The impact of silent acquiescenceToday we crave the ability to check emails on the go, get weather reports at our fingertips and read news of all kinds at a button?s touch.?All this came seamlessly but, unknown to us all, it came at the price of our privacy. To try to keep up with the speed of technology, the European Commission released its draft of the proposed Data Protection Regulation legislation in early 2012 with the aim of strengthening and safeguarding our online privacy rights. But does the European Commission speak for each and every European citizen when it comes to what has become the almost fundamental right to use laptops, tablets, mobile technology on a daily basis?
Is it time to question access privileges?Privacy policies tend to capture this information but in a broadly generic way such that the user is no more informed reading it than not. Have you ever questioned why the app provider needs full network access and permissions to your device and what this means in practice? Certain software changes are required to make the app accessible but why do a high percentage of apps require full access to your contact list, calendar or even the operating system on your device? Should we as consumers be content when some service providers may scan our emails and use the information gathered for their own commercial purposes? Should the choice just be ?don?t download the app if you don?t like the terms?? Let us briefly consider how this impacts us in the workplace and why we should be concerned. With the increase in Bring Your Own Device (BYOD), employees should consider that when you choose to use your personal device or laptop as your work machine you may be opening up your personal data for your employers to see. Employers don?t want their staff leaving with company data, and employees equally do not want their bosses nosing in on their personal data. There is no current platform that sandboxes or contains the data to be distinguished. IBM?s acquisition of Fiberlink was apparently aimed at bringing privacy by design to the world of BYOD. It will be interesting to see whether IBM buying this privately held mobile management and security company will further promote BYOD in the workplace. Furthermore, for apps downloaded onto a mobile device, IBM hopes to automatically vet those apps that request unnecessary access to contact lists, calendars and the like.
Share this story