Web Hosting Articles

  Home arrow Web Hosting Articles arrow Page 4 - You and Your Privacy
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
  >>> SIGN UP!  
  Lost Password? 

You and Your Privacy
By: Bruce Coker
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating:  stars stars stars stars stars / 0

    Table of Contents:
  • You and Your Privacy
  • Policies in practice
  • Current Policies
  • Taking back control

  • Rate this Article: Poor Best 
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article




    You and Your Privacy - Taking back control

    (Page 4 of 4 )

    Various initiatives are in place that attempt to bring some uniformity to Internet privacy. Foremost among these is the Platform for Privacy Preferences Project, P3P, which was set up in 2002 by the World Wide Web Consortium and seeks to implement usersí privacy preferences through user agents, primarily web browsers. On the face of it, this approach has much to commend it: primarily, the simplicity of setting your preferences in one place (the browser preferences dialog), and thereafter letting the browser do the work of enforcing them.

     However, the P3P paradigm is beset with difficulties that have made it extremely difficult to implement effectively. Key among these has been the lack of support from web sites. Non-compliant sites can continue to abuse the data they collect, almost without consequence, and the lack of enforcement power behind P3P only reinforces this problem.

    Another difficulty has been garnering support from the main browsers. Support is present in Internet Explorer, but has been withdrawn from recent versions of Firefox and is not available at all in many other widely-used browsers such as Safari and Opera. Further difficulties have arisen from the complexity of much P3P software, the illusion P3P creates for users that their privacy is being protected when this may not in fact be the case, and the perception that P3P can actually facilitate the gathering of information rather than protect against it.

    A more extreme stance on Internet privacy protection is taken by the Electronic Privacy Information Centre (EPIC), which was formed in 1994 in response to the privacy and civil liberties issues that were raised by the rapid rise of information technology. The EPIC has been highly critical of the P3P initiative, claiming that it has in fact created a state of complacency among users who wrongly believe their privacy is protected. EPIC is skeptical about the value of centralized solutions to privacy issues, and this is borne out by recent statistics published on its web site http://epic.org/.

    A recent study of 100 of 100hot.comís most frequently visited web sites revealed that only 17 percent had an explicit privacy policy and not a single one met the organizationís basic standards for privacy protection. The message according to EPIC is clear: surfer beware. It is up to the individual not just to make sure they understand the privacy implications of using the Internet, but to take appropriate measures to protect themselves. To assist users with this, EPIC publishes comprehensive documentation of privacy issues, along with an extensive list of privacy tools, including secure email clients and web browsers, encryption utilities, proxy servers, anonymous surfing utilities and content filters.

    Ultimately Internet privacy is an issue for all participants; of equal concern to surfers, site owners, developers and ISPs alike. However, one thing is clear: in the end itís up to each individual to take responsibility for their own privacy affairs, as nobody else can be trusted to do it on your behalf.

    DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.


    - Top Wordpress Plugins for SEO
    - Top Drupal Evaluation and Rating Modules
    - Free Network Monitoring Programs for Max Per...
    - E-store Hosting: Free Options for Beginners
    - Dropbox: The Ultimate File-Sharing and Synci...
    - Reviewing the Best Free Web Hosting Sites
    - Businesses Turn to Reseller Web Hosting for ...
    - Multiple Data Center Hosting
    - Web Hosting Goes Green
    - Web Hosting Technology Overview
    - Collaborate: An Examination of Tools for Gro...
    - Social Networking Security
    - Domain Names 101
    - Top Software to Help Manage Your Websites
    - The Evolution of Phishing

    Developer Shed Affiliates


    © 2003-2019 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap