiable parental consent before collecting personal information from children.
    • Privacy Policy: Websites must post a clear privacy policy detailing their information practices regarding children.
    • Access and Deletion: Parents have the right to review and delete their children’s personal information.

    3.4.5 Best Practices for Protecting Privacy

    Individuals can take several steps to protect their privacy online. These include using strong, unique passwords for different accounts, enabling two-factor authentication, and being cautious about the information shared online. Avoiding public Wi-Fi for sensitive transactions and regularly reviewing privacy settings on social media platforms are also recommended practices.

    Attributions

    The content above was assisted by ChatGPT in outlining and organizing information. The final material was curated, edited, authored, and arranged through human creativity, originality, and subject expertise of Gabrielle Brixey, MBA MAC and is therefore under the CC BY NC SA license when applicable. To see resources on AI and copyright please see the United States Copyright Office 2023 Statement and the following case study on using AI assistance but curating and creating with human originality and creativity.


    This page titled 3.4: Privacy with Social Media and Internet is shared under a CC BY-NC-SA 4.0 license and was authored, remixed, and/or curated by Gabrielle Brixey.

    • Was this article helpful?